last executing test programs: 11.81940238s ago: executing program 0 (id=383): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x302, 0x1091, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x48) 11.750632493s ago: executing program 0 (id=384): socket(0x40000000015, 0x5, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000200)={@private0, 0x800, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local}, &(0x7f00000004c0)=0x37) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 8.938837583s ago: executing program 1 (id=388): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) ioprio_set$uid(0x3, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000140), 0x92800, 0x0) r1 = dup(r0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x800) sendfile(r3, r1, 0x0, 0x8a000) 8.821813166s ago: executing program 1 (id=389): socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006112001c0000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x34) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73, 0x2}, 0x70) 8.716876586s ago: executing program 1 (id=390): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1f, 0x0, 0x0, 0x8000}, 0x48) r0 = syz_io_uring_setup(0x3665, &(0x7f00000003c0)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000440)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r0, 0xa3d, 0x0, 0x0, 0x0, 0xff39) 8.577656532s ago: executing program 1 (id=391): socket(0x10, 0x3, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000400)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f0000003700)={0x0, 0xf, &(0x7f0000000080)={&(0x7f00000000c0)={0x4c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x888e}, @NL80211_ATTR_FRAME={0x1c, 0x33, @data_frame={@msdu=@type10={{}, {}, @from_mac, @device_b, @broadcast}, @a_msdu}}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x4c}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 8.101646214s ago: executing program 1 (id=392): socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) userfaultfd(0x1) r2 = io_uring_setup(0x3eae, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) 3.221889801s ago: executing program 0 (id=393): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1f, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xf, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 3.118655701s ago: executing program 0 (id=394): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1f, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xf, &(0x7f0000000280)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r2 = syz_io_uring_setup(0x3665, &(0x7f00000003c0)={0x0, 0x0, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000440)=0x0) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f00000003c0)={0x4c, 0x0, &(0x7f0000000800)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_THREAD_EXIT(r5, 0x40046208, 0x0) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r2, 0xa3d, 0x0, 0x0, 0x0, 0xff39) dup(r1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r6 = getpid() sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) r9 = socket(0x840000000002, 0x3, 0x100) connect$inet(r9, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(r9, &(0x7f0000005240), 0x264e33, 0xff88) 919.500933ms ago: executing program 1 (id=395): socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r3 = userfaultfd(0x1) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f00000000c0)) r4 = io_uring_setup(0x3eae, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_COPY(r3, 0xc028aa05, &(0x7f0000000080)={&(0x7f0000c15000/0x1000)=nil, &(0x7f0000508000/0x4000)=nil, 0x1000}) 80.919485ms ago: executing program 0 (id=396): r0 = syz_open_dev$I2C(&(0x7f0000000040), 0x0, 0x0) ioctl$I2C_SLAVE_FORCE(r0, 0x706, 0x230) 0s ago: executing program 0 (id=397): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) sendto$inet(r0, &(0x7f0000000700)="0c268a927f1f6588b967481241ba78600a34f65ac618ded8974895abeaf4b4834ff959bcecc7a95425a3a07e758044ab4ea6f7c555d88fecf90b037511bf746bec66ba", 0x994b6e03113064ae, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f00000000c0)=0x8, 0x4) kernel console output (not intermixed with test programs): [ 52.295866][ T31] audit: type=1400 audit(52.240:68): avc: denied { read write } for pid=3102 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.296994][ T31] audit: type=1400 audit(52.240:69): avc: denied { open } for pid=3102 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:57331' (ED25519) to the list of known hosts. [ 61.443314][ T31] audit: type=1400 audit(61.370:70): avc: denied { name_bind } for pid=3103 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 63.033795][ T31] audit: type=1400 audit(62.970:71): avc: denied { execute } for pid=3105 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.046162][ T31] audit: type=1400 audit(62.990:72): avc: denied { execute_no_trans } for pid=3105 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.809995][ T31] audit: type=1400 audit(67.750:73): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.817302][ T31] audit: type=1400 audit(67.750:74): avc: denied { mount } for pid=3105 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.828162][ T3105] cgroup: Unknown subsys name 'net' [ 67.836466][ T31] audit: type=1400 audit(67.780:75): avc: denied { unmount } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.071241][ T3105] cgroup: Unknown subsys name 'hugetlb' [ 68.071901][ T3105] cgroup: Unknown subsys name 'rlimit' [ 68.353326][ T31] audit: type=1400 audit(68.290:76): avc: denied { setattr } for pid=3105 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.354662][ T31] audit: type=1400 audit(68.300:77): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.355557][ T31] audit: type=1400 audit(68.300:78): avc: denied { mount } for pid=3105 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.526203][ T3107] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.527971][ T31] audit: type=1400 audit(68.470:79): avc: denied { relabelto } for pid=3107 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.530365][ T31] audit: type=1400 audit(68.470:80): avc: denied { write } for pid=3107 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.550623][ T31] audit: type=1400 audit(68.490:81): avc: denied { read } for pid=3105 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.551744][ T31] audit: type=1400 audit(68.490:82): avc: denied { open } for pid=3105 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.956426][ T3105] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 77.973352][ T31] audit: type=1400 audit(77.910:83): avc: denied { execmem } for pid=3108 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.046593][ T31] audit: type=1400 audit(77.990:84): avc: denied { mounton } for pid=3110 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 78.048397][ T31] audit: type=1400 audit(77.990:85): avc: denied { mount } for pid=3110 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 78.053384][ T31] audit: type=1400 audit(77.990:86): avc: denied { read } for pid=3110 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.057140][ T31] audit: type=1400 audit(78.000:87): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 78.059454][ T31] audit: type=1400 audit(78.000:88): avc: denied { open } for pid=3110 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.073370][ T31] audit: type=1400 audit(78.010:89): avc: denied { mounton } for pid=3110 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.096338][ T31] audit: type=1400 audit(78.040:90): avc: denied { module_request } for pid=3111 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.177962][ T31] audit: type=1400 audit(78.120:91): avc: denied { sys_module } for pid=3110 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.988816][ T31] audit: type=1400 audit(78.930:92): avc: denied { ioctl } for pid=3111 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 80.252060][ T3110] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.270387][ T3110] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.435455][ T3111] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.440071][ T3111] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.408332][ T3111] hsr_slave_0: entered promiscuous mode [ 81.411980][ T3111] hsr_slave_1: entered promiscuous mode [ 81.546026][ T3110] hsr_slave_0: entered promiscuous mode [ 81.550622][ T3110] hsr_slave_1: entered promiscuous mode [ 81.553261][ T3110] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 81.555187][ T3110] Cannot create hsr debugfs directory [ 81.938912][ T3111] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.959647][ T3111] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.983909][ T3111] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.001015][ T3111] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.088703][ T3110] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.099450][ T3110] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.112059][ T3110] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.120487][ T3110] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.770799][ T3110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.816708][ T3111] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.917335][ T3111] veth0_vlan: entered promiscuous mode [ 85.941848][ T3111] veth1_vlan: entered promiscuous mode [ 86.030309][ T3111] veth0_macvtap: entered promiscuous mode [ 86.042414][ T3111] veth1_macvtap: entered promiscuous mode [ 86.124463][ T3111] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.125437][ T3111] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.125823][ T3111] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.126194][ T3111] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.252540][ T3110] veth0_vlan: entered promiscuous mode [ 86.259433][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 86.259529][ T31] audit: type=1400 audit(86.200:96): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.277210][ T31] audit: type=1400 audit(86.220:97): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/syzkaller.qRCvln/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.293582][ T31] audit: type=1400 audit(86.220:98): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.305165][ T3110] veth1_vlan: entered promiscuous mode [ 86.311378][ T31] audit: type=1400 audit(86.250:99): avc: denied { unmount } for pid=3111 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.323642][ T31] audit: type=1400 audit(86.260:100): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.324869][ T31] audit: type=1400 audit(86.260:101): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 86.399186][ T3110] veth0_macvtap: entered promiscuous mode [ 86.409359][ T3110] veth1_macvtap: entered promiscuous mode [ 86.477716][ T3110] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.478375][ T3110] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.478710][ T3110] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.479059][ T3110] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.533424][ T31] audit: type=1400 audit(86.470:102): avc: denied { read write } for pid=3111 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 86.545606][ T31] audit: type=1400 audit(86.480:103): avc: denied { open } for pid=3111 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 86.546587][ T31] audit: type=1400 audit(86.480:104): avc: denied { ioctl } for pid=3111 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 86.878039][ T31] audit: type=1400 audit(86.820:105): avc: denied { listen } for pid=3792 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 94.061541][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 94.061667][ T31] audit: type=1400 audit(94.000:132): avc: denied { read } for pid=3827 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 99.348254][ T31] audit: type=1400 audit(99.290:133): avc: denied { ioctl } for pid=3872 comm="syz.0.28" path="socket:[2619]" dev="sockfs" ino=2619 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 99.356398][ T3873] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 99.363897][ T31] audit: type=1400 audit(99.310:134): avc: denied { create } for pid=3872 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 99.367383][ T31] audit: type=1400 audit(99.310:135): avc: denied { setopt } for pid=3872 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 99.379208][ T31] audit: type=1400 audit(99.320:136): avc: denied { getopt } for pid=3872 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.750455][ T31] audit: type=1400 audit(99.690:137): avc: denied { read } for pid=3872 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 110.550830][ T3938] FAULT_INJECTION: forcing a failure. [ 110.550830][ T3938] name failslab, interval 1, probability 0, space 0, times 1 [ 110.552748][ T3938] CPU: 0 UID: 0 PID: 3938 Comm: syz.1.48 Not tainted 6.11.0-rc6-syzkaller #0 [ 110.553679][ T3938] Hardware name: ARM-Versatile Express [ 110.554240][ T3938] Call trace: [ 110.555590][ T3938] [<8195d098>] (dump_backtrace) from [<8195d194>] (show_stack+0x18/0x1c) [ 110.557294][ T3938] r7:00000c40 r6:84a4d370 r5:60000013 r4:8200ca04 [ 110.557686][ T3938] [<8195d17c>] (show_stack) from [<8197aed0>] (dump_stack_lvl+0x70/0x7c) [ 110.558115][ T3938] [<8197ae60>] (dump_stack_lvl) from [<8197aef4>] (dump_stack+0x18/0x1c) [ 110.558512][ T3938] r5:00000000 r4:8271619c [ 110.558763][ T3938] [<8197aedc>] (dump_stack) from [<808be620>] (should_fail_ex+0x18c/0x1dc) [ 110.559227][ T3938] [<808be494>] (should_fail_ex) from [<804dafe0>] (should_failslab+0x6c/0x94) [ 110.559649][ T3938] r6:84a4d370 r5:00001000 r4:82c016c0 [ 110.559950][ T3938] [<804daf74>] (should_failslab) from [<804c0d80>] (__kmalloc_noprof+0x9c/0x458) [ 110.560363][ T3938] [<804c0ce4>] (__kmalloc_noprof) from [<80728af0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 110.560883][ T3938] r10:84ed5400 r9:83ef2c00 r8:00000000 r7:84527550 r6:84a4d370 r5:00001000 [ 110.561281][ T3938] r4:00000000 [ 110.561490][ T3938] [<80728ab4>] (tomoyo_realpath_from_path) from [<80724c34>] (tomoyo_path_number_perm+0xcc/0x22c) [ 110.562227][ T3938] r10:84ed5400 r9:00000000 r8:84a4d300 r7:00008915 r6:00000004 r5:81ad0e68 [ 110.562648][ T3938] r4:84a4d370 r3:824b7380 [ 110.563043][ T3938] [<80724b68>] (tomoyo_path_number_perm) from [<80729500>] (tomoyo_file_ioctl+0x1c/0x20) [ 110.564112][ T3938] r9:00000005 r8:84a4d300 r7:84a4d300 r6:00008915 r5:00000000 r4:822071e4 [ 110.564526][ T3938] [<807294e4>] (tomoyo_file_ioctl) from [<806ec4b8>] (security_file_ioctl+0x40/0x5c) [ 110.564983][ T3938] [<806ec478>] (security_file_ioctl) from [<80520c78>] (sys_ioctl+0x50/0xda4) [ 110.565477][ T3938] r7:00000000 r6:84a4d301 r5:00000000 r4:00008915 [ 110.565754][ T3938] [<80520c28>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 110.566251][ T3938] Exception stack(0xe0445fa8 to 0xe0445ff0) [ 110.566724][ T3938] 5fa0: 00000000 00000000 00000005 00008915 00000000 00000000 [ 110.567303][ T3938] 5fc0: 00000000 00000000 00130d80 00000036 00000000 00006364 003d0f00 76b6d0bc [ 110.567711][ T3938] 5fe0: 76b6cec0 76b6ceb0 000189f0 00132dd0 [ 110.568092][ T3938] r10:00000036 r9:84ed5400 r8:8020029c r7:00000036 r6:00130d80 r5:00000000 [ 110.568475][ T3938] r4:00000000 [ 110.617693][ T3938] ERROR: Out of memory at tomoyo_realpath_from_path. [ 113.966447][ T31] audit: type=1400 audit(113.910:138): avc: denied { create } for pid=3963 comm="syz.0.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 114.096784][ T31] audit: type=1400 audit(114.040:139): avc: denied { setopt } for pid=3968 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 116.321341][ T31] audit: type=1400 audit(116.260:140): avc: denied { write } for pid=3980 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 116.331357][ T31] audit: type=1400 audit(116.270:141): avc: denied { create } for pid=3980 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 116.336548][ T31] audit: type=1400 audit(116.280:142): avc: denied { write } for pid=3980 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 116.457225][ T31] audit: type=1400 audit(116.400:143): avc: denied { write } for pid=3980 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 116.746420][ T31] audit: type=1400 audit(116.680:144): avc: denied { create } for pid=3989 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 121.892548][ T4024] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 122.495726][ T4027] FAULT_INJECTION: forcing a failure. [ 122.495726][ T4027] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 122.496400][ T4027] CPU: 1 UID: 0 PID: 4027 Comm: syz.0.79 Not tainted 6.11.0-rc6-syzkaller #0 [ 122.496760][ T4027] Hardware name: ARM-Versatile Express [ 122.497002][ T4027] Call trace: [ 122.497233][ T4027] [<8195d098>] (dump_backtrace) from [<8195d194>] (show_stack+0x18/0x1c) [ 122.497639][ T4027] r7:200004c0 r6:eab59e30 r5:60000013 r4:8200ca04 [ 122.497907][ T4027] [<8195d17c>] (show_stack) from [<8197aed0>] (dump_stack_lvl+0x70/0x7c) [ 122.498295][ T4027] [<8197ae60>] (dump_stack_lvl) from [<8197aef4>] (dump_stack+0x18/0x1c) [ 122.498680][ T4027] r5:00000000 r4:8274a3d4 [ 122.498910][ T4027] [<8197aedc>] (dump_stack) from [<808be620>] (should_fail_ex+0x18c/0x1dc) [ 122.499335][ T4027] [<808be494>] (should_fail_ex) from [<808be684>] (should_fail+0x14/0x18) [ 122.499709][ T4027] r6:eab59e30 r5:00000000 r4:eab59f38 [ 122.499964][ T4027] [<808be670>] (should_fail) from [<808be6a4>] (should_fail_usercopy+0x1c/0x20) [ 122.500415][ T4027] [<808be688>] (should_fail_usercopy) from [<81452d04>] (copy_msghdr_from_user+0x50/0x130) [ 122.500836][ T4027] [<81452cb4>] (copy_msghdr_from_user) from [<81452e5c>] (___sys_sendmsg+0x78/0xd0) [ 122.501266][ T4027] r8:0004000d r7:00000000 r6:8322d180 r5:eab59f38 r4:eab59e74 [ 122.501589][ T4027] [<81452de4>] (___sys_sendmsg) from [<81453398>] (sys_sendmsg+0x78/0xbc) [ 122.501987][ T4027] r10:00000128 r9:84b26000 r8:8020029c r7:0004000d r6:200004c0 r5:8322d180 [ 122.502351][ T4027] r4:00000000 [ 122.502544][ T4027] [<81453320>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 122.503422][ T4027] Exception stack(0xeab59fa8 to 0xeab59ff0) [ 122.504009][ T4027] 9fa0: 00000000 00000000 00000003 200004c0 0004000d 00000000 [ 122.504401][ T4027] 9fc0: 00000000 00000000 00130d80 00000128 00000000 00006364 003d0f00 76b030bc [ 122.504745][ T4027] 9fe0: 76b02ec0 76b02eb0 000189f0 00132dd0 [ 122.505044][ T4027] r7:00000128 r6:00130d80 r5:00000000 r4:00000000 [ 123.079331][ T4029] FAULT_INJECTION: forcing a failure. [ 123.079331][ T4029] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 123.079721][ T4029] CPU: 1 UID: 0 PID: 4029 Comm: syz.0.80 Not tainted 6.11.0-rc6-syzkaller #0 [ 123.079920][ T4029] Hardware name: ARM-Versatile Express [ 123.080125][ T4029] Call trace: [ 123.080332][ T4029] [<8195d098>] (dump_backtrace) from [<8195d194>] (show_stack+0x18/0x1c) [ 123.080749][ T4029] r7:76b22e1c r6:0000000c r5:60000013 r4:8200ca04 [ 123.081027][ T4029] [<8195d17c>] (show_stack) from [<8197aed0>] (dump_stack_lvl+0x70/0x7c) [ 123.081396][ T4029] [<8197ae60>] (dump_stack_lvl) from [<8197aef4>] (dump_stack+0x18/0x1c) [ 123.081762][ T4029] r5:00000000 r4:8274a3d4 [ 123.081992][ T4029] [<8197aedc>] (dump_stack) from [<808be620>] (should_fail_ex+0x18c/0x1dc) [ 123.082361][ T4029] [<808be494>] (should_fail_ex) from [<808be684>] (should_fail+0x14/0x18) [ 123.083082][ T4029] r6:0000000c r5:eab55ee4 r4:0000000c [ 123.083654][ T4029] [<808be670>] (should_fail) from [<808be6a4>] (should_fail_usercopy+0x1c/0x20) [ 123.084037][ T4029] [<808be688>] (should_fail_usercopy) from [<81450f70>] (move_addr_to_kernel+0x3c/0xe4) [ 123.084427][ T4029] [<81450f34>] (move_addr_to_kernel) from [<81452524>] (__sys_sendto+0xc0/0x14c) [ 123.084914][ T4029] r9:84ed3c00 r8:00000004 r7:8326b900 r6:76b22e1c r5:00000000 r4:00000000 [ 123.085271][ T4029] [<81452464>] (__sys_sendto) from [<814525cc>] (sys_sendto+0x1c/0x24) [ 123.085670][ T4029] r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76b22e1c [ 123.086005][ T4029] [<814525b0>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 123.086400][ T4029] Exception stack(0xeab55fa8 to 0xeab55ff0) [ 123.086691][ T4029] 5fa0: 76b22e1c 0000000c 00000004 76b22eb0 00000020 00000000 [ 123.087121][ T4029] 5fc0: 76b22e1c 0000000c 00000000 00000122 00000004 00000000 76b22eb0 76b240bc [ 123.087490][ T4029] 5fe0: 00000000 76b22df0 000d8318 00135268 [ 123.561784][ T31] audit: type=1400 audit(123.500:145): avc: denied { prog_run } for pid=4034 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 123.591557][ T31] audit: type=1400 audit(123.530:146): avc: denied { write } for pid=4034 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 124.135707][ T31] audit: type=1400 audit(124.070:147): avc: denied { ioctl } for pid=4036 comm="syz.1.84" path="socket:[2951]" dev="sockfs" ino=2951 ioctlcmd=0x9435 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 124.986009][ T31] audit: type=1400 audit(124.920:148): avc: denied { create } for pid=4039 comm="syz.1.85" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 124.987684][ T31] audit: type=1400 audit(124.920:149): avc: denied { map } for pid=4039 comm="syz.1.85" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2956 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 125.003909][ T31] audit: type=1400 audit(124.920:150): avc: denied { read write } for pid=4039 comm="syz.1.85" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2956 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 125.670315][ T31] audit: type=1400 audit(125.610:151): avc: denied { ioctl } for pid=4042 comm="syz.0.87" path="socket:[2966]" dev="sockfs" ino=2966 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 126.250908][ T4050] Zero length message leads to an empty skb [ 127.219917][ T31] audit: type=1400 audit(127.160:152): avc: denied { name_bind } for pid=4051 comm="syz.0.89" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 127.239023][ T31] audit: type=1400 audit(127.160:153): avc: denied { node_bind } for pid=4051 comm="syz.0.89" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 127.280331][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 127.546147][ T4059] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1792 sclass=netlink_route_socket pid=4059 comm=syz.1.90 [ 127.567201][ T31] audit: type=1400 audit(127.510:154): avc: denied { setattr } for pid=4058 comm="syz.1.90" name="PACKET" dev="sockfs" ino=3323 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 130.172465][ T31] audit: type=1400 audit(130.110:155): avc: denied { mounton } for pid=4067 comm="syz.1.92" path="/45/file0" dev="tmpfs" ino=259 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 130.840744][ T4073] syz.1.93 uses obsolete (PF_INET,SOCK_PACKET) [ 138.296526][ T31] audit: type=1400 audit(138.240:156): avc: denied { watch } for pid=4092 comm="syz.1.100" path="/53" dev="tmpfs" ino=297 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 138.517418][ T31] audit: type=1400 audit(138.460:157): avc: denied { getopt } for pid=4096 comm="syz.1.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 138.663227][ T31] audit: type=1400 audit(138.600:158): avc: denied { create } for pid=4102 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 138.768049][ T31] audit: type=1400 audit(138.710:159): avc: denied { setopt } for pid=4102 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 139.131836][ T4111] FAULT_INJECTION: forcing a failure. [ 139.131836][ T4111] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 139.132456][ T4111] CPU: 1 UID: 0 PID: 4111 Comm: syz.0.106 Not tainted 6.11.0-rc6-syzkaller #0 [ 139.132874][ T4111] Hardware name: ARM-Versatile Express [ 139.133130][ T4111] Call trace: [ 139.133353][ T4111] [<8195d098>] (dump_backtrace) from [<8195d194>] (show_stack+0x18/0x1c) [ 139.133735][ T4111] r7:00000000 r6:00000000 r5:60000013 r4:8200ca04 [ 139.134158][ T4111] [<8195d17c>] (show_stack) from [<8197aed0>] (dump_stack_lvl+0x70/0x7c) [ 139.134505][ T4111] [<8197ae60>] (dump_stack_lvl) from [<8197aef4>] (dump_stack+0x18/0x1c) [ 139.134868][ T4111] r5:00000000 r4:8274a3d4 [ 139.135118][ T4111] [<8197aedc>] (dump_stack) from [<808be620>] (should_fail_ex+0x18c/0x1dc) [ 139.135476][ T4111] [<808be494>] (should_fail_ex) from [<808be684>] (should_fail+0x14/0x18) [ 139.137202][ T4111] r6:00000000 r5:eac19f68 r4:00000002 [ 139.137599][ T4111] [<808be670>] (should_fail) from [<808be6a4>] (should_fail_usercopy+0x1c/0x20) [ 139.137977][ T4111] [<808be688>] (should_fail_usercopy) from [<8053f57c>] (simple_read_from_buffer+0x8c/0x134) [ 139.138378][ T4111] [<8053f4f0>] (simple_read_from_buffer) from [<805b436c>] (proc_fail_nth_read+0xb8/0x100) [ 139.138784][ T4111] r10:00000001 r9:805b42b4 r8:00000002 r7:eac19f68 r6:0000000f r5:76b23f30 [ 139.139094][ T4111] r4:84ed0000 r3:eac19e9f [ 139.139272][ T4111] [<805b42b4>] (proc_fail_nth_read) from [<805074a4>] (vfs_read+0x98/0x324) [ 139.139594][ T4111] r8:76b23f30 r7:eac19f68 r6:84ed0000 r5:0000000f r4:83853cc0 [ 139.139898][ T4111] [<8050740c>] (vfs_read) from [<80508154>] (ksys_read+0x78/0xf8) [ 139.141360][ T4111] r10:00000003 r9:84ed0000 r8:8020029c r7:00000000 r6:00000000 r5:83853cc0 [ 139.142035][ T4111] r4:83853cc3 [ 139.142625][ T4111] [<805080dc>] (ksys_read) from [<805081e4>] (sys_read+0x10/0x14) [ 139.143287][ T4111] r7:00000003 r6:00000005 r5:76b23f30 r4:0000000f [ 139.143648][ T4111] [<805081d4>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 139.144342][ T4111] Exception stack(0xeac19fa8 to 0xeac19ff0) [ 139.144618][ T4111] 9fa0: 0000000f 76b23f30 00000005 76b23f30 0000000f 00000000 [ 139.145033][ T4111] 9fc0: 0000000f 76b23f30 00000005 00000003 00000000 00006364 003d0f00 76b240bc [ 139.145358][ T4111] 9fe0: 00000158 76b23ed0 000d8318 00130ca4 [ 139.287488][ T31] audit: type=1400 audit(139.230:160): avc: denied { setattr } for pid=4113 comm="syz.0.107" name="NETLINK" dev="sockfs" ino=3381 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 139.652510][ T31] audit: type=1400 audit(139.590:161): avc: denied { setopt } for pid=4115 comm="syz.0.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 139.989068][ T4122] FAULT_INJECTION: forcing a failure. [ 139.989068][ T4122] name failslab, interval 1, probability 0, space 0, times 0 [ 139.990069][ T4122] CPU: 0 UID: 0 PID: 4122 Comm: syz.1.110 Not tainted 6.11.0-rc6-syzkaller #0 [ 139.990419][ T4122] Hardware name: ARM-Versatile Express [ 139.990672][ T4122] Call trace: [ 139.990911][ T4122] [<8195d098>] (dump_backtrace) from [<8195d194>] (show_stack+0x18/0x1c) [ 139.991428][ T4122] r7:00000c40 r6:83499c70 r5:60000013 r4:8200ca04 [ 139.991697][ T4122] [<8195d17c>] (show_stack) from [<8197aed0>] (dump_stack_lvl+0x70/0x7c) [ 139.992066][ T4122] [<8197ae60>] (dump_stack_lvl) from [<8197aef4>] (dump_stack+0x18/0x1c) [ 139.992467][ T4122] r5:00000000 r4:8271619c [ 139.993137][ T4122] [<8197aedc>] (dump_stack) from [<808be620>] (should_fail_ex+0x18c/0x1dc) [ 139.994002][ T4122] [<808be494>] (should_fail_ex) from [<804dafe0>] (should_failslab+0x6c/0x94) [ 139.994433][ T4122] r6:83499c70 r5:00001000 r4:82c016c0 [ 139.994694][ T4122] [<804daf74>] (should_failslab) from [<804c0d80>] (__kmalloc_noprof+0x9c/0x458) [ 139.995165][ T4122] [<804c0ce4>] (__kmalloc_noprof) from [<80728af0>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 139.995649][ T4122] r10:84b25400 r9:82c99800 r8:00000000 r7:845272a8 r6:83499c70 r5:00001000 [ 139.996026][ T4122] r4:00000000 [ 139.996249][ T4122] [<80728ab4>] (tomoyo_realpath_from_path) from [<80724c34>] (tomoyo_path_number_perm+0xcc/0x22c) [ 139.996749][ T4122] r10:84b25400 r9:00000000 r8:83499c00 r7:00008933 r6:00000004 r5:81ad0e68 [ 139.997161][ T4122] r4:83499c70 r3:824b7380 [ 139.997374][ T4122] [<80724b68>] (tomoyo_path_number_perm) from [<80729500>] (tomoyo_file_ioctl+0x1c/0x20) [ 139.998309][ T4122] r9:00000004 r8:83499c00 r7:83499c00 r6:00008933 r5:00000000 r4:822071e4 [ 139.998962][ T4122] [<807294e4>] (tomoyo_file_ioctl) from [<806ec4b8>] (security_file_ioctl+0x40/0x5c) [ 140.000171][ T4122] [<806ec478>] (security_file_ioctl) from [<80520c78>] (sys_ioctl+0x50/0xda4) [ 140.001101][ T4122] r7:00000000 r6:83499c01 r5:00000000 r4:00008933 [ 140.001404][ T4122] [<80520c28>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 140.001794][ T4122] Exception stack(0xdfa39fa8 to 0xdfa39ff0) [ 140.002098][ T4122] 9fa0: 00000000 00000000 00000004 00008933 00000000 00000000 [ 140.002562][ T4122] 9fc0: 00000000 00000000 00130d80 00000036 00000000 00006364 003d0f00 76b6d0bc [ 140.003454][ T4122] 9fe0: 76b6cec0 76b6ceb0 000189f0 00132dd0 [ 140.003737][ T4122] r10:00000036 r9:84b25400 r8:8020029c r7:00000036 r6:00130d80 r5:00000000 [ 140.004074][ T4122] r4:00000000 [ 140.010287][ T4122] ERROR: Out of memory at tomoyo_realpath_from_path. [ 140.935560][ T31] audit: type=1400 audit(140.880:162): avc: denied { connect } for pid=4135 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 140.936365][ T31] audit: type=1400 audit(140.880:163): avc: denied { name_connect } for pid=4135 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 140.955577][ T31] audit: type=1400 audit(140.900:164): avc: denied { listen } for pid=4135 comm="syz.1.116" lport=37093 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 141.137118][ T31] audit: type=1400 audit(141.080:165): avc: denied { accept } for pid=4135 comm="syz.1.116" lport=37093 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 144.314306][ T4165] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4165 comm=syz.1.127 [ 144.427303][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 144.427426][ T31] audit: type=1400 audit(144.370:174): avc: denied { create } for pid=4166 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 144.430631][ T31] audit: type=1400 audit(144.370:175): avc: denied { ioctl } for pid=4166 comm="syz.1.128" path="socket:[4224]" dev="sockfs" ino=4224 ioctlcmd=0x89a1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 144.596650][ T31] audit: type=1400 audit(144.540:176): avc: denied { create } for pid=4166 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 145.244248][ T1491] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 145.464667][ T1491] usb 2-1: Using ep0 maxpacket: 16 [ 145.556077][ T1491] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 145.557067][ T1491] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 145.559390][ T1491] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x1 has invalid wMaxPacketSize 0 [ 145.560028][ T1491] usb 2-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 145.575977][ T1491] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 145.576823][ T1491] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 145.577261][ T1491] usb 2-1: Product: syz [ 145.577473][ T1491] usb 2-1: Manufacturer: syz [ 145.577692][ T1491] usb 2-1: SerialNumber: syz [ 145.838911][ T1491] usb 2-1: 2:1 : no or invalid class specific endpoint descriptor [ 145.839755][ T1491] usb 2-1: 2:1 : format type 0 is not supported yet [ 145.887047][ T1491] usb 2-1: USB disconnect, device number 2 [ 149.430165][ T31] audit: type=1400 audit(149.370:177): avc: denied { remount } for pid=4228 comm="syz.0.140" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 151.547665][ T4241] *** NOT YET: opcode c3 *** [ 151.687688][ T31] audit: type=1326 audit(151.630:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.144" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 151.689046][ T31] audit: type=1326 audit(151.630:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.144" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 151.690274][ T31] audit: type=1326 audit(151.630:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.144" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 151.691675][ T31] audit: type=1326 audit(151.630:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.144" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 151.698241][ T31] audit: type=1326 audit(151.630:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.144" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 151.698879][ T31] audit: type=1326 audit(151.640:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.144" exe="/syz-executor" sig=0 arch=40000028 syscall=282 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 151.699396][ T31] audit: type=1400 audit(151.640:184): avc: denied { name_bind } for pid=4242 comm="syz.0.144" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 151.699868][ T31] audit: type=1326 audit(151.640:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.144" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 151.700392][ T31] audit: type=1326 audit(151.640:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4242 comm="syz.0.144" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 154.597816][ T4261] syz.1.149[4261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.599757][ T4261] syz.1.149[4261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.635361][ T31] audit: type=1326 audit(154.570:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4259 comm="syz.1.149" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 156.852937][ C1] hrtimer: interrupt took 6803792 ns [ 168.174598][ T4279] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 168.175302][ T4279] IPv6: NLM_F_CREATE should be set when creating new route [ 168.363496][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 168.363617][ T31] audit: type=1326 audit(168.300:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4282 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 168.364927][ T31] audit: type=1326 audit(168.300:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4282 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 168.367761][ T31] audit: type=1326 audit(168.310:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4282 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 168.371932][ T31] audit: type=1326 audit(168.310:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4282 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 168.383340][ T31] audit: type=1326 audit(168.310:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4282 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 168.401996][ T31] audit: type=1326 audit(168.330:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4282 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 168.405379][ T31] audit: type=1326 audit(168.330:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4282 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 168.406200][ T31] audit: type=1326 audit(168.340:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4282 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=243 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 168.410175][ T31] audit: type=1326 audit(168.350:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4282 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 169.066662][ T31] audit: type=1400 audit(169.010:202): avc: denied { execute } for pid=4286 comm="syz.1.159" dev="tmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 169.067063][ T4287] process 'syz.1.159' launched '/dev/fd/3' with NULL argv: empty string added [ 172.970030][ T4297] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4297 comm=syz.1.163 [ 173.677138][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 173.678785][ T31] audit: type=1326 audit(173.610:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 173.703624][ T31] audit: type=1326 audit(173.630:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 173.704193][ T31] audit: type=1326 audit(173.630:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 173.704667][ T31] audit: type=1326 audit(173.630:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 173.705192][ T31] audit: type=1326 audit(173.630:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 173.705608][ T31] audit: type=1326 audit(173.630:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 173.706022][ T31] audit: type=1326 audit(173.630:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 173.706429][ T31] audit: type=1326 audit(173.630:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 173.707010][ T31] audit: type=1326 audit(173.630:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 173.707836][ T31] audit: type=1326 audit(173.630:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 180.923641][ T4379] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 181.179015][ T4379] usb 2-1: too many endpoints for config 0 interface 0 altsetting 0: 253, using maximum allowed: 30 [ 181.180152][ T4379] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 181.180929][ T4379] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 181.181366][ T4379] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 253 [ 181.181892][ T4379] usb 2-1: New USB device found, idVendor=057e, idProduct=2009, bcdDevice= 0.00 [ 181.182241][ T4379] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 181.194070][ T4379] usb 2-1: config 0 descriptor?? [ 181.475967][ T4379] usbhid 2-1:0.0: can't add hid device: -71 [ 181.476526][ T4379] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 181.479885][ T4379] usb 2-1: USB disconnect, device number 3 [ 186.286356][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 186.286463][ T31] audit: type=1400 audit(186.230:241): avc: denied { create } for pid=4396 comm="syz.1.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 186.891299][ T31] audit: type=1400 audit(186.830:242): avc: denied { write } for pid=4396 comm="syz.1.185" name="anycast6" dev="proc" ino=4026532709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 191.366748][ T4401] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.388320][ T4401] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.235065][ T4401] hsr_slave_0: entered promiscuous mode [ 195.242339][ T4401] hsr_slave_1: entered promiscuous mode [ 195.244409][ T4401] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 195.244700][ T4401] Cannot create hsr debugfs directory [ 195.860901][ T4401] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 195.925578][ T4401] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 196.006846][ T4401] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 196.075135][ T4401] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 196.538194][ T4401] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 196.614765][ T4401] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 196.655367][ T4401] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 196.677869][ T4401] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 198.861989][ T4401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.877980][ T31] audit: type=1400 audit(203.820:243): avc: denied { create } for pid=4753 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 203.893644][ T31] audit: type=1400 audit(203.830:244): avc: denied { write } for pid=4753 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 205.188862][ T4401] veth0_vlan: entered promiscuous mode [ 205.220781][ T4401] veth1_vlan: entered promiscuous mode [ 205.341260][ T4401] veth0_macvtap: entered promiscuous mode [ 205.379089][ T4401] veth1_macvtap: entered promiscuous mode [ 205.665695][ T4401] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.666262][ T4401] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.666636][ T4401] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.667071][ T4401] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 208.503557][ T31] audit: type=1400 audit(208.440:245): avc: denied { getopt } for pid=4756 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 226.709541][ T31] audit: type=1400 audit(226.650:246): avc: denied { shutdown } for pid=4767 comm="syz.1.190" laddr=fe80::12 lport=42079 faddr=fe80:: scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 227.568892][ T31] audit: type=1400 audit(227.510:247): avc: denied { create } for pid=4773 comm="syz.1.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 227.584644][ T31] audit: type=1400 audit(227.530:248): avc: denied { bind } for pid=4773 comm="syz.1.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 228.556528][ T31] audit: type=1326 audit(228.500:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4776 comm="syz.1.193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 228.559502][ T31] audit: type=1326 audit(228.500:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4776 comm="syz.1.193" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 228.581540][ T31] audit: type=1326 audit(228.520:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4776 comm="syz.1.193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 228.582622][ T31] audit: type=1326 audit(228.520:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4776 comm="syz.1.193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 228.613561][ T31] audit: type=1326 audit(228.550:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4776 comm="syz.1.193" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 228.615732][ T31] audit: type=1326 audit(228.560:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4776 comm="syz.1.193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 228.617569][ T31] audit: type=1326 audit(228.560:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4776 comm="syz.1.193" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x7ffc0000 [ 233.669254][ T4792] netlink: 'syz.1.197': attribute type 10 has an invalid length. [ 233.673226][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 233.675016][ T31] audit: type=1400 audit(233.610:283): avc: denied { setopt } for pid=4788 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 234.240447][ T31] audit: type=1400 audit(234.180:284): avc: denied { ioctl } for pid=4795 comm="syz.1.199" path="socket:[3895]" dev="sockfs" ino=3895 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 235.023425][ T31] audit: type=1400 audit(234.960:285): avc: denied { setopt } for pid=4795 comm="syz.1.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 239.053458][ T31] audit: type=1400 audit(238.980:286): avc: denied { setopt } for pid=4811 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 239.793524][ T31] audit: type=1400 audit(239.730:287): avc: denied { write } for pid=4811 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 239.813691][ T31] audit: type=1400 audit(239.730:288): avc: denied { nlmsg_write } for pid=4811 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 241.256087][ T1066] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 241.365162][ T1066] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 241.452466][ T1066] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 241.510454][ T1066] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 242.026127][ T1066] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 242.049348][ T1066] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 242.058012][ T1066] bond0 (unregistering): Released all slaves [ 242.302068][ T1066] hsr_slave_0: left promiscuous mode [ 242.306759][ T1066] hsr_slave_1: left promiscuous mode [ 242.318536][ T1066] veth1_macvtap: left promiscuous mode [ 242.319301][ T1066] veth0_macvtap: left promiscuous mode [ 242.319768][ T1066] veth1_vlan: left promiscuous mode [ 242.320272][ T1066] veth0_vlan: left promiscuous mode [ 244.695143][ T4805] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 244.730877][ T4805] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.741428][ T4805] hsr_slave_0: entered promiscuous mode [ 246.757583][ T4805] hsr_slave_1: entered promiscuous mode [ 246.759277][ T4805] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 246.759590][ T4805] Cannot create hsr debugfs directory [ 247.694649][ T31] audit: type=1400 audit(247.620:289): avc: denied { connect } for pid=5146 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 248.208649][ T31] audit: type=1400 audit(248.150:290): avc: denied { setopt } for pid=5146 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 248.456202][ T4805] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 248.490032][ T4805] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 248.541546][ T4805] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 248.572265][ T4805] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 251.049854][ T4805] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.543489][ T31] audit: type=1326 audit(252.470:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5210 comm="syz.1.217" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132dd0 code=0x0 [ 255.413258][ T31] audit: type=1400 audit(255.350:292): avc: denied { name_connect } for pid=5228 comm="syz.1.218" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 260.081351][ T4805] veth0_vlan: entered promiscuous mode [ 260.119484][ T4805] veth1_vlan: entered promiscuous mode [ 260.290422][ T4805] veth0_macvtap: entered promiscuous mode [ 260.303991][ T4805] veth1_macvtap: entered promiscuous mode [ 260.480207][ T4805] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.480801][ T4805] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.481212][ T4805] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.481578][ T4805] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.011298][ T5264] netlink: 8 bytes leftover after parsing attributes in process `syz.1.220'. [ 261.012204][ T5264] netlink: 8 bytes leftover after parsing attributes in process `syz.1.220'. [ 262.927730][ T31] audit: type=1400 audit(262.870:293): avc: denied { bind } for pid=5283 comm="syz.1.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 262.953655][ T31] audit: type=1400 audit(262.890:294): avc: denied { name_bind } for pid=5283 comm="syz.1.224" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 262.954813][ T31] audit: type=1400 audit(262.890:295): avc: denied { node_bind } for pid=5283 comm="syz.1.224" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 264.337872][ T5292] netlink: 176 bytes leftover after parsing attributes in process `syz.1.226'. [ 264.903782][ T4308] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 265.113646][ T4308] usb 2-1: Using ep0 maxpacket: 8 [ 265.130676][ T4308] usb 2-1: config index 0 descriptor too short (expected 5924, got 36) [ 265.131195][ T4308] usb 2-1: config 250 has an invalid interface number: 228 but max is -1 [ 265.131481][ T4308] usb 2-1: config 250 has 1 interface, different from the descriptor's value: 0 [ 265.131759][ T4308] usb 2-1: config 250 has no interface number 0 [ 265.132025][ T4308] usb 2-1: config 250 interface 228 altsetting 255 endpoint 0x1 has invalid maxpacket 65280, setting to 1024 [ 265.132392][ T4308] usb 2-1: config 250 interface 228 altsetting 255 bulk endpoint 0x1 has invalid maxpacket 1024 [ 265.133280][ T4308] usb 2-1: config 250 interface 228 altsetting 255 endpoint 0x82 has invalid wMaxPacketSize 0 [ 265.133503][ T4308] usb 2-1: config 250 interface 228 altsetting 255 bulk endpoint 0x82 has invalid maxpacket 0 [ 265.133728][ T4308] usb 2-1: config 250 interface 228 altsetting 255 has 2 endpoint descriptors, different from the interface descriptor's value: 17 [ 265.134033][ T4308] usb 2-1: config 250 interface 228 has no altsetting 0 [ 265.169488][ T4308] usb 2-1: New USB device found, idVendor=0525, idProduct=d292, bcdDevice= 0.07 [ 265.169824][ T4308] usb 2-1: New USB device strings: Mfr=0, Product=106, SerialNumber=59 [ 265.170039][ T4308] usb 2-1: Product: syz [ 265.170282][ T4308] usb 2-1: SerialNumber: syz [ 265.220184][ T4308] hub 2-1:250.228: bad descriptor, ignoring hub [ 265.220804][ T4308] hub 2-1:250.228: probe with driver hub failed with error -5 [ 265.425736][ T4308] usblp 2-1:250.228: usblp0: USB Bidirectional printer dev 4 if 228 alt 255 proto 3 vid 0x0525 pid 0xD292 [ 265.467753][ T5295] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 265.474302][ T5295] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 265.500557][ T5295] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 265.502511][ T5295] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 265.675266][ T4308] usb 2-1: USB disconnect, device number 4 [ 265.680905][ T4308] usblp0: removed [ 271.877726][ T5373] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5373 comm=syz.1.242 [ 272.725130][ T31] audit: type=1400 audit(272.670:296): avc: denied { bind } for pid=5384 comm="syz.0.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 277.123640][ T24] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 277.372873][ T24] usb 2-1: New USB device found, idVendor=0545, idProduct=808b, bcdDevice=31.ad [ 277.373437][ T24] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 277.388066][ T24] usb 2-1: config 0 descriptor?? [ 277.692617][ T3065] usb 2-1: USB disconnect, device number 5 [ 278.306306][ T5396] batadv_slave_0: entered promiscuous mode [ 291.876191][ T1066] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 291.935072][ T1066] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 291.941036][ T1066] bond0 (unregistering): Released all slaves [ 292.082423][ T1066] hsr_slave_0: left promiscuous mode [ 292.095360][ T1066] hsr_slave_1: left promiscuous mode [ 292.115286][ T1066] veth1_macvtap: left promiscuous mode [ 292.115760][ T1066] veth0_macvtap: left promiscuous mode [ 292.116137][ T1066] veth1_vlan: left promiscuous mode [ 292.116463][ T1066] veth0_vlan: left promiscuous mode [ 293.225326][ T5494] loop7: detected capacity change from 0 to 16384 [ 293.286986][ T5494] I/O error, dev loop7, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 0 [ 293.287799][ T5494] Buffer I/O error on dev loop7, logical block 0, lost async page write [ 295.936443][ T31] audit: type=1400 audit(295.880:297): avc: denied { read } for pid=5516 comm="syz.1.287" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 296.242235][ T5529] netlink: 'syz.1.292': attribute type 1 has an invalid length. [ 296.435993][ T31] audit: type=1400 audit(296.370:298): avc: denied { bind } for pid=5534 comm="syz.1.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 301.618483][ T4323] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 301.869204][ T4323] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 255, changing to 11 [ 301.879479][ T4323] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 59391, setting to 1024 [ 301.880215][ T4323] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 301.890797][ T4323] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 301.891317][ T4323] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 301.923148][ T4323] usb 1-1: config 0 descriptor?? [ 301.927038][ T5552] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 302.448204][ T4323] plantronics 0003:047F:FFFF.0001: unknown main item tag 0xd [ 302.474782][ T4323] plantronics 0003:047F:FFFF.0001: No inputs registered, leaving [ 302.554792][ T4323] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 302.697284][ T4317] usb 1-1: USB disconnect, device number 2 [ 315.443244][ T31] audit: type=1400 audit(315.380:299): avc: denied { read } for pid=5605 comm="syz.0.312" path="socket:[5798]" dev="sockfs" ino=5798 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 315.842100][ T94] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 315.966029][ T31] audit: type=1400 audit(315.910:300): avc: denied { connect } for pid=5605 comm="syz.0.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 315.987221][ T31] audit: type=1400 audit(315.920:301): avc: denied { setopt } for pid=5605 comm="syz.0.312" laddr=::1 lport=1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 315.997621][ T31] audit: type=1400 audit(315.940:302): avc: denied { write } for pid=5605 comm="syz.0.312" laddr=::1 lport=1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 316.037795][ T94] usb 2-1: Using ep0 maxpacket: 32 [ 316.141956][ T94] usb 2-1: unable to get BOS descriptor or descriptor too short [ 316.171071][ T94] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 316.171678][ T94] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 316.187692][ T94] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 316.188376][ T94] usb 2-1: New USB device strings: Mfr=1, Product=130, SerialNumber=3 [ 316.188792][ T94] usb 2-1: Product: syz [ 316.189065][ T94] usb 2-1: Manufacturer: syz [ 316.189488][ T94] usb 2-1: SerialNumber: syz [ 316.505475][ T94] usb 2-1: 0:6 : does not exist [ 316.507997][ T94] usb 2-1: 0:3 : does not exist [ 316.569577][ T94] usb 2-1: USB disconnect, device number 6 [ 317.127434][ T4318] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 317.198214][ T5638] binder: Bad value for 'stats' [ 317.433230][ T4318] usb 1-1: config 0 has an invalid interface number: 18 but max is 0 [ 317.433755][ T4318] usb 1-1: config 0 has no interface number 0 [ 317.435034][ T4318] usb 1-1: config 0 interface 18 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 317.435426][ T4318] usb 1-1: config 0 interface 18 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 317.460760][ T4318] usb 1-1: New USB device found, idVendor=054c, idProduct=03d5, bcdDevice= 0.10 [ 317.461059][ T4318] usb 1-1: New USB device strings: Mfr=2, Product=0, SerialNumber=0 [ 317.461240][ T4318] usb 1-1: Manufacturer: syz [ 317.465340][ T4318] usb 1-1: config 0 descriptor?? [ 318.102424][ T4318] input: syz as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.18/0003:054C:03D5.0002/input/input5 [ 318.127461][ T4318] sony 0003:054C:03D5.0002: input,hidraw0: USB HID v0.00 Joystick [syz] on usb-dummy_hcd.0-1/input18 [ 318.508847][ T4322] usb 1-1: USB disconnect, device number 3 [ 337.520615][ T31] audit: type=1400 audit(337.460:303): avc: denied { bind } for pid=5705 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 337.714842][ T31] audit: type=1400 audit(337.660:304): avc: denied { setopt } for pid=5705 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 337.717120][ T31] audit: type=1400 audit(337.660:305): avc: denied { accept } for pid=5705 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 337.719948][ T31] audit: type=1400 audit(337.660:306): avc: denied { write } for pid=5705 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 337.721859][ T31] audit: type=1400 audit(337.660:307): avc: denied { read } for pid=5705 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 339.223271][ T31] audit: type=1400 audit(339.160:308): avc: denied { name_connect } for pid=5722 comm="syz.0.338" dest=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 377.556700][ T31] audit: type=1400 audit(377.500:309): avc: denied { getopt } for pid=5788 comm="syz.0.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 380.768606][ T31] audit: type=1400 audit(380.710:310): avc: denied { bind } for pid=5803 comm="syz.0.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 380.780818][ T31] audit: type=1400 audit(380.720:311): avc: denied { listen } for pid=5803 comm="syz.0.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 380.803988][ T31] audit: type=1400 audit(380.740:312): avc: denied { write } for pid=5803 comm="syz.0.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 380.849780][ T31] audit: type=1400 audit(380.790:313): avc: denied { accept } for pid=5803 comm="syz.0.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 380.857989][ T31] audit: type=1400 audit(380.800:314): avc: denied { read } for pid=5803 comm="syz.0.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 387.763162][ T3764] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 387.948086][ T3764] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 387.948923][ T3764] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 387.949239][ T3764] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 387.949674][ T3764] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 387.950029][ T3764] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 387.965469][ T3764] usb 1-1: config 0 descriptor?? [ 388.401886][ T3764] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 388.405862][ T3764] plantronics 0003:047F:FFFF.0003: No inputs registered, leaving [ 388.416034][ T3764] plantronics 0003:047F:FFFF.0003: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 392.408543][ T4317] usb 1-1: USB disconnect, device number 4 [ 401.588505][ T31] audit: type=1400 audit(401.530:315): avc: denied { read } for pid=5913 comm="syz.0.394" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 401.590751][ T31] audit: type=1400 audit(401.530:316): avc: denied { open } for pid=5913 comm="syz.0.394" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 401.598157][ T31] audit: type=1400 audit(401.530:317): avc: denied { ioctl } for pid=5913 comm="syz.0.394" path="/dev/binderfs/binder0" dev="binder" ino=10 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 404.807786][ T31] audit: type=1400 audit(404.750:318): avc: denied { ioctl } for pid=5916 comm="syz.1.395" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7009 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 405.083893][ T5923] ------------[ cut here ]------------ [ 405.084468][ T5923] WARNING: CPU: 1 PID: 5923 at mm/highmem.c:622 kunmap_local_indexed+0x210/0x228 [ 405.085175][ T5923] Modules linked in: [ 405.086437][ T5923] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 405.089281][ T5923] CPU: 1 UID: 0 PID: 5923 Comm: syz.1.395 Not tainted 6.11.0-rc6-syzkaller #0 [ 405.092643][ T5923] Hardware name: ARM-Versatile Express [ 405.093152][ T5923] Call trace: [ 405.093393][ T5923] [<8195d098>] (dump_backtrace) from [<8195d194>] (show_stack+0x18/0x1c) [ 405.093770][ T5923] r7:00000000 r6:826228c4 r5:00000000 r4:8200ca04 [ 405.094127][ T5923] [<8195d17c>] (show_stack) from [<8197aeb4>] (dump_stack_lvl+0x54/0x7c) [ 405.094517][ T5923] [<8197ae60>] (dump_stack_lvl) from [<8197aef4>] (dump_stack+0x18/0x1c) [ 405.095488][ T5923] r5:00000000 r4:8286dd18 [ 405.096009][ T5923] [<8197aedc>] (dump_stack) from [<8195dc3c>] (panic+0x120/0x368) [ 405.096436][ T5923] [<8195db1c>] (panic) from [<802421e4>] (get_taint+0x0/0x1c) [ 405.096835][ T5923] r3:8260c5c4 r2:00000001 r1:81ff5228 r0:81ffd000 [ 405.097503][ T5923] r7:8048178c [ 405.097711][ T5923] [<80242170>] (check_panic_on_warn) from [<80242338>] (__warn+0x7c/0x180) [ 405.098149][ T5923] [<802422bc>] (__warn) from [<802425b4>] (warn_slowpath_fmt+0x178/0x1f4) [ 405.098812][ T5923] r8:00000009 r7:82024538 r6:e0481d14 r5:84141800 r4:00000000 [ 405.099238][ T5923] [<80242440>] (warn_slowpath_fmt) from [<8048178c>] (kunmap_local_indexed+0x210/0x228) [ 405.099687][ T5923] r10:ffedc0a8 r9:84174300 r8:20508000 r7:fffffffe r6:00000003 r5:84141800 [ 405.100195][ T5923] r4:ffedc000 [ 405.100376][ T5923] [<8048157c>] (kunmap_local_indexed) from [<804f7e78>] (move_pages+0x7e8/0x14a0) [ 405.100889][ T5923] r7:fffffffe r6:00000000 r5:8480b810 r4:ffeda840 [ 405.101290][ T5923] [<804f7690>] (move_pages) from [<80572e94>] (userfaultfd_ioctl+0x1260/0x2314) [ 405.101799][ T5923] r10:20c16000 r9:e0481e98 r8:20000080 r7:84174300 r6:00000001 r5:00000000 [ 405.102290][ T5923] r4:8555e100 [ 405.102551][ T5923] [<80571c34>] (userfaultfd_ioctl) from [<80520d5c>] (sys_ioctl+0x134/0xda4) [ 405.103400][ T5923] r10:84141800 r9:00000006 r8:85406540 r7:20000080 r6:85406541 r5:00000000 [ 405.103892][ T5923] r4:c028aa05 [ 405.104154][ T5923] [<80520c28>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 405.104552][ T5923] Exception stack(0xe0481fa8 to 0xe0481ff0) [ 405.106297][ T5923] 1fa0: 00000000 00000000 00000006 c028aa05 20000080 00000000 [ 405.107184][ T5923] 1fc0: 00000000 00000000 00286410 00000036 00000000 00006364 003d0f00 76b2b0bc [ 405.108431][ T5923] 1fe0: 76b2aec0 76b2aeb0 000189f0 00132dd0 [ 405.109816][ T5923] r10:00000036 r9:84141800 r8:8020029c r7:00000036 r6:00286410 r5:00000000 [ 405.110451][ T5923] r4:00000000 [ 405.114081][ T5923] Rebooting in 86400 seconds.. VM DIAGNOSIS: 11:43:20 Registers: info registers vcpu 0 CPU#0 R00=827b83f8 R01=00000000 R02=ffffffff R03=8197cc44 R04=828b1640 R05=00013bec R06=00013bec R07=4be19200 R08=84958454 R09=84958088 R10=00000000 R11=ec21dc5c R12=ec21dc60 R13=ec21dc50 R14=81208b3c R15=8197cc54 PSR=60000013 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005027e9 s17=00000000 d08=00000000005027e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00080003 s33=00080136 d16=0008013600080003 s34=ff020108 s35=03ffffff d17=03ffffffff020108 s36=ffffff02 s37=080003ff d18=080003ffffffff02 s38=81800300 s39=ffff0201 d19=ffff020181800300 s40=0303ffff s41=00018188 d20=000181880303ffff s42=90030008 s43=80020181 d21=8002018190030008 s44=08800308 s45=00030002 d22=0003000208800308 s46=03580800 s47=00040008 d23=0004000803580800 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=83fb682a s53=4ffbe0d9 d26=4ffbe0d983fb682a s54=c2ef9143 s55=03541f9c d27=03541f9cc2ef9143 s56=f5c4536b s57=5013c056 d28=5013c056f5c4536b s58=90bea3b4 s59=a74a18cd d29=a74a18cd90bea3b4 s60=6286e5b7 s61=243eaba9 d30=243eaba96286e5b7 s62=feacc644 s63=76956519 d31=76956519feacc644 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=00000000 R02=00000000 R03=00000063 R04=82753e10 R05=00000000 R06=00000001 R07=e0481b38 R08=828701f8 R09=e0481b37 R10=60000093 R11=e0481b24 R12=00000020 R13=e0481ab8 R14=32393554 R15=802bd8dc PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000