last executing test programs: 59.042822155s ago: executing program 0 (id=1291): r0 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180200000020702500000000002020207b1af8ff00000000bfa100000000000007010000dbffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r0, 0x0, 0x88) r3 = openat$cgroup_int(r2, &(0x7f00000002c0)='cgroup.max.descendants\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x10000a006) 58.382423078s ago: executing program 0 (id=1293): socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000013000000850000008600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) listen(r2, 0x5) accept4(r2, 0x0, 0x0, 0x80800) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x24040014, &(0x7f0000000000)={0xa, 0x4e22, 0x7, @empty, 0xfffffffe}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000180)='wg1\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48}, 0x94) 55.35696786s ago: executing program 0 (id=1295): ioctl$AUTOFS_IOC_FAIL(0xffffffffffffffff, 0x9361, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16, @ANYBLOB="0100000000000000000001000000060006000000000024000300a0cb879a47f5bc644c0e693fa6d031c74a1553b6e901b9ff2f518c78042fb5426c010880f4000080060005000180000024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff240002001bc715ee4868b12a49f4df11bc05475489f6a27c4d6483ad2fa5e45903b0ce8514000400e76a686bac1414aa00000000000000008c00098028000080060001000a00000014000200ff020000000000000000000000000001050003000000000028000080060001000a000000140002000000000000000000000000000000000105000300030000001c000080060001000200da0008000200e000000105000300000000001c000080060001000200000008000200ac141400050003000000000074000080200004000a004e2200000000fc0000000000000000000000000000000400000024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff080003000100000024000200cde20bc0d9b90ac13642d7b66459dd9db5e20b4b16d3d23f2cb03a8aa417dce6080007000000000014000200776730"], 0x1c8}}, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 36.513365036s ago: executing program 0 (id=1302): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) listen(r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r3 = accept(r0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[], 0xfffffdef}}, 0x1) 33.322067078s ago: executing program 0 (id=1303): r0 = socket(0x10, 0x3, 0x9) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="2fde25bd7000fc0c00038008000004000500"/27], 0x28}, 0x1, 0x0, 0x0, 0x8010}, 0x20004090) 32.522970849s ago: executing program 0 (id=1304): socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000013000000850000008600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000180)={0xa, 0x4e22, 0x8, @loopback}, 0x1c) listen(r2, 0x5) accept4(r2, 0x0, 0x0, 0x80800) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x24040014, &(0x7f0000000000)={0xa, 0x4e22, 0x7, @empty, 0xfffffffe}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000180)='wg1\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48}, 0x94) 6.372317487s ago: executing program 1 (id=1321): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0xf) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) setreuid(0xee01, 0xee01) 5.572269007s ago: executing program 1 (id=1322): syz_open_dev$tty1(0xc, 0x4, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.kill\x00', 0x275a, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x6, &(0x7f00000002c0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit, @exit]}, &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x807}, 0x94) sendfile(r0, r0, 0x0, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000a00)={{0x0, 0x0, 0x50f9, 0x5, 0xfffffffffffffffa, 0x4, 0x1, 0x2, 0x2, 0x9, 0x8, 0x8000, 0x8, 0x9, 0x30}}) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x5, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) keyctl$clear(0x4, 0xfffffffffffffffc) ftruncate(0xffffffffffffffff, 0xfff) 4.749648711s ago: executing program 1 (id=1323): r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, 0x0, 0x0) 3.88927553s ago: executing program 1 (id=1324): close(0xffffffffffffffff) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r0, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) accept(0xffffffffffffffff, 0x0, 0x0) 902.077866ms ago: executing program 1 (id=1325): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='kfree\x00', r1, 0x0, 0x4ab}, 0x18) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)="d8000000180081084e81f782db44b904021d0800fd007c06e8fe55a10a0015400600142603600e120800060000000201a80016000800014003e01100036010fab94dcf5c0461c1d67f6f9400e08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef409001b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed1bffec62070000cbee5de6ccd44a677575a62cef352a92954b43370e9701ee1b6ec75a526c5d5b5701cf8773", 0xd8}], 0x1}, 0x400c0) 0s ago: executing program 1 (id=1326): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x8000f28, 0x0) splice(r2, 0x0, r1, 0x0, 0x7f, 0xe) write(r0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x4012831, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000580)='smaps_rollup\x00') mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) lseek(r4, 0x2004, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000400)='io_uring_create\x00'}, 0x18) kernel console output (not intermixed with test programs): : denied { create } for pid=4038 comm="syz.1.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 430.467248][ T30] audit: type=1400 audit(429.910:181): avc: denied { ioctl } for pid=4038 comm="syz.1.227" path="socket:[5437]" dev="sockfs" ino=5437 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 431.093995][ T30] audit: type=1400 audit(430.520:182): avc: denied { create } for pid=4040 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 432.320422][ T30] audit: type=1400 audit(431.760:183): avc: denied { write } for pid=4044 comm="syz.1.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 433.047709][ T4047] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 433.092675][ T4047] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 433.585329][ T30] audit: type=1400 audit(433.030:184): avc: denied { read } for pid=4048 comm="syz.1.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 435.461658][ T30] audit: type=1400 audit(434.910:185): avc: denied { execute } for pid=4056 comm="syz.1.236" path="/169/net_prio.prioidx" dev="tmpfs" ino=878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 435.755694][ T931] usb 1-1: USB disconnect, device number 9 [ 439.862025][ T30] audit: type=1400 audit(439.310:186): avc: denied { ioctl } for pid=4085 comm="syz.0.249" path="socket:[5540]" dev="sockfs" ino=5540 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 442.257353][ T30] audit: type=1400 audit(441.700:187): avc: denied { ioctl } for pid=4098 comm="syz.1.255" path="socket:[5575]" dev="sockfs" ino=5575 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 442.272160][ T30] audit: type=1400 audit(441.720:188): avc: denied { write } for pid=4098 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 442.282164][ T4099] netlink: 4 bytes leftover after parsing attributes in process `syz.1.255'. [ 443.108067][ T4101] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 443.121541][ T4101] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 445.883594][ T4116] binder: 4115:4116 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 447.061588][ T4120] netlink: 20 bytes leftover after parsing attributes in process `syz.0.264'. [ 447.715020][ T4124] fuse: Bad value for 'group_id' [ 447.715489][ T4124] fuse: Bad value for 'group_id' [ 447.998167][ T30] audit: type=1400 audit(447.440:189): avc: denied { create } for pid=4125 comm="syz.0.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 448.023587][ T30] audit: type=1400 audit(447.470:190): avc: denied { write } for pid=4125 comm="syz.0.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 448.297395][ T4129] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 448.345106][ T30] audit: type=1400 audit(447.790:191): avc: denied { write } for pid=4127 comm="syz.1.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 453.250358][ T30] audit: type=1400 audit(452.700:192): avc: denied { getopt } for pid=4159 comm="syz.0.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 462.017908][ T4206] mmap: syz.0.297 (4206) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 464.465713][ T4220] input: syz1 as /devices/virtual/input/input4 [ 471.570472][ T10] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 471.966770][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 471.967736][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 471.968298][ T10] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 471.976141][ T10] usb 1-1: New USB device found, idVendor=0463, idProduct=ffff, bcdDevice= 0.00 [ 471.976852][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 472.054766][ T10] usb 1-1: config 0 descriptor?? [ 472.750460][ T10] hid_parser_main: 8 callbacks suppressed [ 472.751381][ T10] hid-generic 0003:0463:FFFF.0003: unknown main item tag 0x0 [ 472.751683][ T10] hid-generic 0003:0463:FFFF.0003: unknown main item tag 0x0 [ 472.751938][ T10] hid-generic 0003:0463:FFFF.0003: unknown main item tag 0x0 [ 472.752179][ T10] hid-generic 0003:0463:FFFF.0003: unknown main item tag 0x0 [ 472.752435][ T10] hid-generic 0003:0463:FFFF.0003: unknown main item tag 0x0 [ 472.752721][ T10] hid-generic 0003:0463:FFFF.0003: unknown main item tag 0x0 [ 472.752969][ T10] hid-generic 0003:0463:FFFF.0003: unknown main item tag 0x0 [ 472.753241][ T10] hid-generic 0003:0463:FFFF.0003: unknown main item tag 0x0 [ 472.753492][ T10] hid-generic 0003:0463:FFFF.0003: unknown main item tag 0x0 [ 472.753740][ T10] hid-generic 0003:0463:FFFF.0003: unknown main item tag 0x0 [ 472.963225][ T10] hid-generic 0003:0463:FFFF.0003: hiddev0,hidraw0: USB HID v0.40 Device [HID 0463:ffff] on usb-dummy_hcd.0-1/input0 [ 473.163421][ T10] usb 1-1: USB disconnect, device number 10 [ 474.785095][ T30] audit: type=1400 audit(474.230:193): avc: denied { ioctl } for pid=4265 comm="syz.0.327" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0xaf00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 475.683711][ T30] audit: type=1400 audit(475.130:194): avc: denied { bind } for pid=4270 comm="syz.0.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 475.725006][ T30] audit: type=1400 audit(475.160:195): avc: denied { write } for pid=4270 comm="syz.0.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 476.358127][ T4267] fido_id[4267]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/report_descriptor': No such file or directory [ 479.644166][ T30] audit: type=1400 audit(479.090:196): avc: denied { read write } for pid=4282 comm="syz.0.335" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 479.647742][ T30] audit: type=1400 audit(479.090:197): avc: denied { open } for pid=4282 comm="syz.0.335" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 479.661540][ T30] audit: type=1400 audit(479.110:198): avc: denied { map } for pid=4282 comm="syz.0.335" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 479.675667][ T30] audit: type=1400 audit(479.120:199): avc: denied { execute } for pid=4282 comm="syz.0.335" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 480.264792][ T30] audit: type=1400 audit(479.710:200): avc: denied { create } for pid=4284 comm="syz.0.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 481.743259][ T4290] fuse: Unknown parameter 'group_i00000000000000000000' [ 490.995855][ T4306] fuse: Unknown parameter 'group_i00000000000000000000' [ 492.098435][ T4310] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 492.105886][ T4310] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 495.940019][ T30] audit: type=1400 audit(495.380:201): avc: denied { relabelfrom } for pid=4322 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 495.947770][ T30] audit: type=1400 audit(495.390:202): avc: denied { relabelto } for pid=4322 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 497.434017][ T30] audit: type=1400 audit(496.870:203): avc: denied { bind } for pid=4326 comm="syz.1.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 498.225028][ T4329] fuse: Unknown parameter 'group_id00000000000000000000' [ 498.964478][ T30] audit: type=1400 audit(498.390:204): avc: denied { create } for pid=4330 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 499.854886][ T4334] netlink: 256 bytes leftover after parsing attributes in process `syz.1.356'. [ 502.158065][ T4342] fuse: Unknown parameter 'group_id00000000000000000000' [ 503.058554][ T4346] ======================================================= [ 503.058554][ T4346] WARNING: The mand mount option has been deprecated and [ 503.058554][ T4346] and is ignored by this kernel. Remove the mand [ 503.058554][ T4346] option from the mount to silence this warning. [ 503.058554][ T4346] ======================================================= [ 503.060260][ T30] audit: type=1400 audit(502.500:205): avc: denied { remount } for pid=4345 comm="syz.1.361" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 503.200853][ T30] audit: type=1400 audit(502.620:206): avc: denied { unmount } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 504.393830][ T4354] fuse: Bad value for 'user_id' [ 504.394965][ T4354] fuse: Bad value for 'user_id' [ 506.193707][ T30] audit: type=1400 audit(505.640:207): avc: denied { map } for pid=4363 comm="syz.1.370" path="socket:[6039]" dev="sockfs" ino=6039 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 506.194806][ T30] audit: type=1400 audit(505.640:208): avc: denied { read } for pid=4363 comm="syz.1.370" path="socket:[6039]" dev="sockfs" ino=6039 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 507.612580][ T30] audit: type=1400 audit(507.060:209): avc: denied { write } for pid=4367 comm="syz.1.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 508.700230][ T30] audit: type=1400 audit(508.140:210): avc: denied { bind } for pid=4373 comm="syz.1.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 509.525449][ T30] audit: type=1400 audit(508.970:211): avc: denied { connect } for pid=4377 comm="syz.0.377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 513.245014][ T4396] process 'syz.0.383' launched '/dev/fd/9' with NULL argv: empty string added [ 513.260352][ T30] audit: type=1400 audit(512.700:212): avc: denied { execute_no_trans } for pid=4389 comm="syz.0.383" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1030 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 514.938366][ T30] audit: type=1400 audit(514.380:213): avc: denied { read write } for pid=4399 comm="syz.1.387" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 514.977861][ T30] audit: type=1400 audit(514.420:214): avc: denied { open } for pid=4399 comm="syz.1.387" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 515.990784][ T4402] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 515.996922][ T4402] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 520.415041][ T30] audit: type=1400 audit(519.860:215): avc: denied { create } for pid=4416 comm="syz.1.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 520.442286][ T30] audit: type=1400 audit(519.890:216): avc: denied { setopt } for pid=4416 comm="syz.1.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 522.243659][ T4423] fuse: Bad value for 'user_id' [ 522.244912][ T4423] fuse: Bad value for 'user_id' [ 522.600738][ T30] audit: type=1400 audit(522.040:217): avc: denied { setopt } for pid=4424 comm="syz.1.399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 523.253783][ T4427] syz_tun: entered allmulticast mode [ 523.302957][ T4426] syz_tun: left allmulticast mode [ 524.887649][ T30] audit: type=1400 audit(524.330:218): avc: denied { read write } for pid=4432 comm="syz.1.403" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 524.892400][ T30] audit: type=1400 audit(524.330:219): avc: denied { ioctl open } for pid=4432 comm="syz.1.403" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 527.885530][ T4441] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 527.888128][ T4441] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 531.677906][ T30] audit: type=1400 audit(531.120:220): avc: denied { getopt } for pid=4447 comm="syz.1.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 533.276703][ T4453] netlink: 12 bytes leftover after parsing attributes in process `syz.1.413'. [ 536.354308][ T4470] fuse: Bad value for 'rootmode' [ 537.831350][ T4474] binder: 4473:4474 ioctl 40046210 0 returned -14 [ 539.583891][ T4480] fuse: Bad value for 'rootmode' [ 543.586027][ T4486] binder: 4485:4486 ioctl 40046210 0 returned -14 [ 546.875085][ T30] audit: type=1400 audit(546.290:221): avc: denied { write } for pid=4493 comm="syz.1.430" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 559.877979][ T4520] fuse: Unknown parameter 'user_i00000000000000000000' [ 565.004580][ T4533] fuse: Unknown parameter 'user_i00000000000000000000' [ 567.534418][ T30] audit: type=1400 audit(566.980:222): avc: denied { mount } for pid=4536 comm="syz.1.449" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 567.629955][ T30] audit: type=1400 audit(567.070:223): avc: denied { unmount } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 568.126913][ T4540] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 568.166606][ T4540] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 583.435390][ T4549] fuse: Unknown parameter 'user_id00000000000000000000' [ 589.680756][ T30] audit: type=1400 audit(589.120:224): avc: denied { write } for pid=4563 comm="syz.0.459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 591.406242][ T4570] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 594.182817][ T976] usb 1-1: new full-speed USB device number 11 using dummy_hcd [ 594.467241][ T976] usb 1-1: config 0 has an invalid interface number: 140 but max is 0 [ 594.471843][ T976] usb 1-1: config 0 has no interface number 0 [ 594.474096][ T976] usb 1-1: config 0 interface 140 altsetting 2 endpoint 0x2 has invalid maxpacket 512, setting to 64 [ 594.476467][ T976] usb 1-1: config 0 interface 140 altsetting 2 endpoint 0x8 has invalid maxpacket 512, setting to 64 [ 594.479847][ T976] usb 1-1: config 0 interface 140 has no altsetting 0 [ 594.813241][ T976] usb 1-1: New USB device found, idVendor=0bfd, idProduct=0120, bcdDevice=c3.23 [ 594.814661][ T976] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 594.815768][ T976] usb 1-1: Product: syz [ 594.816734][ T976] usb 1-1: Manufacturer: syz [ 594.818054][ T976] usb 1-1: SerialNumber: syz [ 594.847928][ T976] usb 1-1: config 0 descriptor?? [ 594.885310][ T4574] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 594.887336][ T4574] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 594.898076][ T976] kvaser_usb 1-1:0.140: error -ENODEV: Cannot get usb endpoint(s) [ 595.165055][ T3491] usb 1-1: USB disconnect, device number 11 [ 596.166126][ T4577] netlink: 'syz.0.464': attribute type 1 has an invalid length. [ 601.612590][ T4589] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2572 sclass=netlink_route_socket pid=4589 comm=syz.0.468 [ 610.010609][ T4618] netlink: 'syz.1.476': attribute type 1 has an invalid length. [ 610.627206][ T4618] bond1: (slave gretap1): making interface the new active one [ 610.658492][ T4618] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 610.685927][ T4618] netlink: 28 bytes leftover after parsing attributes in process `syz.1.476'. [ 610.722812][ T4618] 8021q: adding VLAN 0 to HW filter on device bond1 [ 616.372457][ T4631] netlink: 'syz.1.481': attribute type 1 has an invalid length. [ 621.232264][ T4650] fuse: Bad value for 'fd' [ 630.003190][ T4662] netlink: 96 bytes leftover after parsing attributes in process `syz.1.493'. [ 636.297984][ T4665] fuse: Unknown parameter '0x0000000000000004' [ 640.275119][ T4673] fuse: Unknown parameter 'fd0x0000000000000004' [ 641.954082][ T4678] fuse: Unknown parameter '0x0000000000000004' [ 647.583032][ T4692] fuse: Unknown parameter '0x0000000000000004' [ 654.202967][ T4705] fuse: Unknown parameter '0x0000000000000004' [ 657.524481][ T4718] fuse: Unknown parameter '0x0000000000000004' [ 662.886292][ T4735] fuse: Unknown parameter '0x0000000000000004' [ 671.306053][ T4749] fuse: Unknown parameter 'fd0x0000000000000004' [ 675.895985][ T4762] fuse: Unknown parameter 'fd0x0000000000000004' [ 679.934747][ T4779] fuse: Unknown parameter 'fd0x0000000000000004' [ 680.096170][ T30] audit: type=1400 audit(679.540:225): avc: denied { connect } for pid=4778 comm="syz.0.536" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 697.755966][ T30] audit: type=1400 audit(697.200:226): avc: denied { write } for pid=4846 comm="syz.0.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 697.765624][ T30] audit: type=1400 audit(697.210:227): avc: denied { read } for pid=4846 comm="syz.0.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 719.079335][ T30] audit: type=1400 audit(718.510:228): avc: denied { create } for pid=4879 comm="syz.1.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 719.198038][ T30] audit: type=1400 audit(718.640:229): avc: denied { ioctl } for pid=4879 comm="syz.1.577" path="socket:[7753]" dev="sockfs" ino=7753 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 726.972809][ T4907] netlink: 68 bytes leftover after parsing attributes in process `syz.0.588'. [ 732.746232][ T4919] netlink: 68 bytes leftover after parsing attributes in process `syz.1.593'. [ 743.202795][ T30] audit: type=1400 audit(742.650:230): avc: denied { ioctl } for pid=4939 comm="syz.1.600" path="/dev/fb0" dev="devtmpfs" ino=620 ioctlcmd=0x4604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 752.215791][ T30] audit: type=1400 audit(751.660:231): avc: denied { name_bind } for pid=4964 comm="syz.1.608" src=20005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 753.516426][ T4969] netlink: 8 bytes leftover after parsing attributes in process `syz.1.610'. [ 753.519648][ T4969] netlink: 'syz.1.610': attribute type 5 has an invalid length. [ 753.530881][ T4969] netlink: 28 bytes leftover after parsing attributes in process `syz.1.610'. [ 753.657943][ T4969] geneve2: entered promiscuous mode [ 753.660820][ T4969] geneve2: entered allmulticast mode [ 753.678430][ T26] netdevsim netdevsim1 netdevsim0: set [1, 1] type 2 family 0 port 256 - 0 [ 753.682292][ T26] netdevsim netdevsim1 netdevsim1: set [1, 1] type 2 family 0 port 256 - 0 [ 753.684850][ T26] netdevsim netdevsim1 netdevsim2: set [1, 1] type 2 family 0 port 256 - 0 [ 753.686877][ T26] netdevsim netdevsim1 netdevsim3: set [1, 1] type 2 family 0 port 256 - 0 [ 761.688045][ T30] audit: type=1400 audit(761.130:232): avc: denied { shutdown } for pid=4975 comm="syz.1.612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 777.951156][ T3491] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 778.108572][ T5009] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 778.123972][ T5009] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 778.239403][ T3491] usb 1-1: unable to get BOS descriptor or descriptor too short [ 778.329916][ T3491] usb 1-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 778.330497][ T3491] usb 1-1: config 1 has no interface number 1 [ 778.331040][ T3491] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 778.452921][ T3491] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 778.453324][ T3491] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 778.453602][ T3491] usb 1-1: Product: syz [ 778.453740][ T3491] usb 1-1: Manufacturer: syz [ 778.453789][ T3491] usb 1-1: SerialNumber: syz [ 778.904107][ T3491] usb 1-1: 2:1: invalid format type 0x1002 is detected, processed as PCM [ 778.904882][ T3491] usb 1-1: 2:1 : sample bitwidth 29 in over sample bytes 2 [ 778.914546][ T3491] usb 1-1: 2:1 : invalid UAC_FORMAT_TYPE desc [ 779.168011][ T3491] usb 1-1: USB disconnect, device number 12 [ 780.445621][ T30] audit: type=1400 audit(779.880:233): avc: denied { getopt } for pid=5019 comm="syz.0.629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 781.861764][ T4996] udevd[4996]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 782.551596][ T3491] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 782.751133][ T3491] usb 1-1: Using ep0 maxpacket: 16 [ 782.886376][ T3491] usb 1-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 782.886981][ T3491] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 782.887448][ T3491] usb 1-1: Product: syz [ 782.887657][ T3491] usb 1-1: Manufacturer: syz [ 782.887849][ T3491] usb 1-1: SerialNumber: syz [ 783.210534][ T3491] r8152-cfgselector 1-1: Unknown version 0x0000 [ 783.211589][ T3491] r8152-cfgselector 1-1: config 0 descriptor?? [ 783.745345][ T10] r8152-cfgselector 1-1: USB disconnect, device number 13 [ 790.166251][ T30] audit: type=1400 audit(789.610:234): avc: denied { mount } for pid=5031 comm="syz.0.634" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 802.533870][ T30] audit: type=1400 audit(801.980:235): avc: denied { unmount } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 802.761622][ T30] audit: type=1400 audit(802.200:236): avc: denied { lock } for pid=5067 comm="syz.0.644" path="socket:[9379]" dev="sockfs" ino=9379 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 807.047067][ T5093] netlink: 36 bytes leftover after parsing attributes in process `syz.1.655'. [ 807.803724][ T931] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 808.081919][ T931] usb 1-1: Using ep0 maxpacket: 16 [ 808.229519][ T931] usb 1-1: config 0 has an invalid interface descriptor of length 8, skipping [ 808.230262][ T931] usb 1-1: config 0 descriptor has 1 excess byte, ignoring [ 808.230350][ T931] usb 1-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 808.292734][ T931] usb 1-1: New USB device found, idVendor=17ef, idProduct=720c, bcdDevice=51.90 [ 808.293432][ T931] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 808.293697][ T931] usb 1-1: Product: syz [ 808.293832][ T931] usb 1-1: Manufacturer: syz [ 808.293879][ T931] usb 1-1: SerialNumber: syz [ 808.451418][ T931] r8152-cfgselector 1-1: Unknown version 0x0000 [ 808.452183][ T931] r8152-cfgselector 1-1: config 0 descriptor?? [ 808.702091][ T931] r8152-cfgselector 1-1: USB disconnect, device number 14 [ 811.333583][ T5111] binder: 5110:5111 ioctl c0306201 20000080 returned -14 [ 835.250698][ T931] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 835.667446][ T931] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x7 has invalid wMaxPacketSize 0 [ 835.668458][ T931] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x7 has invalid maxpacket 0 [ 835.693349][ T931] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x89 has invalid wMaxPacketSize 0 [ 835.694447][ T931] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x89 has invalid maxpacket 0 [ 835.695139][ T931] usb 1-1: New USB device found, idVendor=2040, idProduct=4900, bcdDevice=4d.8b [ 835.695317][ T931] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 835.897496][ T931] usb 1-1: config 0 descriptor?? [ 846.550953][ T10] usb 1-1: USB disconnect, device number 15 [ 847.880354][ T30] audit: type=1400 audit(847.310:237): avc: denied { create } for pid=5191 comm="syz.0.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 856.324657][ T5225] netlink: 28 bytes leftover after parsing attributes in process `syz.1.699'. [ 856.371422][ T5224] netlink: 8 bytes leftover after parsing attributes in process `syz.0.700'. [ 856.953177][ T5230] netlink: 16 bytes leftover after parsing attributes in process `syz.0.702'. [ 864.170129][ T30] audit: type=1326 audit(863.610:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5256 comm="syz.1.712" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 864.177217][ T30] audit: type=1326 audit(863.610:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5256 comm="syz.1.712" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 864.188364][ T30] audit: type=1326 audit(863.620:240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5256 comm="syz.1.712" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 864.193955][ T30] audit: type=1326 audit(863.620:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5256 comm="syz.1.712" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132970 code=0x7ffc0000 [ 864.201958][ T30] audit: type=1326 audit(863.620:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5256 comm="syz.1.712" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 864.215413][ T30] audit: type=1326 audit(863.660:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5256 comm="syz.1.712" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 864.242977][ T30] audit: type=1326 audit(863.690:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5256 comm="syz.1.712" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 864.250778][ T30] audit: type=1326 audit(863.690:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5256 comm="syz.1.712" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132970 code=0x7ffc0000 [ 864.280579][ T30] audit: type=1326 audit(863.720:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5256 comm="syz.1.712" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 864.287441][ T30] audit: type=1326 audit(863.730:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5256 comm="syz.1.712" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 869.440707][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 869.441698][ T30] audit: type=1400 audit(868.850:258): avc: denied { kexec_image_load } for pid=5275 comm="syz.1.720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 876.075670][ T30] audit: type=1326 audit(875.520:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5293 comm="syz.1.727" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 876.076782][ T30] audit: type=1326 audit(875.520:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5293 comm="syz.1.727" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 876.111348][ T30] audit: type=1326 audit(875.550:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5293 comm="syz.1.727" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 876.112340][ T30] audit: type=1326 audit(875.550:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5293 comm="syz.1.727" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132970 code=0x7ffc0000 [ 876.112695][ T30] audit: type=1326 audit(875.550:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5293 comm="syz.1.727" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 876.113039][ T30] audit: type=1326 audit(875.550:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5293 comm="syz.1.727" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 876.113349][ T30] audit: type=1326 audit(875.550:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5293 comm="syz.1.727" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 876.113669][ T30] audit: type=1326 audit(875.550:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5293 comm="syz.1.727" exe="/syz-executor" sig=0 arch=40000028 syscall=144 compat=1 ip=0x132970 code=0x7ffc0000 [ 876.113954][ T30] audit: type=1326 audit(875.560:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5293 comm="syz.1.727" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 876.114322][ T30] audit: type=1326 audit(875.560:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5293 comm="syz.1.727" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 886.226616][ T30] kauditd_printk_skb: 50 callbacks suppressed [ 886.227776][ T30] audit: type=1400 audit(885.670:319): avc: denied { accept } for pid=5336 comm="syz.0.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 886.244067][ T30] audit: type=1400 audit(885.690:320): avc: denied { read } for pid=5336 comm="syz.0.743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 887.234758][ T30] audit: type=1400 audit(886.680:321): avc: denied { write } for pid=5342 comm="syz.0.746" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 888.086452][ T5347] fuse: Bad value for 'group_id' [ 888.090657][ T5347] fuse: Bad value for 'group_id' [ 890.515786][ T5359] fuse: Bad value for 'group_id' [ 890.516196][ T5359] fuse: Bad value for 'group_id' [ 897.042767][ T30] audit: type=1326 audit(896.470:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5389 comm="syz.1.770" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 897.043346][ T30] audit: type=1326 audit(896.480:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5389 comm="syz.1.770" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 897.043793][ T30] audit: type=1326 audit(896.480:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5389 comm="syz.1.770" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 897.044020][ T30] audit: type=1326 audit(896.480:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5389 comm="syz.1.770" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132970 code=0x7ffc0000 [ 897.044222][ T30] audit: type=1326 audit(896.480:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5389 comm="syz.1.770" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 897.044409][ T30] audit: type=1326 audit(896.480:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5389 comm="syz.1.770" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 897.044626][ T30] audit: type=1326 audit(896.490:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5389 comm="syz.1.770" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 897.060499][ T30] audit: type=1326 audit(896.500:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5389 comm="syz.1.770" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 897.061147][ T30] audit: type=1326 audit(896.500:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5389 comm="syz.1.770" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132970 code=0x7ffc0000 [ 897.094265][ T30] audit: type=1326 audit(896.530:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5389 comm="syz.1.770" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 897.451187][ T5393] netlink: 28 bytes leftover after parsing attributes in process `syz.0.771'. [ 897.455458][ T5393] netlink: 28 bytes leftover after parsing attributes in process `syz.0.771'. [ 898.901820][ T5401] Illegal XDP return value 33 on prog (id 12) dev N/A, expect packet loss! [ 903.533366][ T5419] netlink: 'syz.1.784': attribute type 10 has an invalid length. [ 903.662619][ T5419] netlink: 'syz.1.784': attribute type 10 has an invalid length. [ 904.869955][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 904.875100][ T30] audit: type=1400 audit(904.310:351): avc: denied { create } for pid=5422 comm="syz.1.786" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 904.916832][ T30] audit: type=1400 audit(904.350:352): avc: denied { write } for pid=5422 comm="syz.1.786" name="file0" dev="tmpfs" ino=2373 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 904.917754][ T30] audit: type=1400 audit(904.360:353): avc: denied { open } for pid=5422 comm="syz.1.786" path="/456/file0" dev="tmpfs" ino=2373 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 905.066689][ T30] audit: type=1400 audit(904.510:354): avc: denied { unlink } for pid=3326 comm="syz-executor" name="file0" dev="tmpfs" ino=2373 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 905.750603][ T30] audit: type=1400 audit(905.190:355): avc: denied { read } for pid=5426 comm="syz.1.788" dev="nsfs" ino=4026532667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 905.755206][ T30] audit: type=1400 audit(905.200:356): avc: denied { open } for pid=5426 comm="syz.1.788" path="net:[4026532667]" dev="nsfs" ino=4026532667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 905.801923][ T30] audit: type=1326 audit(905.250:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5427 comm="syz.0.789" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 905.808261][ T30] audit: type=1326 audit(905.250:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5427 comm="syz.0.789" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 905.824555][ T30] audit: type=1326 audit(905.270:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5427 comm="syz.0.789" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 905.844516][ T30] audit: type=1326 audit(905.290:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5427 comm="syz.0.789" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 908.732734][ T5443] netlink: 104 bytes leftover after parsing attributes in process `syz.0.796'. [ 910.262708][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 910.263565][ T30] audit: type=1400 audit(909.710:390): avc: denied { setopt } for pid=5455 comm="syz.1.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 915.117398][ T5479] smc: net device bond0 applied user defined pnetid SYZ0 [ 915.127127][ T5479] smc: net device bond0 erased user defined pnetid SYZ0 [ 915.618252][ T5481] netlink: 20 bytes leftover after parsing attributes in process `syz.0.813'. [ 924.307484][ T30] audit: type=1400 audit(923.750:391): avc: denied { read } for pid=5516 comm="syz.0.828" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 924.322290][ T30] audit: type=1400 audit(923.770:392): avc: denied { open } for pid=5516 comm="syz.0.828" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 924.326759][ T30] audit: type=1400 audit(923.770:393): avc: denied { ioctl } for pid=5516 comm="syz.0.828" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 938.665935][ T30] audit: type=1400 audit(938.110:394): avc: denied { watch } for pid=5552 comm="syz.1.845" path="/476" dev="tmpfs" ino=2469 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 952.224012][ T5601] netlink: 4 bytes leftover after parsing attributes in process `syz.1.864'. [ 956.707272][ T30] audit: type=1400 audit(956.150:395): avc: denied { read } for pid=5612 comm="syz.0.869" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 956.742385][ T30] audit: type=1400 audit(956.180:396): avc: denied { open } for pid=5612 comm="syz.0.869" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 956.831390][ T30] audit: type=1400 audit(956.270:397): avc: denied { ioctl } for pid=5612 comm="syz.0.869" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 985.192214][ T30] audit: type=1326 audit(984.640:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.1.884" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 985.195508][ T30] audit: type=1326 audit(984.640:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.1.884" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 985.204237][ T30] audit: type=1326 audit(984.650:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.1.884" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 985.216779][ T30] audit: type=1326 audit(984.660:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.1.884" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 985.221093][ T30] audit: type=1326 audit(984.670:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.1.884" exe="/syz-executor" sig=0 arch=40000028 syscall=125 compat=1 ip=0x132970 code=0x7ffc0000 [ 985.233020][ T30] audit: type=1326 audit(984.680:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.1.884" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 985.238012][ T30] audit: type=1326 audit(984.680:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.1.884" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 985.254723][ T30] audit: type=1326 audit(984.680:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.1.884" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 985.259471][ T30] audit: type=1326 audit(984.700:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.1.884" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 985.261491][ T30] audit: type=1326 audit(984.700:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.1.884" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=1 ip=0x132970 code=0x7ffc0000 [ 987.893381][ T5687] netlink: 4 bytes leftover after parsing attributes in process `syz.1.889'. [ 995.972472][ T5710] fuse: Bad value for 'fd' [ 1005.834618][ T5729] fuse: Bad value for 'fd' [ 1007.647996][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 1007.662238][ T30] audit: type=1326 audit(1007.090:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5736 comm="syz.0.907" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1007.666938][ T30] audit: type=1326 audit(1007.090:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5736 comm="syz.0.907" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1007.675609][ T30] audit: type=1326 audit(1007.110:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5736 comm="syz.0.907" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1007.686436][ T30] audit: type=1326 audit(1007.110:419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5736 comm="syz.0.907" exe="/syz-executor" sig=0 arch=40000028 syscall=383 compat=1 ip=0x132970 code=0x7ffc0000 [ 1007.694001][ T30] audit: type=1326 audit(1007.120:420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5736 comm="syz.0.907" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1007.701356][ T30] audit: type=1326 audit(1007.120:421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5736 comm="syz.0.907" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1007.705479][ T30] audit: type=1326 audit(1007.150:423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5736 comm="syz.0.907" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1007.713753][ T30] audit: type=1326 audit(1007.150:424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5736 comm="syz.0.907" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1007.718155][ T30] audit: type=1326 audit(1007.150:425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5736 comm="syz.0.907" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1007.741673][ T30] audit: type=1326 audit(1007.130:422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5736 comm="syz.0.907" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1008.303322][ T5739] fuse: Bad value for 'fd' [ 1019.241814][ T5764] fuse: Bad value for 'user_id' [ 1019.251000][ T5764] fuse: Bad value for 'user_id' [ 1019.970407][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 1019.970816][ T30] audit: type=1326 audit(1019.400:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5765 comm="syz.1.918" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1019.976089][ T30] audit: type=1326 audit(1019.420:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5765 comm="syz.1.918" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1020.004344][ T30] audit: type=1326 audit(1019.450:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5765 comm="syz.1.918" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1020.012468][ T30] audit: type=1326 audit(1019.460:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5765 comm="syz.1.918" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1020.017275][ T30] audit: type=1326 audit(1019.460:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5765 comm="syz.1.918" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=1 ip=0x132970 code=0x7ffc0000 [ 1020.040399][ T30] audit: type=1326 audit(1019.480:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5765 comm="syz.1.918" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1020.050676][ T30] audit: type=1326 audit(1019.490:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5765 comm="syz.1.918" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1020.062556][ T30] audit: type=1326 audit(1019.500:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5765 comm="syz.1.918" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1020.063138][ T30] audit: type=1326 audit(1019.500:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5765 comm="syz.1.918" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1020.078447][ T30] audit: type=1326 audit(1019.510:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5765 comm="syz.1.918" exe="/syz-executor" sig=0 arch=40000028 syscall=434 compat=1 ip=0x132970 code=0x7ffc0000 [ 1021.642844][ T5774] fuse: Bad value for 'user_id' [ 1021.644071][ T5774] fuse: Bad value for 'user_id' [ 1026.191858][ T5792] netlink: 4 bytes leftover after parsing attributes in process `syz.1.927'. [ 1026.486123][ T5792] hsr_slave_1 (unregistering): left promiscuous mode [ 1028.595139][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 1028.606984][ T30] audit: type=1400 audit(1028.040:459): avc: denied { setopt } for pid=5806 comm="syz.1.933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1031.568322][ T30] audit: type=1400 audit(1031.010:460): avc: denied { append } for pid=5817 comm="syz.1.938" name="loop3" dev="devtmpfs" ino=641 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1031.720241][ T30] audit: type=1400 audit(1031.160:461): avc: denied { ioctl } for pid=5817 comm="syz.1.938" path="socket:[11263]" dev="sockfs" ino=11263 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1036.664981][ T30] audit: type=1326 audit(1036.110:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5838 comm="syz.0.947" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1036.671740][ T30] audit: type=1326 audit(1036.120:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5838 comm="syz.0.947" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1036.676279][ T30] audit: type=1326 audit(1036.120:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5838 comm="syz.0.947" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1036.683756][ T30] audit: type=1326 audit(1036.130:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5838 comm="syz.0.947" exe="/syz-executor" sig=0 arch=40000028 syscall=100 compat=1 ip=0x132970 code=0x7ffc0000 [ 1036.689291][ T30] audit: type=1326 audit(1036.130:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5838 comm="syz.0.947" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1036.693154][ T30] audit: type=1326 audit(1036.130:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5838 comm="syz.0.947" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1038.461510][ T5846] netlink: 32 bytes leftover after parsing attributes in process `syz.1.941'. [ 1045.165817][ T30] audit: type=1326 audit(1044.610:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5858 comm="syz.0.953" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1045.167720][ T30] audit: type=1326 audit(1044.610:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5858 comm="syz.0.953" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1045.173844][ T30] audit: type=1326 audit(1044.620:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5858 comm="syz.0.953" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1045.178336][ T30] audit: type=1326 audit(1044.620:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5858 comm="syz.0.953" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132970 code=0x7ffc0000 [ 1045.190410][ T30] audit: type=1326 audit(1044.630:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5858 comm="syz.0.953" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1045.199592][ T30] audit: type=1326 audit(1044.630:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5858 comm="syz.0.953" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1045.213159][ T30] audit: type=1326 audit(1044.660:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5858 comm="syz.0.953" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1045.214935][ T30] audit: type=1326 audit(1044.660:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5858 comm="syz.0.953" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=1 ip=0x132970 code=0x7ffc0000 [ 1045.237983][ T30] audit: type=1326 audit(1044.680:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5858 comm="syz.0.953" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1045.261284][ T30] audit: type=1326 audit(1044.680:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5858 comm="syz.0.953" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1066.067358][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 1066.089898][ T30] audit: type=1400 audit(1065.480:513): avc: denied { mount } for pid=5909 comm="syz.1.972" name="/" dev="ramfs" ino=11762 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1068.356724][ T30] audit: type=1400 audit(1067.800:514): avc: denied { setcurrent } for pid=5922 comm="syz.0.978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1068.378097][ T30] audit: type=1401 audit(1067.820:515): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 1068.895262][ T30] audit: type=1400 audit(1068.340:516): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1068.900807][ T30] audit: type=1400 audit(1068.340:517): avc: denied { open } for pid=3326 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1068.925766][ T30] audit: type=1400 audit(1068.350:518): avc: denied { ioctl } for pid=3326 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1069.033336][ T30] audit: type=1400 audit(1068.480:519): avc: denied { read } for pid=5925 comm="syz.0.979" dev="nsfs" ino=4026532624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1069.037165][ T30] audit: type=1400 audit(1068.480:520): avc: denied { open } for pid=5925 comm="syz.0.979" path="net:[4026532624]" dev="nsfs" ino=4026532624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1069.053187][ T30] audit: type=1400 audit(1068.500:521): avc: denied { create } for pid=5925 comm="syz.0.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1069.251719][ T5928] netlink: 12 bytes leftover after parsing attributes in process `syz.1.980'. [ 1069.253707][ T5928] netlink: 12 bytes leftover after parsing attributes in process `syz.1.980'. [ 1069.418368][ T30] audit: type=1400 audit(1068.860:522): avc: denied { map_create } for pid=5929 comm="syz.0.981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1070.583282][ T5936] netlink: 'syz.0.984': attribute type 39 has an invalid length. [ 1072.286861][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 1072.287839][ T30] audit: type=1400 audit(1071.730:530): avc: denied { prog_run } for pid=5944 comm="syz.0.987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1072.487188][ T30] audit: type=1400 audit(1071.930:531): avc: denied { execmem } for pid=5944 comm="syz.0.987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1077.674324][ T30] audit: type=1400 audit(1077.110:532): avc: denied { create } for pid=5949 comm="syz.0.988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1077.685925][ T30] audit: type=1400 audit(1077.130:533): avc: denied { write } for pid=5949 comm="syz.0.988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1078.455320][ T30] audit: type=1326 audit(1077.900:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5951 comm="syz.0.989" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1078.456343][ T30] audit: type=1326 audit(1077.900:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5951 comm="syz.0.989" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1078.490609][ T30] audit: type=1326 audit(1077.900:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5951 comm="syz.0.989" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1078.493798][ T30] audit: type=1326 audit(1077.940:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5951 comm="syz.0.989" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1078.496664][ T30] audit: type=1326 audit(1077.940:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5951 comm="syz.0.989" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=1 ip=0x132970 code=0x7ffc0000 [ 1078.520513][ T30] audit: type=1326 audit(1077.960:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5951 comm="syz.0.989" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1078.533586][ T30] audit: type=1326 audit(1077.980:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5951 comm="syz.0.989" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1078.576321][ T30] audit: type=1326 audit(1078.020:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5951 comm="syz.0.989" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1082.680252][ T30] kauditd_printk_skb: 121 callbacks suppressed [ 1082.680714][ T30] audit: type=1326 audit(1082.110:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5957 comm="syz.1.992" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1082.680985][ T30] audit: type=1326 audit(1082.110:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5957 comm="syz.1.992" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=1 ip=0x160424 code=0x7ffc0000 [ 1082.686681][ T30] audit: type=1326 audit(1082.130:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5957 comm="syz.1.992" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1082.693937][ T30] audit: type=1326 audit(1082.140:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5957 comm="syz.1.992" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=1 ip=0x160424 code=0x7ffc0000 [ 1082.711528][ T30] audit: type=1326 audit(1082.150:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5957 comm="syz.1.992" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1082.724410][ T30] audit: type=1326 audit(1082.170:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5957 comm="syz.1.992" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=1 ip=0x160424 code=0x7ffc0000 [ 1082.773893][ T30] audit: type=1326 audit(1082.220:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5957 comm="syz.1.992" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1082.783537][ T30] audit: type=1326 audit(1082.220:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5957 comm="syz.1.992" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=1 ip=0x160424 code=0x7ffc0000 [ 1082.823176][ T30] audit: type=1326 audit(1082.270:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5957 comm="syz.1.992" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1082.835369][ T30] audit: type=1326 audit(1082.270:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5957 comm="syz.1.992" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=1 ip=0x160424 code=0x7ffc0000 [ 1087.880670][ T5988] fuse: Bad value for 'group_id' [ 1087.881277][ T5988] fuse: Bad value for 'group_id' [ 1089.047899][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 1089.070448][ T30] audit: type=1400 audit(1088.490:693): avc: denied { bind } for pid=5992 comm="syz.1.1005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1089.074358][ T30] audit: type=1400 audit(1088.500:694): avc: denied { node_bind } for pid=5992 comm="syz.1.1005" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1089.086339][ T30] audit: type=1400 audit(1088.510:695): avc: denied { write } for pid=5992 comm="syz.1.1005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1089.097919][ T30] audit: type=1400 audit(1088.520:696): avc: denied { read } for pid=5992 comm="syz.1.1005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1090.951965][ T5999] fuse: Bad value for 'group_id' [ 1090.955701][ T5999] fuse: Bad value for 'group_id' [ 1093.705188][ T6010] fuse: Bad value for 'group_id' [ 1093.706091][ T6010] fuse: Bad value for 'group_id' [ 1097.020931][ T6026] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1021'. [ 1097.021502][ T6026] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1021'. [ 1102.191031][ T30] audit: type=1400 audit(1101.620:697): avc: denied { create } for pid=6031 comm="syz.1.1024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1102.764333][ T30] audit: type=1400 audit(1102.210:698): avc: denied { write } for pid=6038 comm="syz.1.1025" name="ip6_tables_names" dev="proc" ino=4026532769 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1103.268389][ T30] audit: type=1400 audit(1102.710:699): avc: denied { create } for pid=6040 comm="syz.1.1026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1103.312070][ T30] audit: type=1400 audit(1102.750:700): avc: denied { sys_admin } for pid=6040 comm="syz.1.1026" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1103.951315][ T30] audit: type=1326 audit(1103.390:701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6040 comm="syz.1.1026" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1103.963329][ T30] audit: type=1326 audit(1103.410:702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6040 comm="syz.1.1026" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1103.986812][ T30] audit: type=1326 audit(1103.410:703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6040 comm="syz.1.1026" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1103.999952][ T30] audit: type=1326 audit(1103.430:704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6040 comm="syz.1.1026" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1104.005660][ T30] audit: type=1326 audit(1103.450:705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6040 comm="syz.1.1026" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132970 code=0x7ffc0000 [ 1104.038226][ T30] audit: type=1326 audit(1103.480:706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6040 comm="syz.1.1026" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1107.982024][ T6052] fuse: Unknown parameter 'use00000000000000000000' [ 1108.698282][ T30] kauditd_printk_skb: 48 callbacks suppressed [ 1108.710361][ T30] audit: type=1400 audit(1108.140:755): avc: denied { create } for pid=6055 comm="syz.1.1030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1108.737927][ T30] audit: type=1400 audit(1108.180:756): avc: denied { connect } for pid=6055 comm="syz.1.1030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1108.770427][ T30] audit: type=1400 audit(1108.210:757): avc: denied { write } for pid=6055 comm="syz.1.1030" laddr=fe80::a8aa:aaff:feaa:aaaa lport=17406 faddr=ff04::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1108.915349][ T6058] netlink: 'syz.1.1030': attribute type 39 has an invalid length. [ 1121.735781][ T6068] fuse: Unknown parameter 'use00000000000000000000' [ 1122.547053][ T30] audit: type=1400 audit(1121.990:758): avc: denied { mount } for pid=6071 comm="syz.1.1037" name="/" dev="ramfs" ino=12654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1123.286738][ T6078] fuse: Unknown parameter 'user_i00000000000000000000' [ 1125.691506][ T30] audit: type=1326 audit(1125.140:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.0.1045" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1125.692661][ T30] audit: type=1326 audit(1125.140:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.0.1045" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1125.696218][ T30] audit: type=1326 audit(1125.140:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.0.1045" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1125.707111][ T30] audit: type=1326 audit(1125.140:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.0.1045" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1125.725294][ T30] audit: type=1326 audit(1125.150:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.0.1045" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=1 ip=0x132970 code=0x7ffc0000 [ 1125.736385][ T30] audit: type=1326 audit(1125.150:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.0.1045" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1125.762160][ T30] audit: type=1326 audit(1125.150:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.0.1045" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1125.773087][ T30] audit: type=1326 audit(1125.150:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.0.1045" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1125.777022][ T30] audit: type=1326 audit(1125.150:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.0.1045" exe="/syz-executor" sig=0 arch=40000028 syscall=181 compat=1 ip=0x132970 code=0x7ffc0000 [ 1127.582324][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1127.594267][ T30] audit: type=1400 audit(1127.010:770): avc: denied { name_bind } for pid=6097 comm="syz.0.1049" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1127.595433][ T30] audit: type=1400 audit(1127.020:771): avc: denied { node_bind } for pid=6097 comm="syz.0.1049" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1127.595949][ T30] audit: type=1400 audit(1127.030:772): avc: denied { create } for pid=6097 comm="syz.0.1049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1127.613638][ T30] audit: type=1400 audit(1127.050:773): avc: denied { write } for pid=6097 comm="syz.0.1049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1127.617665][ T30] audit: type=1400 audit(1127.060:774): avc: denied { nlmsg_write } for pid=6097 comm="syz.0.1049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1128.264073][ T30] audit: type=1400 audit(1127.710:775): avc: denied { sys_module } for pid=6099 comm="syz.0.1050" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1130.720728][ T30] audit: type=1326 audit(1130.160:776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6107 comm="syz.0.1053" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1130.728322][ T30] audit: type=1326 audit(1130.170:777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6107 comm="syz.0.1053" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1130.734704][ T30] audit: type=1326 audit(1130.170:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6107 comm="syz.0.1053" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1130.742599][ T30] audit: type=1326 audit(1130.170:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6107 comm="syz.0.1053" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1135.182513][ T30] kauditd_printk_skb: 54 callbacks suppressed [ 1135.184864][ T30] audit: type=1400 audit(1134.620:834): avc: denied { ioctl } for pid=6130 comm="syz.0.1063" path="socket:[12151]" dev="sockfs" ino=12151 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1143.380425][ T30] audit: type=1326 audit(1142.810:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6159 comm="syz.0.1073" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1143.387014][ T30] audit: type=1326 audit(1142.830:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6159 comm="syz.0.1073" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1143.415178][ T30] audit: type=1326 audit(1142.860:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6159 comm="syz.0.1073" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1143.435962][ T30] audit: type=1326 audit(1142.880:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6159 comm="syz.0.1073" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1143.440737][ T30] audit: type=1326 audit(1142.880:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6159 comm="syz.0.1073" exe="/syz-executor" sig=0 arch=40000028 syscall=461 compat=1 ip=0x132970 code=0x7ffc0000 [ 1143.447403][ T30] audit: type=1326 audit(1142.880:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6159 comm="syz.0.1073" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1143.471551][ T30] audit: type=1326 audit(1142.880:841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6159 comm="syz.0.1073" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1143.477302][ T30] audit: type=1326 audit(1142.920:842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6159 comm="syz.0.1073" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1143.492798][ T30] audit: type=1326 audit(1142.940:843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6159 comm="syz.0.1073" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=1 ip=0x132970 code=0x7ffc0000 [ 1143.529940][ T30] audit: type=1326 audit(1142.970:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6159 comm="syz.0.1073" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1148.825054][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 1148.825839][ T30] audit: type=1400 audit(1148.230:854): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1148.826367][ T30] audit: type=1400 audit(1148.270:855): avc: denied { open } for pid=3326 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1149.151824][ T30] audit: type=1400 audit(1148.590:856): avc: denied { execute } for pid=6173 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1149.222272][ T30] audit: type=1400 audit(1148.660:857): avc: denied { execute_no_trans } for pid=6173 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1149.273999][ T30] audit: type=1400 audit(1148.720:858): avc: denied { execmem } for pid=6173 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1149.387152][ T30] audit: type=1400 audit(1148.790:859): avc: denied { read } for pid=6174 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1149.388041][ T30] audit: type=1400 audit(1148.830:860): avc: denied { open } for pid=6174 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1149.446294][ T30] audit: type=1400 audit(1148.890:861): avc: denied { mounton } for pid=6174 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1149.732112][ T30] audit: type=1400 audit(1149.170:862): avc: denied { module_request } for pid=6174 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1150.916508][ T30] audit: type=1400 audit(1150.350:863): avc: denied { sys_module } for pid=6174 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1152.364247][ T107] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1152.369819][ T107] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 1] type 2 family 0 port 256 - 0 [ 1152.937255][ T107] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1152.937969][ T107] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 1] type 2 family 0 port 256 - 0 [ 1153.382260][ T107] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1153.386733][ T107] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 1] type 2 family 0 port 256 - 0 [ 1153.708136][ T107] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1153.710759][ T107] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 1] type 2 family 0 port 256 - 0 [ 1154.049789][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 1154.053739][ T30] audit: type=1400 audit(1153.490:871): avc: denied { write } for pid=6183 comm="syz.0.1080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1154.820401][ T30] audit: type=1400 audit(1154.260:872): avc: denied { read } for pid=6183 comm="syz.0.1080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1155.880931][ T30] audit: type=1400 audit(1155.320:873): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1156.233596][ T30] audit: type=1326 audit(1155.680:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6193 comm="syz.0.1081" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1156.234697][ T30] audit: type=1326 audit(1155.680:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6193 comm="syz.0.1081" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1156.246764][ T30] audit: type=1326 audit(1155.690:876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6193 comm="syz.0.1081" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1156.266345][ T30] audit: type=1326 audit(1155.710:877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6193 comm="syz.0.1081" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1156.267455][ T30] audit: type=1326 audit(1155.710:878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6193 comm="syz.0.1081" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132970 code=0x7ffc0000 [ 1156.271897][ T30] audit: type=1326 audit(1155.710:879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6193 comm="syz.0.1081" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1156.272431][ T30] audit: type=1326 audit(1155.710:880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6193 comm="syz.0.1081" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1157.142486][ T6199] fuse: Bad value for 'fd' [ 1158.723417][ T107] bond1 (unregistering): (slave gretap1): Releasing active interface [ 1159.666634][ T107] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1159.761825][ T107] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1159.817715][ T107] bond0 (unregistering): Released all slaves [ 1160.230821][ T107] bond1 (unregistering): Released all slaves [ 1160.384873][ T107] bond2 (unregistering): Released all slaves [ 1160.990718][ T30] kauditd_printk_skb: 23 callbacks suppressed [ 1160.991428][ T30] audit: type=1400 audit(1160.430:904): avc: denied { search } for pid=3170 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1161.003607][ T30] audit: type=1400 audit(1160.450:905): avc: denied { search } for pid=3170 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1161.022748][ T30] audit: type=1400 audit(1160.470:906): avc: denied { search } for pid=3170 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1161.034859][ T30] audit: type=1400 audit(1160.480:907): avc: denied { read } for pid=3170 comm="dhcpcd" name="n18" dev="tmpfs" ino=3469 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1161.043447][ T30] audit: type=1400 audit(1160.480:908): avc: denied { open } for pid=3170 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=3469 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1161.066753][ T30] audit: type=1400 audit(1160.500:909): avc: denied { getattr } for pid=3170 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=3469 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1161.175444][ T107] hsr_slave_0: left promiscuous mode [ 1161.594218][ T107] veth1_macvtap: left promiscuous mode [ 1161.602484][ T107] veth0_macvtap: left promiscuous mode [ 1161.623368][ T107] veth1_vlan: left promiscuous mode [ 1161.626486][ T107] veth0_vlan: left promiscuous mode [ 1161.703573][ T6212] fuse: Bad value for 'fd' [ 1164.167252][ T30] audit: type=1400 audit(1163.610:910): avc: denied { create } for pid=6213 comm="syz.0.1087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1170.206720][ T30] audit: type=1400 audit(1169.650:911): avc: denied { read open } for pid=6229 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=759 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1170.223519][ T30] audit: type=1400 audit(1169.650:912): avc: denied { getattr } for pid=6229 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=759 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1170.550500][ T30] audit: type=1400 audit(1169.990:913): avc: denied { add_name } for pid=6225 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1170.556299][ T30] audit: type=1400 audit(1170.000:914): avc: denied { create } for pid=6225 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1170.576818][ T30] audit: type=1400 audit(1170.020:915): avc: denied { write } for pid=6225 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=3473 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1170.600008][ T30] audit: type=1400 audit(1170.040:916): avc: denied { append } for pid=6225 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=3473 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1170.727620][ T6234] fuse: Unknown parameter '0x0000000000000003' [ 1172.260490][ T30] audit: type=1400 audit(1171.700:917): avc: denied { remove_name } for pid=6239 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=3473 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1172.266162][ T30] audit: type=1400 audit(1171.700:918): avc: denied { unlink } for pid=6239 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=3473 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1178.092849][ T6174] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1178.173777][ T6174] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1185.334349][ T6174] hsr_slave_0: entered promiscuous mode [ 1185.365208][ T6174] hsr_slave_1: entered promiscuous mode [ 1188.181408][ T6285] fuse: Unknown parameter '0x0000000000000003' [ 1191.977075][ T6301] fuse: Unknown parameter '0x0000000000000003' [ 1192.516776][ T6174] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1192.677434][ T6174] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1192.808448][ T6174] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1192.922594][ T6174] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1197.837201][ T6174] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1203.209793][ T30] audit: type=1400 audit(1202.650:919): avc: denied { allowed } for pid=6337 comm="syz.0.1101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1204.530440][ T30] audit: type=1400 audit(1203.970:920): avc: denied { create } for pid=6340 comm="syz.0.1102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1204.604041][ T30] audit: type=1400 audit(1204.050:921): avc: denied { write } for pid=6340 comm="syz.0.1102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1207.667390][ T6352] fuse: Unknown parameter '0x0000000000000003' [ 1210.262609][ T30] audit: type=1400 audit(1209.700:922): avc: denied { setattr } for pid=6354 comm="syz.0.1104" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1219.305094][ T6174] veth0_vlan: entered promiscuous mode [ 1219.423546][ T6174] veth1_vlan: entered promiscuous mode [ 1220.032785][ T6174] veth0_macvtap: entered promiscuous mode [ 1220.185844][ T6174] veth1_macvtap: entered promiscuous mode [ 1221.375709][ T26] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1221.384398][ T26] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1221.386886][ T26] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1221.391884][ T26] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1222.361156][ T30] audit: type=1400 audit(1221.800:923): avc: denied { mounton } for pid=6174 comm="syz-executor" path="/syzkaller.ETOeYd/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1222.374063][ T30] audit: type=1400 audit(1221.800:924): avc: denied { mount } for pid=6174 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1222.431735][ T30] audit: type=1400 audit(1221.870:925): avc: denied { mounton } for pid=6174 comm="syz-executor" path="/syzkaller.ETOeYd/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1222.491741][ T30] audit: type=1400 audit(1221.900:926): avc: denied { mount } for pid=6174 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1222.575929][ T30] audit: type=1400 audit(1222.020:927): avc: denied { mounton } for pid=6174 comm="syz-executor" path="/syzkaller.ETOeYd/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1222.625203][ T30] audit: type=1400 audit(1222.070:928): avc: denied { mounton } for pid=6174 comm="syz-executor" path="/syzkaller.ETOeYd/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=14411 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1222.774506][ T30] audit: type=1400 audit(1222.220:929): avc: denied { unmount } for pid=6174 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1222.815192][ T30] audit: type=1400 audit(1222.250:930): avc: denied { mounton } for pid=6174 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1222.816249][ T30] audit: type=1400 audit(1222.260:931): avc: denied { mount } for pid=6174 comm="syz-executor" name="/" dev="gadgetfs" ino=4496 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1222.843404][ T30] audit: type=1400 audit(1222.280:932): avc: denied { mount } for pid=6174 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1225.312797][ T6407] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1110'. [ 1226.644335][ T6410] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1111'. [ 1227.874416][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 1227.877781][ T30] audit: type=1400 audit(1227.320:936): avc: denied { bind } for pid=6413 comm="syz.1.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1227.898389][ T30] audit: type=1400 audit(1227.340:937): avc: denied { setopt } for pid=6413 comm="syz.1.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1227.956075][ T6414] netlink: 'syz.1.1113': attribute type 10 has an invalid length. [ 1228.552587][ T30] audit: type=1400 audit(1227.970:938): avc: denied { read } for pid=6415 comm="syz.1.1114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1231.863527][ T30] audit: type=1400 audit(1231.310:939): avc: denied { unmount } for pid=6174 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1234.535969][ T6431] $Hÿ: renamed from dummy0 (while UP) [ 1234.573563][ T6431] $Hÿ: entered promiscuous mode [ 1235.493539][ T30] audit: type=1326 audit(1234.940:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6434 comm="syz.0.1123" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1235.521952][ T30] audit: type=1326 audit(1234.970:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6434 comm="syz.0.1123" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1235.532635][ T30] audit: type=1326 audit(1234.980:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6434 comm="syz.0.1123" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1235.546068][ T30] audit: type=1326 audit(1234.980:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6434 comm="syz.0.1123" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1235.546888][ T30] audit: type=1326 audit(1234.990:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6434 comm="syz.0.1123" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132970 code=0x7ffc0000 [ 1235.562785][ T30] audit: type=1326 audit(1235.010:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6434 comm="syz.0.1123" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1235.566375][ T30] audit: type=1326 audit(1235.010:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6434 comm="syz.0.1123" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1235.577326][ T30] audit: type=1326 audit(1235.020:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6434 comm="syz.0.1123" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1235.601782][ T30] audit: type=1326 audit(1235.020:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6434 comm="syz.0.1123" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1235.602694][ T30] audit: type=1326 audit(1235.020:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6434 comm="syz.0.1123" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132970 code=0x7ffc0000 [ 1239.837486][ T6457] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 1239.838038][ T6457] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 1239.843490][ T6457] netdevsim netdevsim0: Falling back to sysfs fallback for: . [ 1240.714258][ T30] kauditd_printk_skb: 88 callbacks suppressed [ 1240.718100][ T30] audit: type=1400 audit(1240.160:1038): avc: denied { name_bind } for pid=6458 comm="syz.1.1134" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1240.725062][ T30] audit: type=1400 audit(1240.170:1039): avc: denied { node_bind } for pid=6458 comm="syz.1.1134" saddr=::1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1242.899546][ T30] audit: type=1400 audit(1242.340:1040): avc: denied { create } for pid=6469 comm="syz.1.1139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1242.920692][ T30] audit: type=1400 audit(1242.360:1041): avc: denied { setopt } for pid=6469 comm="syz.1.1139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1243.362840][ T30] audit: type=1326 audit(1242.800:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6471 comm="syz.1.1140" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1243.363968][ T30] audit: type=1326 audit(1242.800:1043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6471 comm="syz.1.1140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1243.364346][ T30] audit: type=1326 audit(1242.810:1044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6471 comm="syz.1.1140" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1243.370481][ T30] audit: type=1326 audit(1242.810:1045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6471 comm="syz.1.1140" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1243.371499][ T30] audit: type=1326 audit(1242.820:1046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6471 comm="syz.1.1140" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132970 code=0x7ffc0000 [ 1243.388468][ T30] audit: type=1326 audit(1242.830:1047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6471 comm="syz.1.1140" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1246.287067][ T30] kauditd_printk_skb: 50 callbacks suppressed [ 1246.288187][ T30] audit: type=1400 audit(1245.730:1098): avc: denied { setopt } for pid=6482 comm="syz.1.1145" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1246.376589][ T6487] pim6reg: entered allmulticast mode [ 1246.403526][ T6487] pim6reg: left allmulticast mode [ 1246.409708][ T30] audit: type=1400 audit(1245.850:1099): avc: denied { connect } for pid=6486 comm="syz.0.1147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1246.434672][ T30] audit: type=1400 audit(1245.880:1100): avc: denied { write } for pid=6486 comm="syz.0.1147" laddr=fe80::a8aa:aaff:feaa:aaaa lport=44280 faddr=ff04::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1247.763936][ T6493] fuse: Bad value for 'fd' [ 1251.433254][ T6505] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1154'. [ 1253.615049][ T30] audit: type=1400 audit(1253.060:1101): avc: denied { sqpoll } for pid=6506 comm="syz.0.1155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1260.780991][ T30] audit: type=1400 audit(1260.220:1102): avc: denied { create } for pid=6520 comm="syz.0.1159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1260.797647][ T30] audit: type=1400 audit(1260.240:1103): avc: denied { write } for pid=6520 comm="syz.0.1159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1260.810704][ T30] audit: type=1400 audit(1260.240:1104): avc: denied { nlmsg_write } for pid=6520 comm="syz.0.1159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1261.836111][ T30] audit: type=1400 audit(1261.280:1105): avc: denied { load_policy } for pid=6524 comm="syz.0.1161" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1261.856479][ T6525] SELinux: failed to load policy [ 1266.003061][ T30] audit: type=1400 audit(1265.450:1106): avc: denied { create } for pid=6530 comm="syz.0.1164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1267.030518][ T30] audit: type=1400 audit(1266.470:1107): avc: denied { getopt } for pid=6530 comm="syz.0.1164" lport=13 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1268.043683][ T30] audit: type=1400 audit(1267.480:1108): avc: denied { ioctl } for pid=6537 comm="syz.1.1166" path="socket:[14633]" dev="sockfs" ino=14633 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1268.053234][ T6539] netlink: 88 bytes leftover after parsing attributes in process `syz.1.1166'. [ 1268.092583][ T30] audit: type=1400 audit(1267.540:1109): avc: denied { create } for pid=6537 comm="syz.1.1166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1268.111737][ T30] audit: type=1400 audit(1267.550:1110): avc: denied { write } for pid=6537 comm="syz.1.1166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1268.996518][ T30] audit: type=1400 audit(1268.440:1111): avc: denied { create } for pid=6542 comm="syz.1.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1269.083744][ T30] audit: type=1400 audit(1268.530:1112): avc: denied { setopt } for pid=6542 comm="syz.1.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1269.127500][ T30] audit: type=1400 audit(1268.570:1113): avc: denied { read write } for pid=6542 comm="syz.1.1168" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1269.143866][ T30] audit: type=1400 audit(1268.580:1114): avc: denied { open } for pid=6542 comm="syz.1.1168" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1269.165023][ T30] audit: type=1400 audit(1268.610:1115): avc: denied { ioctl } for pid=6542 comm="syz.1.1168" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1271.593202][ T30] audit: type=1400 audit(1271.010:1116): avc: denied { create } for pid=6551 comm="syz.1.1172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1271.737327][ T30] audit: type=1400 audit(1271.170:1117): avc: denied { bind } for pid=6551 comm="syz.1.1172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1273.207187][ T6557] serio: Serial port ptm0 [ 1274.911374][ T30] audit: type=1400 audit(1274.360:1118): avc: denied { bind } for pid=6567 comm="syz.1.1178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1274.933858][ T30] audit: type=1400 audit(1274.380:1119): avc: denied { setopt } for pid=6567 comm="syz.1.1178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1279.650581][ T30] audit: type=1400 audit(1279.090:1120): avc: denied { read write } for pid=6174 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1279.654582][ T30] audit: type=1400 audit(1279.100:1121): avc: denied { open } for pid=6174 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1279.678054][ T30] audit: type=1400 audit(1279.120:1122): avc: denied { ioctl } for pid=6174 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1280.023322][ T30] audit: type=1400 audit(1279.460:1123): avc: denied { create } for pid=6581 comm="syz.1.1184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1280.039487][ T30] audit: type=1400 audit(1279.480:1124): avc: denied { connect } for pid=6581 comm="syz.1.1184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1280.047654][ T30] audit: type=1400 audit(1279.490:1125): avc: denied { write } for pid=6581 comm="syz.1.1184" laddr=fe80::a8aa:aaff:feaa:aaaa lport=921 faddr=ff04::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1280.125453][ T30] audit: type=1400 audit(1279.570:1126): avc: denied { read write } for pid=6582 comm="syz.0.1185" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1280.125997][ T30] audit: type=1400 audit(1279.570:1127): avc: denied { open } for pid=6582 comm="syz.0.1185" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1280.201743][ T30] audit: type=1400 audit(1279.650:1128): avc: denied { mounton } for pid=6582 comm="syz.0.1185" path="/543/file0" dev="tmpfs" ino=2826 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1280.204034][ T6584] fuse: Invalid rootmode [ 1280.711198][ T30] audit: type=1400 audit(1280.150:1129): avc: denied { name_bind } for pid=6585 comm="syz.1.1186" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1282.680617][ T6597] fuse: Invalid rootmode [ 1284.324513][ T6605] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 1284.325533][ T6605] SELinux: failed to load policy [ 1284.818289][ T6607] fuse: Invalid rootmode [ 1286.544970][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 1286.554049][ T30] audit: type=1400 audit(1285.990:1143): avc: denied { read } for pid=6612 comm="syz.1.1198" dev="nsfs" ino=4026532789 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1286.555239][ T30] audit: type=1400 audit(1285.990:1144): avc: denied { open } for pid=6612 comm="syz.1.1198" path="net:[4026532789]" dev="nsfs" ino=4026532789 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1286.555689][ T30] audit: type=1400 audit(1286.000:1145): avc: denied { create } for pid=6612 comm="syz.1.1198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1286.567202][ T30] audit: type=1400 audit(1286.010:1146): avc: denied { setopt } for pid=6612 comm="syz.1.1198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1287.360680][ T6617] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 1287.361787][ T6617] SELinux: failed to load policy [ 1287.611746][ T30] audit: type=1400 audit(1287.060:1147): avc: denied { create } for pid=6618 comm="syz.1.1201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1287.626634][ T30] audit: type=1400 audit(1287.070:1148): avc: denied { write } for pid=6618 comm="syz.1.1201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1287.634948][ T30] audit: type=1400 audit(1287.070:1149): avc: denied { module_request } for pid=6618 comm="syz.1.1201" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1288.010303][ T30] audit: type=1400 audit(1287.450:1150): avc: denied { read } for pid=6618 comm="syz.1.1201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1289.327033][ T6628] SELinux: failed to load policy [ 1291.351616][ T6634] syzkaller0: entered promiscuous mode [ 1291.353710][ T6634] syzkaller0: entered allmulticast mode [ 1291.454891][ T6634] sch_tbf: burst 2 is lower than device syzkaller0 mtu (1514) ! [ 1291.466964][ T30] audit: type=1400 audit(1290.910:1151): avc: denied { write } for pid=6633 comm="syz.0.1207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1292.607111][ T30] audit: type=1400 audit(1292.050:1152): avc: denied { sys_module } for pid=6637 comm="syz.0.1209" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1292.942600][ T6641] SELinux: failed to load policy [ 1293.370783][ T30] audit: type=1326 audit(1292.800:1153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6644 comm="syz.1.1212" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x0 [ 1294.380938][ T30] audit: type=1400 audit(1293.820:1154): avc: denied { create } for pid=6642 comm="syz.0.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1296.236114][ T30] audit: type=1400 audit(1295.680:1155): avc: denied { write } for pid=6648 comm="syz.1.1213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1296.790842][ T30] audit: type=1326 audit(1296.230:1156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6648 comm="syz.1.1213" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1296.796642][ T30] audit: type=1326 audit(1296.230:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6648 comm="syz.1.1213" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1296.812836][ T30] audit: type=1326 audit(1296.240:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6648 comm="syz.1.1213" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1296.823639][ T30] audit: type=1326 audit(1296.240:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6648 comm="syz.1.1213" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1296.827679][ T30] audit: type=1326 audit(1296.250:1160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6648 comm="syz.1.1213" exe="/syz-executor" sig=0 arch=40000028 syscall=350 compat=1 ip=0x132970 code=0x7ffc0000 [ 1296.836123][ T30] audit: type=1326 audit(1296.250:1161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6648 comm="syz.1.1213" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1299.584297][ T6658] SELinux: failed to load policy [ 1301.450631][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 1301.451459][ T30] audit: type=1326 audit(1300.880:1176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6666 comm="syz.1.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1301.458122][ T30] audit: type=1326 audit(1300.900:1177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6666 comm="syz.1.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1301.477103][ T30] audit: type=1326 audit(1300.920:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6666 comm="syz.1.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1301.482454][ T30] audit: type=1326 audit(1300.930:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6666 comm="syz.1.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1301.497134][ T30] audit: type=1326 audit(1300.940:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6666 comm="syz.1.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=1 ip=0x132970 code=0x7ffc0000 [ 1301.523793][ T30] audit: type=1326 audit(1300.970:1181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6666 comm="syz.1.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1301.552203][ T30] audit: type=1326 audit(1300.990:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6666 comm="syz.1.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1301.577189][ T30] audit: type=1326 audit(1301.020:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6666 comm="syz.1.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1301.601003][ T30] audit: type=1326 audit(1301.040:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6666 comm="syz.1.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1301.608151][ T30] audit: type=1326 audit(1301.050:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6666 comm="syz.1.1219" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1305.182336][ T6679] SELinux: failed to load policy [ 1310.892234][ T6698] SELinux: failed to load policy [ 1311.279926][ T30] kauditd_printk_skb: 135 callbacks suppressed [ 1311.287223][ T30] audit: type=1400 audit(1310.720:1321): avc: denied { create } for pid=6699 comm="syz.1.1230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1311.307314][ T30] audit: type=1400 audit(1310.750:1322): avc: denied { setopt } for pid=6699 comm="syz.1.1230" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1311.665315][ T6702] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1231'. [ 1311.665711][ T6702] netlink: 28 bytes leftover after parsing attributes in process `syz.1.1231'. [ 1313.134220][ T30] audit: type=1400 audit(1312.570:1323): avc: denied { ioctl } for pid=6706 comm="syz.0.1233" path="socket:[14927]" dev="sockfs" ino=14927 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1313.141366][ T6707] syzkaller1: entered promiscuous mode [ 1313.145307][ T6707] syzkaller1: entered allmulticast mode [ 1315.374475][ T6716] fuse: Bad value for 'rootmode' [ 1316.676189][ T6719] SELinux: failed to load policy [ 1318.783202][ T30] audit: type=1400 audit(1318.220:1324): avc: denied { ioctl } for pid=6726 comm="syz.1.1240" path="socket:[14172]" dev="sockfs" ino=14172 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1319.541908][ T6732] fuse: Unknown parameter 'use00000000000000000000' [ 1321.291443][ T6741] pim6reg: entered allmulticast mode [ 1321.841122][ T30] audit: type=1400 audit(1321.280:1325): avc: denied { create } for pid=6743 comm="syz.1.1245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1322.106640][ T6747] fuse: Unknown parameter 'use00000000000000000000' [ 1323.816973][ T30] audit: type=1400 audit(1323.260:1326): avc: denied { create } for pid=6755 comm="syz.1.1250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1323.832431][ T30] audit: type=1400 audit(1323.270:1327): avc: denied { write } for pid=6755 comm="syz.1.1250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1324.352650][ T6759] fuse: Unknown parameter 'use00000000000000000000' [ 1326.342385][ T30] audit: type=1400 audit(1325.780:1328): avc: denied { allowed } for pid=6765 comm="syz.1.1255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1326.343375][ T30] audit: type=1400 audit(1325.790:1329): avc: denied { create } for pid=6765 comm="syz.1.1255" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1326.350635][ T30] audit: type=1400 audit(1325.790:1330): avc: denied { map } for pid=6765 comm="syz.1.1255" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14998 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1326.354367][ T30] audit: type=1400 audit(1325.800:1331): avc: denied { read write } for pid=6765 comm="syz.1.1255" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14998 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1326.412803][ T30] audit: type=1400 audit(1325.850:1332): avc: denied { execmem } for pid=6765 comm="syz.1.1255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1327.296414][ T6769] fuse: Unknown parameter 'user_i00000000000000000000' [ 1330.452414][ T6780] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 1330.453190][ T6780] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 1330.462583][ T6780] netdevsim netdevsim0: Falling back to sysfs fallback for: . [ 1330.462827][ T30] audit: type=1400 audit(1329.910:1333): avc: denied { firmware_load } for pid=6778 comm="syz.0.1261" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1332.407945][ T6784] fuse: Unknown parameter 'user_i00000000000000000000' [ 1334.174998][ T6794] fuse: Unknown parameter 'user_i00000000000000000000' [ 1335.742552][ T30] audit: type=1400 audit(1335.190:1334): avc: denied { write } for pid=6800 comm="syz.0.1270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1336.532186][ T6805] fuse: Unknown parameter 'user_id00000000000000000000' [ 1337.705030][ T30] audit: type=1400 audit(1337.150:1335): avc: denied { read write } for pid=6810 comm="syz.0.1275" name="virtual_nci" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1337.732563][ T30] audit: type=1400 audit(1337.170:1336): avc: denied { open } for pid=6810 comm="syz.0.1275" path="/dev/virtual_nci" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1338.763417][ T6821] fuse: Unknown parameter 'user_id00000000000000000000' [ 1340.232201][ T6825] SELinux: failed to load policy [ 1343.105272][ T6837] fuse: Unknown parameter 'user_id00000000000000000000' [ 1344.335559][ T30] audit: type=1400 audit(1343.780:1337): avc: denied { getopt } for pid=6838 comm="syz.0.1284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1344.404136][ T30] audit: type=1400 audit(1343.850:1338): avc: denied { name_bind } for pid=6838 comm="syz.0.1284" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1347.734519][ T6852] SELinux: failed to load policy [ 1349.600461][ T6854] fuse: Bad value for 'fd' [ 1352.440063][ T30] audit: type=1400 audit(1351.880:1339): avc: denied { mount } for pid=6859 comm="syz.0.1291" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1353.014766][ T30] audit: type=1400 audit(1352.450:1340): avc: denied { read } for pid=6861 comm="syz.1.1292" path="socket:[15149]" dev="sockfs" ino=15149 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1355.998024][ T6869] fuse: Bad value for 'fd' [ 1356.152762][ T30] audit: type=1400 audit(1355.590:1341): avc: denied { read } for pid=6870 comm="syz.0.1295" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1356.153915][ T30] audit: type=1400 audit(1355.590:1342): avc: denied { open } for pid=6870 comm="syz.0.1295" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1356.194266][ T30] audit: type=1400 audit(1355.630:1343): avc: denied { ioctl } for pid=6870 comm="syz.0.1295" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1371.604301][ T6889] fuse: Bad value for 'fd' [ 1378.323083][ T6897] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6897 comm=syz.0.1303 [ 1380.713276][ T30] audit: type=1400 audit(1380.160:1344): avc: denied { create } for pid=6903 comm="syz.1.1305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1380.730762][ T30] audit: type=1400 audit(1380.180:1345): avc: denied { bind } for pid=6903 comm="syz.1.1305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1381.787337][ T30] audit: type=1400 audit(1381.230:1346): avc: denied { execute } for pid=6909 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1381.836137][ T30] audit: type=1400 audit(1381.280:1347): avc: denied { execute_no_trans } for pid=6909 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1382.145796][ T30] audit: type=1400 audit(1381.590:1348): avc: denied { mounton } for pid=6910 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1382.658021][ T806] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1382.924282][ T806] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1383.252862][ T806] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1383.643282][ T806] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1384.840561][ T30] audit: type=1400 audit(1384.280:1349): avc: denied { create } for pid=6918 comm="syz.1.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1384.854746][ T30] audit: type=1400 audit(1384.300:1350): avc: denied { bind } for pid=6918 comm="syz.1.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1384.873895][ T30] audit: type=1400 audit(1384.320:1351): avc: denied { setopt } for pid=6918 comm="syz.1.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1384.963437][ T30] audit: type=1400 audit(1384.410:1352): avc: denied { write } for pid=6918 comm="syz.1.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1384.977960][ T30] audit: type=1400 audit(1384.420:1353): avc: denied { nlmsg_write } for pid=6918 comm="syz.1.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1389.196326][ T806] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1389.320971][ T806] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1389.384910][ T806] bond0 (unregistering): Released all slaves [ 1389.927102][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 1389.939964][ T30] audit: type=1400 audit(1389.370:1355): avc: denied { search } for pid=3170 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1389.969767][ T30] audit: type=1400 audit(1389.370:1356): avc: denied { search } for pid=3170 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1389.970824][ T30] audit: type=1400 audit(1389.400:1357): avc: denied { search } for pid=3170 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1389.971163][ T30] audit: type=1400 audit(1389.400:1358): avc: denied { read } for pid=3170 comm="dhcpcd" name="n22" dev="tmpfs" ino=3514 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1389.971473][ T30] audit: type=1400 audit(1389.400:1359): avc: denied { open } for pid=3170 comm="dhcpcd" path="/run/udev/data/n22" dev="tmpfs" ino=3514 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1389.971851][ T30] audit: type=1400 audit(1389.410:1360): avc: denied { getattr } for pid=3170 comm="dhcpcd" path="/run/udev/data/n22" dev="tmpfs" ino=3514 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1390.284956][ T806] hsr_slave_0: left promiscuous mode [ 1390.332169][ T806] hsr_slave_1: left promiscuous mode [ 1390.731726][ T806] veth1_vlan: left promiscuous mode [ 1390.733666][ T806] veth0_vlan: left promiscuous mode [ 1400.005391][ T30] audit: type=1400 audit(1399.450:1361): avc: denied { read open } for pid=6962 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=759 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1400.029876][ T30] audit: type=1400 audit(1399.470:1362): avc: denied { getattr } for pid=6962 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=759 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1400.274963][ T30] audit: type=1400 audit(1399.710:1363): avc: denied { add_name } for pid=6961 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1400.285830][ T30] audit: type=1400 audit(1399.730:1364): avc: denied { create } for pid=6961 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1400.300230][ T30] audit: type=1400 audit(1399.740:1365): avc: denied { write } for pid=6961 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=3518 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1400.308109][ T30] audit: type=1400 audit(1399.750:1366): avc: denied { append } for pid=6961 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=3518 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1401.624026][ T30] audit: type=1400 audit(1401.060:1367): avc: denied { remove_name } for pid=6964 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=3518 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1401.624857][ T30] audit: type=1400 audit(1401.060:1368): avc: denied { unlink } for pid=6964 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=3518 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1405.239853][ T30] audit: type=1326 audit(1404.680:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.1.1321" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1405.269893][ T30] audit: type=1326 audit(1404.710:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.1.1321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1405.294084][ T30] audit: type=1326 audit(1404.740:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.1.1321" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1405.299149][ T30] audit: type=1326 audit(1404.740:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.1.1321" exe="/syz-executor" sig=0 arch=40000028 syscall=70 compat=1 ip=0x132970 code=0x7ffc0000 [ 1405.302627][ T30] audit: type=1326 audit(1404.740:1373): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.1.1321" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1261a4 code=0x7ffc0000 [ 1405.305754][ T30] audit: type=1326 audit(1404.740:1374): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.1.1321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1405.313316][ T30] audit: type=1326 audit(1404.760:1375): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6967 comm="syz.1.1321" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132970 code=0x7ffc0000 [ 1406.028001][ T30] audit: type=1400 audit(1405.460:1376): avc: denied { setattr } for pid=6969 comm="syz.1.1322" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1410.811065][ T6992] netlink: 'syz.1.1325': attribute type 21 has an invalid length. [ 1410.885125][ T6992] netlink: 156 bytes leftover after parsing attributes in process `syz.1.1325'. [ 1410.885678][ T6992] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1325'. [ 1413.862351][ T6910] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1413.946985][ T6910] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1414.840516][ T806] unregister_netdevice: waiting for batadv_slave_0 to become free. Usage count = 2 [ 1414.843498][ T806] ref_tracker: netdev@0000000018ee424c has 1/1 users at [ 1414.843498][ T806] netdev_get_by_index+0x5c/0xa4 [ 1414.843498][ T806] fib6_nh_init+0x4b0/0x15b8 [ 1414.843498][ T806] rtm_new_nexthop+0x1770/0x5ba8 [ 1414.843498][ T806] rtnetlink_rcv_msg+0x65c/0x8d4 [ 1414.843498][ T806] netlink_rcv_skb+0x198/0x334 [ 1414.843498][ T806] rtnetlink_rcv+0x18/0x24 [ 1414.843498][ T806] netlink_unicast+0x424/0x700 [ 1414.843498][ T806] netlink_sendmsg+0x640/0xa50 [ 1414.843498][ T806] __sock_sendmsg+0xc8/0x168 [ 1414.843498][ T806] ____sys_sendmsg+0x500/0x764 [ 1414.843498][ T806] ___sys_sendmsg+0x11c/0x19c [ 1414.843498][ T806] __sys_sendmsg+0x114/0x19c [ 1414.843498][ T806] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1414.843498][ T806] invoke_syscall+0x6c/0x258 [ 1414.843498][ T806] el0_svc_common.constprop.0+0xac/0x230 [ 1414.843498][ T806] do_el0_svc_compat+0x40/0x68 [ 1414.843498][ T806] [ 1414.876346][ T30] audit: type=1400 audit(1414.320:1377): avc: denied { read } for pid=3125 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1414.881930][ T30] audit: type=1400 audit(1414.320:1378): avc: denied { search } for pid=3125 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1414.961170][ T30] audit: type=1400 audit(1414.400:1380): avc: denied { search } for pid=3125 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1414.962125][ T30] audit: type=1400 audit(1414.370:1379): avc: denied { write } for pid=3320 comm="syz-executor" path="pipe:[2986]" dev="pipefs" ino=2986 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc [ 1415.013177][ T30] audit: type=1400 audit(1414.440:1381): avc: denied { add_name } for pid=3125 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1415.014241][ T30] audit: type=1400 audit(1414.440:1382): avc: denied { create } for pid=3125 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1415.065475][ T30] audit: type=1400 audit(1414.510:1383): avc: denied { append open } for pid=3125 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1415.113031][ T30] audit: type=1400 audit(1414.560:1384): avc: denied { getattr } for pid=3125 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1425.072852][ T806] unregister_netdevice: waiting for batadv_slave_0 to become free. Usage count = 2 [ 1425.073624][ T806] ref_tracker: netdev@0000000018ee424c has 1/1 users at [ 1425.073624][ T806] netdev_get_by_index+0x5c/0xa4 [ 1425.073624][ T806] fib6_nh_init+0x4b0/0x15b8 [ 1425.073624][ T806] rtm_new_nexthop+0x1770/0x5ba8 [ 1425.073624][ T806] rtnetlink_rcv_msg+0x65c/0x8d4 [ 1425.073624][ T806] netlink_rcv_skb+0x198/0x334 [ 1425.073624][ T806] rtnetlink_rcv+0x18/0x24 [ 1425.073624][ T806] netlink_unicast+0x424/0x700 [ 1425.073624][ T806] netlink_sendmsg+0x640/0xa50 [ 1425.073624][ T806] __sock_sendmsg+0xc8/0x168 [ 1425.073624][ T806] ____sys_sendmsg+0x500/0x764 [ 1425.073624][ T806] ___sys_sendmsg+0x11c/0x19c [ 1425.073624][ T806] __sys_sendmsg+0x114/0x19c [ 1425.073624][ T806] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1425.073624][ T806] invoke_syscall+0x6c/0x258 [ 1425.073624][ T806] el0_svc_common.constprop.0+0xac/0x230 [ 1425.073624][ T806] do_el0_svc_compat+0x40/0x68 [ 1425.073624][ T806] [ 1435.260611][ T806] unregister_netdevice: waiting for batadv_slave_0 to become free. Usage count = 2 [ 1435.261587][ T806] ref_tracker: netdev@0000000018ee424c has 1/1 users at [ 1435.261587][ T806] netdev_get_by_index+0x5c/0xa4 [ 1435.261587][ T806] fib6_nh_init+0x4b0/0x15b8 [ 1435.261587][ T806] rtm_new_nexthop+0x1770/0x5ba8 [ 1435.261587][ T806] rtnetlink_rcv_msg+0x65c/0x8d4 [ 1435.261587][ T806] netlink_rcv_skb+0x198/0x334 [ 1435.261587][ T806] rtnetlink_rcv+0x18/0x24 [ 1435.261587][ T806] netlink_unicast+0x424/0x700 [ 1435.261587][ T806] netlink_sendmsg+0x640/0xa50 [ 1435.261587][ T806] __sock_sendmsg+0xc8/0x168 [ 1435.261587][ T806] ____sys_sendmsg+0x500/0x764 [ 1435.261587][ T806] ___sys_sendmsg+0x11c/0x19c [ 1435.261587][ T806] __sys_sendmsg+0x114/0x19c [ 1435.261587][ T806] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 1435.261587][ T806] invoke_syscall+0x6c/0x258 [ 1435.261587][ T806] el0_svc_common.constprop.0+0xac/0x230 [ 1435.261587][ T806] do_el0_svc_compat+0x40/0x68 [ 1435.261587][ T806] VM DIAGNOSIS: 12:16:44 Registers: info registers vcpu 0 CPU#0 PC=ffff8000814c4b18 X00=0000000000000102 X01=1fffe00003fdf765 X02=1fffe00002fcfb71 X03=1fffe0000d40a24b X04=1ffff00010e48138 X05=ffff80008793b520 X06=ffff700010f276a4 X07=0000000000000001 X08=ffff80008793b520 X09=dfff800000000000 X10=ffff700010f276a4 X11=1ffff00010f276a4 X12=ffff700011aa5db9 X13=0000000000008000 X14=0000000000000003 X15=ffff00000f3bd019 X16=4e200000868effff X17=f84d4d80241b47b5 X18=1fffe00001e77a03 X19=0000000000000050 X20=ffff80008d6b6d10 X21=ffff000017e7db80 X22=0000000000000000 X23=ffff000017e7e650 X24=ffff8000855ef760 X25=ffff800087240000 X26=ffff80008d52edc0 X27=0000000000000000 X28=ffff80008d52edb8 X29=ffff80008d6b6d50 X30=ffff8000803b0b8c SP=ffff80008d6b6ea0 PSTATE=900000c5 N--V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000f00000 Q01=746e756f63206567:617355202e656572 Q02=2e312e7a7973223d:6d6d000a32203d20 Q03=000000ff0000ff00:00ff0000000000ff Q04=0000000000000000:000f00f00f00000f Q05=726f6620676e6974:696177203a656369 Q06=6f6620676e697469:6177203a65636976 Q07=305f6576616c735f:7664617461622072 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdf8e93f0:0000ffffdf8e93f0 Q17=ffffff80ffffffd0:0000ffffdf8e93c0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800081c932dc X00=0000000000000001 X01=ffff00006a085af0 X02=0000000000000000 X03=1fffe00001f8f001 X04=ffff00000fc78000 X05=ffff80008dee76d8 X06=ffff80008dee77a0 X07=ffff80008dee7850 X08=ffff80008dee7728 X09=dfff800000000000 X10=ffff700011bdcee4 X11=1ffff00011bdcee4 X12=ffff700011bdcee5 X13=bce7ee626750e762 X14=0000000000000001 X15=305f6576616c735f X16=6f636562206f7420 X17=2e6565726620656d X18=0000000000000000 X19=0000000000000006 X20=ffff00000fc78000 X21=ffff800081c94134 X22=0000000000000000 X23=0000000000000022 X24=0000000000000008 X25=ffff000012a7b780 X26=ffff00001bae600e X27=ffff800085f667fc X28=dfff800000000000 X29=ffff80008dee7960 X30=ffff800085519bd8 SP=ffff80008dee7940 PSTATE=400000c5 -Z-- EL1h FPCR=00000000 FPSR=00000000 Q00=696d5f6d61706269:6c00302e6f732e6d Q01=0000000000000000:00ff000000000000 Q02=0000000000000000:000000000f000000 Q03=0000000000000000:0000000000000000 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:000000000c000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000