last executing test programs: 7m37.524622421s ago: executing program 0 (id=118): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0), 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f93132", 0x39}], 0x1) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) close(0x3) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa80a010100000004"], 0x57) 7m37.211414544s ago: executing program 0 (id=119): r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000040)={0x10, 0x3ed, 0x30, 0x70bd2d, 0x25dfdbfc}, 0x10}, 0x1, 0x0, 0x0, 0x4048881}, 0x4048040) 7m36.842188849s ago: executing program 0 (id=120): ioctl$TUNSETIFF(0xffffffffffffffff, 0x5452, &(0x7f0000000580)={'veth1_to_bridge\x00', 0x400}) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10000082}, 0x4000080) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0xa, 0x4, 0xdd, 0xa}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x41100, 0x2f}, 0x94) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2400c444, &(0x7f0000000300)={0xa, 0x4e1e, 0x9, @loopback, 0x1}, 0x1c) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340), 0x8) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r2 = accept4(r1, 0x0, 0x0, 0x800) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="f78d9ca38fff48f3be52163448412ba8", 0xfffffe3f}, {&(0x7f0000000140)="ebe3a0e9796cfd1647e299f4e376fdba128280b372219d205e81f4a7f71c1926aae1efd7e0054a863f3d5cfe6cb55b5bb9fa6935849e6098ed884e7cb51726b360fbb37b4fe035bbb095873048"}, {&(0x7f00000003c0)="e8700e444d50a969ff67347cff6127e6ef12ee3819271482a4975a52c1ab9b8b4db3945d1032005eabe97b4dc33a47d3a158da988456d30026b433186f53cdcdb93a4722bf306a10470d50f5cb1ece9ead3459bab1cf1538cd0b157653c5e892962c80f158c443e9c6ad7d2a8103ef2f4b93766b9a21501f94c1568b13756b66f74f46cf801704d2da8b96c34070b233af0afcc436712e58ed25e721193af05a045ad3fdc928f02f3dbad19d3e66eebda2e63f3f46ef4511cee26d7b48241847bf9e343ef4674c45e2a085060f11"}], 0x1, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x40800) recvmsg(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x7ffff000}, {&(0x7f0000000200)=""/83, 0x20000253}], 0x2}, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000013c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000680)=ANY=[@ANYBLOB="f4060000", @ANYRES16=r3, @ANYBLOB="01000000000000e14f003b00000008000300", @ANYRES32=r4, @ANYBLOB="d506330080000000ffffffffffff080211000001"], 0x6f4}}, 0x0) 7m34.665754739s ago: executing program 0 (id=121): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x15, 0xe, 0x2000, 0x7f, 0x1}) 7m34.40668143s ago: executing program 0 (id=122): bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x50) sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x5e, 0x0, 0x0) setfsgid(0xee01) 7m11.257371668s ago: executing program 0 (id=132): setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0xc054) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000300)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000240000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ptrace$ARCH_SHSTK_LOCK(0x1e, r0, 0x1, 0x5003) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000080)="240000001e005f0214fffffffffffff80700001c0d00000000000000080009a60d000000", 0x24) sendto(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x0) r5 = fsopen(0x0, 0x1) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) fsmount(r5, 0x0, 0x1) inotify_init() 6m25.687544081s ago: executing program 32 (id=132): setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0xc054) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000300)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000240000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ptrace$ARCH_SHSTK_LOCK(0x1e, r0, 0x1, 0x5003) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) write(r4, &(0x7f0000000080)="240000001e005f0214fffffffffffff80700001c0d00000000000000080009a60d000000", 0x24) sendto(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x0) r5 = fsopen(0x0, 0x1) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) fsmount(r5, 0x0, 0x1) inotify_init() 1m54.508009332s ago: executing program 2 (id=288): bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) quotactl_fd$Q_GETFMT(0xffffffffffffffff, 0xffffffff80000402, 0x0, &(0x7f0000000300)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f00000d2000/0x1000)=nil, 0x1000, 0xb635773f06ebbee7, 0x57429da63284eb1a, 0xffffffffffffffff, 0x28f3f000) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000001c0)=0x1, 0x4) sched_setscheduler(r0, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0500000004000000040000000300000000000000b32d9ad224", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x50) 1m45.236316565s ago: executing program 2 (id=292): timerfd_create(0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x0, 0x2, 0xbfdffffc}, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) io_uring_enter(r0, 0x47f6, 0x0, 0x2, 0x0, 0x0) 1m44.917281424s ago: executing program 2 (id=293): r0 = syz_open_dev$evdev(&(0x7f0000000080), 0xfffffffffffffffb, 0x802) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x80004506, 0x0) 1m44.746589728s ago: executing program 2 (id=294): r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x822b01) io_setup(0x4, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 1m43.847030518s ago: executing program 2 (id=295): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001280)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x401, 0x28}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x18) socket(0x2c, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280), 0x800, 0x0) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xb) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200), r6) sendmsg$TIPC_NL_NET_SET(r6, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000003c0)={0x20, r7, 0x1, 0x70bd28, 0x25dfdffb, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x10000}, 0x4000000) 1m25.343428506s ago: executing program 2 (id=302): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000380)='sched_switch\x00', r4}, 0x18) syz_open_dev$usbfs(0x0, 0xf, 0xc340) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000380)={'tunl0\x00', 0x0, 0x40, 0x7800, 0x0, 0x4, {{0x5, 0x4, 0x0, 0x2c, 0x14, 0x66, 0x4, 0x40, 0x2f, 0x0, @broadcast, @multicast1}}}}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r7) sendfile(r6, 0xffffffffffffffff, 0x0, 0x20000023896) 44.916290824s ago: executing program 1 (id=321): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000005c0), 0x10) recvmmsg(r0, &(0x7f00000099c0)=[{{0x0, 0x0, 0x0}, 0x7f}], 0x1, 0x10002, 0x0) sendmsg$can_bcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="050000007f0000000000010000000000", @ANYRES64=0x0, @ANYRES16], 0x48}, 0x1, 0x0, 0x0, 0x8000010}, 0x20004801) 39.748162368s ago: executing program 33 (id=302): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000380)='sched_switch\x00', r4}, 0x18) syz_open_dev$usbfs(0x0, 0xf, 0xc340) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000480)={'syztnl0\x00', &(0x7f0000000380)={'tunl0\x00', 0x0, 0x40, 0x7800, 0x0, 0x4, {{0x5, 0x4, 0x0, 0x2c, 0x14, 0x66, 0x4, 0x40, 0x2f, 0x0, @broadcast, @multicast1}}}}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r7) sendfile(r6, 0xffffffffffffffff, 0x0, 0x20000023896) 32.79804217s ago: executing program 1 (id=323): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x8}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_EXTHDR_LEN={0x8, 0x4, 0x1, 0x0, 0x22}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x7}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0xcc}}, 0x0) 32.557891141s ago: executing program 1 (id=324): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f931", 0x38}], 0x1) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) close(0x3) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa80a010100000004"], 0x57) 32.106867986s ago: executing program 1 (id=325): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x8, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x10000002}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) socket$can_bcm(0x1d, 0x2, 0x2) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x9}}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, 0x0, 0x0) sendto$inet(r4, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x11) recvfrom$inet(r4, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x700, 0x0, 0xfffffffffffffd25) shutdown(r4, 0x1) 14.781472944s ago: executing program 1 (id=326): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r1, 0x40085112, &(0x7f00000000c0)=@l={0x92, 0x3, 0xb0, 0xd, 0x7, 0xff, 0x473d}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4008004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r5, 0x10e, 0xc, &(0x7f0000000040)=0x7f, 0x4) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$pokeuser(0x6, r6, 0x358, 0xffff8880b8409000) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_getevents(r7, 0x4, 0x4, &(0x7f00000019c0)=[{}, {}, {}, {}], 0x0) io_destroy(r7) r8 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x8801, 0x0) ioctl$TCSETAF(r8, 0x5408, &(0x7f00000000c0)={0x1, 0xff, 0x5, 0xfffc, 0xe, "f682756c98cc948c"}) writev(r8, &(0x7f0000000300)=[{&(0x7f0000000680)="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", 0x24a}], 0x1) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x3) 4.737594142s ago: executing program 3 (id=332): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)={0x6c, r0, 0x1, 0x70bd2a, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_REKEY_DATA={0x50, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="9ca55c105a866f8322d28c02febf73414594690508f51e59"}, @NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "83390a7d854f7755"}, @NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="0c4cc994cc7bdda27269473236b47d20703ec7edbbee796771bdc45653100ad4"}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x400c811}, 0x4004090) 3.047037794s ago: executing program 3 (id=333): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f931", 0x38}], 0x1) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0x40) close(0x3) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa80a010100000004"], 0x57) 2.667354322s ago: executing program 3 (id=334): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_DEL_VIF(r0, 0x0, 0xcb, &(0x7f0000000d80)={0x1, 0x4, 0x1, 0x8, @vifc_lcl_addr=@broadcast, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 2.386095762s ago: executing program 3 (id=335): r0 = socket(0x11, 0xa, 0x0) write$vga_arbiter(0xffffffffffffffff, &(0x7f0000000000)=@unlock_all, 0x7) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x10, &(0x7f0000000080)={0x0}, 0x8, 0x0, 0x0, 0x44080}, 0x20044084) 2.075836531s ago: executing program 3 (id=336): kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x17, 0xa, 0x801, 0x0, 0x0, {0xa, 0x0, 0x2}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x0) 1.667533707s ago: executing program 3 (id=337): socket$kcm(0x10, 0x2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) fsopen(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/oss_mixer\x00', 0x2002, 0x0) write$proc_mixer(r5, &(0x7f0000000180)=ANY=[@ANYBLOB="5245434c45560a50484f4e454f55540a535045414b455220274344272030303030303030303030303030303030303030300a4449474954414c32202706b86e65204361707455"], 0xb8) r6 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/card0/oss_mixer\x00', 0x0, 0x0) dup3(r6, r5, 0x0) r7 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r7, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00', 0x800, 0x0, 0x103, 0x1}, 0x20) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0xa, 0x4e24, 0x1, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000300)}, 0x0) connect$inet(r7, &(0x7f00000009c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0xc0}, 0x0) 0s ago: executing program 1 (id=338): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f93132", 0x39}], 0x1) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, 0x0, 0x0) close(0x3) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa80a010100000004"], 0x57) kernel console output (not intermixed with test programs): [ 1014.903918][ T31] audit: type=1400 audit(1014.830:56): avc: denied { read write } for pid=3127 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1014.904485][ T31] audit: type=1400 audit(1014.830:57): avc: denied { open } for pid=3127 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:64693' (ED25519) to the list of known hosts. [ 1029.400211][ T31] audit: type=1400 audit(1029.330:58): avc: denied { name_bind } for pid=3130 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1031.034795][ T31] audit: type=1400 audit(1030.950:59): avc: denied { execute } for pid=3132 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1031.050806][ T31] audit: type=1400 audit(1030.970:60): avc: denied { execute_no_trans } for pid=3132 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1033.758580][ T31] audit: type=1400 audit(1033.690:61): avc: denied { mounton } for pid=3132 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1033.763682][ T31] audit: type=1400 audit(1033.690:62): avc: denied { mount } for pid=3132 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1033.776937][ T3132] cgroup: Unknown subsys name 'net' [ 1033.785422][ T31] audit: type=1400 audit(1033.710:63): avc: denied { unmount } for pid=3132 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1033.967138][ T3132] cgroup: Unknown subsys name 'cpuset' [ 1033.973672][ T3132] cgroup: Unknown subsys name 'hugetlb' [ 1033.975740][ T3132] cgroup: Unknown subsys name 'rlimit' [ 1034.222340][ T31] audit: type=1400 audit(1034.150:64): avc: denied { setattr } for pid=3132 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1034.222775][ T31] audit: type=1400 audit(1034.150:65): avc: denied { mounton } for pid=3132 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 1034.230976][ T31] audit: type=1400 audit(1034.160:66): avc: denied { mount } for pid=3132 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 1034.463567][ T3134] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 1034.468215][ T31] audit: type=1400 audit(1034.390:67): avc: denied { relabelto } for pid=3134 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 1034.472427][ T31] audit: type=1400 audit(1034.400:68): avc: denied { write } for pid=3134 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 1034.519590][ T31] audit: type=1400 audit(1034.450:69): avc: denied { read } for pid=3132 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 1034.524321][ T31] audit: type=1400 audit(1034.450:70): avc: denied { open } for pid=3132 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 1041.809602][ T3132] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 1043.666297][ T31] audit: type=1400 audit(1043.590:71): avc: denied { execmem } for pid=3136 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1043.742520][ T31] audit: type=1400 audit(1043.670:72): avc: denied { read } for pid=3138 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1043.752629][ T31] audit: type=1400 audit(1043.680:73): avc: denied { open } for pid=3138 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1043.761278][ T31] audit: type=1400 audit(1043.680:74): avc: denied { mounton } for pid=3138 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1043.779025][ T31] audit: type=1400 audit(1043.700:75): avc: denied { module_request } for pid=3138 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1043.864350][ T31] audit: type=1400 audit(1043.790:76): avc: denied { sys_module } for pid=3138 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1044.674350][ T31] audit: type=1400 audit(1044.600:77): avc: denied { ioctl } for pid=3138 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1046.134586][ T3139] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1046.171345][ T3139] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1046.209345][ T3138] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1046.216635][ T3138] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1047.278450][ T3139] hsr_slave_0: entered promiscuous mode [ 1047.281942][ T3139] hsr_slave_1: entered promiscuous mode [ 1047.381611][ T3138] hsr_slave_0: entered promiscuous mode [ 1047.383598][ T3138] hsr_slave_1: entered promiscuous mode [ 1047.385048][ T3138] debugfs: 'hsr0' already exists in 'hsr' [ 1047.385582][ T3138] Cannot create hsr debugfs directory [ 1047.895461][ T31] audit: type=1400 audit(1047.820:78): avc: denied { create } for pid=3139 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1047.906245][ T31] audit: type=1400 audit(1047.820:79): avc: denied { write } for pid=3139 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1047.906595][ T3139] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1047.906788][ T31] audit: type=1400 audit(1047.820:80): avc: denied { read } for pid=3139 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1047.939873][ T3139] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1047.962745][ T3139] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1047.983696][ T3139] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1048.062029][ T3138] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1048.085103][ T3138] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1048.095202][ T3138] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1048.103706][ T3138] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1048.921996][ T3138] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1048.966922][ T3139] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1051.427389][ T3139] veth0_vlan: entered promiscuous mode [ 1051.443836][ T3139] veth1_vlan: entered promiscuous mode [ 1051.489624][ T3139] veth0_macvtap: entered promiscuous mode [ 1051.499687][ T3139] veth1_macvtap: entered promiscuous mode [ 1051.548316][ T2967] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1051.552618][ T2967] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1051.560489][ T2967] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1051.560719][ T2967] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1051.656364][ T31] audit: type=1400 audit(1051.580:81): avc: denied { mount } for pid=3139 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1051.665736][ T31] audit: type=1400 audit(1051.590:82): avc: denied { mounton } for pid=3139 comm="syz-executor" path="/syzkaller.8zsYhk/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1051.685735][ T31] audit: type=1400 audit(1051.610:83): avc: denied { mount } for pid=3139 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1051.695519][ T31] audit: type=1400 audit(1051.620:84): avc: denied { mounton } for pid=3139 comm="syz-executor" path="/syzkaller.8zsYhk/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1051.708290][ T31] audit: type=1400 audit(1051.630:85): avc: denied { mounton } for pid=3139 comm="syz-executor" path="/syzkaller.8zsYhk/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2494 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1051.714898][ T31] audit: type=1400 audit(1051.640:86): avc: denied { unmount } for pid=3139 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1051.722187][ T31] audit: type=1400 audit(1051.650:87): avc: denied { mounton } for pid=3139 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1051.724336][ T31] audit: type=1400 audit(1051.650:88): avc: denied { mount } for pid=3139 comm="syz-executor" name="/" dev="gadgetfs" ino=2495 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1051.732588][ T31] audit: type=1400 audit(1051.660:89): avc: denied { mount } for pid=3139 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1051.738656][ T31] audit: type=1400 audit(1051.660:90): avc: denied { mounton } for pid=3139 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1051.796449][ T3139] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 1051.861360][ T3138] veth0_vlan: entered promiscuous mode [ 1051.875188][ T3138] veth1_vlan: entered promiscuous mode [ 1051.918441][ T3138] veth0_macvtap: entered promiscuous mode [ 1051.923846][ T3138] veth1_macvtap: entered promiscuous mode [ 1051.964351][ T3200] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1051.964939][ T3200] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1051.965062][ T3200] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1051.965105][ T3200] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1052.404451][ T3839] netlink: 'syz.0.1': attribute type 6 has an invalid length. [ 1052.798644][ T3836] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 1052.958396][ T3836] usb 2-1: Using ep0 maxpacket: 8 [ 1052.968196][ T3836] usb 2-1: config index 0 descriptor too short (expected 301, got 45) [ 1052.969583][ T3836] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 1052.974616][ T3836] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 1052.976141][ T3836] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 1052.977247][ T3836] usb 2-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 1052.978933][ T3836] usb 2-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 1052.979921][ T3836] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1053.204458][ T3836] usb 2-1: usb_control_msg returned -32 [ 1053.205632][ T3836] usbtmc 2-1:16.0: can't read capabilities [ 1063.461391][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 1063.461720][ T31] audit: type=1400 audit(1063.390:106): avc: denied { prog_run } for pid=3858 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1067.569084][ T43] usb 2-1: USB disconnect, device number 2 [ 1078.779436][ T31] audit: type=1400 audit(1078.680:107): avc: denied { create } for pid=3876 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1083.786081][ T3884] netlink: 'syz.1.9': attribute type 2 has an invalid length. [ 1086.376664][ T31] audit: type=1400 audit(1086.300:108): avc: denied { create } for pid=3885 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1086.393426][ T31] audit: type=1400 audit(1086.320:109): avc: denied { write } for pid=3885 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1086.860194][ T31] audit: type=1400 audit(1086.790:110): avc: denied { ioctl } for pid=3889 comm="syz.0.11" path="socket:[2626]" dev="sockfs" ino=2626 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1088.211121][ T31] audit: type=1400 audit(1088.140:111): avc: denied { name_bind } for pid=3894 comm="syz.0.12" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1088.211531][ T31] audit: type=1400 audit(1088.140:112): avc: denied { node_bind } for pid=3894 comm="syz.0.12" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1095.271335][ T31] audit: type=1400 audit(1095.200:113): avc: denied { create } for pid=3898 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1095.280462][ T3899] Zero length message leads to an empty skb [ 1096.170431][ T31] audit: type=1400 audit(1096.100:114): avc: denied { create } for pid=3901 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1096.175320][ T31] audit: type=1400 audit(1096.100:115): avc: denied { bind } for pid=3901 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1096.188339][ T3902] netlink: 28 bytes leftover after parsing attributes in process `syz.0.14'. [ 1096.189300][ T3902] netlink: 28 bytes leftover after parsing attributes in process `syz.0.14'. [ 1096.204991][ T3902] syz_tun: entered promiscuous mode [ 1096.206967][ T3902] erspan0: entered promiscuous mode [ 1096.309160][ T3906] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 1096.404574][ T31] audit: type=1400 audit(1096.330:116): avc: denied { create } for pid=3907 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1096.415996][ T31] audit: type=1400 audit(1096.340:117): avc: denied { write } for pid=3907 comm="syz.0.16" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1096.898068][ T3836] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 1097.048458][ T3836] usb 1-1: Using ep0 maxpacket: 16 [ 1097.060063][ T3836] usb 1-1: config 0 has an invalid descriptor of length 198, skipping remainder of the config [ 1097.060948][ T3836] usb 1-1: too many endpoints for config 0 interface 0 altsetting 0: 40, using maximum allowed: 30 [ 1097.061624][ T3836] usb 1-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 40 [ 1097.062749][ T3836] usb 1-1: New USB device found, idVendor=054c, idProduct=05c4, bcdDevice= 0.00 [ 1097.063533][ T3836] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1097.068980][ T3836] usb 1-1: config 0 descriptor?? [ 1097.825470][ T31] audit: type=1400 audit(1097.750:118): avc: denied { create } for pid=3918 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1097.905587][ T31] audit: type=1400 audit(1097.830:119): avc: denied { map } for pid=3918 comm="syz.1.19" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1102.312495][ T3836] usb 1-1: string descriptor 0 read error: -32 [ 1103.409701][ T31] audit: type=1400 audit(1103.320:120): avc: denied { write } for pid=3912 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1103.541346][ T31] audit: type=1400 audit(1103.470:121): avc: denied { read } for pid=3912 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1115.370833][ T43] usb 1-1: USB disconnect, device number 2 [ 1117.230737][ T31] audit: type=1400 audit(1117.150:122): avc: denied { mounton } for pid=3939 comm="syz.0.23" path="/12/file0" dev="tmpfs" ino=79 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1119.306027][ T31] audit: type=1400 audit(1119.230:123): avc: denied { unmount } for pid=3138 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1121.705006][ T31] audit: type=1400 audit(1121.630:124): avc: denied { create } for pid=3947 comm="syz.0.24" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1125.682954][ T31] audit: type=1400 audit(1125.610:125): avc: denied { create } for pid=3953 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1125.710226][ T31] audit: type=1400 audit(1125.640:126): avc: denied { write } for pid=3953 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1136.823098][ T31] audit: type=1400 audit(1136.750:127): avc: denied { setopt } for pid=3962 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1136.827009][ T31] audit: type=1400 audit(1136.750:128): avc: denied { accept } for pid=3962 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1136.838584][ T31] audit: type=1400 audit(1136.760:129): avc: denied { write } for pid=3962 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1136.960892][ T31] audit: type=1400 audit(1136.890:130): avc: denied { allowed } for pid=3964 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1137.214035][ T3969] netlink: 'syz.1.32': attribute type 4 has an invalid length. [ 1137.356154][ T31] audit: type=1400 audit(1137.280:131): avc: denied { create } for pid=3970 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1137.367054][ T31] audit: type=1400 audit(1137.290:132): avc: denied { write } for pid=3970 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1138.586349][ T31] audit: type=1400 audit(1138.510:133): avc: denied { create } for pid=3977 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1138.599411][ T31] audit: type=1400 audit(1138.530:134): avc: denied { ioctl } for pid=3977 comm="syz.1.34" path="socket:[2763]" dev="sockfs" ino=2763 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1158.758941][ T3131] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 1159.111694][ T3131] usb 1-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 1159.113409][ T3131] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1159.115334][ T3131] usb 1-1: Product: syz [ 1159.126253][ T3131] usb 1-1: Manufacturer: syz [ 1159.139881][ T3131] usb 1-1: SerialNumber: syz [ 1160.578022][ T3126] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 1160.884708][ T3126] usb 2-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 1160.885078][ T3126] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1160.885255][ T3126] usb 2-1: Product: syz [ 1160.885285][ T3126] usb 2-1: Manufacturer: syz [ 1160.885299][ T3126] usb 2-1: SerialNumber: syz [ 1161.146897][ T3131] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000040. ret = -EPROTO [ 1161.152018][ T3131] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00001000. ret = -EPROTO [ 1161.159370][ T3131] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to write register index 0x0000011c. ret = -EPROTO [ 1161.163880][ T3131] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Registers INIT FAILED.... [ 1161.170159][ T3131] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 1161.180776][ T3131] lan78xx 1-1:1.0: probe with driver lan78xx failed with error -71 [ 1161.196506][ T3131] usb 1-1: USB disconnect, device number 3 [ 1163.085989][ T3126] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000080. ret = -EPROTO [ 1163.086286][ T3126] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Registers INIT FAILED.... [ 1163.086764][ T3126] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 1163.091633][ T3126] lan78xx 2-1:1.0: probe with driver lan78xx failed with error -71 [ 1163.137813][ T3126] usb 2-1: USB disconnect, device number 3 [ 1163.415934][ T31] audit: type=1400 audit(1163.340:135): avc: denied { mount } for pid=4023 comm="syz.1.45" name="/" dev="ramfs" ino=2818 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1163.416372][ T31] audit: type=1400 audit(1163.340:136): avc: denied { create } for pid=4016 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1163.638020][ T31] audit: type=1400 audit(1163.510:137): avc: denied { write } for pid=4016 comm="syz.0.44" path="socket:[2819]" dev="sockfs" ino=2819 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1165.071342][ T4036] process 'syz.1.48' launched './file0' with NULL argv: empty string added [ 1165.110484][ T31] audit: type=1400 audit(1165.000:138): avc: denied { execute } for pid=4034 comm="syz.1.48" name="file0" dev="tmpfs" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1165.110818][ T31] audit: type=1400 audit(1165.000:139): avc: denied { execute_no_trans } for pid=4034 comm="syz.1.48" path="/24/file0" dev="tmpfs" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1166.150188][ T4039] smc: net device bond0 applied user defined pnetid SYZ0 [ 1166.159159][ T4039] smc: net device bond0 erased user defined pnetid SYZ0 [ 1166.530680][ T31] audit: type=1400 audit(1166.460:140): avc: denied { mount } for pid=4040 comm="syz.1.50" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1166.590814][ T31] audit: type=1400 audit(1166.520:141): avc: denied { unmount } for pid=3139 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1166.744931][ T31] audit: type=1400 audit(1166.670:142): avc: denied { create } for pid=4042 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1167.450088][ T31] audit: type=1400 audit(1167.360:143): avc: denied { create } for pid=4042 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1170.091513][ T4055] input: syz0 as /devices/virtual/input/input3 [ 1170.825279][ T4063] netlink: 'syz.1.57': attribute type 4 has an invalid length. [ 1170.860364][ T4063] netlink: 'syz.1.57': attribute type 4 has an invalid length. [ 1171.664666][ T31] audit: type=1400 audit(1171.590:144): avc: denied { append } for pid=4068 comm="syz.1.60" name="event1" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1174.938441][ T31] audit: type=1400 audit(1174.860:145): avc: denied { mounton } for pid=4070 comm="syz.1.61" path="/37/file0" dev="tmpfs" ino=209 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 1175.670258][ T4076] netlink: 'syz.1.62': attribute type 4 has an invalid length. [ 1175.740990][ T4076] netlink: 'syz.1.62': attribute type 4 has an invalid length. [ 1184.327124][ T4090] netlink: 'syz.0.67': attribute type 4 has an invalid length. [ 1184.343450][ T4090] netlink: 'syz.0.67': attribute type 4 has an invalid length. [ 1184.427272][ T31] audit: type=1400 audit(1184.350:146): avc: denied { create } for pid=4091 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1184.435085][ T31] audit: type=1400 audit(1184.360:147): avc: denied { setopt } for pid=4091 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1184.896709][ T4099] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 1184.903130][ T31] audit: type=1400 audit(1184.830:148): avc: denied { ioctl } for pid=4098 comm="syz.0.70" path="socket:[3125]" dev="sockfs" ino=3125 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1184.911467][ T4099] netlink: 28 bytes leftover after parsing attributes in process `syz.0.70'. [ 1185.102635][ T4104] netlink: 'syz.0.72': attribute type 4 has an invalid length. [ 1185.111006][ T4104] netlink: 'syz.0.72': attribute type 4 has an invalid length. [ 1189.081385][ T31] audit: type=1400 audit(1189.010:149): avc: denied { write } for pid=4120 comm="syz.0.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1189.087822][ T31] audit: type=1400 audit(1189.010:150): avc: denied { nlmsg_write } for pid=4120 comm="syz.0.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1196.183481][ T4125] netlink: 'syz.1.77': attribute type 4 has an invalid length. [ 1196.204056][ T4125] netlink: 'syz.1.77': attribute type 4 has an invalid length. [ 1214.818786][ T31] audit: type=1400 audit(1214.740:151): avc: denied { map } for pid=4138 comm="syz.0.82" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3184 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1214.819854][ T31] audit: type=1400 audit(1214.750:152): avc: denied { read write } for pid=4138 comm="syz.0.82" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3184 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1214.990245][ T31] audit: type=1400 audit(1214.920:153): avc: denied { override_creds } for pid=4138 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1215.393546][ T4141] netlink: 'syz.0.83': attribute type 4 has an invalid length. [ 1215.433981][ T4141] netlink: 'syz.0.83': attribute type 4 has an invalid length. [ 1218.615627][ T4146] netlink: 56 bytes leftover after parsing attributes in process `syz.1.85'. [ 1219.259596][ T4152] netlink: 'syz.1.88': attribute type 4 has an invalid length. [ 1219.281529][ T4152] netlink: 'syz.1.88': attribute type 4 has an invalid length. [ 1219.610790][ T4153] could not allocate digest TFM handle blake2b-256 [ 1219.649426][ T4156] netlink: 8 bytes leftover after parsing attributes in process `syz.1.89'. [ 1219.664608][ T4156] syz_tun: entered promiscuous mode [ 1219.674298][ T4156] syz_tun: left promiscuous mode [ 1220.211363][ T31] audit: type=1400 audit(1220.140:154): avc: denied { create } for pid=4165 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1220.219585][ T31] audit: type=1400 audit(1220.140:155): avc: denied { bind } for pid=4165 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1220.221892][ T31] audit: type=1400 audit(1220.150:156): avc: denied { listen } for pid=4165 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1220.259981][ T31] audit: type=1400 audit(1220.190:157): avc: denied { connect } for pid=4165 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1223.820253][ T31] audit: type=1400 audit(1223.740:158): avc: denied { write } for pid=4165 comm="syz.1.91" path="socket:[2955]" dev="sockfs" ino=2955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1239.543820][ T4175] netlink: 'syz.0.93': attribute type 4 has an invalid length. [ 1239.589890][ T4175] netlink: 'syz.0.93': attribute type 4 has an invalid length. [ 1245.518126][ T95] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 1245.768157][ T95] usb 2-1: Using ep0 maxpacket: 32 [ 1245.804801][ T95] usb 2-1: unable to get BOS descriptor or descriptor too short [ 1245.822437][ T95] usb 2-1: config 0 has an invalid interface number: 99 but max is 0 [ 1245.838032][ T95] usb 2-1: config 0 has no interface number 0 [ 1245.848005][ T95] usb 2-1: config 0 interface 99 has no altsetting 0 [ 1245.982062][ T95] usb 2-1: New USB device found, idVendor=04d8, idProduct=f58b, bcdDevice=dc.ce [ 1245.987837][ T95] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1245.998882][ T95] usb 2-1: Product: syz [ 1246.004039][ T95] usb 2-1: Manufacturer: syz [ 1246.018624][ T95] usb 2-1: SerialNumber: syz [ 1246.149619][ T95] usb 2-1: config 0 descriptor?? [ 1246.493359][ T95] ir_toy 2-1:0.99: required endpoints not found [ 1246.502799][ T95] usb 2-1: USB disconnect, device number 4 [ 1246.609489][ T4200] netlink: 'syz.1.98': attribute type 4 has an invalid length. [ 1246.713422][ T31] audit: type=1400 audit(1246.640:159): avc: denied { sqpoll } for pid=4201 comm="syz.1.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1247.085371][ T31] audit: type=1400 audit(1247.010:160): avc: denied { setopt } for pid=4208 comm="syz.1.101" lport=141 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1247.090736][ T31] audit: type=1400 audit(1247.020:161): avc: denied { getopt } for pid=4208 comm="syz.1.101" lport=141 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1247.099560][ T4209] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 1247.319681][ T4213] netlink: 'syz.1.103': attribute type 4 has an invalid length. [ 1261.182082][ T4231] netlink: 'syz.1.108': attribute type 4 has an invalid length. [ 1263.800970][ T4246] netlink: 'syz.1.113': attribute type 4 has an invalid length. [ 1268.815318][ T4256] netlink: 'syz.0.118': attribute type 4 has an invalid length. [ 1269.230058][ T31] audit: type=1400 audit(1269.140:162): avc: denied { audit_write } for pid=4257 comm="syz.0.119" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1288.225585][ T4278] Illegal XDP return value 4154254277 on prog (id 18) dev syz_tun, expect packet loss! [ 1290.949595][ T4282] netdevsim netdevsim1 netdevsim0: entered promiscuous mode [ 1290.949984][ T4282] netdevsim netdevsim1 netdevsim0: entered allmulticast mode [ 1290.955754][ T4282] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 1291.095841][ T31] audit: type=1400 audit(1291.020:163): avc: denied { setopt } for pid=4285 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1294.965554][ T4305] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1295.289945][ T3131] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 1295.450173][ T3131] usb 2-1: Using ep0 maxpacket: 16 [ 1295.472733][ T3131] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 253, changing to 11 [ 1295.473094][ T3131] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1295.473417][ T3131] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 1295.473631][ T3131] usb 2-1: New USB device found, idVendor=044e, idProduct=120c, bcdDevice= 0.00 [ 1295.473687][ T3131] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1295.484194][ T3131] usb 2-1: config 0 descriptor?? [ 1296.348695][ T3131] hid-alps 0003:044E:120C.0001: hidraw0: USB HID v0.00 Device [HID 044e:120c] on usb-dummy_hcd.1-1/input0 [ 1296.438323][ T3131] usb 2-1: USB disconnect, device number 5 [ 1296.968067][ T4333] netlink: 84 bytes leftover after parsing attributes in process `syz.1.137'. [ 1300.168340][ T3833] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 1300.454402][ T3833] usb 2-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 1300.457885][ T3833] usb 2-1: config 1 has an invalid descriptor of length 55, skipping remainder of the config [ 1300.458052][ T3833] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 1300.458145][ T3833] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 55, changing to 9 [ 1300.458258][ T3833] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 8496, setting to 1024 [ 1300.537758][ T3833] usb 2-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 1300.541551][ T3833] usb 2-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 1300.546041][ T3833] usb 2-1: Product: syz [ 1300.564767][ T3833] usb 2-1: Manufacturer: syz [ 1300.640799][ T3833] cdc_wdm 2-1:1.0: skipping garbage [ 1300.668383][ T3833] cdc_wdm 2-1:1.0: skipping garbage [ 1300.688564][ T3833] cdc_wdm 2-1:1.0: cdc-wdm0: USB WDM device [ 1300.878981][ T3833] usb 2-1: USB disconnect, device number 6 [ 1301.155759][ T4359] vlan2: entered promiscuous mode [ 1301.161192][ T4359] dummy0: entered promiscuous mode [ 1301.166411][ T4359] vlan2: entered allmulticast mode [ 1301.179552][ T4359] dummy0: entered allmulticast mode [ 1301.548015][ T3126] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 1301.708502][ T3126] usb 2-1: Using ep0 maxpacket: 16 [ 1301.826377][ T3126] usb 2-1: New USB device found, idVendor=06be, idProduct=a232, bcdDevice=33.f3 [ 1301.826856][ T3126] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1301.827193][ T3126] usb 2-1: Product: syz [ 1301.827675][ T3126] usb 2-1: Manufacturer: syz [ 1301.827824][ T3126] usb 2-1: SerialNumber: syz [ 1301.831609][ T3126] usb 2-1: config 0 descriptor?? [ 1317.445822][ T3833] usb 2-1: USB disconnect, device number 7 [ 1317.561836][ T31] audit: type=1400 audit(1317.490:164): avc: denied { name_bind } for pid=4383 comm="syz.1.143" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1330.201046][ T31] audit: type=1400 audit(1330.130:165): avc: denied { connect } for pid=4390 comm="syz.1.145" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1355.324431][ T4534] netlink: 'syz.1.150': attribute type 4 has an invalid length. [ 1355.840711][ T4397] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1355.871220][ T4397] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1359.203922][ T4397] hsr_slave_0: entered promiscuous mode [ 1359.212079][ T4397] hsr_slave_1: entered promiscuous mode [ 1359.222244][ T4397] debugfs: 'hsr0' already exists in 'hsr' [ 1359.223999][ T4397] Cannot create hsr debugfs directory [ 1360.924345][ T4397] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1360.964173][ T4397] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1361.029214][ T4397] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1361.081078][ T4397] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1364.176672][ T4397] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1380.284008][ T4397] veth0_vlan: entered promiscuous mode [ 1380.354265][ T4397] veth1_vlan: entered promiscuous mode [ 1380.524190][ T4397] veth0_macvtap: entered promiscuous mode [ 1380.559284][ T4397] veth1_macvtap: entered promiscuous mode [ 1380.708790][ T3200] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1380.709531][ T3200] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1380.710479][ T3200] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1380.710794][ T3200] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1385.644177][ T3126] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 1385.902779][ T3126] usb 2-1: Using ep0 maxpacket: 8 [ 1385.994832][ T3126] usb 2-1: New USB device found, idVendor=0ccd, idProduct=0039, bcdDevice=90.7b [ 1386.018026][ T3126] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1396.938067][ T4768] i2c i2c-1: died at extended address code [ 1400.236816][ T3131] usb 2-1: USB disconnect, device number 8 [ 1400.828109][ T4779] netlink: 'syz.1.154': attribute type 4 has an invalid length. [ 1401.815557][ T31] audit: type=1400 audit(1401.740:166): avc: denied { bind } for pid=4785 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1401.851356][ T31] audit: type=1400 audit(1401.780:167): avc: denied { connect } for pid=4785 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1401.971448][ T31] audit: type=1400 audit(1401.900:168): avc: denied { setopt } for pid=4785 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1401.999892][ T31] audit: type=1400 audit(1401.910:169): avc: denied { write } for pid=4785 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1404.184134][ T31] audit: type=1400 audit(1404.110:170): avc: denied { read } for pid=4788 comm="syz.2.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1404.650097][ T4791] netlink: 'syz.2.159': attribute type 4 has an invalid length. [ 1405.092550][ T3126] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1405.113865][ T3126] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1405.308948][ T31] audit: type=1400 audit(1405.230:171): avc: denied { create } for pid=4800 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1405.333698][ T31] audit: type=1400 audit(1405.260:172): avc: denied { getopt } for pid=4800 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1406.884540][ T4807] netlink: 'syz.1.164': attribute type 4 has an invalid length. [ 1412.472925][ T31] audit: type=1400 audit(1412.400:173): avc: denied { create } for pid=4801 comm="syz.2.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1412.554089][ T31] audit: type=1400 audit(1412.480:174): avc: denied { ioctl } for pid=4801 comm="syz.2.162" path="socket:[4556]" dev="sockfs" ino=4556 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1434.469047][ T3126] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 1434.618601][ T3126] usb 2-1: Using ep0 maxpacket: 8 [ 1434.754182][ T3126] usb 2-1: New USB device found, idVendor=047d, idProduct=5003, bcdDevice=2f.8c [ 1434.754753][ T3126] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1434.754933][ T3126] usb 2-1: Product: syz [ 1434.755035][ T3126] usb 2-1: Manufacturer: syz [ 1434.755120][ T3126] usb 2-1: SerialNumber: syz [ 1434.773339][ T3126] usb 2-1: config 0 descriptor?? [ 1435.254942][ T4838] netlink: 'syz.2.169': attribute type 4 has an invalid length. [ 1435.646264][ T4842] syz.2.171 uses obsolete (PF_INET,SOCK_PACKET) [ 1435.655458][ T31] audit: type=1400 audit(1435.580:175): avc: denied { ioctl } for pid=4841 comm="syz.2.171" path="socket:[4573]" dev="sockfs" ino=4573 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1436.754782][ T4855] netlink: 'syz.2.174': attribute type 4 has an invalid length. [ 1437.408365][ T31] audit: type=1400 audit(1437.330:176): avc: denied { ioctl } for pid=4860 comm="syz.2.177" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3826 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1438.627936][ T4869] netlink: 'syz.2.179': attribute type 4 has an invalid length. [ 1438.823071][ T4872] geneve2: entered promiscuous mode [ 1438.823415][ T4872] geneve2: entered allmulticast mode [ 1438.849174][ T4620] netdevsim netdevsim2 netdevsim0: set [1, 1] type 2 family 0 port 20000 - 0 [ 1438.849436][ T4620] netdevsim netdevsim2 netdevsim1: set [1, 1] type 2 family 0 port 20000 - 0 [ 1438.849910][ T4620] netdevsim netdevsim2 netdevsim2: set [1, 1] type 2 family 0 port 20000 - 0 [ 1438.853848][ T4620] netdevsim netdevsim2 netdevsim3: set [1, 1] type 2 family 0 port 20000 - 0 [ 1442.444306][ T4886] netlink: 'syz.2.184': attribute type 4 has an invalid length. [ 1444.407185][ T4314] syz_tun (unregistering): left promiscuous mode [ 1444.652511][ T4620] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1444.752317][ T4620] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1444.827162][ T4620] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1444.933842][ T4620] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1445.838765][ T4620] erspan0 (unregistering): left promiscuous mode [ 1445.898093][ T4620] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1445.926117][ T4620] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1445.933442][ T4620] bond0 (unregistering): Released all slaves [ 1446.077661][ T4620] hsr_slave_0: left promiscuous mode [ 1446.146600][ T4620] hsr_slave_1: left promiscuous mode [ 1446.153830][ T4620] veth1_macvtap: left promiscuous mode [ 1446.155557][ T4620] veth0_macvtap: left promiscuous mode [ 1446.156255][ T4620] veth1_vlan: left promiscuous mode [ 1446.158316][ T4620] veth0_vlan: left promiscuous mode [ 1448.640786][ T4077] usb 2-1: USB disconnect, device number 9 [ 1449.975304][ T4936] netlink: 'syz.1.190': attribute type 4 has an invalid length. [ 1459.419833][ T4973] netlink: 'syz.2.195': attribute type 4 has an invalid length. [ 1459.538866][ T4975] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1466.471626][ T31] audit: type=1400 audit(1466.390:177): avc: denied { accept } for pid=4992 comm="syz.1.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1466.898128][ T3833] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 1467.068301][ T3833] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1467.068607][ T3833] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1467.068982][ T3833] usb 2-1: New USB device found, idVendor=0d8c, idProduct=0022, bcdDevice= 0.00 [ 1467.069281][ T3833] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1467.079156][ T3833] usb 2-1: config 0 descriptor?? [ 1467.668067][ T3833] cm6533_jd 0003:0D8C:0022.0003: unknown main item tag 0x0 [ 1467.669242][ T3833] cm6533_jd 0003:0D8C:0022.0003: unknown main item tag 0x0 [ 1467.685543][ T3833] input: HID 0d8c:0022 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0D8C:0022.0003/input/input4 [ 1467.700464][ T3833] cm6533_jd 0003:0D8C:0022.0003: input,hiddev0,hidraw0: USB HID v0.00 Device [HID 0d8c:0022] on usb-dummy_hcd.1-1/input0 [ 1467.879250][ T3833] usb 2-1: USB disconnect, device number 10 [ 1468.199865][ T5035] netlink: 'syz.1.200': attribute type 4 has an invalid length. [ 1481.637799][ T31] audit: type=1400 audit(1481.480:178): avc: denied { module_load } for pid=5077 comm="syz.2.204" path="/sys/power/wakeup_count" dev="sysfs" ino=753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 1481.656656][ T31] audit: type=1400 audit(1481.530:179): avc: denied { write } for pid=5077 comm="syz.2.204" name="tcp" dev="proc" ino=4026532954 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1488.382011][ T5084] netlink: 'syz.2.205': attribute type 4 has an invalid length. [ 1488.759628][ T5086] netlink: 788 bytes leftover after parsing attributes in process `syz.2.206'. [ 1489.281298][ T31] audit: type=1400 audit(1489.200:180): avc: denied { read } for pid=5091 comm="syz.1.209" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1489.284506][ T31] audit: type=1400 audit(1489.210:181): avc: denied { open } for pid=5091 comm="syz.1.209" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1489.290673][ T31] audit: type=1400 audit(1489.220:182): avc: denied { ioctl } for pid=5091 comm="syz.1.209" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1489.295285][ T31] audit: type=1400 audit(1489.220:183): avc: denied { set_context_mgr } for pid=5091 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1489.318001][ T31] audit: type=1400 audit(1489.240:184): avc: denied { map } for pid=5091 comm="syz.1.209" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1489.333503][ T31] audit: type=1400 audit(1489.260:185): avc: denied { call } for pid=5091 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1489.341103][ T31] audit: type=1400 audit(1489.270:186): avc: denied { transfer } for pid=5091 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1489.352358][ T5092] binder: 5091:5092 ioctl c0306201 200005c0 returned -14 [ 1489.447194][ T5094] netlink: 'syz.1.210': attribute type 4 has an invalid length. [ 1489.808633][ T3131] usb 2-1: new high-speed USB device number 11 using dummy_hcd [ 1489.968702][ T3131] usb 2-1: Using ep0 maxpacket: 8 [ 1489.983502][ T3131] usb 2-1: config 0 has an invalid interface number: 1 but max is 0 [ 1489.983797][ T3131] usb 2-1: config 0 has no interface number 0 [ 1489.983995][ T3131] usb 2-1: config 0 interface 1 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1489.984110][ T3131] usb 2-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1489.984148][ T3131] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1489.995967][ T3131] usb 2-1: config 0 descriptor?? [ 1490.017257][ T3131] iowarrior 2-1:0.1: IOWarrior product=0x1512, serial= interface=1 now attached to iowarrior0 [ 1490.229716][ T3833] usb 2-1: USB disconnect, device number 11 [ 1496.687924][ C0] hrtimer: interrupt took 10152304 ns [ 1502.633660][ T5128] netlink: 'syz.2.215': attribute type 4 has an invalid length. [ 1503.068488][ T31] audit: type=1400 audit(1502.990:187): avc: denied { cmd } for pid=5135 comm="syz.2.219" path="socket:[5210]" dev="sockfs" ino=5210 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1503.246116][ T5138] netlink: 'syz.2.220': attribute type 4 has an invalid length. [ 1506.460820][ T5148] netlink: 20 bytes leftover after parsing attributes in process `syz.1.223'. [ 1517.761485][ T5150] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1517.762122][ T5150] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1517.836799][ T5154] netlink: 'syz.2.225': attribute type 4 has an invalid length. [ 1519.671810][ T5162] can0: slcan on ptm0. [ 1520.790496][ T5155] can0 (unregistered): slcan off ptm0. [ 1532.761686][ T5187] netlink: 'syz.2.230': attribute type 4 has an invalid length. [ 1533.164927][ T5191] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1533.788385][ T5197] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1533.799010][ T5197] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1535.440138][ T5209] netlink: 'syz.2.235': attribute type 4 has an invalid length. [ 1541.828198][ T31] audit: type=1400 audit(1541.740:188): avc: denied { setopt } for pid=5222 comm="syz.2.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1544.673858][ T5236] binder_alloc: 5234: binder_alloc_buf, no vma [ 1566.078789][ T3833] usb 2-1: new high-speed USB device number 12 using dummy_hcd [ 1566.228354][ T3833] usb 2-1: Using ep0 maxpacket: 32 [ 1566.262262][ T3833] usb 2-1: config 0 has an invalid interface number: 89 but max is 0 [ 1566.262649][ T3833] usb 2-1: config 0 has no interface number 0 [ 1566.262890][ T3833] usb 2-1: config 0 interface 89 altsetting 2 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1566.263116][ T3833] usb 2-1: config 0 interface 89 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 0 [ 1566.263296][ T3833] usb 2-1: config 0 interface 89 has no altsetting 0 [ 1566.314484][ T3833] usb 2-1: New USB device found, idVendor=0ccd, idProduct=10af, bcdDevice=38.4e [ 1566.315623][ T3833] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1566.318261][ T3833] usb 2-1: Product: syz [ 1566.328329][ T3833] usb 2-1: Manufacturer: syz [ 1566.329297][ T3833] usb 2-1: SerialNumber: syz [ 1566.334651][ T3833] usb 2-1: config 0 descriptor?? [ 1576.575672][ T4086] usb 2-1: USB disconnect, device number 12 [ 1576.831202][ T5295] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1576.833019][ T5295] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1576.846140][ T5295] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1576.850633][ T5295] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1577.078251][ T5295] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1577.079316][ T5295] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1577.169964][ T31] audit: type=1400 audit(1577.100:189): avc: denied { map } for pid=5302 comm="syz.2.262" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1577.173341][ T31] audit: type=1400 audit(1577.100:190): avc: denied { execute } for pid=5302 comm="syz.2.262" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1577.205537][ T5303] Trying to write to read-only block-device nullb0 [ 1588.518712][ T5323] netlink: 28 bytes leftover after parsing attributes in process `syz.2.269'. [ 1588.761712][ T31] audit: type=1400 audit(1588.660:191): avc: denied { getopt } for pid=5327 comm="syz.2.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1591.524941][ T5342] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1591.531703][ T5342] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1591.764253][ T31] audit: type=1400 audit(1591.690:192): avc: denied { setopt } for pid=5345 comm="syz.2.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1592.449246][ T31] audit: type=1400 audit(1592.380:193): avc: denied { bind } for pid=5345 comm="syz.2.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1592.454289][ T31] audit: type=1400 audit(1592.380:194): avc: denied { read } for pid=5345 comm="syz.2.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1601.329529][ T5358] pim6reg: entered allmulticast mode [ 1611.461681][ T31] audit: type=1400 audit(1611.390:195): avc: denied { create } for pid=5389 comm="syz.2.286" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1611.469361][ T31] audit: type=1400 audit(1611.390:196): avc: denied { read } for pid=5389 comm="syz.2.286" name="file0" dev="tmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1611.478819][ T31] audit: type=1400 audit(1611.400:197): avc: denied { open } for pid=5389 comm="syz.2.286" path="/97/file0" dev="tmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1611.514672][ T31] audit: type=1400 audit(1611.440:198): avc: denied { unlink } for pid=4397 comm="syz-executor" name="file0" dev="tmpfs" ino=509 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1611.582976][ T31] audit: type=1400 audit(1611.510:199): avc: granted { setsecparam } for pid=5391 comm="syz.2.287" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1618.047142][ T31] audit: type=1400 audit(1617.970:200): avc: denied { prog_load } for pid=5397 comm="syz.1.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1618.063383][ T31] audit: type=1400 audit(1617.990:201): avc: denied { bpf } for pid=5397 comm="syz.1.289" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1619.422540][ T31] audit: type=1400 audit(1619.350:202): avc: denied { read write } for pid=3139 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1619.439463][ T31] audit: type=1400 audit(1619.370:203): avc: denied { read write open } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1619.442541][ T31] audit: type=1400 audit(1619.370:204): avc: denied { ioctl } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1619.520075][ T31] audit: type=1400 audit(1619.450:205): avc: denied { read } for pid=5421 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1619.561448][ T31] audit: type=1400 audit(1619.490:206): avc: denied { create } for pid=5421 comm="syz.1.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1619.583253][ T31] audit: type=1400 audit(1619.510:207): avc: denied { setopt } for pid=5421 comm="syz.1.290" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1619.670036][ T31] audit: type=1400 audit(1619.590:208): avc: denied { read write } for pid=3139 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1619.690619][ T31] audit: type=1400 audit(1619.610:209): avc: denied { read write open } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1623.350454][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 1623.355630][ T31] audit: type=1400 audit(1622.690:234): avc: denied { connect } for pid=5423 comm="syz.1.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1623.543900][ T31] audit: type=1400 audit(1622.730:235): avc: denied { create } for pid=5423 comm="syz.1.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1623.596188][ T31] audit: type=1400 audit(1622.790:236): avc: denied { connect } for pid=5423 comm="syz.1.291" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1623.642122][ T31] audit: type=1400 audit(1622.850:237): avc: denied { write } for pid=5423 comm="syz.1.291" path="socket:[5570]" dev="sockfs" ino=5570 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1623.712075][ T31] audit: type=1400 audit(1622.880:238): avc: denied { write } for pid=5423 comm="syz.1.291" laddr=fe80::b lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1623.835061][ T31] audit: type=1400 audit(1622.940:239): avc: denied { read } for pid=5423 comm="syz.1.291" laddr=fe80::b lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1624.054069][ T31] audit: type=1400 audit(1623.030:240): avc: denied { read } for pid=5423 comm="syz.1.291" dev="nsfs" ino=4026532720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1624.124007][ T31] audit: type=1400 audit(1623.050:241): avc: denied { read open } for pid=5423 comm="syz.1.291" path="net:[4026532720]" dev="nsfs" ino=4026532720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1624.231199][ T31] audit: type=1400 audit(1623.110:242): avc: denied { create } for pid=5423 comm="syz.1.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1624.398108][ T31] audit: type=1400 audit(1623.180:243): avc: denied { write } for pid=5423 comm="syz.1.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1628.407091][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 1628.419927][ T31] audit: type=1400 audit(1628.330:281): avc: denied { read } for pid=5435 comm="syz.2.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1628.422239][ T31] audit: type=1400 audit(1628.340:282): avc: denied { read write } for pid=3139 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1628.428123][ T31] audit: type=1400 audit(1628.340:283): avc: denied { read write open } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1628.430728][ T31] audit: type=1400 audit(1628.340:284): avc: denied { ioctl } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1628.451574][ T31] audit: type=1400 audit(1628.370:285): avc: denied { write } for pid=5435 comm="syz.2.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1628.494095][ T31] audit: type=1400 audit(1628.420:286): avc: denied { read } for pid=5442 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1628.538020][ T31] audit: type=1400 audit(1628.460:287): avc: denied { read write } for pid=5442 comm="syz.1.297" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1628.542238][ T31] audit: type=1400 audit(1628.470:288): avc: denied { read write open } for pid=5442 comm="syz.1.297" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1628.570123][ T31] audit: type=1400 audit(1628.500:289): avc: denied { block_suspend } for pid=5442 comm="syz.1.297" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1628.753959][ T31] audit: type=1400 audit(1628.680:290): avc: denied { read write } for pid=3139 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1629.159064][ T3742] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 1629.358758][ T3742] usb 2-1: Using ep0 maxpacket: 16 [ 1629.405918][ T3742] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1629.406243][ T3742] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1629.406497][ T3742] usb 2-1: New USB device found, idVendor=1b1c, idProduct=1b02, bcdDevice= 0.00 [ 1629.406563][ T3742] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1629.444511][ T3742] usb 2-1: config 0 descriptor?? [ 1630.120789][ T3742] corsair 0003:1B1C:1B02.0004: unknown main item tag 0x0 [ 1630.121055][ T3742] corsair 0003:1B1C:1B02.0004: unknown main item tag 0x0 [ 1630.121256][ T3742] corsair 0003:1B1C:1B02.0004: unknown main item tag 0x0 [ 1630.121464][ T3742] corsair 0003:1B1C:1B02.0004: unknown main item tag 0x0 [ 1630.121547][ T3742] corsair 0003:1B1C:1B02.0004: unknown main item tag 0x0 [ 1630.126836][ T3742] corsair 0003:1B1C:1B02.0004: hidraw0: USB HID v0.00 Device [HID 1b1c:1b02] on usb-dummy_hcd.1-1/input0 [ 1630.345727][ T3742] corsair 0003:1B1C:1B02.0004: Read invalid backlight brightness: ce. [ 1630.621071][ T3742] usb 2-1: USB disconnect, device number 13 [ 1633.418464][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 1633.418793][ T31] audit: type=1400 audit(1633.340:341): avc: denied { bpf } for pid=5480 comm="syz.1.300" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1633.423549][ T31] audit: type=1400 audit(1633.350:342): avc: denied { perfmon } for pid=5480 comm="syz.1.300" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1633.793770][ T31] audit: type=1400 audit(1633.720:343): avc: denied { read write } for pid=3139 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1633.815843][ T31] audit: type=1400 audit(1633.740:344): avc: denied { read write open } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1633.834675][ T31] audit: type=1400 audit(1633.760:345): avc: denied { ioctl } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1634.006646][ T31] audit: type=1400 audit(1633.930:346): avc: denied { read } for pid=5482 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1634.256453][ T31] audit: type=1400 audit(1634.180:347): avc: denied { prog_load } for pid=5482 comm="syz.1.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1634.264048][ T31] audit: type=1400 audit(1634.190:348): avc: denied { bpf } for pid=5482 comm="syz.1.301" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1634.277794][ T31] audit: type=1400 audit(1634.200:349): avc: denied { perfmon } for pid=5482 comm="syz.1.301" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1634.382508][ T31] audit: type=1400 audit(1634.310:350): avc: denied { prog_load } for pid=5482 comm="syz.1.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1640.812200][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 1640.812387][ T31] audit: type=1400 audit(1640.740:377): avc: denied { read } for pid=5486 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1640.882706][ T31] audit: type=1400 audit(1640.810:378): avc: denied { execmem } for pid=5486 comm="syz.2.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1643.218559][ T31] audit: type=1400 audit(1643.130:379): avc: denied { map_create } for pid=5486 comm="syz.2.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1643.224699][ T31] audit: type=1400 audit(1643.150:380): avc: denied { bpf } for pid=5486 comm="syz.2.302" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1643.256579][ T31] audit: type=1400 audit(1643.180:381): avc: denied { map_read map_write } for pid=5486 comm="syz.2.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1643.277983][ T31] audit: type=1400 audit(1643.200:382): avc: denied { prog_load } for pid=5486 comm="syz.2.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1643.292297][ T31] audit: type=1400 audit(1643.220:383): avc: denied { bpf } for pid=5486 comm="syz.2.302" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1643.295359][ T31] audit: type=1400 audit(1643.220:384): avc: denied { perfmon } for pid=5486 comm="syz.2.302" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1643.299138][ T31] audit: type=1400 audit(1643.220:385): avc: denied { perfmon } for pid=5486 comm="syz.2.302" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1643.303783][ T31] audit: type=1400 audit(1643.230:386): avc: denied { perfmon } for pid=5486 comm="syz.2.302" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1649.566092][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 1649.566536][ T31] audit: type=1400 audit(1649.490:397): avc: denied { read write } for pid=3139 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1649.588184][ T31] audit: type=1400 audit(1649.510:398): avc: denied { read write open } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1649.590642][ T31] audit: type=1400 audit(1649.510:399): avc: denied { ioctl } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1649.849780][ T31] audit: type=1400 audit(1649.770:400): avc: denied { read } for pid=5493 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1649.885598][ T31] audit: type=1400 audit(1649.810:401): avc: denied { create } for pid=5493 comm="syz.1.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1649.938710][ T31] audit: type=1400 audit(1649.870:402): avc: denied { create } for pid=5493 comm="syz.1.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1650.030002][ T31] audit: type=1400 audit(1649.950:403): avc: denied { read write } for pid=5493 comm="syz.1.303" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1650.036001][ T31] audit: type=1400 audit(1649.960:404): avc: denied { read write open } for pid=5493 comm="syz.1.303" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1650.083896][ T31] audit: type=1400 audit(1650.010:405): avc: denied { ioctl } for pid=5493 comm="syz.1.303" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1650.165567][ T31] audit: type=1400 audit(1650.090:406): avc: denied { ioctl } for pid=5493 comm="syz.1.303" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf07 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1651.294467][ T5517] netlink: 'syz.1.304': attribute type 4 has an invalid length. [ 1654.575308][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 1654.576165][ T31] audit: type=1400 audit(1654.500:482): avc: denied { execute_no_trans } for pid=5529 comm="syz.1.308" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1054 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1654.626874][ T31] audit: type=1400 audit(1654.550:483): avc: denied { execute } for pid=5529 comm="syz.1.308" name="file0" dev="tmpfs" ino=800 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1654.657072][ T31] audit: type=1400 audit(1654.580:484): avc: denied { execute } for pid=5529 comm="syz.1.308" dev="tmpfs" ino=1054 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1654.687367][ T31] audit: type=1400 audit(1654.610:485): avc: denied { execute_no_trans } for pid=5529 comm="syz.1.308" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1054 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1654.726192][ T31] audit: type=1400 audit(1654.650:486): avc: denied { execute } for pid=5529 comm="syz.1.308" name="file0" dev="tmpfs" ino=800 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1654.746136][ T31] audit: type=1400 audit(1654.670:487): avc: denied { execute } for pid=5529 comm="syz.1.308" dev="tmpfs" ino=1054 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1654.786369][ T31] audit: type=1400 audit(1654.710:488): avc: denied { execute_no_trans } for pid=5529 comm="syz.1.308" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1054 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1654.834582][ T31] audit: type=1400 audit(1654.760:489): avc: denied { execute } for pid=5529 comm="syz.1.308" name="file0" dev="tmpfs" ino=800 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1654.873966][ T31] audit: type=1400 audit(1654.800:490): avc: denied { execute } for pid=5529 comm="syz.1.308" dev="tmpfs" ino=1054 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1654.902737][ T31] audit: type=1400 audit(1654.830:491): avc: denied { execute_no_trans } for pid=5529 comm="syz.1.308" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1054 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1661.696052][ T31] kauditd_printk_skb: 40 callbacks suppressed [ 1661.696504][ T31] audit: type=1400 audit(1661.620:532): avc: denied { read write } for pid=3139 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1661.710707][ T31] audit: type=1400 audit(1661.640:533): avc: denied { read write open } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1661.713582][ T31] audit: type=1400 audit(1661.640:534): avc: denied { ioctl } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1661.790682][ T31] audit: type=1400 audit(1661.720:535): avc: denied { read } for pid=5533 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1661.847970][ T5534] netlink: 'syz.1.309': attribute type 4 has an invalid length. [ 1661.946527][ T31] audit: type=1400 audit(1661.870:536): avc: denied { read write } for pid=3139 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1661.954243][ T31] audit: type=1400 audit(1661.880:537): avc: denied { read write open } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1661.971820][ T31] audit: type=1400 audit(1661.890:538): avc: denied { ioctl } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1662.056674][ T31] audit: type=1400 audit(1661.980:539): avc: denied { read } for pid=5535 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1662.093646][ T31] audit: type=1400 audit(1662.020:540): avc: denied { read } for pid=5535 comm="syz.1.310" name="iommu" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1662.099546][ T31] audit: type=1400 audit(1662.030:541): avc: denied { read open } for pid=5535 comm="syz.1.310" path="/dev/iommu" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1671.636420][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 1671.636779][ T31] audit: type=1400 audit(1671.560:560): avc: denied { read write } for pid=3139 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1671.648726][ T31] audit: type=1400 audit(1671.570:561): avc: denied { read write open } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1671.658929][ T31] audit: type=1400 audit(1671.580:562): avc: denied { ioctl } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1671.730244][ T31] audit: type=1400 audit(1671.660:563): avc: denied { read } for pid=5541 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1671.782720][ T31] audit: type=1400 audit(1671.710:564): avc: denied { read write } for pid=5541 comm="syz.1.312" name="seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1671.786952][ T31] audit: type=1400 audit(1671.710:565): avc: denied { read write open } for pid=5541 comm="syz.1.312" path="/dev/snd/seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1671.808440][ T31] audit: type=1400 audit(1671.730:566): avc: denied { ioctl } for pid=5541 comm="syz.1.312" path="/dev/snd/seq" dev="devtmpfs" ino=719 ioctlcmd=0x5332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1671.895354][ T31] audit: type=1400 audit(1671.820:567): avc: denied { read write } for pid=3139 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1671.906749][ T31] audit: type=1400 audit(1671.830:568): avc: denied { read write open } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1671.918913][ T31] audit: type=1400 audit(1671.840:569): avc: denied { ioctl } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1674.406651][ C1] vkms_vblank_simulate: vblank timer overrun [ 1674.432642][ T5546] netlink: 'syz.1.314': attribute type 4 has an invalid length. [ 1676.861419][ T31] kauditd_printk_skb: 788 callbacks suppressed [ 1676.862585][ T31] audit: type=1400 audit(1676.790:1358): avc: denied { name_bind } for pid=5549 comm="syz.1.316" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1676.864470][ T31] audit: type=1400 audit(1676.790:1359): avc: denied { node_bind } for pid=5549 comm="syz.1.316" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1677.100768][ C1] vkms_vblank_simulate: vblank timer overrun [ 1678.097592][ T31] audit: type=1400 audit(1678.020:1360): avc: denied { read write } for pid=3139 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1678.121704][ T31] audit: type=1400 audit(1678.040:1361): avc: denied { read write open } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1678.122111][ T31] audit: type=1400 audit(1678.040:1362): avc: denied { ioctl } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1678.376257][ T31] audit: type=1400 audit(1678.300:1363): avc: denied { read } for pid=5554 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1678.465475][ T31] audit: type=1400 audit(1678.390:1364): avc: denied { read write } for pid=5554 comm="syz.1.317" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1678.482940][ T31] audit: type=1400 audit(1678.410:1365): avc: denied { read write open } for pid=5554 comm="syz.1.317" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1678.513209][ T31] audit: type=1400 audit(1678.440:1366): avc: denied { ioctl } for pid=5554 comm="syz.1.317" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1678.546296][ T31] audit: type=1400 audit(1678.470:1367): avc: denied { prog_load } for pid=5554 comm="syz.1.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1679.575125][ T5560] netlink: 'syz.1.319': attribute type 4 has an invalid length. [ 1681.904343][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 1681.904743][ T31] audit: type=1400 audit(1681.830:1429): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1681.918380][ T31] audit: type=1400 audit(1681.840:1430): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1681.932391][ T31] audit: type=1400 audit(1681.860:1431): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1681.942954][ T31] audit: type=1400 audit(1681.870:1432): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1681.968335][ T31] audit: type=1400 audit(1681.890:1433): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1681.983098][ T31] audit: type=1400 audit(1681.910:1434): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1681.993349][ T31] audit: type=1400 audit(1681.920:1435): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1682.010390][ T31] audit: type=1400 audit(1681.930:1436): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1682.041536][ T31] audit: type=1400 audit(1681.970:1437): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1682.045627][ T31] audit: type=1400 audit(1681.970:1438): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1686.939946][ T31] kauditd_printk_skb: 500 callbacks suppressed [ 1686.940295][ T31] audit: type=1400 audit(1686.870:1939): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1686.943173][ T31] audit: type=1400 audit(1686.870:1940): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1686.947972][ T31] audit: type=1400 audit(1686.870:1941): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1686.970490][ T31] audit: type=1400 audit(1686.900:1942): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1686.975758][ T31] audit: type=1400 audit(1686.900:1943): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1686.981950][ T31] audit: type=1400 audit(1686.910:1944): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1686.987982][ T31] audit: type=1400 audit(1686.910:1945): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1686.992981][ T31] audit: type=1400 audit(1686.920:1946): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1686.999652][ T31] audit: type=1400 audit(1686.930:1947): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1687.004635][ T31] audit: type=1400 audit(1686.930:1948): avc: denied { read } for pid=5564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1692.112233][ T31] kauditd_printk_skb: 475 callbacks suppressed [ 1692.112615][ T31] audit: type=1400 audit(1692.040:2424): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1692.413713][ T31] audit: type=1400 audit(1692.340:2425): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="rtnl-link-caif" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1692.681789][ T31] audit: type=1400 audit(1692.610:2426): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1693.320517][ T31] audit: type=1400 audit(1693.250:2427): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1693.408514][ T31] audit: type=1400 audit(1693.320:2428): avc: denied { read write } for pid=3139 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1693.408945][ T31] audit: type=1400 audit(1693.330:2429): avc: denied { read write open } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1693.409306][ T31] audit: type=1400 audit(1693.330:2430): avc: denied { ioctl } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1693.468606][ T31] audit: type=1400 audit(1693.390:2431): avc: denied { read } for pid=5695 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1693.494551][ T31] audit: type=1400 audit(1693.420:2432): avc: denied { create } for pid=5695 comm="syz.1.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1693.505571][ T31] audit: type=1400 audit(1693.430:2433): avc: denied { write } for pid=5695 comm="syz.1.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1693.910374][ T5699] netlink: 'syz.1.324': attribute type 4 has an invalid length. [ 1695.351439][ T5566] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1695.370988][ T5566] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1697.266591][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 1697.268919][ T31] audit: type=1400 audit(1697.190:2454): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1697.758242][ T31] audit: type=1400 audit(1697.670:2455): avc: denied { sys_module } for pid=5566 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1697.761562][ T31] audit: type=1400 audit(1697.690:2456): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1697.853137][ T31] audit: type=1400 audit(1697.780:2457): avc: denied { map_create } for pid=5700 comm="syz.1.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1697.856423][ T31] audit: type=1400 audit(1697.780:2458): avc: denied { bpf } for pid=5700 comm="syz.1.325" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1697.896945][ T31] audit: type=1400 audit(1697.820:2459): avc: denied { map_read map_write } for pid=5700 comm="syz.1.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1697.936793][ T31] audit: type=1400 audit(1697.860:2460): avc: denied { prog_load } for pid=5700 comm="syz.1.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1697.954328][ T31] audit: type=1400 audit(1697.880:2461): avc: denied { bpf } for pid=5700 comm="syz.1.325" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1698.005221][ T31] audit: type=1400 audit(1697.930:2462): avc: denied { prog_load } for pid=5700 comm="syz.1.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1698.050434][ T31] audit: type=1400 audit(1697.930:2463): avc: denied { bpf } for pid=5700 comm="syz.1.325" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1699.831256][ T5566] hsr_slave_0: entered promiscuous mode [ 1699.832927][ T5566] hsr_slave_1: entered promiscuous mode [ 1699.833523][ T5566] debugfs: 'hsr0' already exists in 'hsr' [ 1699.833714][ T5566] Cannot create hsr debugfs directory [ 1700.699451][ T5566] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1700.739117][ T5566] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1700.764183][ T5566] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1700.792897][ T5566] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1702.301040][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 1702.301445][ T31] audit: type=1400 audit(1702.230:2495): avc: denied { sys_module } for pid=5566 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1702.323441][ T31] audit: type=1400 audit(1702.250:2496): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1702.664561][ T31] audit: type=1400 audit(1702.590:2497): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1703.012240][ T31] audit: type=1400 audit(1702.940:2498): avc: denied { sys_module } for pid=5566 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1703.030323][ T31] audit: type=1400 audit(1702.960:2499): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1704.162340][ T5566] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1704.272821][ T31] audit: type=1400 audit(1704.200:2500): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1704.688812][ T31] audit: type=1400 audit(1704.600:2501): avc: denied { sys_module } for pid=5566 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1704.692000][ T31] audit: type=1400 audit(1704.620:2502): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1705.031262][ T31] audit: type=1400 audit(1704.960:2503): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1705.489571][ T31] audit: type=1400 audit(1705.420:2504): avc: denied { sys_module } for pid=5566 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1707.541131][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 1707.541434][ T31] audit: type=1400 audit(1707.470:2510): avc: denied { sys_module } for pid=5566 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1707.561543][ T31] audit: type=1400 audit(1707.480:2511): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1707.939070][ T31] audit: type=1400 audit(1707.860:2512): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1708.384763][ T31] audit: type=1400 audit(1708.310:2513): avc: denied { sys_module } for pid=5566 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1708.407307][ T31] audit: type=1400 audit(1708.330:2514): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1708.840255][ T31] audit: type=1400 audit(1708.770:2515): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1709.269207][ T31] audit: type=1400 audit(1709.190:2516): avc: denied { sys_module } for pid=5566 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1709.299597][ T31] audit: type=1400 audit(1709.230:2517): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1709.792774][ T31] audit: type=1400 audit(1709.720:2518): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1710.138353][ T31] audit: type=1400 audit(1710.060:2519): avc: denied { sys_module } for pid=5566 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1712.832629][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 1712.837974][ T31] audit: type=1400 audit(1712.760:2538): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1713.098476][ T31] audit: type=1400 audit(1713.030:2539): avc: denied { sys_module } for pid=5566 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1713.100164][ T31] audit: type=1400 audit(1713.030:2540): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1713.534848][ T31] audit: type=1400 audit(1713.460:2541): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1713.837858][ T31] audit: type=1400 audit(1713.750:2542): avc: denied { sys_module } for pid=5566 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1713.854027][ T31] audit: type=1400 audit(1713.770:2543): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1714.227773][ T31] audit: type=1400 audit(1714.150:2544): avc: denied { module_request } for pid=5566 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1714.338315][ T31] audit: type=1400 audit(1714.230:2545): avc: denied { create } for pid=5911 comm="syz.1.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1714.338519][ T31] audit: type=1400 audit(1714.240:2546): avc: denied { read } for pid=5911 comm="syz.1.326" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1714.338707][ T31] audit: type=1400 audit(1714.240:2547): avc: denied { read open } for pid=5911 comm="syz.1.326" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1715.412737][ T5922] [U] 1WT`8H$09\ [ 1715.420806][ T5922] [U] ;2}UGVĥ#O9ե>-ߴSݢP [ 1715.424084][ T5922] [U] 4XZ^Y)MC. OȞPOW [ 1715.431030][ T5922] [U] ä%Z [ 1715.438873][ T5922] [U] 8`}[TJ#Z~3µݥI~D%8@7J|{9DCE+OK?%6 [ 1716.612283][ T5566] veth0_vlan: entered promiscuous mode [ 1716.731023][ T5566] veth1_vlan: entered promiscuous mode [ 1716.991470][ T5566] veth0_macvtap: entered promiscuous mode [ 1717.034563][ T5566] veth1_macvtap: entered promiscuous mode [ 1717.265540][ T3200] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1717.272709][ T3200] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1717.277992][ T3200] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1717.279268][ T3200] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1717.845070][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 1717.848770][ T31] audit: type=1400 audit(1717.770:2572): avc: denied { mount } for pid=5566 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1717.863140][ T31] audit: type=1400 audit(1717.790:2573): avc: denied { mounton } for pid=5566 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1717.871131][ T31] audit: type=1400 audit(1717.790:2574): avc: denied { mount } for pid=5566 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1718.248201][ T31] audit: type=1400 audit(1718.170:2575): avc: denied { create } for pid=5930 comm="syz.3.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1718.275854][ T31] audit: type=1400 audit(1718.200:2576): avc: denied { write } for pid=5930 comm="syz.3.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1718.291785][ T31] audit: type=1400 audit(1718.220:2577): avc: denied { nlmsg_write } for pid=5930 comm="syz.3.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1718.312195][ T31] audit: type=1400 audit(1718.240:2578): avc: denied { create } for pid=5930 comm="syz.3.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1718.342060][ T31] audit: type=1400 audit(1718.270:2579): avc: denied { write } for pid=5930 comm="syz.3.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1718.344956][ T31] audit: type=1400 audit(1718.270:2580): avc: denied { nlmsg_write } for pid=5930 comm="syz.3.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1719.126151][ T5936] netlink: 'syz.3.328': attribute type 4 has an invalid length. [ 1719.457913][ T31] audit: type=1400 audit(1719.380:2581): avc: denied { create } for pid=5937 comm="syz.3.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1723.366925][ T5957] netlink: 'syz.3.333': attribute type 4 has an invalid length. [ 1723.633375][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 1723.633918][ T31] audit: type=1400 audit(1723.560:2603): avc: denied { create } for pid=5958 comm="syz.3.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1723.661418][ T31] audit: type=1400 audit(1723.590:2604): avc: denied { setopt } for pid=5958 comm="syz.3.334" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1723.919112][ T31] audit: type=1400 audit(1723.840:2605): avc: denied { create } for pid=5960 comm="syz.3.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1723.973392][ T31] audit: type=1400 audit(1723.900:2606): avc: denied { write } for pid=5960 comm="syz.3.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1724.369641][ T31] audit: type=1400 audit(1724.300:2607): avc: denied { create } for pid=5962 comm="syz.3.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1724.394859][ T31] audit: type=1400 audit(1724.320:2608): avc: denied { write } for pid=5962 comm="syz.3.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1724.585315][ T31] audit: type=1400 audit(1724.510:2609): avc: denied { create } for pid=5966 comm="syz.3.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1724.632721][ T31] audit: type=1400 audit(1724.560:2610): avc: denied { execmem } for pid=5966 comm="syz.3.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1724.641589][ T4620] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1724.645445][ T4620] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 1724.744608][ T4620] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1724.753142][ T4620] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 1724.840109][ T4620] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1724.841831][ T4620] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 1724.930395][ T4620] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1724.933060][ T4620] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 1725.350337][ T4620] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1725.371361][ T4620] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1725.385302][ T4620] bond0 (unregistering): Released all slaves [ 1725.512825][ T4620] hsr_slave_0: left promiscuous mode [ 1725.515989][ T4620] hsr_slave_1: left promiscuous mode [ 1725.548372][ T4620] veth1_macvtap: left promiscuous mode [ 1725.548568][ T4620] veth0_macvtap: left promiscuous mode [ 1725.548783][ T4620] veth1_vlan: left promiscuous mode [ 1725.548986][ T4620] veth0_vlan: left promiscuous mode [ 1725.770735][ T4620] pim6reg (unregistering): left allmulticast mode [ 1726.188926][ T31] audit: type=1400 audit(1726.110:2611): avc: denied { read write } for pid=3139 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1726.214300][ T31] audit: type=1400 audit(1726.140:2612): avc: denied { read write open } for pid=3139 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1726.492398][ T5982] netlink: 'syz.1.338': attribute type 4 has an invalid length. [ 1726.497284][ T5982] netlink: 'syz.1.338': attribute type 4 has an invalid length. [ 1726.531713][ T4620] ------------[ cut here ]------------ [ 1726.532040][ T4620] WARNING: CPU: 0 PID: 4620 at net/xfrm/xfrm_state.c:3303 xfrm_state_fini+0xd4/0x15c [ 1726.533942][ T4620] Modules linked in: [ 1726.536156][ T4620] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1726.538051][ T4620] CPU: 0 UID: 0 PID: 4620 Comm: kworker/u8:0 Not tainted syzkaller #0 PREEMPT [ 1726.538953][ T4620] Hardware name: ARM-Versatile Express [ 1726.539397][ T4620] Workqueue: netns cleanup_net [ 1726.539889][ T4620] Call trace: [ 1726.540242][ T4620] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1726.541111][ T4620] r7:00000000 r6:8281f77c r5:00000000 r4:82260d04 [ 1726.541498][ T4620] [<80201b08>] (show_stack) from [<8021fc50>] (dump_stack_lvl+0x54/0x7c) [ 1726.541849][ T4620] [<8021fbfc>] (dump_stack_lvl) from [<8021fc90>] (dump_stack+0x18/0x1c) [ 1726.542232][ T4620] r5:00000000 r4:82a77d18 [ 1726.542442][ T4620] [<8021fc78>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 1726.542758][ T4620] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 1726.543094][ T4620] r7:81801674 [ 1726.543251][ T4620] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 1726.543603][ T4620] r3:8280c684 r2:00000001 r1:82247720 r0:8224f19c [ 1726.543905][ T4620] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 1726.544315][ T4620] [<80254a44>] (__warn) from [<80254d44>] (warn_slowpath_fmt+0x178/0x1f4) [ 1726.544697][ T4620] r8:00000009 r7:8243ee48 r6:dfb35dd4 r5:841d3c00 r4:00000000 [ 1726.544962][ T4620] [<80254bd0>] (warn_slowpath_fmt) from [<81801674>] (xfrm_state_fini+0xd4/0x15c) [ 1726.545380][ T4620] r10:00000001 r9:00000001 r8:829dd028 r7:829eee90 r6:829dd028 r5:855a0ec0 [ 1726.545697][ T4620] r4:855a0ec0 [ 1726.545877][ T4620] [<818015a0>] (xfrm_state_fini) from [<817f2820>] (xfrm_net_exit+0x2c/0x40) [ 1726.546344][ T4620] r5:855a0ec0 r4:855a0ec0 [ 1726.546548][ T4620] [<817f27f4>] (xfrm_net_exit) from [<81564f60>] (ops_undo_list+0xe8/0x238) [ 1726.546870][ T4620] r5:855a0ec0 r4:dfb35e98 [ 1726.547067][ T4620] [<81564e78>] (ops_undo_list) from [<81567124>] (cleanup_net+0x20c/0x384) [ 1726.547731][ T4620] r10:00000000 r9:ffffffd4 r8:855a49c0 r7:829dd00c r6:829dcfe4 r5:82c1e640 [ 1726.548257][ T4620] r4:855a0ee0 [ 1726.548449][ T4620] [<81566f18>] (cleanup_net) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 1726.548817][ T4620] r10:8300f270 r9:8301c615 r8:841d3c00 r7:8300e600 r6:8301c600 r5:829dcffc [ 1726.549171][ T4620] r4:8603eb00 [ 1726.549380][ T4620] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 1726.549741][ T4620] r10:61c88647 r9:841d3c00 r8:8603eb2c r7:82804d40 r6:8300e600 r5:8300e620 [ 1726.550037][ T4620] r4:8603eb00 [ 1726.550235][ T4620] [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280) [ 1726.550587][ T4620] r10:00000000 r9:8603eb00 r8:8027ade4 r7:ec1b1e60 r6:8603eb80 r5:841d3c00 [ 1726.550889][ T4620] r4:00000001 [ 1726.551054][ T4620] [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1726.551526][ T4620] Exception stack(0xdfb35fb0 to 0xdfb35ff8) [ 1726.552009][ T4620] 5fa0: 00000000 00000000 00000000 00000000 [ 1726.552509][ T4620] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1726.553043][ T4620] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1726.553446][ T4620] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 [ 1726.553757][ T4620] r4:8606ffc0 [ 1726.555922][ T4620] Rebooting in 86400 seconds.. VM DIAGNOSIS: 03:24:32 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=82260d04 R02=00000000 R03=81a3b870 R04=00000006 R05=828f7888 R06=00000000 R07=828f7880 R08=841d3c00 R09=00000028 R10=828f7888 R11=dfb35b3c R12=dfb35b40 R13=dfb35b30 R14=8033d94c R15=81a3b880 PSR=800f0193 N--- A S svc32 s00=696c6573 s01=0078756e d00=0078756e696c6573 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=ddde6800 R02=0001f90e R03=00000005 R04=25f9ddb4 R05=00000019 R06=25f7e4a6 R07=00000019 R08=dddda130 R09=dddda180 R10=f9d3d3f0 R11=df805eac R12=df805eb0 R13=df805e90 R14=8033a890 R15=812ed080 PSR=00000193 ---- A S svc32 s00=64696c61 s01=6e656c20 d00=6e656c2064696c61 s02=3731205b s03=342e3632 d01=342e36323731205b s04=38323739 s05=205b5d34 d02=205b5d3438323739 s06=38393554 s07=6e205d32 d03=6e205d3238393554 s08=696c7465 s09=203a6b6e d04=203a6b6e696c7465 s10=7a797327 s11=332e312e d05=332e312e7a797327 s12=3a273833 s13=74746120 d06=747461203a273833 s14=75626972 s15=74206574 d07=7420657475626972 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000