last executing test programs: 5.421558701s ago: executing program 0 (id=367): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$incfs_size(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), 0x0, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) lremovexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='user.incfs.size\x00') 5.295144503s ago: executing program 0 (id=368): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000004c0)={0x8, 0x0, &(0x7f00000002c0)=[@decrefs], 0x0, 0x0, 0x0}) 5.149741806s ago: executing program 0 (id=369): unshare(0x6020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 5.056067834s ago: executing program 0 (id=370): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x7ffd, 0x220108, 0x6, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{r0}, 0x0, 0x0}, 0x20) 4.98200221s ago: executing program 0 (id=371): syz_emit_ethernet(0x66, &(0x7f0000000340)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "02adf7", 0x30, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @time_exceed={0x2, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "fd9063", 0x0, 0x3a, 0x0, @mcast1, @loopback={0x0, 0xffffac1414aa}}}}}}}}, 0x0) 4.981569471s ago: executing program 0 (id=372): r0 = syz_usb_connect(0x0, 0x3f, &(0x7f0000000540)=ANY=[@ANYBLOB="11010000733336088dee1edb23610000000109022d0101100000000904000003fe03010009cd8d1f0002000000090505020000fcffff09058b1e20"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$EVIOCGMASK(r1, 0x5b03, 0x0) 2.881254446s ago: executing program 1 (id=385): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="20000000130a010100100000000000000200000009"], 0x20}}, 0x0) 2.800194213s ago: executing program 1 (id=386): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x27) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000640)='sched_process_wait\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) close(r3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) 2.690674793s ago: executing program 1 (id=387): r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) write$dsp(r0, &(0x7f00000001c0)='\\', 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) ioctl$SNDCTL_DSP_SETFMT(0xffffffffffffffff, 0x40045010, 0x0) 1.850140407s ago: executing program 1 (id=388): r0 = socket$nl_rdma(0x10, 0x3, 0x14) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001580)=ANY=[@ANYBLOB="1000000009148307"], 0x10}, 0x1, 0xffffff7f00000000}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000700), r0) 1.293451036s ago: executing program 1 (id=389): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x34, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x1}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}]}, 0x34}}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r3, &(0x7f0000006a40)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @private0}, {0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000, 0x8e84fffef67c07}}, r4}}, 0x48) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f00000003c0)={0xf, 0x8, 0xfa00, {r4, 0x632f1f9cb7442d52}}, 0x10) getdents64(r2, 0x0, 0xffb8) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, r1, 0x2, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @remote}}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x60000000}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x40010) sendmsg$rds(r2, &(0x7f0000000c40)={&(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000180)=""/35, 0x23}, {&(0x7f0000000680)=""/181, 0xb5}, {&(0x7f0000000740)=""/196, 0xc4}, {&(0x7f0000000840)=""/67, 0x43}, {&(0x7f00000008c0)=""/216, 0xd8}, {&(0x7f00000009c0)=""/101, 0x65}, {&(0x7f0000000a40)=""/52, 0x34}, {&(0x7f0000000a80)=""/204, 0xcc}], 0x8, &(0x7f0000000c00), 0x0, 0x844}, 0x20004015) socket(0x11, 0x800000003, 0x0) r5 = socket$nl_generic(0x11, 0x3, 0x10) syz_emit_ethernet(0x49b, &(0x7f00000001c0)={@dev, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "cb653e", 0x465, 0x3a, 0x0, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x0, 0x9, "1598a4a8a719ffe0621615f6d04dcae3360546cf06f2665bae2296931fd1d71c1f7e8f222b9ddc4e0bfb5e5c9a484353b785e79b4d8181cf146261723484c54803466e8bedb8ecd2"}, {0x0, 0x2, "d429145c793e823829b4376332b2c98aee"}, {0x0, 0x7e, "130c3818a2eaac43f1a6efc4f7772852ea05bff405aa28758ba53e0f2060e4e027f24bb723a5571d0da2ebeb3fe47f34e606cb3987e3681841f511126b773758e143f6be25d6965fcca35155fec3f970e2067f5db8a5de787eaf96b5957e6b988c02ae9fe26ec3118d9fdcca129d1269b290f687cde5b4eaba737c806335ca0d1e43697d144c6df4dc0d31e84004bc22e87b6e2daab5674479c76a1be360d309e7e7e5fa089032b331a3ceea18d92124681c0b78a0f1665ffcba0bee11950f6b4912bb302b3e648fad7ff4862ccc823e720fdb20af8ab0a6a09dfcdacf69923d60a0efeacf81e1e7e17db9547a4962bdec794c013af7210e54d43f3fe7da2f88c674f4cfd818f6a7461368bf62f1d5f98fd9394eb74bf0559f1c6b1ebec57dba007f143108ca4be3fa330cc21a411b0b7af23ebd9282be17fb702a5ca61650b283eec78e0280e4f2713b42bd4e3615c48c55c1abe5827601038109736f9c6b7242e7c9c917309397b864eedf5ca71db1debb609b6381b54955706017731319e0cc41083f99bd11da748b47d8715080899eb15caf19df36632b73bb22596b8e16186a2e51e277f8c78df609ca44a83914e8f7a8b053210573941b560ff8b114326678c6851c74596300b1c2a1ddc0af5b4cb5f15fa61e42214341368152275070973f3063f35fded9eeb535a0837783921dc2b705e0a0ceacca1882ff23813bc9199a9be39559c9f82a7452ce6113780cd7d26f532b72603afbfe994f5baf7257c9a33b9ac1ecd0b69da263daa9ac7e6a8d4400341926ed1f0c0e9086009c7945c0b255716f5b0dac45a9af480dc1f17beba2a2cddeafed29ecc91ce704895e28d0c46e639591c667a7f34500ea98ef557801dccf733fa61f3cf6740e40418745a42a738440ba9fc2ec415ba0fbf34800e6987b902302d552cf869eb350a9a862cd946f8285b03f03067dc9bae653dc701d97c7e6f7c1f0767624ac9e48b041c51697968b1e1733921270e569ac0b1ac7c25d00936ad05f14d67d3225d6a8cecd9fb63205ab14131e2e742977860e4a38ec056cda185aa357a059d0180056816a7902bdc0951253005099039bd945a6a4e525123cd4fcb8c5b335626464707fc21e92039b9190020eb9ef84c61cddede466a4c3ea2572927153997c33433ce9de0a7d2ed0b5fb0dce9cc6630bd0635a66be0cb490689169618184e896233d49b8f0e0717ae5d557333d54887ed8d983ee01091326af86e76583131104c66753efd58c32e499be23a05249b98e505c4c0237e2e70506fed29a33169d02b74ba5cbefad267e1107f4468e1144ece9656d35b88e405405fbb1438510f0395752c61e57e760de178a58a8da65040946656220817732fa0cd36189027287597cc5ebe709ca9d9a507babd39f1e56a37657326c7ffb654c"}]}}}}}}, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f00000013c0)={'wlan1\x00', 0x0}) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r9}, 0x10) r10 = openat$mixer(0xffffffffffffff9c, &(0x7f00000018c0), 0x0, 0x0) ioctl$mixer_OSS_GETVERSION(r10, 0x80086303, &(0x7f0000000000)) sendmsg$NL80211_CMD_FRAME(r6, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000000)=ANY=[@ANYBLOB="f4060000", @ANYRES16=r7, @ANYBLOB="01000000000000e14f003b00000008000300", @ANYRES32=r8, @ANYBLOB="d506330080000000ffffffffffff080211000001"], 0x6f4}}, 0x0) r11 = syz_open_dev$mouse(&(0x7f0000000040), 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x5452, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000e8000000000040d90000850000002300000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r12, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x4, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x24}}, 0x0) sendmsg(r5, &(0x7f0000000640)={&(0x7f00000000c0)=@caif=@dgm={0x25, 0xd}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000000)="4ba72c4cfd81685544f46c3f0800", 0x36}], 0x2, 0x0, 0x0, 0x11000000}, 0x0) 0s ago: executing program 1 (id=390): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x10001) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x2200, 0x0) preadv(r5, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) open(0x0, 0x400141042, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x143142, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./bus\x00', 0x0, 0x0, 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x149) ioctl$LOOP_SET_STATUS64(r6, 0x4c04, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, "ef359f413bb90152f7d6d1ce5d29c3ee5e5ca9000f7c41499dc2aac63a01000000000000004faa2ad9c084a003ea00", "036c47c67808200400000000000000335263bdbcef549ba197fce47ddfdd753abd950100002a00ffffffffffffffff00000000e8f20000000200", "b7326736181c208220000000b9000000000000000000f0fffffffff2ff00", [0x0, 0x8]}) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x20000000006}}], [{@dont_measure}, {@flag='rw'}, {@subj_role={'subj_role', 0x3d, '*]'}}, {@subj_type={'subj_type', 0x3d, 'resuid'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}}) lsetxattr$security_ima(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600), &(0x7f0000000640)=@md5={0x1, "fe0c279a5b535afd49a475113d7c06be"}, 0x11, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000dc0)='>', 0x1}], 0x1}, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) recvmsg$unix(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/199, 0xc7}], 0x1}, 0x102) kernel console output (not intermixed with test programs): [ 52.933988][ T31] audit: type=1400 audit(52.880:68): avc: denied { read write } for pid=2992 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.938860][ T31] audit: type=1400 audit(52.880:69): avc: denied { open } for pid=2992 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:33473' (ED25519) to the list of known hosts. [ 64.264138][ T31] audit: type=1400 audit(64.200:70): avc: denied { name_bind } for pid=2993 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 66.926581][ T31] audit: type=1400 audit(66.880:71): avc: denied { execute } for pid=2995 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.930479][ T31] audit: type=1400 audit(66.880:72): avc: denied { execute_no_trans } for pid=2995 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.254730][ T31] audit: type=1400 audit(68.200:73): avc: denied { mounton } for pid=2995 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 68.259002][ T31] audit: type=1400 audit(68.210:74): avc: denied { mount } for pid=2995 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.276334][ T2995] cgroup: Unknown subsys name 'net' [ 68.286133][ T31] audit: type=1400 audit(68.240:75): avc: denied { unmount } for pid=2995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.490242][ T2995] cgroup: Unknown subsys name 'hugetlb' [ 68.490968][ T2995] cgroup: Unknown subsys name 'rlimit' [ 68.777688][ T31] audit: type=1400 audit(68.730:76): avc: denied { setattr } for pid=2995 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.779451][ T31] audit: type=1400 audit(68.730:77): avc: denied { mounton } for pid=2995 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.780208][ T31] audit: type=1400 audit(68.730:78): avc: denied { mount } for pid=2995 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.967043][ T2996] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.968095][ T31] audit: type=1400 audit(68.920:79): avc: denied { relabelto } for pid=2996 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 76.241614][ T2995] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 76.341432][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 76.341530][ T31] audit: type=1400 audit(76.290:83): avc: denied { execmem } for pid=2997 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 76.425856][ T31] audit: type=1400 audit(76.380:84): avc: denied { mounton } for pid=2999 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 76.435470][ T31] audit: type=1400 audit(76.380:85): avc: denied { mount } for pid=2999 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 76.437990][ T31] audit: type=1400 audit(76.390:86): avc: denied { read } for pid=2999 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 76.439573][ T31] audit: type=1400 audit(76.390:87): avc: denied { open } for pid=2999 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 76.453969][ T31] audit: type=1400 audit(76.400:88): avc: denied { mounton } for pid=2999 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 76.476332][ T31] audit: type=1400 audit(76.430:89): avc: denied { module_request } for pid=2999 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 76.571286][ T31] audit: type=1400 audit(76.520:90): avc: denied { sys_module } for pid=3000 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 77.439070][ T31] audit: type=1400 audit(77.390:91): avc: denied { ioctl } for pid=3000 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 78.870450][ T2999] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.881034][ T2999] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.019324][ T3000] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.031001][ T3000] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.107242][ T2999] hsr_slave_0: entered promiscuous mode [ 80.113855][ T2999] hsr_slave_1: entered promiscuous mode [ 80.233043][ T3000] hsr_slave_0: entered promiscuous mode [ 80.237566][ T3000] hsr_slave_1: entered promiscuous mode [ 80.239367][ T3000] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 80.240156][ T3000] Cannot create hsr debugfs directory [ 80.720824][ T31] audit: type=1400 audit(80.670:92): avc: denied { create } for pid=2999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 80.742498][ T2999] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.781161][ T2999] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.801781][ T2999] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.827415][ T2999] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 80.882525][ T3000] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 80.900478][ T3000] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.914234][ T3000] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.927701][ T3000] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.790094][ T2999] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.897652][ T3000] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.012493][ T3000] veth0_vlan: entered promiscuous mode [ 85.027284][ T3000] veth1_vlan: entered promiscuous mode [ 85.069787][ T3000] veth0_macvtap: entered promiscuous mode [ 85.077709][ T3000] veth1_macvtap: entered promiscuous mode [ 85.124687][ T3000] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.125257][ T3000] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.125520][ T3000] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.125792][ T3000] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.210741][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 85.210787][ T31] audit: type=1400 audit(85.160:95): avc: denied { mounton } for pid=3000 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 85.225671][ T31] audit: type=1400 audit(85.180:96): avc: denied { mount } for pid=3000 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 85.317965][ T2999] veth0_vlan: entered promiscuous mode [ 85.335068][ T31] audit: type=1400 audit(85.290:97): avc: denied { read write } for pid=3000 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 85.344025][ T31] audit: type=1400 audit(85.290:98): avc: denied { open } for pid=3000 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 85.344796][ T31] audit: type=1400 audit(85.290:99): avc: denied { ioctl } for pid=3000 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 85.357331][ T2999] veth1_vlan: entered promiscuous mode [ 85.397237][ T2999] veth0_macvtap: entered promiscuous mode [ 85.405878][ T2999] veth1_macvtap: entered promiscuous mode [ 85.432192][ T31] audit: type=1400 audit(85.380:100): avc: denied { watch watch_reads } for pid=3679 comm="syz.1.2" path="/syzkaller.iXDWLb/0" dev="vda" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 85.452808][ T2999] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.453164][ T2999] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.455517][ T2999] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.455783][ T2999] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.947132][ T31] audit: type=1400 audit(85.900:101): avc: denied { prog_load } for pid=3688 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 85.951793][ T31] audit: type=1400 audit(85.900:102): avc: denied { bpf } for pid=3688 comm="syz.0.5" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 85.968593][ T31] audit: type=1400 audit(85.910:103): avc: denied { perfmon } for pid=3688 comm="syz.0.5" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 85.986178][ T31] audit: type=1400 audit(85.940:104): avc: denied { prog_run } for pid=3688 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 87.889269][ T3694] syz.0.7 uses obsolete (PF_INET,SOCK_PACKET) [ 90.235009][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 90.235222][ T31] audit: type=1400 audit(90.190:116): avc: denied { setopt } for pid=3714 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 90.253171][ T31] audit: type=1400 audit(90.200:117): avc: denied { bind } for pid=3714 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 90.254640][ T31] audit: type=1400 audit(90.200:118): avc: denied { name_bind } for pid=3714 comm="syz.0.14" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 90.258748][ T31] audit: type=1400 audit(90.210:119): avc: denied { node_bind } for pid=3714 comm="syz.0.14" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 90.291870][ T31] audit: type=1400 audit(90.240:120): avc: denied { write } for pid=3714 comm="syz.0.14" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 90.293811][ T31] audit: type=1400 audit(90.240:121): avc: denied { connect } for pid=3714 comm="syz.0.14" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 90.294919][ T31] audit: type=1400 audit(90.250:122): avc: denied { name_connect } for pid=3714 comm="syz.0.14" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 91.326455][ T31] audit: type=1400 audit(91.280:123): avc: denied { create } for pid=3719 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 91.346799][ T3720] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 91.375271][ T31] audit: type=1400 audit(91.330:124): avc: denied { ioctl } for pid=3719 comm="syz.0.16" path="socket:[2524]" dev="sockfs" ino=2524 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 92.234117][ T31] audit: type=1400 audit(92.180:125): avc: denied { map_read map_write } for pid=3725 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 95.587162][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 95.587284][ T31] audit: type=1400 audit(95.540:128): avc: denied { name_bind } for pid=3748 comm="syz.1.28" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 95.589134][ T31] audit: type=1400 audit(95.540:129): avc: denied { node_bind } for pid=3748 comm="syz.1.28" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 119.154027][ T3678] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 119.345100][ T3678] usb 2-1: too many endpoints for config 0 interface 0 altsetting 0: 253, using maximum allowed: 30 [ 119.345774][ T3678] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 119.346295][ T3678] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 119.346829][ T3678] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 253 [ 119.354124][ T3678] usb 2-1: New USB device found, idVendor=05ac, idProduct=8243, bcdDevice=8b.40 [ 119.354761][ T3678] usb 2-1: New USB device strings: Mfr=11, Product=0, SerialNumber=0 [ 119.358750][ T3678] usb 2-1: Manufacturer: syz [ 119.361843][ T3678] usb 2-1: config 0 descriptor?? [ 119.826876][ T3678] appleir 0003:05AC:8243.0001: unknown main item tag 0x0 [ 119.829654][ T3678] appleir 0003:05AC:8243.0001: No inputs registered, leaving [ 119.840839][ T3678] appleir 0003:05AC:8243.0001: hiddev0,hidraw0: USB HID v0.00 Device [syz] on usb-dummy_hcd.1-1/input0 [ 120.082934][ T3678] usb 2-1: USB disconnect, device number 2 [ 124.968918][ T31] audit: type=1326 audit(124.910:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3803 comm="syz.0.38" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130aa0 code=0x7fc00000 [ 125.514727][ T3808] netlink: 4 bytes leftover after parsing attributes in process `syz.1.40'. [ 135.824275][ T31] audit: type=1400 audit(135.770:131): avc: denied { create } for pid=3827 comm="syz.1.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 135.825799][ T31] audit: type=1400 audit(135.770:132): avc: denied { bind } for pid=3827 comm="syz.1.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 136.648511][ T3833] netlink: 16 bytes leftover after parsing attributes in process `syz.0.49'. [ 136.650089][ T3833] netlink: 4 bytes leftover after parsing attributes in process `syz.0.49'. [ 137.330123][ T31] audit: type=1400 audit(137.280:133): avc: denied { create } for pid=3836 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 137.931645][ T31] audit: type=1400 audit(137.880:134): avc: denied { create } for pid=3836 comm="syz.0.50" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 137.966542][ T31] audit: type=1400 audit(137.900:135): avc: denied { map } for pid=3836 comm="syz.0.50" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2619 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 137.972804][ T31] audit: type=1400 audit(137.900:136): avc: denied { read write } for pid=3836 comm="syz.0.50" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2619 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 138.365628][ T31] audit: type=1400 audit(138.320:137): avc: denied { setopt } for pid=3836 comm="syz.0.50" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 139.885875][ T31] audit: type=1400 audit(139.840:138): avc: denied { name_bind } for pid=3844 comm="syz.0.53" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 139.892176][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 141.405366][ T31] audit: type=1400 audit(141.360:139): avc: denied { create } for pid=3850 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 141.690668][ T3855] syzkaller0: entered promiscuous mode [ 141.691349][ T3855] syzkaller0: entered allmulticast mode [ 142.036538][ T31] audit: type=1400 audit(141.990:140): avc: denied { create } for pid=3866 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 142.324855][ T3753] usb 2-1: new full-speed USB device number 3 using dummy_hcd [ 142.548723][ T3753] usb 2-1: config 0 has an invalid interface number: 107 but max is 0 [ 142.549378][ T3753] usb 2-1: config 0 has no interface number 0 [ 142.549958][ T3753] usb 2-1: config 0 interface 107 altsetting 254 has an invalid descriptor for endpoint zero, skipping [ 142.550484][ T3753] usb 2-1: config 0 interface 107 altsetting 254 has an invalid descriptor for endpoint zero, skipping [ 142.550936][ T3753] usb 2-1: config 0 interface 107 has no altsetting 0 [ 142.551274][ T3753] usb 2-1: New USB device found, idVendor=0403, idProduct=fc0d, bcdDevice=eb.04 [ 142.551644][ T3753] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 142.556416][ T3753] usb 2-1: config 0 descriptor?? [ 142.835718][ T3753] usb 2-1: string descriptor 0 read error: -71 [ 142.838293][ T3753] ftdi_sio 2-1:0.107: FTDI USB Serial Device converter detected [ 142.840893][ T3753] ftdi_sio ttyUSB0: unknown device type: 0xeb04 [ 142.862877][ T3753] usb 2-1: USB disconnect, device number 3 [ 142.868509][ T3753] ftdi_sio 2-1:0.107: device disconnected [ 143.426151][ T31] audit: type=1400 audit(143.380:141): avc: denied { create } for pid=3904 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 144.114892][ T31] audit: type=1400 audit(144.070:142): avc: denied { write } for pid=3915 comm="syz.0.74" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 144.823983][ T3921] mmap: syz.0.76 (3921) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 146.364170][ T31] audit: type=1400 audit(146.310:143): avc: denied { create } for pid=3922 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 146.369363][ T31] audit: type=1400 audit(146.320:144): avc: denied { ioctl } for pid=3922 comm="syz.0.77" path="socket:[3138]" dev="sockfs" ino=3138 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 146.374943][ T31] audit: type=1400 audit(146.330:145): avc: denied { bind } for pid=3922 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 146.381618][ T31] audit: type=1400 audit(146.330:146): avc: denied { write } for pid=3922 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 150.754602][ T31] audit: type=1400 audit(150.700:147): avc: denied { create } for pid=3983 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 150.778330][ T31] audit: type=1400 audit(150.730:148): avc: denied { connect } for pid=3983 comm="syz.1.94" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 153.001169][ T3998] netlink: 28 bytes leftover after parsing attributes in process `syz.0.100'. [ 154.340745][ T31] audit: type=1400 audit(154.290:149): avc: denied { create } for pid=4003 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 154.367436][ T31] audit: type=1400 audit(154.320:150): avc: denied { write } for pid=4003 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 154.631018][ T31] audit: type=1400 audit(154.580:151): avc: denied { mount } for pid=4005 comm="syz.0.103" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 154.746983][ T31] audit: type=1400 audit(154.690:152): avc: denied { unmount } for pid=2999 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 154.846253][ T3995] netlink: 4 bytes leftover after parsing attributes in process `syz.1.99'. [ 155.552687][ T4011] netlink: 20 bytes leftover after parsing attributes in process `syz.1.105'. [ 160.034007][ T31] audit: type=1400 audit(159.980:153): avc: denied { setopt } for pid=4021 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 160.035319][ T31] audit: type=1400 audit(159.980:154): avc: denied { accept } for pid=4021 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 160.035997][ T31] audit: type=1400 audit(159.980:155): avc: denied { write } for pid=4021 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 164.689172][ T31] audit: type=1400 audit(164.640:156): avc: denied { read } for pid=4030 comm="syz.0.112" path="socket:[2851]" dev="sockfs" ino=2851 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 176.173878][ T3985] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 176.183715][ C1] hrtimer: interrupt took 2691824 ns [ 176.434469][ T3985] usb 2-1: Using ep0 maxpacket: 32 [ 176.524640][ T3985] usb 2-1: config 4 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 176.530594][ T3985] usb 2-1: config 4 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 176.532253][ T3985] usb 2-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 176.543849][ T3985] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 176.558555][ T3985] hub 2-1:4.0: USB hub found [ 176.805173][ T3985] hub 2-1:4.0: 2 ports detected [ 177.059193][ T3985] hub 2-1:4.0: hub_hub_status failed (err = -71) [ 177.059682][ T3985] hub 2-1:4.0: config failed, can't get hub status (err -71) [ 177.115925][ T3985] usb 2-1: USB disconnect, device number 4 [ 177.955515][ T31] audit: type=1400 audit(177.910:157): avc: denied { ioctl } for pid=4089 comm="syz.0.133" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3358 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 179.461614][ T4095] syz.0.134[4095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.462497][ T4095] syz.0.134[4095] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.562419][ T31] audit: type=1400 audit(182.500:158): avc: denied { read } for pid=4102 comm="syz.0.139" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 182.564955][ T31] audit: type=1400 audit(182.500:159): avc: denied { open } for pid=4102 comm="syz.0.139" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 188.787523][ T4118] Zero length message leads to an empty skb [ 192.884215][ T31] audit: type=1400 audit(192.840:160): avc: denied { create } for pid=4131 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 192.929428][ T31] audit: type=1400 audit(192.880:161): avc: denied { write } for pid=4131 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 193.654306][ T31] audit: type=1400 audit(193.600:162): avc: denied { create } for pid=4121 comm="syz.0.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 193.684377][ T31] audit: type=1400 audit(193.630:163): avc: denied { bind } for pid=4121 comm="syz.0.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 193.724218][ T31] audit: type=1400 audit(193.650:164): avc: denied { write } for pid=4121 comm="syz.0.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 201.110543][ T31] audit: type=1400 audit(201.060:165): avc: denied { setopt } for pid=4147 comm="syz.0.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 201.202263][ T31] audit: type=1400 audit(201.150:166): avc: denied { create } for pid=4149 comm="syz.0.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 202.565166][ T31] audit: type=1400 audit(202.520:167): avc: denied { ioctl } for pid=4190 comm="syz.1.166" path="socket:[3467]" dev="sockfs" ino=3467 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 202.901919][ T4163] netlink: 204 bytes leftover after parsing attributes in process `syz.0.163'. [ 203.114177][ T31] audit: type=1400 audit(203.060:168): avc: denied { create } for pid=4194 comm="syz.0.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 203.115803][ T31] audit: type=1400 audit(203.070:169): avc: denied { getopt } for pid=4194 comm="syz.0.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 203.851388][ T31] audit: type=1400 audit(203.800:170): avc: denied { mount } for pid=4196 comm="syz.0.168" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 206.367195][ T4234] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 206.408367][ T31] audit: type=1400 audit(206.360:171): avc: denied { create } for pid=4233 comm="syz.0.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 206.416162][ T31] audit: type=1400 audit(206.370:172): avc: denied { write } for pid=4233 comm="syz.0.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 207.471820][ T31] audit: type=1400 audit(207.420:173): avc: denied { bind } for pid=4241 comm="syz.0.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 207.733082][ T31] audit: type=1400 audit(207.680:174): avc: denied { shutdown } for pid=4243 comm="syz.0.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 211.023956][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 233.617627][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 237.254666][ T31] audit: type=1326 audit(237.190:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.215" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130aa0 code=0x7ffc0000 [ 237.255675][ T31] audit: type=1326 audit(237.210:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.215" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130aa0 code=0x7ffc0000 [ 237.287597][ T31] audit: type=1326 audit(237.220:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.215" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x130aa0 code=0x7ffc0000 [ 237.288243][ T31] audit: type=1326 audit(237.240:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.215" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130aa0 code=0x7ffc0000 [ 237.288782][ T31] audit: type=1326 audit(237.240:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.215" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130aa0 code=0x7ffc0000 [ 237.299414][ T31] audit: type=1326 audit(237.250:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.215" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x130aa0 code=0x7ffc0000 [ 237.309173][ T31] audit: type=1326 audit(237.250:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.215" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130aa0 code=0x7ffc0000 [ 237.310178][ T31] audit: type=1326 audit(237.250:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.215" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130aa0 code=0x7ffc0000 [ 237.311021][ T31] audit: type=1326 audit(237.250:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.215" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x130aa0 code=0x7ffc0000 [ 237.311836][ T31] audit: type=1326 audit(237.260:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4316 comm="syz.0.215" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130aa0 code=0x7ffc0000 [ 245.792005][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 245.792123][ T31] audit: type=1400 audit(245.740:212): avc: denied { write } for pid=4348 comm="syz.0.228" name="vlan0" dev="proc" ino=4026532922 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 247.014758][ T31] audit: type=1400 audit(246.970:213): avc: denied { bind } for pid=4360 comm="syz.0.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 255.035005][ T31] audit: type=1400 audit(254.990:214): avc: denied { create } for pid=4372 comm="syz.1.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 255.055094][ T31] audit: type=1400 audit(255.010:215): avc: denied { write } for pid=4372 comm="syz.1.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 256.083943][ T4002] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 256.285945][ T4002] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 256.286688][ T4002] usb 2-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47 [ 256.287103][ T4002] usb 2-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 256.287451][ T4002] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 256.346039][ T4373] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 256.730714][ T9] usb 2-1: USB disconnect, device number 5 [ 262.055510][ T4406] netlink: 84 bytes leftover after parsing attributes in process `syz.1.235'. [ 262.056343][ T4406] veth0_vlan: entered allmulticast mode [ 262.886633][ T4410] macvlan2: entered promiscuous mode [ 263.546048][ T31] audit: type=1400 audit(263.500:216): avc: denied { ioctl } for pid=4414 comm="syz.1.237" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 272.324525][ T3996] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 272.567036][ T3996] usb 1-1: New USB device found, idVendor=0df6, idProduct=0056, bcdDevice=a0.b5 [ 272.567394][ T3996] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 272.601368][ T3996] usb 1-1: config 0 descriptor?? [ 272.858711][ T3996] asix 1-1:0.0 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -61 [ 272.861735][ T3996] asix 1-1:0.0: probe with driver asix failed with error -61 [ 283.145133][ T4502] netlink: 'syz.1.258': attribute type 10 has an invalid length. [ 283.149421][ T4502] netlink: 40 bytes leftover after parsing attributes in process `syz.1.258'. [ 283.150191][ T4502] dummy0: entered promiscuous mode [ 283.151370][ T4502] dummy0: entered allmulticast mode [ 283.165152][ T4502] A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check. [ 286.694581][ T3996] usb 1-1: USB disconnect, device number 2 [ 291.585636][ T31] audit: type=1400 audit(291.540:217): avc: denied { getopt } for pid=4526 comm="syz.0.266" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 291.589167][ T31] audit: type=1400 audit(291.540:218): avc: denied { getopt } for pid=4526 comm="syz.0.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 291.717205][ T31] audit: type=1400 audit(291.670:219): avc: denied { create } for pid=4526 comm="syz.0.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 291.724251][ T31] audit: type=1400 audit(291.670:220): avc: denied { setopt } for pid=4526 comm="syz.0.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 291.745329][ T31] audit: type=1400 audit(291.700:221): avc: denied { write } for pid=4529 comm="syz.1.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 291.959524][ T4537] netlink: 8 bytes leftover after parsing attributes in process `syz.0.270'. [ 292.075080][ T31] audit: type=1400 audit(292.030:222): avc: denied { write } for pid=4539 comm="syz.0.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 292.471986][ T31] audit: type=1400 audit(292.420:223): avc: denied { setopt } for pid=4547 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 293.381427][ T31] audit: type=1400 audit(293.330:224): avc: denied { block_suspend } for pid=4566 comm="syz.0.285" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 294.759991][ T4575] capability: warning: `syz.1.288' uses deprecated v2 capabilities in a way that may be insecure [ 295.446856][ T31] audit: type=1400 audit(295.400:225): avc: denied { mounton } for pid=4587 comm="syz.1.294" path="/syzkaller.iXDWLb/116/bus" dev="vda" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 295.486532][ T31] audit: type=1400 audit(295.430:226): avc: denied { unmount } for pid=3000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 303.326043][ T31] audit: type=1400 audit(303.280:227): avc: denied { read } for pid=4621 comm="syz.1.309" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 311.792598][ T31] audit: type=1400 audit(311.730:228): avc: denied { ioctl } for pid=4650 comm="syz.0.323" path="socket:[5144]" dev="sockfs" ino=5144 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 312.726730][ T4665] pim6reg1: entered promiscuous mode [ 312.727143][ T4665] pim6reg1: entered allmulticast mode [ 336.331968][ T4693] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 336.340745][ T4693] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 337.615606][ T4693] hsr_slave_0: entered promiscuous mode [ 337.618289][ T4693] hsr_slave_1: entered promiscuous mode [ 337.619732][ T4693] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 337.620070][ T4693] Cannot create hsr debugfs directory [ 338.011879][ T4693] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.082660][ T4693] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.131933][ T4693] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.197087][ T4693] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.389858][ T4693] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 338.401300][ T4693] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 338.420534][ T4693] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 338.438222][ T4693] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 339.842508][ T4693] 8021q: adding VLAN 0 to HW filter on device bond0 [ 343.625195][ T4693] veth0_vlan: entered promiscuous mode [ 343.639003][ T4693] veth1_vlan: entered promiscuous mode [ 343.757256][ T4693] veth0_macvtap: entered promiscuous mode [ 343.772226][ T4693] veth1_macvtap: entered promiscuous mode [ 343.880385][ T4693] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 343.881444][ T4693] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 343.881803][ T4693] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 343.882182][ T4693] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 348.050642][ T5059] Illegal XDP return value 4294967274 on prog (id 37) dev syz_tun, expect packet loss! [ 355.065840][ T31] audit: type=1400 audit(355.020:229): avc: denied { nlmsg_read } for pid=5084 comm="syz.1.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 355.638129][ T31] audit: type=1400 audit(355.590:230): avc: denied { write } for pid=5088 comm="syz.1.352" path="socket:[6153]" dev="sockfs" ino=6153 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 357.892409][ T31] audit: type=1400 audit(357.840:231): avc: denied { create } for pid=5115 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 359.652669][ T5132] netlink: 'syz.1.364': attribute type 4 has an invalid length. [ 359.692183][ T5132] netlink: 'syz.1.364': attribute type 4 has an invalid length. [ 361.918514][ T31] audit: type=1400 audit(361.870:232): avc: denied { ioctl } for pid=5142 comm="syz.0.368" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 362.483796][ T3753] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 362.674698][ T3753] usb 1-1: Using ep0 maxpacket: 8 [ 362.692337][ T3753] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 362.692954][ T3753] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 362.697336][ T3753] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 362.697891][ T3753] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 362.698254][ T3753] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 362.698791][ T3753] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 362.699113][ T3753] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 362.850491][ T31] audit: type=1400 audit(362.800:233): avc: denied { unmount } for pid=4693 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 362.958097][ T3753] usb 1-1: usb_control_msg returned -32 [ 362.958616][ T3753] usbtmc 1-1:16.0: can't read capabilities [ 363.123872][ T31] audit: type=1400 audit(363.070:234): avc: denied { connect } for pid=5164 comm="syz.1.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 363.124574][ T31] audit: type=1400 audit(363.070:235): avc: denied { setopt } for pid=5164 comm="syz.1.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 363.393852][ T31] audit: type=1400 audit(363.340:236): avc: denied { cmd } for pid=5168 comm="syz.1.376" path="socket:[6233]" dev="sockfs" ino=6233 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 363.620325][ T31] audit: type=1804 audit(363.570:237): pid=5175 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz.1.379" name="/syzkaller.0HMMGM/34/bus" dev="vda" ino=704 res=1 errno=0 [ 363.624791][ T31] audit: type=1804 audit(363.580:238): pid=5175 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz.1.379" name="/syzkaller.0HMMGM/34/bus" dev="vda" ino=704 res=1 errno=0 [ 363.733255][ T31] audit: type=1400 audit(363.680:239): avc: denied { setopt } for pid=5176 comm="syz.1.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 363.747909][ T5177] veth1_macvtap: left promiscuous mode [ 363.748404][ T5177] macsec0: entered promiscuous mode [ 363.748664][ T5177] macsec0: entered allmulticast mode [ 363.758208][ T5177] veth1_macvtap: entered promiscuous mode [ 363.758754][ T5177] veth1_macvtap: entered allmulticast mode [ 363.762186][ T5177] macsec0: left promiscuous mode [ 363.764823][ T5177] macsec0: left allmulticast mode [ 363.767277][ T5177] veth1_macvtap: left allmulticast mode [ 365.740006][ T31] audit: type=1400 audit(365.690:240): avc: denied { read } for pid=5193 comm="syz.1.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 368.069678][ T31] audit: type=1804 audit(368.020:241): pid=5205 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz.1.390" name="/syzkaller.0HMMGM/45/bus" dev="vda" ino=704 res=1 errno=0 [ 368.213240][ T5205] 8<--- cut here --- [ 368.214330][ T5205] Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read [ 368.224539][ T5205] [00000000] *pgd=854c7003, *pmd=fe625003 [ 368.226646][ T5205] Internal error: Oops: 205 [#1] PREEMPT SMP ARM [ 368.227352][ T5205] Modules linked in: [ 368.227924][ T5205] CPU: 0 PID: 5205 Comm: syz.1.390 Not tainted 6.10.0-rc6-syzkaller #0 [ 368.228412][ T5205] Hardware name: ARM-Versatile Express [ 368.228833][ T5205] PC is at __kmap_local_page_prot+0xc/0x74 [ 368.230139][ T5205] LR is at copy_page_to_iter+0xf8/0x184 [ 368.230464][ T5205] pc : [<804810d0>] lr : [<808067d4>] psr: 60000013 [ 368.230951][ T5205] sp : e0459ca0 ip : e0459cb0 fp : e0459cac [ 368.231404][ T5205] r10: 00000018 r9 : 8285f4e8 r8 : 00000000 [ 368.231716][ T5205] r7 : 00000000 r6 : 00000000 r5 : 00000000 r4 : 84fb4000 [ 368.232036][ T5205] r3 : 00c00000 r2 : 0000071f r1 : 00000000 r0 : 00000000 [ 368.232693][ T5205] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 368.233750][ T5205] Control: 30c5387d Table: 84f181c0 DAC: fffffffd [ 368.234928][ T5205] Register r0 information: NULL pointer [ 368.235665][ T5205] Register r1 information: NULL pointer [ 368.235947][ T5205] Register r2 information: non-paged memory [ 368.236325][ T5205] Register r3 information: non-paged memory [ 368.236609][ T5205] Register r4 information: slab kmalloc-1k start 84fb4000 pointer offset 0 size 1024 [ 368.242887][ T5205] Register r5 information: NULL pointer [ 368.243196][ T5205] Register r6 information: NULL pointer [ 368.243630][ T5205] Register r7 information: NULL pointer [ 368.243889][ T5205] Register r8 information: NULL pointer [ 368.244184][ T5205] Register r9 information: non-slab/vmalloc memory [ 368.244660][ T5205] Register r10 information: non-paged memory [ 368.244993][ T5205] Register r11 information: 2-page vmalloc region starting at 0xe0458000 allocated at kernel_clone+0xac/0x3e4 [ 368.245694][ T5205] Register r12 information: 2-page vmalloc region starting at 0xe0458000 allocated at kernel_clone+0xac/0x3e4 [ 368.246249][ T5205] Process syz.1.390 (pid: 5205, stack limit = 0xe0458000) [ 368.247078][ T5205] Stack: (0xe0459ca0 to 0xe045a000) [ 368.247464][ T5205] 9ca0: e0459ce4 e0459cb0 808067d4 804810d0 e0459cd4 e0459f48 8024d29c 84fb4000 [ 368.247965][ T5205] 9cc0: 84fb4000 00000000 00000001 00000000 000000c7 00000018 e0459d34 e0459ce8 [ 368.248539][ T5205] 9ce0: 81461fc4 808066e8 00000000 3a4ddeba 8513b800 8513b8e0 83f1f300 8513b8e8 [ 368.248931][ T5205] 9d00: e0459f48 00000002 e0459d8c 83f1f300 000000c7 8513b800 84122400 00000000 [ 368.249498][ T5205] 9d20: 00000102 00000000 e0459da4 e0459d38 81689af0 81461ee0 00000102 00000000 [ 368.249953][ T5205] 9d40: 00000000 00000000 00000000 00000000 83f1f388 8513b8fc 83f1f534 e0459f38 [ 368.250285][ T5205] 9d60: 00000000 3a4ddeba 818f6a18 821cb998 00000102 3a4ddeba e0459f38 816899a0 [ 368.250899][ T5205] 9d80: e0459f38 831f2780 00000102 00000000 00000102 e0459df4 e0459dc4 e0459da8 [ 368.251274][ T5205] 9da0: 81688838 816899ac 00000000 00000102 00000000 81688800 e0459de4 e0459dc8 [ 368.251608][ T5205] 9dc0: 813d1084 8168880c e0459f38 200004c0 831f2780 00000000 e0459ea4 e0459de8 [ 368.251937][ T5205] 9de0: 813d1288 813d1040 00000001 00000000 e0459e34 00000000 00000000 00000000 [ 368.252301][ T5205] 9e00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 368.252636][ T5205] 9e20: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 368.252959][ T5205] 9e40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 368.253383][ T5205] 9e60: 00000000 00000000 00000000 00000000 00000000 3a4ddeba 00000000 00000000 [ 368.254006][ T5205] 9e80: e0459f38 200004c0 00000102 831f2780 84122400 00000129 e0459f24 e0459ea8 [ 368.254336][ T5205] 9ea0: 813d436c 813d1204 00000102 00000000 802873d4 00000000 00000000 200002c0 [ 368.254697][ T5205] 9ec0: 000000c7 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 368.255431][ T5205] 9ee0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 3a4ddeba [ 368.255857][ T5205] 9f00: e0459f24 831f2780 00000000 200004c0 00000102 8020029c e0459fa4 e0459f28 [ 368.256392][ T5205] 9f20: 813d4b4c 813d42f0 00000000 e0459f38 00000001 fffffff7 e0459df4 00000000 [ 368.256797][ T5205] 9f40: 00000000 00000000 00000000 00000001 200002c0 000000c6 00000001 00000000 [ 368.257279][ T5205] 9f60: 00000000 00000001 00000000 00000000 00000000 00000000 00000000 00000000 [ 368.257734][ T5205] 9f80: 8020c910 3a4ddeba 00000000 00000000 002642e0 00000129 00000000 e0459fa8 [ 368.258506][ T5205] 9fa0: 80200060 813d4ae4 00000000 00000000 00000003 200004c0 00000102 00000000 SYZFAIL: failed to recv rpc fd=3 want=4 sent=0 n=0 (errno 9: Bad file descriptor) [ 368.258875][ T5205] 9fc0: 00000000 00000000 002642e0 00000129 7e9d8776 7e9d8777 003d0f00 76b270bc [ 368.259770][ T5205] 9fe0: 76b26ec8 76b26eb8 00017ecc 00130aa0 60000010 00000003 00000000 00000000 [ 368.260406][ T5205] Call trace: [ 368.260858][ T5205] [<804810c4>] (__kmap_local_page_prot) from [<808067d4>] (copy_page_to_iter+0xf8/0x184) [ 368.261612][ T5205] [<808066dc>] (copy_page_to_iter) from [<81461fc4>] (sk_msg_recvmsg+0xf0/0x3cc) [ 368.261994][ T5205] r10:00000018 r9:000000c7 r8:00000000 r7:00000001 r6:00000000 r5:84fb4000 [ 368.262273][ T5205] r4:84fb4000 [ 368.262457][ T5205] [<81461ed4>] (sk_msg_recvmsg) from [<81689af0>] (unix_bpf_recvmsg+0x150/0x444) [ 368.262813][ T5205] r10:00000000 r9:00000102 r8:00000000 r7:84122400 r6:8513b800 r5:000000c7 [ 368.263083][ T5205] r4:83f1f300 [ 368.263352][ T5205] [<816899a0>] (unix_bpf_recvmsg) from [<81688838>] (unix_dgram_recvmsg+0x38/0x4c) [ 368.263763][ T5205] r10:e0459df4 r9:00000102 r8:00000000 r7:00000102 r6:831f2780 r5:e0459f38 [ 368.264042][ T5205] r4:816899a0 [ 368.264249][ T5205] [<81688800>] (unix_dgram_recvmsg) from [<813d1084>] (sock_recvmsg+0x50/0x78) [ 368.264524][ T5205] r4:81688800 [ 368.264708][ T5205] [<813d1034>] (sock_recvmsg) from [<813d1288>] (____sys_recvmsg+0x90/0x184) [ 368.265125][ T5205] r7:00000000 r6:831f2780 r5:200004c0 r4:e0459f38 [ 368.265338][ T5205] [<813d11f8>] (____sys_recvmsg) from [<813d436c>] (___sys_recvmsg+0x88/0xbc) [ 368.265639][ T5205] r10:00000129 r9:84122400 r8:831f2780 r7:00000102 r6:200004c0 r5:e0459f38 [ 368.265904][ T5205] r4:00000000 [ 368.266016][ T5205] [<813d42e4>] (___sys_recvmsg) from [<813d4b4c>] (sys_recvmsg+0x74/0xb8) [ 368.266399][ T5205] r8:8020029c r7:00000102 r6:200004c0 r5:00000000 r4:831f2780 [ 368.266622][ T5205] [<813d4ad8>] (sys_recvmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 368.266942][ T5205] Exception stack(0xe0459fa8 to 0xe0459ff0) [ 368.267151][ T5205] 9fa0: 00000000 00000000 00000003 200004c0 00000102 00000000 [ 368.267622][ T5205] 9fc0: 00000000 00000000 002642e0 00000129 7e9d8776 7e9d8777 003d0f00 76b270bc [ 368.268232][ T5205] 9fe0: 76b26ec8 76b26eb8 00017ecc 00130aa0 [ 368.268616][ T5205] r7:00000129 r6:002642e0 r5:00000000 r4:00000000 [ 368.269071][ T5205] Code: eaffffe8 e1a0c00d e92dd800 e24cb004 (e5901000) [ 368.344264][ T5205] ---[ end trace 0000000000000000 ]--- [ 368.345080][ T5205] Kernel panic - not syncing: Fatal exception [ 368.349162][ T5205] Rebooting in 86400 seconds.. VM DIAGNOSIS: 05:01:10 Registers: info registers vcpu 0 CPU#0 R00=ddeb7d44 R01=00000000 R02=dddd3f9c R03=ddeb7b28 R04=ddeb7d44 R05=00000001 R06=df801c68 R07=dddd3f9c R08=00000000 R09=00000000 R10=827e7840 R11=df801aa4 R12=df801aa8 R13=df801a98 R14=804ae594 R15=80826ea4 PSR=a0000113 N-C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=b7788000 R01=e0743000 R02=00000001 R03=8021b3f8 R04=7f00d000 R05=00000001 R06=828afda8 R07=7f00d000 R08=e0743000 R09=8260cad4 R10=828b09cc R11=e47d5dbc R12=e47d5dc0 R13=e47d5d90 R14=802109bc R15=8021b410 PSR=80000113 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000