last executing test programs: 4.491391412s ago: executing program 0 (id=326): poll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x3894}], 0x1, 0xf9) syz_io_uring_setup(0x24f9, 0x0, &(0x7f0000000100), &(0x7f0000000140)) syz_io_uring_setup(0x239, 0x0, 0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(0x0, r0, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x805, 0x0) pipe(&(0x7f0000000080)) pipe2(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$bt_hci(r1, 0x84, 0x81, &(0x7f0000000080)=""/4076, &(0x7f00000010c0)=0xfec) 3.955527062s ago: executing program 1 (id=327): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="d00000000002010400000000000000000a000000440001802c0001801400030000000000000000000000ffff0000000014000500fc0120000000000000000000000000000c000280050001000000000006000340000000003c0003800c000280053a0100000000002c00018014000300fe8000000000000000000000000000bb14000400ff0200000000000000000000000000013c0002802c00018014000300ff01000000000000000000000000000114000400ff0200000000000000000000000000010c000280050001"], 0xd0}, 0x1, 0x0, 0x0, 0x810}, 0x0) 3.742869504s ago: executing program 0 (id=328): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xa}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x17}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x10) r1 = socket$kcm(0x2, 0x3, 0x106) sendmsg$inet(r1, &(0x7f0000000340)={&(0x7f0000000380)={0x2, 0x0, @remote}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000240)="3bd6df23ae", 0x5}], 0x1}, 0x0) 3.494363234s ago: executing program 1 (id=329): add_key$keyring(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000540)='id_legacy\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)='\x00', 0x0) add_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='j', 0x1, 0xfffffffffffffffd) request_key(&(0x7f0000000540)='id_legacy\x00', &(0x7f0000000580)={'syz', 0x2}, 0x0, 0xffffffffffffffff) 3.494108584s ago: executing program 0 (id=330): r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000080), 0x4) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) 3.36983626s ago: executing program 1 (id=331): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@req={0x28, &(0x7f0000000000)={'tunl0\x00', @ifru_mtu=0x5}}) ioctl$sock_SIOCETHTOOL(r1, 0x8946, 0x0) 3.054247287s ago: executing program 1 (id=332): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x2d, 0x0, 0x1, 0xfffffffc}]}) 3.014680986s ago: executing program 0 (id=333): r0 = syz_io_uring_setup(0x10d, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x3, 0x9}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_SHUTDOWN={0x22, 0x9}) io_uring_enter(r0, 0x20003d16, 0x80000, 0x0, 0x0, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x84, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000b00)) syz_open_dev$dmmidi(&(0x7f0000000080), 0x200, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x0) 2.791801767s ago: executing program 1 (id=334): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000006c0)=""/234, 0xea}, {&(0x7f0000002140)=""/4046, 0xfce}, {&(0x7f00000005c0)=""/220, 0xdc}, {&(0x7f0000000240)=""/191, 0xbf}, {&(0x7f00000000c0)=""/35, 0x23}, {&(0x7f0000000900)=""/193, 0xc1}, {&(0x7f0000000000)=""/52, 0x34}, {&(0x7f0000000400)=""/183, 0xb7}, {&(0x7f0000000300)=""/130, 0x82}, {&(0x7f0000000580)=""/54, 0x36}], 0xa}, 0x0) 164.348986ms ago: executing program 0 (id=335): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000a80)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}, 0x45c) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_CREATE(r0, 0x5501) 162.105226ms ago: executing program 1 (id=336): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_usb_connect(0x2, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = io_uring_setup(0xc40, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffff}, 0x0) socket(0x80000000000000a, 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r5, 0x4018620d, &(0x7f0000000300)={0x73622a85, 0x1101}) r6 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) r7 = dup3(r6, r5, 0x0) r8 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r8, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r8, 0x4018620d, &(0x7f0000000040)) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000000)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000340)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000440)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x18, 0x0, &(0x7f00000001c0)={0x30, 0x30, 0x30}}, 0x400}], 0x0, 0x0, &(0x7f0000000680)}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYRESHEX=r4], 0x7c}}, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r3, &(0x7f0000000140)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x30, 0x30, 0x0, @in6={0x1b, 0x0, 0xbcd0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x400}, @in={0x2, 0x4e22, @remote}}}, 0x118) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x42, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) mount$fuse(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRES64=r8, @ANYRESDEC=r2, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) 0s ago: executing program 0 (id=337): syz_open_dev$dmmidi(&(0x7f0000000080), 0xfc, 0x8081) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r0 = userfaultfd(0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) r1 = io_uring_setup(0x3eaf, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000080)={&(0x7f0000c15000/0x1000)=nil, &(0x7f0000508000/0x4000)=nil, 0x1000}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x15) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x54400, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x294}}, 0x80) kernel console output (not intermixed with test programs): [ 56.417432][ T31] audit: type=1400 audit(56.340:68): avc: denied { read write } for pid=3104 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 56.438259][ T31] audit: type=1400 audit(56.370:69): avc: denied { open } for pid=3104 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:20479' (ED25519) to the list of known hosts. [ 67.837170][ T31] audit: type=1400 audit(67.760:70): avc: denied { name_bind } for pid=3105 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 69.517414][ T31] audit: type=1400 audit(69.430:71): avc: denied { execute } for pid=3107 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.518914][ T31] audit: type=1400 audit(69.450:72): avc: denied { execute_no_trans } for pid=3107 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 73.541097][ T31] audit: type=1400 audit(73.470:73): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 73.543323][ T31] audit: type=1400 audit(73.470:74): avc: denied { mount } for pid=3107 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 73.555425][ T3107] cgroup: Unknown subsys name 'net' [ 73.563014][ T31] audit: type=1400 audit(73.490:75): avc: denied { unmount } for pid=3107 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 73.795502][ T3107] cgroup: Unknown subsys name 'cpuset' [ 73.802329][ T3107] cgroup: Unknown subsys name 'hugetlb' [ 73.803384][ T3107] cgroup: Unknown subsys name 'rlimit' [ 74.050347][ T31] audit: type=1400 audit(73.980:76): avc: denied { setattr } for pid=3107 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.053419][ T31] audit: type=1400 audit(73.980:77): avc: denied { mounton } for pid=3107 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 74.055300][ T31] audit: type=1400 audit(73.980:78): avc: denied { mount } for pid=3107 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 74.388027][ T3109] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 74.389752][ T31] audit: type=1400 audit(74.320:79): avc: denied { relabelto } for pid=3109 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 74.393956][ T31] audit: type=1400 audit(74.320:80): avc: denied { write } for pid=3109 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 74.437428][ T31] audit: type=1400 audit(74.360:81): avc: denied { read } for pid=3107 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 74.440120][ T31] audit: type=1400 audit(74.370:82): avc: denied { open } for pid=3107 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 81.956223][ T3107] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 84.492073][ T31] audit: type=1400 audit(84.420:83): avc: denied { execmem } for pid=3110 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 84.549177][ T31] audit: type=1400 audit(84.480:84): avc: denied { read } for pid=3113 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.551272][ T31] audit: type=1400 audit(84.480:85): avc: denied { read } for pid=3112 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.551933][ T31] audit: type=1400 audit(84.480:86): avc: denied { open } for pid=3112 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.558519][ T31] audit: type=1400 audit(84.490:87): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 84.581251][ T31] audit: type=1400 audit(84.510:89): avc: denied { module_request } for pid=3112 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 84.582089][ T31] audit: type=1400 audit(84.510:88): avc: denied { module_request } for pid=3113 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 84.673264][ T31] audit: type=1400 audit(84.600:90): avc: denied { sys_module } for pid=3113 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 85.429309][ T31] audit: type=1400 audit(85.360:91): avc: denied { ioctl } for pid=3113 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 86.710373][ T3113] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.714913][ T3113] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.903858][ T3112] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.910629][ T3112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.735392][ T3113] hsr_slave_0: entered promiscuous mode [ 87.741560][ T3113] hsr_slave_1: entered promiscuous mode [ 87.861207][ T3112] hsr_slave_0: entered promiscuous mode [ 87.864089][ T3112] hsr_slave_1: entered promiscuous mode [ 87.866332][ T3112] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 87.868326][ T3112] Cannot create hsr debugfs directory [ 88.362841][ T31] audit: type=1400 audit(88.290:92): avc: denied { create } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.377260][ T3113] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 88.393804][ T3113] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 88.405766][ T3113] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 88.417480][ T3113] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 88.424248][ T3112] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 88.431537][ T3112] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 88.459657][ T3112] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 88.471586][ T3112] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 89.077316][ T3112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.272280][ T3113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.406092][ T3113] veth0_vlan: entered promiscuous mode [ 92.425786][ T3113] veth1_vlan: entered promiscuous mode [ 92.479046][ T3113] veth0_macvtap: entered promiscuous mode [ 92.490889][ T3113] veth1_macvtap: entered promiscuous mode [ 92.542279][ T3112] veth0_vlan: entered promiscuous mode [ 92.571513][ T3113] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.572456][ T3113] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.572985][ T3113] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.573370][ T3113] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.604246][ T3112] veth1_vlan: entered promiscuous mode [ 92.713549][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 92.713642][ T31] audit: type=1400 audit(92.640:95): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 92.715041][ T31] audit: type=1400 audit(92.640:96): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/syzkaller.KJfoHd/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 92.715868][ T31] audit: type=1400 audit(92.640:97): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 92.731109][ T31] audit: type=1400 audit(92.660:98): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/syzkaller.KJfoHd/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 92.732156][ T31] audit: type=1400 audit(92.660:99): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/syzkaller.KJfoHd/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 92.741264][ T31] audit: type=1400 audit(92.670:100): avc: denied { unmount } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 92.748300][ T31] audit: type=1400 audit(92.680:101): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 92.750386][ T31] audit: type=1400 audit(92.680:102): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 92.751180][ T31] audit: type=1400 audit(92.680:103): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 92.752076][ T31] audit: type=1400 audit(92.680:104): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 92.756781][ T3112] veth0_macvtap: entered promiscuous mode [ 92.765927][ T3112] veth1_macvtap: entered promiscuous mode [ 92.820194][ T3113] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 92.849908][ T3112] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.850523][ T3112] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.850927][ T3112] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.851297][ T3112] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.880803][ T3796] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1'. [ 95.725280][ T3813] IPv6: NLM_F_CREATE should be specified when creating new route [ 96.767529][ T3820] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 96.997797][ T3820] usb 1-1: unable to get BOS descriptor or descriptor too short [ 97.005240][ T3820] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 97.005789][ T3820] usb 1-1: can't read configurations, error -71 [ 98.302374][ T3843] fuse: Unknown parameter '0x0000000000000003' [ 98.763593][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 98.763704][ T31] audit: type=1400 audit(98.690:129): avc: denied { create } for pid=3846 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 98.766190][ T31] audit: type=1400 audit(98.690:130): avc: denied { write } for pid=3846 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 98.766495][ T3847] netlink: 20 bytes leftover after parsing attributes in process `syz.0.16'. [ 98.776963][ T31] audit: type=1400 audit(98.690:131): avc: denied { nlmsg_write } for pid=3846 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 100.131058][ T31] audit: type=1400 audit(100.060:132): avc: denied { ioctl } for pid=3856 comm="syz.0.18" path="socket:[2190]" dev="sockfs" ino=2190 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 101.087152][ T31] audit: type=1400 audit(101.010:133): avc: denied { create } for pid=3868 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 101.088718][ T31] audit: type=1400 audit(101.010:134): avc: denied { write } for pid=3868 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 105.282319][ T31] audit: type=1400 audit(104.910:135): avc: denied { create } for pid=3871 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 105.283411][ T31] audit: type=1400 audit(104.910:136): avc: denied { write } for pid=3871 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 105.284128][ T31] audit: type=1400 audit(104.920:137): avc: denied { connect } for pid=3871 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 105.284814][ T31] audit: type=1400 audit(104.920:138): avc: denied { name_connect } for pid=3871 comm="syz.0.23" dest=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 105.285544][ T31] audit: type=1400 audit(104.940:139): avc: denied { name_connect } for pid=3871 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 106.893110][ T3885] (unnamed net_device) (uninitialized): option tlb_dynamic_lb: mode dependency failed, not supported in mode balance-rr(0) [ 107.280167][ T31] audit: type=1404 audit(107.210:140): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 107.293790][ T31] audit: type=1400 audit(107.220:141): avc: denied { read } for pid=2926 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 107.302137][ T31] audit: type=1400 audit(107.230:142): avc: denied { write } for pid=2926 comm="syslogd" name="console" dev="devtmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 107.302920][ T31] audit: type=1400 audit(107.230:143): avc: denied { write } for pid=2926 comm="syslogd" name="console" dev="devtmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 107.303504][ T31] audit: type=1400 audit(107.230:144): avc: denied { write } for pid=2926 comm="syslogd" name="console" dev="devtmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 108.599298][ T3889] netlink: 4 bytes leftover after parsing attributes in process `syz.0.28'. [ 124.710833][ T31] kauditd_printk_skb: 49 callbacks suppressed [ 124.710960][ T31] audit: type=1400 audit(124.640:194): avc: denied { execute } for pid=3907 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 124.715358][ T31] audit: type=1400 audit(124.640:195): avc: denied { execute_no_trans } for pid=3907 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 124.835970][ T31] audit: type=1400 audit(124.760:196): avc: denied { read } for pid=3908 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 124.857287][ T31] audit: type=1400 audit(124.780:197): avc: denied { open } for pid=3908 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 124.858297][ T31] audit: type=1400 audit(124.780:198): avc: denied { mounton } for pid=3908 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 125.242813][ T11] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 125.352108][ T11] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 125.440823][ T11] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 125.545118][ T11] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 126.322329][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 126.362669][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 126.369432][ T11] bond0 (unregistering): Released all slaves [ 126.604397][ T31] audit: type=1400 audit(126.530:199): avc: denied { map_read map_write } for pid=3927 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 126.610003][ T11] hsr_slave_0: left promiscuous mode [ 126.642972][ T11] hsr_slave_1: left promiscuous mode [ 126.668427][ T11] veth1_macvtap: left promiscuous mode [ 126.669131][ T11] veth0_macvtap: left promiscuous mode [ 126.669642][ T11] veth1_vlan: left promiscuous mode [ 126.670185][ T11] veth0_vlan: left promiscuous mode [ 126.680835][ T31] audit: type=1400 audit(126.610:200): avc: denied { create } for pid=3927 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 126.710676][ T31] audit: type=1400 audit(126.630:201): avc: denied { write } for pid=3927 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 126.725100][ T3929] netlink: 48 bytes leftover after parsing attributes in process `syz.0.33'. [ 126.814844][ T31] audit: type=1400 audit(126.740:202): avc: denied { create } for pid=3927 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 126.849523][ T31] audit: type=1400 audit(126.770:203): avc: denied { create } for pid=3927 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 127.803935][ T3933] netlink: 4 bytes leftover after parsing attributes in process `syz.0.33'. [ 128.679354][ T3937] process 'syz.0.34' launched './file1' with NULL argv: empty string added [ 130.001960][ T3980] netlink: 48 bytes leftover after parsing attributes in process `syz.0.37'. [ 130.065607][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 130.065714][ T31] audit: type=1400 audit(129.990:230): avc: denied { remove_name } for pid=3976 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=33 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 130.144887][ T31] audit: type=1400 audit(130.070:231): avc: denied { unlink } for pid=3976 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=33 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 133.193366][ T4094] netlink: 8 bytes leftover after parsing attributes in process `syz.0.42'. [ 133.805664][ T3908] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 133.829539][ T3908] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 134.068637][ T31] audit: type=1400 audit(134.000:232): avc: denied { mounton } for pid=4113 comm="syz.0.43" path="/37/file0" dev="tmpfs" ino=225 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 134.094063][ T31] audit: type=1400 audit(134.020:233): avc: denied { mount } for pid=4113 comm="syz.0.43" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 134.216257][ T31] audit: type=1400 audit(134.140:234): avc: denied { unmount } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 134.913474][ T31] audit: type=1326 audit(134.840:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4155 comm="syz.0.45" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 134.946832][ T31] audit: type=1326 audit(134.870:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4155 comm="syz.0.45" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 135.012494][ T31] audit: type=1326 audit(134.940:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4155 comm="syz.0.45" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 135.037854][ T31] audit: type=1326 audit(134.960:238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4155 comm="syz.0.45" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 135.044048][ T31] audit: type=1326 audit(134.970:239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4155 comm="syz.0.45" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 135.090138][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 135.090194][ T31] audit: type=1326 audit(135.020:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4155 comm="syz.0.45" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 135.090841][ T31] audit: type=1326 audit(135.020:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4155 comm="syz.0.45" exe="/syz-executor" sig=0 arch=40000028 syscall=218 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 135.091285][ T31] audit: type=1326 audit(135.020:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4155 comm="syz.0.45" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 135.091721][ T31] audit: type=1326 audit(135.020:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4155 comm="syz.0.45" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 135.900834][ T3908] hsr_slave_0: entered promiscuous mode [ 135.908181][ T3908] hsr_slave_1: entered promiscuous mode [ 136.071159][ T4234] netlink: '+}[@': attribute type 3 has an invalid length. [ 136.348291][ T4275] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 136.484453][ T31] audit: type=1400 audit(136.410:246): avc: denied { setopt } for pid=4248 comm="syz.0.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 136.749699][ T31] audit: type=1400 audit(136.680:247): avc: denied { create } for pid=4295 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 136.762186][ T3908] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 136.768388][ T31] audit: type=1400 audit(136.700:248): avc: denied { setopt } for pid=4295 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 136.780834][ T3908] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 136.791438][ T31] audit: type=1400 audit(136.720:249): avc: denied { bind } for pid=4295 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 136.794102][ T3908] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 136.797164][ T31] audit: type=1400 audit(136.720:250): avc: denied { name_bind } for pid=4295 comm="syz.0.50" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 136.797602][ T31] audit: type=1400 audit(136.720:251): avc: denied { node_bind } for pid=4295 comm="syz.0.50" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 136.817295][ T3908] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 138.640638][ T3908] 8021q: adding VLAN 0 to HW filter on device bond0 [ 140.439668][ T4335] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 140.461257][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 140.461364][ T31] audit: type=1400 audit(140.380:258): avc: denied { bind } for pid=4334 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 140.472832][ T31] audit: type=1400 audit(140.400:259): avc: denied { name_bind } for pid=4334 comm="syz.0.53" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 140.478741][ T31] audit: type=1400 audit(140.400:260): avc: denied { node_bind } for pid=4334 comm="syz.0.53" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 140.543375][ T31] audit: type=1400 audit(140.460:261): avc: denied { read } for pid=4334 comm="syz.0.53" laddr=ff02::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 145.819684][ T3908] veth0_vlan: entered promiscuous mode [ 145.840534][ T4380] syz.0.60[4380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.841055][ T4380] syz.0.60[4380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.841876][ T4380] syz.0.60[4380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 145.879997][ T3908] veth1_vlan: entered promiscuous mode [ 146.090699][ T3908] veth0_macvtap: entered promiscuous mode [ 146.115669][ T3908] veth1_macvtap: entered promiscuous mode [ 146.254402][ T3908] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 146.255047][ T3908] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 146.255403][ T3908] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 146.255761][ T3908] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 146.449016][ T31] audit: type=1400 audit(146.370:262): avc: denied { mounton } for pid=3908 comm="syz-executor" path="/syzkaller.HAM6Iu/syz-tmp" dev="vda" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 146.472324][ T31] audit: type=1400 audit(146.400:263): avc: denied { mount } for pid=3908 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 146.501677][ T31] audit: type=1400 audit(146.430:264): avc: denied { mounton } for pid=3908 comm="syz-executor" path="/syzkaller.HAM6Iu/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 146.506176][ T31] audit: type=1400 audit(146.430:265): avc: denied { mounton } for pid=3908 comm="syz-executor" path="/syzkaller.HAM6Iu/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 146.542400][ T31] audit: type=1400 audit(146.470:266): avc: denied { unmount } for pid=3908 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 146.553624][ T31] audit: type=1400 audit(146.480:267): avc: denied { mounton } for pid=3908 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 146.563857][ T31] audit: type=1400 audit(146.490:268): avc: denied { mount } for pid=3908 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 146.582416][ T31] audit: type=1400 audit(146.500:269): avc: denied { mounton } for pid=3908 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 146.583499][ T31] audit: type=1400 audit(146.510:270): avc: denied { mount } for pid=3908 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 146.729188][ T31] audit: type=1400 audit(146.640:271): avc: denied { read write } for pid=3908 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 146.930805][ T4386] syz.1.32[4386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.931223][ T4386] syz.1.32[4386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 146.931976][ T4386] syz.1.32[4386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 149.455776][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::ffff:0.0.0.0]:20002. Sending cookies. [ 151.790375][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 151.790488][ T31] audit: type=1400 audit(151.720:293): avc: denied { create } for pid=4450 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 151.941460][ T4454] tmpfs: Unknown parameter 'nr_ino' [ 151.968197][ T4451] Zero length message leads to an empty skb [ 152.260244][ T31] audit: type=1400 audit(152.190:294): avc: denied { create } for pid=4456 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 152.273009][ T31] audit: type=1400 audit(152.200:295): avc: denied { connect } for pid=4456 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 152.513715][ T31] audit: type=1326 audit(152.440:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.1.87" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 152.529523][ T31] audit: type=1326 audit(152.460:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.1.87" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 152.551788][ T31] audit: type=1326 audit(152.480:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.1.87" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132ef8 code=0x7ffc0000 [ 152.552833][ T31] audit: type=1326 audit(152.480:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.1.87" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132ef8 code=0x7ffc0000 [ 152.553645][ T31] audit: type=1326 audit(152.480:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.1.87" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 152.557655][ T31] audit: type=1326 audit(152.480:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.1.87" exe="/syz-executor" sig=0 arch=40000028 syscall=426 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 152.568410][ T31] audit: type=1326 audit(152.490:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.1.87" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 153.699598][ T4477] tmpfs: Unknown parameter 'nr_ino' [ 156.533544][ T4488] syz.0.94[4488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.552207][ T4488] syz.0.94[4488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.553089][ T4488] syz.0.94[4488] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 156.751664][ T4488] bond1: entered promiscuous mode [ 156.752383][ T4488] bond1: entered allmulticast mode [ 156.753232][ T4488] 8021q: adding VLAN 0 to HW filter on device bond1 [ 156.799003][ T4488] bond1 (unregistering): Released all slaves [ 156.877447][ T4493] netlink: 12 bytes leftover after parsing attributes in process `syz.1.96'. [ 157.170394][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 157.170443][ T31] audit: type=1326 audit(157.100:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4560 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 157.172669][ T31] audit: type=1326 audit(157.100:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4560 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 157.173227][ T31] audit: type=1326 audit(157.100:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4560 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 157.180235][ T31] audit: type=1326 audit(157.110:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4560 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=337 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 157.187060][ T31] audit: type=1326 audit(157.110:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4560 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 157.215181][ T31] audit: type=1326 audit(157.130:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4560 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 157.216091][ T31] audit: type=1326 audit(157.140:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4560 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=299 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 157.220783][ T31] audit: type=1326 audit(157.140:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4560 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 157.221296][ T31] audit: type=1326 audit(157.140:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4560 comm="syz.1.97" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 157.766832][ T31] audit: type=1400 audit(157.690:326): avc: denied { sqpoll } for pid=4569 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 158.139840][ T4574] netlink: 68 bytes leftover after parsing attributes in process `syz.0.101'. [ 158.140478][ T4574] netlink: 16 bytes leftover after parsing attributes in process `syz.0.101'. [ 158.141265][ T4574] netlink: 68 bytes leftover after parsing attributes in process `syz.0.101'. [ 162.178248][ T31] kauditd_printk_skb: 335 callbacks suppressed [ 162.178325][ T31] audit: type=1326 audit(162.110:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x128c3c code=0x7ffc0000 [ 162.180523][ T31] audit: type=1326 audit(162.110:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef818 code=0x7ffc0000 [ 162.183928][ T31] audit: type=1326 audit(162.110:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=276 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 162.190471][ T31] audit: type=1326 audit(162.120:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x128c3c code=0x7ffc0000 [ 162.191244][ T31] audit: type=1326 audit(162.120:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef818 code=0x7ffc0000 [ 162.191901][ T31] audit: type=1326 audit(162.120:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=276 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 162.195227][ T31] audit: type=1326 audit(162.120:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x128c3c code=0x7ffc0000 [ 162.199198][ T31] audit: type=1326 audit(162.120:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef818 code=0x7ffc0000 [ 162.203895][ T31] audit: type=1326 audit(162.130:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=276 compat=0 ip=0x132ec0 code=0x7ffc0000 [ 162.223970][ T31] audit: type=1326 audit(162.140:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4580 comm="syz.0.104" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x128c3c code=0x7ffc0000 [ 165.282268][ T4613] netlink: 4 bytes leftover after parsing attributes in process `syz.0.112'. [ 166.908528][ T4624] netlink: 4 bytes leftover after parsing attributes in process `syz.1.116'. [ 170.613760][ T31] kauditd_printk_skb: 63 callbacks suppressed [ 170.613851][ T31] audit: type=1400 audit(170.540:735): avc: denied { unmount } for pid=3908 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 170.704304][ T31] audit: type=1400 audit(170.630:736): avc: denied { mount } for pid=4629 comm="syz.0.118" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 170.753200][ T31] audit: type=1400 audit(170.680:737): avc: denied { create } for pid=4650 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 170.800045][ T31] audit: type=1400 audit(170.720:738): avc: denied { write } for pid=4650 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 178.052163][ T4670] input: syz0 as /devices/virtual/input/input3 [ 193.965609][ T31] audit: type=1400 audit(193.890:739): avc: denied { unmount } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 197.440282][ T31] audit: type=1400 audit(197.370:740): avc: denied { audit_read } for pid=4693 comm="syz.0.132" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 197.449548][ T31] audit: type=1400 audit(197.380:741): avc: denied { nlmsg_write } for pid=4693 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 197.698957][ T31] audit: type=1400 audit(197.630:742): avc: denied { block_suspend } for pid=4695 comm="syz.0.133" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 198.545042][ T31] audit: type=1400 audit(198.470:743): avc: denied { create } for pid=4700 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 206.767075][ T31] audit: type=1400 audit(206.690:744): avc: denied { connect } for pid=4717 comm="syz.1.139" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 213.189429][ T4733] netlink: 8 bytes leftover after parsing attributes in process `syz.1.144'. [ 237.230578][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 237.310089][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 237.453371][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 237.569131][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 238.143699][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 238.162279][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 238.194034][ T11] bond0 (unregistering): Released all slaves [ 238.437710][ T11] hsr_slave_0: left promiscuous mode [ 238.445548][ T11] hsr_slave_1: left promiscuous mode [ 238.529796][ T11] veth1_macvtap: left promiscuous mode [ 238.533590][ T11] veth0_macvtap: left promiscuous mode [ 238.534242][ T11] veth1_vlan: left promiscuous mode [ 238.534698][ T11] veth0_vlan: left promiscuous mode [ 239.681022][ T4833] input: syz0 as /devices/virtual/input/input4 [ 243.523409][ T4781] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 243.552528][ T4781] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 245.991202][ T4781] hsr_slave_0: entered promiscuous mode [ 246.009028][ T4781] hsr_slave_1: entered promiscuous mode [ 246.013300][ T4781] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 246.013716][ T4781] Cannot create hsr debugfs directory [ 247.119121][ T4781] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 247.132432][ T4781] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 247.149980][ T4781] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 247.175720][ T4781] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 249.189517][ T4781] 8021q: adding VLAN 0 to HW filter on device bond0 [ 254.962737][ T4781] veth0_vlan: entered promiscuous mode [ 254.973529][ T4781] veth1_vlan: entered promiscuous mode [ 255.011555][ T4781] veth0_macvtap: entered promiscuous mode [ 255.017534][ T4781] veth1_macvtap: entered promiscuous mode [ 255.053338][ T4781] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.053709][ T4781] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.053921][ T4781] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.054112][ T4781] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.799187][ T5176] netlink: 36 bytes leftover after parsing attributes in process `syz.1.164'. [ 266.892180][ T5197] raw_sendmsg: syz.1.169 forgot to set AF_INET. Fix it! [ 279.833907][ T31] audit: type=1400 audit(279.760:745): avc: denied { nlmsg_read } for pid=5213 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 291.439913][ T31] audit: type=1400 audit(291.370:746): avc: denied { create } for pid=5220 comm="syz.0.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 293.197084][ T31] audit: type=1400 audit(293.120:747): avc: denied { setopt } for pid=5220 comm="syz.0.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 296.258898][ T5231] capability: warning: `syz.0.179' uses 32-bit capabilities (legacy support in use) [ 319.748352][ T4464] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 319.898460][ T4464] usb 1-1: Using ep0 maxpacket: 8 [ 319.949005][ T4464] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 319.949722][ T4464] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 319.950240][ T4464] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 319.950961][ T4464] usb 1-1: New USB device found, idVendor=041e, idProduct=3100, bcdDevice= 0.00 [ 319.951360][ T4464] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 319.958797][ T4464] usb 1-1: config 0 descriptor?? [ 320.524306][ T4464] creative-sb0540 0003:041E:3100.0001: unknown main item tag 0x0 [ 320.525017][ T4464] creative-sb0540 0003:041E:3100.0001: unknown main item tag 0x0 [ 320.525469][ T4464] creative-sb0540 0003:041E:3100.0001: item fetching failed at offset 4/5 [ 320.526278][ T4464] creative-sb0540 0003:041E:3100.0001: parse failed [ 320.537143][ T4464] creative-sb0540 0003:041E:3100.0001: probe with driver creative-sb0540 failed with error -22 [ 323.197725][ C0] hrtimer: interrupt took 9972000 ns [ 338.715967][ T4760] usb 1-1: USB disconnect, device number 4 [ 357.251008][ T31] audit: type=1400 audit(357.180:748): avc: denied { read } for pid=5297 comm="syz.0.194" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 357.253708][ T31] audit: type=1400 audit(357.180:749): avc: denied { open } for pid=5297 comm="syz.0.194" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 357.269511][ T31] audit: type=1400 audit(357.200:750): avc: denied { map } for pid=5297 comm="syz.0.194" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 359.310900][ T5309] netlink: 4 bytes leftover after parsing attributes in process `syz.0.198'. [ 359.718567][ T31] audit: type=1400 audit(359.650:751): avc: denied { lock } for pid=5312 comm="syz.0.200" path="socket:[5149]" dev="sockfs" ino=5149 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 379.324782][ T31] audit: type=1400 audit(379.250:752): avc: denied { create } for pid=5362 comm="syz.1.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 395.096214][ T31] audit: type=1400 audit(395.020:753): avc: denied { create } for pid=5380 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 395.101156][ T31] audit: type=1400 audit(395.030:754): avc: denied { bind } for pid=5380 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 395.124049][ T31] audit: type=1400 audit(395.050:755): avc: denied { setopt } for pid=5380 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 403.465161][ T5399] netlink: 68 bytes leftover after parsing attributes in process `syz.1.220'. [ 405.590274][ T31] audit: type=1400 audit(405.520:756): avc: denied { ioctl } for pid=5400 comm="syz.1.221" path="socket:[5227]" dev="sockfs" ino=5227 ioctlcmd=0x8b1a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 407.882579][ T4760] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 408.121592][ T4760] usb 1-1: Using ep0 maxpacket: 8 [ 408.140729][ T4760] usb 1-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 408.141522][ T4760] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 408.151692][ T4760] usb 1-1: config 0 descriptor?? [ 409.527880][ T4760] asix 1-1:0.0 (unnamed net_device) (uninitialized): Failed to write reg index 0x0000: -71 [ 409.529322][ T4760] asix 1-1:0.0 (unnamed net_device) (uninitialized): Failed to send software reset: ffffffb9 [ 409.535657][ T4760] asix 1-1:0.0: probe with driver asix failed with error -71 [ 409.579772][ T4760] usb 1-1: USB disconnect, device number 5 [ 410.517896][ T31] audit: type=1400 audit(410.440:757): avc: denied { append } for pid=5435 comm="syz.1.230" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 411.585839][ T31] audit: type=1400 audit(411.510:758): avc: denied { mounton } for pid=5432 comm="syz.0.228" path="/proc/98/task" dev="proc" ino=5268 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 427.436144][ T8] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 427.631214][ T8] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 427.631839][ T8] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 427.632400][ T8] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 427.632766][ T8] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 427.641238][ T8] usb 1-1: config 0 descriptor?? [ 428.079975][ T8] plantronics 0003:047F:FFFF.0002: ignoring exceeding usage max [ 428.090312][ T8] plantronics 0003:047F:FFFF.0002: No inputs registered, leaving [ 428.103660][ T8] plantronics 0003:047F:FFFF.0002: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 429.467978][ T31] audit: type=1400 audit(429.390:759): avc: denied { name_bind } for pid=5468 comm="syz.1.235" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 429.606149][ T5472] pim6reg1: entered promiscuous mode [ 429.608290][ T5472] pim6reg1: entered allmulticast mode [ 432.014963][ T48] usb 1-1: USB disconnect, device number 6 [ 435.729452][ T5564] veth0_vlan: entered allmulticast mode [ 436.655311][ T5576] syz.0.253[5576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.655685][ T5576] syz.0.253[5576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 436.661225][ T5576] syz.0.253[5576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 441.591118][ T5605] pim6reg1: entered promiscuous mode [ 441.593421][ T5605] pim6reg1: entered allmulticast mode [ 446.939327][ T31] audit: type=1400 audit(446.870:760): avc: denied { create } for pid=5643 comm="syz.1.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 458.291061][ T4394] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 458.474807][ T4394] usb 2-1: Using ep0 maxpacket: 16 [ 458.490771][ T4394] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 458.497828][ T4394] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 458.498240][ T4394] usb 2-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 458.499165][ T4394] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 458.503396][ T4394] usb 2-1: config 0 descriptor?? [ 458.939333][ T4394] usbhid 2-1:0.0: can't add hid device: -71 [ 458.939934][ T4394] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 458.944708][ T4394] usb 2-1: USB disconnect, device number 2 [ 459.318143][ T5822] netlink: 8 bytes leftover after parsing attributes in process `syz.1.327'. [ 462.826086][ T5841] input: syz1 as /devices/virtual/input/input5 [ 463.448866][ T31] audit: type=1400 audit(463.380:761): avc: denied { ioctl } for pid=5850 comm="syz.0.337" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5685 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 464.037795][ T31] audit: type=1400 audit(463.950:762): avc: denied { ioctl } for pid=5846 comm="syz.1.336" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 464.038757][ T31] audit: type=1400 audit(463.960:763): avc: denied { set_context_mgr } for pid=5846 comm="syz.1.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 464.118899][ T31] audit: type=1400 audit(464.050:764): avc: denied { call } for pid=5846 comm="syz.1.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 464.198093][ T31] audit: type=1400 audit(464.130:765): avc: denied { mounton } for pid=5846 comm="syz.1.336" path="/151/file0" dev="tmpfs" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 464.199498][ T5853] fuse: Bad value for 'fd' [ 465.095235][ T5854] ------------[ cut here ]------------ [ 465.097792][ T5854] WARNING: CPU: 0 PID: 5854 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 465.105536][ T5854] Modules linked in: [ 465.108636][ T5854] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 465.109536][ T5854] CPU: 0 UID: 0 PID: 5854 Comm: syz.0.337 Not tainted 6.12.0-rc3-syzkaller #0 [ 465.109899][ T5854] Hardware name: ARM-Versatile Express [ 465.110310][ T5854] Call trace: [ 465.110815][ T5854] [<81999458>] (dump_backtrace) from [<81999554>] (show_stack+0x18/0x1c) [ 465.111503][ T5854] r7:00000000 r6:82622f44 r5:00000000 r4:8203d3f8 [ 465.111793][ T5854] [<8199953c>] (show_stack) from [<819b79e4>] (dump_stack_lvl+0x54/0x7c) [ 465.112105][ T5854] [<819b7990>] (dump_stack_lvl) from [<819b7a24>] (dump_stack+0x18/0x1c) [ 465.112401][ T5854] r5:00000000 r4:82870d18 [ 465.112563][ T5854] [<819b7a0c>] (dump_stack) from [<8199a080>] (panic+0x120/0x374) [ 465.112827][ T5854] [<81999f60>] (panic) from [<802420e0>] (get_taint+0x0/0x1c) [ 465.113103][ T5854] r3:8260c5c4 r2:00000001 r1:820257d8 r0:8202d240 [ 465.113342][ T5854] r7:8048c6dc [ 465.113467][ T5854] [<8024206c>] (check_panic_on_warn) from [<80242244>] (__warn+0x80/0x188) [ 465.113768][ T5854] [<802421c4>] (__warn) from [<802424c4>] (warn_slowpath_fmt+0x178/0x1f4) [ 465.114072][ T5854] r8:00000009 r7:82054e3c r6:dfc71d24 r5:84750c00 r4:00000000 [ 465.114286][ T5854] [<80242350>] (warn_slowpath_fmt) from [<8048c6dc>] (kunmap_local_indexed+0x20c/0x224) [ 465.114632][ T5854] r10:ffefd0a8 r9:84070f00 r8:20508000 r7:fffffffe r6:00000003 r5:84750c00 [ 465.114959][ T5854] r4:ffefd000 [ 465.115115][ T5854] [<8048c4d0>] (kunmap_local_indexed) from [<80505b00>] (move_pages+0x7e8/0x149c) [ 465.115436][ T5854] r7:fffffffe r6:00000000 r5:85197810 r4:ffefb840 [ 465.115644][ T5854] [<80505318>] (move_pages) from [<80581d40>] (userfaultfd_ioctl+0x114c/0x2080) [ 465.115968][ T5854] r10:84070f00 r9:dfc71e98 r8:00000001 r7:20c16000 r6:00000000 r5:20000080 [ 465.116212][ T5854] r4:846c1000 [ 465.116377][ T5854] [<80580bf4>] (userfaultfd_ioctl) from [<8052f70c>] (sys_ioctl+0x134/0xda8) [ 465.116759][ T5854] r10:84750c00 r9:8457b6c0 r8:00000004 r7:20000080 r6:8457b6c1 r5:00000000 [ 465.117240][ T5854] r4:c028aa05 [ 465.117401][ T5854] [<8052f5d8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 465.117977][ T5854] Exception stack(0xdfc71fa8 to 0xdfc71ff0) [ 465.118430][ T5854] 1fa0: 00000000 00000000 00000004 c028aa05 20000080 00000000 [ 465.118757][ T5854] 1fc0: 00000000 00000000 00286380 00000036 00000000 00006364 003d0f00 76afd0bc [ 465.119092][ T5854] 1fe0: 76afcec0 76afceb0 00018af8 00132ec0 [ 465.119356][ T5854] r10:00000036 r9:84750c00 r8:8020029c r7:00000036 r6:00286380 r5:00000000 [ 465.119703][ T5854] r4:00000000 [ 465.122048][ T5854] Rebooting in 86400 seconds.. VM DIAGNOSIS: 04:37:55 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=82622f98 R02=00000007 R03=8262a1a8 R04=82870d18 R05=00000000 R06=82622f44 R07=00000000 R08=8202d240 R09=8048c6dc R10=00000000 R11=dfc71c94 R12=dfc71c98 R13=dfc71c88 R14=8199a010 R15=802bc95c PSR=20000093 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=dfc59ee0 R01=dfc59db8 R02=00000000 R03=00000008 R04=dfc59ef0 R05=dfc59e10 R06=2001ed80 R07=00000f66 R08=00000000 R09=851c0688 R10=00000002 R11=dfc59c94 R12=dfc59c48 R13=dfc59c08 R14=8027d344 R15=8020d02c PSR=20000093 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000