last executing test programs: 20.001935503s ago: executing program 1 (id=44): r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4048000) r4 = socket$inet(0x2, 0x3, 0x4) r5 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r5, 0x5404, 0x0) ptrace$ARCH_SET_GS(0x1e, r1, 0x0, 0x1001) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0) recvfrom$inet(r4, &(0x7f0000000400)=""/108, 0x6c, 0x41, &(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000280)='4', 0x1}], 0x1) 19.137191071s ago: executing program 0 (id=47): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) r3 = socket(0x11, 0x3, 0x0) r4 = epoll_create1(0x0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000000)={0xe000202b}) epoll_pwait(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0xfffffffffffffff7, 0x0, 0x0) r6 = dup3(r3, r5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f00000001c0)={0x2007}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) socket$inet6(0xa, 0x3, 0x7) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r7, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001000010700000000ffffffff0a0000080600010014000000"], 0x1c}}, 0x20008080) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x15, 0x1c, &(0x7f0000000100)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xcd9}, {{0x18, 0x1, 0x1, 0x0, r9}, {}, {0x7, 0x0, 0xb, 0x6}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x6, 0x1, 0xa, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {0x7, 0x1, 0xb, 0x4, 0x8}, {}, {0x7, 0x0, 0xc}, {0x18, 0x6, 0x2, 0x0, r8}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sk_reuseport=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket(0x10, 0x3, 0x0) openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/kernel/profiling', 0x42242, 0x73) socket$packet(0x11, 0x2, 0x300) 4.310812401s ago: executing program 0 (id=48): r0 = syz_usb_connect$cdc_ncm(0x0, 0x7a, &(0x7f00000001c0)=ANY=[@ANYBLOB="1201000002000040250507004000010203010902680002010040000904000001020e0000052406000105240000000d370f0100000000000000000006241a0000000c241b4800f3ff00050080050962810300020000000904010000020d00000904010102020d00000905820200040000000905"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000080)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x20, 0x80, 0x1c, {0x3, 0x9, 0xe4a, 0x0, 0x7, 0x3865, 0x2008, 0x11d, 0x5, 0x2, 0x4, 0x81}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) 4.310505102s ago: executing program 1 (id=49): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) unshare(0x400) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, 0x0) 4.173239321s ago: executing program 1 (id=50): keyctl$reject(0x13, 0x0, 0x0, 0x201, 0x0) r0 = syz_usb_connect$hid(0x2, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1e7d, 0x2c24, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x0, 0x6, 0x2, 0x3, 0x0, 0x2, 0x0, {0x9, 0x21, 0x7, 0xff, 0x1, {0x22, 0x3}}, {{{0x9, 0x5, 0x81, 0x3, 0x10, 0x0, 0x10}}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000100)="600ad981520c7a0015117c036b4d59232cccd2504404bc69c20cf9587c38050748b7d2d58c063b31c9bf65d0591a4b78080a0488b9a532c59c89b4cd1e418731296d1cca5b4ab5a6ce9b", 0x4a, 0xfffffffffffffff8) futex(0x0, 0x80000000000b, 0x4, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, r2) syz_usb_control_io(r0, &(0x7f0000000280)={0x2c, &(0x7f00000000c0)={0x20, 0x1, 0x7, {0x7, 0x23, "a311d8fe43"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) r3 = socket$inet(0x2, 0x3, 0x8) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x8, 0x3, 0x310, 0x0, 0xe138, 0x198, 0x198, 0x198, 0x278, 0x358, 0x358, 0x278, 0x358, 0x3, 0x0, {[{{@uncond, 0x0, 0x150, 0x198, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'fsm\x00', "0d0004000000000000000404fff0cf81dfd28c89544e14cd3e01dd24289831867846c88621039b284c3ff45c42995560a99952bed40cf5a8c1df6cdbdb7e2378d5afd35f4c16827f55b3af494e39e8fb330200000000000032b6a99a8d87298e88a94cb519f5c17631af916a0002000000000000000000000000000000000049", 0x8}}, @common=@socket0={{0x20}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x100, 0x7ff, 0x4, 'snmp_trap\x00', {0x6}}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0xfffffffc, 0x8, 'snmp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x370) 2.820635261s ago: executing program 1 (id=51): getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) write$cgroup_int(r0, 0x0, 0x0) madvise(&(0x7f0000000000/0x400000)=nil, 0x40001e, 0x15) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000240)=0x0) timer_settime(r1, 0x0, &(0x7f0000000340)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) nanosleep(&(0x7f0000000200)={r2, r3+60000000}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r5, 0x407, 0x2) write$FUSE_INIT(r5, &(0x7f0000000340)={0x50, 0xfffffffffffffffe, 0x0, {0x7, 0x28, 0xd19e, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x10, 0x3}}, 0x50) vmsplice(r5, &(0x7f0000000140)=[{&(0x7f0000000100)="eb", 0x20000101}], 0x1, 0x0) readv(r4, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/210, 0xd2}], 0x1) 2.594021266s ago: executing program 0 (id=52): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000090024206d041cc340000000000109022400010000a00009040000010301010009210008000122010009058103"], 0x0) syz_usb_control_io$hid(r0, &(0x7f00000002c0)={0x24, &(0x7f0000000380)=ANY=[@ANYBLOB="c60009"], 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000340)={0x2c, &(0x7f00000000c0)={0x20, 0xf, 0xb9, {0xb9, 0xd, "b8be69eb16983ece9a9be4db0f525334247906813de44dbd05ba13aaac34951112c539ce0690836cf1f278e58f820c027c972ccda11eec8740c4a19fe5a7ad745a338d573b78bea440b36e985e3549856891596d37612c94e9e85fc8596350bae0ee302677acd8afed12d3c4bf68022aa0d1bcea05656fae32ae870a1b371cde71c92fb9a739505a207cf9f2644d5cc59c3af17fa15926694035a6f552d36851d8dc136bd163af3b6ddbf16354cf2ae7e79fc03b4e4e40"}}, 0x0, 0x0, &(0x7f0000000280)={0x20, 0x29, 0xf, {0xf, 0x29, 0x4, 0x60, 0xd3, 0x0, "6b33af2b", "9ebaedd1"}}, &(0x7f0000000300)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x2, 0x4, 0x1, 0x77, 0x6, 0xe, 0x4}}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 1.111726476s ago: executing program 0 (id=53): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000), 0x4af42, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 1.021016142s ago: executing program 0 (id=54): capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000700)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)="11", 0x1}], 0x1, 0x0, 0x0, 0x400e815}}], 0x1, 0x4) r0 = syz_open_dev$evdev(&(0x7f0000000240), 0x20000, 0x0) ioctl$EVIOCGLED(r0, 0x40284504, &(0x7f0000000040)=""/51) 950.009767ms ago: executing program 0 (id=55): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100020008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x480c1}, 0x240408d0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000"], 0x48) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000380)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) mprotect(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r6, 0x604ab000) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x1}) open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) pwritev2(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0xe7b, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0xe0}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x2}, {0x3, 0x3, 0x6, 0xa, 0xa, 0xfff8, 0x50}, {0x7, 0x1, 0xb, 0x2, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {0x7, 0x0, 0x0, 0x9}, {0x7, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r4}, {}, {0x46, 0x8, 0xfff1, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 231.305295ms ago: executing program 1 (id=56): sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x60}, 0x1, 0x0, 0x0, 0x2000010}, 0x20000000) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a80)=@newtaction={0xac, 0x30, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [{0x98, 0x1, [@m_simple={0x94, 0x18, 0x0, 0x0, {{0xb}, {0x10, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x9, 0x3, '\t\x00\x00\x00\x00'}]}, {0x59, 0x6, "c92acebef543cf5eac95ff99fdfe71226f0f8ca3945cf1e27303fef4d7edee9dc07b9c204234f1518f815a1e6f9900be0653c30ee7044fc49940d26166aca9768a60e2633236607ed8e41497a644f35e0d2494ec24"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4000880}, 0x20000080) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0xffffffffffffff2f, 0xa1}}], 0x4000000000003b4, 0x2040000, &(0x7f0000003700)={0x77359400}) 0s ago: executing program 1 (id=57): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) kernel console output (not intermixed with test programs): [ 57.771517][ T28] audit: type=1400 audit(57.670:56): avc: denied { read write } for pid=3077 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 57.775258][ T28] audit: type=1400 audit(57.670:57): avc: denied { open } for pid=3077 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:33333' (ED25519) to the list of known hosts. [ 77.560091][ T28] audit: type=1400 audit(77.450:58): avc: denied { name_bind } for pid=3080 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 79.396463][ T28] audit: type=1400 audit(79.290:59): avc: denied { execute } for pid=3081 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 79.410551][ T28] audit: type=1400 audit(79.300:60): avc: denied { execute_no_trans } for pid=3081 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 82.811843][ T28] audit: type=1400 audit(82.710:61): avc: denied { mounton } for pid=3081 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 82.815214][ T28] audit: type=1400 audit(82.710:62): avc: denied { mount } for pid=3081 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 82.827926][ T3081] cgroup: Unknown subsys name 'net' [ 82.835606][ T28] audit: type=1400 audit(82.730:63): avc: denied { unmount } for pid=3081 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 83.012741][ T3081] cgroup: Unknown subsys name 'cpuset' [ 83.020648][ T3081] cgroup: Unknown subsys name 'hugetlb' [ 83.021754][ T3081] cgroup: Unknown subsys name 'rlimit' [ 83.244654][ T28] audit: type=1400 audit(83.140:64): avc: denied { setattr } for pid=3081 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 83.247533][ T28] audit: type=1400 audit(83.140:65): avc: denied { mounton } for pid=3081 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 83.255240][ T28] audit: type=1400 audit(83.140:66): avc: denied { mount } for pid=3081 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 83.504389][ T3083] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 83.508360][ T28] audit: type=1400 audit(83.400:67): avc: denied { relabelto } for pid=3083 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 83.514587][ T28] audit: type=1400 audit(83.410:68): avc: denied { write } for pid=3083 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 83.565107][ T28] audit: type=1400 audit(83.460:69): avc: denied { read } for pid=3081 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 83.565681][ T28] audit: type=1400 audit(83.460:70): avc: denied { open } for pid=3081 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 91.577772][ T3081] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 94.081957][ T28] audit: type=1400 audit(93.980:71): avc: denied { execmem } for pid=3084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 94.148773][ T28] audit: type=1400 audit(94.040:72): avc: denied { read } for pid=3086 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 94.160146][ T28] audit: type=1400 audit(94.050:73): avc: denied { open } for pid=3086 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 94.160512][ T28] audit: type=1400 audit(94.050:74): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 94.188774][ T28] audit: type=1400 audit(94.080:75): avc: denied { module_request } for pid=3086 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 94.277100][ T28] audit: type=1400 audit(94.170:76): avc: denied { sys_module } for pid=3087 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 95.024751][ T28] audit: type=1400 audit(94.920:77): avc: denied { ioctl } for pid=3087 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 96.415907][ T3087] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 96.428742][ T3086] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 96.443542][ T3087] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 96.446854][ T3086] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 97.533677][ T3086] hsr_slave_0: entered promiscuous mode [ 97.537437][ T3086] hsr_slave_1: entered promiscuous mode [ 97.588775][ T3087] hsr_slave_0: entered promiscuous mode [ 97.592110][ T3087] hsr_slave_1: entered promiscuous mode [ 97.595906][ T3087] debugfs: 'hsr0' already exists in 'hsr' [ 97.598161][ T3087] Cannot create hsr debugfs directory [ 98.212821][ T28] audit: type=1400 audit(98.110:78): avc: denied { create } for pid=3086 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 98.215325][ T28] audit: type=1400 audit(98.110:79): avc: denied { write } for pid=3086 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 98.221356][ T28] audit: type=1400 audit(98.120:80): avc: denied { read } for pid=3086 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 98.241328][ T3086] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 98.254504][ T3086] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 98.276665][ T3086] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 98.285603][ T3086] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 98.392708][ T3087] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 98.411441][ T3087] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 98.441761][ T3087] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 98.456872][ T3087] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 99.294215][ T3086] 8021q: adding VLAN 0 to HW filter on device bond0 [ 99.406499][ T3087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 102.421285][ T3086] veth0_vlan: entered promiscuous mode [ 102.444843][ T3086] veth1_vlan: entered promiscuous mode [ 102.503678][ T3086] veth0_macvtap: entered promiscuous mode [ 102.516860][ T3086] veth1_macvtap: entered promiscuous mode [ 102.620506][ T2195] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.621969][ T37] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.622314][ T37] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.622466][ T37] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.804231][ T28] audit: type=1400 audit(102.680:81): avc: denied { mount } for pid=3086 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 102.810288][ T28] audit: type=1400 audit(102.700:82): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/syzkaller.wkf0I1/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 102.819253][ T28] audit: type=1400 audit(102.710:83): avc: denied { mount } for pid=3086 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 102.833999][ T28] audit: type=1400 audit(102.730:84): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/syzkaller.wkf0I1/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 102.844767][ T28] audit: type=1400 audit(102.740:85): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/syzkaller.wkf0I1/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 102.891292][ T28] audit: type=1400 audit(102.780:86): avc: denied { unmount } for pid=3086 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 102.913328][ T28] audit: type=1400 audit(102.810:87): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 102.914581][ T28] audit: type=1400 audit(102.810:88): avc: denied { mount } for pid=3086 comm="syz-executor" name="/" dev="gadgetfs" ino=2196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 102.921271][ T28] audit: type=1400 audit(102.820:89): avc: denied { mount } for pid=3086 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 102.923280][ T28] audit: type=1400 audit(102.820:90): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 102.998316][ T3086] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 103.055790][ T3087] veth0_vlan: entered promiscuous mode [ 103.085541][ T3087] veth1_vlan: entered promiscuous mode [ 103.218467][ T3087] veth0_macvtap: entered promiscuous mode [ 103.283532][ T3087] veth1_macvtap: entered promiscuous mode [ 103.416223][ T643] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.417215][ T643] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.418248][ T643] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.418903][ T643] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.860957][ T40] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 104.046619][ T40] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 104.047045][ T40] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 104.047517][ T40] usb 1-1: config 1 has no interface number 0 [ 104.047739][ T40] usb 1-1: config 1 interface 1 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 104.047864][ T40] usb 1-1: config 1 interface 1 altsetting 0 endpoint 0x81 has invalid maxpacket 512, setting to 64 [ 104.048122][ T40] usb 1-1: Duplicate descriptor for config 1 interface 1 altsetting 0, skipping [ 104.048286][ T40] usb 1-1: config 1 interface 1 altsetting 1 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 104.080467][ T40] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 104.080876][ T40] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 104.081270][ T40] usb 1-1: Product: syz [ 104.081328][ T40] usb 1-1: Manufacturer: syz [ 104.081403][ T40] usb 1-1: SerialNumber: syz [ 104.098332][ T3694] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 104.537522][ T3694] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 104.977246][ T40] cdc_ncm 1-1:1.1: bind() failure [ 105.182607][ T87] usb 1-1: USB disconnect, device number 2 [ 106.460866][ T40] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 106.610769][ T40] usb 2-1: Using ep0 maxpacket: 32 [ 106.647872][ T40] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 106.648355][ T40] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 106.648898][ T40] usb 2-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 106.649091][ T40] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 106.662485][ T40] usb 2-1: config 0 descriptor?? [ 106.680768][ T40] hub 2-1:0.0: USB hub found [ 106.922332][ T40] hub 2-1:0.0: 1 port detected [ 107.593196][ T110] hub 2-1:0.0: activate --> -90 [ 107.807430][ T40] hub 2-1:0.0: hub_ext_port_status failed (err = -71) [ 107.808609][ T23] usb 2-1: USB disconnect, device number 2 [ 107.808915][ T110] usb 2-1: Failed to suspend device, error -19 [ 107.957500][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 107.957815][ T28] audit: type=1400 audit(107.850:113): avc: denied { setopt } for pid=3751 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 110.041462][ T28] audit: type=1400 audit(109.940:114): avc: denied { create } for pid=3765 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 110.048590][ T28] audit: type=1400 audit(109.940:115): avc: denied { read } for pid=3765 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 110.788225][ T3770] Zero length message leads to an empty skb [ 110.795949][ T28] audit: type=1400 audit(110.690:116): avc: denied { perfmon } for pid=3758 comm="syz.1.15" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 113.623159][ T3779] netlink: 48 bytes leftover after parsing attributes in process `syz.0.21'. [ 113.819174][ T28] audit: type=1400 audit(113.710:117): avc: denied { read write } for pid=3780 comm="syz.0.22" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 113.822862][ T28] audit: type=1400 audit(113.710:118): avc: denied { open } for pid=3780 comm="syz.0.22" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 113.842512][ T28] audit: type=1400 audit(113.740:119): avc: denied { ioctl } for pid=3780 comm="syz.0.22" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5879 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 116.202324][ T28] audit: type=1400 audit(116.100:120): avc: denied { map_create } for pid=3780 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 116.215657][ T28] audit: type=1400 audit(116.110:121): avc: denied { map_read map_write } for pid=3780 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 117.627225][ T3784] netlink: 4 bytes leftover after parsing attributes in process `syz.0.23'. [ 117.790831][ T3784] netlink: 20 bytes leftover after parsing attributes in process `syz.0.23'. [ 119.296166][ T3793] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 119.308511][ T28] audit: type=1400 audit(119.200:122): avc: denied { bind } for pid=3792 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 119.313637][ T28] audit: type=1400 audit(119.210:123): avc: denied { name_bind } for pid=3792 comm="syz.1.27" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 119.318470][ T28] audit: type=1400 audit(119.210:124): avc: denied { node_bind } for pid=3792 comm="syz.1.27" saddr=::ffff:0.0.0.0 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 119.332269][ T28] audit: type=1400 audit(119.230:125): avc: denied { connect } for pid=3792 comm="syz.1.27" laddr=::ffff:0.0.0.0 lport=20001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 119.356076][ T28] audit: type=1400 audit(119.250:126): avc: denied { write } for pid=3792 comm="syz.1.27" path="socket:[2401]" dev="sockfs" ino=2401 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 119.372655][ T28] audit: type=1400 audit(119.270:127): avc: denied { read } for pid=3792 comm="syz.1.27" path="socket:[2401]" dev="sockfs" ino=2401 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 120.424180][ T28] audit: type=1400 audit(120.310:128): avc: denied { create } for pid=3797 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 120.440634][ T3798] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pid=3798 comm=syz.1.29 [ 120.476016][ T28] audit: type=1400 audit(120.370:129): avc: denied { write } for pid=3797 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 120.571262][ T28] audit: type=1400 audit(120.470:130): avc: denied { create } for pid=3799 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 123.805047][ T28] audit: type=1400 audit(123.700:131): avc: denied { ioctl } for pid=3799 comm="syz.1.30" path="socket:[2419]" dev="sockfs" ino=2419 ioctlcmd=0xf515 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 128.875677][ T28] audit: type=1400 audit(128.770:132): avc: denied { setcurrent } for pid=3804 comm="syz.0.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 128.954805][ T28] audit: type=1400 audit(128.850:133): avc: denied { block_suspend } for pid=3806 comm="syz.0.32" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 129.450610][ T28] audit: type=1400 audit(129.340:134): avc: denied { mounton } for pid=3816 comm="syz.0.35" path="/18/file0" dev="tmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 130.625176][ T28] audit: type=1400 audit(130.520:135): avc: denied { unmount } for pid=3086 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 130.982753][ T28] audit: type=1400 audit(130.880:136): avc: denied { execute } for pid=3821 comm="syz.0.36" dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 133.040365][ C0] hrtimer: interrupt took 1172576 ns [ 133.342216][ T28] audit: type=1400 audit(133.240:137): avc: denied { create } for pid=3830 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 133.462639][ T28] audit: type=1400 audit(133.360:138): avc: denied { create } for pid=3830 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 133.532680][ T3833] netlink: 4 bytes leftover after parsing attributes in process `syz.0.41'. [ 134.003799][ T3833] netlink: 20 bytes leftover after parsing attributes in process `syz.0.41'. [ 138.765056][ T3838] random: crng reseeded on system resumption [ 139.859891][ T28] audit: type=1400 audit(139.750:139): avc: denied { ioctl } for pid=3835 comm="syz.0.42" path="socket:[3335]" dev="sockfs" ino=3335 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 148.473913][ T28] audit: type=1400 audit(148.370:140): avc: denied { setopt } for pid=3851 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 149.866727][ T28] audit: type=1400 audit(149.760:141): avc: denied { prog_run } for pid=3853 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 163.355649][ T28] audit: type=1400 audit(163.250:142): avc: denied { read write } for pid=3086 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.356861][ T28] audit: type=1400 audit(163.250:143): avc: denied { open } for pid=3086 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.358057][ T28] audit: type=1400 audit(163.250:144): avc: denied { ioctl } for pid=3086 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.429762][ T28] audit: type=1400 audit(163.320:145): avc: denied { read } for pid=3863 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 163.442145][ T28] audit: type=1400 audit(163.340:146): avc: denied { write } for pid=3863 comm="syz.0.48" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 163.444056][ T28] audit: type=1400 audit(163.340:147): avc: denied { open } for pid=3863 comm="syz.0.48" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 163.448784][ T28] audit: type=1400 audit(163.340:148): avc: denied { ioctl } for pid=3863 comm="syz.0.48" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 163.710876][ T40] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 163.783100][ T11] usb 2-1: new full-speed USB device number 3 using dummy_hcd [ 163.879102][ T40] usb 1-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 163.880124][ T40] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 163.880530][ T40] usb 1-1: config 1 interface 1 altsetting 1 has an invalid descriptor for endpoint zero, skipping [ 163.892346][ T40] usb 1-1: New USB device found, idVendor=0525, idProduct=0007, bcdDevice= 0.40 [ 163.892639][ T40] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 163.892831][ T40] usb 1-1: Product: syz [ 163.893013][ T40] usb 1-1: Manufacturer: syz [ 163.893066][ T40] usb 1-1: SerialNumber: syz [ 163.912771][ T40] cdc_mbim 1-1:1.0: skipping garbage [ 163.913142][ T40] cdc_mbim 1-1:1.0: skipping garbage [ 163.952367][ T11] usb 2-1: config 0 interface 0 altsetting 6 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 163.953001][ T11] usb 2-1: config 0 interface 0 altsetting 6 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 163.956060][ T11] usb 2-1: config 0 interface 0 has no altsetting 0 [ 163.957376][ T11] usb 2-1: New USB device found, idVendor=1e7d, idProduct=2c24, bcdDevice= 0.00 [ 163.979266][ T11] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 164.015460][ T11] usb 2-1: config 0 descriptor?? [ 164.119146][ T3865] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 164.465344][ T28] audit: type=1400 audit(164.360:149): avc: denied { write } for pid=3870 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 164.543546][ T11] pyra 0003:1E7D:2C24.0001: item fetching failed at offset 0/3 [ 164.546943][ T11] pyra 0003:1E7D:2C24.0001: parse failed [ 164.550581][ T11] pyra 0003:1E7D:2C24.0001: probe with driver pyra failed with error -22 [ 164.728538][ T28] audit: type=1400 audit(164.620:150): avc: denied { create } for pid=3870 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 164.747328][ T28] audit: type=1400 audit(164.640:151): avc: denied { setopt } for pid=3870 comm="syz.1.50" lport=8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 164.766487][ T87] usb 2-1: USB disconnect, device number 3 [ 164.786114][ T3865] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 165.004115][ T40] cdc_mbim 1-1:1.0: bind() failure [ 165.014119][ T40] cdc_ncm 1-1:1.1: probe with driver cdc_ncm failed with error -71 [ 165.017438][ T40] cdc_mbim 1-1:1.1: probe with driver cdc_mbim failed with error -71 [ 165.024596][ T40] usbtest 1-1:1.1: probe with driver usbtest failed with error -71 [ 165.046155][ T40] usb 1-1: USB disconnect, device number 3 [ 165.480532][ T40] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 165.630535][ T40] usb 1-1: Using ep0 maxpacket: 32 [ 165.651551][ T40] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 165.651907][ T40] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 165.652284][ T40] usb 1-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 165.652362][ T40] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 165.657209][ T40] usb 1-1: config 0 descriptor?? [ 165.685192][ T40] hub 1-1:0.0: USB hub found [ 165.896358][ T40] hub 1-1:0.0: config failed, hub doesn't have any ports! (err -19) [ 166.322466][ T40] hid-generic 0003:046D:C31C.0002: item fetching failed at offset 0/1 [ 166.323411][ T40] hid-generic 0003:046D:C31C.0002: probe with driver hid-generic failed with error -22 [ 166.631519][ T44] usb 1-1: USB disconnect, device number 4 [ 169.424954][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 169.425373][ T28] audit: type=1400 audit(169.320:155): avc: denied { map_create } for pid=3926 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 169.451105][ T28] audit: type=1400 audit(169.350:156): avc: denied { map_read map_write } for pid=3926 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 169.477916][ T28] audit: type=1400 audit(169.370:157): avc: denied { map } for pid=3926 comm="syz.0.55" path="socket:[2547]" dev="sockfs" ino=2547 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 169.528263][ T28] audit: type=1400 audit(169.420:158): avc: denied { prog_load } for pid=3926 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 169.551746][ T28] audit: type=1400 audit(169.450:159): avc: denied { bpf } for pid=3926 comm="syz.0.55" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 169.554524][ T28] audit: type=1400 audit(169.450:160): avc: denied { perfmon } for pid=3926 comm="syz.0.55" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 171.748166][ T3935] ------------[ cut here ]------------ [ 171.748978][ T3935] WARNING: kernel/bpf/verifier.c:2763 at reg_bounds_sanity_check+0x3c0/0x428, CPU#0: syz.1.57/3935 [ 171.754374][ T3935] verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0xffffdfcd, 0xffffffffffffdfcc] s64=[0x80000000ffffdfcd, 0x7fffffffffffdfcc] u32=[0xffffdfcd, 0xffffdfcc] s32=[0xffffdfcd, 0xffffdfcc] var_off=(0xffffdfcc, 0xffffffff00000000) [ 171.758333][ T3935] Modules linked in: [ 171.759507][ T3935] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 171.761137][ T3935] CPU: 0 UID: 0 PID: 3935 Comm: syz.1.57 Not tainted syzkaller #0 PREEMPT [ 171.761784][ T3935] Hardware name: ARM-Versatile Express [ 171.762319][ T3935] Call trace: [ 171.762873][ T3935] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 171.763890][ T3935] r7:8281f940 r6:00000000 r5:822a7678 r4:00000001 [ 171.764407][ T3935] [<80201af0>] (show_stack) from [<8021e45c>] (dump_stack_lvl+0x5c/0x70) [ 171.764831][ T3935] [<8021e400>] (dump_stack_lvl) from [<8021e488>] (dump_stack+0x18/0x1c) [ 171.765227][ T3935] r7:8281f940 r6:00000000 r5:8465c800 r4:82a80d14 [ 171.765652][ T3935] [<8021e470>] (dump_stack) from [<802025f4>] (vpanic+0x114/0x320) [ 171.766502][ T3935] [<802024e0>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0x104) [ 171.766953][ T3935] r7:803e02a4 [ 171.767123][ T3935] [<80202800>] (panic) from [<80250a68>] (get_taint+0x0/0x1c) [ 171.767475][ T3935] r3:8280c544 r2:00000001 r1:8228e41c r0:82295cd4 [ 171.767725][ T3935] [<802509f0>] (check_panic_on_warn) from [<80250be4>] (__warn+0x98/0x1ac) [ 171.768139][ T3935] [<80250b4c>] (__warn) from [<80250ee0>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 171.768685][ T3935] r8:00000009 r7:822adfb0 r6:dfc2d8c4 r5:8465c800 r4:00000000 [ 171.769044][ T3935] [<80250cfc>] (warn_slowpath_fmt) from [<803e02a4>] (reg_bounds_sanity_check+0x3c0/0x428) [ 171.769799][ T3935] r10:85de0000 r9:ffffdfcd r8:80000000 r7:ffffdfcd r6:ffffdfcc r5:822ae714 [ 171.770159][ T3935] r4:85a5ca30 [ 171.770309][ T3935] [<803dfee4>] (reg_bounds_sanity_check) from [<803ecfcc>] (reg_set_min_max+0x1c4/0x288) [ 171.770766][ T3935] r10:00000001 r9:00000010 r8:85de0000 r7:85918310 r6:85a5cb10 r5:85a5ca30 [ 171.771093][ T3935] r4:85918230 [ 171.771249][ T3935] [<803ece08>] (reg_set_min_max) from [<803fdc10>] (check_cond_jmp_op+0xc7c/0x1980) [ 171.772171][ T3935] r10:85a5c800 r9:00000010 r8:858bfb80 r7:ffffffff r6:80000000 r5:860bf600 [ 171.772786][ T3935] r4:dfc9f0c0 r3:85918230 [ 171.773297][ T3935] [<803fcf94>] (check_cond_jmp_op) from [<80404280>] (do_check_common+0x259c/0x3228) [ 171.773959][ T3935] r10:85de4000 r9:85de0000 r8:dfc9f0c0 r7:85de6000 r6:00000018 r5:dfc9f078 [ 171.774652][ T3935] r4:dfc9f000 [ 171.774989][ T3935] [<80401ce4>] (do_check_common) from [<80407ed4>] (bpf_check+0x22e4/0x2d30) [ 171.775543][ T3935] r10:85de6000 r9:00000001 r8:85de0000 r7:00000a7b r6:85de08bc r5:00000000 [ 171.776061][ T3935] r4:00000016 [ 171.776455][ T3935] [<80405bf0>] (bpf_check) from [<803d95f4>] (bpf_prog_load+0x5b8/0xdec) [ 171.777177][ T3935] r10:dfc9f000 r9:8465c800 r8:8603ab30 r7:dfc2dd18 r6:00000000 r5:00000000 [ 171.778170][ T3935] r4:dfc2deb0 [ 171.778329][ T3935] [<803d903c>] (bpf_prog_load) from [<803dae1c>] (__sys_bpf+0x2d8/0x2008) [ 171.779053][ T3935] r10:00000005 r9:00000000 r8:dfc2de50 r7:00000048 r6:8465c800 r5:200054c0 [ 171.780066][ T3935] r4:00000000 [ 171.780394][ T3935] [<803dab44>] (__sys_bpf) from [<803dd0e4>] (sys_bpf+0x2c/0x48) [ 171.781113][ T3935] r10:00000182 r9:8465c800 r8:8020029c r7:00000182 r6:00346450 r5:00000000 [ 171.781559][ T3935] r4:00000000 [ 171.781916][ T3935] [<803dd0b8>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 171.782791][ T3935] Exception stack(0xdfc2dfa8 to 0xdfc2dff0) [ 171.783503][ T3935] dfa0: 00000000 00000000 00000005 200054c0 00000048 00000000 [ 171.784857][ T3935] dfc0: 00000000 00000000 00346450 00000182 00346418 00000000 003d0f00 76f0e0dc [ 171.785378][ T3935] dfe0: 76f0de88 76f0de78 00018ba0 001300f0 [ 171.788479][ T3935] Rebooting in 86400 seconds..