last executing test programs: 5m11.476238821s ago: executing program 0 (id=372): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280), 0x80c80, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000100)={{0x7000, 0xdddd1000, 0xf000, 0x0, 0x8, 0x8, 0x0, 0x2, 0x0, 0x6, 0x9, 0x10}, {0x8080000, 0x0, 0xc, 0x8, 0x7c, 0x0, 0x4, 0x0, 0x7, 0x7, 0x0, 0x2}, {0x8000000, 0x5000, 0xc, 0x0, 0x7, 0x4, 0x0, 0x0, 0x23, 0x0, 0x0, 0xfc}, {0x4, 0xd000, 0x4, 0x0, 0x0, 0x40, 0xff, 0x0, 0x0, 0x0, 0x4}, {0xeeee8000, 0x3000, 0x0, 0x0, 0xff, 0x4, 0xe, 0xe, 0x0, 0x3c}, {0x0, 0x0, 0xd, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80}, {0x8080000, 0x0, 0xf, 0x6, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfe}, {0x4000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xa, 0x26, 0x0, 0x48}, {0x80a0000}, {0xeeef0000}, 0xfdfcffdb, 0x0, 0x0, 0x28, 0xb, 0xf801, 0x0, [0x0, 0x3, 0x1, 0x200000000000000]}) 5m8.495248171s ago: executing program 0 (id=374): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='kfree\x00', r1}, 0x18) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x1058, [{}, {0x0, 0x100000000000000}]}, 0x68) 5m5.436505415s ago: executing program 0 (id=376): openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f00000001c0)={0x78, 0x0, r1, {0x6, 0x7, 0x0, {0x4, 0xfffffffffffffff3, 0x5a29, 0x0, 0x6, 0x4, 0x4, 0xdcb, 0xfffffcf3, 0x2000, 0x10001, r2, r3, 0x8e, 0x40}}}, 0x78) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f, 0x0, 0x10400}}, 0x50) 5m3.224173787s ago: executing program 0 (id=377): r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ptype\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x48804) readv(r0, &(0x7f0000000740)=[{&(0x7f0000000580)=""/148, 0x94}, {&(0x7f0000000640)=""/57, 0x39}], 0x2) 5m0.1703795s ago: executing program 0 (id=380): r0 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000980), 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f0000000100)={'wg1\x00', 0x0}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x4, 0x5}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kfree\x00', r5}, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000d0000000c00018008000100", @ANYRES32=r3], 0x20}}, 0x0) 4m57.978843661s ago: executing program 0 (id=381): syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='setgroups\x00') sched_setaffinity(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socket(0x1e, 0x4, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r5, 0x0, 0x0, 0xc0) setsockopt$sock_int(r5, 0x1, 0x8, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={0x0}, 0x18) 4m10.877796423s ago: executing program 32 (id=381): syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='setgroups\x00') sched_setaffinity(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) socket(0x1e, 0x4, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r5, 0x0, 0x0, 0xc0) setsockopt$sock_int(r5, 0x1, 0x8, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={0x0}, 0x18) 3m5.496402597s ago: executing program 1 (id=398): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000380)={@remote}, 0x14) 3m1.108370468s ago: executing program 1 (id=399): userfaultfd(0x801) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/packet\x00') readv(r0, &(0x7f0000000180), 0x0) socket$inet_udp(0x2, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x82000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) mount(&(0x7f0000000300), &(0x7f0000000080)='.\x00', &(0x7f0000000180)='exfat\x00', 0x2200890, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x3, 0x0, 0x0, @local, @local, 0x7, 0x7, 0x202, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f0000000600)={'syztnl1\x00', 0x0}) 2m44.921157913s ago: executing program 1 (id=400): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r0) waitid(0x0, 0x0, &(0x7f0000000100), 0xe, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0x7, 0x0, 0x20000004, 0x3, 0x1, 0x900}}) 2m42.59437269s ago: executing program 1 (id=401): openat$kvm(0xffffffffffffff9c, 0x0, 0x20080, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3000001, 0x2172, 0xffffffffffffffff, 0xd031b000) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000005000/0x4000)=nil) 2m16.143994092s ago: executing program 1 (id=402): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000200)='kfree\x00', r1}, 0x18) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x17c) pwritev2(r2, 0x0, 0x0, 0xe7b, 0x0, 0x0) 2m15.60538525s ago: executing program 1 (id=403): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) timer_create(0x2, &(0x7f0000000200)={0x0, 0x1e, 0x1, @tid=r1}, &(0x7f00000004c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="000000000000000900000000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x368, 0x1d0, 0x11, 0x148, 0x0, 0x0, 0x2d0, 0x2a8, 0x2a8, 0x2d0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1d0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@conntrack2={{0xc0}, {{@ipv4=@remote, [0xffffff00, 0xff, 0xffffff00], @ipv6=@dev={0xfe, 0x80, '\x00', 0xe}, [0x0, 0xffffff00], @ipv4=@private=0xa010100, [0xffffff00, 0x0, 0xffffff00], @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}, [0xff000000, 0xff000000, 0xff], 0x8, 0x6, 0x5e, 0x4e21, 0x4e23, 0x4e24, 0x4e21}, 0x40, 0x8e0}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0xffffffff, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@addrtype={{0x30}, {0x242, 0x75f65a4e97d6873f, 0x1}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x3, 0x6, 0x2}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) quotactl$Q_QUOTAOFF(0xffffffff80000300, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) 1m29.12864473s ago: executing program 33 (id=403): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) timer_create(0x2, &(0x7f0000000200)={0x0, 0x1e, 0x1, @tid=r1}, &(0x7f00000004c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="000000000000000900000000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x368, 0x1d0, 0x11, 0x148, 0x0, 0x0, 0x2d0, 0x2a8, 0x2a8, 0x2d0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1d0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@conntrack2={{0xc0}, {{@ipv4=@remote, [0xffffff00, 0xff, 0xffffff00], @ipv6=@dev={0xfe, 0x80, '\x00', 0xe}, [0x0, 0xffffff00], @ipv4=@private=0xa010100, [0xffffff00, 0x0, 0xffffff00], @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}, [0xff000000, 0xff000000, 0xff], 0x8, 0x6, 0x5e, 0x4e21, 0x4e23, 0x4e24, 0x4e21}, 0x40, 0x8e0}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0xffffffff, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@addrtype={{0x30}, {0x242, 0x75f65a4e97d6873f, 0x1}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x3, 0x6, 0x2}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3c8) quotactl$Q_QUOTAOFF(0xffffffff80000300, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) 17.489679199s ago: executing program 2 (id=431): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0x7, 0xc9d7, 0x3d, 0x1}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000880)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r2}, 0x10) getxattr(0x0, 0x0, 0x0, 0x0) 16.313394078s ago: executing program 2 (id=432): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mremap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffe000/0x1000)=nil) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/cgroup.procs\x00', 0xa00, 0x1c2) r5 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x3a) inotify_add_watch(r4, &(0x7f0000000000)='./file0\x00', 0x42000200) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$uinput_user_dev(r6, &(0x7f0000000580)={'syz1\x00', {0x6fc9, 0x5, 0x5, 0x5}, 0x38, [0x9, 0x3, 0xa, 0x2, 0x5334, 0x400, 0x80000000, 0x5, 0x8, 0x0, 0x6, 0xf5, 0x9, 0x3b, 0x747d5a13, 0x8, 0xfffffb9a, 0xfffffffc, 0x5, 0xfffffffb, 0xbeb, 0x3, 0x4, 0xf252, 0x4, 0x800, 0x300000, 0x7, 0xe, 0x4623b, 0x0, 0x0, 0x1ff, 0x8000, 0x3ff, 0x3, 0xd, 0x4, 0xba55, 0x8da8, 0x2, 0x200, 0x2, 0x8, 0x4000e, 0xd76, 0x2, 0xde, 0x8, 0x9, 0x1, 0x199f, 0x8, 0x2, 0x9, 0x1, 0x4, 0x6, 0x1000, 0x5, 0x40, 0x9, 0x7, 0x1], [0x6, 0x1e, 0x3, 0x8000, 0xfffffffd, 0x3, 0x0, 0x400005, 0x7, 0xfffffffc, 0x4, 0x7fff, 0x72c, 0xc32, 0x3, 0x9, 0x10000, 0x400, 0x8001, 0x3, 0x1, 0x4, 0x5, 0x0, 0x981, 0x4, 0x100, 0x3ff, 0x0, 0xfffffffe, 0x0, 0x1000001, 0x0, 0xfffffff9, 0x0, 0x2, 0x1, 0x0, 0x6, 0x5, 0x800, 0xffff, 0x6, 0x96, 0x7, 0x101, 0x0, 0x2, 0x401, 0xc, 0x3, 0x379, 0xc, 0xe, 0x5, 0x7, 0x6, 0x1000002, 0x1, 0x1, 0xb, 0x26, 0x200, 0x3], [0x401, 0xc584, 0x4, 0xcd4, 0x7, 0x20, 0x7, 0x4, 0x8, 0x89b2, 0x7, 0x9, 0xe8b, 0x5, 0x80000001, 0x7, 0xfffffffc, 0x1000, 0x2, 0x10, 0x9, 0xfffffff9, 0xe55, 0x10, 0x80000001, 0x4, 0x4, 0x5, 0x9, 0x2, 0x5, 0x80, 0x40, 0x9, 0x47, 0x2, 0x3, 0x4, 0x7, 0x6d7e, 0x3, 0x8, 0x8001, 0xbf23, 0x6, 0x8, 0x0, 0x0, 0x3ff, 0x3, 0x6, 0x100fffd, 0x2005, 0x7, 0x4, 0xea, 0x7, 0x5, 0x6, 0xd9, 0x0, 0x7d, 0x401, 0x5], [0x108e, 0x7fff, 0x3, 0x3, 0x88, 0x2, 0x6, 0x4, 0x10, 0x2, 0x761, 0xb, 0x402, 0x800, 0xc4a, 0x1000, 0x7f, 0x5, 0x3fa6, 0x4, 0x0, 0x7, 0x1e0, 0x4, 0x2000e47, 0x3, 0x3, 0x4, 0x200, 0x1000, 0x3b, 0x5, 0x5, 0x800, 0xa80a, 0x65f413f9, 0x4, 0x8, 0x1208a8, 0x2, 0x3d, 0x7, 0x2, 0x6, 0x4, 0x10, 0x340a, 0x0, 0x7fff, 0xa1, 0xfffffff8, 0x401, 0x1, 0x200, 0x7, 0x4edf, 0xfffffffd, 0x7, 0x2000000e, 0x2, 0xd, 0xf, 0x133, 0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r6, 0x5501) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={r7, 0x11, 0x6}, 0x10) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) 2.752501102s ago: executing program 2 (id=433): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r1}, 0x10) r2 = socket(0x10, 0x3, 0x9) connect$netlink(r2, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x25dfdbfc}, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000b00)={{0x14, 0x10, 0x1, 0x0, 0x0, {0xa}}, [], {0x14}}, 0x28}}, 0x0) 2.070248676s ago: executing program 2 (id=434): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000004c0)="91b8a8f2f8acb5086a320819ddc8", &(0x7f0000000200), 0x4, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x1000) 1.080625496s ago: executing program 2 (id=435): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10003, 0x9, 0x1}, 0x48) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0xf5010000}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r3, 0x0, 0x0}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f0000001a00)=""/122}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x4, &(0x7f0000001800)={{r0}, &(0x7f0000001780)=0x4, 0x0}, 0x20) 0s ago: executing program 2 (id=436): r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000640)=@newqdisc={0x48, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r2, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0xf, 0x10001}}]}}]}, 0x48}}, 0x44080) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000005c0)=@newqdisc={0x34, 0x24, 0xd0f, 0x70bd2c, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffe0, 0xa}, {0x1, 0xe}}, [@qdisc_kind_options=@q_codel={{0xa}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x55}, 0xc010) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:63392' (ED25519) to the list of known hosts. [ 238.167534][ T30] audit: type=1400 audit(237.480:46): avc: denied { name_bind } for pid=3296 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 238.599969][ T30] audit: type=1400 audit(237.910:47): avc: denied { execute } for pid=3297 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 238.622465][ T30] audit: type=1400 audit(237.920:48): avc: denied { execute_no_trans } for pid=3297 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 244.828819][ T30] audit: type=1400 audit(244.140:49): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 244.857040][ T30] audit: type=1400 audit(244.170:50): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 244.918528][ T3297] cgroup: Unknown subsys name 'net' [ 244.963560][ T30] audit: type=1400 audit(244.270:51): avc: denied { unmount } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 245.238969][ T3297] cgroup: Unknown subsys name 'cpuset' [ 245.284575][ T3297] cgroup: Unknown subsys name 'rlimit' [ 245.628718][ T30] audit: type=1400 audit(244.940:52): avc: denied { setattr } for pid=3297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 245.646834][ T30] audit: type=1400 audit(244.960:53): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 245.654231][ T30] audit: type=1400 audit(244.960:54): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 246.543756][ T3299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 246.553821][ T30] audit: type=1400 audit(245.860:55): avc: denied { relabelto } for pid=3299 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 246.559619][ T30] audit: type=1400 audit(245.870:56): avc: denied { write } for pid=3299 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 246.678061][ T30] audit: type=1400 audit(245.990:57): avc: denied { read } for pid=3297 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 246.684401][ T30] audit: type=1400 audit(245.990:58): avc: denied { open } for pid=3297 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 246.733662][ T3297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 265.420845][ T30] audit: type=1400 audit(264.730:59): avc: denied { execmem } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 265.507378][ T30] audit: type=1400 audit(264.820:60): avc: denied { read } for pid=3302 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 265.518679][ T30] audit: type=1400 audit(264.820:61): avc: denied { open } for pid=3302 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 265.547226][ T30] audit: type=1400 audit(264.860:62): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 265.636616][ T30] audit: type=1400 audit(264.950:63): avc: denied { module_request } for pid=3302 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 265.923715][ T30] audit: type=1400 audit(265.240:64): avc: denied { sys_module } for pid=3303 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 275.960111][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 276.140926][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 276.200826][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 276.535021][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 279.918129][ T3302] hsr_slave_0: entered promiscuous mode [ 279.935348][ T3302] hsr_slave_1: entered promiscuous mode [ 280.897628][ T3303] hsr_slave_0: entered promiscuous mode [ 280.908034][ T3303] hsr_slave_1: entered promiscuous mode [ 280.915308][ T3303] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 280.917195][ T3303] Cannot create hsr debugfs directory [ 283.400179][ T30] audit: type=1400 audit(282.710:65): avc: denied { create } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 283.422931][ T30] audit: type=1400 audit(282.730:66): avc: denied { write } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 283.424031][ T30] audit: type=1400 audit(282.730:67): avc: denied { read } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 283.490496][ T3302] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 283.617859][ T3302] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 283.667039][ T3302] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 283.725600][ T3302] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 284.205253][ T3303] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 284.307185][ T3303] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 284.357961][ T3303] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 284.427647][ T3303] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 289.689625][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.117143][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 300.184086][ T3302] veth0_vlan: entered promiscuous mode [ 300.348971][ T3302] veth1_vlan: entered promiscuous mode [ 300.755684][ T3303] veth0_vlan: entered promiscuous mode [ 300.944217][ T3303] veth1_vlan: entered promiscuous mode [ 301.244558][ T3302] veth0_macvtap: entered promiscuous mode [ 301.310290][ T3302] veth1_macvtap: entered promiscuous mode [ 301.689463][ T3303] veth0_macvtap: entered promiscuous mode [ 301.869328][ T3303] veth1_macvtap: entered promiscuous mode [ 302.107531][ T3302] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.116196][ T3302] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.118787][ T3302] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.121203][ T3302] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.915628][ T3303] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.916573][ T3303] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.926868][ T3303] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.927233][ T3303] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.976984][ T30] audit: type=1400 audit(302.290:68): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 303.026392][ T30] audit: type=1400 audit(302.340:69): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzkaller.i4ACNE/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 303.073902][ T30] audit: type=1400 audit(302.370:70): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 303.126331][ T30] audit: type=1400 audit(302.440:71): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzkaller.i4ACNE/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 303.146521][ T30] audit: type=1400 audit(302.460:72): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzkaller.i4ACNE/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3563 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 303.238613][ T30] audit: type=1400 audit(302.550:73): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 303.277740][ T30] audit: type=1400 audit(302.590:74): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 303.299851][ T30] audit: type=1400 audit(302.610:75): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="gadgetfs" ino=3564 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 303.356879][ T30] audit: type=1400 audit(302.670:76): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 303.382905][ T30] audit: type=1400 audit(302.680:77): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 303.877505][ T3302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 310.052066][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 310.052614][ T30] audit: type=1400 audit(309.360:91): avc: denied { read } for pid=3466 comm="syz.0.5" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 310.059567][ T30] audit: type=1400 audit(309.370:92): avc: denied { open } for pid=3466 comm="syz.0.5" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 310.064122][ T30] audit: type=1400 audit(309.380:93): avc: denied { ioctl } for pid=3466 comm="syz.0.5" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 310.168881][ T30] audit: type=1400 audit(309.480:94): avc: denied { map_read map_write } for pid=3466 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 311.849623][ T30] audit: type=1400 audit(311.160:95): avc: denied { create } for pid=3471 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 311.886733][ T3472] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 311.930552][ T30] audit: type=1400 audit(311.240:96): avc: denied { bind } for pid=3471 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 311.965119][ T30] audit: type=1400 audit(311.270:97): avc: denied { name_bind } for pid=3471 comm="syz.0.7" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 311.981187][ T30] audit: type=1400 audit(311.290:98): avc: denied { node_bind } for pid=3471 comm="syz.0.7" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 312.032062][ T30] audit: type=1400 audit(311.340:99): avc: denied { setopt } for pid=3471 comm="syz.0.7" laddr=ff02::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 312.179842][ T30] audit: type=1400 audit(311.490:100): avc: denied { block_suspend } for pid=3471 comm="syz.0.7" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 315.144587][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 315.145846][ T30] audit: type=1400 audit(314.460:104): avc: denied { read write } for pid=3482 comm="syz.0.10" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 315.169654][ T30] audit: type=1400 audit(314.480:105): avc: denied { open } for pid=3482 comm="syz.0.10" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 315.237823][ T30] audit: type=1400 audit(314.550:106): avc: denied { read write } for pid=3482 comm="syz.0.10" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 315.247960][ T30] audit: type=1400 audit(314.560:107): avc: denied { open } for pid=3482 comm="syz.0.10" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 315.274938][ T30] audit: type=1400 audit(314.590:108): avc: denied { mounton } for pid=3482 comm="syz.0.10" path="/7/file0" dev="tmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 316.240929][ T30] audit: type=1400 audit(315.550:109): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 316.897225][ T30] audit: type=1400 audit(316.210:110): avc: denied { create } for pid=3485 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 316.929616][ T30] audit: type=1400 audit(316.240:111): avc: denied { write } for pid=3485 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 316.930376][ T30] audit: type=1400 audit(316.240:112): avc: denied { nlmsg_write } for pid=3485 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 320.707228][ T3489] netlink: 5 bytes leftover after parsing attributes in process `syz.0.12'. [ 320.718209][ T3489] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 325.062689][ T30] audit: type=1400 audit(324.350:113): avc: denied { map } for pid=3496 comm="syz.0.15" path="socket:[3013]" dev="sockfs" ino=3013 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 326.055769][ T30] audit: type=1400 audit(325.360:114): avc: denied { load_policy } for pid=3498 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 326.105766][ T3499] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 326.109753][ T3499] SELinux: failed to load policy [ 331.846840][ T30] audit: type=1400 audit(331.160:115): avc: denied { ioctl } for pid=3514 comm="syz.0.22" path="socket:[3039]" dev="sockfs" ino=3039 ioctlcmd=0x89a2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 333.810593][ T30] audit: type=1400 audit(333.120:116): avc: denied { create } for pid=3522 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 333.836679][ T30] audit: type=1400 audit(333.150:117): avc: denied { connect } for pid=3522 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 333.865625][ T30] audit: type=1400 audit(333.180:118): avc: denied { write } for pid=3522 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 335.057032][ T30] audit: type=1400 audit(334.370:119): avc: denied { create } for pid=3524 comm="syz.1.26" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 335.072979][ T30] audit: type=1400 audit(334.380:120): avc: denied { ioctl } for pid=3524 comm="syz.1.26" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3738 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 341.453513][ T30] audit: type=1400 audit(340.720:121): avc: denied { read } for pid=3533 comm="syz.1.28" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 341.454856][ T30] audit: type=1400 audit(340.760:122): avc: denied { open } for pid=3533 comm="syz.1.28" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 341.598246][ T30] audit: type=1400 audit(340.910:123): avc: denied { ioctl } for pid=3533 comm="syz.1.28" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 341.695732][ T30] audit: type=1400 audit(340.970:124): avc: denied { set_context_mgr } for pid=3533 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 342.102887][ T30] audit: type=1400 audit(341.400:125): avc: denied { map } for pid=3533 comm="syz.1.28" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 342.228746][ T3534] binder: 3533:3534 tried to acquire reference to desc 0, got 1 instead [ 342.253583][ T30] audit: type=1400 audit(341.560:126): avc: denied { call } for pid=3533 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 342.330244][ T3534] binder: 3533:3534 got transaction with invalid data ptr [ 342.408643][ T3534] binder: 3533:3534 transaction call to 3533:0 failed 5/29201/-14, code 0 size 0-24 line 3439 [ 342.464020][ T23] binder: undelivered TRANSACTION_ERROR: 29201 [ 370.028378][ T3548] €Â0: renamed from pim6reg1 [ 370.590196][ T30] audit: type=1400 audit(369.900:127): avc: denied { read write } for pid=3551 comm="syz.0.33" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 370.604173][ T30] audit: type=1400 audit(369.900:128): avc: denied { open } for pid=3551 comm="syz.0.33" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 370.641085][ T30] audit: type=1400 audit(369.950:129): avc: denied { ioctl } for pid=3551 comm="syz.0.33" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 371.085627][ T10] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 371.363934][ T10] usb 1-1: Using ep0 maxpacket: 8 [ 371.491049][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 371.496926][ T10] usb 1-1: New USB device found, idVendor=1e7d, idProduct=2e22, bcdDevice= 0.00 [ 371.497332][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 371.690060][ T10] usb 1-1: config 0 descriptor?? [ 372.298418][ T10] hid-generic 0003:1E7D:2E22.0001: unknown main item tag 0x0 [ 372.299673][ T10] hid-generic 0003:1E7D:2E22.0001: unknown main item tag 0x0 [ 372.300103][ T10] hid-generic 0003:1E7D:2E22.0001: unknown main item tag 0x0 [ 372.300492][ T10] hid-generic 0003:1E7D:2E22.0001: unknown main item tag 0x0 [ 372.300875][ T10] hid-generic 0003:1E7D:2E22.0001: unknown main item tag 0x0 [ 372.313526][ T10] hid-generic 0003:1E7D:2E22.0001: unknown main item tag 0x0 [ 372.388280][ T10] hid-generic 0003:1E7D:2E22.0001: hidraw0: USB HID v0.00 Device [HID 1e7d:2e22] on usb-dummy_hcd.0-1/input0 [ 372.508897][ T10] usb 1-1: USB disconnect, device number 2 [ 377.100418][ T3567] fido_id[3567]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/report_descriptor': No such file or directory [ 394.411207][ T30] audit: type=1400 audit(393.550:130): avc: denied { ioctl } for pid=3587 comm="syz.1.42" path="socket:[4170]" dev="sockfs" ino=4170 ioctlcmd=0x5820 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 403.098585][ T3596] xt_hashlimit: size too large, truncated to 1048576 [ 406.497254][ T30] audit: type=1400 audit(405.800:131): avc: denied { read } for pid=3603 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 407.003504][ T3606] netlink: 96 bytes leftover after parsing attributes in process `syz.1.46'. [ 407.805362][ T3610] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 407.818247][ T3610] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 408.375718][ T3613] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 408.403685][ T3613] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 414.199852][ T3619] netlink: 80 bytes leftover after parsing attributes in process `syz.1.51'. [ 423.453926][ T9] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 424.403425][ T9] usb 1-1: Using ep0 maxpacket: 16 [ 424.448000][ T9] usb 1-1: New USB device found, idVendor=054c, idProduct=05c4, bcdDevice= 0.00 [ 424.448985][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 425.357850][ T9] usb 1-1: config 0 descriptor?? [ 426.609687][ T9] playstation 0003:054C:05C4.0002: unknown main item tag 0x2 [ 427.398450][ T9] playstation 0003:054C:05C4.0002: hidraw0: USB HID v20.00 Device [HID 054c:05c4] on usb-dummy_hcd.0-1/input0 [ 428.417022][ T9] playstation 0003:054C:05C4.0002: Failed to retrieve feature with reportID 18: -71 [ 428.417675][ T9] playstation 0003:054C:05C4.0002: Failed to retrieve DualShock4 pairing info: -71 [ 428.417956][ T9] playstation 0003:054C:05C4.0002: Failed to get MAC address from DualShock4 [ 428.418140][ T9] playstation 0003:054C:05C4.0002: Failed to create dualshock4. [ 428.435343][ T9] playstation 0003:054C:05C4.0002: probe with driver playstation failed with error -71 [ 428.530902][ T30] audit: type=1400 audit(427.840:132): avc: denied { mount } for pid=3631 comm="syz.0.56" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 429.356837][ T9] usb 1-1: USB disconnect, device number 3 [ 429.497289][ T30] audit: type=1400 audit(428.810:133): avc: denied { create } for pid=3636 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 431.517436][ T3633] fido_id[3633]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/report_descriptor': No such file or directory [ 443.812584][ T3651] support for the xor transformation has been removed. [ 443.837625][ T30] audit: type=1400 audit(443.150:134): avc: denied { create } for pid=3650 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 443.842819][ T30] audit: type=1400 audit(443.160:135): avc: denied { connect } for pid=3650 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 444.290716][ T30] audit: type=1400 audit(443.600:136): avc: denied { create } for pid=3652 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 444.333650][ T30] audit: type=1400 audit(443.640:137): avc: denied { setopt } for pid=3652 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 444.338705][ T30] audit: type=1400 audit(443.650:138): avc: denied { map } for pid=3652 comm="syz.1.64" path="socket:[3874]" dev="sockfs" ino=3874 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 444.359222][ T30] audit: type=1400 audit(443.670:139): avc: denied { read accept } for pid=3652 comm="syz.1.64" path="socket:[3874]" dev="sockfs" ino=3874 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 445.169559][ T30] audit: type=1400 audit(444.480:140): avc: denied { setopt } for pid=3653 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 449.480924][ T3669] syzkaller0: entered promiscuous mode [ 449.489209][ T3669] syzkaller0: entered allmulticast mode [ 451.061822][ T30] audit: type=1400 audit(450.370:141): avc: denied { mounton } for pid=3676 comm="syz.0.72" path="/40/file0" dev="tmpfs" ino=221 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 453.885746][ T30] audit: type=1326 audit(453.200:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3682 comm="syz.0.74" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 453.902381][ T30] audit: type=1326 audit(453.210:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3682 comm="syz.0.74" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 453.903515][ T30] audit: type=1326 audit(453.210:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3682 comm="syz.0.74" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 453.904133][ T30] audit: type=1326 audit(453.210:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3682 comm="syz.0.74" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 453.915311][ T30] audit: type=1326 audit(453.230:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3682 comm="syz.0.74" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 453.916474][ T30] audit: type=1326 audit(453.230:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3682 comm="syz.0.74" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 453.923027][ T30] audit: type=1326 audit(453.230:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3682 comm="syz.0.74" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 453.933967][ T30] audit: type=1326 audit(453.240:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3682 comm="syz.0.74" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 453.955117][ T30] audit: type=1326 audit(453.270:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3682 comm="syz.0.74" exe="/syz-executor" sig=0 arch=c00000b7 syscall=176 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 477.160013][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 477.166961][ T30] audit: type=1400 audit(476.470:152): avc: denied { read write } for pid=3303 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 477.167919][ T30] audit: type=1400 audit(476.470:153): avc: denied { open } for pid=3303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 477.216810][ T30] audit: type=1400 audit(476.530:154): avc: denied { ioctl } for pid=3303 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 477.583551][ T30] audit: type=1400 audit(476.830:155): avc: denied { search } for pid=3703 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 477.585756][ T30] audit: type=1400 audit(476.830:156): avc: denied { read } for pid=3703 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 477.587760][ T30] audit: type=1400 audit(476.830:157): avc: denied { open } for pid=3703 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 477.596255][ T30] audit: type=1400 audit(476.860:158): avc: denied { getattr } for pid=3703 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 477.925474][ T30] audit: type=1400 audit(477.240:159): avc: denied { prog_load } for pid=3704 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 477.942516][ T30] audit: type=1400 audit(477.250:160): avc: denied { bpf } for pid=3704 comm="syz.1.80" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 477.958166][ T30] audit: type=1400 audit(477.270:161): avc: denied { perfmon } for pid=3704 comm="syz.1.80" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 482.337878][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 482.338692][ T30] audit: type=1400 audit(481.630:175): avc: denied { execmem } for pid=3719 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 498.973151][ T30] audit: type=1326 audit(498.280:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.1.95" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 498.978212][ T30] audit: type=1326 audit(498.280:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.1.95" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 499.046922][ T30] audit: type=1326 audit(498.360:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.1.95" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 499.072945][ T30] audit: type=1326 audit(498.380:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.1.95" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 499.105335][ T30] audit: type=1326 audit(498.410:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.1.95" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 499.122999][ T30] audit: type=1326 audit(498.430:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.1.95" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 499.142600][ T30] audit: type=1326 audit(498.450:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.1.95" exe="/syz-executor" sig=0 arch=c00000b7 syscall=176 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 499.152496][ T30] audit: type=1326 audit(498.460:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.1.95" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 499.156068][ T30] audit: type=1326 audit(498.470:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3746 comm="syz.1.95" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 499.705467][ T3749] netlink: 24 bytes leftover after parsing attributes in process `syz.1.96'. [ 500.201056][ T3749] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3749 comm=syz.1.96 [ 500.559437][ T30] audit: type=1326 audit(499.870:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3750 comm="syz.1.97" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 505.996618][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 505.998000][ T30] audit: type=1400 audit(505.310:210): avc: denied { create } for pid=3760 comm="syz.1.101" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 506.007393][ T30] audit: type=1400 audit(505.320:211): avc: denied { ioctl } for pid=3760 comm="syz.1.101" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4042 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 510.799501][ T30] audit: type=1400 audit(510.020:212): avc: denied { module_request } for pid=3760 comm="syz.1.101" kmod="fs-exfat" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 517.787396][ T30] audit: type=1400 audit(517.080:213): avc: denied { read write } for pid=3773 comm="syz.1.104" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 517.788146][ T30] audit: type=1400 audit(517.080:214): avc: denied { open } for pid=3773 comm="syz.1.104" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 517.788806][ T30] audit: type=1400 audit(517.090:215): avc: denied { ioctl } for pid=3773 comm="syz.1.104" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 517.790596][ T3774] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 517.809868][ T3774] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 519.450955][ T30] audit: type=1400 audit(518.760:216): avc: denied { mounton } for pid=3775 comm="syz.1.105" path="/49/bus" dev="tmpfs" ino=265 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 519.788269][ T30] audit: type=1400 audit(519.100:217): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 520.606090][ T30] audit: type=1400 audit(519.920:218): avc: denied { read } for pid=3777 comm="syz.1.106" dev="nsfs" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 520.638837][ T30] audit: type=1400 audit(519.930:219): avc: denied { open } for pid=3777 comm="syz.1.106" path="net:[4026532659]" dev="nsfs" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 520.676033][ T3778] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 520.688003][ T3778] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 521.814513][ T3780] Zero length message leads to an empty skb [ 521.817329][ T30] audit: type=1400 audit(521.120:220): avc: denied { create } for pid=3779 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 521.825110][ T30] audit: type=1400 audit(521.130:221): avc: denied { write } for pid=3779 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 523.396353][ T3784] 8021q: VLANs not supported on ip_vti0 [ 523.858354][ T30] audit: type=1400 audit(523.160:222): avc: denied { sys_module } for pid=3781 comm="syz.0.108" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 524.966473][ T30] audit: type=1400 audit(524.280:223): avc: denied { create } for pid=3787 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 524.989490][ T30] audit: type=1400 audit(524.290:224): avc: denied { bind } for pid=3787 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 524.996701][ T30] audit: type=1400 audit(524.300:225): avc: denied { name_bind } for pid=3787 comm="syz.0.109" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 525.005228][ T30] audit: type=1400 audit(524.300:226): avc: denied { node_bind } for pid=3787 comm="syz.0.109" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 525.146503][ T30] audit: type=1400 audit(524.300:227): avc: denied { setopt } for pid=3787 comm="syz.0.109" laddr=ff02::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 526.739031][ T3789] netlink: 'syz.1.107': attribute type 1 has an invalid length. [ 528.819079][ T30] audit: type=1400 audit(528.130:228): avc: denied { create } for pid=3791 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 528.920878][ T30] audit: type=1400 audit(528.220:229): avc: denied { setopt } for pid=3791 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 529.056625][ T30] audit: type=1400 audit(528.370:230): avc: denied { ioctl } for pid=3791 comm="syz.0.110" path="socket:[4521]" dev="sockfs" ino=4521 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 529.079920][ T30] audit: type=1400 audit(528.390:231): avc: denied { write } for pid=3791 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 531.159281][ T30] audit: type=1400 audit(530.370:232): avc: denied { read } for pid=3795 comm="syz.0.112" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 531.159955][ T30] audit: type=1400 audit(530.380:233): avc: denied { open } for pid=3795 comm="syz.0.112" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 531.160568][ T30] audit: type=1400 audit(530.430:234): avc: denied { ioctl } for pid=3795 comm="syz.0.112" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x700f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 535.066262][ T30] audit: type=1400 audit(534.380:235): avc: denied { create } for pid=3799 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 535.107521][ T30] audit: type=1400 audit(534.420:236): avc: denied { nlmsg_write } for pid=3799 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 535.164152][ T30] audit: type=1400 audit(534.480:237): avc: denied { setopt } for pid=3799 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 535.183666][ T30] audit: type=1400 audit(534.480:238): avc: denied { write } for pid=3799 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 538.394686][ T30] audit: type=1400 audit(537.700:239): avc: denied { write } for pid=3802 comm="syz.0.115" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 539.495552][ T3805] support for the xor transformation has been removed. [ 543.352494][ T30] audit: type=1400 audit(542.660:240): avc: denied { create } for pid=3816 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 543.405538][ T30] audit: type=1400 audit(542.710:241): avc: denied { write } for pid=3816 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 564.989443][ T30] audit: type=1400 audit(564.300:242): avc: denied { setopt } for pid=3842 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 566.097310][ T30] audit: type=1326 audit(565.410:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3849 comm="syz.0.132" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 566.109479][ T30] audit: type=1326 audit(565.420:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3849 comm="syz.0.132" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffb235d14c code=0x7ffc0000 [ 566.135469][ T30] audit: type=1326 audit(565.420:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3849 comm="syz.0.132" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 566.136707][ T30] audit: type=1326 audit(565.420:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3849 comm="syz.0.132" exe="/syz-executor" sig=0 arch=c00000b7 syscall=287 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 566.137318][ T30] audit: type=1326 audit(565.420:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3849 comm="syz.0.132" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 566.789387][ T30] audit: type=1400 audit(566.100:248): avc: denied { read } for pid=3853 comm="syz.0.134" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 566.804306][ T30] audit: type=1400 audit(566.110:249): avc: denied { open } for pid=3853 comm="syz.0.134" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 566.805588][ T30] audit: type=1400 audit(566.120:250): avc: denied { ioctl } for pid=3853 comm="syz.0.134" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 568.196943][ T30] audit: type=1400 audit(567.510:251): avc: denied { ioctl } for pid=3859 comm="syz.0.137" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 579.127111][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 579.143164][ T30] audit: type=1326 audit(578.440:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3892 comm="syz.0.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 579.148006][ T30] audit: type=1326 audit(578.440:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3892 comm="syz.0.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 579.156103][ T30] audit: type=1326 audit(578.460:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3892 comm="syz.0.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 579.164101][ T30] audit: type=1326 audit(578.470:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3892 comm="syz.0.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 579.181125][ T30] audit: type=1326 audit(578.490:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3892 comm="syz.0.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 579.189923][ T30] audit: type=1326 audit(578.500:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3892 comm="syz.0.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 579.205168][ T30] audit: type=1326 audit(578.520:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3892 comm="syz.0.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 579.211198][ T30] audit: type=1326 audit(578.520:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3892 comm="syz.0.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 579.218689][ T30] audit: type=1326 audit(578.530:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3892 comm="syz.0.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 579.230097][ T30] audit: type=1326 audit(578.540:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3892 comm="syz.0.152" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 585.391269][ T3901] netlink: 'syz.1.155': attribute type 12 has an invalid length. [ 612.783551][ T3943] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 612.820060][ T3943] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 613.379726][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 613.384934][ T30] audit: type=1400 audit(612.690:265): avc: denied { accept } for pid=3946 comm="syz.1.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 613.410392][ T30] audit: type=1400 audit(612.720:266): avc: denied { read } for pid=3946 comm="syz.1.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 613.567501][ T3949] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 613.584502][ T30] audit: type=1400 audit(612.890:267): avc: denied { ioctl } for pid=3948 comm="syz.0.171" path="socket:[5342]" dev="sockfs" ino=5342 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 615.848703][ T30] audit: type=1400 audit(615.160:268): avc: denied { create } for pid=3958 comm="syz.0.174" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 616.223697][ T30] audit: type=1326 audit(615.530:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 616.277114][ T30] audit: type=1326 audit(615.580:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 616.342257][ T30] audit: type=1326 audit(615.640:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 616.343426][ T30] audit: type=1326 audit(615.650:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 616.380546][ T30] audit: type=1326 audit(615.690:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 616.413376][ T30] audit: type=1326 audit(615.710:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.175" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 622.157815][ T3983] vlan2: entered allmulticast mode [ 622.158495][ T3983] bridge_slave_0: entered allmulticast mode [ 622.591169][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 622.598242][ T30] audit: type=1400 audit(621.900:285): avc: denied { connect } for pid=3986 comm="syz.1.187" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 624.023170][ T9] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 624.253417][ T9] usb 1-1: Using ep0 maxpacket: 32 [ 624.378622][ T9] usb 1-1: config 0 interface 0 altsetting 4 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 624.379651][ T9] usb 1-1: config 0 interface 0 has no altsetting 0 [ 624.380114][ T9] usb 1-1: New USB device found, idVendor=5543, idProduct=0781, bcdDevice= 0.00 [ 624.380434][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 624.483151][ T30] audit: type=1400 audit(623.790:286): avc: denied { mount } for pid=3996 comm="syz.1.191" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 624.639135][ T9] usb 1-1: config 0 descriptor?? [ 627.589671][ T9] hid-generic 0003:5543:0781.0003: unbalanced delimiter at end of report description [ 627.611091][ T9] hid-generic 0003:5543:0781.0003: probe with driver hid-generic failed with error -22 [ 629.002625][ T30] audit: type=1400 audit(628.090:287): avc: denied { write } for pid=3998 comm="syz.1.192" name="ptype" dev="proc" ino=4026532696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 635.135506][ T3410] usb 1-1: USB disconnect, device number 4 [ 638.234076][ T4008] SELinux: syz.0.193 (4008) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 639.567114][ T30] audit: type=1326 audit(638.870:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4015 comm="syz.1.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 639.587168][ T30] audit: type=1326 audit(638.890:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4015 comm="syz.1.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 639.625557][ T30] audit: type=1326 audit(638.930:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4015 comm="syz.1.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 639.626827][ T30] audit: type=1326 audit(638.930:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4015 comm="syz.1.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 639.627146][ T30] audit: type=1326 audit(638.930:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4015 comm="syz.1.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 639.627417][ T30] audit: type=1326 audit(638.940:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4015 comm="syz.1.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=145 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 639.627723][ T30] audit: type=1326 audit(638.940:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4015 comm="syz.1.198" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 640.384438][ T30] audit: type=1326 audit(639.700:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4018 comm="syz.0.199" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 640.389210][ T30] audit: type=1326 audit(639.700:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4018 comm="syz.0.199" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 640.454078][ T30] audit: type=1326 audit(639.760:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4018 comm="syz.0.199" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 644.656210][ T4034] netlink: 'syz.0.206': attribute type 5 has an invalid length. [ 644.808682][ T4034] ip6erspan0: entered promiscuous mode [ 644.887269][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 644.889279][ T30] audit: type=1326 audit(644.200:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.0.206" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 644.915098][ T30] audit: type=1326 audit(644.220:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.0.206" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 644.935585][ T30] audit: type=1326 audit(644.230:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.0.206" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 645.608135][ T30] audit: type=1400 audit(644.910:317): avc: denied { create } for pid=4035 comm="syz.0.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 645.636743][ T30] audit: type=1400 audit(644.940:318): avc: denied { read } for pid=4035 comm="syz.0.207" path="socket:[5491]" dev="sockfs" ino=5491 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 648.823658][ T31] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 649.118939][ T31] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 649.123072][ T31] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 649.134599][ T31] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 649.142648][ T31] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 649.227108][ T31] usb 1-1: config 0 descriptor?? [ 655.356271][ T31] usbhid 1-1:0.0: can't add hid device: -32 [ 655.360357][ T31] usbhid 1-1:0.0: probe with driver usbhid failed with error -32 [ 665.616166][ T3449] usb 1-1: USB disconnect, device number 5 [ 668.772663][ T4049] usb 1-1: new full-speed USB device number 6 using dummy_hcd [ 669.069327][ T4049] usb 1-1: too many endpoints for config 0 interface 0 altsetting 255: 33, using maximum allowed: 30 [ 669.074354][ T4049] usb 1-1: config 0 interface 0 altsetting 255 has 2 endpoint descriptors, different from the interface descriptor's value: 33 [ 669.083559][ T4049] usb 1-1: config 0 interface 0 has no altsetting 0 [ 669.085757][ T4049] usb 1-1: New USB device found, idVendor=0458, idProduct=501b, bcdDevice= 0.00 [ 669.087919][ T4049] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 669.178973][ T4049] usb 1-1: config 0 descriptor?? [ 669.898690][ T4049] hid-generic 0003:0458:501B.0004: hidraw0: USB HID v8.00 Device [HID 0458:501b] on usb-dummy_hcd.0-1/input0 [ 670.057545][ T4049] usb 1-1: USB disconnect, device number 6 [ 673.117689][ T4070] fido_id[4070]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/report_descriptor': No such file or directory [ 685.289785][ T30] audit: type=1326 audit(684.600:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4077 comm="syz.0.217" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 685.297219][ T30] audit: type=1326 audit(684.600:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4077 comm="syz.0.217" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 685.307282][ T30] audit: type=1326 audit(684.620:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4077 comm="syz.0.217" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 685.339747][ T30] audit: type=1326 audit(684.650:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4077 comm="syz.0.217" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 685.349578][ T30] audit: type=1326 audit(684.660:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4077 comm="syz.0.217" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 685.351035][ T30] audit: type=1326 audit(684.660:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4077 comm="syz.0.217" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 685.362613][ T30] audit: type=1326 audit(684.660:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4077 comm="syz.0.217" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 685.365972][ T30] audit: type=1326 audit(684.680:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4077 comm="syz.0.217" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 685.372157][ T30] audit: type=1326 audit(684.680:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4077 comm="syz.0.217" exe="/syz-executor" sig=0 arch=c00000b7 syscall=428 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 685.375083][ T30] audit: type=1326 audit(684.680:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4077 comm="syz.0.217" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 687.658364][ T10] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 687.913018][ T10] usb 1-1: Using ep0 maxpacket: 32 [ 687.965559][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 687.966393][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 687.966677][ T10] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 687.967327][ T10] usb 1-1: New USB device found, idVendor=046d, idProduct=c295, bcdDevice= 0.00 [ 687.967589][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 688.024576][ T10] usb 1-1: config 0 descriptor?? [ 688.554875][ T10] usbhid 1-1:0.0: can't add hid device: -71 [ 688.556548][ T10] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 688.654908][ T10] usb 1-1: USB disconnect, device number 7 [ 689.735874][ T4095] input: syz0 as /devices/virtual/input/input2 [ 690.325269][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 690.327902][ T30] audit: type=1400 audit(689.640:348): avc: denied { create } for pid=4096 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 690.340467][ T30] audit: type=1400 audit(689.650:349): avc: denied { bind } for pid=4096 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 690.345994][ T30] audit: type=1400 audit(689.660:350): avc: denied { read } for pid=4096 comm="syz.0.225" path="socket:[5581]" dev="sockfs" ino=5581 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 690.870022][ T30] audit: type=1400 audit(690.180:351): avc: denied { create } for pid=4096 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 690.880508][ T30] audit: type=1400 audit(690.190:352): avc: denied { setopt } for pid=4096 comm="syz.0.225" lport=135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 690.892879][ T30] audit: type=1400 audit(690.200:353): avc: denied { connect } for pid=4096 comm="syz.0.225" lport=135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 691.436542][ T30] audit: type=1400 audit(690.740:354): avc: denied { create } for pid=4099 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 691.441011][ T30] audit: type=1400 audit(690.740:355): avc: denied { setopt } for pid=4099 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 691.864114][ T30] audit: type=1400 audit(691.160:356): avc: denied { execmem } for pid=4101 comm="syz.0.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 696.866122][ T30] audit: type=1400 audit(696.140:357): avc: denied { create } for pid=4101 comm="syz.0.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 696.874492][ T30] audit: type=1400 audit(696.160:358): avc: denied { write } for pid=4101 comm="syz.0.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 696.894227][ T30] audit: type=1400 audit(696.170:359): avc: denied { module_request } for pid=4101 comm="syz.0.227" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 697.987374][ T30] audit: type=1400 audit(697.240:360): avc: denied { mount } for pid=4101 comm="syz.0.227" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 700.433090][ T9] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 701.552760][ T9] usb 1-1: Using ep0 maxpacket: 32 [ 701.583232][ T9] usb 1-1: New USB device found, idVendor=05e3, idProduct=0502, bcdDevice=b2.ac [ 701.583794][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 703.584854][ T9] usb 1-1: config 0 descriptor?? [ 703.628254][ T9] gl620a 1-1:0.0: probe with driver gl620a failed with error -22 [ 706.952463][ T30] audit: type=1400 audit(706.250:361): avc: denied { read } for pid=4101 comm="syz.0.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 710.625218][ T4115] netlink: 'syz.1.229': attribute type 4 has an invalid length. [ 710.637881][ T4115] netlink: 'syz.1.229': attribute type 5 has an invalid length. [ 710.655991][ T4115] netlink: 3657 bytes leftover after parsing attributes in process `syz.1.229'. [ 710.715138][ T30] audit: type=1400 audit(710.020:362): avc: denied { ioctl } for pid=4114 comm="syz.1.229" path="socket:[5110]" dev="sockfs" ino=5110 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 710.734078][ T30] audit: type=1400 audit(710.040:363): avc: denied { bind } for pid=4114 comm="syz.1.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 710.764054][ T30] audit: type=1400 audit(710.060:364): avc: denied { ioctl } for pid=4114 comm="syz.1.229" path="socket:[5109]" dev="sockfs" ino=5109 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 726.597477][ T23] usb 1-1: USB disconnect, device number 8 [ 761.353519][ T30] audit: type=1400 audit(760.660:365): avc: denied { sys_module } for pid=4139 comm="syz.0.237" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 799.527993][ T30] audit: type=1400 audit(798.840:366): avc: denied { load_policy } for pid=4156 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 799.549835][ T4157] SELinux: failed to load policy [ 801.229983][ T30] audit: type=1400 audit(800.530:367): avc: denied { create } for pid=4162 comm="syz.0.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 802.699840][ T30] audit: type=1400 audit(802.000:368): avc: denied { name_bind } for pid=4168 comm="syz.1.244" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 802.705054][ T30] audit: type=1400 audit(802.010:369): avc: denied { node_bind } for pid=4168 comm="syz.1.244" saddr=224.0.0.2 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 802.782203][ T30] audit: type=1400 audit(802.090:370): avc: denied { read write } for pid=4168 comm="syz.1.244" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 802.799599][ T30] audit: type=1400 audit(802.110:371): avc: denied { open } for pid=4168 comm="syz.1.244" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 803.134405][ T30] audit: type=1400 audit(802.450:372): avc: denied { create } for pid=4173 comm="syz.0.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 803.167757][ T30] audit: type=1400 audit(802.480:373): avc: denied { relabelfrom } for pid=4173 comm="syz.0.246" name="NETLINK" dev="sockfs" ino=6235 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 803.176796][ T30] audit: type=1400 audit(802.490:374): avc: denied { mac_admin } for pid=4173 comm="syz.0.246" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 803.180386][ T4174] SELinux: Context system_u:object_r:inetd_var_run_t:s0 is not valid (left unmapped). [ 803.187561][ T30] audit: type=1400 audit(802.500:375): avc: denied { relabelto } for pid=4173 comm="syz.0.246" name="NETLINK" dev="sockfs" ino=6235 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=netlink_netfilter_socket permissive=1 trawcon="system_u:object_r:inetd_var_run_t:s0" [ 803.915397][ T4179] SELinux: ebitmap: truncated map [ 804.094691][ T4179] SELinux: failed to load policy [ 805.245335][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 805.246357][ T30] audit: type=1400 audit(804.560:378): avc: denied { create } for pid=4184 comm="syz.0.251" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 806.276876][ T30] audit: type=1400 audit(805.510:379): avc: denied { unlink } for pid=3302 comm="syz-executor" name="file0" dev="tmpfs" ino=807 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 806.583839][ T30] audit: type=1400 audit(805.890:380): avc: denied { execute } for pid=4191 comm="syz.0.254" dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 806.588409][ T4192] process 'syz.0.254' launched '/dev/fd/3' with NULL argv: empty string added [ 806.597162][ T30] audit: type=1400 audit(805.910:381): avc: denied { execute_no_trans } for pid=4191 comm="syz.0.254" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 807.522196][ T4198] sch_fq: defrate 2048 ignored. [ 808.336860][ T30] audit: type=1400 audit(807.650:382): avc: denied { read write } for pid=4201 comm="syz.0.259" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 808.343402][ T30] audit: type=1400 audit(807.650:383): avc: denied { open } for pid=4201 comm="syz.0.259" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 808.388803][ T30] audit: type=1400 audit(807.700:384): avc: denied { read write } for pid=4201 comm="syz.0.259" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 808.404064][ T30] audit: type=1400 audit(807.710:385): avc: denied { open } for pid=4201 comm="syz.0.259" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 808.516149][ T4202] xt_bpf: check failed: parse error [ 808.539237][ T30] audit: type=1400 audit(807.850:386): avc: denied { mounton } for pid=4201 comm="syz.0.259" path="/162/file0" dev="tmpfs" ino=843 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 808.700779][ T30] audit: type=1400 audit(808.000:387): avc: denied { mount } for pid=4201 comm="syz.0.259" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 810.330223][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 810.436166][ T30] audit: type=1400 audit(809.460:390): avc: denied { write } for pid=4187 comm="syz.1.252" laddr=::1 lport=3 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 811.249586][ T30] audit: type=1400 audit(810.560:391): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 811.518248][ T4208] netlink: 'syz.0.260': attribute type 4 has an invalid length. [ 811.519678][ T4208] netlink: 'syz.0.260': attribute type 5 has an invalid length. [ 811.523394][ T4208] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.260'. [ 811.883028][ T30] audit: type=1326 audit(811.190:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4209 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 811.897960][ T30] audit: type=1326 audit(811.200:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4209 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 811.919741][ T30] audit: type=1326 audit(811.230:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4209 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 811.946785][ T30] audit: type=1326 audit(811.250:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4209 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 811.948062][ T30] audit: type=1326 audit(811.260:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4209 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 811.978431][ T30] audit: type=1326 audit(811.290:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4209 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 812.003156][ T30] audit: type=1326 audit(811.310:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4209 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 812.024471][ T30] audit: type=1326 audit(811.320:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4209 comm="syz.0.261" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 819.057983][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 819.060569][ T30] audit: type=1400 audit(818.370:410): avc: denied { write } for pid=4220 comm="syz.1.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 835.522880][ T30] audit: type=1400 audit(834.840:411): avc: denied { read } for pid=4228 comm="syz.0.268" path="socket:[6322]" dev="sockfs" ino=6322 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 835.767384][ T30] audit: type=1400 audit(835.080:412): avc: denied { map } for pid=4230 comm="syz.0.269" path="socket:[6329]" dev="sockfs" ino=6329 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 835.768033][ T30] audit: type=1400 audit(835.080:413): avc: denied { read accept } for pid=4230 comm="syz.0.269" path="socket:[6329]" dev="sockfs" ino=6329 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 837.027489][ T30] audit: type=1400 audit(836.340:414): avc: denied { write } for pid=4236 comm="syz.0.272" name="tcp6" dev="proc" ino=4026532678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 839.334284][ T30] audit: type=1400 audit(838.640:415): avc: denied { write } for pid=4244 comm="syz.0.276" laddr=::1 lport=60 faddr=::1 fport=20131 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 853.443036][ T30] audit: type=1400 audit(852.730:416): avc: denied { prog_run } for pid=4255 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 854.523971][ T4049] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 854.713693][ T4049] usb 1-1: Using ep0 maxpacket: 8 [ 854.766373][ T4049] usb 1-1: unable to get BOS descriptor or descriptor too short [ 854.787510][ T4049] usb 1-1: config 17 has an invalid interface number: 8 but max is 1 [ 854.789863][ T4049] usb 1-1: config 17 has 1 interface, different from the descriptor's value: 2 [ 854.795112][ T4049] usb 1-1: config 17 has no interface number 0 [ 854.797135][ T4049] usb 1-1: config 17 interface 8 altsetting 6 endpoint 0x3 has invalid wMaxPacketSize 0 [ 854.799362][ T4049] usb 1-1: config 17 interface 8 has no altsetting 0 [ 854.909299][ T4049] usb 1-1: New USB device found, idVendor=0763, idProduct=2001, bcdDevice=2c.ff [ 854.912978][ T4049] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 854.915115][ T4049] usb 1-1: Product: syz [ 854.916608][ T4049] usb 1-1: Manufacturer: syz [ 854.918111][ T4049] usb 1-1: SerialNumber: syz [ 855.380753][ T4049] usb 1-1: selecting invalid altsetting 0 [ 855.672178][ T4049] usb 1-1: USB disconnect, device number 9 [ 855.756241][ T30] audit: type=1404 audit(855.060:417): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 855.995875][ T30] audit: type=1400 audit(855.310:418): avc: denied { name_bind } for pid=4263 comm="syz.0.283" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 856.093937][ T30] audit: type=1400 audit(855.400:419): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 856.223024][ T30] audit: type=1404 audit(855.530:420): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 856.309041][ T30] audit: type=1400 audit(855.620:421): avc: denied { prog_load } for pid=4261 comm="syz.1.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 856.311067][ T30] audit: type=1400 audit(855.620:422): avc: denied { bpf } for pid=4261 comm="syz.1.282" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 856.387872][ T30] audit: type=1400 audit(855.700:424): avc: denied { execmem } for pid=4266 comm="syz.0.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 856.402199][ T30] audit: type=1400 audit(855.620:423): avc: denied { perfmon } for pid=4261 comm="syz.1.282" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 857.332078][ T30] audit: type=1400 audit(856.640:425): avc: denied { read write } for pid=4261 comm="syz.1.282" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 857.407170][ T4262] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 857.438947][ T4262] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 858.394329][ T4271] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 858.425962][ T4271] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 858.998101][ T4269] udevd[4269]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:17.8/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 859.248386][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 859.259021][ T30] audit: type=1400 audit(858.560:435): avc: denied { read write } for pid=4274 comm="syz.1.287" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 859.267466][ T30] audit: type=1400 audit(858.580:436): avc: denied { open } for pid=4274 comm="syz.1.287" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 859.320296][ T30] audit: type=1400 audit(858.630:437): avc: denied { ioctl } for pid=4274 comm="syz.1.287" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 860.008378][ T4277] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 860.029944][ T4277] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 863.681063][ T30] audit: type=1400 audit(862.990:438): avc: denied { map_read map_write } for pid=4266 comm="syz.0.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 866.517419][ T30] audit: type=1400 audit(865.830:439): avc: denied { create } for pid=4282 comm="syz.0.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 866.541078][ T30] audit: type=1400 audit(865.850:440): avc: denied { bind } for pid=4282 comm="syz.0.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 866.553551][ T30] audit: type=1400 audit(865.860:441): avc: denied { create } for pid=4282 comm="syz.0.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 866.572488][ T30] audit: type=1400 audit(865.880:442): avc: denied { setopt } for pid=4282 comm="syz.0.290" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 866.580106][ T30] audit: type=1400 audit(865.890:443): avc: denied { connect } for pid=4282 comm="syz.0.290" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 867.086009][ T30] audit: type=1326 audit(866.400:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4284 comm="syz.0.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 867.100890][ T30] audit: type=1326 audit(866.410:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4284 comm="syz.0.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=178 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 867.103219][ T30] audit: type=1326 audit(866.410:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4284 comm="syz.0.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 867.109480][ T30] audit: type=1326 audit(866.420:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4284 comm="syz.0.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=138 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 867.115945][ T30] audit: type=1326 audit(866.420:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4284 comm="syz.0.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffffb235268c code=0x7ffc0000 [ 871.596975][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 871.598236][ T30] audit: type=1400 audit(870.890:458): avc: denied { ioctl } for pid=4300 comm="syz.0.298" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 871.701111][ T4301] input: syz1 as /devices/virtual/input/input4 [ 871.706902][ T30] audit: type=1400 audit(871.020:459): avc: denied { read } for pid=4302 comm="syz.1.299" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 871.712413][ T30] audit: type=1400 audit(871.020:460): avc: denied { open } for pid=4302 comm="syz.1.299" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 871.770446][ T30] audit: type=1400 audit(871.080:461): avc: denied { ioctl } for pid=4302 comm="syz.1.299" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 873.187576][ T30] audit: type=1400 audit(872.500:462): avc: denied { execute } for pid=4308 comm="syz.0.301" name="file0" dev="tmpfs" ino=980 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 873.529434][ T30] audit: type=1326 audit(872.840:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4310 comm="syz.0.302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 873.534315][ T30] audit: type=1326 audit(872.840:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4310 comm="syz.0.302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 873.546422][ T30] audit: type=1326 audit(872.860:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4310 comm="syz.0.302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 873.549447][ T30] audit: type=1326 audit(872.860:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4310 comm="syz.0.302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 873.568181][ T30] audit: type=1326 audit(872.880:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4310 comm="syz.0.302" exe="/syz-executor" sig=0 arch=c00000b7 syscall=27 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 877.393434][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 877.395389][ T30] audit: type=1400 audit(876.700:474): avc: denied { read write } for pid=4324 comm="syz.0.307" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 877.396114][ T30] audit: type=1400 audit(876.700:475): avc: denied { open } for pid=4324 comm="syz.0.307" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 877.433230][ T30] audit: type=1400 audit(876.720:476): avc: denied { mounton } for pid=4324 comm="syz.0.307" path="/195/file0" dev="tmpfs" ino=1012 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 877.503712][ T30] audit: type=1400 audit(876.810:477): avc: denied { mount } for pid=4324 comm="syz.0.307" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 877.912946][ T30] audit: type=1400 audit(877.220:478): avc: denied { create } for pid=4326 comm="syz.1.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 877.933416][ T30] audit: type=1400 audit(877.230:479): avc: denied { ioctl } for pid=4326 comm="syz.1.308" path="socket:[6497]" dev="sockfs" ino=6497 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 877.934618][ T30] audit: type=1400 audit(877.240:480): avc: denied { bind } for pid=4326 comm="syz.1.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 878.327357][ T30] audit: type=1400 audit(877.640:481): avc: denied { create } for pid=4329 comm="syz.1.309" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 878.339162][ T30] audit: type=1400 audit(877.650:482): avc: denied { ioctl } for pid=4329 comm="syz.1.309" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=6506 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 888.795177][ T30] audit: type=1400 audit(888.110:483): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 901.360960][ T30] audit: type=1400 audit(900.610:484): avc: denied { mounton } for pid=4364 comm="syz.0.322" path="/198/file0" dev="tmpfs" ino=1028 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 910.617306][ T30] audit: type=1326 audit(909.930:485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4374 comm="syz.0.324" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 910.629032][ T30] audit: type=1326 audit(909.940:486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4374 comm="syz.0.324" exe="/syz-executor" sig=0 arch=c00000b7 syscall=219 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 910.636674][ T30] audit: type=1326 audit(909.940:487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4374 comm="syz.0.324" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 920.340620][ T30] audit: type=1400 audit(919.650:488): avc: denied { prog_run } for pid=4391 comm="syz.0.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 923.210351][ T30] audit: type=1400 audit(922.520:489): avc: denied { ioctl } for pid=4394 comm="syz.0.330" path="socket:[6673]" dev="sockfs" ino=6673 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 923.229958][ T30] audit: type=1400 audit(922.540:490): avc: denied { map } for pid=4394 comm="syz.0.330" path="socket:[6673]" dev="sockfs" ino=6673 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 923.250057][ T30] audit: type=1400 audit(922.560:491): avc: denied { read } for pid=4394 comm="syz.0.330" path="socket:[6673]" dev="sockfs" ino=6673 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 924.118310][ T30] audit: type=1400 audit(923.430:492): avc: denied { read } for pid=4396 comm="syz.0.331" dev="nsfs" ino=4026532626 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 924.129116][ T30] audit: type=1400 audit(923.440:493): avc: denied { open } for pid=4396 comm="syz.0.331" path="net:[4026532626]" dev="nsfs" ino=4026532626 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 925.074782][ T30] audit: type=1326 audit(924.360:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4399 comm="syz.1.332" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 925.089891][ T30] audit: type=1326 audit(924.400:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4399 comm="syz.1.332" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 925.147118][ T30] audit: type=1326 audit(924.460:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4399 comm="syz.1.332" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 925.155832][ T30] audit: type=1326 audit(924.460:497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4399 comm="syz.1.332" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 925.343193][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 925.344229][ T30] audit: type=1326 audit(924.620:511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4399 comm="syz.1.332" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 925.345023][ T30] audit: type=1326 audit(924.640:512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4399 comm="syz.1.332" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 925.345704][ T30] audit: type=1326 audit(924.650:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4399 comm="syz.1.332" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 925.346436][ T30] audit: type=1400 audit(924.650:514): avc: denied { create } for pid=4399 comm="syz.1.332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 925.377425][ T30] audit: type=1326 audit(924.670:515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4399 comm="syz.1.332" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 925.378713][ T30] audit: type=1326 audit(924.680:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4399 comm="syz.1.332" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff81b590d4 code=0x7ffc0000 [ 925.397163][ T30] audit: type=1326 audit(924.710:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4399 comm="syz.1.332" exe="/syz-executor" sig=0 arch=c00000b7 syscall=29 compat=0 ip=0xffff81b5a6d0 code=0x7ffc0000 [ 925.408878][ T30] audit: type=1326 audit(924.720:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4399 comm="syz.1.332" exe="/syz-executor" sig=0 arch=c00000b7 syscall=29 compat=0 ip=0xffff81b5a6d0 code=0x7ffc0000 [ 925.446118][ T4401] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 925.486421][ T4401] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 925.504052][ T30] audit: type=1326 audit(924.810:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4399 comm="syz.1.332" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 925.549552][ T30] audit: type=1326 audit(924.860:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4399 comm="syz.1.332" exe="/syz-executor" sig=0 arch=c00000b7 syscall=200 compat=0 ip=0xffff81b5aba8 code=0x7ffc0000 [ 931.704559][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 931.709654][ T30] audit: type=1400 audit(930.990:528): avc: denied { sys_module } for pid=4414 comm="syz.0.339" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 931.973068][ T30] audit: type=1400 audit(931.260:529): avc: denied { create } for pid=4418 comm="syz.1.340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 932.090513][ T30] audit: type=1400 audit(931.390:530): avc: denied { read } for pid=4418 comm="syz.1.340" path="socket:[6738]" dev="sockfs" ino=6738 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 937.083263][ T30] audit: type=1400 audit(936.380:531): avc: denied { load_policy } for pid=4429 comm="syz.1.342" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 937.126907][ T4430] SELinux: failed to load policy [ 939.608237][ T30] audit: type=1400 audit(938.900:532): avc: denied { append } for pid=4434 comm="syz.0.344" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 939.982847][ T30] audit: type=1400 audit(939.290:533): avc: denied { search } for pid=4431 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 939.986740][ T30] audit: type=1400 audit(939.300:534): avc: denied { search } for pid=4431 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=630 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 940.003337][ T30] audit: type=1400 audit(939.310:535): avc: denied { search } for pid=4431 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=795 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 940.007798][ T30] audit: type=1400 audit(939.310:536): avc: denied { search } for pid=4431 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=796 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 940.093143][ T30] audit: type=1400 audit(939.400:537): avc: denied { read open } for pid=4438 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=796 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 940.106349][ T30] audit: type=1400 audit(939.420:538): avc: denied { getattr } for pid=4438 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=796 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 940.186923][ T30] audit: type=1400 audit(939.500:539): avc: denied { write } for pid=4436 comm="syz.1.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 940.265106][ T30] audit: type=1400 audit(939.580:540): avc: denied { add_name } for pid=4431 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 943.695874][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 943.700035][ T30] audit: type=1400 audit(943.000:547): avc: denied { remove_name } for pid=4445 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1709 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 943.704356][ T30] audit: type=1400 audit(943.010:548): avc: denied { unlink } for pid=4445 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1709 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 946.304384][ T4451] netlink: 'syz.1.347': attribute type 1 has an invalid length. [ 987.658247][ T30] audit: type=1326 audit(986.970:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.0.352" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 987.666042][ T30] audit: type=1326 audit(986.980:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.0.352" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 987.776454][ T30] audit: type=1326 audit(987.080:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.0.352" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 987.785596][ T30] audit: type=1326 audit(987.090:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.0.352" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 987.875113][ T30] audit: type=1326 audit(987.110:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.0.352" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 987.876224][ T30] audit: type=1326 audit(987.120:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.0.352" exe="/syz-executor" sig=0 arch=c00000b7 syscall=269 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 987.876744][ T30] audit: type=1326 audit(987.130:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.0.352" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 987.960152][ T30] audit: type=1326 audit(987.220:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.0.352" exe="/syz-executor" sig=0 arch=c00000b7 syscall=24 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 987.966696][ T30] audit: type=1326 audit(987.270:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.0.352" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 987.990921][ T30] audit: type=1326 audit(987.270:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4461 comm="syz.0.352" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb235aba8 code=0x7ffc0000 [ 996.937443][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 996.943939][ T30] audit: type=1400 audit(996.250:584): avc: denied { ioctl } for pid=4474 comm="syz.0.356" path="socket:[7229]" dev="sockfs" ino=7229 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1002.690896][ T30] audit: type=1400 audit(1002.000:585): avc: denied { name_bind } for pid=4477 comm="syz.0.357" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1002.706672][ T30] audit: type=1400 audit(1002.020:586): avc: denied { node_bind } for pid=4477 comm="syz.0.357" saddr=224.0.0.2 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1020.002765][ T30] audit: type=1400 audit(1019.290:587): avc: denied { write } for pid=4481 comm="syz.1.358" name="tcp6" dev="proc" ino=4026532755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1020.101975][ C1] hrtimer: interrupt took 89964160 ns [ 1022.508431][ T30] audit: type=1400 audit(1021.820:588): avc: denied { read } for pid=4484 comm="syz.1.359" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1022.549324][ T30] audit: type=1400 audit(1021.860:589): avc: denied { open } for pid=4484 comm="syz.1.359" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1022.802992][ T30] audit: type=1400 audit(1022.060:590): avc: denied { ioctl } for pid=4484 comm="syz.1.359" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1022.804054][ T30] audit: type=1400 audit(1022.060:591): avc: denied { set_context_mgr } for pid=4484 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1022.868515][ T4485] binder: 4484:4485 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 1022.871164][ T4485] binder: 4485 RLIMIT_NICE not set [ 1024.063482][ T4486] xt_l2tp: missing protocol rule (udp|l2tpip) [ 1024.119994][ T30] audit: type=1400 audit(1023.430:592): avc: denied { append } for pid=4484 comm="syz.1.359" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1035.134942][ T30] audit: type=1400 audit(1034.430:593): avc: denied { setopt } for pid=4494 comm="syz.1.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1039.640544][ T30] audit: type=1400 audit(1038.950:594): avc: denied { create } for pid=4498 comm="syz.0.365" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1042.336702][ T30] audit: type=1400 audit(1041.640:595): avc: denied { unlink } for pid=3302 comm="syz-executor" name="file0" dev="tmpfs" ino=1135 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1044.384916][ T4507] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1044.409034][ T4507] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1052.215769][ T4520] x_tables: duplicate underflow at hook 4 [ 1055.197062][ T4524] capability: warning: `syz.1.375' uses deprecated v2 capabilities in a way that may be insecure [ 1069.259391][ T30] audit: type=1400 audit(1068.570:596): avc: denied { name_bind } for pid=4537 comm="syz.1.382" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1108.049691][ T30] audit: type=1400 audit(1107.360:597): avc: denied { execute } for pid=4549 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1108.205019][ T30] audit: type=1400 audit(1107.500:598): avc: denied { execute_no_trans } for pid=4549 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1110.973662][ T30] audit: type=1400 audit(1110.270:599): avc: denied { mounton } for pid=4553 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1119.546653][ T30] audit: type=1400 audit(1118.860:600): avc: denied { create } for pid=4564 comm="syz.1.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1165.115187][ T30] audit: type=1400 audit(1164.430:601): avc: denied { write } for pid=4651 comm="syz.1.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1165.117937][ T4655] netlink: 148 bytes leftover after parsing attributes in process `syz.1.392'. [ 1165.155269][ T4655] netlink: 116 bytes leftover after parsing attributes in process `syz.1.392'. [ 1165.156868][ T4655] netlink: 24 bytes leftover after parsing attributes in process `syz.1.392'. [ 1167.216150][ T54] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1167.925061][ T54] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1168.407849][ T54] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1169.054673][ T54] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1169.285242][ T4666] netlink: 4 bytes leftover after parsing attributes in process `syz.1.394'. [ 1171.735418][ T30] audit: type=1400 audit(1171.050:602): avc: denied { read } for pid=3147 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1172.608064][ T30] audit: type=1400 audit(1171.920:603): avc: denied { mount } for pid=4678 comm="syz.1.397" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1172.650944][ T30] audit: type=1400 audit(1171.960:604): avc: denied { unmount } for pid=4678 comm="syz.1.397" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1176.401188][ T54] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1176.516881][ T54] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1176.617477][ T54] bond0 (unregistering): Released all slaves [ 1177.243995][ T54] hsr_slave_0: left promiscuous mode [ 1177.303814][ T54] hsr_slave_1: left promiscuous mode [ 1177.546255][ T54] veth1_macvtap: left promiscuous mode [ 1177.548550][ T54] veth0_macvtap: left promiscuous mode [ 1177.574917][ T54] veth1_vlan: left promiscuous mode [ 1177.577306][ T54] veth0_vlan: left promiscuous mode [ 1193.559743][ T4553] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1193.692953][ T4553] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1200.040574][ T4553] hsr_slave_0: entered promiscuous mode [ 1200.075349][ T4553] hsr_slave_1: entered promiscuous mode [ 1202.662252][ T4553] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1202.687557][ T4553] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1202.759503][ T4553] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1202.794001][ T4553] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1207.883783][ T4553] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1224.529424][ T4797] xt_hashlimit: max too large, truncated to 1048576 [ 1226.464846][ T4553] veth0_vlan: entered promiscuous mode [ 1226.677795][ T4553] veth1_vlan: entered promiscuous mode [ 1227.127126][ T4553] veth0_macvtap: entered promiscuous mode [ 1227.215789][ T4553] veth1_macvtap: entered promiscuous mode [ 1227.664176][ T4553] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1227.664683][ T4553] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1227.664863][ T4553] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1227.665027][ T4553] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1228.608318][ T30] audit: type=1400 audit(1227.900:605): avc: denied { mounton } for pid=4553 comm="syz-executor" path="/syzkaller.mLVkDH/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1228.685304][ T30] audit: type=1400 audit(1227.960:606): avc: denied { mount } for pid=4553 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1228.804506][ T30] audit: type=1400 audit(1228.080:607): avc: denied { mount } for pid=4553 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1228.886684][ T30] audit: type=1400 audit(1228.200:608): avc: denied { mounton } for pid=4553 comm="syz-executor" path="/syzkaller.mLVkDH/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1228.906637][ T30] audit: type=1400 audit(1228.210:609): avc: denied { mounton } for pid=4553 comm="syz-executor" path="/syzkaller.mLVkDH/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=8434 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1228.950805][ T30] audit: type=1400 audit(1228.260:610): avc: denied { unmount } for pid=4553 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1228.999847][ T30] audit: type=1400 audit(1228.310:611): avc: denied { mounton } for pid=4553 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1229.010967][ T30] audit: type=1400 audit(1228.320:612): avc: denied { mount } for pid=4553 comm="syz-executor" name="/" dev="gadgetfs" ino=3564 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1229.050777][ T30] audit: type=1400 audit(1228.360:613): avc: denied { mount } for pid=4553 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1229.064347][ T30] audit: type=1400 audit(1228.370:614): avc: denied { mounton } for pid=4553 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1253.567148][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1253.573440][ T30] audit: type=1400 audit(1252.880:617): avc: denied { create } for pid=4848 comm="syz.2.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1253.670847][ T30] audit: type=1400 audit(1252.980:618): avc: denied { connect } for pid=4848 comm="syz.2.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1253.680532][ T30] audit: type=1400 audit(1252.990:619): avc: denied { setopt } for pid=4848 comm="syz.2.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1294.862962][ T30] audit: type=1400 audit(1294.170:620): avc: denied { write } for pid=4888 comm="syz.2.418" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1297.020033][ T4858] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1297.323764][ T4858] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1302.514658][ T4620] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1302.969345][ T4620] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1303.419816][ T4620] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1304.339405][ T4620] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1314.284158][ T4620] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1314.523868][ T4620] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1314.718918][ T4620] bond0 (unregistering): Released all slaves [ 1315.889770][ T4620] hsr_slave_0: left promiscuous mode [ 1315.941033][ T4620] hsr_slave_1: left promiscuous mode [ 1316.196909][ T4620] veth1_vlan: left promiscuous mode [ 1316.223323][ T4620] veth0_vlan: left promiscuous mode [ 1328.041191][ T4858] hsr_slave_0: entered promiscuous mode [ 1328.099367][ T4858] hsr_slave_1: entered promiscuous mode [ 1328.133953][ T4858] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1328.136938][ T4858] Cannot create hsr debugfs directory [ 1332.023528][ T30] audit: type=1400 audit(1331.320:621): avc: denied { create } for pid=4921 comm="syz.2.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1332.055013][ T30] audit: type=1400 audit(1331.370:622): avc: denied { getopt } for pid=4921 comm="syz.2.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1333.009967][ T30] audit: type=1400 audit(1332.320:623): avc: denied { setcurrent } for pid=4924 comm="syz.2.423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1333.035633][ T30] audit: type=1401 audit(1332.330:624): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 1333.890536][ T4858] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1334.098812][ T4858] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1334.296105][ T4858] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1334.608901][ T4858] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1334.865793][ T4931] wg2: entered promiscuous mode [ 1334.866798][ T4931] wg2: entered allmulticast mode [ 1337.695967][ T4947] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1337.718965][ T4947] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1341.900830][ T4858] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1346.936680][ T4972] input: syz1 as /devices/virtual/input/input5 [ 1356.187534][ T4985] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4985 comm=syz.2.433 [ 1356.201197][ T4985] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4985 comm=syz.2.433 [ 1359.487403][ T4997] Unable to handle kernel paging request at virtual address dfff800000000035 [ 1359.489183][ T4997] KASAN: null-ptr-deref in range [0x00000000000001a8-0x00000000000001af] [ 1359.489937][ T4997] Mem abort info: [ 1359.490367][ T4997] ESR = 0x0000000096000005 [ 1359.490900][ T4997] EC = 0x25: DABT (current EL), IL = 32 bits [ 1359.492144][ T4997] SET = 0, FnV = 0 [ 1359.492641][ T4997] EA = 0, S1PTW = 0 [ 1359.493072][ T4997] FSC = 0x05: level 1 translation fault [ 1359.493483][ T4997] Data abort info: [ 1359.493872][ T4997] ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000 [ 1359.494303][ T4997] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 1359.494796][ T4997] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 1359.495300][ T4997] [dfff800000000035] address between user and kernel address ranges [ 1359.497162][ T4997] Internal error: Oops: 0000000096000005 [#1] SMP [ 1359.503752][ T4997] Modules linked in: [ 1359.505917][ T4997] CPU: 1 UID: 0 PID: 4997 Comm: syz.2.436 Not tainted 6.16.0-rc5-syzkaller #0 PREEMPT [ 1359.506961][ T4997] Hardware name: linux,dummy-virt (DT) [ 1359.507891][ T4997] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1359.508570][ T4997] pc : htb_qlen_notify+0x30/0xb8 [ 1359.509083][ T4997] lr : qdisc_tree_reduce_backlog+0x19c/0x398 [ 1359.509513][ T4997] sp : ffff80008dcf6fa0 [ 1359.509928][ T4997] x29: ffff80008dcf6fa0 x28: 1ffff00010c8e7a8 x27: ffff800086473d20 [ 1359.511057][ T4997] x26: 00000000000affe0 x25: ffff800086473d40 x24: 0000000000000000 [ 1359.512058][ T4997] x23: 0000000000000000 x22: 00000000000001a8 x21: 0000000000000035 [ 1359.513045][ T4997] x20: ffff0000140b6000 x19: 0000000000000000 x18: 0000000000000000 [ 1359.513957][ T4997] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000001 [ 1359.514827][ T4997] x14: 00000000000246ce x13: 0000000000000000 x12: 0000000000000006 [ 1359.515673][ T4997] x11: 0000000000000002 x10: ffff00000fb4c710 x9 : ffff800089773000 [ 1359.516681][ T4997] x8 : 0000000000000000 x7 : 00a241a92305cd1c x6 : ffff00000fb4c760 [ 1359.518180][ T4997] x5 : 0000000000000000 x4 : 000000006ea48840 x3 : 0000000000000000 [ 1359.519131][ T4997] x2 : dfff800000000000 x1 : 0000000000000003 x0 : ffff0000140b6000 [ 1359.520169][ T4997] Call trace: [ 1359.520869][ T4997] htb_qlen_notify+0x30/0xb8 (P) [ 1359.521854][ T4997] qdisc_tree_reduce_backlog+0x19c/0x398 [ 1359.522579][ T4997] codel_change+0x558/0x998 [ 1359.523026][ T4997] codel_init+0x26c/0x378 [ 1359.523509][ T4997] qdisc_create+0x2e4/0xc04 [ 1359.524079][ T4997] tc_modify_qdisc+0xb80/0x17bc [ 1359.524562][ T4997] rtnetlink_rcv_msg+0x2e8/0x8d4 [ 1359.525073][ T4997] netlink_rcv_skb+0x198/0x334 [ 1359.525536][ T4997] rtnetlink_rcv+0x18/0x24 [ 1359.526008][ T4997] netlink_unicast+0x3c0/0x670 [ 1359.526503][ T4997] netlink_sendmsg+0x644/0xa54 [ 1359.526968][ T4997] __sock_sendmsg+0xc8/0x168 [ 1359.527425][ T4997] ____sys_sendmsg+0x504/0x768 [ 1359.527890][ T4997] ___sys_sendmsg+0x11c/0x19c [ 1359.528337][ T4997] __sys_sendmsg+0x114/0x19c [ 1359.528801][ T4997] __arm64_sys_sendmsg+0x70/0xa0 [ 1359.529251][ T4997] invoke_syscall+0x6c/0x258 [ 1359.529685][ T4997] el0_svc_common.constprop.0+0xac/0x230 [ 1359.530157][ T4997] do_el0_svc+0x40/0x58 [ 1359.530643][ T4997] el0_svc+0x50/0x198 [ 1359.531073][ T4997] el0t_64_sync_handler+0x10c/0x138 [ 1359.532146][ T4997] el0t_64_sync+0x198/0x19c [ 1359.533372][ T4997] Code: a90153f3 aa0003f4 aa0103f3 52800061 (38e26aa0) [ 1359.535208][ T4997] ---[ end trace 0000000000000000 ]--- [ 1359.536789][ T4997] Kernel panic - not syncing: Oops: Fatal exception in interrupt [ 1359.537970][ T4997] SMP: stopping secondary CPUs [ 1359.539901][ T4997] Kernel Offset: disabled [ 1359.540352][ T4997] CPU features: 0x1040,000800d0,02000800,0400421b [ 1359.540921][ T4997] Memory Limit: none [ 1359.542065][ T4997] Rebooting in 86400 seconds.. VM DIAGNOSIS: 02:43:40 Registers: info registers vcpu 0 CPU#0 PC=ffff800080010068 X00=ffff80008df16e20 X01=ffff800080010000 X02=1fffe00001f69b5c X03=1fffe00001f69b59 X04=0000013c88941660 X05=ffff80008df16cc8 X06=ffff80008df16ce0 X07=ffff80008df16dc0 X08=ffff80008df16c68 X09=dfff800000000000 X10=ffff700011be2d8c X11=1ffff00011be2d8c X12=ffff700011be2d8d X13=0000000000000000 X14=0000aaaadbcf7000 X15=0000aaaadbaf9000 X16=ffff800080000000 X17=ffff7fffe303b000 X18=1ffff00011be2e5a X19=000000000000001e X20=000000000000001e X21=ffff80008df16da1 X22=ffff8000870c0b28 X23=ffff80008d4b000c X24=dfff800000000000 X25=ffff80008d4b0000 X26=ffff00000fb4dac8 X27=ffff00000fb4dac0 X28=ffff600001f69b59 X29=ffff800080007f90 X30=ffff8000800194dc SP=ffff800080007f90 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=6572207265767265:730073250a0d0a0d Q02=2073736572646461:206c617574726976 Q03=0000000000000000:00ff00ff00000000 Q04=0000000000000000:000000000f0f0000 Q05=7461207473657571:657220676e696761 Q06=6170206c656e7265:6b20656c646e6168 Q07=2074612074736575:71657220676e6967 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff15ed220:0000fffff15ed220 Q17=ffffff80ffffffd8:0000fffff15ed1f0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008033eab8 X00=00000000000000c0 X01=0000000000000000 X02=1fffe00001f69791 X03=0000000000000000 X04=0000000000000000 X05=ffff8000871d0e00 X06=ffff700010e3a1c0 X07=0000000000000001 X08=ffff8000871d0e00 X09=dfff800000000000 X10=ffff700010e3a1c0 X11=1ffff00010e3a1c0 X12=ffff700010e3a1c1 X13=0000000000000001 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff8000871d09a0 X20=00000000000000c0 X21=ffff800080345d84 X22=ffff8000871d09a0 X23=0000000000000000 X24=1ffff00011b9ed12 X25=0000000000000001 X26=ffff800080345f7c X27=dfff800000000000 X28=ffff00000fb4bc80 X29=ffff80008dcf6820 X30=ffff80008033eaac SP=ffff80008dcf6820 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2f2f2f2f2f2f2f2f:2f2f2f2f2f2f2f2f Q01=6368642f62696c2f:0000aaaae147fd80 Q02=0000003300000033:cccc000000000000 Q03=000000ff000000ff:0000000000000000 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:00030003cc000000 Q06=0000ffffacd5ea98:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000