last executing test programs: 16m38.780437238s ago: executing program 1 (id=134): bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) lsetxattr$security_selinux(&(0x7f0000000900)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000940), &(0x7f0000000980)='system_u:object_r:netutils_exec_t:s0\x00', 0xf, 0x0) 16m38.532890229s ago: executing program 1 (id=135): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xb2570000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x2000000}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sched_setaffinity(r1, 0x8, &(0x7f0000000000)=0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='sched_switch\x00', r5}, 0xe) read$FUSE(r0, &(0x7f0000000200)={0x2020}, 0x2020) mount(&(0x7f0000000300), 0x0, &(0x7f0000000180)='devtmpfs\x00', 0x2200892, 0x0) pread64(0xffffffffffffffff, &(0x7f0000002240)=""/237, 0xed, 0x4eb) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f00000000c0)}, 0x20) 16m12.900533119s ago: executing program 1 (id=147): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x18) personality(0xfe47fef9f5ff7379) 16m12.719182542s ago: executing program 1 (id=148): bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) 16m12.472387243s ago: executing program 1 (id=149): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x6, 0x4, 0x104, 0xc}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18040000000000000000000000400000850000000800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) 16m12.219790465s ago: executing program 1 (id=150): prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x5e}, {@in6=@loopback, 0x4d4, 0x32}, @in=@dev, {0xfffffffffffffffd}, {0x0, 0x200000000, 0x0, 0x100000}, {0x0, 0x0, 0x2}, 0x70bd2a, 0x0, 0x2, 0x4}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, "ab"}}]}, 0x13c}, 0x1, 0x0, 0x0, 0x20000011}, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) writev(0xffffffffffffffff, 0x0, 0x0) 15m26.551417625s ago: executing program 32 (id=150): prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x5e}, {@in6=@loopback, 0x4d4, 0x32}, @in=@dev, {0xfffffffffffffffd}, {0x0, 0x200000000, 0x0, 0x100000}, {0x0, 0x0, 0x2}, 0x70bd2a, 0x0, 0x2, 0x4}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, "ab"}}]}, 0x13c}, 0x1, 0x0, 0x0, 0x20000011}, 0x0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) writev(0xffffffffffffffff, 0x0, 0x0) 14m38.722086389s ago: executing program 0 (id=211): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7b, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2004c7f9, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000700)="0c268a927f1f6588b967481241ba78600a34f65ac618ded8974895abeaf4b4834ff959bcecc7a95425a3a07e758044ab4ea6f7c555d88fecf90b037511bf746bec66ba", 0x994b6e03113064ae, 0x0, 0x0, 0x0) 14m36.011502822s ago: executing program 0 (id=215): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xb, &(0x7f0000001880)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000200000850000007000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip_vti0\x00', 0x0}) r3 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r3, &(0x7f00000001c0)={&(0x7f0000000800)={0x1d, r2}, 0x10, &(0x7f0000000880)={&(0x7f0000000180)=@can={{0x2, 0x1}, 0x6, 0x3, 0x0, 0x0, "a2caa0cfd0000043"}, 0x10}}, 0x4000815) 14m35.458295582s ago: executing program 0 (id=216): r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x7995}, 0xfff7, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) 14m35.08167446s ago: executing program 0 (id=218): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) statfs(&(0x7f0000000040)='./file0\x00', 0x0) 14m34.870461617s ago: executing program 0 (id=219): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c4300000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 14m34.540439099s ago: executing program 0 (id=220): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x4, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) socket$key(0xf, 0x3, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x24040004}, 0x20000000) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x118) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000004000000000000000010000851000000600000018020000", @ANYRES32, @ANYBLOB="0000000000000000660002000000ffb0180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 13m49.431003923s ago: executing program 33 (id=220): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x4, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) socket$key(0xf, 0x3, 0x2) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x24040004}, 0x20000000) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x118) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000004000000000000000010000851000000600000018020000", @ANYRES32, @ANYBLOB="0000000000000000660002000000ffb0180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) 5.799782031s ago: executing program 2 (id=1194): mknod(&(0x7f0000000080)='./file0\x00', 0x8000, 0x77b) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='btrfs\x00', 0x0, 0x0) 5.64214524s ago: executing program 2 (id=1195): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@newqdisc={0x38, 0x24, 0xd0f, 0x3, 0x0, {0x60, 0x0, 0x0, r1, {0x0, 0x3}, {0xffff, 0xffff}, {0x4}}, [@qdisc_kind_options=@q_pie={{0x8}, {0xc, 0x2, [@TCA_PIE_BYTEMODE={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x1d4}, 0x8840) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) 5.540051434s ago: executing program 2 (id=1196): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000000)='./cgroup\x00', &(0x7f0000000100)='adfs\x00', 0x200013, 0x0) 5.462954563s ago: executing program 2 (id=1197): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='afs_call\x00', r0}, 0x18) unshare(0x68040200) 5.288500395s ago: executing program 2 (id=1198): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x9}]}, 0x24}}, 0x20000800) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000010c0)={0x24, r1, 0x5, 0x4, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_BEACON_INTERVAL={0x8}]}, 0x24}}, 0x0) 3.89775295s ago: executing program 2 (id=1200): r0 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f00000008c0), 0x1, 0x400) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f00000001c0)={0x0, &(0x7f00000000c0)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000d40)={0x0, 0x0, r2, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000340)={r3, 0x40000005, 0x3, 0x0, 0x1, [0x0], [0x4, 0x7, 0x77], [0x7, 0x80000002, 0x2, 0x7], [0x0, 0x0, 0x1, 0xfff]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000140)={0x3ff, 0x2, 0x806}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000080)={r4, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000300)={0x0, 0x0, r5}) 2.007758788s ago: executing program 3 (id=1205): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000580)='W', 0xfffffffffffffd3d, 0x10008095, 0x0, 0x0) getsockopt$MRT(r0, 0x0, 0xcf, 0x0, &(0x7f0000000100)) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x0, 0x32, 0x0, 0xffffd000) 1.681003829s ago: executing program 3 (id=1206): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x568, 0x2e0, 0xd0, 0x2e0, 0xd0, 0xd0, 0x5a0, 0x5a0, 0x5a0, 0x5a0, 0x5a0, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x5}}}, {{@ipv6={@mcast1, @local, [], [], 'macvtap0\x00', 'ip6tnl0\x00', {}, {}, 0x11}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@broadcast}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_team\x00', 'syzkaller0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@unspec=@connmark={{0x30}}, @common=@inet=@socket1={{0x28}}]}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@DSCP={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@dev}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5c8) 1.43023157s ago: executing program 3 (id=1207): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x108) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='huge=always,huge=within_size,nr_blocks=5']) chdir(&(0x7f0000000380)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) fstat(r0, &(0x7f0000000580)) 1.130558238s ago: executing program 3 (id=1208): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180), 0x800, 0x0) r1 = syz_io_uring_setup(0xd2, &(0x7f0000000480)={0x0, 0x0, 0x100, 0x0, 0x335}, &(0x7f0000000080)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r0, 0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000001800)=""/200, 0xc8}], 0x1}) io_uring_enter(r1, 0x47ba, 0x636d, 0x0, 0x0, 0x0) 762.115214ms ago: executing program 3 (id=1209): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000280)={0x14, r1, 0x79f70b28a21117bf, 0x70bd2b, 0x25dfdbfc}, 0x14}}, 0x4000050) 0s ago: executing program 3 (id=1210): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f0000000180)={'8255\x00', [0xa4, 0x1000405, 0xc, 0x401, 0x6, 0xcc7, 0xfff, 0x5c952395, 0x3, 0x3fe, 0x802, 0x1600, 0x1, 0x1, 0x9, 0xe1cb, 0x6, 0x4, 0x3, 0x400, 0x80000089, 0xfffffffd, 0x32, 0x3562, 0xffffeadb, 0x1, 0x3d, 0x8, 0x877, 0x3, 0x2ec0]}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) kernel console output (not intermixed with test programs): [ 52.100923][ T29] audit: type=1400 audit(52.000:56): avc: denied { read write } for pid=3090 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.171143][ T29] audit: type=1400 audit(52.060:57): avc: denied { open } for pid=3090 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:30788' (ED25519) to the list of known hosts. [ 68.398955][ T29] audit: type=1400 audit(68.300:58): avc: denied { name_bind } for pid=3093 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 70.414111][ T29] audit: type=1400 audit(70.320:59): avc: denied { execute } for pid=3094 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 70.422083][ T29] audit: type=1400 audit(70.330:60): avc: denied { execute_no_trans } for pid=3094 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 73.235726][ T29] audit: type=1400 audit(73.140:61): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 73.241856][ T29] audit: type=1400 audit(73.150:62): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 73.252930][ T3094] cgroup: Unknown subsys name 'net' [ 73.259771][ T29] audit: type=1400 audit(73.170:63): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 73.418453][ T3094] cgroup: Unknown subsys name 'cpuset' [ 73.425610][ T3094] cgroup: Unknown subsys name 'hugetlb' [ 73.428620][ T3094] cgroup: Unknown subsys name 'rlimit' [ 73.679650][ T29] audit: type=1400 audit(73.590:64): avc: denied { setattr } for pid=3094 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.681856][ T29] audit: type=1400 audit(73.590:65): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 73.684084][ T29] audit: type=1400 audit(73.590:66): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 73.885469][ T3096] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 73.889407][ T29] audit: type=1400 audit(73.800:67): avc: denied { relabelto } for pid=3096 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.893007][ T29] audit: type=1400 audit(73.800:68): avc: denied { write } for pid=3096 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 73.936982][ T29] audit: type=1400 audit(73.840:69): avc: denied { read } for pid=3094 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.939215][ T29] audit: type=1400 audit(73.850:70): avc: denied { open } for pid=3094 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 82.675044][ T3094] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 84.617210][ T29] audit: type=1400 audit(84.520:71): avc: denied { execmem } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 84.694040][ T29] audit: type=1400 audit(84.600:72): avc: denied { read } for pid=3100 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.694448][ T29] audit: type=1400 audit(84.600:73): avc: denied { read } for pid=3099 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.694794][ T29] audit: type=1400 audit(84.600:74): avc: denied { open } for pid=3099 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.716720][ T29] audit: type=1400 audit(84.620:75): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 84.724844][ T29] audit: type=1400 audit(84.630:76): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 84.727557][ T29] audit: type=1400 audit(84.640:77): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 84.810448][ T29] audit: type=1400 audit(84.720:78): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 85.422912][ T29] audit: type=1400 audit(85.330:79): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 86.660995][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.673078][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.949126][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.955413][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.690439][ T3099] hsr_slave_0: entered promiscuous mode [ 87.694032][ T3099] hsr_slave_1: entered promiscuous mode [ 88.070419][ T3100] hsr_slave_0: entered promiscuous mode [ 88.073891][ T3100] hsr_slave_1: entered promiscuous mode [ 88.076179][ T3100] debugfs: 'hsr0' already exists in 'hsr' [ 88.078196][ T3100] Cannot create hsr debugfs directory [ 88.235955][ T29] audit: type=1400 audit(88.140:80): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.246073][ T3099] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 88.288884][ T3099] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 88.314600][ T3099] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 88.335263][ T3099] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 88.590422][ T3100] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 88.600964][ T3100] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 88.612374][ T3100] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 88.622927][ T3100] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 89.263183][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.434530][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.985144][ T3099] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 92.384390][ T3099] veth0_vlan: entered promiscuous mode [ 92.407298][ T3099] veth1_vlan: entered promiscuous mode [ 92.474919][ T3099] veth0_macvtap: entered promiscuous mode [ 92.495328][ T3099] veth1_macvtap: entered promiscuous mode [ 92.554844][ T3100] veth0_vlan: entered promiscuous mode [ 92.584299][ T3100] veth1_vlan: entered promiscuous mode [ 92.643161][ T57] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.644083][ T57] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.644227][ T57] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.644301][ T57] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.790971][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 92.791411][ T29] audit: type=1400 audit(92.690:83): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 92.791646][ T29] audit: type=1400 audit(92.690:84): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.Q3YVJx/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 92.800203][ T29] audit: type=1400 audit(92.700:85): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 92.812854][ T29] audit: type=1400 audit(92.720:86): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.Q3YVJx/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 92.815354][ T29] audit: type=1400 audit(92.720:87): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.Q3YVJx/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=964 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 92.821670][ T3100] veth0_macvtap: entered promiscuous mode [ 92.835496][ T3100] veth1_macvtap: entered promiscuous mode [ 92.849670][ T29] audit: type=1400 audit(92.760:88): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 92.859816][ T29] audit: type=1400 audit(92.770:89): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 92.867191][ T29] audit: type=1400 audit(92.770:90): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=2382 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 92.875053][ T29] audit: type=1400 audit(92.780:91): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 92.881838][ T29] audit: type=1400 audit(92.790:92): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 92.961973][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 92.972499][ T57] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.973148][ T57] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.973261][ T57] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.973334][ T57] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.424842][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 103.425189][ T29] audit: type=1400 audit(103.290:104): avc: denied { map_create } for pid=3841 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 103.442458][ T29] audit: type=1400 audit(103.350:105): avc: denied { map_read map_write } for pid=3841 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 103.599782][ T29] audit: type=1400 audit(103.510:106): avc: denied { execute } for pid=3841 comm="syz.0.11" name="file0" dev="tmpfs" ino=58 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 133.518730][ T3875] syz.1.20 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 139.266694][ C1] hrtimer: interrupt took 5381520 ns [ 152.913544][ T29] audit: type=1400 audit(152.820:107): avc: denied { create } for pid=3882 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 154.020164][ T29] audit: type=1400 audit(153.920:108): avc: denied { create } for pid=3882 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 154.537670][ T3790] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 154.737646][ T3790] usb 2-1: Using ep0 maxpacket: 16 [ 154.774856][ T3790] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 154.775285][ T3790] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 154.775626][ T3790] usb 2-1: New USB device found, idVendor=1b96, idProduct=0008, bcdDevice= 0.00 [ 154.775739][ T3790] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 154.791487][ T3790] usb 2-1: config 0 descriptor?? [ 155.325222][ T3790] ntrig 0003:1B96:0008.0001: nested delimiters [ 155.325743][ T3790] ntrig 0003:1B96:0008.0001: item 0 1 2 10 parsing failed [ 155.337769][ T3790] ntrig 0003:1B96:0008.0001: parse failed [ 155.338503][ T3790] ntrig 0003:1B96:0008.0001: probe with driver ntrig failed with error -22 [ 155.592571][ T3790] usb 2-1: USB disconnect, device number 2 [ 157.247295][ T29] audit: type=1400 audit(157.120:109): avc: denied { write } for pid=3907 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 157.247752][ T29] audit: type=1400 audit(157.130:110): avc: denied { create } for pid=3907 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 157.248057][ T29] audit: type=1400 audit(157.150:111): avc: denied { setopt } for pid=3907 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 157.319228][ T29] audit: type=1400 audit(157.190:112): avc: denied { write } for pid=3907 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 172.416940][ T29] audit: type=1326 audit(172.320:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.28" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 172.452491][ T29] audit: type=1326 audit(172.360:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.28" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 172.500977][ T29] audit: type=1326 audit(172.400:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.28" exe="/syz-executor" sig=0 arch=40000028 syscall=262 compat=0 ip=0x132970 code=0x7ffc0000 [ 172.566274][ T29] audit: type=1326 audit(2000000000.000:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.28" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 172.566962][ T29] audit: type=1326 audit(2000000000.030:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.28" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 173.387138][ T1805] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 173.547389][ T1805] usb 1-1: Using ep0 maxpacket: 16 [ 173.573234][ T1805] usb 1-1: config 1 has an invalid interface descriptor of length 2, skipping [ 173.573719][ T1805] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 173.574256][ T1805] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 173.574558][ T1805] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 173.699603][ T1805] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 173.707705][ T1805] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 173.708079][ T1805] usb 1-1: Product: syz [ 173.708289][ T1805] usb 1-1: Manufacturer: syz [ 173.708346][ T1805] usb 1-1: SerialNumber: syz [ 174.055889][ T1805] usb 1-1: USB disconnect, device number 2 [ 179.191245][ T29] audit: type=1400 audit(2000000006.660:118): avc: denied { create } for pid=3918 comm="syz.1.30" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 179.193606][ T29] audit: type=1400 audit(2000000006.660:119): avc: denied { write } for pid=3918 comm="syz.1.30" name="file0" dev="tmpfs" ino=78 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 179.197097][ T29] audit: type=1400 audit(2000000006.660:120): avc: denied { open } for pid=3918 comm="syz.1.30" path="/12/file0" dev="tmpfs" ino=78 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 191.595667][ T29] audit: type=1400 audit(2000000019.060:121): avc: denied { unlink } for pid=3100 comm="syz-executor" name="file0" dev="tmpfs" ino=78 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 194.332128][ T29] audit: type=1400 audit(2000000021.800:122): avc: denied { write } for pid=3956 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 199.192232][ T29] audit: type=1400 audit(2000000026.660:123): avc: denied { create } for pid=3967 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 211.096880][ T29] audit: type=1400 audit(2000000038.560:124): avc: denied { name_bind } for pid=3977 comm="syz.1.39" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 211.097351][ T29] audit: type=1400 audit(2000000038.560:125): avc: denied { node_bind } for pid=3977 comm="syz.1.39" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 225.180496][ T3986] netlink: 'syz.0.41': attribute type 4 has an invalid length. [ 225.181090][ T3986] netlink: 17 bytes leftover after parsing attributes in process `syz.0.41'. [ 239.056152][ T3999] process 'syz.1.47' launched '/dev/fd/4' with NULL argv: empty string added [ 239.079645][ T29] audit: type=1400 audit(2000000066.540:126): avc: denied { execute_no_trans } for pid=3998 comm="syz.1.47" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 242.159162][ T29] audit: type=1400 audit(2000000069.560:127): avc: denied { relabelfrom } for pid=4002 comm="syz.1.49" name="" dev="pipefs" ino=2602 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 242.435631][ T4005] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 242.439168][ T29] audit: type=1400 audit(2000000069.900:128): avc: denied { create } for pid=4004 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 242.453092][ T29] audit: type=1400 audit(2000000069.920:129): avc: denied { ioctl } for pid=4004 comm="syz.1.50" path="socket:[2605]" dev="sockfs" ino=2605 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 242.679060][ T29] audit: type=1400 audit(2000000070.140:130): avc: denied { setopt } for pid=4006 comm="syz.1.51" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 243.828329][ T29] audit: type=1400 audit(2000000071.300:131): avc: denied { mount } for pid=4013 comm="syz.1.54" name="/" dev="configfs" ino=1123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 243.844428][ T29] audit: type=1400 audit(2000000071.310:132): avc: denied { search } for pid=4013 comm="syz.1.54" name="/" dev="configfs" ino=1123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 243.844805][ T29] audit: type=1400 audit(2000000071.310:133): avc: denied { search } for pid=4013 comm="syz.1.54" name="/" dev="configfs" ino=1123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 243.845138][ T29] audit: type=1400 audit(2000000071.310:134): avc: denied { search } for pid=4013 comm="syz.1.54" name="/" dev="configfs" ino=1123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 243.845455][ T29] audit: type=1400 audit(2000000071.310:135): avc: denied { search } for pid=4013 comm="syz.1.54" name="/" dev="configfs" ino=1123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 280.478912][ T29] audit: type=1326 audit(2000000107.950:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4040 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 280.479405][ T29] audit: type=1326 audit(2000000107.950:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4040 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 280.481763][ T29] audit: type=1326 audit(2000000107.950:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4040 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=14 compat=0 ip=0x132970 code=0x7ffc0000 [ 280.497256][ T29] audit: type=1326 audit(2000000107.960:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4040 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 280.502285][ T29] audit: type=1326 audit(2000000107.970:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4040 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 280.519151][ T29] audit: type=1326 audit(2000000107.980:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4040 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=9 compat=0 ip=0x132970 code=0x7ffc0000 [ 280.532788][ T29] audit: type=1326 audit(2000000108.000:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4040 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 280.540270][ T29] audit: type=1326 audit(2000000108.010:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4040 comm="syz.1.63" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 281.232470][ T29] audit: type=1400 audit(2000000108.680:144): avc: denied { allowed } for pid=4067 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 281.238363][ T29] audit: type=1400 audit(2000000108.700:145): avc: denied { create } for pid=4067 comm="syz.0.66" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 281.423225][ T4070] netlink: 96 bytes leftover after parsing attributes in process `syz.1.67'. [ 302.562486][ T3805] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 302.827400][ T3805] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 302.940181][ T3805] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 302.940569][ T3805] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 302.940918][ T3805] usb 2-1: Product: syz [ 302.941013][ T3805] usb 2-1: Manufacturer: syz [ 302.941069][ T3805] usb 2-1: SerialNumber: syz [ 304.097159][ T3805] cdc_ncm 2-1:1.0: bind() failure [ 304.103537][ T3805] cdc_ncm 2-1:1.1: probe with driver cdc_ncm failed with error -71 [ 304.117898][ T3805] cdc_mbim 2-1:1.1: probe with driver cdc_mbim failed with error -71 [ 304.123116][ T3805] usbtest 2-1:1.1: probe with driver usbtest failed with error -71 [ 304.149675][ T3805] usb 2-1: USB disconnect, device number 3 [ 309.709082][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 309.714106][ T29] audit: type=1400 audit(2000000137.180:148): avc: denied { create } for pid=4103 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 309.725735][ T29] audit: type=1400 audit(2000000137.180:149): avc: denied { write } for pid=4103 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 309.731641][ T29] audit: type=1400 audit(2000000137.180:150): avc: denied { nlmsg_write } for pid=4103 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 328.459717][ T29] audit: type=1400 audit(2000000155.930:151): avc: denied { map } for pid=4145 comm="syz.0.83" path="socket:[2702]" dev="sockfs" ino=2702 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 338.317844][ T29] audit: type=1400 audit(2000000165.790:152): avc: denied { connect } for pid=4164 comm="syz.1.90" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 338.330532][ T29] audit: type=1400 audit(2000000165.800:153): avc: denied { write } for pid=4164 comm="syz.1.90" laddr=fe80::10 lport=60 faddr=fe80::3c fport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 338.721533][ T12] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.722770][ T12] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.728769][ T12] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.731395][ T12] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 339.003226][ T29] audit: type=1400 audit(2000000166.470:154): avc: denied { setopt } for pid=4168 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 339.011501][ T29] audit: type=1400 audit(2000000166.480:155): avc: denied { write } for pid=4168 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 339.215959][ T29] audit: type=1326 audit(2000000166.680:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4173 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 339.219714][ T29] audit: type=1326 audit(2000000166.690:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4173 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 339.237184][ T29] audit: type=1326 audit(2000000166.700:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4173 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 339.237502][ T29] audit: type=1326 audit(2000000166.700:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4173 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 339.237772][ T29] audit: type=1326 audit(2000000166.700:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4173 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 339.252894][ T29] audit: type=1326 audit(2000000166.720:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4173 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 343.516348][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 343.522161][ T29] audit: type=1400 audit(2000000170.980:181): avc: denied { create } for pid=4197 comm="syz.0.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 343.530793][ T29] audit: type=1400 audit(2000000171.000:182): avc: denied { connect } for pid=4197 comm="syz.0.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 346.228274][ T29] audit: type=1400 audit(2000000173.700:183): avc: denied { setopt } for pid=4192 comm="syz.1.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 348.746894][ T29] audit: type=1400 audit(2000000176.210:184): avc: denied { create } for pid=4199 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 350.018207][ T29] audit: type=1326 audit(2000000177.490:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.106" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 350.020895][ T29] audit: type=1326 audit(2000000177.490:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.106" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 350.032370][ T29] audit: type=1326 audit(2000000177.500:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.106" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 350.032822][ T29] audit: type=1326 audit(2000000177.500:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.106" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 350.033132][ T29] audit: type=1326 audit(2000000177.500:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.106" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 350.056868][ T29] audit: type=1326 audit(2000000177.520:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.106" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 350.067882][ T29] audit: type=1326 audit(2000000177.520:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.106" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 350.071116][ T29] audit: type=1326 audit(2000000177.540:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.106" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 350.078214][ T29] audit: type=1326 audit(2000000177.540:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4213 comm="syz.1.106" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 353.849801][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 353.850238][ T29] audit: type=1326 audit(2000000181.320:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4226 comm="syz.1.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 353.864664][ T29] audit: type=1326 audit(2000000181.330:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4226 comm="syz.1.110" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 353.890303][ T29] audit: type=1326 audit(2000000181.350:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4226 comm="syz.1.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 353.893527][ T29] audit: type=1326 audit(2000000181.360:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4226 comm="syz.1.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 353.901127][ T29] audit: type=1326 audit(2000000181.370:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4226 comm="syz.1.110" exe="/syz-executor" sig=0 arch=40000028 syscall=282 compat=0 ip=0x132970 code=0x7ffc0000 [ 353.924163][ T29] audit: type=1326 audit(2000000181.370:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4226 comm="syz.1.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 353.927227][ T29] audit: type=1326 audit(2000000181.390:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4226 comm="syz.1.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 353.931825][ T29] audit: type=1326 audit(2000000181.390:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4226 comm="syz.1.110" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 353.934685][ T29] audit: type=1326 audit(2000000181.390:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4226 comm="syz.1.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 353.941027][ T29] audit: type=1326 audit(2000000181.400:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4226 comm="syz.1.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 364.807856][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 364.808244][ T29] audit: type=1400 audit(2000000192.270:217): avc: denied { bind } for pid=4263 comm="syz.1.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 392.459292][ T3881] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 392.752555][ T3881] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 392.753747][ T3881] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 392.753979][ T3881] usb 1-1: New USB device found, idVendor=06a3, idProduct=0ccb, bcdDevice= 0.00 [ 392.754081][ T3881] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 392.821233][ T3881] usb 1-1: config 0 descriptor?? [ 393.877241][ T3881] usbhid 1-1:0.0: can't add hid device: -71 [ 393.879312][ T3881] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 393.994125][ T3881] usb 1-1: USB disconnect, device number 3 [ 395.762754][ T4348] netlink: 4 bytes leftover after parsing attributes in process `syz.0.121'. [ 396.379365][ T29] audit: type=1400 audit(2000000223.840:218): avc: denied { ioctl } for pid=4351 comm="syz.1.123" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3678 ioctlcmd=0xaa03 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 398.020890][ T29] audit: type=1400 audit(2000000225.490:219): avc: denied { create } for pid=4382 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 406.387989][ T29] audit: type=1326 audit(2000000233.850:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4397 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 406.398929][ T29] audit: type=1326 audit(2000000233.850:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4397 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 406.400750][ T29] audit: type=1326 audit(2000000233.870:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4397 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=227 compat=0 ip=0x132970 code=0x7ffc0000 [ 406.402262][ T4398] SELinux: Context system_u:object is not valid (left unmapped). [ 406.404095][ T29] audit: type=1400 audit(2000000233.870:223): avc: denied { relabelto } for pid=4397 comm="syz.1.134" name="cgroup.procs" dev="cgroup" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object" [ 406.405850][ T29] audit: type=1400 audit(2000000233.870:224): avc: denied { associate } for pid=4397 comm="syz.1.134" name="cgroup.procs" dev="cgroup" ino=82 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object" [ 406.409715][ T29] audit: type=1326 audit(2000000233.870:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4397 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 421.611982][ T29] audit: type=1400 audit(2000000249.080:226): avc: denied { read } for pid=4418 comm="syz.0.143" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 421.614736][ T29] audit: type=1400 audit(2000000249.080:227): avc: denied { open } for pid=4418 comm="syz.0.143" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 421.662687][ T29] audit: type=1400 audit(2000000249.130:228): avc: denied { ioctl } for pid=4418 comm="syz.0.143" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 421.663182][ T29] audit: type=1400 audit(2000000249.130:229): avc: denied { set_context_mgr } for pid=4418 comm="syz.0.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 421.690082][ T4419] binder: BINDER_SET_CONTEXT_MGR already set [ 421.690523][ T4419] binder: 4418:4419 ioctl 4018620d 200001c0 returned -16 [ 432.524958][ T4431] ÿÿÿÿÿÿ: renamed from vlan1 [ 447.083650][ T29] audit: type=1400 audit(2000000274.550:230): avc: denied { compute_member } for pid=4451 comm="syz.0.153" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 448.668899][ T4462] Zero length message leads to an empty skb [ 481.615172][ T4500] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 481.625448][ T4500] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 482.929691][ T4500] hsr_slave_0: entered promiscuous mode [ 482.934112][ T4500] hsr_slave_1: entered promiscuous mode [ 482.948227][ T4500] debugfs: 'hsr0' already exists in 'hsr' [ 482.949413][ T4500] Cannot create hsr debugfs directory [ 483.577458][ T4500] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 483.585836][ T4500] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 483.618216][ T4500] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 483.638470][ T4500] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 484.459479][ T4500] 8021q: adding VLAN 0 to HW filter on device bond0 [ 487.546164][ T4500] veth0_vlan: entered promiscuous mode [ 487.568992][ T4500] veth1_vlan: entered promiscuous mode [ 487.676110][ T4500] veth0_macvtap: entered promiscuous mode [ 487.720465][ T4500] veth1_macvtap: entered promiscuous mode [ 487.814343][ T4561] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 487.814845][ T4561] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 487.815103][ T4561] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 487.815179][ T4561] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 490.195174][ T29] audit: type=1400 audit(2000000317.660:231): avc: denied { write } for pid=4858 comm="syz.2.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 490.657938][ T29] audit: type=1400 audit(2000000318.130:232): avc: denied { unmount } for pid=4860 comm="syz.2.175" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 498.390355][ T4188] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 498.428099][ T4188] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 498.914748][ T4892] netlink: 'syz.2.182': attribute type 32 has an invalid length. [ 498.937920][ T4892] netlink: 28 bytes leftover after parsing attributes in process `syz.2.182'. [ 499.564853][ T29] audit: type=1326 audit(2000000327.030:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4897 comm="syz.2.185" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 499.574853][ T29] audit: type=1326 audit(2000000327.040:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4897 comm="syz.2.185" exe="/syz-executor" sig=0 arch=40000028 syscall=397 compat=0 ip=0x132970 code=0x7ffc0000 [ 499.578782][ T29] audit: type=1326 audit(2000000327.050:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4897 comm="syz.2.185" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 521.949438][ T4951] SELinux: ebitmap: truncated map [ 521.950981][ T29] audit: type=1400 audit(2000000349.420:236): avc: denied { load_policy } for pid=4950 comm="syz.0.206" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 521.954058][ T4951] SELinux: failed to load policy [ 527.071650][ T4966] netlink: 'syz.2.212': attribute type 27 has an invalid length. [ 527.909948][ T4967] 8021q: adding VLAN 0 to HW filter on device bond0 [ 528.061245][ T4967] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 528.061575][ T4967] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 528.077834][ T4967] veth1_vlan: left promiscuous mode [ 528.084079][ T4967] veth0_vlan: left promiscuous mode [ 528.095067][ T4967] veth0_vlan: entered promiscuous mode [ 528.099865][ T4967] veth1_vlan: entered promiscuous mode [ 528.119831][ T4967] veth1_macvtap: left promiscuous mode [ 528.132990][ T4967] veth0_macvtap: left promiscuous mode [ 528.135127][ T4967] veth0_macvtap: entered promiscuous mode [ 528.140787][ T4967] veth1_macvtap: entered promiscuous mode [ 529.421117][ T29] audit: type=1400 audit(2000000356.890:237): avc: denied { write } for pid=4976 comm="syz.0.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 529.508501][ T12] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 529.510786][ T12] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 529.511215][ T12] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 529.511479][ T12] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 532.397185][ T29] audit: type=1400 audit(2000000359.860:238): avc: denied { audit_write } for pid=4995 comm="syz.2.222" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 532.418385][ T29] audit: type=1107 audit(2000000359.880:239): pid=4995 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 563.934987][ T4969] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 563.949408][ T4969] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 563.952841][ T4969] bond0 (unregistering): Released all slaves [ 564.043277][ T4969] hsr_slave_0: left promiscuous mode [ 564.045621][ T4969] hsr_slave_1: left promiscuous mode [ 582.811757][ T5096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 582.908665][ T5096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 585.739657][ T5096] hsr_slave_0: entered promiscuous mode [ 585.741416][ T5096] hsr_slave_1: entered promiscuous mode [ 585.742625][ T5096] debugfs: 'hsr0' already exists in 'hsr' [ 585.742943][ T5096] Cannot create hsr debugfs directory [ 586.978769][ T5096] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 587.003748][ T5096] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 587.033799][ T5096] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 587.090895][ T5096] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 589.457837][ T5096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 595.597860][ T5096] veth0_vlan: entered promiscuous mode [ 595.625901][ T5096] veth1_vlan: entered promiscuous mode [ 595.689388][ T5096] veth0_macvtap: entered promiscuous mode [ 595.702897][ T5096] veth1_macvtap: entered promiscuous mode [ 595.761157][ T32] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 595.761930][ T32] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 595.762236][ T32] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 595.762360][ T32] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 596.910402][ T5477] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 596.917121][ T5477] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 597.427642][ T5487] netlink: 8 bytes leftover after parsing attributes in process `syz.3.238'. [ 597.679124][ T29] audit: type=1400 audit(2000000425.150:240): avc: denied { create } for pid=5488 comm="syz.2.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 601.943249][ T5507] netlink: 8 bytes leftover after parsing attributes in process `syz.3.247'. [ 602.647207][ T29] audit: type=1400 audit(2000000430.100:241): avc: denied { bind } for pid=5514 comm="syz.3.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 602.678651][ T29] audit: type=1400 audit(2000000430.150:242): avc: denied { listen } for pid=5514 comm="syz.3.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 602.725102][ T29] audit: type=1400 audit(2000000430.190:243): avc: denied { accept } for pid=5514 comm="syz.3.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 603.010865][ T29] audit: type=1400 audit(2000000430.480:244): avc: denied { create } for pid=5516 comm="syz.3.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 604.143513][ T5520] bond0: (slave bond_slave_0): Releasing backup interface [ 604.178412][ T5520] bond0: (slave bond_slave_1): Releasing backup interface [ 604.210638][ T5520] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 606.430680][ T5548] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 606.433898][ T5548] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 606.824917][ T5557] syz.2.266 uses obsolete (PF_INET,SOCK_PACKET) [ 607.169383][ T29] audit: type=1400 audit(2000000434.640:245): avc: denied { bind } for pid=5558 comm="syz.2.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 612.736007][ T29] audit: type=1326 audit(2000000440.200:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5564 comm="syz.2.270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 612.838110][ T29] audit: type=1326 audit(2000000440.220:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5564 comm="syz.2.270" exe="/syz-executor" sig=0 arch=40000028 syscall=380 compat=0 ip=0x132970 code=0x7ffc0000 [ 612.840531][ T29] audit: type=1326 audit(2000000440.220:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5564 comm="syz.2.270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 612.846165][ T29] audit: type=1326 audit(2000000440.220:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5564 comm="syz.2.270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 612.850241][ T29] audit: type=1326 audit(2000000440.220:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5564 comm="syz.2.270" exe="/syz-executor" sig=0 arch=40000028 syscall=228 compat=0 ip=0x132970 code=0x7ffc0000 [ 612.859376][ T29] audit: type=1326 audit(2000000440.220:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5564 comm="syz.2.270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 612.862414][ T29] audit: type=1326 audit(2000000440.220:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5564 comm="syz.2.270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 612.864124][ T29] audit: type=1326 audit(2000000440.220:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5564 comm="syz.2.270" exe="/syz-executor" sig=0 arch=40000028 syscall=163 compat=0 ip=0x132970 code=0x7ffc0000 [ 612.865561][ T29] audit: type=1326 audit(2000000440.220:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5564 comm="syz.2.270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 612.867815][ T29] audit: type=1326 audit(2000000440.220:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5564 comm="syz.2.270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.762812][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 634.763077][ T29] audit: type=1326 audit(2000000462.230:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5572 comm="syz.3.271" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.797932][ T29] audit: type=1326 audit(2000000462.270:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5572 comm="syz.3.271" exe="/syz-executor" sig=0 arch=40000028 syscall=380 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.807664][ T29] audit: type=1326 audit(2000000462.270:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5572 comm="syz.3.271" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.808056][ T29] audit: type=1326 audit(2000000462.270:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5572 comm="syz.3.271" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.808177][ T29] audit: type=1326 audit(2000000462.270:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5572 comm="syz.3.271" exe="/syz-executor" sig=0 arch=40000028 syscall=228 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.808238][ T29] audit: type=1326 audit(2000000462.270:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5572 comm="syz.3.271" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.808286][ T29] audit: type=1326 audit(2000000462.270:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5572 comm="syz.3.271" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 634.808342][ T29] audit: type=1326 audit(2000000462.270:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5572 comm="syz.3.271" exe="/syz-executor" sig=0 arch=40000028 syscall=163 compat=0 ip=0x132970 code=0x7ffc0000 [ 635.017787][ T29] audit: type=1326 audit(2000000462.490:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5572 comm="syz.3.271" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 635.079597][ T29] audit: type=1326 audit(2000000462.510:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5572 comm="syz.3.271" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 640.514300][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 640.515525][ T29] audit: type=1400 audit(2000000467.980:279): avc: denied { read } for pid=5596 comm="syz.2.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 645.914202][ T29] audit: type=1400 audit(2000000473.380:280): avc: denied { create } for pid=5602 comm="syz.2.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 645.929425][ T29] audit: type=1400 audit(2000000473.400:281): avc: denied { connect } for pid=5602 comm="syz.2.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 649.541203][ T29] audit: type=1400 audit(2000000477.010:282): avc: denied { bind } for pid=5602 comm="syz.2.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 649.582670][ T29] audit: type=1400 audit(2000000477.050:283): avc: denied { ioctl } for pid=5602 comm="syz.2.283" path="socket:[5114]" dev="sockfs" ino=5114 ioctlcmd=0x89a2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 655.877368][ T29] audit: type=1400 audit(2000000483.320:284): avc: denied { create } for pid=5607 comm="syz.3.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 655.927278][ T29] audit: type=1400 audit(2000000483.360:285): avc: denied { bind } for pid=5607 comm="syz.3.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 656.479284][ T29] audit: type=1400 audit(2000000483.950:286): avc: denied { accept } for pid=5607 comm="syz.3.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 662.397945][ T5619] netlink: 4 bytes leftover after parsing attributes in process `syz.2.287'. [ 665.362633][ T29] audit: type=1400 audit(2000000492.830:287): avc: denied { setopt } for pid=5628 comm="syz.3.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 665.672729][ T5636] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 665.677239][ T5636] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 665.965237][ T5646] mmap: syz.2.298 (5646) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 669.981271][ T29] audit: type=1326 audit(2000000497.450:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.2.302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 669.984535][ T29] audit: type=1326 audit(2000000497.450:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.2.302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 669.991337][ T29] audit: type=1326 audit(2000000497.460:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.2.302" exe="/syz-executor" sig=0 arch=40000028 syscall=380 compat=0 ip=0x132970 code=0x7ffc0000 [ 670.001385][ T29] audit: type=1326 audit(2000000497.470:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.2.302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 670.012778][ T29] audit: type=1326 audit(2000000497.480:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.2.302" exe="/syz-executor" sig=0 arch=40000028 syscall=228 compat=0 ip=0x132970 code=0x7ffc0000 [ 670.018737][ T29] audit: type=1326 audit(2000000497.490:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.2.302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 670.029293][ T29] audit: type=1326 audit(2000000497.500:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.2.302" exe="/syz-executor" sig=0 arch=40000028 syscall=163 compat=0 ip=0x132970 code=0x7ffc0000 [ 670.140772][ T4561] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 670.171044][ T29] audit: type=1326 audit(2000000497.640:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.2.302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 670.208848][ T4561] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 670.340351][ T4561] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 670.370114][ T29] audit: type=1326 audit(2000000497.840:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.2.302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 670.400012][ T4561] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 670.409871][ T29] audit: type=1326 audit(2000000497.840:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5654 comm="syz.2.302" exe="/syz-executor" sig=0 arch=40000028 syscall=150 compat=0 ip=0x132970 code=0x7ffc0000 [ 671.074397][ T4561] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 671.083621][ T4561] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 671.101019][ T4561] bond0 (unregistering): Released all slaves [ 671.203859][ T4561] hsr_slave_0: left promiscuous mode [ 671.208223][ T4561] hsr_slave_1: left promiscuous mode [ 671.221574][ T4561] veth1_macvtap: left promiscuous mode [ 671.222678][ T4561] veth0_macvtap: left promiscuous mode [ 671.227869][ T4561] veth1_vlan: left promiscuous mode [ 671.228911][ T4561] veth0_vlan: left promiscuous mode [ 691.064560][ T29] audit: type=1400 audit(2000000518.530:298): avc: denied { mount } for pid=5735 comm="syz.2.312" name="/" dev="ramfs" ino=6451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 691.211369][ T29] audit: type=1400 audit(2000000518.680:299): avc: denied { watch watch_reads } for pid=5745 comm="syz.3.315" path="/40" dev="tmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 691.960135][ T5761] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 691.963398][ T5761] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 691.982803][ T29] audit: type=1400 audit(2000000519.450:300): avc: denied { create } for pid=5760 comm="syz.3.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 693.103514][ T5771] input: syz1 as /devices/virtual/input/input3 [ 694.181394][ T5771] netlink: 'syz.3.319': attribute type 1 has an invalid length. [ 708.525329][ T29] audit: type=1400 audit(2000000535.990:301): avc: denied { write } for pid=5871 comm="syz.3.334" name="ptype" dev="proc" ino=4026532751 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 710.339487][ T5876] netlink: 52 bytes leftover after parsing attributes in process `syz.3.335'. [ 721.412603][ T29] audit: type=1400 audit(2000000548.880:302): avc: denied { ioctl } for pid=5899 comm="syz.2.343" path="socket:[6045]" dev="sockfs" ino=6045 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 721.415385][ T29] audit: type=1400 audit(2000000548.880:303): avc: denied { connect } for pid=5899 comm="syz.2.343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 726.838632][ T5914] netlink: 'syz.3.348': attribute type 1 has an invalid length. [ 726.838986][ T5914] netlink: 12 bytes leftover after parsing attributes in process `syz.3.348'. [ 742.202753][ T5946] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 742.205213][ T5946] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 742.299478][ T29] audit: type=1400 audit(2000000569.770:304): avc: denied { create } for pid=5949 comm="syz.3.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 742.319899][ T29] audit: type=1400 audit(2000000569.790:305): avc: denied { write } for pid=5949 comm="syz.3.360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 745.635203][ T29] audit: type=1400 audit(2000000573.100:306): avc: denied { setopt } for pid=6031 comm="syz.3.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 748.879971][ T29] audit: type=1400 audit(2000000576.350:307): avc: denied { write } for pid=6054 comm="syz.2.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 748.883504][ T29] audit: type=1400 audit(2000000576.350:308): avc: denied { read } for pid=6054 comm="syz.2.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 789.051388][ T6110] futex_wake_op: syz.3.387 tries to shift op by -1; fix this program [ 790.259295][ T29] audit: type=1400 audit(2000000617.730:309): avc: denied { append } for pid=6119 comm="syz.3.391" name="comedi4" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 790.263166][ T29] audit: type=1400 audit(2000000617.730:310): avc: denied { map } for pid=6119 comm="syz.3.391" path="/dev/comedi4" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 790.264769][ T29] audit: type=1400 audit(2000000617.730:311): avc: denied { execute } for pid=6119 comm="syz.3.391" path="/dev/comedi4" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 797.379307][ T29] audit: type=1400 audit(2000000624.790:312): avc: denied { create } for pid=6121 comm="syz.3.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 809.579468][ T6143] netlink: 16 bytes leftover after parsing attributes in process `syz.2.399'. [ 812.518788][ T29] audit: type=1400 audit(2000000639.990:313): avc: denied { create } for pid=6165 comm="syz.2.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 812.534971][ T29] audit: type=1400 audit(2000000640.000:314): avc: denied { write } for pid=6165 comm="syz.2.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 812.548534][ T6166] netlink: 8 bytes leftover after parsing attributes in process `syz.2.409'. [ 814.872785][ T6180] capability: warning: `syz.2.416' uses deprecated v2 capabilities in a way that may be insecure [ 815.360359][ T6183] netlink: 'syz.2.417': attribute type 10 has an invalid length. [ 815.855222][ T6187] capability: warning: `syz.2.419' uses 32-bit capabilities (legacy support in use) [ 823.208386][ T29] audit: type=1400 audit(2000000650.680:315): avc: denied { bind } for pid=6217 comm="syz.3.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 823.265890][ T29] audit: type=1400 audit(2000000650.730:316): avc: denied { setopt } for pid=6217 comm="syz.3.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 826.394580][ T6234] Illegal XDP return value 4294967262 on prog (id 172) dev syz_tun, expect packet loss! [ 829.993138][ T6250] netlink: 8 bytes leftover after parsing attributes in process `syz.2.444'. [ 850.827419][ T6334] nbd0: detected capacity change from 0 to 127 [ 850.830457][ T47] block nbd0: Receive control failed (result -32) [ 851.844802][ T6346] comedi: valid board names for 8255 driver are: [ 851.846085][ T6346] 8255 [ 851.847836][ T6346] comedi: valid board names for vmk80xx driver are: [ 851.848736][ T6346] vmk80xx [ 851.849988][ T6346] comedi: valid board names for usbduxsigma driver are: [ 851.850906][ T6346] usbduxsigma [ 851.851586][ T6346] comedi: valid board names for usbduxfast driver are: [ 851.857037][ T6346] usbduxfast [ 851.857813][ T6346] comedi: valid board names for usbdux driver are: [ 851.859421][ T6346] usbdux [ 851.861741][ T6346] comedi: valid board names for ni6501 driver are: [ 851.862867][ T6346] ni6501 [ 851.863576][ T6346] comedi: valid board names for dt9812 driver are: [ 851.864416][ T6346] dt9812 [ 851.865128][ T6346] comedi: valid board names for ni_labpc_cs driver are: [ 851.866055][ T6346] ni_labpc_cs [ 851.867284][ T6346] comedi: valid board names for ni_daq_700 driver are: [ 851.868104][ T6346] ni_daq_700 [ 851.868744][ T6346] comedi: valid board names for labpc_pci driver are: [ 851.869538][ T6346] labpc_pci [ 851.870104][ T6346] comedi: valid board names for adl_pci9118 driver are: [ 851.870971][ T6346] pci9118dg [ 851.871623][ T6346] pci9118hg [ 851.873029][ T6346] pci9118hr [ 851.873639][ T6346] comedi: valid board names for 8255_pci driver are: [ 851.874518][ T6346] 8255_pci [ 851.875107][ T6346] comedi: valid board names for comedi_parport driver are: [ 851.876197][ T6346] comedi_parport [ 851.879114][ T6346] comedi: valid board names for comedi_test driver are: [ 851.888121][ T6346] comedi_test [ 851.888890][ T6346] comedi: valid board names for comedi_bond driver are: [ 851.889744][ T6346] comedi_bond [ 855.026781][ T6354] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 857.973208][ T6360] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 858.050734][ T6360] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 866.064416][ T29] audit: type=1400 audit(2000000693.530:317): avc: denied { ioctl } for pid=6391 comm="syz.2.502" path="socket:[7037]" dev="sockfs" ino=7037 ioctlcmd=0x9431 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 867.051895][ T29] audit: type=1400 audit(2000000694.520:318): avc: denied { setopt } for pid=6397 comm="syz.2.505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 867.067168][ T29] audit: type=1400 audit(2000000694.530:319): avc: denied { connect } for pid=6397 comm="syz.2.505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 882.795422][ T6431] netlink: 68 bytes leftover after parsing attributes in process `syz.3.518'. [ 884.024722][ T6433] netlink: 'syz.2.519': attribute type 4 has an invalid length. [ 885.943383][ T6447] fuse: Bad value for 'fd' [ 887.445665][ T29] audit: type=1400 audit(2000000714.910:320): avc: denied { append } for pid=6453 comm="syz.2.528" name="file0" dev="tmpfs" ino=1137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 887.936267][ T6456] netlink: 12 bytes leftover after parsing attributes in process `syz.2.529'. [ 888.474505][ T6465] fuse: Bad value for 'fd' [ 889.766040][ T6476] fuse: Bad value for 'fd' [ 889.963994][ T6480] netlink: 8 bytes leftover after parsing attributes in process `syz.2.538'. [ 889.980133][ T6480] netlink: 24 bytes leftover after parsing attributes in process `syz.2.538'. [ 893.754088][ T29] audit: type=1107 audit(2000000721.220:321): pid=6492 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 894.004965][ T6495] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 902.734909][ T6520] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 902.740799][ T6520] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 919.524921][ T29] audit: type=1400 audit(2000000746.990:322): avc: denied { map } for pid=6549 comm="syz.3.564" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 919.553684][ T6565] binder: 6549:6565 ioctl c0306201 0 returned -14 [ 919.557186][ T29] audit: type=1400 audit(2000000747.020:323): avc: denied { call } for pid=6549 comm="syz.3.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 919.575741][ T29] audit: type=1400 audit(2000000747.040:324): avc: denied { create } for pid=6564 comm="syz.2.571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 932.391755][ T6573] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 932.515273][ T6579] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 935.313892][ T29] audit: type=1400 audit(2000000762.780:325): avc: denied { getopt } for pid=6586 comm="syz.3.576" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 935.595861][ T6601] fuse: Bad value for 'fd' [ 936.712263][ T6611] fuse: Bad value for 'fd' [ 941.421895][ T29] audit: type=1400 audit(2000000768.890:326): avc: denied { setopt } for pid=6612 comm="syz.2.588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 954.251667][ T6629] fuse: Bad value for 'fd' [ 975.063896][ T29] audit: type=1400 audit(2000000802.530:327): avc: denied { read } for pid=6661 comm="syz.2.605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 975.589612][ T29] audit: type=1400 audit(2000000803.060:328): avc: denied { shutdown } for pid=6661 comm="syz.2.605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 984.724221][ T6730] netlink: 'syz.3.628': attribute type 1 has an invalid length. [ 984.770124][ T6730] 8021q: adding VLAN 0 to HW filter on device bond2 [ 984.784828][ T6730] bond2: (slave dummy0): making interface the new active one [ 984.790604][ T6730] bond2: (slave dummy0): Enslaving as an active interface with an up link [ 984.807983][ T6730] bond2 (unregistering): (slave dummy0): Releasing active interface [ 984.813957][ T6730] bond2 (unregistering): Released all slaves [ 987.304268][ T6819] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 987.308444][ T6819] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 990.928826][ T29] audit: type=1400 audit(2000000818.390:329): avc: denied { unlink } for pid=5096 comm="syz-executor" name="file0" dev="tmpfs" ino=769 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 991.119869][ T6852] input: syz1 as /devices/virtual/input/input4 [ 994.107366][ T6865] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 994.109788][ T6865] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1001.139937][ T6906] binder: 6905:6906 ioctl c018620c 20000200 returned -1 [ 1002.205515][ T6913] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1002.216205][ T6913] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1019.894811][ T29] audit: type=1400 audit(2000000847.360:330): avc: denied { read } for pid=6953 comm="syz.2.686" path="socket:[8089]" dev="sockfs" ino=8089 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1021.640951][ T6967] trusted_key: encrypted_key: insufficient parameters specified [ 1053.672897][ T7016] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1053.675271][ T7016] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1053.803679][ T7020] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1053.806048][ T7020] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1053.909595][ T7024] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1053.911697][ T7024] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1071.838076][ T7047] sit0: entered allmulticast mode [ 1071.843796][ T7047] sit0: entered promiscuous mode [ 1073.545371][ T29] audit: type=1400 audit(2000000901.010:331): avc: denied { relabelfrom } for pid=7058 comm="syz.3.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1073.556266][ T29] audit: type=1400 audit(2000000901.010:332): avc: denied { relabelto } for pid=7058 comm="syz.3.726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1074.973603][ T7088] pim6reg1: entered promiscuous mode [ 1075.002369][ T7088] pim6reg1: entered allmulticast mode [ 1079.241685][ T29] audit: type=1400 audit(2000000906.710:333): avc: denied { create } for pid=7110 comm="syz.3.740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1082.429049][ T7174] pim6reg1: entered promiscuous mode [ 1082.429936][ T7174] pim6reg1: entered allmulticast mode [ 1085.037733][ T7250] syzkaller0: entered promiscuous mode [ 1085.039069][ T7250] syzkaller0: entered allmulticast mode [ 1086.818271][ T7266] pim6reg1: entered promiscuous mode [ 1086.823869][ T7266] pim6reg1: entered allmulticast mode [ 1101.364703][ T7435] netlink: 12 bytes leftover after parsing attributes in process `syz.3.793'. [ 1101.757037][ T29] audit: type=1400 audit(2000000929.220:334): avc: denied { map } for pid=7449 comm="syz.3.794" path="socket:[9129]" dev="sockfs" ino=9129 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1101.759838][ T29] audit: type=1400 audit(2000000929.220:335): avc: denied { read accept } for pid=7449 comm="syz.3.794" path="socket:[9129]" dev="sockfs" ino=9129 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1104.889703][ T29] audit: type=1400 audit(2000000932.360:336): avc: denied { transfer } for pid=7485 comm="syz.3.808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1114.141478][ T7519] netlink: 12 bytes leftover after parsing attributes in process `syz.3.821'. [ 1114.143403][ T7519] netlink: 16 bytes leftover after parsing attributes in process `syz.3.821'. [ 1115.069397][ T7523] netlink: 8 bytes leftover after parsing attributes in process `syz.3.822'. [ 1115.538163][ T29] audit: type=1400 audit(2000000943.000:337): avc: denied { read open } for pid=7479 comm="syz.2.805" path="/" dev="configfs" ino=1123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1117.275368][ T7525] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1117.517324][ T7531] netlink: 'syz.3.824': attribute type 4 has an invalid length. [ 1128.401914][ T7563] MPI: mpi too large (30216 bits) [ 1128.486197][ T7565] netlink: 'syz.2.834': attribute type 29 has an invalid length. [ 1145.761024][ T29] audit: type=1400 audit(2000000973.230:338): avc: denied { create } for pid=7589 comm="syz.3.843" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1145.787617][ T29] audit: type=1400 audit(2000000973.250:339): avc: denied { mounton } for pid=7589 comm="syz.3.843" path="/246/file0" dev="tmpfs" ino=1272 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1156.279510][ T7634] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 1162.828506][ T29] audit: type=1400 audit(2000000990.300:340): avc: denied { create } for pid=7640 comm="syz.3.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1162.842010][ T29] audit: type=1400 audit(2000000990.310:341): avc: denied { ioctl } for pid=7640 comm="syz.3.856" path="socket:[9677]" dev="sockfs" ino=9677 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1169.485158][ T29] audit: type=1400 audit(2000000996.950:342): avc: denied { bind } for pid=7668 comm="syz.3.867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1169.486231][ T29] audit: type=1400 audit(2000000996.950:343): avc: denied { name_bind } for pid=7668 comm="syz.3.867" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 1169.492016][ T29] audit: type=1400 audit(2000000996.960:344): avc: denied { node_bind } for pid=7668 comm="syz.3.867" saddr=fc00:: src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 1174.690016][ T29] audit: type=1400 audit(2000001002.160:345): avc: denied { create } for pid=7705 comm="syz.2.882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1174.701338][ T29] audit: type=1400 audit(2000001002.170:346): avc: denied { ioctl } for pid=7705 comm="syz.2.882" path="socket:[10614]" dev="sockfs" ino=10614 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1175.161830][ T7708] netlink: 4 bytes leftover after parsing attributes in process `syz.2.883'. [ 1191.987547][ T7743] netlink: 156 bytes leftover after parsing attributes in process `syz.3.894'. [ 1192.316041][ T7745] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=770 sclass=netlink_route_socket pid=7745 comm=syz.2.895 [ 1195.720164][ T7761] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1196.174296][ T29] audit: type=1326 audit(2000001023.640:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7766 comm="syz.2.905" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x0 [ 1200.729520][ T7807] netlink: 348 bytes leftover after parsing attributes in process `syz.2.912'. [ 1200.729793][ T7807] netlink: 20 bytes leftover after parsing attributes in process `syz.2.912'. [ 1225.023692][ T29] audit: type=1400 audit(2000001052.490:348): avc: denied { setcurrent } for pid=7857 comm="syz.3.931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1237.175147][ T7919] netlink: 40 bytes leftover after parsing attributes in process `syz.3.948'. [ 1264.533578][ T29] audit: type=1400 audit(2000001092.000:349): avc: denied { remount } for pid=7966 comm="syz.2.962" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1264.747222][ T29] audit: type=1400 audit(2000001092.210:350): avc: denied { create } for pid=7972 comm="syz.2.965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1264.950720][ T29] audit: type=1400 audit(2000001092.420:351): avc: denied { ioctl } for pid=7972 comm="syz.2.965" path="socket:[10006]" dev="sockfs" ino=10006 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1279.135830][ T29] audit: type=1400 audit(2000001106.600:352): avc: denied { setopt } for pid=7996 comm="syz.2.973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1280.843753][ T29] audit: type=1400 audit(2000001108.310:353): avc: denied { create } for pid=8005 comm="syz.3.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1280.853130][ T29] audit: type=1400 audit(2000001108.320:354): avc: denied { bind } for pid=8005 comm="syz.3.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1280.857800][ T29] audit: type=1400 audit(2000001108.320:355): avc: denied { setopt } for pid=8005 comm="syz.3.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1280.862186][ T29] audit: type=1400 audit(2000001108.330:356): avc: denied { accept } for pid=8005 comm="syz.3.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1280.865828][ T29] audit: type=1400 audit(2000001108.330:357): avc: denied { write } for pid=8005 comm="syz.3.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1280.870196][ T29] audit: type=1400 audit(2000001108.340:358): avc: denied { read } for pid=8005 comm="syz.3.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1293.181597][ T29] audit: type=1400 audit(2000001120.650:359): avc: denied { setopt } for pid=8071 comm="syz.2.1003" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1298.055740][ T8085] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1006'. [ 1298.058452][ T8085] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1006'. [ 1298.058926][ T8085] netlink: 'syz.3.1006': attribute type 12 has an invalid length. [ 1298.059110][ T8085] netlink: 'syz.3.1006': attribute type 14 has an invalid length. [ 1305.030547][ T29] audit: type=1400 audit(2000001132.500:360): avc: denied { nlmsg_read } for pid=8096 comm="syz.3.1011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1316.315084][ T29] audit: type=1400 audit(2000001143.780:361): avc: denied { getopt } for pid=8115 comm="syz.2.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1316.593191][ T8118] netlink: 'syz.2.1020': attribute type 3 has an invalid length. [ 1316.593627][ T8118] netlink: 666 bytes leftover after parsing attributes in process `syz.2.1020'. [ 1317.009013][ T29] audit: type=1400 audit(2000001144.480:362): avc: denied { create } for pid=8119 comm="syz.2.1021" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1317.017176][ T29] audit: type=1400 audit(2000001144.480:363): avc: denied { map } for pid=8119 comm="syz.2.1021" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10167 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1317.017996][ T29] audit: type=1400 audit(2000001144.480:364): avc: denied { read write } for pid=8119 comm="syz.2.1021" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10167 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1317.994570][ T8127] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1335.459945][ T8170] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1037'. [ 1335.654649][ T29] audit: type=1400 audit(2000001163.120:365): avc: denied { bind } for pid=8173 comm="syz.3.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1336.802090][ T29] audit: type=1400 audit(2000001164.270:366): avc: denied { write } for pid=8185 comm="syz.3.1045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1338.600471][ T29] audit: type=1400 audit(2000001166.070:367): avc: denied { create } for pid=8197 comm="syz.3.1051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1338.604730][ T29] audit: type=1400 audit(2000001166.070:368): avc: denied { sys_admin } for pid=8197 comm="syz.3.1051" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1341.107633][ T8211] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1342.048306][ T8219] netlink: 96 bytes leftover after parsing attributes in process `syz.3.1059'. [ 1345.404639][ T8226] syz_tun: entered allmulticast mode [ 1353.053697][ T29] audit: type=1400 audit(2000001180.520:369): avc: denied { connect } for pid=8305 comm="syz.2.1082" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1353.910689][ T29] audit: type=1400 audit(2000001181.380:370): avc: denied { ioctl } for pid=8314 comm="syz.3.1085" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=11357 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1356.898109][ T8331] netlink: 'syz.3.1091': attribute type 3 has an invalid length. [ 1356.899538][ T8331] netlink: 64 bytes leftover after parsing attributes in process `syz.3.1091'. [ 1358.679913][ T29] audit: type=1400 audit(2000001186.140:371): avc: denied { create } for pid=8332 comm="syz.2.1092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1364.171763][ T8367] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1104'. [ 1365.500738][ T8382] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1111'. [ 1365.694838][ T8386] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1365.699718][ T8386] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1368.795449][ T29] audit: type=1400 audit(2000001196.260:372): avc: denied { getopt } for pid=8403 comm="syz.2.1119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1368.800914][ T29] audit: type=1400 audit(2000001196.270:373): avc: denied { setattr } for pid=8403 comm="syz.2.1119" name="/" dev="configfs" ino=1123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1372.030202][ T8447] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1372.031977][ T8447] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1376.113079][ T29] audit: type=1400 audit(2000001203.580:374): avc: denied { mounton } for pid=8460 comm="syz.3.1133" path="/proc/911/task" dev="proc" ino=11538 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1376.743559][ T29] audit: type=1326 audit(2000001204.190:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8463 comm="syz.3.1134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1376.766213][ T29] audit: type=1326 audit(2000001204.230:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8463 comm="syz.3.1134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1376.797623][ T29] audit: type=1326 audit(2000001204.260:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8463 comm="syz.3.1134" exe="/syz-executor" sig=0 arch=40000028 syscall=323 compat=0 ip=0x132970 code=0x7ffc0000 [ 1376.809840][ T29] audit: type=1326 audit(2000001204.280:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8463 comm="syz.3.1134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1376.813125][ T29] audit: type=1326 audit(2000001204.280:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8463 comm="syz.3.1134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1376.815807][ T29] audit: type=1326 audit(2000001204.280:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8463 comm="syz.3.1134" exe="/syz-executor" sig=0 arch=40000028 syscall=61 compat=0 ip=0x132970 code=0x7ffc0000 [ 1376.838223][ T29] audit: type=1326 audit(2000001204.310:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8463 comm="syz.3.1134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1376.840160][ T29] audit: type=1326 audit(2000001204.310:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8463 comm="syz.3.1134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 1377.503638][ T8466] ======================================================= [ 1377.503638][ T8466] WARNING: The mand mount option has been deprecated and [ 1377.503638][ T8466] and is ignored by this kernel. Remove the mand [ 1377.503638][ T8466] option from the mount to silence this warning. [ 1377.503638][ T8466] ======================================================= [ 1381.169382][ T8479] binder: 8478:8479 ioctl c0306201 20000080 returned -14 [ 1385.483624][ T8506] netlink: 104 bytes leftover after parsing attributes in process `syz.3.1149'. [ 1387.668717][ T29] audit: type=1400 audit(2000001215.130:383): avc: denied { bind } for pid=8525 comm="syz.2.1157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1387.682680][ T29] audit: type=1400 audit(2000001215.150:384): avc: denied { name_bind } for pid=8525 comm="syz.2.1157" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1387.689418][ T29] audit: type=1400 audit(2000001215.160:385): avc: denied { node_bind } for pid=8525 comm="syz.2.1157" saddr=224.0.0.1 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1393.978900][ T29] audit: type=1400 audit(2000001221.450:386): avc: denied { unmount } for pid=8564 comm="syz.2.1173" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=filesystem permissive=1 [ 1394.316199][ T29] audit: type=1400 audit(2000001221.780:387): avc: denied { map } for pid=8572 comm="syz.2.1177" path="socket:[11667]" dev="sockfs" ino=11667 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1398.165106][ T29] audit: type=1400 audit(2000001225.630:388): avc: denied { create } for pid=8601 comm="syz.2.1188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1401.543684][ T29] audit: type=1400 audit(2000001229.010:389): avc: denied { read } for pid=8661 comm="syz.3.1201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1402.485138][ T6016] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1402.509564][ T6016] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1402.532587][ T6016] bond0 (unregistering): Released all slaves [ 1402.669861][ T6016] hsr_slave_0: left promiscuous mode [ 1402.677707][ T6016] hsr_slave_1: left promiscuous mode [ 1403.859115][ T8695] tmpfs: Unsupported parameter 'huge' [ 1405.259450][ T8775] 8<--- cut here --- [ 1405.259713][ T8775] Unable to handle kernel paging request at virtual address fee000a7 when write [ 1405.259847][ T8775] [fee000a7] *pgd=80000080007003, *pmd=00000000 [ 1405.261456][ T8775] Internal error: Oops: a06 [#1] SMP ARM [ 1405.265514][ T8775] Modules linked in: [ 1405.266747][ T8775] CPU: 1 UID: 0 PID: 8775 Comm: syz.3.1210 Not tainted syzkaller #0 PREEMPT [ 1405.268649][ T8775] Hardware name: ARM-Versatile Express [ 1405.269405][ T8775] PC is at subdev_8255_io+0x60/0x6c [ 1405.270896][ T8775] LR is at subdev_8255_io+0x4c/0x6c [ 1405.271153][ T8775] pc : [<813dbc18>] lr : [<813dbc04>] psr: 60000013 [ 1405.271583][ T8775] sp : ea4ddcb8 ip : ea4ddcb8 fp : ea4ddcd4 [ 1405.271927][ T8775] r10: 00000000 r9 : 00000000 r8 : 00000084 [ 1405.272186][ T8775] r7 : 000000a4 r6 : 0000009b r5 : 8407f3c0 r4 : 000000a7 [ 1405.272505][ T8775] r3 : 0000009b r2 : fee000a7 r1 : 00000001 r0 : 8407f3c0 [ 1405.272926][ T8775] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1405.273350][ T8775] Control: 30c5387d Table: 85b9ed80 DAC: 00000000 [ 1405.273679][ T8775] Register r0 information: slab kmalloc-192 start 8407f3c0 pointer offset 0 size 192 [ 1405.274805][ T8775] Register r1 information: non-paged memory [ 1405.275169][ T8775] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 1405.275580][ T8775] Register r3 information: non-paged memory [ 1405.275718][ T8775] Register r4 information: non-paged memory [ 1405.275893][ T8775] Register r5 information: slab kmalloc-192 start 8407f3c0 pointer offset 0 size 192 [ 1405.276202][ T8775] Register r6 information: non-paged memory [ 1405.276472][ T8775] Register r7 information: non-paged memory [ 1405.276644][ T8775] Register r8 information: non-paged memory [ 1405.276822][ T8775] Register r9 information: NULL pointer [ 1405.277087][ T8775] Register r10 information: NULL pointer [ 1405.277235][ T8775] Register r11 information: 2-page vmalloc region starting at 0xea4dc000 allocated at kernel_clone+0xac/0x3ec [ 1405.277559][ T8775] Register r12 information: 2-page vmalloc region starting at 0xea4dc000 allocated at kernel_clone+0xac/0x3ec [ 1405.277853][ T8775] Process syz.3.1210 (pid: 8775, stack limit = 0xea4dc000) [ 1405.278055][ T8775] Stack: (0xea4ddcb8 to 0xea4de000) [ 1405.278361][ T8775] dca0: 813dbbb8 8407f3c0 [ 1405.278694][ T8775] dcc0: 000000a4 000000a4 ea4ddcf4 ea4ddcd8 813db8f0 813dbbc4 000000a4 8050a7fc [ 1405.279090][ T8775] dce0: 8585a000 8585a000 ea4ddd14 ea4ddcf8 813dbcb0 813db8a4 8585a000 8407f3c0 [ 1405.279588][ T8775] dd00: ea4ddda4 000000a4 ea4ddd54 ea4ddd18 813dbea4 813dbc30 82af1fe0 84083a80 [ 1405.279958][ T8775] dd20: 828215f0 00000000 00000000 829d23cc 8407f3c0 8407f404 ea4ddd90 8407f3c0 [ 1405.280352][ T8775] dd40: 00000000 82b25910 ea4ddd8c ea4ddd58 813cad9c 813dbdf4 20000180 00000000 [ 1405.280655][ T8775] dd60: ea4ddd7c 20000180 8407f3c0 b5403587 20000180 85e29800 40946400 00000003 [ 1405.280966][ T8775] dd80: ea4dde4c ea4ddd90 813c68e8 813caca0 35353238 00000000 00000000 00000000 [ 1405.281334][ T8775] dda0: 00000000 000000a4 01000405 0000000c 00000401 00000006 00000cc7 00000fff [ 1405.281702][ T8775] ddc0: 5c952395 00000003 000003fe 00000802 00001600 00000001 00000001 00000009 [ 1405.282079][ T8775] dde0: 0000e1cb 00000006 00000004 00000003 00000400 80000089 fffffffd 00000032 [ 1405.282433][ T8775] de00: 00003562 ffffeadb 00000001 0000003d 00000008 00000877 00000003 00002ec0 [ 1405.282830][ T8775] de20: 00000000 9d677a81 00000000 85d1a180 8407f3c0 20000180 20000180 85e29800 [ 1405.283138][ T8775] de40: ea4ddf14 ea4dde50 813c78b4 813c67f4 00000000 00000000 00000000 9d677a81 [ 1405.283494][ T8775] de60: 00000000 00000000 824625b4 0000005f 83c55de0 8407f3f0 8409c48c 85e29800 [ 1405.283735][ T8775] de80: ea4ddee4 ea4dde90 807a7d9c 8079e194 00000064 00000001 00000000 ea4ddeac [ 1405.284031][ T8775] dea0: 858ae850 834e1b28 00006400 0000000b ea4ddea0 00000000 00000000 9d677a81 [ 1405.284258][ T8775] dec0: 85d1a180 40946400 20000180 20000180 85d1a180 00000003 ea4ddef4 ea4ddee8 [ 1405.284476][ T8775] dee0: 807a7ebc 9d677a81 ea4ddf14 40946400 00000000 85d1a181 20000180 85d1a180 [ 1405.284668][ T8775] df00: 00000003 85e29800 ea4ddfa4 ea4ddf18 80578f00 813c72e4 ecac8b10 85e29800 [ 1405.284810][ T8775] df20: ea4ddf3c ea4ddf30 81a61720 81a615f0 ea4ddf54 ea4ddf40 8025c484 8028d914 [ 1405.285106][ T8775] df40: ea4ddfb0 40000000 ea4ddf84 ea4ddf58 802229ec 8025c440 00000000 8281cfb4 [ 1405.285340][ T8775] df60: ea4ddfb0 0014ced0 ecac8b10 80222940 00000000 9d677a81 ea4ddfac 00000000 [ 1405.285533][ T8775] df80: 00000000 00316308 00000036 8020029c 85e29800 00000036 00000000 ea4ddfa8 [ 1405.285720][ T8775] dfa0: 80200060 80578ddc 00000000 00000000 00000003 40946400 20000180 00000000 [ 1405.285958][ T8775] dfc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76fc90bc [ 1405.286393][ T8775] dfe0: 76fc8ec0 76fc8eb0 00019294 00132970 60000010 00000003 00000000 00000000 [ 1405.286946][ T8775] Call trace: [ 1405.287335][ T8775] [<813dbbb8>] (subdev_8255_io) from [<813db8f0>] (subdev_8255_do_config+0x58/0x60) [ 1405.287797][ T8775] r7:000000a4 r6:000000a4 r5:8407f3c0 r4:813dbbb8 [ 1405.288080][ T8775] [<813db898>] (subdev_8255_do_config) from [<813dbcb0>] (subdev_8255_io_init+0x8c/0x9c) [ 1405.288323][ T8775] r4:8585a000 [ 1405.288419][ T8775] [<813dbc24>] (subdev_8255_io_init) from [<813dbea4>] (dev_8255_attach+0xbc/0x114) [ 1405.288820][ T8775] r7:000000a4 r6:ea4ddda4 r5:8407f3c0 r4:8585a000 [ 1405.289504][ T8775] [<813dbde8>] (dev_8255_attach) from [<813cad9c>] (comedi_device_attach+0x108/0x250) [ 1405.290086][ T8775] r10:82b25910 r9:00000000 r8:8407f3c0 r7:ea4ddd90 r6:8407f404 r5:8407f3c0 [ 1405.290466][ T8775] r4:829d23cc [ 1405.290821][ T8775] [<813cac94>] (comedi_device_attach) from [<813c68e8>] (do_devconfig_ioctl+0x100/0x220) [ 1405.291212][ T8775] r10:00000003 r9:40946400 r8:85e29800 r7:20000180 r6:b5403587 r5:8407f3c0 [ 1405.291578][ T8775] r4:20000180 [ 1405.291808][ T8775] [<813c67e8>] (do_devconfig_ioctl) from [<813c78b4>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 1405.292248][ T8775] r8:85e29800 r7:20000180 r6:20000180 r5:8407f3c0 r4:85d1a180 [ 1405.292627][ T8775] [<813c72d8>] (comedi_unlocked_ioctl) from [<80578f00>] (sys_ioctl+0x130/0xba0) [ 1405.293060][ T8775] r10:85e29800 r9:00000003 r8:85d1a180 r7:20000180 r6:85d1a181 r5:00000000 [ 1405.293338][ T8775] r4:40946400 [ 1405.293491][ T8775] [<80578dd0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1405.293707][ T8775] Exception stack(0xea4ddfa8 to 0xea4ddff0) [ 1405.293847][ T8775] dfa0: 00000000 00000000 00000003 40946400 20000180 00000000 [ 1405.294103][ T8775] dfc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76fc90bc [ 1405.294365][ T8775] dfe0: 76fc8ec0 76fc8eb0 00019294 00132970 [ 1405.294602][ T8775] r10:00000036 r9:85e29800 r8:8020029c r7:00000036 r6:00316308 r5:00000000 [ 1405.294867][ T8775] r4:00000000 [ 1405.295227][ T8775] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 1405.295744][ T8775] ---[ end trace 0000000000000000 ]--- [ 1405.296418][ T8775] Kernel panic - not syncing: Fatal exception [ 1405.298824][ T8775] Rebooting in 86400 seconds.. VM DIAGNOSIS: 02:32:56 Registers: info registers vcpu 0 CPU#0 R00=00000020 R01=8325f000 R02=84069180 R03=df9f5400 R04=00000001 R05=8325f000 R06=8411906c R07=00000020 R08=00000000 R09=82457588 R10=00000020 R11=df801efc R12=df801ee0 R13=df801ee0 R14=80a321b8 R15=80a321bc PSR=60030193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000024 R01=00000000 R02=00000000 R03=85e29800 R04=85e29800 R05=82252740 R06=829fdbd2 R07=82a79158 R08=00000002 R09=00002247 R10=00000000 R11=ea4ddb0c R12=ea4dda00 R13=ea4ddab0 R14=802de438 R15=81a354cc PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000