last executing test programs: 23m44.376606974s ago: executing program 1 (id=229): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) 23m32.132558005s ago: executing program 1 (id=231): pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r3 = getpid() sched_setscheduler(r3, 0x1, &(0x7f00000000c0)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) connect$inet6(r1, 0x0, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000140), 0x20, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r6, 0xc0305710, &(0x7f0000000040)={0x1, 0xff, 0x0, 0x0, 0x4}) ioctl$sock_SIOCINQ(r0, 0x5761, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000020000000500000000000000001000"/28], 0x50) r7 = fsopen(&(0x7f00000004c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) r8 = fsmount(r7, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r8, &(0x7f0000000140)='./file0\x00') readlinkat(r8, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f00000002c0)=""/204, 0xcc) readlinkat(r8, &(0x7f0000000080)='./file0/../file0/file0\x00', &(0x7f0000000440)=""/171, 0xab) 23m23.568924599s ago: executing program 1 (id=233): socket$inet6(0xa, 0x80002, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[], 0x150}}, 0x804) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x3000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_int(r4, 0x29, 0x19, 0x0, 0x0) 23m13.810279989s ago: executing program 1 (id=237): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtfilter={0x70, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x4, 0xf}, {}, {0x7, 0xc}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x40, 0x2, [@TCA_CGROUP_EMATCHES={0x3c, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x30, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x2c, 0x1, 0x0, 0x0, {{0x800, 0x7, 0x1}, {{0x0, 0x0, 0x1}, {0x3, 0x1, 0x1}}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x3, 0x6e4, 0xc}, {0x4, 0x80000000, 0x3, 0x1, 0xf, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xee4}}]}]}}]}, 0x70}, 0x1, 0x0, 0x0, 0x10}, 0x0) 23m13.070498847s ago: executing program 1 (id=238): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) write$binfmt_aout(r0, &(0x7f00000001c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0xfe, "0062ba7d82000000160000000000f738096304"}) r1 = syz_open_pts(r0, 0x80) r2 = syz_io_uring_setup(0x3bd4, &(0x7f0000000180)={0x0, 0xcc5a, 0x130c8, 0x6, 0x30e}, &(0x7f0000000100), &(0x7f0000000280)) r3 = dup3(r1, r2, 0x80000) read$watch_queue(r3, &(0x7f0000001d40)=""/4095, 0xfff) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f00000002c0)={0x5907, 0xc, 0x69e1, 0x9a3, 0x1c, "a014481d08f736c7f115622e4c2fcc076f53ba", 0x6, 0x6}) 23m10.457954277s ago: executing program 1 (id=239): syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) openat$loop_ctrl(0xffffff9c, &(0x7f00000000c0), 0x2438cc1c75303902, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x40f00, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) close(0x3) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000040)={{0x3, 0x0, 0x0, 0x0, 0x0, 0x5, 0x53b8}, 0x1, 0x80000000, 0x0, 0x5, r1, r1, 0x5}) ioctl$COMEDI_INSN(0xffffffffffffffff, 0x8028640c, 0x0) r4 = socket$kcm(0x2b, 0x1, 0x0) r5 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xa43d, 0x80, 0x3, 0x3b9}, 0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(0x0, r6, &(0x7f00000000c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r5, 0x47f6, 0x0, 0x2, 0x0, 0x0) sendmsg$inet(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x43}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2000c08d) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x4) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 22m25.461804515s ago: executing program 32 (id=239): syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) openat$loop_ctrl(0xffffff9c, &(0x7f00000000c0), 0x2438cc1c75303902, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x40f00, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) close(0x3) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000040)={{0x3, 0x0, 0x0, 0x0, 0x0, 0x5, 0x53b8}, 0x1, 0x80000000, 0x0, 0x5, r1, r1, 0x5}) ioctl$COMEDI_INSN(0xffffffffffffffff, 0x8028640c, 0x0) r4 = socket$kcm(0x2b, 0x1, 0x0) r5 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xa43d, 0x80, 0x3, 0x3b9}, 0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(0x0, r6, &(0x7f00000000c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r5, 0x47f6, 0x0, 0x2, 0x0, 0x0) sendmsg$inet(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x43}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x2000c08d) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0}, 0x4) open_tree(0xffffffffffffff9c, 0x0, 0x1001) 47.692212054s ago: executing program 0 (id=1190): r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000040)={0x5, 0x6576, 0x9}) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x100000000) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) 47.4373267s ago: executing program 0 (id=1191): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f00000000c0)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x4008094) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) r3 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/mm/ksm/run\x00', 0x1, 0x0) write$sysctl(r3, &(0x7f0000000580)='1\x00', 0x2) write$sysctl(r3, &(0x7f00000000c0)='2\x00', 0x2) 27.482792483s ago: executing program 0 (id=1200): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r2, 0xffffffffffffffff, 0x0) 26.841609674s ago: executing program 0 (id=1204): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000003"], 0x48) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000300)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0xc0086c43, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xa, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018170000", @ANYRES32=r0, @ANYBLOB="000000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r5, 0x20, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/21, 0x15}}, 0x10) 24.42132261s ago: executing program 2 (id=1205): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x28, r2, 0x7, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}]}]}, 0x28}}, 0x0) 19.389792064s ago: executing program 2 (id=1206): r0 = syz_open_procfs(0x0, &(0x7f00000004c0)='cpuset\x00') preadv(r0, 0x0, 0x0, 0xa4, 0x5519) read$FUSE(r0, &(0x7f0000005580)={0x2020}, 0x2020) 18.892198305s ago: executing program 2 (id=1207): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r3, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffff", 0x8) setsockopt$inet6_opts(r3, 0x29, 0x37, 0x0, 0x18) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000d80), 0x20000) connect$inet6(r3, &(0x7f0000000240)={0xa, 0x6e23, 0x2, @mcast1, 0x9}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000001840), 0x3b, 0x0) 6.203330171s ago: executing program 0 (id=1208): socket$inet6(0xa, 0x3, 0x3c) bind$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) close(r0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8b18, &(0x7f0000000000)={'wlan1\x00', @random="010000000700"}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000300)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)={0x60, r3, 0xb7a006d1969b963b, 0x1, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_FRAME={0x44, 0x33, @probe_request={{{}, {}, @device_a, @device_b}, @val, @val, @void, @val={0x2d, 0x1a, {0x8802, 0x3, 0x6, 0x0, {0x6, 0xd, 0x0, 0xc0, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x1, 0x95ce, 0x9}}, @val={0x72, 0x6}}}]}, 0x60}, 0x1, 0x0, 0x0, 0x8011}, 0x10) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000000)=[{&(0x7f0000000080)="2e00000010008188e6b62aa73772cc9f1ba1f848480000005e140602000000000e000a000f000000028000001294", 0x2e}], 0x1}, 0x0) 5.539322394s ago: executing program 0 (id=1209): recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003080), 0x0, 0x140, 0x0) r0 = getpid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x3, 0x5, &(0x7f0000000000)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xa0}, @call={0x85, 0x0, 0x0, 0x23}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x18000000000002a0, 0xb, 0x0, &(0x7f0000000440)="b9ff033168440372b89e14", 0x0, 0xa, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x40940, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000003c0)=0x2) readv(r4, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/135, 0x87}], 0x1) ioctl$TIOCVHANGUP(r4, 0x5437, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)={0x24, r6, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x8}]}, 0x24}}, 0xc080) sendmsg$NL80211_CMD_ASSOCIATE(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x50, r6, 0x1, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0xfffffff9, 0x9}}}}, [@NL80211_ATTR_HT_CAPABILITY_MASK={0x1e, 0x94, {0xc, 0x1, 0x5, 0x0, {0x6, 0xd41, 0x0, 0x344, 0x0, 0x1, 0x1, 0x1}, 0x300, 0x5, 0xf}}, @NL80211_ATTR_DISABLE_HT={0x4}, @NL80211_ATTR_DISABLE_VHT={0x4}]}, 0x50}}, 0x4c11) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 2.711124895s ago: executing program 2 (id=1210): rt_sigprocmask(0x0, &(0x7f0000001480)={[0xffffffffffffffff]}, 0x0, 0x8) r0 = getpgrp(0x0) r1 = gettid() openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r2, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r2, &(0x7f0000000040)={0x50, 0x0, r3, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) rt_tgsigqueueinfo(r0, r1, 0x1f, &(0x7f00000003c0)={0x26, 0x1, 0x10004}) rt_tgsigqueueinfo(r0, r1, 0x24, &(0x7f0000000040)={0xa, 0x8, 0x29b}) ppoll(0x0, 0x0, 0x0, &(0x7f0000002d40)={[0x100000001]}, 0x8) 101.415023ms ago: executing program 2 (id=1211): setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x210000000013, &(0x7f0000000500)=0x100000001, 0x4) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000400)=ANY=[], 0x8) connect$inet6(r0, &(0x7f00000003c0)={0xa, 0xfffe, 0x3000001, @mcast2, 0x6}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000240)='bridge0\x00', 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, 0x0}, 0x10) write(r0, &(0x7f00000000c0)="8f2a0a65bd8c002b0304000e0580a7b6070d63e286a5cefe", 0x5ac) 0s ago: executing program 2 (id=1212): socket$nl_route(0x10, 0x3, 0x0) fspick(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x23) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = fsopen(0x0, 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) fsmount(r3, 0x0, 0x80) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000001c00), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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"/2282], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) kernel console output (not intermixed with test programs): 1568][ T3086] cgroup: Unknown subsys name 'rlimit' [ 76.849169][ T29] audit: type=1400 audit(76.750:64): avc: denied { setattr } for pid=3086 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.853742][ T29] audit: type=1400 audit(76.760:65): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 76.856204][ T29] audit: type=1400 audit(76.760:66): avc: denied { mount } for pid=3086 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 76.983476][ T3088] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 76.986810][ T29] audit: type=1400 audit(76.890:67): avc: denied { relabelto } for pid=3088 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.993148][ T29] audit: type=1400 audit(76.900:68): avc: denied { write } for pid=3088 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 77.025589][ T29] audit: type=1400 audit(76.930:69): avc: denied { read } for pid=3086 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.030541][ T29] audit: type=1400 audit(76.930:70): avc: denied { open } for pid=3086 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 85.227784][ T3086] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 87.620782][ T29] audit: type=1400 audit(87.520:71): avc: denied { execmem } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 87.707660][ T29] audit: type=1400 audit(87.610:72): avc: denied { read } for pid=3091 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 87.711718][ T29] audit: type=1400 audit(87.610:73): avc: denied { open } for pid=3091 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 87.720310][ T29] audit: type=1400 audit(87.620:74): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 87.752898][ T29] audit: type=1400 audit(87.660:75): avc: denied { module_request } for pid=3091 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 87.754894][ T29] audit: type=1400 audit(87.660:76): avc: denied { module_request } for pid=3092 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 87.859125][ T29] audit: type=1400 audit(87.760:77): avc: denied { sys_module } for pid=3091 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 88.524464][ T29] audit: type=1400 audit(88.430:78): avc: denied { ioctl } for pid=3092 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 89.866637][ T3091] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 89.887325][ T3091] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 89.923104][ T3092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 89.952733][ T3092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 90.851288][ T3091] hsr_slave_0: entered promiscuous mode [ 90.856189][ T3091] hsr_slave_1: entered promiscuous mode [ 91.138521][ T3092] hsr_slave_0: entered promiscuous mode [ 91.143045][ T3092] hsr_slave_1: entered promiscuous mode [ 91.144446][ T3092] debugfs: 'hsr0' already exists in 'hsr' [ 91.144726][ T3092] Cannot create hsr debugfs directory [ 91.438114][ T29] audit: type=1400 audit(91.340:79): avc: denied { create } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 91.444271][ T29] audit: type=1400 audit(91.350:80): avc: denied { write } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 91.464042][ T3091] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 91.488426][ T3091] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 91.529377][ T3091] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 91.561540][ T3091] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 91.726684][ T3092] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 91.739229][ T3092] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 91.756651][ T3092] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 91.766023][ T3092] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 92.471497][ T3091] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.864384][ T3092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.697553][ T3091] veth0_vlan: entered promiscuous mode [ 95.733778][ T3091] veth1_vlan: entered promiscuous mode [ 95.843143][ T3091] veth0_macvtap: entered promiscuous mode [ 95.859709][ T3091] veth1_macvtap: entered promiscuous mode [ 95.972977][ T31] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.974007][ T31] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.974192][ T31] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.974286][ T31] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.138636][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 96.139235][ T29] audit: type=1400 audit(96.040:82): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 96.157030][ T29] audit: type=1400 audit(96.060:83): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzkaller.pRzj4R/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 96.181139][ T29] audit: type=1400 audit(96.080:84): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 96.195296][ T29] audit: type=1400 audit(96.100:85): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzkaller.pRzj4R/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 96.203139][ T29] audit: type=1400 audit(96.110:86): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzkaller.pRzj4R/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2407 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 96.231243][ T29] audit: type=1400 audit(96.130:87): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 96.244713][ T29] audit: type=1400 audit(96.150:88): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 96.250885][ T29] audit: type=1400 audit(96.150:89): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="gadgetfs" ino=2408 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 96.263025][ T29] audit: type=1400 audit(96.170:90): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 96.280877][ T29] audit: type=1400 audit(96.170:91): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 96.381700][ T3091] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 96.694797][ T3092] veth0_vlan: entered promiscuous mode [ 96.717390][ T3092] veth1_vlan: entered promiscuous mode [ 96.815973][ T3092] veth0_macvtap: entered promiscuous mode [ 96.847261][ T3092] veth1_macvtap: entered promiscuous mode [ 96.923665][ T60] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.924829][ T60] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.925331][ T60] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.925581][ T60] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.632647][ T3702] syz.1.2 uses obsolete (PF_INET,SOCK_PACKET) [ 97.662129][ T3702] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2'. [ 97.679284][ T3702] Zero length message leads to an empty skb [ 104.277013][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 104.283501][ T29] audit: type=1400 audit(104.180:104): avc: denied { bind } for pid=3715 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.299192][ T29] audit: type=1400 audit(104.200:105): avc: denied { setopt } for pid=3715 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 104.462189][ T3716] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 104.595436][ T3716] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 104.673240][ T3716] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 104.790768][ T3716] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 104.893775][ T60] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.902458][ T60] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.938143][ T60] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 104.963501][ T245] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 115.737741][ T29] audit: type=1400 audit(115.640:106): avc: denied { create } for pid=3744 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 116.077794][ T29] audit: type=1400 audit(115.980:107): avc: denied { allowed } for pid=3747 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 116.105519][ T29] audit: type=1400 audit(116.010:108): avc: denied { create } for pid=3747 comm="syz.0.11" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 116.108086][ T29] audit: type=1400 audit(116.010:109): avc: denied { map } for pid=3747 comm="syz.0.11" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3134 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 116.108802][ T29] audit: type=1400 audit(116.010:110): avc: denied { read write } for pid=3747 comm="syz.0.11" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3134 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 119.664129][ T3755] syzkaller0: entered promiscuous mode [ 119.670330][ T3755] syzkaller0: entered allmulticast mode [ 119.685555][ T29] audit: type=1400 audit(119.590:111): avc: denied { setopt } for pid=3754 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 119.700798][ T29] audit: type=1400 audit(119.600:112): avc: denied { ioctl } for pid=3754 comm="syz.1.14" path="socket:[2584]" dev="sockfs" ino=2584 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 119.707081][ T29] audit: type=1400 audit(119.610:113): avc: denied { write } for pid=3754 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 120.311068][ T3043] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 120.489236][ T3043] usb 2-1: config 0 has an invalid interface number: 158 but max is 0 [ 120.489494][ T3043] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 120.490169][ T3043] usb 2-1: config 0 has no interface number 0 [ 120.490487][ T3043] usb 2-1: New USB device found, idVendor=041e, idProduct=3f19, bcdDevice=be.65 [ 120.490534][ T3043] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 120.498557][ T3043] usb 2-1: config 0 descriptor?? [ 120.523776][ T3043] usb 2-1: unknown interface protocol 0xea, assuming v1 [ 120.524527][ T3043] usb 2-1: 158:0 : does not exist [ 120.524600][ T3043] usb 2-1: 158:0 : does not exist [ 121.005877][ T29] audit: type=1400 audit(120.910:114): avc: denied { create } for pid=3780 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 121.012275][ T29] audit: type=1400 audit(120.920:115): avc: denied { read } for pid=3780 comm="syz.0.19" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 121.017917][ T29] audit: type=1400 audit(120.920:116): avc: denied { open } for pid=3780 comm="syz.0.19" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 123.713486][ T29] audit: type=1400 audit(123.620:117): avc: denied { name_bind } for pid=3787 comm="syz.0.21" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 123.717640][ T29] audit: type=1400 audit(123.620:118): avc: denied { node_bind } for pid=3787 comm="syz.0.21" saddr=::1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 130.754933][ T3659] usb 2-1: USB disconnect, device number 2 [ 131.084778][ T29] audit: type=1400 audit(130.990:119): avc: denied { name_bind } for pid=3805 comm="syz.1.24" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 131.212123][ T29] audit: type=1400 audit(131.120:120): avc: denied { create } for pid=3807 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 131.223068][ T29] audit: type=1400 audit(131.130:121): avc: denied { write } for pid=3807 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 131.239415][ T3808] netlink: 16 bytes leftover after parsing attributes in process `syz.1.25'. [ 131.328708][ T29] audit: type=1400 audit(131.230:122): avc: denied { create } for pid=3809 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 131.345330][ T29] audit: type=1400 audit(131.240:123): avc: denied { bind } for pid=3809 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 131.354788][ T29] audit: type=1400 audit(131.260:124): avc: denied { write } for pid=3809 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 131.476443][ T29] audit: type=1400 audit(131.380:125): avc: denied { create } for pid=3811 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 131.622557][ T29] audit: type=1400 audit(131.530:126): avc: denied { bind } for pid=3811 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 132.053889][ T29] audit: type=1400 audit(131.960:127): avc: denied { setopt } for pid=3811 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 132.067112][ T29] audit: type=1400 audit(131.970:128): avc: denied { accept } for pid=3811 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 138.015644][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 138.016382][ T29] audit: type=1400 audit(137.920:132): avc: denied { ioctl } for pid=3836 comm="syz.0.32" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3219 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 143.230477][ C1] hrtimer: interrupt took 916544 ns [ 146.005611][ T29] audit: type=1400 audit(145.910:133): avc: denied { ioctl } for pid=3840 comm="syz.0.33" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 146.009285][ T29] audit: type=1400 audit(145.910:134): avc: denied { set_context_mgr } for pid=3840 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 146.023447][ T29] audit: type=1400 audit(145.930:135): avc: denied { write } for pid=3840 comm="syz.0.33" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 146.036034][ T3841] binder: BINDER_SET_CONTEXT_MGR already set [ 146.041259][ T3841] binder: 3840:3841 ioctl 4018620d 20000040 returned -16 [ 146.049520][ T3841] binder: 3840:3841 ioctl c0306201 0 returned -14 [ 146.483730][ T769] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 146.655245][ T769] usb 1-1: config 0 has an invalid interface number: 1 but max is 0 [ 146.655617][ T769] usb 1-1: config 0 has no interface number 0 [ 146.656155][ T769] usb 1-1: config 0 interface 1 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 10 [ 146.656460][ T769] usb 1-1: config 0 interface 1 altsetting 0 endpoint 0x82 has invalid maxpacket 159, setting to 8 [ 146.656780][ T769] usb 1-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 146.656906][ T769] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 146.668430][ T769] usb 1-1: config 0 descriptor?? [ 146.683625][ T3843] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 146.699303][ T769] iowarrior 1-1:0.1: IOWarrior product=0x1512, serial= interface=1 now attached to iowarrior0 [ 146.897572][ T769] usb 1-1: USB disconnect, device number 2 [ 147.016978][ T29] audit: type=1400 audit(146.920:136): avc: denied { create } for pid=3861 comm="syz.0.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 147.166733][ T29] audit: type=1400 audit(147.070:137): avc: denied { create } for pid=3863 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 147.166763][ T3864] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 156.921745][ T42] usb 1-1: new low-speed USB device number 3 using dummy_hcd [ 157.112728][ T42] usb 1-1: config 0 has an invalid interface number: 1 but max is 0 [ 157.115850][ T42] usb 1-1: config 0 has no interface number 0 [ 157.117470][ T42] usb 1-1: config 0 interface 1 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 10 [ 157.122898][ T42] usb 1-1: config 0 interface 1 altsetting 0 endpoint 0x82 has invalid maxpacket 159, setting to 8 [ 157.124334][ T42] usb 1-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 157.125458][ T42] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 157.131542][ T42] usb 1-1: config 0 descriptor?? [ 157.139698][ T3876] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 157.157762][ T42] iowarrior 1-1:0.1: IOWarrior product=0x1512, serial= interface=1 now attached to iowarrior0 [ 157.374673][ T42] usb 1-1: USB disconnect, device number 3 [ 159.377821][ T29] audit: type=1400 audit(159.280:138): avc: denied { perfmon } for pid=3906 comm="syz.1.44" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 159.450811][ T29] audit: type=1400 audit(159.350:139): avc: denied { prog_run } for pid=3906 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 161.797612][ T29] audit: type=1400 audit(161.700:140): avc: denied { sqpoll } for pid=3896 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 174.474997][ T29] audit: type=1400 audit(174.380:141): avc: denied { append } for pid=3922 comm="syz.0.49" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 185.111257][ T29] audit: type=1400 audit(184.570:142): avc: denied { bind } for pid=3929 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 185.111765][ T29] audit: type=1400 audit(184.570:143): avc: denied { node_bind } for pid=3929 comm="syz.1.51" saddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 185.112114][ T29] audit: type=1400 audit(184.580:144): avc: denied { connect } for pid=3929 comm="syz.1.51" laddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 185.112321][ T29] audit: type=1400 audit(184.590:145): avc: denied { write } for pid=3929 comm="syz.1.51" laddr=172.20.20.187 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 192.992118][ T29] audit: type=1400 audit(192.890:146): avc: denied { mounton } for pid=3946 comm="syz.1.56" path="/26/file0" dev="tmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 195.153681][ T3952] netlink: 48 bytes leftover after parsing attributes in process `syz.1.57'. [ 195.892839][ T29] audit: type=1400 audit(195.800:147): avc: denied { bind } for pid=3953 comm="syz.1.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 195.897213][ T29] audit: type=1400 audit(195.800:148): avc: denied { setopt } for pid=3953 comm="syz.1.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 196.611908][ T3957] comedi: valid board names for 8255 driver are: [ 196.614198][ T3957] 8255 [ 196.615725][ T3957] comedi: valid board names for vmk80xx driver are: [ 196.617404][ T3957] vmk80xx [ 196.618939][ T3957] comedi: valid board names for usbduxsigma driver are: [ 196.621815][ T3957] usbduxsigma [ 196.622997][ T3957] comedi: valid board names for usbduxfast driver are: [ 196.624558][ T3957] usbduxfast [ 196.625467][ T3957] comedi: valid board names for usbdux driver are: [ 196.627320][ T3957] usbdux [ 196.628218][ T3957] comedi: valid board names for ni6501 driver are: [ 196.630459][ T3957] ni6501 [ 196.631907][ T3957] comedi: valid board names for dt9812 driver are: [ 196.634665][ T3957] dt9812 [ 196.636079][ T3957] comedi: valid board names for ni_labpc_cs driver are: [ 196.638933][ T3957] ni_labpc_cs [ 196.640467][ T3957] comedi: valid board names for ni_daq_700 driver are: [ 196.643974][ T3957] ni_daq_700 [ 196.646115][ T3957] comedi: valid board names for labpc_pci driver are: [ 196.649158][ T3957] labpc_pci [ 196.651457][ T3957] comedi: valid board names for adl_pci9118 driver are: [ 196.654411][ T3957] pci9118dg [ 196.656164][ T3957] pci9118hg [ 196.657531][ T3957] pci9118hr [ 196.658731][ T3957] comedi: valid board names for 8255_pci driver are: [ 196.671295][ T3957] 8255_pci [ 196.671755][ T3957] comedi: valid board names for comedi_parport driver are: [ 196.671931][ T3957] comedi_parport [ 196.672090][ T3957] comedi: valid board names for comedi_test driver are: [ 196.672227][ T3957] comedi_test [ 196.672269][ T3957] comedi: valid board names for comedi_bond driver are: [ 196.672287][ T3957] comedi_bond [ 199.661536][ T29] audit: type=1400 audit(199.550:149): avc: denied { create } for pid=3969 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 199.669807][ T29] audit: type=1400 audit(199.570:150): avc: denied { read } for pid=3969 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 218.655132][ T3991] netlink: 4 bytes leftover after parsing attributes in process `syz.1.71'. [ 226.304158][ T4009] syzkaller0: entered promiscuous mode [ 226.308707][ T4009] syzkaller0: entered allmulticast mode [ 228.620618][ T769] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 228.780619][ T769] usb 1-1: Using ep0 maxpacket: 32 [ 228.788913][ T769] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 228.789343][ T769] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 228.789543][ T769] usb 1-1: New USB device found, idVendor=1e7d, idProduct=2d5a, bcdDevice= 0.00 [ 228.789729][ T769] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 228.823149][ T769] usb 1-1: config 0 descriptor?? [ 229.323648][ T769] savu 0003:1E7D:2D5A.0001: hiddev0,hidraw0: USB HID v0.00 Device [HID 1e7d:2d5a] on usb-dummy_hcd.0-1/input0 [ 229.594474][ T769] usb 1-1: USB disconnect, device number 4 [ 233.370678][ T769] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 233.523265][ T769] usb 2-1: Using ep0 maxpacket: 16 [ 233.586733][ T769] usb 2-1: New USB device found, idVendor=054c, idProduct=0038, bcdDevice=16.f5 [ 233.587120][ T769] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 233.587459][ T769] usb 2-1: Product: syz [ 233.587591][ T769] usb 2-1: Manufacturer: syz [ 233.587629][ T769] usb 2-1: SerialNumber: syz [ 233.602910][ T769] usb 2-1: config 0 descriptor?? [ 233.619477][ T769] visor 2-1:0.0: Sony Clie 3.5 converter detected [ 233.827222][ T769] usb 2-1: clie_3_5_startup: get config number failed: -71 [ 233.828653][ T769] visor 2-1:0.0: probe with driver visor failed with error -71 [ 233.863071][ T769] usb 2-1: USB disconnect, device number 3 [ 234.067854][ T29] audit: type=1400 audit(233.970:151): avc: denied { connect } for pid=4078 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 234.615182][ T4081] syzkaller0: entered promiscuous mode [ 234.632818][ T4081] syzkaller0: entered allmulticast mode [ 238.021352][ T29] audit: type=1400 audit(237.930:152): avc: denied { write } for pid=4089 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 238.024552][ T29] audit: type=1400 audit(237.930:153): avc: denied { nlmsg_write } for pid=4089 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 239.523318][ T29] audit: type=1400 audit(239.420:154): avc: denied { write } for pid=4094 comm="syz.0.92" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 242.686454][ T29] audit: type=1400 audit(242.590:155): avc: denied { write } for pid=4120 comm="syz.1.97" path="socket:[2977]" dev="sockfs" ino=2977 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 243.053589][ T4127] SELinux: Context system_u:object_r:insmod_exec_t:s0 is not valid (left unmapped). [ 243.061505][ T29] audit: type=1400 audit(242.960:156): avc: denied { relabelto } for pid=4126 comm="syz.1.98" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:insmod_exec_t:s0" [ 243.062102][ T29] audit: type=1400 audit(242.960:157): avc: denied { associate } for pid=4126 comm="syz.1.98" name="virtual_nci" dev="devtmpfs" ino=659 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:insmod_exec_t:s0" [ 248.621203][ T29] audit: type=1400 audit(248.530:158): avc: denied { read write } for pid=4151 comm="syz.0.103" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:insmod_exec_t:s0" [ 248.626168][ T29] audit: type=1400 audit(248.530:159): avc: denied { open } for pid=4151 comm="syz.0.103" path="/dev/virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:insmod_exec_t:s0" [ 249.706307][ T29] audit: type=1400 audit(249.610:160): avc: denied { create } for pid=4172 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 249.727656][ T29] audit: type=1400 audit(249.630:161): avc: denied { write } for pid=4172 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 249.947157][ T4175] fuse: Unknown parameter '' [ 251.850770][ T94] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 252.007565][ T94] usb 2-1: too many endpoints for config 0 interface 0 altsetting 0: 253, using maximum allowed: 30 [ 252.007986][ T94] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 252.008419][ T94] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 252.008562][ T94] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 253 [ 252.024933][ T94] usb 2-1: New USB device found, idVendor=05ac, idProduct=8243, bcdDevice=8b.40 [ 252.025168][ T94] usb 2-1: New USB device strings: Mfr=11, Product=0, SerialNumber=0 [ 252.026412][ T94] usb 2-1: Manufacturer: syz [ 252.030631][ T94] usb 2-1: config 0 descriptor?? [ 252.487638][ T94] appleir 0003:05AC:8243.0002: unknown main item tag 0x0 [ 252.493646][ T94] appleir 0003:05AC:8243.0002: hiddev0,hidraw0: USB HID v0.00 Device [syz] on usb-dummy_hcd.1-1/input0 [ 252.757555][ T4190] FAULT_INJECTION: forcing a failure. [ 252.757555][ T4190] name failslab, interval 1, probability 0, space 0, times 1 [ 252.759321][ T4190] CPU: 1 UID: 0 PID: 4190 Comm: syz.1.111 Tainted: G L syzkaller #0 PREEMPT [ 252.759712][ T4190] Tainted: [L]=SOFTLOCKUP [ 252.759766][ T4190] Hardware name: ARM-Versatile Express [ 252.760219][ T4190] Call trace: [ 252.761427][ T4190] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 252.764051][ T4190] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 252.764320][ T4190] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 252.764396][ T4190] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 252.764469][ T4190] r7:00000000 r6:00000000 r5:84d66000 r4:82918c50 [ 252.764488][ T4190] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 252.764610][ T4190] [<8099aa40>] (should_fail_ex) from [<805372e4>] (should_failslab+0x6c/0x94) [ 252.764727][ T4190] r8:84d66000 r7:00000000 r6:00000cc0 r5:00000000 r4:830013c0 [ 252.764750][ T4190] [<80537278>] (should_failslab) from [<80512494>] (__kmalloc_cache_noprof+0x54/0x45c) [ 252.764803][ T4190] [<80512440>] (__kmalloc_cache_noprof) from [<813bad5c>] (hiddev_ioctl_string.constprop.0+0x6c/0x150) [ 252.764911][ T4190] r10:85a98000 r9:e02c3000 r8:84fcd240 r7:00000001 r6:86284000 r5:20000400 [ 252.764953][ T4190] r4:b5403587 [ 252.764971][ T4190] [<813bacf0>] (hiddev_ioctl_string.constprop.0) from [<813bb65c>] (hiddev_ioctl+0x1f0/0xa0c) [ 252.765047][ T4190] r9:e02c3000 r8:84fcd240 r7:84fcd24c r6:20000400 r5:81044804 r4:00000000 [ 252.765183][ T4190] [<813bb46c>] (hiddev_ioctl) from [<80582358>] (sys_ioctl+0x244/0xb58) [ 252.765351][ T4190] r10:84d66000 r9:00000004 r8:84fff300 r7:20000400 r6:81044804 r5:84fff301 [ 252.765400][ T4190] r4:00000000 [ 252.765421][ T4190] [<80582114>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 252.765561][ T4190] Exception stack(0xe01e1fa8 to 0xe01e1ff0) [ 252.765792][ T4190] 1fa0: 00000000 00000000 00000004 81044804 20000400 00000000 [ 252.765860][ T4190] 1fc0: 00000000 00000000 0012e624 00000036 003462d8 00000000 00000001 76f5d0dc [ 252.765893][ T4190] 1fe0: 76f5ce88 76f5ce78 00018734 0012fc20 [ 252.765978][ T4190] r10:00000036 r9:84d66000 r8:8020029c r7:00000036 r6:0012e624 r5:00000000 [ 252.766015][ T4190] r4:00000000 [ 252.834059][ T94] usb 2-1: USB disconnect, device number 4 [ 252.939076][ T29] audit: type=1804 audit(252.840:162): pid=4198 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz.0.112" name="/newroot/48/file1" dev="fuse" ino=1 res=1 errno=0 [ 252.961792][ T4198] FAULT_INJECTION: forcing a failure. [ 252.961792][ T4198] name failslab, interval 1, probability 0, space 0, times 0 [ 252.962202][ T4198] CPU: 1 UID: 0 PID: 4198 Comm: syz.0.112 Tainted: G L syzkaller #0 PREEMPT [ 252.962268][ T4198] Tainted: [L]=SOFTLOCKUP [ 252.962279][ T4198] Hardware name: ARM-Versatile Express [ 252.962292][ T4198] Call trace: [ 252.962321][ T4198] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 252.962382][ T4198] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 252.962415][ T4198] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 252.962842][ T4198] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 252.963247][ T4198] r7:00000dc0 r6:00000000 r5:83823c00 r4:82918c50 [ 252.963471][ T4198] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 252.963769][ T4198] [<8099aa40>] (should_fail_ex) from [<805372e4>] (should_failslab+0x6c/0x94) [ 252.964938][ T4198] r8:00000000 r7:00000dc0 r6:00000000 r5:00000180 r4:83001480 [ 252.965069][ T4198] [<80537278>] (should_failslab) from [<805163e8>] (__kmalloc_noprof+0xa4/0x590) [ 252.965215][ T4198] [<80516344>] (__kmalloc_noprof) from [<807620ec>] (fuse_do_ioctl+0xc0/0x8ec) [ 252.967724][ T4198] r10:00000020 r9:00000000 r8:00000000 r7:862d8e80 r6:86334780 r5:00000000 [ 252.969935][ T4198] r4:00008933 [ 252.970141][ T4198] [<8076202c>] (fuse_do_ioctl) from [<807629d4>] (fuse_file_ioctl+0x50/0x64) [ 252.970296][ T4198] r10:83823c00 r9:00000003 r8:84fff600 r7:85286780 r6:00000000 r5:00008933 [ 252.970312][ T4198] r4:84fff600 [ 252.970324][ T4198] [<80762984>] (fuse_file_ioctl) from [<80582358>] (sys_ioctl+0x244/0xb58) [ 252.970367][ T4198] r7:00000000 r6:00008933 r5:84fff601 r4:00000000 [ 252.970378][ T4198] [<80582114>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 252.970407][ T4198] Exception stack(0xdfc45fa8 to 0xdfc45ff0) [ 252.970445][ T4198] 5fa0: 00000000 00000000 00000003 00008933 00000000 00000000 [ 252.970467][ T4198] 5fc0: 00000000 00000000 0012e624 00000036 003462d8 00000000 00000001 76f350dc [ 252.970482][ T4198] 5fe0: 76f34e88 76f34e78 00018734 0012fc20 [ 252.970521][ T4198] r10:00000036 r9:83823c00 r8:8020029c r7:00000036 r6:0012e624 r5:00000000 [ 252.970533][ T4198] r4:00000000 [ 256.644908][ T4232] FAULT_INJECTION: forcing a failure. [ 256.644908][ T4232] name failslab, interval 1, probability 0, space 0, times 0 [ 256.645243][ T4232] CPU: 1 UID: 0 PID: 4232 Comm: syz.0.117 Tainted: G L syzkaller #0 PREEMPT [ 256.645301][ T4232] Tainted: [L]=SOFTLOCKUP [ 256.645312][ T4232] Hardware name: ARM-Versatile Express [ 256.645325][ T4232] Call trace: [ 256.645385][ T4232] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 256.645449][ T4232] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 256.645459][ T4232] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 256.645563][ T4232] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 256.645610][ T4232] r7:00000000 r6:00000000 r5:84d63000 r4:82918c50 [ 256.645705][ T4232] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 256.645742][ T4232] [<8099aa40>] (should_fail_ex) from [<805372e4>] (should_failslab+0x6c/0x94) [ 256.645991][ T4232] r8:84d63000 r7:00000000 r6:00000cc0 r5:00000000 r4:830a1b40 [ 256.646136][ T4232] [<80537278>] (should_failslab) from [<80515564>] (kmem_cache_alloc_lru_noprof+0x58/0x454) [ 256.646219][ T4232] [<8051550c>] (kmem_cache_alloc_lru_noprof) from [<80586b34>] (__d_alloc+0x30/0x21c) [ 256.646317][ T4232] r10:00000113 r9:824a68ac r8:8365edd0 r7:84df8c00 r6:84f80008 r5:e43d9f68 [ 256.646364][ T4232] r4:8365edd0 [ 256.646384][ T4232] [<80586b04>] (__d_alloc) from [<80586d38>] (d_alloc+0x18/0x68) [ 256.646459][ T4232] r9:84d63000 r8:8365edd0 r7:e43d9f68 r6:84f80008 r5:00000000 r4:8365edd0 [ 256.646680][ T4232] [<80586d20>] (d_alloc) from [<805763bc>] (lookup_one_qstr_excl+0x7c/0xcc) [ 256.646784][ T4232] r7:e43d9f68 r6:84f80008 r5:00000000 r4:00000000 [ 256.646918][ T4232] [<80576340>] (lookup_one_qstr_excl) from [<8057cafc>] (start_removing_noperm+0x50/0x68) [ 256.647115][ T4232] r9:84d63000 r8:8365edd0 r7:84f80088 r6:e43d9f68 r5:8365edd0 r4:00000000 [ 256.647139][ T4232] [<8057caac>] (start_removing_noperm) from [<8077ac20>] (sys_mq_unlink+0xa4/0x138) [ 256.647210][ T4232] r7:84d039d0 r6:e43d9f68 r5:832e6000 r4:00000000 [ 256.647229][ T4232] [<8077ab7c>] (sys_mq_unlink) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 256.647273][ T4232] Exception stack(0xe43d9fa8 to 0xe43d9ff0) [ 256.647363][ T4232] 9fa0: 00000000 00000000 20000000 00000000 00000000 00000000 [ 256.647441][ T4232] 9fc0: 00000000 00000000 0012e624 00000113 003462d8 00000000 00000001 76f350dc [ 256.647490][ T4232] 9fe0: 76f34e88 76f34e78 00018734 0012fc20 [ 256.647528][ T4232] r8:8020029c r7:00000113 r6:0012e624 r5:00000000 r4:00000000 [ 259.721421][ T4241] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 259.727775][ T29] audit: type=1400 audit(259.630:163): avc: denied { getopt } for pid=4240 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 260.001051][ T94] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 260.195136][ T94] usb 1-1: too many endpoints for config 0 interface 0 altsetting 0: 253, using maximum allowed: 30 [ 260.195561][ T94] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 260.195840][ T94] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 260.196011][ T94] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 253 [ 260.240223][ T94] usb 1-1: New USB device found, idVendor=05ac, idProduct=8243, bcdDevice=8b.40 [ 260.240616][ T94] usb 1-1: New USB device strings: Mfr=11, Product=0, SerialNumber=0 [ 260.240792][ T94] usb 1-1: Manufacturer: syz [ 260.252817][ T94] usb 1-1: config 0 descriptor?? [ 260.761150][ T94] appleir 0003:05AC:8243.0003: unknown main item tag 0x0 [ 260.765634][ T94] appleir 0003:05AC:8243.0003: hiddev0,hidraw0: USB HID v0.00 Device [syz] on usb-dummy_hcd.0-1/input0 [ 261.068683][ T94] usb 1-1: USB disconnect, device number 5 [ 263.909426][ T29] audit: type=1400 audit(263.810:164): avc: denied { create } for pid=4270 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 263.924204][ T29] audit: type=1400 audit(263.830:165): avc: denied { ioctl } for pid=4270 comm="syz.0.122" path="socket:[3586]" dev="sockfs" ino=3586 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 265.595618][ T29] audit: type=1400 audit(265.500:166): avc: denied { read } for pid=4273 comm="syz.1.123" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 265.598836][ T29] audit: type=1400 audit(265.500:167): avc: denied { open } for pid=4273 comm="syz.1.123" path="/64/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 265.613805][ T4276] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 265.615583][ T4276] block device autoloading is deprecated and will be removed. [ 265.624305][ T29] audit: type=1400 audit(265.530:168): avc: denied { ioctl } for pid=4273 comm="syz.1.123" path="/64/file0/file0" dev="fuse" ino=64 ioctlcmd=0x301 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 266.443130][ T4285] FAULT_INJECTION: forcing a failure. [ 266.443130][ T4285] name failslab, interval 1, probability 0, space 0, times 0 [ 266.443531][ T4285] CPU: 1 UID: 0 PID: 4285 Comm: syz.1.125 Tainted: G L syzkaller #0 PREEMPT [ 266.443599][ T4285] Tainted: [L]=SOFTLOCKUP [ 266.443610][ T4285] Hardware name: ARM-Versatile Express [ 266.443623][ T4285] Call trace: [ 266.443655][ T4285] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 266.443729][ T4285] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 266.443739][ T4285] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 266.443836][ T4285] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 266.443884][ T4285] r7:00000000 r6:00000000 r5:83924800 r4:82918c50 [ 266.443938][ T4285] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 266.444020][ T4285] [<8099aa40>] (should_fail_ex) from [<805372e4>] (should_failslab+0x6c/0x94) [ 266.444160][ T4285] r8:83924800 r7:00000000 r6:00000cc0 r5:00000000 r4:830a1b40 [ 266.444292][ T4285] [<80537278>] (should_failslab) from [<80515564>] (kmem_cache_alloc_lru_noprof+0x58/0x454) [ 266.444403][ T4285] [<8051550c>] (kmem_cache_alloc_lru_noprof) from [<80586b34>] (__d_alloc+0x30/0x21c) [ 266.444479][ T4285] r10:00000015 r9:824a68ac r8:82ad4b1c r7:861ce000 r6:737cc7ba r5:ea4f5e70 [ 266.444503][ T4285] r4:ea4f5de8 [ 266.444759][ T4285] [<80586b04>] (__d_alloc) from [<8058a100>] (d_alloc_parallel+0x60/0x4f0) [ 266.444847][ T4285] r9:852a8990 r8:82ad4b1c r7:93f1d520 r6:737cc7ba r5:82ad5458 r4:ea4f5de8 [ 266.445074][ T4285] [<8058a0a0>] (d_alloc_parallel) from [<80576788>] (__lookup_slow+0x5c/0x140) [ 266.445296][ T4285] r10:00000015 r9:00000000 r8:ea4f5e70 r7:85287400 r6:00000001 r5:852a8990 [ 266.445355][ T4285] r4:85287480 [ 266.445373][ T4285] [<8057672c>] (__lookup_slow) from [<805768a4>] (lookup_slow+0x38/0x50) [ 266.445464][ T4285] r9:00000000 r8:ea4f5f6c r7:00000001 r6:ea4f5e70 r5:852a8990 r4:85287480 [ 266.445545][ T4285] [<8057686c>] (lookup_slow) from [<8057aa88>] (path_lookupat+0x198/0x2a4) [ 266.445685][ T4285] r7:00000101 r6:ea4f5f6c r5:00000000 r4:ea4f5e68 [ 266.445947][ T4285] [<8057a8f0>] (path_lookupat) from [<8057c5b8>] (filename_lookup+0xd8/0x1a8) [ 266.446154][ T4285] r9:00000000 r8:ea4f5f6c r7:00000001 r6:83924800 r5:832e6000 r4:ffffff9c [ 266.446475][ T4285] [<8057c4e0>] (filename_lookup) from [<8057c7c0>] (user_path_at+0x4c/0x68) [ 266.446540][ T4285] r9:83924800 r8:00000000 r7:ea4f5f6c r6:ffffff9c r5:00000001 r4:832e6000 [ 266.446606][ T4285] [<8057c774>] (user_path_at) from [<8059bd3c>] (sys_mount+0x1bc/0x260) [ 266.446804][ T4285] r7:00000000 r6:00000000 r5:00000000 r4:00000000 [ 266.446830][ T4285] [<8059bb80>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 266.446958][ T4285] Exception stack(0xea4f5fa8 to 0xea4f5ff0) [ 266.447199][ T4285] 5fa0: 00000000 00000000 00000000 20000080 00000000 02009c71 [ 266.447539][ T4285] 5fc0: 00000000 00000000 0012e624 00000015 00346378 00000000 003d0f00 76f3c0dc [ 266.447628][ T4285] 5fe0: 76f3be88 76f3be78 00018734 0012fc20 [ 266.447757][ T4285] r10:00000015 r9:83924800 r8:8020029c r7:00000015 r6:0012e624 r5:00000000 [ 266.447971][ T4285] r4:00000000 [ 268.533415][ T4299] FAULT_INJECTION: forcing a failure. [ 268.533415][ T4299] name failslab, interval 1, probability 0, space 0, times 0 [ 268.534564][ T4299] CPU: 1 UID: 0 PID: 4299 Comm: syz.0.129 Tainted: G L syzkaller #0 PREEMPT [ 268.534891][ T4299] Tainted: [L]=SOFTLOCKUP [ 268.534925][ T4299] Hardware name: ARM-Versatile Express [ 268.535269][ T4299] Call trace: [ 268.535674][ T4299] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 268.536385][ T4299] r7:60000113 r6:60000113 r5:822a2700 r4:00000000 [ 268.536445][ T4299] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 268.536485][ T4299] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 268.536521][ T4299] r7:00000000 r6:00000000 r5:83926c00 r4:82918c50 [ 268.536532][ T4299] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 268.536566][ T4299] [<8099aa40>] (should_fail_ex) from [<805372e4>] (should_failslab+0x6c/0x94) [ 268.536606][ T4299] r8:83926c00 r7:00000000 r6:00000dc0 r5:00000000 r4:832ae000 [ 268.536617][ T4299] [<80537278>] (should_failslab) from [<80515110>] (kmem_cache_alloc_noprof+0x54/0x450) [ 268.536699][ T4299] [<805150bc>] (kmem_cache_alloc_noprof) from [<8074bb50>] (fuse_request_alloc+0x24/0x84) [ 268.537044][ T4299] r10:83926c00 r9:00000001 r8:8291fb18 r7:85a5d880 r6:85a5d880 r5:82ae4c10 [ 268.537162][ T4299] r4:86d85400 [ 268.537195][ T4299] [<8074bb2c>] (fuse_request_alloc) from [<8074c5ec>] (fuse_get_req+0x1b4/0x2d8) [ 268.537271][ T4299] r7:85a5d880 r6:86d854d8 r5:00000000 r4:86d85400 [ 268.537284][ T4299] [<8074c438>] (fuse_get_req) from [<8074d018>] (__fuse_simple_request+0x54/0x4f4) [ 268.537334][ T4299] r10:0000003d r9:e43adec8 r8:8291fb18 r7:83926c00 r6:e43adec8 r5:86d85400 [ 268.537347][ T4299] r4:85a5d880 [ 268.537358][ T4299] [<8074cfc4>] (__fuse_simple_request) from [<80754f3c>] (fuse_permission+0x2a4/0x338) [ 268.537401][ T4299] r8:e43adec0 r7:86d85400 r6:85a5d880 r5:00000000 r4:00000001 [ 268.537412][ T4299] [<80754c98>] (fuse_permission) from [<80576bc8>] (inode_permission+0xfc/0x16c) [ 268.537484][ T4299] r10:0000003d r9:83926c00 r8:8020029c r7:00000000 r6:8291fa94 r5:00000041 [ 268.537498][ T4299] r4:836f4a00 [ 268.537533][ T4299] [<80576acc>] (inode_permission) from [<80562c40>] (sys_chroot+0x64/0x104) [ 268.537618][ T4299] r9:83926c00 r8:8020029c r7:00000002 r6:83926c00 r5:20000500 r4:00000000 [ 268.537631][ T4299] [<80562bdc>] (sys_chroot) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 268.537754][ T4299] Exception stack(0xe43adfa8 to 0xe43adff0) [ 268.537886][ T4299] dfa0: 00000000 00000000 20000500 00000000 00000000 00000000 [ 268.537928][ T4299] dfc0: 00000000 00000000 0012e624 0000003d 003462d8 00000000 00000001 76f350dc [ 268.537949][ T4299] dfe0: 76f34e88 76f34e78 00018734 0012fc20 [ 268.537996][ T4299] r7:0000003d r6:0012e624 r5:00000000 r4:00000000 [ 268.576594][ T4304] FAULT_INJECTION: forcing a failure. [ 268.576594][ T4304] name failslab, interval 1, probability 0, space 0, times 0 [ 268.577063][ T4304] CPU: 1 UID: 0 PID: 4304 Comm: syz.1.130 Tainted: G L syzkaller #0 PREEMPT [ 268.577140][ T4304] Tainted: [L]=SOFTLOCKUP [ 268.577152][ T4304] Hardware name: ARM-Versatile Express [ 268.577168][ T4304] Call trace: [ 268.577201][ T4304] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 268.577270][ T4304] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 268.577282][ T4304] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 268.577385][ T4304] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 268.577642][ T4304] r7:00000000 r6:00000000 r5:84d60c00 r4:82918c50 [ 268.577792][ T4304] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 268.577829][ T4304] [<8099aa40>] (should_fail_ex) from [<805372e4>] (should_failslab+0x6c/0x94) [ 268.577883][ T4304] r8:84d60c00 r7:00000000 r6:00000cc0 r5:00000000 r4:830a1b40 [ 268.578001][ T4304] [<80537278>] (should_failslab) from [<80515564>] (kmem_cache_alloc_lru_noprof+0x58/0x454) [ 268.578221][ T4304] [<8051550c>] (kmem_cache_alloc_lru_noprof) from [<80586b34>] (__d_alloc+0x30/0x21c) [ 268.578390][ T4304] r10:8339cc00 r9:824a68ac r8:832a4310 r7:8339cc00 r6:81e56e00 r5:e8441e28 [ 268.578407][ T4304] r4:00000802 [ 268.578432][ T4304] [<80586b04>] (__d_alloc) from [<80589f64>] (d_alloc_pseudo+0x10/0x3c) [ 268.578474][ T4304] r9:829f4c50 r8:832a4310 r7:84d60c00 r6:81e56e00 r5:855cf700 r4:00000802 [ 268.578485][ T4304] [<80589f54>] (d_alloc_pseudo) from [<8056975c>] (alloc_file_pseudo+0x6c/0x104) [ 268.578511][ T4304] [<805696f0>] (alloc_file_pseudo) from [<8158d100>] (sock_alloc_file+0x48/0xc4) [ 268.578603][ T4304] r10:81e7d9b8 r9:200002c0 r8:200002c0 r7:00000000 r6:855cf700 r5:855cf680 [ 268.578614][ T4304] r4:855cfb80 [ 268.578624][ T4304] [<8158d0b8>] (sock_alloc_file) from [<81590b2c>] (do_accept+0xa0/0x174) [ 268.578658][ T4304] r6:e8441f5c r5:855cf680 r4:855cfb80 [ 268.578668][ T4304] [<81590a8c>] (do_accept) from [<81590c88>] (__sys_accept4+0x88/0x108) [ 268.578710][ T4304] r10:0000016e r9:200002c0 r8:84fff600 r7:00000000 r6:00000800 r5:84fff601 [ 268.578721][ T4304] r4:00000006 [ 268.578732][ T4304] [<81590c00>] (__sys_accept4) from [<81590d18>] (sys_accept4+0x10/0x14) [ 268.578937][ T4304] r9:84d60c00 r8:8020029c r7:0000016e r6:0012e624 r5:00000000 r4:00000000 [ 268.579017][ T4304] [<81590d08>] (sys_accept4) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 268.579290][ T4304] Exception stack(0xe8441fa8 to 0xe8441ff0) [ 268.579408][ T4304] 1fa0: 00000000 00000000 00000003 00000000 200002c0 00000800 [ 268.579473][ T4304] 1fc0: 00000000 00000000 0012e624 0000016e 003462d8 00000000 00000001 76f5d0dc [ 268.579796][ T4304] 1fe0: 76f5ce88 76f5ce78 00018734 0012fc20 [ 268.756147][ T4306] capability: warning: `syz.1.131' uses 32-bit capabilities (legacy support in use) [ 268.822143][ T29] audit: type=1400 audit(268.730:169): avc: denied { nlmsg_write } for pid=4305 comm="syz.1.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 270.598368][ T29] audit: type=1400 audit(270.500:170): avc: denied { setattr } for pid=4308 comm="syz.0.132" name="NETLINK" dev="sockfs" ino=4231 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 270.631315][ T29] audit: type=1400 audit(270.540:171): avc: denied { getopt } for pid=4308 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 271.319266][ T4316] FAULT_INJECTION: forcing a failure. [ 271.319266][ T4316] name failslab, interval 1, probability 0, space 0, times 0 [ 271.330529][ T4316] CPU: 0 UID: 0 PID: 4316 Comm: syz.1.134 Tainted: G L syzkaller #0 PREEMPT [ 271.330723][ T4316] Tainted: [L]=SOFTLOCKUP [ 271.330749][ T4316] Hardware name: ARM-Versatile Express [ 271.330890][ T4316] Call trace: [ 271.330951][ T4316] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 271.331076][ T4316] r7:60000113 r6:60000113 r5:822a2700 r4:00000000 [ 271.331099][ T4316] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 271.331160][ T4316] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 271.331226][ T4316] r7:00000d40 r6:00000000 r5:84180c00 r4:82918c50 [ 271.331246][ T4316] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 271.331308][ T4316] [<8099aa40>] (should_fail_ex) from [<805372e4>] (should_failslab+0x6c/0x94) [ 271.331412][ T4316] r8:00000000 r7:00000d40 r6:00000000 r5:00000014 r4:83001240 [ 271.331436][ T4316] [<80537278>] (should_failslab) from [<805163e8>] (__kmalloc_noprof+0xa4/0x590) [ 271.331494][ T4316] [<80516344>] (__kmalloc_noprof) from [<807e0624>] (tomoyo_encode2+0x64/0xec) [ 271.331674][ T4316] r10:84180c00 r9:ea589f6c r8:822f0804 r7:822f0804 r6:00000000 r5:822f080c [ 271.331699][ T4316] r4:822f0803 [ 271.331731][ T4316] [<807e05c0>] (tomoyo_encode2) from [<807e06d0>] (tomoyo_encode+0x24/0x30) [ 271.331808][ T4316] r9:ea589f6c r8:822f0804 r7:822f0804 r6:00000000 r5:00000000 r4:822f0804 [ 271.331857][ T4316] [<807e06ac>] (tomoyo_encode) from [<807dec78>] (tomoyo_mount_acl+0x80/0x388) [ 271.331923][ T4316] r5:00000000 r4:ea589e58 [ 271.331945][ T4316] [<807debf8>] (tomoyo_mount_acl) from [<807df068>] (tomoyo_mount_permission+0xe8/0x208) [ 271.332019][ T4316] r10:84180c00 r9:807e10d8 r8:822f0804 r7:ea589f6c r6:00000000 r5:01032005 [ 271.332045][ T4316] r4:00000000 [ 271.332065][ T4316] [<807def80>] (tomoyo_mount_permission) from [<807e10f4>] (tomoyo_sb_mount+0x1c/0x24) [ 271.332136][ T4316] r8:00000000 r7:01032025 r6:00000000 r5:ea589f6c r4:00000000 [ 271.332157][ T4316] [<807e10d8>] (tomoyo_sb_mount) from [<807967b8>] (security_sb_mount+0xa4/0x238) [ 271.332318][ T4316] [<80796714>] (security_sb_mount) from [<8059ac4c>] (path_mount+0x78/0xb54) [ 271.332399][ T4316] r9:00000000 r8:00000000 r7:00000000 r6:ea589f6c r5:01032025 r4:00000000 [ 271.332451][ T4316] [<8059abd4>] (path_mount) from [<8059bd5c>] (sys_mount+0x1dc/0x260) [ 271.332531][ T4316] r10:00000015 r9:84180c00 r8:00000000 r7:00000000 r6:00000000 r5:00000000 [ 271.332581][ T4316] r4:00000000 [ 271.332604][ T4316] [<8059bb80>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 271.332659][ T4316] Exception stack(0xea589fa8 to 0xea589ff0) [ 271.332703][ T4316] 9fa0: 00000000 00000000 00000000 200000c0 00000000 01032025 [ 271.332756][ T4316] 9fc0: 00000000 00000000 0012e624 00000015 003462d8 00000000 00000001 76f5d0dc [ 271.332787][ T4316] 9fe0: 76f5ce88 76f5ce78 00018734 0012fc20 [ 271.332827][ T4316] r10:00000015 r9:84180c00 r8:8020029c r7:00000015 r6:0012e624 r5:00000000 [ 271.332850][ T4316] r4:00000000 [ 272.218848][ T29] audit: type=1400 audit(272.120:172): avc: denied { create } for pid=4323 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 272.236861][ T29] audit: type=1400 audit(272.140:173): avc: denied { write } for pid=4323 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 272.315092][ T29] audit: type=1400 audit(272.220:174): avc: denied { create } for pid=4323 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 272.340529][ T29] audit: type=1400 audit(272.240:175): avc: denied { ioctl } for pid=4323 comm="syz.0.136" path="socket:[4246]" dev="sockfs" ino=4246 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 272.387904][ T29] audit: type=1400 audit(272.290:176): avc: denied { write } for pid=4323 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 273.034212][ T4318] FAULT_INJECTION: forcing a failure. [ 273.034212][ T4318] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 273.034860][ T4318] CPU: 1 UID: 0 PID: 4318 Comm: syz.1.135 Tainted: G L syzkaller #0 PREEMPT [ 273.035016][ T4318] Tainted: [L]=SOFTLOCKUP [ 273.035052][ T4318] Hardware name: ARM-Versatile Express [ 273.035080][ T4318] Call trace: [ 273.035133][ T4318] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 273.035255][ T4318] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 273.035279][ T4318] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 273.035337][ T4318] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 273.035435][ T4318] r7:2000034a r6:00000000 r5:84180000 r4:8294f8d0 [ 273.035458][ T4318] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 273.035609][ T4318] [<8099aa40>] (should_fail_ex) from [<8099ac78>] (should_fail+0x14/0x18) [ 273.035753][ T4318] r8:20000340 r7:2000034a r6:85f7c018 r5:00000007 r4:ea589f58 [ 273.035805][ T4318] [<8099ac64>] (should_fail) from [<8099ac98>] (should_fail_usercopy+0x1c/0x20) [ 273.035968][ T4318] [<8099ac7c>] (should_fail_usercopy) from [<80582ea4>] (filldir+0x194/0x24c) [ 273.036100][ T4318] [<80582d10>] (filldir) from [<80760a90>] (fuse_emit+0x68/0x320) [ 273.036258][ T4318] r10:00000020 r9:852875f0 r8:ded01b8c r7:85287618 r6:80582d10 r5:85f7c000 [ 273.036355][ T4318] r4:ea589f58 [ 273.036523][ T4318] [<80760a28>] (fuse_emit) from [<80761424>] (fuse_readdir_uncached+0x250/0x380) [ 273.036710][ T4318] r10:00000068 r9:00001000 r8:85f7c000 r7:ea589f58 r6:00001000 r5:00000020 [ 273.036853][ T4318] r4:00001000 [ 273.036879][ T4318] [<807611d4>] (fuse_readdir_uncached) from [<807616a4>] (fuse_readdir+0x150/0x778) [ 273.036979][ T4318] r10:0000008d r9:ea589f58 r8:85287480 r7:85287400 r6:ea589f58 r5:85287400 [ 273.037005][ T4318] r4:860f0a80 [ 273.037119][ T4318] [<80761554>] (fuse_readdir) from [<80583240>] (iterate_dir+0xa8/0x248) [ 273.037323][ T4318] r10:0000008d r9:84180000 r8:85287480 r7:85287400 r6:ea589f58 r5:85b54d80 [ 273.037449][ T4318] r4:00000000 [ 273.037968][ T4318] [<80583198>] (iterate_dir) from [<80583454>] (sys_getdents+0x74/0x124) [ 273.038329][ T4318] r8:8020029c r7:85b54d80 r6:00000097 r5:20000340 r4:85b54d83 [ 273.038471][ T4318] [<805833e0>] (sys_getdents) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 273.038538][ T4318] Exception stack(0xea589fa8 to 0xea589ff0) [ 273.038586][ T4318] 9fa0: 00000000 00000000 00000004 20000340 00000097 00000000 [ 273.038776][ T4318] 9fc0: 00000000 00000000 0012e624 0000008d 003462d8 00000000 00000001 76f5d0dc [ 273.038967][ T4318] 9fe0: 76f5ce88 76f5ce78 00018734 0012fc20 [ 273.039121][ T4318] r7:0000008d r6:0012e624 r5:00000000 r4:00000000 [ 273.096409][ T29] audit: type=1400 audit(273.000:177): avc: denied { ioctl } for pid=4330 comm="syz.0.139" path="socket:[3705]" dev="sockfs" ino=3705 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 273.104472][ T29] audit: type=1400 audit(273.010:178): avc: denied { getopt } for pid=4330 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 273.118167][ T29] audit: type=1400 audit(273.020:179): avc: denied { write } for pid=4330 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 273.255813][ T29] audit: type=1400 audit(273.160:180): avc: denied { setopt } for pid=4333 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 274.188019][ T4346] FAULT_INJECTION: forcing a failure. [ 274.188019][ T4346] name failslab, interval 1, probability 0, space 0, times 0 [ 274.188805][ T4346] CPU: 1 UID: 0 PID: 4346 Comm: syz.1.143 Tainted: G L syzkaller #0 PREEMPT [ 274.188923][ T4346] Tainted: [L]=SOFTLOCKUP [ 274.188946][ T4346] Hardware name: ARM-Versatile Express [ 274.188983][ T4346] Call trace: [ 274.189038][ T4346] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 274.189332][ T4346] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 274.189592][ T4346] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 274.189969][ T4346] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 274.190179][ T4346] r7:00000000 r6:00000000 r5:84d61800 r4:82918c50 [ 274.190377][ T4346] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 274.190634][ T4346] [<8099aa40>] (should_fail_ex) from [<805372e4>] (should_failslab+0x6c/0x94) [ 274.190782][ T4346] r8:84d61800 r7:00000000 r6:00000cc0 r5:00000000 r4:832ae240 [ 274.190839][ T4346] [<80537278>] (should_failslab) from [<805159b8>] (kmem_cache_alloc_node_noprof+0x58/0x458) [ 274.190910][ T4346] [<80515960>] (kmem_cache_alloc_node_noprof) from [<8159c054>] (__alloc_skb+0x90/0x198) [ 274.191003][ T4346] r10:802c0778 r9:ea7c1e10 r8:00000cc0 r7:832ae240 r6:00000000 r5:ffffffff [ 274.191033][ T4346] r4:00000000 [ 274.191053][ T4346] [<8159bfc4>] (__alloc_skb) from [<815a4a40>] (alloc_skb_with_frags+0x44/0x1f0) [ 274.191129][ T4346] r8:7fffffff r7:85db50d8 r6:0000ff7f r5:84d61800 r4:00000003 [ 274.191205][ T4346] [<815a49fc>] (alloc_skb_with_frags) from [<8159500c>] (sock_alloc_send_pskb+0x1f4/0x228) [ 274.191274][ T4346] r10:802c0778 r9:ea7c1e10 r8:7fffffff r7:85db50d8 r6:ea7c1d84 r5:84d61800 [ 274.191296][ T4346] r4:85db5000 [ 274.191315][ T4346] [<81594e18>] (sock_alloc_send_pskb) from [<81917aac>] (packet_sendmsg+0x924/0x17e4) [ 274.191434][ T4346] r10:85e6fb4c r9:00000010 r8:85e6f800 r7:ea7c1ea8 r6:ea7c1e98 r5:0000ff9f [ 274.191458][ T4346] r4:85db5000 [ 274.191478][ T4346] [<81917188>] (packet_sendmsg) from [<8158e5c4>] (__sock_sendmsg+0x44/0x78) [ 274.191549][ T4346] r10:00000122 r9:84fd0600 r8:836f7b80 r7:20000080 r6:836f7b80 r5:ea7c1e98 [ 274.191571][ T4346] r4:00000000 [ 274.191588][ T4346] [<8158e580>] (__sock_sendmsg) from [<81591204>] (__sys_sendto+0x110/0x160) [ 274.191651][ T4346] r7:20000080 r6:84fd0601 r5:0400c010 r4:00000000 [ 274.191671][ T4346] [<815910f4>] (__sys_sendto) from [<81591270>] (sys_sendto+0x1c/0x24) [ 274.191736][ T4346] r9:84d61800 r8:8020029c r7:00000122 r6:0012e624 r5:00000014 r4:20000080 [ 274.191754][ T4346] [<81591254>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 274.191801][ T4346] Exception stack(0xea7c1fa8 to 0xea7c1ff0) [ 274.191845][ T4346] 1fa0: 20000080 00000014 00000003 20000140 0000ffa9 0400c010 [ 274.191884][ T4346] 1fc0: 20000080 00000014 0012e624 00000122 003462d8 00000000 00000001 76f5d0dc [ 274.192072][ T4346] 1fe0: 76f5ce88 76f5ce78 00018734 0012fc20 [ 279.893156][ T4368] FAULT_INJECTION: forcing a failure. [ 279.893156][ T4368] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 279.896738][ T4368] CPU: 0 UID: 0 PID: 4368 Comm: syz.1.149 Tainted: G L syzkaller #0 PREEMPT [ 279.896938][ T4368] Tainted: [L]=SOFTLOCKUP [ 279.896964][ T4368] Hardware name: ARM-Versatile Express [ 279.896993][ T4368] Call trace: [ 279.897053][ T4368] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 279.897295][ T4368] r7:60000013 r6:60000013 r5:822a2700 r4:00000000 [ 279.897323][ T4368] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 279.897384][ T4368] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 279.897449][ T4368] r7:830ff040 r6:00000000 r5:84d65400 r4:8294f8d0 [ 279.897468][ T4368] [<8021edb0>] (dump_stack) from [<8099ac00>] (should_fail_ex+0x1c0/0x224) [ 279.897526][ T4368] [<8099aa40>] (should_fail_ex) from [<8099ac78>] (should_fail+0x14/0x18) [ 279.897654][ T4368] r8:00000020 r7:830ff040 r6:20000240 r5:84595014 r4:ea8bde10 [ 279.897678][ T4368] [<8099ac64>] (should_fail) from [<8099ac98>] (should_fail_usercopy+0x1c/0x20) [ 279.897734][ T4368] [<8099ac7c>] (should_fail_usercopy) from [<814c0094>] (snd_mixer_oss_ioctl1+0x950/0xb14) [ 279.897808][ T4368] [<814bf744>] (snd_mixer_oss_ioctl1) from [<814c02a8>] (snd_mixer_oss_ioctl_card+0x50/0x90) [ 279.897879][ T4368] r10:84d65400 r9:00000003 r8:85b54840 r7:85d52700 r6:20000240 r5:85b54841 [ 279.897903][ T4368] r4:805c4d65 [ 279.897921][ T4368] [<814c0258>] (snd_mixer_oss_ioctl_card) from [<814c5820>] (snd_pcm_oss_ioctl+0x170/0xf44) [ 279.897975][ T4368] [<814c56b0>] (snd_pcm_oss_ioctl) from [<80582358>] (sys_ioctl+0x244/0xb58) [ 279.898056][ T4368] r10:84d65400 r9:00000003 r8:85b54840 r7:20000240 r6:805c4d65 r5:85b54841 [ 279.898081][ T4368] r4:00000000 [ 279.898100][ T4368] [<80582114>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 279.898153][ T4368] Exception stack(0xea8bdfa8 to 0xea8bdff0) [ 279.898229][ T4368] dfa0: 00000000 00000000 00000003 805c4d65 20000240 00000000 [ 279.898504][ T4368] dfc0: 00000000 00000000 0012e624 00000036 003462d8 00000000 00000001 76f5d0dc [ 279.898549][ T4368] dfe0: 76f5ce88 76f5ce78 00018734 0012fc20 [ 279.898602][ T4368] r10:00000036 r9:84d65400 r8:8020029c r7:00000036 r6:0012e624 r5:00000000 [ 279.898651][ T4368] r4:00000000 [ 281.907682][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 281.909062][ T29] audit: type=1400 audit(281.810:182): avc: denied { map } for pid=4380 comm="syz.0.153" path="/dev/usbmon2" dev="devtmpfs" ino=690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 284.652822][ T29] audit: type=1400 audit(284.560:183): avc: denied { ioctl } for pid=4387 comm="syz.1.155" path="socket:[3783]" dev="sockfs" ino=3783 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 285.433100][ T29] audit: type=1400 audit(285.340:184): avc: denied { ioctl } for pid=4398 comm="syz.0.159" path="socket:[4354]" dev="sockfs" ino=4354 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 285.560922][ T29] audit: type=1400 audit(285.460:185): avc: denied { bind } for pid=4398 comm="syz.0.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 285.569312][ T29] audit: type=1400 audit(285.470:186): avc: denied { write } for pid=4398 comm="syz.0.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 286.098022][ T29] audit: type=1400 audit(286.000:187): avc: denied { write } for pid=4398 comm="syz.0.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 286.216048][ T29] audit: type=1400 audit(286.120:188): avc: denied { associate } for pid=4402 comm="syz.0.160" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 287.110481][ T3659] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 287.240734][ T3659] usb 1-1: device descriptor read/64, error -71 [ 287.480942][ T3659] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 287.610852][ T3659] usb 1-1: device descriptor read/64, error -71 [ 287.721370][ T3659] usb usb1-port1: attempt power cycle [ 288.072120][ T3659] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 288.122463][ T3659] usb 1-1: device descriptor read/8, error -71 [ 288.371167][ T3659] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 288.395831][ T3659] usb 1-1: device descriptor read/8, error -71 [ 288.503867][ T3659] usb usb1-port1: unable to enumerate USB device [ 289.415247][ T29] audit: type=1400 audit(289.320:189): avc: denied { ioctl } for pid=4430 comm="syz.1.169" path="socket:[4395]" dev="sockfs" ino=4395 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 289.655147][ T4431] netlink: 4 bytes leftover after parsing attributes in process `syz.1.169'. [ 290.010834][ T23] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 290.181158][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 290.181498][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 290.181847][ T23] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 290.182047][ T23] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 290.182098][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 290.193030][ T23] usb 2-1: config 0 descriptor?? [ 291.638945][ T23] usbhid 2-1:0.0: can't add hid device: -71 [ 291.642027][ T23] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 291.666831][ T23] usb 2-1: USB disconnect, device number 5 [ 292.331116][ T23] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 292.483844][ T23] usb 2-1: too many configurations: 9, using maximum allowed: 8 [ 292.493915][ T23] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 292.494774][ T23] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 292.495037][ T23] usb 2-1: config 0 interface 0 has no altsetting 0 [ 292.507000][ T23] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 292.507443][ T23] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 292.507711][ T23] usb 2-1: config 0 interface 0 has no altsetting 0 [ 292.521418][ T23] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 292.521960][ T23] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 292.522283][ T23] usb 2-1: config 0 interface 0 has no altsetting 0 [ 292.534753][ T23] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 292.535383][ T23] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 292.535744][ T23] usb 2-1: config 0 interface 0 has no altsetting 0 [ 292.549387][ T23] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 292.550174][ T23] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 292.550275][ T23] usb 2-1: config 0 interface 0 has no altsetting 0 [ 292.558932][ T23] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 292.559314][ T23] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 292.559543][ T23] usb 2-1: config 0 interface 0 has no altsetting 0 [ 292.572606][ T23] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 292.573100][ T23] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 292.573345][ T23] usb 2-1: config 0 interface 0 has no altsetting 0 [ 292.582678][ T23] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 292.584277][ T23] usb 2-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 292.584452][ T23] usb 2-1: config 0 interface 0 has no altsetting 0 [ 292.614708][ T23] usb 2-1: New USB device found, idVendor=0c45, idProduct=1010, bcdDevice=49.8e [ 292.615104][ T23] usb 2-1: New USB device strings: Mfr=41, Product=64, SerialNumber=168 [ 292.615442][ T23] usb 2-1: Product: syz [ 292.615615][ T23] usb 2-1: Manufacturer: syz [ 292.615781][ T23] usb 2-1: SerialNumber: syz [ 292.625488][ T23] usb 2-1: config 0 descriptor?? [ 292.648759][ T23] yurex 2-1:0.0: USB YUREX device now attached to Yurex #0 [ 292.862846][ T769] usb 2-1: USB disconnect, device number 6 [ 292.874081][ T769] yurex 2-1:0.0: USB YUREX #0 now disconnected [ 296.757059][ T4487] syzkaller0: entered promiscuous mode [ 296.757855][ T4487] syzkaller0: entered allmulticast mode [ 303.173441][ T4506] can0: slcan on ptm0. [ 303.251190][ T4505] can0 (unregistered): slcan off ptm0. [ 303.543953][ T29] audit: type=1400 audit(303.450:190): avc: denied { audit_write } for pid=4515 comm="syz.1.186" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 311.672631][ T4532] random: crng reseeded on system resumption [ 311.693909][ T4531] syzkaller0: entered promiscuous mode [ 311.700214][ T4531] syzkaller0: entered allmulticast mode [ 313.319703][ T29] audit: type=1400 audit(313.220:191): avc: denied { create } for pid=4541 comm="syz.1.194" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 313.328192][ T29] audit: type=1400 audit(313.230:192): avc: denied { rename } for pid=4541 comm="syz.1.194" name="file0" dev="tmpfs" ino=577 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 313.533253][ T29] audit: type=1400 audit(313.430:193): avc: denied { unlink } for pid=3092 comm="syz-executor" name="file1" dev="tmpfs" ino=577 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 313.534696][ T29] audit: type=1400 audit(313.440:194): avc: denied { unlink } for pid=3092 comm="syz-executor" name="file0" dev="tmpfs" ino=578 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 323.091928][ T29] audit: type=1400 audit(323.000:195): avc: denied { mounton } for pid=4550 comm="syz.0.197" path="/86/file0" dev="tmpfs" ino=474 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 327.926867][ T4562] gtp0: entered promiscuous mode [ 328.316671][ T29] audit: type=1400 audit(328.220:196): avc: denied { name_bind } for pid=4565 comm="syz.0.202" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 329.711401][ T3847] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 329.925323][ T3847] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 329.926912][ T3847] usb 2-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 329.937934][ T3847] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 329.973073][ T3847] usb 2-1: config 0 descriptor?? [ 334.440532][ T42] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 334.590881][ T42] usb 1-1: Using ep0 maxpacket: 16 [ 334.603125][ T42] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 334.620524][ T42] usb 1-1: New USB device found, idVendor=2040, idProduct=0264, bcdDevice=4e.d1 [ 334.620837][ T42] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 334.621207][ T42] usb 1-1: Product: syz [ 334.621263][ T42] usb 1-1: Manufacturer: syz [ 334.621296][ T42] usb 1-1: SerialNumber: syz [ 334.632033][ T42] usb 1-1: config 0 descriptor?? [ 340.246709][ T3043] usb 2-1: USB disconnect, device number 7 [ 340.454876][ T29] audit: type=1400 audit(340.360:197): avc: denied { create } for pid=4598 comm="syz.1.207" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 340.478093][ T29] audit: type=1400 audit(340.380:198): avc: denied { mounton } for pid=4598 comm="syz.1.207" path="/112/file0" dev="tmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 341.400995][ T41] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 341.552348][ T41] usb 2-1: Using ep0 maxpacket: 32 [ 341.566529][ T41] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 341.566903][ T41] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 341.567963][ T41] usb 2-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 341.568217][ T41] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 341.585486][ T41] usb 2-1: config 0 descriptor?? [ 341.607330][ T41] hub 2-1:0.0: USB hub found [ 341.819467][ T41] hub 2-1:0.0: 1 port detected [ 342.449019][ T1262] hub 2-1:0.0: activate --> -90 [ 342.654097][ C1] raw-gadget.0 gadget.1: ignoring, device is not running [ 342.655727][ T41] hub 2-1:0.0: hub_ext_port_status failed (err = -71) [ 342.660294][ T1262] usb 2-1: Failed to suspend device, error -71 [ 342.665732][ T3043] usb 2-1: USB disconnect, device number 8 [ 344.858600][ T23] usb 1-1: USB disconnect, device number 10 [ 345.032213][ T4632] netlink: 28 bytes leftover after parsing attributes in process `syz.0.210'. [ 356.881188][ T23] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 357.050274][ T23] usb 2-1: Using ep0 maxpacket: 8 [ 357.077666][ T23] usb 2-1: New USB device found, idVendor=04a5, idProduct=3003, bcdDevice=3a.b2 [ 357.078462][ T23] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 357.081040][ T23] usb 2-1: Product: syz [ 357.082529][ T23] usb 2-1: Manufacturer: syz [ 357.084181][ T23] usb 2-1: SerialNumber: syz [ 357.089229][ T23] usb 2-1: config 0 descriptor?? [ 357.320204][ C1] raw-gadget.0 gadget.1: ignoring, device is not running [ 357.332813][ T23] usb 2-1: USB disconnect, device number 9 [ 361.224301][ T4668] netlink: 4 bytes leftover after parsing attributes in process `syz.1.219'. [ 361.256154][ T4668] netlink: 12 bytes leftover after parsing attributes in process `syz.1.219'. [ 367.863897][ T29] audit: type=1400 audit(367.760:199): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=38226 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 367.867451][ T29] audit: type=1400 audit(367.770:200): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=38226 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 384.113664][ T4698] Illegal XDP return value 51 on prog (id 8) dev syz_tun, expect packet loss! [ 401.224502][ T29] audit: type=1400 audit(401.130:201): avc: denied { mount } for pid=4708 comm="syz.1.231" name="/" dev="ramfs" ino=4651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 401.440997][ T42] usb 1-1: new full-speed USB device number 11 using dummy_hcd [ 401.664143][ T42] usb 1-1: New USB device found, idVendor=0ccd, idProduct=00b3, bcdDevice=2d.ea [ 401.664492][ T42] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 401.664758][ T42] usb 1-1: Product: syz [ 401.664919][ T42] usb 1-1: Manufacturer: syz [ 401.665107][ T42] usb 1-1: SerialNumber: syz [ 401.675168][ T42] usb 1-1: config 0 descriptor?? [ 411.913083][ T41] usb 1-1: USB disconnect, device number 11 [ 418.104877][ T29] audit: type=1400 audit(418.010:202): avc: denied { allowed } for pid=4746 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 422.592205][ T29] audit: type=1400 audit(422.430:203): avc: denied { write } for pid=4750 comm="syz.1.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 428.538405][ T29] audit: type=1400 audit(428.440:204): avc: denied { ioctl } for pid=4754 comm="syz.0.240" path="socket:[4701]" dev="sockfs" ino=4701 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 445.265765][ T29] audit: type=1400 audit(445.170:205): avc: denied { recv } for pid=4750 comm="syz.1.239" saddr=fe80::2 daddr=ff02::1 netif=eth0 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 468.947278][ T101] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 469.009322][ T101] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 469.106172][ T101] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 469.113844][ T4909] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 469.124916][ T4909] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 469.162048][ T101] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 469.496036][ T101] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 469.516378][ T101] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 469.524483][ T101] bond0 (unregistering): Released all slaves [ 469.645148][ T101] hsr_slave_0: left promiscuous mode [ 469.648746][ T101] hsr_slave_1: left promiscuous mode [ 469.676588][ T101] veth1_macvtap: left promiscuous mode [ 469.677580][ T101] veth0_macvtap: left promiscuous mode [ 469.677926][ T101] veth1_vlan: left promiscuous mode [ 469.678197][ T101] veth0_vlan: left promiscuous mode [ 471.381903][ T4909] hsr_slave_0: entered promiscuous mode [ 471.394840][ T4909] hsr_slave_1: entered promiscuous mode [ 471.396250][ T4909] debugfs: 'hsr0' already exists in 'hsr' [ 471.396473][ T4909] Cannot create hsr debugfs directory [ 471.880424][ T4909] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 471.899236][ T4909] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 471.907687][ T4909] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 471.917722][ T4909] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 473.204684][ T4909] 8021q: adding VLAN 0 to HW filter on device bond0 [ 476.864692][ T4909] veth0_vlan: entered promiscuous mode [ 476.879270][ T4909] veth1_vlan: entered promiscuous mode [ 477.021306][ T4909] veth0_macvtap: entered promiscuous mode [ 477.034758][ T4909] veth1_macvtap: entered promiscuous mode [ 477.177535][ T101] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 477.178637][ T101] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 477.178808][ T101] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 477.178886][ T101] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 477.426492][ T29] audit: type=1400 audit(477.330:206): avc: denied { unmount } for pid=4909 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 477.936481][ T29] audit: type=1400 audit(477.840:207): avc: denied { remount } for pid=5262 comm="syz.2.245" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 480.936516][ T29] audit: type=1400 audit(480.840:208): avc: denied { execute } for pid=5279 comm="syz.0.250" name="file2" dev="tmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 480.944565][ T5280] process 'syz.0.250' launched './file2' with NULL argv: empty string added [ 480.945485][ T29] audit: type=1400 audit(480.850:209): avc: denied { execute_no_trans } for pid=5279 comm="syz.0.250" path="/121/file2" dev="tmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 481.401162][ T5288] netlink: 20 bytes leftover after parsing attributes in process `syz.0.253'. [ 487.984186][ T29] audit: type=1400 audit(487.890:210): avc: denied { map } for pid=5309 comm="syz.2.260" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 487.996189][ T5310] binder: BINDER_SET_CONTEXT_MGR already set [ 487.996582][ T5310] binder: 5309:5310 ioctl 4018620d 20000040 returned -16 [ 488.386005][ T29] audit: type=1400 audit(488.290:211): avc: denied { ioctl } for pid=5312 comm="syz.2.261" path="/dev/virtual_nci" dev="devtmpfs" ino=659 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:insmod_exec_t:s0" [ 494.000855][ T5313] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 497.991160][ T29] audit: type=1400 audit(497.370:212): avc: denied { call } for pid=5343 comm="syz.2.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 509.374331][ T29] audit: type=1400 audit(509.280:213): avc: denied { setopt } for pid=5366 comm="syz.2.268" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 511.540741][ T41] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 511.708980][ T41] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 511.711037][ T41] usb 1-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 511.716077][ T41] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 511.749052][ T41] usb 1-1: config 0 descriptor?? [ 519.624187][ T5415] ======================================================= [ 519.624187][ T5415] WARNING: The mand mount option has been deprecated and [ 519.624187][ T5415] and is ignored by this kernel. Remove the mand [ 519.624187][ T5415] option from the mount to silence this warning. [ 519.624187][ T5415] ======================================================= [ 519.625556][ T5415] cgroup: Unknown subsys name 'hugetlb' [ 522.009213][ T10] usb 1-1: USB disconnect, device number 12 [ 522.136500][ T29] audit: type=1400 audit(522.040:214): avc: denied { write } for pid=5422 comm="syz.0.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 522.621362][ T10] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 522.770791][ T10] usb 1-1: Using ep0 maxpacket: 32 [ 522.777699][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 522.778066][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 522.778312][ T10] usb 1-1: New USB device found, idVendor=0403, idProduct=6030, bcdDevice= 0.00 [ 522.778493][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 522.795551][ T10] usb 1-1: config 0 descriptor?? [ 523.252241][ T10] ft260 0003:0403:6030.0004: unknown main item tag 0x0 [ 523.463296][ T10] ft260 0003:0403:6030.0004: chip code: 6424 8183 [ 523.678077][ T10] ft260 0003:0403:6030.0004: USB HID v0.00 Device [HID 0403:6030] on usb-dummy_hcd.0-1/input0 [ 524.091442][ T10] ft260 0003:0403:6030.0004: failed to retrieve status: -71 [ 524.093810][ T10] ft260 0003:0403:6030.0004: failed to reset I2C controller: -71 [ 524.103476][ T10] usb 1-1: USB disconnect, device number 13 [ 529.421078][ T29] audit: type=1400 audit(529.330:215): avc: denied { setopt } for pid=5456 comm="syz.2.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 529.505102][ T29] audit: type=1400 audit(529.410:216): avc: denied { getopt } for pid=5456 comm="syz.2.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 547.736475][ T5484] netlink: 16 bytes leftover after parsing attributes in process `syz.2.293'. [ 548.302713][ T29] audit: type=1400 audit(548.210:217): avc: denied { unmount } for pid=5488 comm="syz.2.295" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 554.604952][ T5495] netlink: 'syz.2.296': attribute type 3 has an invalid length. [ 554.607430][ T5495] netlink: 'syz.2.296': attribute type 3 has an invalid length. [ 565.245604][ T5506] netlink: 12 bytes leftover after parsing attributes in process `syz.0.300'. [ 565.378064][ T5506] 8021q: adding VLAN 0 to HW filter on device bond1 [ 565.419439][ T5506] netlink: 28 bytes leftover after parsing attributes in process `syz.0.300'. [ 565.437705][ T5506] bond1: entered promiscuous mode [ 565.444735][ T5506] bond1: entered allmulticast mode [ 565.489515][ T5506] dummy0: entered promiscuous mode [ 565.602119][ T5506] dummy0: entered allmulticast mode [ 565.605956][ T5506] bond1: (slave dummy0): Enslaving as an active interface with an up link [ 566.631172][ T769] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 566.815198][ T769] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 566.816994][ T769] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 566.823892][ T769] usb 1-1: config 1 has no interface number 0 [ 566.827963][ T769] usb 1-1: config 1 interface 1 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 566.881941][ T769] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 566.886508][ T769] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 566.893608][ T769] usb 1-1: Product: syz [ 566.896687][ T769] usb 1-1: Manufacturer: syz [ 566.899270][ T769] usb 1-1: SerialNumber: syz [ 566.925565][ T769] usb 1-1: selecting invalid altsetting 1 [ 567.348438][ T769] cdc_ncm 1-1:1.1: failed GET_NTB_PARAMETERS [ 567.352163][ T769] cdc_ncm 1-1:1.1: bind() failure [ 576.040462][ T29] audit: type=1400 audit(575.940:218): avc: denied { mounton } for pid=5568 comm="syz.2.308" path="/27/file0" dev="tmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 576.065902][ T29] audit: type=1400 audit(575.970:219): avc: denied { setattr } for pid=5568 comm="syz.2.308" name="file0" dev="tmpfs" ino=158 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 579.988212][ T29] audit: type=1400 audit(579.890:220): avc: denied { sqpoll } for pid=5585 comm="syz.2.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 581.084934][ T769] usb 1-1: USB disconnect, device number 14 [ 582.650940][ T3043] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 582.820515][ T3043] usb 1-1: Using ep0 maxpacket: 8 [ 582.841940][ T3043] usb 1-1: New USB device found, idVendor=047d, idProduct=5003, bcdDevice=2f.8c [ 582.842126][ T3043] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 582.842287][ T3043] usb 1-1: Product: syz [ 582.842378][ T3043] usb 1-1: Manufacturer: syz [ 582.842463][ T3043] usb 1-1: SerialNumber: syz [ 582.846933][ T3043] usb 1-1: config 0 descriptor?? [ 583.084476][ T5408] usb 1-1: USB disconnect, device number 15 [ 583.646890][ T5408] usb 1-1: new high-speed USB device number 16 using dummy_hcd [ 583.884905][ T5408] usb 1-1: Using ep0 maxpacket: 8 [ 583.960289][ T5408] usb 1-1: New USB device found, idVendor=047d, idProduct=5003, bcdDevice=2f.8c [ 583.960700][ T5408] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 583.961036][ T5408] usb 1-1: Product: syz [ 583.961090][ T5408] usb 1-1: Manufacturer: syz [ 583.961119][ T5408] usb 1-1: SerialNumber: syz [ 584.004670][ T5408] usb 1-1: config 0 descriptor?? [ 584.258850][ T3043] usb 1-1: USB disconnect, device number 16 [ 585.290580][ T5633] fuse: root generation should be zero [ 599.777524][ T29] audit: type=1400 audit(599.680:221): avc: denied { create } for pid=5645 comm="syz.2.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 599.789014][ T29] audit: type=1400 audit(599.690:222): avc: denied { write } for pid=5645 comm="syz.2.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 628.638218][ T29] audit: type=1400 audit(628.540:223): avc: denied { getopt } for pid=5687 comm="syz.0.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 628.776715][ T29] audit: type=1326 audit(628.680:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5689 comm="syz.0.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 628.785779][ T29] audit: type=1326 audit(628.690:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5689 comm="syz.0.338" exe="/syz-executor" sig=0 arch=40000028 syscall=146 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 628.786337][ T29] audit: type=1326 audit(628.690:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5689 comm="syz.0.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 628.786676][ T29] audit: type=1326 audit(628.690:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5689 comm="syz.0.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 632.065029][ T10] usb 1-1: new high-speed USB device number 17 using dummy_hcd [ 632.289418][ T10] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 632.290648][ T10] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9374, bcdDevice=bc.3b [ 632.298715][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 632.314380][ T10] usb 1-1: config 0 descriptor?? [ 642.534269][ T5408] usb 1-1: USB disconnect, device number 17 [ 645.758168][ T29] audit: type=1400 audit(645.660:228): avc: denied { write } for pid=5743 comm="syz.0.353" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 645.758509][ T29] audit: type=1400 audit(645.660:229): avc: denied { open } for pid=5743 comm="syz.0.353" path="/178/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 645.769563][ T29] audit: type=1400 audit(645.670:230): avc: denied { ioctl } for pid=5743 comm="syz.0.353" path="/178/file0/file0" dev="fuse" ino=64 ioctlcmd=0x1269 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 645.913141][ T29] audit: type=1400 audit(645.820:231): avc: denied { read } for pid=5748 comm="syz.0.354" path="socket:[5930]" dev="sockfs" ino=5930 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 669.271808][ T29] audit: type=1400 audit(669.170:232): avc: denied { execute } for pid=5779 comm="syz.2.363" path="/file1" dev="ramfs" ino=5956 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 670.923261][ T29] audit: type=1400 audit(670.830:233): avc: denied { watch watch_reads } for pid=5789 comm="syz.0.367" path="/184" dev="tmpfs" ino=972 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 690.889356][ T5836] netlink: 40 bytes leftover after parsing attributes in process `syz.2.382'. [ 691.211588][ T10] usb 1-1: new high-speed USB device number 18 using dummy_hcd [ 691.376936][ T10] usb 1-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 691.378745][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 691.385888][ T10] usb 1-1: config 0 descriptor?? [ 691.400919][ T10] cp210x 1-1:0.0: cp210x converter detected [ 691.537938][ T5854] netlink: 28 bytes leftover after parsing attributes in process `syz.2.388'. [ 691.604774][ T10] cp210x 1-1:0.0: failed to get vendor val 0x370b size 1: -121 [ 691.610634][ T10] cp210x 1-1:0.0: querying part number failed [ 691.616836][ T10] usb 1-1: cp210x converter now attached to ttyUSB0 [ 691.808958][ T23] usb 1-1: USB disconnect, device number 18 [ 691.820670][ T23] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 691.822323][ T23] cp210x 1-1:0.0: device disconnected [ 692.058624][ T5874] netlink: 48 bytes leftover after parsing attributes in process `syz.0.390'. [ 708.783925][ T29] audit: type=1400 audit(708.690:234): avc: denied { wake_alarm } for pid=5897 comm="syz.0.398" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 722.359434][ T5934] netlink: 12 bytes leftover after parsing attributes in process `syz.0.408'. [ 761.004064][ T29] audit: type=1400 audit(766.908:235): avc: denied { read } for pid=6032 comm="syz.0.438" name="file0" dev="tmpfs" ino=1154 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 761.010460][ T29] audit: type=1400 audit(766.908:236): avc: denied { open } for pid=6032 comm="syz.0.438" path="/217/file0" dev="tmpfs" ino=1154 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 763.153014][ T29] audit: type=1400 audit(769.058:237): avc: denied { create } for pid=6041 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 763.971272][ T5408] usb 1-1: new high-speed USB device number 19 using dummy_hcd [ 764.120470][ T5408] usb 1-1: Using ep0 maxpacket: 32 [ 764.138905][ T5408] usb 1-1: New USB device found, idVendor=05a9, idProduct=1550, bcdDevice=e4.bb [ 764.139094][ T5408] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 764.139230][ T5408] usb 1-1: Product: syz [ 764.139316][ T5408] usb 1-1: Manufacturer: syz [ 764.139461][ T5408] usb 1-1: SerialNumber: syz [ 764.145190][ T5408] usb 1-1: config 0 descriptor?? [ 774.388601][ T5408] usb 1-1: USB disconnect, device number 19 [ 778.575304][ T6090] trusted_key: encrypted_key: insufficient parameters specified [ 790.568713][ T6111] TCP: TCP_TX_DELAY enabled [ 818.878459][ T6157] netlink: 'syz.2.473': attribute type 27 has an invalid length. [ 819.648461][ T2060] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 819.648887][ T2060] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 819.648994][ T2060] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 819.649060][ T2060] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 819.795451][ T6160] netlink: 8 bytes leftover after parsing attributes in process `syz.2.474'. [ 819.795900][ T6160] netlink: 4 bytes leftover after parsing attributes in process `syz.2.474'. [ 819.802890][ T6160] netlink: 'syz.2.474': attribute type 14 has an invalid length. [ 822.330892][ T5606] usb 1-1: new high-speed USB device number 20 using dummy_hcd [ 822.490351][ T5606] usb 1-1: Using ep0 maxpacket: 32 [ 822.539048][ T5606] usb 1-1: New USB device found, idVendor=1964, idProduct=0001, bcdDevice=d4.15 [ 822.539474][ T5606] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 822.540404][ T5606] usb 1-1: Product: syz [ 822.540463][ T5606] usb 1-1: Manufacturer: syz [ 822.540496][ T5606] usb 1-1: SerialNumber: syz [ 822.547523][ T5606] usb 1-1: config 0 descriptor?? [ 822.830821][ T5606] RobotFuzz Open Source InterFace, OSIF 1-1:0.0: version d4.15 found at bus 001 address 020 [ 833.058429][ T5606] usb 1-1: USB disconnect, device number 20 [ 836.560509][ T29] audit: type=1400 audit(842.458:238): avc: denied { getopt } for pid=6207 comm="syz.2.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 836.620928][ T29] audit: type=1400 audit(842.518:239): avc: denied { unmount } for pid=6207 comm="syz.2.484" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=filesystem permissive=1 [ 839.524093][ T29] audit: type=1400 audit(845.428:240): avc: denied { bind } for pid=6211 comm="syz.2.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 841.560644][ T29] audit: type=1400 audit(847.468:241): avc: denied { read } for pid=6220 comm="syz.2.488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 848.353773][ T6277] capability: warning: `syz.0.501' uses deprecated v2 capabilities in a way that may be insecure [ 852.313162][ T29] audit: type=1400 audit(858.218:242): avc: denied { kexec_image_load } for pid=6288 comm="syz.0.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 856.350917][ T29] audit: type=1400 audit(862.248:243): avc: denied { map } for pid=6296 comm="syz.2.509" path="socket:[7402]" dev="sockfs" ino=7402 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 856.351461][ T29] audit: type=1400 audit(862.258:244): avc: denied { read } for pid=6296 comm="syz.2.509" path="socket:[7402]" dev="sockfs" ino=7402 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 858.195234][ T6303] netlink: 8 bytes leftover after parsing attributes in process `syz.2.511'. [ 866.556265][ T29] audit: type=1400 audit(872.458:245): avc: denied { mount } for pid=6355 comm="syz.0.521" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 866.570735][ T29] audit: type=1400 audit(872.468:246): avc: denied { create } for pid=6355 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 866.577937][ T29] audit: type=1400 audit(872.478:247): avc: denied { sys_admin } for pid=6355 comm="syz.0.521" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 866.628587][ T29] audit: type=1400 audit(872.528:248): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 872.976092][ T29] audit: type=1400 audit(878.858:249): avc: denied { audit_read } for pid=6372 comm="syz.2.528" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 882.814491][ T29] audit: type=1400 audit(888.718:250): avc: denied { create } for pid=6381 comm="syz.2.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 883.650874][ T5408] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 883.800761][ T5408] usb 1-1: Using ep0 maxpacket: 16 [ 883.830875][ T5408] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 883.912740][ T5408] usb 1-1: New USB device found, idVendor=2040, idProduct=0264, bcdDevice=4e.d1 [ 883.913143][ T5408] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 883.913208][ T5408] usb 1-1: Product: syz [ 883.913291][ T5408] usb 1-1: Manufacturer: syz [ 883.913329][ T5408] usb 1-1: SerialNumber: syz [ 883.923747][ T5408] usb 1-1: config 0 descriptor?? [ 894.183991][ T5606] usb 1-1: USB disconnect, device number 21 [ 917.889056][ T6464] netlink: 44 bytes leftover after parsing attributes in process `syz.2.553'. [ 922.430463][ T769] usb 1-1: new high-speed USB device number 22 using dummy_hcd [ 922.606149][ T769] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 922.607935][ T769] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 922.609329][ T769] usb 1-1: New USB device found, idVendor=10c4, idProduct=ea90, bcdDevice= 0.00 [ 922.611255][ T769] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 922.633353][ T769] usb 1-1: config 0 descriptor?? [ 923.107444][ T769] cp2112 0003:10C4:EA90.0005: unknown main item tag 0x0 [ 923.125656][ T769] cp2112 0003:10C4:EA90.0005: hidraw0: USB HID v0.00 Device [HID 10c4:ea90] on usb-dummy_hcd.0-1/input0 [ 923.311951][ T769] cp2112 0003:10C4:EA90.0005: Part Number: 0x82 Device Version: 0xFE [ 928.882257][ T769] cp2112 0003:10C4:EA90.0005: error reading lock byte: -110 [ 932.065463][ T3659] usb 1-1: USB disconnect, device number 22 [ 932.203632][ T29] audit: type=1400 audit(938.108:251): avc: denied { connect } for pid=6508 comm="syz.0.559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 934.878453][ T6522] netlink: 4 bytes leftover after parsing attributes in process `syz.2.564'. [ 934.897436][ T6522] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 934.908251][ T6522] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 934.918560][ T6522] bond0 (unregistering): Released all slaves [ 935.466230][ T6533] netlink: 8 bytes leftover after parsing attributes in process `syz.2.567'. [ 935.470697][ T6533] netlink: 8 bytes leftover after parsing attributes in process `syz.2.567'. [ 937.399148][ T29] audit: type=1326 audit(943.298:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6534 comm="syz.2.568" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x0 [ 958.559181][ T6575] netlink: 64 bytes leftover after parsing attributes in process `syz.2.580'. [ 980.732947][ T3659] usb 1-1: new high-speed USB device number 23 using dummy_hcd [ 980.966320][ T3659] usb 1-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 980.966698][ T3659] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 980.970415][ T3659] usb 1-1: Product: syz [ 980.970763][ T3659] usb 1-1: Manufacturer: syz [ 980.970932][ T3659] usb 1-1: SerialNumber: syz [ 981.225278][ T3659] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000098. ret = -EPIPE [ 981.225788][ T3659] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): lan78xx_setup_irq_domain() failed : -32 [ 981.225990][ T3659] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 981.232557][ T3659] lan78xx 1-1:1.0: probe with driver lan78xx failed with error -32 [ 991.262723][ T769] usb 1-1: USB disconnect, device number 23 [ 1005.122005][ T769] usb 1-1: new high-speed USB device number 24 using dummy_hcd [ 1005.292055][ T769] usb 1-1: config 128 has an invalid interface number: 148 but max is 0 [ 1005.294523][ T769] usb 1-1: config 128 has no interface number 0 [ 1005.295827][ T769] usb 1-1: config 128 interface 148 altsetting 9 endpoint 0x5 has an invalid bInterval 129, changing to 11 [ 1005.298069][ T769] usb 1-1: config 128 interface 148 has no altsetting 0 [ 1005.315653][ T769] usb 1-1: New USB device found, idVendor=0cf3, idProduct=e019, bcdDevice=fb.4f [ 1005.317048][ T769] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1005.318309][ T769] usb 1-1: Product: syz [ 1005.320699][ T769] usb 1-1: Manufacturer: syz [ 1005.321805][ T769] usb 1-1: SerialNumber: syz [ 1005.568182][ T769] usb 1-1: USB disconnect, device number 24 [ 1006.021109][ T769] usb 1-1: new high-speed USB device number 25 using dummy_hcd [ 1006.210365][ T769] usb 1-1: Using ep0 maxpacket: 8 [ 1006.247710][ T769] usb 1-1: config index 0 descriptor too short (expected 301, got 27) [ 1006.251938][ T769] usb 1-1: config 16 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 3 [ 1006.253884][ T769] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 1006.258813][ T769] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1006.284669][ T769] usbtmc 1-1:16.0: bulk endpoints not found [ 1019.867623][ T6732] usb 1-1: USB disconnect, device number 25 [ 1019.980728][ T29] audit: type=1400 audit(1025.878:253): avc: denied { mount } for pid=6736 comm="syz.2.623" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1023.724249][ T29] audit: type=1400 audit(1029.628:254): avc: denied { write } for pid=6752 comm="syz.2.627" name="file2" dev="tmpfs" ino=1175 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1023.737519][ T29] audit: type=1400 audit(1029.638:255): avc: denied { open } for pid=6752 comm="syz.2.627" path="/224/file2" dev="tmpfs" ino=1175 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1056.133980][ T6732] hid-generic 0003:0004:0000.0006: unknown main item tag 0x0 [ 1056.134632][ T6732] hid-generic 0003:0004:0000.0006: unknown main item tag 0x0 [ 1056.135229][ T6732] hid-generic 0003:0004:0000.0006: unknown main item tag 0x0 [ 1056.149076][ T6732] hid-generic 0003:0004:0000.0006: hidraw0: USB HID v0.00 Device [syz0] on syz1 [ 1056.413344][ T6810] binder_alloc: 6809: binder_alloc_buf, no vma [ 1057.373886][ T29] audit: type=1400 audit(1063.268:256): avc: denied { mount } for pid=6820 comm="syz.2.647" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1078.221361][ T29] audit: type=1326 audit(1084.128:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6847 comm="syz.2.657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1078.230219][ T29] audit: type=1326 audit(1084.128:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6847 comm="syz.2.657" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1078.240822][ T29] audit: type=1326 audit(1084.128:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6847 comm="syz.2.657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1078.241219][ T29] audit: type=1326 audit(1084.128:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6847 comm="syz.2.657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1078.241372][ T29] audit: type=1326 audit(1084.128:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6847 comm="syz.2.657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1078.241490][ T29] audit: type=1326 audit(1084.128:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6847 comm="syz.2.657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1078.241702][ T29] audit: type=1326 audit(1084.128:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6847 comm="syz.2.657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1078.241847][ T29] audit: type=1326 audit(1084.128:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6847 comm="syz.2.657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1078.241959][ T29] audit: type=1326 audit(1084.128:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6847 comm="syz.2.657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1078.242075][ T29] audit: type=1326 audit(1084.128:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6847 comm="syz.2.657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1082.369045][ T6879] netlink: 20 bytes leftover after parsing attributes in process `syz.2.667'. [ 1101.468356][ T5408] usb 1-1: new high-speed USB device number 26 using dummy_hcd [ 1101.731272][ T5408] usb 1-1: Using ep0 maxpacket: 32 [ 1101.786486][ T5408] usb 1-1: config index 0 descriptor too short (expected 156, got 27) [ 1101.786844][ T5408] usb 1-1: too many endpoints for config 0 interface 0 altsetting 191: 144, using maximum allowed: 30 [ 1101.787237][ T5408] usb 1-1: config 0 interface 0 altsetting 191 endpoint 0x87 has an invalid bInterval 0, changing to 7 [ 1101.787314][ T5408] usb 1-1: config 0 interface 0 altsetting 191 has 1 endpoint descriptor, different from the interface descriptor's value: 144 [ 1101.787394][ T5408] usb 1-1: config 0 interface 0 has no altsetting 0 [ 1101.934246][ T5408] usb 1-1: New USB device found, idVendor=0f11, idProduct=1021, bcdDevice=86.66 [ 1101.934583][ T5408] usb 1-1: New USB device strings: Mfr=85, Product=120, SerialNumber=172 [ 1101.934958][ T5408] usb 1-1: Product: syz [ 1101.935130][ T5408] usb 1-1: Manufacturer: syz [ 1101.935169][ T5408] usb 1-1: SerialNumber: syz [ 1102.003677][ T5408] usb 1-1: config 0 descriptor?? [ 1102.071022][ T5408] ldusb 1-1:0.0: Interrupt out endpoint not found (using control endpoint instead) [ 1102.075023][ T5408] ldusb 1-1:0.0: LD USB Device #0 now attached to major 180 minor 0 [ 1102.283895][ T769] usb 1-1: USB disconnect, device number 26 [ 1102.296166][ T769] ldusb 1-1:0.0: LD USB Device #0 now disconnected [ 1157.451108][ T6897] usb 1-1: new high-speed USB device number 27 using dummy_hcd [ 1157.600354][ T6897] usb 1-1: Using ep0 maxpacket: 32 [ 1157.625473][ T6897] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1157.627263][ T6897] usb 1-1: config 0 has no interfaces? [ 1157.630325][ T6897] usb 1-1: New USB device found, idVendor=0ac8, idProduct=0321, bcdDevice=6f.be [ 1157.631775][ T6897] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1157.657458][ T6897] usb 1-1: config 0 descriptor?? [ 1157.892991][ T6897] usb 1-1: USB disconnect, device number 27 [ 1175.180566][ T6897] usb 1-1: new high-speed USB device number 28 using dummy_hcd [ 1175.341011][ T6897] usb 1-1: Using ep0 maxpacket: 8 [ 1175.354784][ T6897] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 1175.354981][ T6897] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 1175.355203][ T6897] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 1175.355308][ T6897] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 1175.355421][ T6897] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 1175.355534][ T6897] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 1175.355687][ T6897] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1175.584409][ T6897] usb 1-1: usb_control_msg returned -32 [ 1175.584725][ T6897] usbtmc 1-1:16.0: can't read capabilities [ 1189.176383][ T6732] usb 1-1: USB disconnect, device number 28 [ 1191.190599][ T6732] usb 1-1: new high-speed USB device number 29 using dummy_hcd [ 1191.357291][ T6732] usb 1-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 1191.357703][ T6732] usb 1-1: config 1 has an invalid descriptor of length 55, skipping remainder of the config [ 1191.357769][ T6732] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 1191.357897][ T6732] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 55, changing to 9 [ 1191.357951][ T6732] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 8496, setting to 1024 [ 1191.367188][ T6732] usb 1-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 1191.367454][ T6732] usb 1-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 1191.367703][ T6732] usb 1-1: Product: syz [ 1191.367756][ T6732] usb 1-1: Manufacturer: syz [ 1191.384486][ T6732] cdc_wdm 1-1:1.0: skipping garbage [ 1191.384743][ T6732] cdc_wdm 1-1:1.0: skipping garbage [ 1191.388946][ T6732] cdc_wdm 1-1:1.0: cdc-wdm0: USB WDM device [ 1191.602909][ T6897] usb 1-1: USB disconnect, device number 29 [ 1240.415400][ T7271] netlink: 8 bytes leftover after parsing attributes in process `syz.0.781'. [ 1252.742239][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 1252.742893][ T29] audit: type=1400 audit(1258.648:294): avc: denied { setopt } for pid=7291 comm="syz.0.788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1253.424590][ T29] audit: type=1400 audit(1259.328:295): avc: denied { bind } for pid=7291 comm="syz.0.788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1253.438905][ T7292] netlink: 4 bytes leftover after parsing attributes in process `syz.0.788'. [ 1275.041053][ T7340] netlink: 'syz.0.801': attribute type 10 has an invalid length. [ 1275.045722][ T7340] syz_tun: entered promiscuous mode [ 1275.136486][ T29] audit: type=1400 audit(1281.038:296): avc: denied { connect } for pid=7341 comm="syz.0.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1321.908237][ T7435] netlink: 4 bytes leftover after parsing attributes in process `syz.2.827'. [ 1321.923150][ T7435] netlink: 12 bytes leftover after parsing attributes in process `syz.2.827'. [ 1325.462428][ T7440] ptrace attach of "/syz-executor exec"[3091] was attempted by "/syz-executor exec"[7440] [ 1325.472364][ T29] audit: type=1400 audit(1331.368:297): avc: denied { create } for pid=7437 comm="syz.0.828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 1354.702787][ T29] audit: type=1400 audit(1360.608:298): avc: denied { create } for pid=7486 comm="syz.0.844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1359.279607][ T7502] netlink: 'syz.2.849': attribute type 4 has an invalid length. [ 1369.938214][ T7521] netlink: 'syz.2.855': attribute type 1 has an invalid length. [ 1382.343049][ T29] audit: type=1400 audit(1388.248:299): avc: denied { setopt } for pid=7548 comm="syz.2.866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1382.369513][ T7549] netlink: 4 bytes leftover after parsing attributes in process `syz.2.866'. [ 1382.443763][ T7549] hsr_slave_1 (unregistering): left promiscuous mode [ 1387.385254][ T7566] syzkaller0: entered promiscuous mode [ 1387.385546][ T7566] syzkaller0: entered allmulticast mode [ 1395.854074][ T7597] mmap: syz.0.879 (7597) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 1404.830876][ T6732] usb 1-1: new high-speed USB device number 30 using dummy_hcd [ 1405.040986][ T6732] usb 1-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 1405.043220][ T6732] usb 1-1: config 27 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 1405.045351][ T6732] usb 1-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 1405.053853][ T6732] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1405.086140][ T6732] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 1405.089537][ T6732] usb 1-1: invalid MIDI out EP 0 [ 1405.187719][ T6732] snd-usb-audio 1-1:27.0: probe with driver snd-usb-audio failed with error -22 [ 1405.286364][ T6732] usb 1-1: USB disconnect, device number 30 [ 1410.757008][ T29] audit: type=1400 audit(1416.658:300): avc: denied { read } for pid=7682 comm="syz.0.902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1414.239135][ T7691] fuse: Bad value for 'fd' [ 1418.933441][ T29] audit: type=1400 audit(1424.838:301): avc: denied { bind } for pid=7697 comm="syz.2.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1420.431676][ T7710] netlink: 7 bytes leftover after parsing attributes in process `syz.2.913'. [ 1421.093692][ T7714] netlink: 36 bytes leftover after parsing attributes in process `syz.2.915'. [ 1443.210860][ T29] audit: type=1400 audit(1449.118:302): avc: denied { bind } for pid=7762 comm="syz.0.931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1443.214282][ T29] audit: type=1400 audit(1449.118:303): avc: denied { listen } for pid=7762 comm="syz.0.931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1443.219258][ T29] audit: type=1400 audit(1449.118:304): avc: denied { connect } for pid=7762 comm="syz.0.931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1443.315460][ T7765] netlink: 8 bytes leftover after parsing attributes in process `syz.0.932'. [ 1444.305968][ T29] audit: type=1400 audit(1450.208:305): avc: denied { shutdown } for pid=7770 comm="syz.0.935" lport=9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1450.147521][ T29] audit: type=1400 audit(1456.048:306): avc: denied { watch watch_reads } for pid=7794 comm="syz.0.945" path="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 1452.649292][ T7814] netlink: 20 bytes leftover after parsing attributes in process `syz.0.952'. [ 1452.751383][ T29] audit: type=1400 audit(1458.658:307): avc: denied { read } for pid=7815 comm="syz.0.953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1453.262990][ T29] audit: type=1400 audit(1459.168:308): avc: denied { setopt } for pid=7815 comm="syz.0.953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1510.938712][ T7918] netlink: 4 bytes leftover after parsing attributes in process `syz.2.991'. [ 1510.962113][ T7918] netlink: 24 bytes leftover after parsing attributes in process `syz.2.991'. [ 1510.976801][ T29] audit: type=1400 audit(1516.878:309): avc: denied { read } for pid=7917 comm="syz.2.991" path="socket:[11644]" dev="sockfs" ino=11644 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1520.232854][ T29] audit: type=1326 audit(1526.138:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7983 comm="syz.0.1020" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1520.234427][ T29] audit: type=1326 audit(1526.138:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7983 comm="syz.0.1020" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1520.239616][ T29] audit: type=1326 audit(1526.138:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7983 comm="syz.0.1020" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1520.240309][ T29] audit: type=1326 audit(1526.138:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7983 comm="syz.0.1020" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1520.240442][ T29] audit: type=1326 audit(1526.138:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7983 comm="syz.0.1020" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1520.247594][ T29] audit: type=1326 audit(1526.138:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7983 comm="syz.0.1020" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1520.252897][ T29] audit: type=1326 audit(1526.158:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7983 comm="syz.0.1020" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1520.260619][ T29] audit: type=1326 audit(1526.158:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7983 comm="syz.0.1020" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1520.261127][ T29] audit: type=1326 audit(1526.158:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7983 comm="syz.0.1020" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1520.261262][ T29] audit: type=1326 audit(1526.158:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7983 comm="syz.0.1020" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7fc00000 [ 1540.937260][ T8029] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1028'. [ 1540.941398][ T8029] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1028'. [ 1540.988584][ T8029] bond0: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 1540.996092][ T8029] bond0 (unregistering): Released all slaves [ 1550.875980][ T8140] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 1550.876526][ T8140] IPv6: NLM_F_CREATE should be set when creating new route [ 1550.876929][ T8140] IPv6: NLM_F_CREATE should be set when creating new route [ 1553.905048][ T8151] pim6reg: entered allmulticast mode [ 1558.182750][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 1558.183110][ T29] audit: type=1400 audit(1564.078:341): avc: denied { name_bind } for pid=8164 comm="syz.2.1053" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1603.925882][ T29] audit: type=1400 audit(1609.828:342): avc: denied { connect } for pid=8231 comm="syz.2.1074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1615.292812][ T8249] sch_tbf: burst 32855 is lower than device lo mtu (11337746) ! [ 1701.792122][ T8457] sch_tbf: burst 19360 is lower than device lo mtu (65550) ! [ 1707.977789][ T8478] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1708.762896][ T8512] bond2: (slave ip6gretap1): making interface the new active one [ 1708.774532][ T8512] bond2: (slave ip6gretap1): Enslaving as an active interface with an up link [ 1738.407196][ T29] audit: type=1326 audit(1744.308:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.0.1164" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 1738.548502][ T29] audit: type=1326 audit(1744.428:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.0.1164" exe="/syz-executor" sig=0 arch=40000028 syscall=83 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 1738.676731][ T29] audit: type=1326 audit(1744.538:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.0.1164" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 1738.752458][ T29] audit: type=1326 audit(1744.588:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.0.1164" exe="/syz-executor" sig=0 arch=40000028 syscall=16 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 1738.801285][ T29] audit: type=1326 audit(1744.688:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.0.1164" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 1738.875232][ T29] audit: type=1326 audit(1744.758:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8565 comm="syz.0.1164" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 1749.326694][ T8619] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1173'. [ 1804.942725][ T8722] netlink: 'syz.0.1208': attribute type 10 has an invalid length. [ 1813.457473][ T8741] ------------[ cut here ]------------ [ 1813.457961][ T8741] WARNING: kernel/bpf/verifier.c:2742 at reg_bounds_sanity_check+0x3c0/0x428, CPU#1: syz.2.1212/8741 [ 1813.459381][ T8741] verifier bug: REG INVARIANTS VIOLATION (false_reg1): range bounds violation u64=[0x4000000, 0x0] s64=[0x4000000, 0x0] u32=[0x4000000, 0x0] s32=[0x4000000, 0x0] var_off=(0x0, 0x0) [ 1813.460927][ T8741] Modules linked in: [ 1813.461900][ T8741] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1813.462400][ T8741] CPU: 1 UID: 0 PID: 8741 Comm: syz.2.1212 Tainted: G L syzkaller #0 PREEMPT [ 1813.462836][ T8741] Tainted: [L]=SOFTLOCKUP [ 1813.462937][ T8741] Hardware name: ARM-Versatile Express [ 1813.463075][ T8741] Call trace: [ 1813.463181][ T8741] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 1813.463500][ T8741] r7:82290da0 r6:00000000 r5:822a2700 r4:00000001 [ 1813.463659][ T8741] [<80201b1c>] (show_stack) from [<8021ed9c>] (dump_stack_lvl+0x5c/0x70) [ 1813.463888][ T8741] [<8021ed40>] (dump_stack_lvl) from [<8021edc8>] (dump_stack+0x18/0x1c) [ 1813.464131][ T8741] r7:82290da0 r6:85ddb000 r5:00000000 r4:82a7cd14 [ 1813.464379][ T8741] [<8021edb0>] (dump_stack) from [<802025c4>] (vpanic+0xe0/0x2e4) [ 1813.464613][ T8741] [<802024e4>] (vpanic) from [<802027fc>] (trace_suspend_resume+0x0/0xd8) [ 1813.464851][ T8741] r7:803dc6c8 [ 1813.464951][ T8741] [<802027c8>] (panic) from [<80251f68>] (get_taint+0x0/0x1c) [ 1813.465198][ T8741] r3:8280c504 r2:00000001 r1:8228958c r0:82290da0 [ 1813.465453][ T8741] [<80251ef0>] (check_panic_on_warn) from [<802520e0>] (__warn+0x94/0x1a0) [ 1813.465784][ T8741] [<8025204c>] (__warn) from [<802523d4>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 1813.466143][ T8741] r8:00000009 r7:822a8f9c r6:df9e98bc r5:85ddb000 r4:00000000 [ 1813.466334][ T8741] [<802521f0>] (warn_slowpath_fmt) from [<803dc6c8>] (reg_bounds_sanity_check+0x3c0/0x428) [ 1813.466642][ T8741] r10:85e28000 r9:04000000 r8:00000000 r7:04000000 r6:00000000 r5:822a9700 [ 1813.466861][ T8741] r4:85c08aa0 [ 1813.466987][ T8741] [<803dc308>] (reg_bounds_sanity_check) from [<803e9118>] (reg_set_min_max+0x230/0x288) [ 1813.467291][ T8741] r10:00000000 r9:00000030 r8:85e28000 r7:85e2e118 r6:85e2e0a8 r5:85c02aa0 [ 1813.467620][ T8741] r4:85c08aa0 [ 1813.467710][ T8741] [<803e8ee8>] (reg_set_min_max) from [<803f8a18>] (check_cond_jmp_op+0x434/0x1968) [ 1813.467966][ T8741] r10:85c02800 r9:00000030 r8:862d8900 r7:00000070 r6:85e28000 r5:86587180 [ 1813.468188][ T8741] r4:dfa35088 r3:85c08aa0 [ 1813.468300][ T8741] [<803f85e4>] (check_cond_jmp_op) from [<803ff4d0>] (do_check_common+0x2160/0x31c4) [ 1813.468541][ T8741] r10:85e28000 r9:00000000 r8:862d8900 r7:85e2e000 r6:dfa35088 r5:dfa35040 [ 1813.468818][ T8741] r4:dfa35000 [ 1813.468917][ T8741] [<803fd370>] (do_check_common) from [<80403910>] (bpf_check+0x275c/0x2d2c) [ 1813.469169][ T8741] r10:85e2e000 r9:00000001 r8:85e28000 r7:00000a7b r6:85e288bc r5:00000000 [ 1813.469397][ T8741] r4:00000016 [ 1813.469531][ T8741] [<804011b4>] (bpf_check) from [<803d5a58>] (bpf_prog_load+0x5b0/0xdd8) [ 1813.470089][ T8741] r10:df9e9d58 r9:85ddb000 r8:85d84730 r7:df9e9d18 r6:00000000 r5:00000000 [ 1813.470451][ T8741] r4:df9e9eb0 [ 1813.470533][ T8741] [<803d54a8>] (bpf_prog_load) from [<803d7254>] (__sys_bpf+0x334/0x2118) [ 1813.470789][ T8741] r10:00000005 r9:00000000 r8:df9e9e50 r7:00000048 r6:85ddb000 r5:200054c0 [ 1813.470962][ T8741] r4:00000000 [ 1813.471107][ T8741] [<803d6f20>] (__sys_bpf) from [<803d95cc>] (sys_bpf+0x2c/0x48) [ 1813.471376][ T8741] r10:00000182 r9:85ddb000 r8:8020029c r7:00000182 r6:00346450 r5:00000000 [ 1813.471601][ T8741] r4:00000000 [ 1813.471737][ T8741] [<803d95a0>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1813.471965][ T8741] Exception stack(0xdf9e9fa8 to 0xdf9e9ff0) [ 1813.472210][ T8741] 9fa0: 00000000 00000000 00000005 200054c0 00000048 00000000 [ 1813.472483][ T8741] 9fc0: 00000000 00000000 00346450 00000182 00346418 00000000 00000001 76eee0dc [ 1813.473087][ T8741] 9fe0: 76eede88 76eede78 00018734 0012fc20 [ 1813.475322][ T8741] Rebooting in 86400 seconds..