last executing test programs: 20.884198742s ago: executing program 1 (id=7009): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000300)={0x0, 0x1, 0x2c, 0xa0, 0x1, 0x1}) 20.783327297s ago: executing program 1 (id=7010): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r0) sendmsg$NFC_CMD_DEACTIVATE_TARGET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010005000000fcdbdf251e00000008000400010000000800010086"], 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) 20.783015587s ago: executing program 1 (id=7011): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000060000000000000000008500000007000000850000000e00000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000012c0)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="2801"], 0x128}, 0x4050) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 20.684311892s ago: executing program 1 (id=7012): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x30, 0x3, 0xa, 0x101, 0x0, 0x0, {0x2}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x4}]}], {0x14}}, 0x78}}, 0x0) 20.683828102s ago: executing program 1 (id=7013): socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) kcmp(r1, r1, 0x2, r4, r3) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)={{0x14}, [@NFT_MSG_NEWSET={0x3c, 0x12, 0xa, 0x9, 0x0, 0x0, {0x2}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0x8000000}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}], {0x14}}, 0x64}, 0x1, 0x0, 0x0, 0x814}, 0x0) sendmsg$NFT_MSG_GETOBJ(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="34000000150a03000000000000000000020000000900020073797a310000000008000340000000010900010073797a"], 0x34}}, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000100), 0x2, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$LOOP_CONFIGURE(r6, 0x4c0a, &(0x7f00000002c0)={r7, 0x0, {0x2a00, 0x80010000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xb, 0x1c, "fee8a2ab78fc979fd1e00d96072000001ea89de2b7fb0000e60080b8785d96000100", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "f4bd000000801900", [0x0, 0x2000000000001]}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) 11.868755026s ago: executing program 0 (id=7019): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x100) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='devtmpfs\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x21, &(0x7f00000002c0)=ANY=[@ANYBLOB='inode32,uid=', @ANYRESHEX=0x0]) 11.483230755s ago: executing program 0 (id=7020): r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x3, 0x800) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 11.314823773s ago: executing program 0 (id=7021): r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x80000001, 0x82002) poll(&(0x7f0000000180)=[{r0}], 0x1, 0x7a0) syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) 9.033148046s ago: executing program 0 (id=7022): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='devices.list\x00', 0x275a, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000740)={0x30}, 0x30) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') fchdir(r1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x40, 0x1) 8.824240786s ago: executing program 0 (id=7023): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x10, &(0x7f0000000600)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000040)='autofs\x00', 0x0, &(0x7f0000000400)) 2.262464519s ago: executing program 1 (id=7024): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000201b4510fc0428155d6d01020301090212000100000000090401"], 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 0s ago: executing program 0 (id=7025): r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0xc0185879, &(0x7f0000000100)={0x8003, 0x41000, 0x2000, 0x0, 0x0, 0x0, 0x2401}) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000000000)=""/59, 0x304000, 0x800, 0x0, 0x3}, 0x20) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000480), 0x0) eventfd(0xfffffffe) recvmmsg(0xffffffffffffffff, &(0x7f0000001b00), 0x0, 0x2120, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x3) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000013000/0x4000)=nil, 0x3000, 0x3}) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) userfaultfd(0x801) kernel console output (not intermixed with test programs): [ 6012.836198][ T31] kauditd_printk_skb: 49 callbacks suppressed [ 6012.836596][ T31] audit: type=1400 audit(134223996.725:1283): avc: denied { name_bind } for pid=25816 comm="syz.0.6333" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 6012.840145][ T31] audit: type=1400 audit(134223996.735:1284): avc: denied { node_bind } for pid=25816 comm="syz.0.6333" saddr=224.0.0.1 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 6014.120518][ T31] audit: type=1326 audit(134223998.015:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25822 comm="syz.0.6335" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6014.122941][ T31] audit: type=1326 audit(134223998.015:1286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25822 comm="syz.0.6335" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6014.123370][ T31] audit: type=1326 audit(134223998.015:1287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25822 comm="syz.0.6335" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6014.128780][ T31] audit: type=1326 audit(134223998.025:1288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25822 comm="syz.0.6335" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x12ff5c code=0x7ffc0000 [ 6014.129276][ T31] audit: type=1326 audit(134223998.025:1289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25822 comm="syz.0.6335" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6014.133006][ T31] audit: type=1326 audit(134223998.025:1290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25822 comm="syz.0.6335" exe="/syz-executor" sig=0 arch=40000028 syscall=70 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6014.133986][ T31] audit: type=1326 audit(134223998.025:1291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25822 comm="syz.0.6335" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6016.021081][T25835] netlink: 48 bytes leftover after parsing attributes in process `syz.0.6339'. [ 6016.492917][T25837] SELinux: policydb table sizes (0,0) do not match mine (6,7) [ 6016.492995][ T31] audit: type=1400 audit(134224000.385:1292): avc: denied { load_policy } for pid=25836 comm="syz.0.6340" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 6016.500819][T25837] SELinux: failed to load policy [ 6019.700387][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 6019.700772][ T31] audit: type=1400 audit(134224003.595:1296): avc: denied { create } for pid=25855 comm="syz.0.6349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6019.737368][ T31] audit: type=1400 audit(134224003.625:1297): avc: denied { write } for pid=25855 comm="syz.0.6349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6019.738914][ T31] audit: type=1400 audit(134224003.625:1298): avc: denied { read } for pid=25855 comm="syz.0.6349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6019.955450][ T31] audit: type=1400 audit(134224003.845:1299): avc: denied { sys_module } for pid=25855 comm="syz.0.6349" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6020.849054][ T31] audit: type=1400 audit(134224004.745:1300): avc: denied { watch watch_reads } for pid=25861 comm="syz.0.6351" path="/481" dev="tmpfs" ino=2459 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6021.589785][ T31] audit: type=1400 audit(134224005.485:1301): avc: denied { create } for pid=25865 comm="syz.0.6353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 6021.602894][ T31] audit: type=1400 audit(134224005.485:1302): avc: denied { write } for pid=25865 comm="syz.0.6353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 6023.164947][ T31] audit: type=1400 audit(134224007.055:1303): avc: denied { map } for pid=25873 comm="syz.0.6357" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=71796 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6023.166157][ T31] audit: type=1400 audit(134224007.055:1304): avc: denied { read write } for pid=25873 comm="syz.0.6357" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=71796 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6023.241175][ T31] audit: type=1400 audit(134224007.135:1305): avc: denied { execute } for pid=25873 comm="syz.0.6357" path="/487/cpu.stat" dev="tmpfs" ino=2494 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 6026.111541][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 6026.111963][ T31] audit: type=1400 audit(134224010.005:1314): avc: denied { bind } for pid=25851 comm="syz.1.6347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6026.140614][ T31] audit: type=1400 audit(134224010.035:1315): avc: denied { write } for pid=25851 comm="syz.1.6347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6026.476894][ T31] audit: type=1326 audit(134224010.365:1316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25895 comm="syz.0.6365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6026.499945][ T31] audit: type=1326 audit(134224010.395:1317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25895 comm="syz.0.6365" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6026.500346][ T31] audit: type=1326 audit(134224010.395:1318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25895 comm="syz.0.6365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6026.500556][ T31] audit: type=1326 audit(134224010.395:1319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25895 comm="syz.0.6365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6026.543547][ T31] audit: type=1326 audit(134224010.435:1320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25895 comm="syz.0.6365" exe="/syz-executor" sig=0 arch=40000028 syscall=370 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6026.544058][ T31] audit: type=1326 audit(134224010.435:1321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25895 comm="syz.0.6365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6026.544317][ T31] audit: type=1326 audit(134224010.435:1322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25895 comm="syz.0.6365" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6026.544552][ T31] audit: type=1326 audit(134224010.435:1323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25895 comm="syz.0.6365" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6027.798215][T25899] netlink: 'syz.0.6366': attribute type 10 has an invalid length. [ 6031.694535][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 6031.694958][ T31] audit: type=1400 audit(134224015.585:1352): avc: denied { unmount } for pid=25914 comm="syz.0.6373" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 6031.770290][T23471] page_pool_release_retry() stalled pool shutdown: id 35, 43 inflight 60 sec [ 6032.031200][ T31] audit: type=1400 audit(134224015.925:1353): avc: denied { create } for pid=25916 comm="syz.0.6374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6032.040717][ T31] audit: type=1400 audit(134224015.935:1354): avc: denied { connect } for pid=25916 comm="syz.0.6374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6032.095697][ T31] audit: type=1400 audit(134224015.985:1355): avc: denied { write } for pid=25916 comm="syz.0.6374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6034.131193][ T31] audit: type=1400 audit(134224018.025:1356): avc: denied { create } for pid=25926 comm="syz.0.6379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 6036.500396][T25939] netlink: 12 bytes leftover after parsing attributes in process `syz.0.6383'. [ 6037.354087][T25940] IPv6: NLM_F_CREATE should be specified when creating new route [ 6039.588876][ T31] audit: type=1400 audit(134224023.475:1357): avc: denied { relabelfrom } for pid=25945 comm="syz.0.6385" name="" dev="pipefs" ino=71113 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 6039.914365][ T31] audit: type=1400 audit(134224023.805:1358): avc: denied { ioctl } for pid=25947 comm="syz.0.6386" path="socket:[71922]" dev="sockfs" ino=71922 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6040.040414][ T31] audit: type=1400 audit(134224023.935:1359): avc: denied { bind } for pid=25947 comm="syz.0.6386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6040.044455][ T31] audit: type=1400 audit(134224023.935:1360): avc: denied { setopt } for pid=25947 comm="syz.0.6386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6053.493288][T25954] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6388'. [ 6053.493577][T25954] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6388'. [ 6057.210038][ T31] audit: type=1400 audit(134224041.105:1361): avc: denied { ioctl } for pid=25970 comm="syz.1.6396" path="socket:[71984]" dev="sockfs" ino=71984 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6062.179529][ T31] audit: type=1326 audit(134224046.075:1362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25987 comm="syz.0.6402" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6062.181956][ T31] audit: type=1326 audit(134224046.075:1363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25987 comm="syz.0.6402" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6062.184077][ T31] audit: type=1326 audit(134224046.075:1364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25987 comm="syz.0.6402" exe="/syz-executor" sig=0 arch=40000028 syscall=95 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6062.190136][ T31] audit: type=1326 audit(134224046.075:1365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25987 comm="syz.0.6402" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6062.192515][ T31] audit: type=1326 audit(134224046.075:1366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=25987 comm="syz.0.6402" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6062.294956][T25990] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.6401'. [ 6062.296374][T25986] netlink: 16402 bytes leftover after parsing attributes in process `kfree'. [ 6062.411458][ T31] audit: type=1400 audit(134224046.305:1367): avc: denied { connect } for pid=25989 comm="syz.0.6403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6067.772178][ T31] audit: type=1326 audit(134224051.665:1368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26014 comm="syz.1.6413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6067.789990][ T31] audit: type=1326 audit(134224051.685:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26014 comm="syz.1.6413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6067.793802][ T31] audit: type=1326 audit(134224051.685:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26014 comm="syz.1.6413" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6067.799045][ T31] audit: type=1326 audit(134224051.685:1371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26014 comm="syz.1.6413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6067.803562][ T31] audit: type=1326 audit(134224051.695:1372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26014 comm="syz.1.6413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6067.807458][ T31] audit: type=1326 audit(134224051.695:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26014 comm="syz.1.6413" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6067.821946][ T31] audit: type=1326 audit(134224051.715:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26014 comm="syz.1.6413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6067.824123][ T31] audit: type=1326 audit(134224051.715:1375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26014 comm="syz.1.6413" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6067.825993][ T31] audit: type=1326 audit(134224051.715:1376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26014 comm="syz.1.6413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6067.838880][ T31] audit: type=1326 audit(134224051.715:1377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26014 comm="syz.1.6413" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12fdb8 code=0x7ffc0000 [ 6068.387294][T26023] netlink: 'syz.0.6416': attribute type 10 has an invalid length. [ 6078.478531][T26042] alloc_vmap_area: 14 callbacks suppressed [ 6078.478875][T26042] vmalloc_node_range for size 268443648 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 6078.479181][T26042] syz.0.6424: vmalloc error: size 268439552, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 6078.479501][T26042] CPU: 0 UID: 0 PID: 26042 Comm: syz.0.6424 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 6078.479558][T26042] Hardware name: ARM-Versatile Express [ 6078.479612][T26042] Call trace: [ 6078.479653][T26042] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 6078.479747][T26042] r7:00000dc0 r6:82276824 r5:60000013 r4:8225b4f4 [ 6078.479764][T26042] [<80201ae4>] (show_stack) from [<8021fe10>] (dump_stack_lvl+0x70/0x7c) [ 6078.479806][T26042] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 6078.479850][T26042] r5:85c7a400 r4:00000000 [ 6078.479863][T26042] [<8021fe1c>] (dump_stack) from [<804f2d08>] (warn_alloc+0xd8/0x178) [ 6078.479906][T26042] [<804f2c30>] (warn_alloc) from [<804e1ad4>] (__vmalloc_node_range_noprof+0xc0/0x544) [ 6078.480006][T26042] r3:10001000 r2:82276824 [ 6078.480190][T26042] r6:df800000 r5:ff800000 r4:10001000 [ 6078.480211][T26042] [<804e1a14>] (__vmalloc_node_range_noprof) from [<804e2030>] (vmalloc_user_noprof+0x6c/0x74) [ 6078.480286][T26042] r10:00000126 r9:85c7a400 r8:86962640 r7:869626b0 r6:00000000 r5:85b9f640 [ 6078.480315][T26042] r4:10001000 [ 6078.480342][T26042] [<804e1fc4>] (vmalloc_user_noprof) from [<819c23bc>] (xskq_create+0x78/0xac) [ 6078.480424][T26042] [<819c2344>] (xskq_create) from [<819c06a4>] (xsk_setsockopt+0x238/0x2d4) [ 6078.480488][T26042] r7:869626b0 r6:86962400 r5:00000000 r4:00000002 [ 6078.480567][T26042] [<819c0470>] (xsk_setsockopt) from [<81529a98>] (do_sock_setsockopt+0x70/0xc8) [ 6078.480629][T26042] r8:00000004 r7:85157b80 r6:00000002 r5:0000011b r4:819c046c [ 6078.480657][T26042] [<81529a28>] (do_sock_setsockopt) from [<8152ce70>] (__sys_setsockopt+0x7c/0xc4) [ 6078.480717][T26042] r8:00000000 r7:85f5af00 r6:85f5af01 r5:00000002 r4:0000011b [ 6078.480764][T26042] [<8152cdf4>] (__sys_setsockopt) from [<8152ced4>] (sys_setsockopt+0x1c/0x24) [ 6078.480849][T26042] r8:8020029c r7:00000126 r6:002f6308 r5:00000000 r4:00000004 [ 6078.480897][T26042] [<8152ceb8>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6078.480938][T26042] Exception stack(0xdfec9fa8 to 0xdfec9ff0) [ 6078.480975][T26042] 9fa0: 00000004 00000000 00000005 0000011b 00000002 200004c0 [ 6078.481034][T26042] 9fc0: 00000004 00000000 002f6308 00000126 002e0000 00000000 00006364 76bd40bc [ 6078.481060][T26042] 9fe0: 76bd3ec0 76bd3eb0 000193a4 00131fc0 [ 6078.481086][T26042] Mem-Info: [ 6078.481523][T26042] active_anon:18784 inactive_anon:0 isolated_anon:0 [ 6078.481523][T26042] active_file:64 inactive_file:42299 isolated_file:0 [ 6078.481523][T26042] unevictable:768 dirty:8 writeback:0 [ 6078.481523][T26042] slab_reclaimable:1161 slab_unreclaimable:31250 [ 6078.481523][T26042] mapped:5314 shmem:18056 pagetables:502 [ 6078.481523][T26042] sec_pagetables:0 bounce:0 [ 6078.481523][T26042] kernel_misc_reclaimable:0 [ 6078.481523][T26042] free:363996 free_pcp:1254 free_cma:4032 [ 6078.481638][T26042] Node 0 active_anon:75136kB inactive_anon:0kB active_file:256kB inactive_file:169196kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:21256kB dirty:32kB writeback:0kB shmem:72224kB writeback_tmp:0kB kernel_stack:2464kB pagetables:2008kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 6078.481755][T26042] Normal free:1271556kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:8624kB unevictable:0kB writepending:4kB present:1556480kB managed:1426968kB mlocked:0kB bounce:0kB free_pcp:5016kB local_pcp:2484kB free_cma:0kB [ 6078.481877][T26042] lowmem_reserve[]: 0 4224 4224 [ 6078.482066][T26042] Normal: 1*4kB (M) 4*8kB (E) 6*16kB (UME) 8*32kB (ME) 10*64kB (U) 10*128kB (UM) 4*256kB (UME) 11*512kB (UE) 9*1024kB (UME) 4*2048kB (UME) 304*4096kB (UM) = 1271556kB [ 6078.482935][T26042] 60421 total pagecache pages [ 6078.482995][T26042] 0 pages in swap cache [ 6078.483049][T26042] Free swap = 124996kB [ 6078.483120][T26042] Total swap = 124996kB [ 6078.483169][T26042] 524288 pages RAM [ 6078.483207][T26042] 135168 pages HighMem/MovableOnly [ 6078.483245][T26042] 32378 pages reserved [ 6078.483299][T26042] 4096 pages cma reserved [ 6080.042596][ T31] audit: type=1400 audit(134224063.935:1392): avc: denied { ioctl } for pid=26049 comm="syz.0.6426" path="socket:[71322]" dev="sockfs" ino=71322 ioctlcmd=0x8936 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6081.779644][ T31] audit: type=1326 audit(134224065.665:1393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26058 comm="syz.0.6430" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6081.780170][ T31] audit: type=1326 audit(134224065.665:1394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26058 comm="syz.0.6430" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6081.780490][ T31] audit: type=1326 audit(134224065.675:1395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26058 comm="syz.0.6430" exe="/syz-executor" sig=0 arch=40000028 syscall=441 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6081.788385][ T31] audit: type=1326 audit(134224065.675:1396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26058 comm="syz.0.6430" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6081.790802][ T31] audit: type=1326 audit(134224065.675:1397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26058 comm="syz.0.6430" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6083.902577][T26065] netlink: 830 bytes leftover after parsing attributes in process `syz.0.6433'. [ 6084.629983][ T31] audit: type=1326 audit(134224068.525:1398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26068 comm="syz.0.6435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6084.632517][ T31] audit: type=1326 audit(134224068.525:1399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26068 comm="syz.0.6435" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6084.635299][ T31] audit: type=1326 audit(134224068.525:1400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26068 comm="syz.0.6435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6084.636693][ T31] audit: type=1326 audit(134224068.525:1401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26068 comm="syz.0.6435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6084.651507][ T31] audit: type=1326 audit(134224068.545:1402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26068 comm="syz.0.6435" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6084.656468][ T31] audit: type=1326 audit(134224068.545:1403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26068 comm="syz.0.6435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6084.667471][ T31] audit: type=1326 audit(134224068.545:1404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26068 comm="syz.0.6435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6084.680200][ T31] audit: type=1326 audit(134224068.565:1405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26068 comm="syz.0.6435" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6084.680676][ T31] audit: type=1326 audit(134224068.565:1406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26068 comm="syz.0.6435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6084.680936][ T31] audit: type=1326 audit(134224068.575:1407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26068 comm="syz.0.6435" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6089.788384][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 6089.788984][ T31] audit: type=1400 audit(134224073.675:1414): avc: denied { bind } for pid=26083 comm="syz.0.6441" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6089.791212][ T31] audit: type=1400 audit(134224073.675:1415): avc: denied { node_bind } for pid=26083 comm="syz.0.6441" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 6089.803726][ T31] audit: type=1400 audit(134224073.695:1416): avc: denied { connect } for pid=26083 comm="syz.0.6441" laddr=172.20.20.170 lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6090.657622][ T31] audit: type=1400 audit(134224074.545:1417): avc: denied { block_suspend } for pid=26087 comm="syz.0.6443" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6092.408465][T23414] page_pool_release_retry() stalled pool shutdown: id 35, 43 inflight 121 sec [ 6101.488342][ T31] audit: type=1400 audit(134224085.365:1418): avc: denied { create } for pid=26109 comm="syz.0.6451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6101.491458][ T31] audit: type=1400 audit(134224085.375:1419): avc: denied { write } for pid=26109 comm="syz.0.6451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6102.172802][ T31] audit: type=1400 audit(134224086.065:1420): avc: denied { getopt } for pid=26112 comm="syz.0.6453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 6102.617123][T26119] SELinux: syz.1.6455 (26119) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 6107.524960][T26137] pim6reg1: entered promiscuous mode [ 6107.528467][T26137] pim6reg1: entered allmulticast mode [ 6107.992469][ T31] audit: type=1400 audit(134224091.885:1421): avc: denied { kexec_image_load } for pid=26143 comm="syz.1.6464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 6108.686213][T26148] netlink: 'syz.1.6466': attribute type 2 has an invalid length. [ 6108.703780][T26148] netlink: 16 bytes leftover after parsing attributes in process `syz.1.6466'. [ 6114.315094][ T31] audit: type=1400 audit(134224098.205:1422): avc: denied { recv } for pid=3098 comm="syz-executor" saddr=127.0.0.1 src=34818 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6114.338764][ T31] audit: type=1400 audit(134224098.225:1423): avc: denied { read write } for pid=20535 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6114.339393][ T31] audit: type=1400 audit(134224098.225:1424): avc: denied { open } for pid=20535 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6114.389506][ T31] audit: type=1400 audit(134224098.265:1425): avc: denied { recv } for pid=20999 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34818 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6114.390968][ T31] audit: type=1400 audit(134224098.285:1426): avc: denied { ioctl } for pid=20535 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6114.734592][ T31] audit: type=1400 audit(134224098.625:1427): avc: denied { read } for pid=26166 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6114.850148][ T31] audit: type=1400 audit(134224098.745:1428): avc: denied { map_create } for pid=26166 comm="syz.1.6474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6114.853416][ T31] audit: type=1400 audit(134224098.745:1429): avc: denied { perfmon } for pid=26166 comm="syz.1.6474" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6114.856450][ T31] audit: type=1400 audit(134224098.745:1430): avc: denied { map_read map_write } for pid=26166 comm="syz.1.6474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6114.993429][ T31] audit: type=1400 audit(134224098.885:1431): avc: denied { prog_load } for pid=26166 comm="syz.1.6474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6133.063591][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 6133.068201][ T31] audit: type=1400 audit(134224116.955:1439): avc: denied { create } for pid=26177 comm="syz.0.6480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6133.070252][ T31] audit: type=1400 audit(134224116.955:1440): avc: denied { write } for pid=26177 comm="syz.0.6480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6133.071361][T26179] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6480'. [ 6133.224958][ T31] audit: type=1400 audit(134224117.115:1441): avc: denied { create } for pid=26180 comm="syz.0.6481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6133.232344][ T31] audit: type=1400 audit(134224117.125:1442): avc: denied { ioctl } for pid=26180 comm="syz.0.6481" path="socket:[72368]" dev="sockfs" ino=72368 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6133.238917][ T31] audit: type=1400 audit(134224117.125:1443): avc: denied { bind } for pid=26180 comm="syz.0.6481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6133.305454][ T31] audit: type=1400 audit(134224117.195:1444): avc: denied { create } for pid=26182 comm="syz.1.6482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 6133.309143][ T31] audit: type=1400 audit(134224117.205:1445): avc: denied { module_request } for pid=26182 comm="syz.1.6482" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6133.680672][ T31] audit: type=1400 audit(134224117.575:1446): avc: denied { bind } for pid=26187 comm="syz.0.6484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6134.623684][ T31] audit: type=1400 audit(134224118.515:1447): avc: denied { setopt } for pid=26210 comm="syz.1.6486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6134.679121][ T31] audit: type=1400 audit(134224118.555:1448): avc: denied { sys_module } for pid=26187 comm="syz.0.6484" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6135.541530][T26219] netlink: 52 bytes leftover after parsing attributes in process `syz.1.6489'. [ 6135.543036][T26219] netlink: 52 bytes leftover after parsing attributes in process `syz.1.6489'. [ 6138.284027][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 6138.284448][ T31] audit: type=1400 audit(134224122.175:1456): avc: denied { relabelfrom } for pid=26264 comm="syz.1.6503" name="" dev="pipefs" ino=71679 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 6138.632695][T26270] netlink: 76 bytes leftover after parsing attributes in process `syz.1.6505'. [ 6138.633125][T26270] netlink: 72 bytes leftover after parsing attributes in process `syz.1.6505'. [ 6138.633627][T26270] netlink: 'syz.1.6505': attribute type 3 has an invalid length. [ 6138.633712][T26270] netlink: 11 bytes leftover after parsing attributes in process `syz.1.6505'. [ 6138.654538][ T31] audit: type=1400 audit(134224122.535:1457): avc: denied { open } for pid=26268 comm="syz.1.6505" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6138.739284][ T31] audit: type=1400 audit(134224122.635:1458): avc: denied { ioctl } for pid=26268 comm="syz.1.6505" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6139.509273][ T31] audit: type=1400 audit(134224123.395:1459): avc: denied { create } for pid=26278 comm="syz.0.6510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6139.684502][ T31] audit: type=1400 audit(134224123.575:1460): avc: denied { write } for pid=26278 comm="syz.0.6510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6139.760140][ T31] audit: type=1400 audit(134224123.655:1461): avc: denied { unmount } for pid=26276 comm="syz.1.6509" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 6139.823018][T26277] netlink: 'syz.1.6509': attribute type 10 has an invalid length. [ 6139.823523][T26277] vxcan0: left promiscuous mode [ 6140.159857][T26281] macvlan1: entered promiscuous mode [ 6140.162773][T26281] ipvlan0: entered promiscuous mode [ 6140.165356][T26281] ipvlan0: left promiscuous mode [ 6140.167644][T26281] macvlan1: left promiscuous mode [ 6140.320884][ T31] audit: type=1400 audit(134224124.215:1462): avc: denied { create } for pid=26284 comm="syz.1.6512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6140.368434][ T31] audit: type=1400 audit(134224124.255:1463): avc: denied { write } for pid=26284 comm="syz.1.6512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6140.562269][ T31] audit: type=1400 audit(134224124.455:1464): avc: denied { write } for pid=26290 comm="syz.1.6514" path="/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6141.041913][ T31] audit: type=1400 audit(134224124.925:1465): avc: denied { write } for pid=26297 comm="syz.0.6517" lport=15 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6149.199688][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 6149.200036][ T31] audit: type=1326 audit(134224133.095:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26349 comm="syz.0.6528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6149.200337][ T31] audit: type=1326 audit(134224133.095:1475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26349 comm="syz.0.6528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6149.215836][ T31] audit: type=1326 audit(134224133.095:1476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26349 comm="syz.0.6528" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6149.220852][ T31] audit: type=1326 audit(134224133.105:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26349 comm="syz.0.6528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6149.223382][ T31] audit: type=1326 audit(134224133.115:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26349 comm="syz.0.6528" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12fdb8 code=0x7ffc0000 [ 6149.226651][ T31] audit: type=1326 audit(134224133.115:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26349 comm="syz.0.6528" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12fdb8 code=0x7ffc0000 [ 6149.232575][ T31] audit: type=1326 audit(134224133.125:1480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26349 comm="syz.0.6528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6149.232923][ T31] audit: type=1326 audit(134224133.125:1481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26349 comm="syz.0.6528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6149.240524][ T31] audit: type=1326 audit(134224133.135:1482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26349 comm="syz.0.6528" exe="/syz-executor" sig=0 arch=40000028 syscall=108 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6149.240954][ T31] audit: type=1326 audit(134224133.135:1483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26349 comm="syz.0.6528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6150.086062][T26359] netlink: 14 bytes leftover after parsing attributes in process `syz.0.6530'. [ 6152.892605][T26407] netlink: 24 bytes leftover after parsing attributes in process `syz.0.6538'. [ 6153.289188][T24196] page_pool_release_retry() stalled pool shutdown: id 35, 43 inflight 182 sec [ 6154.543384][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 6154.543603][ T31] audit: type=1400 audit(134224138.435:1491): avc: denied { write } for pid=26457 comm="syz.1.6542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6154.543767][ T31] audit: type=1400 audit(134224138.435:1492): avc: denied { nlmsg_write } for pid=26457 comm="syz.1.6542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6155.210146][T17274] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6155.217114][T17274] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6155.236743][T17274] bond0 (unregistering): Released all slaves [ 6155.343336][T17274] hsr_slave_0: left promiscuous mode [ 6155.359320][T17274] hsr_slave_1: left promiscuous mode [ 6155.769095][T26464] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6543'. [ 6156.435032][ T31] audit: type=1400 audit(134224140.325:1493): avc: denied { write } for pid=26482 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6156.440381][ T31] audit: type=1400 audit(134224140.335:1494): avc: denied { open } for pid=26482 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6156.882270][ T31] audit: type=1400 audit(134224140.775:1495): avc: denied { ioctl } for pid=26484 comm="syz.1.6544" path="socket:[73966]" dev="sockfs" ino=73966 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6156.911375][ T31] audit: type=1400 audit(134224140.795:1496): avc: denied { search } for pid=26493 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6156.915076][ T31] audit: type=1400 audit(134224140.795:1497): avc: denied { search } for pid=26493 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6156.915193][ T31] audit: type=1400 audit(134224140.795:1498): avc: denied { search } for pid=26493 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6156.915298][ T31] audit: type=1400 audit(134224140.795:1499): avc: denied { search } for pid=26493 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6157.058632][ T31] audit: type=1400 audit(134224140.935:1500): avc: denied { read open } for pid=26513 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6160.355683][T26446] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 6160.373133][T26446] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 6161.460600][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 6161.460937][ T31] audit: type=1400 audit(134224145.355:1512): avc: denied { setopt } for pid=26683 comm="syz.1.6548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6161.820031][ T31] audit: type=1326 audit(134224145.715:1513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26687 comm="syz.1.6549" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6161.831454][ T31] audit: type=1326 audit(134224145.725:1514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26687 comm="syz.1.6549" exe="/syz-executor" sig=0 arch=40000028 syscall=247 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6161.831904][ T31] audit: type=1326 audit(134224145.725:1515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26687 comm="syz.1.6549" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6161.844618][ T31] audit: type=1326 audit(134224145.725:1516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26687 comm="syz.1.6549" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6163.456326][T26446] hsr_slave_0: entered promiscuous mode [ 6163.472444][T26446] hsr_slave_1: entered promiscuous mode [ 6165.033839][ T31] audit: type=1400 audit(134224148.915:1517): avc: denied { allowed } for pid=26820 comm="syz.1.6551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6165.035616][ T31] audit: type=1400 audit(134224148.915:1518): avc: denied { create } for pid=26820 comm="syz.1.6551" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6165.037086][ T31] audit: type=1400 audit(134224148.915:1519): avc: denied { map } for pid=26820 comm="syz.1.6551" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=73142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6165.044956][ T31] audit: type=1400 audit(134224148.915:1520): avc: denied { read write } for pid=26820 comm="syz.1.6551" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=73142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6165.083525][T26446] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 6165.112442][T26446] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 6165.142722][T26446] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 6165.200629][T26446] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 6167.610436][T26446] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6170.288103][ T31] audit: type=1400 audit(134224154.175:1521): avc: denied { lock } for pid=26820 comm="syz.1.6551" path="socket:[73217]" dev="sockfs" ino=73217 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6173.978388][ T31] audit: type=1400 audit(134224157.865:1522): avc: denied { bind } for pid=26905 comm="syz.1.6555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6173.978875][ T31] audit: type=1400 audit(134224157.865:1523): avc: denied { node_bind } for pid=26905 comm="syz.1.6555" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 6173.999105][ T31] audit: type=1400 audit(134224157.885:1524): avc: denied { connect } for pid=26905 comm="syz.1.6555" laddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6175.319560][T26922] netlink: 'syz.1.6558': attribute type 1 has an invalid length. [ 6175.443226][T26446] veth0_vlan: entered promiscuous mode [ 6175.490726][T26446] veth1_vlan: entered promiscuous mode [ 6175.647031][T26446] veth0_macvtap: entered promiscuous mode [ 6175.656793][ T31] audit: type=1326 audit(134224159.545:1525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26925 comm="syz.1.6559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6175.685772][T26446] veth1_macvtap: entered promiscuous mode [ 6175.689998][ T31] audit: type=1326 audit(134224159.575:1526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26925 comm="syz.1.6559" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6175.690829][ T31] audit: type=1326 audit(134224159.575:1527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26925 comm="syz.1.6559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6175.720352][ T31] audit: type=1326 audit(134224159.605:1528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26925 comm="syz.1.6559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6175.730984][ T31] audit: type=1326 audit(134224159.625:1529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26925 comm="syz.1.6559" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6175.731335][ T31] audit: type=1326 audit(134224159.625:1530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26925 comm="syz.1.6559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6175.731622][ T31] audit: type=1326 audit(134224159.625:1531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26925 comm="syz.1.6559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6175.741968][ T31] audit: type=1326 audit(134224159.635:1532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26925 comm="syz.1.6559" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6175.742369][ T31] audit: type=1326 audit(134224159.635:1533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26925 comm="syz.1.6559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6175.746042][ T31] audit: type=1326 audit(134224159.635:1534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26925 comm="syz.1.6559" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6175.925880][T26446] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6175.926316][T26446] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6175.926538][T26446] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6175.926636][T26446] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6178.004830][T26960] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6567'. [ 6178.396388][T17274] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6178.440225][T17274] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6178.451212][T17274] bond0 (unregistering): Released all slaves [ 6179.336039][T26985] syzkaller0: entered promiscuous mode [ 6179.336519][T26985] syzkaller0: entered allmulticast mode [ 6181.089628][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 6181.099028][ T31] audit: type=1326 audit(134224164.975:1562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27061 comm="syz.0.6573" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6181.111240][ T31] audit: type=1326 audit(134224165.005:1563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27061 comm="syz.0.6573" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6181.119018][ T31] audit: type=1326 audit(134224165.005:1564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27061 comm="syz.0.6573" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6181.121308][ T31] audit: type=1326 audit(134224165.005:1565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27061 comm="syz.0.6573" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6181.123261][ T31] audit: type=1326 audit(134224165.005:1566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27061 comm="syz.0.6573" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6181.125010][ T31] audit: type=1326 audit(134224165.005:1567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27061 comm="syz.0.6573" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6181.126781][ T31] audit: type=1326 audit(134224165.005:1568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27061 comm="syz.0.6573" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6181.149305][ T31] audit: type=1326 audit(134224165.015:1569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27061 comm="syz.0.6573" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6181.151639][ T31] audit: type=1326 audit(134224165.035:1570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27061 comm="syz.0.6573" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6181.153302][ T31] audit: type=1326 audit(134224165.035:1571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27061 comm="syz.0.6573" exe="/syz-executor" sig=0 arch=40000028 syscall=343 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6181.502268][T27071] netlink: 20 bytes leftover after parsing attributes in process `syz.0.6574'. [ 6181.792129][T27076] netlink: 'syz.0.6575': attribute type 12 has an invalid length. [ 6183.386981][T26943] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 6183.404386][T26943] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 6187.791635][T26943] hsr_slave_0: entered promiscuous mode [ 6187.810238][T26943] hsr_slave_1: entered promiscuous mode [ 6187.812011][T26943] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 6187.818522][T26943] Cannot create hsr debugfs directory [ 6187.910552][ T31] kauditd_printk_skb: 52 callbacks suppressed [ 6187.910998][ T31] audit: type=1400 audit(134224171.805:1624): avc: denied { map_create } for pid=27263 comm="syz.0.6583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6188.958240][ T31] audit: type=1400 audit(134224172.845:1625): avc: denied { create } for pid=26943 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6188.970593][ T31] audit: type=1400 audit(134224172.845:1626): avc: denied { write } for pid=26943 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6188.972362][ T31] audit: type=1400 audit(134224172.865:1627): avc: denied { read } for pid=26943 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6188.972426][T26943] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 6189.026429][T26943] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 6189.051294][T26943] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 6189.114687][T26943] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 6189.338405][ T31] audit: type=1400 audit(134224173.225:1628): avc: denied { map_read map_write } for pid=27359 comm="syz.0.6586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6189.550856][ T31] audit: type=1400 audit(134224173.445:1629): avc: denied { create } for pid=27365 comm="syz.0.6587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6189.568740][ T31] audit: type=1400 audit(134224173.455:1630): avc: denied { write } for pid=27365 comm="syz.0.6587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6189.912354][ T31] audit: type=1400 audit(134224173.805:1631): avc: denied { read } for pid=27365 comm="syz.0.6587" path="socket:[74613]" dev="sockfs" ino=74613 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6190.399139][T27376] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6588'. [ 6191.003293][T26943] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6191.239738][ T31] audit: type=1400 audit(134224175.135:1632): avc: denied { execmem } for pid=27386 comm="syz.0.6591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6194.650811][ T31] audit: type=1400 audit(134224178.535:1633): avc: denied { open } for pid=27386 comm="syz.0.6591" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6194.651279][ T31] audit: type=1400 audit(134224178.545:1634): avc: denied { ioctl } for pid=27386 comm="syz.0.6591" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6194.874974][ T31] audit: type=1400 audit(134224178.765:1635): avc: denied { ioctl } for pid=27386 comm="syz.0.6591" path="socket:[74650]" dev="sockfs" ino=74650 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6194.877134][T27389] syzkaller0: entered promiscuous mode [ 6194.877467][T27389] syzkaller0: entered allmulticast mode [ 6195.439939][ T31] audit: type=1326 audit(134224179.335:1636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27417 comm="syz.0.6592" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6195.440171][ T31] audit: type=1326 audit(134224179.335:1637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27417 comm="syz.0.6592" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6195.471849][ T31] audit: type=1326 audit(134224179.365:1638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27417 comm="syz.0.6592" exe="/syz-executor" sig=0 arch=40000028 syscall=356 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6195.473734][ T31] audit: type=1326 audit(134224179.365:1639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27417 comm="syz.0.6592" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6195.475569][ T31] audit: type=1326 audit(134224179.365:1640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27417 comm="syz.0.6592" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6196.273149][ T31] audit: type=1400 audit(134224180.165:1641): avc: denied { ioctl } for pid=27423 comm="syz.0.6594" path="socket:[73601]" dev="sockfs" ino=73601 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6197.249580][ T31] audit: type=1400 audit(134224181.145:1642): avc: denied { bind } for pid=27423 comm="syz.0.6594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6198.672802][T26943] veth0_vlan: entered promiscuous mode [ 6198.695925][T26943] veth1_vlan: entered promiscuous mode [ 6198.904035][T26943] veth0_macvtap: entered promiscuous mode [ 6198.932484][T26943] veth1_macvtap: entered promiscuous mode [ 6198.990107][T26943] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6198.990517][T26943] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6198.990743][T26943] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6198.990838][T26943] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6200.918749][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 6200.919140][ T31] audit: type=1400 audit(134224184.805:1657): avc: denied { name_bind } for pid=27453 comm="syz.0.6600" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 6200.919450][ T31] audit: type=1400 audit(134224184.805:1658): avc: denied { node_bind } for pid=27453 comm="syz.0.6600" saddr=::ffff:0.0.0.0 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 6206.053507][ T31] audit: type=1326 audit(134224189.945:1659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27501 comm="syz.0.6610" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6206.056232][ T31] audit: type=1326 audit(134224189.945:1660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27501 comm="syz.0.6610" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6206.060269][ T31] audit: type=1326 audit(134224189.955:1661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27501 comm="syz.0.6610" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6206.061512][ T31] audit: type=1326 audit(134224189.955:1662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27501 comm="syz.0.6610" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6206.064455][ T31] audit: type=1326 audit(134224189.955:1663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27501 comm="syz.0.6610" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6206.067522][ T31] audit: type=1326 audit(134224189.955:1664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27501 comm="syz.0.6610" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6206.076819][ T31] audit: type=1326 audit(134224189.965:1665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27501 comm="syz.0.6610" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6206.081639][ T31] audit: type=1326 audit(134224189.975:1666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27501 comm="syz.0.6610" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6206.084710][ T31] audit: type=1326 audit(134224189.975:1667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27501 comm="syz.0.6610" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6206.089221][ T31] audit: type=1326 audit(134224189.975:1668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27501 comm="syz.0.6610" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6207.023718][T27508] syzkaller0: entered promiscuous mode [ 6207.025215][T27508] syzkaller0: entered allmulticast mode [ 6211.060654][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 6211.062106][ T31] audit: type=1326 audit(134224194.955:1690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27534 comm="syz.0.6621" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6211.063942][ T31] audit: type=1326 audit(134224194.955:1691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27534 comm="syz.0.6621" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6211.065557][ T31] audit: type=1326 audit(134224194.955:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27534 comm="syz.0.6621" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6211.083036][ T31] audit: type=1326 audit(134224194.975:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27534 comm="syz.0.6621" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6211.084855][ T31] audit: type=1326 audit(134224194.975:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27534 comm="syz.0.6621" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6211.086337][ T31] audit: type=1326 audit(134224194.975:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27534 comm="syz.0.6621" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6211.087688][ T31] audit: type=1326 audit(134224194.975:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27534 comm="syz.0.6621" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6211.090656][ T31] audit: type=1326 audit(134224194.975:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27534 comm="syz.0.6621" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6211.092448][ T31] audit: type=1326 audit(134224194.975:1698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27534 comm="syz.0.6621" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6211.094731][ T31] audit: type=1326 audit(134224194.985:1699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27534 comm="syz.0.6621" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6216.858323][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 6216.858653][ T31] audit: type=1400 audit(134224200.745:1709): avc: denied { create } for pid=27551 comm="syz.0.6625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 6216.868543][ T31] audit: type=1400 audit(134224200.755:1710): avc: denied { connect } for pid=27551 comm="syz.0.6625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 6226.149386][ T31] audit: type=1400 audit(134224210.035:1711): avc: denied { create } for pid=27576 comm="syz.1.6635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6226.168121][ T31] audit: type=1400 audit(134224210.055:1712): avc: denied { write } for pid=27576 comm="syz.1.6635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6230.541001][T27613] netlink: 'syz.1.6640': attribute type 7 has an invalid length. [ 6231.028574][ T31] audit: type=1326 audit(134224214.905:1713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27614 comm="syz.1.6641" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6231.030734][ T31] audit: type=1326 audit(134224214.925:1714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27614 comm="syz.1.6641" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6231.049996][ T31] audit: type=1326 audit(134224214.925:1715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27614 comm="syz.1.6641" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6231.050484][ T31] audit: type=1326 audit(134224214.945:1716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27614 comm="syz.1.6641" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6231.050583][ T31] audit: type=1326 audit(134224214.945:1717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27614 comm="syz.1.6641" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6231.058458][ T31] audit: type=1326 audit(134224214.945:1718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27614 comm="syz.1.6641" exe="/syz-executor" sig=0 arch=40000028 syscall=152 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6231.098331][ T31] audit: type=1326 audit(134224214.985:1719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27614 comm="syz.1.6641" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6231.111076][ T31] audit: type=1326 audit(134224215.005:1720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27614 comm="syz.1.6641" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6233.270817][T27628] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6646'. [ 6236.346196][ T31] audit: type=1400 audit(134224220.235:1721): avc: denied { write } for pid=27658 comm="wg1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6238.231692][ T31] audit: type=1400 audit(134224222.125:1722): avc: denied { create } for pid=27674 comm="syz.1.6659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6238.235705][ T31] audit: type=1400 audit(134224222.125:1723): avc: denied { bind } for pid=27674 comm="syz.1.6659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6238.252253][ T31] audit: type=1400 audit(134224222.145:1724): avc: denied { create } for pid=27674 comm="syz.1.6659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 6238.264928][ T31] audit: type=1400 audit(134224222.155:1725): avc: denied { ioctl } for pid=27674 comm="syz.1.6659" path="socket:[74980]" dev="sockfs" ino=74980 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 6241.958535][ T31] audit: type=1400 audit(134224225.845:1726): avc: denied { write } for pid=27695 comm="syz.1.6666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6242.856597][ T31] audit: type=1400 audit(134224226.745:1727): avc: denied { recv } for pid=3098 comm="syz-executor" saddr=127.0.0.1 src=34818 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6242.939209][ T31] audit: type=1400 audit(134224226.805:1728): avc: denied { recv } for pid=24113 comm="kworker/u9:14" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=34818 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6242.939658][ T31] audit: type=1400 audit(134224226.825:1729): avc: denied { read write } for pid=26943 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6242.939899][ T31] audit: type=1400 audit(134224226.825:1730): avc: denied { open } for pid=26943 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6242.948278][ T31] audit: type=1400 audit(134224226.835:1731): avc: denied { ioctl } for pid=26943 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6243.109537][ T31] audit: type=1400 audit(134224227.005:1732): avc: denied { read } for pid=27706 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6243.208186][ T31] audit: type=1400 audit(134224227.095:1733): avc: denied { map_create } for pid=27706 comm="syz.0.6671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6243.218362][ T31] audit: type=1400 audit(134224227.105:1734): avc: denied { bpf } for pid=27706 comm="syz.0.6671" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6243.231801][ T31] audit: type=1400 audit(134224227.115:1735): avc: denied { map_read map_write } for pid=27706 comm="syz.0.6671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6248.438723][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 6248.439070][ T31] audit: type=1400 audit(134224232.325:1758): avc: denied { wake_alarm } for pid=27734 comm="syz.0.6679" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6249.225767][ T31] audit: type=1400 audit(134224233.115:1759): avc: denied { watch } for pid=27736 comm="syz.0.6680" path="/72" dev="tmpfs" ino=376 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6249.253026][ T31] audit: type=1400 audit(134224233.145:1760): avc: denied { watch_reads } for pid=27736 comm="syz.0.6680" path="/72" dev="tmpfs" ino=376 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6250.783638][ T31] audit: type=1400 audit(134224234.665:1761): avc: denied { append } for pid=27729 comm="syz.1.6677" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6250.786945][ T31] audit: type=1400 audit(134224234.675:1762): avc: denied { sys_module } for pid=27729 comm="syz.1.6677" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6253.978840][ T31] audit: type=1400 audit(134224237.865:1763): avc: denied { load_policy } for pid=27747 comm="syz.0.6683" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 6254.193974][T27748] SELinux: failed to load policy [ 6255.077504][ T31] audit: type=1326 audit(134224238.955:1764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27751 comm="syz.0.6685" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6255.089560][ T31] audit: type=1326 audit(134224238.985:1765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27751 comm="syz.0.6685" exe="/syz-executor" sig=0 arch=40000028 syscall=152 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6255.098577][ T31] audit: type=1326 audit(134224238.985:1766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27751 comm="syz.0.6685" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6255.108439][ T31] audit: type=1326 audit(134224238.985:1767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27751 comm="syz.0.6685" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6255.123573][ T31] audit: type=1326 audit(134224239.015:1768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27751 comm="syz.0.6685" exe="/syz-executor" sig=0 arch=40000028 syscall=309 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6255.136496][ T31] audit: type=1326 audit(134224239.015:1769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27751 comm="syz.0.6685" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6255.137293][ T31] audit: type=1326 audit(134224239.015:1770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27751 comm="syz.0.6685" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6256.542583][ T31] audit: type=1400 audit(134224240.435:1771): avc: denied { execmem } for pid=27758 comm="syz.0.6688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6265.190421][ T31] audit: type=1400 audit(134224249.085:1772): avc: denied { create } for pid=27758 comm="syz.0.6688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 6267.913595][ T31] audit: type=1400 audit(134224251.805:1773): avc: denied { allowed } for pid=27773 comm="syz.1.6692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6267.931031][ T31] audit: type=1400 audit(134224251.825:1774): avc: denied { create } for pid=27773 comm="syz.1.6692" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6267.933585][ T31] audit: type=1400 audit(134224251.825:1775): avc: denied { map } for pid=27773 comm="syz.1.6692" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=76156 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6267.935739][ T31] audit: type=1400 audit(134224251.825:1776): avc: denied { read write } for pid=27773 comm="syz.1.6692" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=76156 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6269.235922][T27782] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6696'. [ 6269.353440][T27782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27782 comm=syz.1.6696 [ 6269.858495][T27786] usb usb1: usbfs: interface 0 claimed by hub while 'syz.1.6697' sets config #1 [ 6273.270734][ T31] audit: type=1400 audit(134224257.165:1777): avc: denied { create } for pid=27789 comm="syz.1.6699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6276.273196][ T31] audit: type=1400 audit(134224260.165:1778): avc: denied { create } for pid=27791 comm="syz.1.6700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6276.405341][T27792] syzkaller1: entered promiscuous mode [ 6276.405561][ T31] audit: type=1400 audit(134224260.295:1779): avc: denied { ioctl } for pid=27791 comm="syz.1.6700" path="socket:[75153]" dev="sockfs" ino=75153 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6276.418636][T27792] syzkaller1: entered allmulticast mode [ 6276.755582][ T31] audit: type=1400 audit(134224260.645:1780): avc: denied { write } for pid=27797 comm="syz.1.6701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6278.161721][ T31] audit: type=1400 audit(134224262.055:1781): avc: denied { create } for pid=27807 comm="syz.1.6706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6278.170969][ T31] audit: type=1326 audit(134224262.065:1782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27807 comm="syz.1.6706" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6278.172049][ T31] audit: type=1326 audit(134224262.065:1783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27807 comm="syz.1.6706" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6278.179738][ T31] audit: type=1326 audit(134224262.065:1784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27807 comm="syz.1.6706" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6278.180133][ T31] audit: type=1326 audit(134224262.075:1785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27807 comm="syz.1.6706" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6278.181540][ T31] audit: type=1326 audit(134224262.075:1786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27807 comm="syz.1.6706" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6278.630657][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 6278.631038][ T31] audit: type=1400 audit(134224262.525:1793): avc: denied { name_bind } for pid=27809 comm="syz.1.6707" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 6278.634717][ T31] audit: type=1400 audit(134224262.525:1794): avc: denied { node_bind } for pid=27809 comm="syz.1.6707" saddr=::1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 6281.328557][ T31] audit: type=1326 audit(134224265.215:1795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27829 comm="syz.1.6715" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6281.329033][ T31] audit: type=1326 audit(134224265.215:1796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27829 comm="syz.1.6715" exe="/syz-executor" sig=0 arch=40000028 syscall=225 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6281.329278][ T31] audit: type=1326 audit(134224265.215:1797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27829 comm="syz.1.6715" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6282.275645][T27841] netlink: 64 bytes leftover after parsing attributes in process `syz.1.6720'. [ 6282.279032][ T31] audit: type=1400 audit(134224266.175:1798): avc: denied { create } for pid=27840 comm="syz.1.6720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6282.290605][ T31] audit: type=1400 audit(134224266.185:1799): avc: denied { write } for pid=27840 comm="syz.1.6720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6282.903108][T27846] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6720'. [ 6282.914362][T27846] netlink: 32 bytes leftover after parsing attributes in process `syz.1.6720'. [ 6283.129087][ T31] audit: type=1326 audit(134224266.915:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27840 comm="syz.1.6720" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6283.129620][ T31] audit: type=1326 audit(134224266.915:1801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27840 comm="syz.1.6720" exe="/syz-executor" sig=0 arch=40000028 syscall=38 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6283.129898][ T31] audit: type=1326 audit(134224266.915:1802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27840 comm="syz.1.6720" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6284.718437][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 6284.720446][ T31] audit: type=1400 audit(134224268.605:1806): avc: denied { ioctl } for pid=27858 comm="syz.0.6724" path="socket:[76298]" dev="sockfs" ino=76298 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6284.831431][ T31] audit: type=1400 audit(134224268.725:1807): avc: denied { bind } for pid=27858 comm="syz.0.6724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6284.836129][ T31] audit: type=1400 audit(134224268.725:1808): avc: denied { write } for pid=27858 comm="syz.0.6724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6286.186138][ T31] audit: type=1400 audit(134224270.075:1809): avc: denied { read } for pid=27876 comm="syz.1.6731" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 6286.187590][ T31] audit: type=1400 audit(134224270.075:1810): avc: denied { open } for pid=27876 comm="syz.1.6731" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 6288.611624][ T31] audit: type=1400 audit(134224272.505:1811): avc: denied { ioctl } for pid=27879 comm="syz.0.6732" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 6288.612081][ T31] audit: type=1400 audit(134224272.505:1812): avc: denied { set_context_mgr } for pid=27879 comm="syz.0.6732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 6289.040207][ T31] audit: type=1400 audit(134224272.935:1813): avc: denied { write } for pid=27879 comm="syz.0.6732" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 6289.043448][ T31] audit: type=1400 audit(134224272.935:1814): avc: denied { map } for pid=27879 comm="syz.0.6732" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 6289.056405][ T31] audit: type=1400 audit(134224272.945:1815): avc: denied { call } for pid=27879 comm="syz.0.6732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 6289.575376][T27649] usb 1-1: new high-speed USB device number 105 using dummy_hcd [ 6289.777186][T27649] usb 1-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 6289.788313][T27649] usb 1-1: config 1 has an invalid descriptor of length 55, skipping remainder of the config [ 6289.788415][T27649] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 6289.788565][T27649] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 55, changing to 9 [ 6289.788649][T27649] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 8496, setting to 1024 [ 6289.799136][T27649] usb 1-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 6289.800719][T27649] usb 1-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 6289.800813][T27649] usb 1-1: Product: syz [ 6289.800871][T27649] usb 1-1: Manufacturer: syz [ 6289.969133][T27649] cdc_wdm 1-1:1.0: skipping garbage [ 6289.969485][T27649] cdc_wdm 1-1:1.0: skipping garbage [ 6289.983870][T27649] cdc_wdm 1-1:1.0: cdc-wdm0: USB WDM device [ 6290.184007][T27575] usb 1-1: USB disconnect, device number 105 [ 6293.875525][T27907] block device autoloading is deprecated and will be removed. [ 6296.151942][T27914] bond0: (slave bond_slave_0): Releasing backup interface [ 6296.190333][T27914] bond0: (slave bond_slave_1): Releasing backup interface [ 6296.554804][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 6296.555997][ T31] audit: type=1400 audit(134224280.445:1817): avc: denied { write } for pid=27915 comm="syz.1.6737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6297.630859][ T31] audit: type=1400 audit(134224281.525:1818): avc: denied { sqpoll } for pid=27921 comm="syz.1.6739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6298.121222][ T31] audit: type=1400 audit(134224281.995:1819): avc: denied { mounton } for pid=27924 comm="syz.1.6740" path="/91/file0" dev="tmpfs" ino=481 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 6298.127408][ T31] audit: type=1400 audit(134224282.015:1820): avc: denied { mount } for pid=27924 comm="syz.1.6740" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6305.053660][T27938] netlink: 44 bytes leftover after parsing attributes in process `syz.0.6745'. [ 6309.562328][ T31] audit: type=1400 audit(134224293.455:1821): avc: denied { unmount } for pid=26943 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6312.970907][ T31] audit: type=1400 audit(134224296.865:1822): avc: denied { create } for pid=27958 comm="syz.0.6751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 6312.975305][ T31] audit: type=1400 audit(134224296.865:1823): avc: denied { setopt } for pid=27958 comm="syz.0.6751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 6313.072256][ T31] audit: type=1400 audit(134224296.965:1824): avc: denied { bind } for pid=27958 comm="syz.0.6751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 6315.440405][T27968] comedi: valid board names for 8255 driver are: [ 6315.440796][T27968] 8255 [ 6315.440982][T27968] comedi: valid board names for vmk80xx driver are: [ 6315.441079][T27968] vmk80xx [ 6315.441148][T27968] comedi: valid board names for usbduxsigma driver are: [ 6315.441235][T27968] usbduxsigma [ 6315.441295][T27968] comedi: valid board names for usbduxfast driver are: [ 6315.441344][T27968] usbduxfast [ 6315.441386][T27968] comedi: valid board names for usbdux driver are: [ 6315.441458][T27968] usbdux [ 6315.441505][T27968] comedi: valid board names for ni6501 driver are: [ 6315.441566][T27968] ni6501 [ 6315.441616][T27968] comedi: valid board names for dt9812 driver are: [ 6315.441664][T27968] dt9812 [ 6315.441709][T27968] comedi: valid board names for ni_labpc_cs driver are: [ 6315.441754][T27968] ni_labpc_cs [ 6315.441799][T27968] comedi: valid board names for ni_daq_700 driver are: [ 6315.441875][T27968] ni_daq_700 [ 6315.441924][T27968] comedi: valid board names for labpc_pci driver are: [ 6315.442016][T27968] labpc_pci [ 6315.442065][T27968] comedi: valid board names for adl_pci9118 driver are: [ 6315.442112][T27968] pci9118dg [ 6315.442155][T27968] pci9118hg [ 6315.442209][T27968] pci9118hr [ 6315.442255][T27968] comedi: valid board names for 8255_pci driver are: [ 6315.442321][T27968] 8255_pci [ 6315.442471][T27968] comedi: valid board names for comedi_parport driver are: [ 6315.442517][T27968] comedi_parport [ 6315.442560][T27968] comedi: valid board names for comedi_test driver are: [ 6315.442604][T27968] comedi_test [ 6315.442712][T27968] comedi: valid board names for comedi_bond driver are: [ 6315.442766][T27968] comedi_bond [ 6319.171023][ T31] audit: type=1400 audit(134224303.055:1825): avc: denied { recv } for pid=27952 comm="syz.1.6750" saddr=fe80::2 daddr=ff02::1 netif=eth0 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6319.634138][ T31] audit: type=1400 audit(134224303.525:1826): avc: denied { write } for pid=27976 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6319.634559][ T31] audit: type=1400 audit(134224303.525:1827): avc: denied { open } for pid=27976 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6319.798441][ T31] audit: type=1400 audit(134224303.685:1828): avc: denied { search } for pid=27976 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6319.798912][ T31] audit: type=1400 audit(134224303.685:1829): avc: denied { search } for pid=27976 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6319.799200][ T31] audit: type=1400 audit(134224303.685:1830): avc: denied { search } for pid=27976 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6319.799323][ T31] audit: type=1400 audit(134224303.685:1831): avc: denied { search } for pid=27976 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6319.853629][ T31] audit: type=1400 audit(134224303.745:1832): avc: denied { read open } for pid=27978 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6319.856081][ T31] audit: type=1400 audit(134224303.745:1833): avc: denied { create } for pid=27977 comm="syz.0.6759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6319.890557][ T31] audit: type=1400 audit(134224303.785:1834): avc: denied { getattr } for pid=27978 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6332.774077][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 6332.774428][ T31] audit: type=1400 audit(134224316.665:1849): avc: denied { create } for pid=28018 comm="syz.1.6771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6337.185304][ T31] audit: type=1400 audit(134224321.075:1850): avc: denied { create } for pid=28027 comm="syz.0.6773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 6338.129324][T27649] usb 2-1: new high-speed USB device number 108 using dummy_hcd [ 6338.282889][T27649] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 6338.283151][T27649] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 6338.283199][T27649] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 6338.283236][T27649] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 6338.283293][T27649] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.00 [ 6338.283326][T27649] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6338.285861][T27649] usb 2-1: config 0 descriptor?? [ 6338.703636][T27649] keytouch 0003:0926:3333.0023: fixing up Keytouch IEC report descriptor [ 6338.706579][T27649] input: HID 0926:3333 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0926:3333.0023/input/input30 [ 6338.771408][T27649] keytouch 0003:0926:3333.0023: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.1-1/input0 [ 6338.911977][T23414] usb 2-1: USB disconnect, device number 108 [ 6339.014479][ T31] audit: type=1400 audit(134224322.905:1851): avc: denied { connect } for pid=28071 comm="syz.1.6775" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6339.073520][T28072] *** NOT YET: opcode db *** [ 6339.786657][ T31] audit: type=1400 audit(134224323.665:1852): avc: denied { mounton } for pid=28027 comm="syz.0.6773" path="/syzcgroup/unified/syz0" dev="cgroup2" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 6339.797369][T28077] ubi31: attaching mtd0 [ 6339.840061][T28077] ubi31: scanning is finished [ 6339.841995][T28077] ubi31 error: ubi_read_volume_table: the layout volume was not found [ 6339.879514][T28077] ubi31 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 6339.887587][ T31] audit: type=1400 audit(134224323.775:1853): avc: denied { kexec_image_load } for pid=28027 comm="syz.0.6773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 6340.346087][ T31] audit: type=1326 audit(134224324.235:1854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28078 comm="syz.1.6778" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6340.346571][ T31] audit: type=1326 audit(134224324.235:1855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28078 comm="syz.1.6778" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6340.346821][ T31] audit: type=1326 audit(134224324.235:1856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28078 comm="syz.1.6778" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6340.346917][ T31] audit: type=1326 audit(134224324.235:1857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28078 comm="syz.1.6778" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6340.349392][ T31] audit: type=1326 audit(134224324.235:1858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28078 comm="syz.1.6778" exe="/syz-executor" sig=0 arch=40000028 syscall=365 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6340.350812][ T31] audit: type=1326 audit(134224324.245:1859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28078 comm="syz.1.6778" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6340.353857][ T31] audit: type=1326 audit(134224324.245:1860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28078 comm="syz.1.6778" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6352.028299][T23414] usb 2-1: new high-speed USB device number 109 using dummy_hcd [ 6352.178411][T23414] usb 2-1: Using ep0 maxpacket: 16 [ 6352.197987][T23414] usb 2-1: config 0 has an invalid interface number: 8 but max is 0 [ 6352.198427][T23414] usb 2-1: config 0 has no interface number 0 [ 6352.198669][T23414] usb 2-1: config 0 interface 8 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 6352.198880][T23414] usb 2-1: config 0 interface 8 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 6352.225677][T23414] usb 2-1: New USB device found, idVendor=0d8c, idProduct=000e, bcdDevice=8e.8f [ 6352.226098][T23414] usb 2-1: New USB device strings: Mfr=0, Product=24, SerialNumber=3 [ 6352.226311][T23414] usb 2-1: Product: syz [ 6352.226509][T23414] usb 2-1: SerialNumber: syz [ 6352.233050][T23414] usb 2-1: config 0 descriptor?? [ 6352.261474][T23414] cm109 2-1:0.8: invalid payload size 0, expected 4 [ 6352.269851][T23414] input: CM109 USB driver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.8/input/input31 [ 6352.476988][ C0] cm109 2-1:0.8: cm109_urb_ctl_callback: urb status -71 [ 6352.478282][ C0] cm109 2-1:0.8: cm109_urb_ctl_callback: urb status -71 [ 6352.478802][ C0] cm109 2-1:0.8: cm109_urb_ctl_callback: urb status -71 [ 6352.478874][T27684] usb 2-1: USB disconnect, device number 109 [ 6352.478985][ C0] cm109 2-1:0.8: cm109_submit_buzz_toggle: usb_submit_urb (urb_ctl) failed -19 [ 6352.480445][T27684] cm109 2-1:0.8: cm109_toggle_buzzer_sync: usb_control_msg() failed -19 [ 6353.636303][T28141] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6795'. [ 6354.890360][ T31] kauditd_printk_skb: 621 callbacks suppressed [ 6354.890709][ T31] audit: type=1400 audit(134224338.785:2482): avc: denied { write } for pid=28148 comm="syz.1.6798" path="socket:[76671]" dev="sockfs" ino=76671 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6355.806654][ T31] audit: type=1400 audit(134224339.665:2483): avc: denied { mounton } for pid=28152 comm="syz.1.6800" path="/132/file0" dev="tmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6355.807030][ T31] audit: type=1400 audit(134224339.695:2484): avc: denied { mount } for pid=28152 comm="syz.1.6800" name="/" dev="configfs" ino=1104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 6358.079821][ T31] audit: type=1400 audit(134224341.975:2485): avc: denied { ioctl } for pid=28155 comm="syz.0.6801" path="socket:[76681]" dev="sockfs" ino=76681 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6358.081056][T28156] syzkaller0: entered promiscuous mode [ 6358.081256][T28156] syzkaller0: entered allmulticast mode [ 6363.487611][ T31] audit: type=1400 audit(134224347.375:2486): avc: denied { read } for pid=28175 comm="syz.0.6806" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 6363.489172][ T31] audit: type=1400 audit(134224347.385:2487): avc: denied { open } for pid=28175 comm="syz.0.6806" path="/112/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 6364.012411][T28185] input: syz0 as /devices/virtual/input/input32 [ 6364.036298][ T31] audit: type=1400 audit(134224347.925:2488): avc: denied { unmount } for pid=26943 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 6364.250527][ T31] audit: type=1400 audit(134224348.145:2489): avc: denied { setopt } for pid=28196 comm="syz.1.6811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6364.257077][ T31] audit: type=1400 audit(134224348.145:2490): avc: denied { name_bind } for pid=28195 comm="syz.0.6812" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 6364.264597][T28197] lo: entered allmulticast mode [ 6365.491381][ T31] audit: type=1326 audit(134224349.385:2491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28207 comm="syz.1.6815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6365.491890][ T31] audit: type=1326 audit(134224349.385:2492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28207 comm="syz.1.6815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6365.504841][ T31] audit: type=1326 audit(134224349.395:2493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28207 comm="syz.1.6815" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6365.518359][ T31] audit: type=1326 audit(134224349.405:2494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28207 comm="syz.1.6815" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6365.534799][ T31] audit: type=1326 audit(134224349.425:2495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28207 comm="syz.1.6815" exe="/syz-executor" sig=0 arch=40000028 syscall=365 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6367.438686][T23414] usb 1-1: new high-speed USB device number 106 using dummy_hcd [ 6367.641994][T23414] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 6367.642456][T23414] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 6367.642675][T23414] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 6367.642962][T23414] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 6367.643200][T23414] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6367.657168][T23414] usb 1-1: config 0 descriptor?? [ 6368.078552][T27649] usb 2-1: new high-speed USB device number 110 using dummy_hcd [ 6368.105761][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.107035][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.107687][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.108683][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.109321][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.109916][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.110763][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.112120][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.112974][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.113667][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.114399][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.115064][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.115614][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.118405][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.119138][T23414] plantronics 0003:047F:FFFF.0024: unknown main item tag 0x0 [ 6368.280546][T23414] plantronics 0003:047F:FFFF.0024: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 6368.388392][T27649] usb 2-1: Using ep0 maxpacket: 32 [ 6368.405990][T27649] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 6368.427207][T27649] usb 2-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 6368.428038][T27649] usb 2-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 6368.428263][T27649] usb 2-1: Product: syz [ 6368.428338][T27649] usb 2-1: Manufacturer: syz [ 6368.428394][T27649] usb 2-1: SerialNumber: syz [ 6368.478437][T27649] usb 2-1: config 0 descriptor?? [ 6368.481357][T28229] raw-gadget.1 gadget.1: fail, usb_ep_enable returned -22 [ 6368.533089][T23414] usb 1-1: USB disconnect, device number 106 [ 6368.719552][ T31] kauditd_printk_skb: 464 callbacks suppressed [ 6368.720168][ T31] audit: type=1400 audit(134224352.605:2960): avc: denied { create } for pid=28255 comm="syz.0.6822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6368.722933][ T31] audit: type=1400 audit(134224352.615:2961): avc: denied { bind } for pid=28255 comm="syz.0.6822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6370.918643][T27567] usb 1-1: new high-speed USB device number 107 using dummy_hcd [ 6371.088425][T27567] usb 1-1: Using ep0 maxpacket: 8 [ 6371.098384][T27567] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 6371.098700][T27567] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 6371.098916][T27567] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 6371.099164][T27567] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 6371.099389][T27567] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 6371.099517][T27567] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 6371.099594][T27567] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6371.333343][T27567] usb 1-1: usb_control_msg returned -32 [ 6371.333710][T27567] usbtmc 1-1:16.0: can't read capabilities [ 6383.384370][T27655] usb 2-1: USB disconnect, device number 110 [ 6384.194316][ T31] audit: type=1326 audit(134224368.085:2962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28284 comm="syz.1.6825" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6384.195557][ T31] audit: type=1326 audit(134224368.085:2963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28284 comm="syz.1.6825" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6384.199001][ T31] audit: type=1326 audit(134224368.085:2964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28284 comm="syz.1.6825" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6384.199575][ T31] audit: type=1326 audit(134224368.095:2965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28284 comm="syz.1.6825" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6384.201012][ T31] audit: type=1326 audit(134224368.095:2966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28284 comm="syz.1.6825" exe="/syz-executor" sig=0 arch=40000028 syscall=365 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6384.201558][ T31] audit: type=1326 audit(134224368.095:2967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28284 comm="syz.1.6825" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6384.202190][ T31] audit: type=1326 audit(134224368.095:2968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28284 comm="syz.1.6825" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6384.203469][ T31] audit: type=1326 audit(134224368.095:2969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28284 comm="syz.1.6825" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6384.204194][ T31] audit: type=1326 audit(134224368.095:2970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28284 comm="syz.1.6825" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6384.204828][ T31] audit: type=1326 audit(134224368.095:2971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28284 comm="syz.1.6825" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6385.729700][T27608] usb 1-1: USB disconnect, device number 107 [ 6389.201419][ T31] kauditd_printk_skb: 699 callbacks suppressed [ 6389.201788][ T31] audit: type=1326 audit(134224373.095:3671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28295 comm="syz.0.6826" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127dbc code=0x7ffc0000 [ 6389.202093][ T31] audit: type=1326 audit(134224373.095:3672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28295 comm="syz.0.6826" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef208 code=0x7ffc0000 [ 6389.202190][ T31] audit: type=1326 audit(134224373.095:3673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28295 comm="syz.0.6826" exe="/syz-executor" sig=0 arch=40000028 syscall=145 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6389.212577][ T31] audit: type=1326 audit(134224373.105:3674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28295 comm="syz.0.6826" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127dbc code=0x7ffc0000 [ 6389.218983][ T31] audit: type=1326 audit(134224373.105:3675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28295 comm="syz.0.6826" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef208 code=0x7ffc0000 [ 6389.219184][ T31] audit: type=1326 audit(134224373.115:3676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28295 comm="syz.0.6826" exe="/syz-executor" sig=0 arch=40000028 syscall=145 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6389.221177][ T31] audit: type=1326 audit(134224373.115:3677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28295 comm="syz.0.6826" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127dbc code=0x7ffc0000 [ 6389.221369][ T31] audit: type=1326 audit(134224373.115:3678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28295 comm="syz.0.6826" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef208 code=0x7ffc0000 [ 6389.222036][ T31] audit: type=1326 audit(134224373.115:3679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28295 comm="syz.0.6826" exe="/syz-executor" sig=0 arch=40000028 syscall=145 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6389.235783][ T31] audit: type=1326 audit(134224373.125:3680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28295 comm="syz.0.6826" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127dbc code=0x7ffc0000 [ 6404.343210][ T31] kauditd_printk_skb: 130 callbacks suppressed [ 6404.343592][ T31] audit: type=1400 audit(134224388.235:3811): avc: denied { read } for pid=28324 comm="syz.0.6834" dev="nsfs" ino=4026532646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6404.343957][ T31] audit: type=1400 audit(134224388.235:3812): avc: denied { open } for pid=28324 comm="syz.0.6834" path="net:[4026532646]" dev="nsfs" ino=4026532646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6404.358719][ T31] audit: type=1400 audit(134224388.235:3813): avc: denied { create } for pid=28324 comm="syz.0.6834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 6407.885026][ T31] audit: type=1326 audit(134224391.775:3814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28324 comm="syz.0.6834" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6407.886646][ T31] audit: type=1326 audit(134224391.775:3815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28324 comm="syz.0.6834" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6408.510772][ T31] audit: type=1326 audit(134224392.405:3816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28324 comm="syz.0.6834" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6408.514094][ T31] audit: type=1326 audit(134224392.405:3817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28324 comm="syz.0.6834" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6408.514461][ T31] audit: type=1326 audit(134224392.405:3818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28324 comm="syz.0.6834" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6408.521413][ T31] audit: type=1326 audit(134224392.415:3819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28324 comm="syz.0.6834" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6408.522046][ T31] audit: type=1326 audit(134224392.415:3820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28324 comm="syz.0.6834" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6426.281886][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 6426.282479][ T31] audit: type=1400 audit(134224410.175:3850): avc: denied { connect } for pid=28352 comm="syz.0.6836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6426.787194][ T31] audit: type=1400 audit(134224410.675:3851): avc: denied { write } for pid=28352 comm="syz.0.6836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6433.279591][T27649] usb 2-1: new high-speed USB device number 111 using dummy_hcd [ 6433.428780][T27649] usb 2-1: Using ep0 maxpacket: 8 [ 6433.445285][T27649] usb 2-1: config 0 interface 0 has no altsetting 0 [ 6433.445687][T27649] usb 2-1: New USB device found, idVendor=04d8, idProduct=00dd, bcdDevice= 0.00 [ 6433.445923][T27649] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6433.451350][T27649] usb 2-1: config 0 descriptor?? [ 6433.959969][T27649] mcp2221 0003:04D8:00DD.0025: USB HID vff.ff Device [HID 04d8:00dd] on usb-dummy_hcd.1-1/input0 [ 6434.136821][T28387] i2c i2c-0: died at extended address code [ 6434.188507][T27571] usb 2-1: USB disconnect, device number 111 [ 6434.978945][T27571] usb 2-1: new high-speed USB device number 112 using dummy_hcd [ 6435.138730][T27571] usb 2-1: Using ep0 maxpacket: 8 [ 6435.150875][T27571] usb 2-1: config 1 interface 0 altsetting 16 bulk endpoint 0x1 has invalid maxpacket 64 [ 6435.152472][T27571] usb 2-1: config 1 interface 0 has no altsetting 0 [ 6435.165798][T27571] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 6435.168895][T27571] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6435.169836][T27571] usb 2-1: Product: syz [ 6435.170534][T27571] usb 2-1: Manufacturer: syz [ 6435.171207][T27571] usb 2-1: SerialNumber: syz [ 6435.186586][T28427] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 6435.806923][T27571] usb 2-1: USB disconnect, device number 112 [ 6436.210043][T27571] usb 2-1: new high-speed USB device number 113 using dummy_hcd [ 6436.389087][T27571] usb 2-1: Using ep0 maxpacket: 32 [ 6436.404352][T27571] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 6436.427112][T27571] usb 2-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 6436.429545][T27571] usb 2-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 6436.431395][T27571] usb 2-1: Product: syz [ 6436.432280][T27571] usb 2-1: Manufacturer: syz [ 6436.433190][T27571] usb 2-1: SerialNumber: syz [ 6436.437451][T27571] usb 2-1: config 0 descriptor?? [ 6436.446741][T28466] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 6436.510070][T27571] usb 2-1: can't set config #0, error -71 [ 6436.526410][T27571] usb 2-1: USB disconnect, device number 113 [ 6437.060169][T27571] usb 2-1: new high-speed USB device number 114 using dummy_hcd [ 6437.219379][T27571] usb 2-1: Using ep0 maxpacket: 8 [ 6437.235421][T27571] usb 2-1: too many endpoints for config 0 interface 0 altsetting 250: 255, using maximum allowed: 30 [ 6437.240397][T27571] usb 2-1: config 0 interface 0 altsetting 250 has 1 endpoint descriptor, different from the interface descriptor's value: 255 [ 6437.241716][T27571] usb 2-1: config 0 interface 0 has no altsetting 0 [ 6437.243031][T27571] usb 2-1: New USB device found, idVendor=04d8, idProduct=00df, bcdDevice= 0.00 [ 6437.245044][T27571] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6437.250565][T27571] usb 2-1: config 0 descriptor?? [ 6437.677052][T27571] mcp2200 0003:04D8:00DF.0026: unknown main item tag 0x0 [ 6437.679732][T27571] mcp2200 0003:04D8:00DF.0026: unknown main item tag 0x0 [ 6437.681185][T27571] mcp2200 0003:04D8:00DF.0026: unknown main item tag 0x0 [ 6437.683780][T27571] mcp2200 0003:04D8:00DF.0026: USB HID vff.ff Device [HID 04d8:00df] on usb-dummy_hcd.1-1/input0 [ 6437.882598][T27649] usb 2-1: USB disconnect, device number 114 [ 6438.978729][ T31] audit: type=1400 audit(134224422.805:3852): avc: denied { create } for pid=28528 comm="syz.0.6866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6441.922383][T28552] netlink: 'syz.0.6870': attribute type 10 has an invalid length. [ 6442.014706][T28552] bond_slave_0: entered promiscuous mode [ 6442.014998][T28552] bond_slave_1: entered promiscuous mode [ 6442.017317][T28552] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 6442.022140][T28552] bond1: (slave macvlan2): Enslaving as a backup interface with an up link [ 6448.498838][ T31] audit: type=1400 audit(134224432.385:3853): avc: denied { create } for pid=28618 comm="syz.0.6883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 6452.806702][ T31] audit: type=1400 audit(134224436.695:3854): avc: denied { read } for pid=28665 comm="syz.1.6902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6455.559874][ T31] audit: type=1400 audit(134224439.455:3855): avc: denied { accept } for pid=28678 comm="syz.1.6908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6457.352599][ T31] audit: type=1400 audit(134224441.245:3856): avc: denied { getopt } for pid=28694 comm="syz.1.6914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6463.850384][T28763] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6943'. [ 6463.885111][T28763] hsr_slave_0 (unregistering): left promiscuous mode [ 6499.399062][ T31] audit: type=1400 audit(134224483.285:3857): avc: denied { create } for pid=28832 comm="syz.1.6966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 6499.496160][ T31] audit: type=1400 audit(134224483.385:3858): avc: denied { ioctl } for pid=28835 comm="syz.1.6967" path="socket:[77476]" dev="sockfs" ino=77476 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6499.502645][ T31] audit: type=1400 audit(134224483.395:3859): avc: denied { bind } for pid=28835 comm="syz.1.6967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6499.504478][ T31] audit: type=1400 audit(134224483.395:3860): avc: denied { setopt } for pid=28835 comm="syz.1.6967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6499.506317][ T31] audit: type=1400 audit(134224483.395:3861): avc: denied { connect } for pid=28835 comm="syz.1.6967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6499.508770][ T31] audit: type=1400 audit(134224483.405:3862): avc: denied { write } for pid=28835 comm="syz.1.6967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6500.639134][T27616] usb 2-1: new high-speed USB device number 115 using dummy_hcd [ 6500.818541][T27616] usb 2-1: config 36 interface 0 altsetting 0 has an endpoint descriptor with address 0xEC, changing to 0x8C [ 6500.818924][T27616] usb 2-1: config 36 interface 0 altsetting 0 endpoint 0x8C has invalid wMaxPacketSize 0 [ 6500.838333][T27616] usb 2-1: New USB device found, idVendor=6993, idProduct=b001, bcdDevice=26.29 [ 6500.838720][T27616] usb 2-1: New USB device strings: Mfr=244, Product=0, SerialNumber=16 [ 6500.838936][T27616] usb 2-1: Manufacturer: syz [ 6500.839062][T27616] usb 2-1: SerialNumber: syz [ 6501.095516][T27616] usbhid 2-1:36.0: couldn't find an input interrupt endpoint [ 6501.110053][T27616] usb 2-1: USB disconnect, device number 115 [ 6501.809868][T27616] usb 2-1: new high-speed USB device number 116 using dummy_hcd [ 6502.011052][T27616] usb 2-1: config 0 has an invalid interface number: 8 but max is 0 [ 6502.011398][T27616] usb 2-1: config 0 has an invalid interface descriptor of length 2, skipping [ 6502.011564][T27616] usb 2-1: config 0 has no interface number 0 [ 6502.012492][T27616] usb 2-1: config 0 interface 8 altsetting 3 bulk endpoint 0xC has invalid maxpacket 64 [ 6502.012648][T27616] usb 2-1: config 0 interface 8 altsetting 3 endpoint 0xD has invalid maxpacket 512, setting to 64 [ 6502.012738][T27616] usb 2-1: config 0 interface 8 altsetting 3 endpoint 0x4 has invalid maxpacket 512, setting to 64 [ 6502.012810][T27616] usb 2-1: config 0 interface 8 altsetting 3 endpoint 0x7 has invalid maxpacket 512, setting to 64 [ 6502.012900][T27616] usb 2-1: config 0 interface 8 altsetting 3 has a duplicate endpoint with address 0xD, skipping [ 6502.012977][T27616] usb 2-1: config 0 interface 8 altsetting 3 has a duplicate endpoint with address 0x7, skipping [ 6502.013049][T27616] usb 2-1: config 0 interface 8 altsetting 3 has 7 endpoint descriptors, different from the interface descriptor's value: 10 [ 6502.013199][T27616] usb 2-1: config 0 interface 8 has no altsetting 0 [ 6502.052087][T27616] usb 2-1: New USB device found, idVendor=0ab4, idProduct=0014, bcdDevice=17.d6 [ 6502.052467][T27616] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6502.052697][T27616] usb 2-1: Product: syz [ 6502.052973][T27616] usb 2-1: Manufacturer: syz [ 6502.053078][T27616] usb 2-1: SerialNumber: syz [ 6502.060216][T27616] usb 2-1: config 0 descriptor?? [ 6502.065294][T28856] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 6502.077348][T27616] esd_usb 2-1:0.8: sending version message failed [ 6502.079910][T27616] esd_usb 2-1:0.8: probe with driver esd_usb failed with error -22 [ 6502.295462][T27616] usb 2-1: USB disconnect, device number 116 [ 6502.398860][T28870] netlink: 4580 bytes leftover after parsing attributes in process `syz.1.6972'. [ 6502.715243][ T31] audit: type=1326 audit(134224486.605:3863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28874 comm="syz.1.6974" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6502.733267][ T31] audit: type=1326 audit(134224486.625:3864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28874 comm="syz.1.6974" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6502.740572][ T31] audit: type=1326 audit(134224486.635:3865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28874 comm="syz.1.6974" exe="/syz-executor" sig=0 arch=40000028 syscall=360 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6502.741535][ T31] audit: type=1326 audit(134224486.635:3866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28874 comm="syz.1.6974" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 6519.397499][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 6519.398487][ T31] audit: type=1400 audit(134224503.285:3871): avc: denied { module_load } for pid=28903 comm="syz.1.6984" path="/sys/kernel/address_bits" dev="sysfs" ino=742 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 6520.154286][T27711] usb 2-1: new high-speed USB device number 117 using dummy_hcd [ 6520.318635][T27711] usb 2-1: Using ep0 maxpacket: 16 [ 6520.331944][T27711] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x84 has invalid wMaxPacketSize 0 [ 6520.348125][T27711] usb 2-1: New USB device found, idVendor=2040, idProduct=0264, bcdDevice=4e.d1 [ 6520.348406][T27711] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6520.348534][T27711] usb 2-1: Product: syz [ 6520.348675][T27711] usb 2-1: Manufacturer: syz [ 6520.348784][T27711] usb 2-1: SerialNumber: syz [ 6520.356046][T27711] usb 2-1: config 0 descriptor?? [ 6524.121143][T27616] usb 1-1: new high-speed USB device number 108 using dummy_hcd [ 6524.404939][T27616] usb 1-1: Using ep0 maxpacket: 32 [ 6524.617778][T27616] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 6524.618347][T27616] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 6524.618616][T27616] usb 1-1: New USB device found, idVendor=04f2, idProduct=1236, bcdDevice= 0.00 [ 6524.618698][T27616] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6524.624927][T27616] usb 1-1: config 0 descriptor?? [ 6525.180519][T27616] chicony 0003:04F2:1236.0027: hidraw0: USB HID v0.00 Device [HID 04f2:1236] on usb-dummy_hcd.0-1/input0 [ 6525.280598][T27571] usb 1-1: USB disconnect, device number 108 [ 6530.606729][T27608] usb 2-1: USB disconnect, device number 117 [ 6539.601139][T29102] CUSE: info not properly terminated [ 6541.639382][ T31] audit: type=1400 audit(134224525.535:3872): avc: denied { read } for pid=29105 comm="syz.1.7000" path="socket:[78529]" dev="sockfs" ino=78529 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6542.068870][T27711] usb 2-1: new high-speed USB device number 118 using dummy_hcd [ 6542.228575][T27711] usb 2-1: Using ep0 maxpacket: 8 [ 6542.246676][T27711] usb 2-1: unable to get BOS descriptor or descriptor too short [ 6542.260312][T27711] usb 2-1: config 7 has an invalid interface number: 67 but max is 0 [ 6542.260731][T27711] usb 2-1: config 7 has no interface number 0 [ 6542.274975][T27711] usb 2-1: New USB device found, idVendor=16c0, idProduct=05df, bcdDevice=6b.16 [ 6542.275295][T27711] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6542.275496][T27711] usb 2-1: Product: syz [ 6542.275689][T27711] usb 2-1: Manufacturer: syz [ 6542.275756][T27711] usb 2-1: SerialNumber: syz [ 6542.549235][T27711] usb 2-1: USB disconnect, device number 118 [ 6547.961053][T29130] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 6558.718951][T27667] usb 1-1: new high-speed USB device number 109 using dummy_hcd [ 6558.898725][T27667] usb 1-1: Using ep0 maxpacket: 16 [ 6558.922846][T27667] usb 1-1: config 1 has an invalid interface number: 105 but max is 0 [ 6558.928958][T27667] usb 1-1: config 1 has no interface number 0 [ 6558.929867][T27667] usb 1-1: config 1 interface 105 altsetting 2 bulk endpoint 0x4 has invalid maxpacket 16 [ 6558.931131][T27667] usb 1-1: config 1 interface 105 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 64 [ 6558.932135][T29176] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7013'. [ 6558.933126][T27667] usb 1-1: config 1 interface 105 has no altsetting 0 [ 6558.944607][T27667] usb 1-1: New USB device found, idVendor=20f4, idProduct=e05a, bcdDevice=6c.6d [ 6558.946240][T27667] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6558.947229][T27667] usb 1-1: Product: syz [ 6558.949544][T27667] usb 1-1: Manufacturer: syz [ 6558.957448][T27667] usb 1-1: SerialNumber: syz [ 6559.029735][T29172] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 6559.030590][T29172] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 6559.396796][T27667] aqc111 1-1:1.105: probe with driver aqc111 failed with error -71 [ 6559.417098][T27667] usb 1-1: USB disconnect, device number 109 [ 6563.091682][ T31] audit: type=1400 audit(134224546.985:3873): avc: denied { mount } for pid=29190 comm="syz.0.7019" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 6563.112928][ T31] audit: type=1400 audit(134224547.005:3874): avc: denied { remount } for pid=29190 comm="syz.0.7019" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 6563.158550][ T31] audit: type=1400 audit(134224547.045:3875): avc: denied { unmount } for pid=26446 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 6572.718653][T27567] usb 2-1: new high-speed USB device number 119 using dummy_hcd [ 6572.868673][T27567] usb 2-1: Using ep0 maxpacket: 16 [ 6572.878752][T27567] usb 2-1: config 0 has an invalid interface number: 1 but max is 0 [ 6572.879086][T27567] usb 2-1: config 0 has no interface number 0 [ 6572.894282][T27567] usb 2-1: New USB device found, idVendor=04fc, idProduct=1528, bcdDevice=6d.5d [ 6572.894586][T27567] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6572.894791][T27567] usb 2-1: Product: syz [ 6572.894861][T27567] usb 2-1: Manufacturer: syz [ 6572.894918][T27567] usb 2-1: SerialNumber: syz [ 6572.899372][T27567] usb 2-1: config 0 descriptor?? [ 6574.773755][ T31] audit: type=1400 audit(134224558.665:3876): avc: denied { ioctl } for pid=29212 comm="syz.0.7025" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=78685 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6575.035397][T29213] ------------[ cut here ]------------ [ 6575.036226][T29213] WARNING: CPU: 1 PID: 29213 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 6575.040623][T29213] Modules linked in: [ 6575.041614][T29213] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 6575.042272][T29213] CPU: 1 UID: 0 PID: 29213 Comm: syz.0.7025 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 6575.043039][T29213] Hardware name: ARM-Versatile Express [ 6575.043579][T29213] Call trace: [ 6575.043767][T29213] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 6575.044387][T29213] r7:00000000 r6:8282083c r5:00000000 r4:8225b4f4 [ 6575.044687][T29213] [<80201ae4>] (show_stack) from [<8021fdf4>] (dump_stack_lvl+0x54/0x7c) [ 6575.045085][T29213] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 6575.045517][T29213] r5:00000000 r4:82a6dd18 [ 6575.045770][T29213] [<8021fe1c>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 6575.046557][T29213] [<802024f4>] (panic) from [<80258578>] (get_taint+0x0/0x1c) [ 6575.047025][T29213] r3:8280c684 r2:00000001 r1:8224203c r0:822499d4 [ 6575.047606][T29213] r7:804bc144 [ 6575.047971][T29213] [<80258504>] (check_panic_on_warn) from [<802586dc>] (__warn+0x80/0x188) [ 6575.048616][T29213] [<8025865c>] (__warn) from [<8025895c>] (warn_slowpath_fmt+0x178/0x1f4) [ 6575.049008][T29213] r8:00000009 r7:822752cc r6:dfa31d1c r5:8394d400 r4:00000000 [ 6575.049447][T29213] [<802587e8>] (warn_slowpath_fmt) from [<804bc144>] (kunmap_local_indexed+0x20c/0x224) [ 6575.050031][T29213] r10:00000000 r9:dedb60f8 r8:def40674 r7:00a00000 r6:00000003 r5:8394d400 [ 6575.050461][T29213] r4:ffedc000 [ 6575.050623][T29213] [<804bbf38>] (kunmap_local_indexed) from [<805373a8>] (move_pages+0xb24/0x19c8) [ 6575.050988][T29213] r7:00a00000 r6:fffffff0 r5:8693847c r4:85bfa400 [ 6575.051250][T29213] [<80536884>] (move_pages) from [<805be4dc>] (userfaultfd_ioctl+0xff8/0x21c4) [ 6575.051639][T29213] r10:85bfa400 r9:dfa31e98 r8:21000000 r7:00000001 r6:00000000 r5:20000100 [ 6575.052021][T29213] r4:8495c080 [ 6575.052344][T29213] [<805bd4e4>] (userfaultfd_ioctl) from [<805679ec>] (sys_ioctl+0x130/0xdc8) [ 6575.053059][T29213] r10:8394d400 r9:85d5cf00 r8:00000003 r7:20000100 r6:85d5cf01 r5:00000000 [ 6575.053491][T29213] r4:c028aa05 [ 6575.053667][T29213] [<805678bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6575.054357][T29213] Exception stack(0xdfa31fa8 to 0xdfa31ff0) [ 6575.054646][T29213] 1fa0: 00000000 00000000 00000003 c028aa05 20000100 00000000 [ 6575.055018][T29213] 1fc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76b780bc [ 6575.055429][T29213] 1fe0: 76b77ec0 76b77eb0 000193a4 00131fc0 [ 6575.055697][T29213] r10:00000036 r9:8394d400 r8:8020029c r7:00000036 r6:002f6300 r5:00000000 [ 6575.056031][T29213] r4:00000000 [ 6575.059050][T29213] Rebooting in 86400 seconds.. VM DIAGNOSIS: 23:10:43 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=8240935c R02=00000000 R03=00000000 R04=84be87c0 R05=84be88ac R06=00000040 R07=00040000 R08=df979e20 R09=83948c00 R10=00000001 R11=df979d94 R12=df979d58 R13=df979d80 R14=80261ffc R15=81532854 PSR=60010013 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84161840 R01=0000006d R02=ebab3000 R03=00000000 R04=82ab1124 R05=84161840 R06=80a6a888 R07=82ab1149 R08=82828458 R09=00000000 R10=00002236 R11=dfa319f0 R12=00000002 R13=dfa319e4 R14=8295a27c R15=80a6a8e0 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000