last executing test programs: 23m16.479626252s ago: executing program 0 (id=525): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, r0, 0x0, &(0x7f0000000280)) 23m16.068741143s ago: executing program 0 (id=527): unshare(0x22020400) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 23m15.93627465s ago: executing program 0 (id=529): unshare(0x22020600) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000, 0x0, 0x0, 0x400000}) fcntl$setpipe(r0, 0x407, 0x2000000) 23m15.73211246s ago: executing program 0 (id=530): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x12f451, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0/file0\x00', &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x80700a, 0x0) umount2(&(0x7f0000000280)='./file0/file0/file0\x00', 0xa) 23m15.252823155s ago: executing program 0 (id=532): r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0x0) 23m14.283389614s ago: executing program 0 (id=533): openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x5) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x80200, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r1, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r2 = gettid() setpriority(0x0, r2, 0x1ff) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x15, 0x1c, &(0x7f0000000100)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7060000000000008500000005000000bf0900000000000035090100000000009500000000000000b7020000000000007b9af8ff00000000b5090000000000007baaf0ff00000000ae8900000000000007080000f8ffffffbf8400000000000007040000f0ffffffc70200000800000018260000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf980000000000005608f8ffffff00008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close_range(r0, 0xffffffffffffffff, 0x0) 23m14.282842114s ago: executing program 32 (id=533): openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x5) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x80200, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r1, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r2 = gettid() setpriority(0x0, r2, 0x1ff) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x15, 0x1c, &(0x7f0000000100)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7060000000000008500000005000000bf0900000000000035090100000000009500000000000000b7020000000000007b9af8ff00000000b5090000000000007baaf0ff00000000ae8900000000000007080000f8ffffffbf8400000000000007040000f0ffffffc70200000800000018260000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf980000000000005608f8ffffff00008500000007000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close_range(r0, 0xffffffffffffffff, 0x0) 4.486577979s ago: executing program 2 (id=2419): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) getresgid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)) 4.249812631s ago: executing program 2 (id=2421): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x4}, 0x18) syz_open_dev$hidraw(&(0x7f0000000000), 0x9, 0x101480) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000080)={'veth0_to_batadv\x00'}) socket$inet_smc(0x2b, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00'}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) 4.184531185s ago: executing program 1 (id=2422): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0, 0x0, 0x7}, 0x18) request_key(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f0000000080)='\xe3', 0xffffffffffffffff) 4.014055824s ago: executing program 2 (id=2423): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fdffffff18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014008000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000000), 0x3, 0x800) process_madvise(r3, &(0x7f0000000180)=[{&(0x7f0000000440)="514e4a8f33cd2a95d03a8a26e67601c6440d12087f8f8aeef047289708f76f145b51e4c255c695c53a980a97f3679341ece83b3de9808a9d58beb0b3103fb2f7a99c46aa7db4606d2d7266a436d73dd52992122f979e5074818a287e144ffb7acf6040fdb315cdfb90ce076b387b222d883d8ecbd1c615aca9ee51707649436cb012db7f4849a890a4aae8ae2f2c07308a8b2b9457b346065bcbc46fd131a8ae1b08ac1a25ffd0d983722c2c5e034d7cbc16c8449ccc805a98cb1f2ae01371343e526ae9fe1f6557b498f0e0dfec12239b850f2d3505bdd25be7befe833cd32b303a3afc292b9c9842184505cdae69c51905bc23daf39d1315e9d002cc23030a77c20c444a1017c7b836a9dba9dbda75b4ea942349c7c0fd4b0d1b54c09cad62dd3fb68b5860244483457d1a51dea368163fc651c6df22f29cdaf3cd84a72a3f4a6fe45af90c7d2919f8065a893f120029ed2d8a508613ad9b1910ca4a55844688b29c853dedda490b55a7e103ed9f0d1452af5e8a99fc8274c308a373c86bf43f7d1f54c845cc88947eb366ff1de3b035952fd7c9c21299b7b0c42a2a93615e5f6e26a5c9901a6fda9295710b6498335bec5b26cb8027c7da7028f97e43a02fbafc7a6e67076f054ce8f91295ef5a2eb2415f017a1dfe1a931fc6cdb09054383b79207dbd967527162671a3c0d1ef73b30b472946eb266cc4cc09308686292dad482010c8efcaed8e0007b75879591f8c4275b0feccc0173236b237944b7c13177f7fa4bae0d8bd9c9028793d922e24d1edadca17976cf344f357cbd87471788f2f97aee00fefbfea96e1ddb1267f4cc57db9f19244cc5735c13d2ce59cca644e737c60577a1be4e72640f7414c1bc8539aba1c14c8dccb9134edafd97201fb5ef91405251f5f371b7f5bfc0b070a57dc7bba08d452e225464432c3a5b1158c4c7b3fad8b2930400c1e54fa0168698bf1729dbe4319059bfa0310a9c106df68949cea0e3c997cb895e1dc6175a071296c48c74b347db318f39e586f5cd95b0a418ec0a74b22ada2c57ccef5f9b7c0dec4660d7831039cd1f3da9642d4687f0a7c5f266c2917c5aadef1f86734d303e644768dbddd484a63b8ae2be8cacaad9772f72c73d0632374b022179223a66f189926adb4aa77b333a45a8fabb510bd5f5e0bead7f5b42faf0c8af82579413a8a7e4b5372a17e2205a8ba98ad01b431f70fd2c20402aa0c848ede9de608c0127e4ee397c627187766f2037a0094eeaef9080925137c390c5f100e4f3e8d7cdb173a254adbe54812fb110e4cdfa4354654c6c0d6b314527bfc1d4d9fbb03b8b23f7a79068f339ed6cb591de89f4f85aef13d8df7dbab1e6211f1a1e414966013f3ba44fb74a8381cf17c9e854f29e095b1a68b9d8f9100054897a704588d3f8990a070668a6a5ebc655389a6f8885b16204ceb0cd6084c727764884ca1a76d9cdaf6d785f1ed51de9f1a07ea77abd502bee2bee4f4c44c4d964bb2c0c1d825f960d8d1f9a690ce7db79476f0c72277deaa91baa46a4b209fc95916fe4f7ca584706ba53530c21c20f47b15bb7faba36fe7d39f5c1b626b6bb005b072f1275ad3be398483c0d0c2c13fbb4015313284d32afdce8751a600d614f71a7cb893c31280e6b6d43dabe92d505267d927b2fff56b47d2d32aead408fd91f3ecfe0624820cd280b268f8e1a9b0be5b7a8558cd1c00b2f6da5e0a4f82bef29a1429eb6b4e028cf8a90ca388e9f346de50be87985c72eccf49219407703770d79a90563337722d619472e274264b8dc96aaa0aa3ccd60ce01ef1b49a9fc883a883a860f2e60792eaa94fef0ee76c7a75310da786d63077e0e5c18b6a097480f7685f171dff6f06aa0a187278654135a4221c9a33303aef997944c83e714233626ce97fe356a3119e32d66de7f292a4f059d3b7fcaf00d091125e4788c7ffe5747def52af89b35e615c3963acce245e30983cbbd4f245b565f75323f3377161d3d339d7a19d6c51aa8232c95a337b6f86c632c85123718cd18dcaf1da9839db4b8c5369ec8a73b79b4474a80dd9b0b72aa1edb2371b91df9484b5130465378f5b4182456a4c6be349bd027782b574c26c9ba9189a64570cb20c2646b0e7f901951dde3a63b0969737aa2e69a6038146bdb73ec69d88fe330315a8c45e7043992c846e62bce2464f137051908a66f8e56b47d32d0fe424948ac6556e5120d90d5f89c86ebb79917472548efaa75b85120546923faccfa6fba43a9c1977c0fce83afdaf5c23c4d0ab5523e3a384a3c4ccda5bf5449503a28e1d753b22df5f561bf191004154d7a6d75583ffaf2527e106cfec29c5546d6b7242552085b1431ad71ff27062b535ca17af0b8821a1abcce8519af5b0b64b2e26f615cd5369248d916dd543d74cc18e16c10150e712cf144f96ca38f6d8d45d1213b6a7e014bddf60291bc84886f6541562545578d4432178a58d730619954a396b9b64024d96ad8f3e242e6c2a1b4b0de0f0b70f73013961dbbdd0dd2fcef8696a61950271a3947533bbbe6248aa5a7ee56c0d896d0e2e9e13b2dd3b7ebd953d2a717aa013495892fa95333f7c11701c3e966add574566b85e1d1061ca2d6660be93e8956adfcb5dad969dc5771efc078f161c103fc34dc553e4075229f9d1b0c946d77e424c276d4f82bce72b9c958d376c64490a4bdacb4dfe398717844e86bd170e69b89aa8d96f2f0346c4c474167c5ac799eaf378bff93c8ca492ef246490f3d4c693e4df2e553b19d8065a5ccd58cc82b545fcc97deb418d3f874c9120281f49d8ae11b589cd861de87f8c32be6e4c1a53af391c10f966d79d3accabba0cb67849b046a5f44bde6515a386e6f5bb9e65be36c905335571ed7f8f9ba71d9babe292a7addc85ee2e26bc67a38593aedf0aa2dc225bbf16216ef67ed989ee039b7f12efa59e8ae095f84888eaa1dffa2ce8fc56880bc52ea3adcea4d31d232964dc1ac45147fcd53c58731161c49d0becfd8f98ec258915ec5c3b4e7551ff1c37da7a81835c7a4ac147c4356f49e4211bd762e43b3292b422b0cbcb4f3020538cdbb66ae3593954166cf501a8f9c1db4b12b6c43eadae1f016fb0166abf195019743f59e6dbb3bca999b068629b79877497586a57b0b9894a80aedca9e8794294ee62149b17ba0feb82e1162d24e7a428ce6f0090188475f64b7256ebfe75148fd2cb96ca103c026ac88cd205e45ac694d81af47c2ff78f418f1c60d2acdc0a89f1cfe2c35b730898493a411eb2681eeb93f462bcfc72502724ff91c5b5994955bf1e60bb8285dadf69f5ecd2efec4358145456111e4317549c11ddd2230d7b5e2f369303174ae95c0fd7e9efe1fe14e073501bfeb322b9a519884209ca2ffea0ef6f332d625845d34fa5e5a8f3376c29c04889b0226f2c27fdc681caad74559bbceaac3dce2c28e8612cdc3c6c6eb6bd6a33fbd09bb757657737236709b754c4e17d95909b5a44bdc7e6cf12724e2f6d2ab402a7ac2e97c4fbc2a93a1364c05ef2d9a591c4003b4632ab4a713620e6a6ddf8aeee6665b848729a6564b4e2ffb3918709a86987b4793d1036ca017bcfdc28bdbf0e8909788e0e5b7cf669754e9a5b6bfed3ab8433a81a9676bda005a88c3f36cbab4046b496d8d086d33fdb8767c441061745caf96d0fa48bc48424e663a86f587ccb7cecb27ca3c2988cfca3bca1c49bfc066a227c694097c3c7dfabe01d650099376cbcd7db9f73910d7caaf6731bfdf884a150e062812bc89c780e0942cb918fed7879b4c9cd7f6f97f6d3eb3cb0ee283b0204246f85b023a9a7a03e981272b702fccfd5b70500fa6095d293d72e8443cd71f3b0d98898e70414a452547a69ba1ab046a1f8155b21128e850ae8ab375f22f6f0de883131f31e347f97c1d714d7247922ec11fdfb7b9289adc15d48db0728bb7b253d74425f258f2d126956c5b65689882329537bf5e45294441c82a49ac146b2123e77bd176ff0e9e5f3c6c3af8c35cfb357f63f5f37e29996ee53d1e3664f313777eefeabbbe30356d7c4d21e9bbbc044df658f8a3998b4b82f3e3968b8cee6b53e4ea8a6f352917bd69541caf395abb198ca1244a0d1689db0ff285b0c400506111dbd25f92b683debd5d7fa6bd4c875dff446e161e6cdce28a2871414c758e2a9b69f6e5cdb4fe74092c10d6c5257a1364d57d3302406d0752c168902ec58dfada1f5e1f9747646e4f32d376586170d381b92631703b593c187a8cc1360849646ddbe4f597eb84653715c5ace4e1eeda40afbdf6774d03b816d15e2034c628418ee3a67ea484717f5591877be8020f25d60db4c177a540f8fffe761119a465009f965ed4313bfbef81e2a50c9590aaed4e8b1d17b2f4fdcbf985888afc87b015fa168767f1e89778e9c4238481f98a4d1dd53b28dba9695dde06c3ba65034fd55163091050975dc76ee4dc371315df410ba45111b42edece6d569ec4f273ec5480f88b249485ea7d37bab69a1c1d6ddd698f0fc0181932c7ff1ec1dc46441d8196bb8ca05474a753e801f5390017ad4866b4e2c6aff97f0acdb8ec7778ecfc0e1cd101fb2dc05233575c54df6bfc3347e2032025ea36ae961e1ecb1d9b667798e63e42fdb260cf85f521695448d144e63c54d55462c6af4f7429a975cd3738d73552da58608b2694ef42517ded3221a8a19e99afcbddc1f46799ce5e9b231f97bf548e061bbcda88af9ba0212583c3e65651a787bc91ea76a307e4c47b93892df06dccf06fbc710b4d3707d02d2b48dfe5a1dfa002ce0e6bf6aa46bf3c445d618143c7941bbcd00eca396c3c42f735d51d00b15e3994d915f1a890f0924449b6ccdd1b4020428e0b3a984f6211eda95bc886ebf95e3df4cfba55f11b9d3f84dccd543abe004d76af0511088d884a9213ea9f5f263b90079b477e8d82177b6b8232f11427ffc7a6e86eda6825d2340688bf312b1f01b79b5235dd0d18dfcc5d5513b462b2ec6e055be39dc5885a22c476dd4444515a9f5359be6672b5d9d70be040334a9309514aa87b84f06eab374a9dacb285dc9", 0xe00}], 0x1, 0xb, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x8808) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000140), 0x14886, 0x0) fcntl$notify(r4, 0x402, 0x29) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r5, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) shutdown(r5, 0x0) 3.944462737s ago: executing program 1 (id=2424): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "69dcaf20127e9a854529f45826cb35be51682e30944313e2ca73845d177d601880221daeccfda56b75cfe2bad94f000066b2ddab614fec2236da7d88ea07c9ee"}, 0x48, 0xfffffffffffffffe) 3.823264134s ago: executing program 1 (id=2425): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r2 = getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1b00000000000000000000000080f8000403000000ee7d35635300b3f00c9e407fdfaf38c6de73c65cf70000d2903a54057d04ac65ada2f66017f4bfe13173c5bb9233aca210108334768d430b184cfa62fa0228c35d0784d0a6c928fce3eb2070326dc505348a43c364754a695ad2918df0d6bc52861e44dbe9b95e0c656e45f9f23d91e0f4e9df4ef32018d054911d90409cc1ad93bc785da7260da2964c5c546fd845cc711905d0eebc2d824c7bfb88", @ANYRES32, @ANYBLOB='\x00'/15, @ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0}, 0x18) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) socket(0x400000000010, 0x3, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x40001, 0x0) 1.263413155s ago: executing program 2 (id=2426): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.190723668s ago: executing program 2 (id=2427): r0 = syz_io_uring_setup(0x1104, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0xfffffffe, 0x21e}, &(0x7f00000003c0)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1fc, 0x0, 0x1}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) io_uring_enter(r0, 0x47fa, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x2, r4, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x40032043, 0x1}) 825.114007ms ago: executing program 1 (id=2428): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) r2 = gettid() tkill(r2, 0x12) 592.734469ms ago: executing program 1 (id=2429): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000580), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000005c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000003c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010028bd7000fbdbdf251500000008000300", @ANYRES32=r2, @ANYBLOB="050029000100000008002c00"], 0x48}, 0x1, 0x0, 0x0, 0x4014}, 0x20000000) 307.17µs ago: executing program 1 (id=2430): bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r0 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r0, &(0x7f0000000040), 0x10) listen(r0, 0x0) r1 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r1, &(0x7f0000000080), 0x10) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) write$tun(r2, &(0x7f0000000440)={@val, @void, @eth={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x452c, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {0x0, 0x6558, 0x18, 0x0, @wg=@data={0x4, 0x0, 0xffffdd86}}}}}}}, 0xfdef) setsockopt$sock_linger(r1, 0x1, 0x3c, &(0x7f0000000180)={0x1, 0x5}, 0x8) sendmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="1b", 0x40000}], 0x11}}], 0x1, 0x24008094) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x101}, 0x1c) getsockopt$sock_buf(r3, 0x1, 0x1c, 0x0, &(0x7f00000001c0)=0x3b) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x18) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r6, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) r7 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'macvtap0\x00', 0x0}) setsockopt$inet6_mreq(r7, 0x29, 0x14, &(0x7f0000000000)={@mcast2, r8}, 0x14) r9 = socket$inet6(0xa, 0x2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x66) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000080)='veth0_virt_wifi\x00', 0x10) sendmsg$nl_route_sched(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x2000, {0x0, 0x0, 0x74, r8, {0xfffd, 0x10}, {0x1, 0xfff1}, {0xfff2, 0x3}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x14004804}, 0x840) bpf$TOKEN_CREATE(0x24, &(0x7f0000000100)={0x0, r4}, 0x8) 0s ago: executing program 2 (id=2431): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) recvmsg$unix(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000009c0)=""/181, 0xb5}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) shutdown(r0, 0x0) kernel console output (not intermixed with test programs): [ T30] audit: type=1326 audit(1809.860:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8498 comm="syz.2.1631" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1810.436709][ T30] audit: type=1326 audit(1809.860:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8498 comm="syz.2.1631" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1810.436919][ T30] audit: type=1326 audit(1809.870:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8498 comm="syz.2.1631" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1812.103953][ T8509] Driver unsupported XDP return value 0 on prog (id 35) dev N/A, expect packet loss! [ 1816.686042][ T30] kauditd_printk_skb: 46 callbacks suppressed [ 1816.686611][ T30] audit: type=1400 audit(1816.110:671): avc: denied { create } for pid=8534 comm="syz.1.1648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1816.715383][ T30] audit: type=1400 audit(1816.140:672): avc: denied { setopt } for pid=8534 comm="syz.1.1648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1817.165787][ T30] audit: type=1400 audit(1816.590:673): avc: denied { create } for pid=8539 comm="syz.2.1650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1817.166147][ T30] audit: type=1400 audit(1816.590:674): avc: denied { setopt } for pid=8539 comm="syz.2.1650" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1817.167004][ T8537] wireguard0: entered promiscuous mode [ 1817.167078][ T8537] wireguard0: entered allmulticast mode [ 1817.180678][ T30] audit: type=1400 audit(1816.610:675): avc: denied { map_create } for pid=8536 comm="syz.1.1649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1817.205709][ T30] audit: type=1400 audit(1816.630:676): avc: denied { create } for pid=8536 comm="syz.1.1649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1817.212889][ T30] audit: type=1400 audit(1816.640:677): avc: denied { write } for pid=8536 comm="syz.1.1649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1817.228584][ T30] audit: type=1400 audit(1816.660:678): avc: denied { create } for pid=8536 comm="syz.1.1649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1817.264415][ T30] audit: type=1400 audit(1816.690:679): avc: denied { read write } for pid=8536 comm="syz.1.1649" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1817.268179][ T30] audit: type=1400 audit(1816.690:680): avc: denied { open } for pid=8536 comm="syz.1.1649" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1821.842155][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 1821.846308][ T30] audit: type=1400 audit(1821.270:698): avc: denied { sys_module } for pid=8560 comm="syz.2.1658" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1821.999447][ T30] audit: type=1400 audit(1821.430:699): avc: denied { create } for pid=8566 comm="syz.1.1660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1822.052408][ T30] audit: type=1400 audit(1821.480:700): avc: denied { bind } for pid=8560 comm="syz.2.1658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1822.677788][ T30] audit: type=1400 audit(1822.110:701): avc: denied { write } for pid=8570 comm="syz.2.1661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1822.684012][ T8571] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1661'. [ 1822.687778][ T8571] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1661'. [ 1822.956619][ T30] audit: type=1400 audit(1822.380:702): avc: denied { mounton } for pid=8572 comm="syz.2.1662" path="/508/file0" dev="tmpfs" ino=2596 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1822.960254][ T30] audit: type=1400 audit(1822.380:703): avc: denied { mount } for pid=8572 comm="syz.2.1662" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1822.967990][ T30] audit: type=1400 audit(1822.390:704): avc: denied { mounton } for pid=8572 comm="syz.2.1662" path="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=dir permissive=1 [ 1823.034033][ T30] audit: type=1400 audit(1822.460:705): avc: denied { unmount } for pid=5094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1823.119161][ T30] audit: type=1400 audit(1822.550:706): avc: denied { unmount } for pid=5094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1823.268182][ T30] audit: type=1400 audit(1822.700:707): avc: denied { create } for pid=8574 comm="syz.1.1664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1827.398956][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 1827.399566][ T30] audit: type=1400 audit(1826.820:720): avc: denied { append } for pid=8602 comm="syz.1.1675" name="loop4" dev="devtmpfs" ino=641 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1827.626187][ T30] audit: type=1400 audit(1827.050:721): avc: denied { mounton } for pid=8604 comm="syz.1.1676" path="/syzcgroup/unified/syz1" dev="cgroup2" ino=33 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 1827.631856][ T8605] tmpfs: Bad value for 'mpol' [ 1828.206535][ T30] audit: type=1400 audit(1827.640:722): avc: denied { create } for pid=8612 comm="syz.2.1680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1828.216827][ T30] audit: type=1400 audit(1827.640:723): avc: denied { bind } for pid=8612 comm="syz.2.1680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1828.663170][ T8618] netlink: 'syz.2.1682': attribute type 27 has an invalid length. [ 1830.114350][ T8619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1830.571903][ T8619] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1830.572476][ T8619] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1830.668368][ T8619] veth1_vlan: left promiscuous mode [ 1830.713567][ T8619] veth0_vlan: left promiscuous mode [ 1830.724233][ T8619] veth0_vlan: entered promiscuous mode [ 1830.768579][ T8619] veth1_vlan: entered promiscuous mode [ 1830.803071][ T8619] veth1_macvtap: left promiscuous mode [ 1830.816990][ T8619] veth0_macvtap: left promiscuous mode [ 1830.829032][ T8619] veth0_macvtap: entered promiscuous mode [ 1830.839426][ T8619] veth1_macvtap: entered promiscuous mode [ 1830.893077][ T8619] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1831.589122][ T30] audit: type=1400 audit(1831.010:724): avc: denied { setopt } for pid=8628 comm="syz.1.1686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1832.007338][ T30] audit: type=1326 audit(1831.440:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8634 comm="syz.2.1689" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1832.011029][ T30] audit: type=1326 audit(1831.440:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8634 comm="syz.2.1689" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1832.019646][ T30] audit: type=1326 audit(1831.450:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8634 comm="syz.2.1689" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1832.024359][ T30] audit: type=1326 audit(1831.450:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8634 comm="syz.2.1689" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1832.036130][ T30] audit: type=1326 audit(1831.450:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8634 comm="syz.2.1689" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1833.855246][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 1833.855509][ T30] audit: type=1400 audit(1833.280:740): avc: denied { ioctl } for pid=8638 comm="syz.1.1691" path="socket:[23612]" dev="sockfs" ino=23612 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1837.127185][ T30] audit: type=1400 audit(1836.560:741): avc: denied { bind } for pid=8648 comm="syz.1.1694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1837.141705][ T30] audit: type=1400 audit(1836.570:742): avc: denied { write } for pid=8648 comm="syz.1.1694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1837.420127][ T30] audit: type=1326 audit(1836.850:743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8650 comm="syz.2.1695" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1837.422276][ T30] audit: type=1326 audit(1836.850:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8650 comm="syz.2.1695" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1837.427073][ T30] audit: type=1326 audit(1836.860:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8650 comm="syz.2.1695" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1837.431233][ T30] audit: type=1326 audit(1836.860:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8650 comm="syz.2.1695" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1837.434391][ T30] audit: type=1326 audit(1836.860:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8650 comm="syz.2.1695" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1837.439697][ T30] audit: type=1326 audit(1836.860:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8650 comm="syz.2.1695" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1837.440089][ T30] audit: type=1326 audit(1836.870:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8650 comm="syz.2.1695" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1839.539772][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1839.540308][ T30] audit: type=1326 audit(1838.950:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8660 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1839.540629][ T30] audit: type=1326 audit(1838.960:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8660 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1839.561067][ T30] audit: type=1326 audit(1838.980:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8660 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1839.561689][ T30] audit: type=1326 audit(1838.980:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8660 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1839.561994][ T30] audit: type=1326 audit(1838.980:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8660 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1839.571575][ T30] audit: type=1326 audit(1839.000:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8660 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1839.600927][ T30] audit: type=1326 audit(1839.000:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8660 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1839.601574][ T30] audit: type=1326 audit(1839.000:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8660 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1839.601813][ T30] audit: type=1326 audit(1839.020:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8660 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=153 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1839.602096][ T30] audit: type=1326 audit(1839.020:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8660 comm="syz.1.1699" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1840.086481][ T8665] macvtap0: refused to change device tx_queue_len [ 1842.743045][ T6779] hid_parser_main: 6 callbacks suppressed [ 1842.776097][ T6779] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x4 [ 1842.776800][ T6779] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x2 [ 1842.778432][ T6779] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 1842.779138][ T6779] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 1842.779388][ T6779] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 1842.779627][ T6779] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 1842.779863][ T6779] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 1842.780081][ T6779] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 1842.780293][ T6779] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 1842.780506][ T6779] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 1842.861141][ T6779] hid-generic 0000:3000000:0000.0003: hidraw0: HID v0.00 Device [sy] on syz0 [ 1843.584079][ T8681] fido_id[8681]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1844.604127][ T8688] pim6reg: entered allmulticast mode [ 1848.167810][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 1848.172969][ T30] audit: type=1400 audit(1847.600:774): avc: denied { create } for pid=8703 comm="syz.1.1718" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1848.179666][ T30] audit: type=1400 audit(1847.600:775): avc: denied { read } for pid=8703 comm="syz.1.1718" name="file0" dev="tmpfs" ino=1664 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1848.187379][ T30] audit: type=1400 audit(1847.600:776): avc: denied { open } for pid=8703 comm="syz.1.1718" path="/325/file0" dev="tmpfs" ino=1664 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1848.227636][ T30] audit: type=1400 audit(1847.660:777): avc: denied { unlink } for pid=7021 comm="syz-executor" name="file0" dev="tmpfs" ino=1664 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1849.899304][ T8722] fuse: Unknown parameter 'grou00000000000000000000' [ 1850.041602][ T30] audit: type=1326 audit(1849.470:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8723 comm="syz.2.1727" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1850.044102][ T30] audit: type=1326 audit(1849.470:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8723 comm="syz.2.1727" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1850.051933][ T30] audit: type=1326 audit(1849.480:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8723 comm="syz.2.1727" exe="/syz-executor" sig=0 arch=c00000b7 syscall=167 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1850.060809][ T30] audit: type=1326 audit(1849.490:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8723 comm="syz.2.1727" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1850.083293][ T30] audit: type=1326 audit(1849.510:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8723 comm="syz.2.1727" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1850.179125][ T30] audit: type=1326 audit(1849.520:783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8723 comm="syz.2.1727" exe="/syz-executor" sig=0 arch=c00000b7 syscall=222 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1853.773833][ T30] kauditd_printk_skb: 43 callbacks suppressed [ 1853.777298][ T30] audit: type=1326 audit(1853.200:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8728 comm="syz.1.1728" exe="/syz-executor" sig=0 arch=c00000b7 syscall=93 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1853.808419][ T30] audit: type=1326 audit(1853.230:828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8726 comm="syz.1.1728" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff93475818 code=0x7ffc0000 [ 1853.811018][ T30] audit: type=1326 audit(1853.240:829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8726 comm="syz.1.1728" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1853.821886][ T30] audit: type=1326 audit(1853.250:830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8726 comm="syz.1.1728" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1854.051920][ T8737] fuse: Unknown parameter 'grou00000000000000000000' [ 1855.719526][ T8748] fuse: Unknown parameter 'grou00000000000000000000' [ 1857.782949][ T8753] netlink: 'syz.1.1738': attribute type 10 has an invalid length. [ 1858.055528][ T8756] veth0: entered promiscuous mode [ 1858.069616][ T8756] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1739'. [ 1858.674381][ T8762] fuse: Unknown parameter 'group_i00000000000000000000' [ 1859.523023][ T30] audit: type=1326 audit(1858.870:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8765 comm="syz.1.1744" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1859.523706][ T30] audit: type=1326 audit(1858.870:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8765 comm="syz.1.1744" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1859.524164][ T30] audit: type=1326 audit(1858.880:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8765 comm="syz.1.1744" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1859.546689][ T30] audit: type=1326 audit(1858.880:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8765 comm="syz.1.1744" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1859.547420][ T30] audit: type=1326 audit(1858.910:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8765 comm="syz.1.1744" exe="/syz-executor" sig=0 arch=c00000b7 syscall=29 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1859.547749][ T30] audit: type=1326 audit(1858.910:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8765 comm="syz.1.1744" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1859.548047][ T30] audit: type=1326 audit(1858.910:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8765 comm="syz.1.1744" exe="/syz-executor" sig=0 arch=c00000b7 syscall=217 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1859.548336][ T30] audit: type=1326 audit(1858.930:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8765 comm="syz.1.1744" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1859.548639][ T30] audit: type=1326 audit(1858.940:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8765 comm="syz.1.1744" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1859.548968][ T30] audit: type=1326 audit(1858.970:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8765 comm="syz.1.1744" exe="/syz-executor" sig=0 arch=c00000b7 syscall=219 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1860.562450][ T8773] fuse: Unknown parameter 'group_i00000000000000000000' [ 1861.422594][ T8784] fuse: Unknown parameter 'group_i00000000000000000000' [ 1869.459318][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 1869.470820][ T30] audit: type=1400 audit(1868.890:861): avc: denied { create } for pid=8815 comm="syz.1.1764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1870.056100][ T8822] netlink: 3 bytes leftover after parsing attributes in process `syz.1.1766'. [ 1870.159458][ T8825] fuse: Bad value for 'user_id' [ 1870.159765][ T8825] fuse: Bad value for 'user_id' [ 1871.739117][ T8842] fuse: Bad value for 'user_id' [ 1871.739618][ T8842] fuse: Bad value for 'user_id' [ 1873.775450][ T30] audit: type=1400 audit(1873.190:862): avc: denied { ioctl } for pid=8850 comm="syz.1.1775" path="socket:[24168]" dev="sockfs" ino=24168 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1873.779498][ T30] audit: type=1326 audit(1873.200:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1873.779919][ T30] audit: type=1326 audit(1873.210:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1873.786300][ T30] audit: type=1326 audit(1873.210:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1873.788911][ T30] audit: type=1326 audit(1873.220:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1873.820634][ T30] audit: type=1326 audit(1873.230:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1873.839323][ T30] audit: type=1326 audit(1873.270:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1873.848748][ T30] audit: type=1326 audit(1873.280:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=57 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1873.851953][ T30] audit: type=1326 audit(1873.280:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1874.467067][ T30] kauditd_printk_skb: 65 callbacks suppressed [ 1874.467594][ T30] audit: type=1326 audit(1873.890:936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff93475818 code=0x7ffc0000 [ 1874.477327][ T30] audit: type=1326 audit(1873.900:937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff92552a0c code=0x7ffc0000 [ 1874.493156][ T30] audit: type=1326 audit(1873.920:938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff93475818 code=0x7ffc0000 [ 1874.514447][ T30] audit: type=1326 audit(1873.930:939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff92552a0c code=0x7ffc0000 [ 1874.518987][ T30] audit: type=1326 audit(1873.930:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff93475818 code=0x7ffc0000 [ 1874.526765][ T30] audit: type=1326 audit(1873.950:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff92552a0c code=0x7ffc0000 [ 1874.535389][ T30] audit: type=1326 audit(1873.950:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff93475818 code=0x7ffc0000 [ 1874.538956][ T30] audit: type=1326 audit(1873.950:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=25 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1874.542211][ T30] audit: type=1326 audit(1873.960:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff92552a0c code=0x7ffc0000 [ 1874.548214][ T30] audit: type=1326 audit(1873.960:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8850 comm="syz.1.1775" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff93475818 code=0x7ffc0000 [ 1874.860187][ T8859] fuse: Bad value for 'user_id' [ 1874.860578][ T8859] fuse: Bad value for 'user_id' [ 1876.591688][ T8871] fuse: Bad value for 'fd' [ 1878.439842][ T8878] netlink: 180 bytes leftover after parsing attributes in process `syz.2.1786'. [ 1878.463165][ T8877] netlink: 180 bytes leftover after parsing attributes in process `syz.2.1786'. [ 1878.782986][ T8882] fuse: Bad value for 'fd' [ 1879.901544][ T30] kauditd_printk_skb: 422 callbacks suppressed [ 1879.902204][ T30] audit: type=1326 audit(1879.330:1368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8891 comm="syz.2.1793" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1879.910936][ T30] audit: type=1326 audit(1879.340:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8891 comm="syz.2.1793" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1879.931796][ T30] audit: type=1326 audit(1879.350:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8891 comm="syz.2.1793" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1879.943712][ T30] audit: type=1326 audit(1879.370:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8891 comm="syz.2.1793" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1879.958667][ T30] audit: type=1326 audit(1879.390:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8891 comm="syz.2.1793" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1879.975668][ T30] audit: type=1326 audit(1879.400:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8891 comm="syz.2.1793" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1880.016329][ T30] audit: type=1326 audit(1879.440:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8891 comm="syz.2.1793" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1880.030181][ T30] audit: type=1326 audit(1879.460:1375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8891 comm="syz.2.1793" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1880.051818][ T30] audit: type=1326 audit(1879.480:1376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8891 comm="syz.2.1793" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1880.055585][ T30] audit: type=1326 audit(1879.480:1377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8891 comm="syz.2.1793" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa515af28 code=0x7ffc0000 [ 1880.746636][ T8898] netlink: 256 bytes leftover after parsing attributes in process `syz.2.1796'. [ 1886.853772][ T8938] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1813'. [ 1887.493220][ T8931] bond_slave_0: entered promiscuous mode [ 1887.493886][ T8931] bond_slave_1: entered promiscuous mode [ 1887.499485][ T8931] macvlan2: entered allmulticast mode [ 1887.500881][ T8931] bond0: entered allmulticast mode [ 1887.503489][ T8931] bond_slave_0: entered allmulticast mode [ 1887.506691][ T8931] bond_slave_1: entered allmulticast mode [ 1887.516270][ T8931] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1887.529095][ T30] kauditd_printk_skb: 28 callbacks suppressed [ 1887.529699][ T30] audit: type=1400 audit(1886.950:1406): avc: denied { ioctl } for pid=8930 comm="syz.2.1811" path="socket:[24391]" dev="sockfs" ino=24391 ioctlcmd=0x5518 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1887.635372][ T30] audit: type=1400 audit(1887.040:1407): avc: denied { read write } for pid=8946 comm="syz.1.1815" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1887.636204][ T30] audit: type=1400 audit(1887.060:1408): avc: denied { open } for pid=8946 comm="syz.1.1815" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1887.740911][ T30] audit: type=1400 audit(1887.170:1409): avc: denied { execute } for pid=8948 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1887.748487][ T30] audit: type=1400 audit(1887.180:1410): avc: denied { execute_no_trans } for pid=8948 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1887.949182][ T8950] fuse: Invalid rootmode [ 1888.057453][ T30] audit: type=1400 audit(1887.490:1411): avc: denied { mounton } for pid=8951 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1888.218621][ T8343] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1888.397650][ T8343] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1888.570426][ T8343] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1888.706852][ T8343] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1888.867333][ T8962] fuse: Invalid rootmode [ 1889.629453][ T30] audit: type=1400 audit(1889.060:1412): avc: denied { read } for pid=3166 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1890.022679][ T8343] bond_slave_0: left promiscuous mode [ 1890.023467][ T8343] bond_slave_1: left promiscuous mode [ 1890.273987][ T30] audit: type=1400 audit(1889.700:1413): avc: denied { bind } for pid=8973 comm="syz.1.1824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1890.291590][ T30] audit: type=1400 audit(1889.710:1414): avc: denied { setopt } for pid=8973 comm="syz.1.1824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1890.827894][ T8343] bond0 (unregistering): left allmulticast mode [ 1890.828334][ T8343] bond_slave_0: left allmulticast mode [ 1890.829181][ T8343] bond_slave_1: left allmulticast mode [ 1890.906221][ T8343] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1890.947990][ T8343] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1891.007744][ T8343] bond0 (unregistering): Released all slaves [ 1891.096826][ T8343] bond1 (unregistering): Released all slaves [ 1891.262926][ T30] audit: type=1400 audit(1890.680:1415): avc: denied { search } for pid=3166 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1891.379791][ T8343] hsr_slave_0: left promiscuous mode [ 1891.402394][ T8343] hsr_slave_1: left promiscuous mode [ 1891.444368][ T8343] veth1_macvtap: left promiscuous mode [ 1891.446083][ T8343] veth0_macvtap: left promiscuous mode [ 1891.447719][ T8343] veth1_vlan: left promiscuous mode [ 1891.448708][ T8343] veth0_vlan: left promiscuous mode [ 1891.461335][ T8978] fuse: Invalid rootmode [ 1892.229900][ T8343] pim6reg (unregistering): left allmulticast mode [ 1892.247090][ T8343] pimreg (unregistering): left allmulticast mode [ 1898.620059][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1898.623970][ T30] audit: type=1400 audit(1898.050:1421): avc: denied { read open } for pid=8993 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=931 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1898.656570][ T30] audit: type=1400 audit(1898.060:1422): avc: denied { getattr } for pid=8993 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=931 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1898.700333][ T8995] fuse: Bad value for 'rootmode' [ 1898.782669][ T30] audit: type=1400 audit(1898.210:1423): avc: denied { add_name } for pid=8991 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1898.787505][ T30] audit: type=1400 audit(1898.220:1424): avc: denied { create } for pid=8991 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1898.799909][ T30] audit: type=1400 audit(1898.230:1425): avc: denied { write } for pid=8991 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth5.link" dev="tmpfs" ino=5009 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1898.811718][ T30] audit: type=1400 audit(1898.240:1426): avc: denied { append } for pid=8991 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" dev="tmpfs" ino=5009 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1899.451252][ T30] audit: type=1400 audit(1898.880:1427): avc: denied { remove_name } for pid=9002 comm="rm" name="resolv.conf.eth5.link" dev="tmpfs" ino=5009 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1899.453045][ T30] audit: type=1400 audit(1898.880:1428): avc: denied { unlink } for pid=9002 comm="rm" name="resolv.conf.eth5.link" dev="tmpfs" ino=5009 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1900.818975][ T30] audit: type=1400 audit(1900.250:1429): avc: denied { mount } for pid=9011 comm="syz.1.1831" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1901.329262][ T9019] fuse: Bad value for 'rootmode' [ 1902.360557][ T30] audit: type=1400 audit(1901.790:1430): avc: denied { write } for pid=9029 comm="syz.1.1836" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1902.853984][ T9034] fuse: Bad value for 'rootmode' [ 1902.937178][ T8951] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1903.052786][ T8951] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1907.508442][ T8951] hsr_slave_0: entered promiscuous mode [ 1907.518071][ T8951] hsr_slave_1: entered promiscuous mode [ 1908.449375][ T9066] wireguard1: entered promiscuous mode [ 1908.450222][ T9066] wireguard1: entered allmulticast mode [ 1909.974281][ T8951] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1910.032742][ T8951] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1910.073816][ T8951] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1910.093781][ T8951] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1911.597366][ T30] audit: type=1400 audit(1911.020:1431): avc: denied { load_policy } for pid=9095 comm="syz.1.1845" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1912.290835][ T9097] SELinux: failed to load policy [ 1912.496661][ T8951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1912.680713][ T30] audit: type=1326 audit(1912.110:1432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9100 comm="syz.1.1846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1912.698352][ T30] audit: type=1326 audit(1912.130:1433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9100 comm="syz.1.1846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1912.717214][ T30] audit: type=1326 audit(1912.150:1434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9100 comm="syz.1.1846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1912.737878][ T30] audit: type=1326 audit(1912.160:1435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9100 comm="syz.1.1846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1912.757796][ T30] audit: type=1326 audit(1912.170:1436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9100 comm="syz.1.1846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=116 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1912.760402][ T30] audit: type=1326 audit(1912.190:1437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9100 comm="syz.1.1846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1912.776271][ T30] audit: type=1326 audit(1912.200:1438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9100 comm="syz.1.1846" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1916.195503][ T30] audit: type=1326 audit(1915.620:1439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9133 comm="syz.1.1854" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1916.219127][ T30] audit: type=1326 audit(1915.640:1440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9133 comm="syz.1.1854" exe="/syz-executor" sig=0 arch=c00000b7 syscall=261 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1924.662252][ T8951] veth0_vlan: entered promiscuous mode [ 1924.693024][ T9188] netlink: 5 bytes leftover after parsing attributes in process `syz.1.1861'. [ 1924.707986][ T9188] 0{X: renamed from gretap0 (while UP) [ 1924.733963][ T9188] 0{X: entered allmulticast mode [ 1924.749152][ T9188] A link change request failed with some changes committed already. Interface 30{X may have been left with an inconsistent configuration, please check. [ 1924.843949][ T8951] veth1_vlan: entered promiscuous mode [ 1925.128660][ T8951] veth0_macvtap: entered promiscuous mode [ 1925.181832][ T8951] veth1_macvtap: entered promiscuous mode [ 1925.468076][ T8343] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1925.470224][ T8343] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1925.477149][ T8343] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1925.488289][ T8343] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1925.728164][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1925.728522][ T30] audit: type=1400 audit(1925.150:1443): avc: denied { mounton } for pid=8951 comm="syz-executor" path="/syzkaller.wGdAoc/syz-tmp" dev="vda" ino=1880 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1925.730851][ T30] audit: type=1400 audit(1925.160:1444): avc: denied { mount } for pid=8951 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1925.749291][ T30] audit: type=1400 audit(1925.180:1445): avc: denied { mounton } for pid=8951 comm="syz-executor" path="/syzkaller.wGdAoc/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1925.753118][ T30] audit: type=1400 audit(1925.180:1446): avc: denied { mounton } for pid=8951 comm="syz-executor" path="/syzkaller.wGdAoc/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=25996 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1925.787946][ T30] audit: type=1400 audit(1925.210:1447): avc: denied { unmount } for pid=8951 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1925.802406][ T30] audit: type=1400 audit(1925.230:1448): avc: denied { mounton } for pid=8951 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1925.809227][ T30] audit: type=1400 audit(1925.240:1449): avc: denied { mount } for pid=8951 comm="syz-executor" name="/" dev="gadgetfs" ino=2917 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1925.828406][ T30] audit: type=1400 audit(1925.260:1450): avc: denied { mount } for pid=8951 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1925.838683][ T9196] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1865'. [ 1925.841629][ T30] audit: type=1400 audit(1925.260:1451): avc: denied { mounton } for pid=8951 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1925.854032][ T30] audit: type=1400 audit(1925.280:1452): avc: denied { mount } for pid=8951 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1926.367827][ T9206] smc: net device bond0 applied user defined pnetid SYZ0 [ 1926.369983][ T9206] smc: net device bond0 erased user defined pnetid SYZ0 [ 1926.908696][ T9219] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1875'. [ 1926.932330][ T9219] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1875'. [ 1927.055495][ T9219] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1927.077447][ T9224] SELinux: Context system_u:object_r:modules_dep_t:s0 is not valid (left unmapped). [ 1927.137863][ T9219] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1927.208304][ T9219] bond0 (unregistering): Released all slaves [ 1930.940759][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 1930.941441][ T30] audit: type=1326 audit(1930.370:1467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9261 comm="syz.1.1890" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1930.961035][ T30] audit: type=1326 audit(1930.390:1468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9261 comm="syz.1.1890" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1930.975888][ T30] audit: type=1326 audit(1930.400:1469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9261 comm="syz.1.1890" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1930.976229][ T30] audit: type=1326 audit(1930.400:1470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9261 comm="syz.1.1890" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1930.976367][ T30] audit: type=1326 audit(1930.400:1471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9261 comm="syz.1.1890" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1930.986335][ T30] audit: type=1326 audit(1930.420:1472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9261 comm="syz.1.1890" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1931.001149][ T30] audit: type=1326 audit(1930.430:1473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9261 comm="syz.1.1890" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1931.017398][ T30] audit: type=1326 audit(1930.440:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9261 comm="syz.1.1890" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1931.024281][ T30] audit: type=1326 audit(1930.450:1475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9261 comm="syz.1.1890" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1931.025607][ T30] audit: type=1326 audit(1930.450:1476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9261 comm="syz.1.1890" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1932.523165][ T9282] netlink: 'syz.1.1894': attribute type 6 has an invalid length. [ 1932.931747][ T9288] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1896'. [ 1933.758756][ T9299] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1899'. [ 1934.687014][ T9314] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1903'. [ 1934.690499][ T9314] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1903'. [ 1935.066928][ T9314] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1903'. [ 1935.070344][ T9314] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1903'. [ 1935.518447][ T9314] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1903'. [ 1935.518896][ T9314] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1903'. [ 1935.726439][ T9325] netlink: 'syz.1.1904': attribute type 10 has an invalid length. [ 1935.736799][ T9325] netlink: 'syz.1.1904': attribute type 10 has an invalid length. [ 1936.443957][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 1936.446965][ T30] audit: type=1400 audit(2191.867:1480): avc: denied { create } for pid=9337 comm="syz.1.1908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1936.459355][ T30] audit: type=1400 audit(2191.887:1481): avc: denied { getopt } for pid=9337 comm="syz.1.1908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1936.708871][ T9338] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1908'. [ 1936.709154][ T9338] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1908'. [ 1937.623362][ T9351] fuse: Unknown parameter '0x0000000000000004' [ 1938.245891][ T30] audit: type=1400 audit(2193.667:1482): avc: denied { read } for pid=9359 comm="syz.1.1914" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1938.249818][ T30] audit: type=1400 audit(2193.667:1483): avc: denied { open } for pid=9359 comm="syz.1.1914" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1938.256770][ T30] audit: type=1400 audit(2193.667:1484): avc: denied { ioctl } for pid=9359 comm="syz.1.1914" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1938.790768][ T9366] fuse: Unknown parameter '0x0000000000000004' [ 1939.108441][ T9369] __nla_validate_parse: 2 callbacks suppressed [ 1939.113135][ T9369] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1917'. [ 1939.146648][ T9369] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1917'. [ 1939.905951][ T30] audit: type=1326 audit(2195.327:1485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9374 comm="syz.1.1918" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1939.919141][ T30] audit: type=1326 audit(2195.347:1486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9374 comm="syz.1.1918" exe="/syz-executor" sig=0 arch=c00000b7 syscall=13 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1939.925611][ T30] audit: type=1326 audit(2195.347:1487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9374 comm="syz.1.1918" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1941.259844][ T30] audit: type=1400 audit(2196.677:1488): avc: denied { bind } for pid=9390 comm="syz.1.1920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1941.341510][ T30] audit: type=1400 audit(2196.767:1489): avc: denied { write } for pid=9390 comm="syz.1.1920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1943.184409][ T9410] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1943.359556][ T9410] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1943.368237][ T9416] atomic_op 00000000fdd935a3 conn xmit_atomic 0000000000000000 [ 1943.493801][ T9410] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1943.614194][ T30] audit: type=1400 audit(2199.037:1490): avc: denied { connect } for pid=9417 comm="syz.2.1931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1943.629873][ T9410] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1943.650521][ T30] audit: type=1400 audit(2199.077:1491): avc: denied { listen } for pid=9417 comm="syz.2.1931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1943.671787][ T9419] netlink: 'syz.1.1927': attribute type 4 has an invalid length. [ 1943.676672][ T9419] netlink: 152 bytes leftover after parsing attributes in process `syz.1.1927'. [ 1943.712908][ T9419] : renamed from dummy0 (while UP) [ 1944.111261][ T8337] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1944.178294][ T8345] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1944.234256][ T1154] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1944.291561][ T8345] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1944.617684][ T30] audit: type=1326 audit(2200.047:1492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9428 comm="syz.2.1936" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1944.624199][ T30] audit: type=1326 audit(2200.047:1493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9428 comm="syz.2.1936" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1944.641037][ T30] audit: type=1326 audit(2200.067:1494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9428 comm="syz.2.1936" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1944.645680][ T30] audit: type=1326 audit(2200.067:1495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9428 comm="syz.2.1936" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1944.659220][ T30] audit: type=1326 audit(2200.087:1496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9428 comm="syz.2.1936" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1944.677935][ T30] audit: type=1326 audit(2200.107:1497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9428 comm="syz.2.1936" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1944.691740][ T30] audit: type=1326 audit(2200.107:1498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9428 comm="syz.2.1936" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1944.692319][ T30] audit: type=1326 audit(2200.107:1499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9428 comm="syz.2.1936" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1945.357486][ T9442] netlink: 'syz.2.1942': attribute type 1 has an invalid length. [ 1945.366997][ T9442] netlink: 'syz.2.1942': attribute type 3 has an invalid length. [ 1946.522295][ T9454] netlink: 256 bytes leftover after parsing attributes in process `syz.1.1947'. [ 1948.856397][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 1948.856971][ T30] audit: type=1400 audit(2204.277:1510): avc: denied { append } for pid=9491 comm="syz.1.1963" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1948.860361][ T9493] random: crng reseeded on system resumption [ 1948.872050][ T9494] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1964'. [ 1948.887030][ T9493] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1963'. [ 1949.392049][ T9502] netlink: 'syz.2.1968': attribute type 13 has an invalid length. [ 1949.392411][ T9502] netlink: 'syz.2.1968': attribute type 17 has an invalid length. [ 1949.660640][ T9506] IPv6: Can't replace route, no match found [ 1950.956571][ T30] audit: type=1326 audit(2206.377:1511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9517 comm="syz.1.1976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1950.958950][ T30] audit: type=1326 audit(2206.387:1512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9517 comm="syz.1.1976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1950.999131][ T30] audit: type=1326 audit(2206.387:1513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9517 comm="syz.1.1976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1950.999974][ T30] audit: type=1326 audit(2206.427:1514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9517 comm="syz.1.1976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1951.000395][ T30] audit: type=1326 audit(2206.427:1515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9517 comm="syz.1.1976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1951.013971][ T30] audit: type=1326 audit(2206.437:1516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9517 comm="syz.1.1976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=54 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1951.043102][ T30] audit: type=1326 audit(2206.467:1517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9517 comm="syz.1.1976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1951.043703][ T30] audit: type=1326 audit(2206.467:1518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9517 comm="syz.1.1976" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1951.106960][ T30] audit: type=1400 audit(2206.537:1519): avc: denied { create } for pid=9519 comm="syz.2.1977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1954.688582][ T9551] SELinux: Context is not valid (left unmapped). [ 1954.690041][ T9551] SELinux: Context GP is not valid (left unmapped). [ 1954.813032][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 1954.813745][ T30] audit: type=1326 audit(2210.237:1532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9552 comm="syz.2.1992" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1954.818622][ T30] audit: type=1326 audit(2210.247:1533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9552 comm="syz.2.1992" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1954.819211][ T30] audit: type=1326 audit(2210.247:1534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9552 comm="syz.2.1992" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1954.823775][ T30] audit: type=1326 audit(2210.247:1535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9552 comm="syz.2.1992" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1954.827069][ T30] audit: type=1326 audit(2210.247:1536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9552 comm="syz.2.1992" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1954.827644][ T30] audit: type=1326 audit(2210.257:1537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9552 comm="syz.2.1992" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1954.830822][ T30] audit: type=1326 audit(2210.257:1538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9552 comm="syz.2.1992" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1954.835636][ T30] audit: type=1326 audit(2210.257:1539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9552 comm="syz.2.1992" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1954.838762][ T30] audit: type=1326 audit(2210.267:1540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9552 comm="syz.2.1992" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1954.841833][ T30] audit: type=1326 audit(2210.267:1541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9552 comm="syz.2.1992" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1954.986484][ T9556] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1993'. [ 1955.151835][ T9559] SELinux: policydb version 0 does not match my version range 15-35 [ 1955.154075][ T9559] SELinux: failed to load policy [ 1962.342223][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 1962.343035][ T30] audit: type=1400 audit(2217.767:1581): avc: denied { ioctl } for pid=9604 comm="syz.1.2014" path="socket:[27346]" dev="sockfs" ino=27346 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1970.145158][ T9632] SELinux: failed to load policy [ 1970.264241][ T30] audit: type=1400 audit(2225.687:1582): avc: denied { setopt } for pid=9633 comm="syz.1.2024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1970.372417][ T30] audit: type=1326 audit(2225.797:1583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.2025" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1970.378577][ T30] audit: type=1326 audit(2225.797:1584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.2025" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1970.383252][ T30] audit: type=1326 audit(2225.807:1585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.2025" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff92559454 code=0x7ffc0000 [ 1970.384011][ T30] audit: type=1326 audit(2225.807:1586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.2025" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1970.390814][ T30] audit: type=1326 audit(2225.817:1587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.2025" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1970.391430][ T30] audit: type=1326 audit(2225.817:1588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.2025" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1970.391851][ T30] audit: type=1326 audit(2225.817:1589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.2025" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1970.400330][ T30] audit: type=1326 audit(2225.827:1590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.2025" exe="/syz-executor" sig=0 arch=c00000b7 syscall=425 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 1970.409251][ T30] audit: type=1326 audit(2225.837:1591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9635 comm="syz.1.2025" exe="/syz-executor" sig=0 arch=c00000b7 syscall=222 compat=0 ip=0xffff9255af5c code=0x7ffc0000 [ 1974.759638][ T9655] smc: net device bond0 applied user defined pnetid SYZ0 [ 1974.762818][ T9655] smc: net device bond0 erased user defined pnetid SYZ0 [ 1976.560251][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 1976.560659][ T30] audit: type=1400 audit(2231.987:1624): avc: denied { audit_write } for pid=9667 comm="syz.1.2039" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1976.564370][ T30] audit: type=1107 audit(2231.987:1625): pid=9667 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 1976.763687][ T30] audit: type=1400 audit(2232.187:1626): avc: denied { create } for pid=9668 comm="syz.2.2038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1984.773587][ T30] audit: type=1326 audit(2240.197:1627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9699 comm="syz.2.2050" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1984.779076][ T30] audit: type=1326 audit(2240.197:1628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9699 comm="syz.2.2050" exe="/syz-executor" sig=0 arch=c00000b7 syscall=196 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1984.783395][ T30] audit: type=1326 audit(2240.197:1629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9699 comm="syz.2.2050" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1984.788715][ T30] audit: type=1326 audit(2240.207:1630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9699 comm="syz.2.2050" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1984.980132][ T3466] hid-generic 0000:0003:0003.0004: item fetching failed at offset 0/2 [ 1984.981853][ T3466] hid-generic 0000:0003:0003.0004: probe with driver hid-generic failed with error -22 [ 1985.662915][ T30] audit: type=1326 audit(2241.087:1631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9707 comm="syz.2.2053" exe="/syz-executor" sig=9 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x0 [ 1990.553037][ T30] audit: type=1326 audit(2245.977:1632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9725 comm="syz.2.2059" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1990.561466][ T30] audit: type=1326 audit(2245.987:1633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9725 comm="syz.2.2059" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1990.563867][ T30] audit: type=1326 audit(2245.987:1634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9725 comm="syz.2.2059" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1990.571458][ T30] audit: type=1326 audit(2245.997:1635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9725 comm="syz.2.2059" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1990.573922][ T30] audit: type=1326 audit(2245.997:1636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9725 comm="syz.2.2059" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1990.579438][ T30] audit: type=1326 audit(2246.007:1637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9725 comm="syz.2.2059" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1990.583001][ T30] audit: type=1326 audit(2246.007:1638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9725 comm="syz.2.2059" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1990.585856][ T30] audit: type=1326 audit(2246.017:1639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9725 comm="syz.2.2059" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1990.596245][ T30] audit: type=1326 audit(2246.017:1640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9725 comm="syz.2.2059" exe="/syz-executor" sig=0 arch=c00000b7 syscall=222 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1990.608184][ T30] audit: type=1326 audit(2246.037:1641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9725 comm="syz.2.2059" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 1998.242198][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 1998.243934][ T30] audit: type=1400 audit(2253.667:1654): avc: denied { write } for pid=9752 comm="syz.2.2070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1999.333667][ T9762] netlink: 'syz.2.2074': attribute type 30 has an invalid length. [ 2000.098904][ T30] audit: type=1400 audit(2255.527:1655): avc: denied { ioctl } for pid=9767 comm="syz.2.2077" path="socket:[28109]" dev="sockfs" ino=28109 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2000.109499][ T30] audit: type=1400 audit(2255.537:1656): avc: denied { bind } for pid=9767 comm="syz.2.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2001.213508][ T30] audit: type=1326 audit(2256.637:1657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9773 comm="syz.2.2079" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2001.220956][ T30] audit: type=1326 audit(2256.647:1658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9773 comm="syz.2.2079" exe="/syz-executor" sig=0 arch=c00000b7 syscall=178 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2001.225908][ T30] audit: type=1326 audit(2256.647:1659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9773 comm="syz.2.2079" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2001.231016][ T30] audit: type=1326 audit(2256.657:1660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9773 comm="syz.2.2079" exe="/syz-executor" sig=0 arch=c00000b7 syscall=130 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2001.233046][ T30] audit: type=1326 audit(2256.657:1661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9773 comm="syz.2.2079" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2001.242966][ T30] audit: type=1326 audit(2256.667:1662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9773 comm="syz.2.2079" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2001.263994][ T30] audit: type=1400 audit(2256.687:1663): avc: denied { read write } for pid=9774 comm="syz.1.2080" name="virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2003.289969][ T9797] infiniband syz!: set active [ 2003.291739][ T9797] infiniband syz!: added team_slave_0 [ 2003.533221][ T9797] RDS/IB: syz!: added [ 2003.534343][ T9797] smc: adding ib device syz! with port count 1 [ 2003.539345][ T9797] smc: ib device syz! port 1 has pnetid [ 2004.398320][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 2004.400315][ T30] audit: type=1400 audit(2259.817:1670): avc: denied { write } for pid=9817 comm="syz.1.2097" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2004.715590][ T30] audit: type=1326 audit(2260.137:1671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9819 comm="syz.1.2098" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2004.723688][ T30] audit: type=1326 audit(2260.147:1672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9819 comm="syz.1.2098" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2004.766213][ T30] audit: type=1326 audit(2260.157:1673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9819 comm="syz.1.2098" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2004.776244][ T30] audit: type=1326 audit(2260.197:1674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9819 comm="syz.1.2098" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2004.783129][ T30] audit: type=1326 audit(2260.207:1675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9819 comm="syz.1.2098" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2004.791101][ T30] audit: type=1326 audit(2260.217:1676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9819 comm="syz.1.2098" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2004.799454][ T30] audit: type=1326 audit(2260.227:1677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9819 comm="syz.1.2098" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2004.799875][ T30] audit: type=1326 audit(2260.227:1678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9819 comm="syz.1.2098" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2004.822231][ T30] audit: type=1326 audit(2260.237:1679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9819 comm="syz.1.2098" exe="/syz-executor" sig=0 arch=c00000b7 syscall=31 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2005.146964][ T9824] netlink: 332 bytes leftover after parsing attributes in process `syz.1.2100'. [ 2005.782416][ T9828] netlink: 72 bytes leftover after parsing attributes in process `syz.2.2102'. [ 2005.784321][ T9828] netlink: 72 bytes leftover after parsing attributes in process `syz.2.2102'. [ 2009.607313][ T30] kauditd_printk_skb: 40 callbacks suppressed [ 2009.611641][ T30] audit: type=1326 audit(2265.027:1720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.2112" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2009.620954][ T30] audit: type=1326 audit(2265.047:1721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.2112" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2009.638814][ T30] audit: type=1326 audit(2265.057:1722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.2112" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2009.639315][ T30] audit: type=1326 audit(2265.067:1723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.2112" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2009.650555][ T30] audit: type=1326 audit(2265.077:1724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.2112" exe="/syz-executor" sig=0 arch=c00000b7 syscall=64 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2009.661222][ T30] audit: type=1326 audit(2265.087:1725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.2112" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2009.682460][ T30] audit: type=1326 audit(2265.097:1726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.2112" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2009.690928][ T30] audit: type=1326 audit(2265.117:1727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.2112" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2009.691692][ T30] audit: type=1326 audit(2265.117:1728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.2112" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2009.702492][ T30] audit: type=1326 audit(2265.127:1729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9851 comm="syz.2.2112" exe="/syz-executor" sig=0 arch=c00000b7 syscall=181 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2009.997874][ T9856] can0: slcan on ptm0. [ 2010.136105][ T9855] can0 (unregistered): slcan off ptm0. [ 2011.156124][ T9874] SELinux: ebitmap: truncated map [ 2011.202424][ T9874] SELinux: failed to load policy [ 2011.505739][ T9880] netlink: 'syz.2.2124': attribute type 4 has an invalid length. [ 2011.548581][ T9880] netlink: 'syz.2.2124': attribute type 4 has an invalid length. [ 2013.860996][ T9889] loop9: detected capacity change from 0 to 7 [ 2013.879322][ T9889] Buffer I/O error on dev loop9, logical block 0, async page read [ 2013.883379][ T9889] Buffer I/O error on dev loop9, logical block 0, async page read [ 2013.888793][ T9889] loop9: unable to read partition table [ 2013.890762][ T9889] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 2013.890762][ T9889] ) failed (rc=-5) [ 2014.279550][ T9896] SELinux: Context system_u:object_r:hald_var_run_t:s0 is not valid (left unmapped). [ 2015.274116][ T9904] netlink: 40 bytes leftover after parsing attributes in process `syz.2.2134'. [ 2017.533280][ T9920] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2142'. [ 2020.111974][ T9932] netlink: 'syz.1.2146': attribute type 1 has an invalid length. [ 2020.244307][ T9932] 8021q: adding VLAN 0 to HW filter on device bond1 [ 2020.716186][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 2020.717610][ T30] audit: type=1400 audit(2276.147:1768): avc: denied { read } for pid=9939 comm="syz.2.2149" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2020.858052][ T30] audit: type=1326 audit(2276.287:1769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9943 comm="syz.2.2152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2020.863234][ T30] audit: type=1326 audit(2276.287:1770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9943 comm="syz.2.2152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2020.876928][ T30] audit: type=1326 audit(2276.307:1771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9943 comm="syz.2.2152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2020.890538][ T30] audit: type=1326 audit(2276.307:1772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9943 comm="syz.2.2152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2020.895282][ T30] audit: type=1326 audit(2276.307:1773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9943 comm="syz.2.2152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2020.899245][ T30] audit: type=1326 audit(2276.307:1774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9943 comm="syz.2.2152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2020.904236][ T30] audit: type=1326 audit(2276.317:1775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9943 comm="syz.2.2152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2020.908361][ T30] audit: type=1326 audit(2276.317:1776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9943 comm="syz.2.2152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=432 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2020.910832][ T30] audit: type=1326 audit(2276.317:1777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9943 comm="syz.2.2152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2023.364204][ T9951] netlink: 'syz.2.2153': attribute type 4 has an invalid length. [ 2023.366155][ T9951] netlink: 17 bytes leftover after parsing attributes in process `syz.2.2153'. [ 2026.151186][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 2026.151746][ T30] audit: type=1326 audit(2281.577:1793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9960 comm="syz.1.2158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2026.157814][ T30] audit: type=1326 audit(2281.587:1794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9960 comm="syz.1.2158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2026.162113][ T30] audit: type=1326 audit(2281.587:1795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9960 comm="syz.1.2158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2026.167937][ T30] audit: type=1326 audit(2281.597:1796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9960 comm="syz.1.2158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2026.169470][ T30] audit: type=1326 audit(2281.597:1797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9960 comm="syz.1.2158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2026.185409][ T30] audit: type=1326 audit(2281.597:1798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9960 comm="syz.1.2158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2026.190241][ T30] audit: type=1326 audit(2281.617:1799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9960 comm="syz.1.2158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2026.232829][ T30] audit: type=1326 audit(2281.617:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9960 comm="syz.1.2158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2026.243728][ T30] audit: type=1326 audit(2281.657:1801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9960 comm="syz.1.2158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2026.259628][ T30] audit: type=1326 audit(2281.677:1802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9960 comm="syz.1.2158" exe="/syz-executor" sig=0 arch=c00000b7 syscall=28 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2028.616138][ T9963] capability: warning: `syz.1.2159' uses 32-bit capabilities (legacy support in use) [ 2031.787513][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 2031.793506][ T30] audit: type=1400 audit(2287.217:1805): avc: denied { read } for pid=9978 comm="syz.1.2166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2032.249469][ T9982] pim6reg1: entered promiscuous mode [ 2032.250461][ T9982] pim6reg1: entered allmulticast mode [ 2032.784270][ T30] audit: type=1400 audit(2288.207:1806): avc: denied { listen } for pid=9985 comm="syz.1.2169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2036.604996][ T30] audit: type=1400 audit(2291.967:1807): avc: denied { accept } for pid=9987 comm="syz.1.2170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2038.792925][ T30] audit: type=1400 audit(2294.217:1808): avc: denied { wake_alarm } for pid=10002 comm="syz.2.2174" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2039.107611][ T30] audit: type=1326 audit(2294.537:1809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10004 comm="syz.2.2175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2039.122678][ T30] audit: type=1326 audit(2294.547:1810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10004 comm="syz.2.2175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=235 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2039.128285][ T30] audit: type=1326 audit(2294.547:1811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10004 comm="syz.2.2175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2039.140982][ T30] audit: type=1326 audit(2294.567:1812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10004 comm="syz.2.2175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=450 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2039.165803][ T30] audit: type=1326 audit(2294.587:1813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10004 comm="syz.2.2175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2039.187526][ T30] audit: type=1326 audit(2294.607:1814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10004 comm="syz.2.2175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2040.064866][ T30] audit: type=1326 audit(2295.487:1815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10008 comm="syz.1.2177" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2040.065227][ T30] audit: type=1326 audit(2295.487:1816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10008 comm="syz.1.2177" exe="/syz-executor" sig=0 arch=c00000b7 syscall=130 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2040.065689][ T30] audit: type=1326 audit(2295.487:1817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10008 comm="syz.1.2177" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2040.977137][T10014] netlink: 32 bytes leftover after parsing attributes in process `syz.2.2179'. [ 2042.681256][T10033] netlink: 1 bytes leftover after parsing attributes in process `syz.1.2186'. [ 2042.683803][T10033] xt_policy: neither incoming nor outgoing policy selected [ 2045.010706][ T30] audit: type=1326 audit(2300.437:1818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10047 comm="syz.1.2192" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2045.015905][ T30] audit: type=1326 audit(2300.437:1819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10047 comm="syz.1.2192" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2045.024022][ T30] audit: type=1326 audit(2300.447:1820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10047 comm="syz.1.2192" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2045.031499][ T30] audit: type=1326 audit(2300.457:1821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10047 comm="syz.1.2192" exe="/syz-executor" sig=0 arch=c00000b7 syscall=64 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2045.265839][ T30] audit: type=1400 audit(2300.687:1822): avc: denied { accept } for pid=10050 comm="syz.2.2193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2045.552152][ T30] audit: type=1326 audit(2300.977:1823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10047 comm="syz.1.2192" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2045.565524][ T30] audit: type=1326 audit(2300.977:1824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10047 comm="syz.1.2192" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2045.577309][ T30] audit: type=1326 audit(2301.007:1825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10047 comm="syz.1.2192" exe="/syz-executor" sig=0 arch=c00000b7 syscall=451 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2045.582684][ T30] audit: type=1326 audit(2301.007:1826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10047 comm="syz.1.2192" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9255af28 code=0x7ffc0000 [ 2046.098316][ T30] audit: type=1400 audit(2301.527:1827): avc: denied { relabelfrom } for pid=10056 comm="syz.1.2195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 2048.659542][T10070] netlink: 'syz.2.2201': attribute type 20 has an invalid length. [ 2048.829264][T10072] netlink: 5 bytes leftover after parsing attributes in process `syz.2.2202'. [ 2048.832747][T10072] 0{X: renamed from gretap0 (while UP) [ 2048.852043][T10072] 0{X: entered allmulticast mode [ 2048.866896][T10072] A link change request failed with some changes committed already. Interface 30{X may have been left with an inconsistent configuration, please check. [ 2051.726389][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 2051.729291][ T30] audit: type=1326 audit(2307.157:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10088 comm="syz.2.2209" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2051.735236][ T30] audit: type=1326 audit(2307.157:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10088 comm="syz.2.2209" exe="/syz-executor" sig=0 arch=c00000b7 syscall=285 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2051.740906][ T30] audit: type=1326 audit(2307.167:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10088 comm="syz.2.2209" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2051.747614][ T30] audit: type=1326 audit(2307.177:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10088 comm="syz.2.2209" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2052.355819][ T30] audit: type=1400 audit(2307.777:1850): avc: denied { create } for pid=10091 comm="syz.2.2210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2052.368351][ T30] audit: type=1400 audit(2307.797:1851): avc: denied { setopt } for pid=10091 comm="syz.2.2210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2052.378558][ T30] audit: type=1400 audit(2307.807:1852): avc: denied { bind } for pid=10091 comm="syz.2.2210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2052.744337][ T30] audit: type=1400 audit(2308.167:1853): avc: denied { create } for pid=10095 comm="syz.2.2212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2052.755729][ T30] audit: type=1400 audit(2308.177:1854): avc: denied { bind } for pid=10095 comm="syz.2.2212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2052.756202][ T30] audit: type=1400 audit(2308.177:1855): avc: denied { name_bind } for pid=10095 comm="syz.2.2212" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 2054.487496][T10112] syz_tun: entered allmulticast mode [ 2054.661985][T10111] syz_tun: left allmulticast mode [ 2057.221430][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 2057.222037][ T30] audit: type=1326 audit(2312.637:1881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10128 comm="syz.2.2225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2057.222357][ T30] audit: type=1326 audit(2312.637:1882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10128 comm="syz.2.2225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2057.222596][ T30] audit: type=1326 audit(2312.647:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10128 comm="syz.2.2225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2057.228572][ T30] audit: type=1326 audit(2312.647:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10128 comm="syz.2.2225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2057.229168][ T30] audit: type=1326 audit(2312.657:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10128 comm="syz.2.2225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2057.245748][ T30] audit: type=1326 audit(2312.657:1886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10128 comm="syz.2.2225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2057.246438][ T30] audit: type=1326 audit(2312.667:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10128 comm="syz.2.2225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2057.246709][ T30] audit: type=1326 audit(2312.667:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10128 comm="syz.2.2225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2057.246937][ T30] audit: type=1326 audit(2312.667:1889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10128 comm="syz.2.2225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=31 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2057.247165][ T30] audit: type=1326 audit(2312.667:1890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10128 comm="syz.2.2225" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2059.896630][T10141] netlink: 96 bytes leftover after parsing attributes in process `syz.1.2228'. [ 2062.872025][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 2062.872326][ T30] audit: type=1400 audit(2318.297:1915): avc: denied { read } for pid=10157 comm="syz.1.2235" dev="nsfs" ino=4026532610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2062.872510][ T30] audit: type=1400 audit(2318.297:1916): avc: denied { open } for pid=10157 comm="syz.1.2235" path="net:[4026532610]" dev="nsfs" ino=4026532610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2062.893514][ T30] audit: type=1400 audit(2318.317:1917): avc: denied { ioctl } for pid=10157 comm="syz.1.2235" path="socket:[29928]" dev="sockfs" ino=29928 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2063.424308][ T30] audit: type=1400 audit(2318.847:1918): avc: denied { mounton } for pid=10161 comm="syz.1.2237" path="/595/file0" dev="tmpfs" ino=3049 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2063.427933][ T30] audit: type=1400 audit(2318.857:1919): avc: denied { mount } for pid=10161 comm="syz.1.2237" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2063.453912][ T30] audit: type=1400 audit(2318.877:1920): avc: denied { create } for pid=10161 comm="syz.1.2237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2063.470638][ T30] audit: type=1400 audit(2318.887:1921): avc: denied { mounton } for pid=10161 comm="syz.1.2237" path="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=dir permissive=1 [ 2063.511326][ T30] audit: type=1400 audit(2318.937:1922): avc: denied { unmount } for pid=7021 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2063.536502][ T30] audit: type=1400 audit(2318.947:1923): avc: denied { unmount } for pid=7021 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2063.628407][ T30] audit: type=1400 audit(2319.057:1924): avc: denied { write } for pid=10163 comm="syz.1.2238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2066.988272][T10200] 0{X: left allmulticast mode [ 2067.146655][T10200] wireguard0: left promiscuous mode [ 2067.147180][T10200] wireguard0: left allmulticast mode [ 2067.932741][ T8327] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2068.108553][ T8327] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2068.140635][ T30] kauditd_printk_skb: 30 callbacks suppressed [ 2068.147472][ T30] audit: type=1400 audit(2323.567:1955): avc: denied { read write } for pid=10205 comm="syz.2.2254" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 2068.166477][ T30] audit: type=1400 audit(2323.577:1956): avc: denied { open } for pid=10205 comm="syz.2.2254" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 2068.271429][ T8327] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2068.403240][ T8327] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2068.991677][ T30] audit: type=1400 audit(2324.417:1957): avc: denied { read } for pid=3166 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 2069.634151][ T8327] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2069.707208][ T8327] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2069.770701][ T8327] bond0 (unregistering): Released all slaves [ 2069.837082][ T8327] bond1 (unregistering): Released all slaves [ 2070.039351][ T30] audit: type=1400 audit(2325.457:1958): avc: denied { search } for pid=3166 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2070.050833][ T30] audit: type=1400 audit(2325.477:1959): avc: denied { search } for pid=3166 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2070.051448][ T30] audit: type=1400 audit(2325.477:1960): avc: denied { search } for pid=3166 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2070.070854][ T30] audit: type=1400 audit(2325.497:1961): avc: denied { search } for pid=3166 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2070.087326][ T30] audit: type=1400 audit(2325.507:1962): avc: denied { search } for pid=3166 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2070.087943][ T30] audit: type=1400 audit(2325.507:1963): avc: denied { search } for pid=3166 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2070.089271][ T30] audit: type=1400 audit(2325.507:1964): avc: denied { read } for pid=3166 comm="dhcpcd" name="n29" dev="tmpfs" ino=5052 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2071.318260][ T8327] hsr_slave_0: left promiscuous mode [ 2071.332823][ T8327] hsr_slave_1: left promiscuous mode [ 2071.402289][ T8327] veth1_macvtap: left promiscuous mode [ 2071.403019][ T8327] veth0_macvtap: left promiscuous mode [ 2075.244148][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 2075.245236][ T30] audit: type=1326 audit(2330.667:1980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10251 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2075.258331][ T30] audit: type=1326 audit(2330.687:1981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10251 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2075.271378][ T30] audit: type=1326 audit(2330.697:1982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10251 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=208 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2075.272226][ T30] audit: type=1326 audit(2330.697:1983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10251 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2075.291669][ T30] audit: type=1326 audit(2330.717:1984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10251 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2075.294140][ T30] audit: type=1326 audit(2330.717:1985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10251 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=97 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2075.323356][ T30] audit: type=1326 audit(2330.747:1986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10251 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2075.330339][ T30] audit: type=1326 audit(2330.757:1987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10251 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2075.341178][ T30] audit: type=1326 audit(2330.767:1988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10251 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=293 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2075.343022][ T30] audit: type=1326 audit(2330.767:1989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10251 comm="syz.2.2261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2077.691567][T10202] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2077.722747][T10202] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2080.353010][T10202] hsr_slave_0: entered promiscuous mode [ 2080.363485][T10202] hsr_slave_1: entered promiscuous mode [ 2080.372184][T10202] debugfs: 'hsr0' already exists in 'hsr' [ 2080.374045][T10202] Cannot create hsr debugfs directory [ 2082.653132][T10202] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2082.693138][T10202] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2082.721673][T10202] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2082.743035][T10202] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2084.971671][T10202] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2086.826269][ T30] kauditd_printk_skb: 26 callbacks suppressed [ 2086.829383][ T30] audit: type=1400 audit(2342.247:2016): avc: denied { ioctl } for pid=10348 comm="syz.2.2271" path="/dev/virtual_nci" dev="devtmpfs" ino=672 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2087.796484][ T30] audit: type=1400 audit(2343.207:2017): avc: denied { ioctl } for pid=10359 comm="syz.2.2272" path="socket:[30457]" dev="sockfs" ino=30457 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2088.042959][ T30] audit: type=1400 audit(2343.467:2018): avc: denied { getopt } for pid=10364 comm="syz.2.2273" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2088.068613][ T30] audit: type=1400 audit(2343.497:2019): avc: denied { ioctl } for pid=10364 comm="syz.2.2273" path="socket:[30741]" dev="sockfs" ino=30741 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2088.511427][T10371] netlink: 'syz.2.2274': attribute type 10 has an invalid length. [ 2089.859919][ T30] audit: type=1400 audit(2345.287:2020): avc: denied { read } for pid=10386 comm="syz.2.2278" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2089.870372][ T30] audit: type=1400 audit(2345.287:2021): avc: denied { open } for pid=10386 comm="syz.2.2278" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2089.888275][ T30] audit: type=1400 audit(2345.317:2022): avc: denied { ioctl } for pid=10386 comm="syz.2.2278" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2094.289710][T10202] veth0_vlan: entered promiscuous mode [ 2094.392868][T10202] veth1_vlan: entered promiscuous mode [ 2094.857770][T10202] veth0_macvtap: entered promiscuous mode [ 2094.919300][T10202] veth1_macvtap: entered promiscuous mode [ 2095.600654][ T8337] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2095.601119][ T8337] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2095.601391][ T8337] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2095.601547][ T8337] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2095.973346][ T30] audit: type=1400 audit(2351.397:2023): avc: denied { mounton } for pid=10202 comm="syz-executor" path="/syzkaller.D4obpy/syz-tmp" dev="vda" ino=1881 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 2095.986014][ T30] audit: type=1400 audit(2351.407:2024): avc: denied { mount } for pid=10202 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2096.057989][ T30] audit: type=1400 audit(2351.487:2025): avc: denied { mounton } for pid=10202 comm="syz-executor" path="/syzkaller.D4obpy/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 2096.070381][ T30] audit: type=1400 audit(2351.487:2026): avc: denied { mounton } for pid=10202 comm="syz-executor" path="/syzkaller.D4obpy/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=30860 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 2096.125995][ T30] audit: type=1400 audit(2351.547:2027): avc: denied { unmount } for pid=10202 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2096.126731][ T30] audit: type=1400 audit(2351.547:2028): avc: denied { mounton } for pid=10202 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 2096.126958][ T30] audit: type=1400 audit(2351.547:2029): avc: denied { mount } for pid=10202 comm="syz-executor" name="/" dev="gadgetfs" ino=2917 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 2096.168695][ T30] audit: type=1400 audit(2351.597:2030): avc: denied { mount } for pid=10202 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2096.193116][ T30] audit: type=1400 audit(2351.617:2031): avc: denied { mounton } for pid=10202 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 2096.211731][ T30] audit: type=1400 audit(2351.637:2032): avc: denied { mount } for pid=10202 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2097.508605][T10426] veth0_to_team: entered promiscuous mode [ 2097.512739][T10426] veth0_to_team: entered allmulticast mode [ 2097.546029][ T8621] syz!: Port: 1 Link DOWN [ 2101.705842][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 2101.706146][ T30] audit: type=1400 audit(2357.137:2043): avc: denied { create } for pid=10444 comm="syz.2.2294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2101.717322][ T30] audit: type=1400 audit(2357.137:2044): avc: denied { bind } for pid=10444 comm="syz.2.2294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2101.735787][ T30] audit: type=1400 audit(2357.157:2045): avc: denied { listen } for pid=10444 comm="syz.2.2294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2101.751458][ T30] audit: type=1400 audit(2357.177:2046): avc: denied { accept } for pid=10444 comm="syz.2.2294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2102.973335][ T30] audit: type=1400 audit(2358.397:2047): avc: denied { name_bind } for pid=10451 comm="syz.1.2297" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2102.992287][ T30] audit: type=1400 audit(2358.397:2048): avc: denied { node_bind } for pid=10451 comm="syz.1.2297" saddr=fe80::aa src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2103.452992][ T30] audit: type=1326 audit(2358.877:2049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10455 comm="syz.1.2299" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2103.467632][ T30] audit: type=1326 audit(2358.877:2050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10455 comm="syz.1.2299" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2103.468390][ T30] audit: type=1326 audit(2358.897:2051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10455 comm="syz.1.2299" exe="/syz-executor" sig=0 arch=c00000b7 syscall=29 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2103.479842][ T30] audit: type=1326 audit(2358.897:2052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10455 comm="syz.1.2299" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2104.341063][T10464] netlink: 'syz.1.2302': attribute type 1 has an invalid length. [ 2104.342880][T10464] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2302'. [ 2105.643877][T10481] random: crng reseeded on system resumption [ 2105.683484][T10481] Restarting kernel threads ... [ 2105.687018][T10481] Done restarting kernel threads. [ 2108.399292][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 2108.403120][ T30] audit: type=1400 audit(2363.827:2070): avc: denied { setopt } for pid=10497 comm="syz.2.2316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2109.730057][ T30] audit: type=1400 audit(2365.157:2071): avc: denied { bind } for pid=10508 comm="syz.1.2320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2109.732896][ T30] audit: type=1400 audit(2365.157:2072): avc: denied { setopt } for pid=10508 comm="syz.1.2320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2109.810691][T10509] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2110.015507][T10509] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2110.162635][T10509] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2110.368217][T10509] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2110.993849][ T8353] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2111.102248][ T8353] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2111.306743][ T1154] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2111.389904][ T8327] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2112.811698][ T30] audit: type=1400 audit(2368.237:2073): avc: denied { audit_write } for pid=10527 comm="syz.1.2326" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2112.812625][ T30] audit: type=1107 audit(2368.237:2074): pid=10527 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='%' [ 2113.897197][T10540] wireguard0: entered promiscuous mode [ 2113.897597][T10540] wireguard0: entered allmulticast mode [ 2114.343733][ T30] audit: type=1400 audit(2369.767:2075): avc: denied { create } for pid=10539 comm="syz.1.2332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2114.369480][ T30] audit: type=1400 audit(2369.797:2076): avc: denied { read write } for pid=10539 comm="syz.1.2332" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2114.372207][ T30] audit: type=1400 audit(2369.797:2077): avc: denied { open } for pid=10539 comm="syz.1.2332" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2114.901007][ T30] audit: type=1400 audit(2370.327:2078): avc: denied { setopt } for pid=10539 comm="syz.1.2332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2116.512166][ T30] audit: type=1326 audit(2371.937:2079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10555 comm="syz.1.2338" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2116.514071][ T30] audit: type=1326 audit(2371.937:2080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10555 comm="syz.1.2338" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2116.525281][ T30] audit: type=1326 audit(2371.947:2081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10555 comm="syz.1.2338" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2116.527563][ T30] audit: type=1326 audit(2371.947:2082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10555 comm="syz.1.2338" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2116.529824][ T30] audit: type=1326 audit(2371.957:2083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10555 comm="syz.1.2338" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2116.533994][ T30] audit: type=1326 audit(2371.957:2084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10555 comm="syz.1.2338" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2117.400701][T10566] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2343'. [ 2117.401237][T10566] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2343'. [ 2120.322962][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 2120.323943][ T30] audit: type=1326 audit(2375.747:2109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10597 comm="syz.2.2358" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2120.326243][ T30] audit: type=1326 audit(2375.747:2110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10597 comm="syz.2.2358" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2120.342872][ T30] audit: type=1326 audit(2375.757:2111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10597 comm="syz.2.2358" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2120.343689][ T30] audit: type=1326 audit(2375.757:2112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10597 comm="syz.2.2358" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2120.344199][ T30] audit: type=1326 audit(2375.757:2113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10597 comm="syz.2.2358" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2120.345752][ T30] audit: type=1326 audit(2375.767:2114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10597 comm="syz.2.2358" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2120.345993][ T30] audit: type=1326 audit(2375.767:2115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10597 comm="syz.2.2358" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2120.346274][ T30] audit: type=1326 audit(2375.767:2116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10597 comm="syz.2.2358" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2120.346489][ T30] audit: type=1326 audit(2375.767:2117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10597 comm="syz.2.2358" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2120.349582][ T30] audit: type=1326 audit(2375.777:2118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10597 comm="syz.2.2358" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2120.413431][T10598] bond0: entered promiscuous mode [ 2120.414264][T10598] bond0: entered allmulticast mode [ 2120.420940][T10598] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2120.500630][T10598] bond0 (unregistering): Released all slaves [ 2120.988580][T10603] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2360'. [ 2120.988966][T10603] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2360'. [ 2121.186398][T10607] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2362'. [ 2123.577765][T10634] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2374'. [ 2123.579727][T10634] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2374'. [ 2127.328818][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 2127.331972][ T30] audit: type=1326 audit(2382.757:2140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10651 comm="syz.1.2382" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2127.332557][ T30] audit: type=1326 audit(2382.757:2141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10651 comm="syz.1.2382" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2127.346370][ T30] audit: type=1326 audit(2382.757:2142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10651 comm="syz.1.2382" exe="/syz-executor" sig=0 arch=c00000b7 syscall=158 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2127.347092][ T30] audit: type=1326 audit(2382.757:2143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10651 comm="syz.1.2382" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2127.347396][ T30] audit: type=1326 audit(2382.767:2144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10651 comm="syz.1.2382" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2128.090863][T10664] rdma_op 00000000aded044a conn xmit_rdma 0000000000000000 [ 2130.662932][ T30] audit: type=1400 audit(2386.087:2145): avc: denied { write } for pid=10679 comm="syz.2.2395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2130.672661][T10681] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2395'. [ 2130.673309][T10681] netem: change failed [ 2130.717416][T10682] netlink: 288 bytes leftover after parsing attributes in process `syz.1.2394'. [ 2131.100030][T10691] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2399'. [ 2132.089770][ T30] audit: type=1400 audit(2387.517:2146): avc: denied { read write } for pid=10698 comm="syz.1.2402" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2132.096330][ T30] audit: type=1400 audit(2387.517:2147): avc: denied { open } for pid=10698 comm="syz.1.2402" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2132.217280][ T7112] hid_parser_main: 6 callbacks suppressed [ 2132.219078][ T7112] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2132.219615][ T7112] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2132.219870][ T7112] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2132.220084][ T7112] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2132.220293][ T7112] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2132.220497][ T7112] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2132.220702][ T7112] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2132.220924][ T7112] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2132.221137][ T7112] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2132.236918][ T7112] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 2132.298278][ T7112] hid-generic 0000:0000:0000.0005: hidraw0: HID v8.00 Device [syz0] on syz0 [ 2133.291682][T10702] fido_id[10702]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2133.392710][ T30] audit: type=1326 audit(2388.817:2148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10711 comm="syz.1.2407" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2133.399310][ T30] audit: type=1326 audit(2388.817:2149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10711 comm="syz.1.2407" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2133.402067][ T30] audit: type=1326 audit(2388.827:2150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10711 comm="syz.1.2407" exe="/syz-executor" sig=0 arch=c00000b7 syscall=239 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2133.549657][ T30] audit: type=1326 audit(2388.977:2151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10713 comm="syz.2.2408" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2133.552790][ T30] audit: type=1326 audit(2388.977:2152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10713 comm="syz.2.2408" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2133.556215][ T30] audit: type=1326 audit(2388.987:2153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10713 comm="syz.2.2408" exe="/syz-executor" sig=0 arch=c00000b7 syscall=30 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2133.559982][ T30] audit: type=1326 audit(2388.987:2154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10713 comm="syz.2.2408" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2133.563501][ T30] audit: type=1326 audit(2388.987:2155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10713 comm="syz.2.2408" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa655af28 code=0x7ffc0000 [ 2133.633025][ T30] audit: type=1326 audit(2389.057:2156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10711 comm="syz.1.2407" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2133.646022][ T30] audit: type=1326 audit(2389.067:2157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10711 comm="syz.1.2407" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9155af28 code=0x7ffc0000 [ 2139.289988][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 2139.292265][ T30] audit: type=1400 audit(2394.717:2164): avc: denied { setopt } for pid=10764 comm="syz.1.2430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2139.302578][ T30] audit: type=1400 audit(2394.717:2165): avc: denied { write } for pid=10764 comm="syz.1.2430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2139.324250][T10765] ------------[ cut here ]------------ [ 2139.325410][T10765] 'send_pkt()' returns 0, but 65536 expected [ 2139.331898][T10765] WARNING: CPU: 1 PID: 10765 at net/vmw_vsock/virtio_transport_common.c:426 virtio_transport_send_pkt_info+0x730/0xc04 [ 2139.332659][T10765] Modules linked in: [ 2139.333233][T10765] CPU: 1 UID: 0 PID: 10765 Comm: syz.1.2430 Not tainted syzkaller #0 PREEMPT [ 2139.333538][T10765] Hardware name: linux,dummy-virt (DT) [ 2139.333907][T10765] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 2139.335407][T10765] pc : virtio_transport_send_pkt_info+0x730/0xc04 [ 2139.335666][T10765] lr : virtio_transport_send_pkt_info+0x730/0xc04 [ 2139.336419][T10765] sp : ffff80008f5e74b0 [ 2139.336718][T10765] x29: ffff80008f5e74b0 x28: ffff00003cf34400 x27: dfff800000000000 [ 2139.338534][T10765] x26: ffff00003863c900 x25: ffff00003cf34448 x24: ffff00001c102640 [ 2139.339322][T10765] x23: ffff000013cbbd40 x22: 0000000000010000 x21: ffff800088b3d6e0 [ 2139.340031][T10765] x20: ffff80008f5e75d0 x19: 0000000000010000 x18: 0000000000000000 [ 2139.340903][T10765] x17: 0000000000000000 x16: ffff00006a0ad4c4 x15: 0000fffff68d8fe8 [ 2139.341899][T10765] x14: 0000000000000000 x13: 0000000000000001 x12: ffff700011ebcdff [ 2139.342463][T10765] x11: 1ffff00011ebcdfe x10: ffff700011ebcdfe x9 : dfff800000000000 [ 2139.343029][T10765] x8 : ffff80008f5e6ff8 x7 : ffff80008f5e7120 x6 : ffff80008f5e7070 [ 2139.343590][T10765] x5 : ffff80008f5e7058 x4 : 1ffff00011ebce14 x3 : 1fffe0000d41773e [ 2139.344173][T10765] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00001304dac0 [ 2139.345159][T10765] Call trace: [ 2139.345498][T10765] virtio_transport_send_pkt_info+0x730/0xc04 (P) [ 2139.345957][T10765] virtio_transport_seqpacket_enqueue+0x104/0x164 [ 2139.346470][T10765] vsock_connectible_sendmsg+0x960/0xcf4 [ 2139.346602][ T30] audit: type=1400 audit(2394.757:2166): avc: denied { write } for pid=3316 comm="syz-executor" path="pipe:[3522]" dev="pipefs" ino=3522 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 2139.348036][T10765] __sock_sendmsg+0xc8/0x168 [ 2139.348393][T10765] ____sys_sendmsg+0x3ac/0x764 [ 2139.348787][T10765] ___sys_sendmsg+0x11c/0x19c [ 2139.349211][T10765] __sys_sendmmsg+0x1b0/0x424 [ 2139.349550][T10765] __arm64_sys_sendmmsg+0x8c/0xd0 [ 2139.349895][T10765] invoke_syscall+0x6c/0x258 [ 2139.350257][T10765] el0_svc_common.constprop.0+0xac/0x230 [ 2139.350613][T10765] do_el0_svc+0x40/0x58 [ 2139.350931][T10765] el0_svc+0x50/0x1a0 [ 2139.351245][T10765] el0t_64_sync_handler+0xa0/0xe4 [ 2139.351582][T10765] el0t_64_sync+0x198/0x19c [ 2139.352083][T10765] irq event stamp: 0 [ 2139.352364][T10765] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 2139.353318][T10765] hardirqs last disabled at (0): [] copy_process+0x1394/0x53f4 [ 2139.353650][T10765] softirqs last enabled at (0): [] copy_process+0x13cc/0x53f4 [ 2139.353952][T10765] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 2139.354255][T10765] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2139.967307][ T30] audit: type=1400 audit(2395.377:2167): avc: denied { getopt } for pid=10764 comm="syz.1.2430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2141.069198][ T8327] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2141.429250][ T8327] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2141.768663][ T8327] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2142.208814][ T8327] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2144.480867][ T8327] hsr_slave_0: left promiscuous mode [ 2144.487042][ T8327] hsr_slave_1: left promiscuous mode [ 2144.531376][ T8327] veth1_macvtap: left promiscuous mode [ 2144.532257][ T8327] veth0_macvtap: left promiscuous mode [ 2144.548270][ T8327] veth1_vlan: left promiscuous mode [ 2144.549371][ T8327] veth0_vlan: left promiscuous mode [ 2146.001298][ T8345] smc: removing ib device syz! [ 2151.064104][ T8345] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2151.161703][ T8345] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2151.271874][ T8345] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2151.384026][ T8345] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2153.221040][ T8345] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2153.303148][ T8345] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2153.385762][ T8345] bond0 (unregistering): Released all slaves [ 2153.632837][ T8345] hsr_slave_0: left promiscuous mode [ 2153.639751][ T8345] hsr_slave_1: left promiscuous mode [ 2153.698910][ T8345] veth1_macvtap: left promiscuous mode [ 2153.699801][ T8345] veth0_macvtap: left promiscuous mode [ 2153.700606][ T8345] veth1_vlan: left promiscuous mode [ 2153.701187][ T8345] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 06:32:31 Registers: info registers vcpu 0 CPU#0 PC=ffff800085440a8c X00=ffff800085440a88 X01=ffff800083dfc920 X02=0000000000000000 X03=ffff800080411b80 X04=ffff700011a3c569 X05=ffff80008d1e2b40 X06=ffff700011a3c568 X07=0000000000000001 X08=ffff80008d1e2b43 X09=dfff800000000000 X10=ffff700011a3c568 X11=1ffff00011a3c568 X12=ffff700011a3c569 X13=0000000000000000 X14=0000000000000003 X15=ffff000020703676 X16=ffff00001b71e21a X17=0000000000000000 X18=1fffe000036e3c43 X19=ffff80008d1e2b40 X20=000001f1cabb0400 X21=ffff800084b46b00 X22=dfff800000000000 X23=00000000000680be X24=ffff800084b46b00 X25=ffff0000232f93f4 X26=0000000000000000 X27=1fffe0000465f27e X28=ffff00001b71d940 X29=ffff8000a1e47520 X30=ffff800083dfc938 SP=ffff8000a1e47520 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=000c980301000000:08060c9003006565 Q03=04221000060101d0:0010000ca0030008 Q04=000ca0030008000c:9803010000000806 Q05=8e3010000c800422:1000060101d00010 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000002 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=05436207613ebe9c:20cf22738fa50962 Q17=ec5d5f49cbfaa573:cf2bba6b78d72f36 Q18=ccb8efe0889171b0:afcb780afaedf46f Q19=55ecb21ac45a743a:4343482078a14b8a Q20=9b880c729a21ae13:0cb1896a53ef77fb Q21=65fe0c820e3c3e48:01529a0494e0853e Q22=a296029731580568:b293b9fa3ad43e7f Q23=00ac80091f42d745:55e92237fcc86a60 Q24=0008001ab003004c:504701ffffffffff Q25=0303ffffffff041a:c0030008001ab803 Q26=1ae0030008001ad8:0320c08008001ad0 Q27=000000000001ffff:ffffffffffffdf08 Q28=08001b8003000000:0000000000000000 Q29=1b98030008001b90:030008001b880300 Q30=001bb00303ffffff:ff041ba003000800 Q31=ffffffff041bc003:0008001bb8030008 info registers vcpu 1 CPU#1 PC=ffff800081be6234 X00=0000000000000002 X01=0000000000000007 X02=0000000000000000 X03=1fffe00001d9822f X04=0000000000000018 X05=ffff800087ac2440 X06=ffff700010f58488 X07=0000000000000001 X08=ffff800087ac2440 X09=dfff800000000000 X10=ffff700010f58488 X11=1ffff00010f58488 X12=ffff700010f58489 X13=205d353637303154 X14=3433666333303030 X15=3a37327820303034 X16=3030386666666420 X17=3030303030303030 X18=0000000000000000 X19=ffff00000ecc1080 X20=ffff80008d4db018 X21=ffff800087b3e1c0 X22=0000000000000030 X23=dfff800000000000 X24=ffff00000ecd2059 X25=0000000000000001 X26=ffff00000ecc12d8 X27=ffff00000ecc1080 X28=dfff800000000000 X29=ffff80008f5e6a60 X30=ffff800081be64c0 SP=ffff80008f5e6a60 PSTATE=800003c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000fffff68d8e20:5411d458c12abd00 Q02=0000fffff68d8e00:ffffff80ffffffd8 Q03=0000fffff68d8eb0:0000fffff68d8eb0 Q04=0000fffff68d8eb0:0000ffffa6537008 Q05=0000fffff68d8e80:0000fffff68d8eb0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff68d90d0:0000fffff68d90d0 Q17=ffffff80ffffffd0:0000fffff68d90a0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000