last executing test programs: 19m37.337585443s ago: executing program 1 (id=415): r0 = socket(0xa, 0x3, 0xff) sendmsg$inet6(r0, &(0x7f0000000080)={&(0x7f0000000140)={0xa, 0xa, 0x4, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x3}}], 0x18}, 0x922bac8576bdadce) 19m36.390457096s ago: executing program 1 (id=416): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x1, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000000, 0x2}, {0x0, 0x0, 0x40000000000800}, 0x200, 0x10000000, 0x0, 0x0, 0x1}}, 0xb8}, 0x1, 0x0, 0x0, 0xc5}, 0x4000) 19m35.677862184s ago: executing program 1 (id=417): r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000080)={&(0x7f0000000100)=@hci={0x1f, 0x0, 0x4}, 0x80, &(0x7f0000000200)=[{&(0x7f0000001240)="1c393502dda1a67d93b1ceccbe972c4fef9c33ecf2d824f3a33513f45f472bbdc8e3a2275f2587f0da0b3ae419bed996116448f90d113ce98aa985f379d729430858f5cb9a668a1800bf2354b33cdff83033de518580a3080d7f4cc2406e071138439e1566dd17983ee153ab672f362d3292e24a9952f18ec3d8b37bb3391096c1d4442a754899299321c03cbcfb98a26994b2a072c2b9d9c70d619545e5f61b050e40166d2ff57dcc008f24fd5339e7bc21e25863f80d2487c30b6bf781608a31d68e9319ab1712d8f5bdde849c040417c864cbfd3923dcb9fc6bdc2ea53334184b03efcb631dc68f0a7b6e13eea4b80d4237120e32932ca4e2b50bad0a35496d36a191d91f03b477b9587bc0ba489932e34f819fa1524ebad53a3d94b46c6aeff4f42fa067729fbb2862c09d337a75e0c8429d4bfe0dee2e1e23e8c22787178600ecca135623731e4701f35bd4e7c936a8ee274120e7662328a5aba1161b05889b045696721c79bff0547efe051f3c5de77fdd3c77afd41a1a7747a982b7efb013c9d6bac7d3ad1f9b7c3a5a1448b35696f03bca1c875e346edc55b7a271c3e5f3c0df72c8e4d7cccfa2e9b598f0ae06efbc1a5d5bd91aed6b32deccf7755cef50fab72633c802533b9d94f17f9be978f2514c47671575ee528fbdddc6194328e605e4d10e293756d20eb8a545f2bfe48df5d1d98a270458392a0a57647dcb8ee005e78877a072d12d0429b9b9957a695c3289b4a59469691115e6ba204181708b9d1ae47418ed594b8128f20c100f5485a84e60d73ab818da73fab78caf", 0x23f}], 0x1}, 0x9cdc2384056b48b8) 19m35.198651965s ago: executing program 1 (id=418): r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$inet6(0xa, 0x80002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000000000002) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@abs={0x0, 0x0, 0xb}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)={0x2, 0x2e14, 0x7f}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xb, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2020, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x41, 0x3, 0x1c0, 0x0, 0x50020000, 0x0, 0x98, 0x0, 0x128, 0x1f0, 0x1f0, 0x128, 0x1f0, 0x3, 0x0, {[{{@ip={@remote, @multicast2, 0xff, 0x0, 'syzkaller0\x00', 'vlan1\x00', {}, {}, 0x6, 0x3, 0x35}, 0x0, 0x70, 0x98, 0x0, {0x0, 0xffffffffa0028000}}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x70, 0x90}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x220) 19m7.83053102s ago: executing program 1 (id=426): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={&(0x7f0000000d80)={0x2, 0x15, 0x9, 0x9, 0x5, 0x0, 0x70bd2a, 0x25dfdbfc, [@sadb_address={0x3, 0x7, 0x3c, 0x80, 0x0, @in={0x2, 0x4e24, @loopback}}]}, 0x28}}, 0x4000000) 19m6.570496638s ago: executing program 1 (id=427): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x4, 0x0, 0x0, 0x1b, "0062ba7d820700000000000000000000096304"}) r1 = syz_open_pts(r0, 0x101840) dup3(r1, r0, 0x80000) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x5, 0x0, 0x9, 0x64, 0x4, "ca88ec6d0fd188f5"}) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r5 = syz_io_uring_setup(0x110, &(0x7f0000000200)={0x0, 0xfec9, 0x8, 0x2, 0x3d4}, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r5, 0xdb4, 0x0, 0x0, 0x0, 0x0) 18m20.98595854s ago: executing program 32 (id=427): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x4, 0x0, 0x0, 0x1b, "0062ba7d820700000000000000000000096304"}) r1 = syz_open_pts(r0, 0x101840) dup3(r1, r0, 0x80000) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000000)={0x5, 0x0, 0x9, 0x64, 0x4, "ca88ec6d0fd188f5"}) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r5 = syz_io_uring_setup(0x110, &(0x7f0000000200)={0x0, 0xfec9, 0x8, 0x2, 0x3d4}, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r5, 0xdb4, 0x0, 0x0, 0x0, 0x0) 8m39.917672691s ago: executing program 2 (id=723): r0 = socket$nl_generic(0x11, 0x3, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x1, 0x1c, 0x67, 0x0, 0x5, 0x2, 0x0, @multicast2, @rand_addr=0x64010106}, {0x22, 0x9, 0x0, @empty}}}}}, 0x0) sendmsg(r0, &(0x7f0000000640)={&(0x7f00000000c0)=@caif=@dgm={0x25, 0xd}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000000)="4ba72c4cfd81685544f46c3f0800", 0x36}], 0x2, 0x0, 0x0, 0x11000000}, 0x0) 8m39.102250191s ago: executing program 2 (id=724): mkdir(&(0x7f0000000540)='./file0\x00', 0x108) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x4000, &(0x7f0000000100)={[{@subsystem='freezer'}]}) 8m38.231040384s ago: executing program 2 (id=725): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000440)=ANY=[@ANYBLOB="140100002b00010000000000ffdbdf25010100800c0000000000000000000000140001000100"], 0x114}], 0x1}, 0x0) 8m37.297028773s ago: executing program 2 (id=726): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = syz_clone(0x80211, 0x0, 0xffffffffffffffd7, 0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=0x0]) mount(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000280)='autofs\x00', 0x201000c, &(0x7f0000000040)) chdir(&(0x7f0000000080)='./file0\x00') setpgid(r0, r0) setpgid(0x0, r0) stat(&(0x7f0000000540)='./file0\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x100, 0x0) r2 = open(&(0x7f0000000000)='.\x00', 0x0, 0x244) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000200)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) 8m34.625760588s ago: executing program 2 (id=728): r0 = syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x0, 0x2, 0x4}, &(0x7f0000000140)=0x0, &(0x7f0000000280)) r2 = io_uring_setup(0x491, &(0x7f0000000240)={0x0, 0x3a29, 0x800, 0x2, 0x4000157}) close_range(r2, 0xffffffffffffffff, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0x200, 0x0, 0x4) io_uring_enter(r0, 0x823, 0x3ffb, 0xd, 0x0, 0x17) 8m32.489711973s ago: executing program 2 (id=729): openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x62941, 0x2, 0x10}, 0x18) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000002b80)='system.posix_acl_access\x00', &(0x7f0000002cc0)={{}, {0x1, 0x7}, [], {}, [], {0x10, 0x6}, {0x20, 0x4}}, 0x4, 0x3) 8m32.489577863s ago: executing program 33 (id=729): openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x62941, 0x2, 0x10}, 0x18) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000002b80)='system.posix_acl_access\x00', &(0x7f0000002cc0)={{}, {0x1, 0x7}, [], {}, [], {0x10, 0x6}, {0x20, 0x4}}, 0x4, 0x3) 2m9.510792355s ago: executing program 3 (id=914): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1d, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x8, 0x40, 0x7fff0000}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082104, 0x0) 2m8.927379678s ago: executing program 3 (id=915): openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) r0 = syz_io_uring_setup(0x22f, &(0x7f0000000080)={0x0, 0x5325, 0x10000, 0x0, 0x100002cf}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000009c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xffffffffffffff31}) r3 = syz_usb_connect(0x0, 0x3f, &(0x7f00000000c0)=ANY=[@ANYBLOB="11010000733336088dee1adb23610000000109022d0001100000000904000003fe03010009cd8d1f00020000000905050200de7e001009058b1e20"], 0x0) close(0x3) syz_usb_control_io(r3, 0x0, &(0x7f0000000300)={0x84, &(0x7f0000000080)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) io_uring_enter(r0, 0x7a98, 0x0, 0x0, 0x0, 0x0) 2m8.279810647s ago: executing program 3 (id=917): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x88e00) read(r0, &(0x7f0000000500)=""/207, 0xcf) 2m7.567140531s ago: executing program 3 (id=918): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x94) creat(&(0x7f0000000180)='./file0\x00', 0x18b) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x80, &(0x7f00000002c0)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 1m42.75875788s ago: executing program 3 (id=921): prctl$PR_SET_IO_FLUSHER(0x43, 0x1) syz_clone(0x99a1cfb1edd42446, 0x0, 0x0, 0x0, 0x0, 0x0) 1m41.667951182s ago: executing program 3 (id=922): r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000640)={0x28, 0x0, 0x2710, @local}, 0x10) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000002c0)=""/80, 0x50}], 0x1, 0x0, 0xffffffffffffff31}, 0x5}], 0x40000, 0x0, 0x0) shutdown(r1, 0x0) 55.438865474s ago: executing program 34 (id=922): r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @local}, 0x10) listen(r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000000640)={0x28, 0x0, 0x2710, @local}, 0x10) recvmmsg(r1, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000002c0)=""/80, 0x50}], 0x1, 0x0, 0xffffffffffffff31}, 0x5}], 0x40000, 0x0, 0x0) shutdown(r1, 0x0) 3.645280535s ago: executing program 0 (id=961): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000080)={@mcast1, 0x3, r1}) 3.178688561s ago: executing program 0 (id=962): syz_emit_ethernet(0x16, &(0x7f0000000f00)={@random="cd1c43650b3c", @random="4d861f9bc51f", @void, {@llc={0x4, {@snap={0x0, 0x1, '\x00', "332d1f", 0x6000}}}}}, 0x0) 2.593924355s ago: executing program 0 (id=963): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="6c00000010000104000000000000000800000000", @ANYRES32=0x0, @ANYBLOB="5d580000000000001c001a8018640a801400070000000000000000000000000000000001140003006970766c616e310000000000000000001c0012800b0001006970766c616e00000c0002"], 0x6c}, 0x1, 0x0, 0x0, 0x840}, 0x24048010) 1.658152395s ago: executing program 0 (id=964): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40186f40, &(0x7f0000000440)=0x1f) 768.099882ms ago: executing program 0 (id=965): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) landlock_add_rule$LANDLOCK_RULE_PATH_BENEATH(r0, 0x1, 0x0, 0x0) 0s ago: executing program 0 (id=966): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x6) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000380)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r3}, 0x10) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:58066' (ED25519) to the list of known hosts. [ 238.294112][ T30] audit: type=1400 audit(237.870:46): avc: denied { name_bind } for pid=3320 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 238.800103][ T30] audit: type=1400 audit(238.370:47): avc: denied { execute } for pid=3321 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 238.806777][ T30] audit: type=1400 audit(238.380:48): avc: denied { execute_no_trans } for pid=3321 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 247.368920][ T30] audit: type=1400 audit(246.940:49): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 247.412913][ T30] audit: type=1400 audit(246.980:50): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 247.462343][ T3321] cgroup: Unknown subsys name 'net' [ 247.509677][ T30] audit: type=1400 audit(247.080:51): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 247.933985][ T3321] cgroup: Unknown subsys name 'cpuset' [ 248.010365][ T3321] cgroup: Unknown subsys name 'rlimit' [ 248.352906][ T30] audit: type=1400 audit(247.920:52): avc: denied { setattr } for pid=3321 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 248.367518][ T30] audit: type=1400 audit(247.930:53): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 248.368560][ T30] audit: type=1400 audit(247.940:54): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 249.166684][ T3323] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 249.175845][ T30] audit: type=1400 audit(248.740:55): avc: denied { relabelto } for pid=3323 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 249.187680][ T30] audit: type=1400 audit(248.750:56): avc: denied { write } for pid=3323 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 249.294860][ T30] audit: type=1400 audit(248.870:57): avc: denied { read } for pid=3321 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 249.298116][ T30] audit: type=1400 audit(248.870:58): avc: denied { open } for pid=3321 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 249.320107][ T3321] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 274.250018][ T30] audit: type=1400 audit(273.820:59): avc: denied { execmem } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 274.408430][ T30] audit: type=1400 audit(273.980:60): avc: denied { read } for pid=3326 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 274.413638][ T30] audit: type=1400 audit(273.980:61): avc: denied { open } for pid=3326 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 274.420586][ T30] audit: type=1400 audit(273.990:62): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 274.482617][ T30] audit: type=1400 audit(274.050:63): avc: denied { module_request } for pid=3326 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 274.756843][ T30] audit: type=1400 audit(274.330:64): avc: denied { sys_module } for pid=3326 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 283.854623][ T3327] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 284.045142][ T3327] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 284.080511][ T3326] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 284.242953][ T3326] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 290.479436][ T3327] hsr_slave_0: entered promiscuous mode [ 290.496805][ T3327] hsr_slave_1: entered promiscuous mode [ 290.924454][ T3326] hsr_slave_0: entered promiscuous mode [ 290.940304][ T3326] hsr_slave_1: entered promiscuous mode [ 290.949728][ T3326] debugfs: 'hsr0' already exists in 'hsr' [ 290.958601][ T3326] Cannot create hsr debugfs directory [ 293.946725][ T30] audit: type=1400 audit(293.520:65): avc: denied { create } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 293.966778][ T30] audit: type=1400 audit(293.540:66): avc: denied { write } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 293.974715][ T30] audit: type=1400 audit(293.550:67): avc: denied { read } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 294.055174][ T3326] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 294.189410][ T3326] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 294.324740][ T3326] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 294.484416][ T3326] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 295.090134][ T3327] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 295.135528][ T3327] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 295.176622][ T3327] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 295.226527][ T3327] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 297.670001][ T3326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 298.728384][ T3327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 311.478875][ T3326] veth0_vlan: entered promiscuous mode [ 311.584753][ T3326] veth1_vlan: entered promiscuous mode [ 312.063217][ T3326] veth0_macvtap: entered promiscuous mode [ 312.145840][ T3326] veth1_macvtap: entered promiscuous mode [ 312.476691][ T1098] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.485087][ T1098] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.488644][ T1098] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.490375][ T1098] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 313.225242][ T30] audit: type=1400 audit(312.760:68): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/syzkaller.cFR6k8/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 313.230130][ T30] audit: type=1400 audit(312.800:69): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 313.251952][ T30] audit: type=1400 audit(312.820:70): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/syzkaller.cFR6k8/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 313.345216][ T30] audit: type=1400 audit(312.920:71): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 313.433956][ T30] audit: type=1400 audit(313.000:72): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/syzkaller.cFR6k8/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 313.434973][ T30] audit: type=1400 audit(313.010:73): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/syzkaller.cFR6k8/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4561 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 313.499322][ T30] audit: type=1400 audit(313.070:74): avc: denied { unmount } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 313.516694][ T30] audit: type=1400 audit(313.090:75): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 313.529637][ T30] audit: type=1400 audit(313.100:76): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="gadgetfs" ino=4562 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 313.559123][ T30] audit: type=1400 audit(313.130:77): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 313.640772][ T3327] veth0_vlan: entered promiscuous mode [ 313.858907][ T3326] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 313.869845][ T3327] veth1_vlan: entered promiscuous mode [ 314.898995][ T3327] veth0_macvtap: entered promiscuous mode [ 315.128290][ T3327] veth1_macvtap: entered promiscuous mode [ 316.019975][ T40] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 316.027665][ T40] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 316.028206][ T40] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 316.031798][ T40] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.120634][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 321.125542][ T30] audit: type=1400 audit(320.690:86): avc: denied { prog_load } for pid=3483 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 321.129264][ T30] audit: type=1400 audit(320.690:87): avc: denied { bpf } for pid=3483 comm="syz.0.4" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 321.164117][ T30] audit: type=1400 audit(320.720:88): avc: denied { perfmon } for pid=3483 comm="syz.0.4" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 321.233447][ T30] audit: type=1400 audit(320.800:89): avc: denied { prog_run } for pid=3483 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 323.744978][ T30] audit: type=1400 audit(323.310:90): avc: denied { create } for pid=3489 comm="syz.0.6" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 323.876508][ T30] audit: type=1400 audit(323.450:91): avc: denied { mount } for pid=3489 comm="syz.0.6" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 324.016081][ T30] audit: type=1400 audit(323.580:92): avc: denied { unmount } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 326.568703][ T30] audit: type=1400 audit(326.140:93): avc: denied { name_bind } for pid=3498 comm="syz.0.10" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 329.433202][ T30] audit: type=1400 audit(329.000:94): avc: denied { unmount } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 330.322382][ T30] audit: type=1400 audit(329.890:95): avc: denied { allowed } for pid=3504 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 330.786173][ T30] audit: type=1400 audit(330.360:96): avc: denied { unmount } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 331.233068][ T30] audit: type=1400 audit(330.790:97): avc: denied { create } for pid=3508 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 331.297547][ T30] audit: type=1400 audit(330.870:98): avc: denied { connect } for pid=3508 comm="syz.1.14" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 331.359765][ T30] audit: type=1400 audit(330.930:99): avc: denied { write } for pid=3508 comm="syz.1.14" laddr=fe80::5872:fff:fe7a:8f5a lport=58 faddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 332.043692][ T30] audit: type=1400 audit(331.610:100): avc: denied { read write } for pid=3510 comm="syz.1.15" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 332.056145][ T30] audit: type=1400 audit(331.630:101): avc: denied { open } for pid=3510 comm="syz.1.15" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 334.996697][ T30] audit: type=1400 audit(334.560:102): avc: denied { map_create } for pid=3522 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 335.028267][ T30] audit: type=1400 audit(334.600:103): avc: denied { map_read map_write } for pid=3522 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 335.940088][ T30] audit: type=1400 audit(335.510:104): avc: denied { create } for pid=3524 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 335.975951][ T30] audit: type=1400 audit(335.550:105): avc: denied { write } for pid=3524 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 336.015873][ T3525] Zero length message leads to an empty skb [ 337.603975][ T30] audit: type=1400 audit(337.170:106): avc: denied { read } for pid=3530 comm="syz.0.23" name="iommu" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 337.615900][ T30] audit: type=1400 audit(337.190:107): avc: denied { open } for pid=3530 comm="syz.0.23" path="/dev/iommu" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 337.639313][ T30] audit: type=1400 audit(337.210:108): avc: denied { ioctl } for pid=3530 comm="syz.0.23" path="/dev/iommu" dev="devtmpfs" ino=615 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 338.017719][ T30] audit: type=1400 audit(337.590:109): avc: denied { name_bind } for pid=3532 comm="syz.0.24" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 338.022652][ T30] audit: type=1400 audit(337.590:110): avc: denied { node_bind } for pid=3532 comm="syz.0.24" saddr=::ffff:127.0.0.1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 342.437269][ T30] audit: type=1400 audit(342.010:111): avc: denied { ioctl } for pid=3541 comm="syz.0.28" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4714 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 351.014086][ T3565] netlink: 28 bytes leftover after parsing attributes in process `syz.1.37'. [ 352.619076][ T3571] netlink: 4 bytes leftover after parsing attributes in process `syz.1.40'. [ 355.301319][ C1] hrtimer: interrupt took 1245568 ns [ 355.587838][ T30] audit: type=1400 audit(355.160:112): avc: denied { read write } for pid=3327 comm="syz-executor" name="loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 355.638853][ T30] audit: type=1400 audit(355.180:113): avc: denied { open } for pid=3327 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 355.687427][ T30] audit: type=1400 audit(355.260:114): avc: denied { ioctl } for pid=3327 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 356.344728][ T30] audit: type=1400 audit(355.900:115): avc: denied { read write } for pid=3577 comm="syz.0.44" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 356.345819][ T30] audit: type=1400 audit(355.910:116): avc: denied { open } for pid=3577 comm="syz.0.44" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 356.365748][ T30] audit: type=1400 audit(355.940:117): avc: denied { ioctl } for pid=3577 comm="syz.0.44" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 362.705524][ T30] audit: type=1400 audit(362.280:118): avc: denied { setopt } for pid=3587 comm="syz.0.48" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 362.747331][ T30] audit: type=1400 audit(362.320:119): avc: denied { bind } for pid=3587 comm="syz.0.48" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 362.749351][ T30] audit: type=1400 audit(362.320:120): avc: denied { node_bind } for pid=3587 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 366.980797][ T30] audit: type=1400 audit(366.550:121): avc: denied { associate } for pid=3597 comm="syz.0.53" name="mnt" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 369.735859][ T30] audit: type=1400 audit(369.310:122): avc: denied { create } for pid=3600 comm="syz.0.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 369.750835][ T3601] capability: warning: `syz.0.54' uses deprecated v2 capabilities in a way that may be insecure [ 369.778500][ T30] audit: type=1400 audit(369.350:123): avc: denied { ioctl } for pid=3600 comm="syz.0.54" path="socket:[3663]" dev="sockfs" ino=3663 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 370.625207][ T30] audit: type=1400 audit(370.200:124): avc: denied { name_bind } for pid=3602 comm="syz.0.55" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 373.050307][ T3609] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 373.074211][ T30] audit: type=1400 audit(372.650:125): avc: denied { ioctl } for pid=3608 comm="syz.1.58" path="socket:[4803]" dev="sockfs" ino=4803 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 383.903383][ T3633] sock: sock_timestamping_bind_phc: sock not bind to device [ 386.928427][ T30] audit: type=1400 audit(386.480:126): avc: denied { open } for pid=3639 comm="syz.0.66" path="/dev/ptyq5" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 387.108692][ T30] audit: type=1400 audit(386.680:127): avc: denied { ioctl } for pid=3639 comm="syz.0.66" path="/dev/ptyq5" dev="devtmpfs" ino=117 ioctlcmd=0x5413 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 390.012429][ T30] audit: type=1400 audit(389.580:128): avc: denied { read write } for pid=3650 comm="syz.1.69" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 390.016705][ T30] audit: type=1400 audit(389.590:129): avc: denied { open } for pid=3650 comm="syz.1.69" path="/20/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 390.057841][ T30] audit: type=1400 audit(389.620:130): avc: denied { ioctl } for pid=3650 comm="syz.1.69" path="/20/file0/file0" dev="fuse" ino=64 ioctlcmd=0x542d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 392.460408][ T30] audit: type=1400 audit(392.030:131): avc: denied { setopt } for pid=3657 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 393.020262][ T30] audit: type=1400 audit(392.580:132): avc: denied { read } for pid=3659 comm="syz.1.73" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 393.024709][ T30] audit: type=1400 audit(392.590:133): avc: denied { open } for pid=3659 comm="syz.1.73" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 397.524366][ T30] audit: type=1400 audit(397.090:134): avc: denied { create } for pid=3668 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 398.752790][ T30] audit: type=1400 audit(398.320:135): avc: denied { read } for pid=3668 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 404.259856][ T30] audit: type=1400 audit(403.830:136): avc: denied { block_suspend } for pid=3676 comm="syz.0.80" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 409.613275][ T30] audit: type=1400 audit(409.180:137): avc: denied { mounton } for pid=3694 comm="syz.1.87" path="/proc/77/task" dev="proc" ino=4961 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 426.279096][ T3732] Driver unsupported XDP return value 0 on prog (id 10) dev N/A, expect packet loss! [ 434.794395][ T30] audit: type=1400 audit(434.370:138): avc: denied { mounton } for pid=3756 comm="syz.0.113" path="/74/file0" dev="tmpfs" ino=399 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 440.008282][ T30] audit: type=1400 audit(439.580:139): avc: denied { read } for pid=3769 comm="syz.1.118" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 447.783985][ T3780] IPv4: Oversized IP packet from 127.0.0.1 [ 447.792738][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 449.694379][ T30] audit: type=1400 audit(449.260:140): avc: denied { write } for pid=3786 comm="syz.1.125" name="udmabuf" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 452.985560][ T30] audit: type=1400 audit(452.560:141): avc: denied { ioctl } for pid=3790 comm="syz.0.127" path="socket:[3905]" dev="sockfs" ino=3905 ioctlcmd=0x891b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 459.165771][ T30] audit: type=1400 audit(458.710:142): avc: denied { connect } for pid=3806 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 459.666269][ T30] audit: type=1400 audit(459.240:143): avc: denied { shutdown } for pid=3806 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 463.296299][ T30] audit: type=1400 audit(462.870:144): avc: denied { mounton } for pid=3813 comm="syz.1.137" path="/syzcgroup/net/syz1/devices.allow" dev="cgroup" ino=80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=file permissive=1 [ 474.302337][ T30] audit: type=1400 audit(473.870:145): avc: denied { create } for pid=3849 comm="syz.0.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 479.249284][ T3868] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 481.068265][ T3876] fuse: Bad value for 'fd' [ 482.434318][ T3880] tmpfs: Unknown parameter 'nr_ino' [ 486.326658][ T3887] fuse: Bad value for 'fd' [ 487.185771][ T3890] netlink: 8 bytes leftover after parsing attributes in process `syz.1.166'. [ 487.186715][ T3890] netlink: 32 bytes leftover after parsing attributes in process `syz.1.166'. [ 487.216297][ T3891] tmpfs: Unknown parameter 'nr_ino' [ 488.417016][ T30] audit: type=1400 audit(487.990:146): avc: denied { ioctl } for pid=3896 comm="syz.0.170" path="socket:[4046]" dev="sockfs" ino=4046 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 490.509079][ T3907] fuse: Bad value for 'fd' [ 490.970560][ T3909] tmpfs: Bad value for 'nr_inodes' [ 496.285911][ T3920] tmpfs: Bad value for 'nr_inodes' [ 497.175987][ T30] audit: type=1400 audit(496.750:147): avc: denied { setattr } for pid=3923 comm="syz.0.179" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 498.532950][ T3930] tmpfs: Bad value for 'nr_inodes' [ 500.974412][ T3940] tmpfs: Bad value for 'nr_inodes' [ 502.760525][ T3953] tmpfs: Bad value for 'nr_inodes' [ 505.469875][ T3966] netlink: 8 bytes leftover after parsing attributes in process `syz.0.199'. [ 505.654762][ T3968] tmpfs: Bad value for 'nr_inodes' [ 513.808241][ T30] audit: type=1400 audit(513.380:148): avc: denied { mounton } for pid=3999 comm="syz.1.214" path="/86/file0/file0" dev="fuse" ino=18446744073709551615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 517.373080][ T4007] Injecting memory failure for pfn 0x63e04 at process virtual address 0x20000000 [ 517.420157][ T4007] Memory failure: 0x63e04: Sending SIGBUS to syz.1.216:4007 due to hardware memory corruption [ 517.436382][ T4007] Memory failure: 0x63e04: recovery action for dirty LRU page: Recovered [ 517.452967][ T4007] Injecting memory failure for pfn 0x4918b at process virtual address 0x20001000 [ 517.457448][ T4007] Memory failure: 0x4918b: recovery action for reserved kernel page: Ignored [ 525.659702][ T30] audit: type=1400 audit(525.230:149): avc: denied { connect } for pid=4021 comm="syz.1.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 531.734719][ T30] audit: type=1400 audit(531.280:150): avc: denied { remount } for pid=4034 comm="syz.1.229" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 531.743033][ T4036] ======================================================= [ 531.743033][ T4036] WARNING: The mand mount option has been deprecated and [ 531.743033][ T4036] and is ignored by this kernel. Remove the mand [ 531.743033][ T4036] option from the mount to silence this warning. [ 531.743033][ T4036] ======================================================= [ 534.133080][ T4045] netlink: 8 bytes leftover after parsing attributes in process `syz.1.233'. [ 539.077143][ T4060] syzkaller0: entered promiscuous mode [ 539.078404][ T4060] syzkaller0: entered allmulticast mode [ 544.985211][ T30] audit: type=1400 audit(544.560:151): avc: denied { create } for pid=4074 comm="syz.0.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 545.023333][ T30] audit: type=1400 audit(544.590:152): avc: denied { setopt } for pid=4074 comm="syz.0.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 547.783450][ T30] audit: type=1400 audit(547.350:153): avc: denied { write } for pid=4073 comm="syz.1.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 559.186439][ T4102] netlink: 12 bytes leftover after parsing attributes in process `syz.0.256'. [ 565.198269][ T30] audit: type=1400 audit(564.770:154): avc: denied { create } for pid=4120 comm="syz.1.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 569.362991][ T4125] Soft offlining pfn 0x60050 at process virtual address 0x20000000 [ 569.643389][ T4125] Soft offlining pfn 0x5f2df at process virtual address 0x20001000 [ 569.645992][ T4125] Soft offlining pfn 0x5b999 at process virtual address 0x20002000 [ 576.665809][ T4143] process 'syz.0.271' launched './file0' with NULL argv: empty string added [ 582.292606][ T30] audit: type=1326 audit(581.860:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4156 comm="syz.1.279" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7fc00000 [ 594.797024][ T30] audit: type=1400 audit(594.360:156): avc: denied { name_bind } for pid=4184 comm="syz.0.288" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 600.811924][ T30] audit: type=1400 audit(600.380:157): avc: denied { watch watch_reads } for pid=4192 comm="syz.0.290" path="/157" dev="tmpfs" ino=841 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 602.170679][ T4200] ip6tnl2: entered allmulticast mode [ 608.026268][ T4212] syzkaller0: entered promiscuous mode [ 608.031969][ T4212] syzkaller0: entered allmulticast mode [ 610.989394][ T30] audit: type=1400 audit(610.560:158): avc: denied { mount } for pid=4216 comm="syz.0.300" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 619.195158][ T30] audit: type=1400 audit(618.760:159): avc: denied { wake_alarm } for pid=4239 comm="syz.0.309" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 628.414386][ T30] audit: type=1400 audit(627.980:160): avc: denied { relabelfrom } for pid=4260 comm="syz.1.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 628.476687][ T30] audit: type=1400 audit(628.020:161): avc: denied { relabelto } for pid=4260 comm="syz.1.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 630.594870][ T30] audit: type=1400 audit(630.160:162): avc: denied { create } for pid=4263 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 630.616370][ T30] audit: type=1400 audit(630.180:163): avc: denied { write open } for pid=4263 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1979 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 630.702438][ T30] audit: type=1400 audit(630.250:164): avc: denied { append } for pid=4263 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1979 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 630.876403][ T30] audit: type=1400 audit(630.450:165): avc: denied { getattr } for pid=4263 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 631.108116][ T30] audit: type=1400 audit(630.670:166): avc: denied { bind } for pid=4270 comm="syz.0.320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 631.225344][ T30] audit: type=1400 audit(630.800:167): avc: denied { setopt } for pid=4270 comm="syz.0.320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 632.015464][ T30] audit: type=1400 audit(631.590:168): avc: denied { read } for pid=4272 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 633.443564][ T30] audit: type=1400 audit(632.970:169): avc: denied { unlink } for pid=4273 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1979 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 635.688901][ T30] audit: type=1400 audit(635.260:170): avc: denied { create } for pid=4283 comm="syz.0.324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 642.092942][ T4300] netlink: 8 bytes leftover after parsing attributes in process `syz.0.328'. [ 642.156752][ T4300] netlink: 8 bytes leftover after parsing attributes in process `syz.0.328'. [ 642.189228][ T4300] netlink: 8 bytes leftover after parsing attributes in process `syz.0.328'. [ 642.210790][ T4300] netlink: 8 bytes leftover after parsing attributes in process `syz.0.328'. [ 645.765105][ T4307] netlink: 8 bytes leftover after parsing attributes in process `syz.1.332'. [ 652.376399][ T4327] netlink: 4 bytes leftover after parsing attributes in process `syz.0.339'. [ 654.059333][ T4333] fuse: Unknown parameter 'grou00000000000000000000' [ 655.589059][ T30] audit: type=1400 audit(655.160:171): avc: denied { bind } for pid=4339 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 655.683392][ T30] audit: type=1400 audit(655.250:172): avc: denied { accept } for pid=4339 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 655.775005][ T30] audit: type=1400 audit(655.340:173): avc: denied { read } for pid=4339 comm="syz.0.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 662.703387][ T30] audit: type=1400 audit(662.230:174): avc: denied { ioctl } for pid=4355 comm="syz.1.352" path="socket:[6752]" dev="sockfs" ino=6752 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 664.630466][ T4364] fuse: Bad value for 'fd' [ 666.252254][ T30] audit: type=1400 audit(665.820:175): avc: denied { write } for pid=4370 comm="syz.0.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 667.340438][ T30] audit: type=1400 audit(666.910:176): avc: denied { map } for pid=4372 comm="syz.0.359" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7268 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 667.347400][ T30] audit: type=1400 audit(666.920:177): avc: denied { read write } for pid=4372 comm="syz.0.359" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7268 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 673.193749][ T4390] netlink: 20 bytes leftover after parsing attributes in process `syz.0.366'. [ 679.365348][ T30] audit: type=1400 audit(678.930:178): avc: denied { execute } for pid=4399 comm="syz.1.371" name="file0" dev="tmpfs" ino=867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 679.410659][ T30] audit: type=1400 audit(678.980:179): avc: denied { execute_no_trans } for pid=4399 comm="syz.1.371" path="/163/file0" dev="tmpfs" ino=867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 680.143260][ T4402] 8021q: adding VLAN 0 to HW filter on device bond1 [ 700.087523][ T30] audit: type=1400 audit(699.660:180): avc: denied { create } for pid=4433 comm="syz.0.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 701.499914][ T4438] batadv_slave_0: entered promiscuous mode [ 701.579493][ T4438] netlink: 4 bytes leftover after parsing attributes in process `syz.0.388'. [ 702.387644][ T4437] batadv_slave_0: left promiscuous mode [ 705.316801][ T4448] fuse: Unknown parameter 'group_id00000000000000000000' [ 709.058941][ T30] audit: type=1400 audit(708.630:181): avc: denied { create } for pid=4457 comm="syz.0.394" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 709.177894][ T30] audit: type=1400 audit(708.750:182): avc: denied { mounton } for pid=4457 comm="syz.0.394" path="/226/file0" dev="tmpfs" ino=1199 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 712.065201][ T4465] fuse: Unknown parameter 'group_id00000000000000000000' [ 719.023973][ T4469] Injecting memory failure for pfn 0x5f4b6 at process virtual address 0x20001000 [ 719.049411][ T4469] Memory failure: 0x5f4b6: recovery action for clean LRU page: Recovered [ 719.055996][ T4469] Injecting memory failure for pfn 0x5f4b4 at process virtual address 0x20002000 [ 719.075735][ T4469] Memory failure: 0x5f4b4: recovery action for clean LRU page: Recovered [ 719.078906][ T4469] Injecting memory failure for pfn 0x5f4b2 at process virtual address 0x20003000 [ 719.080390][ T4469] Memory failure: 0x5f4b2: recovery action for clean LRU page: Recovered [ 722.759807][ T30] audit: type=1400 audit(722.330:183): avc: denied { unlink } for pid=3327 comm="syz-executor" name="file0" dev="tmpfs" ino=1199 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 724.245887][ T30] audit: type=1400 audit(723.820:184): avc: denied { ioctl } for pid=4477 comm="syz.1.400" path="socket:[6928]" dev="sockfs" ino=6928 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 724.500736][ T4478] veth1_to_hsr: entered promiscuous mode [ 724.520716][ T4478] macvlan2: entered promiscuous mode [ 728.665320][ T4487] netlink: 8 bytes leftover after parsing attributes in process `syz.1.404'. [ 728.674337][ T4487] netlink: 8 bytes leftover after parsing attributes in process `syz.1.404'. [ 730.755110][ T4492] netlink: 62967 bytes leftover after parsing attributes in process `syz.1.406'. [ 738.966653][ T30] audit: type=1400 audit(738.540:185): avc: denied { write } for pid=4505 comm="syz.1.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 740.364367][ T30] audit: type=1400 audit(739.920:186): avc: denied { create } for pid=4507 comm="syz.1.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 740.465229][ T30] audit: type=1400 audit(740.020:187): avc: denied { write } for pid=4507 comm="syz.1.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 740.466293][ T30] audit: type=1400 audit(740.020:188): avc: denied { nlmsg_write } for pid=4507 comm="syz.1.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 740.549255][ T30] audit: type=1400 audit(740.120:189): avc: denied { create } for pid=4507 comm="syz.1.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 740.594446][ T30] audit: type=1400 audit(740.160:190): avc: denied { write } for pid=4507 comm="syz.1.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 750.578326][ T30] audit: type=1400 audit(750.150:191): avc: denied { create } for pid=4576 comm="syz.1.414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 766.236655][ T4596] netlink: 40 bytes leftover after parsing attributes in process `syz.0.420'. [ 769.687734][ T4604] syzkaller0: entered promiscuous mode [ 769.688343][ T4604] syzkaller0: entered allmulticast mode [ 799.365403][ T30] audit: type=1400 audit(798.930:192): avc: denied { append } for pid=4618 comm="syz.0.428" name="uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 799.378028][ T30] audit: type=1400 audit(798.950:193): avc: denied { ioctl } for pid=4618 comm="syz.0.428" path="/dev/uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 799.517878][ T4620] input: syz1 as /devices/virtual/input/input1 [ 828.159522][ T30] audit: type=1400 audit(827.730:194): avc: denied { execute } for pid=4635 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 828.208257][ T30] audit: type=1400 audit(827.770:195): avc: denied { execute_no_trans } for pid=4635 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 849.953450][ T30] audit: type=1400 audit(849.520:196): avc: denied { create } for pid=4690 comm="syz.0.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 862.429144][ T4722] fuse: Unknown parameter 'group_i00000000000000000000' [ 863.878480][ T4638] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 864.067717][ T4638] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 868.460154][ T4733] fuse: Unknown parameter 'group_i00000000000000000000' [ 875.694321][ T4749] fuse: Unknown parameter 'group_i00000000000000000000' [ 876.915766][ T4638] hsr_slave_0: entered promiscuous mode [ 876.965014][ T4751] fuse: Bad value for 'fd' [ 877.029813][ T4638] hsr_slave_1: entered promiscuous mode [ 877.114382][ T4638] debugfs: 'hsr0' already exists in 'hsr' [ 877.115421][ T4638] Cannot create hsr debugfs directory [ 878.416843][ T30] audit: type=1400 audit(877.990:197): avc: denied { link } for pid=4753 comm="syz.0.452" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=1376 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 878.587659][ T30] audit: type=1400 audit(878.160:198): avc: denied { read } for pid=4753 comm="syz.0.452" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=1376 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 878.712920][ T30] audit: type=1400 audit(878.180:199): avc: denied { open } for pid=4753 comm="syz.0.452" path="/259/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=1376 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 883.216639][ T4638] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 883.409868][ T4638] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 883.588526][ T4638] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 883.797600][ T4638] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 884.060535][ T4758] fuse: Unknown parameter 'group_id00000000000000000000' [ 885.497070][ T4767] fuse: Bad value for 'fd' [ 887.360192][ T30] audit: type=1400 audit(886.930:200): avc: denied { read write } for pid=4769 comm="syz.0.456" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 887.547826][ T30] audit: type=1400 audit(887.120:201): avc: denied { open } for pid=4769 comm="syz.0.456" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 887.928399][ T4499] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 888.034903][ T4499] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 891.197193][ T4779] fuse: Unknown parameter 'group_id00000000000000000000' [ 892.926702][ T4782] fuse: Bad value for 'fd' [ 893.849813][ T4773] fido_id[4773]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 894.540464][ T4638] 8021q: adding VLAN 0 to HW filter on device bond0 [ 894.630586][ T30] audit: type=1400 audit(894.190:202): avc: denied { write } for pid=4783 comm="syz.0.460" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 894.753632][ T30] audit: type=1400 audit(894.310:203): avc: denied { read } for pid=4783 comm="syz.0.460" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 894.765389][ T30] audit: type=1400 audit(894.330:204): avc: denied { open } for pid=4783 comm="syz.0.460" path="/dev/dri/card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 902.445291][ T4796] fuse: Unknown parameter '0x0000000000000003' [ 904.997782][ T30] audit: type=1400 audit(904.570:205): avc: denied { setopt } for pid=4797 comm="syz.0.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 912.734053][ T30] audit: type=1400 audit(912.290:206): avc: denied { node_bind } for pid=4811 comm="syz.0.467" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 914.477181][ T30] audit: type=1400 audit(914.050:207): avc: denied { create } for pid=4814 comm="syz.0.468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 914.576821][ T30] audit: type=1400 audit(914.130:208): avc: denied { ioctl } for pid=4814 comm="syz.0.468" path="socket:[8493]" dev="sockfs" ino=8493 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 929.235018][ T30] audit: type=1400 audit(928.790:209): avc: denied { read } for pid=4835 comm="syz.0.470" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 929.252806][ T30] audit: type=1400 audit(928.820:210): avc: denied { open } for pid=4835 comm="syz.0.470" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 929.296650][ T30] audit: type=1400 audit(928.870:211): avc: denied { ioctl } for pid=4835 comm="syz.0.470" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x700e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 931.265166][ T30] audit: type=1400 audit(930.840:212): avc: denied { create } for pid=4839 comm="syz.0.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 931.563225][ T30] audit: type=1400 audit(931.130:213): avc: denied { bind } for pid=4839 comm="syz.0.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 937.367783][ T4638] veth0_vlan: entered promiscuous mode [ 937.727764][ T4638] veth1_vlan: entered promiscuous mode [ 938.848262][ T4638] veth0_macvtap: entered promiscuous mode [ 939.437675][ T4638] veth1_macvtap: entered promiscuous mode [ 939.664296][ T4847] netlink: 20 bytes leftover after parsing attributes in process `syz.0.472'. [ 941.409266][ T4558] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 941.424303][ T4558] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 941.429992][ T4558] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 941.437528][ T4558] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 943.090463][ T30] audit: type=1400 audit(942.660:214): avc: denied { mounton } for pid=4638 comm="syz-executor" path="/syzkaller.6Hp3GG/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=7941 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 957.219069][ T4499] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 957.556484][ T4499] usb 1-1: Using ep0 maxpacket: 8 [ 957.734566][ T4499] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 957.735862][ T4499] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 957.736172][ T4499] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 957.736738][ T4499] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 957.736925][ T4499] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 957.737629][ T4499] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 957.737780][ T4499] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 958.237757][ T4499] usb 1-1: GET_CAPABILITIES returned 0 [ 958.238771][ T4499] usbtmc 1-1:16.0: can't read capabilities [ 958.726664][ T4499] usb 1-1: USB disconnect, device number 2 [ 963.089315][ T30] audit: type=1400 audit(962.660:215): avc: denied { create } for pid=4866 comm="syz.2.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 963.323642][ T30] audit: type=1400 audit(962.800:216): avc: denied { ioctl } for pid=4866 comm="syz.2.479" path="socket:[8572]" dev="sockfs" ino=8572 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 963.324658][ T30] audit: type=1400 audit(962.880:217): avc: denied { bind } for pid=4866 comm="syz.2.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 973.807105][ T30] audit: type=1400 audit(973.370:218): avc: denied { create } for pid=4878 comm="syz.2.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 973.833624][ T30] audit: type=1400 audit(973.400:219): avc: denied { setopt } for pid=4878 comm="syz.2.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 997.145325][ T4550] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 998.000421][ T4550] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 998.536597][ T4550] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 999.274868][ T4550] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1001.719646][ T30] audit: type=1400 audit(1001.290:220): avc: denied { read } for pid=3166 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1006.775509][ T4903] fuse: Bad value for 'rootmode' [ 1009.564134][ T4550] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1009.715305][ T4550] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1009.810175][ T4550] bond0 (unregistering): Released all slaves [ 1010.852516][ T4550] hsr_slave_0: left promiscuous mode [ 1010.925833][ T4550] hsr_slave_1: left promiscuous mode [ 1011.379539][ T4550] veth1_to_hsr: left promiscuous mode [ 1011.439716][ T4550] veth1_macvtap: left promiscuous mode [ 1011.534563][ T4550] veth0_macvtap: left promiscuous mode [ 1011.558275][ T4550] veth1_vlan: left promiscuous mode [ 1011.560002][ T4550] veth0_vlan: left promiscuous mode [ 1011.887125][ T4909] netlink: 'syz.2.495': attribute type 1 has an invalid length. [ 1011.904123][ T4909] netlink: 244 bytes leftover after parsing attributes in process `syz.2.495'. [ 1025.706639][ T4914] fuse: Bad value for 'rootmode' [ 1027.188455][ T4916] fuse: Bad value for 'fd' [ 1027.305380][ T30] audit: type=1400 audit(1026.880:221): avc: denied { ioctl } for pid=4915 comm="syz.0.498" path="/289/file0" dev="tmpfs" ino=1533 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1039.569520][ T30] audit: type=1400 audit(1039.140:222): avc: denied { allowed } for pid=4947 comm="syz.2.510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1043.719130][ T30] audit: type=1400 audit(1043.290:223): avc: denied { ioctl } for pid=4957 comm="syz.2.512" path="socket:[9266]" dev="sockfs" ino=9266 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1050.549591][ T30] audit: type=1400 audit(1050.120:224): avc: denied { append } for pid=4965 comm="syz.2.514" name="loop5" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1051.788272][ T30] audit: type=1400 audit(1051.360:225): avc: denied { create } for pid=4970 comm="syz.2.515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1054.906435][ T4981] netlink: 8 bytes leftover after parsing attributes in process `syz.0.518'. [ 1059.093581][ T30] audit: type=1400 audit(1058.650:226): avc: denied { read write } for pid=4991 comm="syz.2.521" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1059.114211][ T30] audit: type=1400 audit(1058.680:227): avc: denied { open } for pid=4991 comm="syz.2.521" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1059.291747][ T30] audit: type=1400 audit(1058.840:228): avc: denied { ioctl } for pid=4991 comm="syz.2.521" path="/dev/nullb0" dev="devtmpfs" ino=672 ioctlcmd=0x127f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1072.353396][ T4341] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 1072.725723][ T4341] usb 1-1: config index 0 descriptor too short (expected 2084, got 36) [ 1072.730362][ T4341] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1072.733941][ T4341] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1072.736089][ T4341] usb 1-1: New USB device found, idVendor=0079, idProduct=0006, bcdDevice= 0.00 [ 1072.737898][ T4341] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1072.879444][ T4341] usb 1-1: config 0 descriptor?? [ 1073.799328][ T4341] hid-generic 0003:0079:0006.0002: unknown main item tag 0x0 [ 1073.812674][ T4341] hid-generic 0003:0079:0006.0002: unknown main item tag 0x0 [ 1073.919444][ T4341] hid-generic 0003:0079:0006.0002: hidraw0: USB HID v0.00 Device [HID 0079:0006] on usb-dummy_hcd.0-1/input0 [ 1074.013022][ T4341] usb 1-1: USB disconnect, device number 3 [ 1078.834972][ T5036] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1078.850983][ T5036] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1079.968580][ T5039] netlink: 'syz.2.535': attribute type 5 has an invalid length. [ 1087.488962][ T5040] fido_id[5040]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/report_descriptor': No such file or directory [ 1094.527883][ T30] audit: type=1400 audit(1094.100:229): avc: denied { write } for pid=5062 comm="syz.0.542" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1100.725002][ T30] audit: type=1400 audit(1100.290:230): avc: denied { read write } for pid=5072 comm="syz.0.544" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1100.748744][ T30] audit: type=1400 audit(1100.320:231): avc: denied { open } for pid=5072 comm="syz.0.544" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1100.820003][ T30] audit: type=1400 audit(1100.390:232): avc: denied { map } for pid=5072 comm="syz.0.544" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1103.254958][ T4341] usb 1-1: new full-speed USB device number 4 using dummy_hcd [ 1103.775312][ T4341] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1103.834484][ T4341] usb 1-1: not running at top speed; connect to a high speed hub [ 1103.968873][ T4341] usb 1-1: config 12 has an invalid interface number: 173 but max is 0 [ 1103.969965][ T4341] usb 1-1: config 12 has no interface number 0 [ 1103.972236][ T4341] usb 1-1: config 12 interface 173 has no altsetting 0 [ 1104.258128][ T4341] usb 1-1: New USB device found, idVendor=04b8, idProduct=0202, bcdDevice=33.b7 [ 1104.268067][ T4341] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1104.272668][ T4341] usb 1-1: Product: syz [ 1104.274443][ T4341] usb 1-1: Manufacturer: syz [ 1104.282794][ T4341] usb 1-1: SerialNumber: syz [ 1105.087927][ T4341] usb 1-1: USB disconnect, device number 4 [ 1108.137703][ T5085] netlink: 8 bytes leftover after parsing attributes in process `syz.2.548'. [ 1109.020297][ T5085] gtp0: entered promiscuous mode [ 1109.042468][ T5085] gtp0: entered allmulticast mode [ 1109.828399][ T30] audit: type=1400 audit(1109.400:233): avc: denied { create } for pid=5088 comm="syz.0.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1120.286796][ T30] audit: type=1400 audit(1119.860:234): avc: denied { ioctl } for pid=5113 comm="syz.0.556" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1120.314194][ T30] audit: type=1400 audit(1119.880:235): avc: denied { set_context_mgr } for pid=5113 comm="syz.0.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1120.363823][ T5114] binder: BINDER_SET_CONTEXT_MGR already set [ 1120.368927][ T5114] binder: 5113:5114 ioctl 4018620d 20000040 returned -16 [ 1122.163075][ T5117] nbd0: detected capacity change from 0 to 63 [ 1122.244389][ T5118] block nbd0: Receive control failed (result -32) [ 1122.407261][ T5027] block nbd0: Dead connection, failed to find a fallback [ 1122.423710][ T5027] block nbd0: shutting down sockets [ 1122.429898][ T5027] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 1122.454597][ T5027] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1122.457341][ T5027] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 1122.457701][ T5027] Buffer I/O error on dev nbd0, logical block 1, async page read [ 1122.458449][ T5027] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 1122.458784][ T5027] Buffer I/O error on dev nbd0, logical block 2, async page read [ 1122.459432][ T5027] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 1122.459731][ T5027] Buffer I/O error on dev nbd0, logical block 3, async page read [ 1122.494219][ T5027] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 1122.494745][ T5027] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1122.495666][ T5027] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 1122.495865][ T5027] Buffer I/O error on dev nbd0, logical block 1, async page read [ 1122.496597][ T5027] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 1122.496789][ T5027] Buffer I/O error on dev nbd0, logical block 2, async page read [ 1122.497403][ T5027] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 1122.497591][ T5027] Buffer I/O error on dev nbd0, logical block 3, async page read [ 1122.498064][ T5027] nbd0: unable to read partition table [ 1122.858718][ T5027] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 1122.872699][ T5027] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1122.878462][ T5027] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 1122.887712][ T5027] Buffer I/O error on dev nbd0, logical block 1, async page read [ 1122.928754][ T5027] nbd0: unable to read partition table [ 1124.215720][ T5027] block nbd0: NBD_DISCONNECT [ 1124.268058][ T5027] block nbd0: Send disconnect failed -32 [ 1128.305369][ T5027] udevd[5027]: inotify_add_watch(7, /dev/nbd0, 10) failed: No such file or directory [ 1128.415754][ T30] audit: type=1400 audit(1127.980:236): avc: denied { write } for pid=5125 comm="syz.2.559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1136.879092][ T30] audit: type=1400 audit(1136.450:237): avc: denied { create } for pid=5142 comm="syz.2.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1137.018471][ T30] audit: type=1400 audit(1136.580:238): avc: denied { connect } for pid=5142 comm="syz.2.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1137.046631][ T30] audit: type=1400 audit(1136.620:239): avc: denied { setopt } for pid=5142 comm="syz.2.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1137.108109][ T30] audit: type=1400 audit(1136.680:240): avc: denied { bind } for pid=5142 comm="syz.2.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1137.216248][ T30] audit: type=1400 audit(1136.780:241): avc: denied { write } for pid=5142 comm="syz.2.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1149.550576][ T5174] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1149.579541][ T5174] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1158.288196][ T30] audit: type=1400 audit(1157.860:242): avc: denied { write } for pid=5188 comm="syz.0.578" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1158.293581][ T30] audit: type=1400 audit(1157.860:243): avc: denied { open } for pid=5188 comm="syz.0.578" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1158.315135][ T5190] random: crng reseeded on system resumption [ 1158.406006][ T30] audit: type=1400 audit(1157.980:244): avc: denied { ioctl } for pid=5188 comm="syz.0.578" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3314 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1170.828453][ T30] audit: type=1400 audit(1170.390:245): avc: denied { create } for pid=5222 comm="syz.2.591" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1170.893704][ T30] audit: type=1400 audit(1170.450:246): avc: denied { map } for pid=5222 comm="syz.2.591" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9633 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1170.943959][ T30] audit: type=1400 audit(1170.470:247): avc: denied { read write } for pid=5222 comm="syz.2.591" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9633 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1177.118570][ T5232] netlink: 8 bytes leftover after parsing attributes in process `syz.2.593'. [ 1178.257989][ T5232] netlink: 8 bytes leftover after parsing attributes in process `syz.2.593'. [ 1183.658086][ T30] audit: type=1400 audit(1183.210:248): avc: denied { ioctl } for pid=5246 comm="syz.2.599" path="/dev/dri/card1" dev="devtmpfs" ino=619 ioctlcmd=0x64c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1186.310364][ T5255] netlink: 'syz.2.602': attribute type 14 has an invalid length. [ 1186.333163][ T5255] netlink: 24 bytes leftover after parsing attributes in process `syz.2.602'. [ 1189.538109][ T30] audit: type=1400 audit(1189.110:249): avc: denied { write } for pid=5265 comm="syz.0.607" name="tcp" dev="proc" ino=4026532734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1194.883235][ T3472] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 1195.232957][ T3472] usb 1-1: New USB device found, idVendor=0813, idProduct=0001, bcdDevice=3a.08 [ 1195.235492][ T3472] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1195.287533][ T3472] usb 1-1: config 0 descriptor?? [ 1205.860718][ T784] usb 1-1: USB disconnect, device number 5 [ 1220.087376][ T30] audit: type=1400 audit(1219.660:250): avc: denied { create } for pid=5297 comm="syz.2.619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1220.167443][ T30] audit: type=1400 audit(1219.720:251): avc: denied { bind } for pid=5297 comm="syz.2.619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1220.178095][ T30] audit: type=1400 audit(1219.750:252): avc: denied { write } for pid=5297 comm="syz.2.619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1222.029608][ T5302] syzkaller0: entered promiscuous mode [ 1222.082282][ T5302] syzkaller0: entered allmulticast mode [ 1230.305891][ T30] audit: type=1400 audit(1229.880:253): avc: denied { nlmsg_write } for pid=5318 comm="syz.2.629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1248.358416][ T5342] binder: 5341:5342 got transaction to context manager from process owning it [ 1248.377756][ T5342] binder: 5341:5342 transaction call to 5341:0 failed 3/29201/-22, code 0 size 0-0 line 3223 [ 1248.404077][ T9] binder: undelivered TRANSACTION_ERROR: 29201 [ 1248.536507][ T5344] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1248.718625][ T5344] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1253.747836][ T5353] could not allocate digest TFM handle sha1-avx [ 1259.077282][ T5365] netlink: 12 bytes leftover after parsing attributes in process `syz.2.644'. [ 1268.547172][ T30] audit: type=1400 audit(1268.120:254): avc: denied { sqpoll } for pid=5383 comm="syz.0.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1298.410137][ T30] audit: type=1400 audit(1297.980:255): avc: denied { getopt } for pid=5424 comm="syz.0.664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1301.333881][ T30] audit: type=1400 audit(1300.890:256): avc: denied { setopt } for pid=5429 comm="syz.2.666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1316.892486][ T5437] serio: Serial port ptm0 [ 1318.727773][ T5444] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1318.757140][ T5444] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1320.357914][ T5450] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1320.386784][ T5450] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1334.733979][ T30] audit: type=1400 audit(1334.270:257): avc: denied { create } for pid=5477 comm="syz.0.681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1340.799123][ T5490] netlink: 16 bytes leftover after parsing attributes in process `syz.2.685'. [ 1341.567894][ T5492] netlink: 'syz.2.685': attribute type 10 has an invalid length. [ 1341.968771][ T5492] netlink: 4 bytes leftover after parsing attributes in process `syz.2.685'. [ 1345.909206][ T30] audit: type=1400 audit(1345.450:258): avc: denied { nlmsg_read } for pid=5501 comm="syz.2.689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1346.987026][ T5506] cgroup: none used incorrectly [ 1353.614054][ T30] audit: type=1400 audit(1353.170:259): avc: denied { bind } for pid=5502 comm="syz.0.690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1353.630299][ T30] audit: type=1400 audit(1353.200:260): avc: denied { listen } for pid=5502 comm="syz.0.690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1353.849019][ T30] audit: type=1400 audit(1353.420:261): avc: denied { setopt } for pid=5502 comm="syz.0.690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1353.884208][ T30] audit: type=1400 audit(1353.450:262): avc: denied { read } for pid=5502 comm="syz.0.690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1367.424056][ T5527] netlink: 4 bytes leftover after parsing attributes in process `syz.0.698'. [ 1367.541625][ T5527] syz_tun: entered promiscuous mode [ 1367.545512][ T5527] macsec1: entered allmulticast mode [ 1367.550479][ T5527] syz_tun: entered allmulticast mode [ 1367.596369][ T5527] syz_tun: left allmulticast mode [ 1367.598546][ T5527] syz_tun: left promiscuous mode [ 1368.429245][ T30] audit: type=1400 audit(1368.000:263): avc: denied { write } for pid=5529 comm="syz.0.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1379.369103][ T5549] netlink: 8 bytes leftover after parsing attributes in process `syz.2.708'. [ 1386.480490][ T5565] binder: 5564:5565 ioctl c0306201 20000100 returned -14 [ 1389.426930][ T5569] netlink: 4 bytes leftover after parsing attributes in process `syz.2.715'. [ 1400.854297][ T23] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 1401.043404][ T23] usb 1-1: Using ep0 maxpacket: 32 [ 1401.072113][ T23] usb 1-1: config 0 has an invalid interface number: 132 but max is 0 [ 1401.074424][ T23] usb 1-1: config 0 has no interface number 0 [ 1401.082064][ T23] usb 1-1: config 0 interface 132 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1401.174060][ T23] usb 1-1: New USB device found, idVendor=0413, idProduct=6023, bcdDevice=ec.e5 [ 1401.183901][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1401.186317][ T23] usb 1-1: Product: syz [ 1401.187863][ T23] usb 1-1: Manufacturer: syz [ 1401.189371][ T23] usb 1-1: SerialNumber: syz [ 1401.227597][ T23] usb 1-1: config 0 descriptor?? [ 1408.424219][ T5594] syz.2.722 uses obsolete (PF_INET,SOCK_PACKET) [ 1411.384634][ T5600] netlink: 'syz.2.725': attribute type 1 has an invalid length. [ 1411.385285][ T5600] netlink: 224 bytes leftover after parsing attributes in process `syz.2.725'. [ 1411.762197][ T5583] usb 1-1: USB disconnect, device number 6 [ 1412.552502][ T30] audit: type=1400 audit(1412.110:264): avc: denied { mount } for pid=5601 comm="syz.2.726" name="/" dev="autofs" ino=10230 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1413.226099][ T30] audit: type=1400 audit(1412.800:265): avc: denied { read } for pid=5601 comm="syz.2.726" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1413.235925][ T30] audit: type=1400 audit(1412.810:266): avc: denied { open } for pid=5601 comm="syz.2.726" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1413.832230][ T30] audit: type=1400 audit(1413.400:267): avc: denied { ioctl } for pid=5601 comm="syz.2.726" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9379 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1414.356791][ T30] audit: type=1400 audit(1413.930:268): avc: denied { unmount } for pid=4638 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1415.875683][ T4545] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1416.536898][ T4545] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1416.957189][ T4545] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1417.485074][ T4545] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1422.746401][ T5621] netlink: 24 bytes leftover after parsing attributes in process `syz.0.727'. [ 1424.269392][ T4545] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1424.364074][ T4545] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1424.429744][ T4545] bond0 (unregistering): Released all slaves [ 1425.045615][ T4545] hsr_slave_0: left promiscuous mode [ 1425.094726][ T4545] hsr_slave_1: left promiscuous mode [ 1425.294945][ T4545] veth1_macvtap: left promiscuous mode [ 1425.296260][ T4545] veth0_macvtap: left promiscuous mode [ 1425.298894][ T4545] veth1_vlan: left promiscuous mode [ 1425.308487][ T4545] veth0_vlan: left promiscuous mode [ 1441.797455][ T30] audit: type=1400 audit(1441.370:269): avc: denied { getopt } for pid=5642 comm="syz.0.731" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1448.096187][ T5611] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1448.257105][ T5611] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1458.288125][ T5611] hsr_slave_0: entered promiscuous mode [ 1458.307786][ T5611] hsr_slave_1: entered promiscuous mode [ 1458.324218][ T5611] debugfs: 'hsr0' already exists in 'hsr' [ 1458.325014][ T5611] Cannot create hsr debugfs directory [ 1462.895500][ T5611] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1463.045790][ T5611] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1463.149983][ T5611] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1463.268658][ T5611] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1469.723356][ T5611] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1482.324066][ T4853] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 1482.513688][ T4853] usb 1-1: Using ep0 maxpacket: 16 [ 1482.560060][ T4853] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1482.568561][ T4853] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1482.572948][ T4853] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 17 [ 1482.584950][ T4853] usb 1-1: New USB device found, idVendor=05ac, idProduct=8241, bcdDevice= 0.00 [ 1482.589984][ T4853] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1482.717426][ T4853] usb 1-1: config 0 descriptor?? [ 1483.373300][ T4853] hid-generic 0003:05AC:8241.0003: hidraw0: USB HID v0.00 Device [HID 05ac:8241] on usb-dummy_hcd.0-1/input0 [ 1483.564782][ T4499] usb 1-1: USB disconnect, device number 7 [ 1486.380695][ T4853] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 1486.675058][ T4853] usb 1-1: Using ep0 maxpacket: 16 [ 1486.797144][ T4853] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1486.802865][ T4853] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1486.875846][ T4853] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1486.879267][ T4853] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1486.882716][ T4853] usb 1-1: Product: syz [ 1486.886628][ T4853] usb 1-1: Manufacturer: syz [ 1486.888255][ T4853] usb 1-1: SerialNumber: syz [ 1487.389588][ T4853] usb 1-1: 0:2 : does not exist [ 1487.540316][ T4853] usb 1-1: 5:0: failed to get current value for ch 0 (-22) [ 1488.396205][ T4853] usb 1-1: USB disconnect, device number 8 [ 1491.825377][ T5768] fido_id[5768]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/report_descriptor': No such file or directory [ 1495.998910][ T5750] udevd[5750]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 1497.327342][ T5611] veth0_vlan: entered promiscuous mode [ 1497.667366][ T5611] veth1_vlan: entered promiscuous mode [ 1498.709546][ T5611] veth0_macvtap: entered promiscuous mode [ 1498.975100][ T5611] veth1_macvtap: entered promiscuous mode [ 1500.127038][ T4551] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1500.128071][ T4551] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1500.128381][ T4551] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1500.128713][ T4551] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1501.537338][ T30] audit: type=1400 audit(1501.100:270): avc: denied { mount } for pid=5611 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1508.905483][ T30] audit: type=1400 audit(1508.470:271): avc: denied { connect } for pid=5805 comm="syz.3.746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1521.726435][ T5825] 8021q: adding VLAN 0 to HW filter on device bond2 [ 1522.018852][ T5825] bond_slave_0: entered promiscuous mode [ 1522.020116][ T5825] bond_slave_1: entered promiscuous mode [ 1522.036226][ T5825] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 1522.186885][ T5825] bond2: (slave macvlan2): Enslaving as an active interface with an up link [ 1522.636249][ T5825] bond2: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 1523.592785][ T30] audit: type=1400 audit(1523.160:272): avc: denied { connect } for pid=5827 comm="syz.0.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1523.611864][ T30] audit: type=1400 audit(1523.180:273): avc: denied { write } for pid=5827 comm="syz.0.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1524.816355][ T5785] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 1525.068092][ T5785] usb 1-1: Using ep0 maxpacket: 8 [ 1525.187864][ T5785] usb 1-1: New USB device found, idVendor=0ccd, idProduct=00b3, bcdDevice=2e.04 [ 1525.190403][ T5785] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1525.194422][ T5785] usb 1-1: Product: syz [ 1525.196114][ T5785] usb 1-1: Manufacturer: syz [ 1525.197655][ T5785] usb 1-1: SerialNumber: syz [ 1525.253621][ T5785] usb 1-1: config 0 descriptor?? [ 1535.954988][ T784] usb 1-1: USB disconnect, device number 9 [ 1540.820152][ T30] audit: type=1400 audit(1540.390:274): avc: denied { lock } for pid=5844 comm="syz.0.757" path="socket:[11685]" dev="sockfs" ino=11685 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1564.545780][ T30] audit: type=1400 audit(1564.100:275): avc: denied { create } for pid=5868 comm="syz.3.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1564.626876][ T30] audit: type=1400 audit(1564.200:276): avc: denied { connect } for pid=5868 comm="syz.3.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1565.213484][ T30] audit: type=1400 audit(1564.780:277): avc: denied { write } for pid=5868 comm="syz.3.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1565.797084][ T30] audit: type=1400 audit(1565.370:278): avc: denied { bind } for pid=5868 comm="syz.3.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1570.177859][ T5887] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 1570.177859][ T5887] The task syz.3.769 (5887) triggered the difference, watch for misbehavior. [ 1572.072714][ T30] audit: type=1326 audit(1571.630:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5881 comm="syz.3.769" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7fc00000 [ 1572.073663][ T30] audit: type=1326 audit(1571.640:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5881 comm="syz.3.769" exe="/syz-executor" sig=0 arch=40000028 syscall=263 compat=1 ip=0x125b74 code=0x7fc00000 [ 1572.074033][ T30] audit: type=1326 audit(1571.640:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5881 comm="syz.3.769" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=1 ip=0x1302b4 code=0x7fc00000 [ 1575.727309][ T30] audit: type=1400 audit(1575.280:282): avc: denied { ioctl } for pid=5905 comm="syz.3.775" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=11263 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1580.305905][ T5917] netlink: 'syz.0.778': attribute type 4 has an invalid length. [ 1580.547451][ T5917] netlink: 'syz.0.778': attribute type 4 has an invalid length. [ 1582.976048][ T30] audit: type=1400 audit(1582.550:283): avc: denied { create } for pid=5922 comm="syz.0.780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1583.022118][ T30] audit: type=1400 audit(1582.590:284): avc: denied { connect } for pid=5922 comm="syz.0.780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1583.052072][ T30] audit: type=1400 audit(1582.620:285): avc: denied { read } for pid=5922 comm="syz.0.780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1583.413288][ T30] audit: type=1400 audit(1582.980:286): avc: denied { listen } for pid=5924 comm="syz.3.781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1584.039542][ T30] audit: type=1400 audit(1583.580:287): avc: denied { create } for pid=5929 comm="syz.3.783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1591.099708][ T30] audit: type=1400 audit(1590.670:288): avc: denied { bind } for pid=5943 comm="syz.0.786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1591.130685][ T30] audit: type=1400 audit(1590.700:289): avc: denied { listen } for pid=5943 comm="syz.0.786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1591.988166][ T30] audit: type=1326 audit(1591.560:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz.0.787" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 1591.998874][ T30] audit: type=1326 audit(1591.560:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz.0.787" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 1592.010091][ T30] audit: type=1326 audit(1591.580:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz.0.787" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 1592.034315][ T30] audit: type=1326 audit(1591.600:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz.0.787" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 1592.038538][ T30] audit: type=1326 audit(1591.610:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz.0.787" exe="/syz-executor" sig=0 arch=40000028 syscall=168 compat=1 ip=0x132320 code=0x7ffc0000 [ 1592.058633][ T30] audit: type=1326 audit(1591.620:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz.0.787" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 1592.069751][ T30] audit: type=1326 audit(1591.630:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz.0.787" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 1592.080351][ T30] audit: type=1326 audit(1591.650:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5946 comm="syz.0.787" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 1598.285130][ T30] audit: type=1400 audit(1597.840:298): avc: denied { append } for pid=5961 comm="syz.0.793" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1598.728899][ T5964] netlink: 12 bytes leftover after parsing attributes in process `syz.3.794'. [ 1606.928812][ T30] audit: type=1400 audit(1606.500:299): avc: denied { getopt } for pid=5992 comm="syz.0.805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1632.608310][ T30] audit: type=1400 audit(1632.180:300): avc: denied { write } for pid=6016 comm="syz.3.813" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1635.859993][ T6025] netlink: 8 bytes leftover after parsing attributes in process `syz.0.812'. [ 1648.790790][ T6046] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1648.827896][ T6046] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1658.907657][ T6060] syzkaller0: entered promiscuous mode [ 1658.909854][ T6060] syzkaller0: entered allmulticast mode [ 1675.854032][ T6096] netlink: 'syz.0.840': attribute type 1 has an invalid length. [ 1705.093981][ T30] audit: type=1400 audit(1704.650:301): avc: denied { setopt } for pid=6137 comm="syz.3.854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1727.029481][ T30] audit: type=1400 audit(1726.600:302): avc: denied { read } for pid=6189 comm="syz.3.871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1731.156200][ T6194] netlink: 384 bytes leftover after parsing attributes in process `syz.0.873'. [ 1737.029522][ T6204] wg2 speed is unknown, defaulting to 1000 [ 1737.125429][ T6204] wg2 speed is unknown, defaulting to 1000 [ 1737.203045][ T6204] wg2 speed is unknown, defaulting to 1000 [ 1740.954984][ T30] audit: type=1400 audit(1740.510:303): avc: denied { setopt } for pid=6208 comm="syz.0.878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1741.005693][ T6209] netlink: 4 bytes leftover after parsing attributes in process `syz.0.878'. [ 1744.620853][ T9] wg2 speed is unknown, defaulting to 1000 [ 1744.653323][ T6204] infiniband syz2: set active [ 1744.654417][ T6204] infiniband syz2: added wg2 [ 1744.730759][ T6204] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 1744.860351][ T6204] infiniband syz2: Couldn't open port 1 [ 1744.900019][ T30] audit: type=1326 audit(1744.460:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6212 comm="syz.0.880" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 1744.922447][ T30] audit: type=1326 audit(1744.460:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6212 comm="syz.0.880" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 1744.950345][ T30] audit: type=1326 audit(1744.510:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6212 comm="syz.0.880" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 1745.587933][ T6204] RDS/IB: syz2: added [ 1745.617132][ T6204] smc: adding ib device syz2 with port count 1 [ 1745.647896][ T6204] smc: ib device syz2 port 1 has no pnetid [ 1745.694706][ T9] wg2 speed is unknown, defaulting to 1000 [ 1745.879031][ T6204] wg2 speed is unknown, defaulting to 1000 [ 1749.050851][ T30] audit: type=1400 audit(1748.620:307): avc: denied { watch watch_reads } for pid=6222 comm="syz.0.883" path="/proc/1137" dev="proc" ino=12141 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1755.070778][ T6204] wg2 speed is unknown, defaulting to 1000 [ 1763.327822][ T30] audit: type=1326 audit(1762.870:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6249 comm="syz.0.894" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x0 [ 1782.876447][ T30] audit: type=1400 audit(1782.450:309): avc: denied { bind } for pid=6276 comm="syz.3.904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1782.908863][ T30] audit: type=1400 audit(1782.460:310): avc: denied { setopt } for pid=6276 comm="syz.3.904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1783.385214][ T6278] netlink: 44 bytes leftover after parsing attributes in process `syz.0.899'. [ 1790.643644][ T6288] netlink: 36 bytes leftover after parsing attributes in process `syz.3.907'. [ 1800.349075][ T6308] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1800.364622][ T6308] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1828.656005][ T30] audit: type=1400 audit(1828.230:311): avc: denied { shutdown } for pid=6330 comm="syz.3.922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1852.059101][ T30] audit: type=1400 audit(1851.630:312): avc: denied { append } for pid=6345 comm="syz.0.927" name="card0" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1853.283310][ T5435] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 1853.482969][ T5435] usb 1-1: Using ep0 maxpacket: 8 [ 1853.528176][ T5435] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 1853.532655][ T5435] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 1853.553260][ T5435] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 1853.556719][ T5435] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 1853.563590][ T5435] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 1853.566527][ T5435] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 1853.570368][ T5435] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1853.882584][ T5435] usb 1-1: GET_CAPABILITIES returned 0 [ 1853.891828][ T5435] usbtmc 1-1:16.0: can't read capabilities [ 1854.133348][ T6339] usb 1-1: USB disconnect, device number 10 [ 1857.005981][ T6355] bond3: entered promiscuous mode [ 1857.006697][ T6355] bond3: entered allmulticast mode [ 1857.009495][ T6355] 8021q: adding VLAN 0 to HW filter on device bond3 [ 1862.484352][ T5435] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 1862.938355][ T5435] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1862.940628][ T5435] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 3 [ 1862.951689][ T5435] usb 1-1: New USB device found, idVendor=0489, idProduct=e057, bcdDevice= 0.00 [ 1862.955516][ T5435] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1862.999060][ T5435] usb 1-1: config 0 descriptor?? [ 1873.652816][ T9] usb 1-1: USB disconnect, device number 11 [ 1881.303792][ T6378] wg2 speed is unknown, defaulting to 1000 [ 1882.723617][ T5785] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 1882.926098][ T5785] usb 1-1: Using ep0 maxpacket: 32 [ 1882.999027][ T5785] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1882.999434][ T5785] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1883.002594][ T5785] usb 1-1: New USB device found, idVendor=0403, idProduct=6030, bcdDevice= 0.00 [ 1883.002784][ T5785] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1883.317858][ T5785] usb 1-1: config 0 descriptor?? [ 1884.523625][ T5785] ft260 0003:0403:6030.0004: unknown main item tag 0x7 [ 1884.766824][ T5785] ft260 0003:0403:6030.0004: chip code: 6424 8183 [ 1885.072321][ T5785] ft260 0003:0403:6030.0004: failed to retrieve system status [ 1885.074760][ T5785] ft260 0003:0403:6030.0004: probe with driver ft260 failed with error -71 [ 1885.289709][ T5785] usb 1-1: USB disconnect, device number 12 [ 1887.443453][ T9] usb 1-1: new full-speed USB device number 13 using dummy_hcd [ 1887.735676][ T9] usb 1-1: not running at top speed; connect to a high speed hub [ 1887.867669][ T9] usb 1-1: config index 0 descriptor too short (expected 2322, got 18) [ 1887.870076][ T9] usb 1-1: config 95 has an invalid interface number: 1 but max is 0 [ 1887.873209][ T9] usb 1-1: config 95 has no interface number 0 [ 1887.875371][ T9] usb 1-1: config 95 interface 1 has no altsetting 0 [ 1888.102180][ T9] usb 1-1: string descriptor 0 read error: -22 [ 1888.105531][ T9] usb 1-1: New USB device found, idVendor=0763, idProduct=2030, bcdDevice=79.79 [ 1888.108294][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1889.433540][ T9] usb 1-1: USB disconnect, device number 13 [ 1892.176216][ T6405] udevd[6405]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:95.1/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 1895.038000][ T30] audit: type=1400 audit(1894.610:313): avc: denied { setopt } for pid=6418 comm="syz.0.949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1899.163196][ T6426] nbd: must specify a device to reconfigure [ 1906.725378][ T6378] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1906.896084][ T6378] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1912.324825][ T23] wg2 speed is unknown, defaulting to 1000 [ 1912.325973][ T23] syz2: Port: 1 Link DOWN [ 1912.337021][ T23] wg2 speed is unknown, defaulting to 1000 [ 1912.737261][ T4491] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1913.379563][ T4491] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1913.930791][ T4491] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1914.446354][ T4491] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1915.230171][ T6378] hsr_slave_0: entered promiscuous mode [ 1915.284935][ T6378] hsr_slave_1: entered promiscuous mode [ 1915.316292][ T6378] debugfs: 'hsr0' already exists in 'hsr' [ 1915.316726][ T6378] Cannot create hsr debugfs directory [ 1921.732607][ T9] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 1922.305349][ T9] usb 1-1: config 0 has an invalid interface number: 253 but max is 0 [ 1922.307327][ T9] usb 1-1: config 0 has no interface number 0 [ 1922.309550][ T9] usb 1-1: config 0 interface 253 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 1922.413233][ T9] usb 1-1: New USB device found, idVendor=0bfd, idProduct=0018, bcdDevice=e4.3c [ 1922.422797][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1922.424753][ T9] usb 1-1: Product: syz [ 1922.426047][ T9] usb 1-1: Manufacturer: syz [ 1922.427336][ T9] usb 1-1: SerialNumber: syz [ 1922.563618][ T9] usb 1-1: config 0 descriptor?? [ 1922.626180][ T9] kvaser_usb 1-1:0.253: error -ENODEV: Cannot get usb endpoint(s) [ 1922.770016][ T4491] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1922.816170][ T5785] usb 1-1: USB disconnect, device number 14 [ 1922.987349][ T4491] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1923.154949][ T4491] bond0 (unregistering): Released all slaves [ 1923.732935][ T30] audit: type=1400 audit(1923.290:314): avc: denied { append } for pid=6480 comm="syz.0.960" name="ubi_ctrl" dev="devtmpfs" ino=688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1923.828761][ T6481] ubi31: attaching mtd0 [ 1924.445981][ T6481] ubi31: scanning is finished [ 1924.449467][ T6481] ubi31 error: ubi_read_volume_table: the layout volume was not found [ 1924.920939][ T6481] ubi31 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 1926.856813][ T6487] netlink: 8 bytes leftover after parsing attributes in process `syz.0.963'. [ 1929.332807][ T4491] hsr_slave_0: left promiscuous mode [ 1929.383935][ T4491] hsr_slave_1: left promiscuous mode [ 1929.721731][ T4491] veth1_macvtap: left promiscuous mode [ 1929.735952][ T4491] veth0_macvtap: left promiscuous mode [ 1929.739226][ T4491] veth1_vlan: left promiscuous mode [ 1929.740541][ T4491] veth0_vlan: left promiscuous mode [ 1939.386549][ T4537] smc: removing ib device syz2 [ 1944.712850][ T6378] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1945.308838][ T6378] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1945.577239][ T6378] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1945.787230][ T6378] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1955.833012][ T4491] unregister_netdevice: waiting for wg2 to become free. Usage count = 4 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1955.974882][ T30] audit: type=1400 audit(1955.520:315): avc: denied { read } for pid=3121 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1955.978714][ T30] audit: type=1400 audit(1955.540:316): avc: denied { search } for pid=3121 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1955.984330][ T30] audit: type=1400 audit(1955.540:317): avc: denied { search } for pid=3121 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1956.003209][ T30] audit: type=1400 audit(1955.540:318): avc: denied { add_name } for pid=3121 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1956.007243][ T30] audit: type=1400 audit(1955.560:319): avc: denied { create } for pid=3121 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1956.010696][ T30] audit: type=1400 audit(1955.560:320): avc: denied { append open } for pid=3121 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1956.075702][ T30] audit: type=1400 audit(1955.640:321): avc: denied { getattr } for pid=3121 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1969.347699][ T4545] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1969.443765][ T4545] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1969.534356][ T4545] bond0 (unregistering): Released all slaves [ 1970.153405][ T4545] hsr_slave_0: left promiscuous mode [ 1970.193595][ T4545] hsr_slave_1: left promiscuous mode [ 1977.047805][ T4545] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1977.396447][ T4545] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1977.819669][ T4545] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1978.163520][ T4545] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1979.658128][ T4545] bond_slave_0: left promiscuous mode [ 1979.659877][ T4545] bond_slave_1: left promiscuous mode [ 1981.285604][ T4545] bond2 (unregistering): (slave ip6gretap1): Releasing backup interface [ 1983.274724][ T4545] bond2 (unregistering): (slave macvlan2): Removing an active aggregator [ 1983.297593][ T4545] bond2 (unregistering): (slave macvlan2): Releasing backup interface [ 1983.433517][ T4545] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1983.532325][ T4545] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1983.593077][ T4545] bond0 (unregistering): Released all slaves [ 1984.018046][ T4545] bond1 (unregistering): Released all slaves [ 1985.105922][ T4545] bond2 (unregistering): Released all slaves [ 1985.735236][ T4545] bond3 (unregistering): Released all slaves