last executing test programs: 49.872603904s ago: executing program 1 (id=1115): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000180081064e81f782db44b904021d080006007c09e8fe55a10a0015400100142603600e120800060000000401a80016000900014003000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0xc854) 49.404070211s ago: executing program 1 (id=1116): ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='kfree\x00', r0}, 0x18) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34, 0x0, 0x3, 0x3, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000000c0)={0x0, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 49.217315726s ago: executing program 1 (id=1117): r0 = syz_open_dev$usbmon(&(0x7f0000001700), 0x7, 0x8a00) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f00000017c0)={0x0, 0x0}) 49.044866939s ago: executing program 1 (id=1119): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000003000), r2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000003040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r2, &(0x7f0000003140)={0x0, 0x0, &(0x7f0000003100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002bbd7000fbdbdf25020000000a000900aaaaaaaaaa44000008000300", @ANYRES32=r4, @ANYBLOB='\b\x00\v'], 0x30}, 0x1, 0x0, 0x0, 0x20000050}, 0x20040084) 48.352805204s ago: executing program 0 (id=1122): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0xd, &(0x7f0000000340), &(0x7f000001f200)=0x4) 48.234522463s ago: executing program 1 (id=1123): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000001180)=""/4113, 0x1011}], 0x1, 0x16, 0xfffffff9) 48.133230091s ago: executing program 0 (id=1124): r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @empty}}, 0xfdec, 0x21bb}, &(0x7f0000000140)=0x90) 47.917739198s ago: executing program 0 (id=1125): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x8, 0x0, 0x0}}, 0x10) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="3c010000190001000000000000000000e0000001000000000000000000000000fe8000000000000000000000000000aa4e220000000000000a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000104000000000000feffffffffffffff030000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000008400050020010000000000000000000000000000000000002b00000000000000000000000000000000000000000500000000000002000700000000000000000000000000e00000020000000000000000000000004000000033"], 0x13c}}, 0x20040880) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r1, &(0x7f0000000300)={&(0x7f00000003c0)=@l2tp6={0xa, 0x0, 0x101, @mcast1, 0xc84, 0x3}, 0x80, 0x0}, 0x2c044950) 47.734104633s ago: executing program 0 (id=1126): writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x85, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e23, @empty}}}, 0x90) 47.584878775s ago: executing program 0 (id=1127): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000400)={'batadv_slave_0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000200)={0x2c, 0xd, r2, 0x2}, 0x10) 47.315397435s ago: executing program 0 (id=1128): r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0xa4, 0x24, 0xf0b, 0x70bd2b, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x74, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x0, [0x5, 0x4, 0x2, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x8, 0x0, 0x0, 0x2]}}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x400}]}]}, @TCA_TAPRIO_ATTR_SCHED_CLOCKID={0x8, 0x5, 0x7}]}}]}, 0xa4}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) 45.495046399s ago: executing program 1 (id=1129): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a040007000000b6f1ffff0000854105001a"], 0x38}}, 0x8802) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100090e"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) 2.242344733s ago: executing program 32 (id=1128): r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0xa4, 0x24, 0xf0b, 0x70bd2b, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x74, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x0, [0x5, 0x4, 0x2, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x8, 0x0, 0x0, 0x2]}}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x400}]}]}, @TCA_TAPRIO_ATTR_SCHED_CLOCKID={0x8, 0x5, 0x7}]}}]}, 0xa4}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) 0s ago: executing program 33 (id=1129): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a040007000000b6f1ffff0000854105001a"], 0x38}}, 0x8802) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100090e"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x3ef, 0x0) kernel console output (not intermixed with test programs): _u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 278.779633][ T30] audit: type=1400 audit(278.390:162): avc: denied { read write } for pid=3822 comm="syz.1.147" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 278.781669][ T30] audit: type=1400 audit(278.390:163): avc: denied { open } for pid=3822 comm="syz.1.147" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 278.831771][ T3674] hid-generic 0000:FFFFFC00:0006.0002: unknown main item tag 0x6 [ 278.881361][ T3674] hid-generic 0000:FFFFFC00:0006.0002: hidraw0: HID v0.03 Device [syz0] on syz1 [ 279.430608][ T3824] fido_id[3824]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 280.121857][ T30] audit: type=1400 audit(279.730:164): avc: denied { map } for pid=3832 comm="syz.0.150" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5445 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 280.129088][ T30] audit: type=1400 audit(279.740:165): avc: denied { read write } for pid=3832 comm="syz.0.150" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5445 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 282.053392][ T30] audit: type=1400 audit(281.660:166): avc: denied { getopt } for pid=3842 comm="syz.1.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 283.218635][ T30] audit: type=1400 audit(282.830:167): avc: denied { create } for pid=3849 comm="syz.0.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 283.810712][ T3852] netlink: 44 bytes leftover after parsing attributes in process `syz.0.157'. [ 283.821921][ T3850] netlink: 44 bytes leftover after parsing attributes in process `syz.0.157'. [ 284.328560][ T30] audit: type=1400 audit(283.940:168): avc: denied { create } for pid=3856 comm="syz.0.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 284.825553][ T30] audit: type=1400 audit(284.430:169): avc: denied { create } for pid=3860 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 284.876468][ T30] audit: type=1400 audit(284.480:170): avc: denied { getopt } for pid=3860 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 284.878466][ T30] audit: type=1400 audit(284.490:171): avc: denied { connect } for pid=3860 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 284.891035][ T30] audit: type=1400 audit(284.500:172): avc: denied { name_connect } for pid=3860 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 285.384396][ T30] audit: type=1400 audit(284.990:173): avc: denied { write } for pid=3860 comm="syz.1.160" lport=37221 faddr=::ffff:10.1.1.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 285.642136][ T30] audit: type=1400 audit(285.250:174): avc: denied { create } for pid=3866 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 285.654119][ T30] audit: type=1400 audit(285.260:175): avc: denied { write } for pid=3866 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 285.831702][ T30] audit: type=1400 audit(285.440:176): avc: denied { read } for pid=3866 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 286.684012][ T30] audit: type=1400 audit(286.290:177): avc: denied { execute } for pid=3872 comm="syz.0.164" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=4353 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 289.017678][ T30] audit: type=1400 audit(288.150:178): avc: denied { accept } for pid=3869 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 289.021774][ T30] audit: type=1400 audit(288.420:179): avc: denied { create } for pid=3869 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 289.059567][ T30] audit: type=1400 audit(288.460:180): avc: denied { bind } for pid=3869 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 289.118954][ T30] audit: type=1400 audit(288.500:181): avc: denied { connect } for pid=3869 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 291.580261][ T30] audit: type=1400 audit(291.180:182): avc: denied { bind } for pid=3888 comm="syz.0.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 291.582187][ T30] audit: type=1400 audit(291.180:183): avc: denied { name_bind } for pid=3888 comm="syz.0.167" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 291.582695][ T30] audit: type=1400 audit(291.180:184): avc: denied { node_bind } for pid=3888 comm="syz.0.167" saddr=172.20.20.170 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 291.615730][ T30] audit: type=1400 audit(291.220:185): avc: denied { name_connect } for pid=3888 comm="syz.0.167" dest=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 295.640047][ T30] audit: type=1326 audit(295.240:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 295.642023][ T30] audit: type=1326 audit(295.250:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 295.652456][ T30] audit: type=1326 audit(295.260:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=155 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 295.655969][ T30] audit: type=1326 audit(295.260:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 295.660191][ T30] audit: type=1326 audit(295.270:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 295.663610][ T30] audit: type=1326 audit(295.270:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3920 comm="syz.0.181" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 295.697831][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.699161][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.702308][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.704190][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.706405][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x1 [ 295.708127][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.709697][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.711615][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.713617][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.715531][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.716643][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.718560][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.719605][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.721580][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.722599][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.725082][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.726233][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.727981][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.729689][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.730931][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.732695][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.733825][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.736251][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.737277][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.738898][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.740479][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.742314][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.743360][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.745498][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.746528][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.748975][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.750441][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.752884][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.755194][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.756384][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.757337][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.758289][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.759499][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.760770][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.761737][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.762767][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.763721][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.765364][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.766268][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.767219][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.768234][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.769219][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.770383][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.771318][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.772254][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.773186][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.774152][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.775765][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.776730][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.777617][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.778519][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.779426][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.780361][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.781251][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.782177][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.783077][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.784056][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.785528][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.786468][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.787419][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.788391][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.789386][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.790302][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.791282][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.792291][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.793197][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.794262][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.795591][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.796515][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.797637][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.798739][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.799640][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.800575][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.801473][ T3394] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 295.811549][ T3394] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.03 Device [syz1] on syz1 [ 295.882635][ T3923] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 295.883742][ T3923] IPv6: NLM_F_CREATE should be set when creating new route [ 296.835958][ T30] kauditd_printk_skb: 27 callbacks suppressed [ 296.836885][ T30] audit: type=1326 audit(296.440:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3924 comm="syz.0.183" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 296.848111][ T30] audit: type=1326 audit(296.460:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3924 comm="syz.0.183" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 297.055669][ T3930] fido_id[3930]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 297.233656][ T30] audit: type=1326 audit(296.840:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3931 comm="syz.0.185" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 297.237512][ T30] audit: type=1326 audit(296.850:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3931 comm="syz.0.185" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 297.242860][ T30] audit: type=1326 audit(296.850:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3931 comm="syz.0.185" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 297.246880][ T30] audit: type=1326 audit(296.860:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3931 comm="syz.0.185" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 297.249910][ T30] audit: type=1326 audit(296.860:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3931 comm="syz.0.185" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 297.255740][ T30] audit: type=1326 audit(296.860:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3931 comm="syz.0.185" exe="/syz-executor" sig=0 arch=c00000b7 syscall=92 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 297.258814][ T30] audit: type=1326 audit(296.870:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3931 comm="syz.0.185" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 297.262677][ T30] audit: type=1326 audit(296.870:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3931 comm="syz.0.185" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 302.486931][ T3965] netlink: 44 bytes leftover after parsing attributes in process `syz.0.196'. [ 302.490916][ T3965] netlink: 44 bytes leftover after parsing attributes in process `syz.0.196'. [ 303.856977][ T3973] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 310.299355][ T30] kauditd_printk_skb: 45 callbacks suppressed [ 310.301773][ T30] audit: type=1400 audit(309.900:274): avc: denied { override_creds } for pid=4002 comm="syz.0.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 312.837086][ T30] audit: type=1326 audit(312.430:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.217" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 312.840277][ T30] audit: type=1326 audit(312.430:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.217" exe="/syz-executor" sig=0 arch=c00000b7 syscall=264 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 312.840849][ T30] audit: type=1326 audit(312.430:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.217" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 322.283411][ T30] audit: type=1400 audit(321.890:278): avc: denied { read append } for pid=4022 comm="syz.1.222" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 322.288532][ T30] audit: type=1400 audit(321.900:279): avc: denied { open } for pid=4022 comm="syz.1.222" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 322.293366][ T30] audit: type=1400 audit(321.900:280): avc: denied { ioctl } for pid=4022 comm="syz.1.222" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 324.049745][ T4033] IPv4: Oversized IP packet from 127.202.26.0 [ 324.688852][ T30] audit: type=1400 audit(324.300:281): avc: denied { setopt } for pid=4036 comm="syz.1.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 325.860880][ T30] audit: type=1400 audit(325.470:282): avc: denied { create } for pid=4042 comm="syz.1.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 328.633173][ T30] audit: type=1400 audit(328.240:283): avc: denied { write } for pid=4055 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 329.293847][ T4067] netlink: 4 bytes leftover after parsing attributes in process `syz.0.242'. [ 331.129497][ T4089] xt_hashlimit: max too large, truncated to 1048576 [ 332.112951][ T4100] netlink: 28 bytes leftover after parsing attributes in process `syz.0.255'. [ 332.114070][ T4100] netlink: 28 bytes leftover after parsing attributes in process `syz.0.255'. [ 334.427386][ T4114] geneve2: entered allmulticast mode [ 335.919862][ T30] audit: type=1400 audit(335.520:284): avc: denied { open } for pid=4122 comm="syz.1.266" path="/dev/ttyq6" dev="devtmpfs" ino=373 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 336.258676][ T30] audit: type=1400 audit(335.870:285): avc: denied { create } for pid=4124 comm="syz.0.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 336.988204][ T30] audit: type=1326 audit(336.600:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.1.268" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 337.009062][ T30] audit: type=1326 audit(336.620:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.1.268" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 337.011698][ T30] audit: type=1326 audit(336.620:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.1.268" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 337.014333][ T30] audit: type=1326 audit(336.620:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.1.268" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 337.023728][ T30] audit: type=1326 audit(336.630:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.1.268" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 337.038967][ T30] audit: type=1326 audit(336.650:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.1.268" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 337.041210][ T30] audit: type=1326 audit(336.650:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.1.268" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 337.088244][ T30] audit: type=1326 audit(336.690:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4128 comm="syz.1.268" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 337.699093][ T4136] mmap: syz.0.272 (4136) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 340.912959][ T4148] futex_wake_op: syz.1.278 tries to shift op by -1; fix this program [ 341.731977][ T4172] netlink: 20 bytes leftover after parsing attributes in process `syz.0.285'. [ 342.177802][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 342.187368][ T30] audit: type=1400 audit(341.780:319): avc: denied { audit_write } for pid=4174 comm="syz.0.287" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 342.221195][ T30] audit: type=1107 audit(341.830:320): pid=4174 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 342.786526][ T4180] netlink: 4 bytes leftover after parsing attributes in process `syz.0.289'. [ 342.820233][ T4180] netlink: 12 bytes leftover after parsing attributes in process `syz.0.289'. [ 343.797942][ T4187] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 344.108204][ T30] audit: type=1326 audit(343.720:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4190 comm="syz.1.294" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 344.115917][ T30] audit: type=1326 audit(343.720:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4190 comm="syz.1.294" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 344.129838][ T30] audit: type=1326 audit(343.740:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4190 comm="syz.1.294" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 344.140953][ T4187] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 344.162505][ T30] audit: type=1326 audit(343.740:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4190 comm="syz.1.294" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 344.167138][ T30] audit: type=1326 audit(343.750:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4190 comm="syz.1.294" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 344.167435][ T30] audit: type=1326 audit(343.760:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4190 comm="syz.1.294" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 344.167885][ T30] audit: type=1326 audit(343.760:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4190 comm="syz.1.294" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 344.168200][ T30] audit: type=1326 audit(343.760:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4190 comm="syz.1.294" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 344.367014][ T4187] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 344.770343][ T4187] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 345.168597][ T4187] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 345.232682][ T4187] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 345.293817][ T4187] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 345.413127][ T4187] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 347.396706][ T4221] IPv6: Can't replace route, no match found [ 348.240623][ T4228] netlink: 8 bytes leftover after parsing attributes in process `syz.1.309'. [ 348.294022][ T4228] veth2: entered promiscuous mode [ 348.374055][ T4228] veth3: entered promiscuous mode [ 348.377723][ T4228] veth3: entered allmulticast mode [ 350.451843][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 350.458852][ T30] audit: type=1400 audit(350.050:342): avc: denied { create } for pid=4223 comm="syz.0.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 350.459922][ T30] audit: type=1400 audit(350.060:343): avc: denied { setopt } for pid=4223 comm="syz.0.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 351.061113][ T4236] x_tables: ip6_tables: tcpmss match: only valid for protocol 6 [ 357.577882][ T4272] netlink: 268 bytes leftover after parsing attributes in process `syz.1.327'. [ 358.506905][ T3394] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 358.709378][ T3394] usb 1-1: New USB device found, idVendor=056e, idProduct=4010, bcdDevice=20.1c [ 358.710098][ T3394] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 358.759256][ T3394] usb 1-1: config 0 descriptor?? [ 359.534036][ T3394] pegasus 1-1:0.0: probe with driver pegasus failed with error -71 [ 359.619526][ T3394] usb 1-1: USB disconnect, device number 7 [ 360.108181][ T30] audit: type=1400 audit(359.720:344): avc: denied { execute } for pid=4287 comm="syz.0.333" path="/161/cpu.stat" dev="tmpfs" ino=839 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 362.579632][ T30] audit: type=1400 audit(362.190:345): avc: denied { getopt } for pid=4311 comm="syz.1.343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 363.209379][ T30] audit: type=1326 audit(362.820:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.1.345" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 363.212156][ T30] audit: type=1326 audit(362.820:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.1.345" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 363.227254][ T30] audit: type=1326 audit(362.830:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.1.345" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 363.232347][ T30] audit: type=1326 audit(362.840:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.1.345" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 363.244411][ T30] audit: type=1326 audit(362.850:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.1.345" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 363.247482][ T30] audit: type=1326 audit(362.860:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.1.345" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 363.257348][ T30] audit: type=1326 audit(362.860:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.1.345" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 363.258463][ T30] audit: type=1326 audit(362.870:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.1.345" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 369.946238][ T4343] Zero length message leads to an empty skb [ 372.423179][ T30] kauditd_printk_skb: 42 callbacks suppressed [ 372.431275][ T30] audit: type=1326 audit(372.030:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4355 comm="syz.1.359" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 372.437200][ T30] audit: type=1326 audit(372.040:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4355 comm="syz.1.359" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 372.440218][ T30] audit: type=1326 audit(372.050:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4355 comm="syz.1.359" exe="/syz-executor" sig=0 arch=c00000b7 syscall=111 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 372.447976][ T30] audit: type=1326 audit(372.060:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4355 comm="syz.1.359" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 373.426908][ T30] audit: type=1400 audit(373.030:400): avc: denied { getopt } for pid=4364 comm="syz.0.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 374.295755][ T30] audit: type=1326 audit(373.900:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4373 comm="syz.0.366" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 374.309876][ T30] audit: type=1326 audit(373.920:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4373 comm="syz.0.366" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 374.310679][ T30] audit: type=1326 audit(373.920:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4373 comm="syz.0.366" exe="/syz-executor" sig=0 arch=c00000b7 syscall=293 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 374.311112][ T30] audit: type=1326 audit(373.920:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4373 comm="syz.0.366" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 374.590732][ T30] audit: type=1400 audit(374.190:405): avc: denied { bind } for pid=4375 comm="syz.0.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 374.955845][ T4378] xt_hashlimit: max too large, truncated to 1048576 [ 377.351829][ T4397] (unnamed net_device) (uninitialized): up delay (1024) is not a multiple of miimon (100), value rounded to 1000 ms [ 377.353516][ T4397] (unnamed net_device) (uninitialized): down delay (4) is not a multiple of miimon (100), value rounded to 0 ms [ 378.947903][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 378.951142][ T30] audit: type=1400 audit(378.560:407): avc: denied { write } for pid=4408 comm="syz.1.379" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 379.031948][ T30] audit: type=1400 audit(378.640:408): avc: denied { create } for pid=4407 comm="syz.0.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 379.057444][ T30] audit: type=1400 audit(378.670:409): avc: denied { setopt } for pid=4407 comm="syz.0.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 379.190832][ T30] audit: type=1326 audit(378.800:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.1.381" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 379.212361][ T30] audit: type=1326 audit(378.820:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.1.381" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 379.212979][ T30] audit: type=1326 audit(378.820:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.1.381" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 379.213482][ T30] audit: type=1326 audit(378.820:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.1.381" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 379.213804][ T30] audit: type=1326 audit(378.820:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.1.381" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 379.229965][ T30] audit: type=1326 audit(378.840:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.1.381" exe="/syz-executor" sig=0 arch=c00000b7 syscall=5 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 379.233377][ T30] audit: type=1326 audit(378.840:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.1.381" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 380.088443][ T4422] sctp: [Deprecated]: syz.0.385 (pid 4422) Use of struct sctp_assoc_value in delayed_ack socket option. [ 380.088443][ T4422] Use struct sctp_sack_info instead [ 382.207344][ T4438] netlink: 8 bytes leftover after parsing attributes in process `syz.0.393'. [ 382.429822][ T4441] Invalid ELF header magic: != ELF [ 386.366907][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 386.368430][ T30] audit: type=1326 audit(385.960:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.397" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 386.370510][ T30] audit: type=1326 audit(385.970:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.397" exe="/syz-executor" sig=0 arch=c00000b7 syscall=209 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 386.372984][ T30] audit: type=1326 audit(385.970:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.397" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 386.376293][ T30] audit: type=1326 audit(385.970:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.397" exe="/syz-executor" sig=0 arch=c00000b7 syscall=435 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 386.379180][ T30] audit: type=1326 audit(385.970:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.397" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 386.383299][ T30] audit: type=1326 audit(385.990:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.397" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 386.389509][ T30] audit: type=1326 audit(385.990:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.397" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 386.391546][ T30] audit: type=1326 audit(386.000:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.397" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 386.799621][ T4451] geneve0: entered allmulticast mode [ 387.701565][ T30] audit: type=1326 audit(387.310:426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4456 comm="syz.0.401" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 387.705945][ T30] audit: type=1326 audit(387.310:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4456 comm="syz.0.401" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 387.935826][ T4459] ucma_write: process 448 (syz.0.402) changed security contexts after opening file descriptor, this is not allowed. [ 388.373746][ T4463] netlink: 132 bytes leftover after parsing attributes in process `syz.0.404'. [ 391.528251][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 391.529813][ T30] audit: type=1400 audit(391.140:438): avc: denied { create } for pid=4503 comm="syz.1.423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 392.109498][ T30] audit: type=1326 audit(391.710:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4509 comm="syz.1.426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 392.127886][ T30] audit: type=1326 audit(391.740:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4509 comm="syz.1.426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 392.139457][ T30] audit: type=1326 audit(391.750:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4509 comm="syz.1.426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 392.145667][ T30] audit: type=1326 audit(391.750:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4509 comm="syz.1.426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 392.150605][ T30] audit: type=1326 audit(391.760:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4509 comm="syz.1.426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 392.152381][ T30] audit: type=1326 audit(391.760:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4509 comm="syz.1.426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 392.185356][ T30] audit: type=1326 audit(391.780:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4509 comm="syz.1.426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=184 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 392.185939][ T30] audit: type=1326 audit(391.790:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4509 comm="syz.1.426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 393.143962][ T30] audit: type=1400 audit(392.750:447): avc: denied { load_policy } for pid=4524 comm="syz.0.432" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 393.163202][ T4525] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 393.168015][ T4525] SELinux: failed to load policy [ 393.469508][ T4530] netlink: 8 bytes leftover after parsing attributes in process `syz.0.434'. [ 393.512485][ T4530] ip6gre1: entered allmulticast mode [ 401.336244][ T4562] netlink: 24 bytes leftover after parsing attributes in process `syz.1.448'. [ 403.910112][ T30] audit: type=1326 audit(403.520:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4576 comm="syz.1.454" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 403.918333][ T30] audit: type=1326 audit(403.530:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4576 comm="syz.1.454" exe="/syz-executor" sig=0 arch=c00000b7 syscall=209 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 403.921333][ T30] audit: type=1326 audit(403.530:450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4576 comm="syz.1.454" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 403.932605][ T30] audit: type=1326 audit(403.540:451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4576 comm="syz.1.454" exe="/syz-executor" sig=0 arch=c00000b7 syscall=146 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 403.934467][ T30] audit: type=1326 audit(403.540:452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4576 comm="syz.1.454" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 410.589009][ T4594] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 410.590681][ T4594] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 410.835641][ T30] audit: type=1400 audit(410.440:453): avc: denied { read append } for pid=4595 comm="syz.0.462" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 410.839250][ T30] audit: type=1400 audit(410.440:454): avc: denied { open } for pid=4595 comm="syz.0.462" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 410.987637][ T30] audit: type=1400 audit(410.600:455): avc: denied { ioctl } for pid=4595 comm="syz.0.462" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3309 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 411.244180][ T30] audit: type=1400 audit(410.850:456): avc: denied { bind } for pid=4597 comm="syz.0.463" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 411.253860][ T30] audit: type=1400 audit(410.850:457): avc: denied { node_bind } for pid=4597 comm="syz.0.463" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 416.919694][ T40] hid-generic 0000:0004:0000.0004: unknown main item tag 0x0 [ 416.920256][ T40] hid-generic 0000:0004:0000.0004: unknown main item tag 0x0 [ 416.920476][ T40] hid-generic 0000:0004:0000.0004: unknown main item tag 0x0 [ 416.951452][ T40] hid-generic 0000:0004:0000.0004: hidraw0: HID v0.00 Device [syz0] on syz1 [ 417.741412][ T4631] fido_id[4631]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 418.245560][ T4637] netlink: 24 bytes leftover after parsing attributes in process `syz.0.480'. [ 422.948513][ T4660] syzkaller1: entered promiscuous mode [ 422.949633][ T4660] syzkaller1: entered allmulticast mode [ 425.310755][ T30] audit: type=1326 audit(424.900:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4664 comm="syz.0.493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 425.337292][ T30] audit: type=1326 audit(424.930:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4664 comm="syz.0.493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 425.361089][ T30] audit: type=1326 audit(424.970:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4664 comm="syz.0.493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 425.362372][ T30] audit: type=1326 audit(424.970:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4664 comm="syz.0.493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 425.433993][ T30] audit: type=1326 audit(425.030:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4664 comm="syz.0.493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 425.436285][ T30] audit: type=1326 audit(425.030:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4664 comm="syz.0.493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 425.440145][ T30] audit: type=1326 audit(425.050:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4664 comm="syz.0.493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 425.469746][ T30] audit: type=1326 audit(425.080:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4664 comm="syz.0.493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 425.487850][ T30] audit: type=1326 audit(425.090:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4664 comm="syz.0.493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 425.492556][ T30] audit: type=1326 audit(425.100:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4664 comm="syz.0.493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 430.305516][ T4700] syzkaller1: entered promiscuous mode [ 430.306060][ T4700] syzkaller1: entered allmulticast mode [ 430.656166][ T30] kauditd_printk_skb: 58 callbacks suppressed [ 430.657066][ T30] audit: type=1400 audit(430.260:526): avc: denied { nlmsg_write } for pid=4701 comm="syz.1.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 430.786494][ T30] audit: type=1400 audit(430.390:527): avc: denied { bind } for pid=4703 comm="syz.0.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 431.044242][ T4706] syz_tun: entered promiscuous mode [ 431.047191][ T4706] macsec1: entered promiscuous mode [ 431.049402][ T4706] macsec1: entered allmulticast mode [ 431.051277][ T4706] syz_tun: entered allmulticast mode [ 431.070826][ T4706] syz_tun: left allmulticast mode [ 431.072600][ T4706] syz_tun: left promiscuous mode [ 431.086956][ T30] audit: type=1400 audit(430.700:528): avc: denied { create } for pid=4707 comm="syz.0.511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 431.093377][ T30] audit: type=1400 audit(430.700:529): avc: denied { write } for pid=4707 comm="syz.0.511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 431.505425][ T30] audit: type=1326 audit(431.110:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4712 comm="syz.1.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 431.510639][ T30] audit: type=1326 audit(431.120:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4712 comm="syz.1.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=178 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 431.513597][ T30] audit: type=1326 audit(431.120:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4712 comm="syz.1.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 431.518999][ T30] audit: type=1326 audit(431.130:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4712 comm="syz.1.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=138 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 431.524477][ T30] audit: type=1326 audit(431.130:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4712 comm="syz.1.513" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 433.129390][ T4721] pim6reg1: entered promiscuous mode [ 433.131547][ T4721] pim6reg1: entered allmulticast mode [ 433.628050][ T4723] netlink: 132 bytes leftover after parsing attributes in process `syz.1.518'. [ 435.111625][ T30] audit: type=1400 audit(434.720:535): avc: denied { ioctl } for pid=4730 comm="syz.1.521" path="socket:[6957]" dev="sockfs" ino=6957 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 436.316648][ T4742] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 436.317449][ T4742] SELinux: failed to load policy [ 436.335548][ T30] audit: type=1326 audit(435.940:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4741 comm="syz.1.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 436.343757][ T30] audit: type=1326 audit(435.950:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4741 comm="syz.1.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 436.349640][ T30] audit: type=1326 audit(435.950:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4741 comm="syz.1.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 436.361269][ T30] audit: type=1326 audit(435.960:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4741 comm="syz.1.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 436.362043][ T30] audit: type=1326 audit(435.970:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4741 comm="syz.1.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 436.370981][ T30] audit: type=1326 audit(435.980:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4741 comm="syz.1.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 436.389124][ T30] audit: type=1326 audit(435.990:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4741 comm="syz.1.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 436.389928][ T30] audit: type=1326 audit(436.000:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4741 comm="syz.1.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 436.402242][ T30] audit: type=1326 audit(436.010:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4741 comm="syz.1.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=127 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 436.407968][ T30] audit: type=1326 audit(436.010:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4741 comm="syz.1.526" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 436.487351][ T4742] can0: slcan on ttyS3. [ 436.813567][ T4748] RDS: rds_bind could not find a transport for 2001::, load rds_tcp or rds_rdma? [ 437.152180][ T4742] can0 (unregistered): slcan off ttyS3. [ 441.044260][ T4782] netlink: 28 bytes leftover after parsing attributes in process `syz.0.537'. [ 441.677347][ T4788] netlink: 36 bytes leftover after parsing attributes in process `syz.1.539'. [ 441.686955][ T4788] netlink: 16 bytes leftover after parsing attributes in process `syz.1.539'. [ 441.687169][ T4788] netlink: 36 bytes leftover after parsing attributes in process `syz.1.539'. [ 441.687442][ T4788] netlink: 36 bytes leftover after parsing attributes in process `syz.1.539'. [ 443.503859][ T4806] netlink: 72 bytes leftover after parsing attributes in process `syz.1.545'. [ 443.546545][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 443.547023][ T30] audit: type=1400 audit(443.160:551): avc: denied { setopt } for pid=4805 comm="syz.1.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 443.783674][ T4806] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.027025][ T4806] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.129734][ T4813] syzkaller1: entered promiscuous mode [ 444.130316][ T4813] syzkaller1: entered allmulticast mode [ 444.408276][ T4806] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.699736][ T4806] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.217516][ T4806] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.357467][ T30] audit: type=1326 audit(444.960:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4821 comm="syz.0.551" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 445.361899][ T30] audit: type=1326 audit(444.970:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4821 comm="syz.0.551" exe="/syz-executor" sig=0 arch=c00000b7 syscall=30 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 445.366006][ T4806] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.369587][ T30] audit: type=1326 audit(444.980:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4821 comm="syz.0.551" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 445.451969][ T4806] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.528452][ T4806] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.618738][ T4824] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.802803][ T4824] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.990426][ T4824] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 446.309278][ T4824] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 446.973174][ T4824] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.037672][ T4824] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.098982][ T4824] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 447.170797][ T4824] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.499293][ T4846] netlink: 'syz.0.556': attribute type 4 has an invalid length. [ 448.601819][ T4846] netlink: 'syz.0.556': attribute type 4 has an invalid length. [ 449.150484][ T30] audit: type=1400 audit(448.760:555): avc: denied { setopt } for pid=4855 comm="syz.0.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 451.132861][ T4864] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 451.980717][ T4864] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 452.625780][ T4864] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 452.809367][ T4864] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 453.183675][ T4864] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 453.233015][ T4864] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 453.280825][ T4864] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 453.328670][ T4864] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 464.003077][ T30] audit: type=1326 audit(463.610:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4928 comm="syz.1.562" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 464.007509][ T30] audit: type=1326 audit(463.610:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4928 comm="syz.1.562" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 464.015415][ T30] audit: type=1326 audit(463.610:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4928 comm="syz.1.562" exe="/syz-executor" sig=0 arch=c00000b7 syscall=39 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 464.025926][ T30] audit: type=1326 audit(463.610:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4928 comm="syz.1.562" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 465.770263][ T30] audit: type=1326 audit(465.380:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4935 comm="syz.1.564" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 465.778870][ T30] audit: type=1326 audit(465.390:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4935 comm="syz.1.564" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 465.787014][ T30] audit: type=1326 audit(465.400:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4935 comm="syz.1.564" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 465.797753][ T30] audit: type=1326 audit(465.410:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4935 comm="syz.1.564" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 465.805820][ T30] audit: type=1326 audit(465.410:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4935 comm="syz.1.564" exe="/syz-executor" sig=0 arch=c00000b7 syscall=160 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 465.808203][ T30] audit: type=1326 audit(465.410:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4935 comm="syz.1.564" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 473.404005][ T30] kauditd_printk_skb: 27 callbacks suppressed [ 473.410734][ T30] audit: type=1326 audit(473.010:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4982 comm="syz.0.584" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 473.420093][ T30] audit: type=1326 audit(473.030:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4982 comm="syz.0.584" exe="/syz-executor" sig=0 arch=c00000b7 syscall=430 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 473.430377][ T30] audit: type=1326 audit(473.040:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4982 comm="syz.0.584" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 473.480952][ T30] audit: type=1400 audit(473.090:596): avc: denied { watch } for pid=4984 comm="syz.1.585" path="/proc/631/task" dev="proc" ino=9399 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 474.301107][ T30] audit: type=1400 audit(473.900:597): avc: denied { create } for pid=4995 comm="syz.0.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 474.938614][ T30] audit: type=1326 audit(474.550:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5000 comm="syz.0.592" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 474.940634][ T30] audit: type=1326 audit(474.550:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5000 comm="syz.0.592" exe="/syz-executor" sig=0 arch=c00000b7 syscall=127 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 474.942485][ T30] audit: type=1326 audit(474.550:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5000 comm="syz.0.592" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 476.440474][ T30] audit: type=1326 audit(476.050:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5010 comm="syz.0.597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 476.445529][ T30] audit: type=1326 audit(476.050:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5010 comm="syz.0.597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 476.686642][ T5013] netlink: 76 bytes leftover after parsing attributes in process `syz.0.598'. [ 480.165373][ T5024] syz.0.603 uses obsolete (PF_INET,SOCK_PACKET) [ 480.709018][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 480.712283][ T30] audit: type=1326 audit(480.320:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5027 comm="syz.0.605" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 480.716572][ T30] audit: type=1326 audit(480.320:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5027 comm="syz.0.605" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 480.726810][ T30] audit: type=1326 audit(480.320:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5027 comm="syz.0.605" exe="/syz-executor" sig=0 arch=c00000b7 syscall=25 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 480.729696][ T30] audit: type=1326 audit(480.320:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5027 comm="syz.0.605" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 480.732222][ T30] audit: type=1326 audit(480.330:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5027 comm="syz.0.605" exe="/syz-executor" sig=0 arch=c00000b7 syscall=78 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 480.735080][ T30] audit: type=1326 audit(480.330:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5027 comm="syz.0.605" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 481.732675][ T5038] netlink: 8 bytes leftover after parsing attributes in process `syz.0.610'. [ 481.734218][ T5038] 8021q: VLANs not supported on ipvlan1 [ 481.965095][ T30] audit: type=1326 audit(481.570:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5039 comm="syz.0.611" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 481.971323][ T30] audit: type=1326 audit(481.580:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5039 comm="syz.0.611" exe="/syz-executor" sig=0 arch=c00000b7 syscall=235 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 482.002422][ T30] audit: type=1326 audit(481.610:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5039 comm="syz.0.611" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 482.020921][ T30] audit: type=1326 audit(481.630:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5039 comm="syz.0.611" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 488.538395][ T30] audit: type=1400 audit(488.130:622): avc: denied { create } for pid=5053 comm="syz.0.616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 488.541982][ T30] audit: type=1400 audit(488.150:623): avc: denied { setopt } for pid=5053 comm="syz.0.616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 489.231902][ T30] audit: type=1400 audit(488.840:624): avc: denied { setopt } for pid=5061 comm="syz.0.620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 502.298180][ T5107] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 502.298629][ T5107] IPv6: NLM_F_CREATE should be set when creating new route [ 505.293101][ T5113] netlink: 72 bytes leftover after parsing attributes in process `syz.0.641'. [ 505.443684][ T30] audit: type=1326 audit(505.050:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5115 comm="syz.0.643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 505.448812][ T30] audit: type=1326 audit(505.060:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5115 comm="syz.0.643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 505.455336][ T30] audit: type=1326 audit(505.060:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5115 comm="syz.0.643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 505.459104][ T30] audit: type=1326 audit(505.070:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5115 comm="syz.0.643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 505.467566][ T30] audit: type=1326 audit(505.070:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5115 comm="syz.0.643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=52 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 505.468186][ T30] audit: type=1326 audit(505.080:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5115 comm="syz.0.643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 505.476137][ T30] audit: type=1326 audit(505.090:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5115 comm="syz.0.643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 505.666071][ T30] audit: type=1326 audit(505.270:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5120 comm="syz.0.645" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 505.676130][ T30] audit: type=1326 audit(505.280:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5120 comm="syz.0.645" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 505.682035][ T30] audit: type=1326 audit(505.290:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5120 comm="syz.0.645" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 506.293340][ T5125] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 507.494254][ T5141] netlink: 8 bytes leftover after parsing attributes in process `syz.0.654'. [ 507.499633][ T5141] netlink: 8 bytes leftover after parsing attributes in process `syz.0.654'. [ 507.501225][ T5141] netlink: 8 bytes leftover after parsing attributes in process `syz.0.654'. [ 507.859631][ T3394] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 507.890846][ T3394] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz0 [ 508.557300][ T5150] fido_id[5150]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 512.177400][ T5185] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 513.681124][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 513.681697][ T30] audit: type=1326 audit(513.290:674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5154 comm="syz.0.661" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7fc00000 [ 514.066143][ T30] audit: type=1400 audit(513.590:675): avc: denied { read } for pid=5179 comm="syz.1.671" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 514.222667][ T5193] process 'syz.0.673' launched '/dev/fd/3' with NULL argv: empty string added [ 514.228838][ T30] audit: type=1400 audit(513.830:676): avc: denied { execute_no_trans } for pid=5192 comm="syz.0.673" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 514.458752][ T30] audit: type=1400 audit(514.060:677): avc: granted { setsecparam } for pid=5194 comm="syz.0.674" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 515.805277][ T30] audit: type=1400 audit(515.410:678): avc: denied { getopt } for pid=5198 comm="syz.0.676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 521.923606][ T5202] batadv_slave_1: entered promiscuous mode [ 521.945462][ T5202] batadv_slave_1: left promiscuous mode [ 524.511848][ T5217] netlink: 'syz.1.684': attribute type 15 has an invalid length. [ 525.506404][ T5227] futex_wake_op: syz.1.689 tries to shift op by -1; fix this program [ 526.139733][ T30] audit: type=1326 audit(525.750:679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5232 comm="syz.1.692" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 526.145732][ T30] audit: type=1326 audit(525.750:680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5232 comm="syz.1.692" exe="/syz-executor" sig=0 arch=c00000b7 syscall=57 compat=0 ip=0xffff8955906c code=0x7ffc0000 [ 526.150922][ T30] audit: type=1326 audit(525.760:681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5232 comm="syz.1.692" exe="/syz-executor" sig=0 arch=c00000b7 syscall=115 compat=0 ip=0xffff89585e88 code=0x7ffc0000 [ 526.355359][ T30] audit: type=1326 audit(525.960:682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5232 comm="syz.1.692" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 526.583584][ T5239] syz.0.696 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 527.044091][ T5244] SELinux: failed to load policy [ 527.260847][ T5248] netlink: 4 bytes leftover after parsing attributes in process `syz.0.699'. [ 534.859862][ T5271] netlink: 452 bytes leftover after parsing attributes in process `syz.0.707'. [ 535.251465][ T30] audit: type=1326 audit(534.860:683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5279 comm="syz.1.711" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 535.253317][ T30] audit: type=1326 audit(534.860:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5279 comm="syz.1.711" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 535.258553][ T30] audit: type=1326 audit(534.870:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5279 comm="syz.1.711" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 535.262757][ T30] audit: type=1326 audit(534.870:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5279 comm="syz.1.711" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 535.267155][ T30] audit: type=1326 audit(534.870:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5279 comm="syz.1.711" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 535.270749][ T30] audit: type=1326 audit(534.880:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5279 comm="syz.1.711" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 535.274307][ T30] audit: type=1326 audit(534.880:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5279 comm="syz.1.711" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 535.278848][ T30] audit: type=1326 audit(534.880:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5279 comm="syz.1.711" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 535.282725][ T30] audit: type=1326 audit(534.880:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5279 comm="syz.1.711" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 535.287724][ T30] audit: type=1326 audit(534.890:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5279 comm="syz.1.711" exe="/syz-executor" sig=0 arch=c00000b7 syscall=68 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 537.139974][ T5307] xt_recent: hitcount (4294967295) is larger than allowed maximum (65535) [ 538.062231][ T5319] netlink: 4 bytes leftover after parsing attributes in process `syz.1.729'. [ 538.382500][ T5319] netlink: 4 bytes leftover after parsing attributes in process `syz.1.729'. [ 539.002775][ T5329] x_tables: ip6_tables: tcpmss match: only valid for protocol 6 [ 540.561240][ T30] kauditd_printk_skb: 75 callbacks suppressed [ 540.561835][ T30] audit: type=1400 audit(540.170:768): avc: denied { read write } for pid=5348 comm="syz.0.742" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 540.566178][ T30] audit: type=1400 audit(540.170:769): avc: denied { open } for pid=5348 comm="syz.0.742" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 541.038595][ T30] audit: type=1400 audit(540.650:770): avc: denied { ioctl } for pid=5352 comm="syz.0.744" path="socket:[9890]" dev="sockfs" ino=9890 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 541.822124][ T30] audit: type=1400 audit(541.430:771): avc: denied { prog_load } for pid=5358 comm="syz.0.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 541.830304][ T30] audit: type=1400 audit(541.430:772): avc: denied { bpf } for pid=5358 comm="syz.0.747" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 542.120003][ T30] audit: type=1400 audit(541.730:773): avc: denied { map_create } for pid=5360 comm="syz.0.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 542.123231][ T30] audit: type=1400 audit(541.730:774): avc: denied { perfmon } for pid=5360 comm="syz.0.748" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 542.126783][ T30] audit: type=1400 audit(541.730:775): avc: denied { map_read map_write } for pid=5360 comm="syz.0.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 542.626222][ T30] audit: type=1400 audit(542.220:776): avc: denied { create } for pid=5363 comm="syz.1.749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 542.627029][ T30] audit: type=1400 audit(542.230:777): avc: denied { write } for pid=5363 comm="syz.1.749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 542.649681][ T5364] lo speed is unknown, defaulting to 1000 [ 542.653876][ T5364] lo speed is unknown, defaulting to 1000 [ 542.673218][ T5364] lo speed is unknown, defaulting to 1000 [ 542.793144][ T5364] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 542.850990][ T5364] infiniband sz0: RDMA CMA: cma_listen_on_dev, error -98 [ 543.021369][ T5364] lo speed is unknown, defaulting to 1000 [ 543.060858][ T5364] lo speed is unknown, defaulting to 1000 [ 545.003432][ T5384] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 545.527989][ T5393] netlink: 96 bytes leftover after parsing attributes in process `syz.1.760'. [ 545.847515][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 545.855384][ T30] audit: type=1400 audit(545.450:794): avc: denied { allowed } for pid=5398 comm="syz.0.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 545.875614][ T30] audit: type=1400 audit(545.480:795): avc: denied { create } for pid=5398 comm="syz.0.764" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 545.892562][ T30] audit: type=1400 audit(545.500:796): avc: denied { module_request } for pid=5398 comm="syz.0.764" kmod="net-pf-16-proto-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 545.941719][ T30] audit: type=1400 audit(545.550:797): avc: denied { create } for pid=5400 comm="syz.1.765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 545.944095][ T30] audit: type=1400 audit(545.550:798): avc: denied { setopt } for pid=5400 comm="syz.1.765" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 546.853672][ T30] audit: type=1400 audit(546.460:799): avc: denied { create } for pid=5411 comm="syz.1.769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 547.080982][ T30] audit: type=1400 audit(546.690:800): avc: denied { sys_module } for pid=5411 comm="syz.1.769" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 547.248197][ T30] audit: type=1400 audit(546.860:801): avc: denied { write } for pid=5411 comm="syz.1.769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 547.744181][ T30] audit: type=1400 audit(547.350:802): avc: denied { create } for pid=5417 comm="syz.1.771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 547.761901][ T30] audit: type=1400 audit(547.360:803): avc: denied { write } for pid=5417 comm="syz.1.771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 551.113647][ T5447] netlink: 96 bytes leftover after parsing attributes in process `syz.0.785'. [ 551.319472][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 551.320040][ T30] audit: type=1400 audit(550.930:820): avc: denied { name_bind } for pid=5448 comm="syz.0.786" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 551.320508][ T30] audit: type=1400 audit(550.930:821): avc: denied { node_bind } for pid=5448 comm="syz.0.786" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 554.649627][ T30] audit: type=1326 audit(554.260:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5453 comm="syz.0.788" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 554.658611][ T30] audit: type=1326 audit(554.270:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5453 comm="syz.0.788" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 554.661659][ T30] audit: type=1326 audit(554.270:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5453 comm="syz.0.788" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 554.667774][ T30] audit: type=1326 audit(554.270:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5453 comm="syz.0.788" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 554.671668][ T30] audit: type=1326 audit(554.280:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5453 comm="syz.0.788" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 554.711514][ T30] audit: type=1326 audit(554.310:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5453 comm="syz.0.788" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 554.712219][ T30] audit: type=1326 audit(554.310:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5453 comm="syz.0.788" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 554.712511][ T30] audit: type=1326 audit(554.320:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5453 comm="syz.0.788" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 556.503308][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 556.503817][ T30] audit: type=1400 audit(556.110:837): avc: denied { create } for pid=5465 comm="syz.1.793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 557.632395][ T30] audit: type=1326 audit(557.240:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.1.798" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 557.633879][ T30] audit: type=1326 audit(557.240:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.1.798" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 557.634484][ T30] audit: type=1326 audit(557.240:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.1.798" exe="/syz-executor" sig=0 arch=c00000b7 syscall=204 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 557.641247][ T30] audit: type=1326 audit(557.240:841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.1.798" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 557.641778][ T30] audit: type=1326 audit(557.250:842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.1.798" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 557.644306][ T30] audit: type=1326 audit(557.250:843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.1.798" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 557.650867][ T30] audit: type=1326 audit(557.260:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.1.798" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 557.667283][ T30] audit: type=1326 audit(557.280:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.1.798" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 557.670136][ T30] audit: type=1326 audit(557.280:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5477 comm="syz.1.798" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 558.776808][ T5490] netlink: 32 bytes leftover after parsing attributes in process `syz.0.804'. [ 560.099746][ T5496] netlink: 12 bytes leftover after parsing attributes in process `syz.0.807'. [ 561.929489][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 561.930054][ T30] audit: type=1400 audit(561.540:859): avc: denied { load_policy } for pid=5513 comm="syz.0.816" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 562.101670][ T5514] SELinux: failed to load policy [ 562.363555][ T30] audit: type=1400 audit(561.970:860): avc: denied { create } for pid=5519 comm="syz.0.819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 562.373367][ T30] audit: type=1400 audit(561.980:861): avc: denied { write } for pid=5519 comm="syz.0.819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 562.382227][ T30] audit: type=1400 audit(561.990:862): avc: denied { nlmsg_write } for pid=5519 comm="syz.0.819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 563.527612][ T30] audit: type=1400 audit(562.190:863): avc: denied { execmem } for pid=5521 comm="syz.0.820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 565.063397][ T30] audit: type=1400 audit(564.660:864): avc: denied { getopt } for pid=5521 comm="syz.0.820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 566.289134][ T30] audit: type=1400 audit(565.900:865): avc: denied { write } for pid=5526 comm="syz.1.821" name="rt_acct" dev="proc" ino=4026532669 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 566.977253][ T30] audit: type=1326 audit(566.590:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5532 comm="syz.1.824" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 566.980169][ T30] audit: type=1326 audit(566.590:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5532 comm="syz.1.824" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 566.990788][ T30] audit: type=1326 audit(566.600:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5532 comm="syz.1.824" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 566.997154][ T30] audit: type=1326 audit(566.600:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5532 comm="syz.1.824" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 567.003195][ T30] audit: type=1326 audit(566.610:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5532 comm="syz.1.824" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 567.007974][ T30] audit: type=1326 audit(566.610:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5532 comm="syz.1.824" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 567.018775][ T30] audit: type=1326 audit(566.630:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5532 comm="syz.1.824" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 567.021709][ T30] audit: type=1326 audit(566.630:873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5532 comm="syz.1.824" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 567.032140][ T30] audit: type=1326 audit(566.640:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5532 comm="syz.1.824" exe="/syz-executor" sig=0 arch=c00000b7 syscall=36 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 567.037190][ T30] audit: type=1326 audit(566.640:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5532 comm="syz.1.824" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 570.531081][ T5549] netlink: 404 bytes leftover after parsing attributes in process `syz.0.829'. [ 570.703738][ T5551] netlink: 16 bytes leftover after parsing attributes in process `syz.1.830'. [ 570.873230][ T5553] netlink: 4 bytes leftover after parsing attributes in process `syz.0.831'. [ 572.240995][ T5570] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 572.241545][ T5570] IPv6: NLM_F_CREATE should be set when creating new route [ 572.727221][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 572.730007][ T30] audit: type=1400 audit(572.340:896): avc: denied { create } for pid=5575 comm="syz.0.842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 573.433716][ T5584] xt_CT: You must specify a L4 protocol and not use inversions on it [ 573.622735][ T30] audit: type=1400 audit(829.221:897): avc: denied { bind } for pid=5586 comm="syz.0.847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 573.636917][ T30] audit: type=1400 audit(829.241:898): avc: denied { setopt } for pid=5586 comm="syz.0.847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 573.651997][ T30] audit: type=1400 audit(829.251:899): avc: denied { ioctl } for pid=5586 comm="syz.0.847" path="socket:[10443]" dev="sockfs" ino=10443 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 573.660526][ T5587] netlink: 16 bytes leftover after parsing attributes in process `syz.0.847'. [ 575.290276][ T30] audit: type=1400 audit(830.871:900): avc: denied { read write } for pid=5604 comm="syz.1.856" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 575.290998][ T30] audit: type=1400 audit(830.871:901): avc: denied { open } for pid=5604 comm="syz.1.856" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 575.910966][ T5612] netlink: 76 bytes leftover after parsing attributes in process `syz.1.859'. [ 578.240490][ T5622] netlink: 56 bytes leftover after parsing attributes in process `syz.1.862'. [ 581.255792][ T30] audit: type=1400 audit(836.361:902): avc: denied { ioctl } for pid=5614 comm="syz.0.860" path="socket:[9211]" dev="sockfs" ino=9211 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 584.877099][ T5636] syzkaller0: entered promiscuous mode [ 584.878821][ T5636] syzkaller0: entered allmulticast mode [ 610.834233][ T30] audit: type=1400 audit(866.431:903): avc: denied { ioctl } for pid=5646 comm="syz.0.873" path="socket:[11288]" dev="sockfs" ino=11288 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 610.923241][ T30] audit: type=1326 audit(866.521:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.1.876" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 610.929422][ T30] audit: type=1326 audit(866.531:905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.1.876" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 610.934513][ T30] audit: type=1326 audit(866.531:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.1.876" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 610.943313][ T30] audit: type=1326 audit(866.541:907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.1.876" exe="/syz-executor" sig=0 arch=c00000b7 syscall=119 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 610.949598][ T30] audit: type=1326 audit(866.541:908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.1.876" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 610.959200][ T30] audit: type=1326 audit(866.561:909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.1.876" exe="/syz-executor" sig=0 arch=c00000b7 syscall=230 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 610.961599][ T30] audit: type=1326 audit(866.561:910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.1.876" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 610.966495][ T30] audit: type=1326 audit(866.561:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.1.876" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 610.971959][ T30] audit: type=1326 audit(866.561:912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.1.876" exe="/syz-executor" sig=0 arch=c00000b7 syscall=194 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 612.320262][ T5680] netlink: 60 bytes leftover after parsing attributes in process `syz.1.887'. [ 612.531332][ T5683] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5683 comm=syz.1.889 [ 612.531866][ T5683] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=5683 comm=syz.1.889 [ 613.297391][ T5687] x_tables: duplicate underflow at hook 1 [ 615.899554][ T5721] netlink: 'syz.0.905': attribute type 31 has an invalid length. [ 616.394417][ T30] kauditd_printk_skb: 147 callbacks suppressed [ 616.401396][ T30] audit: type=1400 audit(871.991:1060): avc: denied { read } for pid=5724 comm="syz.0.907" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 616.409841][ T30] audit: type=1400 audit(872.011:1061): avc: denied { open } for pid=5724 comm="syz.0.907" path="net:[4026532631]" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 616.420799][ T30] audit: type=1400 audit(872.021:1062): avc: denied { create } for pid=5724 comm="syz.0.907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 616.446407][ T30] audit: type=1400 audit(872.051:1063): avc: denied { bind } for pid=5724 comm="syz.0.907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 617.258937][ T30] audit: type=1400 audit(872.861:1064): avc: denied { create } for pid=5730 comm="syz.0.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 617.273695][ T30] audit: type=1400 audit(872.871:1065): avc: denied { bind } for pid=5730 comm="syz.0.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 617.289760][ T30] audit: type=1400 audit(872.871:1066): avc: denied { name_bind } for pid=5730 comm="syz.0.910" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 617.301291][ T30] audit: type=1400 audit(872.881:1067): avc: denied { node_bind } for pid=5730 comm="syz.0.910" saddr=172.20.20.170 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 617.311228][ T30] audit: type=1400 audit(872.891:1068): avc: denied { write } for pid=5730 comm="syz.0.910" laddr=172.20.20.170 lport=20002 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 617.317652][ T30] audit: type=1400 audit(872.891:1069): avc: denied { connect } for pid=5730 comm="syz.0.910" laddr=172.20.20.170 lport=20002 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 619.411012][ T5749] netlink: 8 bytes leftover after parsing attributes in process `syz.1.918'. [ 623.971184][ T5772] IPv6: Can't replace route, no match found [ 624.180523][ T30] kauditd_printk_skb: 57 callbacks suppressed [ 624.186594][ T30] audit: type=1400 audit(879.784:1127): avc: denied { create } for pid=5774 comm="syz.1.929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 624.189844][ T30] audit: type=1400 audit(879.794:1128): avc: denied { setopt } for pid=5774 comm="syz.1.929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 624.731625][ T30] audit: type=1400 audit(880.335:1129): avc: denied { getopt } for pid=5774 comm="syz.1.929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 625.722763][ T30] audit: type=1400 audit(881.325:1130): avc: denied { allowed } for pid=5777 comm="syz.0.930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 625.729827][ T30] audit: type=1400 audit(881.325:1131): avc: denied { create } for pid=5777 comm="syz.0.930" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 625.739521][ T30] audit: type=1400 audit(881.335:1132): avc: denied { map } for pid=5777 comm="syz.0.930" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11478 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 625.741047][ T30] audit: type=1400 audit(881.335:1133): avc: denied { read write } for pid=5777 comm="syz.0.930" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11478 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 625.791957][ T30] audit: type=1400 audit(881.395:1134): avc: denied { execute } for pid=5777 comm="syz.0.930" path="/495/cpu.stat" dev="tmpfs" ino=2518 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 626.038912][ T30] audit: type=1400 audit(881.645:1135): avc: denied { read write } for pid=5779 comm="syz.0.931" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 626.042390][ T30] audit: type=1400 audit(881.645:1136): avc: denied { open } for pid=5779 comm="syz.0.931" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 626.080023][ T3674] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 626.144317][ T3674] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz0 [ 629.515667][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 629.518583][ T30] audit: type=1400 audit(885.125:1139): avc: denied { ioctl } for pid=5785 comm="syz.0.933" path="socket:[11489]" dev="sockfs" ino=11489 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 629.521121][ T30] audit: type=1400 audit(885.125:1140): avc: denied { module_request } for pid=5785 comm="syz.0.933" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 630.036699][ T5789] netlink: 20 bytes leftover after parsing attributes in process `syz.0.933'. [ 630.808631][ T30] audit: type=1326 audit(886.415:1141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5792 comm="syz.0.935" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 630.811007][ T30] audit: type=1326 audit(886.415:1142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5792 comm="syz.0.935" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 630.819783][ T30] audit: type=1326 audit(886.425:1143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5792 comm="syz.0.935" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 630.823015][ T30] audit: type=1326 audit(886.425:1144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5792 comm="syz.0.935" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 630.830589][ T30] audit: type=1326 audit(886.435:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5792 comm="syz.0.935" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 630.837242][ T30] audit: type=1326 audit(886.445:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5792 comm="syz.0.935" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 630.840769][ T30] audit: type=1326 audit(886.445:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5792 comm="syz.0.935" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 630.847664][ T30] audit: type=1326 audit(886.455:1148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5792 comm="syz.0.935" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 631.867337][ T5800] netlink: 84 bytes leftover after parsing attributes in process `syz.0.938'. [ 632.269672][ T5802] netlink: 132 bytes leftover after parsing attributes in process `syz.0.939'. [ 632.744614][ T5806] lo speed is unknown, defaulting to 1000 [ 633.148994][ T5806] netlink: 'syz.0.941': attribute type 1 has an invalid length. [ 633.149580][ T5806] netlink: 224 bytes leftover after parsing attributes in process `syz.0.941'. [ 635.163643][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 635.166338][ T30] audit: type=1400 audit(890.766:1165): avc: denied { ioctl } for pid=5819 comm="syz.1.945" path="socket:[10840]" dev="sockfs" ino=10840 ioctlcmd=0x8953 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 635.346493][ T5822] netlink: 12 bytes leftover after parsing attributes in process `syz.1.946'. [ 638.699663][ T30] audit: type=1326 audit(894.306:1166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5840 comm="syz.1.948" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 638.706829][ T30] audit: type=1326 audit(894.316:1167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5840 comm="syz.1.948" exe="/syz-executor" sig=0 arch=c00000b7 syscall=449 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 638.709170][ T30] audit: type=1326 audit(894.316:1168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5840 comm="syz.1.948" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 648.253849][ T30] audit: type=1326 audit(903.857:1169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5883 comm="syz.0.954" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 648.254450][ T30] audit: type=1326 audit(903.857:1170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5883 comm="syz.0.954" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 648.254718][ T30] audit: type=1326 audit(903.857:1171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5883 comm="syz.0.954" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 648.255008][ T30] audit: type=1326 audit(903.857:1172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5883 comm="syz.0.954" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 648.255287][ T30] audit: type=1326 audit(903.857:1173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5883 comm="syz.0.954" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 648.255548][ T30] audit: type=1326 audit(903.857:1174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5883 comm="syz.0.954" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 648.263432][ T30] audit: type=1326 audit(903.867:1175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5883 comm="syz.0.954" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 648.273006][ T30] audit: type=1326 audit(903.887:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5883 comm="syz.0.954" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 648.278808][ T30] audit: type=1326 audit(903.887:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5883 comm="syz.0.954" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 648.287609][ T30] audit: type=1326 audit(903.897:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5883 comm="syz.0.954" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 648.757889][ T5888] capability: warning: `syz.0.956' uses 32-bit capabilities (legacy support in use) [ 653.369737][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 653.370909][ T30] audit: type=1400 audit(908.978:1202): avc: denied { create } for pid=5921 comm="syz.1.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 653.379458][ T30] audit: type=1400 audit(908.988:1203): avc: denied { write } for pid=5921 comm="syz.1.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 654.011458][ T30] audit: type=1400 audit(909.608:1204): avc: denied { write } for pid=5927 comm="syz.1.973" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 656.909762][ T30] audit: type=1400 audit(912.518:1205): avc: denied { read } for pid=5931 comm="syz.1.975" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 656.912944][ T30] audit: type=1400 audit(912.528:1206): avc: denied { open } for pid=5931 comm="syz.1.975" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 656.931167][ T30] audit: type=1400 audit(912.538:1207): avc: denied { ioctl } for pid=5931 comm="syz.1.975" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 657.093971][ T30] audit: type=1400 audit(912.708:1208): avc: granted { setsecparam } for pid=5933 comm="syz.1.976" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 657.333010][ T30] audit: type=1326 audit(912.949:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5935 comm="syz.1.977" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 657.335616][ T30] audit: type=1326 audit(912.949:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5935 comm="syz.1.977" exe="/syz-executor" sig=0 arch=c00000b7 syscall=159 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 657.337553][ T30] audit: type=1326 audit(912.949:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5935 comm="syz.1.977" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 657.527382][ T5938] netlink: 4 bytes leftover after parsing attributes in process `syz.1.978'. [ 657.536292][ T5938] netlink: 32 bytes leftover after parsing attributes in process `syz.1.978'. [ 658.918385][ T30] audit: type=1400 audit(914.529:1212): avc: denied { audit_write } for pid=5947 comm="syz.1.982" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 658.923761][ T30] audit: type=1107 audit(914.529:1213): pid=5947 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='٥Vcc45M6A"ؖ% ' [ 660.011581][ T30] audit: type=1400 audit(915.629:1214): avc: denied { write } for pid=5951 comm="syz.1.984" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 660.013976][ T30] audit: type=1400 audit(915.629:1215): avc: denied { open } for pid=5951 comm="syz.1.984" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 660.018547][ T5952] random: crng reseeded on system resumption [ 660.155603][ T30] audit: type=1400 audit(915.769:1216): avc: denied { ioctl } for pid=5951 comm="syz.1.984" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3304 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 661.051328][ T5956] lo speed is unknown, defaulting to 1000 [ 661.726542][ T30] audit: type=1400 audit(917.339:1217): avc: denied { create } for pid=5961 comm="syz.1.988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 662.039002][ T5967] netlink: 9412 bytes leftover after parsing attributes in process `syz.0.990'. [ 664.108004][ T30] audit: type=1400 audit(919.719:1218): avc: denied { mounton } for pid=5985 comm="syz.0.999" path="/536/file0" dev="tmpfs" ino=2725 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 664.118757][ T30] audit: type=1400 audit(919.729:1219): avc: denied { mount } for pid=5985 comm="syz.0.999" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 664.126384][ T30] audit: type=1400 audit(919.739:1220): avc: denied { mounton } for pid=5985 comm="syz.0.999" path="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=dir permissive=1 [ 664.173990][ T30] audit: type=1400 audit(919.789:1221): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 664.186957][ T30] audit: type=1400 audit(919.799:1222): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 666.738681][ T30] audit: type=1326 audit(922.350:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5999 comm="syz.0.1005" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7fc00000 [ 666.801900][ T30] audit: type=1400 audit(922.410:1224): avc: denied { write } for pid=6011 comm="syz.1.1010" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 667.220962][ T30] audit: type=1326 audit(922.830:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6015 comm="syz.1.1012" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 667.224392][ T30] audit: type=1326 audit(922.840:1226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6015 comm="syz.1.1012" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 667.233617][ T30] audit: type=1326 audit(922.840:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6015 comm="syz.1.1012" exe="/syz-executor" sig=0 arch=c00000b7 syscall=220 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 667.314224][ T6016] ptrace attach of "/syz-executor exec"[6017] was attempted by "/syz-executor exec"[6016] [ 668.932389][ T6034] lo speed is unknown, defaulting to 1000 [ 669.186323][ T6040] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1022'. [ 669.194747][ T6039] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1022'. [ 669.207357][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 669.207923][ T30] audit: type=1400 audit(924.810:1236): avc: denied { sqpoll } for pid=6033 comm="syz.0.1020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 670.207607][ T30] audit: type=1400 audit(925.810:1237): avc: denied { create } for pid=6050 comm="syz.1.1027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 670.216025][ T30] audit: type=1400 audit(925.830:1238): avc: denied { connect } for pid=6050 comm="syz.1.1027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 670.836461][ T6059] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 671.017807][ T6062] netlink: 'syz.1.1032': attribute type 10 has an invalid length. [ 671.020328][ T6062] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1032'. [ 671.022804][ T6062] vxcan0: entered promiscuous mode [ 671.026585][ T6062] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check. [ 673.824725][ T30] audit: type=1326 audit(929.431:1239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6083 comm="syz.0.1041" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 673.830183][ T30] audit: type=1326 audit(929.431:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6083 comm="syz.0.1041" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 673.832828][ T30] audit: type=1326 audit(929.441:1241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6083 comm="syz.0.1041" exe="/syz-executor" sig=0 arch=c00000b7 syscall=69 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 673.833602][ T30] audit: type=1326 audit(929.441:1242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6083 comm="syz.0.1041" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 674.232444][ T30] audit: type=1400 audit(929.841:1243): avc: denied { bind } for pid=6087 comm="syz.0.1043" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 674.233701][ T30] audit: type=1400 audit(929.841:1244): avc: denied { node_bind } for pid=6087 comm="syz.0.1043" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 676.286899][ T30] audit: type=1400 audit(931.891:1245): avc: denied { create } for pid=6111 comm="()" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 676.298667][ T30] audit: type=1400 audit(931.901:1246): avc: denied { write } for pid=6111 comm="()" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 676.310453][ T30] audit: type=1400 audit(931.911:1247): avc: denied { ioctl } for pid=6111 comm="()" path="socket:[11264]" dev="sockfs" ino=11264 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 676.545779][ T6117] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 676.761332][ T30] audit: type=1400 audit(932.371:1248): avc: denied { write } for pid=6111 comm="()" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 677.533528][ T30] audit: type=1400 audit(933.141:1249): avc: denied { create } for pid=6127 comm="syz.0.1062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 677.542921][ T30] audit: type=1400 audit(933.151:1250): avc: denied { ioctl } for pid=6127 comm="syz.0.1062" path="socket:[12311]" dev="sockfs" ino=12311 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 677.546625][ T30] audit: type=1400 audit(933.151:1251): avc: denied { bind } for pid=6127 comm="syz.0.1062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 677.551906][ T6130] SELinux: policydb version -1545030876 does not match my version range 15-34 [ 677.552830][ T6130] SELinux: failed to load policy [ 677.557380][ T30] audit: type=1400 audit(933.161:1252): avc: denied { load_policy } for pid=6128 comm="syz.1.1063" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 679.246800][ T6144] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1070'. [ 685.601355][ T6156] lo speed is unknown, defaulting to 1000 [ 690.040410][ T30] audit: type=1400 audit(945.642:1253): avc: denied { search } for pid=6159 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 690.056847][ T30] audit: type=1400 audit(945.662:1254): avc: denied { search } for pid=6159 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 690.060881][ T30] audit: type=1400 audit(945.662:1255): avc: denied { search } for pid=6159 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 690.063869][ T30] audit: type=1400 audit(945.662:1256): avc: denied { search } for pid=6159 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 690.149887][ T30] audit: type=1400 audit(945.762:1257): avc: denied { read open } for pid=6160 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 690.153518][ T30] audit: type=1400 audit(945.762:1258): avc: denied { getattr } for pid=6160 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 690.264212][ T30] audit: type=1400 audit(945.872:1259): avc: denied { add_name } for pid=6159 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 690.278183][ T30] audit: type=1400 audit(945.892:1260): avc: denied { create } for pid=6159 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 690.297688][ T30] audit: type=1400 audit(945.892:1261): avc: denied { write open } for pid=6159 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=2219 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 690.329240][ T30] audit: type=1400 audit(945.942:1262): avc: denied { append } for pid=6159 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2219 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 693.447583][ T6183] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1084'. [ 694.798367][ T6196] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1089'. [ 695.269191][ T30] kauditd_printk_skb: 26 callbacks suppressed [ 695.272146][ T30] audit: type=1400 audit(950.853:1289): avc: denied { setattr } for pid=6199 comm="syz.1.1091" name="NETLINK" dev="sockfs" ino=12100 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 695.686604][ T30] audit: type=1400 audit(951.293:1290): avc: denied { create } for pid=6203 comm="syz.1.1093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 695.699552][ T30] audit: type=1400 audit(951.303:1291): avc: denied { write } for pid=6203 comm="syz.1.1093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 695.853046][ T6206] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1094'. [ 697.068669][ T6216] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1099'. [ 697.794550][ T30] audit: type=1400 audit(953.403:1292): avc: denied { create } for pid=6221 comm="syz.1.1102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 697.806340][ T30] audit: type=1400 audit(953.413:1293): avc: denied { connect } for pid=6221 comm="syz.1.1102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 697.988489][ T30] audit: type=1326 audit(953.593:1294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6223 comm="syz.1.1103" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 697.991573][ T30] audit: type=1326 audit(953.603:1295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6223 comm="syz.1.1103" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 697.996435][ T30] audit: type=1326 audit(953.603:1296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6223 comm="syz.1.1103" exe="/syz-executor" sig=0 arch=c00000b7 syscall=35 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 697.999546][ T30] audit: type=1326 audit(953.613:1297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6223 comm="syz.1.1103" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 698.004361][ T30] audit: type=1326 audit(953.613:1298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6223 comm="syz.1.1103" exe="/syz-executor" sig=0 arch=c00000b7 syscall=193 compat=0 ip=0xffff8955a768 code=0x7ffc0000 [ 700.533915][ T6249] netlink: 'syz.1.1115': attribute type 21 has an invalid length. [ 701.792459][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 701.796879][ T30] audit: type=1326 audit(957.404:1302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1121" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 701.803823][ T30] audit: type=1326 audit(957.414:1303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1121" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 701.817528][ T30] audit: type=1326 audit(957.424:1304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1121" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 701.820450][ T30] audit: type=1326 audit(957.434:1305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1121" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 701.832125][ T30] audit: type=1326 audit(957.444:1306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1121" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 701.840546][ T30] audit: type=1326 audit(957.454:1307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1121" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 701.843732][ T30] audit: type=1326 audit(957.454:1308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1121" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 701.854198][ T30] audit: type=1326 audit(957.464:1309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1121" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 701.858860][ T30] audit: type=1326 audit(957.464:1310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1121" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 701.865764][ T30] audit: type=1326 audit(957.484:1311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6263 comm="syz.0.1121" exe="/syz-executor" sig=0 arch=c00000b7 syscall=74 compat=0 ip=0xffff7eb5a768 code=0x7ffc0000 [ 702.121962][ T6268] sctp: [Deprecated]: syz.0.1122 (pid 6268) Use of int in maxseg socket option. [ 702.121962][ T6268] Use struct sctp_assoc_value instead [ 702.486774][ T6273] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1125'. [ 748.205371][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 748.226333][ T30] audit: type=1400 audit(1003.809:1316): avc: denied { execute } for pid=6282 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 748.268359][ T30] audit: type=1400 audit(1003.859:1317): avc: denied { execute_no_trans } for pid=6282 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 748.490843][ T30] audit: type=1400 audit(1004.109:1318): avc: denied { mounton } for pid=6283 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 752.880201][ C0] BUG: workqueue lockup - pool cpus=1 node=0 flags=0x0 nice=0 stuck for 49s! [ 752.884493][ C0] Showing busy workqueues and worker pools: [ 752.885209][ C0] workqueue events_unbound: flags=0x2 [ 752.886060][ C0] pwq 8: cpus=0-1 flags=0x4 nice=0 active=1 refcnt=2 [ 752.886674][ C0] in-flight: 26:bpf_map_free_deferred [ 752.889507][ C0] workqueue wg-crypt-wg0: flags=0x28 [ 752.889960][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 752.890340][ C0] pending: wg_packet_encrypt_worker [ 752.891355][ C0] workqueue wg-crypt-wg1: flags=0x28 [ 752.891784][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=3 refcnt=4 [ 752.892166][ C0] pending: wg_packet_encrypt_worker, wg_packet_tx_worker, wg_packet_decrypt_worker [ 752.892967][ C0] workqueue wg-crypt-wg2: flags=0x28 [ 752.893399][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=3 refcnt=4 [ 752.893689][ C0] pending: wg_packet_encrypt_worker, wg_packet_tx_worker, wg_packet_decrypt_worker [ 752.894861][ C0] pool 8: cpus=0-1 flags=0x4 nice=0 hung=0s workers=20 idle: 4911 167 4912 4902 4899 4895 41 4898 4906 4904 4909 81 4892 2126 12 274 4908 4916 4915 [ 752.897402][ C0] Showing backtraces of running workers in stalled CPU-bound worker pools: SYZFAIL: failed to recv rpc [ 752.949730][ T30] audit: type=1400 audit(1008.560:1319): avc: denied { read } for pid=3118 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 752.950371][ T30] audit: type=1400 audit(1008.560:1320): avc: denied { write } for pid=3313 comm="syz-executor" path="pipe:[2326]" dev="pipefs" ino=2326 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 752.969200][ T30] audit: type=1400 audit(1008.560:1321): avc: denied { search } for pid=3118 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 752.979851][ T30] audit: type=1400 audit(1008.560:1322): avc: denied { search } for pid=3118 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 752.989585][ T30] audit: type=1400 audit(1008.600:1323): avc: denied { add_name } for pid=3118 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 752.990151][ T30] audit: type=1400 audit(1008.600:1324): avc: denied { create } for pid=3118 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 752.990504][ T30] audit: type=1400 audit(1008.600:1325): avc: denied { append open } for pid=3118 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 782.214359][ C1] hrtimer: interrupt took 79101842739 ns VM DIAGNOSIS: 19:41:57 Registers: info registers vcpu 0 CPU#0 PC=ffff80008031e0a4 X00=0000000000000001 X01=ffff800085871c20 X02=0000000000000000 X03=1fffe00001d273c9 X04=00000000e1d89d5b X05=0000000000000000 X06=ffff00000e93a998 X07=535db11b4f34943f X08=0000000000000000 X09=ffff8000897d9000 X10=ffff00000e93a8d0 X11=0000000000000002 X12=0000000000000006 X13=0000000000000000 X14=1fffe000036e4acd X15=18507de22b04a63b X16=54be00001fc4ffff X17=7ab9b59a9d79f023 X18=ffff00001b0dc780 X19=ffff000041a38000 X20=00000000000005dc X21=ffff000041a38000 X22=1fffe0000834700b X23=0000000000000020 X24=0000000000000103 X25=ffff000016f88000 X26=ffff000041a38070 X27=ffff00000e939e40 X28=1ffff00011a902f4 X29=ffff800080006740 X30=ffff800084a78e8c SP=ffff800080006690 PSTATE=80000005 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000000000000000:000000000000000a Q02=0000aaaacda3d8d3:0000aaaacda3d270 Q03=0000ffffe292e710:0000ffffe292e478 Q04=0000000000000000:0000000000000000 Q05=0000ffffe292e3d0:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:000001f40000000a Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffe292e7e0:0000ffffe292e7e0 Q17=ffffff80ffffffd0:0000ffffe292e7b0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000854cd118 X00=00000000000000c0 X01=ffff7fffe2fc3000 X02=0000000000000000 X03=1fffe000029ab3c9 X04=0000000000000000 X05=ffff80008d4e7bc0 X06=ffff700011a9cf78 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700011a9cf78 X11=1ffff00011a9cf78 X12=ffff700011a9cf79 X13=0000000000000000 X14=00004c4d96186958 X15=0000000000000000 X16=ffff80008d4e0000 X17=ffff7fffe2fc3000 X18=0000000000000000 X19=0000000000000001 X20=ffff000014d5a920 X21=ffff00001688c300 X22=0000000000000028 X23=ffff000014d5a8d0 X24=ffff8000870ea448 X25=00000000ffffffff X26=00000000000000c0 X27=ffff000014d59e40 X28=ffff00001688c340 X29=ffff80008d4e7bc0 X30=ffff8000854cd0f8 SP=ffff80008d4e7bc0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=00524f5252450040:0000000000000000 Q05=00524f5252450040:0000000000000000 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd1311790:0000ffffd1311790 Q17=ffffff80ffffffd0:0000ffffd1311760 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000