last executing test programs: 4.873812621s ago: executing program 0 (id=481): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='freezer.parent_freezing\x00', 0x275a, 0x0) readahead(r0, 0x0, 0xffffffffffffff01) 4.519300281s ago: executing program 0 (id=482): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0xa4, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x7c, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_EXTHDR_OFFSET={0x8}, @NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0x22}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x7}]}}}, {0x44, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x2}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x12}, @NFTA_BITWISE_DATA={0x10, 0x7, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4}, @NFTA_DATA_VALUE={0x7, 0x1, "bb91dc"}]}, @NFTA_BITWISE_OP={0x8, 0x6, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x118}}, 0x0) 4.179281429s ago: executing program 0 (id=484): prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000300)) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000000)={0x8, 0x0, &(0x7f00000003c0)=[@increfs], 0x0, 0x0, 0x0}) r3 = dup3(r2, r1, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000080)="fa"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000580)={0x10, 0x0, &(0x7f0000000700)=[@request_death={0x400c6313, 0x0, 0xffffff7f00000000}], 0x2, 0x1000000000000, 0x0}) 3.444590739s ago: executing program 1 (id=487): syz_emit_ethernet(0x56, &(0x7f0000006280)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @remote, @val={@val, {0x8100, 0x0, 0x0, 0x2}}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "cb653e", 0x18, 0x3a, 0xff, @empty, @mcast2, {[], @mld={0x83, 0x0, 0x0, 0x2, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}}}}}}}, 0x0) 3.375935291s ago: executing program 1 (id=488): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x1) ioctl$TCFLSH(r2, 0x8926, 0x20001100) syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) syz_emit_ethernet(0x11, &(0x7f0000000040)=ANY=[@ANYBLOB="a1aaaaaaaaaa00380000f41eae5686c7537700000805"], 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)}, 0x0) sendmsg$can_bcm(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000380)={0x0, 0x13, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x150}}, 0x0) 3.256022384s ago: executing program 0 (id=489): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8}, @NFTA_EXTHDR_OP={0x8, 0x6, 0x1, 0x0, 0x2}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x8e}, @NFTA_EXTHDR_OFFSET={0x8, 0x3, 0x1, 0x0, 0xa2}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_USERDATA={0x5, 0x7, 0x1, 0x0, "1d"}]}], {0x14}}, 0x94}}, 0x0) 3.255720424s ago: executing program 0 (id=490): prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000080)) r2 = dup(r1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000001c0)={0x1, 0x0, 0x0, &(0x7f00000000c0)=""/117, 0x0}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000240)={0x1, r2}) 3.134545068s ago: executing program 0 (id=491): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/diskstats\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xc, 0x2000000000000087}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r5, 0x0, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup=r6, 0x11, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg$NFT_BATCH(r0, 0x0, 0x24000010) 266.123873ms ago: executing program 1 (id=492): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000003000000050002"], 0x3c}}, 0x0) 121.508037ms ago: executing program 1 (id=493): openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x1d10c2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) unshare(0x2c020400) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000080)=ANY=[], 0x8, 0x800) msgsnd(0x0, &(0x7f0000000180)=ANY=[], 0x2000, 0x0) msgrcv(0x0, &(0x7f00000004c0)={0x0, ""/4}, 0xc, 0xffffff7f00000000, 0x3000) 5.24252ms ago: executing program 1 (id=494): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="4c0000001000010400000000e100000000000000", @ANYRES32=r1, @ANYBLOB="00000000000000002c001280110001006272696467655f736c617665000000001400058005000500000000e604000700"], 0x4c}}, 0x0) 0s ago: executing program 1 (id=495): r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000180)) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, 0x3000}) kernel console output (not intermixed with test programs): [ 53.595592][ T31] audit: type=1400 audit(53.510:68): avc: denied { read write } for pid=3080 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.596794][ T31] audit: type=1400 audit(53.510:69): avc: denied { open } for pid=3080 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:33013' (ED25519) to the list of known hosts. [ 64.083531][ T31] audit: type=1400 audit(63.990:70): avc: denied { name_bind } for pid=3081 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 65.996161][ T31] audit: type=1400 audit(65.910:71): avc: denied { execute } for pid=3083 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.025104][ T31] audit: type=1400 audit(65.920:72): avc: denied { execute_no_trans } for pid=3083 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.836101][ T31] audit: type=1400 audit(69.750:73): avc: denied { mounton } for pid=3083 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.840837][ T31] audit: type=1400 audit(69.750:74): avc: denied { mount } for pid=3083 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.862083][ T3083] cgroup: Unknown subsys name 'net' [ 69.873201][ T31] audit: type=1400 audit(69.780:75): avc: denied { unmount } for pid=3083 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 70.085942][ T3083] cgroup: Unknown subsys name 'cpuset' [ 70.094240][ T3083] cgroup: Unknown subsys name 'hugetlb' [ 70.095428][ T3083] cgroup: Unknown subsys name 'rlimit' [ 70.307405][ T31] audit: type=1400 audit(70.220:76): avc: denied { setattr } for pid=3083 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 70.308514][ T31] audit: type=1400 audit(70.220:77): avc: denied { mounton } for pid=3083 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 70.309531][ T31] audit: type=1400 audit(70.220:78): avc: denied { mount } for pid=3083 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 70.554657][ T3085] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 70.556155][ T31] audit: type=1400 audit(70.470:79): avc: denied { relabelto } for pid=3085 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.566422][ T31] audit: type=1400 audit(70.480:80): avc: denied { write } for pid=3085 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 70.600213][ T31] audit: type=1400 audit(70.510:81): avc: denied { read } for pid=3083 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.603390][ T31] audit: type=1400 audit(70.510:82): avc: denied { open } for pid=3083 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.708702][ T3083] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 79.998492][ T31] audit: type=1400 audit(79.910:83): avc: denied { execmem } for pid=3086 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 80.058521][ T31] audit: type=1400 audit(79.970:84): avc: denied { read } for pid=3088 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.073242][ T31] audit: type=1400 audit(79.970:85): avc: denied { open } for pid=3088 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.077730][ T31] audit: type=1400 audit(79.980:86): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 80.106245][ T31] audit: type=1400 audit(80.020:87): avc: denied { module_request } for pid=3088 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.106982][ T31] audit: type=1400 audit(80.020:88): avc: denied { module_request } for pid=3089 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.198632][ T31] audit: type=1400 audit(80.110:89): avc: denied { sys_module } for pid=3088 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 81.016710][ T31] audit: type=1400 audit(80.930:90): avc: denied { ioctl } for pid=3088 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 82.359057][ T3088] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.388860][ T3088] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.434919][ T3089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.439504][ T3089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.298371][ T3088] hsr_slave_0: entered promiscuous mode [ 83.302287][ T3088] hsr_slave_1: entered promiscuous mode [ 83.385114][ T3089] hsr_slave_0: entered promiscuous mode [ 83.389327][ T3089] hsr_slave_1: entered promiscuous mode [ 83.397424][ T3089] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 83.398063][ T3089] Cannot create hsr debugfs directory [ 83.892372][ T3088] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.893062][ T31] audit: type=1400 audit(83.800:91): avc: denied { create } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.894237][ T31] audit: type=1400 audit(83.800:92): avc: denied { write } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.903758][ T3088] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.916737][ T3088] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.930417][ T3088] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 84.031752][ T3089] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 84.042347][ T3089] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 84.059507][ T3089] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 84.071046][ T3089] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 84.810012][ T3088] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.004867][ T3089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.988865][ T3088] veth0_vlan: entered promiscuous mode [ 88.007510][ T3088] veth1_vlan: entered promiscuous mode [ 88.059096][ T3088] veth0_macvtap: entered promiscuous mode [ 88.069024][ T3088] veth1_macvtap: entered promiscuous mode [ 88.124267][ T3088] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.125010][ T3088] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.125365][ T3088] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.125648][ T3088] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.274980][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 88.275067][ T31] audit: type=1400 audit(88.190:94): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 88.278737][ T31] audit: type=1400 audit(88.190:95): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/syzkaller.kOm9Ci/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 88.282315][ T31] audit: type=1400 audit(88.190:96): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 88.292932][ T31] audit: type=1400 audit(88.200:97): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/syzkaller.kOm9Ci/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 88.297261][ T31] audit: type=1400 audit(88.210:98): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/syzkaller.kOm9Ci/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1966 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 88.311675][ T31] audit: type=1400 audit(88.220:99): avc: denied { unmount } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 88.317929][ T31] audit: type=1400 audit(88.230:100): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 88.322285][ T31] audit: type=1400 audit(88.230:101): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 88.333627][ T31] audit: type=1400 audit(88.240:102): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 88.334449][ T31] audit: type=1400 audit(88.240:103): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 88.389079][ T3088] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 88.588216][ T3089] veth0_vlan: entered promiscuous mode [ 88.612057][ T3089] veth1_vlan: entered promiscuous mode [ 88.690416][ T3089] veth0_macvtap: entered promiscuous mode [ 88.701093][ T3089] veth1_macvtap: entered promiscuous mode [ 88.778040][ T3089] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.787288][ T3089] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.790243][ T3089] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.798559][ T3089] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.861207][ T3795] Zero length message leads to an empty skb [ 92.978629][ T3798] : renamed from bond0 (while UP) [ 93.336021][ T3802] capability: warning: `syz.0.13' uses 32-bit capabilities (legacy support in use) [ 93.504609][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 93.504719][ T31] audit: type=1400 audit(93.420:127): avc: denied { prog_load } for pid=3803 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 93.509675][ T31] audit: type=1400 audit(93.420:128): avc: denied { perfmon } for pid=3803 comm="syz.0.14" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 93.543730][ T31] audit: type=1400 audit(93.460:129): avc: denied { prog_run } for pid=3803 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 99.687402][ T31] audit: type=1400 audit(99.600:130): avc: denied { map_create } for pid=3810 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 99.691204][ T31] audit: type=1400 audit(99.600:131): avc: denied { map_read map_write } for pid=3810 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 100.126253][ T31] audit: type=1400 audit(100.040:132): avc: denied { create } for pid=3814 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 100.141209][ T31] audit: type=1400 audit(100.050:133): avc: denied { create } for pid=3814 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 100.423609][ T94] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 100.606093][ T94] usb 1-1: config 3 has an invalid interface number: 235 but max is 0 [ 100.606924][ T94] usb 1-1: config 3 has no interface number 0 [ 100.607410][ T94] usb 1-1: config 3 interface 235 has no altsetting 0 [ 100.626819][ T94] usb 1-1: New USB device found, idVendor=04b4, idProduct=0002, bcdDevice=e5.61 [ 100.627783][ T94] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 100.628341][ T94] usb 1-1: Product: syz [ 100.628886][ T94] usb 1-1: Manufacturer: syz [ 100.629230][ T94] usb 1-1: SerialNumber: syz [ 100.875751][ T94] cytherm 1-1:3.235: Cypress thermometer device now attached [ 100.884003][ T94] usb 1-1: USB disconnect, device number 2 [ 100.885633][ T94] cytherm 1-1:3.235: Cypress thermometer now disconnected [ 101.006776][ T31] audit: type=1400 audit(100.920:134): avc: denied { map } for pid=3830 comm="syz.0.19" path="/dev/nullb0" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 101.010906][ T31] audit: type=1400 audit(100.920:135): avc: denied { execute } for pid=3830 comm="syz.0.19" path="/dev/nullb0" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 101.186197][ T3833] netlink: 40 bytes leftover after parsing attributes in process `syz.0.20'. [ 101.188376][ T3833] netlink: 8 bytes leftover after parsing attributes in process `syz.0.20'. [ 103.146880][ T31] audit: type=1400 audit(103.060:136): avc: denied { create } for pid=3838 comm="syz.0.22" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 103.152489][ T31] audit: type=1400 audit(103.060:137): avc: denied { ioctl } for pid=3838 comm="syz.0.22" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2333 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 103.737616][ T31] audit: type=1400 audit(103.650:138): avc: denied { create } for pid=3852 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 103.740742][ T31] audit: type=1400 audit(103.650:139): avc: denied { ioctl } for pid=3852 comm="syz.0.28" path="socket:[2372]" dev="sockfs" ino=2372 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 104.987341][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 104.987450][ T31] audit: type=1400 audit(104.900:142): avc: denied { create } for pid=3875 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 105.004979][ T31] audit: type=1400 audit(104.920:143): avc: denied { map } for pid=3875 comm="syz.0.37" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2430 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 105.013682][ T31] audit: type=1400 audit(104.920:144): avc: denied { read write } for pid=3875 comm="syz.0.37" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2430 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 105.024957][ T31] audit: type=1400 audit(104.930:145): avc: denied { write } for pid=3875 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 105.396562][ T3880] netlink: 'syz.0.39': attribute type 4 has an invalid length. [ 105.744221][ T3882] Process accounting resumed [ 106.643519][ T31] audit: type=1400 audit(106.550:146): avc: denied { append } for pid=3905 comm="syz.0.42" name="dsp" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 120.987511][ T31] audit: type=1400 audit(120.900:147): avc: denied { create } for pid=3914 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 124.439488][ T31] audit: type=1400 audit(124.350:148): avc: denied { name_bind } for pid=3927 comm="syz.1.48" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 126.345016][ T3941] trusted_key: encrypted_key: master key parameter '' is invalid [ 131.195007][ T31] audit: type=1400 audit(131.110:149): avc: denied { create } for pid=3975 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 131.989343][ T3986] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 131.992106][ T31] audit: type=1400 audit(131.900:150): avc: denied { getopt } for pid=3985 comm="syz.0.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 139.155241][ T4012] netlink: 8 bytes leftover after parsing attributes in process `syz.1.81'. [ 139.339624][ T31] audit: type=1400 audit(139.250:151): avc: denied { create } for pid=4018 comm="syz.1.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 139.343152][ T31] audit: type=1400 audit(139.250:152): avc: denied { ioctl } for pid=4018 comm="syz.1.84" path="socket:[3353]" dev="sockfs" ino=3353 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 139.569789][ T31] audit: type=1400 audit(139.480:153): avc: denied { ioctl } for pid=4020 comm="syz.1.85" path="socket:[3368]" dev="sockfs" ino=3368 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 143.165267][ T4030] netlink: 8 bytes leftover after parsing attributes in process `syz.0.87'. [ 143.569088][ T31] audit: type=1400 audit(143.480:154): avc: denied { write } for pid=4033 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 143.664938][ T31] audit: type=1400 audit(143.580:155): avc: denied { create } for pid=4039 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 143.670700][ T31] audit: type=1400 audit(143.580:156): avc: denied { connect } for pid=4039 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 143.750136][ T31] audit: type=1400 audit(143.660:157): avc: denied { write } for pid=4041 comm="syz.0.92" name="dev" dev="proc" ino=4026532667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 144.479572][ T31] audit: type=1326 audit(144.390:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 144.482370][ T31] audit: type=1326 audit(144.390:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x50000 [ 144.493356][ T31] audit: type=1326 audit(144.400:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x50000 [ 144.494424][ T31] audit: type=1326 audit(144.400:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=146 compat=0 ip=0x103d50 code=0x50000 [ 144.494994][ T31] audit: type=1326 audit(144.400:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x133488 code=0x50000 [ 144.496737][ T31] audit: type=1326 audit(144.400:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 144.497366][ T31] audit: type=1326 audit(144.400:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 144.497966][ T31] audit: type=1326 audit(144.400:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 144.498554][ T31] audit: type=1326 audit(144.400:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 144.499154][ T31] audit: type=1326 audit(144.400:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 149.482922][ T31] kauditd_printk_skb: 11390 callbacks suppressed [ 149.482974][ T31] audit: type=1326 audit(149.400:11558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 149.483972][ T31] audit: type=1326 audit(149.400:11559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 149.487354][ T31] audit: type=1326 audit(149.400:11560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 149.488083][ T31] audit: type=1326 audit(149.400:11561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 149.488628][ T31] audit: type=1326 audit(149.400:11562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 149.489104][ T31] audit: type=1326 audit(149.400:11563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 149.489518][ T31] audit: type=1326 audit(149.400:11564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 149.490032][ T31] audit: type=1326 audit(149.400:11565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 149.490579][ T31] audit: type=1326 audit(149.400:11566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 149.491106][ T31] audit: type=1326 audit(149.400:11567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 151.317509][ T4066] syz.1.102 uses obsolete (PF_INET,SOCK_PACKET) [ 152.571412][ T4087] netlink: 12 bytes leftover after parsing attributes in process `syz.1.108'. [ 152.725582][ T4089] netlink: 104 bytes leftover after parsing attributes in process `syz.1.109'. [ 154.493100][ T31] kauditd_printk_skb: 14904 callbacks suppressed [ 154.493184][ T31] audit: type=1326 audit(154.400:26473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 154.494020][ T31] audit: type=1326 audit(154.400:26474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 154.494497][ T31] audit: type=1326 audit(154.400:26475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 154.494986][ T31] audit: type=1326 audit(154.400:26476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 154.495473][ T31] audit: type=1326 audit(154.400:26477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 154.495963][ T31] audit: type=1326 audit(154.400:26478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 154.496432][ T31] audit: type=1326 audit(154.400:26479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 154.496958][ T31] audit: type=1326 audit(154.400:26480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 154.497440][ T31] audit: type=1326 audit(154.400:26481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 154.497925][ T31] audit: type=1326 audit(154.400:26482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4045 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x50000 [ 160.233772][ T31] kauditd_printk_skb: 1134 callbacks suppressed [ 160.233885][ T31] audit: type=1400 audit(160.150:27616): avc: denied { create } for pid=4106 comm="syz.0.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 160.306890][ T31] audit: type=1400 audit(160.210:27617): avc: denied { bind } for pid=4106 comm="syz.0.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 160.672982][ C1] hrtimer: interrupt took 9918592 ns [ 160.795771][ T31] audit: type=1400 audit(160.710:27618): avc: denied { setopt } for pid=4106 comm="syz.0.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 160.806154][ T31] audit: type=1400 audit(160.720:27619): avc: denied { accept } for pid=4106 comm="syz.0.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 165.664699][ T31] audit: type=1400 audit(165.580:27620): avc: denied { shutdown } for pid=4117 comm="syz.1.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 166.215934][ T31] audit: type=1400 audit(166.130:27621): avc: denied { connect } for pid=4124 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 166.216833][ T31] audit: type=1400 audit(166.130:27622): avc: denied { name_connect } for pid=4124 comm="syz.1.122" dest=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 166.320178][ T31] audit: type=1400 audit(166.230:27623): avc: denied { write } for pid=4124 comm="syz.1.122" laddr=::ffff:172.20.20.10 lport=54661 faddr=::ffff:172.20.20.187 fport=3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 166.343506][ T31] audit: type=1400 audit(166.250:27624): avc: denied { name_connect } for pid=4124 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 173.525610][ T4136] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 177.677236][ T31] audit: type=1400 audit(177.590:27625): avc: denied { read } for pid=4140 comm="syz.1.127" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 177.678631][ T31] audit: type=1400 audit(177.590:27626): avc: denied { open } for pid=4140 comm="syz.1.127" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 177.707868][ T31] audit: type=1400 audit(177.620:27627): avc: denied { ioctl } for pid=4140 comm="syz.1.127" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 177.709369][ T31] audit: type=1400 audit(177.620:27628): avc: denied { set_context_mgr } for pid=4140 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 180.510620][ T31] audit: type=1400 audit(180.420:27629): avc: denied { write } for pid=4148 comm="syz.0.131" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 181.050636][ T24] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 181.253923][ T24] usb 1-1: Using ep0 maxpacket: 32 [ 181.290413][ T24] usb 1-1: config 0 has an invalid interface number: 51 but max is 0 [ 181.293049][ T24] usb 1-1: config 0 has no interface number 0 [ 181.307414][ T24] usb 1-1: New USB device found, idVendor=061d, idProduct=c150, bcdDevice=ce.6f [ 181.307959][ T24] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 181.308375][ T24] usb 1-1: Product: syz [ 181.308589][ T24] usb 1-1: Manufacturer: syz [ 181.308803][ T24] usb 1-1: SerialNumber: syz [ 181.316941][ T24] usb 1-1: config 0 descriptor?? [ 181.338322][ T24] quatech2 1-1:0.51: Quatech 2nd gen USB to Serial Driver converter detected [ 181.668936][ T24] usb 1-1: Quatech 2nd gen USB to Serial Driver converter now attached to ttyUSB0 [ 181.741922][ T24] usb 1-1: Quatech 2nd gen USB to Serial Driver converter now attached to ttyUSB1 [ 181.954626][ C1] usb 1-1: qt2_read_bulk_callback - non-zero urb status: -71 [ 181.955141][ T10] usb 1-1: USB disconnect, device number 3 [ 181.963571][ T10] quatech-serial ttyUSB0: Quatech 2nd gen USB to Serial Driver converter now disconnected from ttyUSB0 [ 182.014661][ T10] quatech-serial ttyUSB1: Quatech 2nd gen USB to Serial Driver converter now disconnected from ttyUSB1 [ 182.017035][ T10] quatech2 1-1:0.51: device disconnected [ 182.931194][ T31] audit: type=1400 audit(182.840:27630): avc: denied { create } for pid=4188 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 182.955001][ T31] audit: type=1400 audit(182.870:27631): avc: denied { read } for pid=4188 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 183.737872][ T31] audit: type=1400 audit(183.650:27632): avc: denied { bind } for pid=4197 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 183.924973][ T31] audit: type=1400 audit(183.840:27633): avc: denied { write } for pid=4199 comm="syz.0.141" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 183.998308][ T31] audit: type=1400 audit(183.910:27634): avc: denied { create } for pid=4201 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 184.023600][ T31] audit: type=1400 audit(183.920:27635): avc: denied { write } for pid=4201 comm="syz.1.142" path="socket:[2746]" dev="sockfs" ino=2746 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 184.029181][ T31] audit: type=1400 audit(183.930:27636): avc: denied { nlmsg_read } for pid=4201 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 184.043995][ T31] audit: type=1326 audit(183.950:27637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4201 comm="syz.1.142" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 186.670850][ T31] audit: type=1400 audit(186.580:27638): avc: denied { create } for pid=4213 comm="syz.1.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 186.708892][ T31] audit: type=1400 audit(186.620:27639): avc: denied { connect } for pid=4213 comm="syz.1.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 191.203294][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 191.203352][ T31] audit: type=1400 audit(191.110:27641): avc: denied { block_suspend } for pid=4217 comm="syz.0.147" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 192.958905][ T4260] netlink: 20 bytes leftover after parsing attributes in process `syz.0.156'. [ 192.971643][ T4260] wg0: entered promiscuous mode [ 192.975204][ T4260] netlink: 44 bytes leftover after parsing attributes in process `syz.0.156'. [ 193.037845][ T4262] netlink: 28 bytes leftover after parsing attributes in process `syz.0.157'. [ 193.039323][ T31] audit: type=1400 audit(192.950:27642): avc: denied { create } for pid=4261 comm="syz.0.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 198.140271][ T2884] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 198.323947][ T2884] usb 2-1: Using ep0 maxpacket: 8 [ 198.340377][ T2884] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 198.353824][ T2884] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 198.354315][ T2884] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 198.372571][ T2884] usb 2-1: config 0 descriptor?? [ 198.421080][ T2884] iowarrior 2-1:0.0: no interrupt-in endpoint found [ 202.583659][ T2884] usb 1-1: new full-speed USB device number 4 using dummy_hcd [ 202.713145][ T2884] usb 1-1: device descriptor read/64, error -71 [ 202.973475][ T2884] usb 1-1: new full-speed USB device number 5 using dummy_hcd [ 203.123485][ T2884] usb 1-1: device descriptor read/64, error -71 [ 203.233737][ T2884] usb usb1-port1: attempt power cycle [ 203.593390][ T2884] usb 1-1: new full-speed USB device number 6 using dummy_hcd [ 203.626976][ T2884] usb 1-1: device descriptor read/8, error -71 [ 203.873023][ T2884] usb 1-1: new full-speed USB device number 7 using dummy_hcd [ 203.908179][ T2884] usb 1-1: device descriptor read/8, error -71 [ 204.024009][ T2884] usb usb1-port1: unable to enumerate USB device [ 212.132093][ T2884] usb 2-1: USB disconnect, device number 2 [ 214.314923][ T4347] syzkaller1: entered promiscuous mode [ 214.315339][ T4347] syzkaller1: entered allmulticast mode [ 214.555441][ T31] audit: type=1400 audit(214.470:27643): avc: denied { shutdown } for pid=4352 comm="syz.1.181" lport=54094 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 214.573394][ T31] audit: type=1400 audit(214.490:27644): avc: denied { setopt } for pid=4352 comm="syz.1.181" lport=54094 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 217.242228][ T4358] netlink: 8 bytes leftover after parsing attributes in process `syz.1.183'. [ 217.243773][ T4358] netlink: 16 bytes leftover after parsing attributes in process `syz.1.183'. [ 223.280460][ T4391] netlink: 4 bytes leftover after parsing attributes in process `syz.0.196'. [ 223.471098][ T4397] netlink: 'syz.0.197': attribute type 64 has an invalid length. [ 223.471592][ T4397] netlink: 12 bytes leftover after parsing attributes in process `syz.0.197'. [ 223.601455][ T31] audit: type=1400 audit(223.510:27645): avc: denied { create } for pid=4400 comm="syz.0.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 224.136671][ T31] audit: type=1400 audit(224.050:27646): avc: denied { write } for pid=4400 comm="syz.0.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 224.166214][ T31] audit: type=1400 audit(224.080:27647): avc: denied { read } for pid=4400 comm="syz.0.199" dev="sockfs" ino=2978 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 224.172944][ T4402] netlink: 172 bytes leftover after parsing attributes in process `syz.0.199'. [ 231.102855][ T31] audit: type=1326 audit(231.009:27648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4417 comm="syz.1.204" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 236.858144][ T31] audit: type=1400 audit(236.769:27649): avc: denied { write } for pid=4419 comm="syz.0.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 237.099249][ T31] audit: type=1400 audit(237.009:27650): avc: denied { read } for pid=4425 comm="syz.0.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 237.605740][ T31] audit: type=1400 audit(237.519:27651): avc: denied { setopt } for pid=4425 comm="syz.0.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 240.093642][ T2884] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 240.253527][ T2884] usb 1-1: Using ep0 maxpacket: 32 [ 240.269782][ T2884] usb 1-1: config index 0 descriptor too short (expected 156, got 27) [ 240.270363][ T2884] usb 1-1: too many endpoints for config 0 interface 0 altsetting 191: 144, using maximum allowed: 30 [ 240.270804][ T2884] usb 1-1: config 0 interface 0 altsetting 191 endpoint 0x87 has an invalid bInterval 0, changing to 7 [ 240.271231][ T2884] usb 1-1: config 0 interface 0 altsetting 191 has 1 endpoint descriptor, different from the interface descriptor's value: 144 [ 240.271651][ T2884] usb 1-1: config 0 interface 0 has no altsetting 0 [ 240.295261][ T2884] usb 1-1: New USB device found, idVendor=0f11, idProduct=1021, bcdDevice=86.66 [ 240.295736][ T2884] usb 1-1: New USB device strings: Mfr=85, Product=120, SerialNumber=172 [ 240.296016][ T2884] usb 1-1: Product: syz [ 240.296194][ T2884] usb 1-1: Manufacturer: syz [ 240.296359][ T2884] usb 1-1: SerialNumber: syz [ 240.304576][ T2884] usb 1-1: config 0 descriptor?? [ 240.320066][ T2884] ldusb 1-1:0.0: Interrupt out endpoint not found (using control endpoint instead) [ 240.326805][ T2884] ldusb 1-1:0.0: LD USB Device #0 now attached to major 180 minor 0 [ 240.518318][ T2884] usb 1-1: USB disconnect, device number 8 [ 240.524330][ T2884] ldusb 1-1:0.0: LD USB Device #0 now disconnected [ 252.309825][ T31] audit: type=1400 audit(252.219:27652): avc: denied { getopt } for pid=4520 comm="syz.0.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 252.566429][ T4525] ALSA: mixer_oss: invalid OSS volume '' [ 260.913811][ T4550] netlink: 'syz.1.245': attribute type 1 has an invalid length. [ 263.378487][ T4558] netlink: 144 bytes leftover after parsing attributes in process `syz.1.247'. [ 270.491005][ T31] audit: type=1400 audit(270.399:27653): avc: denied { nlmsg_read } for pid=4577 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 271.629941][ T31] audit: type=1400 audit(271.539:27654): avc: denied { unmount } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 271.804707][ T4592] netlink: 8 bytes leftover after parsing attributes in process `syz.0.260'. [ 271.805553][ T4592] netlink: 8 bytes leftover after parsing attributes in process `syz.0.260'. [ 271.878450][ T31] audit: type=1400 audit(271.789:27655): avc: denied { getopt } for pid=4595 comm="syz.0.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 271.881043][ T31] audit: type=1400 audit(271.789:27656): avc: denied { write } for pid=4595 comm="syz.0.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 281.310004][ T4626] netlink: 52 bytes leftover after parsing attributes in process `syz.1.271'. [ 281.316050][ T4626] netdevsim netdevsim1 netdevsim0: entered promiscuous mode [ 281.505697][ T4634] ubi0: attaching mtd0 [ 281.529501][ T4634] ubi0: scanning is finished [ 281.530718][ T4634] ubi0 error: ubi_read_volume_table: the layout volume was not found [ 281.578503][ T4634] ubi0 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 296.167224][ T4678] netlink: 'syz.0.291': attribute type 11 has an invalid length. [ 297.644049][ T4708] ubi0: attaching mtd0 [ 297.660303][ T4708] ubi0: scanning is finished [ 297.665085][ T4708] ubi0 error: ubi_read_volume_table: the layout volume was not found [ 297.704589][ T4708] ubi0 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 297.926067][ T31] audit: type=1400 audit(297.839:27657): avc: denied { create } for pid=4712 comm="syz.0.305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 298.250526][ T4720] ubi0: attaching mtd0 [ 298.265044][ T4720] ubi0: scanning is finished [ 298.265483][ T4720] ubi0 error: ubi_read_volume_table: the layout volume was not found [ 298.267934][ T4720] ubi0 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 298.464022][ T31] audit: type=1400 audit(298.359:27658): avc: denied { bind } for pid=4723 comm="syz.0.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 299.437509][ T4737] ubi0: attaching mtd0 [ 299.457625][ T4737] ubi0: scanning is finished [ 299.458801][ T4737] ubi0 error: ubi_read_volume_table: the layout volume was not found [ 299.462249][ T4737] ubi0 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 299.558501][ T4739] netlink: 20 bytes leftover after parsing attributes in process `syz.0.314'. [ 299.577339][ T4739] netdevsim netdevsim0 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 299.577936][ T4739] netdevsim netdevsim0 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 299.578508][ T4739] netdevsim netdevsim0 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 299.579155][ T4739] netdevsim netdevsim0 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 299.970200][ T4749] ubi0: attaching mtd0 [ 299.988458][ T4749] ubi0: scanning is finished [ 299.989013][ T4749] ubi0 error: ubi_read_volume_table: the layout volume was not found [ 300.033653][ T4749] ubi0 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 300.146529][ T31] audit: type=1400 audit(300.059:27659): avc: denied { relabelfrom } for pid=4750 comm="syz.0.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 300.147932][ T31] audit: type=1400 audit(300.059:27660): avc: denied { relabelto } for pid=4750 comm="syz.0.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 301.686125][ T4776] ubi0: attaching mtd0 [ 301.698825][ T4776] ubi0: scanning is finished [ 301.699971][ T4776] ubi0 error: ubi_read_volume_table: the layout volume was not found [ 301.784133][ T4776] ubi0 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 301.954489][ T31] audit: type=1400 audit(301.869:27661): avc: denied { create } for pid=4779 comm="syz.0.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 302.507130][ T4784] sctp: [Deprecated]: syz.1.327 (pid 4784) Use of int in maxseg socket option. [ 302.507130][ T4784] Use struct sctp_assoc_value instead [ 302.590998][ T4786] ubi0: attaching mtd0 [ 302.609343][ T4786] ubi0: scanning is finished [ 302.609867][ T4786] ubi0 error: ubi_read_volume_table: the layout volume was not found [ 302.614526][ T4786] ubi0 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 303.804745][ T31] audit: type=1400 audit(303.719:27662): avc: denied { bind } for pid=4779 comm="syz.0.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 303.806982][ T31] audit: type=1400 audit(303.719:27663): avc: denied { name_bind } for pid=4779 comm="syz.0.325" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 303.808219][ T31] audit: type=1400 audit(303.719:27664): avc: denied { node_bind } for pid=4779 comm="syz.0.325" saddr=172.20.20.170 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 303.811282][ T31] audit: type=1400 audit(303.719:27665): avc: denied { name_connect } for pid=4779 comm="syz.0.325" dest=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 305.699049][ T31] audit: type=1326 audit(305.609:27666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4808 comm="syz.0.338" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 306.514400][ T31] audit: type=1400 audit(306.419:27667): avc: denied { bind } for pid=4812 comm="syz.1.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 306.537612][ T31] audit: type=1400 audit(306.439:27668): avc: denied { setopt } for pid=4812 comm="syz.1.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 313.108640][ T31] audit: type=1400 audit(313.019:27669): avc: denied { create } for pid=4840 comm="syz.1.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 313.128571][ T31] audit: type=1400 audit(313.039:27670): avc: denied { write } for pid=4840 comm="syz.1.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 315.587985][ T4868] ubi0: attaching mtd0 [ 315.607795][ T4868] ubi0: scanning is finished [ 315.608352][ T4868] ubi0 error: ubi_read_volume_table: the layout volume was not found [ 315.678772][ T4868] ubi0 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 315.976700][ T4872] netlink: 28 bytes leftover after parsing attributes in process `syz.0.357'. [ 315.977326][ T4872] netlink: 'syz.0.357': attribute type 6 has an invalid length. [ 316.633745][ T4880] ubi0: attaching mtd0 [ 316.678045][ T4880] ubi0: scanning is finished [ 316.678558][ T4880] ubi0 error: ubi_read_volume_table: the layout volume was not found [ 316.681268][ T4880] ubi0 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 317.102949][ T3042] usb 2-1: new low-speed USB device number 3 using dummy_hcd [ 317.293422][ T3042] usb 2-1: device descriptor read/64, error -71 [ 317.536199][ T3042] usb 2-1: new low-speed USB device number 4 using dummy_hcd [ 317.673900][ T3042] usb 2-1: device descriptor read/64, error -71 [ 317.790357][ T3042] usb usb2-port1: attempt power cycle [ 318.135574][ T3042] usb 2-1: new low-speed USB device number 5 using dummy_hcd [ 318.180213][ T3042] usb 2-1: device descriptor read/8, error -71 [ 318.534062][ T3042] usb 2-1: new low-speed USB device number 6 using dummy_hcd [ 318.558578][ T3042] usb 2-1: device descriptor read/8, error -71 [ 318.666344][ T3042] usb usb2-port1: unable to enumerate USB device [ 330.701911][ T4903] netlink: 36 bytes leftover after parsing attributes in process `syz.1.368'. [ 330.706503][ T4903] netlink: 16 bytes leftover after parsing attributes in process `syz.1.368'. [ 330.707336][ T4903] netlink: 36 bytes leftover after parsing attributes in process `syz.1.368'. [ 330.708115][ T4903] netlink: 36 bytes leftover after parsing attributes in process `syz.1.368'. [ 333.563454][ T4917] netlink: 'syz.1.373': attribute type 10 has an invalid length. [ 343.097130][ T31] audit: type=1400 audit(343.009:27671): avc: denied { bind } for pid=4940 comm="syz.1.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 344.079535][ T31] audit: type=1326 audit(343.989:27672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.0.385" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 345.157163][ T31] audit: type=1400 audit(345.069:27673): avc: denied { sqpoll } for pid=4946 comm="syz.1.383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 346.470260][ T4959] futex_wake_op: syz.1.387 tries to shift op by 32; fix this program [ 347.602945][ T4969] netlink: 8 bytes leftover after parsing attributes in process `syz.0.392'. [ 368.056987][ T31] audit: type=1400 audit(367.939:27674): avc: denied { write } for pid=5010 comm="syz.0.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 368.286186][ T31] audit: type=1400 audit(368.199:27675): avc: denied { ioctl } for pid=5012 comm="syz.0.407" path="socket:[5695]" dev="sockfs" ino=5695 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 372.549102][ T31] audit: type=1400 audit(372.459:27676): avc: denied { map } for pid=5051 comm="syz.1.418" path="socket:[5764]" dev="sockfs" ino=5764 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 372.557935][ T31] audit: type=1400 audit(372.469:27677): avc: denied { read accept } for pid=5051 comm="syz.1.418" path="socket:[5764]" dev="sockfs" ino=5764 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 378.094476][ T31] audit: type=1400 audit(378.009:27678): avc: denied { setopt } for pid=5055 comm="syz.0.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 378.413935][ T5063] input: syz0 as /devices/virtual/input/input4 [ 379.958699][ T31] audit: type=1400 audit(379.869:27679): avc: denied { ioctl } for pid=5082 comm="syz.0.429" path="socket:[4829]" dev="sockfs" ino=4829 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 379.960077][ T5084] syz.0.429 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 382.627592][ T31] audit: type=1400 audit(382.539:27680): avc: denied { listen } for pid=5087 comm="syz.1.431" lport=43439 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 387.466829][ T5102] netlink: 8 bytes leftover after parsing attributes in process `syz.0.433'. [ 394.287997][ T31] audit: type=1400 audit(394.199:27681): avc: denied { bind } for pid=5121 comm="syz.0.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 394.314378][ T5122] netlink: 4 bytes leftover after parsing attributes in process `syz.0.442'. [ 397.153939][ T31] audit: type=1400 audit(397.069:27682): avc: denied { setcurrent } for pid=5134 comm="syz.1.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 397.155896][ T5135] capability: warning: `syz.1.446' uses deprecated v2 capabilities in a way that may be insecure [ 397.257965][ T31] audit: type=1400 audit(397.169:27683): avc: denied { mounton } for pid=5136 comm="syz.1.447" path="/192/file0" dev="tmpfs" ino=990 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 398.584407][ T5164] netlink: 12 bytes leftover after parsing attributes in process `syz.0.454'. [ 398.943405][ T5171] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5171 comm=syz.1.456 [ 398.945992][ T5171] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5171 comm=syz.1.456 [ 399.982280][ T5185] netlink: 48 bytes leftover after parsing attributes in process `syz.0.460'. [ 400.514403][ T5187] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5187 comm=syz.1.456 [ 401.822258][ T31] audit: type=1400 audit(401.729:27684): avc: denied { connect } for pid=5202 comm="syz.1.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 402.325842][ T31] audit: type=1400 audit(402.239:27685): avc: denied { read } for pid=5202 comm="syz.1.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 406.366689][ T31] audit: type=1400 audit(406.279:27686): avc: denied { view } for pid=5225 comm="syz.1.474" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 406.690532][ T31] audit: type=1400 audit(406.599:27687): avc: denied { getopt } for pid=5229 comm="syz.0.476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 406.953880][ T5234] smc: net device bond0 applied user defined pnetid SYZ0 [ 407.225163][ T5239] netlink: 12 bytes leftover after parsing attributes in process `syz.1.480'. [ 408.271644][ T5247] netlink: 20 bytes leftover after parsing attributes in process `syz.1.485'. [ 408.278511][ T31] audit: type=1400 audit(408.189:27688): avc: denied { read } for pid=5246 comm="syz.1.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 411.643367][ T5268] netlink: 32 bytes leftover after parsing attributes in process `syz.1.492'. [ 412.096362][ T5274] ------------[ cut here ]------------ [ 412.097584][ T5274] WARNING: CPU: 1 PID: 5274 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 412.099473][ T5274] Modules linked in: [ 412.100814][ T5274] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 412.102503][ T5274] CPU: 1 UID: 0 PID: 5274 Comm: syz.1.495 Not tainted 6.12.0-syzkaller #0 [ 412.103709][ T5274] Hardware name: ARM-Versatile Express [ 412.104390][ T5274] Call trace: [ 412.104956][ T5274] [<819a4c38>] (dump_backtrace) from [<819a4d34>] (show_stack+0x18/0x1c) [ 412.105625][ T5274] r7:00000000 r6:82622f84 r5:00000000 r4:8203f4b0 [ 412.105985][ T5274] [<819a4d1c>] (show_stack) from [<819c2e28>] (dump_stack_lvl+0x54/0x7c) [ 412.106363][ T5274] [<819c2dd4>] (dump_stack_lvl) from [<819c2e68>] (dump_stack+0x18/0x1c) [ 412.106728][ T5274] r5:00000000 r4:82871d18 [ 412.106938][ T5274] [<819c2e50>] (dump_stack) from [<819a5860>] (panic+0x120/0x374) [ 412.107272][ T5274] [<819a5740>] (panic) from [<802420d8>] (get_taint+0x0/0x1c) [ 412.107629][ T5274] r3:8260c604 r2:00000001 r1:82027874 r0:8202f328 [ 412.107895][ T5274] r7:8048d4c0 [ 412.108080][ T5274] [<80242064>] (check_panic_on_warn) from [<8024223c>] (__warn+0x80/0x188) [ 412.108461][ T5274] [<802421bc>] (__warn) from [<802424bc>] (warn_slowpath_fmt+0x178/0x1f4) [ 412.108933][ T5274] r8:00000009 r7:82057110 r6:dfcd9d24 r5:84e2e000 r4:00000000 [ 412.109251][ T5274] [<80242348>] (warn_slowpath_fmt) from [<8048d4c0>] (kunmap_local_indexed+0x20c/0x224) [ 412.109673][ T5274] r10:ffedcfe8 r9:83a0d200 r8:20000000 r7:00000000 r6:00000003 r5:84e2e000 [ 412.109971][ T5274] r4:ffedc000 [ 412.110164][ T5274] [<8048d2b4>] (kunmap_local_indexed) from [<80507174>] (move_pages+0x7e8/0x149c) [ 412.110710][ T5274] r7:00000000 r6:842b4180 r5:dedaa084 r4:ffeda000 [ 412.112513][ T5274] [<8050698c>] (move_pages) from [<805855e8>] (userfaultfd_ioctl+0x111c/0x2080) [ 412.112973][ T5274] r10:83a0d200 r9:dfcd9e98 r8:00000001 r7:21000000 r6:00000000 r5:20000040 [ 412.113453][ T5274] r4:84f17000 [ 412.113685][ T5274] [<805844cc>] (userfaultfd_ioctl) from [<80531118>] (sys_ioctl+0x138/0xd88) [ 412.114132][ T5274] r10:84e2e000 r9:00000003 r8:848d9000 r7:20000040 r6:848d9001 r5:00000000 [ 412.114517][ T5274] r4:c028aa05 [ 412.114708][ T5274] [<80530fe0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 412.115241][ T5274] Exception stack(0xdfcd9fa8 to 0xdfcd9ff0) [ 412.115675][ T5274] 9fa0: 00000000 00000000 00000003 c028aa05 20000040 00000000 [ 412.116011][ T5274] 9fc0: 00000000 00000000 002862f0 00000036 00000000 00006364 003d0f00 76bb20bc [ 412.116312][ T5274] 9fe0: 76bb1ec0 76bb1eb0 00018af0 00133450 [ 412.116689][ T5274] r10:00000036 r9:84e2e000 r8:8020029c r7:00000036 r6:002862f0 r5:00000000 [ 412.117033][ T5274] r4:00000000 [ 412.119117][ T5274] Rebooting in 86400 seconds.. VM DIAGNOSIS: 21:57:47 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=8203f4b0 R02=00000001 R03=819c4c98 R04=826f8a08 R05=826f8a00 R06=00000028 R07=00000006 R08=826f8a08 R09=00000000 R10=00000200 R11=df801e9c R12=df801ea0 R13=df801e90 R14=819c392c R15=819c4ca8 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=00000000 R02=00000000 R03=0000003c R04=82758c88 R05=00000000 R06=60000093 R07=00000001 R08=00000001 R09=dfcd9b40 R10=00000001 R11=dfcd9b2c R12=00000020 R13=dfcd9ab0 R14=37323554 R15=802bf820 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000