last executing test programs: 2m2.472713838s ago: executing program 0 (id=46): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001a80)="d8000000180081064e81f782db4cb904021d0800fd007c05e8fe50a10a000600014002020c600e41b0000900ac000a0501000000160012000a00ff120048035c3b61c1d67f6f94007134cf6efb8007a007a290457f01a7cee4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5ae24e25ccca9e00360db79826835d3a71d95667daffffffffff1f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5b7276505de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9000001008af26c8b7b55f4d2a6823a45", 0xd8}], 0x1}, 0x894) 2m2.338480585s ago: executing program 0 (id=47): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0xd9}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/rt_acct\x00') r3 = socket(0x18, 0x800, 0x0) sendfile(r3, r2, 0x0, 0x8) 2m1.779427895s ago: executing program 0 (id=49): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40100002}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b0000001f0000008e00000022bf000001000000", @ANYRES32, @ANYBLOB="0000000000100000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000001000"/27], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r2, 0x0, 0xa002a0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200), &(0x7f0000001540), 0xfffffffe, r2, 0x0, 0x1500}, 0x38) 2m1.591598155s ago: executing program 0 (id=50): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$selinux_validatetrans(r2, &(0x7f0000000780)=ANY=[@ANYBLOB="73797374426d5f753a6f626a6563745f723a73657472616e7f9a7fd5cbae98616019735f696e697472635f657865635f743a73302073797374656d5f753a6f626a6563745f727a7661725f617574685f743a7330203030303030303030303007"], 0x8e) 2m1.350794798s ago: executing program 0 (id=51): r0 = io_uring_setup(0x3c92, &(0x7f0000000100)={0x0, 0x3, 0x0, 0xffffffff}) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000040)=0x8, 0x4) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth0_to_bridge\x00', 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000040)=0x8, 0x4) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) close_range(r0, 0xffffffffffffffff, 0x0) 2m0.977858768s ago: executing program 0 (id=53): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x2, 0x0, 0x9, @local, @rand_addr=' \x01\x00', 0x7, 0x7, 0x202, 0x8}}) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000600)={'syztnl1\x00', 0x0}) 1m15.640409585s ago: executing program 32 (id=53): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x2, 0x0, 0x9, @local, @rand_addr=' \x01\x00', 0x7, 0x7, 0x202, 0x8}}) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000600)={'syztnl1\x00', 0x0}) 3.526855941s ago: executing program 2 (id=261): r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x200, 0x102) r1 = dup(r0) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000100)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x1}, 0x8, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0}) 3.428421067s ago: executing program 2 (id=262): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000006180), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f00000062c0)={0x0, 0x0, &(0x7f0000006280)={&(0x7f0000006200)={0x3c, r1, 0x801, 0x70bd27, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_EXTENDED_ADDR={0xc, 0x17, {0xaaaaaaaaaaaa0102}}, @NL802154_ATTR_IFTYPE={0x8}, @NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan3\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x20040010) 3.240380617s ago: executing program 2 (id=263): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, 0x0, 0x0) listen(r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r3 = accept(r0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[], 0xfffffdef}, 0x1, 0x0, 0x0, 0x40001}, 0x1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 610.395797ms ago: executing program 2 (id=277): r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x32, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}}, {{0x2, 0x4e20, @loopback}}}, 0x108) 530.177371ms ago: executing program 2 (id=279): r0 = syz_io_uring_setup(0x10d, &(0x7f0000000200), &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1b, 0xc, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffffd}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x7, 0x0, 0xb, 0xa, 0x9, 0xffffffffffffffc0, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xb}, @map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4a0}, @jmp={0x5, 0x0, 0x4, 0x7, 0x9, 0xfffffffffffffffe, 0x1}], 0x0, 0xfff, 0x0, 0x0, 0x41100, 0x4f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xa}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9, 0x12, r3, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080), 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x0, 0x4007, @fd_index=0x7fffffd, 0x2, 0x0, 0x0, 0x0, 0x1}) io_uring_enter(r0, 0x3f70, 0x0, 0x0, 0x0, 0x0) 468.390424ms ago: executing program 1 (id=280): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000d40)={0x64, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0x1f}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x64}}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@filter={'filter\x00', 0x42, 0x4, 0x358, 0xffffffff, 0x1d8, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x2c0, 0x2c0, 0x2c0, 0xffffffff, 0x5, 0x0, {[{{@uncond, 0x74000002, 0x70, 0xa0, 0x1ba, {0x46010000, 0x2c000000000000}}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x287, 0xd8, 0x138, 0x0, {}, [@common=@unspec=@physdev={{0x68}, {'wg0\x00', {}, 'veth1_vlan\x00', {}, 0x0, 0x5}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{}, {0x11e, [0x1]}}}}, {{@uncond, 0x0, 0xb0, 0xe8, 0x0, {}, [@common=@set={{0x40}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{}, {0x11e}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 468.062864ms ago: executing program 2 (id=281): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, 0x0, 0x0) listen(r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r3 = accept(r0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[], 0xfffffdef}, 0x1, 0x0, 0x0, 0x40001}, 0x1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 308.419193ms ago: executing program 1 (id=282): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0'}, 0xb) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x7, 0x10012, r0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x40305839, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00']) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) madvise(&(0x7f0000000000/0x2000)=nil, 0x8000000, 0x19) 230.156577ms ago: executing program 1 (id=283): r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100), 0x40001, 0x0) ioctl$SNDCTL_DSP_GETOSPACE(r0, 0x8010500c, 0x0) 156.028701ms ago: executing program 1 (id=284): pipe2(&(0x7f0000000200)={0x0, 0x0}, 0x0) r1 = fanotify_init(0x200, 0x800) fanotify_mark(r1, 0x1, 0x4000005b, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') 77.449695ms ago: executing program 1 (id=285): r0 = socket$inet6(0xa, 0x3, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000300)={{{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x2000000, 0x33}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @broadcast}, 0x0, 0x0, 0x0, 0x3}}, 0xe8) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000000041}, 0xc) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 0s ago: executing program 1 (id=286): r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000180)) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) ftruncate(0xffffffffffffffff, 0x51a9497) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f00001ce000/0x4000)=nil, 0x3000}) kernel console output (not intermixed with test programs): [ 47.052930][ T31] audit: type=1400 audit(46.990:56): avc: denied { read write } for pid=3091 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.053496][ T31] audit: type=1400 audit(46.990:57): avc: denied { open } for pid=3091 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:49223' (ED25519) to the list of known hosts. [ 59.412098][ T31] audit: type=1400 audit(59.340:58): avc: denied { name_bind } for pid=3094 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 60.675753][ T31] audit: type=1400 audit(60.620:59): avc: denied { execute } for pid=3095 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 60.696050][ T31] audit: type=1400 audit(60.640:60): avc: denied { execute_no_trans } for pid=3095 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.933059][ T31] audit: type=1400 audit(62.870:61): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 62.938466][ T31] audit: type=1400 audit(62.880:62): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 62.949178][ T3095] cgroup: Unknown subsys name 'net' [ 62.954011][ T31] audit: type=1400 audit(62.890:63): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.139576][ T3095] cgroup: Unknown subsys name 'cpuset' [ 63.144168][ T3095] cgroup: Unknown subsys name 'hugetlb' [ 63.145697][ T3095] cgroup: Unknown subsys name 'rlimit' [ 63.448196][ T31] audit: type=1400 audit(63.390:64): avc: denied { setattr } for pid=3095 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.451206][ T31] audit: type=1400 audit(63.390:65): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 63.452946][ T31] audit: type=1400 audit(63.390:66): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 63.655254][ T3097] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 63.661057][ T31] audit: type=1400 audit(63.600:67): avc: denied { relabelto } for pid=3097 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 70.661699][ T3095] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 72.358555][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 72.358943][ T31] audit: type=1400 audit(72.300:71): avc: denied { execmem } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 72.413989][ T31] audit: type=1400 audit(72.350:72): avc: denied { read } for pid=3100 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 72.415219][ T31] audit: type=1400 audit(72.350:73): avc: denied { open } for pid=3100 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 72.421356][ T31] audit: type=1400 audit(72.360:74): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 72.447997][ T31] audit: type=1400 audit(72.390:76): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 72.448361][ T31] audit: type=1400 audit(72.390:75): avc: denied { module_request } for pid=3101 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 72.519026][ T31] audit: type=1400 audit(72.460:77): avc: denied { sys_module } for pid=3101 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 73.146432][ T31] audit: type=1400 audit(73.090:78): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.246445][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.272506][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.275713][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.308735][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.986959][ T3101] hsr_slave_0: entered promiscuous mode [ 74.990640][ T3101] hsr_slave_1: entered promiscuous mode [ 75.110355][ T3100] hsr_slave_0: entered promiscuous mode [ 75.113798][ T3100] hsr_slave_1: entered promiscuous mode [ 75.117732][ T3100] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 75.118148][ T3100] Cannot create hsr debugfs directory [ 75.422156][ T31] audit: type=1400 audit(75.360:79): avc: denied { create } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 75.430806][ T31] audit: type=1400 audit(75.370:80): avc: denied { write } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 75.462333][ T3101] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 75.483512][ T3101] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 75.502356][ T3101] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 75.525601][ T3101] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 75.639769][ T3100] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 75.649362][ T3100] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 75.658889][ T3100] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 75.668739][ T3100] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 76.258332][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.431200][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.810577][ T3101] veth0_vlan: entered promiscuous mode [ 78.831803][ T3101] veth1_vlan: entered promiscuous mode [ 78.894171][ T3101] veth0_macvtap: entered promiscuous mode [ 78.901526][ T3101] veth1_macvtap: entered promiscuous mode [ 78.951773][ T3101] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.952377][ T3101] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.952442][ T3101] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.952617][ T3101] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.045550][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 79.045771][ T31] audit: type=1400 audit(78.980:82): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 79.057221][ T31] audit: type=1400 audit(79.000:83): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzkaller.eFJYtV/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 79.060695][ T31] audit: type=1400 audit(79.000:84): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 79.067865][ T3100] veth0_vlan: entered promiscuous mode [ 79.070654][ T31] audit: type=1400 audit(79.010:85): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzkaller.eFJYtV/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 79.073292][ T31] audit: type=1400 audit(79.010:86): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzkaller.eFJYtV/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 79.080786][ T3100] veth1_vlan: entered promiscuous mode [ 79.089349][ T31] audit: type=1400 audit(79.030:87): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 79.096710][ T31] audit: type=1400 audit(79.030:88): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=770 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 79.103563][ T31] audit: type=1400 audit(79.040:89): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="gadgetfs" ino=2257 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 79.114952][ T31] audit: type=1400 audit(79.050:90): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 79.117996][ T31] audit: type=1400 audit(79.060:91): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 79.161154][ T3100] veth0_macvtap: entered promiscuous mode [ 79.169140][ T3101] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 79.173743][ T3100] veth1_macvtap: entered promiscuous mode [ 79.243233][ T3100] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.243665][ T3100] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.243966][ T3100] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.244059][ T3100] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.458689][ T3794] netlink: 32 bytes leftover after parsing attributes in process `syz.1.2'. [ 81.872655][ T3830] netlink: 36 bytes leftover after parsing attributes in process `syz.0.12'. [ 81.875083][ T3830] netlink: 16 bytes leftover after parsing attributes in process `syz.0.12'. [ 81.875575][ T3830] netlink: 36 bytes leftover after parsing attributes in process `syz.0.12'. [ 81.876063][ T3830] netlink: 36 bytes leftover after parsing attributes in process `syz.0.12'. [ 82.429939][ T3837] : renamed from bond0 (while UP) [ 83.161445][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.161958][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.163158][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.163461][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.163778][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.164068][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.174952][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.175600][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.175906][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.176357][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.176671][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.176994][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.177303][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.177590][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.177872][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.178163][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.178451][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.178734][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.179026][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.179315][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.179616][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.179904][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.180194][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.180478][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.180789][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.181111][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.181423][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.181737][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.182031][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.182316][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.182599][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.182881][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.183171][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.183455][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.183764][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.184052][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.222549][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.223583][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.225670][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.226602][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.227576][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.235193][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.235659][ T3850] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 83.269184][ T3850] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz1 [ 84.136632][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 84.136828][ T31] audit: type=1400 audit(84.080:123): avc: denied { create } for pid=3864 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 84.220415][ T31] audit: type=1400 audit(84.160:124): avc: denied { bind } for pid=3864 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 84.227688][ T31] audit: type=1400 audit(84.170:125): avc: denied { listen } for pid=3864 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 84.240699][ T31] audit: type=1400 audit(84.180:126): avc: denied { connect } for pid=3864 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 84.260638][ T31] audit: type=1400 audit(84.200:127): avc: denied { write } for pid=3864 comm="syz.0.20" path="socket:[2372]" dev="sockfs" ino=2372 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 84.264839][ T31] audit: type=1400 audit(84.200:128): avc: denied { accept } for pid=3864 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 84.290137][ T31] audit: type=1400 audit(84.230:129): avc: denied { read } for pid=3864 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 85.264800][ T31] audit: type=1400 audit(85.200:130): avc: denied { allowed } for pid=3882 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 85.286814][ T31] audit: type=1400 audit(85.220:131): avc: denied { sqpoll } for pid=3882 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 85.305521][ T31] audit: type=1400 audit(85.240:132): avc: denied { create } for pid=3882 comm="syz.1.26" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 85.561151][ T3887] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.917816][ T3887] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 85.992967][ T3896] netlink: 'syz.0.27': attribute type 10 has an invalid length. [ 85.997925][ T3896] netlink: 40 bytes leftover after parsing attributes in process `syz.0.27'. [ 86.041217][ T3887] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.158818][ T3887] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 86.269763][ T3887] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.330936][ T3887] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.358565][ T3887] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.388163][ T3887] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.519949][ T3911] Illegal XDP return value 3931934482 on prog (id 25) dev syz_tun, expect packet loss! [ 89.012277][ T3963] netlink: 'syz.0.46': attribute type 6 has an invalid length. [ 89.369789][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 89.372847][ T31] audit: type=1400 audit(89.300:151): avc: denied { write } for pid=3964 comm="syz.0.47" name="rt_acct" dev="proc" ino=4026532756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 89.374836][ T31] audit: type=1400 audit(89.310:152): avc: denied { create } for pid=3964 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 90.349562][ T31] audit: type=1400 audit(90.290:153): avc: denied { name_bind } for pid=3981 comm="syz.0.51" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 90.697948][ T31] audit: type=1400 audit(90.640:154): avc: denied { setopt } for pid=3986 comm="syz.1.54" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 92.066119][ T31] audit: type=1400 audit(92.010:155): avc: denied { create } for pid=3994 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 96.936392][ T31] audit: type=1400 audit(96.870:156): avc: denied { bind } for pid=3994 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 96.971437][ T31] audit: type=1400 audit(96.910:157): avc: denied { write } for pid=3994 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 98.392349][ T31] audit: type=1400 audit(98.330:158): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 99.478488][ T31] audit: type=1326 audit(99.410:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4006 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 99.506236][ T31] audit: type=1326 audit(99.440:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4006 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 99.525398][ T31] audit: type=1326 audit(99.460:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4006 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=183 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 99.540978][ T31] audit: type=1326 audit(99.480:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4006 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 99.548028][ T31] audit: type=1326 audit(99.480:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4006 comm="syz.1.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 101.221096][ T31] audit: type=1400 audit(101.160:164): avc: denied { create } for pid=4014 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 101.330702][ T31] audit: type=1400 audit(101.270:165): avc: denied { setopt } for pid=4014 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 102.995627][ T4022] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 103.550397][ T4022] capability: warning: `syz.1.63' uses deprecated v2 capabilities in a way that may be insecure [ 103.651948][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 103.666363][ T31] audit: type=1400 audit(103.590:168): avc: denied { setopt } for pid=4021 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 109.533413][ T31] audit: type=1400 audit(109.470:169): avc: denied { write } for pid=4043 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 110.201232][ T31] audit: type=1400 audit(110.140:170): avc: denied { mount } for pid=4046 comm="syz.1.72" name="/" dev="ramfs" ino=3319 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 110.621809][ T31] audit: type=1326 audit(110.550:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 110.635176][ T31] audit: type=1326 audit(110.570:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 110.640244][ T31] audit: type=1326 audit(110.580:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.73" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 110.647894][ T31] audit: type=1326 audit(110.580:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 110.648124][ T31] audit: type=1326 audit(110.590:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 110.655032][ T31] audit: type=1326 audit(110.590:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.73" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 110.668028][ T31] audit: type=1326 audit(110.610:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 110.668277][ T31] audit: type=1326 audit(110.610:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4049 comm="syz.1.73" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 110.676209][ T4050] mmap: syz.1.73 (4050) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 111.901798][ T4056] pim6reg: entered allmulticast mode [ 111.913538][ T4056] pim6reg: left allmulticast mode [ 114.750675][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 114.755412][ T31] audit: type=1326 audit(114.690:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.1.78" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 114.755853][ T31] audit: type=1326 audit(114.690:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.1.78" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 114.770448][ T31] audit: type=1326 audit(114.700:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.1.78" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 114.785264][ T31] audit: type=1326 audit(114.720:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.1.78" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 114.789493][ T31] audit: type=1326 audit(114.730:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.1.78" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 114.808128][ T31] audit: type=1326 audit(114.740:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.1.78" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 114.834869][ T31] audit: type=1326 audit(114.770:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.1.78" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 114.855043][ T31] audit: type=1326 audit(114.780:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.1.78" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 114.856591][ T31] audit: type=1326 audit(114.800:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.1.78" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 114.858392][ T31] audit: type=1326 audit(114.800:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4070 comm="syz.1.78" exe="/syz-executor" sig=0 arch=40000028 syscall=131 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 115.619801][ T4078] netlink: 'syz.1.80': attribute type 27 has an invalid length. [ 116.955253][ T4078] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 116.955680][ T4078] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 116.955821][ T4078] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 116.955909][ T4078] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 117.737168][ T4082] 8021q: adding VLAN 0 to HW filter on device bond0 [ 117.802914][ T4082] netlink: 260 bytes leftover after parsing attributes in process `syz.1.81'. [ 139.718417][ T1033] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 139.847116][ T1033] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 139.988065][ T1033] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 140.170940][ T1033] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 140.791704][ T1033]  (unregistering): (slave bond_slave_0): Releasing backup interface [ 140.801106][ T1033]  (unregistering): (slave bond_slave_1): Releasing backup interface [ 140.810129][ T1033]  (unregistering): Released all slaves [ 141.105293][ T1033] hsr_slave_0: left promiscuous mode [ 141.207091][ T1033] hsr_slave_1: left promiscuous mode [ 141.215374][ T1033] veth1_macvtap: left promiscuous mode [ 141.215709][ T1033] veth0_macvtap: left promiscuous mode [ 141.216020][ T1033] veth1_vlan: left promiscuous mode [ 141.216158][ T1033] veth0_vlan: left promiscuous mode [ 145.320511][ T4149] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 145.340470][ T4149] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 146.287565][ T4355] SELinux: syz.1.95 (4355) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 146.722860][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 146.723466][ T31] audit: type=1400 audit(146.660:223): avc: denied { ioctl } for pid=4385 comm="syz.1.97" path="socket:[3579]" dev="sockfs" ino=3579 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 146.732364][ T31] audit: type=1400 audit(146.670:224): avc: denied { bind } for pid=4385 comm="syz.1.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 147.518458][ T4149] hsr_slave_0: entered promiscuous mode [ 147.535961][ T4149] hsr_slave_1: entered promiscuous mode [ 147.538426][ T4149] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 147.539591][ T4149] Cannot create hsr debugfs directory [ 148.551732][ T4149] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 148.569366][ T4149] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 148.591770][ T4149] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 148.600861][ T4149] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 148.895490][ T4509] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4509 comm=syz.1.103 [ 148.896421][ T4509] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4509 comm=syz.1.103 [ 149.356783][ T31] audit: type=1400 audit(149.300:225): avc: denied { shutdown } for pid=4514 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 149.395201][ T31] audit: type=1400 audit(149.330:226): avc: denied { map } for pid=4514 comm="syz.1.105" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3640 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 149.395506][ T31] audit: type=1400 audit(149.330:227): avc: denied { read write } for pid=4514 comm="syz.1.105" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3640 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 149.668047][ T4520] netlink: 132 bytes leftover after parsing attributes in process `syz.1.106'. [ 149.781865][ T31] audit: type=1400 audit(149.720:228): avc: denied { create } for pid=4521 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 150.935907][ T4149] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.997497][ T31] audit: type=1400 audit(158.940:229): avc: denied { create } for pid=4582 comm="syz.1.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 159.367116][ T4149] veth0_vlan: entered promiscuous mode [ 159.399219][ T4149] veth1_vlan: entered promiscuous mode [ 159.546648][ T4149] veth0_macvtap: entered promiscuous mode [ 159.613241][ T4149] veth1_macvtap: entered promiscuous mode [ 159.890073][ T4149] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.890522][ T4149] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.890627][ T4149] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 159.890769][ T4149] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 163.505935][ T31] audit: type=1400 audit(163.450:230): avc: denied { lock } for pid=4604 comm="syz.2.116" path="socket:[4130]" dev="sockfs" ino=4130 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 165.696309][ T4619] netlink: 32 bytes leftover after parsing attributes in process `syz.2.122'. [ 166.283330][ T31] audit: type=1326 audit(166.220:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.1.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 166.299842][ T31] audit: type=1326 audit(166.240:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.1.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 166.302629][ T31] audit: type=1326 audit(166.240:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.1.127" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 166.302989][ T31] audit: type=1326 audit(166.240:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.1.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 166.309432][ T31] audit: type=1326 audit(166.250:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.1.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 166.313256][ T31] audit: type=1326 audit(166.250:236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.1.127" exe="/syz-executor" sig=0 arch=40000028 syscall=131 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 166.317902][ T31] audit: type=1326 audit(166.260:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4629 comm="syz.1.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 167.218750][ T4643] netlink: 14 bytes leftover after parsing attributes in process `syz.1.131'. [ 171.507368][ T31] audit: type=1400 audit(171.450:238): avc: denied { write } for pid=4696 comm="syz.2.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 179.909642][ T31] audit: type=1400 audit(179.850:239): avc: denied { setopt } for pid=4738 comm="syz.1.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 180.109032][ T31] audit: type=1400 audit(180.050:240): avc: denied { setopt } for pid=4742 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 180.648445][ T4752] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4752 comm=syz.1.161 [ 181.535435][ T31] audit: type=1400 audit(181.470:241): avc: denied { create } for pid=4763 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 181.816974][ T4764] Zero length message leads to an empty skb [ 182.248887][ T4773] netlink: 8 bytes leftover after parsing attributes in process `syz.1.168'. [ 182.852926][ T31] audit: type=1400 audit(182.790:242): avc: denied { ioctl } for pid=4777 comm="syz.1.170" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3966 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 183.008875][ T31] audit: type=1400 audit(182.940:243): avc: denied { write } for pid=4779 comm="syz.2.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 183.361365][ T4786] netlink: 116 bytes leftover after parsing attributes in process `syz.2.173'. [ 184.305158][ T31] audit: type=1400 audit(184.240:244): avc: denied { connect } for pid=4794 comm="syz.1.176" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 184.406728][ T4797] capability: warning: `syz.2.177' uses 32-bit capabilities (legacy support in use) [ 187.061241][ T31] audit: type=1400 audit(187.000:245): avc: denied { append } for pid=4814 comm="syz.1.186" name="seq" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 187.449188][ T4819] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=61 sclass=netlink_audit_socket pid=4819 comm=syz.1.188 [ 189.135666][ T3878] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 189.335829][ T3878] usb 2-1: Using ep0 maxpacket: 16 [ 189.441516][ T3878] usb 2-1: config 0 has an invalid interface number: 99 but max is 0 [ 189.447664][ T3878] usb 2-1: config 0 has no interface number 0 [ 189.458106][ T3878] usb 2-1: config 0 interface 99 altsetting 0 has an endpoint descriptor with address 0x51, changing to 0x1 [ 189.464884][ T3878] usb 2-1: config 0 interface 99 altsetting 0 endpoint 0x1 has invalid maxpacket 33243, setting to 1024 [ 189.466376][ T3878] usb 2-1: config 0 interface 99 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 1024 [ 189.495707][ T3878] usb 2-1: New USB device found, idVendor=fff0, idProduct=fff0, bcdDevice=63.0c [ 189.502835][ T3878] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 189.535043][ T3878] usb 2-1: Product: syz [ 189.535714][ T3878] usb 2-1: Manufacturer: syz [ 189.543359][ T3878] usb 2-1: SerialNumber: syz [ 189.579672][ T3878] usb 2-1: config 0 descriptor?? [ 189.592199][ T4826] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 189.624827][ T3878] usbtest 2-1:0.99: couldn't get endpoints, -22 [ 189.631869][ T3878] usbtest 2-1:0.99: probe with driver usbtest failed with error -22 [ 189.818113][ T3881] usb 2-1: USB disconnect, device number 2 [ 190.323961][ T31] audit: type=1400 audit(190.260:246): avc: denied { mounton } for pid=4844 comm="syz.1.194" path="/proc/287/task" dev="proc" ino=4036 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 192.839349][ T31] audit: type=1400 audit(192.780:247): avc: denied { connect } for pid=4848 comm="syz.2.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 193.513626][ T31] audit: type=1400 audit(193.440:248): avc: denied { wake_alarm } for pid=4854 comm="syz.1.198" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 197.083347][ T31] audit: type=1400 audit(197.020:249): avc: denied { read } for pid=4894 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 197.936010][ T31] audit: type=1400 audit(197.880:250): avc: denied { create } for pid=4903 comm="syz.1.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 197.942844][ T31] audit: type=1400 audit(197.880:251): avc: denied { bind } for pid=4903 comm="syz.1.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 198.504263][ T31] audit: type=1400 audit(198.420:252): avc: denied { setopt } for pid=4903 comm="syz.1.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 198.531248][ T31] audit: type=1400 audit(198.470:253): avc: denied { accept } for pid=4903 comm="syz.1.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 199.595520][ T4133] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 199.765225][ T4133] usb 2-1: Using ep0 maxpacket: 16 [ 199.792062][ T4133] usb 2-1: config 4 has an invalid interface number: 64 but max is 0 [ 199.793100][ T4133] usb 2-1: config 4 has no interface number 0 [ 199.838570][ T4133] usb 2-1: New USB device found, idVendor=0545, idProduct=800c, bcdDevice= 3.0a [ 199.839725][ T4133] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 199.840769][ T4133] usb 2-1: Product: syz [ 199.843188][ T4133] usb 2-1: Manufacturer: syz [ 199.844092][ T4133] usb 2-1: SerialNumber: syz [ 200.149017][ T4133] usb 2-1: USB disconnect, device number 3 [ 201.223845][ T31] audit: type=1400 audit(201.150:254): avc: denied { recv } for pid=3095 comm="syz-executor" saddr=127.0.0.1 src=58550 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 201.276236][ T31] audit: type=1400 audit(201.210:255): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=58550 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 201.845325][ T31] audit: type=1400 audit(201.790:256): avc: denied { getopt } for pid=4944 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 203.254749][ T31] audit: type=1400 audit(203.180:257): avc: denied { getopt } for pid=4959 comm="syz.1.235" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 203.930255][ T31] audit: type=1400 audit(203.870:258): avc: denied { bind } for pid=4964 comm="syz.1.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 204.364714][ T3881] usb 2-1: new full-speed USB device number 4 using dummy_hcd [ 204.550012][ T3881] usb 2-1: config 0 has an invalid interface number: 230 but max is 0 [ 204.550458][ T3881] usb 2-1: config 0 has no interface number 0 [ 204.550758][ T3881] usb 2-1: too many endpoints for config 0 interface 230 altsetting 255: 65, using maximum allowed: 30 [ 204.550945][ T3881] usb 2-1: config 0 interface 230 altsetting 255 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 204.551097][ T3881] usb 2-1: config 0 interface 230 altsetting 255 has 1 endpoint descriptor, different from the interface descriptor's value: 65 [ 204.551207][ T3881] usb 2-1: config 0 interface 230 has no altsetting 0 [ 204.551329][ T3881] usb 2-1: New USB device found, idVendor=5543, idProduct=0781, bcdDevice= 0.00 [ 204.551444][ T3881] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 204.559411][ T3881] usb 2-1: config 0 descriptor?? [ 205.110822][ T3881] uclogic 0003:5543:0781.0002: hidraw0: USB HID v0.00 Device [HID 5543:0781] on usb-dummy_hcd.1-1/input230 [ 205.278093][ T4051] usb 2-1: USB disconnect, device number 4 [ 205.925123][ T31] audit: type=1400 audit(205.860:259): avc: denied { mounton } for pid=4999 comm="syz.2.244" path="/43/file0" dev="tmpfs" ino=235 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 205.926790][ T5001] fuse: Invalid rootmode [ 206.807693][ T31] audit: type=1400 audit(206.750:260): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 207.771613][ T5044] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 207.773161][ T5044] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 209.422597][ T31] audit: type=1400 audit(209.360:261): avc: denied { read } for pid=5057 comm="syz.1.264" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 209.426995][ T31] audit: type=1400 audit(209.370:262): avc: denied { open } for pid=5057 comm="syz.1.264" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 209.431138][ T31] audit: type=1400 audit(209.370:263): avc: denied { map } for pid=5057 comm="syz.1.264" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 210.996920][ T31] audit: type=1400 audit(210.940:264): avc: denied { create } for pid=5092 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 211.065444][ T31] audit: type=1400 audit(211.000:265): avc: denied { setopt } for pid=5092 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 211.123578][ T31] audit: type=1400 audit(211.060:266): avc: denied { execute } for pid=5096 comm="syz.1.282" path="/189/cpuacct.usage_sys" dev="tmpfs" ino=978 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 211.370092][ T31] audit: type=1400 audit(211.310:267): avc: denied { bind } for pid=5102 comm="syz.1.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 211.459076][ T5105] ------------[ cut here ]------------ [ 211.459725][ T5105] WARNING: CPU: 0 PID: 5105 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 211.463993][ T5105] Modules linked in: [ 211.467390][ T5105] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 211.468501][ T5105] CPU: 0 UID: 0 PID: 5105 Comm: syz.1.286 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 211.468995][ T5105] Hardware name: ARM-Versatile Express [ 211.469522][ T5105] Call trace: [ 211.469957][ T5105] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 211.470551][ T5105] r7:00000000 r6:8282083c r5:00000000 r4:8225b4ec [ 211.470856][ T5105] [<80201ae4>] (show_stack) from [<8021fdf4>] (dump_stack_lvl+0x54/0x7c) [ 211.471158][ T5105] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 211.471458][ T5105] r5:00000000 r4:82a6dd18 [ 211.471646][ T5105] [<8021fe1c>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 211.471932][ T5105] [<802024f4>] (panic) from [<80258578>] (get_taint+0x0/0x1c) [ 211.472216][ T5105] r3:8280c684 r2:00000001 r1:82242038 r0:822499d0 [ 211.472446][ T5105] r7:804bc144 [ 211.472588][ T5105] [<80258504>] (check_panic_on_warn) from [<802586dc>] (__warn+0x80/0x188) [ 211.472887][ T5105] [<8025865c>] (__warn) from [<8025895c>] (warn_slowpath_fmt+0x178/0x1f4) [ 211.473283][ T5105] r8:00000009 r7:822752c4 r6:e0381d1c r5:84033000 r4:00000000 [ 211.473531][ T5105] [<802587e8>] (warn_slowpath_fmt) from [<804bc144>] (kunmap_local_indexed+0x20c/0x224) [ 211.474242][ T5105] r10:00000000 r9:86048800 r8:00000000 r7:00000000 r6:00000003 r5:84033000 [ 211.474745][ T5105] r4:ffefd000 [ 211.474923][ T5105] [<804bbf38>] (kunmap_local_indexed) from [<805373a8>] (move_pages+0xb24/0x19c8) [ 211.475407][ T5105] r7:00000000 r6:fffffffe r5:86048838 r4:8496c900 [ 211.475834][ T5105] [<80536884>] (move_pages) from [<805be4dc>] (userfaultfd_ioctl+0xff8/0x21c4) [ 211.476498][ T5105] r10:8496c900 r9:e0381e98 r8:21000000 r7:00000001 r6:00000000 r5:20000040 [ 211.476876][ T5105] r4:8604e080 [ 211.477038][ T5105] [<805bd4e4>] (userfaultfd_ioctl) from [<805679ec>] (sys_ioctl+0x130/0xdc8) [ 211.477523][ T5105] r10:84033000 r9:83364480 r8:00000003 r7:20000040 r6:83364481 r5:00000000 [ 211.477874][ T5105] r4:c028aa05 [ 211.478025][ T5105] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 211.478526][ T5105] Exception stack(0xe0381fa8 to 0xe0381ff0) [ 211.478973][ T5105] 1fa0: 00000000 00000000 00000003 c028aa05 20000040 00000000 [ 211.479340][ T5105] 1fc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76bcc0bc [ 211.479783][ T5105] 1fe0: 76bcbec0 76bcbeb0 000193a4 00131fc0 [ 211.480180][ T5105] r10:00000036 r9:84033000 r8:8020029c r7:00000036 r6:002f6300 r5:00000000 [ 211.480608][ T5105] r4:00000000 [ 211.483395][ T5105] Rebooting in 86400 seconds.. VM DIAGNOSIS: 20:42:46 Registers: info registers vcpu 0 CPU#0 R00=0000001e R01=00000000 R02=00000000 R03=822498e0 R04=00000000 R05=ffffffff R06=82820850 R07=00000000 R08=00000000 R09=84033000 R10=00000000 R11=e0381c3c R12=e0381c40 R13=e0381bf0 R14=00000000 R15=802e5fa8 PSR=00000093 ---- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=7eef7820 R01=7eef76a2 R02=76e40e90 R03=00000000 R04=00000000 R05=7eef7818 R06=00000000 R07=7eef77f8 R08=7eef7858 R09=76c26b00 R10=7eef77bc R11=00000000 R12=7eef7858 R13=7eef7238 R14=76d2a87c R15=76d31d50 PSR=a0070010 N-C- A S usr32 s00=656b6e69 s01=6e692064 d00=6e692064656b6e69 s02=54205b5d s03=35303135 d01=3530313554205b5d s04=4157205d s05=4e494e52 d02=4e494e524157205d s06=43203a47 s07=203a5550 d03=203a555043203a47 s08=49502030 s09=35203a44 d04=35203a4449502030 s10=20353031 s11=6d207461 d05=6d20746120353031 s12=69682f6d s13=656d6867 d06=656d686769682f6d s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000