last executing test programs: 33.862496873s ago: executing program 1 (id=311): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x9461a000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$VT_ACTIVATE(r0, 0x4b4a, 0x10000000000004) 18.362228347s ago: executing program 1 (id=326): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000540)={'gre0\x00', &(0x7f0000002940)={'syztnl0\x00', 0x0, 0x40, 0x7800, 0x1, 0x7ff, {{0x5, 0x4, 0x3, 0x8, 0x14, 0x65, 0x0, 0x0, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0xa}, @private=0xa010102}}}}) 17.773319633s ago: executing program 1 (id=327): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000003e80)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000009c0)="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", 0xfffffdef}], 0x1}}], 0x1, 0x0) 15.933211963s ago: executing program 1 (id=328): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_pid(r1, &(0x7f0000000280), 0x12) r3 = openat$cgroup_procs(r2, &(0x7f0000000300)='tasks\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x401) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x64) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x2010092, 0x0) socket$igmp(0x2, 0x3, 0x2) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000340)=ANY=[]) write$FUSE_NOTIFY_STORE(r6, &(0x7f00000001c0)=ANY=[@ANYRESHEX], 0x2b) sendfile(r3, r3, 0x0, 0x2) sendfile(r1, r1, 0x0, 0x401) 7.152469644s ago: executing program 0 (id=335): r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"/424]}, 0x1f8) 6.881626531s ago: executing program 0 (id=336): timer_create(0x2, &(0x7f0000533fa0)={0x0, 0x2d, 0x800000000004, @thr={0x0, &(0x7f0000000340)="747a6258c14a4f5a70744568bf422334df7b693305a3bd73dcf069e16d6044caaf20409466f6fccd"}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000019600)='blkio.bfq.empty_time\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200), 0xfffffd9d) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='htcp\x00', 0x5) sendfile(r0, r1, 0x0, 0x8000002b) 6.752900765s ago: executing program 0 (id=337): syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000080)) ioctl$KDSETLED(r0, 0x4b32, 0xfffffffffffeffff) 6.481302872s ago: executing program 0 (id=338): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) lsm_list_modules(0x0, 0x0, 0x3) 6.243072099s ago: executing program 0 (id=339): r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x8100, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000002c0)='contention_end\x00', r1}, 0x10) ioctl$SNDCTL_DSP_SUBDIVIDE(r0, 0xc0045009, &(0x7f0000000080)=0x4) 6.068743444s ago: executing program 0 (id=340): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0, 0x2012, r0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="1808000000040160000000000000003f851000000600000018000000", @ANYRES32, @ANYBLOB="0000000000000011660800000002010018000000f8ff000500000000000000009500000000000000360a020000000001180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0xa, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 480.836046ms ago: executing program 1 (id=341): r0 = socket$inet_sctp(0x2, 0x5, 0x84) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[], 0x44}}, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000300)={r2}, &(0x7f0000000000)=0x8) 0s ago: executing program 1 (id=342): r0 = socket$nl_route(0x10, 0x3, 0x0) userfaultfd(0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000680)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r4 = userfaultfd(0x80001) ioctl$UFFDIO_API(r4, 0xc018aa3f, &(0x7f0000000180)) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_COPY(r4, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, 0x3000}) sendmsg$nl_route(r0, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 51.473571][ T31] audit: type=1400 audit(51.410:68): avc: denied { read write } for pid=3082 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 51.474303][ T31] audit: type=1400 audit(51.410:69): avc: denied { open } for pid=3082 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:25803' (ED25519) to the list of known hosts. [ 63.161298][ T31] audit: type=1400 audit(63.080:70): avc: denied { name_bind } for pid=3083 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.792889][ T31] audit: type=1400 audit(64.730:71): avc: denied { execute } for pid=3085 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.798867][ T31] audit: type=1400 audit(64.740:72): avc: denied { execute_no_trans } for pid=3085 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.231010][ T31] audit: type=1400 audit(69.170:73): avc: denied { mounton } for pid=3085 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.233551][ T31] audit: type=1400 audit(69.170:74): avc: denied { mount } for pid=3085 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.252957][ T3085] cgroup: Unknown subsys name 'net' [ 69.263807][ T31] audit: type=1400 audit(69.200:75): avc: denied { unmount } for pid=3085 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.407896][ T3085] cgroup: Unknown subsys name 'cpuset' [ 69.412217][ T3085] cgroup: Unknown subsys name 'hugetlb' [ 69.413124][ T3085] cgroup: Unknown subsys name 'rlimit' [ 69.636691][ T31] audit: type=1400 audit(69.570:76): avc: denied { setattr } for pid=3085 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.638169][ T31] audit: type=1400 audit(69.570:77): avc: denied { mounton } for pid=3085 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.639057][ T31] audit: type=1400 audit(69.570:78): avc: denied { mount } for pid=3085 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.889057][ T3087] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.890422][ T31] audit: type=1400 audit(69.830:79): avc: denied { relabelto } for pid=3087 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.893771][ T31] audit: type=1400 audit(69.830:80): avc: denied { write } for pid=3087 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.925122][ T31] audit: type=1400 audit(69.860:81): avc: denied { read } for pid=3085 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.928141][ T31] audit: type=1400 audit(69.860:82): avc: denied { open } for pid=3085 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.874786][ T3085] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 80.035427][ T31] audit: type=1400 audit(79.970:83): avc: denied { execmem } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 80.093999][ T31] audit: type=1400 audit(80.030:84): avc: denied { read } for pid=3090 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.094830][ T31] audit: type=1400 audit(80.030:85): avc: denied { open } for pid=3090 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.106302][ T31] audit: type=1400 audit(80.040:86): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 80.116335][ T31] audit: type=1400 audit(80.050:87): avc: denied { module_request } for pid=3091 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.171928][ T31] audit: type=1400 audit(80.110:88): avc: denied { sys_module } for pid=3091 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 80.849953][ T31] audit: type=1400 audit(80.790:89): avc: denied { ioctl } for pid=3090 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 82.142966][ T3090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.153352][ T3090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.565149][ T3091] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.575215][ T3091] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.265491][ T3090] hsr_slave_0: entered promiscuous mode [ 83.270971][ T3090] hsr_slave_1: entered promiscuous mode [ 83.621608][ T31] audit: type=1400 audit(83.560:90): avc: denied { create } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.622626][ T31] audit: type=1400 audit(83.560:91): avc: denied { write } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.623506][ T31] audit: type=1400 audit(83.560:92): avc: denied { read } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.630075][ T3090] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.645086][ T3090] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.653897][ T3090] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.669444][ T3090] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.779466][ T3091] hsr_slave_0: entered promiscuous mode [ 83.783444][ T3091] hsr_slave_1: entered promiscuous mode [ 83.787395][ T3091] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 83.787908][ T3091] Cannot create hsr debugfs directory [ 84.144619][ T3091] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 84.162682][ T3091] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 84.173922][ T3091] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 84.189247][ T3091] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 84.701405][ T3090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.908907][ T3091] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.862387][ T3090] veth0_vlan: entered promiscuous mode [ 87.884964][ T3090] veth1_vlan: entered promiscuous mode [ 87.962635][ T3090] veth0_macvtap: entered promiscuous mode [ 87.975061][ T3090] veth1_macvtap: entered promiscuous mode [ 88.052017][ T3090] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.052891][ T3090] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.053362][ T3090] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.053814][ T3090] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.187969][ T3091] veth0_vlan: entered promiscuous mode [ 88.240199][ T31] audit: type=1400 audit(88.180:93): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 88.244743][ T31] audit: type=1400 audit(88.180:94): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzkaller.Wxw7m5/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 88.257241][ T31] audit: type=1400 audit(88.190:95): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 88.259732][ T3091] veth1_vlan: entered promiscuous mode [ 88.262292][ T31] audit: type=1400 audit(88.200:96): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzkaller.Wxw7m5/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 88.266269][ T31] audit: type=1400 audit(88.200:97): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzkaller.Wxw7m5/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2404 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 88.276650][ T31] audit: type=1400 audit(88.220:98): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 88.282601][ T31] audit: type=1400 audit(88.220:99): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 88.289289][ T31] audit: type=1400 audit(88.230:100): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 88.291865][ T31] audit: type=1400 audit(88.230:101): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 88.293326][ T31] audit: type=1400 audit(88.230:102): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 88.368035][ T3090] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 88.384126][ T3091] veth0_macvtap: entered promiscuous mode [ 88.395952][ T3091] veth1_macvtap: entered promiscuous mode [ 88.450222][ T3091] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.450922][ T3091] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.451450][ T3091] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.451733][ T3091] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.057132][ T1783] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 89.236774][ T1783] usb 1-1: Using ep0 maxpacket: 32 [ 89.251757][ T1783] usb 1-1: config 1 interface 0 altsetting 7 bulk endpoint 0x1 has invalid maxpacket 32 [ 89.257920][ T1783] usb 1-1: config 1 interface 0 has no altsetting 0 [ 89.265365][ T1783] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 89.266763][ T1783] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 89.267310][ T1783] usb 1-1: Product: syz [ 89.267572][ T1783] usb 1-1: Manufacturer: syz [ 89.268758][ T1783] usb 1-1: SerialNumber: syz [ 89.279124][ T3770] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 89.814631][ T1783] usblp 1-1:1.0: usblp0: USB Unidirectional printer dev 2 if 0 alt 7 proto 1 vid 0x0525 pid 0xA4A8 [ 89.839494][ T1783] usb 1-1: USB disconnect, device number 2 [ 89.852648][ T1783] usblp0: removed [ 90.802817][ T3813] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 92.742906][ T3830] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3830 comm=syz.1.9 [ 94.302746][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 94.302835][ T31] audit: type=1400 audit(94.240:129): avc: denied { ioctl } for pid=3840 comm="syz.0.13" path="socket:[2541]" dev="sockfs" ino=2541 ioctlcmd=0x89f8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 94.521743][ T31] audit: type=1400 audit(94.460:130): avc: denied { map_create } for pid=3840 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.396727][ T31] audit: type=1400 audit(97.330:131): avc: denied { setopt } for pid=3854 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 97.406563][ T31] audit: type=1400 audit(97.340:132): avc: denied { create } for pid=3854 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 97.410169][ T31] audit: type=1400 audit(97.350:133): avc: denied { write } for pid=3854 comm="syz.0.15" path="socket:[861]" dev="sockfs" ino=861 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 97.421138][ T31] audit: type=1400 audit(97.360:134): avc: denied { read write } for pid=3854 comm="syz.0.15" path="socket:[860]" dev="sockfs" ino=860 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 97.710887][ T31] audit: type=1400 audit(97.650:135): avc: denied { create } for pid=3863 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 97.714031][ T31] audit: type=1400 audit(97.650:136): avc: denied { ioctl } for pid=3863 comm="syz.1.18" path="socket:[880]" dev="sockfs" ino=880 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 97.833606][ T31] audit: type=1400 audit(97.770:137): avc: denied { create } for pid=3865 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 97.841550][ T31] audit: type=1400 audit(97.780:138): avc: denied { ioctl } for pid=3865 comm="syz.1.19" path="socket:[2576]" dev="sockfs" ino=2576 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 99.312639][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 99.312735][ T31] audit: type=1400 audit(99.250:143): avc: denied { ioctl } for pid=3873 comm="syz.0.21" path="socket:[2584]" dev="sockfs" ino=2584 ioctlcmd=0x943d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 99.535089][ T31] audit: type=1400 audit(99.470:144): avc: denied { create } for pid=3884 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 99.626427][ T31] audit: type=1400 audit(99.560:145): avc: denied { write } for pid=3884 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 101.646513][ T31] audit: type=1400 audit(101.580:146): avc: denied { connect } for pid=3931 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 101.647547][ T31] audit: type=1400 audit(101.580:147): avc: denied { name_connect } for pid=3931 comm="syz.0.29" dest=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 102.163028][ T31] audit: type=1400 audit(102.100:148): avc: denied { ioctl } for pid=3948 comm="syz.1.30" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 104.151674][ T3969] fuse: Bad value for 'fd' [ 104.764916][ T31] audit: type=1400 audit(104.700:149): avc: denied { listen } for pid=3970 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 105.282319][ T3976] Zero length message leads to an empty skb [ 106.635458][ T31] audit: type=1400 audit(106.570:150): avc: denied { write } for pid=3981 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 106.809879][ T31] audit: type=1400 audit(106.750:151): avc: denied { bind } for pid=3986 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 107.840418][ T31] audit: type=1400 audit(107.780:152): avc: denied { accept } for pid=3986 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 108.480684][ T3996] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3996 comm=syz.0.45 [ 108.484979][ T31] audit: type=1400 audit(108.420:153): avc: denied { write } for pid=3995 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 108.609505][ T4001] FAULT_INJECTION: forcing a failure. [ 108.609505][ T4001] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 108.610539][ T4001] CPU: 1 UID: 0 PID: 4001 Comm: syz.0.46 Not tainted 6.12.0-syzkaller #0 [ 108.610947][ T4001] Hardware name: ARM-Versatile Express [ 108.611379][ T4001] Call trace: [ 108.612043][ T4001] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 108.613285][ T4001] r7:ea8f9e20 r6:20000300 r5:60000013 r4:820413b8 [ 108.613492][ T4001] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 108.613728][ T4001] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 108.613894][ T4001] r5:00000000 r4:82751908 [ 108.613988][ T4001] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 108.614205][ T4001] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 108.614469][ T4001] r6:20000300 r5:00000000 r4:ea8f9f20 [ 108.614591][ T4001] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 108.614826][ T4001] [<808f19d4>] (should_fail_usercopy) from [<8149822c>] (copy_msghdr_from_user+0x50/0x130) [ 108.615206][ T4001] [<814981dc>] (copy_msghdr_from_user) from [<81498384>] (___sys_sendmsg+0x78/0xd0) [ 108.615523][ T4001] r8:00000080 r7:00000000 r6:83190a00 r5:ea8f9f20 r4:ea8f9e64 [ 108.616370][ T4001] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 108.617241][ T4001] r10:00000128 r9:84a5e000 r8:8513d900 r7:00000080 r6:20000300 r5:8513d901 [ 108.617813][ T4001] r4:00000003 [ 108.618097][ T4001] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 108.618844][ T4001] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 108.619466][ T4001] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 108.619954][ T4001] Exception stack(0xea8f9fa8 to 0xea8f9ff0) [ 108.620434][ T4001] 9fa0: 00000000 00000000 00000003 20000300 00000080 00000000 [ 108.620849][ T4001] 9fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bd50bc [ 108.621197][ T4001] 9fe0: 76bd4ec0 76bd4eb0 00018af0 00133450 [ 108.829032][ T31] audit: type=1400 audit(108.770:154): avc: denied { create } for pid=4004 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 109.353923][ T31] audit: type=1400 audit(109.290:155): avc: denied { accept } for pid=3986 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 110.267062][ T4021] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 110.268018][ T4021] audit: out of memory in audit_log_start [ 110.416532][ T31] audit: type=1400 audit(110.350:156): avc: denied { create } for pid=4023 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 110.483872][ T4029] capability: warning: `syz.0.55' uses deprecated v2 capabilities in a way that may be insecure [ 110.627770][ T4032] FAULT_INJECTION: forcing a failure. [ 110.627770][ T4032] name failslab, interval 1, probability 0, space 0, times 0 [ 110.628438][ T4032] CPU: 1 UID: 0 PID: 4032 Comm: syz.0.56 Not tainted 6.12.0-syzkaller #0 [ 110.629246][ T4032] Hardware name: ARM-Versatile Express [ 110.629503][ T4032] Call trace: [ 110.629728][ T4032] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 110.630221][ T4032] r7:84a5e000 r6:00000820 r5:60000013 r4:820413b8 [ 110.630723][ T4032] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 110.631207][ T4032] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 110.631632][ T4032] r5:00000000 r4:8271b79c [ 110.631860][ T4032] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 110.632341][ T4032] [<808f17e0>] (should_fail_ex) from [<804ef540>] (should_failslab+0x6c/0x94) [ 110.632736][ T4032] r6:00000820 r5:8450e180 r4:82cab840 [ 110.632962][ T4032] [<804ef4d4>] (should_failslab) from [<804d432c>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 110.633460][ T4032] [<804d42e0>] (kmem_cache_alloc_noprof) from [<814a9338>] (skb_clone+0x60/0x1c8) [ 110.633912][ T4032] r10:8450e180 r9:00000000 r8:00000000 r7:8456a740 r6:00000001 r5:8450e180 [ 110.634565][ T4032] r4:00000820 [ 110.634822][ T4032] [<814a92d8>] (skb_clone) from [<81835110>] (can_send+0xe8/0x368) [ 110.635201][ T4032] r5:00000010 r4:8450e180 [ 110.635553][ T4032] [<81835028>] (can_send) from [<8184819c>] (isotp_sendmsg+0x3fc/0x7fc) [ 110.636590][ T4032] r9:00000000 r8:00000000 r7:00000000 r6:84448000 r5:8444a000 r4:84448280 [ 110.637045][ T4032] [<81847da0>] (isotp_sendmsg) from [<81495610>] (__sock_sendmsg+0x44/0x78) [ 110.637432][ T4032] r10:00000000 r9:ea805dc4 r8:ea805dc4 r7:833fc500 r6:833fc500 r5:ea805f20 [ 110.637870][ T4032] r4:00000000 [ 110.638140][ T4032] [<814955cc>] (__sock_sendmsg) from [<81496610>] (____sys_sendmsg+0x2a4/0x2c4) [ 110.638701][ T4032] r7:833fc500 r6:00000000 r5:00040080 r4:ea805f20 [ 110.638933][ T4032] [<8149636c>] (____sys_sendmsg) from [<814983a8>] (___sys_sendmsg+0x9c/0xd0) [ 110.639492][ T4032] r10:ea805e24 r9:200001c0 r8:00040080 r7:00000000 r6:833fc500 r5:ea805f20 [ 110.639994][ T4032] r4:00000000 [ 110.640181][ T4032] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 110.640715][ T4032] r10:00000128 r9:84a5e000 r8:8514cb40 r7:00040080 r6:200001c0 r5:8514cb41 [ 110.641443][ T4032] r4:00000003 [ 110.642008][ T4032] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 110.642549][ T4032] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 110.643321][ T4032] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 110.643733][ T4032] Exception stack(0xea805fa8 to 0xea805ff0) [ 110.644198][ T4032] 5fa0: 00000000 00000000 00000003 200001c0 00040080 00000000 [ 110.644665][ T4032] 5fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bd50bc [ 110.645157][ T4032] 5fe0: 76bd4ec0 76bd4eb0 00018af0 00133450 [ 110.655251][ T31] audit: type=1400 audit(110.590:157): avc: denied { setopt } for pid=4031 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 110.658780][ T4032] can-isotp: isotp_sendmsg: can_send_ret -ENOMEM [ 110.931415][ T4040] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4040 comm=syz.0.59 [ 111.054033][ T31] audit: type=1400 audit(110.990:158): avc: denied { append } for pid=4042 comm="syz.0.60" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 111.290696][ T4047] FAULT_INJECTION: forcing a failure. [ 111.290696][ T4047] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 111.291512][ T4047] CPU: 0 UID: 0 PID: 4047 Comm: syz.1.62 Not tainted 6.12.0-syzkaller #0 [ 111.291895][ T4047] Hardware name: ARM-Versatile Express [ 111.292139][ T4047] Call trace: [ 111.292412][ T4047] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 111.292893][ T4047] r7:eaae1e20 r6:20000280 r5:60000013 r4:820413b8 [ 111.293266][ T4047] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 111.293626][ T4047] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 111.293949][ T4047] r5:00000000 r4:82751908 [ 111.294187][ T4047] [<819d6104>] (dump_stack) from [<808f196c>] (should_fail_ex+0x18c/0x1dc) [ 111.294536][ T4047] [<808f17e0>] (should_fail_ex) from [<808f19d0>] (should_fail+0x14/0x18) [ 111.294864][ T4047] r6:20000280 r5:00000000 r4:eaae1f20 [ 111.295058][ T4047] [<808f19bc>] (should_fail) from [<808f19f0>] (should_fail_usercopy+0x1c/0x20) [ 111.295433][ T4047] [<808f19d4>] (should_fail_usercopy) from [<8149822c>] (copy_msghdr_from_user+0x50/0x130) [ 111.296784][ T4047] [<814981dc>] (copy_msghdr_from_user) from [<81498384>] (___sys_sendmsg+0x78/0xd0) [ 111.297639][ T4047] r8:00008803 r7:00000000 r6:83190c80 r5:eaae1f20 r4:eaae1e64 [ 111.298143][ T4047] [<8149830c>] (___sys_sendmsg) from [<81498838>] (__sys_sendmsg+0x8c/0xd8) [ 111.298885][ T4047] r10:00000128 r9:84a5ec00 r8:8513d840 r7:00008803 r6:20000280 r5:8513d841 [ 111.299754][ T4047] r4:00000003 [ 111.299948][ T4047] [<814987ac>] (__sys_sendmsg) from [<81498898>] (sys_sendmsg+0x14/0x18) [ 111.300361][ T4047] r8:8020029c r7:00000128 r6:00131400 r5:00000000 r4:00000000 [ 111.300668][ T4047] [<81498884>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 111.301035][ T4047] Exception stack(0xeaae1fa8 to 0xeaae1ff0) [ 111.301331][ T4047] 1fa0: 00000000 00000000 00000003 20000280 00008803 00000000 [ 111.301680][ T4047] 1fc0: 00000000 00000000 00131400 00000128 00000000 00006364 003d0f00 76bb30bc [ 111.302012][ T4047] 1fe0: 76bb2ec0 76bb2eb0 00018af0 00133450 [ 111.491692][ T31] audit: type=1400 audit(111.430:159): avc: denied { audit_write } for pid=4048 comm="syz.1.63" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 111.508858][ T31] audit: type=1400 audit(111.450:160): avc: denied { wake_alarm } for pid=4048 comm="syz.1.63" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 113.583571][ T31] audit: type=1400 audit(113.520:161): avc: denied { getopt } for pid=4066 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 113.612319][ T714] hid (null): unknown global tag 0xd [ 113.617274][ T714] hid (null): unknown global tag 0xb9 [ 113.617387][ T714] hid (null): unknown global tag 0xd [ 113.618562][ T714] hid (null): global environment stack underflow [ 113.632846][ T714] hid-generic 0001:0005:4040.0001: unknown main item tag 0x2 [ 113.633176][ T714] hid-generic 0001:0005:4040.0001: unknown global tag 0xd [ 113.633247][ T714] hid-generic 0001:0005:4040.0001: item 0 2 1 13 parsing failed [ 113.634004][ T714] hid-generic 0001:0005:4040.0001: probe with driver hid-generic failed with error -22 [ 113.813216][ T31] audit: type=1400 audit(113.750:162): avc: denied { create } for pid=4075 comm="syz.1.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 114.446565][ T31] audit: type=1400 audit(114.380:163): avc: denied { ioctl } for pid=4081 comm="syz.0.70" path="socket:[2826]" dev="sockfs" ino=2826 ioctlcmd=0x5422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 115.780852][ T31] audit: type=1400 audit(115.720:164): avc: denied { read } for pid=4089 comm="syz.0.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 116.873919][ T31] audit: type=1400 audit(116.810:165): avc: denied { create } for pid=4097 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 116.878640][ T31] audit: type=1400 audit(116.820:166): avc: denied { write } for pid=4097 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 117.013005][ T31] audit: type=1400 audit(116.950:167): avc: denied { write } for pid=4099 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 117.132977][ T4106] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4106 comm=syz.1.80 [ 117.139129][ T4106] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=529 sclass=netlink_route_socket pid=4106 comm=syz.1.80 [ 118.535538][ T31] audit: type=1400 audit(118.470:168): avc: denied { read } for pid=4108 comm="syz.1.81" path="socket:[3249]" dev="sockfs" ino=3249 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 124.985446][ T31] audit: type=1400 audit(124.920:169): avc: denied { map } for pid=4147 comm="syz.1.93" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 124.989474][ T31] audit: type=1400 audit(124.920:170): avc: denied { execute } for pid=4147 comm="syz.1.93" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 125.463919][ T31] audit: type=1400 audit(125.400:171): avc: denied { prog_run } for pid=4156 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 130.850624][ T31] audit: type=1400 audit(130.790:172): avc: denied { setopt } for pid=4169 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 141.932164][ T31] audit: type=1400 audit(141.870:173): avc: denied { map_read map_write } for pid=4182 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 143.524398][ T31] audit: type=1400 audit(143.460:174): avc: denied { bind } for pid=4180 comm="syz.1.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 143.528256][ T31] audit: type=1400 audit(143.470:175): avc: denied { node_bind } for pid=4180 comm="syz.1.103" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 145.078903][ T4192] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 145.616714][ T714] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 145.776898][ T714] usb 1-1: Using ep0 maxpacket: 8 [ 145.824234][ T714] usb 1-1: config 16 has an invalid descriptor of length 0, skipping remainder of the config [ 145.825123][ T714] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid maxpacket 56832, setting to 1024 [ 145.832184][ T714] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 1024 [ 145.834233][ T714] usb 1-1: config 16 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 145.834982][ T714] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 145.835422][ T714] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 145.863967][ T714] usbtmc 1-1:16.0: bulk endpoints not found [ 151.427348][ T31] audit: type=1400 audit(151.370:176): avc: denied { connect } for pid=4209 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 156.805976][ C0] hrtimer: interrupt took 10864096 ns [ 159.605270][ T1783] usb 1-1: USB disconnect, device number 3 [ 161.411199][ T31] audit: type=1400 audit(161.350:177): avc: denied { create } for pid=4235 comm="syz.1.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 161.983406][ T31] audit: type=1400 audit(161.920:178): avc: denied { name_bind } for pid=4245 comm="syz.0.121" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 161.985312][ T31] audit: type=1400 audit(161.920:179): avc: denied { node_bind } for pid=4245 comm="syz.0.121" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 162.422618][ T4255] tmpfs: Unsupported parameter 'mpol' [ 177.764935][ T4272] *** NOT YET: opcode db *** [ 179.541472][ T31] audit: type=1400 audit(179.480:180): avc: denied { create } for pid=4282 comm="syz.0.136" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 179.543543][ T31] audit: type=1400 audit(179.480:181): avc: denied { map } for pid=4282 comm="syz.0.136" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3013 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 179.544547][ T31] audit: type=1400 audit(179.480:182): avc: denied { read write } for pid=4282 comm="syz.0.136" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3013 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 184.144343][ T31] audit: type=1326 audit(184.080:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.1.138" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 184.147926][ T31] audit: type=1326 audit(184.090:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.1.138" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x133450 code=0x7fc00000 [ 184.156089][ T31] audit: type=1326 audit(184.090:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.1.138" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 184.157232][ T31] audit: type=1326 audit(184.090:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.1.138" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 184.158027][ T31] audit: type=1326 audit(184.090:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.1.138" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 184.158729][ T31] audit: type=1326 audit(184.090:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.1.138" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 184.159464][ T31] audit: type=1326 audit(184.090:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4294 comm="syz.1.138" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 192.066498][ T714] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 192.216879][ T714] usb 1-1: Using ep0 maxpacket: 8 [ 192.223115][ T714] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 192.224034][ T714] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 192.224578][ T714] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 192.225080][ T714] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 192.225433][ T714] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 192.226990][ T714] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 192.227387][ T714] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 192.459793][ T714] usb 1-1: usb_control_msg returned -32 [ 192.460311][ T714] usbtmc 1-1:16.0: can't read capabilities [ 192.887237][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 192.887340][ T31] audit: type=1400 audit(192.820:192): avc: denied { connect } for pid=4305 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 192.896729][ T4318] vcan0: tx drop: invalid da for name 0x0000000000000003 [ 199.290169][ T4323] netlink: 'syz.1.145': attribute type 1 has an invalid length. [ 199.519520][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 200.007903][ T31] audit: type=1400 audit(199.950:193): avc: denied { append } for pid=4327 comm="syz.1.147" name="pfkey" dev="proc" ino=4026532824 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 201.368191][ T31] audit: type=1400 audit(201.310:194): avc: denied { ioctl } for pid=4327 comm="syz.1.147" path="socket:[3578]" dev="sockfs" ino=3578 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 201.415231][ T31] audit: type=1400 audit(201.350:195): avc: denied { setopt } for pid=4327 comm="syz.1.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 201.591925][ T31] audit: type=1400 audit(201.530:196): avc: denied { write } for pid=4327 comm="syz.1.147" path="socket:[3582]" dev="sockfs" ino=3582 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 206.208749][ T46] usb 1-1: USB disconnect, device number 4 [ 208.789032][ T31] audit: type=1400 audit(208.730:197): avc: denied { create } for pid=4353 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 208.797642][ T31] audit: type=1400 audit(208.740:198): avc: denied { getopt } for pid=4353 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 208.825504][ T31] audit: type=1400 audit(208.760:199): avc: denied { write } for pid=4353 comm="syz.0.151" path="socket:[3602]" dev="sockfs" ino=3602 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 208.842792][ T31] audit: type=1400 audit(208.780:200): avc: denied { setattr } for pid=4353 comm="syz.0.151" name="NFC_LLCP" dev="sockfs" ino=3602 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 218.259343][ T31] audit: type=1326 audit(218.200:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 218.274121][ T31] audit: type=1326 audit(218.200:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 218.275560][ T31] audit: type=1326 audit(218.210:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=180 compat=0 ip=0x133450 code=0x7ffc0000 [ 218.297086][ T31] audit: type=1326 audit(218.210:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 218.298347][ T31] audit: type=1326 audit(218.210:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 218.329651][ T31] audit: type=1326 audit(218.270:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 218.334456][ T31] audit: type=1326 audit(218.270:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 218.356457][ T31] audit: type=1326 audit(218.280:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 218.357582][ T31] audit: type=1326 audit(218.280:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 218.372071][ T31] audit: type=1326 audit(218.290:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4371 comm="syz.0.156" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 231.548693][ T31] kauditd_printk_skb: 40 callbacks suppressed [ 231.548816][ T31] audit: type=1400 audit(231.490:251): avc: denied { nlmsg_write } for pid=4377 comm="syz.1.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 233.316616][ T31] audit: type=1400 audit(233.240:252): avc: denied { setopt } for pid=4389 comm="syz.1.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 233.324187][ T31] audit: type=1400 audit(233.260:253): avc: denied { ioctl } for pid=4389 comm="syz.1.164" path="socket:[3628]" dev="sockfs" ino=3628 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 250.450709][ T31] audit: type=1400 audit(250.390:254): avc: denied { create } for pid=4408 comm="syz.1.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 257.386913][ T31] audit: type=1326 audit(257.270:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 257.388152][ T31] audit: type=1326 audit(257.270:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.182" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x133450 code=0x7fc00000 [ 257.389153][ T31] audit: type=1326 audit(257.270:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 257.390688][ T31] audit: type=1326 audit(257.270:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 257.391568][ T31] audit: type=1326 audit(257.270:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 257.392428][ T31] audit: type=1326 audit(257.270:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 257.393250][ T31] audit: type=1326 audit(257.270:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 257.394066][ T31] audit: type=1326 audit(257.270:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 257.394863][ T31] audit: type=1326 audit(257.270:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 257.406205][ T31] audit: type=1326 audit(257.270:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.182" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7fc00000 [ 264.608673][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 264.608786][ T31] audit: type=1400 audit(264.550:273): avc: denied { mount } for pid=4455 comm="syz.0.189" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 264.624887][ T31] audit: type=1400 audit(264.560:274): avc: denied { remount } for pid=4455 comm="syz.0.189" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 274.068440][ T31] audit: type=1400 audit(274.010:275): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 275.293295][ T31] audit: type=1400 audit(275.230:276): avc: denied { bind } for pid=4467 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 280.891933][ T31] audit: type=1400 audit(280.830:277): avc: denied { mounton } for pid=4473 comm="syz.1.193" path="/95/file0" dev="tmpfs" ino=512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 281.726255][ T31] audit: type=1400 audit(281.650:278): avc: denied { bind } for pid=4480 comm="syz.1.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 282.151495][ T31] audit: type=1400 audit(282.090:279): avc: denied { setopt } for pid=4488 comm="syz.0.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 313.632226][ T31] audit: type=1400 audit(313.570:280): avc: denied { connect } for pid=4528 comm="syz.0.212" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 314.338150][ T4532] netlink: 'syz.0.213': attribute type 1 has an invalid length. [ 316.850801][ T31] audit: type=1400 audit(316.790:281): avc: denied { read } for pid=4533 comm="syz.0.214" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 329.163834][ T4560] misc userio: No port type given on /dev/userio [ 338.619776][ T31] audit: type=1400 audit(338.560:282): avc: denied { create } for pid=4571 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 338.621892][ T31] audit: type=1400 audit(338.560:283): avc: denied { write } for pid=4571 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 338.621980][ T4580] netlink: 16 bytes leftover after parsing attributes in process `syz.0.226'. [ 344.237779][ T31] audit: type=1400 audit(344.180:284): avc: denied { create } for pid=4589 comm="syz.0.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 349.963828][ T31] audit: type=1400 audit(349.900:285): avc: denied { read } for pid=4606 comm="syz.0.236" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 349.964789][ T31] audit: type=1400 audit(349.900:286): avc: denied { open } for pid=4606 comm="syz.0.236" path="/118/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 350.017884][ T4609] block device autoloading is deprecated and will be removed. [ 350.057135][ T31] audit: type=1400 audit(349.980:287): avc: denied { ioctl } for pid=4606 comm="syz.0.236" path="/118/file0/file0" dev="fuse" ino=0 ioctlcmd=0x921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 365.458067][ T31] audit: type=1400 audit(365.400:288): avc: denied { name_bind } for pid=4658 comm="syz.1.251" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 365.968905][ T31] audit: type=1400 audit(365.910:289): avc: denied { mount } for pid=4664 comm="syz.1.254" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 366.007794][ T31] audit: type=1400 audit(365.940:290): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 366.596228][ T31] audit: type=1400 audit(366.530:291): avc: denied { write } for pid=4675 comm="syz.1.259" name="udp6" dev="proc" ino=4026532803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 368.056812][ T46] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 368.216831][ T46] usb 1-1: Using ep0 maxpacket: 32 [ 368.234463][ T46] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 368.237977][ T46] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 368.238541][ T46] usb 1-1: New USB device found, idVendor=1e7d, idProduct=2d5a, bcdDevice= 0.00 [ 368.238937][ T46] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 368.249347][ T46] usb 1-1: config 0 descriptor?? [ 368.704444][ T46] savu 0003:1E7D:2D5A.0002: hiddev0,hidraw0: USB HID v0.00 Device [HID 1e7d:2d5a] on usb-dummy_hcd.0-1/input0 [ 368.980624][ T4340] usb 1-1: USB disconnect, device number 5 [ 375.681589][ T4726] syz.1.271 (4726): /proc/4726/oom_adj is deprecated, please use /proc/4726/oom_score_adj instead. [ 379.839827][ C1] vkms_vblank_simulate: vblank timer overrun [ 402.416462][ T31] audit: type=1400 audit(402.340:292): avc: denied { create } for pid=4753 comm="syz.1.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 404.526354][ T3736] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 404.699729][ T3736] usb 1-1: New USB device found, idVendor=1604, idProduct=8001, bcdDevice=44.1f [ 404.700575][ T3736] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 404.701208][ T3736] usb 1-1: Product: syz [ 404.701516][ T3736] usb 1-1: Manufacturer: syz [ 404.701762][ T3736] usb 1-1: SerialNumber: syz [ 404.712625][ T3736] usb 1-1: config 0 descriptor?? [ 404.929332][ T3786] usb 1-1: USB disconnect, device number 6 [ 405.927561][ T3736] usb 2-1: new full-speed USB device number 2 using dummy_hcd [ 406.092386][ T3736] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 406.093357][ T3736] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 2 [ 406.095249][ T3736] usb 2-1: New USB device found, idVendor=05d8, idProduct=810a, bcdDevice=92.b8 [ 406.100915][ T3736] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 406.111224][ T3736] usb 2-1: config 0 descriptor?? [ 411.768072][ T31] audit: type=1400 audit(411.710:293): avc: denied { execute } for pid=4807 comm="syz.0.295" path="/143/cpu.stat" dev="tmpfs" ino=755 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 419.868576][ T46] usb 2-1: USB disconnect, device number 2 [ 424.874961][ T31] audit: type=1400 audit(424.810:294): avc: denied { setopt } for pid=4845 comm="syz.0.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 424.935027][ T4848] tmpfs: Unsupported parameter 'mpol' [ 424.995476][ T4850] random: crng reseeded on system resumption [ 435.222977][ T4876] smc: net device wg0 applied user defined pnetid SYZ0 [ 435.238647][ T4876] netlink: 'syz.0.319': attribute type 39 has an invalid length. [ 437.021154][ T4887] netlink: 184 bytes leftover after parsing attributes in process `syz.0.321'. [ 439.326430][ T31] audit: type=1400 audit(439.260:295): avc: denied { name_connect } for pid=4888 comm="syz.0.322" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 439.343632][ T31] audit: type=1400 audit(439.280:296): avc: denied { shutdown } for pid=4888 comm="syz.0.322" lport=46337 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 452.874573][ T31] audit: type=1400 audit(452.800:297): avc: denied { map } for pid=4909 comm="syz.0.329" path="/dev/nullb0" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 452.883000][ T31] audit: type=1400 audit(452.800:298): avc: denied { execute } for pid=4909 comm="syz.0.329" path="/dev/nullb0" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 452.884120][ T31] audit: type=1400 audit(452.810:299): avc: denied { create } for pid=4909 comm="syz.0.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 452.884865][ T31] audit: type=1400 audit(452.810:300): avc: denied { getattr } for pid=4909 comm="syz.0.329" path="socket:[4870]" dev="sockfs" ino=4870 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 452.989815][ T31] audit: type=1400 audit(452.930:301): avc: denied { write } for pid=4911 comm="syz.0.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 464.847313][ T31] audit: type=1400 audit(464.790:302): avc: denied { ioctl } for pid=4937 comm="syz.1.342" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5278 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 464.871249][ T4940] ------------[ cut here ]------------ [ 464.872148][ T4940] WARNING: CPU: 0 PID: 4940 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 464.875358][ T4940] Modules linked in: [ 464.877772][ T4940] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 464.879081][ T4940] CPU: 0 UID: 0 PID: 4940 Comm: syz.1.342 Not tainted 6.12.0-syzkaller #0 [ 464.879581][ T4940] Hardware name: ARM-Versatile Express [ 464.879863][ T4940] Call trace: [ 464.880125][ T4940] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 464.880865][ T4940] r7:00000000 r6:82623304 r5:00000000 r4:820413b8 [ 464.881575][ T4940] [<819b809c>] (show_stack) from [<819d60dc>] (dump_stack_lvl+0x54/0x7c) [ 464.882146][ T4940] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 464.882880][ T4940] r5:00000000 r4:82874d18 [ 464.883358][ T4940] [<819d6104>] (dump_stack) from [<819b8be0>] (panic+0x120/0x374) [ 464.884036][ T4940] [<819b8ac0>] (panic) from [<802426d0>] (get_taint+0x0/0x1c) [ 464.884689][ T4940] r3:8260c604 r2:00000001 r1:82029878 r0:82031344 [ 464.885307][ T4940] r7:80492e7c [ 464.885678][ T4940] [<8024265c>] (check_panic_on_warn) from [<80242834>] (__warn+0x80/0x188) [ 464.886691][ T4940] [<802427b4>] (__warn) from [<80242ab4>] (warn_slowpath_fmt+0x178/0x1f4) [ 464.887532][ T4940] r8:00000009 r7:82059090 r6:df9a5d24 r5:8343bc00 r4:00000000 [ 464.888289][ T4940] [<80242940>] (warn_slowpath_fmt) from [<80492e7c>] (kunmap_local_indexed+0x20c/0x224) [ 464.888768][ T4940] r10:ffefdfe8 r9:83eee100 r8:20000000 r7:00000000 r6:00000003 r5:8343bc00 [ 464.889252][ T4940] r4:ffefd000 [ 464.889538][ T4940] [<80492c70>] (kunmap_local_indexed) from [<8050cd58>] (move_pages+0x7e8/0x149c) [ 464.890002][ T4940] r7:00000000 r6:84bcd1e0 r5:dee49e34 r4:ffefb000 [ 464.890414][ T4940] [<8050c570>] (move_pages) from [<8058b378>] (userfaultfd_ioctl+0x111c/0x2080) [ 464.890991][ T4940] r10:83eee100 r9:df9a5e98 r8:00000001 r7:21000000 r6:00000000 r5:20000040 [ 464.891703][ T4940] r4:8527f080 [ 464.891957][ T4940] [<8058a25c>] (userfaultfd_ioctl) from [<80536ea8>] (sys_ioctl+0x138/0xd88) [ 464.893296][ T4940] r10:8343bc00 r9:00000007 r8:83fd39c0 r7:20000040 r6:83fd39c1 r5:00000000 [ 464.893841][ T4940] r4:c028aa05 [ 464.894168][ T4940] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 464.895027][ T4940] Exception stack(0xdf9a5fa8 to 0xdf9a5ff0) [ 464.895683][ T4940] 5fa0: 00000000 00000000 00000007 c028aa05 20000040 00000000 [ 464.897085][ T4940] 5fc0: 00000000 00000000 00286410 00000036 00000000 00006364 003d0f00 76b710bc [ 464.898878][ T4940] 5fe0: 76b70ec0 76b70eb0 00018af0 00133450 [ 464.899607][ T4940] r10:00000036 r9:8343bc00 r8:8020029c r7:00000036 r6:00286410 r5:00000000 [ 464.900595][ T4940] r4:00000000 [ 464.902332][ T4940] Rebooting in 86400 seconds.. VM DIAGNOSIS: 09:42:58 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=820413b8 R02=00000000 R03=819d7f48 R04=00000006 R05=826faf88 R06=00000000 R07=826faf80 R08=8343bc00 R09=00000028 R10=826faf88 R11=df9a5b1c R12=df9a5b20 R13=df9a5b10 R14=8031ce20 R15=819d7f58 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=820413b8 R02=00000001 R03=819d7f48 R04=00000006 R05=826faf88 R06=00000000 R07=826faf80 R08=83d2a400 R09=00000028 R10=826faf88 R11=df805edc R12=df805ee0 R13=df805ed0 R14=8031ce20 R15=819d7f58 PSR=20000093 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=004b27e9 s17=00000000 d08=00000000004b27e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=03000205 s33=ffff0200 d16=ffff020003000205 s34=0303ffff s35=00080008 d17=000800080303ffff s36=00059803 s37=a0030208 d18=a003020800059803 s38=ffff0205 s39=0303ffff d19=0303ffffffff0205 s40=080005a8 s41=05b00300 d20=05b00300080005a8 s42=a0000800 s43=06060141 d21=06060141a0000800 s44=00000008 s45=05800201 d22=0580020100000008 s46=80a00800 s47=000140a4 d23=000140a480a00800 s48=8cdb6e08 s49=0a10d86f d24=0a10d86f8cdb6e08 s50=1a4510f5 s51=a56beba8 d25=a56beba81a4510f5 s52=6d2023a2 s53=2ad0f2ad d26=2ad0f2ad6d2023a2 s54=24c25f2d s55=6beacc21 d27=6beacc2124c25f2d s56=35d2d1e8 s57=aea73019 d28=aea7301935d2d1e8 s58=50780657 s59=75c8c953 d29=75c8c95350780657 s60=915ff799 s61=ecd3dbf3 d30=ecd3dbf3915ff799 s62=1714ea4a s63=282e2aa5 d31=282e2aa51714ea4a FPSCR: 00000000