last executing test programs: 31.012971176s ago: executing program 1 (id=443): r0 = socket$kcm(0x11, 0x200000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001540)=ANY=[@ANYBLOB="bf16000000000000b7070000000100004870000000000000500000000000000095000000000000002ba728041598fbd30cb599e83d24a3aa81d36bb3019c13bd23212fb56fa54f2641d8b02c3815e79c1414eb07eae6f0711e6bd917487960717142fa9ea4318123f602000000000080de89e661168c1886d0d4d94f204e34ff65c26e278ef5b915395b19284a1a4bc72fbc1626e3a2a2ad358061d0ae0209e62f51ee988e6ea604ce974a22a550d6f97080980400003e05df3ceb9f1feae5737ecaa80a666963c474c2a100c788b277beee1cbf9b0a4d3881dcc7b1b85f3c3d44aeaccd3641110bec4e90a6341965c39e4b3431abe802f5ab3e89cf6c662ed4048d3b3e22278d00ce00000000d3a02762c2951257b85802189d74005d2a1bcf9436e192e23fd275985bf31b714f000bcab6fcd610f25f5888000000003f11afc9bd08c6ebfbb89432fb465bc52f49129b9b6150e320c9901de2ebb9000000018e3095c4c5c7a156cec33a667dccaff950ca1e5efdd4c968dacf81baa3a509b1041d06f6b0097c430481824a3f4fddd3c643f630ba175d876defd3541772f26e27c44cfdb2d85d6d29983e830a9cdd79837b3468e8c67a571d0a017c100344c52a570dd39877dfb2ff1ae66e1ce917474b2e650ae630afd086004c4a56c6cce6e51723257c872c5255f20100000000000000f041b665ab21372c8d8b7bac5b5c784d20a4a24d8dbd75062e1daef9dead619cc6e7baa72707157791c3d2a286ffb8d35452bb5d36c2a8682bf7ecbd53f950ef4709ec01e230d2f53594ef4839c6130c4c13a0cca84b9935f771fd49e480cd9d48aeb12b1d6acabd38a817bcd222614d1f62734d679039a97d2b74f9e8e997ccd314000f7477137f4e8e7025123e783df8b8a17e3aa9fe1f662aef87a065b03cfb65b4dfe4f1b56e1f23128d743753a1de172d683d5892ce9414a1d98ea93e3d35dbb6c23b90cf36e83b8a434a97d09343d7f83079ccb02e69d384146056d125cfa788237874dd42dae334bda042819a2aa24dba1c25be2794448b4f63483026b5e34d44705b76ef29241adab0dd7d68bf975e02069f6f2425e1bc97a3d588085f16bef63a06578d4f5de7bfb6aaa75f16996d536256c02284cb1d3a6fb8cae87691fae365a70c3fc69e1565bba8dd8a8ca049f798abe646f738bebd69413afc9d8a5edd7aaa000000000000001e6c2f2a287c5278a218dbfaffffff00a14db5cfa6819eb1d39c48cfdc80d215c9e16e0c4736c819363154cca4e2f89800d18c89d7f46f679df6c9e2952ae1ebfd0ca88368ee6ce139e8b5822c22cf2e9dde943d34c432e1001171792c65986146666a5490928441f47e0fe5eac41824ca1fd0eb71aa243c88d5480efd8329d9a733d8f9ffffff5f912ac4e34bf6ea8a86da707b03bddb491ba0cc98f6be92c50008a2b50025419d1476c73132ca7ca26ce8a7e3ffb700f09e157f9b844051f1a642aca9ff98c9036471ccff0522903e7bcf62e18f7696bbc280b95e8e0d6fd5644b0ebde3a95b06548862de809d3dae3cccf109f7c78e8479a345e800000000000000000000009455bf417627ce723a5d9103706aba69279500bb82f6b5a3ddc0bd9856712945b70c75ce5b722578820820d010d7a3cffc99fc647d0b82ef26ab708c0b19ed144be51c3b398f0e6bb7a30006000000cba12953d58cff0f0378740fe6662f377b97d8e7cdb047acd083d3cd3856476a60a49ad127ba6570bafc2bbcf9ee721fd9cb467ff071e5604fbf0491245c0000007d932d7a64de4c4aa433fc0840aff7c47da3a4c6966d0000000000000000f6bfbae29e8a6e2a889f6ef6869d82d6bd73eb76b65c7a35a54a4a6b8ad4600e3a972a0bb5971a5f16590b0a03dafa3fd1118765cc8ab9fccf3b51c41a339f200f2fa33006910a679a9ae0187b4d750c4bd244cb0cbfd23b265f4d4da448a7a0d19c5e430a31609dfa2dde267551467eb6475293dd7012cc449009981f22820e57a0eff234ccfe21d7a2302e000669753d3c3432cc14ee1abe724adb6b5431befedd3e22971118f0e21aed1823cb7dde8212a8531bd9691dd4cc6a370e9eb56b3d790b98f2bd0db1e5de6a146597b2cbb7103040d2a39d7965d34df524b760ab92efcce7dd1574052c735935bf6a752c015c7f5ffee9ff66e5dd2866b15b6e0d17618cb1f5c1ee4b051f47db7aa110f499f840a5c965443d725556351ee25fe09f69494b053678dcadcf02e063dff2fa4bef1ac3bbbebe6c74d71ec3b23e29895eff1d1017024fe3e8cc759b05785adc346b7ffd05963f92c1d0d7d90ba878ad89e490f3e29ac51d30632869a534418f916bf6fe8167827a8e6c8f8b391c822805cb0adf1b8bd6947ff208753eb0d208ce14f7b206b2e02c21e963abc5ceb735c1b3c46b0a843de52a903375dfb663a8d8ee9c2b2705c1a81d9d3b9656b219c8cd99c9cafcd0d0540884d97aecb19983fc6af29ab44a82aff9cba921192c665b877af6539bdb1b567f481ba07982e7ad758f4e1eac69e7e88a63960975f490e161e371ec8534791e3b61c685d900a9c0839208356b53750e76fcc3c2d1bddcbd83897921414d0c02e8188f3df79ea2a5c5444004830e6cb227ca1bdafb977c00000000003a417193b8c5d793687335a930867094fd6a78218218e04b705ec62f1608cb569b81914e68f175b392af6bc4fd2121d7fd276af2c97a441b56e7a0687d98b8e76d8d0d231e4fe00be1de76bd19cc12e2bd938eb681ed6bc951c1b4f7c51af59eea4d40c6000000000200778a677b72786311153271a3313da02645e11761699e4d04ac86dd14ff7b9a10d3fa74696fe3953a5b7706bf5d1faba4b18808d9cb0e9db696dec4e0820ee4028d7225a2c9c427cf64cbde6fba056b2006b7a37c1181d530fb865e235cd302f3b4071ee5237ada986b9e5e3144bf479f277f10656ad3744037ccc9c63685a6f1109d2ea73773d3635f61497f1fa1ea4a16f601800bf3e59141fbf05a96113320c445f9ba8596970d5254727e804fbd99ccefb7c09269dd2c5c25e56e169ac15980f3f85f7ca36dd5950ef5b64fd46f123311829534a82940994199b3cf7a8fabea9930952f5da9b909c1946e55289f668c423fcbb31ae91864c882313151741a67538c9689dc8ecc9903c7041e5c0704e2fa55a756487517a7445cbd9e3f5175e41c0000000000000000000a000000bf98efd587fffe326f474b0b089c017b16c0062cbce96f5adebec52a79f9363909842f79c50a1520be46d87003137e4c5031f00123e812a5e37cd52c9eb7336281cb8c6ce9934b157d7875a70eaf103cb3938e2361c51cd1eab8a26b232acf6bf0ab829c26dab637538b2eb1420d812d2b80c777710ba0f18e4661681aa218d9ba54023ab4305d77eb15611ae2545835e9d30e9f6d4fb43a291c69545a1eea0f8720431132d8549f99bf6c5cb060da70cbb59d0a000000000034d083fc37d2449f72de0cbea4bc1dc89c136cdbc504f849d5502d77a95c7bfff4cd9c03058d0d4d07ea64824f1acf2b39389f675f39d01719cdbab3f1ce10609c8d7b3e37cb99b41da5e485a441b6a103549f55ab09dc98767763d1f2fafd45bb7d2b40050d1f8292f4d9ec6d0000000000003932062290f4996fdd55b06023437e9e2072daf7f5d82f6f1b5b89a41134f4dc2e65bb11272fdf8c8141f41d6160b3d8b6ecd16d14267f61b4881adee7f07f3d6af5ae79e16fe2c3f55ac7a6392d2e1d9b4286b6c3e1f5a76b85ed6e1f0000c67e6c5fcdc8c39381be4799b8cb2d08b8262c807dd755e22b801162381aa9d1af2bbc9cfd497585337eac408b8475b47a392a10cae349160f128e5f873a58064eb400c36a90624f6aed398a215e9ce64522ab249f67c38a656d32ecff5cdb2b039c4abf349d2c0f88a42e9189bbfa7f5cf35b6e7ef8f9d33163b7ea875583e3aec4714c9c4ca3ecb04f2720237615a28bf310b58ffa2a103216fdcc8c2d8f5d55e5e7ebf147105272aaae56e86d856b3cf79a3f7306436762dd1a08ce873e07cebc7892ec6f9f696da38feed3dc0001500e34adae1ba89a32bad2af9030f840f1ba46cdadd5cbacc59352c290f55d971b65953533668c25f21d8d62d849e9058eaa97c63491568887548f668cdbca2abf01a361a0b64d8b523e669da350e3ec7445dfbf366b0b3bc5e76824a1e43eaaeca70db90f2fa39596443447671933079a24fe3681ad9ac361f71ac279a688f10a1cc4df1112105edebc5e3bbc394c8305ab129ca2dfb9b7c5e9d097bd01b495cccefddce569117f7f5d6a6270ff0f0f4c371029ca8489571b55841bf3dd003bc81460eee57ceb3c33f4e9300b0144fe040cf5fcfcbb616c2070237881afdb314cecd1623f3e55ab8b7627fa1be349145a8d6313cbc790eefe2020138e82fb9d351be4ddcbcc9bc048dd3db5828d16baec6e07a007f0030f34ea3cfd524d6fa1d45da5641d6c94e1d3ae7fba1c85035d2a60ef1696e0d96aa1c60019f73ae0aa6113cd66ef26b5777337c26e1461405d86fdf091edd526f25cada439bb3609ed5c35ab60a539ade786bd6004d0ea3edbd6c4da0d8e8be8c771c8c8a0b07d9859e04adb18964dcce9bce546074c26dffbc2df372a016e8c845d4257000000000000000000000000000000000000f29657697d9c2b132b2dc2f5ea5122836582a7e85fe2bc166f17aefd9d861de0191f5277d4a3b5afb6f23d9eea2459f7844606e1202768d83c24cc791bde44a448022bbfa571fe029a7b2d5152639ee283894ab6168992ff0acc01b39a078f285ce615351f262019586eb9447bb3eaffd7b53d8f37ca6c5f1027dd5b7592996c8a7789ba108979cc9ad07ed86682843e2eaa855dd01443ee6ffde1811f10039d5d14458177096e15cc4d8f2582a1bea5ccb9f10f615c87c441dc50a244bc138a1cae9868c3079bafe69769000000000000000000e99b63029d219cd3545a8426b56554a9f265d3557eefb3602894507c256cb8ee9ebadfecb6afeb84ba757bfa8d00a5af0dd6aa1e8144ef8ef04410d52204c335408941b8eccc5c734cc6a05247142ed647f89bcb5c043acfb382b9cc918bc3cdc368983157851cdf678800aa7eb2a6cbc12c7ae23bc88b8f10223ab2a093429f3f6965bc5af0114cf6f246e891e20ecaad7059866506c3000000000c3230e901e885b7a4a36bdfdb5ce7a2e5807a0f4c1d461d1243fccf51b875b49490cd7d044e7a1e1a4c013fae1f070a8a37ab90da2efc6c875b3aab34b75a252072691fc97bef0fed8ee597ab83bb53f89c36bc2ee3ad54904542f66dc94132df75fc9944882d6f2e13b7057e0000000000000000000000000000000000001b726c0ccd24000000000000cfd2f4d005578b9ed06e1c41ef3b411066739de953d39b968caaca1507928d68c8f052"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe89}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000200), 0xfffffd9d) sendfile(r2, r3, 0x0, 0x8000002b) 30.890013998s ago: executing program 1 (id=444): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x4c, 0x30, 0x0, 0x0, 0x0, {}, [{0x38, 0x1, [@m_tunnel_key={0x34, 0x0, 0x0, 0x0, {{0xf}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x4c}}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3400000013000100000000000000000007000000", @ANYRES32=r1, @ANYBLOB="000000000000000014001a80100004800c000280080001"], 0x34}}, 0x0) 30.681285516s ago: executing program 1 (id=445): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000400)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000280)=0x3f3f, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x9, 0x4) sendto$inet(r0, &(0x7f0000000080)='m', 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=""/199, 0xc7}, 0x40002000) 30.460942056s ago: executing program 1 (id=446): prlimit64(0x0, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r3, 0x29, 0x19, &(0x7f0000000040)=0xb0, 0x4) 22.952188087s ago: executing program 1 (id=450): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000003a"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) syncfs(r2) 22.212929084s ago: executing program 1 (id=451): socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f0000000380), 0x5, r0}, 0x38) r1 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180800000000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000300)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = getpid() sched_setscheduler(r3, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = accept4(r4, 0x0, &(0x7f0000000000), 0x80800) mmap(&(0x7f0000105000/0x4000)=nil, 0x4000, 0x1000007, 0x2172, r6, 0x7d0d3000) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r8, @ANYBLOB="00000000000000006200000000000000180000000000000000000000000000009500000000000000b50a00000000000095000000000000001315c1"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x900}, 0x21) sendmsg$WG_CMD_SET_DEVICE(r7, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001980)={&(0x7f0000000340)=ANY=[@ANYBLOB="c8000000", @ANYRES16, @ANYBLOB="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"], 0xc8}}, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000005000/0x4000)=nil) r9 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000004640)={&(0x7f0000000540)=@newqdisc={0x78, 0x1a, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, {0x0, 0x40000}}}}]}, 0x78}}, 0x8884) 2.305748554s ago: executing program 0 (id=459): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r3}, 0x10) write$cgroup_pid(r2, &(0x7f0000000380), 0x12) 2.02125412s ago: executing program 0 (id=460): setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 1.701781928s ago: executing program 0 (id=461): sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000006c0)={0x14}, 0x14}}, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000a00)={0xa8, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x90, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_REKEYING={0x8}, @TIPC_NLA_NODE_REKEYING={0x8}, @TIPC_NLA_NODE_ID={0x6d, 0x3, "21943526416b53b0f293a420b0a9394ff01634cb2c287bc55b1213b394944336119a739711cdcbbb8f24f8b3eb8d39ef40cc88b50f6a4a70bec1128c936bce8746e8719a09a3e9eeb0bb0e2a952c0a6d750137b25ec19bef2e20b468f73398bd5cc9dfcb1e3ab55628"}, @TIPC_NLA_NODE_REKEYING={0x8}]}, @TIPC_NLA_NODE={0x4}]}, 0xa8}}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x1c}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0xbe8}, {&(0x7f00000007c0)=""/154, 0x8}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 1.420595263s ago: executing program 0 (id=462): landlock_restrict_self(0xffffffffffffffff, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10001) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, &(0x7f0000001880)=[{&(0x7f0000001a80)=""/102400, 0x19000}], 0x1, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000006c0)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg$inet(r1, &(0x7f0000000380)=[{{0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6000}}], 0x300, 0x0) 136.458198ms ago: executing program 0 (id=463): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000800000000000000100000094"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="13070000000000000000010000001c0002800c00018008000100050000000c00018008000100060008"], 0x30}}, 0x0) 0s ago: executing program 0 (id=464): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_GETMODE(r0, 0x5601, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10001) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r3 = userfaultfd(0x1) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f00000000c0)) r4 = io_uring_setup(0x3eae, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1}) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, r5) ioctl$UFFDIO_COPY(r3, 0xc028aa05, &(0x7f0000000080)={&(0x7f0000c15000/0x1000)=nil, &(0x7f0000508000/0x4000)=nil, 0x1000}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONNECT(r6, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 51.947365][ T31] audit: type=1400 audit(51.880:68): avc: denied { read write } for pid=2995 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 51.952031][ T31] audit: type=1400 audit(51.880:69): avc: denied { open } for pid=2995 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:27690' (ED25519) to the list of known hosts. [ 60.601335][ T31] audit: type=1400 audit(60.500:70): avc: denied { name_bind } for pid=2996 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 62.269703][ T31] audit: type=1400 audit(62.200:71): avc: denied { execute } for pid=2998 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.331858][ T31] audit: type=1400 audit(62.260:72): avc: denied { execute_no_trans } for pid=2998 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.315002][ T31] audit: type=1400 audit(66.250:73): avc: denied { mounton } for pid=2998 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.317608][ T31] audit: type=1400 audit(66.250:74): avc: denied { mount } for pid=2998 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.335602][ T2998] cgroup: Unknown subsys name 'net' [ 66.346513][ T31] audit: type=1400 audit(66.280:75): avc: denied { unmount } for pid=2998 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.507057][ T2998] cgroup: Unknown subsys name 'hugetlb' [ 66.509488][ T2998] cgroup: Unknown subsys name 'rlimit' [ 66.790425][ T31] audit: type=1400 audit(66.720:76): avc: denied { setattr } for pid=2998 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.793178][ T31] audit: type=1400 audit(66.730:77): avc: denied { mounton } for pid=2998 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.794223][ T31] audit: type=1400 audit(66.730:78): avc: denied { mount } for pid=2998 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.006212][ T2999] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.008380][ T31] audit: type=1400 audit(66.940:79): avc: denied { relabelto } for pid=2999 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.012166][ T31] audit: type=1400 audit(66.940:80): avc: denied { write } for pid=2999 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.046039][ T31] audit: type=1400 audit(66.980:81): avc: denied { read } for pid=2998 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.047052][ T31] audit: type=1400 audit(66.980:82): avc: denied { open } for pid=2998 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.261412][ T2998] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 75.053793][ T31] audit: type=1400 audit(74.990:83): avc: denied { execmem } for pid=3000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 75.101735][ T31] audit: type=1400 audit(75.030:84): avc: denied { mounton } for pid=3002 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 75.102642][ T31] audit: type=1400 audit(75.030:85): avc: denied { mount } for pid=3002 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 75.103379][ T31] audit: type=1400 audit(75.030:86): avc: denied { read } for pid=3002 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.104194][ T31] audit: type=1400 audit(75.030:87): avc: denied { open } for pid=3002 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.106591][ T31] audit: type=1400 audit(75.040:88): avc: denied { mounton } for pid=3002 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 75.125494][ T31] audit: type=1400 audit(75.060:89): avc: denied { module_request } for pid=3003 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.176614][ T31] audit: type=1400 audit(75.110:90): avc: denied { sys_module } for pid=3002 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.940252][ T31] audit: type=1400 audit(75.870:91): avc: denied { ioctl } for pid=3002 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 77.099025][ T3002] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.105747][ T3002] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.287656][ T3003] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.294836][ T3003] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.008520][ T3002] hsr_slave_0: entered promiscuous mode [ 78.014151][ T3002] hsr_slave_1: entered promiscuous mode [ 78.362982][ T3003] hsr_slave_0: entered promiscuous mode [ 78.364661][ T3003] hsr_slave_1: entered promiscuous mode [ 78.366793][ T3003] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 78.367269][ T3003] Cannot create hsr debugfs directory [ 78.465035][ T31] audit: type=1400 audit(78.400:92): avc: denied { create } for pid=3002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.469840][ T3002] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 78.482643][ T3002] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.488998][ T3002] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.498401][ T3002] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.754238][ T3003] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.764430][ T3003] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.769377][ T3003] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.774722][ T3003] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 79.466022][ T3002] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.546539][ T3003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.325395][ T3002] veth0_vlan: entered promiscuous mode [ 82.349008][ T3002] veth1_vlan: entered promiscuous mode [ 82.410664][ T3002] veth0_macvtap: entered promiscuous mode [ 82.421898][ T3002] veth1_macvtap: entered promiscuous mode [ 82.503661][ T3002] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.504561][ T3002] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.505013][ T3002] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.505406][ T3002] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.660069][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 82.660157][ T31] audit: type=1400 audit(82.580:95): avc: denied { mount } for pid=3002 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 82.665612][ T31] audit: type=1400 audit(82.590:96): avc: denied { mounton } for pid=3002 comm="syz-executor" path="/syzkaller.W5TRsS/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 82.666942][ T31] audit: type=1400 audit(82.590:97): avc: denied { mount } for pid=3002 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 82.685948][ T31] audit: type=1400 audit(82.620:98): avc: denied { unmount } for pid=3002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 82.690557][ T31] audit: type=1400 audit(82.620:99): avc: denied { mounton } for pid=3002 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 82.711512][ T31] audit: type=1400 audit(82.640:100): avc: denied { mount } for pid=3002 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 82.855970][ T31] audit: type=1400 audit(82.790:101): avc: denied { read write } for pid=3002 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 82.857045][ T31] audit: type=1400 audit(82.790:102): avc: denied { open } for pid=3002 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 82.857984][ T31] audit: type=1400 audit(82.790:103): avc: denied { ioctl } for pid=3002 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 83.097779][ T31] audit: type=1400 audit(83.030:104): avc: denied { map_create } for pid=3681 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 83.802319][ T3003] veth0_vlan: entered promiscuous mode [ 83.834964][ T3003] veth1_vlan: entered promiscuous mode [ 84.026094][ T3003] veth0_macvtap: entered promiscuous mode [ 84.049366][ T3003] veth1_macvtap: entered promiscuous mode [ 84.162248][ T3003] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.162761][ T3003] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.163080][ T3003] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.163372][ T3003] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.782088][ T45] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 87.021342][ T45] usb 2-1: Using ep0 maxpacket: 16 [ 87.054037][ T45] usb 2-1: New USB device found, idVendor=0d49, idProduct=7010, bcdDevice= c.90 [ 87.055368][ T45] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 87.056384][ T45] usb 2-1: Product: syz [ 87.056609][ T45] usb 2-1: Manufacturer: syz [ 87.056830][ T45] usb 2-1: SerialNumber: syz [ 87.084817][ T45] usb 2-1: config 0 descriptor?? [ 87.094393][ T45] ums-onetouch 2-1:0.0: USB Mass Storage device detected [ 87.332429][ T3698] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 87.338241][ T3698] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 87.349885][ T45] usb 2-1: USB disconnect, device number 2 [ 91.274703][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 91.274805][ T31] audit: type=1400 audit(91.210:117): avc: denied { write } for pid=3689 comm="syz.0.6" name="tcp6" dev="proc" ino=4026532708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 105.206533][ T31] audit: type=1400 audit(105.140:118): avc: denied { create } for pid=3729 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 105.295783][ T31] audit: type=1400 audit(105.180:119): avc: denied { setopt } for pid=3729 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 105.563818][ T31] audit: type=1400 audit(105.500:120): avc: denied { create } for pid=3731 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 105.581651][ T31] audit: type=1400 audit(105.500:121): avc: denied { setopt } for pid=3731 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 105.582664][ T31] audit: type=1400 audit(105.510:122): avc: denied { bind } for pid=3731 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 105.583444][ T31] audit: type=1400 audit(105.510:123): avc: denied { name_bind } for pid=3731 comm="syz.0.12" src=65532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 105.584336][ T31] audit: type=1400 audit(105.510:124): avc: denied { node_bind } for pid=3731 comm="syz.0.12" saddr=172.20.20.0 src=65532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 105.611934][ T31] audit: type=1400 audit(105.540:125): avc: denied { write } for pid=3731 comm="syz.0.12" laddr=::1 lport=65532 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 105.613175][ T31] audit: type=1400 audit(105.540:126): avc: denied { connect } for pid=3731 comm="syz.0.12" laddr=::1 lport=65532 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 105.614151][ T31] audit: type=1400 audit(105.540:127): avc: denied { name_connect } for pid=3731 comm="syz.0.12" dest=65532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 110.448173][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 110.448276][ T31] audit: type=1400 audit(110.380:131): avc: denied { read } for pid=3747 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 114.403389][ T31] audit: type=1400 audit(114.340:132): avc: denied { create } for pid=3750 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 114.752397][ T31] audit: type=1400 audit(114.690:133): avc: denied { name_bind } for pid=3750 comm="syz.0.20" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 114.763220][ T31] audit: type=1400 audit(114.700:134): avc: denied { node_bind } for pid=3750 comm="syz.0.20" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 120.601182][ C0] hrtimer: interrupt took 10053456 ns [ 125.106073][ T31] audit: type=1400 audit(125.040:135): avc: denied { append } for pid=3770 comm="syz.0.24" name="nbd0" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 125.312987][ T3775] syz.0.26 uses obsolete (PF_INET,SOCK_PACKET) [ 125.318514][ T31] audit: type=1400 audit(125.250:136): avc: denied { ioctl } for pid=3774 comm="syz.0.26" path="socket:[3184]" dev="sockfs" ino=3184 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 126.851845][ T31] audit: type=1400 audit(126.780:137): avc: denied { connect } for pid=3780 comm="syz.0.29" lport=250 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 126.868671][ T31] audit: type=1400 audit(126.800:138): avc: denied { write } for pid=3780 comm="syz.0.29" laddr=172.20.20.10 lport=250 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 127.282262][ T31] audit: type=1400 audit(127.200:139): avc: denied { setopt } for pid=3784 comm="syz.0.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 127.283440][ T31] audit: type=1400 audit(127.200:140): avc: denied { write } for pid=3784 comm="syz.0.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 127.577662][ T3787] IPv6: NLM_F_REPLACE set, but no existing node found! [ 127.939068][ T31] audit: type=1400 audit(127.870:141): avc: denied { create } for pid=3788 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 127.955745][ T31] audit: type=1400 audit(127.890:142): avc: denied { write } for pid=3788 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 127.957402][ T31] audit: type=1400 audit(127.890:143): avc: denied { nlmsg_read } for pid=3788 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 129.270345][ T31] audit: type=1400 audit(129.200:144): avc: denied { getopt } for pid=3803 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 129.674600][ T3807] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 130.680748][ T31] audit: type=1400 audit(130.610:145): avc: denied { create } for pid=3815 comm="syz.1.46" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 130.702762][ T31] audit: type=1400 audit(130.630:146): avc: denied { map } for pid=3815 comm="syz.1.46" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2405 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 130.726156][ T31] audit: type=1400 audit(130.630:147): avc: denied { read write } for pid=3815 comm="syz.1.46" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2405 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 132.375219][ T3823] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 133.922055][ T31] audit: type=1400 audit(133.850:148): avc: denied { create } for pid=3833 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 133.925346][ T31] audit: type=1400 audit(133.860:149): avc: denied { bind } for pid=3833 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 133.929364][ T31] audit: type=1400 audit(133.860:150): avc: denied { write } for pid=3833 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 135.762729][ T31] audit: type=1400 audit(135.700:151): avc: denied { bind } for pid=3848 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 135.764381][ T31] audit: type=1400 audit(135.700:152): avc: denied { write } for pid=3848 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 136.426212][ T31] audit: type=1400 audit(136.360:153): avc: denied { create } for pid=3876 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 136.434308][ T31] audit: type=1400 audit(136.370:154): avc: denied { write } for pid=3876 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 137.064056][ T31] audit: type=1400 audit(136.970:155): avc: denied { create } for pid=3888 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 138.085767][ T31] audit: type=1400 audit(138.020:156): avc: denied { name_connect } for pid=3897 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 138.336139][ T31] audit: type=1400 audit(138.270:157): avc: denied { read } for pid=3901 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 139.574942][ C0] Illegal XDP return value 1603896156 on prog (id 15) dev veth1, expect packet loss! [ 139.613780][ T3907] A link change request failed with some changes committed already. Interface bond_slave_0 may have been left with an inconsistent configuration, please check. [ 140.337311][ T3911] netlink: 80 bytes leftover after parsing attributes in process `syz.1.71'. [ 140.993060][ T3915] netlink: 'syz.0.73': attribute type 10 has an invalid length. [ 140.996536][ T3915] netlink: 40 bytes leftover after parsing attributes in process `syz.0.73'. [ 141.009399][ T3915] A link change request failed with some changes committed already. Interface veth1 may have been left with an inconsistent configuration, please check. [ 142.142282][ T3929] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 142.215345][ T31] audit: type=1400 audit(142.150:158): avc: denied { create } for pid=3927 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 142.457265][ T31] audit: type=1400 audit(142.390:159): avc: denied { setopt } for pid=3927 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 142.558877][ T31] audit: type=1400 audit(142.490:160): avc: denied { ioctl } for pid=3927 comm="syz.0.79" path="socket:[3392]" dev="sockfs" ino=3392 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 143.043534][ T31] audit: type=1400 audit(142.980:161): avc: denied { connect } for pid=3938 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 143.096359][ T31] audit: type=1400 audit(143.030:162): avc: denied { listen } for pid=3938 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 143.446533][ T31] audit: type=1400 audit(143.380:163): avc: denied { shutdown } for pid=3942 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 144.120533][ T31] audit: type=1400 audit(144.050:164): avc: denied { name_bind } for pid=3948 comm="syz.0.85" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 146.489832][ T31] audit: type=1400 audit(146.420:165): avc: denied { bind } for pid=3962 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 147.041491][ T31] audit: type=1400 audit(146.970:166): avc: denied { ioctl } for pid=3963 comm="syz.0.91" path="socket:[2599]" dev="sockfs" ino=2599 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 148.420384][ T3984] netlink: 4 bytes leftover after parsing attributes in process `syz.0.98'. [ 148.434044][ T31] audit: type=1400 audit(148.370:167): avc: denied { nlmsg_read } for pid=3983 comm="syz.1.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 149.642769][ T31] audit: type=1400 audit(149.580:168): avc: denied { map } for pid=3982 comm="syz.0.98" path="socket:[2633]" dev="sockfs" ino=2633 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 150.104853][ T31] audit: type=1400 audit(150.040:169): avc: denied { setopt } for pid=3993 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 153.486624][ T4035] sch_fq: defrate 0 ignored. [ 153.655605][ T31] audit: type=1326 audit(153.590:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4036 comm="syz.1.115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 153.664003][ T31] audit: type=1326 audit(153.600:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4036 comm="syz.1.115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 153.673830][ T31] audit: type=1326 audit(153.600:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4036 comm="syz.1.115" exe="/syz-executor" sig=0 arch=40000028 syscall=316 compat=0 ip=0x130460 code=0x7ffc0000 [ 153.674973][ T31] audit: type=1326 audit(153.610:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4036 comm="syz.1.115" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 153.872624][ T31] audit: type=1400 audit(153.760:174): avc: denied { name_bind } for pid=4040 comm="syz.1.117" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 153.914708][ T31] audit: type=1326 audit(153.850:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4040 comm="syz.1.117" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x0 [ 158.061332][ T31] audit: type=1326 audit(157.990:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4048 comm="syz.1.119" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x0 [ 163.554135][ T31] audit: type=1400 audit(163.490:177): avc: denied { unmount } for pid=3003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 179.618395][ T31] audit: type=1400 audit(179.550:178): avc: denied { mount } for pid=4069 comm="syz.0.123" name="/" dev="ramfs" ino=3540 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 180.998606][ T4073] capability: warning: `syz.1.124' uses deprecated v2 capabilities in a way that may be insecure [ 181.575860][ T31] audit: type=1400 audit(181.510:179): avc: denied { unmount } for pid=3002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 182.127361][ T31] audit: type=1400 audit(182.060:180): avc: denied { create } for pid=4076 comm="syz.0.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 182.128444][ T31] audit: type=1400 audit(182.060:181): avc: denied { ioctl } for pid=4076 comm="syz.0.126" path="socket:[2742]" dev="sockfs" ino=2742 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 183.275933][ T31] audit: type=1326 audit(183.210:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4082 comm="syz.0.129" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x0 [ 184.129973][ T4085] syz.1.130[4085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.130385][ T4085] syz.1.130[4085] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.801336][ T8] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 186.981374][ T8] usb 1-1: Using ep0 maxpacket: 16 [ 186.985001][ T8] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 11 [ 186.985425][ T8] usb 1-1: config 1 interface 0 altsetting 3 endpoint 0xB has invalid wMaxPacketSize 0 [ 186.985731][ T8] usb 1-1: config 1 interface 0 altsetting 3 bulk endpoint 0xB has invalid maxpacket 0 [ 186.986060][ T8] usb 1-1: config 1 interface 0 altsetting 3 endpoint 0x8A has invalid wMaxPacketSize 0 [ 186.986289][ T8] usb 1-1: config 1 interface 0 altsetting 3 bulk endpoint 0x8A has invalid maxpacket 0 [ 186.986503][ T8] usb 1-1: config 1 interface 0 has no altsetting 0 [ 186.986852][ T8] usb 1-1: New USB device found, idVendor=04e6, idProduct=0003, bcdDevice= 1.77 [ 186.988023][ T8] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 187.032619][ T8] ums-sddr09 1-1:1.0: USB Mass Storage device detected [ 187.268339][ T8] scsi host0: usb-storage 1-1:1.0 [ 187.473337][ T8] usb 1-1: USB disconnect, device number 2 [ 188.494528][ T3723] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 188.835703][ T3723] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 188.837330][ T3723] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 188.840543][ T3723] usb 1-1: New USB device found, idVendor=046d, idProduct=c086, bcdDevice= 0.09 [ 188.865808][ T3723] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 188.895842][ T3723] usb 1-1: config 0 descriptor?? [ 189.485045][ T3723] logitech-hidpp-device 0003:046D:C086.0001: item fetching failed at offset 3/5 [ 189.489930][ T3723] logitech-hidpp-device 0003:046D:C086.0001: hidpp_probe:parse failed [ 189.490348][ T3723] logitech-hidpp-device 0003:046D:C086.0001: probe with driver logitech-hidpp-device failed with error -22 [ 189.575080][ T3692] usb 1-1: USB disconnect, device number 3 [ 195.871943][ T45] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 196.122880][ T45] usb 1-1: Using ep0 maxpacket: 16 [ 196.146290][ T45] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 11 [ 196.147032][ T45] usb 1-1: config 1 interface 0 altsetting 3 endpoint 0xB has invalid wMaxPacketSize 0 [ 196.171478][ T45] usb 1-1: config 1 interface 0 altsetting 3 bulk endpoint 0xB has invalid maxpacket 0 [ 196.173593][ T45] usb 1-1: config 1 interface 0 altsetting 3 endpoint 0x8A has invalid wMaxPacketSize 0 [ 196.174537][ T45] usb 1-1: config 1 interface 0 altsetting 3 bulk endpoint 0x8A has invalid maxpacket 0 [ 196.179213][ T45] usb 1-1: config 1 interface 0 has no altsetting 0 [ 196.191946][ T45] usb 1-1: New USB device found, idVendor=04e6, idProduct=0003, bcdDevice= 1.77 [ 196.192325][ T45] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 196.279885][ T45] ums-sddr09 1-1:1.0: USB Mass Storage device detected [ 196.465681][ T45] scsi host0: usb-storage 1-1:1.0 [ 196.682292][ T45] usb 1-1: USB disconnect, device number 4 [ 197.825659][ T3898] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 198.044031][ T3898] usb 1-1: Using ep0 maxpacket: 8 [ 198.055061][ T3898] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 198.056284][ T3898] usb 1-1: New USB device found, idVendor=05ac, idProduct=8501, bcdDevice=20.9d [ 198.056786][ T3898] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 198.077713][ T3898] usb 1-1: config 0 descriptor?? [ 198.343952][ T3898] usb 1-1: USB disconnect, device number 5 [ 199.097748][ T4190] netlink: 4 bytes leftover after parsing attributes in process `syz.0.142'. [ 199.372146][ T4190] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4190 comm=syz.0.142 [ 199.401947][ T31] audit: type=1400 audit(199.330:183): avc: denied { read } for pid=4189 comm="syz.0.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 199.758022][ T31] audit: type=1400 audit(199.690:184): avc: denied { mounton } for pid=4194 comm="syz.0.144" path="/proc/172/task" dev="proc" ino=2818 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 210.363568][ T31] audit: type=1400 audit(210.300:185): avc: denied { create } for pid=4214 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 210.993386][ T31] audit: type=1400 audit(210.930:186): avc: denied { connect } for pid=4214 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 211.066409][ T4221] vlan2: entered promiscuous mode [ 213.278494][ T4231] netlink: 8 bytes leftover after parsing attributes in process `syz.1.153'. [ 213.515066][ T31] audit: type=1400 audit(213.450:187): avc: denied { create } for pid=4232 comm="syz.1.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 213.554176][ T31] audit: type=1400 audit(213.490:188): avc: denied { write } for pid=4232 comm="syz.1.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 214.554223][ T31] audit: type=1400 audit(214.490:189): avc: denied { create } for pid=4238 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 214.582113][ T31] audit: type=1400 audit(214.490:190): avc: denied { bind } for pid=4238 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 214.596479][ T31] audit: type=1400 audit(214.530:191): avc: denied { listen } for pid=4238 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 217.995509][ T31] audit: type=1400 audit(217.920:192): avc: denied { getopt } for pid=4245 comm="syz.1.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 218.855793][ T31] audit: type=1400 audit(218.790:193): avc: denied { create } for pid=4251 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 218.864279][ T31] audit: type=1400 audit(218.800:194): avc: denied { bind } for pid=4251 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 221.514719][ T31] audit: type=1400 audit(221.450:195): avc: denied { accept } for pid=4268 comm="syz.0.166" laddr=fe80::42 lport=32980 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 221.672295][ T31] audit: type=1400 audit(221.600:196): avc: denied { create } for pid=4261 comm="syz.1.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 222.658410][ T4280] netlink: 16 bytes leftover after parsing attributes in process `syz.0.168'. [ 222.661956][ T31] audit: type=1400 audit(222.590:197): avc: denied { create } for pid=4273 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 222.662847][ T31] audit: type=1400 audit(222.590:198): avc: denied { write } for pid=4273 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 224.238860][ T31] audit: type=1400 audit(224.170:199): avc: denied { relabelfrom } for pid=4295 comm="syz.0.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 224.240645][ T31] audit: type=1400 audit(224.170:200): avc: denied { relabelto } for pid=4295 comm="syz.0.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 238.452221][ T4349] netlink: 'syz.1.186': attribute type 46 has an invalid length. [ 240.590252][ T31] audit: type=1400 audit(240.520:201): avc: denied { execute } for pid=4366 comm="syz.1.194" path="/97/cpuacct.usage_percpu_user" dev="tmpfs" ino=512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 241.202651][ T31] audit: type=1400 audit(241.130:202): avc: denied { associate } for pid=4371 comm="syz.1.196" name="0" dev="devpts" ino=3 scontext=system_u:object_r:mouse_device_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 244.148085][ T31] audit: type=1400 audit(244.080:203): avc: denied { node_bind } for pid=4376 comm="syz.1.198" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 260.519581][ T4414] netlink: 'syz.1.210': attribute type 13 has an invalid length. [ 268.122087][ T31] audit: type=1400 audit(268.050:204): avc: denied { write } for pid=4438 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 268.124052][ T31] audit: type=1400 audit(268.050:205): avc: denied { nlmsg_write } for pid=4438 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 268.673445][ T31] audit: type=1400 audit(268.600:206): avc: denied { connect } for pid=4442 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 268.676257][ T31] audit: type=1400 audit(268.610:207): avc: denied { setopt } for pid=4442 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 271.547680][ T4445] veth0_vlan: entered allmulticast mode [ 271.632655][ T4445] ªªªªªª: renamed from vlan0 [ 271.789876][ T31] audit: type=1400 audit(271.720:208): avc: denied { getopt } for pid=4446 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 273.507120][ T31] audit: type=1400 audit(273.440:209): avc: denied { bind } for pid=4457 comm="syz.0.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 273.519118][ T31] audit: type=1400 audit(273.450:210): avc: denied { write } for pid=4457 comm="syz.0.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 282.008613][ T31] audit: type=1400 audit(281.940:211): avc: denied { read } for pid=4470 comm="syz.1.235" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 282.009372][ T31] audit: type=1400 audit(281.940:212): avc: denied { open } for pid=4470 comm="syz.1.235" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 282.018771][ T31] audit: type=1400 audit(281.950:213): avc: denied { ioctl } for pid=4470 comm="syz.1.235" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 282.020463][ T31] audit: type=1400 audit(281.950:214): avc: denied { set_context_mgr } for pid=4470 comm="syz.1.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 282.042158][ T31] audit: type=1400 audit(281.970:215): avc: denied { map } for pid=4470 comm="syz.1.235" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 283.662665][ T31] audit: type=1400 audit(283.600:216): avc: denied { append } for pid=4473 comm="syz.0.236" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 284.328987][ T31] audit: type=1400 audit(284.260:217): avc: denied { call } for pid=4470 comm="syz.1.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 299.198545][ T31] audit: type=1400 audit(299.130:218): avc: denied { read } for pid=4495 comm="syz.0.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 303.213375][ T4503] process 'syz.1.247' launched './file0' with NULL argv: empty string added [ 303.220105][ T31] audit: type=1400 audit(303.150:219): avc: denied { execute_no_trans } for pid=4502 comm="syz.1.247" path="/124/file0" dev="tmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 315.402418][ T31] audit: type=1400 audit(315.340:220): avc: denied { bind } for pid=4543 comm="syz.0.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 315.791546][ T31] audit: type=1400 audit(315.720:221): avc: denied { connect } for pid=4545 comm="syz.0.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 316.224858][ T4552] vlan0: entered allmulticast mode [ 322.550544][ T31] audit: type=1400 audit(322.480:222): avc: denied { sys_module } for pid=4601 comm="syz.0.277" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 322.554410][ T31] audit: type=1400 audit(322.480:223): avc: denied { module_request } for pid=4601 comm="syz.0.277" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 322.632635][ T31] audit: type=1400 audit(322.550:224): avc: denied { read } for pid=2816 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 322.642801][ T31] audit: type=1400 audit(322.550:225): avc: denied { search } for pid=2816 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 322.643717][ T31] audit: type=1400 audit(322.550:226): avc: denied { append } for pid=2816 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 322.644396][ T31] audit: type=1400 audit(322.550:227): avc: denied { open } for pid=2816 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 322.645104][ T31] audit: type=1400 audit(322.550:228): avc: denied { getattr } for pid=2816 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 322.732063][ T31] audit: type=1400 audit(322.640:229): avc: denied { read write } for pid=3003 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 322.772830][ T31] audit: type=1400 audit(322.660:230): avc: denied { open } for pid=3003 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 322.773754][ T31] audit: type=1400 audit(322.660:231): avc: denied { ioctl } for pid=3003 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 323.845143][ T4608] Zero length message leads to an empty skb [ 325.635578][ T4626] netlink: 16 bytes leftover after parsing attributes in process `syz.0.283'. [ 326.632405][ T4045] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 326.829446][ T4045] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 326.838048][ T4045] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 326.838985][ T4045] usb 2-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 326.861410][ T4045] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 326.876813][ T4045] usb 2-1: config 0 descriptor?? [ 327.941550][ T4045] usb 2-1: string descriptor 0 read error: -71 [ 327.943576][ T4045] uclogic 0003:256C:006D.0002: failed retrieving string descriptor #200: -71 [ 327.944553][ T4045] uclogic 0003:256C:006D.0002: failed retrieving pen parameters: -71 [ 327.944942][ T4045] uclogic 0003:256C:006D.0002: failed probing pen v2 parameters: -71 [ 327.945590][ T4045] uclogic 0003:256C:006D.0002: failed probing parameters: -71 [ 327.946083][ T4045] uclogic 0003:256C:006D.0002: probe with driver uclogic failed with error -71 [ 327.973214][ T4045] usb 2-1: USB disconnect, device number 3 [ 328.632001][ T4045] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 329.001428][ T4045] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 329.005809][ T4045] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 329.008512][ T4045] usb 2-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 329.010462][ T4045] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 329.021643][ T45] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 329.030630][ T4045] usb 2-1: config 0 descriptor?? [ 329.294202][ T45] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 329.304404][ T45] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 329.304769][ T45] usb 1-1: New USB device found, idVendor=0419, idProduct=0600, bcdDevice= 0.00 [ 329.305105][ T45] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 329.373282][ T45] usb 1-1: config 0 descriptor?? [ 329.902054][ T45] samsung 0003:0419:0600.0004: unknown main item tag 0x0 [ 329.920849][ T45] samsung 0003:0419:0600.0004: unknown main item tag 0x0 [ 329.921439][ T45] samsung 0003:0419:0600.0004: unknown main item tag 0x0 [ 329.922113][ T45] samsung 0003:0419:0600.0004: unknown main item tag 0x0 [ 329.922495][ T45] samsung 0003:0419:0600.0004: unknown main item tag 0x0 [ 329.952452][ T45] samsung 0003:0419:0600.0004: hidraw0: USB HID v0.00 Device [HID 0419:0600] on usb-dummy_hcd.0-1/input0 [ 329.965726][ T4045] usb 2-1: string descriptor 0 read error: -71 [ 329.974148][ T4045] uclogic 0003:256C:006D.0003: failed retrieving string descriptor #200: -71 [ 329.974766][ T4045] uclogic 0003:256C:006D.0003: failed retrieving pen parameters: -71 [ 329.975287][ T4045] uclogic 0003:256C:006D.0003: failed probing pen v2 parameters: -71 [ 329.975651][ T4045] uclogic 0003:256C:006D.0003: failed probing parameters: -71 [ 329.976104][ T4045] uclogic 0003:256C:006D.0003: probe with driver uclogic failed with error -71 [ 329.994436][ T4045] usb 2-1: USB disconnect, device number 4 [ 330.064633][ T45] usb 1-1: USB disconnect, device number 6 [ 330.363441][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 330.363546][ T31] audit: type=1400 audit(330.300:266): avc: denied { mounton } for pid=4694 comm="syz.1.292" path="/140/file0" dev="tmpfs" ino=736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 330.383838][ T31] audit: type=1400 audit(330.310:267): avc: denied { mount } for pid=4694 comm="syz.1.292" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 330.991630][ T31] audit: type=1400 audit(330.920:268): avc: denied { create } for pid=4703 comm="syz.0.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 331.107820][ T31] audit: type=1400 audit(331.040:269): avc: denied { unmount } for pid=3003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 333.133330][ T31] audit: type=1400 audit(333.070:270): avc: denied { unlink } for pid=4712 comm="syz.0.298" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 334.011950][ T31] audit: type=1400 audit(333.940:271): avc: denied { create } for pid=4730 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 334.012577][ T31] audit: type=1400 audit(333.950:272): avc: denied { setopt } for pid=4730 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 335.863089][ T8] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 336.167087][ T8] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 336.167511][ T8] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 336.167829][ T8] usb 1-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 336.168034][ T8] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 336.186800][ T8] usb 1-1: config 0 descriptor?? [ 337.500372][ T8] uclogic 0003:256C:006D.0005: interface is invalid, ignoring [ 337.705252][ T2957] usb 1-1: USB disconnect, device number 7 [ 338.251779][ T31] audit: type=1400 audit(338.180:273): avc: denied { setopt } for pid=4772 comm="syz.0.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 338.277497][ T31] audit: type=1400 audit(338.210:274): avc: denied { bind } for pid=4772 comm="syz.0.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 338.343106][ T31] audit: type=1400 audit(338.270:275): avc: denied { write } for pid=4772 comm="syz.0.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 338.420476][ T31] audit: type=1400 audit(338.350:276): avc: denied { create } for pid=4774 comm="syz.1.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 338.942528][ T31] audit: type=1400 audit(338.880:277): avc: denied { setopt } for pid=4774 comm="syz.1.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 339.086925][ T31] audit: type=1400 audit(339.020:278): avc: denied { write } for pid=4776 comm="syz.0.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 339.543053][ T31] audit: type=1400 audit(339.480:279): avc: denied { name_bind } for pid=4779 comm="syz.0.314" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 341.182939][ T31] audit: type=1400 audit(341.110:280): avc: denied { write } for pid=4787 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 341.190586][ T31] audit: type=1400 audit(341.110:281): avc: denied { open } for pid=4787 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 341.192244][ T31] audit: type=1400 audit(341.110:282): avc: denied { getattr } for pid=4787 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 342.491660][ T4809] input: syz0 as /devices/virtual/input/input3 [ 344.031212][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 344.031342][ T31] audit: type=1400 audit(343.960:301): avc: denied { connect } for pid=4825 comm="syz.0.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 344.893712][ T31] audit: type=1400 audit(344.830:302): avc: denied { write } for pid=4830 comm="syz.0.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 349.389841][ T31] audit: type=1400 audit(349.320:303): avc: denied { mounton } for pid=4857 comm="syz.0.340" path="/proc/429/task" dev="proc" ino=4598 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 349.393439][ T31] audit: type=1400 audit(349.320:304): avc: denied { mount } for pid=4857 comm="syz.0.340" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 349.844032][ T4863] netlink: 8 bytes leftover after parsing attributes in process `syz.0.342'. [ 350.011519][ T31] audit: type=1400 audit(349.930:305): avc: denied { ioctl } for pid=4864 comm="syz.0.343" path="socket:[4615]" dev="sockfs" ino=4615 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 350.742187][ T4859] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 351.036141][ T4859] usb 1-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 21 [ 351.037054][ T4859] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 351.037431][ T4859] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 351.103686][ T4859] usb 1-1: config 0 descriptor?? [ 351.116595][ T4859] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 365.409967][ T4042] usb 1-1: USB disconnect, device number 8 [ 365.733760][ T31] audit: type=1400 audit(365.670:306): avc: denied { execmem } for pid=4890 comm="syz.0.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 368.742696][ T31] audit: type=1400 audit(368.680:307): avc: denied { execute } for pid=4893 comm="syz.0.348" path="/197/bus" dev="tmpfs" ino=1023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 368.752865][ T4894] mmap: syz.0.348 (4894) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 368.879220][ T31] audit: type=1400 audit(368.810:308): avc: denied { create } for pid=4895 comm="syz.0.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 368.901870][ T31] audit: type=1400 audit(368.830:309): avc: denied { bind } for pid=4895 comm="syz.0.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 368.903034][ T31] audit: type=1400 audit(368.830:310): avc: denied { connect } for pid=4895 comm="syz.0.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 369.241295][ T31] audit: type=1400 audit(369.170:311): avc: denied { setopt } for pid=4897 comm="syz.0.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 369.365470][ T31] audit: type=1400 audit(369.300:312): avc: denied { create } for pid=4899 comm="syz.0.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 371.766619][ T4910] tap0: tun_chr_ioctl cmd 1074025677 [ 371.768344][ T4910] tap0: linktype set to 0 [ 373.077174][ T31] audit: type=1400 audit(373.010:313): avc: denied { execute } for pid=4927 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 373.087925][ T31] audit: type=1400 audit(373.020:314): avc: denied { execute_no_trans } for pid=4927 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 373.157196][ T31] audit: type=1400 audit(373.080:315): avc: denied { mounton } for pid=4929 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 373.191880][ T31] audit: type=1400 audit(373.110:316): avc: denied { mounton } for pid=4929 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 373.688019][ T4935] netlink: 830 bytes leftover after parsing attributes in process `syz.0.359'. [ 374.279623][ T31] audit: type=1400 audit(374.210:317): avc: denied { write } for pid=4940 comm="syz.0.361" name="mcfilter" dev="proc" ino=4026532681 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 374.872506][ T31] audit: type=1400 audit(374.780:318): avc: denied { create } for pid=4948 comm="syz.0.364" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 374.873905][ T31] audit: type=1400 audit(374.800:319): avc: denied { map } for pid=4948 comm="syz.0.364" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4718 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 374.874931][ T31] audit: type=1400 audit(374.800:320): avc: denied { read write } for pid=4948 comm="syz.0.364" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4718 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 377.658157][ T4929] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 377.669109][ T4929] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 378.503236][ T4929] hsr_slave_0: entered promiscuous mode [ 378.506966][ T4929] hsr_slave_1: entered promiscuous mode [ 378.509127][ T4929] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 378.509525][ T4929] Cannot create hsr debugfs directory [ 378.757327][ T4929] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 378.831831][ T4929] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 378.892037][ T4929] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 378.946490][ T4929] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 379.079724][ T4929] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 379.094293][ T4929] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 379.104723][ T4929] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 379.115796][ T4929] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 379.863239][ T4929] 8021q: adding VLAN 0 to HW filter on device bond0 [ 381.252442][ T4807] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 381.462033][ T4807] usb 1-1: Using ep0 maxpacket: 8 [ 381.482441][ T4807] usb 1-1: config 32 interface 0 altsetting 0 endpoint 0x85 has an invalid bInterval 0, changing to 7 [ 381.482994][ T4807] usb 1-1: New USB device found, idVendor=19b5, idProduct=0021, bcdDevice=98.c7 [ 381.483311][ T4807] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 384.281622][ T4807] usb 1-1: string descriptor 0 read error: -71 [ 384.282834][ T4807] hub 1-1:32.0: USB hub found [ 384.285838][ T4807] hub 1-1:32.0: config failed, can't read hub descriptor (err -22) [ 384.513352][ T4807] usb 1-1: USB disconnect, device number 9 [ 384.605910][ T31] audit: type=1400 audit(384.540:321): avc: denied { getopt } for pid=5310 comm="syz.0.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 385.236427][ T5328] netlink: 188 bytes leftover after parsing attributes in process `syz.0.374'. [ 390.583385][ T4929] veth0_vlan: entered promiscuous mode [ 390.636319][ T4929] veth1_vlan: entered promiscuous mode [ 390.892501][ T4929] veth0_macvtap: entered promiscuous mode [ 390.897734][ T4929] veth1_macvtap: entered promiscuous mode [ 390.972305][ T4929] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 390.972846][ T4929] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 390.973388][ T4929] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 390.973947][ T4929] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 391.341882][ T31] audit: type=1400 audit(391.250:322): avc: denied { mounton } for pid=4929 comm="syz-executor" path="/syzkaller.KRpKnp/syz-tmp" dev="vda" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 391.342793][ T31] audit: type=1400 audit(391.260:323): avc: denied { mount } for pid=4929 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 391.372053][ T31] audit: type=1400 audit(391.300:324): avc: denied { unmount } for pid=4929 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 391.375497][ T31] audit: type=1400 audit(391.310:325): avc: denied { mounton } for pid=4929 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 391.382846][ T31] audit: type=1400 audit(391.310:326): avc: denied { mount } for pid=4929 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 391.957080][ T31] audit: type=1400 audit(391.890:327): avc: denied { create } for pid=5387 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 392.587613][ T5388] vlan2: entered promiscuous mode [ 394.832097][ T4847] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 395.073655][ T4847] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 395.074283][ T4847] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 395.074680][ T4847] usb 2-1: New USB device found, idVendor=1e7d, idProduct=30d4, bcdDevice= 0.00 [ 395.075022][ T4847] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 395.086679][ T4847] usb 2-1: config 0 descriptor?? [ 395.689029][ T4847] arvo 0003:1E7D:30D4.0006: collection stack underflow [ 395.689408][ T4847] arvo 0003:1E7D:30D4.0006: item 0 4 0 12 parsing failed [ 395.689746][ T4847] arvo 0003:1E7D:30D4.0006: parse failed [ 395.689978][ T4847] arvo 0003:1E7D:30D4.0006: probe with driver arvo failed with error -22 [ 395.927824][ T4836] usb 2-1: USB disconnect, device number 5 [ 396.371300][ T31] audit: type=1326 audit(396.290:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.382" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 396.394818][ T31] audit: type=1326 audit(396.300:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.382" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 396.395720][ T31] audit: type=1326 audit(396.330:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.382" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x130460 code=0x7ffc0000 [ 396.396387][ T31] audit: type=1326 audit(396.330:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.382" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 396.397035][ T31] audit: type=1326 audit(396.330:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.382" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 396.413696][ T31] audit: type=1326 audit(396.350:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.382" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x130460 code=0x7ffc0000 [ 396.414527][ T31] audit: type=1326 audit(396.350:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.382" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 396.415071][ T31] audit: type=1326 audit(396.350:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.382" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 396.456789][ T31] audit: type=1326 audit(396.380:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.382" exe="/syz-executor" sig=0 arch=40000028 syscall=179 compat=0 ip=0x130460 code=0x7ffc0000 [ 396.459243][ T31] audit: type=1326 audit(396.380:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5420 comm="syz.1.382" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 405.884629][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 405.884744][ T31] audit: type=1400 audit(405.820:339): avc: denied { name_bind } for pid=5426 comm="syz.0.384" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 409.063220][ T31] audit: type=1400 audit(409.000:340): avc: denied { create } for pid=5437 comm="syz.0.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 409.071810][ T31] audit: type=1400 audit(409.000:341): avc: denied { ioctl } for pid=5437 comm="syz.0.389" path="socket:[6154]" dev="sockfs" ino=6154 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 409.112554][ T5438] netlink: 28 bytes leftover after parsing attributes in process `syz.0.389'. [ 410.354378][ T31] audit: type=1326 audit(410.290:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5447 comm="syz.0.394" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 410.372917][ T31] audit: type=1326 audit(410.290:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5447 comm="syz.0.394" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x130460 code=0x7ffc0000 [ 410.373762][ T31] audit: type=1326 audit(410.290:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5447 comm="syz.0.394" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 410.374166][ T31] audit: type=1326 audit(410.290:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5447 comm="syz.0.394" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x130460 code=0x7ffc0000 [ 410.374565][ T31] audit: type=1326 audit(410.290:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5447 comm="syz.0.394" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 410.375092][ T31] audit: type=1326 audit(410.290:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5447 comm="syz.0.394" exe="/syz-executor" sig=0 arch=40000028 syscall=299 compat=0 ip=0x130460 code=0x7ffc0000 [ 410.376024][ T31] audit: type=1326 audit(410.290:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5447 comm="syz.0.394" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 411.704849][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 411.717792][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 411.725651][ T11] bond0 (unregistering): Released all slaves [ 411.841832][ T11] hsr_slave_0: left promiscuous mode [ 411.853742][ T11] hsr_slave_1: left promiscuous mode [ 411.865852][ T11] veth1_macvtap: left promiscuous mode [ 411.866383][ T11] veth0_macvtap: left promiscuous mode [ 411.866660][ T11] veth1_vlan: left promiscuous mode [ 411.866902][ T11] veth0_vlan: left promiscuous mode [ 412.747058][ T5464] netlink: 'syz.0.400': attribute type 1 has an invalid length. [ 413.138504][ T5464] 8021q: adding VLAN 0 to HW filter on device bond3 [ 413.165615][ T5464] bond2: (slave bond3): Enslaving as a backup interface with a down link [ 414.511747][ T31] audit: type=1400 audit(414.440:349): avc: denied { mounton } for pid=5542 comm="syz.0.403" path="/245/file0" dev="tmpfs" ino=1266 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 426.373497][ T5559] netlink: 252 bytes leftover after parsing attributes in process `syz.1.409'. [ 426.794305][ T31] audit: type=1400 audit(426.720:350): avc: denied { write } for pid=5560 comm="syz.1.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 426.831826][ T31] audit: type=1400 audit(426.730:351): avc: denied { connect } for pid=5560 comm="syz.1.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 426.832675][ T31] audit: type=1400 audit(426.730:352): avc: denied { name_connect } for pid=5560 comm="syz.1.410" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 426.853466][ T31] audit: type=1400 audit(426.790:353): avc: denied { shutdown } for pid=5560 comm="syz.1.410" lport=52177 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 430.734178][ T31] audit: type=1400 audit(430.660:354): avc: denied { connect } for pid=5583 comm="syz.1.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 430.764341][ T31] audit: type=1400 audit(430.680:355): avc: denied { bind } for pid=5583 comm="syz.1.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 431.254228][ T31] audit: type=1400 audit(431.190:356): avc: denied { setopt } for pid=5583 comm="syz.1.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 445.771784][ T4766] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 445.981240][ T4766] usb 2-1: Using ep0 maxpacket: 32 [ 446.008123][ T4766] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 446.008798][ T4766] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 446.009292][ T4766] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 446.009784][ T4766] usb 2-1: New USB device found, idVendor=1b96, idProduct=000a, bcdDevice= 0.00 [ 446.010189][ T4766] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 446.014044][ T4766] usb 2-1: config 0 descriptor?? [ 446.450393][ T4766] ntrig 0003:1B96:000A.0007: unknown main item tag 0x0 [ 446.453227][ T4766] ntrig 0003:1B96:000A.0007: unknown main item tag 0x0 [ 446.453658][ T4766] ntrig 0003:1B96:000A.0007: unknown main item tag 0x0 [ 446.453990][ T4766] ntrig 0003:1B96:000A.0007: unknown main item tag 0x0 [ 446.454329][ T4766] ntrig 0003:1B96:000A.0007: unknown main item tag 0x0 [ 446.462639][ T4766] ntrig 0003:1B96:000A.0007: hidraw0: USB HID v0.00 Device [HID 1b96:000a] on usb-dummy_hcd.1-1/input0 [ 446.798405][ T4766] usb 2-1: USB disconnect, device number 6 [ 453.119776][ T31] audit: type=1326 audit(453.050:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5666 comm="syz.1.441" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x0 [ 456.361319][ T31] audit: type=1400 audit(456.290:358): avc: denied { ioctl } for pid=5672 comm="syz.1.444" path="socket:[5912]" dev="sockfs" ino=5912 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 457.971620][ T4847] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 458.272731][ T4847] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 26 [ 458.304470][ T4847] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 458.305023][ T4847] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 458.305388][ T4847] usb 1-1: SerialNumber: syz [ 459.033661][ T4847] cdc_ether 1-1:1.0 usb0: register 'cdc_ether' at usb-dummy_hcd.0-1, CDC Ethernet Device, 42:42:42:42:42:42 [ 459.905909][ T4050] usb 1-1: USB disconnect, device number 10 [ 459.908143][ T4050] cdc_ether 1-1:1.0 usb0: unregister 'cdc_ether' usb-dummy_hcd.0-1, CDC Ethernet Device [ 473.173072][ T31] audit: type=1400 audit(473.110:359): avc: denied { accept } for pid=5723 comm="syz.1.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 483.633677][ T31] audit: type=1326 audit(483.560:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5739 comm="syz.0.457" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 483.665469][ T31] audit: type=1326 audit(483.560:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5739 comm="syz.0.457" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 483.666378][ T31] audit: type=1326 audit(483.580:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5739 comm="syz.0.457" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x130460 code=0x7ffc0000 [ 483.667176][ T31] audit: type=1326 audit(483.580:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5739 comm="syz.0.457" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 483.667943][ T31] audit: type=1326 audit(483.580:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5739 comm="syz.0.457" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 483.668659][ T31] audit: type=1326 audit(483.580:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5739 comm="syz.0.457" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x130460 code=0x7ffc0000 [ 483.669393][ T31] audit: type=1326 audit(483.580:366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5739 comm="syz.0.457" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130460 code=0x7ffc0000 [ 483.670136][ T31] audit: type=1326 audit(483.580:367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5739 comm="syz.0.457" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1262dc code=0x7ffc0000 [ 483.702091][ T31] audit: type=1326 audit(483.580:368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5739 comm="syz.0.457" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xeceb8 code=0x7ffc0000 [ 483.703013][ T31] audit: type=1326 audit(483.580:369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5739 comm="syz.0.457" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1262dc code=0x7ffc0000 [ 488.712435][ T5766] ------------[ cut here ]------------ [ 488.713606][ T5766] WARNING: CPU: 1 PID: 5766 at mm/highmem.c:611 kunmap_local_indexed+0x20c/0x224 [ 488.720597][ T5766] Modules linked in: [ 488.721842][ T5766] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 488.722697][ T5766] CPU: 1 PID: 5766 Comm: syz.0.464 Not tainted 6.10.0-rc6-syzkaller #0 [ 488.723901][ T5766] Hardware name: ARM-Versatile Express [ 488.727898][ T5766] Call trace: [ 488.731324][ T5766] [<818d4fd8>] (dump_backtrace) from [<818d50d4>] (show_stack+0x18/0x1c) [ 488.741152][ T5766] r7:00000000 r6:82622d44 r5:00000000 r4:81fe1570 [ 488.745314][ T5766] [<818d50bc>] (show_stack) from [<818f273c>] (dump_stack_lvl+0x54/0x7c) [ 488.751200][ T5766] [<818f26e8>] (dump_stack_lvl) from [<818f277c>] (dump_stack+0x18/0x1c) [ 488.757680][ T5766] r5:00000000 r4:8285fd18 [ 488.761539][ T5766] [<818f2764>] (dump_stack) from [<818d5b7c>] (panic+0x120/0x358) [ 488.767452][ T5766] [<818d5a5c>] (panic) from [<80243dcc>] (print_tainted+0x0/0xa0) [ 488.771477][ T5766] r3:8260c5c4 r2:00000001 r1:81fca1dc r0:81fd1e34 [ 488.771882][ T5766] r7:80480ee0 [ 488.772051][ T5766] [<80243d58>] (check_panic_on_warn) from [<80243fc0>] (__warn+0x7c/0x180) [ 488.777443][ T5766] [<80243f44>] (__warn) from [<8024423c>] (warn_slowpath_fmt+0x178/0x1f4) [ 488.782795][ T5766] r8:00000009 r7:81ff8ab4 r6:dfb15d14 r5:84fa6000 r4:00000000 [ 488.783123][ T5766] [<802440c8>] (warn_slowpath_fmt) from [<80480ee0>] (kunmap_local_indexed+0x20c/0x224) [ 488.783679][ T5766] r10:ffedc0a8 r9:83f60f00 r8:20508000 r7:fffffffe r6:00000003 r5:84fa6000 [ 488.784065][ T5766] r4:ffedc000 [ 488.784250][ T5766] [<80480cd4>] (kunmap_local_indexed) from [<804f28a4>] (move_pages+0x7e8/0x149c) [ 488.784659][ T5766] r7:fffffffe r6:00000000 r5:82ea3810 r4:ffeda840 [ 488.785047][ T5766] [<804f20bc>] (move_pages) from [<8056b0a8>] (userfaultfd_ioctl+0x1278/0x2314) [ 488.785474][ T5766] r10:20c16000 r9:dfb15e98 r8:20000080 r7:83f60f00 r6:00000001 r5:00000000 [ 488.785807][ T5766] r4:847ea000 [ 488.785987][ T5766] [<80569e30>] (userfaultfd_ioctl) from [<8051a5a8>] (sys_ioctl+0x134/0xda4) [ 488.786461][ T5766] r10:84fa6000 r9:00000005 r8:843869c0 r7:20000080 r6:843869c1 r5:00000000 [ 488.786788][ T5766] r4:c028aa05 [ 488.786956][ T5766] [<8051a474>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 488.787371][ T5766] Exception stack(0xdfb15fa8 to 0xdfb15ff0) [ 488.787799][ T5766] 5fa0: 00000000 00000000 00000005 c028aa05 20000080 00000000 [ 488.788158][ T5766] 5fc0: 00000000 00000000 002542e0 00000036 7ed64776 7ed64777 003d0f00 76b7b0bc [ 488.788534][ T5766] 5fe0: 76b7aec8 76b7aeb8 00018374 00130460 [ 488.788851][ T5766] r10:00000036 r9:84fa6000 r8:8020029c r7:00000036 r6:002542e0 r5:00000000 [ 488.789188][ T5766] r4:00000000 [ 488.791099][ T5766] Rebooting in 86400 seconds.. VM DIAGNOSIS: 20:09:00 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=00000000 R02=00000101 R03=818f44cc R04=826f5908 R05=826f5900 R06=00000028 R07=00000006 R08=826f5908 R09=00000000 R10=df801ee0 R11=df801d4c R12=df801d50 R13=df801d40 R14=818f3160 R15=818f44dc PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83d60040 R01=00000070 R02=eb099000 R03=00000000 R04=828622ce R05=83d60040 R06=809b1214 R07=828622d3 R08=82862298 R09=0000003c R10=60000093 R11=dfb15a74 R12=00000002 R13=dfb15a68 R14=827531c0 R15=809b126c PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000