last executing test programs: 5.016915387s ago: executing program 0 (id=723): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x2) readv(r2, &(0x7f0000000000)=[{&(0x7f0000001300)=""/244, 0x940}], 0x1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000008c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x13, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 4.183866969s ago: executing program 0 (id=725): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = getpid() setreuid(0xee00, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a30000000004c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021100011800c0001"], 0x12c}}, 0x0) r6 = syz_pidfd_open(r1, 0x0) setns(r6, 0x24020000) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0xf801, 0x2, 0xe}, {0x2, 0x5, 0x5, 0x10000}, {0x7, 0xa, 0x8e, 0x2}, {0x6, 0x0, 0x6, 0x2}, {0x6, 0x40, 0xc, 0x6}, {0x1, 0x8, 0x18, 0x2}, {0x7, 0x2, 0x40, 0x3}]}) syz_clone3(&(0x7f00000008c0)={0x14840000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000880)=[0x0], 0x1}, 0x58) 1.53760245s ago: executing program 0 (id=727): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000140)={'filter\x00', 0x7, 0x4, 0x3c0, 0x0, 0x1f0, 0x0, 0x108, 0x2d8, 0xe0, 0x4, 0x0, {[{{@uncond, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE2={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x410) 1.297457494s ago: executing program 1 (id=728): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="fc0000001900674c0000000000000000e0000001000000000000000000000000e000000200000000000000000000000000000000000000000a", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000040000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000004400050000000000000000"], 0xfc}}, 0x0) 1.2072383s ago: executing program 0 (id=729): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) unshare(0x400) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000001400)=""/227, 0x10}], 0x4) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) 1.025826703s ago: executing program 1 (id=730): setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) shutdown(0xffffffffffffffff, 0x1) 852.083324ms ago: executing program 1 (id=731): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) times(0x0) 278.816789ms ago: executing program 1 (id=732): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, r3, 0x1, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000084}, 0x40) 278.448389ms ago: executing program 0 (id=733): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb55a2a630b00c145f94cd977", 0x18, 0xffffffffffffffff) 145.248623ms ago: executing program 0 (id=734): r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, '\x00', 0x0, @lsm, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) sendmmsg(r0, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x1}], 0x1}}], 0x1, 0x9200000000000000) dup3(r1, r0, 0x0) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/207, 0xcf}], 0x1}, 0x0) 144.948573ms ago: executing program 1 (id=735): setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000240)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) shutdown(0xffffffffffffffff, 0x1) 0s ago: executing program 1 (id=736): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000500)={'vcan0\x00', 0x0}) r2 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r2, &(0x7f0000000080)={0x1d, r1}, 0x18) sendmsg$can_j1939(r2, &(0x7f00000001c0)={&(0x7f0000000040), 0x18, &(0x7f0000000180)={&(0x7f00000000c0)="92", 0x1a000}}, 0xee) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$can_j1939(0x1d, 0x2, 0x7) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=@newtfilter={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x74, r7, {0x6}, {0x0, 0x10}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) kernel console output (not intermixed with test programs): [ 39.431546][ T31] audit: type=1400 audit(39.370:68): avc: denied { read write } for pid=3104 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 39.433382][ T31] audit: type=1400 audit(39.370:69): avc: denied { open } for pid=3104 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:25639' (ED25519) to the list of known hosts. [ 50.532414][ T31] audit: type=1400 audit(50.460:70): avc: denied { name_bind } for pid=3106 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 52.309842][ T31] audit: type=1400 audit(52.250:71): avc: denied { execute } for pid=3108 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 52.314004][ T31] audit: type=1400 audit(52.250:72): avc: denied { execute_no_trans } for pid=3108 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 55.335312][ T31] audit: type=1400 audit(55.270:73): avc: denied { mounton } for pid=3108 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 55.336853][ T31] audit: type=1400 audit(55.270:74): avc: denied { mount } for pid=3108 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 55.347769][ T3108] cgroup: Unknown subsys name 'net' [ 55.354024][ T31] audit: type=1400 audit(55.290:75): avc: denied { unmount } for pid=3108 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 55.480102][ T3108] cgroup: Unknown subsys name 'cpuset' [ 55.485016][ T3108] cgroup: Unknown subsys name 'hugetlb' [ 55.486032][ T3108] cgroup: Unknown subsys name 'rlimit' [ 55.729302][ T31] audit: type=1400 audit(55.660:76): avc: denied { setattr } for pid=3108 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 55.730783][ T31] audit: type=1400 audit(55.660:77): avc: denied { mounton } for pid=3108 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 55.731781][ T31] audit: type=1400 audit(55.660:78): avc: denied { mount } for pid=3108 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 55.946530][ T3110] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 55.948418][ T31] audit: type=1400 audit(55.880:79): avc: denied { relabelto } for pid=3110 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 55.954410][ T31] audit: type=1400 audit(55.890:80): avc: denied { write } for pid=3110 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 55.987134][ T31] audit: type=1400 audit(55.920:81): avc: denied { read } for pid=3108 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 55.990825][ T31] audit: type=1400 audit(55.930:82): avc: denied { open } for pid=3108 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 60.203769][ T3108] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 61.923140][ T31] audit: type=1400 audit(61.860:83): avc: denied { execmem } for pid=3111 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 61.999209][ T31] audit: type=1400 audit(61.920:84): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 62.000796][ T31] audit: type=1400 audit(61.920:85): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 62.001510][ T31] audit: type=1400 audit(61.920:86): avc: denied { read } for pid=3113 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 62.002282][ T31] audit: type=1400 audit(61.920:87): avc: denied { open } for pid=3113 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 62.003032][ T31] audit: type=1400 audit(61.920:88): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 62.007959][ T31] audit: type=1400 audit(61.940:89): avc: denied { module_request } for pid=3113 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 62.135142][ T31] audit: type=1400 audit(62.070:90): avc: denied { sys_module } for pid=3113 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 62.685611][ T31] audit: type=1400 audit(62.620:91): avc: denied { ioctl } for pid=3113 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.686186][ T3113] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.692008][ T3113] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.942165][ T3114] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.945448][ T3114] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.363222][ T3113] hsr_slave_0: entered promiscuous mode [ 64.367268][ T3113] hsr_slave_1: entered promiscuous mode [ 64.585096][ T3113] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 64.585756][ T31] audit: type=1400 audit(64.520:92): avc: denied { create } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 64.593445][ T3113] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 64.597620][ T3113] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 64.604651][ T3113] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 64.711712][ T3114] hsr_slave_0: entered promiscuous mode [ 64.713238][ T3114] hsr_slave_1: entered promiscuous mode [ 64.714450][ T3114] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 64.714790][ T3114] Cannot create hsr debugfs directory [ 64.911162][ T3114] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 64.915335][ T3114] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 64.919357][ T3114] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 64.922897][ T3114] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 65.145078][ T3113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.378014][ T3114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.078274][ T3113] veth0_vlan: entered promiscuous mode [ 67.091122][ T3113] veth1_vlan: entered promiscuous mode [ 67.138192][ T3113] veth0_macvtap: entered promiscuous mode [ 67.145558][ T3113] veth1_macvtap: entered promiscuous mode [ 67.184452][ T3113] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.185031][ T3113] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.185228][ T3113] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.185410][ T3113] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.231876][ T3114] veth0_vlan: entered promiscuous mode [ 67.268190][ T3114] veth1_vlan: entered promiscuous mode [ 67.269894][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 67.269928][ T31] audit: type=1400 audit(67.200:95): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 67.281407][ T31] audit: type=1400 audit(67.210:96): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/syzkaller.ipW97T/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 67.282945][ T31] audit: type=1400 audit(67.220:97): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 67.297040][ T31] audit: type=1400 audit(67.230:98): avc: denied { unmount } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 67.303930][ T31] audit: type=1400 audit(67.240:99): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 67.308340][ T31] audit: type=1400 audit(67.240:100): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 67.314774][ T3114] veth0_macvtap: entered promiscuous mode [ 67.321180][ T3114] veth1_macvtap: entered promiscuous mode [ 67.363733][ T3114] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.364051][ T3114] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.364245][ T3114] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.364438][ T3114] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.415340][ T31] audit: type=1400 audit(67.350:101): avc: denied { read write } for pid=3113 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 67.432149][ T31] audit: type=1400 audit(67.360:102): avc: denied { open } for pid=3113 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 67.432735][ T31] audit: type=1400 audit(67.360:103): avc: denied { ioctl } for pid=3113 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 67.580171][ T31] audit: type=1400 audit(67.520:104): avc: denied { create } for pid=3794 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 67.721745][ T3802] capability: warning: `syz.0.5' uses deprecated v2 capabilities in a way that may be insecure [ 71.337563][ T3856] Zero length message leads to an empty skb [ 72.497274][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 72.497330][ T31] audit: type=1400 audit(72.430:135): avc: denied { unmount } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 72.731803][ T31] audit: type=1400 audit(72.670:136): avc: denied { ioctl } for pid=3875 comm="syz.0.27" path="socket:[3299]" dev="sockfs" ino=3299 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 73.522323][ T31] audit: type=1400 audit(73.460:137): avc: denied { create } for pid=3880 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 73.605650][ T3881] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 73.673937][ T31] audit: type=1400 audit(73.600:138): avc: denied { create } for pid=3886 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 73.689716][ T31] audit: type=1400 audit(73.620:139): avc: denied { getopt } for pid=3886 comm="syz.0.29" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 73.706468][ T31] audit: type=1400 audit(73.640:140): avc: denied { write } for pid=3886 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 73.713946][ T31] audit: type=1400 audit(73.650:141): avc: denied { ioctl } for pid=3886 comm="syz.0.29" path="socket:[3317]" dev="sockfs" ino=3317 ioctlcmd=0x9411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 73.869855][ T31] audit: type=1400 audit(73.810:142): avc: denied { create } for pid=3897 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 73.875193][ T31] audit: type=1400 audit(73.810:143): avc: denied { ioctl } for pid=3897 comm="syz.1.32" path="socket:[2278]" dev="sockfs" ino=2278 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 73.977450][ T31] audit: type=1400 audit(73.910:144): avc: denied { bind } for pid=3901 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 76.844735][ T3933] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3933 comm=syz.1.42 [ 77.096382][ T24] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 77.097129][ T24] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 77.104219][ T24] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz1 [ 77.735348][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 77.735459][ T31] audit: type=1400 audit(77.670:151): avc: denied { create } for pid=3956 comm="syz.0.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 78.970938][ T31] audit: type=1400 audit(78.910:152): avc: denied { name_bind } for pid=3971 comm="syz.0.54" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 78.972406][ T31] audit: type=1400 audit(78.910:153): avc: denied { node_bind } for pid=3971 comm="syz.0.54" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 79.489048][ T31] audit: type=1400 audit(79.420:154): avc: denied { ioctl } for pid=3982 comm="syz.0.58" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.683207][ T3990] FAULT_INJECTION: forcing a failure. [ 79.683207][ T3990] name failslab, interval 1, probability 0, space 0, times 1 [ 79.684643][ T3990] CPU: 1 UID: 0 PID: 3990 Comm: syz.1.61 Not tainted 6.11.0-syzkaller #0 [ 79.685241][ T3990] Hardware name: ARM-Versatile Express [ 79.685695][ T3990] Call trace: [ 79.686642][ T3990] [<8198c4e0>] (dump_backtrace) from [<8198c5dc>] (show_stack+0x18/0x1c) [ 79.688291][ T3990] r7:848ad400 r6:00000cc0 r5:60000013 r4:820390a8 [ 79.688806][ T3990] [<8198c5c4>] (show_stack) from [<819aa8e0>] (dump_stack_lvl+0x70/0x7c) [ 79.689340][ T3990] [<819aa870>] (dump_stack_lvl) from [<819aa904>] (dump_stack+0x18/0x1c) [ 79.689760][ T3990] r5:00000000 r4:827188dc [ 79.690064][ T3990] [<819aa8ec>] (dump_stack) from [<808df6cc>] (should_fail_ex+0x18c/0x1dc) [ 79.690610][ T3990] [<808df540>] (should_fail_ex) from [<804e3700>] (should_failslab+0x6c/0x94) [ 79.691068][ T3990] r6:00000cc0 r5:82c98800 r4:82cab000 [ 79.691419][ T3990] [<804e3694>] (should_failslab) from [<804c8d9c>] (kmem_cache_alloc_lru_noprof+0x50/0x338) [ 79.691965][ T3990] [<804c8d4c>] (kmem_cache_alloc_lru_noprof) from [<80461f98>] (shmem_alloc_inode+0x24/0x30) [ 79.692602][ T3990] r10:00000402 r9:848ad400 r8:000081ff r7:82c0b680 r6:81a19ea0 r5:82c98800 [ 79.692990][ T3990] r4:824bf2a0 [ 79.693152][ T3990] [<80461f74>] (shmem_alloc_inode) from [<805344c8>] (alloc_inode+0x24/0xc8) [ 79.693746][ T3990] [<805344a4>] (alloc_inode) from [<8053457c>] (new_inode+0x10/0x6c) [ 79.694066][ T3990] r7:82c0b680 r6:00000000 r5:82c98800 r4:824bf2a0 [ 79.694288][ T3990] [<8053456c>] (new_inode) from [<80462524>] (shmem_get_inode+0x90/0x394) [ 79.694715][ T3990] r9:848ad400 r8:000081ff r7:82c0b680 r6:00000000 r5:82c98800 r4:824bf2a0 [ 79.695321][ T3990] [<80462494>] (shmem_get_inode) from [<804632ec>] (__shmem_file_setup+0x90/0x168) [ 79.695984][ T3990] r10:8342c300 r9:00000000 r8:82934088 r7:8204c764 r6:00000000 r5:00003000 [ 79.696423][ T3990] r4:82cad010 [ 79.696878][ T3990] [<8046325c>] (__shmem_file_setup) from [<8046956c>] (shmem_zero_setup+0x4c/0x84) [ 79.697379][ T3990] r9:82934084 r8:82934088 r7:21000000 r6:8521e2a0 r5:000020fa r4:8521e2a0 [ 79.697820][ T3990] [<80469520>] (shmem_zero_setup) from [<804a0528>] (mmap_region+0x8f8/0xcb4) [ 79.698172][ T3990] r5:000020fa r4:20ffd000 [ 79.698351][ T3990] [<8049fc30>] (mmap_region) from [<804a0c40>] (do_mmap+0x35c/0x4cc) [ 79.699060][ T3990] r10:00000000 r9:8342c300 r8:20ffd000 r7:848ad400 r6:000020fa r5:0000a031 [ 79.699499][ T3990] r4:00003000 [ 79.699767][ T3990] [<804a08e4>] (do_mmap) from [<8046a88c>] (vm_mmap_pgoff+0xd8/0x18c) [ 79.700198][ T3990] r10:8342c300 r9:00003000 r8:20ffd000 r7:00000000 r6:e0739f20 r5:00000002 [ 79.700657][ T3990] r4:00000000 [ 79.700846][ T3990] [<8046a7b4>] (vm_mmap_pgoff) from [<8049cbd4>] (ksys_mmap_pgoff+0x48/0xec) [ 79.701477][ T3990] r10:000000c0 r9:848ad400 r8:8020029c r7:20ffd000 r6:00003000 r5:00000002 [ 79.701953][ T3990] r4:0000a031 [ 79.702230][ T3990] [<8049cb8c>] (ksys_mmap_pgoff) from [<8049cc94>] (sys_mmap_pgoff+0x1c/0x24) [ 79.703024][ T3990] r8:8020029c r7:000000c0 r6:00130d60 r5:00000000 r4:ffffffff [ 79.703577][ T3990] [<8049cc78>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 79.704081][ T3990] Exception stack(0xe0739fa8 to 0xe0739ff0) [ 79.704721][ T3990] 9fa0: ffffffff 00000000 20ffd000 00003000 00000002 0000a031 [ 79.705204][ T3990] 9fc0: ffffffff 00000000 00130d60 000000c0 00000000 00006364 003d0f00 76b400bc [ 79.705842][ T3990] 9fe0: 76b3fec0 76b3feb0 000189e8 00132db0 [ 80.037362][ T31] audit: type=1400 audit(79.970:155): avc: denied { create } for pid=3998 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 80.042333][ T31] audit: type=1400 audit(79.980:156): avc: denied { ioctl } for pid=3998 comm="syz.1.66" path="socket:[3482]" dev="sockfs" ino=3482 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 80.065284][ T31] audit: type=1400 audit(80.000:157): avc: denied { bind } for pid=4001 comm="syz.0.67" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 80.075993][ T31] audit: type=1400 audit(80.010:158): avc: denied { node_bind } for pid=4001 comm="syz.0.67" saddr=fe80:: scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 80.078100][ T31] audit: type=1400 audit(80.010:159): avc: denied { write } for pid=4001 comm="syz.0.67" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 80.086818][ T31] audit: type=1400 audit(80.020:160): avc: denied { create } for pid=4001 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 80.100016][ T4003] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4003 comm=syz.0.67 [ 80.214876][ T4006] syz.0.68 uses obsolete (PF_INET,SOCK_PACKET) [ 80.747893][ T24] hid-generic 0100:000B:0003.0002: item fetching failed at offset 0/104 [ 80.754133][ T24] hid-generic 0100:000B:0003.0002: probe with driver hid-generic failed with error -22 [ 80.893134][ T4026] FAULT_INJECTION: forcing a failure. [ 80.893134][ T4026] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 80.894045][ T4026] CPU: 0 UID: 0 PID: 4026 Comm: syz.0.72 Not tainted 6.11.0-syzkaller #0 [ 80.894451][ T4026] Hardware name: ARM-Versatile Express [ 80.894726][ T4026] Call trace: [ 80.894954][ T4026] [<8198c4e0>] (dump_backtrace) from [<8198c5dc>] (show_stack+0x18/0x1c) [ 80.895357][ T4026] r7:00000000 r6:00000000 r5:60000013 r4:820390a8 [ 80.895625][ T4026] [<8198c5c4>] (show_stack) from [<819aa8e0>] (dump_stack_lvl+0x70/0x7c) [ 80.895972][ T4026] [<819aa870>] (dump_stack_lvl) from [<819aa904>] (dump_stack+0x18/0x1c) [ 80.896674][ T4026] r5:00000000 r4:8274d884 [ 80.896951][ T4026] [<819aa8ec>] (dump_stack) from [<808df6cc>] (should_fail_ex+0x18c/0x1dc) [ 80.897583][ T4026] [<808df540>] (should_fail_ex) from [<808df730>] (should_fail+0x14/0x18) [ 80.898125][ T4026] r6:00000000 r5:e052df68 r4:00000002 [ 80.898654][ T4026] [<808df71c>] (should_fail) from [<808df750>] (should_fail_usercopy+0x1c/0x20) [ 80.899233][ T4026] [<808df734>] (should_fail_usercopy) from [<8054879c>] (simple_read_from_buffer+0x8c/0x134) [ 80.899718][ T4026] [<80548710>] (simple_read_from_buffer) from [<805be738>] (proc_fail_nth_read+0xb8/0x100) [ 80.900293][ T4026] r10:00000001 r9:805be680 r8:00000002 r7:e052df68 r6:0000000f r5:76b2df30 [ 80.900736][ T4026] r4:844b6c00 r3:e052de9f [ 80.901047][ T4026] [<805be680>] (proc_fail_nth_read) from [<8050fedc>] (vfs_read+0x98/0x324) [ 80.901668][ T4026] r8:76b2df30 r7:e052df68 r6:844b6c00 r5:0000000f r4:82f6f900 [ 80.902034][ T4026] [<8050fe44>] (vfs_read) from [<80510b8c>] (ksys_read+0x78/0xf8) [ 80.902479][ T4026] r10:00000003 r9:844b6c00 r8:8020029c r7:00000000 r6:00000000 r5:82f6f900 [ 80.903037][ T4026] r4:82f6f903 [ 80.903470][ T4026] [<80510b14>] (ksys_read) from [<80510c1c>] (sys_read+0x10/0x14) [ 80.903938][ T4026] r7:00000003 r6:00000006 r5:76b2df30 r4:0000000f [ 80.904352][ T4026] [<80510c0c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 80.904931][ T4026] Exception stack(0xe052dfa8 to 0xe052dff0) [ 80.905414][ T4026] dfa0: 0000000f 76b2df30 00000006 76b2df30 0000000f 00000000 [ 80.905901][ T4026] dfc0: 0000000f 76b2df30 00000006 00000003 00000000 00006364 003d0f00 76b2e0bc [ 80.906529][ T4026] dfe0: 00000158 76b2ded0 000d82f8 00130c84 [ 80.987968][ T4028] kernel profiling enabled (shift: 0) [ 81.902804][ T4052] FAULT_INJECTION: forcing a failure. [ 81.902804][ T4052] name failslab, interval 1, probability 0, space 0, times 0 [ 81.903433][ T4052] CPU: 1 UID: 0 PID: 4052 Comm: syz.0.82 Not tainted 6.11.0-syzkaller #0 [ 81.903782][ T4052] Hardware name: ARM-Versatile Express [ 81.904009][ T4052] Call trace: [ 81.904218][ T4052] [<8198c4e0>] (dump_backtrace) from [<8198c5dc>] (show_stack+0x18/0x1c) [ 81.905180][ T4052] r7:00000d40 r6:852123e8 r5:60000013 r4:820390a8 [ 81.905790][ T4052] [<8198c5c4>] (show_stack) from [<819aa8e0>] (dump_stack_lvl+0x70/0x7c) [ 81.906295][ T4052] [<819aa870>] (dump_stack_lvl) from [<819aa904>] (dump_stack+0x18/0x1c) [ 81.906698][ T4052] r5:00000000 r4:827188dc [ 81.906915][ T4052] [<819aa8ec>] (dump_stack) from [<808df6cc>] (should_fail_ex+0x18c/0x1dc) [ 81.907301][ T4052] [<808df540>] (should_fail_ex) from [<804e3700>] (should_failslab+0x6c/0x94) [ 81.907714][ T4052] r6:852123e8 r5:00000018 r4:82c01240 [ 81.907962][ T4052] [<804e3694>] (should_failslab) from [<804c9454>] (__kmalloc_noprof+0x9c/0x458) [ 81.908351][ T4052] [<804c93b8>] (__kmalloc_noprof) from [<8074bcfc>] (tomoyo_encode2+0x64/0xf0) [ 81.909143][ T4052] r10:00000fff r9:82c9bc00 r8:00000000 r7:833d35d8 r6:852123e8 r5:84b42ffd [ 81.909622][ T4052] r4:84b42ff0 [ 81.909811][ T4052] [<8074bc98>] (tomoyo_encode2) from [<8074bdac>] (tomoyo_encode+0x24/0x30) [ 81.910199][ T4052] r9:82c9bc00 r8:00000000 r7:833d35d8 r6:852123e8 r5:00001000 r4:84b42ff1 [ 81.910533][ T4052] [<8074bd88>] (tomoyo_encode) from [<8074be38>] (tomoyo_realpath_from_path+0x80/0x17c) [ 81.910954][ T4052] r5:00001000 r4:84b42000 [ 81.911172][ T4052] [<8074bdb8>] (tomoyo_realpath_from_path) from [<80747f38>] (tomoyo_path_number_perm+0xcc/0x22c) [ 81.911689][ T4052] r10:844b6000 r9:00000000 r8:852123c0 r7:00005421 r6:00000004 r5:81ad14e8 [ 81.912048][ T4052] r4:852123e8 r3:824b9340 [ 81.912260][ T4052] [<80747e6c>] (tomoyo_path_number_perm) from [<8074c804>] (tomoyo_file_ioctl+0x1c/0x20) [ 81.912744][ T4052] r9:00000003 r8:852123c0 r7:200000c0 r6:200000c0 r5:00005421 r4:852123c0 [ 81.913088][ T4052] [<8074c7e8>] (tomoyo_file_ioctl) from [<806fae84>] (security_file_ioctl+0x64/0x1e4) [ 81.913511][ T4052] [<806fae20>] (security_file_ioctl) from [<8052987c>] (sys_ioctl+0x50/0xd94) [ 81.913929][ T4052] r7:200000c0 r6:852123c1 r5:00000000 r4:00005421 [ 81.914219][ T4052] [<8052982c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 81.914633][ T4052] Exception stack(0xeab35fa8 to 0xeab35ff0) [ 81.914925][ T4052] 5fa0: 00000000 00000000 00000003 00005421 200000c0 00000000 [ 81.915299][ T4052] 5fc0: 00000000 00000000 00130d60 00000036 00000000 00006364 003d0f00 76b2e0bc [ 81.915641][ T4052] 5fe0: 76b2dec0 76b2deb0 000189e8 00132db0 [ 81.916040][ T4052] r10:00000036 r9:844b6000 r8:8020029c r7:00000036 r6:00130d60 r5:00000000 [ 81.916473][ T4052] r4:00000000 [ 81.919557][ T4052] ERROR: Out of memory at tomoyo_realpath_from_path. [ 83.906508][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 83.906626][ T31] audit: type=1400 audit(83.840:171): avc: denied { create } for pid=4083 comm="syz.1.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 86.016725][ T31] audit: type=1400 audit(85.950:172): avc: denied { ioctl } for pid=4092 comm="syz.1.98" path="socket:[2813]" dev="sockfs" ino=2813 ioctlcmd=0x9411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 87.728244][ T4128] SELinux: Context system_u:object_r:root_t:s0 is not valid (left unmapped). [ 87.730313][ T31] audit: type=1400 audit(87.670:173): avc: denied { relabelto } for pid=4127 comm="syz.0.105" name="file0" dev="tmpfs" ino=298 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:root_t:s0" [ 87.731694][ T31] audit: type=1400 audit(87.670:174): avc: denied { associate } for pid=4127 comm="syz.0.105" name="file0" dev="tmpfs" ino=298 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:root_t:s0" [ 87.739236][ T31] audit: type=1400 audit(87.670:175): avc: denied { ioctl } for pid=4127 comm="syz.0.105" path="/54/file0" dev="tmpfs" ino=298 ioctlcmd=0x510a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:root_t:s0" [ 87.756045][ T31] audit: type=1400 audit(87.690:176): avc: denied { unlink } for pid=3113 comm="syz-executor" name="file0" dev="tmpfs" ino=298 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:root_t:s0" [ 88.070920][ T31] audit: type=1400 audit(88.010:177): avc: denied { getopt } for pid=4138 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.094394][ T31] audit: type=1400 audit(88.030:178): avc: denied { map_create } for pid=4138 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 92.068239][ T4118] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 92.197928][ T4157] FAULT_INJECTION: forcing a failure. [ 92.197928][ T4157] name failslab, interval 1, probability 0, space 0, times 0 [ 92.205599][ T4157] CPU: 0 UID: 0 PID: 4157 Comm: syz.0.113 Not tainted 6.11.0-syzkaller #0 [ 92.206137][ T4157] Hardware name: ARM-Versatile Express [ 92.206575][ T4157] Call trace: [ 92.206933][ T4157] [<8198c4e0>] (dump_backtrace) from [<8198c5dc>] (show_stack+0x18/0x1c) [ 92.208018][ T4157] r7:844b5400 r6:00000d40 r5:60000013 r4:820390a8 [ 92.208305][ T4157] [<8198c5c4>] (show_stack) from [<819aa8e0>] (dump_stack_lvl+0x70/0x7c) [ 92.208611][ T4157] [<819aa870>] (dump_stack_lvl) from [<819aa904>] (dump_stack+0x18/0x1c) [ 92.208923][ T4157] r5:00000000 r4:827188dc [ 92.209234][ T4157] [<819aa8ec>] (dump_stack) from [<808df6cc>] (should_fail_ex+0x18c/0x1dc) [ 92.209529][ T4157] [<808df540>] (should_fail_ex) from [<804e3700>] (should_failslab+0x6c/0x94) [ 92.209824][ T4157] r6:00000d40 r5:846ff458 r4:82c9f6c0 [ 92.210122][ T4157] [<804e3694>] (should_failslab) from [<804c90d0>] (kmem_cache_alloc_noprof+0x4c/0x334) [ 92.210413][ T4157] [<804c9084>] (kmem_cache_alloc_noprof) from [<80704568>] (security_inode_alloc+0x30/0x1e8) [ 92.210795][ T4157] r10:82c98800 r9:00000000 r8:00000000 r7:846ff560 r6:81a1cb84 r5:846ff458 [ 92.211253][ T4157] r4:846ff458 [ 92.211394][ T4157] [<80704538>] (security_inode_alloc) from [<80532704>] (inode_init_always+0x164/0x1b0) [ 92.211841][ T4157] r5:00000000 r4:846ff458 [ 92.212070][ T4157] [<805325a0>] (inode_init_always) from [<805344e0>] (alloc_inode+0x3c/0xc8) [ 92.212347][ T4157] r10:00000404 r9:844b5400 r8:000081ff r7:82c0b680 r6:81a19ea0 r5:82c98800 [ 92.212620][ T4157] r4:846ff458 r3:844b5400 [ 92.212845][ T4157] [<805344a4>] (alloc_inode) from [<8053457c>] (new_inode+0x10/0x6c) [ 92.213070][ T4157] r7:82c0b680 r6:00000000 r5:82c98800 r4:824bf2a0 [ 92.213231][ T4157] [<8053456c>] (new_inode) from [<80462524>] (shmem_get_inode+0x90/0x394) [ 92.213500][ T4157] r9:844b5400 r8:000081ff r7:82c0b680 r6:00000000 r5:82c98800 r4:824bf2a0 [ 92.213739][ T4157] [<80462494>] (shmem_get_inode) from [<804632ec>] (__shmem_file_setup+0x90/0x168) [ 92.214050][ T4157] r10:840db600 r9:00000000 r8:82934088 r7:8204c764 r6:00000000 r5:00003000 [ 92.214302][ T4157] r4:82cad010 [ 92.214542][ T4157] [<8046325c>] (__shmem_file_setup) from [<8046956c>] (shmem_zero_setup+0x4c/0x84) [ 92.214786][ T4157] r9:82934084 r8:82934088 r7:21000000 r6:85102cc0 r5:000020fa r4:85102cc0 [ 92.214986][ T4157] [<80469520>] (shmem_zero_setup) from [<804a0528>] (mmap_region+0x8f8/0xcb4) [ 92.215272][ T4157] r5:000020fa r4:20ffd000 [ 92.215522][ T4157] [<8049fc30>] (mmap_region) from [<804a0c40>] (do_mmap+0x35c/0x4cc) [ 92.215918][ T4157] r10:00000000 r9:840db600 r8:20ffd000 r7:844b5400 r6:000020fa r5:0000a031 [ 92.216354][ T4157] r4:00003000 [ 92.216552][ T4157] [<804a08e4>] (do_mmap) from [<8046a88c>] (vm_mmap_pgoff+0xd8/0x18c) [ 92.216998][ T4157] r10:840db600 r9:00003000 r8:20ffd000 r7:00000000 r6:eb011f20 r5:00000002 [ 92.217332][ T4157] r4:00000000 [ 92.217442][ T4157] [<8046a7b4>] (vm_mmap_pgoff) from [<8049cbd4>] (ksys_mmap_pgoff+0x48/0xec) [ 92.217730][ T4157] r10:000000c0 r9:844b5400 r8:8020029c r7:20ffd000 r6:00003000 r5:00000002 [ 92.218091][ T4157] r4:0000a031 [ 92.218299][ T4157] [<8049cb8c>] (ksys_mmap_pgoff) from [<8049cc94>] (sys_mmap_pgoff+0x1c/0x24) [ 92.218734][ T4157] r8:8020029c r7:000000c0 r6:00130d60 r5:00000000 r4:ffffffff [ 92.218923][ T4157] [<8049cc78>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 92.219330][ T4157] Exception stack(0xeb011fa8 to 0xeb011ff0) [ 92.219606][ T4157] 1fa0: ffffffff 00000000 20ffd000 00003000 00000002 0000a031 [ 92.219849][ T4157] 1fc0: ffffffff 00000000 00130d60 000000c0 00000000 00006364 003d0f00 76b2e0bc [ 92.220064][ T4157] 1fe0: 76b2dec0 76b2deb0 000189e8 00132db0 [ 93.557792][ T31] audit: type=1400 audit(93.490:179): avc: denied { bind } for pid=4165 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 93.558385][ T31] audit: type=1400 audit(93.490:180): avc: denied { getopt } for pid=4165 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 93.560310][ T31] audit: type=1400 audit(93.490:181): avc: denied { setopt } for pid=4165 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 93.587522][ T4170] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 93.594120][ T31] audit: type=1400 audit(93.530:182): avc: denied { setattr } for pid=4169 comm="syz.0.120" name="RAWv6" dev="sockfs" ino=2930 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 94.511416][ T4207] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4207 comm=syz.0.131 [ 94.936709][ T31] audit: type=1400 audit(94.870:183): avc: denied { write } for pid=4214 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 95.066395][ T4224] sctp: [Deprecated]: syz.1.137 (pid 4224) Use of int in max_burst socket option deprecated. [ 95.066395][ T4224] Use struct sctp_assoc_value instead [ 95.557703][ T31] audit: type=1400 audit(95.490:184): avc: denied { create } for pid=4232 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 95.561544][ T31] audit: type=1400 audit(95.500:185): avc: denied { write } for pid=4232 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 97.536224][ T31] audit: type=1400 audit(97.470:186): avc: denied { getopt } for pid=4244 comm="syz.0.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 97.544888][ T31] audit: type=1400 audit(97.480:187): avc: denied { connect } for pid=4244 comm="syz.0.144" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.019588][ T94] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 99.169838][ T94] usb 2-1: Using ep0 maxpacket: 8 [ 99.186328][ T94] usb 2-1: config 1 interface 0 has no altsetting 0 [ 99.196945][ T94] usb 2-1: New USB device found, idVendor=0fc5, idProduct=b080, bcdDevice= 0.40 [ 99.197215][ T94] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 99.197787][ T94] usb 2-1: Product: 靭荖ኊ᪈棽觍គ⒳蜀몇뜝ɋꓯ䃉㱤ϻ矷滔错햪௧蔀ୈ粄斬晤9禜奛ꦟ텶☚䢿컼↞Ẳ妜횤䗞䳐 [ 99.198159][ T94] usb 2-1: Manufacturer: ⡨聋婐徜饺酝턢䑌뫊⮞룁ꎫ䲃켎誺䴡⟎썜ሳ氢묉퍰쎃鶢㳓녩鉎䍽읣菱콑ᔝﴇ쿴ᔊ﫛襛츜ሑ愒蘨诱鶉ᯋ먫ꕱᅆ䤷猖刣噁矆̐먰ᐐǁ鳴痭΂䎳儜ㅝ䛘爯얫旘䐊ḧ숳凂員遦蟌ᇭ透菶∟஽땾ꚫ⦔䒿鎻녽☻წꩊ貂〆Ϣᣳ骹Ȩ︮꽫㝍ꥤ믈◅偞炍벑쎺詰퇢 [ 99.200099][ T94] usb 2-1: SerialNumber: ⁅耘ꅸ貁簕洏⿐瓩ꯑ胂츑ꐠ⅀䝲消⚝珑ՠꊵ髸〠Ꮂfl鼼顇普쁌먻틵䝜ᦫ੒ꙏ褏ံ跊疊䤉ꊐꢀ曱Ꮋ摱毽ઇ훖狊⌌Ꮏếឲ裺黌鐘㷐쏓发ڲ೹龊씶曀醇䪄쯷⹋꽶輫艞蟇皭 [ 99.416884][ T4288] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 99.423300][ T4288] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 99.551826][ T31] audit: type=1400 audit(99.490:188): avc: denied { name_bind } for pid=4308 comm="syz.0.164" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 99.561835][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 99.869841][ T94] usbhid 2-1:1.0: can't add hid device: -71 [ 99.870299][ T94] usbhid 2-1:1.0: probe with driver usbhid failed with error -71 [ 99.874123][ T94] usb 2-1: USB disconnect, device number 2 [ 99.927946][ T31] audit: type=1400 audit(99.860:189): avc: denied { write } for pid=4316 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.991485][ T31] audit: type=1400 audit(99.930:190): avc: denied { shutdown } for pid=4331 comm="syz.1.168" lport=36731 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 100.214933][ T4340] SELinux: Context system_u:object_r:semanage_store_t:s0 is not valid (left unmapped). [ 100.217598][ T31] audit: type=1400 audit(100.150:191): avc: denied { relabelto } for pid=4339 comm="syz.1.171" name="uhid" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:semanage_store_t:s0" [ 100.219437][ T31] audit: type=1400 audit(100.150:192): avc: denied { associate } for pid=4339 comm="syz.1.171" name="uhid" dev="devtmpfs" ino=722 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:semanage_store_t:s0" [ 100.223838][ T31] audit: type=1400 audit(100.160:193): avc: denied { ioctl } for pid=4339 comm="syz.1.171" path="socket:[3974]" dev="sockfs" ino=3974 ioctlcmd=0x9429 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 100.375008][ T31] audit: type=1400 audit(100.310:194): avc: denied { read write } for pid=4345 comm="syz.1.174" name="uhid" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:semanage_store_t:s0" [ 100.376671][ T31] audit: type=1400 audit(100.310:195): avc: denied { open } for pid=4345 comm="syz.1.174" path="/dev/uhid" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:semanage_store_t:s0" [ 102.466043][ T31] audit: type=1400 audit(102.400:196): avc: denied { ioctl } for pid=4350 comm="syz.0.176" path="socket:[3993]" dev="sockfs" ino=3993 ioctlcmd=0x8954 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 102.478931][ T31] audit: type=1400 audit(102.410:197): avc: denied { create } for pid=4350 comm="syz.0.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 103.257508][ T4366] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4366 comm=syz.1.179 [ 103.261494][ T4366] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4366 comm=syz.1.179 [ 107.589404][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 107.589518][ T31] audit: type=1400 audit(107.510:200): avc: denied { map } for pid=4402 comm="syz.0.189" path="socket:[4361]" dev="sockfs" ino=4361 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 107.590812][ T31] audit: type=1400 audit(107.510:201): avc: denied { read } for pid=4402 comm="syz.0.189" path="socket:[4361]" dev="sockfs" ino=4361 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 107.721641][ T31] audit: type=1400 audit(107.660:202): avc: denied { create } for pid=4400 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 107.734630][ T31] audit: type=1400 audit(107.670:203): avc: denied { ioctl } for pid=4400 comm="syz.1.188" path="socket:[5139]" dev="sockfs" ino=5139 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 107.784113][ T31] audit: type=1400 audit(107.720:204): avc: denied { ioctl } for pid=4400 comm="syz.1.188" path="socket:[5140]" dev="sockfs" ino=5140 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 108.029606][ T31] audit: type=1400 audit(107.950:205): avc: denied { listen } for pid=4400 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 108.368164][ T31] audit: type=1400 audit(108.300:206): avc: denied { ioctl } for pid=4413 comm="syz.0.193" path="socket:[4379]" dev="sockfs" ino=4379 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 108.390273][ T31] audit: type=1400 audit(108.310:207): avc: denied { getopt } for pid=4413 comm="syz.0.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 108.817417][ T31] audit: type=1400 audit(108.750:208): avc: denied { write } for pid=4413 comm="syz.0.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 108.831569][ T31] audit: type=1400 audit(108.770:209): avc: denied { create } for pid=4413 comm="syz.0.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 109.203608][ T4423] FAULT_INJECTION: forcing a failure. [ 109.203608][ T4423] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 109.204097][ T4423] CPU: 1 UID: 0 PID: 4423 Comm: syz.0.195 Not tainted 6.11.0-syzkaller #0 [ 109.204387][ T4423] Hardware name: ARM-Versatile Express [ 109.204640][ T4423] Call trace: [ 109.204839][ T4423] [<8198c4e0>] (dump_backtrace) from [<8198c5dc>] (show_stack+0x18/0x1c) [ 109.205188][ T4423] r7:20000380 r6:ec8b1e30 r5:60000013 r4:820390a8 [ 109.205431][ T4423] [<8198c5c4>] (show_stack) from [<819aa8e0>] (dump_stack_lvl+0x70/0x7c) [ 109.205737][ T4423] [<819aa870>] (dump_stack_lvl) from [<819aa904>] (dump_stack+0x18/0x1c) [ 109.206069][ T4423] r5:00000000 r4:8274d884 [ 109.206261][ T4423] [<819aa8ec>] (dump_stack) from [<808df6cc>] (should_fail_ex+0x18c/0x1dc) [ 109.206598][ T4423] [<808df540>] (should_fail_ex) from [<808df730>] (should_fail+0x14/0x18) [ 109.206896][ T4423] r6:ec8b1e30 r5:00000000 r4:ec8b1f38 [ 109.207160][ T4423] [<808df71c>] (should_fail) from [<808df750>] (should_fail_usercopy+0x1c/0x20) [ 109.207509][ T4423] [<808df734>] (should_fail_usercopy) from [<8147a810>] (copy_msghdr_from_user+0x50/0x130) [ 109.207876][ T4423] [<8147a7c0>] (copy_msghdr_from_user) from [<8147a968>] (___sys_sendmsg+0x78/0xd0) [ 109.208238][ T4423] r8:00008000 r7:00000000 r6:84c0c500 r5:ec8b1f38 r4:ec8b1e74 [ 109.208729][ T4423] [<8147a8f0>] (___sys_sendmsg) from [<8147aea4>] (sys_sendmsg+0x78/0xbc) [ 109.209129][ T4423] r10:00000128 r9:844b3c00 r8:8020029c r7:00008000 r6:20000380 r5:84c0c500 [ 109.209595][ T4423] r4:00000000 [ 109.209702][ T4423] [<8147ae2c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 109.209933][ T4423] Exception stack(0xec8b1fa8 to 0xec8b1ff0) [ 109.210083][ T4423] 1fa0: 00000000 00000000 00000003 20000380 00008000 00000000 [ 109.210289][ T4423] 1fc0: 00000000 00000000 00130d60 00000128 00000000 00006364 003d0f00 76b2e0bc [ 109.210519][ T4423] 1fe0: 76b2dec0 76b2deb0 000189e8 00132db0 [ 109.210774][ T4423] r7:00000128 r6:00130d60 r5:00000000 r4:00000000 [ 109.549306][ T4412] coredump: 214(syz.1.192): written to core: VMAs: 17, size 39915520; core: 10910079 bytes, pos 39919616 [ 113.934544][ T4429] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 117.554315][ T31] audit: type=1400 audit(117.490:210): avc: denied { name_bind } for pid=4481 comm="syz.1.212" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 117.569747][ T10] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 117.727849][ T10] usb 1-1: Using ep0 maxpacket: 8 [ 117.750342][ T10] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 117.751018][ T10] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 117.751519][ T10] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 117.752088][ T10] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 117.752657][ T10] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 117.753065][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 117.756660][ T4496] netlink: 4 bytes leftover after parsing attributes in process `syz.1.217'. [ 117.995883][ T10] usb 1-1: GET_CAPABILITIES returned 0 [ 117.996271][ T10] usbtmc 1-1:16.0: can't read capabilities [ 118.209914][ T94] usb 1-1: USB disconnect, device number 2 [ 118.617039][ T31] audit: type=1400 audit(118.550:211): avc: denied { map_read map_write } for pid=4518 comm="syz.1.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 119.028458][ T31] audit: type=1400 audit(118.960:212): avc: denied { write } for pid=4522 comm="syz.0.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 119.650432][ T4525] netlink: 4 bytes leftover after parsing attributes in process `syz.0.225'. [ 120.067144][ T4533] tmpfs: Unsupported parameter 'mpol' [ 120.378926][ T94] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 120.529293][ T94] usb 2-1: Using ep0 maxpacket: 8 [ 120.536723][ T94] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 120.537132][ T94] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 120.537401][ T94] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 120.537688][ T94] usb 2-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 120.538045][ T94] usb 2-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 120.538301][ T94] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 120.769000][ T94] usb 2-1: usb_control_msg returned -32 [ 120.769321][ T94] usbtmc 2-1:16.0: can't read capabilities [ 128.064096][ T31] audit: type=1400 audit(128.000:213): avc: denied { setopt } for pid=4568 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 128.076207][ T4569] netlink: 'syz.0.239': attribute type 10 has an invalid length. [ 128.215682][ T31] audit: type=1400 audit(128.150:214): avc: denied { execute } for pid=4572 comm="syz.0.240" path=2F6D656D66643A736563657203202864656C6574656429 dev="tmpfs" ino=1030 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 132.042171][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 134.463916][ T3791] usb 2-1: USB disconnect, device number 3 [ 135.155455][ T4608] netlink: 16 bytes leftover after parsing attributes in process `syz.1.252'. [ 136.477714][ T31] audit: type=1400 audit(136.410:215): avc: denied { read } for pid=4622 comm="syz.0.259" path="socket:[5347]" dev="sockfs" ino=5347 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 139.652988][ T94] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 139.845596][ T94] usb 1-1: device descriptor read/64, error -71 [ 140.099014][ T94] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 140.104274][ C1] hrtimer: interrupt took 2735728 ns [ 140.249200][ T94] usb 1-1: device descriptor read/64, error -71 [ 140.373316][ T94] usb usb1-port1: attempt power cycle [ 140.764779][ T94] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 140.831480][ T94] usb 1-1: device descriptor read/8, error -71 [ 141.106706][ T94] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 141.140120][ T94] usb 1-1: device descriptor read/8, error -71 [ 141.254996][ T94] usb usb1-port1: unable to enumerate USB device [ 141.859220][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 149.469610][ T31] audit: type=1400 audit(149.400:216): avc: denied { write } for pid=4672 comm="syz.1.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 150.058858][ T31] audit: type=1400 audit(149.990:217): avc: denied { bind } for pid=4682 comm="syz.1.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 150.059366][ T31] audit: type=1400 audit(149.990:218): avc: denied { name_bind } for pid=4682 comm="syz.1.281" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 150.059739][ T31] audit: type=1400 audit(149.990:219): avc: denied { node_bind } for pid=4682 comm="syz.1.281" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 150.061838][ T31] audit: type=1400 audit(150.000:220): avc: denied { write } for pid=4682 comm="syz.1.281" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 150.632525][ T31] audit: type=1400 audit(150.570:221): avc: denied { connect } for pid=4688 comm="syz.0.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 150.633062][ T31] audit: type=1400 audit(150.570:222): avc: denied { name_connect } for pid=4688 comm="syz.0.284" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 151.219729][ T31] audit: type=1400 audit(151.160:223): avc: denied { ioctl } for pid=4698 comm="syz.0.289" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5446 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 152.351085][ T94] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 152.622497][ T94] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 152.623282][ T94] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 152.623707][ T94] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 152.624235][ T94] usb 2-1: New USB device found, idVendor=20d6, idProduct=cb17, bcdDevice= 0.00 [ 152.624675][ T94] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 152.669195][ T94] usb 2-1: config 0 descriptor?? [ 153.123399][ T94] usbhid 2-1:0.0: can't add hid device: -71 [ 153.124008][ T94] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 153.131674][ T94] usb 2-1: USB disconnect, device number 4 [ 154.049052][ T31] audit: type=1400 audit(153.980:224): avc: denied { name_connect } for pid=4737 comm="syz.1.300" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 155.108325][ T4726] coredump: 370(syz.0.294): written to core: VMAs: 17, size 39915520; core: 11032383 bytes, pos 39919616 [ 155.235995][ T4752] netlink: 24 bytes leftover after parsing attributes in process `syz.1.307'. [ 155.913662][ T31] audit: type=1400 audit(155.840:225): avc: denied { watch watch_reads } for pid=4759 comm="syz.0.312" path="/162" dev="tmpfs" ino=852 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 162.440923][ T4804] netlink: 12 bytes leftover after parsing attributes in process `syz.1.328'. [ 162.983002][ T31] audit: type=1326 audit(162.920:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4805 comm="syz.1.329" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 163.015522][ T31] audit: type=1326 audit(162.950:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4805 comm="syz.1.329" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 163.016842][ T31] audit: type=1326 audit(162.950:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4805 comm="syz.1.329" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 163.019252][ T31] audit: type=1326 audit(162.950:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4805 comm="syz.1.329" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 163.048322][ T31] audit: type=1326 audit(162.950:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4805 comm="syz.1.329" exe="/syz-executor" sig=0 arch=40000028 syscall=152 compat=0 ip=0x132db0 code=0x7ffc0000 [ 163.059531][ T31] audit: type=1326 audit(162.990:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4805 comm="syz.1.329" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 165.241615][ T31] audit: type=1400 audit(165.180:232): avc: denied { create } for pid=4813 comm="syz.1.332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 165.263641][ T31] audit: type=1400 audit(165.190:233): avc: denied { sys_admin } for pid=4813 comm="syz.1.332" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 165.285425][ T31] audit: type=1400 audit(165.210:234): avc: denied { checkpoint_restore } for pid=4813 comm="syz.1.332" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 168.777324][ T31] audit: type=1400 audit(168.710:235): avc: denied { write } for pid=4841 comm="syz.1.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 170.647971][ T31] audit: type=1400 audit(170.580:236): avc: denied { mounton } for pid=4857 comm="syz.0.352" path="/proc/399/task" dev="proc" ino=5693 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 173.378240][ T31] audit: type=1400 audit(173.310:237): avc: denied { create } for pid=4884 comm="syz.1.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 173.730293][ T31] audit: type=1400 audit(173.670:238): avc: denied { lock } for pid=4889 comm="syz.0.365" path="/dev/userio" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 174.262353][ T31] audit: type=1400 audit(174.200:239): avc: denied { create } for pid=4896 comm="syz.0.367" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 174.287476][ T31] audit: type=1400 audit(174.220:240): avc: denied { mounton } for pid=4896 comm="syz.0.367" path="/184/file0" dev="tmpfs" ino=971 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 174.439000][ T31] audit: type=1400 audit(174.370:241): avc: denied { unlink } for pid=3113 comm="syz-executor" name="file0" dev="tmpfs" ino=971 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 178.512292][ T31] audit: type=1400 audit(178.450:242): avc: denied { mounton } for pid=4925 comm="syz.0.376" path="/188/file0" dev="tmpfs" ino=992 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 178.758354][ T31] audit: type=1400 audit(178.690:243): avc: denied { unmount } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 179.056808][ T31] audit: type=1400 audit(178.990:244): avc: denied { sqpoll } for pid=4935 comm="syz.1.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 180.342080][ T4939] fuse: root generation should be zero [ 180.527980][ T31] audit: type=1400 audit(180.460:245): avc: denied { append } for pid=4960 comm="syz.0.389" name="nullb0" dev="devtmpfs" ino=669 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 182.174007][ T4974] netlink: 12 bytes leftover after parsing attributes in process `syz.0.395'. [ 184.223852][ T31] audit: type=1400 audit(184.160:246): avc: denied { create } for pid=4997 comm="syz.1.406" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 184.226555][ T31] audit: type=1400 audit(184.160:247): avc: denied { write } for pid=4997 comm="syz.1.406" name="file0" dev="tmpfs" ino=1080 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 184.227073][ T31] audit: type=1400 audit(184.160:248): avc: denied { open } for pid=4997 comm="syz.1.406" path="/204/file0" dev="tmpfs" ino=1080 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 184.249211][ T31] audit: type=1400 audit(184.180:249): avc: denied { ioctl } for pid=4997 comm="syz.1.406" path="/204/file0" dev="tmpfs" ino=1080 ioctlcmd=0x1273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 184.271190][ T31] audit: type=1400 audit(184.210:250): avc: denied { unlink } for pid=3114 comm="syz-executor" name="file0" dev="tmpfs" ino=1080 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 184.673894][ T31] audit: type=1400 audit(184.610:251): avc: denied { bind } for pid=5008 comm="syz.1.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 184.797741][ T5011] SELinux: Context system_u:object_r:initctl_t:s0 is not valid (left unmapped). [ 184.817553][ T31] audit: type=1400 audit(184.750:252): avc: denied { relabelto } for pid=5010 comm="syz.1.411" name="file0" dev="tmpfs" ino=1106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:initctl_t:s0" [ 184.819096][ T31] audit: type=1400 audit(184.750:253): avc: denied { associate } for pid=5010 comm="syz.1.411" name="file0" dev="tmpfs" ino=1106 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:initctl_t:s0" [ 184.862784][ T31] audit: type=1400 audit(184.800:254): avc: denied { unlink } for pid=3114 comm="syz-executor" name="file0" dev="tmpfs" ino=1106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:initctl_t:s0" [ 185.531716][ T31] kauditd_printk_skb: 70 callbacks suppressed [ 185.531780][ T31] audit: type=1400 audit(185.470:325): avc: denied { create } for pid=5024 comm="syz.1.416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 185.535918][ T31] audit: type=1400 audit(185.470:326): avc: denied { connect } for pid=5024 comm="syz.1.416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 185.899621][ T31] audit: type=1326 audit(185.800:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5028 comm="syz.1.417" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x0 [ 186.190682][ T5032] process 'syz.0.418' launched './file0' with NULL argv: empty string added [ 186.213947][ T31] audit: type=1400 audit(186.140:328): avc: denied { execute_no_trans } for pid=5031 comm="syz.0.418" path="/201/file0" dev="tmpfs" ino=1063 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 186.870493][ T5036] syz_tun: entered promiscuous mode [ 186.872409][ T5036] batadv_slave_0: entered promiscuous mode [ 187.075751][ T31] audit: type=1326 audit(187.010:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.0.420" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 187.089858][ T31] audit: type=1326 audit(187.020:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.0.420" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 187.093871][ T31] audit: type=1326 audit(187.030:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.0.420" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 187.108976][ T31] audit: type=1326 audit(187.040:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.0.420" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 187.111538][ T31] audit: type=1326 audit(187.040:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.0.420" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 187.114435][ T31] audit: type=1326 audit(187.040:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5040 comm="syz.0.420" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 188.815448][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x4 [ 188.815846][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x2 [ 188.816378][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 188.816645][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 188.816877][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 188.817098][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 188.817316][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 188.817548][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 188.817784][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 188.818009][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 188.818234][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 188.818495][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 188.827332][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 188.827582][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 188.827957][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 188.828238][ T5051] hid-generic 0000:3000000:0000.0003: unknown main item tag 0x0 [ 188.841764][ T5051] hid-generic 0000:3000000:0000.0003: hidraw0: HID v0.00 Device [sy] on syz0 [ 190.541316][ T31] kauditd_printk_skb: 470 callbacks suppressed [ 190.541368][ T31] audit: type=1326 audit(190.480:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5052 comm="syz.1.424" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x128b2c code=0x7ffc0000 [ 190.542736][ T31] audit: type=1326 audit(190.480:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5052 comm="syz.1.424" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef708 code=0x7ffc0000 [ 190.543802][ T31] audit: type=1326 audit(190.480:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5052 comm="syz.1.424" exe="/syz-executor" sig=0 arch=40000028 syscall=276 compat=0 ip=0x132db0 code=0x7ffc0000 [ 190.551311][ T31] audit: type=1326 audit(190.490:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5052 comm="syz.1.424" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x128b2c code=0x7ffc0000 [ 190.552271][ T31] audit: type=1326 audit(190.490:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5052 comm="syz.1.424" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef708 code=0x7ffc0000 [ 190.553196][ T31] audit: type=1326 audit(190.490:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5052 comm="syz.1.424" exe="/syz-executor" sig=0 arch=40000028 syscall=276 compat=0 ip=0x132db0 code=0x7ffc0000 [ 190.566879][ T31] audit: type=1326 audit(190.500:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5052 comm="syz.1.424" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x128b2c code=0x7ffc0000 [ 190.568002][ T31] audit: type=1326 audit(190.500:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5052 comm="syz.1.424" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef708 code=0x7ffc0000 [ 190.579368][ T31] audit: type=1326 audit(190.500:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5052 comm="syz.1.424" exe="/syz-executor" sig=0 arch=40000028 syscall=276 compat=0 ip=0x132db0 code=0x7ffc0000 [ 190.580852][ T31] audit: type=1326 audit(190.510:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5052 comm="syz.1.424" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x128b2c code=0x7ffc0000 [ 190.980628][ T5064] netlink: 4 bytes leftover after parsing attributes in process `syz.0.425'. [ 190.991705][ T5064] netlink: 4 bytes leftover after parsing attributes in process `syz.0.425'. [ 200.153382][ T5118] fuse: Bad value for 'group_id' [ 200.153687][ T5118] fuse: Bad value for 'group_id' [ 200.306823][ T5120] syzkaller1: entered promiscuous mode [ 200.307462][ T5120] syzkaller1: entered allmulticast mode [ 202.448921][ T31] kauditd_printk_skb: 210 callbacks suppressed [ 202.448987][ T31] audit: type=1400 audit(202.380:1025): avc: denied { create } for pid=5131 comm="syz.1.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 203.809705][ T5136] netlink: '+}[@': attribute type 7 has an invalid length. [ 217.809169][ T31] audit: type=1326 audit(217.740:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5159 comm="syz.1.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 217.809737][ T31] audit: type=1326 audit(217.740:1027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5159 comm="syz.1.456" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 217.810123][ T31] audit: type=1326 audit(217.740:1028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5159 comm="syz.1.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 217.810574][ T31] audit: type=1326 audit(217.740:1029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5159 comm="syz.1.456" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 217.810915][ T31] audit: type=1326 audit(217.740:1030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5159 comm="syz.1.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 217.814239][ T31] audit: type=1326 audit(217.740:1031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5159 comm="syz.1.456" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 217.814699][ T31] audit: type=1326 audit(217.740:1032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5159 comm="syz.1.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 217.815107][ T31] audit: type=1326 audit(217.740:1033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5159 comm="syz.1.456" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 217.815950][ T31] audit: type=1326 audit(217.750:1034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5159 comm="syz.1.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 217.816349][ T31] audit: type=1326 audit(217.750:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5159 comm="syz.1.456" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 222.262038][ T5186] netlink: 12 bytes leftover after parsing attributes in process `syz.1.467'. [ 222.263686][ T5185] fuse: Unknown parameter 'grou00000000000000000000' [ 225.406437][ T31] kauditd_printk_skb: 55 callbacks suppressed [ 225.406969][ T31] audit: type=1326 audit(225.340:1091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5196 comm="syz.1.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 225.460009][ T31] audit: type=1326 audit(225.400:1092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5196 comm="syz.1.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 225.470341][ T31] audit: type=1326 audit(225.410:1093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5196 comm="syz.1.471" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 225.471523][ T31] audit: type=1326 audit(225.410:1094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5196 comm="syz.1.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 225.472235][ T31] audit: type=1326 audit(225.410:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5196 comm="syz.1.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 225.474442][ T31] audit: type=1326 audit(225.410:1096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5196 comm="syz.1.471" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 225.481584][ T31] audit: type=1326 audit(225.420:1097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5196 comm="syz.1.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 225.482623][ T31] audit: type=1326 audit(225.420:1098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5196 comm="syz.1.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 225.483511][ T31] audit: type=1326 audit(225.420:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5196 comm="syz.1.471" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 225.484883][ T31] audit: type=1326 audit(225.420:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5196 comm="syz.1.471" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 226.000063][ T5203] netlink: 12 bytes leftover after parsing attributes in process `syz.0.473'. [ 226.382236][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 230.613110][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 230.613907][ T31] audit: type=1326 audit(230.540:1109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5251 comm="syz.0.481" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 230.630135][ T31] audit: type=1326 audit(230.560:1110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5251 comm="syz.0.481" exe="/syz-executor" sig=0 arch=40000028 syscall=125 compat=0 ip=0x132db0 code=0x7ffc0000 [ 230.630623][ T31] audit: type=1326 audit(230.560:1111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5251 comm="syz.0.481" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 230.630944][ T31] audit: type=1326 audit(230.570:1112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5251 comm="syz.0.481" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 234.275789][ T5129] hid-generic 0000:0000:0000.0004: collection stack underflow [ 234.276175][ T5129] hid-generic 0000:0000:0000.0004: item 0 0 0 12 parsing failed [ 234.276461][ T5129] hid-generic 0000:0000:0000.0004: probe with driver hid-generic failed with error -22 [ 236.953819][ T5304] block device autoloading is deprecated and will be removed. [ 236.965392][ T5304] syz.0.496: attempt to access beyond end of device [ 236.965392][ T5304] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 237.682942][ T31] audit: type=1326 audit(237.620:1113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5317 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 237.683534][ T31] audit: type=1326 audit(237.620:1114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5317 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 237.685338][ T31] audit: type=1326 audit(237.620:1115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5317 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x132db0 code=0x7ffc0000 [ 237.686780][ T31] audit: type=1326 audit(237.620:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5317 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 237.687231][ T31] audit: type=1326 audit(237.620:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5317 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 237.699501][ T31] audit: type=1326 audit(237.630:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5317 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x132db0 code=0x7ffc0000 [ 237.705367][ T31] audit: type=1326 audit(237.640:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5317 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 237.705947][ T31] audit: type=1326 audit(237.640:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5317 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=131 compat=0 ip=0x132db0 code=0x7ffc0000 [ 237.706425][ T31] audit: type=1326 audit(237.640:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5317 comm="syz.1.500" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 237.851292][ T5325] Driver unsupported XDP return value 0 on prog (id 86) dev N/A, expect packet loss! [ 239.091208][ T5334] IPv4: Oversized IP packet from 172.20.20.24 [ 239.100825][ C1] IPv4: Oversized IP packet from 172.20.20.24 [ 239.107212][ C1] IPv4: Oversized IP packet from 172.20.20.24 [ 239.544528][ T5337] netlink: 4 bytes leftover after parsing attributes in process `syz.1.508'. [ 240.701076][ T31] audit: type=1326 audit(240.640:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5345 comm="syz.1.512" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 243.760072][ T5363] netlink: 'syz.1.518': attribute type 1 has an invalid length. [ 244.069621][ T5371] netlink: 24 bytes leftover after parsing attributes in process `syz.0.521'. [ 244.145000][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 244.145060][ T31] audit: type=1400 audit(244.080:1125): avc: denied { compute_member } for pid=5372 comm="syz.1.522" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 245.453153][ T5404] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 245.560143][ T5404] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 245.914008][ T5412] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 246.022236][ T5404] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 246.100999][ T5404] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 246.299992][ T5404] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 246.343582][ T5404] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 246.364597][ T5404] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 246.387590][ T5404] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 246.562917][ T5434] bond1: entered promiscuous mode [ 246.563330][ T5434] bond1: entered allmulticast mode [ 246.563889][ T5434] 8021q: adding VLAN 0 to HW filter on device bond1 [ 246.583775][ T5434] bond1 (unregistering): Released all slaves [ 246.589805][ T31] audit: type=1400 audit(246.520:1126): avc: denied { remove_name } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 246.590330][ T31] audit: type=1400 audit(246.520:1127): avc: denied { rename } for pid=2926 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 247.115013][ T5506] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 247.219194][ T5506] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 247.349519][ T5506] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 247.397284][ T5516] fuse: Bad value for 'user_id' [ 247.397287][ T5506] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 247.397570][ T5516] fuse: Bad value for 'user_id' [ 247.764382][ T5521] netlink: 'syz.1.539': attribute type 10 has an invalid length. [ 248.817537][ T31] audit: type=1326 audit(248.750:1128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5528 comm="syz.1.542" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 248.828893][ T31] audit: type=1326 audit(248.760:1129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5528 comm="syz.1.542" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 248.848918][ T31] audit: type=1326 audit(248.780:1130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5528 comm="syz.1.542" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 248.858487][ T31] audit: type=1326 audit(248.790:1131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5528 comm="syz.1.542" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 248.859503][ T31] audit: type=1326 audit(248.790:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5528 comm="syz.1.542" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 248.865445][ T31] audit: type=1326 audit(248.800:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5528 comm="syz.1.542" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 248.870327][ T31] audit: type=1326 audit(248.800:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5528 comm="syz.1.542" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 249.528310][ T5506] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.543667][ T5506] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.560207][ T5506] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.613790][ T5506] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 250.323236][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 250.323341][ T31] audit: type=1400 audit(250.260:1139): avc: denied { block_suspend } for pid=5548 comm="syz.0.546" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 250.332445][ T5553] syzkaller1: entered promiscuous mode [ 250.332736][ T5553] syzkaller1: entered allmulticast mode [ 250.659103][ T31] audit: type=1400 audit(250.590:1140): avc: denied { create } for pid=5566 comm="syz.0.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 251.158136][ T31] audit: type=1326 audit(251.090:1141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5578 comm="syz.1.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 251.170278][ T31] audit: type=1326 audit(251.110:1142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5578 comm="syz.1.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 251.172937][ T31] audit: type=1326 audit(251.110:1143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5578 comm="syz.1.554" exe="/syz-executor" sig=0 arch=40000028 syscall=363 compat=0 ip=0x132db0 code=0x7ffc0000 [ 251.174587][ T31] audit: type=1326 audit(251.110:1144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5578 comm="syz.1.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 251.177014][ T31] audit: type=1326 audit(251.110:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5578 comm="syz.1.554" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 251.361411][ T31] audit: type=1400 audit(251.300:1146): avc: denied { mount } for pid=5581 comm="syz.1.555" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 252.113827][ T31] audit: type=1326 audit(252.030:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5591 comm="syz.1.559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 252.121820][ T31] audit: type=1326 audit(252.050:1148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5591 comm="syz.1.559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 256.612359][ T5626] ip6_vti0: entered promiscuous mode [ 256.615603][ T5626] vlan2: entered promiscuous mode [ 256.632199][ T5626] ip6_vti0: left promiscuous mode [ 256.962864][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 256.962936][ T31] audit: type=1326 audit(256.900:1157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5632 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 256.964010][ T31] audit: type=1326 audit(256.900:1158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5632 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 256.969039][ T31] audit: type=1326 audit(256.900:1159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5632 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=0 ip=0x132db0 code=0x7ffc0000 [ 256.978450][ T31] audit: type=1326 audit(256.910:1160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5632 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 256.983249][ T31] audit: type=1326 audit(256.910:1161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5632 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 256.983651][ T31] audit: type=1326 audit(256.920:1162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5632 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=9 compat=0 ip=0x132db0 code=0x7ffc0000 [ 256.985031][ T31] audit: type=1326 audit(256.920:1163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5632 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 256.986051][ T31] audit: type=1326 audit(256.920:1164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5632 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 256.991929][ T31] audit: type=1326 audit(256.930:1165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5632 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132db0 code=0x7ffc0000 [ 257.001047][ T31] audit: type=1326 audit(256.930:1166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5632 comm="syz.1.572" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 257.785010][ T5634] netlink: 4 bytes leftover after parsing attributes in process `syz.1.572'. [ 257.785530][ T5634] netlink: 4 bytes leftover after parsing attributes in process `syz.1.572'. [ 257.786457][ T5634] netlink: 4 bytes leftover after parsing attributes in process `syz.1.572'. [ 267.148819][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 267.148874][ T31] audit: type=1326 audit(267.080:1204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5638 comm="syz.1.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 267.149896][ T31] audit: type=1326 audit(267.080:1205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5638 comm="syz.1.574" exe="/syz-executor" sig=0 arch=40000028 syscall=21 compat=0 ip=0x132db0 code=0x7ffc0000 [ 267.150538][ T31] audit: type=1326 audit(267.080:1206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5638 comm="syz.1.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 267.151075][ T31] audit: type=1326 audit(267.080:1207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5638 comm="syz.1.574" exe="/syz-executor" sig=0 arch=40000028 syscall=360 compat=0 ip=0x132db0 code=0x7ffc0000 [ 267.151495][ T31] audit: type=1326 audit(267.080:1208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5638 comm="syz.1.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 267.151900][ T31] audit: type=1326 audit(267.080:1209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5638 comm="syz.1.574" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x132db0 code=0x7ffc0000 [ 267.152306][ T31] audit: type=1326 audit(267.080:1210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5638 comm="syz.1.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 267.152763][ T31] audit: type=1326 audit(267.080:1211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5638 comm="syz.1.574" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x132db0 code=0x7ffc0000 [ 267.153169][ T31] audit: type=1326 audit(267.080:1212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5638 comm="syz.1.574" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 267.153592][ T31] audit: type=1326 audit(267.080:1213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5638 comm="syz.1.574" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x130ba8 code=0x7ffc0000 [ 267.351699][ T5641] fuse: Bad value for 'rootmode' [ 267.642925][ T5645] netlink: 60 bytes leftover after parsing attributes in process `syz.1.577'. [ 267.643253][ T5645] netlink: 60 bytes leftover after parsing attributes in process `syz.1.577'. [ 267.747943][ T5645] netlink: 60 bytes leftover after parsing attributes in process `syz.1.577'. [ 267.759616][ T5645] netlink: 60 bytes leftover after parsing attributes in process `syz.1.577'. [ 268.048283][ T5645] netlink: 60 bytes leftover after parsing attributes in process `syz.1.577'. [ 268.049091][ T5645] netlink: 60 bytes leftover after parsing attributes in process `syz.1.577'. [ 269.288111][ T5662] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 269.377085][ T5662] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 269.449743][ T5662] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 269.531219][ T5662] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 269.668440][ T5662] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 269.701894][ T5662] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 269.719691][ T5662] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 269.742886][ T5662] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 270.664229][ T5689] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.750932][ T5689] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.830614][ T5689] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.892833][ T5689] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.719128][ T5689] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 273.733540][ T5689] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 273.762521][ T5689] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 273.783702][ T5689] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.452709][ T5713] fuse: Unknown parameter 'use00000000000000000000' [ 275.266955][ T5719] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.409517][ T5719] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.497239][ T5719] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.556322][ T5719] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.645873][ T5719] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.654115][ T5719] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.672155][ T5719] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.675821][ T5719] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.732857][ T5739] fuse: Unknown parameter 'use00000000000000000000' [ 275.783393][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 275.783450][ T31] audit: type=1326 audit(275.720:1218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5740 comm="syz.0.598" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 275.784183][ T31] audit: type=1326 audit(275.720:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5740 comm="syz.0.598" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 275.785903][ T31] audit: type=1326 audit(275.720:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5740 comm="syz.0.598" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 275.799067][ T31] audit: type=1326 audit(275.730:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5740 comm="syz.0.598" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 275.799614][ T31] audit: type=1326 audit(275.730:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5740 comm="syz.0.598" exe="/syz-executor" sig=0 arch=40000028 syscall=108 compat=0 ip=0x132db0 code=0x7ffc0000 [ 275.800160][ T31] audit: type=1326 audit(275.730:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5740 comm="syz.0.598" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 276.825886][ T5751] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 276.899887][ T5751] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 276.957213][ T5751] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 276.980946][ T5757] fuse: Bad value for 'fd' [ 277.016282][ T5751] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 277.329747][ T31] audit: type=1400 audit(277.260:1224): avc: denied { relabelfrom } for pid=5762 comm="syz.1.605" name="NETLINK" dev="sockfs" ino=8450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 277.337897][ T31] audit: type=1400 audit(277.270:1225): avc: denied { relabelto } for pid=5762 comm="syz.1.605" name="NETLINK" dev="sockfs" ino=8450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_netfilter_socket permissive=1 [ 278.921506][ T5751] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 278.941185][ T5751] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 278.944521][ T5751] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 278.947736][ T5751] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 279.648923][ T31] audit: type=1400 audit(279.580:1226): avc: denied { setattr } for pid=5789 comm="syz.0.612" name="file0" dev="tmpfs" ino=1431 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 279.771035][ T5792] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 279.869826][ T5792] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 279.980969][ T5792] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 280.052494][ T5792] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 280.214173][ T5785] netlink: 4 bytes leftover after parsing attributes in process `syz.1.610'. [ 280.238947][ T5785] hsr_slave_1 (unregistering): left promiscuous mode [ 282.285853][ T5792] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 282.302206][ T5792] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 282.322063][ T5792] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 282.344293][ T5792] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 282.519842][ T31] audit: type=1326 audit(282.450:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5859 comm="syz.1.619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 282.551597][ T31] audit: type=1326 audit(282.490:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5859 comm="syz.1.619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 282.570226][ T31] audit: type=1326 audit(282.500:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5859 comm="syz.1.619" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 282.571734][ T31] audit: type=1326 audit(282.510:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5859 comm="syz.1.619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 282.572751][ T31] audit: type=1326 audit(282.510:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5859 comm="syz.1.619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 282.601989][ T31] audit: type=1326 audit(282.530:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5859 comm="syz.1.619" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 282.602909][ T31] audit: type=1326 audit(282.530:1233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5859 comm="syz.1.619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 282.604042][ T31] audit: type=1326 audit(282.540:1234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5859 comm="syz.1.619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 282.604845][ T31] audit: type=1326 audit(282.540:1235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5859 comm="syz.1.619" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 282.622262][ T31] audit: type=1326 audit(282.540:1236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5859 comm="syz.1.619" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 282.821492][ T5866] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 282.908458][ T5866] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 283.006410][ T5866] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 283.079954][ T5866] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 283.280400][ T5866] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 283.319692][ T5878] netlink: 20 bytes leftover after parsing attributes in process `syz.0.624'. [ 283.379208][ T5866] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 283.487872][ T5866] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 283.510640][ T5866] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 284.270739][ T5896] fuse: Bad value for 'fd' [ 285.077187][ T5908] fuse: Bad value for 'fd' [ 286.310486][ T5919] fuse: Bad value for 'fd' [ 287.475273][ T5933] fuse: Unknown parameter '00000000000000000000003' [ 288.119277][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 288.119352][ T31] audit: type=1326 audit(288.040:1255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5938 comm="syz.0.644" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 288.120985][ T31] audit: type=1326 audit(288.060:1256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5938 comm="syz.0.644" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 288.123510][ T31] audit: type=1326 audit(288.060:1257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5938 comm="syz.0.644" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 288.125017][ T31] audit: type=1326 audit(288.060:1258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5938 comm="syz.0.644" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 288.131933][ T31] audit: type=1326 audit(288.060:1259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5938 comm="syz.0.644" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 288.135818][ T31] audit: type=1326 audit(288.070:1260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5938 comm="syz.0.644" exe="/syz-executor" sig=0 arch=40000028 syscall=286 compat=0 ip=0x132db0 code=0x7ffc0000 [ 288.136405][ T31] audit: type=1326 audit(288.070:1261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5938 comm="syz.0.644" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 288.136891][ T31] audit: type=1326 audit(288.070:1262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5938 comm="syz.0.644" exe="/syz-executor" sig=0 arch=40000028 syscall=144 compat=0 ip=0x132db0 code=0x7ffc0000 [ 288.137329][ T31] audit: type=1326 audit(288.070:1263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5938 comm="syz.0.644" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 292.062471][ T31] audit: type=1400 audit(292.000:1264): avc: denied { listen } for pid=5959 comm="syz.0.653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 293.476133][ T5969] sch_tbf: burst 5 is lower than device lo mtu (65550) ! [ 293.831021][ T31] audit: type=1326 audit(293.770:1265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.0.658" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 293.832396][ T31] audit: type=1326 audit(293.770:1266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.0.658" exe="/syz-executor" sig=0 arch=40000028 syscall=351 compat=0 ip=0x132db0 code=0x7ffc0000 [ 293.833855][ T31] audit: type=1326 audit(293.770:1267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5972 comm="syz.0.658" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 297.079752][ T31] audit: type=1326 audit(297.020:1268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5981 comm="syz.0.661" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 297.081076][ T31] audit: type=1326 audit(297.020:1269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5981 comm="syz.0.661" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 297.082749][ T31] audit: type=1326 audit(297.020:1270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5981 comm="syz.0.661" exe="/syz-executor" sig=0 arch=40000028 syscall=179 compat=0 ip=0x132db0 code=0x7ffc0000 [ 297.083821][ T31] audit: type=1326 audit(297.020:1271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5981 comm="syz.0.661" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 297.098915][ T31] audit: type=1326 audit(297.020:1272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5981 comm="syz.0.661" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 297.650944][ T31] audit: type=1326 audit(297.590:1273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5987 comm="syz.0.664" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 297.651999][ T31] audit: type=1326 audit(297.590:1274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5987 comm="syz.0.664" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 302.854687][ T6027] syz.0.679[6027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.854958][ T6027] syz.0.679[6027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 304.730477][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 306.304696][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 306.304792][ T31] audit: type=1326 audit(306.240:1329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6060 comm="syz.1.693" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 306.305811][ T31] audit: type=1326 audit(306.240:1330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6060 comm="syz.1.693" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 306.306570][ T31] audit: type=1326 audit(306.240:1331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6060 comm="syz.1.693" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 306.313614][ T31] audit: type=1326 audit(306.240:1332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6060 comm="syz.1.693" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 306.314448][ T31] audit: type=1326 audit(306.240:1333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6060 comm="syz.1.693" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 306.328395][ T31] audit: type=1326 audit(306.260:1334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6060 comm="syz.1.693" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 306.329886][ T31] audit: type=1326 audit(306.260:1335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6060 comm="syz.1.693" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 306.336233][ T31] audit: type=1326 audit(306.260:1336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6060 comm="syz.1.693" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 306.337085][ T31] audit: type=1326 audit(306.260:1337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6060 comm="syz.1.693" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132db0 code=0x7ffc0000 [ 306.337817][ T31] audit: type=1326 audit(306.270:1338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6060 comm="syz.1.693" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 307.280929][ T6071] netlink: 12 bytes leftover after parsing attributes in process `syz.0.697'. [ 311.147924][ T6101] netlink: 8 bytes leftover after parsing attributes in process `syz.1.710'. [ 313.024238][ T6115] SELinux: Context system_u:object_r:var_t:s0 is not valid (left unmapped). [ 313.025471][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 313.025564][ T31] audit: type=1400 audit(312.960:1370): avc: denied { relabelto } for pid=6114 comm="syz.0.717" name="file1" dev="tmpfs" ino=1817 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:var_t:s0" [ 313.041707][ T31] audit: type=1400 audit(312.970:1371): avc: denied { associate } for pid=6114 comm="syz.0.717" name="file1" dev="tmpfs" ino=1817 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:var_t:s0" [ 316.371203][ T6134] serio: Serial port ptm0 [ 317.459586][ T31] audit: type=1326 audit(317.390:1372): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6140 comm="syz.0.725" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x0 [ 319.566510][ T24] hid-generic 0000:0000:0000.0005: unknown main item tag 0x7 [ 319.572496][ T24] hid-generic 0000:0000:0000.0005: ignoring exceeding usage max [ 319.574480][ T24] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 319.575382][ T24] hid-generic 0000:0000:0000.0005: unknown main item tag 0x6 [ 319.575769][ T24] hid-generic 0000:0000:0000.0005: unknown main item tag 0xd [ 319.584996][ T24] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz0] on syz0 [ 320.136825][ T6158] netlink: 68 bytes leftover after parsing attributes in process `syz.1.728'. [ 320.869068][ T31] audit: type=1326 audit(320.800:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6164 comm="syz.1.731" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 320.870961][ T31] audit: type=1326 audit(320.810:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6164 comm="syz.1.731" exe="/syz-executor" sig=0 arch=40000028 syscall=43 compat=0 ip=0x132db0 code=0x7ffc0000 [ 320.875871][ T31] audit: type=1326 audit(320.810:1375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6164 comm="syz.1.731" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 320.876694][ T31] audit: type=1326 audit(320.810:1376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6164 comm="syz.1.731" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132db0 code=0x7ffc0000 [ 321.531823][ C1] ------------[ cut here ]------------ [ 321.531991][ T6181] netlink: 4 bytes leftover after parsing attributes in process `syz.1.736'. [ 321.532340][ C1] WARNING: CPU: 1 PID: 6182 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 321.534723][ C1] refcount_t: underflow; use-after-free. [ 321.534905][ C1] Modules linked in: [ 321.536535][ C1] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 321.538884][ C1] CPU: 1 UID: 0 PID: 6182 Comm: kworker/u9:4 Not tainted 6.11.0-syzkaller #0 [ 321.539209][ C1] Hardware name: ARM-Versatile Express [ 321.539414][ C1] Call trace: frame pointer underflow [ 321.539598][ C1] [<8198c4e0>] (dump_backtrace) from [<8198c5dc>] (show_stack+0x18/0x1c) [ 321.539905][ C1] r7:00000000 r6:826228c4 r5:00000000 r4:820390a8 [ 321.540210][ C1] [<8198c5c4>] (show_stack) from [<819aa8c4>] (dump_stack_lvl+0x54/0x7c) [ 321.540609][ C1] [<819aa870>] (dump_stack_lvl) from [<819aa904>] (dump_stack+0x18/0x1c) [ 321.540900][ C1] r5:00000000 r4:82870d18 [ 321.541052][ C1] [<819aa8ec>] (dump_stack) from [<8198d108>] (panic+0x120/0x374) [ 321.541291][ C1] [<8198cfe8>] (panic) from [<802421dc>] (get_taint+0x0/0x1c) [ 321.541755][ C1] r3:8260c5c4 r2:00000001 r1:820210f0 r0:82028eb4 [ 321.541913][ C1] r7:80839f38 [ 321.542001][ C1] [<80242168>] (check_panic_on_warn) from [<80242340>] (__warn+0x80/0x188) [ 321.542257][ C1] [<802422c0>] (__warn) from [<80242630>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 321.542777][ C1] r8:00000009 r7:82087dc4 r6:df805c64 r5:82ff3c00 r4:00000000 [ 321.543356][ C1] [<8024244c>] (warn_slowpath_fmt) from [<80839f38>] (refcount_warn_saturate+0x13c/0x174) [ 321.543736][ C1] r10:20000113 r9:84bdbf5c r8:845c63c0 r7:00000000 r6:8181ca34 r5:00000002 [ 321.544010][ C1] r4:845c63c0 [ 321.544108][ C1] [<80839dfc>] (refcount_warn_saturate) from [<8148cd70>] (sk_skb_reason_drop+0x1d8/0x248) [ 321.544439][ C1] [<8148cb98>] (sk_skb_reason_drop) from [<8181ca34>] (j1939_xtp_rx_cts+0x220/0x3d0) [ 321.545416][ C1] r9:84bdbf5c r8:845c63c0 r7:834426d8 r6:00000df2 r5:84bdbf00 r4:84bdbf14 [ 321.546696][ C1] [<8181c814>] (j1939_xtp_rx_cts) from [<8181d9a8>] (j1939_tp_recv+0x3f4/0x530) [ 321.548104][ C1] r10:ddde50c8 r9:00000040 r8:834426d0 r7:851a5000 r6:851a5008 r5:851a5000 [ 321.549344][ C1] r4:853263c0 [ 321.549783][ C1] [<8181d5b4>] (j1939_tp_recv) from [<81817440>] (j1939_can_recv+0x1e4/0x2dc) [ 321.551084][ C1] r7:851a5000 r6:851a5008 r5:851a5810 r4:853263c0 [ 321.551363][ C1] [<8181725c>] (j1939_can_recv) from [<8180d20c>] (can_rcv_filter+0x9c/0x218) [ 321.553922][ C1] r9:00000040 r8:84a9c680 r7:98c80000 r6:85326300 r5:00000001 r4:84b65480 [ 321.554812][ C1] [<8180d170>] (can_rcv_filter) from [<8180dbb0>] (can_receive+0xb4/0xf0) [ 321.555649][ C1] r9:00000040 r8:00000000 r7:84a9c000 r6:84435080 r5:845a8000 r4:85326300 [ 321.555975][ C1] [<8180dafc>] (can_receive) from [<8180dc70>] (can_rcv+0x84/0xac) [ 321.556342][ C1] r9:00000040 r8:00000001 r7:00000000 r6:00000000 r5:8180dbec r4:85326300 [ 321.556755][ C1] [<8180dbec>] (can_rcv) from [<814adbe8>] (__netif_receive_skb_one_core+0x5c/0x80) [ 321.557176][ C1] r5:8180dbec r4:84a9c000 [ 321.557597][ C1] [<814adb8c>] (__netif_receive_skb_one_core) from [<814adc54>] (__netif_receive_skb+0x18/0x5c) [ 321.558114][ C1] r5:ddde51b0 r4:85326300 [ 321.558662][ C1] [<814adc3c>] (__netif_receive_skb) from [<814adf44>] (process_backlog+0x88/0x15c) [ 321.561496][ C1] r5:ddde51b0 r4:85326300 [ 321.561908][ C1] [<814adebc>] (process_backlog) from [<814aee48>] (__napi_poll+0x34/0x240) [ 321.562846][ C1] r10:ddde50c0 r9:ddde5300 r8:df805ea0 r7:df805e9b r6:00000040 r5:ddde51b0 [ 321.563179][ C1] r4:00000001 [ 321.563360][ C1] [<814aee14>] (__napi_poll) from [<814af680>] (net_rx_action+0x338/0x420) [ 321.564195][ C1] r9:ddde5300 r8:df805ea0 r7:0000012c r6:00000865 r5:ddde51b0 r4:00000000 [ 321.564645][ C1] [<814af348>] (net_rx_action) from [<8024b5fc>] (handle_softirqs+0x158/0x464) [ 321.565454][ C1] r10:00000008 r9:82ff3c00 r8:00000102 r7:00048040 r6:00000003 r5:00000004 [ 321.566450][ C1] r4:8260408c [ 321.566861][ C1] [<8024b4a4>] (handle_softirqs) from [<8024b9f8>] (__irq_exit_rcu+0xa4/0x164) [ 321.567466][ C1] r10:00000000 r9:82ff3c00 r8:00000000 r7:dfb819a8 r6:821da600 r5:8221ad84 [ 321.569327][ C1] r4:82ff3c00 [ 321.569914][ C1] [<8024b954>] (__irq_exit_rcu) from [<8024bcf8>] (irq_exit+0x10/0x18) [ 321.570601][ C1] r5:8221ad84 r4:824bacdc [ 321.570825][ C1] [<8024bce8>] (irq_exit) from [<819ab1c0>] (generic_handle_arch_irq+0x7c/0x80) [ 321.571382][ C1] [<819ab144>] (generic_handle_arch_irq) from [<8195bed4>] (call_with_stack+0x1c/0x20) [ 321.572153][ C1] r9:82ff3c00 r8:00000000 r7:dfb819dc r6:ffffffff r5:60000013 r4:8024bb18 [ 321.573125][ C1] [<8195beb8>] (call_with_stack) from [<80200bcc>] (__irq_svc+0x8c/0xbc) [ 321.574002][ C1] Exception stack(0xdfb819a8 to 0xdfb819f0) [ 321.574918][ C1] 19a0: 00000001 00000006 00000000 00048040 60000013 00000002 [ 321.577620][ C1] 19c0: dfb81a70 00000070 00000000 00000000 00000000 dfb81a0c df805f00 dfb819f8 [ 321.579154][ C1] 19e0: 819abdfc 8024bb18 60000013 ffffffff [ 321.580053][ C1] [<8024bab8>] (do_softirq) from [<8024bbe8>] (__local_bh_enable_ip+0xcc/0xd0) [ 321.581308][ C1] r5:00000002 r4:82ff3c00 [ 321.581732][ C1] [<8024bb1c>] (__local_bh_enable_ip) from [<802028b8>] (kernel_neon_end+0x24/0x2c) [ 321.582586][ C1] r5:84245e70 r4:0000000c [ 321.582909][ C1] [<80202894>] (kernel_neon_end) from [<80239310>] (crc32c_pmull_update+0xbc/0xc0) [ 321.583359][ C1] [<80239254>] (crc32c_pmull_update) from [<8076a9f8>] (crypto_shash_update+0x1c/0x20) [ 321.583800][ C1] r7:83ead800 r6:84245e00 r5:83088640 r4:83088718 [ 321.584161][ C1] [<8076a9dc>] (crypto_shash_update) from [<806328b4>] (ext4_inode_csum+0x74/0x250) [ 321.584773][ C1] [<80632840>] (ext4_inode_csum) from [<80632ae8>] (ext4_inode_csum_set+0x58/0xe0) [ 321.585492][ C1] r7:83088640 r6:84245e00 r5:840d1800 r4:83088718 [ 321.585959][ C1] [<80632a90>] (ext4_inode_csum_set) from [<80632eb8>] (ext4_fill_raw_inode+0x348/0x410) [ 321.588614][ C1] r7:00000000 r6:83088640 r5:84245e00 r4:83088718 [ 321.588999][ C1] [<80632b70>] (ext4_fill_raw_inode) from [<80637a08>] (ext4_mark_iloc_dirty+0xf0/0x4cc) [ 321.589612][ C1] r9:830da6c0 r8:84245000 r7:00000e00 r6:dfb81b74 r5:830888bc r4:83088718 [ 321.590039][ C1] [<80637918>] (ext4_mark_iloc_dirty) from [<80638108>] (__ext4_mark_inode_dirty+0x8c/0x278) [ 321.590544][ C1] r10:00000020 r9:00000120 r8:8063d004 r7:00000000 r6:831f2270 r5:dfb81b74 [ 321.596204][ C1] r4:83088718 [ 321.596592][ C1] [<8063807c>] (__ext4_mark_inode_dirty) from [<8063d004>] (ext4_dirty_inode+0x60/0x7c) [ 321.598590][ C1] r10:00000000 r9:00000120 r8:83088718 r7:840d1800 r6:82e9c790 r5:83088718 [ 321.600172][ C1] r4:831f2270 [ 321.600457][ C1] [<8063cfa4>] (ext4_dirty_inode) from [<80552580>] (__mark_inode_dirty+0x54/0x558) [ 321.606954][ C1] r5:00000008 r4:83088718 [ 321.607351][ C1] [<8055252c>] (__mark_inode_dirty) from [<80534148>] (generic_update_time+0x44/0x4c) [ 321.608692][ C1] r9:00000120 r8:83088718 r7:82ff3c00 r6:82e9c790 r5:83088718 r4:00000001 [ 321.609175][ C1] [<80534104>] (generic_update_time) from [<805366f0>] (touch_atime+0x144/0x178) [ 321.609585][ C1] r5:83088718 r4:00000001 [ 321.609779][ C1] [<805365ac>] (touch_atime) from [<8043cf34>] (filemap_read+0x4b4/0x4bc) [ 321.610243][ C1] r7:dfb81dd0 r6:851fc9c0 r5:00000120 r4:00000001 [ 321.611094][ C1] [<8043ca80>] (filemap_read) from [<8043d034>] (generic_file_read_iter+0xf8/0x130) [ 321.614640][ C1] r10:00001826 r9:00000120 r8:dfb81dd0 r7:dfb81db8 r6:00000000 r5:dfb81db8 [ 321.618453][ C1] r4:00000000 [ 321.618817][ C1] [<8043cf3c>] (generic_file_read_iter) from [<8062289c>] (ext4_file_read_iter+0x54/0x158) [ 321.620935][ C1] r10:00001826 r9:00000000 r8:00000034 r7:dfb81e48 r6:00000000 r5:dfb81db8 [ 321.622370][ C1] r4:dfb81dd0 r3:00000000 [ 321.627278][ C1] [<80622848>] (ext4_file_read_iter) from [<8050fc30>] (__kernel_read+0x164/0x328) [ 321.629220][ C1] r9:00000000 r8:00000034 r7:dfb81e48 r6:00000000 r5:82ff3c00 r4:851fc9c0 [ 321.630039][ C1] [<8050facc>] (__kernel_read) from [<8050fe40>] (kernel_read+0x4c/0x50) [ 321.630648][ C1] r9:828c7d10 r8:00000006 r7:83848600 r6:dfb81e48 r5:00000120 r4:851fc9c0 [ 321.632652][ C1] [<8050fdf4>] (kernel_read) from [<80595678>] (load_elf_phdrs+0x80/0xc4) [ 321.633323][ C1] r7:851fc9c0 r6:00000120 r5:83848600 r4:83848a5c [ 321.638570][ C1] [<805955f8>] (load_elf_phdrs) from [<80596ed4>] (load_elf_binary+0xcc/0x141c) [ 321.640911][ C1] r7:83848a5c r6:82ff3c00 r5:fffffff8 r4:83848a00 [ 321.643414][ C1] [<80596e08>] (load_elf_binary) from [<80518dd0>] (bprm_execve+0x224/0x5ec) [ 321.644254][ C1] r10:00001826 r9:828c7d10 r8:00000006 r7:8271b52c r6:83848a00 r5:fffffff8 [ 321.645007][ C1] r4:827207c4 [ 321.648515][ C1] [<80518bac>] (bprm_execve) from [<8051aa04>] (kernel_execve+0xf8/0x190) [ 321.649787][ C1] r10:00000000 r9:00000000 r8:826f6050 r7:84419880 r6:82ed8000 r5:83848a00 [ 321.654436][ C1] r4:00000000 [ 321.654886][ C1] [<8051a90c>] (kernel_execve) from [<8026066c>] (call_usermodehelper_exec_async+0xf0/0x160) [ 321.656057][ C1] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:850a5c80 r4:82f6ce00 [ 321.656901][ C1] [<8026057c>] (call_usermodehelper_exec_async) from [<80200114>] (ret_from_fork+0x14/0x20) [ 321.658728][ C1] Exception stack(0xdfb81fb0 to 0xdfb81ff8) [ 321.659296][ C1] 1fa0: 00000000 00000000 00000000 00000000 [ 321.660676][ C1] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 321.666300][ C1] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 321.667004][ C1] r7:00000000 r6:00000000 r5:8026057c r4:850a5c80 [ 321.669131][ C1] Rebooting in 86400 seconds.. VM DIAGNOSIS: 16:50:33 Registers: info registers vcpu 0 CPU#0 R00=89256000 R01=dfe20000 R02=00000001 R03=802199f8 R04=7f003000 R05=00000001 R06=828c1b28 R07=7f003000 R08=dfe20000 R09=8260cad0 R10=828c274c R11=dffb5dbc R12=dffb5dc0 R13=dffb5d90 R14=802109dc R15=80219a10 PSR=80000013 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=df805814 R01=00000003 R02=00000031 R03=00000025 R04=df805874 R05=8202f2d6 R06=00000005 R07=df805814 R08=8202f2db R09=00000028 R10=0000000e R11=df8058b4 R12=df805868 R13=df805868 R14=819872d0 R15=81982a60 PSR=a0000193 N-C- A S svc32 s00=05ec76f0 s01=00000001 d00=0000000105ec76f0 s02=dea713f1 s03=00000000 d01=00000000dea713f1 s04=4746b865 s05=1872fb19 d02=1872fb194746b865 s06=00000000 s07=00000000 d03=0000000000000000 s08=9f904f30 s09=462545d6 d04=462545d69f904f30 s10=00000000 s11=00000000 d05=0000000000000000 s12=ffffffff s13=00000000 d06=00000000ffffffff s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000002 s19=00002af6 d09=00002af600000002 s20=ef9d1c5c s21=10b67791 d10=10b67791ef9d1c5c s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=746f6f72 d14=746f6f7200000000 s30=6a626f3a s31=5f746365 d15=5f7463656a626f3a s32=74653a72 s33=75725f63 d16=75725f6374653a72 s34=6d69746e s35=00745f65 d17=00745f656d69746e s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000