last executing test programs: 19.372175802s ago: executing program 1 (id=332): r0 = userfaultfd(0x80801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, 0x0) 19.134613158s ago: executing program 1 (id=333): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup(r1) ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0xe0eb) 18.797734413s ago: executing program 1 (id=335): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x2d, 0x0, @val=@netfilter={0x2, 0x0, 0x6, 0x1}}, 0x20) bpf$LINK_DETACH(0x22, &(0x7f00000001c0)=r1, 0x4) 18.047335259s ago: executing program 1 (id=337): r0 = userfaultfd(0x80801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, 0x0) 17.566419432s ago: executing program 1 (id=338): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0, r3}, 0x18) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001000010700000000000000000a000028060001001a"], 0x1c}}, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r4) 13.217938935s ago: executing program 0 (id=342): bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$LINK_DETACH(0x22, &(0x7f00000001c0), 0x4) 12.6784107s ago: executing program 0 (id=343): sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x2a, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=@newqdisc={0x24, 0x24, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xe}}}, 0x24}}, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=@newqdisc={0x2c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=@newtfilter={0x884, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0x7}, {}, {0x2}}, [@filter_kind_options=@f_basic={{0xa}, {0x84c, 0x2, [@TCA_BASIC_POLICE={0x848, 0x4, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0xa, 0x5, 0x8, 0x8, 0x10, 0x9, 0x8, 0x3ff, 0x5, 0xc3c, 0xfffffff9, 0x0, 0x101, 0x2000000, 0xefa0, 0x80000000, 0x0, 0x16d, 0x1, 0x4, 0x10001, 0x5, 0x8, 0xe8, 0x7ff, 0x3, 0xc, 0x7, 0x3, 0x0, 0x9, 0x7f, 0x5, 0xad2c, 0x3, 0x40, 0x9, 0x0, 0xd4, 0x2, 0x5, 0x1, 0x10, 0x1, 0x10000, 0x81, 0x51b5, 0x5, 0xf26, 0x1, 0x2, 0x1, 0x8000, 0x800, 0x2, 0x100, 0x80000001, 0x0, 0x7, 0x8, 0x9, 0x400, 0x4, 0x0, 0xb, 0x0, 0x9, 0x10000, 0xb, 0x6, 0x6, 0x9, 0x0, 0x1, 0xf21, 0xe, 0x3, 0x0, 0x7, 0x10, 0x9, 0xd, 0x7fffffff, 0xed93, 0x1, 0x7, 0x1, 0x0, 0x2, 0x6, 0x4, 0x847d, 0x19da, 0x7, 0x1, 0xfffffff9, 0x3, 0x100, 0x6, 0x9, 0xc415, 0x5, 0x9, 0x6, 0xb7, 0x7fff, 0xfffffff7, 0x0, 0x5, 0x72, 0x8, 0xd, 0x3, 0x4, 0xc, 0x5, 0x4, 0x5, 0x1, 0x9, 0xf52, 0x0, 0x5, 0x8000, 0x81, 0x5, 0x1ff, 0x80000001, 0x8, 0x7ff, 0x9, 0x0, 0x0, 0x1, 0xa, 0x0, 0x401, 0x6, 0x100, 0x6, 0x4, 0xb7, 0x2c22, 0x8, 0x0, 0x9, 0x5e, 0x4, 0x5, 0xf14f, 0x5, 0x3, 0x3, 0x7, 0x3, 0x0, 0x6, 0x9709de23, 0x8, 0x9, 0x0, 0x2, 0xfffffff9, 0x1, 0x3c, 0x40, 0x65, 0xe8c, 0x5, 0x4, 0x3, 0x5, 0x9, 0x2, 0x39000, 0x2, 0x7fff, 0xfaca, 0xf11, 0x100, 0x95, 0x2, 0x70020000, 0x42, 0x7292, 0x9, 0x401, 0x400, 0x24, 0x0, 0x5, 0x1, 0x5, 0x0, 0xff, 0xffff, 0x36, 0x67, 0x9, 0x0, 0xe74, 0x1, 0xf, 0x4, 0x80, 0x0, 0x0, 0x9, 0x2, 0x5, 0xfb9, 0x9, 0x8000000, 0x1, 0x2, 0x100, 0x8000, 0x0, 0xf, 0x2, 0x6, 0x2, 0x0, 0x7, 0xfa0, 0x8, 0x8, 0x8e6, 0xfffffffc, 0x3, 0xffff8000, 0x2, 0xfff, 0x3ff, 0x5, 0x401, 0x5, 0x7, 0x401, 0x4, 0x1, 0x5, 0x3, 0x1, 0x40000000, 0x0, 0x1ff, 0x10001, 0x3, 0x8, 0x1, 0x6, 0x3, 0x4, 0x7, 0x2027]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x97e, 0x7, 0x200, 0x2, 0xffffb720, {0x5, 0x1, 0x5, 0x6, 0x81, 0x5}, {0x2, 0x2, 0x2, 0x3, 0x800, 0x4}, 0x4, 0x42, 0xe45}}, @TCA_POLICE_RATE={0x404, 0x2, [0x9, 0x6, 0x7f, 0x44, 0x5, 0xffff, 0x5, 0x7, 0x3, 0x80000001, 0x400, 0x6, 0x6, 0x5, 0x3, 0x83, 0x0, 0x101, 0x9, 0xfffff000, 0x6, 0x0, 0xffffff49, 0x3, 0x440, 0x0, 0xfffffff2, 0xb224, 0xc, 0xfffffffb, 0x6, 0x5b1, 0xd, 0x7, 0x6, 0x0, 0xffffffff, 0xf, 0x0, 0x80000001, 0xd017, 0x1, 0x5, 0xfffffff7, 0x6, 0x9, 0x800, 0x1, 0x7f, 0x7f, 0x1, 0x9, 0x7, 0x401, 0xfff, 0x8, 0x7fffffff, 0x1, 0xc4a, 0x7, 0x1, 0x8, 0x7, 0x401, 0x10001, 0x0, 0x4, 0x2fc6, 0x2, 0x8a4, 0x1, 0x4, 0xde4, 0x8, 0x4, 0xfffffeff, 0x4, 0xa, 0x101, 0x1, 0x6, 0x4, 0x5999, 0x6, 0x5, 0x3, 0x8, 0x69, 0x28, 0x6, 0xad61, 0xae11, 0x3, 0x2, 0xade6, 0xe862, 0x0, 0x0, 0x81, 0x101, 0x8000, 0xf, 0xfffffffd, 0xff, 0x0, 0x80000001, 0x6, 0x81, 0xffff, 0x2, 0xff, 0x4, 0x3, 0x1, 0x4f, 0xfffff570, 0x7, 0x1, 0x9, 0x6, 0x0, 0xb2, 0x10001, 0x6, 0x9, 0x80000000, 0xb4000000, 0x7, 0x10000, 0x89, 0x2, 0xd0d, 0x7, 0x6, 0x8000, 0x2, 0xd009, 0xfffeffff, 0x1ff, 0x8, 0x8000, 0x61, 0xa25, 0x101, 0x10001, 0x5, 0x5, 0x1, 0x80, 0x5, 0x0, 0x4, 0xc, 0x8, 0x1, 0x3, 0x30e, 0x400, 0x80, 0x0, 0x9, 0xe, 0xfffffff6, 0x0, 0x9, 0xed6, 0x3, 0xb, 0x3, 0x9, 0x9, 0x2, 0x3, 0x4, 0x3, 0x97, 0x401, 0x950, 0x8, 0x68, 0x5, 0x7, 0x9, 0x9, 0xa7c, 0xa, 0xa, 0x7fffffff, 0x81, 0xb, 0x0, 0x5, 0x410, 0x62, 0xfffffff8, 0x8, 0x200, 0x44b, 0x2, 0x0, 0x5, 0x7, 0x7fff, 0x7, 0x40, 0x5, 0xfff, 0x5, 0x7ff, 0x7, 0x6, 0x2, 0x6, 0x1, 0x0, 0x80, 0x9, 0x1, 0x10000, 0xfffffff4, 0x7, 0x5, 0x60, 0x1, 0x9, 0x4, 0x3ff, 0xa, 0xfffffffe, 0xb, 0xd3, 0x7ff, 0x6, 0x60, 0x5, 0x8000, 0x0, 0xfffffffe, 0x7fff, 0x1ff, 0x9, 0x8, 0x8, 0xc, 0x8, 0x8, 0x5, 0xb, 0xffffb01c, 0x3, 0x1, 0x7, 0x7f, 0x2, 0x800, 0x7]}]}]}}, @TCA_RATE={0x6, 0x5, {0x2, 0x7}}]}, 0x884}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 11.984652795s ago: executing program 1 (id=344): r0 = socket$inet(0x2, 0x3, 0x5) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$loop(&(0x7f00000001c0), 0x1e6, 0x10000) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x138, 0x10, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@loopback, 0x0, 0x32}, @in=@local, {}, {0xac2, 0x0, 0x0, 0x5}, {}, 0x2, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x8000, 0x1000, 0x756, {{0x5, 0x4, 0x2, 0x2, 0x14, 0x66, 0x0, 0xe9, 0x2f, 0x0, @private, @empty}}}}) 11.347005298s ago: executing program 0 (id=345): openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) r1 = inotify_init1(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000600)='fd/4\x00') ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0x4004662b, &(0x7f0000000180)={@id={0x2, 0x0, @auto="05d4f5079caf75d3cdcbceab9c468b45"}}) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000100), 0x0, 0x0, 0x400000000000000) 10.254827751s ago: executing program 0 (id=346): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec85000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x18) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = getpid() process_vm_readv(r3, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r4 = syz_open_dev$loop(0x0, 0x75f, 0x103382) memfd_create(&(0x7f0000001e00)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xefE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaa\xc6?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc9\xd1\xa7@\xa1_B\xc2@\r_b\x9a\xeb\b\xa4(V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7<\x7f\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xb0\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93i|\xc0\x00\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcd\x90\x95\xdd\x8a\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x00\x00\x00\x00\x01\x00\x00\x04\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1d0x0}) r7 = syz_open_procfs(r6, &(0x7f0000000600)='fd/4\x00') fallocate(r7, 0x10, 0xfff, 0x7) 1.296603508s ago: executing program 0 (id=347): r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, {}, 0x0, {}, 0x2, 0x2, 0x20, 0x0, "fbbed512428fc04e9df6872ff23175725dd6195cf93db8657ecddfe583ad1a298f570d1f8db9856eba4381b80a516659b7648bbf43304e509d711871a8d520a2", "db0a5367d0bf99cc45233e506dd2b53dd56f4d02d6df2633efd6c2cdbb2be7d4", [0x7fff]}) 0s ago: executing program 0 (id=348): memfd_create(&(0x7f0000000140)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\xea7\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xcd\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1f, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000f, 0x28011, r0, 0x1000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc0686611, &(0x7f0000000180)={0x68, 0x0, 0x3f, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:39561' (ED25519) to the list of known hosts. [ 137.304133][ T30] audit: type=1400 audit(137.050:58): avc: denied { name_bind } for pid=3264 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 137.662858][ T30] audit: type=1400 audit(137.410:59): avc: denied { execute } for pid=3266 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 137.667984][ T30] audit: type=1400 audit(137.420:60): avc: denied { execute_no_trans } for pid=3266 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 142.188160][ T30] audit: type=1400 audit(141.940:61): avc: denied { mounton } for pid=3266 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 142.198931][ T30] audit: type=1400 audit(141.950:62): avc: denied { mount } for pid=3266 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 142.226174][ T3266] cgroup: Unknown subsys name 'net' [ 142.245730][ T30] audit: type=1400 audit(141.990:63): avc: denied { unmount } for pid=3266 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 142.669974][ T3266] cgroup: Unknown subsys name 'cpuset' [ 142.716562][ T3266] cgroup: Unknown subsys name 'rlimit' [ 143.101691][ T30] audit: type=1400 audit(142.850:64): avc: denied { setattr } for pid=3266 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 143.104998][ T30] audit: type=1400 audit(142.850:65): avc: denied { mounton } for pid=3266 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 143.106591][ T30] audit: type=1400 audit(142.860:66): avc: denied { mount } for pid=3266 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 143.515125][ T3269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 143.521304][ T30] audit: type=1400 audit(143.270:67): avc: denied { relabelto } for pid=3269 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 143.528882][ T30] audit: type=1400 audit(143.270:68): avc: denied { write } for pid=3269 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 143.622079][ T30] audit: type=1400 audit(143.370:69): avc: denied { read } for pid=3266 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 143.626296][ T30] audit: type=1400 audit(143.370:70): avc: denied { open } for pid=3266 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 143.646716][ T3266] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 149.005051][ T30] audit: type=1400 audit(148.760:71): avc: denied { execmem } for pid=3270 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 149.060929][ T30] audit: type=1400 audit(148.810:72): avc: denied { mounton } for pid=3272 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 149.071179][ T30] audit: type=1400 audit(148.820:73): avc: denied { mount } for pid=3272 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 149.096348][ T30] audit: type=1400 audit(148.850:74): avc: denied { read } for pid=3272 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 149.099138][ T30] audit: type=1400 audit(148.850:75): avc: denied { open } for pid=3272 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 149.120178][ T30] audit: type=1400 audit(148.870:76): avc: denied { mounton } for pid=3272 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 149.174969][ T30] audit: type=1400 audit(148.910:77): avc: denied { module_request } for pid=3272 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 149.367006][ T30] audit: type=1400 audit(149.120:78): avc: denied { sys_module } for pid=3273 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 153.639201][ T3273] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 153.674421][ T3273] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 154.074153][ T3272] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 154.137661][ T3272] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 155.869341][ T3273] hsr_slave_0: entered promiscuous mode [ 155.927755][ T3273] hsr_slave_1: entered promiscuous mode [ 156.450461][ T3272] hsr_slave_0: entered promiscuous mode [ 156.507523][ T3272] hsr_slave_1: entered promiscuous mode [ 156.566230][ T3272] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 156.568927][ T3272] Cannot create hsr debugfs directory [ 157.865837][ T30] audit: type=1400 audit(157.610:79): avc: denied { create } for pid=3273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 157.869274][ T30] audit: type=1400 audit(157.620:80): avc: denied { write } for pid=3273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 157.872859][ T30] audit: type=1400 audit(157.620:81): avc: denied { read } for pid=3273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 157.895970][ T3273] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 157.987168][ T3273] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 158.019195][ T3273] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 158.057666][ T3273] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 158.421985][ T3272] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 158.455342][ T3272] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 158.479433][ T3272] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 158.500021][ T3272] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 159.996676][ T3273] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.480530][ T3272] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.199792][ T3273] veth0_vlan: entered promiscuous mode [ 167.259214][ T3273] veth1_vlan: entered promiscuous mode [ 167.473557][ T3273] veth0_macvtap: entered promiscuous mode [ 167.518398][ T3273] veth1_macvtap: entered promiscuous mode [ 167.723717][ T3272] veth0_vlan: entered promiscuous mode [ 167.844803][ T3272] veth1_vlan: entered promiscuous mode [ 167.862040][ T3273] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.865543][ T3273] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.866027][ T3273] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.866494][ T3273] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.198422][ T30] audit: type=1400 audit(167.950:82): avc: denied { mount } for pid=3273 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 168.222794][ T30] audit: type=1400 audit(167.970:83): avc: denied { mounton } for pid=3273 comm="syz-executor" path="/syzkaller.t5WWlN/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 168.250443][ T30] audit: type=1400 audit(168.000:84): avc: denied { mount } for pid=3273 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 168.300933][ T3272] veth0_macvtap: entered promiscuous mode [ 168.318056][ T30] audit: type=1400 audit(168.070:85): avc: denied { unmount } for pid=3273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 168.341832][ T30] audit: type=1400 audit(168.090:86): avc: denied { mounton } for pid=3273 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 168.360619][ T3272] veth1_macvtap: entered promiscuous mode [ 168.369477][ T30] audit: type=1400 audit(168.110:87): avc: denied { mount } for pid=3273 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 168.514664][ T3272] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.515240][ T3272] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.515641][ T3272] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.516060][ T3272] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.680986][ T3273] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 169.011687][ T30] audit: type=1400 audit(168.750:88): avc: denied { read write } for pid=3273 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 169.012682][ T30] audit: type=1400 audit(168.750:89): avc: denied { open } for pid=3273 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 169.024793][ T30] audit: type=1400 audit(168.750:90): avc: denied { ioctl } for pid=3273 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 169.517318][ T30] audit: type=1400 audit(169.270:91): avc: denied { map_create } for pid=3407 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 174.180141][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 174.180642][ T30] audit: type=1400 audit(173.000:105): avc: denied { ioctl } for pid=3409 comm="syz.0.1" path="socket:[4037]" dev="sockfs" ino=4037 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 174.185151][ T30] audit: type=1400 audit(173.030:106): avc: denied { setopt } for pid=3409 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 174.187711][ T30] audit: type=1400 audit(173.050:107): avc: denied { write } for pid=3409 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 174.190742][ T30] audit: type=1400 audit(173.230:108): avc: denied { read write } for pid=3409 comm="syz.0.1" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 174.194081][ T30] audit: type=1400 audit(173.230:109): avc: denied { open } for pid=3409 comm="syz.0.1" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 174.197195][ T30] audit: type=1400 audit(173.270:110): avc: denied { ioctl } for pid=3409 comm="syz.0.1" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 176.931814][ T29] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 178.133870][ C1] hrtimer: interrupt took 886144 ns [ 180.044193][ T29] usb 1-1: unable to get BOS descriptor or descriptor too short [ 180.072835][ T29] usb 1-1: config 1 interface 0 altsetting 210 endpoint 0x81 has invalid maxpacket 512, setting to 8 [ 180.075453][ T29] usb 1-1: config 1 interface 0 altsetting 210 endpoint 0x82 is Bulk; changing to Interrupt [ 180.076014][ T29] usb 1-1: config 1 interface 0 altsetting 210 endpoint 0x3 is Bulk; changing to Interrupt [ 180.076451][ T29] usb 1-1: config 1 interface 0 has no altsetting 0 [ 180.268433][ T29] usb 1-1: string descriptor 0 read error: -22 [ 180.269905][ T29] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 180.270379][ T29] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 180.329005][ T3419] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 180.331969][ T3419] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 180.334655][ T3419] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 180.359515][ T29] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -22 [ 185.108670][ T3348] usb 1-1: USB disconnect, device number 2 [ 188.306881][ T3432] Zero length message leads to an empty skb [ 188.311201][ T3432] capability: warning: `syz.0.6' uses 32-bit capabilities (legacy support in use) [ 188.328972][ T30] audit: type=1400 audit(188.040:111): avc: denied { write } for pid=3429 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 188.332538][ T30] audit: type=1400 audit(188.040:112): avc: denied { nlmsg_write } for pid=3429 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 192.276301][ T30] audit: type=1400 audit(192.030:113): avc: denied { bind } for pid=3433 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 192.284402][ T30] audit: type=1400 audit(192.030:114): avc: denied { setopt } for pid=3433 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 194.245219][ T30] audit: type=1326 audit(193.980:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3439 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb1b49728 code=0x7ffc0000 [ 194.246252][ T30] audit: type=1326 audit(193.990:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3439 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb1b49728 code=0x7ffc0000 [ 194.268729][ T30] audit: type=1326 audit(194.020:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3439 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=107 compat=0 ip=0xffffb1b49728 code=0x7ffc0000 [ 194.277034][ T30] audit: type=1326 audit(194.020:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3439 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb1b49728 code=0x7ffc0000 [ 194.286842][ T30] audit: type=1326 audit(194.030:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3439 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=111 compat=0 ip=0xffffb1b49728 code=0x7ffc0000 [ 194.299718][ T30] audit: type=1326 audit(194.040:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3439 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb1b49728 code=0x7ffc0000 [ 194.310551][ T30] audit: type=1326 audit(194.060:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3439 comm="syz.0.9" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb1b49728 code=0x7ffc0000 [ 196.655680][ T3444] xt_limit: Overflow, try lower: 0/0 [ 196.822444][ T3444] devtmpfs: Unknown parameter 'posixacl' [ 203.379428][ T3448] netlink: 28 bytes leftover after parsing attributes in process `syz.1.11'. [ 207.652165][ T30] audit: type=1400 audit(207.400:122): avc: denied { create } for pid=3451 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 207.698827][ T30] audit: type=1400 audit(207.430:123): avc: denied { bind } for pid=3451 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 207.699664][ T30] audit: type=1400 audit(207.430:124): avc: denied { listen } for pid=3451 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 207.700337][ T30] audit: type=1400 audit(207.430:125): avc: denied { accept } for pid=3451 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 213.021948][ T30] audit: type=1400 audit(212.770:126): avc: denied { read write } for pid=3461 comm="syz.0.15" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 213.038730][ T30] audit: type=1400 audit(212.790:127): avc: denied { open } for pid=3461 comm="syz.0.15" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 213.371789][ T3464] netlink: 28 bytes leftover after parsing attributes in process `syz.1.16'. [ 213.835752][ T30] audit: type=1400 audit(213.590:128): avc: denied { name_bind } for pid=3467 comm="syz.1.18" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 213.836751][ T30] audit: type=1400 audit(213.590:129): avc: denied { node_bind } for pid=3467 comm="syz.1.18" saddr=::ffff:172.20.20.170 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 213.880809][ T30] audit: type=1400 audit(213.630:130): avc: denied { read } for pid=3467 comm="syz.1.18" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 213.882418][ T30] audit: type=1400 audit(213.630:131): avc: denied { open } for pid=3467 comm="syz.1.18" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 218.499491][ T3479] netlink: 28 bytes leftover after parsing attributes in process `syz.0.22'. [ 220.699126][ T30] audit: type=1400 audit(220.450:132): avc: denied { read write } for pid=3487 comm="syz.1.25" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 220.703018][ T30] audit: type=1400 audit(220.450:133): avc: denied { open } for pid=3487 comm="syz.1.25" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 221.848848][ T30] audit: type=1400 audit(221.600:134): avc: denied { ioctl } for pid=3487 comm="syz.1.25" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4590 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 227.037185][ T3492] netlink: 4 bytes leftover after parsing attributes in process `syz.0.26'. [ 227.056475][ T3492] netlink: 4 bytes leftover after parsing attributes in process `syz.0.26'. [ 230.307333][ T3496] netlink: 4 bytes leftover after parsing attributes in process `syz.0.26'. [ 250.348535][ T3507] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 250.407968][ T30] audit: type=1400 audit(250.060:135): avc: denied { create } for pid=3503 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 250.424883][ T30] audit: type=1400 audit(250.060:136): avc: denied { setopt } for pid=3503 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 250.428429][ T30] audit: type=1400 audit(250.110:137): avc: denied { ioctl } for pid=3503 comm="syz.0.28" path="socket:[4147]" dev="sockfs" ino=4147 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 250.447749][ T30] audit: type=1400 audit(250.110:138): avc: denied { bind } for pid=3503 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 252.012180][ T30] audit: type=1400 audit(251.760:139): avc: denied { mount } for pid=3509 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 258.481992][ T30] audit: type=1400 audit(258.210:140): avc: denied { write } for pid=3518 comm="syz.0.30" name="rt_cache" dev="proc" ino=4026532646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 260.192715][ T3528] netlink: 4 bytes leftover after parsing attributes in process `syz.0.30'. [ 262.481166][ T3509] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 262.522381][ T3509] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 266.788998][ T3509] hsr_slave_0: entered promiscuous mode [ 266.835340][ T3509] hsr_slave_1: entered promiscuous mode [ 266.884711][ T3509] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 266.885295][ T3509] Cannot create hsr debugfs directory [ 269.607990][ T477] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 269.959906][ T477] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.238984][ T477] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.474788][ T477] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 271.404034][ T30] audit: type=1400 audit(271.150:141): avc: denied { read } for pid=3122 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 274.709409][ T477] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 274.789571][ T477] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 274.879452][ T477] bond0 (unregistering): Released all slaves [ 275.326808][ T477] hsr_slave_0: left promiscuous mode [ 275.376630][ T477] hsr_slave_1: left promiscuous mode [ 275.543009][ T477] veth1_macvtap: left promiscuous mode [ 275.558477][ T477] veth0_macvtap: left promiscuous mode [ 275.559622][ T477] veth1_vlan: left promiscuous mode [ 275.560851][ T477] veth0_vlan: left promiscuous mode [ 283.535577][ T3509] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 283.608172][ T3509] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 283.659433][ T3509] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 283.722817][ T3509] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 286.379283][ T3509] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.162580][ T3509] veth0_vlan: entered promiscuous mode [ 294.208344][ T3509] veth1_vlan: entered promiscuous mode [ 294.423045][ T3509] veth0_macvtap: entered promiscuous mode [ 294.452504][ T3509] veth1_macvtap: entered promiscuous mode [ 294.614138][ T3509] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.615322][ T3509] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.615696][ T3509] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.616054][ T3509] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.886038][ T30] audit: type=1400 audit(294.590:142): avc: denied { mounton } for pid=3509 comm="syz-executor" path="/syzkaller.DPyxyo/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 294.886859][ T30] audit: type=1400 audit(294.600:143): avc: denied { mounton } for pid=3509 comm="syz-executor" path="/syzkaller.DPyxyo/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 315.982631][ T37] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.381269][ T37] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.709812][ T37] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.999472][ T37] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.988182][ T37] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 324.108612][ T37] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 324.168181][ T37] bond0 (unregistering): Released all slaves [ 324.532305][ T37] hsr_slave_0: left promiscuous mode [ 324.596271][ T37] hsr_slave_1: left promiscuous mode [ 324.821723][ T37] veth1_macvtap: left promiscuous mode [ 324.822653][ T37] veth0_macvtap: left promiscuous mode [ 324.839225][ T37] veth1_vlan: left promiscuous mode [ 324.840277][ T37] veth0_vlan: left promiscuous mode [ 331.945785][ T30] audit: type=1400 audit(331.690:144): avc: denied { setopt } for pid=3670 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 336.660324][ T3631] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 336.741688][ T3631] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 341.347533][ T3631] hsr_slave_0: entered promiscuous mode [ 341.408822][ T3631] hsr_slave_1: entered promiscuous mode [ 344.419148][ T3631] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 344.468296][ T3631] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 344.499381][ T3631] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 344.525312][ T3631] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 347.619125][ T3631] 8021q: adding VLAN 0 to HW filter on device bond0 [ 353.852406][ T30] audit: type=1400 audit(353.600:145): avc: denied { read } for pid=3748 comm="syz.1.44" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 353.855279][ T30] audit: type=1400 audit(353.610:146): avc: denied { open } for pid=3748 comm="syz.1.44" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 359.697498][ T3631] veth0_vlan: entered promiscuous mode [ 359.752594][ T3631] veth1_vlan: entered promiscuous mode [ 359.936480][ T3631] veth0_macvtap: entered promiscuous mode [ 360.046057][ T3631] veth1_macvtap: entered promiscuous mode [ 361.663008][ T30] audit: type=1400 audit(360.670:147): avc: denied { connect } for pid=3765 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 362.206563][ T3631] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.207457][ T3631] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.208206][ T3631] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.208954][ T3631] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 389.816074][ T30] audit: type=1400 audit(389.570:148): avc: denied { mounton } for pid=3795 comm="syz.1.51" path="/15/file0" dev="tmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 390.552723][ T30] audit: type=1400 audit(390.300:149): avc: denied { mounton } for pid=3797 comm="syz.0.52" path="/proc/10/task" dev="proc" ino=5709 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 390.609866][ T3798] EXT4-fs (vda): resizing filesystem from 262144 to 262144 blocks [ 391.245126][ T30] audit: type=1400 audit(390.960:150): avc: denied { unmount } for pid=3509 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 402.468107][ T3817] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 402.572013][ T30] audit: type=1400 audit(402.320:151): avc: denied { name_bind } for pid=3815 comm="syz.1.57" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 403.581323][ T3823] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 403.590153][ T30] audit: type=1400 audit(403.340:152): avc: denied { read } for pid=3077 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 403.594188][ T30] audit: type=1400 audit(403.340:153): avc: denied { append } for pid=3077 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 403.596414][ T30] audit: type=1400 audit(403.350:154): avc: denied { open } for pid=3077 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 403.598784][ T30] audit: type=1400 audit(403.350:155): avc: denied { getattr } for pid=3077 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 403.691186][ T3823] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 405.246745][ T30] audit: type=1400 audit(404.990:156): avc: denied { create } for pid=3816 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 413.096247][ T30] audit: type=1400 audit(412.500:157): avc: denied { read } for pid=3828 comm="syz.0.60" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 413.107520][ T30] audit: type=1400 audit(412.860:158): avc: denied { open } for pid=3828 comm="syz.0.60" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 413.131768][ T30] audit: type=1400 audit(412.860:159): avc: denied { ioctl } for pid=3828 comm="syz.0.60" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 418.668843][ T30] audit: type=1400 audit(418.420:160): avc: denied { create } for pid=3833 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 419.276335][ T30] audit: type=1400 audit(419.000:161): avc: denied { create } for pid=3833 comm="syz.0.61" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 419.317764][ T30] audit: type=1400 audit(419.070:162): avc: denied { ioctl } for pid=3833 comm="syz.0.61" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4984 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 431.544497][ T3845] serio: Serial port ptm0 [ 432.458828][ T30] audit: type=1400 audit(432.210:163): avc: denied { create } for pid=3850 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 432.464659][ T30] audit: type=1400 audit(432.210:164): avc: denied { write } for pid=3850 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 432.782074][ T30] audit: type=1400 audit(432.530:165): avc: denied { getopt } for pid=3853 comm="syz.0.66" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 433.730706][ T30] audit: type=1400 audit(433.480:166): avc: denied { prog_run } for pid=3858 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 433.796241][ T3859] netlink: 4 bytes leftover after parsing attributes in process `syz.0.69'. [ 434.564845][ T3348] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 434.745416][ T3348] usb 1-1: Using ep0 maxpacket: 16 [ 434.772449][ T3348] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 434.774078][ T3348] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 434.774663][ T3348] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 434.775240][ T3348] usb 1-1: New USB device found, idVendor=1e7d, idProduct=2e22, bcdDevice= 0.00 [ 434.775763][ T3348] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 434.804480][ T3348] usb 1-1: config 0 descriptor?? [ 440.419530][ T3348] usbhid 1-1:0.0: can't add hid device: -32 [ 440.422308][ T3348] usbhid 1-1:0.0: probe with driver usbhid failed with error -32 [ 452.312468][ T29] usb 1-1: USB disconnect, device number 3 [ 452.782293][ T30] audit: type=1400 audit(452.530:167): avc: denied { unmount } for pid=3631 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 469.565291][ T3405] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 469.737116][ T3405] usb 1-1: Using ep0 maxpacket: 32 [ 469.802465][ T3405] usb 1-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 469.816219][ T3405] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 469.816916][ T3405] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 469.968300][ T3405] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 469.968895][ T3405] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 469.969366][ T3405] usb 1-1: Product: syz [ 469.969669][ T3405] usb 1-1: Manufacturer: syz [ 469.969973][ T3405] usb 1-1: SerialNumber: syz [ 475.858554][ T3405] usb 1-1: 0:2 : does not exist [ 485.028351][ T3615] usb 1-1: USB disconnect, device number 4 [ 496.636638][ T30] audit: type=1400 audit(496.390:168): avc: denied { bind } for pid=3931 comm="syz.1.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 496.637649][ T30] audit: type=1400 audit(496.390:169): avc: denied { name_bind } for pid=3931 comm="syz.1.86" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 496.638453][ T30] audit: type=1400 audit(496.390:170): avc: denied { node_bind } for pid=3931 comm="syz.1.86" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 500.065654][ T30] audit: type=1400 audit(499.650:171): avc: denied { bind } for pid=3933 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 500.069431][ T30] audit: type=1400 audit(499.670:172): avc: denied { getopt } for pid=3933 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 505.459145][ T30] audit: type=1400 audit(505.190:173): avc: denied { create } for pid=3941 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 505.460195][ T30] audit: type=1400 audit(505.190:174): avc: denied { write } for pid=3941 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 569.647287][ T3993] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 569.672806][ T3993] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 570.211489][ T1806] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 570.464810][ T1806] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 570.728627][ T1806] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 570.910261][ T1806] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 574.369564][ T1806] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 574.435267][ T1806] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 574.510140][ T1806] bond0 (unregistering): Released all slaves [ 574.770159][ T1806] hsr_slave_0: left promiscuous mode [ 574.817393][ T30] audit: type=1400 audit(574.570:175): avc: denied { mounton } for pid=4032 comm="syz.0.105" path="/proc/91/cgroup" dev="proc" ino=6306 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 574.822563][ T1806] hsr_slave_1: left promiscuous mode [ 575.000179][ T1806] veth1_macvtap: left promiscuous mode [ 575.000945][ T1806] veth0_macvtap: left promiscuous mode [ 575.009020][ T1806] veth1_vlan: left promiscuous mode [ 575.009831][ T1806] veth0_vlan: left promiscuous mode [ 581.170483][ T3993] hsr_slave_0: entered promiscuous mode [ 581.225918][ T3993] hsr_slave_1: entered promiscuous mode [ 581.275002][ T3993] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 581.275551][ T3993] Cannot create hsr debugfs directory [ 583.632902][ T3993] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 583.688520][ T3993] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 583.722058][ T3993] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 583.770833][ T3993] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 585.989876][ T3993] 8021q: adding VLAN 0 to HW filter on device bond0 [ 593.785184][ T3993] veth0_vlan: entered promiscuous mode [ 593.984126][ T3993] veth1_vlan: entered promiscuous mode [ 594.331430][ T3993] veth0_macvtap: entered promiscuous mode [ 594.378191][ T3993] veth1_macvtap: entered promiscuous mode [ 594.597690][ T3993] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 594.599443][ T3993] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 594.600230][ T3993] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 594.601073][ T3993] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 595.229901][ T30] audit: type=1400 audit(594.880:176): avc: denied { mount } for pid=3993 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 595.257121][ T30] audit: type=1400 audit(594.990:177): avc: denied { mounton } for pid=3993 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 599.749145][ T4103] netlink: 16 bytes leftover after parsing attributes in process `syz.1.109'. [ 599.750120][ T4103] netlink: 4 bytes leftover after parsing attributes in process `syz.1.109'. [ 607.356275][ T30] audit: type=1400 audit(607.110:178): avc: denied { create } for pid=4118 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 607.370348][ T30] audit: type=1400 audit(607.120:179): avc: denied { bind } for pid=4118 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 607.380188][ T30] audit: type=1400 audit(607.130:180): avc: denied { connect } for pid=4118 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 607.504928][ T30] audit: type=1400 audit(607.250:181): avc: denied { write } for pid=4118 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 609.251542][ T30] audit: type=1400 audit(609.000:182): avc: denied { setopt } for pid=4123 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 609.975304][ T30] audit: type=1400 audit(609.730:183): avc: denied { getopt } for pid=4125 comm="syz.0.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 614.826608][ T30] audit: type=1400 audit(614.580:184): avc: denied { read } for pid=4152 comm="syz.0.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 623.432234][ T4207] netlink: 16410 bytes leftover after parsing attributes in process `syz.0.148'. [ 626.349258][ T4227] netlink: 4031 bytes leftover after parsing attributes in process `syz.1.158'. [ 630.747749][ T30] audit: type=1400 audit(630.490:185): avc: denied { create } for pid=4247 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 634.936489][ T30] audit: type=1400 audit(634.670:186): avc: denied { read } for pid=4268 comm="syz.0.176" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 634.937939][ T30] audit: type=1400 audit(634.670:187): avc: denied { open } for pid=4268 comm="syz.0.176" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 634.960814][ T30] audit: type=1400 audit(634.710:188): avc: denied { ioctl } for pid=4268 comm="syz.0.176" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 635.437074][ T30] audit: type=1400 audit(635.180:189): avc: denied { read } for pid=4271 comm="syz.0.178" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 635.445794][ T30] audit: type=1400 audit(635.190:190): avc: denied { open } for pid=4271 comm="syz.0.178" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 635.515487][ T30] audit: type=1400 audit(635.260:191): avc: denied { ioctl } for pid=4271 comm="syz.0.178" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 635.566637][ T30] audit: type=1400 audit(635.310:192): avc: denied { set_context_mgr } for pid=4271 comm="syz.0.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 635.641245][ T4272] binder: 4271:4272 BC_REQUEST_DEATH_NOTIFICATION death notification already set [ 637.909371][ T30] audit: type=1400 audit(637.660:193): avc: denied { create } for pid=4276 comm="syz.0.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 638.107034][ T30] audit: type=1400 audit(637.860:194): avc: denied { write } for pid=4276 comm="syz.0.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 638.115792][ T30] audit: type=1400 audit(637.860:195): avc: denied { nlmsg_read } for pid=4276 comm="syz.0.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 638.131616][ T30] audit: type=1400 audit(637.880:196): avc: denied { create } for pid=4276 comm="syz.0.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 638.252207][ T30] audit: type=1400 audit(638.000:197): avc: denied { create } for pid=4270 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 638.258572][ T30] audit: type=1400 audit(638.010:198): avc: denied { bind } for pid=4270 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 638.792177][ T30] audit: type=1400 audit(638.530:199): avc: denied { setopt } for pid=4270 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 648.205329][ T30] audit: type=1400 audit(647.950:200): avc: denied { accept } for pid=4290 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 648.265024][ T30] audit: type=1400 audit(648.010:201): avc: denied { write } for pid=4290 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 648.925012][ T30] audit: type=1400 audit(648.660:202): avc: denied { name_bind } for pid=4292 comm="syz.1.185" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 648.927098][ T30] audit: type=1400 audit(648.660:203): avc: denied { node_bind } for pid=4292 comm="syz.1.185" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 649.015723][ T30] audit: type=1400 audit(648.760:204): avc: denied { name_connect } for pid=4292 comm="syz.1.185" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 663.270391][ T4304] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 666.311994][ T4309] loop2: detected capacity change from 0 to 7 [ 690.550090][ T30] audit: type=1400 audit(690.300:205): avc: denied { create } for pid=4335 comm="syz.1.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 691.418396][ T4096] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 691.688046][ T4096] usb 1-1: Using ep0 maxpacket: 16 [ 691.815563][ T4096] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xF3, changing to 0x83 [ 691.817345][ T4096] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 691.905230][ T4096] usb 1-1: New USB device found, idVendor=2040, idProduct=0264, bcdDevice=4e.d1 [ 691.906771][ T4096] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 691.907557][ T4096] usb 1-1: Product: syz [ 691.908274][ T4096] usb 1-1: Manufacturer: syz [ 691.909001][ T4096] usb 1-1: SerialNumber: syz [ 692.022358][ T4096] usb 1-1: config 0 descriptor?? [ 696.910949][ T4349] EXT4-fs warning (device vda): verify_group_input:136: Cannot add at group 63 (only 8 groups) [ 703.172763][ T3888] usb 1-1: USB disconnect, device number 5 [ 704.687175][ T30] audit: type=1400 audit(704.440:206): avc: denied { unmount } for pid=3631 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 707.189011][ T30] audit: type=1400 audit(706.940:207): avc: denied { bind } for pid=4358 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 707.218131][ T30] audit: type=1400 audit(706.970:208): avc: denied { shutdown } for pid=4358 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 707.227332][ T30] audit: type=1400 audit(706.970:209): avc: denied { read } for pid=4358 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 710.261114][ T30] audit: type=1400 audit(710.010:210): avc: denied { write } for pid=4365 comm="syz.1.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 710.289289][ T30] audit: type=1400 audit(710.040:211): avc: denied { read } for pid=4365 comm="syz.1.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 710.969958][ T4367] netlink: 'syz.1.207': attribute type 9 has an invalid length. [ 752.585961][ T30] audit: type=1400 audit(752.330:212): avc: denied { create } for pid=4420 comm="syz.1.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 755.240706][ T30] audit: type=1400 audit(754.070:213): avc: denied { read write } for pid=4420 comm="syz.1.223" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 755.242577][ T30] audit: type=1400 audit(754.070:214): avc: denied { open } for pid=4420 comm="syz.1.223" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 755.256540][ T30] audit: type=1400 audit(754.090:215): avc: denied { ioctl } for pid=4420 comm="syz.1.223" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0xaf02 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 766.127950][ T4436] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 766.236866][ T4436] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 766.308560][ T30] audit: type=1400 audit(766.050:216): avc: denied { sqpoll } for pid=4435 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 850.196969][ T4566] netlink: 'syz.1.269': attribute type 1 has an invalid length. [ 850.624567][ T4568] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 850.675942][ T4568] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 852.167218][ T30] audit: type=1400 audit(851.910:217): avc: denied { create } for pid=4572 comm="syz.1.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 853.468304][ T4579] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 853.525894][ T4579] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 863.762448][ T30] audit: type=1400 audit(863.510:218): avc: denied { map } for pid=4582 comm="syz.0.274" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8227 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 863.775313][ T30] audit: type=1400 audit(863.520:219): avc: denied { read write } for pid=4582 comm="syz.0.274" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8227 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 864.935462][ T30] audit: type=1400 audit(864.680:220): avc: denied { ioctl } for pid=4588 comm="syz.0.276" path="socket:[8129]" dev="sockfs" ino=8129 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 882.124369][ T30] audit: type=1326 audit(881.860:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4628 comm="syz.0.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8b549728 code=0x7ffc0000 [ 882.132492][ T30] audit: type=1326 audit(881.880:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4628 comm="syz.0.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8b549728 code=0x7ffc0000 [ 882.145415][ T30] audit: type=1326 audit(881.890:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4628 comm="syz.0.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=220 compat=0 ip=0xffff8b549728 code=0x7ffc0000 [ 882.187865][ T30] audit: type=1326 audit(881.940:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4628 comm="syz.0.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8b549728 code=0x7ffc0000 [ 882.190775][ T30] audit: type=1326 audit(881.940:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4628 comm="syz.0.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8b549728 code=0x7ffc0000 [ 882.206106][ T30] audit: type=1326 audit(881.960:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4628 comm="syz.0.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8b549728 code=0x7ffc0000 [ 883.249733][ T30] audit: type=1326 audit(883.000:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4628 comm="syz.0.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8b549728 code=0x7ffc0000 [ 883.251941][ T30] audit: type=1326 audit(883.000:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4628 comm="syz.0.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8b549728 code=0x7ffc0000 [ 883.276193][ T30] audit: type=1326 audit(883.020:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4630 comm="syz.0.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=115 compat=0 ip=0xffff8b574818 code=0x7ffc0000 [ 884.337881][ T30] audit: type=1326 audit(884.070:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4628 comm="syz.0.286" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8b549728 code=0x7ffc0000 [ 884.346149][ T4629] ptrace attach of "/syz-executor exec"[4630] was attempted by "/syz-executor exec"[4629] [ 892.207092][ T10] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 892.415041][ T10] usb 1-1: Using ep0 maxpacket: 32 [ 892.469416][ T10] usb 1-1: config index 0 descriptor too short (expected 29220, got 36) [ 892.470432][ T10] usb 1-1: config 0 has too many interfaces: 81, using maximum allowed: 32 [ 892.471178][ T10] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 81 [ 892.472168][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 892.473198][ T10] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 892.485767][ T10] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 892.486935][ T10] usb 1-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 892.487649][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 892.959413][ T10] usb 1-1: config 0 descriptor?? [ 893.825147][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 893.825356][ T30] audit: type=1400 audit(893.280:251): avc: denied { read } for pid=4651 comm="syz.1.289" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 893.826506][ T30] audit: type=1400 audit(893.300:252): avc: denied { open } for pid=4651 comm="syz.1.289" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 893.827563][ T30] audit: type=1400 audit(893.330:253): avc: denied { ioctl } for pid=4651 comm="syz.1.289" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 896.217867][ T10] usblp 1-1:0.0: usblp0: USB Bidirectional printer dev 6 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 896.391510][ T10] usb 1-1: USB disconnect, device number 6 [ 896.761605][ T10] usblp0: removed [ 905.037860][ T30] audit: type=1400 audit(904.790:254): avc: denied { create } for pid=4667 comm="syz.1.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 933.895128][ T30] audit: type=1400 audit(933.610:255): avc: denied { getopt } for pid=4697 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 955.186505][ T30] audit: type=1400 audit(954.940:256): avc: denied { bind } for pid=4733 comm="syz.0.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 979.606048][ T4775] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 979.659622][ T4775] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 989.197161][ T30] audit: type=1400 audit(988.830:257): avc: denied { setopt } for pid=4777 comm="syz.1.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1028.392157][ T3888] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 1028.876482][ T3888] usb 1-1: New USB device found, idVendor=1d50, idProduct=606f, bcdDevice= 0.00 [ 1028.877132][ T3888] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1028.906305][ T3888] usb 1-1: config 0 descriptor?? [ 1029.446937][ T3888] gs_usb 1-1:0.0: Configuring for 1 interfaces [ 1029.691404][ T3888] gs_usb 1-1:0.0: Couldn't register candev for channel 0 (-EINVAL) [ 1029.791749][ T3888] gs_usb 1-1:0.0: probe with driver gs_usb failed with error -22 [ 1029.960553][ T3888] usb 1-1: USB disconnect, device number 7 [ 1050.188225][ T4874] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 [ 1050.190021][ T4874] Mem abort info: [ 1050.190389][ T4874] ESR = 0x0000000086000006 [ 1050.190834][ T4874] EC = 0x21: IABT (current EL), IL = 32 bits [ 1050.191433][ T4874] SET = 0, FnV = 0 [ 1050.192307][ T4874] EA = 0, S1PTW = 0 [ 1050.227012][ T4874] FSC = 0x06: level 2 translation fault [ 1050.227692][ T4874] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000055ffd000 [ 1050.228090][ T4874] [0000000000000000] pgd=080000005a132003, p4d=080000005a132003, pud=0800000057d06003, pmd=0000000000000000 [ 1050.231971][ T4874] Internal error: Oops: 0000000086000006 [#1] PREEMPT SMP [ 1050.232852][ T4874] Modules linked in: [ 1050.234535][ T4874] CPU: 1 UID: 0 PID: 4874 Comm: syz.0.348 Not tainted 6.11.0-syzkaller-08481-g88264981f208 #0 [ 1050.235316][ T4874] Hardware name: linux,dummy-virt (DT) [ 1050.236243][ T4874] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1050.236959][ T4874] pc : 0x0 [ 1050.238554][ T4874] lr : filemap_read_folio+0xac/0x1f8 [ 1050.239797][ T4874] sp : ffff80008fcb7760 [ 1050.240019][ T4874] x29: ffff80008fcb7760 x28: 00000000ffffffff x27: 0000000000080001 [ 1050.240489][ T4874] x26: 1fffe00001b96869 x25: ffff000012bef6c0 x24: dfff800000000000 [ 1050.240879][ T4874] x23: 0000000000000000 x22: 1ffff00011f96ef4 x21: ffff000012bef6c0 [ 1050.241214][ T4874] x20: fffffdffc0804200 x19: fffffdffc0804200 x18: 00000000d4e7d5d4 [ 1050.241544][ T4874] x17: 0000000000000000 x16: 0000000000000000 x15: ffff0000133e8a80 [ 1050.241894][ T4874] x14: 1fffe0000267d14f x13: 1fffe0000267d15e x12: ffff70001194ea71 [ 1050.242223][ T4874] x11: 1ffff0001194ea70 x10: ffff70001194ea70 x9 : dfff800000000000 [ 1050.242624][ T4874] x8 : 0000000000000003 x7 : 0000000041b58ab3 x6 : ffff700011f96ef4 [ 1050.242961][ T4874] x5 : 00000000f1f1f1f1 x4 : 00000000f3f3f300 x3 : ffff0000133e8000 [ 1050.243517][ T4874] x2 : 1fffffbff8100841 x1 : fffffdffc0804200 x0 : ffff000012bef6c0 [ 1050.244154][ T4874] Call trace: [ 1050.244353][ T4874] 0x0 [ 1050.244566][ T4874] do_read_cache_folio+0x1c0/0x47c [ 1050.244835][ T4874] read_cache_folio+0x44/0x6c [ 1050.245039][ T4874] freader_get_folio+0x210/0x6a0 [ 1050.245259][ T4874] freader_fetch+0x90/0x47c [ 1050.245454][ T4874] __build_id_parse.isra.0+0xec/0x5ac [ 1050.245670][ T4874] build_id_parse+0x38/0x58 [ 1050.245863][ T4874] do_procmap_query+0xab4/0xdf0 [ 1050.246066][ T4874] procfs_procmap_ioctl+0x68/0xa4 [ 1050.246266][ T4874] __arm64_sys_ioctl+0x124/0x190 [ 1050.246467][ T4874] invoke_syscall+0x6c/0x258 [ 1050.246671][ T4874] el0_svc_common.constprop.0+0xac/0x230 [ 1050.246972][ T4874] do_el0_svc+0x40/0x58 [ 1050.247333][ T4874] el0_svc+0x50/0x180 [ 1050.247745][ T4874] el0t_64_sync_handler+0x100/0x12c [ 1050.248176][ T4874] el0t_64_sync+0x190/0x194 [ 1050.249267][ T4874] Code: ???????? ???????? ???????? ???????? (????????) [ 1050.251009][ T4874] ---[ end trace 0000000000000000 ]--- [ 1050.252441][ T4874] Kernel panic - not syncing: Oops: Fatal exception [ 1050.254011][ T4874] SMP: stopping secondary CPUs [ 1050.255216][ T4874] Kernel Offset: disabled [ 1050.255439][ T4874] CPU features: 0x08,80002003,40200000,0200421b [ 1050.255994][ T4874] Memory Limit: none [ 1050.256479][ T4874] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:02:29 Registers: info registers vcpu 0 CPU#0 PC=ffff800085198534 X00=ffff800085198530 X01=0000000000000003 X02=0000000000000000 X03=1fffe00001f6bb41 X04=0000000000000000 X05=0000000000000000 X06=1ffff00010d7bf78 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700010000d0a X11=1ffff00010000d0a X12=ffff700010000d0b X13=1fffe00001f6bcb2 X14=1fffe00001f6bc8f X15=ffff00000fb5e480 X16=0000000000000000 X17=32065c1cac19a851 X18=00000000ce67bce4 X19=ffff800086e15330 X20=ffff800086e15300 X21=0000000000000000 X22=0000000000000004 X23=0000000000000028 X24=ffff800086e15330 X25=ffff800086bdf000 X26=ffff000011d327a0 X27=0000000000000001 X28=ffff000069fcf000 X29=ffff800080006750 X30=ffff800085196d04 SP=ffff800080006750 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0200000000000000:0200000000000000 Q01=0000000200000000:0000000000000000 Q02=0000000000000002:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000002:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd4509520:0000ffffd4509520 Q17=ffffff80ffffffd0:0000ffffd45094f0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800083b49110 X00=000000000000000b X01=ffff000069fd3fc0 X02=ffff7fffe3438000 X03=1fffe0000d3f91b9 X04=00000000f204f1f1 X05=ffff7000119aefd8 X06=dfff800000000000 X07=00000000f1f1f1f1 X08=ffff800086bdfbc8 X09=0ac0d5affe09d4ff X10=1ffff000110aa184 X11=0000000000000001 X12=1fffe0000d3f742c X13=1fffe0000267d168 X14=1fffe0000267d14f X15=ffff0000133e8a80 X16=ffff80008cd70000 X17=ffff7fffe3438000 X18=00000000ffffffff X19=ffff00000d437800 X20=ffff800083b49110 X21=ffff00000d897b00 X22=ffff800085528f40 X23=000000000000000b X24=ffff80008524d320 X25=ffff7fffe3438000 X26=ffff0000133e8008 X27=ffff0000133e8000 X28=ffff60000267d001 X29=ffff80008cd77f20 X30=ffff80008033ef94 SP=ffff80008cd77f20 PSTATE=000000c5 ---- EL1h FPCR=00000000 FPSR=00000000 Q00=0200000000000000:0200000000000000 Q01=0000000200000000:0000000000000000 Q02=0000000000000002:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000002:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd4509520:0000ffffd4509520 Q17=ffffff80ffffffd0:0000ffffd45094f0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000