last executing test programs: 8.839116651s ago: executing program 0 (id=935): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x2000) read(r2, &(0x7f0000000200)=""/209, 0x128) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000080)={0x2bd, @tick=0x5}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000740)={0xfffffffb, 0x2, 0x1, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000400)={0x0, 0x1f000000}) tkill(r1, 0x7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r3}, 0x10) 6.300225826s ago: executing program 0 (id=938): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = io_uring_setup(0x5f41, &(0x7f00000001c0)={0x0, 0x0, 0x800}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r3) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0xf}, 0x1c) listen(r4, 0x0) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r5, &(0x7f0000000140)={0x2, 0x4e22, @local}, 0x10) close_range(r2, 0xffffffffffffffff, 0x0) 5.898707387s ago: executing program 0 (id=939): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000001880)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000200000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x0) 5.643655167s ago: executing program 0 (id=940): r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/kcm\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r1, &(0x7f0000000080)=[{{&(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000012c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @private=0xa010102}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10000}}], 0x38}}], 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000000040000000026e890d98490ad69cfc8000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0xfb81, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x26000400) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) getsockopt$inet_mptcp_buf(r0, 0x11c, 0x3, &(0x7f0000001300)=""/4096, &(0x7f00000001c0)=0x1000) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYRES16=r4, @ANYRES32, @ANYRES64=r4, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x602, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x2}, 0x18) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x8) r7 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f00000004c0)='|', 0x1}, {&(0x7f0000000540)}], 0x2, 0x0) 3.228076842s ago: executing program 1 (id=947): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c0003"], 0xfc}}, 0x0) 2.810467344s ago: executing program 0 (id=948): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000e6ff0080000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$igmp6(0xa, 0x3, 0x2) sendmmsg$inet6(r2, &(0x7f00000000c0)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) recvfrom(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 2.72871674s ago: executing program 1 (id=949): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001900)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcc9cdfa146ec56175037958e271f60d25b7937f02c8695e5a1b2cdf41dc10d1e8bf076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90fbdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f93781965f1328d6704902cbe0002476619f28d99cd0aa7b73340cc2160a1fe3c184b751c51160fbce841f8a97be6148ba532e6ea097a75dfebd31a08b32808b80200000000009dd27080e71113610e10d859e8327ef03fb6c86adac12233f9a1fb9c2aec61ce63a3462fd50117b89a9ab759b4eeb8cb000067d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07ed0030000002cab154ad029a119ca3c972780870014605c83d7d11c3c975d5aec84222fff0d7216fdb0d3a0ec4bfae563112f4b391aafe2348754000000000000007642d3e5a815212f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc5a788bee1b47683db01a46939868d75211bbae0e7313bff5d4c391ddece00fc772dd6b4d4d0a917b239fe12280fc92c88c5b8dcdcc22ee1747790a8992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673fffffff7f23877a6b24db0e067345560942fa629fbef2461c96a08707671215c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415e6adcda2130f5011e42e50adab988dd8e12baf5cc9398c88607a08009c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859adfe38f01001bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bc0004c3addb08141bdee5d27874b2f663ddeef0005b3d96c7aae73835d5a3cda9e90d76c1993e0799d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f65112412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622e6bbcb80f87b4150900000000000000f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d6d1e6e79aef42355a500587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3ff010000000000000be959096ea948cfa8e7194123e918914a71ad5a8521fb9553bc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d839cf3c63ebb4380b168c38fa32e49563cfee3a7f0fc18bfa32c418cef875fb49e2989177a30280bc586e79a5dd8076c248e7d6e97b3ce267dd4e27b6ef206660090bb2164474cef378f97ca33fc03000000000000001547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f5874c24411d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d28307c9912fb097601f3f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a013709003f509e6e540c9ba9c2a589ac5d8ad67a65e9a44c576dc24452eaa9d819e2b04bdd1c000000070000000000000000000000005333c6199c12dcd926891927a7267c47cf897853d160100b39b613faefe16bed1fc105dddd77ab929b837d54aa17eb9fbdc2bdc0e98ae2c3f23a6131e2879f04ff01000030b92dd493be66c2242f8184733b80ba28e8ffffff7f00000000bb2f89049c5f6d63d56995747639964217aacfe548bc869098aa0500e51dbc9e2d4db3c5f79fd355222ec2a00cf7f2ccd6dd6d2dc2a815d8314221a5472f1318a9dfbec5a759579caf3262129b14e99040b5d91398e17df85c25ccae973eecc7d18716975c9cd848d566cc17587641ed01889c927da38d83314480b15e23138c5b877a72bd4cf74a299df4fbfc8e6ea96939f15d254d9033c5a45706bda78ab60200000000000000000000000000000000000000706f78f0a2ea9667fb5b951808545a46830970c2dfae01adbda7d29bf1f7abdaf52e0de6f9d7150808ed086642e64ebf98762b34338b80e41b704c3eefaf0bb5f7d895de17a10b0a0ea15ccc0d7a830b6eb33b6b61675511d693ef5e3c44bbf71cabc5175d879e7499f8baae2a1a09cf38da73297764fbc0e723e1cc3abb12e3076982ed32c94a2ce3e6f37c47e983da4ca5c96187db5a2a2e1742bc93a65d7187126126b3a80f17dd2f7dbbe82d104ede9ba6925afc2ee6cb94f56f1363cad635abf8f9836faa292c49c0ebf5005154c7b58a3a2a2e5a00d2f953a86d2fd92b8661264f781e3fb02d05a28f3f17b64d0258853d45cb5ebde10cd3d82eeed2f1ed925b7cf400304932c5ed0a362b235ce37e1f17700f7d1fecf8be8a2c5d25a9c60657560d05441387ff158a018d19a286c56d0886eb59d509ee63ba54e4153c132d0366a9660000000000000009c1aaec93ec0f925921fb2e9eb202a29bef28224dbabe723de5c584bc398a8792e493048c87f60a51a391e95921218149403558fd13c649f90b0911d57eeb298b590581eba1ce383b539ab80fd15445987b1bb4eb512545e1ab65fef310e10b1ee362b51c72f82edf2f502ddf52567775e34a56d1be892f1e62b08950d517fa6fb1b0ef2edf1b67f8644786116b037d4a36fdd30b000063e58c856ec44cbbc2d370553f832af9480215e09aaa3843fe360b1c293a14627f2cfbe278f31d0abc0f5aaa10926dbbfe8a4b131c13a73d4e6d065c2c0fed3ab8442520ce0e0ad7d2d177377ab197ace3ef8b1c24ceb0bdee84bd6e6317633938dd19dc42de7f8f860eca6d9c11465fcd3497526df4c13e3ba5f0d75365a4542ae9440d2fede416d618cdaaf7e038879c5d177b3876fda4121e15a00adb976064a93e8d000000000000903350932d3eef7fdada20c19807066e2c72d0d816eb9fa50be213bf6bbb7ccb9f2e8a153e6ced68f192ebed6e86af0f2cec7335fa8039fd6eb025440bc2a34d071f0a0e6774308a2c5986aa9200a1306ffa5a71ca69e89a6980612b35fc858f37c2c398515a910a35e22ab0573c10b85df4c2972a2fb8b9c080fbb41a753791df727fdeadc5cf218a6eda31312256191c620cce34d1e3bf40a4a207ab1575b399eb8155781bfc7cb5920b49c039935a888d77041814f60fbbcafa487ee96b368e8769da90b44190e569fe8b1d155d0765baaca5c5548b5a78bb43e5d9e47a1d5809bb178184b5672d08e29aecf1f572ac1e6cab7e820751e95999b7532603494d37a2bff300"/2742], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 2.057482492s ago: executing program 1 (id=950): r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000000c80)=[{&(0x7f00000005c0)=""/6, 0x6}], 0x1}}], 0x48}, 0x0) 1.461891448s ago: executing program 1 (id=951): syz_usb_connect(0x0, 0x0, 0x0, 0x0) r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000380)={0x1d, r1, 0x2, {0x1, 0xff, 0x3}, 0xfe}, 0x18) sendmmsg$sock(r0, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)="1f", 0x1}], 0x1}}], 0x1, 0x0) 889.314812ms ago: executing program 1 (id=952): r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000001c0)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000340)={0xa, 0x4e24, 0xfff, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="e8020000000000002900000004000000005a"], 0x2e8}}], 0x2, 0x0) 314.842056ms ago: executing program 1 (id=953): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) r1 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) writev(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000040)="aa1d484ea0000000f7fc08fcd111fbdf23ea32db0e8f21d5bc27bd49eb067a0689fff2a41cfb", 0x26}], 0x1) process_madvise(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}], 0x1, 0x13, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x44f0) 0s ago: executing program 0 (id=954): setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0x42, 0x4, 0x2a8, 0xffffffff, 0xf8, 0xf8, 0x1c0, 0xffffffff, 0xffffffff, 0x2e0, 0x2e0, 0x2e0, 0xffffffff, 0x4, 0x0, {[{{@ip={@rand_addr, @loopback, 0x0, 0x0, 'veth0_to_batadv\x00', 'wlan0\x00'}, 0x0, 0xa0, 0xc8, 0x0, {0x100000000000000}, [@common=@inet=@l2tp={{0x30}, {0x9000000, 0x0, 0x2, 0x0, 0x5}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28}}, {{@ip={@private, @loopback, 0x0, 0x0, 'batadv_slave_0\x00', 'veth1\x00'}, 0x0, 0x70, 0xb0}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x308) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000580)=ANY=[@ANYBLOB="6802000000050104000000000000000000000000540201"], 0x268}}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:6471' (ED25519) to the list of known hosts. [ 133.218889][ T30] audit: type=1400 audit(132.910:46): avc: denied { name_bind } for pid=3302 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 133.519049][ T30] audit: type=1400 audit(133.210:47): avc: denied { execute } for pid=3303 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 133.521785][ T30] audit: type=1400 audit(133.210:48): avc: denied { execute_no_trans } for pid=3303 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 137.244362][ T30] audit: type=1400 audit(136.930:49): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 137.251179][ T30] audit: type=1400 audit(136.940:50): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 137.279870][ T3303] cgroup: Unknown subsys name 'net' [ 137.296851][ T30] audit: type=1400 audit(136.990:51): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 137.580226][ T3303] cgroup: Unknown subsys name 'cpuset' [ 137.616557][ T3303] cgroup: Unknown subsys name 'rlimit' [ 137.814391][ T30] audit: type=1400 audit(137.500:52): avc: denied { setattr } for pid=3303 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 137.819282][ T30] audit: type=1400 audit(137.510:53): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 137.826975][ T30] audit: type=1400 audit(137.510:54): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 138.188779][ T3305] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 138.195067][ T30] audit: type=1400 audit(137.880:55): avc: denied { relabelto } for pid=3305 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 138.287185][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 138.287660][ T30] audit: type=1400 audit(137.980:57): avc: denied { read } for pid=3303 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 138.291332][ T30] audit: type=1400 audit(137.980:58): avc: denied { open } for pid=3303 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 138.301018][ T3303] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 154.152910][ T30] audit: type=1400 audit(153.840:59): avc: denied { execmem } for pid=3306 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 154.284482][ T30] audit: type=1400 audit(153.970:60): avc: denied { read } for pid=3308 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 154.288484][ T30] audit: type=1400 audit(153.980:61): avc: denied { open } for pid=3308 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 154.301892][ T30] audit: type=1400 audit(153.990:62): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 154.344800][ T30] audit: type=1400 audit(154.040:64): avc: denied { module_request } for pid=3309 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 154.346735][ T30] audit: type=1400 audit(154.040:63): avc: denied { module_request } for pid=3308 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 154.484873][ T30] audit: type=1400 audit(154.180:65): avc: denied { sys_module } for pid=3309 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 158.882876][ T3309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 158.961041][ T3309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 159.218713][ T3308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.239657][ T3308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.121923][ T3309] hsr_slave_0: entered promiscuous mode [ 161.133071][ T3309] hsr_slave_1: entered promiscuous mode [ 161.512042][ T3308] hsr_slave_0: entered promiscuous mode [ 161.517839][ T3308] hsr_slave_1: entered promiscuous mode [ 161.520707][ T3308] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 161.522572][ T3308] Cannot create hsr debugfs directory [ 162.853940][ T30] audit: type=1400 audit(162.540:66): avc: denied { create } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 162.864248][ T30] audit: type=1400 audit(162.550:67): avc: denied { write } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 162.864794][ T30] audit: type=1400 audit(162.550:68): avc: denied { read } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 162.876328][ T3309] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 162.940533][ T3309] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 162.981560][ T3309] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 163.050839][ T3309] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 163.367107][ T3308] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 163.395640][ T3308] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 163.416739][ T3308] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 163.461162][ T3308] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 165.410053][ T3309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.472116][ T3308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 171.501707][ T3308] veth0_vlan: entered promiscuous mode [ 171.557860][ T3308] veth1_vlan: entered promiscuous mode [ 171.747252][ T3309] veth0_vlan: entered promiscuous mode [ 171.810128][ T3308] veth0_macvtap: entered promiscuous mode [ 171.842025][ T3308] veth1_macvtap: entered promiscuous mode [ 171.857494][ T3309] veth1_vlan: entered promiscuous mode [ 172.097555][ T3309] veth0_macvtap: entered promiscuous mode [ 172.123027][ T3308] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.125529][ T3308] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.125988][ T3308] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.126248][ T3308] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.165739][ T3309] veth1_macvtap: entered promiscuous mode [ 172.490497][ T30] audit: type=1400 audit(172.180:69): avc: denied { mount } for pid=3308 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 172.527121][ T30] audit: type=1400 audit(172.220:70): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/syzkaller.QTSkMz/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 172.540127][ T30] audit: type=1400 audit(172.230:71): avc: denied { mount } for pid=3308 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 172.543138][ T3309] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.565989][ T3309] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.571028][ T3309] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.572113][ T3309] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 172.574470][ T30] audit: type=1400 audit(172.260:72): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/syzkaller.QTSkMz/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 172.582710][ T30] audit: type=1400 audit(172.270:73): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/syzkaller.QTSkMz/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 172.639461][ T30] audit: type=1400 audit(172.330:74): avc: denied { unmount } for pid=3308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 172.668571][ T30] audit: type=1400 audit(172.360:75): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1550 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 172.681819][ T30] audit: type=1400 audit(172.370:76): avc: denied { mount } for pid=3308 comm="syz-executor" name="/" dev="gadgetfs" ino=3413 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 172.726112][ T30] audit: type=1400 audit(172.420:77): avc: denied { mount } for pid=3308 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 172.732184][ T30] audit: type=1400 audit(172.420:78): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 173.148085][ T3308] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 177.499336][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 177.501723][ T30] audit: type=1400 audit(177.190:93): avc: denied { module_load } for pid=3494 comm="syz.0.19" path="/sys/power/wakeup_count" dev="sysfs" ino=873 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 178.002766][ T30] audit: type=1400 audit(177.690:94): avc: denied { unmount } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 178.389328][ T30] audit: type=1400 audit(178.080:95): avc: denied { read write } for pid=3501 comm="syz.0.21" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 178.391549][ T30] audit: type=1400 audit(178.080:96): avc: denied { open } for pid=3501 comm="syz.0.21" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 178.839172][ T30] audit: type=1400 audit(178.530:97): avc: denied { mount } for pid=3505 comm="syz.1.22" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 178.974480][ T30] audit: type=1400 audit(178.650:98): avc: denied { unmount } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 179.022262][ T30] audit: type=1400 audit(178.710:99): avc: denied { unmount } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 179.149670][ T3510] Zero length message leads to an empty skb [ 179.846556][ T30] audit: type=1400 audit(179.530:100): avc: denied { create } for pid=3516 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 179.883990][ T30] audit: type=1400 audit(179.570:101): avc: denied { connect } for pid=3516 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 180.264952][ T30] audit: type=1400 audit(179.950:102): avc: denied { create } for pid=3520 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 187.194678][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 187.198311][ T30] audit: type=1400 audit(186.880:104): avc: denied { write } for pid=3549 comm="syz.0.40" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 187.211712][ T30] audit: type=1400 audit(186.900:105): avc: denied { ioctl } for pid=3549 comm="syz.0.40" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 187.536684][ T1912] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 187.792361][ T1912] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 187.795020][ T1912] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 187.836786][ T1912] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 187.837383][ T1912] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 187.843118][ T1912] usb 1-1: Product: syz [ 187.844485][ T1912] usb 1-1: Manufacturer: syz [ 187.844894][ T1912] usb 1-1: SerialNumber: syz [ 188.161956][ T3550] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 188.628383][ T1912] cdc_mbim 1-1:1.0: failed GET_NTB_PARAMETERS [ 188.631347][ T1912] cdc_mbim 1-1:1.0: bind() failure [ 188.762856][ T1912] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 188.765012][ T1912] cdc_ncm 1-1:1.1: bind() failure [ 194.175736][ T30] audit: type=1400 audit(193.860:106): avc: denied { read write } for pid=3559 comm="syz.1.43" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 194.180744][ T30] audit: type=1400 audit(193.870:107): avc: denied { open } for pid=3559 comm="syz.1.43" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 194.194559][ T30] audit: type=1400 audit(193.880:108): avc: denied { ioctl } for pid=3559 comm="syz.1.43" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 194.228380][ T30] audit: type=1400 audit(193.910:109): avc: denied { create } for pid=3559 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 194.234286][ T30] audit: type=1400 audit(193.920:110): avc: denied { connect } for pid=3559 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 197.351119][ T30] audit: type=1400 audit(197.040:111): avc: denied { setattr } for pid=3568 comm="syz.1.45" name="seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 197.535931][ T3571] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 197.540048][ T3571] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 197.692267][ T30] audit: type=1400 audit(197.380:112): avc: denied { create } for pid=3572 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 197.715653][ T30] audit: type=1400 audit(197.410:113): avc: denied { bind } for pid=3572 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 197.724538][ T30] audit: type=1400 audit(197.410:114): avc: denied { write } for pid=3572 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 197.737598][ T30] audit: type=1400 audit(197.430:115): avc: denied { read } for pid=3572 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 200.208054][ T30] audit: type=1400 audit(199.900:116): avc: denied { name_bind } for pid=3576 comm="syz.1.48" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 200.212116][ T30] audit: type=1400 audit(199.900:117): avc: denied { node_bind } for pid=3576 comm="syz.1.48" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 200.666886][ T30] audit: type=1400 audit(200.360:118): avc: denied { allowed } for pid=3578 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 200.688510][ T30] audit: type=1400 audit(200.380:119): avc: denied { create } for pid=3578 comm="syz.1.49" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 201.350831][ T3583] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 201.359590][ T3583] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 201.680665][ T30] audit: type=1400 audit(201.370:120): avc: denied { open } for pid=3584 comm="syz.1.52" path="/dev/ptyq7" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 201.708449][ T30] audit: type=1400 audit(201.390:121): avc: denied { ioctl } for pid=3584 comm="syz.1.52" path="/dev/ptyq7" dev="devtmpfs" ino=118 ioctlcmd=0x4b4d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 202.079099][ T30] audit: type=1400 audit(201.770:122): avc: denied { read } for pid=3586 comm="syz.1.53" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 202.082094][ T30] audit: type=1400 audit(201.770:123): avc: denied { open } for pid=3586 comm="syz.1.53" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 202.151433][ T40] usb 1-1: USB disconnect, device number 2 [ 202.201639][ T30] audit: type=1400 audit(201.890:124): avc: denied { ioctl } for pid=3586 comm="syz.1.53" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3313 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 202.628436][ T30] audit: type=1400 audit(202.320:125): avc: denied { append } for pid=3590 comm="syz.1.55" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 202.655966][ T3591] binder: 3590:3591 ioctl 4004662b 0 returned -22 [ 204.030145][ T3602] netlink: 'syz.1.60': attribute type 27 has an invalid length. [ 206.522274][ T3607] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2561 sclass=netlink_tcpdiag_socket pid=3607 comm=syz.0.61 [ 206.680489][ T3602] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 206.681053][ T3602] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 206.681275][ T3602] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 206.681539][ T3602] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 207.338975][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 207.339421][ T30] audit: type=1400 audit(207.020:136): avc: denied { create } for pid=3610 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 207.339668][ T30] audit: type=1400 audit(207.030:137): avc: denied { write } for pid=3610 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 207.504132][ T30] audit: type=1400 audit(207.190:138): avc: denied { ioctl } for pid=3612 comm="syz.1.64" path="socket:[4404]" dev="sockfs" ino=4404 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 207.621903][ T30] audit: type=1400 audit(207.310:139): avc: denied { map_create } for pid=3614 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 207.841220][ T30] audit: type=1400 audit(207.530:140): avc: denied { map_read map_write } for pid=3614 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 212.714637][ T30] audit: type=1400 audit(212.400:141): avc: denied { read } for pid=3646 comm="syz.1.80" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 212.716955][ T30] audit: type=1400 audit(212.410:142): avc: denied { open } for pid=3646 comm="syz.1.80" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 213.072103][ T30] audit: type=1400 audit(212.760:143): avc: denied { read } for pid=3651 comm="syz.0.83" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 213.077553][ T30] audit: type=1400 audit(212.770:144): avc: denied { open } for pid=3651 comm="syz.0.83" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 213.093078][ T30] audit: type=1400 audit(212.780:145): avc: denied { ioctl } for pid=3651 comm="syz.0.83" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 215.035932][ T3677] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3677 comm=syz.0.95 [ 216.875092][ T30] audit: type=1400 audit(216.560:146): avc: denied { create } for pid=3688 comm="syz.0.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 216.888047][ T30] audit: type=1400 audit(216.580:147): avc: denied { connect } for pid=3688 comm="syz.0.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 221.430299][ T30] audit: type=1400 audit(221.120:148): avc: denied { mounton } for pid=3731 comm="syz.1.121" path="/58/file0" dev="tmpfs" ino=316 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 224.157259][ T30] audit: type=1400 audit(223.850:149): avc: denied { create } for pid=3766 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 224.176375][ T30] audit: type=1400 audit(223.870:150): avc: denied { write } for pid=3766 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 224.416218][ T30] audit: type=1400 audit(224.110:151): avc: denied { ioctl } for pid=3769 comm="syz.1.141" path="socket:[3903]" dev="sockfs" ino=3903 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 228.907480][ T30] audit: type=1400 audit(228.600:152): avc: denied { write } for pid=3823 comm="syz.1.165" name="packet" dev="proc" ino=4026532779 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 230.105818][ T30] audit: type=1400 audit(229.800:153): avc: denied { create } for pid=3837 comm="syz.1.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 230.143934][ T30] audit: type=1400 audit(229.830:154): avc: denied { getopt } for pid=3837 comm="syz.1.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 231.532683][ T3858] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3858 comm=syz.1.183 [ 242.029088][ T3968] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3968 comm=syz.0.237 [ 247.070741][ T30] audit: type=1400 audit(246.760:155): avc: denied { read } for pid=4036 comm="syz.1.271" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 247.098079][ T30] audit: type=1400 audit(246.790:156): avc: denied { map } for pid=4036 comm="syz.1.271" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 247.120223][ T4037] binder_alloc: binder_alloc_mmap_handler: 4036 20ff8000-20ffc000 already mapped failed -16 [ 248.263939][ T30] audit: type=1400 audit(247.940:157): avc: denied { connect } for pid=4052 comm="syz.1.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 248.264600][ T30] audit: type=1400 audit(247.940:158): avc: denied { name_connect } for pid=4052 comm="syz.1.279" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 248.298512][ T30] audit: type=1400 audit(247.990:159): avc: denied { listen } for pid=4052 comm="syz.1.279" lport=59956 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 248.742427][ T30] audit: type=1400 audit(248.430:160): avc: denied { accept } for pid=4052 comm="syz.1.279" lport=59956 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 248.765973][ T30] audit: type=1400 audit(248.460:161): avc: denied { write } for pid=4052 comm="syz.1.279" path="socket:[5391]" dev="sockfs" ino=5391 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 249.552382][ T30] audit: type=1400 audit(249.240:162): avc: denied { mounton } for pid=4063 comm="syz.0.283" path="/135/file0" dev="tmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 250.181191][ T30] audit: type=1400 audit(249.870:163): avc: denied { setattr } for pid=4063 comm="syz.0.283" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 250.527529][ T30] audit: type=1400 audit(250.220:164): avc: denied { setopt } for pid=4071 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 252.142669][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 252.145263][ T30] audit: type=1400 audit(251.830:172): avc: denied { perfmon } for pid=4089 comm="syz.1.295" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 253.042649][ T30] audit: type=1400 audit(252.730:173): avc: denied { execute } for pid=4094 comm="syz.1.297" path="/155/cpu.stat" dev="tmpfs" ino=810 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 255.076194][ T30] audit: type=1400 audit(254.760:174): avc: denied { set_context_mgr } for pid=4105 comm="syz.1.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 256.094022][ T30] audit: type=1400 audit(255.780:175): avc: denied { associate } for pid=4112 comm="syz.1.304" name="3" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 256.294544][ T4115] binder: 4114:4115 ioctl 4018620d 0 returned -22 [ 256.305365][ T4115] binder: 4114:4115 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 256.307401][ T4115] binder: 4115 RLIMIT_NICE not set [ 258.159252][ T30] audit: type=1400 audit(257.850:176): avc: denied { create } for pid=4125 comm="syz.1.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 258.310439][ T4128] capability: warning: `syz.0.310' uses 32-bit capabilities (legacy support in use) [ 258.452463][ T30] audit: type=1400 audit(258.140:177): avc: denied { setopt } for pid=4129 comm="syz.1.311" lport=128 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 258.461333][ T4130] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 259.299587][ T30] audit: type=1400 audit(258.990:178): avc: denied { setattr } for pid=4135 comm="syz.1.314" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 259.380281][ T23] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 259.607461][ T23] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 259.608358][ T23] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 259.662814][ T23] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 259.664261][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 259.664728][ T23] usb 1-1: Product: syz [ 259.664928][ T23] usb 1-1: Manufacturer: syz [ 259.665120][ T23] usb 1-1: SerialNumber: syz [ 259.918872][ T30] audit: type=1400 audit(259.610:179): avc: denied { write } for pid=4140 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 259.958874][ T4136] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 260.439751][ T23] cdc_mbim 1-1:1.0: failed GET_NTB_PARAMETERS [ 260.440506][ T23] cdc_mbim 1-1:1.0: bind() failure [ 260.464710][ T30] audit: type=1400 audit(260.150:180): avc: denied { ioctl } for pid=4140 comm="syz.1.316" path="socket:[5512]" dev="sockfs" ino=5512 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 260.478033][ T30] audit: type=1400 audit(260.170:181): avc: denied { read } for pid=4140 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 260.496889][ T23] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 260.497518][ T23] cdc_ncm 1-1:1.1: bind() failure [ 260.958760][ T4147] FAULT_INJECTION: forcing a failure. [ 260.958760][ T4147] name failslab, interval 1, probability 0, space 0, times 1 [ 260.972357][ T4147] CPU: 0 UID: 0 PID: 4147 Comm: syz.1.318 Not tainted 6.15.0-syzkaller-13804-g939f15e640f1 #0 PREEMPT [ 260.972628][ T4147] Hardware name: linux,dummy-virt (DT) [ 260.972943][ T4147] Call trace: [ 260.973231][ T4147] show_stack+0x18/0x24 (C) [ 260.974361][ T4147] dump_stack_lvl+0xdc/0xf4 [ 260.974433][ T4147] dump_stack+0x1c/0x28 [ 260.974479][ T4147] should_fail_ex+0x5a0/0x6ac [ 260.974527][ T4147] should_failslab+0xbc/0x11c [ 260.974575][ T4147] __kmalloc_noprof+0xd0/0x4d0 [ 260.974624][ T4147] tomoyo_realpath_from_path+0x90/0x534 [ 260.974670][ T4147] tomoyo_path_number_perm+0x200/0x438 [ 260.974713][ T4147] tomoyo_file_ioctl+0x1c/0x28 [ 260.974756][ T4147] security_file_ioctl_compat+0x8c/0x19c [ 260.974802][ T4147] __arm64_compat_sys_ioctl+0x98/0x238 [ 260.974850][ T4147] invoke_syscall+0x6c/0x258 [ 260.974893][ T4147] el0_svc_common.constprop.0+0xac/0x230 [ 260.974937][ T4147] do_el0_svc_compat+0x40/0x68 [ 260.974979][ T4147] el0_svc_compat+0x4c/0x17c [ 260.975025][ T4147] el0t_32_sync_handler+0x98/0x13c [ 260.975070][ T4147] el0t_32_sync+0x19c/0x1a0 [ 260.991282][ T4147] ERROR: Out of memory at tomoyo_realpath_from_path. [ 261.252847][ T30] audit: type=1400 audit(260.940:182): avc: denied { connect } for pid=4148 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 264.761288][ T4159] FAULT_INJECTION: forcing a failure. [ 264.761288][ T4159] name failslab, interval 1, probability 0, space 0, times 0 [ 264.762848][ T4159] CPU: 0 UID: 0 PID: 4159 Comm: syz.1.323 Not tainted 6.15.0-syzkaller-13804-g939f15e640f1 #0 PREEMPT [ 264.762918][ T4159] Hardware name: linux,dummy-virt (DT) [ 264.762951][ T4159] Call trace: [ 264.762980][ T4159] show_stack+0x18/0x24 (C) [ 264.763057][ T4159] dump_stack_lvl+0xdc/0xf4 [ 264.763107][ T4159] dump_stack+0x1c/0x28 [ 264.763195][ T4159] should_fail_ex+0x5a0/0x6ac [ 264.763279][ T4159] should_failslab+0xbc/0x11c [ 264.763334][ T4159] __kmalloc_noprof+0xd0/0x4d0 [ 264.763383][ T4159] tomoyo_realpath_from_path+0x90/0x534 [ 264.763431][ T4159] tomoyo_path_number_perm+0x200/0x438 [ 264.763476][ T4159] tomoyo_file_ioctl+0x1c/0x28 [ 264.763520][ T4159] security_file_ioctl_compat+0x8c/0x19c [ 264.763642][ T4159] __arm64_compat_sys_ioctl+0x98/0x238 [ 264.763699][ T4159] invoke_syscall+0x6c/0x258 [ 264.763745][ T4159] el0_svc_common.constprop.0+0xac/0x230 [ 264.763789][ T4159] do_el0_svc_compat+0x40/0x68 [ 264.763832][ T4159] el0_svc_compat+0x4c/0x17c [ 264.763879][ T4159] el0t_32_sync_handler+0x98/0x13c [ 264.763925][ T4159] el0t_32_sync+0x19c/0x1a0 [ 264.776930][ T4159] ERROR: Out of memory at tomoyo_realpath_from_path. [ 265.012720][ T4161] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4161 comm=syz.1.324 [ 265.176736][ T4163] FAULT_INJECTION: forcing a failure. [ 265.176736][ T4163] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 265.178327][ T4163] CPU: 0 UID: 0 PID: 4163 Comm: syz.1.325 Not tainted 6.15.0-syzkaller-13804-g939f15e640f1 #0 PREEMPT [ 265.178397][ T4163] Hardware name: linux,dummy-virt (DT) [ 265.178431][ T4163] Call trace: [ 265.178460][ T4163] show_stack+0x18/0x24 (C) [ 265.178537][ T4163] dump_stack_lvl+0xdc/0xf4 [ 265.178588][ T4163] dump_stack+0x1c/0x28 [ 265.178630][ T4163] should_fail_ex+0x5a0/0x6ac [ 265.178678][ T4163] should_fail+0x14/0x20 [ 265.178720][ T4163] should_fail_usercopy+0x1c/0x28 [ 265.178762][ T4163] _inline_copy_from_user+0x34/0x134 [ 265.178811][ T4163] get_compat_msghdr+0x90/0x118 [ 265.178854][ T4163] ___sys_sendmsg+0x184/0x19c [ 265.178906][ T4163] __sys_sendmsg+0x114/0x19c [ 265.178953][ T4163] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 265.178998][ T4163] invoke_syscall+0x6c/0x258 [ 265.179043][ T4163] el0_svc_common.constprop.0+0xac/0x230 [ 265.179087][ T4163] do_el0_svc_compat+0x40/0x68 [ 265.179130][ T4163] el0_svc_compat+0x4c/0x17c [ 265.179177][ T4163] el0t_32_sync_handler+0x98/0x13c [ 265.179272][ T4163] el0t_32_sync+0x19c/0x1a0 [ 265.485601][ T4167] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=4167 comm=syz.1.327 [ 265.499800][ T30] audit: type=1400 audit(265.190:183): avc: denied { nlmsg_write } for pid=4166 comm="syz.1.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 265.780658][ T30] audit: type=1400 audit(265.470:184): avc: denied { create } for pid=4170 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 265.789676][ T30] audit: type=1400 audit(265.480:185): avc: denied { setattr } for pid=4170 comm="syz.1.329" name="NETLINK" dev="sockfs" ino=5577 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 265.799443][ T30] audit: type=1400 audit(265.490:186): avc: denied { ioctl } for pid=4170 comm="syz.1.329" path="socket:[5577]" dev="sockfs" ino=5577 ioctlcmd=0x662c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 265.838935][ T30] audit: type=1400 audit(265.530:187): avc: denied { write } for pid=4170 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 265.841590][ T4171] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4171 comm=syz.1.329 [ 266.370211][ T30] audit: type=1400 audit(266.060:188): avc: denied { getopt } for pid=4170 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 266.411130][ T30] audit: type=1400 audit(266.100:189): avc: denied { nlmsg_write } for pid=4170 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 266.422151][ T30] audit: type=1400 audit(266.110:190): avc: denied { read } for pid=4170 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 268.498427][ T4175] FAULT_INJECTION: forcing a failure. [ 268.498427][ T4175] name failslab, interval 1, probability 0, space 0, times 0 [ 268.499022][ T4175] CPU: 1 UID: 0 PID: 4175 Comm: syz.1.330 Not tainted 6.15.0-syzkaller-13804-g939f15e640f1 #0 PREEMPT [ 268.499083][ T4175] Hardware name: linux,dummy-virt (DT) [ 268.499151][ T4175] Call trace: [ 268.499185][ T4175] show_stack+0x18/0x24 (C) [ 268.499288][ T4175] dump_stack_lvl+0xdc/0xf4 [ 268.499346][ T4175] dump_stack+0x1c/0x28 [ 268.499392][ T4175] should_fail_ex+0x5a0/0x6ac [ 268.499443][ T4175] should_failslab+0xbc/0x11c [ 268.499501][ T4175] __kmalloc_noprof+0xd0/0x4d0 [ 268.499553][ T4175] tomoyo_realpath_from_path+0x90/0x534 [ 268.499603][ T4175] tomoyo_path_number_perm+0x200/0x438 [ 268.499650][ T4175] tomoyo_file_ioctl+0x1c/0x28 [ 268.499698][ T4175] security_file_ioctl_compat+0x8c/0x19c [ 268.499748][ T4175] __arm64_compat_sys_ioctl+0x98/0x238 [ 268.499801][ T4175] invoke_syscall+0x6c/0x258 [ 268.499847][ T4175] el0_svc_common.constprop.0+0xac/0x230 [ 268.499893][ T4175] do_el0_svc_compat+0x40/0x68 [ 268.499938][ T4175] el0_svc_compat+0x4c/0x17c [ 268.499988][ T4175] el0t_32_sync_handler+0x98/0x13c [ 268.500036][ T4175] el0t_32_sync+0x19c/0x1a0 [ 268.500107][ T4175] ERROR: Out of memory at tomoyo_realpath_from_path. [ 269.116967][ T4181] FAULT_INJECTION: forcing a failure. [ 269.116967][ T4181] name failslab, interval 1, probability 0, space 0, times 0 [ 269.117557][ T4181] CPU: 1 UID: 0 PID: 4181 Comm: syz.1.333 Not tainted 6.15.0-syzkaller-13804-g939f15e640f1 #0 PREEMPT [ 269.117620][ T4181] Hardware name: linux,dummy-virt (DT) [ 269.117652][ T4181] Call trace: [ 269.117680][ T4181] show_stack+0x18/0x24 (C) [ 269.117775][ T4181] dump_stack_lvl+0xdc/0xf4 [ 269.117829][ T4181] dump_stack+0x1c/0x28 [ 269.117870][ T4181] should_fail_ex+0x5a0/0x6ac [ 269.117930][ T4181] should_failslab+0xbc/0x11c [ 269.117984][ T4181] __kmalloc_noprof+0xd0/0x4d0 [ 269.118033][ T4181] tomoyo_realpath_from_path+0x90/0x534 [ 269.118080][ T4181] tomoyo_path_number_perm+0x200/0x438 [ 269.118135][ T4181] tomoyo_file_ioctl+0x1c/0x28 [ 269.118182][ T4181] security_file_ioctl_compat+0x8c/0x19c [ 269.118236][ T4181] __arm64_compat_sys_ioctl+0x98/0x238 [ 269.118286][ T4181] invoke_syscall+0x6c/0x258 [ 269.118329][ T4181] el0_svc_common.constprop.0+0xac/0x230 [ 269.118374][ T4181] do_el0_svc_compat+0x40/0x68 [ 269.118417][ T4181] el0_svc_compat+0x4c/0x17c [ 269.118464][ T4181] el0t_32_sync_handler+0x98/0x13c [ 269.118510][ T4181] el0t_32_sync+0x19c/0x1a0 [ 269.118588][ T4181] ERROR: Out of memory at tomoyo_realpath_from_path. [ 269.319636][ T30] audit: type=1400 audit(269.010:191): avc: denied { create } for pid=4182 comm="syz.1.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 269.324984][ T30] audit: type=1400 audit(269.020:192): avc: denied { write } for pid=4182 comm="syz.1.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 269.787075][ T963] hid (null): bogus close delimiter [ 269.788464][ T963] hid (null): invalid report_count 52508 [ 269.857430][ T963] hid-generic 0004:0003:E901.0001: collection stack underflow [ 269.858327][ T963] hid-generic 0004:0003:E901.0001: item 0 0 0 12 parsing failed [ 269.861482][ T963] hid-generic 0004:0003:E901.0001: probe with driver hid-generic failed with error -22 [ 270.690980][ T4189] FAULT_INJECTION: forcing a failure. [ 270.690980][ T4189] name failslab, interval 1, probability 0, space 0, times 0 [ 270.691579][ T4189] CPU: 1 UID: 0 PID: 4189 Comm: syz.1.336 Not tainted 6.15.0-syzkaller-13804-g939f15e640f1 #0 PREEMPT [ 270.691639][ T4189] Hardware name: linux,dummy-virt (DT) [ 270.691729][ T4189] Call trace: [ 270.691761][ T4189] show_stack+0x18/0x24 (C) [ 270.691834][ T4189] dump_stack_lvl+0xdc/0xf4 [ 270.691883][ T4189] dump_stack+0x1c/0x28 [ 270.691935][ T4189] should_fail_ex+0x5a0/0x6ac [ 270.691986][ T4189] should_failslab+0xbc/0x11c [ 270.692036][ T4189] __kmalloc_noprof+0xd0/0x4d0 [ 270.692111][ T4189] tomoyo_realpath_from_path+0x90/0x534 [ 270.692164][ T4189] tomoyo_path_number_perm+0x200/0x438 [ 270.692215][ T4189] tomoyo_file_ioctl+0x1c/0x28 [ 270.692259][ T4189] security_file_ioctl_compat+0x8c/0x19c [ 270.692306][ T4189] __arm64_compat_sys_ioctl+0x98/0x238 [ 270.692356][ T4189] invoke_syscall+0x6c/0x258 [ 270.692400][ T4189] el0_svc_common.constprop.0+0xac/0x230 [ 270.692443][ T4189] do_el0_svc_compat+0x40/0x68 [ 270.692486][ T4189] el0_svc_compat+0x4c/0x17c [ 270.692546][ T4189] el0t_32_sync_handler+0x98/0x13c [ 270.692598][ T4189] el0t_32_sync+0x19c/0x1a0 [ 270.692674][ T4189] ERROR: Out of memory at tomoyo_realpath_from_path. [ 270.775426][ T4189] binder: 4189:4188 cannot find target node [ 270.776705][ T4189] binder: 4188:4189 transaction call to 0:0 failed 3/29189/-22, code 0 size 88-24 line 3152 [ 270.834024][ T3454] binder: undelivered TRANSACTION_ERROR: 29189 [ 271.456778][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 271.462242][ T30] audit: type=1400 audit(271.150:198): avc: denied { read } for pid=4194 comm="syz.1.338" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 271.466703][ T30] audit: type=1400 audit(271.160:199): avc: denied { open } for pid=4194 comm="syz.1.338" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 271.479646][ T30] audit: type=1400 audit(271.170:200): avc: denied { ioctl } for pid=4194 comm="syz.1.338" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9377 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 271.502538][ T30] audit: type=1400 audit(271.190:201): avc: denied { create } for pid=4194 comm="syz.1.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 271.536592][ T4195] binder: 4195:4194 cannot find target node [ 271.537000][ T4195] binder: 4194:4195 transaction call to 0:0 failed 5/29189/-22, code 0 size 72-24 line 3152 [ 271.548270][ T3453] binder: undelivered TRANSACTION_ERROR: 29189 [ 271.987568][ T4199] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 272.022826][ T30] audit: type=1400 audit(271.710:202): avc: denied { ioctl } for pid=4198 comm="syz.1.340" path="socket:[5618]" dev="sockfs" ino=5618 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 273.023836][ T30] audit: type=1400 audit(272.710:203): avc: denied { write } for pid=4204 comm="syz.1.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 273.051500][ T30] audit: type=1400 audit(272.740:204): avc: denied { ioctl } for pid=4204 comm="syz.1.341" path="socket:[6427]" dev="sockfs" ino=6427 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 273.246986][ T4207] FAULT_INJECTION: forcing a failure. [ 273.246986][ T4207] name failslab, interval 1, probability 0, space 0, times 0 [ 273.248492][ T4207] CPU: 0 UID: 0 PID: 4207 Comm: syz.1.342 Not tainted 6.15.0-syzkaller-13804-g939f15e640f1 #0 PREEMPT [ 273.248564][ T4207] Hardware name: linux,dummy-virt (DT) [ 273.248598][ T4207] Call trace: [ 273.248626][ T4207] show_stack+0x18/0x24 (C) [ 273.248701][ T4207] dump_stack_lvl+0xdc/0xf4 [ 273.248751][ T4207] dump_stack+0x1c/0x28 [ 273.248793][ T4207] should_fail_ex+0x5a0/0x6ac [ 273.248841][ T4207] should_failslab+0xbc/0x11c [ 273.248923][ T4207] __kmalloc_noprof+0xd0/0x4d0 [ 273.249008][ T4207] tomoyo_encode2+0xa8/0x2c0 [ 273.249057][ T4207] tomoyo_encode+0x28/0x40 [ 273.249100][ T4207] tomoyo_realpath_from_path+0x114/0x534 [ 273.249186][ T4207] tomoyo_path_number_perm+0x200/0x438 [ 273.249241][ T4207] tomoyo_file_ioctl+0x1c/0x28 [ 273.249289][ T4207] security_file_ioctl_compat+0x8c/0x19c [ 273.249390][ T4207] __arm64_compat_sys_ioctl+0x98/0x238 [ 273.249442][ T4207] invoke_syscall+0x6c/0x258 [ 273.249491][ T4207] el0_svc_common.constprop.0+0xac/0x230 [ 273.249535][ T4207] do_el0_svc_compat+0x40/0x68 [ 273.249578][ T4207] el0_svc_compat+0x4c/0x17c [ 273.249626][ T4207] el0t_32_sync_handler+0x98/0x13c [ 273.249671][ T4207] el0t_32_sync+0x19c/0x1a0 [ 273.260352][ T4207] ERROR: Out of memory at tomoyo_realpath_from_path. [ 273.418527][ T30] audit: type=1400 audit(273.110:205): avc: denied { getopt } for pid=4208 comm="syz.1.343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 273.530100][ T30] audit: type=1400 audit(273.220:206): avc: denied { connect } for pid=4208 comm="syz.1.343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 273.542075][ T30] audit: type=1400 audit(273.230:207): avc: denied { write } for pid=4208 comm="syz.1.343" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 273.721038][ T4211] FAULT_INJECTION: forcing a failure. [ 273.721038][ T4211] name failslab, interval 1, probability 0, space 0, times 0 [ 273.724000][ T4211] CPU: 0 UID: 0 PID: 4211 Comm: syz.1.344 Not tainted 6.15.0-syzkaller-13804-g939f15e640f1 #0 PREEMPT [ 273.724075][ T4211] Hardware name: linux,dummy-virt (DT) [ 273.724111][ T4211] Call trace: [ 273.724140][ T4211] show_stack+0x18/0x24 (C) [ 273.724227][ T4211] dump_stack_lvl+0xdc/0xf4 [ 273.724281][ T4211] dump_stack+0x1c/0x28 [ 273.724325][ T4211] should_fail_ex+0x5a0/0x6ac [ 273.724372][ T4211] should_failslab+0xbc/0x11c [ 273.724423][ T4211] __kmalloc_noprof+0xd0/0x4d0 [ 273.724474][ T4211] tomoyo_encode2+0xa8/0x2c0 [ 273.724523][ T4211] tomoyo_encode+0x28/0x40 [ 273.724568][ T4211] tomoyo_realpath_from_path+0x114/0x534 [ 273.724612][ T4211] tomoyo_path_number_perm+0x200/0x438 [ 273.724655][ T4211] tomoyo_file_ioctl+0x1c/0x28 [ 273.724699][ T4211] security_file_ioctl_compat+0x8c/0x19c [ 273.724748][ T4211] __arm64_compat_sys_ioctl+0x98/0x238 [ 273.724798][ T4211] invoke_syscall+0x6c/0x258 [ 273.724844][ T4211] el0_svc_common.constprop.0+0xac/0x230 [ 273.724887][ T4211] do_el0_svc_compat+0x40/0x68 [ 273.724930][ T4211] el0_svc_compat+0x4c/0x17c [ 273.724976][ T4211] el0t_32_sync_handler+0x98/0x13c [ 273.725022][ T4211] el0t_32_sync+0x19c/0x1a0 [ 273.740304][ T4211] ERROR: Out of memory at tomoyo_realpath_from_path. [ 273.901601][ T4213] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4213 comm=syz.1.345 [ 274.085234][ T3453] usb 1-1: USB disconnect, device number 3 [ 275.037862][ T4226] FAULT_INJECTION: forcing a failure. [ 275.037862][ T4226] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 275.039280][ T4226] CPU: 0 UID: 0 PID: 4226 Comm: syz.0.350 Not tainted 6.15.0-syzkaller-13804-g939f15e640f1 #0 PREEMPT [ 275.039346][ T4226] Hardware name: linux,dummy-virt (DT) [ 275.039380][ T4226] Call trace: [ 275.039407][ T4226] show_stack+0x18/0x24 (C) [ 275.039483][ T4226] dump_stack_lvl+0xdc/0xf4 [ 275.039535][ T4226] dump_stack+0x1c/0x28 [ 275.039577][ T4226] should_fail_ex+0x5a0/0x6ac [ 275.039625][ T4226] should_fail+0x14/0x20 [ 275.039667][ T4226] should_fail_usercopy+0x1c/0x28 [ 275.039710][ T4226] _copy_from_iter+0x178/0xff4 [ 275.039756][ T4226] copy_page_from_iter+0x12c/0x19c [ 275.039800][ T4226] tun_build_skb.constprop.0+0x2c8/0x12a8 [ 275.039891][ T4226] tun_get_user+0x16dc/0x2ae0 [ 275.039961][ T4226] tun_chr_write_iter+0xac/0x1b0 [ 275.040009][ T4226] vfs_write+0x4b0/0xad4 [ 275.040057][ T4226] ksys_write+0xec/0x1d8 [ 275.040100][ T4226] __arm64_sys_write+0x6c/0x9c [ 275.040142][ T4226] invoke_syscall+0x6c/0x258 [ 275.040187][ T4226] el0_svc_common.constprop.0+0xac/0x230 [ 275.040240][ T4226] do_el0_svc_compat+0x40/0x68 [ 275.040284][ T4226] el0_svc_compat+0x4c/0x17c [ 275.040331][ T4226] el0t_32_sync_handler+0x98/0x13c [ 275.040376][ T4226] el0t_32_sync+0x19c/0x1a0 [ 276.854667][ T30] audit: type=1400 audit(276.550:208): avc: denied { ioctl } for pid=4230 comm="syz.0.352" path="socket:[6550]" dev="sockfs" ino=6550 ioctlcmd=0x8940 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 277.384532][ T4237] FAULT_INJECTION: forcing a failure. [ 277.384532][ T4237] name failslab, interval 1, probability 0, space 0, times 0 [ 277.386556][ T4237] CPU: 0 UID: 0 PID: 4237 Comm: syz.0.353 Not tainted 6.15.0-syzkaller-13804-g939f15e640f1 #0 PREEMPT [ 277.386629][ T4237] Hardware name: linux,dummy-virt (DT) [ 277.386665][ T4237] Call trace: [ 277.386693][ T4237] show_stack+0x18/0x24 (C) [ 277.386778][ T4237] dump_stack_lvl+0xdc/0xf4 [ 277.386828][ T4237] dump_stack+0x1c/0x28 [ 277.386871][ T4237] should_fail_ex+0x5a0/0x6ac [ 277.386918][ T4237] should_failslab+0xbc/0x11c [ 277.386969][ T4237] __kmalloc_noprof+0xd0/0x4d0 [ 277.387018][ T4237] tomoyo_encode2+0xa8/0x2c0 [ 277.387065][ T4237] tomoyo_encode+0x28/0x40 [ 277.387108][ T4237] tomoyo_realpath_from_path+0x114/0x534 [ 277.387153][ T4237] tomoyo_path_number_perm+0x200/0x438 [ 277.387196][ T4237] tomoyo_file_ioctl+0x1c/0x28 [ 277.387249][ T4237] security_file_ioctl_compat+0x8c/0x19c [ 277.387298][ T4237] __arm64_compat_sys_ioctl+0x98/0x238 [ 277.387348][ T4237] invoke_syscall+0x6c/0x258 [ 277.387394][ T4237] el0_svc_common.constprop.0+0xac/0x230 [ 277.387438][ T4237] do_el0_svc_compat+0x40/0x68 [ 277.387482][ T4237] el0_svc_compat+0x4c/0x17c [ 277.387531][ T4237] el0t_32_sync_handler+0x98/0x13c [ 277.387577][ T4237] el0t_32_sync+0x19c/0x1a0 [ 277.404391][ T4237] ERROR: Out of memory at tomoyo_realpath_from_path. [ 277.829796][ T30] audit: type=1400 audit(277.520:209): avc: denied { ioctl } for pid=4240 comm="syz.0.355" path="socket:[6565]" dev="sockfs" ino=6565 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 277.869775][ T30] audit: type=1400 audit(277.560:210): avc: denied { create } for pid=4242 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 277.882083][ T30] audit: type=1400 audit(277.570:211): avc: denied { setopt } for pid=4242 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 278.099698][ T30] audit: type=1400 audit(277.780:212): avc: denied { create } for pid=4244 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 278.137950][ T30] audit: type=1400 audit(277.810:213): avc: denied { create } for pid=4244 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 278.165134][ T30] audit: type=1400 audit(277.860:214): avc: denied { bind } for pid=4244 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 278.170059][ T30] audit: type=1400 audit(277.860:215): avc: denied { setopt } for pid=4244 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 278.185406][ T30] audit: type=1400 audit(277.870:216): avc: denied { accept } for pid=4244 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 278.202867][ T30] audit: type=1400 audit(277.880:217): avc: denied { write } for pid=4244 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 280.744467][ T4268] raw_sendmsg: syz.0.367 forgot to set AF_INET. Fix it! [ 294.026124][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 294.026655][ T30] audit: type=1400 audit(293.720:226): avc: denied { read } for pid=4386 comm="syz.0.413" path="socket:[6790]" dev="sockfs" ino=6790 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 295.635766][ T4406] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4406 comm=syz.1.420 [ 296.182748][ T30] audit: type=1400 audit(295.870:227): avc: denied { connect } for pid=4409 comm="syz.0.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 297.291124][ T4422] binder: 4421:4422 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 297.305604][ T4422] binder: 4422 RLIMIT_NICE not set [ 299.711625][ T4437] process 'syz.0.429' launched './file0' with NULL argv: empty string added [ 302.839072][ T30] audit: type=1326 audit(302.530:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.1.436" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x0 [ 305.762541][ T4469] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 305.768853][ T4469] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 309.275538][ T30] audit: type=1400 audit(308.960:229): avc: denied { create } for pid=4473 comm="syz.1.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 309.279327][ T30] audit: type=1400 audit(308.970:230): avc: denied { create } for pid=4473 comm="syz.1.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 309.284516][ T30] audit: type=1400 audit(308.970:231): avc: denied { setopt } for pid=4473 comm="syz.1.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 309.460516][ T30] audit: type=1400 audit(309.150:232): avc: denied { bind } for pid=4473 comm="syz.1.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 309.465683][ T4474] netlink: 4 bytes leftover after parsing attributes in process `syz.1.443'. [ 310.069380][ T30] audit: type=1400 audit(309.760:233): avc: denied { map } for pid=4479 comm="syz.1.445" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6073 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 310.075019][ T30] audit: type=1400 audit(309.760:234): avc: denied { read write } for pid=4479 comm="syz.1.445" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6073 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 310.346915][ T30] audit: type=1400 audit(310.040:235): avc: denied { getopt } for pid=4481 comm="syz.1.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 311.491257][ T4491] netlink: 20 bytes leftover after parsing attributes in process `syz.1.449'. [ 311.492787][ T4491] 8021q: VLANs not supported on vcan0 [ 315.732067][ T30] audit: type=1400 audit(315.420:236): avc: denied { attach_queue } for pid=4512 comm="syz.0.455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 319.036410][ T4541] netlink: 4 bytes leftover after parsing attributes in process `syz.0.463'. [ 320.194462][ T30] audit: type=1326 audit(319.860:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4542 comm="syz.0.464" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x0 [ 320.935954][ T30] audit: type=1400 audit(320.630:238): avc: denied { read } for pid=4548 comm="syz.1.466" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 320.941499][ T30] audit: type=1400 audit(320.630:239): avc: denied { open } for pid=4548 comm="syz.1.466" path="/268/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 321.075798][ T4550] block device autoloading is deprecated and will be removed. [ 321.088954][ T30] audit: type=1400 audit(320.780:240): avc: denied { ioctl } for pid=4548 comm="syz.1.466" path="/268/file0/file0" dev="fuse" ino=64 ioctlcmd=0x933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 321.897753][ T30] audit: type=1400 audit(321.590:241): avc: denied { prog_run } for pid=4555 comm="syz.1.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 323.205212][ T4567] netlink: 'syz.1.470': attribute type 10 has an invalid length. [ 324.387505][ T4576] syz.1.475 uses obsolete (PF_INET,SOCK_PACKET) [ 325.090228][ T30] audit: type=1400 audit(324.780:242): avc: denied { load_policy } for pid=4580 comm="syz.1.478" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 325.107597][ T4581] SELinux: failed to load policy [ 325.391241][ T30] audit: type=1400 audit(325.080:243): avc: denied { shutdown } for pid=4584 comm="syz.1.480" lport=46007 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 327.271284][ T30] audit: type=1400 audit(326.960:244): avc: denied { name_bind } for pid=4594 comm="syz.1.484" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 327.487399][ T4597] input: syz1 as /devices/virtual/input/input3 [ 328.410961][ T30] audit: type=1400 audit(328.100:245): avc: denied { read write } for pid=4604 comm="syz.0.488" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 328.419806][ T30] audit: type=1400 audit(328.100:246): avc: denied { open } for pid=4604 comm="syz.0.488" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 330.817530][ T4630] input: syz0 as /devices/virtual/input/input4 [ 331.337945][ T4636] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 331.347263][ T4636] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 332.941649][ T4648] syzkaller1: entered promiscuous mode [ 332.954695][ T4648] syzkaller1: entered allmulticast mode [ 336.765021][ T30] audit: type=1400 audit(336.460:247): avc: denied { bind } for pid=4654 comm="syz.1.511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 338.640044][ T4669] netlink: 4 bytes leftover after parsing attributes in process `syz.0.517'. [ 339.592524][ T4674] block device autoloading is deprecated and will be removed. [ 340.351342][ T30] audit: type=1400 audit(340.040:248): avc: denied { connect } for pid=4678 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 340.361648][ T30] audit: type=1400 audit(340.050:249): avc: denied { setopt } for pid=4678 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 340.365089][ T30] audit: type=1400 audit(340.060:250): avc: denied { bind } for pid=4678 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 340.396768][ T30] audit: type=1400 audit(340.090:251): avc: denied { write } for pid=4678 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 343.575800][ T30] audit: type=1400 audit(343.270:252): avc: denied { write } for pid=4696 comm="syz.0.528" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 343.590118][ T4697] binder: 4696:4697 BC_ACQUIRE_DONE node 8 has no pending acquire request [ 343.592183][ T4697] binder: 4696:4697 got reply transaction with no transaction stack [ 343.594491][ T4697] binder: 4696:4697 transaction reply to 0:0 failed 9/29201/-71, code 0 size 0-0 line 3053 [ 343.619561][ T3417] binder: undelivered TRANSACTION_ERROR: 29201 [ 344.475210][ T30] audit: type=1400 audit(344.170:253): avc: denied { bind } for pid=4706 comm="syz.1.533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 345.435568][ T4716] smc: net device bond0 applied user defined pnetid SYZ0 [ 345.792417][ T30] audit: type=1400 audit(345.480:254): avc: denied { name_connect } for pid=4718 comm="syz.0.538" dest=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 346.341466][ T4725] netlink: 4 bytes leftover after parsing attributes in process `syz.0.538'. [ 347.452529][ T30] audit: type=1400 audit(347.140:255): avc: denied { bind } for pid=4738 comm="syz.0.547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 347.457209][ T30] audit: type=1400 audit(347.150:256): avc: denied { listen } for pid=4738 comm="syz.0.547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 347.476565][ T30] audit: type=1400 audit(347.170:257): avc: denied { read } for pid=4738 comm="syz.0.547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 348.962506][ T30] audit: type=1400 audit(348.650:258): avc: denied { write } for pid=4752 comm="syz.0.553" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 349.846398][ T4760] binder: 4759:4760 tried to acquire reference to desc 0, got 1 instead [ 349.847022][ T4760] binder: 4759:4760 ioctl c0306201 200003c0 returned -14 [ 349.852488][ T30] audit: type=1400 audit(349.540:259): avc: denied { call } for pid=4759 comm="syz.0.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 349.867693][ T4760] binder: 4759:4760 got transaction with invalid fd, -1 [ 349.870106][ T4760] binder: 4760:4759 translate fd failed [ 349.875577][ T4760] binder: 4759:4760 transaction call to 4759:0 failed 14/29201/-9, code 0 size 96-24 line 3521 [ 349.888619][ T9] binder: undelivered TRANSACTION_ERROR: 29201 [ 350.050027][ T30] audit: type=1400 audit(349.740:260): avc: denied { ioctl } for pid=4761 comm="syz.1.557" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=8400 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 350.597534][ T30] audit: type=1400 audit(350.290:261): avc: denied { map } for pid=4765 comm="syz.0.559" path="socket:[8404]" dev="sockfs" ino=8404 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 352.098389][ T30] audit: type=1400 audit(351.770:262): avc: denied { ioctl } for pid=4770 comm="syz.0.561" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x6608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 353.490669][ T4787] input: syz0 as /devices/virtual/input/input6 [ 353.644999][ T4788] block device autoloading is deprecated and will be removed. [ 354.986338][ T30] audit: type=1400 audit(354.680:263): avc: denied { bind } for pid=4802 comm="syz.0.574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 356.337426][ T30] audit: type=1400 audit(356.030:264): avc: denied { write } for pid=4819 comm="syz.0.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 360.639047][ T4847] binder: 4845:4847 tried to acquire reference to desc 0, got 1 instead [ 360.644207][ T4847] binder: 4845:4847 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 360.644564][ T4847] binder: 4847 RLIMIT_NICE not set [ 360.645059][ T4847] binder: 4847 RLIMIT_NICE not set [ 360.648196][ T4847] binder: 4847 RLIMIT_NICE not set [ 360.649541][ T4847] binder_alloc: 4845: binder_alloc_buf, no vma [ 360.650172][ T4847] binder: cannot allocate buffer: vma cleared, target dead or dying [ 360.650710][ T4847] binder: 4845:4847 transaction reply to 4845:4847 failed 20/29189/-3, code 0 size 0-0 line 3336 [ 360.651486][ T4847] binder: send failed reply for transaction 19 to 4845:4847 [ 360.671182][ T23] binder: undelivered TRANSACTION_COMPLETE [ 360.671838][ T23] binder: undelivered TRANSACTION_ERROR: 29189 [ 360.712953][ T23] binder: undelivered TRANSACTION_ERROR: 29190 [ 364.528246][ T4881] netlink: 'syz.0.606': attribute type 1 has an invalid length. [ 364.529105][ T4881] netlink: 224 bytes leftover after parsing attributes in process `syz.0.606'. [ 365.218092][ T4885] netem: change failed [ 365.576591][ T30] audit: type=1400 audit(365.270:265): avc: denied { mounton } for pid=4886 comm="syz.0.609" path="/proc/591/task" dev="proc" ino=7778 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 365.595961][ T30] audit: type=1400 audit(365.290:266): avc: denied { mount } for pid=4886 comm="syz.0.609" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 368.314701][ T3417] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 368.526840][ T3417] usb 1-1: config 0 has no interfaces? [ 368.565067][ T3417] usb 1-1: New USB device found, idVendor=091e, idProduct=0003, bcdDevice=d7.3b [ 368.566656][ T3417] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 368.568113][ T3417] usb 1-1: Product: syz [ 368.569055][ T3417] usb 1-1: Manufacturer: syz [ 368.570077][ T3417] usb 1-1: SerialNumber: syz [ 368.589884][ T3417] usb 1-1: config 0 descriptor?? [ 368.838593][ T4892] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 368.841101][ T4892] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 368.978660][ T3454] usb 1-1: USB disconnect, device number 4 [ 369.858905][ T4894] netlink: 24 bytes leftover after parsing attributes in process `syz.0.612'. [ 369.941331][ T30] audit: type=1400 audit(369.630:267): avc: denied { relabelfrom } for pid=4893 comm="syz.0.612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 369.942986][ T30] audit: type=1400 audit(369.630:268): avc: denied { relabelto } for pid=4893 comm="syz.0.612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 370.411807][ T30] audit: type=1400 audit(370.100:269): avc: denied { name_bind } for pid=4895 comm="syz.0.613" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 371.464882][ T9] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 371.669170][ T9] usb 1-1: config 0 has no interfaces? [ 371.749736][ T9] usb 1-1: New USB device found, idVendor=091e, idProduct=0003, bcdDevice=d7.3b [ 371.750875][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 371.751875][ T9] usb 1-1: Product: syz [ 371.752723][ T9] usb 1-1: Manufacturer: syz [ 371.754364][ T9] usb 1-1: SerialNumber: syz [ 371.793097][ T9] usb 1-1: config 0 descriptor?? [ 372.049406][ T4903] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 372.051945][ T4903] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 372.136983][ T963] usb 1-1: USB disconnect, device number 5 [ 372.626435][ T30] audit: type=1400 audit(372.320:270): avc: denied { ioctl } for pid=4912 comm="syz.0.621" path="time:[4026531834]" dev="nsfs" ino=4026531834 ioctlcmd=0xb706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 374.230703][ T30] audit: type=1400 audit(373.920:271): avc: denied { mount } for pid=4921 comm="syz.0.624" name="/" dev="ramfs" ino=7869 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 374.587373][ T30] audit: type=1400 audit(374.270:272): avc: denied { watch watch_reads } for pid=4923 comm="syz.0.625" path="/286" dev="tmpfs" ino=1488 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 375.036613][ T30] audit: type=1400 audit(374.730:273): avc: denied { write } for pid=4925 comm="syz.0.626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 375.334963][ T30] audit: type=1400 audit(375.010:274): avc: denied { create } for pid=4927 comm="syz.1.627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 377.597583][ T30] audit: type=1400 audit(377.290:275): avc: denied { nlmsg_read } for pid=4945 comm="syz.0.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 384.070127][ T30] audit: type=1400 audit(383.760:276): avc: denied { read } for pid=4980 comm="syz.1.650" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 384.076490][ T30] audit: type=1400 audit(383.770:277): avc: denied { open } for pid=4980 comm="syz.1.650" path="net:[4026532631]" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 384.512869][ T30] audit: type=1400 audit(384.200:278): avc: denied { create } for pid=4982 comm="syz.1.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 387.084621][ T30] audit: type=1326 audit(386.770:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4988 comm="syz.1.653" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 387.085776][ T30] audit: type=1326 audit(386.770:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4988 comm="syz.1.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 387.128956][ T30] audit: type=1326 audit(386.820:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4988 comm="syz.1.653" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 387.129701][ T30] audit: type=1326 audit(386.820:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4988 comm="syz.1.653" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f20 code=0x7ffc0000 [ 387.158958][ T30] audit: type=1326 audit(386.840:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4988 comm="syz.1.653" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 387.162102][ T30] audit: type=1326 audit(386.850:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4988 comm="syz.1.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 387.179752][ T30] audit: type=1326 audit(386.860:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4988 comm="syz.1.653" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 389.210822][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 389.217615][ T30] audit: type=1400 audit(388.900:295): avc: denied { unmount } for pid=3308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 390.278122][ T30] audit: type=1326 audit(389.960:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5008 comm="syz.1.662" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 390.278719][ T30] audit: type=1326 audit(389.960:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5008 comm="syz.1.662" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 390.278984][ T30] audit: type=1326 audit(389.960:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5008 comm="syz.1.662" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 390.279271][ T30] audit: type=1326 audit(389.970:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5008 comm="syz.1.662" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 390.279548][ T30] audit: type=1326 audit(389.970:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5008 comm="syz.1.662" exe="/syz-executor" sig=0 arch=40000028 syscall=184 compat=1 ip=0x131f20 code=0x7ffc0000 [ 390.304131][ T30] audit: type=1326 audit(389.990:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5008 comm="syz.1.662" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 390.305041][ T30] audit: type=1326 audit(389.990:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5008 comm="syz.1.662" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 390.970861][ T30] audit: type=1326 audit(390.650:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5014 comm="syz.1.665" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 390.971698][ T30] audit: type=1326 audit(390.660:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5014 comm="syz.1.665" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 392.995359][ T5025] lo speed is unknown, defaulting to 1000 [ 393.008063][ T5025] lo speed is unknown, defaulting to 1000 [ 393.049789][ T5025] lo speed is unknown, defaulting to 1000 [ 393.146845][ T5025] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 393.221637][ T5025] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 393.501480][ T5025] lo speed is unknown, defaulting to 1000 [ 393.600667][ T5025] lo speed is unknown, defaulting to 1000 [ 398.936130][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 398.936681][ T30] audit: type=1400 audit(398.630:325): avc: denied { append } for pid=5039 comm="syz.0.675" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 399.070444][ T5038] lo speed is unknown, defaulting to 1000 [ 401.464041][ T5047] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 401.506960][ T5047] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 401.596594][ T5047] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 401.600221][ T5047] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 403.166079][ T5053] netlink: 4 bytes leftover after parsing attributes in process `syz.0.680'. [ 403.938464][ T5059] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.683'. [ 404.204427][ T963] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 404.539419][ T963] usb 1-1: config 0 has no interfaces? [ 404.657539][ T963] usb 1-1: New USB device found, idVendor=091e, idProduct=0003, bcdDevice=d7.3b [ 404.658021][ T963] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 404.658173][ T963] usb 1-1: Product: syz [ 404.658331][ T963] usb 1-1: Manufacturer: syz [ 404.658472][ T963] usb 1-1: SerialNumber: syz [ 404.715680][ T963] usb 1-1: config 0 descriptor?? [ 404.745379][ T5061] ipvlan2: entered promiscuous mode [ 404.745931][ T5061] ipvlan2: entered allmulticast mode [ 404.746219][ T5061] macvlan0: entered allmulticast mode [ 404.989351][ T5057] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 404.992605][ T5057] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 405.067976][ T3417] usb 1-1: USB disconnect, device number 6 [ 406.708658][ T30] audit: type=1400 audit(406.400:326): avc: denied { watch } for pid=5069 comm="syz.0.688" path="/314/file0" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 406.719453][ T5070] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 406.726307][ T30] audit: type=1400 audit(406.410:327): avc: denied { relabelto } for pid=5069 comm="syz.0.688" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 406.740941][ T30] audit: type=1400 audit(406.430:328): avc: denied { associate } for pid=5069 comm="syz.0.688" name="/" dev="cgroup2" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 406.945013][ T30] audit: type=1400 audit(406.630:329): avc: denied { wake_alarm } for pid=5071 comm="syz.0.689" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 409.768178][ T5072] block nbd0: shutting down sockets [ 415.568612][ T30] audit: type=1400 audit(415.260:330): avc: denied { connect } for pid=5081 comm="syz.0.693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 416.880334][ T30] audit: type=1400 audit(416.570:331): avc: denied { create } for pid=5085 comm="dhcpcd-run-hook" name="resolv.conf.dummy0.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 416.889120][ T30] audit: type=1400 audit(416.580:332): avc: denied { write open } for pid=5085 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.dummy0.link" dev="tmpfs" ino=2885 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 416.925071][ T30] audit: type=1400 audit(416.610:333): avc: denied { append } for pid=5085 comm="dhcpcd-run-hook" name="resolv.conf.dummy0.link" dev="tmpfs" ino=2885 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 416.965496][ T30] audit: type=1400 audit(416.660:334): avc: denied { getattr } for pid=5085 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 417.395195][ T5091] vlan2: entered promiscuous mode [ 417.396841][ T5091] vlan2: entered allmulticast mode [ 417.401333][ T5091] veth1_vlan: entered allmulticast mode [ 417.446608][ T30] audit: type=1400 audit(417.130:335): avc: denied { read } for pid=5090 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 417.541987][ T5091] netlink: 4 bytes leftover after parsing attributes in process `syz.0.696'. [ 417.985273][ T30] audit: type=1400 audit(417.670:336): avc: denied { unlink } for pid=5092 comm="rm" name="resolv.conf.dummy0.link" dev="tmpfs" ino=2885 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 418.104075][ T5091] hsr_slave_1 (unregistering): left promiscuous mode [ 420.504959][ T5104] netlink: 4 bytes leftover after parsing attributes in process `syz.0.700'. [ 425.674310][ T3453] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 425.872969][ T3453] usb 1-1: config 0 has no interfaces? [ 425.909512][ T3453] usb 1-1: New USB device found, idVendor=091e, idProduct=0003, bcdDevice=d7.3b [ 425.910902][ T3453] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 425.912082][ T3453] usb 1-1: Product: syz [ 425.912815][ T3453] usb 1-1: Manufacturer: syz [ 425.914140][ T3453] usb 1-1: SerialNumber: syz [ 425.938049][ T3453] usb 1-1: config 0 descriptor?? [ 426.178105][ T5125] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 426.181573][ T5125] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 426.224822][ T963] usb 1-1: USB disconnect, device number 7 [ 427.569025][ T5137] ipvlan2: entered promiscuous mode [ 427.569530][ T5137] ipvlan2: entered allmulticast mode [ 427.569951][ T5137] macvlan0: entered allmulticast mode [ 428.840026][ T5142] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 428.847585][ T5142] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 428.916728][ T5142] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 428.919268][ T5142] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 430.234939][ T5154] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 430.238392][ T5154] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 430.261732][ T5154] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 430.278080][ T5154] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 431.780554][ T5166] Restarting kernel threads ... [ 431.804984][ T5166] Done restarting kernel threads. [ 432.014492][ T30] audit: type=1400 audit(431.700:337): avc: denied { setattr } for pid=5163 comm="syz.1.725" path="/dev/vcsu" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 434.737349][ T30] audit: type=1326 audit(434.430:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5171 comm="syz.0.729" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 434.743818][ T30] audit: type=1326 audit(434.430:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5171 comm="syz.0.729" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 434.746629][ T30] audit: type=1326 audit(434.440:340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5171 comm="syz.0.729" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 434.748405][ T30] audit: type=1326 audit(434.440:341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5171 comm="syz.0.729" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=1 ip=0x131f20 code=0x7ffc0000 [ 434.750160][ T30] audit: type=1326 audit(434.440:342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5171 comm="syz.0.729" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 434.755173][ T30] audit: type=1326 audit(434.440:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5171 comm="syz.0.729" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 434.757904][ T30] audit: type=1326 audit(434.450:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5171 comm="syz.0.729" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 434.789920][ T30] audit: type=1326 audit(434.450:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5171 comm="syz.0.729" exe="/syz-executor" sig=0 arch=40000028 syscall=238 compat=1 ip=0x131f20 code=0x7ffc0000 [ 434.802136][ T30] audit: type=1326 audit(434.450:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5171 comm="syz.0.729" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 437.530294][ T5197] mmap: syz.0.741 (5197) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 439.107634][ T5209] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 439.156304][ T5209] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 439.181951][ T5209] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 439.197751][ T5209] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 439.648531][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 439.651602][ T30] audit: type=1400 audit(439.340:348): avc: denied { sqpoll } for pid=5212 comm="syz.1.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 441.665350][ T3453] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 442.008903][ T3453] usb 1-1: config 0 has no interfaces? [ 442.094832][ T3453] usb 1-1: New USB device found, idVendor=091e, idProduct=0003, bcdDevice=d7.3b [ 442.096189][ T3453] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 442.096519][ T3453] usb 1-1: Product: syz [ 442.096796][ T3453] usb 1-1: Manufacturer: syz [ 442.097070][ T3453] usb 1-1: SerialNumber: syz [ 442.136052][ T3453] usb 1-1: config 0 descriptor?? [ 442.399790][ T3453] usb 1-1: USB disconnect, device number 8 [ 444.177485][ T30] audit: type=1326 audit(443.870:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5244 comm="syz.1.763" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 444.191824][ T30] audit: type=1326 audit(443.880:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5244 comm="syz.1.763" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 444.192419][ T30] audit: type=1326 audit(443.880:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5244 comm="syz.1.763" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 444.206782][ T30] audit: type=1326 audit(443.900:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5244 comm="syz.1.763" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 444.207303][ T30] audit: type=1326 audit(443.900:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5244 comm="syz.1.763" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f20 code=0x7ffc0000 [ 444.254052][ T30] audit: type=1326 audit(443.930:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5244 comm="syz.1.763" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 444.285596][ T30] audit: type=1326 audit(443.980:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5244 comm="syz.1.763" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 444.287440][ T30] audit: type=1326 audit(443.980:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5244 comm="syz.1.763" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 444.311422][ T30] audit: type=1326 audit(444.000:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5244 comm="syz.1.763" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 444.536195][ T5249] netlink: 'syz.0.765': attribute type 27 has an invalid length. [ 446.715482][ T5249] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 446.723740][ T5249] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 446.724192][ T5249] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 446.724430][ T5249] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 447.189844][ T5249] vlan2: left promiscuous mode [ 447.192526][ T5249] vlan2: left allmulticast mode [ 447.210808][ T5249] veth1_vlan: left allmulticast mode [ 447.577513][ T5256] 8021q: adding VLAN 0 to HW filter on device bond0 [ 447.958446][ T5256] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 447.990579][ T5256] veth1_vlan: left promiscuous mode [ 447.998908][ T5256] veth0_vlan: left promiscuous mode [ 448.007771][ T5256] veth0_vlan: entered promiscuous mode [ 448.019774][ T5256] veth1_vlan: entered promiscuous mode [ 448.021040][ T5256] veth1_vlan: entered allmulticast mode [ 448.047215][ T5256] veth1_macvtap: left promiscuous mode [ 448.055799][ T5256] veth0_macvtap: left promiscuous mode [ 448.062616][ T5256] veth0_macvtap: entered promiscuous mode [ 448.068883][ T5256] veth1_macvtap: entered promiscuous mode [ 448.083066][ T5256] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.088238][ T5256] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.090693][ T5256] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.093017][ T5256] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 454.692642][ T5273] netlink: 4 bytes leftover after parsing attributes in process `syz.0.774'. [ 455.236894][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 455.237455][ T30] audit: type=1400 audit(454.930:374): avc: denied { getopt } for pid=5274 comm="syz.0.775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 455.763810][ T30] audit: type=1326 audit(455.450:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5276 comm="syz.0.776" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 455.769655][ T30] audit: type=1326 audit(455.460:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5276 comm="syz.0.776" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 455.778024][ T30] audit: type=1326 audit(455.470:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5276 comm="syz.0.776" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 455.795136][ T30] audit: type=1326 audit(455.470:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5276 comm="syz.0.776" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=1 ip=0x12fd18 code=0x7ffc0000 [ 455.795770][ T30] audit: type=1326 audit(455.480:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5276 comm="syz.0.776" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=1 ip=0x12fd18 code=0x7ffc0000 [ 455.796354][ T30] audit: type=1326 audit(455.480:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5276 comm="syz.0.776" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 455.796619][ T30] audit: type=1326 audit(455.480:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5276 comm="syz.0.776" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 455.796866][ T30] audit: type=1326 audit(455.490:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5276 comm="syz.0.776" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 455.815555][ T30] audit: type=1326 audit(455.510:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5276 comm="syz.0.776" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 458.890323][ T5296] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 458.902293][ T5296] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 459.407664][ T5294] futex_wake_op: syz.0.784 tries to shift op by -1; fix this program [ 459.716553][ T5299] netlink: 4 bytes leftover after parsing attributes in process `syz.1.785'. [ 459.826381][ T5301] netlink: 'syz.0.786': attribute type 13 has an invalid length. [ 461.505114][ T30] kauditd_printk_skb: 28 callbacks suppressed [ 461.506486][ T30] audit: type=1400 audit(461.190:412): avc: denied { write } for pid=5304 comm="syz.1.788" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 462.424716][ T5310] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 462.427397][ T5310] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 467.830621][ T5319] lo speed is unknown, defaulting to 1000 [ 474.114979][ T963] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 474.302594][ T963] usb 1-1: config 0 has no interfaces? [ 474.396902][ T963] usb 1-1: New USB device found, idVendor=091e, idProduct=0003, bcdDevice=d7.3b [ 474.397405][ T963] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 474.397558][ T963] usb 1-1: Product: syz [ 474.397696][ T963] usb 1-1: Manufacturer: syz [ 474.397920][ T963] usb 1-1: SerialNumber: syz [ 474.429487][ T963] usb 1-1: config 0 descriptor?? [ 474.688438][ T963] usb 1-1: USB disconnect, device number 9 [ 477.725353][ T30] audit: type=1326 audit(477.390:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5340 comm="syz.0.800" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x0 [ 485.367425][ T30] audit: type=1400 audit(485.060:414): avc: denied { read write } for pid=3308 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 485.368000][ T30] audit: type=1400 audit(485.060:415): avc: denied { open } for pid=3308 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 485.368572][ T30] audit: type=1400 audit(485.060:416): avc: denied { ioctl } for pid=3308 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 485.625729][ T30] audit: type=1400 audit(485.310:417): avc: denied { map_create } for pid=5347 comm="syz.0.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 485.635920][ T30] audit: type=1400 audit(485.320:418): avc: denied { bpf } for pid=5347 comm="syz.0.802" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 485.640154][ T30] audit: type=1400 audit(485.330:419): avc: denied { map_read map_write } for pid=5347 comm="syz.0.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 485.674418][ T30] audit: type=1400 audit(485.360:420): avc: denied { prog_load } for pid=5347 comm="syz.0.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 485.897430][ T30] audit: type=1400 audit(485.590:421): avc: denied { perfmon } for pid=5347 comm="syz.0.802" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 485.939387][ T30] audit: type=1400 audit(485.630:422): avc: denied { execute } for pid=5347 comm="syz.0.802" name="file1" dev="tmpfs" ino=2033 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 485.944428][ T30] audit: type=1400 audit(485.630:423): avc: denied { execute_no_trans } for pid=5347 comm="syz.0.802" path="/393/file1" dev="tmpfs" ino=2033 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 488.562202][ T5362] netlink: 'syz.1.808': attribute type 5 has an invalid length. [ 490.504003][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 490.504554][ T30] audit: type=1326 audit(490.170:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5372 comm="syz.1.813" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 490.504925][ T30] audit: type=1326 audit(490.190:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5372 comm="syz.1.813" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 490.509125][ T30] audit: type=1326 audit(490.200:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5372 comm="syz.1.813" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 490.510910][ T30] audit: type=1326 audit(490.200:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5372 comm="syz.1.813" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f20 code=0x7ffc0000 [ 490.512667][ T30] audit: type=1326 audit(490.200:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5372 comm="syz.1.813" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 490.513092][ T30] audit: type=1326 audit(490.200:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5372 comm="syz.1.813" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 490.545137][ T30] audit: type=1326 audit(490.240:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5372 comm="syz.1.813" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 490.547243][ T30] audit: type=1326 audit(490.240:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5372 comm="syz.1.813" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f20 code=0x7ffc0000 [ 490.579335][ T30] audit: type=1326 audit(490.270:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5372 comm="syz.1.813" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 490.582897][ T30] audit: type=1326 audit(490.270:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5372 comm="syz.1.813" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 493.956274][ T5395] netlink: 'syz.0.823': attribute type 10 has an invalid length. [ 493.960806][ T5395] netlink: 'syz.0.823': attribute type 10 has an invalid length. [ 494.485677][ T5403] netlink: 'syz.1.826': attribute type 21 has an invalid length. [ 496.086521][ T30] kauditd_printk_skb: 90 callbacks suppressed [ 496.087038][ T30] audit: type=1400 audit(495.780:540): avc: denied { block_suspend } for pid=5409 comm="syz.1.829" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 496.207879][ T30] audit: type=1400 audit(495.900:541): avc: denied { create } for pid=5409 comm="syz.1.829" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 496.288065][ T30] audit: type=1400 audit(495.980:542): avc: denied { write } for pid=5409 comm="syz.1.829" name="file0" dev="tmpfs" ino=2172 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 496.305612][ T30] audit: type=1400 audit(496.000:543): avc: denied { open } for pid=5409 comm="syz.1.829" path="/422/file0" dev="tmpfs" ino=2172 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 496.331179][ T30] audit: type=1400 audit(496.010:544): avc: denied { ioctl } for pid=5409 comm="syz.1.829" path="/422/file0" dev="tmpfs" ino=2172 ioctlcmd=0x1273 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 496.545575][ T30] audit: type=1400 audit(496.220:545): avc: denied { unlink } for pid=3309 comm="syz-executor" name="file0" dev="tmpfs" ino=2172 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 496.914257][ T30] audit: type=1326 audit(496.600:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5413 comm="syz.1.830" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 496.916460][ T30] audit: type=1326 audit(496.600:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5413 comm="syz.1.830" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 496.926898][ T30] audit: type=1326 audit(496.610:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5413 comm="syz.1.830" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 496.933098][ T30] audit: type=1326 audit(496.620:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5413 comm="syz.1.830" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 501.032303][ T5439] netdevsim netdevsim0: Direct firmware load for ÈöníñÆgkNšÄq>ä*x(Oˆ@ failed with error -2 [ 501.038995][ T5439] netdevsim netdevsim0: Falling back to sysfs fallback for: ÈöníñÆgkNšÄq>ä*x(Oˆ@ [ 501.177995][ T30] kauditd_printk_skb: 45 callbacks suppressed [ 501.180008][ T30] audit: type=1400 audit(500.870:595): avc: denied { allowed } for pid=5440 comm="syz.1.842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 501.194434][ T30] audit: type=1400 audit(500.880:596): avc: denied { create } for pid=5440 comm="syz.1.842" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 501.195352][ T30] audit: type=1400 audit(500.880:597): avc: denied { map } for pid=5440 comm="syz.1.842" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9866 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 501.195640][ T30] audit: type=1400 audit(500.880:598): avc: denied { read write } for pid=5440 comm="syz.1.842" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9866 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 503.102289][ T30] audit: type=1400 audit(502.790:599): avc: denied { create } for pid=5446 comm=77DEA305FF07 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 503.110363][ T30] audit: type=1400 audit(502.800:600): avc: denied { write } for pid=5446 comm=77DEA305FF07 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 503.669331][ T5449] lo speed is unknown, defaulting to 1000 [ 503.674100][ T30] audit: type=1400 audit(503.360:601): avc: denied { mounton } for pid=5450 comm="syz.0.847" path="/414/file0" dev="tmpfs" ino=2141 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 503.677651][ T30] audit: type=1400 audit(503.370:602): avc: denied { mount } for pid=5450 comm="syz.0.847" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 503.697253][ T30] audit: type=1400 audit(503.390:603): avc: denied { mounton } for pid=5450 comm="syz.0.847" path="/file0" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:devpts_t tclass=dir permissive=1 [ 503.782429][ T30] audit: type=1400 audit(503.470:604): avc: denied { unmount } for pid=3308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 504.345977][ T5452] netlink: 8 bytes leftover after parsing attributes in process `syz.1.846'. [ 507.625580][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 507.626172][ T30] audit: type=1326 audit(507.270:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5463 comm="syz.0.852" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x0 [ 508.237822][ T5465] lo speed is unknown, defaulting to 1000 [ 510.978591][ T5472] netlink: 'syz.0.855': attribute type 4 has an invalid length. [ 512.322614][ T5479] lo speed is unknown, defaulting to 1000 [ 512.672765][ T30] audit: type=1400 audit(512.360:608): avc: denied { getopt } for pid=5478 comm="syz.0.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 513.162373][ T30] audit: type=1326 audit(512.850:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5481 comm="syz.0.859" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 513.163101][ T30] audit: type=1326 audit(512.850:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5481 comm="syz.0.859" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 513.184997][ T30] audit: type=1326 audit(512.860:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5481 comm="syz.0.859" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 513.202957][ T30] audit: type=1326 audit(512.890:612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5481 comm="syz.0.859" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 513.204107][ T30] audit: type=1326 audit(512.890:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5481 comm="syz.0.859" exe="/syz-executor" sig=0 arch=40000028 syscall=319 compat=1 ip=0x131f20 code=0x7ffc0000 [ 513.204382][ T30] audit: type=1326 audit(512.890:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5481 comm="syz.0.859" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 513.204662][ T30] audit: type=1326 audit(512.890:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5481 comm="syz.0.859" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 513.204951][ T30] audit: type=1326 audit(512.890:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5481 comm="syz.0.859" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 513.264265][ T30] audit: type=1326 audit(512.940:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5481 comm="syz.0.859" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 518.462408][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 518.462974][ T30] audit: type=1400 audit(518.150:623): avc: denied { read write } for pid=5489 comm="syz.1.862" name="virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 518.477997][ T30] audit: type=1400 audit(518.170:624): avc: denied { open } for pid=5489 comm="syz.1.862" path="/dev/virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 518.971087][ T5496] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 519.617536][ T30] audit: type=1400 audit(519.310:625): avc: denied { setcheckreqprot } for pid=5500 comm="syz.1.865" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 519.617931][ T5501] SELinux: syz.1.865 (5501) set checkreqprot to 1. This is no longer supported. [ 520.035745][ T5503] lo speed is unknown, defaulting to 1000 [ 520.318816][ T30] audit: type=1400 audit(520.010:626): avc: denied { bind } for pid=5502 comm="syz.1.866" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 520.324082][ T30] audit: type=1400 audit(520.010:627): avc: denied { name_bind } for pid=5502 comm="syz.1.866" src=17953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 520.326704][ T30] audit: type=1400 audit(520.010:628): avc: denied { node_bind } for pid=5502 comm="syz.1.866" saddr=100.1.1.1 src=17953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 523.796970][ T5513] infiniband syz!: set down [ 523.799749][ T5513] infiniband syz!: added team_slave_0 [ 524.530913][ T5513] RDS/IB: syz!: added [ 524.556748][ T5513] smc: adding ib device syz! with port count 1 [ 524.558179][ T5513] smc: ib device syz! port 1 has pnetid [ 528.239954][ T30] audit: type=1326 audit(527.930:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5529 comm="syz.1.878" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 528.242077][ T30] audit: type=1326 audit(527.930:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5529 comm="syz.1.878" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 528.253939][ T30] audit: type=1326 audit(527.940:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5529 comm="syz.1.878" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 528.255913][ T30] audit: type=1326 audit(527.950:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5529 comm="syz.1.878" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 528.280317][ T30] audit: type=1326 audit(527.950:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5529 comm="syz.1.878" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=1 ip=0x131f20 code=0x7ffc0000 [ 528.280960][ T30] audit: type=1326 audit(527.970:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5529 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 528.300652][ T30] audit: type=1326 audit(527.970:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5529 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 528.311251][ T30] audit: type=1326 audit(528.000:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5529 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 528.320457][ T30] audit: type=1326 audit(528.010:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5529 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 528.329666][ T30] audit: type=1326 audit(528.020:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5529 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f20 code=0x7ffc0000 [ 529.110450][ T5535] binfmt_misc: register: failed to install interpreter file ./file0 [ 533.280395][ T30] kauditd_printk_skb: 98 callbacks suppressed [ 533.280946][ T30] audit: type=1400 audit(532.970:737): avc: denied { create } for pid=5564 comm="syz.0.894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 533.334420][ T30] audit: type=1400 audit(533.020:738): avc: denied { create } for pid=5564 comm="syz.0.894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 533.426471][ T30] audit: type=1400 audit(533.110:739): avc: denied { bind } for pid=5564 comm="syz.0.894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 533.758051][ T30] audit: type=1400 audit(533.450:740): avc: denied { write } for pid=5566 comm="syz.0.895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 533.760152][ T30] audit: type=1400 audit(533.450:741): avc: denied { connect } for pid=5566 comm="syz.0.895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 533.767517][ T30] audit: type=1400 audit(533.460:742): avc: denied { name_connect } for pid=5566 comm="syz.0.895" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 534.271654][ T30] audit: type=1400 audit(533.960:743): avc: denied { listen } for pid=5566 comm="syz.0.895" lport=41093 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 534.275756][ T30] audit: type=1400 audit(533.970:744): avc: denied { accept } for pid=5566 comm="syz.0.895" lport=41093 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 539.237789][ T30] audit: type=1400 audit(538.930:745): avc: denied { mount } for pid=5595 comm="syz.0.907" name="/" dev="ramfs" ino=10119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 539.534064][ T30] audit: type=1400 audit(539.220:746): avc: denied { shutdown } for pid=5597 comm="syz.0.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 539.554441][ T30] audit: type=1400 audit(539.240:747): avc: denied { getopt } for pid=5597 comm="syz.0.908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 539.556004][ T30] audit: type=1400 audit(539.240:748): avc: denied { name_connect } for pid=5597 comm="syz.0.908" dest=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 541.771044][ T30] audit: type=1400 audit(541.460:749): avc: denied { read write } for pid=5617 comm="syz.0.918" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 541.776653][ T30] audit: type=1400 audit(541.470:750): avc: denied { open } for pid=5617 comm="syz.0.918" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 541.810488][ T3453] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 541.865145][ T3453] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 541.950348][ T30] audit: type=1400 audit(541.640:751): avc: denied { watch_reads } for pid=5619 comm="syz.1.919" path="/461" dev="tmpfs" ino=2366 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 543.436953][ T5625] fido_id[5625]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 544.642022][ T30] audit: type=1400 audit(544.330:752): avc: denied { create } for pid=5639 comm="syz.0.928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 544.647451][ T30] audit: type=1400 audit(544.340:753): avc: denied { write } for pid=5639 comm="syz.0.928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 545.271368][ T30] audit: type=1326 audit(544.960:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5641 comm="syz.0.929" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 545.288163][ T30] audit: type=1326 audit(544.980:755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5641 comm="syz.0.929" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 545.289819][ T30] audit: type=1326 audit(544.980:756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5641 comm="syz.0.929" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 545.296949][ T30] audit: type=1326 audit(544.990:757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5641 comm="syz.0.929" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 545.297482][ T30] audit: type=1326 audit(544.990:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5641 comm="syz.0.929" exe="/syz-executor" sig=0 arch=40000028 syscall=238 compat=1 ip=0x131f20 code=0x7ffc0000 [ 545.297755][ T30] audit: type=1326 audit(544.990:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5641 comm="syz.0.929" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 545.298044][ T30] audit: type=1326 audit(544.990:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5641 comm="syz.0.929" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 545.300462][ T30] audit: type=1326 audit(544.990:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5641 comm="syz.0.929" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 549.790919][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 549.791500][ T30] audit: type=1400 audit(549.480:781): avc: denied { write } for pid=5669 comm="syz.0.940" name="kcm" dev="proc" ino=4026532776 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 551.171449][ T30] audit: type=1400 audit(550.860:782): avc: denied { read } for pid=5677 comm="syz.1.944" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 551.180990][ T30] audit: type=1400 audit(550.860:783): avc: denied { open } for pid=5677 comm="syz.1.944" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 551.534088][ T30] audit: type=1400 audit(551.220:784): avc: denied { create } for pid=5680 comm="syz.1.945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 551.551818][ T30] audit: type=1400 audit(551.240:785): avc: denied { connect } for pid=5680 comm="syz.1.945" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 551.567400][ T30] audit: type=1400 audit(551.260:786): avc: denied { ioctl } for pid=5680 comm="syz.1.945" path="socket:[10754]" dev="sockfs" ino=10754 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 551.570782][ T30] audit: type=1400 audit(551.260:787): avc: denied { write } for pid=5680 comm="syz.1.945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 551.888278][ T30] audit: type=1400 audit(551.580:788): avc: denied { ioctl } for pid=5682 comm="syz.1.946" path="socket:[10762]" dev="sockfs" ino=10762 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 551.907814][ T30] audit: type=1400 audit(551.600:789): avc: denied { setopt } for pid=5682 comm="syz.1.946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 551.919707][ T30] audit: type=1400 audit(551.600:790): avc: denied { write } for pid=5682 comm="syz.1.946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 552.311333][ T5685] netlink: 40 bytes leftover after parsing attributes in process `syz.1.947'. [ 555.366207][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 555.366728][ T30] audit: type=1400 audit(555.060:794): avc: denied { load_policy } for pid=5696 comm="syz.1.953" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 555.392008][ T5697] ------------[ cut here ]------------ [ 555.392420][ T5697] WARNING: CPU: 1 PID: 5697 at mm/page_alloc.c:4935 __alloc_frozen_pages_noprof+0xb7c/0x1f1c [ 555.393434][ T5697] Modules linked in: [ 555.394529][ T5697] CPU: 1 UID: 0 PID: 5697 Comm: syz.1.953 Not tainted 6.15.0-syzkaller-13804-g939f15e640f1 #0 PREEMPT [ 555.394900][ T5697] Hardware name: linux,dummy-virt (DT) [ 555.395266][ T5697] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 555.395790][ T5697] pc : __alloc_frozen_pages_noprof+0xb7c/0x1f1c [ 555.396256][ T5697] lr : __alloc_pages_noprof+0x14/0x114 [ 555.396934][ T5697] sp : ffff80008df470f0 [ 555.398562][ T5697] x29: ffff80008df470f0 x28: 0000000000000016 x27: 00000000dffb11d1 [ 555.399711][ T5697] x26: 0000000000000000 x25: 0000000049bd27bc x24: ffff000014d370c8 [ 555.400666][ T5697] x23: ffff8000810acda8 x22: 1ffff00011be8e40 x21: 0000000400000000 [ 555.401654][ T5697] x20: 0000000000000000 x19: 0000000000000016 x18: 0000000000000000 [ 555.402579][ T5697] x17: 0000000000000000 x16: 0000000000000000 x15: ffff800080a7d870 [ 555.404170][ T5697] x14: ffff800080a7d718 x13: 49bd27bcd5218f0e x12: db32ea23dffb11d1 [ 555.405393][ T5697] x11: 00000000f204f204 x10: 00000000f200f204 x9 : 00000000f2000000 [ 555.406406][ T5697] x8 : 00000000f2f2f2f2 x7 : 00000000f3f3f3f3 x6 : 0000000000000001 [ 555.407416][ T5697] x5 : ffff000017689e40 x4 : 0000000000000000 x3 : 0000000000000000 [ 555.408381][ T5697] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff800088b71b60 [ 555.409488][ T5697] Call trace: [ 555.409817][ T5697] __alloc_frozen_pages_noprof+0xb7c/0x1f1c (P) [ 555.410157][ T5697] __alloc_pages_noprof+0x14/0x114 [ 555.410442][ T5697] ___kmalloc_large_node+0x9c/0x1d8 [ 555.410717][ T5697] __kmalloc_large_node_noprof+0x28/0x88 [ 555.411001][ T5697] __kmalloc_noprof+0x360/0x4d0 [ 555.411302][ T5697] hashtab_init+0x150/0x298 [ 555.411577][ T5697] symtab_init+0x44/0x64 [ 555.411832][ T5697] common_read+0x17c/0x318 [ 555.412087][ T5697] policydb_read+0x60c/0x2918 [ 555.412371][ T5697] security_load_policy+0x12c/0xd98 [ 555.412652][ T5697] sel_write_load+0x2d8/0x148c [ 555.412914][ T5697] vfs_write+0x1d8/0xad4 [ 555.413199][ T5697] ksys_write+0xec/0x1d8 [ 555.413582][ T5697] __arm64_sys_write+0x6c/0x9c [ 555.413903][ T5697] invoke_syscall+0x6c/0x258 [ 555.414308][ T5697] el0_svc_common.constprop.0+0xac/0x230 [ 555.414591][ T5697] do_el0_svc_compat+0x40/0x68 [ 555.414865][ T5697] el0_svc_compat+0x4c/0x17c [ 555.415140][ T5697] el0t_32_sync_handler+0x98/0x13c [ 555.415412][ T5697] el0t_32_sync+0x19c/0x1a0 [ 555.415858][ T5697] irq event stamp: 592 [ 555.416122][ T5697] hardirqs last enabled at (591): [] _raw_spin_unlock_irqrestore+0x80/0xac [ 555.416572][ T5697] hardirqs last disabled at (592): [] el1_dbg+0x24/0x9c [ 555.417135][ T5697] softirqs last enabled at (568): [] handle_softirqs+0x88c/0xdb4 [ 555.417878][ T5697] softirqs last disabled at (475): [] __do_softirq+0x14/0x20 [ 555.418456][ T5697] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 555.437006][ T30] audit: type=1400 audit(555.110:795): avc: denied { write } for pid=3303 comm="syz-executor" path="pipe:[2771]" dev="pipefs" ino=2771 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 555.580512][ T5697] SELinux: failed to load policy [ 557.735375][ T30] audit: type=1400 audit(557.430:796): avc: denied { read } for pid=3153 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 560.688329][ T4970] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 560.770391][ T4970] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 560.830861][ T4970] bond0 (unregistering): Released all slaves [ 560.987885][ T30] audit: type=1400 audit(560.680:797): avc: denied { search } for pid=3153 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 560.992298][ T30] audit: type=1400 audit(560.680:798): avc: denied { search } for pid=3153 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 561.015781][ T30] audit: type=1400 audit(560.700:799): avc: denied { search } for pid=3153 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 561.019291][ T30] audit: type=1400 audit(560.710:800): avc: denied { read } for pid=3153 comm="dhcpcd" name="n18" dev="tmpfs" ino=3738 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 561.031584][ T30] audit: type=1400 audit(560.720:801): avc: denied { open } for pid=3153 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=3738 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 561.042936][ T30] audit: type=1400 audit(560.720:802): avc: denied { getattr } for pid=3153 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=3738 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 562.294139][ T30] audit: type=1400 audit(561.970:803): avc: denied { read open } for pid=5705 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 562.294682][ T30] audit: type=1400 audit(561.970:804): avc: denied { getattr } for pid=5705 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 562.351892][ T30] audit: type=1400 audit(562.040:805): avc: denied { add_name } for pid=5704 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 562.360430][ T30] audit: type=1400 audit(562.040:806): avc: denied { create } for pid=5704 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 562.489931][ T4970] hsr_slave_0: left promiscuous mode [ 562.499456][ T4970] hsr_slave_1: left promiscuous mode [ 565.149212][ T26] smc: removing ib device syz! VM DIAGNOSIS: 07:07:38 Registers: info registers vcpu 0 CPU#0 PC=ffff800081ab9b70 X00=ffff80008d59d004 X01=0000000000000000 X02=1fffe00002ddc407 X03=1fffe00002ddc405 X04=1fffe00001ef6218 X05=ffff000016ee03ac X06=ffff000017652ab0 X07=00000000000003a0 X08=0000000000000044 X09=ffff8000897c2000 X10=ffff0000176528d0 X11=0000000000000002 X12=000000000000000d X13=0000000000000000 X14=1fffe0000372cacd X15=1850097b41ff0e4f X16=75fc0000e66affff X17=7872724ac5b5fb6e X18=ffff000017ce1640 X19=ffff000016ee2000 X20=0000000000000001 X21=1fffe00002ddc408 X22=0000000000000003 X23=ffff00001e68d500 X24=1fffe00002cc2800 X25=ffff00000f7b10c4 X26=0000000000000040 X27=0000000000000000 X28=0000000000ab378b X29=ffff800080006190 X30=ffff800081a9c738 SP=ffff800080006190 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008031d924 X00=00000000000003c0 X01=ffff7fffe2fd5000 X02=0000000000000000 X03=1fffe00002ed13c9 X04=0000000094fe2422 X05=0000000000048000 X06=ffff00001768a9c0 X07=78b10841845088ed X08=0000000000000000 X09=ffff8000897c2000 X10=ffff00001768a8d0 X11=0000000000000000 X12=0000000000000417 X13=0000000000008000 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff8000870da448 X20=ffff800087251480 X21=ffff8000803478b8 X22=ffff00001768a9c0 X23=00000000000003c0 X24=ffff000017689e40 X25=0000000000000007 X26=ffff800087e61320 X27=ffff80008df46940 X28=00000000000003c0 X29=ffff80008df467c0 X30=ffff80008031d904 SP=ffff80008df467c0 PSTATE=100003c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000