last executing test programs: 4.293100997s ago: executing program 1 (id=500): open(&(0x7f0000000380)='./file0\x00', 0x200, 0x0) 4.031254071s ago: executing program 1 (id=501): r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 3.759482985s ago: executing program 1 (id=502): r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0xa}, 0xa) connect$unix(r0, &(0x7f0000000000)=@file={0xa}, 0xa) 3.622519417s ago: executing program 0 (id=503): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x5, 0xa, 0x80, 0x80}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f00000001c0), 0xbde, r1}, 0x38) 3.473571171s ago: executing program 1 (id=504): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_ENCODING_SA={0x5, 0x6, 0xd6}]}}}]}, 0x3c}}, 0x0) 3.292090427s ago: executing program 1 (id=505): syz_open_dev$evdev(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCSETA(r0, 0x802c542a, 0xffffffffffffffff) 2.903825411s ago: executing program 1 (id=506): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000240)="f20ea8accd", 0x5, 0xfffffffffffffffe) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0xa, &(0x7f0000001a00), 0x4) 1.893129741s ago: executing program 0 (id=507): r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) sendmmsg$alg(r0, &(0x7f0000001840)=[{0x20000000, 0xff00, 0x0, 0x0, &(0x7f0000000040)=[@op={0x10, 0x29, 0x4}], 0x18}], 0x1, 0x0) 1.630470905s ago: executing program 0 (id=508): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) syz_open_dev$dmmidi(&(0x7f0000000300), 0x2, 0x1) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = socket$unix(0x1, 0x5, 0x0) r3 = dup2(r2, r1) close_range(r3, 0xffffffffffffffff, 0x0) 1.473671129s ago: executing program 0 (id=509): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) 962.113685ms ago: executing program 0 (id=510): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x1e, 0x2200c851, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x800) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090011006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6", 0xa8, 0x1, 0x0, 0x0) shutdown(r0, 0x1) 0s ago: executing program 0 (id=511): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) r1 = userfaultfd(0x80001) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000180)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_COPY(r1, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, 0x3000}) kernel console output (not intermixed with test programs): [ 49.450600][ T31] audit: type=1400 audit(49.380:68): avc: denied { read write } for pid=2994 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 49.486429][ T31] audit: type=1400 audit(49.400:69): avc: denied { open } for pid=2994 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:59261' (ED25519) to the list of known hosts. [ 60.922704][ T31] audit: type=1400 audit(60.850:70): avc: denied { name_bind } for pid=2995 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.019917][ T31] audit: type=1400 audit(62.950:71): avc: denied { execute } for pid=2997 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.051675][ T31] audit: type=1400 audit(62.990:72): avc: denied { execute_no_trans } for pid=2997 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.643086][ T31] audit: type=1400 audit(65.580:73): avc: denied { mounton } for pid=2997 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 65.644693][ T31] audit: type=1400 audit(65.580:74): avc: denied { mount } for pid=2997 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.652040][ T2997] cgroup: Unknown subsys name 'net' [ 65.658137][ T31] audit: type=1400 audit(65.590:75): avc: denied { unmount } for pid=2997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 65.839938][ T2997] cgroup: Unknown subsys name 'hugetlb' [ 65.840549][ T2997] cgroup: Unknown subsys name 'rlimit' [ 66.094422][ T31] audit: type=1400 audit(66.030:76): avc: denied { setattr } for pid=2997 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.099666][ T31] audit: type=1400 audit(66.030:77): avc: denied { mounton } for pid=2997 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.100593][ T31] audit: type=1400 audit(66.030:78): avc: denied { mount } for pid=2997 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.336183][ T2999] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 66.338020][ T31] audit: type=1400 audit(66.270:79): avc: denied { relabelto } for pid=2999 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.346410][ T31] audit: type=1400 audit(66.280:80): avc: denied { write } for pid=2999 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 66.377128][ T31] audit: type=1400 audit(66.310:81): avc: denied { read } for pid=2997 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.379950][ T31] audit: type=1400 audit(66.320:82): avc: denied { open } for pid=2997 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.863562][ T2997] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 74.738352][ T31] audit: type=1400 audit(74.660:83): avc: denied { execmem } for pid=3000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 74.786415][ T31] audit: type=1400 audit(74.720:84): avc: denied { mounton } for pid=3002 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 74.787730][ T31] audit: type=1400 audit(74.720:85): avc: denied { mount } for pid=3002 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 74.794817][ T31] audit: type=1400 audit(74.730:86): avc: denied { read } for pid=3002 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.795952][ T31] audit: type=1400 audit(74.730:87): avc: denied { open } for pid=3002 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.798080][ T31] audit: type=1400 audit(74.730:88): avc: denied { mounton } for pid=3002 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 74.821344][ T31] audit: type=1400 audit(74.760:89): avc: denied { module_request } for pid=3002 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.916264][ T31] audit: type=1400 audit(74.850:90): avc: denied { sys_module } for pid=3002 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.747583][ T31] audit: type=1400 audit(75.680:91): avc: denied { ioctl } for pid=3003 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.985278][ T3002] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.025055][ T3002] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.032291][ T3003] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.074746][ T3003] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.892415][ T3002] hsr_slave_0: entered promiscuous mode [ 77.894598][ T3002] hsr_slave_1: entered promiscuous mode [ 77.957628][ T3003] hsr_slave_0: entered promiscuous mode [ 77.966514][ T3003] hsr_slave_1: entered promiscuous mode [ 77.968488][ T3003] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 77.971365][ T3003] Cannot create hsr debugfs directory [ 78.340295][ T31] audit: type=1400 audit(78.270:92): avc: denied { create } for pid=3002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.342304][ T3002] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 78.350077][ T3002] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.360350][ T3002] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.371074][ T3002] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.444086][ T3003] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.448413][ T3003] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.458612][ T3003] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.466215][ T3003] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 79.083266][ T3003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.266071][ T3002] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.524097][ T3003] veth0_vlan: entered promiscuous mode [ 81.544457][ T3003] veth1_vlan: entered promiscuous mode [ 81.616635][ T3003] veth0_macvtap: entered promiscuous mode [ 81.633578][ T3003] veth1_macvtap: entered promiscuous mode [ 81.690260][ T3003] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.691101][ T3003] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.691681][ T3003] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.692204][ T3003] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.833784][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 81.833843][ T31] audit: type=1400 audit(81.770:95): avc: denied { mount } for pid=3003 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 81.838817][ T31] audit: type=1400 audit(81.770:96): avc: denied { mounton } for pid=3003 comm="syz-executor" path="/syzkaller.wgS8au/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 81.844603][ T3002] veth0_vlan: entered promiscuous mode [ 81.851001][ T31] audit: type=1400 audit(81.780:97): avc: denied { mount } for pid=3003 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 81.870340][ T3002] veth1_vlan: entered promiscuous mode [ 81.872690][ T31] audit: type=1400 audit(81.810:98): avc: denied { unmount } for pid=3003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 81.877142][ T31] audit: type=1400 audit(81.810:99): avc: denied { mounton } for pid=3003 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 81.886883][ T31] audit: type=1400 audit(81.820:100): avc: denied { mount } for pid=3003 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 81.960560][ T3002] veth0_macvtap: entered promiscuous mode [ 81.974976][ T3002] veth1_macvtap: entered promiscuous mode [ 82.044341][ T31] audit: type=1400 audit(81.950:101): avc: denied { read write } for pid=3003 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 82.045389][ T31] audit: type=1400 audit(81.970:102): avc: denied { open } for pid=3003 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 82.045982][ T31] audit: type=1400 audit(81.970:103): avc: denied { ioctl } for pid=3003 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 82.058509][ T3002] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.061681][ T3002] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.063627][ T3002] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.064025][ T3002] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.334868][ T31] audit: type=1400 audit(82.270:104): avc: denied { create } for pid=3684 comm="syz.1.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 88.820180][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 88.820272][ T31] audit: type=1400 audit(88.750:115): avc: denied { create } for pid=3732 comm="syz.1.22" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 88.840428][ T31] audit: type=1400 audit(88.770:116): avc: denied { map } for pid=3732 comm="syz.1.22" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2329 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 88.849654][ T31] audit: type=1400 audit(88.770:117): avc: denied { read write } for pid=3732 comm="syz.1.22" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2329 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 95.341458][ T3763] netlink: 4436 bytes leftover after parsing attributes in process `syz.1.33'. [ 95.951022][ T31] audit: type=1400 audit(95.890:118): avc: denied { create } for pid=3767 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 95.952486][ T3768] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 95.956406][ T31] audit: type=1400 audit(95.890:119): avc: denied { connect } for pid=3767 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.672086][ T31] audit: type=1400 audit(99.610:120): avc: denied { setopt } for pid=3767 comm="syz.1.35" laddr=::ffff:172.20.20.10 lport=33561 faddr=::ffff:172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.690039][ T3761] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 99.905903][ C0] hrtimer: interrupt took 1403104 ns [ 99.913671][ T3761] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 99.914562][ T3761] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 99.915036][ T3761] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 99.915772][ T3761] usb 1-1: New USB device found, idVendor=1770, idProduct=ff00, bcdDevice= 0.00 [ 99.916431][ T3761] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 99.922199][ T3761] usb 1-1: config 0 descriptor?? [ 100.449920][ T3761] gt683r_led 0003:1770:FF00.0001: item fetching failed at offset 1/5 [ 100.451177][ T3761] gt683r_led 0003:1770:FF00.0001: hid parsing failed [ 100.451659][ T3761] gt683r_led 0003:1770:FF00.0001: probe with driver gt683r_led failed with error -22 [ 100.666759][ T3761] usb 1-1: USB disconnect, device number 2 [ 101.062961][ T3791] syz.0.37[3791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 101.065866][ T3791] syz.0.37[3791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 102.180830][ T3795] syzkaller0: entered promiscuous mode [ 102.181768][ T3795] syzkaller0: entered allmulticast mode [ 104.123012][ T3811] netlink: 12 bytes leftover after parsing attributes in process `syz.0.42'. [ 104.172176][ T3811] netlink: 12 bytes leftover after parsing attributes in process `syz.0.42'. [ 105.779824][ T31] audit: type=1400 audit(105.690:121): avc: denied { write } for pid=3813 comm="syz.0.43" laddr=::1 lport=3 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 118.333344][ T31] audit: type=1400 audit(118.270:122): avc: denied { create } for pid=3818 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 118.343518][ T31] audit: type=1400 audit(118.280:123): avc: denied { write } for pid=3818 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 118.345314][ T31] audit: type=1400 audit(118.280:124): avc: denied { nlmsg_write } for pid=3818 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 118.348134][ T3823] netlink: 165 bytes leftover after parsing attributes in process `syz.1.44'. [ 119.972753][ T3756] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 120.202860][ T3756] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 120.205485][ T3756] usb 1-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 120.207700][ T3756] usb 1-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 120.208319][ T3756] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 120.268256][ T3756] usb 1-1: config 0 descriptor?? [ 127.114101][ T31] audit: type=1400 audit(127.050:125): avc: denied { create } for pid=3831 comm="syz.0.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 127.123250][ T31] audit: type=1400 audit(127.060:126): avc: denied { setopt } for pid=3831 comm="syz.0.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 132.005773][ T31] audit: type=1400 audit(131.940:127): avc: denied { name_bind } for pid=3843 comm="syz.1.51" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 132.006873][ T31] audit: type=1400 audit(131.940:128): avc: denied { node_bind } for pid=3843 comm="syz.1.51" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 134.606223][ T3793] usb 1-1: USB disconnect, device number 3 [ 135.705713][ T3861] netem: incorrect ge model size [ 135.706209][ T3861] netem: change failed [ 152.691526][ T3882] netlink: 12 bytes leftover after parsing attributes in process `syz.1.63'. [ 152.742359][ T3882] ip6gretap1: entered promiscuous mode [ 153.308758][ T31] audit: type=1400 audit(153.240:129): avc: denied { block_suspend } for pid=3877 comm="syz.0.62" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 161.946130][ T3897] syz.0.64[3897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.946461][ T3897] syz.0.64[3897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.375437][ T31] audit: type=1400 audit(164.310:130): avc: denied { unmount } for pid=3002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 165.450614][ T31] audit: type=1400 audit(165.390:131): avc: denied { ioctl } for pid=3914 comm="syz.0.71" path="socket:[3313]" dev="sockfs" ino=3313 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 165.476014][ T31] audit: type=1400 audit(165.410:132): avc: denied { create } for pid=3914 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 165.522470][ T31] audit: type=1400 audit(165.450:133): avc: denied { ioctl } for pid=3914 comm="syz.0.71" path="socket:[3314]" dev="sockfs" ino=3314 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 185.569897][ T31] audit: type=1400 audit(185.500:134): avc: denied { create } for pid=3955 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 186.316913][ T3964] capability: warning: `syz.0.88' uses deprecated v2 capabilities in a way that may be insecure [ 186.450092][ T31] audit: type=1400 audit(186.350:135): avc: denied { write } for pid=3962 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 190.660864][ T2796] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 190.900232][ T2796] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 255, changing to 11 [ 190.907392][ T2796] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 59391, setting to 1024 [ 190.920080][ T2796] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 190.920850][ T2796] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 190.921322][ T2796] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 190.964246][ T2796] usb 1-1: config 0 descriptor?? [ 190.974623][ T3989] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 191.527737][ T2796] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 191.532149][ T2796] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 191.539530][ T2796] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 191.540068][ T2796] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 191.540586][ T2796] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 191.540929][ T2796] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 191.541257][ T2796] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 191.544206][ T2796] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 191.549797][ T2796] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 191.550301][ T2796] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 191.550699][ T2796] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 191.553526][ T2796] plantronics 0003:047F:FFFF.0002: No inputs registered, leaving [ 191.582429][ T2796] plantronics 0003:047F:FFFF.0002: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 191.812426][ T87] usb 1-1: USB disconnect, device number 4 [ 192.988599][ T31] audit: type=1400 audit(192.900:136): avc: denied { ioctl } for pid=4016 comm="syz.0.101" path="socket:[3410]" dev="sockfs" ino=3410 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 193.709812][ T31] audit: type=1400 audit(193.640:137): avc: denied { map } for pid=4030 comm="syz.1.107" path="socket:[3433]" dev="sockfs" ino=3433 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 193.732397][ T31] audit: type=1400 audit(193.670:138): avc: denied { read write } for pid=4030 comm="syz.1.107" path="socket:[3433]" dev="sockfs" ino=3433 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 194.113046][ T4033] netlink: 44378 bytes leftover after parsing attributes in process `syz.1.108'. [ 195.469722][ T31] audit: type=1400 audit(195.400:139): avc: denied { map } for pid=4042 comm="syz.1.112" path="/dev/usbmon0" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 195.760923][ T31] audit: type=1400 audit(195.690:140): avc: denied { write } for pid=4044 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 198.286653][ T31] audit: type=1400 audit(198.220:141): avc: denied { ioctl } for pid=4061 comm="syz.1.120" path="socket:[2769]" dev="sockfs" ino=2769 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 201.930056][ T4087] netlink: 8 bytes leftover after parsing attributes in process `syz.1.128'. [ 202.656205][ T31] audit: type=1400 audit(202.590:142): avc: denied { create } for pid=4091 comm="syz.1.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 202.740205][ T31] audit: type=1400 audit(202.680:143): avc: denied { ioctl } for pid=4091 comm="syz.1.130" path="socket:[2794]" dev="sockfs" ino=2794 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 204.511757][ T4099] netlink: 104 bytes leftover after parsing attributes in process `syz.1.133'. [ 205.844395][ T31] audit: type=1400 audit(205.760:144): avc: denied { create } for pid=4108 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 206.068832][ T4109] Zero length message leads to an empty skb [ 206.473264][ T31] audit: type=1400 audit(206.410:145): avc: denied { execute } for pid=4115 comm="syz.1.138" name="file2" dev="tmpfs" ino=516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 206.473594][ T4116] process 'syz.1.138' launched './file2' with NULL argv: empty string added [ 206.479416][ T31] audit: type=1400 audit(206.410:146): avc: denied { execute_no_trans } for pid=4115 comm="syz.1.138" path="/96/file2" dev="tmpfs" ino=516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 207.164592][ T31] audit: type=1400 audit(207.100:147): avc: denied { write } for pid=4118 comm="syz.1.139" name="kcm" dev="proc" ino=4026532740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 207.224370][ T31] audit: type=1400 audit(207.150:148): avc: denied { write } for pid=4118 comm="syz.1.139" path="socket:[3572]" dev="sockfs" ino=3572 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 207.600395][ T4121] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 207.643494][ T4121] ipip0: entered promiscuous mode [ 208.831700][ T4131] netlink: 28 bytes leftover after parsing attributes in process `syz.1.143'. [ 208.832326][ T4131] netlink: 28 bytes leftover after parsing attributes in process `syz.1.143'. [ 209.423324][ T31] audit: type=1400 audit(209.360:149): avc: denied { ioctl } for pid=4134 comm="syz.1.145" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 210.750609][ T31] audit: type=1400 audit(210.690:150): avc: denied { create } for pid=4145 comm="syz.0.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 210.761867][ T31] audit: type=1400 audit(210.700:151): avc: denied { write } for pid=4145 comm="syz.0.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 210.763211][ T31] audit: type=1400 audit(210.700:152): avc: denied { nlmsg_read } for pid=4145 comm="syz.0.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 214.319922][ T4181] usb 2-1: new low-speed USB device number 2 using dummy_hcd [ 214.536612][ T4181] usb 2-1: config index 0 descriptor too short (expected 1307, got 27) [ 214.537200][ T4181] usb 2-1: config 0 has an invalid interface number: 0 but max is -1 [ 214.537547][ T4181] usb 2-1: config 0 has 1 interface, different from the descriptor's value: 0 [ 214.538017][ T4181] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x84 is Bulk; changing to Interrupt [ 214.570188][ T4181] usb 2-1: string descriptor 0 read error: -22 [ 214.570654][ T4181] usb 2-1: New USB device found, idVendor=0460, idProduct=0008, bcdDevice=c3.de [ 214.570965][ T4181] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 214.594811][ T4181] usb 2-1: config 0 descriptor?? [ 214.598069][ T4183] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 214.610752][ T4181] hub 2-1:0.0: bad descriptor, ignoring hub [ 214.611223][ T4181] hub 2-1:0.0: probe with driver hub failed with error -5 [ 214.614993][ T4181] input: USB Acecad 302 Tablet 0460:0008 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/input/input4 [ 215.371614][ T3713] usb 2-1: USB disconnect, device number 2 [ 224.150843][ T3761] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 224.372806][ T3761] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 224.396397][ T3761] usb 1-1: New USB device found, idVendor=1a0a, idProduct=0102, bcdDevice=7a.b1 [ 224.396899][ T3761] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 224.397161][ T3761] usb 1-1: Product: syz [ 224.397335][ T3761] usb 1-1: Manufacturer: syz [ 224.397518][ T3761] usb 1-1: SerialNumber: syz [ 224.406398][ T3761] usb 1-1: config 0 descriptor?? [ 224.448553][ T3761] usb_ehset_test 1-1:0.0: probe with driver usb_ehset_test failed with error -32 [ 224.646210][ T3761] usb 1-1: USB disconnect, device number 5 [ 250.541643][ T31] audit: type=1400 audit(250.470:153): avc: denied { create } for pid=4302 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 250.544493][ T31] audit: type=1400 audit(250.470:154): avc: denied { setopt } for pid=4302 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 250.562903][ T31] audit: type=1400 audit(250.470:155): avc: denied { bind } for pid=4302 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 250.564002][ T31] audit: type=1400 audit(250.470:156): avc: denied { name_bind } for pid=4302 comm="syz.1.184" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 250.564946][ T31] audit: type=1400 audit(250.470:157): avc: denied { node_bind } for pid=4302 comm="syz.1.184" saddr=::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 250.568693][ T31] audit: type=1400 audit(250.490:158): avc: denied { listen } for pid=4302 comm="syz.1.184" laddr=::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 251.088640][ T31] audit: type=1400 audit(251.010:159): avc: denied { getopt } for pid=4302 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 251.101701][ T31] audit: type=1400 audit(251.010:160): avc: denied { connect } for pid=4302 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 251.102495][ T31] audit: type=1400 audit(251.010:161): avc: denied { name_connect } for pid=4302 comm="syz.1.184" dest=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 256.280255][ T4328] wg2: entered promiscuous mode [ 256.280725][ T4328] wg2: entered allmulticast mode [ 257.689401][ T31] audit: type=1400 audit(257.620:162): avc: denied { write } for pid=4342 comm="syz.1.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 257.691373][ T31] audit: type=1400 audit(257.630:163): avc: denied { name_connect } for pid=4342 comm="syz.1.200" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 270.359358][ T31] audit: type=1400 audit(270.290:164): avc: denied { create } for pid=4373 comm="syz.0.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 270.360336][ T31] audit: type=1400 audit(270.300:165): avc: denied { bind } for pid=4373 comm="syz.0.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 270.864209][ T31] audit: type=1400 audit(270.800:166): avc: denied { setopt } for pid=4373 comm="syz.0.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 270.873517][ T31] audit: type=1400 audit(270.810:167): avc: denied { accept } for pid=4373 comm="syz.0.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 271.502958][ T4401] netlink: 104 bytes leftover after parsing attributes in process `syz.1.218'. [ 271.670333][ T31] audit: type=1400 audit(271.600:168): avc: denied { create } for pid=4406 comm="syz.1.220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 271.753214][ T4411] netlink: 56 bytes leftover after parsing attributes in process `syz.1.221'. [ 272.281704][ T4425] netlink: 8 bytes leftover after parsing attributes in process `syz.0.225'. [ 272.383557][ T31] audit: type=1400 audit(272.320:169): avc: denied { create } for pid=4426 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 272.543060][ T31] audit: type=1400 audit(272.480:170): avc: denied { accept } for pid=4426 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 272.568857][ T31] audit: type=1400 audit(272.500:171): avc: denied { setopt } for pid=4426 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 272.575822][ T31] audit: type=1400 audit(272.510:172): avc: denied { bind } for pid=4426 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 274.063903][ T4443] pim6reg1: entered promiscuous mode [ 274.070404][ T4443] pim6reg1: entered allmulticast mode [ 275.153618][ T31] audit: type=1400 audit(275.090:173): avc: denied { bind } for pid=4470 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 279.087056][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 279.087156][ T31] audit: type=1400 audit(279.020:175): avc: denied { create } for pid=4487 comm="syz.0.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 279.172569][ T31] audit: type=1400 audit(279.110:176): avc: denied { setopt } for pid=4487 comm="syz.0.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 279.387809][ T31] audit: type=1400 audit(279.320:177): avc: denied { bind } for pid=4487 comm="syz.0.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 279.390590][ T31] audit: type=1400 audit(279.320:178): avc: denied { node_bind } for pid=4487 comm="syz.0.248" saddr=10.1.1.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 279.391538][ T31] audit: type=1400 audit(279.330:179): avc: denied { setopt } for pid=4487 comm="syz.0.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 280.249972][ T4494] syz.1.250 uses obsolete (PF_INET,SOCK_PACKET) [ 281.789839][ T31] audit: type=1400 audit(281.720:180): avc: denied { shutdown } for pid=4505 comm="syz.1.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 290.089764][ T3705] usb 1-1: new full-speed USB device number 6 using dummy_hcd [ 290.298437][ T3705] usb 1-1: config 179 has an invalid interface number: 65 but max is 0 [ 290.299385][ T3705] usb 1-1: config 179 has no interface number 0 [ 290.299742][ T3705] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 10 [ 290.300151][ T3705] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1029, setting to 64 [ 290.300683][ T3705] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0x83 has invalid maxpacket 65535, setting to 64 [ 290.301144][ T3705] usb 1-1: config 179 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 290.301695][ T3705] usb 1-1: New USB device found, idVendor=12ab, idProduct=0004, bcdDevice= 0.00 [ 290.302052][ T3705] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 290.319899][ T4522] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 290.321075][ T4522] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 290.355873][ T3705] input: Honey Bee Xbox360 dancepad as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:179.65/input/input5 [ 290.591308][ C1] xpad 1-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 290.591965][ T3705] usb 1-1: USB disconnect, device number 6 [ 290.593958][ T3705] xpad 1-1:179.65: xpad_try_sending_next_out_packet - usb_submit_urb failed with result -19 [ 294.889568][ T3775] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 295.121384][ T3775] usb 2-1: New USB device found, idVendor=9710, idProduct=7730, bcdDevice=96.33 [ 295.121861][ T3775] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 295.131306][ T3775] usb 2-1: config 0 descriptor?? [ 296.832985][ T3775] usb 2-1: Cannot set autoneg [ 296.833916][ T3775] MOSCHIP usb-ethernet driver 2-1:0.0: probe with driver MOSCHIP usb-ethernet driver failed with error -71 [ 296.851681][ T3775] usb 2-1: USB disconnect, device number 3 [ 298.572025][ T31] audit: type=1400 audit(298.510:181): avc: denied { watch } for pid=4583 comm="syz.1.271" path="/169/control" dev="tmpfs" ino=905 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 298.941897][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 312.600416][ T4641] netlink: 12 bytes leftover after parsing attributes in process `syz.0.291'. [ 314.252934][ T31] audit: type=1400 audit(314.190:182): avc: denied { connect } for pid=4646 comm="syz.0.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 326.251450][ T31] audit: type=1400 audit(326.190:183): avc: denied { getopt } for pid=4660 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 328.580496][ T31] audit: type=1400 audit(328.510:184): avc: denied { create } for pid=4671 comm="syz.1.304" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 328.626126][ T31] audit: type=1400 audit(328.560:185): avc: denied { unlink } for pid=3003 comm="syz-executor" name="file0" dev="tmpfs" ino=937 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 329.172933][ T31] audit: type=1400 audit(329.110:186): avc: denied { name_bind } for pid=4677 comm="syz.1.307" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 333.073350][ T31] audit: type=1400 audit(333.010:187): avc: denied { read } for pid=4664 comm="syz.0.302" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 333.074484][ T31] audit: type=1400 audit(333.010:188): avc: denied { open } for pid=4664 comm="syz.0.302" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 343.092968][ T31] audit: type=1400 audit(343.030:189): avc: denied { mounton } for pid=4715 comm="syz.0.321" path="/137/file0" dev="tmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 369.675021][ T4852] netlink: 52 bytes leftover after parsing attributes in process `syz.0.367'. [ 370.634014][ T31] audit: type=1400 audit(370.570:190): avc: denied { create } for pid=4857 comm="syz.1.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 384.060270][ T10] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 384.322580][ T10] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 384.327774][ T10] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 255, changing to 11 [ 384.360319][ T10] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 384.366080][ T10] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 384.382535][ T10] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 384.383203][ T10] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 384.415828][ T10] usb 2-1: config 0 descriptor?? [ 384.422281][ T4951] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 384.635337][ T10] usbhid 2-1:0.0: can't add hid device: -71 [ 384.636102][ T10] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 384.642625][ T10] usb 2-1: USB disconnect, device number 4 [ 390.203975][ T5019] Illegal XDP return value 2227723868 on prog (id 131) dev N/A, expect packet loss! [ 410.504820][ T31] audit: type=1400 audit(410.440:191): avc: denied { ioctl } for pid=5121 comm="syz.1.481" path="socket:[6263]" dev="sockfs" ino=6263 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 419.510849][ T31] audit: type=1400 audit(419.420:192): avc: denied { bind } for pid=5192 comm="syz.0.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 419.840549][ T31] audit: type=1400 audit(419.780:193): avc: denied { name_bind } for pid=5194 comm="syz.0.510" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 421.501852][ T31] audit: type=1400 audit(421.430:194): avc: denied { ioctl } for pid=5198 comm="syz.0.511" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=6383 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 421.554133][ T5199] ------------[ cut here ]------------ [ 421.554719][ T5199] WARNING: CPU: 1 PID: 5199 at mm/highmem.c:611 kunmap_local_indexed+0x210/0x228 [ 421.555772][ T5199] Modules linked in: [ 421.556426][ T5199] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 421.557191][ T5199] CPU: 1 PID: 5199 Comm: syz.0.511 Not tainted 6.10.0-syzkaller #0 [ 421.557615][ T5199] Hardware name: ARM-Versatile Express [ 421.558127][ T5199] Call trace: [ 421.558568][ T5199] [<818e7f40>] (dump_backtrace) from [<818e803c>] (show_stack+0x18/0x1c) [ 421.559518][ T5199] r7:00000000 r6:82622804 r5:00000000 r4:81fe6c3c [ 421.560154][ T5199] [<818e8024>] (show_stack) from [<8190568c>] (dump_stack_lvl+0x54/0x7c) [ 421.560540][ T5199] [<81905638>] (dump_stack_lvl) from [<819056cc>] (dump_stack+0x18/0x1c) [ 421.560879][ T5199] r5:00000000 r4:82861d0c [ 421.561065][ T5199] [<819056b4>] (dump_stack) from [<818e8ae4>] (panic+0x120/0x358) [ 421.561425][ T5199] [<818e89c4>] (panic) from [<80241f54>] (print_tainted+0x0/0xa0) [ 421.561949][ T5199] r3:8260c5c4 r2:00000001 r1:81fcfd64 r0:81fd73ec [ 421.562270][ T5199] r7:80480f40 [ 421.562629][ T5199] [<80241ee0>] (check_panic_on_warn) from [<80242148>] (__warn+0x7c/0x180) [ 421.563659][ T5199] [<802420cc>] (__warn) from [<802423c4>] (warn_slowpath_fmt+0x178/0x1f4) [ 421.564065][ T5199] r8:00000009 r7:81ffe3b0 r6:dfec9d14 r5:855c1800 r4:00000000 [ 421.564381][ T5199] [<80242250>] (warn_slowpath_fmt) from [<80480f40>] (kunmap_local_indexed+0x210/0x228) [ 421.566006][ T5199] r10:ffedcfe8 r9:84112400 r8:20000000 r7:fffffff0 r6:00000003 r5:855c1800 [ 421.566940][ T5199] r4:ffedc000 [ 421.567142][ T5199] [<80480d30>] (kunmap_local_indexed) from [<804f2e04>] (move_pages+0x7e8/0x149c) [ 421.567547][ T5199] r7:fffffff0 r6:eabf175f r5:decfbde4 r4:ffeda000 [ 421.567797][ T5199] [<804f261c>] (move_pages) from [<8056cbd4>] (userfaultfd_ioctl+0x125c/0x2310) [ 421.568204][ T5199] r10:21000000 r9:dfec9e98 r8:20000040 r7:84112400 r6:00000001 r5:00000000 [ 421.568533][ T5199] r4:851db000 [ 421.568715][ T5199] [<8056b978>] (userfaultfd_ioctl) from [<8051ad88>] (sys_ioctl+0x134/0xda4) [ 421.569359][ T5199] r10:855c1800 r9:00000004 r8:84538780 r7:20000040 r6:84538781 r5:00000000 [ 421.569727][ T5199] r4:c028aa05 [ 421.569911][ T5199] [<8051ac54>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 421.570392][ T5199] Exception stack(0xdfec9fa8 to 0xdfec9ff0) [ 421.571092][ T5199] 9fa0: 00000000 00000000 00000004 c028aa05 20000040 00000000 [ 421.571677][ T5199] 9fc0: 00000000 00000000 002662e0 00000036 7e811766 7e811767 003d0f00 76b1f0bc [ 421.572069][ T5199] 9fe0: 76b1eec8 76b1eeb8 00018444 001306b0 [ 421.572525][ T5199] r10:00000036 r9:855c1800 r8:8020029c r7:00000036 r6:002662e0 r5:00000000 [ 421.572859][ T5199] r4:00000000 [ 421.575032][ T5199] Rebooting in 86400 seconds.. VM DIAGNOSIS: 00:02:02 Registers: info registers vcpu 0 CPU#0 R00=855c6000 R01=82e33000 R02=00000000 R03=00000000 R04=82e33000 R05=dddd0340 R06=855c6000 R07=855c6778 R08=dfc31cc8 R09=82f99588 R10=00000002 R11=dfc31c3c R12=273df149 R13=dfc31bd0 R14=81909d04 R15=802a99c4 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=00000000 R02=00000000 R03=00000061 R04=82773620 R05=00000000 R06=00000001 R07=dfec9aac R08=82864138 R09=dfec9aab R10=60000093 R11=dfec9a98 R12=00000020 R13=dfec9a2c R14=39313554 R15=802bcf74 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000