last executing test programs: 20.831282817s ago: executing program 1: r0 = getpid() syz_pidfd_open(r0, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) ioctl$EXT4_IOC_GETSTATE(r2, 0x5452, &(0x7f0000000000)) 20.56093942s ago: executing program 1: mkdir(0x0, 0x0) mkdir(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r3, 0x0, 0x0, 0x0) mkdir(&(0x7f00000002c0)='./bus\x00', 0x0) 5.111935842s ago: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = epoll_create1(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000380)='sys_enter\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000100)={0x20000014}) epoll_pwait(r0, &(0x7f0000000340)=[{}], 0x1, 0x0, 0x0, 0x0) 4.759776173s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sched_setscheduler(0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x22, &(0x7f0000000080), 0x4) 4.488982356s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) mount(&(0x7f00000002c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='.\x00', &(0x7f0000000140)='f2fs\x00', 0x8000, 0x0) 3.934961893s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) unlinkat(0xffffffffffffffff, 0x0, 0x200) 3.708804172s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r0}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6}]}) chdir(0x0) 3.708657592s ago: executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300002311f335850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x4, 0x0, 0x0) 898.324453ms ago: executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) getpid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="186e649ce5000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000005640)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00'}, 0x90) 802.345821ms ago: executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = getpgid(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) tgkill(r0, r0, 0x0) 436.657303ms ago: executing program 1: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000027000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000001100)={0x0, 0x0}, 0x8) r2 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000340)=r1, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff}) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r2, r0, 0x4, r3}, 0x10) 0s ago: executing program 1: r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0xffffffffffffffb4, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x100}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) kernel console output (not intermixed with test programs): [ 48.061569][ T31] audit: type=1400 audit(48.020:68): avc: denied { read write } for pid=2994 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.062485][ T31] audit: type=1400 audit(48.030:69): avc: denied { open } for pid=2994 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 64.512188][ T1161] aoe: packet could not be sent on bond0. consider increasing tx_queue_len [ 64.513126][ T1161] aoe: packet could not be sent on teql0. consider increasing tx_queue_len [ 64.513677][ T1161] aoe: packet could not be sent on tunl0. consider increasing tx_queue_len [ 64.513957][ T1161] aoe: packet could not be sent on gre0. consider increasing tx_queue_len [ 64.514230][ T1161] aoe: packet could not be sent on gretap0. consider increasing tx_queue_len [ 64.514520][ T1161] aoe: packet could not be sent on erspan0. consider increasing tx_queue_len [ 64.514786][ T1161] aoe: packet could not be sent on ip_vti0. consider increasing tx_queue_len [ 64.515055][ T1161] aoe: packet could not be sent on ip6_vti0. consider increasing tx_queue_len [ 64.515323][ T1161] aoe: packet could not be sent on sit0. consider increasing tx_queue_len [ 64.515596][ T1161] aoe: packet could not be sent on ip6tnl0. consider increasing tx_queue_len Warning: Permanently added '[localhost]:36627' (ED25519) to the list of known hosts. [ 74.452902][ T31] audit: type=1400 audit(74.420:70): avc: denied { name_bind } for pid=2998 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 76.768525][ T31] audit: type=1400 audit(76.730:71): avc: denied { execute } for pid=3000 comm="sh" name="syz-fuzzer" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 76.776092][ T31] audit: type=1400 audit(76.740:72): avc: denied { execute_no_trans } for pid=3000 comm="sh" path="/syz-fuzzer" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:01:23 fuzzer started [ 85.702292][ T31] audit: type=1400 audit(85.670:73): avc: denied { node_bind } for pid=3000 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 85.727907][ T31] audit: type=1400 audit(85.690:74): avc: denied { name_bind } for pid=3000 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 1970/01/01 00:01:25 dialing manager at localhost:30000 [ 86.766368][ T31] audit: type=1400 audit(86.720:75): avc: denied { mounton } for pid=3009 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 86.780754][ T31] audit: type=1400 audit(86.740:76): avc: denied { mount } for pid=3009 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 86.798138][ T31] audit: type=1400 audit(86.760:77): avc: denied { mounton } for pid=3010 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 86.799025][ T31] audit: type=1400 audit(86.760:78): avc: denied { mount } for pid=3010 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 86.822897][ T3010] cgroup: Unknown subsys name 'net' [ 86.837359][ T31] audit: type=1400 audit(86.790:79): avc: denied { setattr } for pid=3013 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 86.838371][ T31] audit: type=1400 audit(86.790:80): avc: denied { unmount } for pid=3010 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 87.021402][ T3010] cgroup: Unknown subsys name 'hugetlb' [ 87.025387][ T3010] cgroup: Unknown subsys name 'rlimit' [ 87.110951][ T3016] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 87.112683][ T31] audit: type=1400 audit(87.080:81): avc: denied { relabelto } for pid=3016 comm="mkswap" name="swap-file" dev="vda" ino=682 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 87.114249][ T31] audit: type=1400 audit(87.080:82): avc: denied { write } for pid=3016 comm="mkswap" path="/swap-file" dev="vda" ino=682 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 92.144278][ T3011] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:01:32 starting 2 executor processes [ 92.270254][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 92.271388][ T31] audit: type=1400 audit(92.230:85): avc: denied { execmem } for pid=3017 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 92.284506][ T31] audit: type=1400 audit(92.250:86): avc: denied { mounton } for pid=3019 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 92.285597][ T31] audit: type=1400 audit(92.250:87): avc: denied { mount } for pid=3019 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 92.290989][ T31] audit: type=1400 audit(92.250:88): avc: denied { read } for pid=3019 comm="syz-executor.0" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 92.291927][ T31] audit: type=1400 audit(92.250:89): avc: denied { open } for pid=3019 comm="syz-executor.0" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 92.292882][ T31] audit: type=1400 audit(92.250:90): avc: denied { mounton } for pid=3019 comm="syz-executor.0" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 92.309351][ T31] audit: type=1400 audit(92.270:91): avc: denied { module_request } for pid=3019 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 92.370933][ T31] audit: type=1400 audit(92.330:92): avc: denied { sys_module } for pid=3019 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 92.982941][ T31] audit: type=1400 audit(92.950:93): avc: denied { ioctl } for pid=3019 comm="syz-executor.0" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 93.753842][ T3020] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 93.759690][ T3020] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 94.129994][ T3019] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 94.138211][ T3019] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 94.854628][ T3020] hsr_slave_0: entered promiscuous mode [ 94.862207][ T3020] hsr_slave_1: entered promiscuous mode [ 95.225040][ T3019] hsr_slave_0: entered promiscuous mode [ 95.227538][ T3019] hsr_slave_1: entered promiscuous mode [ 95.229273][ T3019] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 95.229713][ T3019] Cannot create hsr debugfs directory [ 95.296054][ T31] audit: type=1400 audit(95.260:94): avc: denied { create } for pid=3020 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 95.303460][ T3020] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 95.317408][ T3020] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 95.324581][ T3020] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 95.331773][ T3020] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 95.609524][ T3019] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 95.621952][ T3019] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 95.629154][ T3019] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 95.636569][ T3019] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 96.102935][ T3020] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.434810][ T3019] 8021q: adding VLAN 0 to HW filter on device bond0 [ 98.773199][ T3020] veth0_vlan: entered promiscuous mode [ 98.782896][ T3020] veth1_vlan: entered promiscuous mode [ 98.813696][ T3020] veth0_macvtap: entered promiscuous mode [ 98.818511][ T3020] veth1_macvtap: entered promiscuous mode [ 98.849458][ T3020] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.850057][ T3020] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.851749][ T3020] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.852048][ T3020] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.936444][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 98.936522][ T31] audit: type=1400 audit(98.900:97): avc: denied { mounton } for pid=3020 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 98.944263][ T31] audit: type=1400 audit(98.910:98): avc: denied { mount } for pid=3020 comm="syz-executor.1" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 99.114273][ T31] audit: type=1400 audit(99.080:99): avc: denied { read write } for pid=3020 comm="syz-executor.1" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 99.121308][ T31] audit: type=1400 audit(99.080:100): avc: denied { open } for pid=3020 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 99.122194][ T31] audit: type=1400 audit(99.080:101): avc: denied { ioctl } for pid=3020 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 99.262700][ T31] audit: type=1400 audit(99.230:102): avc: denied { ioctl } for pid=3694 comm="syz-executor.1" path="net:[4026532754]" dev="nsfs" ino=4026532754 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 99.406203][ T31] audit: type=1400 audit(99.370:103): avc: denied { map_create } for pid=3698 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 99.572722][ T31] audit: type=1400 audit(99.540:104): avc: denied { create } for pid=3701 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.574237][ T3702] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 99.594738][ T31] audit: type=1400 audit(99.560:105): avc: denied { ioctl } for pid=3701 comm="syz-executor.1" path="socket:[1985]" dev="sockfs" ino=1985 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.847381][ T3019] veth0_vlan: entered promiscuous mode [ 99.885551][ T3019] veth1_vlan: entered promiscuous mode [ 99.959809][ T3019] veth0_macvtap: entered promiscuous mode [ 99.974596][ T3019] veth1_macvtap: entered promiscuous mode [ 100.045549][ T3019] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.046040][ T3019] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.046327][ T3019] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.046628][ T3019] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 100.279256][ T31] audit: type=1400 audit(100.240:106): avc: denied { create } for pid=3713 comm="syz-executor.0" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 100.707136][ T3724] loop0: detected capacity change from 0 to 512 [ 100.717409][ T3724] EXT4-fs: Ignoring removed mblk_io_submit option [ 100.732001][ T3724] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 100.733500][ T3724] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 100.779109][ T3724] EXT4-fs (loop0): 1 truncate cleaned up [ 100.781170][ T3724] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 100.792755][ T3724] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 105.573788][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 105.573851][ T31] audit: type=1400 audit(105.540:132): avc: denied { ioctl } for pid=3788 comm="syz-executor.1" path="socket:[2455]" dev="sockfs" ino=2455 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 106.474124][ T31] audit: type=1400 audit(106.440:133): avc: denied { setattr } for pid=3793 comm="syz-executor.1" name="PINGv6" dev="sockfs" ino=3194 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 106.505687][ T31] audit: type=1400 audit(106.470:134): avc: denied { read } for pid=3793 comm="syz-executor.1" dev="sockfs" ino=3194 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 106.507544][ T31] audit: type=1400 audit(106.470:135): avc: denied { name_bind 0x1000000 } for pid=3793 comm="syz-executor.1" path="socket:[3194]" dev="sockfs" ino=3194 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 120.957031][ T3812] Zero length message leads to an empty skb [ 121.661326][ T31] audit: type=1400 audit(121.620:136): avc: denied { read write } for pid=3823 comm="syz-executor.1" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 121.667309][ T31] audit: type=1400 audit(121.630:137): avc: denied { open } for pid=3823 comm="syz-executor.1" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 122.641830][ T31] audit: type=1400 audit(122.610:138): avc: denied { map_read map_write } for pid=3831 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 138.843269][ T31] audit: type=1400 audit(2000000010.590:139): avc: denied { unmount } for pid=3020 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 140.529414][ T31] audit: type=1400 audit(2000000012.270:140): avc: denied { create } for pid=3855 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 140.538059][ T31] audit: type=1400 audit(2000000012.280:141): avc: denied { write } for pid=3855 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 153.089722][ T3870] loop0: detected capacity change from 0 to 2048 [ 153.272781][ T3870] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 153.341862][ T3870] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 153.360718][ T31] audit: type=1400 audit(2000000025.090:142): avc: denied { setopt } for pid=3869 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 153.427097][ T3870] EXT4-fs error (device loop0): ext4_find_extent:936: inode #2: comm syz-executor.0: pblk 1 bad header/extent: invalid magic - magic 2, entries 0, max 3(0), depth 0(4) [ 153.451288][ T3870] EXT4-fs (loop0): Remounting filesystem read-only [ 153.642751][ T31] audit: type=1400 audit(2000000025.390:143): avc: denied { unmount } for pid=3019 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 153.644815][ T3019] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 154.356994][ T31] audit: type=1400 audit(2000000026.100:144): avc: denied { write } for pid=3878 comm="syz-executor.0" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 162.318644][ T31] audit: type=1400 audit(2000000034.060:145): avc: denied { getopt } for pid=3890 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 162.889717][ T31] audit: type=1400 audit(2000000034.630:146): avc: denied { create } for pid=3892 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 162.896873][ T31] audit: type=1400 audit(2000000034.640:147): avc: denied { bind } for pid=3892 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 162.905935][ T31] audit: type=1400 audit(2000000034.650:148): avc: denied { listen } for pid=3892 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 162.918584][ T31] audit: type=1400 audit(2000000034.660:149): avc: denied { connect } for pid=3892 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 162.934706][ T31] audit: type=1400 audit(2000000034.680:150): avc: denied { write } for pid=3892 comm="syz-executor.1" path="socket:[3375]" dev="sockfs" ino=3375 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 164.042550][ T31] audit: type=1400 audit(2000000035.790:151): avc: denied { mounton } for pid=3901 comm="syz-executor.1" path="/syzkaller-testdir1231650713/syzkaller.BgJp7O/51/file0" dev="ramfs" ino=3388 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=dir permissive=1 [ 164.046126][ T3902] ======================================================= [ 164.046126][ T3902] WARNING: The mand mount option has been deprecated and [ 164.046126][ T3902] and is ignored by this kernel. Remove the mand [ 164.046126][ T3902] option from the mount to silence this warning. [ 164.046126][ T3902] ======================================================= [ 165.341151][ T3882] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 165.541147][ T3882] usb 2-1: Using ep0 maxpacket: 32 [ 165.553174][ T3882] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 165.553789][ T3882] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 165.554492][ T3882] usb 2-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 165.554804][ T3882] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 165.572205][ T3882] usb 2-1: config 0 descriptor?? [ 165.592648][ T3882] hub 2-1:0.0: USB hub found [ 165.893635][ T3882] hub 2-1:0.0: config failed, can't read hub descriptor (err -90) [ 166.119162][ T3882] usbhid 2-1:0.0: can't add hid device: -71 [ 166.122448][ T3882] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 166.162800][ T3882] usb 2-1: USB disconnect, device number 2 [ 168.522904][ T46] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 168.721700][ T46] usb 2-1: Using ep0 maxpacket: 8 [ 168.759488][ T46] usb 2-1: unable to get BOS descriptor or descriptor too short [ 168.793342][ T46] usb 2-1: config 0 has no interfaces? [ 168.803644][ T46] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 168.804292][ T46] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 168.805114][ T46] usb 2-1: Product: syz [ 168.805316][ T46] usb 2-1: Manufacturer: syz [ 168.805523][ T46] usb 2-1: SerialNumber: syz [ 168.832562][ T46] usb 2-1: config 0 descriptor?? [ 169.065399][ T24] usb 2-1: USB disconnect, device number 3 [ 172.287544][ T3943] loop0: detected capacity change from 0 to 512 [ 172.379145][ T3943] EXT4-fs error (device loop0): ext4_free_branches:1027: inode #11: comm syz-executor.0: invalid indirect mapped block 256 (level 2) [ 172.401448][ T3943] EXT4-fs (loop0): Remounting filesystem read-only [ 172.403032][ T3943] EXT4-fs (loop0): 2 truncates cleaned up [ 172.404422][ T3943] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 172.405095][ T3943] SELinux: (dev loop0, type ext4) getxattr errno 5 [ 172.409862][ T3943] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 175.978708][ T3963] loop1: detected capacity change from 0 to 2048 [ 176.052851][ T3963] loop1: p1 < > p4 [ 176.071084][ T3963] loop1: p4 size 8388608 extends beyond EOD, truncated [ 176.419756][ T31] audit: type=1400 audit(2000000048.160:152): avc: denied { unmount } for pid=3020 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 177.645927][ T31] audit: type=1400 audit(2000000049.390:153): avc: denied { create } for pid=3971 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 178.219222][ T31] audit: type=1400 audit(2000000049.960:154): avc: denied { nlmsg_write } for pid=3992 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 178.519301][ T31] audit: type=1400 audit(2000000050.260:155): avc: denied { mount } for pid=3995 comm="syz-executor.1" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 178.668244][ T31] audit: type=1400 audit(2000000050.410:156): avc: denied { unmount } for pid=3020 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 180.728309][ T4006] syz-executor.1[4006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.728789][ T4006] syz-executor.1[4006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 194.618313][ T4019] loop0: detected capacity change from 0 to 512 [ 194.638832][ T4019] EXT4-fs (loop0): blocks per group (71) and clusters per group (32768) inconsistent [ 195.620910][ T49] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 195.811058][ T49] usb 1-1: Using ep0 maxpacket: 32 [ 195.853996][ T49] usb 1-1: New USB device found, idVendor=1557, idProduct=8150, bcdDevice=29.ed [ 195.854287][ T49] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 195.854658][ T49] usb 1-1: Product: syz [ 195.854763][ T49] usb 1-1: Manufacturer: syz [ 195.854876][ T49] usb 1-1: SerialNumber: syz [ 195.856742][ T49] usb 1-1: config 0 descriptor?? [ 196.516571][ T49] (unnamed net_device) (uninitialized): Assigned a random MAC address: 6a:0b:2e:99:1e:d1 [ 196.532700][ T49] rtl8150 1-1:0.0: eth1: rtl8150 is detected [ 196.544473][ T49] usb 1-1: USB disconnect, device number 2 [ 201.035212][ T31] audit: type=1400 audit(2000000072.780:157): avc: denied { create } for pid=4057 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 205.198329][ T31] audit: type=1400 audit(2000000076.930:158): avc: denied { read } for pid=4097 comm="syz-executor.0" path="socket:[2751]" dev="sockfs" ino=2751 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 207.299815][ T31] audit: type=1400 audit(2000000079.040:159): avc: denied { connect } for pid=4117 comm="syz-executor.0" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 208.974971][ T4136] process 'syz-executor.1' launched './file1' with NULL argv: empty string added [ 217.221285][ T31] audit: type=1400 audit(2000000088.950:160): avc: denied { create } for pid=4171 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 217.265487][ T31] audit: type=1400 audit(2000000089.010:161): avc: denied { write } for pid=4171 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 218.847690][ T31] audit: type=1400 audit(2000000090.590:162): avc: denied { map } for pid=4167 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3659 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 218.849204][ T31] audit: type=1400 audit(2000000090.590:163): avc: denied { read write } for pid=4167 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3659 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 220.671074][ T49] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 220.869145][ T49] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xFF has an invalid bInterval 0, changing to 7 [ 220.869771][ T49] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xFF has invalid wMaxPacketSize 0 [ 220.870199][ T49] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 220.875570][ T49] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 220.876431][ T49] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 220.892223][ T49] usb 2-1: config 0 descriptor?? [ 221.371614][ T49] plantronics 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 221.374359][ T49] plantronics 0003:047F:FFFF.0001: No inputs registered, leaving [ 221.382231][ T49] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 221.656128][ C0] hrtimer: interrupt took 2772672 ns [ 222.712445][ T31] audit: type=1400 audit(2000000094.460:164): avc: denied { bind } for pid=4208 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 223.498718][ T4207] usb 2-1: USB disconnect, device number 4 [ 223.724007][ T4205] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 223.951000][ T4205] usb 1-1: Using ep0 maxpacket: 8 [ 223.966008][ T4205] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 223.966541][ T4205] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 223.966999][ T4205] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 223.967454][ T4205] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 223.968305][ T4205] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 223.969097][ T4205] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 223.969317][ T4205] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 224.232586][ T4205] usb 1-1: usb_control_msg returned -32 [ 224.234215][ T4205] usbtmc 1-1:16.0: can't read capabilities [ 225.644482][ T31] audit: type=1400 audit(2000000097.390:165): avc: denied { bind } for pid=4240 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 228.485102][ T4251] loop1: detected capacity change from 0 to 512 [ 228.609412][ T4251] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 228.621476][ T4251] ext4 filesystem being mounted at /syzkaller-testdir1231650713/syzkaller.BgJp7O/100/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 228.649676][ T31] audit: type=1400 audit(2000000100.390:166): avc: denied { write } for pid=4250 comm="syz-executor.1" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 228.654890][ T31] audit: type=1400 audit(2000000100.390:167): avc: denied { add_name } for pid=4250 comm="syz-executor.1" name="memory.events" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 228.657010][ T31] audit: type=1400 audit(2000000100.390:168): avc: denied { create } for pid=4250 comm="syz-executor.1" name="memory.events" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 228.743405][ T4251] EXT4-fs error (device loop1): ext4_do_update_inode:5075: inode #2: comm syz-executor.1: corrupted inode contents [ 228.758048][ T4251] EXT4-fs error (device loop1): ext4_dirty_inode:5935: inode #2: comm syz-executor.1: mark_inode_dirty error [ 228.766815][ T4251] EXT4-fs error (device loop1): ext4_do_update_inode:5075: inode #2: comm syz-executor.1: corrupted inode contents [ 228.775917][ T4251] EXT4-fs error (device loop1): __ext4_ext_dirty:202: inode #2: comm syz-executor.1: mark_inode_dirty error [ 228.797749][ T31] audit: type=1400 audit(2000000100.540:169): avc: denied { create } for pid=4250 comm="syz-executor.1" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 228.807572][ T31] audit: type=1400 audit(2000000100.550:170): avc: denied { setattr } for pid=4250 comm="syz-executor.1" name="file0" dev="loop1" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 228.920190][ T3020] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 232.506679][ T31] audit: type=1400 audit(2000000104.250:171): avc: denied { create } for pid=4266 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 232.527503][ T4267] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 236.236481][ T3839] usb 1-1: USB disconnect, device number 3 [ 246.103566][ T31] audit: type=1400 audit(2000000117.840:172): avc: denied { write } for pid=4339 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 246.131072][ T31] audit: type=1400 audit(2000000117.850:173): avc: denied { connect } for pid=4339 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 246.132696][ T31] audit: type=1400 audit(2000000117.870:174): avc: denied { name_connect } for pid=4339 comm="syz-executor.1" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 249.172793][ T31] audit: type=1400 audit(2000000120.920:175): avc: denied { create } for pid=4346 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 252.567333][ T31] audit: type=1400 audit(2000000124.310:176): avc: denied { write } for pid=4360 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 253.013311][ T31] audit: type=1400 audit(2000000124.760:177): avc: denied { ioctl } for pid=4366 comm="syz-executor.0" path="socket:[3831]" dev="sockfs" ino=3831 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 253.029244][ T31] audit: type=1400 audit(2000000124.770:178): avc: denied { create } for pid=4366 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 253.453120][ T31] audit: type=1400 audit(2000000125.200:179): avc: denied { read } for pid=4372 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 253.935653][ T31] audit: type=1400 audit(2000000125.680:180): avc: denied { create } for pid=4377 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 253.952500][ T31] audit: type=1400 audit(2000000125.700:181): avc: denied { write } for pid=4377 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 253.956784][ T4378] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=56997 sclass=netlink_tcpdiag_socket pid=4378 comm=syz-executor.0 [ 254.635924][ T31] audit: type=1804 audit(2000000126.380:182): pid=4389 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir664429643/syzkaller.pgmm37/82/file0" dev="vda" ino=698 res=1 errno=0 [ 254.815668][ T31] audit: type=1400 audit(2000000126.560:183): avc: denied { create } for pid=4391 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 255.246641][ T4402] syz-executor.1 uses obsolete (PF_INET,SOCK_PACKET) [ 255.297474][ T4404] SELinux: Context system_u:object_r:admin_passwd_exec_t:s0 is not valid (left unmapped). [ 255.300035][ T31] audit: type=1400 audit(2000000127.040:184): avc: denied { relabelto } for pid=4403 comm="syz-executor.0" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:admin_passwd_exec_t:s0" [ 255.301541][ T31] audit: type=1400 audit(2000000127.040:185): avc: denied { associate } for pid=4403 comm="syz-executor.0" name="vcsu" dev="devtmpfs" ino=14 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:admin_passwd_exec_t:s0" [ 256.793190][ T4441] serio: Serial port pts0 [ 259.016085][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 259.016148][ T31] audit: type=1400 audit(2000000130.760:192): avc: denied { accept } for pid=4461 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 259.513276][ T31] audit: type=1400 audit(2000000131.260:193): avc: denied { audit_write } for pid=4470 comm="syz-executor.1" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 259.692492][ T4476] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 266.038327][ T31] audit: type=1400 audit(2000000137.780:194): avc: denied { mount } for pid=4522 comm="syz-executor.0" name="/" dev="configfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 266.044462][ T31] audit: type=1400 audit(2000000137.790:195): avc: denied { write search } for pid=4522 comm="syz-executor.0" name="/" dev="configfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 266.108623][ T31] audit: type=1400 audit(2000000137.850:196): avc: denied { unmount } for pid=3019 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 268.509502][ T31] audit: type=1400 audit(2000000140.250:197): avc: denied { getopt } for pid=4530 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 268.684968][ T31] audit: type=1400 audit(2000000140.430:198): avc: denied { setopt } for pid=4534 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 269.064413][ T31] audit: type=1400 audit(2000000140.810:199): avc: denied { read } for pid=4541 comm="syz-executor.1" path="socket:[5197]" dev="sockfs" ino=5197 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 269.147978][ T31] audit: type=1400 audit(2000000140.890:200): avc: denied { read } for pid=4544 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 269.413223][ T31] audit: type=1400 audit(2000000141.150:201): avc: denied { append } for pid=4555 comm="syz-executor.1" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 269.692583][ T3994] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 269.901393][ T3994] usb 2-1: Using ep0 maxpacket: 32 [ 269.906854][ T3994] usb 2-1: config index 0 descriptor too short (expected 35577, got 27) [ 269.907361][ T3994] usb 2-1: config 1 has too many interfaces: 92, using maximum allowed: 32 [ 269.907746][ T3994] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 92 [ 269.907956][ T3994] usb 2-1: config 1 has no interface number 0 [ 269.908213][ T3994] usb 2-1: config 1 interface 1 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 269.908460][ T3994] usb 2-1: config 1 interface 1 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 17 [ 269.908788][ T3994] usb 2-1: New USB device found, idVendor=1941, idProduct=5051, bcdDevice=d5.e8 [ 269.909215][ T3994] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 270.149580][ T49] usb 2-1: USB disconnect, device number 5 [ 270.663651][ T31] audit: type=1400 audit(2000000142.410:202): avc: denied { write } for pid=4587 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 272.172914][ T31] audit: type=1400 audit(2000000143.920:203): avc: denied { connect } for pid=4611 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 272.386665][ T4618] loop0: detected capacity change from 0 to 128 [ 272.403879][ T4618] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (39871!=39978) [ 272.416284][ T4618] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 ro without journal. Quota mode: none. [ 272.435635][ T4618] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 272.436311][ T4618] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 272.444422][ T4618] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 272.445691][ T4618] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 272.460048][ T4618] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 272.462747][ T4618] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 272.468106][ T4618] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 272.469593][ T4618] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 272.513450][ T3019] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 272.688834][ T31] audit: type=1400 audit(2000000144.430:204): avc: denied { listen } for pid=4624 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 272.713610][ T31] audit: type=1400 audit(2000000144.460:205): avc: denied { remount } for pid=4624 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 273.446978][ T31] audit: type=1400 audit(2000000145.190:206): avc: denied { name_bind } for pid=4636 comm="syz-executor.0" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 276.055463][ T4640] loop0: detected capacity change from 0 to 128 [ 276.065049][ T4640] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (39871!=39978) [ 276.072031][ T4640] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 ro without journal. Quota mode: none. [ 276.093396][ T4640] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 276.093847][ T4640] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 276.099645][ T4640] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 276.103036][ T4640] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 276.119245][ T4640] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 276.121626][ T4640] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 276.127380][ T4640] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 276.128681][ T4640] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 276.167687][ T3019] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 276.463930][ T31] audit: type=1400 audit(2000000148.210:207): avc: denied { setattr } for pid=4646 comm="syz-executor.0" name="KCM" dev="sockfs" ino=5336 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 277.037156][ T4659] loop0: detected capacity change from 0 to 128 [ 277.049399][ T4659] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (39871!=39978) [ 277.054884][ T4659] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 ro without journal. Quota mode: none. [ 277.075217][ T4659] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 277.076903][ T4659] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 277.084679][ T4659] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 277.085386][ T4659] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 277.098225][ T4659] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 277.099314][ T4659] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 277.106576][ T4659] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 277.107474][ T4659] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 277.173243][ T3019] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 277.626015][ T31] audit: type=1400 audit(2000000149.370:208): avc: denied { read } for pid=4666 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 278.133504][ T31] audit: type=1400 audit(2000000149.880:209): avc: denied { bind } for pid=4666 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 278.137443][ T31] audit: type=1400 audit(2000000149.880:210): avc: denied { node_bind } for pid=4666 comm="syz-executor.0" saddr=100.1.1.0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 278.140070][ T31] audit: type=1400 audit(2000000149.880:211): avc: denied { getopt } for pid=4666 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 278.527236][ T31] audit: type=1400 audit(2000000150.270:212): avc: denied { getopt } for pid=4666 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 278.668456][ T31] audit: type=1400 audit(2000000150.410:213): avc: denied { setopt } for pid=4666 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 280.245833][ T31] audit: type=1400 audit(2000000151.990:214): avc: denied { create } for pid=4678 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 280.254653][ T31] audit: type=1400 audit(2000000152.000:215): avc: denied { bind } for pid=4678 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 280.262007][ T31] audit: type=1400 audit(2000000152.000:216): avc: denied { connect } for pid=4678 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 281.332518][ T31] audit: type=1400 audit(2000000153.080:217): avc: denied { setopt } for pid=4678 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 283.031940][ T31] audit: type=1400 audit(2000000154.780:218): avc: denied { create } for pid=4686 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 283.509719][ T4690] loop0: detected capacity change from 0 to 512 [ 283.526455][ T4690] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a842601c, mo2=0002] [ 283.527163][ T4690] System zones: 1-12 [ 283.535652][ T4690] EXT4-fs error (device loop0): ext4_get_branch:178: inode #13: block 33619980: comm syz-executor.0: invalid block [ 283.537828][ T4690] EXT4-fs error (device loop0): ext4_free_branches:1027: inode #13: comm syz-executor.0: invalid indirect mapped block 1819239214 (level 1) [ 283.543693][ T4690] EXT4-fs error (device loop0): ext4_validate_block_bitmap:440: comm syz-executor.0: bg 0: block 361: padding at end of block bitmap is not set [ 283.547162][ T4690] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6551: Corrupt filesystem [ 283.549254][ T4690] EXT4-fs error (device loop0): ext4_clear_blocks:881: inode #13: comm syz-executor.0: attempt to clear invalid blocks 33619980 len 1 [ 283.551876][ T4690] EXT4-fs error (device loop0): ext4_free_branches:1027: inode #13: comm syz-executor.0: invalid indirect mapped block 1819239214 (level 0) [ 283.555018][ T4690] EXT4-fs (loop0): 1 truncate cleaned up [ 283.555684][ T4690] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 283.567020][ T4690] EXT4-fs error (device loop0): dx_probe:822: inode #2: comm syz-executor.0: Directory hole found for htree index block [ 283.604571][ T3019] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 283.692964][ T31] audit: type=1400 audit(2000000155.440:219): avc: denied { accept } for pid=4686 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 283.712472][ T31] audit: type=1400 audit(2000000155.450:220): avc: denied { connect } for pid=4686 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 286.109852][ T31] audit: type=1400 audit(2000000157.850:221): avc: denied { setattr } for pid=4706 comm="syz-executor.1" name="NETLINK" dev="sockfs" ino=5423 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 289.434509][ T31] audit: type=1400 audit(2000000161.180:222): avc: denied { mount } for pid=4723 comm="syz-executor.1" name="/" dev="bdev" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bdev_t tclass=filesystem permissive=1 [ 289.702587][ T4729] fuse: Unknown parameter 'fQ' [ 290.538783][ T31] audit: type=1400 audit(2000000162.280:223): avc: denied { ioctl } for pid=4743 comm="syz-executor.0" path="socket:[4726]" dev="sockfs" ino=4726 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 290.982279][ T4755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=33022 sclass=netlink_route_socket pid=4755 comm=syz-executor.0 [ 291.007547][ T31] audit: type=1400 audit(2000000162.750:224): avc: denied { setopt } for pid=4754 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 291.013650][ T4755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=4755 comm=syz-executor.0 [ 291.402610][ T4767] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! [ 291.604311][ T4772] loop0: detected capacity change from 0 to 128 [ 291.615224][ T4772] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (39871!=39978) [ 291.621836][ T4772] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 ro without journal. Quota mode: none. [ 291.638362][ T4772] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 291.642580][ T4772] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 291.704053][ T3019] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 294.711020][ T31] audit: type=1400 audit(2000000166.450:225): avc: denied { create } for pid=4811 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 296.362350][ T31] audit: type=1400 audit(2000000168.110:226): avc: denied { ioctl } for pid=4825 comm="syz-executor.1" path="socket:[5615]" dev="sockfs" ino=5615 ioctlcmd=0x5515 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 296.386544][ T31] audit: type=1400 audit(2000000168.130:227): avc: denied { ioctl } for pid=4825 comm="syz-executor.1" path="socket:[5613]" dev="sockfs" ino=5613 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 296.479643][ T31] audit: type=1400 audit(2000000168.220:228): avc: denied { ioctl } for pid=4825 comm="syz-executor.1" path="socket:[5617]" dev="sockfs" ino=5617 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 296.890174][ T31] audit: type=1400 audit(2000000168.630:229): avc: denied { connect } for pid=4835 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 298.815259][ T4853] loop0: detected capacity change from 0 to 512 [ 298.834299][ T4853] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 298.836417][ T31] audit: type=1400 audit(2000000170.580:230): avc: denied { create } for pid=4852 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 298.844583][ T31] audit: type=1400 audit(2000000170.590:231): avc: denied { ioctl } for pid=4852 comm="syz-executor.1" path="socket:[4883]" dev="sockfs" ino=4883 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 299.105677][ T4853] EXT4-fs (loop0): failed to open journal device unknown-block(0,0) -6 [ 299.156204][ T31] audit: type=1400 audit(2000000170.900:232): avc: denied { create } for pid=4851 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 299.346762][ T31] audit: type=1400 audit(2000000171.090:233): avc: denied { write } for pid=4851 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 299.823713][ T31] audit: type=1400 audit(2000000171.570:234): avc: denied { ioctl } for pid=4869 comm="syz-executor.0" path="socket:[5650]" dev="sockfs" ino=5650 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 300.979053][ T4884] serio: Serial port pts0 [ 302.369177][ T31] audit: type=1400 audit(2000000174.110:235): avc: denied { setattr } for pid=4891 comm="syz-executor.0" name="" dev="pipefs" ino=5678 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 302.389077][ T31] audit: type=1400 audit(2000000174.130:236): avc: denied { relabelfrom } for pid=4891 comm="syz-executor.0" name="" dev="pipefs" ino=5678 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 302.391191][ T4892] SELinux: Context system_u:object_r:modem_device_t:s0 is not valid (left unmapped). [ 302.395321][ T31] audit: type=1400 audit(2000000174.140:237): avc: denied { relabelto } for pid=4891 comm="syz-executor.0" name="" dev="pipefs" ino=5678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:modem_device_t:s0" [ 304.747438][ T31] audit: type=1400 audit(2000000176.490:238): avc: denied { create } for pid=4910 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 307.021647][ T4924] loop0: detected capacity change from 0 to 512 [ 307.079588][ T31] audit: type=1400 audit(2000000178.820:239): avc: denied { ioctl } for pid=4923 comm="syz-executor.0" path="socket:[5026]" dev="sockfs" ino=5026 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 308.028631][ T31] audit: type=1400 audit(2000000179.770:240): avc: denied { connect } for pid=4944 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 308.403342][ T4950] loop0: detected capacity change from 0 to 128 [ 308.407883][ T4950] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (39871!=39978) [ 308.415602][ T4950] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 ro without journal. Quota mode: none. [ 308.454074][ T3019] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 309.341198][ T31] audit: type=1400 audit(2000000181.070:241): avc: denied { remount } for pid=4956 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 309.352746][ T31] audit: type=1400 audit(2000000181.100:242): avc: denied { remount } for pid=4956 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 311.246411][ T31] audit: type=1400 audit(2000000182.990:243): avc: denied { mount } for pid=4964 comm="syz-executor.1" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 311.459320][ T4970] loop0: detected capacity change from 0 to 128 [ 311.469581][ T4970] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (39871!=39978) [ 311.478492][ T4970] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 ro without journal. Quota mode: none. [ 311.489461][ T4970] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 311.491606][ T4970] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 311.534076][ T3019] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 311.849850][ C1] net_ratelimit: 1 callbacks suppressed [ 311.850075][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 312.392545][ T31] audit: type=1400 audit(2000000184.140:244): avc: denied { bind } for pid=4986 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 312.423534][ T31] audit: type=1400 audit(2000000184.170:245): avc: denied { getopt } for pid=4986 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 314.748458][ T4995] loop0: detected capacity change from 0 to 1024 [ 314.764517][ T4995] EXT4-fs: Ignoring removed orlov option [ 314.979720][ T31] audit: type=1400 audit(2000000186.720:246): avc: denied { listen } for pid=4998 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 315.100299][ T4995] EXT4-fs (loop0): Test dummy encryption mode enabled [ 315.102211][ T4995] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 315.102523][ T4995] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (12914!=20869) [ 315.107081][ T4995] EXT4-fs (loop0): invalid journal inode [ 315.109291][ T4995] EXT4-fs (loop0): can't get journal size [ 315.120027][ T4995] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 315.174017][ T31] audit: type=1400 audit(2000000186.920:247): avc: denied { write } for pid=5005 comm="syz-executor.1" name="ip_tables_matches" dev="proc" ino=4026532794 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 317.221766][ T3019] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 317.766281][ T31] audit: type=1400 audit(2000000189.510:248): avc: denied { read } for pid=5024 comm="syz-executor.1" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:admin_passwd_exec_t:s0" [ 317.768451][ T31] audit: type=1400 audit(2000000189.510:249): avc: denied { open } for pid=5024 comm="syz-executor.1" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:admin_passwd_exec_t:s0" [ 318.032522][ T5030] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5030 comm=syz-executor.0 [ 318.039833][ T31] audit: type=1400 audit(2000000189.780:250): avc: denied { ioctl } for pid=5029 comm="syz-executor.0" path="socket:[6234]" dev="sockfs" ino=6234 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 318.990061][ T31] audit: type=1400 audit(2000000190.730:251): avc: denied { create } for pid=5041 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 319.078531][ T5044] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65498 sclass=netlink_route_socket pid=5044 comm=syz-executor.0 [ 319.133594][ T31] audit: type=1400 audit(2000000190.870:252): avc: denied { write } for pid=5041 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 319.185092][ T5040] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65498 sclass=netlink_route_socket pid=5040 comm=syz-executor.0 [ 319.205873][ T31] audit: type=1400 audit(2000000190.950:253): avc: denied { read } for pid=5039 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 319.888602][ T31] audit: type=1400 audit(2000000191.630:254): avc: denied { write } for pid=5050 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 322.088388][ T5062] loop1: detected capacity change from 0 to 128 [ 322.092511][ T5062] ext4: Unknown parameter 'euid' [ 323.106260][ T5085] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5085 comm=syz-executor.0 [ 323.109422][ T5085] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=258 sclass=netlink_route_socket pid=5085 comm=syz-executor.0 [ 323.967513][ T31] audit: type=1400 audit(2000000195.710:255): avc: denied { shutdown } for pid=5091 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 324.096620][ T5096] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) [ 324.507318][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 324.530112][ T31] audit: type=1400 audit(2000000196.270:256): avc: denied { ioctl } for pid=5091 comm="syz-executor.1" path="socket:[6327]" dev="sockfs" ino=6327 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 324.796417][ T5111] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5111 comm=syz-executor.0 [ 325.665263][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 326.210059][ T31] audit: type=1400 audit(2000000197.950:257): avc: denied { setopt } for pid=5147 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 327.355736][ T31] audit: type=1400 audit(2000000199.100:258): avc: denied { map } for pid=5170 comm="syz-executor.1" path="/dev/dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 327.357525][ T31] audit: type=1400 audit(2000000199.100:259): avc: denied { execute } for pid=5170 comm="syz-executor.1" path="/dev/dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 327.519119][ T31] audit: type=1400 audit(2000000199.260:260): avc: denied { accept } for pid=5175 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 327.925935][ T31] audit: type=1400 audit(2000000199.670:261): avc: denied { getopt } for pid=5180 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 327.943429][ T31] audit: type=1400 audit(2000000199.690:262): avc: denied { getopt } for pid=5180 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 328.958091][ T5203] can: request_module (can-proto-0) failed. [ 329.646050][ T31] audit: type=1400 audit(2000000201.390:263): avc: denied { ioctl } for pid=5221 comm="syz-executor.0" path="socket:[7177]" dev="sockfs" ino=7177 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 330.294370][ T5232] can: request_module (can-proto-0) failed. [ 331.358955][ T5249] can: request_module (can-proto-0) failed. [ 333.353135][ T5282] can: request_module (can-proto-0) failed. [ 333.458439][ T5287] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5287 comm=syz-executor.0 [ 333.502974][ T5287] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5287 comm=syz-executor.0 [ 333.644485][ T5292] capability: warning: `syz-executor.0' uses deprecated v2 capabilities in a way that may be insecure [ 334.129933][ T5301] can: request_module (can-proto-0) failed. [ 334.295063][ T31] audit: type=1400 audit(2000000206.040:264): avc: denied { nlmsg_tty_audit } for pid=5290 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 334.978104][ T5325] can: request_module (can-proto-0) failed. [ 335.089579][ T31] audit: type=1400 audit(2000000206.830:265): avc: denied { getopt } for pid=5331 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 335.384314][ T5330] fuseblk: Bad value for 'fd' [ 336.687510][ T5362] sctp: [Deprecated]: syz-executor.1 (pid 5362) Use of int in max_burst socket option. [ 336.687510][ T5362] Use struct sctp_assoc_value instead [ 337.205016][ T31] audit: type=1400 audit(2000000208.950:266): avc: denied { setopt } for pid=5361 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 337.646430][ T31] audit: type=1400 audit(2000000209.390:267): avc: denied { setopt } for pid=5364 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 337.789056][ T31] audit: type=1400 audit(2000000209.530:268): avc: denied { sqpoll } for pid=5366 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 337.835468][ T31] audit: type=1400 audit(2000000209.580:269): avc: denied { bind } for pid=5366 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 340.354925][ T31] audit: type=1400 audit(2000000212.100:270): avc: denied { getattr } for pid=5374 comm="syz-executor.0" name="KEY" dev="sockfs" ino=7417 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 344.386940][ T31] audit: type=1400 audit(2000000216.130:271): avc: denied { create } for pid=5398 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 344.480920][ T31] audit: type=1400 audit(2000000216.210:272): avc: denied { write } for pid=5398 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 348.334087][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 348.412087][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 348.513419][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 348.573496][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 349.329668][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 349.393014][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 349.412486][ T11] bond0 (unregistering): Released all slaves [ 349.581758][ T11] hsr_slave_0: left promiscuous mode [ 349.605456][ T11] hsr_slave_1: left promiscuous mode [ 349.620993][ T11] veth1_macvtap: left promiscuous mode [ 349.621569][ T11] veth0_macvtap: left promiscuous mode [ 349.621997][ T11] veth1_vlan: left promiscuous mode [ 349.622416][ T11] veth0_vlan: left promiscuous mode [ 354.087497][ T5434] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 354.126534][ T5434] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 356.855257][ T5434] hsr_slave_0: entered promiscuous mode [ 356.859289][ T5434] hsr_slave_1: entered promiscuous mode [ 356.873543][ T5434] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 356.874123][ T5434] Cannot create hsr debugfs directory [ 358.035125][ T5434] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 358.048238][ T5434] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 358.073667][ T5434] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 358.097330][ T5434] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 360.364393][ T5434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 360.581101][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 361.817989][ T5434] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 364.864199][ T31] audit: type=1400 audit(2000000236.610:273): avc: denied { getopt } for pid=5925 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 365.218881][ T5434] veth0_vlan: entered promiscuous mode [ 365.246561][ T5434] veth1_vlan: entered promiscuous mode [ 365.304347][ T5434] veth0_macvtap: entered promiscuous mode [ 365.319642][ T5434] veth1_macvtap: entered promiscuous mode [ 365.402687][ T5434] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 365.403180][ T5434] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 365.403507][ T5434] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 365.403827][ T5434] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.286481][ T5951] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5951 comm=syz-executor.1 [ 366.462956][ T5955] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5955 comm=syz-executor.1 [ 367.014281][ T5966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5966 comm=syz-executor.1 [ 367.522953][ T5966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5966 comm=syz-executor.1 [ 367.879403][ T5980] dlm: plock device version mismatch: kernel (1.2.0), user (0.0.0) [ 371.166398][ T6028] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2573 sclass=netlink_route_socket pid=6028 comm=syz-executor.0 [ 371.281270][ T31] audit: type=1400 audit(2000000243.020:274): avc: denied { create } for pid=6029 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 372.676717][ T6038] can: request_module (can-proto-0) failed. [ 374.398156][ T6055] can: request_module (can-proto-0) failed. [ 374.662938][ T6034] loop1: detected capacity change from 0 to 32768 [ 375.512721][ T6074] can: request_module (can-proto-0) failed. [ 377.467946][ T31] audit: type=1400 audit(2000000249.210:275): avc: denied { watch } for pid=6118 comm="syz-executor.1" path="/syzkaller-testdir1231650713/syzkaller.BgJp7O/328" dev="vda" ino=686 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 377.486746][ T31] audit: type=1800 audit(2000000249.230:276): pid=6119 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=698 res=0 errno=0 [ 379.651251][ T31] audit: type=1400 audit(2000000251.390:277): avc: denied { mounton } for pid=6173 comm="syz-executor.1" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 379.755367][ T2842] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 379.824848][ T2842] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 379.883859][ T2842] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 379.983248][ T2842] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 380.374619][ T2842] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 380.383583][ T2842] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 380.392011][ T2842] bond0 (unregistering): Released all slaves [ 380.511808][ T2842] hsr_slave_0: left promiscuous mode [ 380.517751][ T2842] hsr_slave_1: left promiscuous mode [ 380.531596][ T2842] veth1_macvtap: left promiscuous mode [ 380.532026][ T2842] veth0_macvtap: left promiscuous mode [ 380.532393][ T2842] veth1_vlan: left promiscuous mode [ 380.532770][ T2842] veth0_vlan: left promiscuous mode [ 382.011042][ T31] audit: type=1400 audit(2000000253.730:278): avc: denied { create } for pid=6284 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 382.281028][ T31] audit: type=1400 audit(2000000254.010:279): avc: denied { lock } for pid=6284 comm="syz-executor.0" path="/dev/vhost-net" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 383.343136][ T6173] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 383.349162][ T6173] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 386.353911][ T6173] hsr_slave_0: entered promiscuous mode [ 386.356765][ T6173] hsr_slave_1: entered promiscuous mode [ 387.906360][ T6173] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 387.925844][ T6173] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 387.937558][ T6173] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 387.959444][ T6173] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 388.183845][ T6562] sctp: [Deprecated]: syz-executor.0 (pid 6562) Use of int in maxseg socket option. [ 388.183845][ T6562] Use struct sctp_assoc_value instead [ 389.592030][ T6173] 8021q: adding VLAN 0 to HW filter on device bond0 [ 393.812212][ T6617] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6617 comm=syz-executor.0 [ 394.985893][ T31] audit: type=1400 audit(2000000266.730:280): avc: denied { remove_name } for pid=2816 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 394.986931][ T31] audit: type=1400 audit(2000000266.730:281): avc: denied { rename } for pid=2816 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 395.497219][ T6173] veth0_vlan: entered promiscuous mode [ 395.522910][ T6173] veth1_vlan: entered promiscuous mode [ 395.601959][ T6173] veth0_macvtap: entered promiscuous mode [ 395.616080][ T6173] veth1_macvtap: entered promiscuous mode [ 395.676820][ T6173] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 395.677101][ T6173] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 395.677345][ T6173] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 395.677522][ T6173] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 395.781448][ T31] audit: type=1400 audit(2000000267.520:282): avc: denied { mount } for pid=6173 comm="syz-executor.1" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 396.111711][ T6660] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=6660 comm=syz-executor.0 [ 398.041379][ T31] audit: type=1400 audit(2000000269.780:283): avc: denied { setopt } for pid=6692 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 399.320474][ T6728] fuse: Unknown parameter 'roo|moee' [ 399.332186][ T6728] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6728 comm=syz-executor.0 [ 401.866268][ T31] audit: type=1804 audit(2000000273.610:284): pid=6750 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir738396479/syzkaller.JCsac4/11/file0" dev="vda" ino=698 res=1 errno=0 [ 402.320035][ T31] audit: type=1400 audit(2000000274.060:285): avc: denied { accept } for pid=6755 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 402.369853][ T6756] SELinux: Context system_u:object_r:lib_t:s0 is not valid (left unmapped). [ 402.375397][ T31] audit: type=1400 audit(2000000274.120:286): avc: denied { relabelto } for pid=6755 comm="syz-executor.1" name="dmmidi1" dev="devtmpfs" ino=793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:lib_t:s0" [ 402.381526][ T31] audit: type=1400 audit(2000000274.120:287): avc: denied { associate } for pid=6755 comm="syz-executor.1" name="dmmidi1" dev="devtmpfs" ino=793 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:lib_t:s0" [ 402.540086][ T31] audit: type=1400 audit(2000000274.280:288): avc: denied { name_connect } for pid=6757 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 403.064256][ T31] audit: type=1400 audit(2000000274.800:289): avc: denied { accept } for pid=6757 comm="syz-executor.1" lport=59707 faddr=::ffff:100.1.1.2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 403.077293][ T31] audit: type=1400 audit(2000000274.810:290): avc: denied { getopt } for pid=6757 comm="syz-executor.1" lport=59707 faddr=::ffff:100.1.1.2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 403.719494][ T31] audit: type=1400 audit(2000000275.460:291): avc: denied { write } for pid=6775 comm="syz-executor.0" path="socket:[9709]" dev="sockfs" ino=9709 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 403.723558][ T6776] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=6776 comm=syz-executor.0 [ 403.731452][ T6776] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6776 comm=syz-executor.0 [ 403.754919][ T6778] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=6778 comm=syz-executor.0 [ 403.759189][ T6778] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6778 comm=syz-executor.0 [ 405.419050][ T6795] fuse: Unknown parameter '' [ 405.443576][ T31] audit: type=1804 audit(2000000277.190:292): pid=6795 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir738396479/syzkaller.JCsac4/17/file0" dev="vda" ino=698 res=1 errno=0 [ 405.489773][ T31] audit: type=1804 audit(2000000277.230:293): pid=6795 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir738396479/syzkaller.JCsac4/17/file0" dev="vda" ino=698 res=1 errno=0 [ 410.012271][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 410.012368][ T31] audit: type=1400 audit(2000000281.750:295): avc: denied { create } for pid=6833 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 410.019177][ T31] audit: type=1400 audit(2000000281.760:296): avc: denied { setopt } for pid=6833 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 410.963080][ T31] audit: type=1400 audit(2000000282.710:297): avc: denied { nlmsg_read } for pid=6837 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 411.096596][ T6849] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6849 comm=syz-executor.0 [ 411.121770][ T31] audit: type=1400 audit(2000000282.870:298): avc: denied { create } for pid=6848 comm="syz-executor.0" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 411.137424][ T31] audit: type=1804 audit(2000000282.880:299): pid=6849 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/syzkaller-testdir3545148065/syzkaller.Xz5Ssv/88/file0" dev="vda" ino=698 res=1 errno=0 [ 411.649448][ T31] audit: type=1400 audit(2000000283.390:300): avc: denied { ioctl } for pid=6856 comm="syz-executor.0" path="socket:[10911]" dev="sockfs" ino=10911 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 413.032266][ T3955] hid-generic 0000:0000:0000.0002: item fetching failed at offset 0/1 [ 413.033347][ T3955] hid-generic 0000:0000:0000.0002: probe with driver hid-generic failed with error -22 [ 413.044216][ T31] audit: type=1400 audit(2000000284.780:301): avc: denied { create } for pid=6885 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 413.218160][ T31] audit: type=1400 audit(2000000284.960:302): avc: denied { ioctl } for pid=6885 comm="syz-executor.0" path="socket:[9939]" dev="sockfs" ino=9939 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 414.078746][ T31] audit: type=1400 audit(2000000285.820:303): avc: denied { getopt } for pid=6899 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 414.099516][ T31] audit: type=1400 audit(2000000285.840:304): avc: denied { accept } for pid=6899 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 415.468913][ T31] audit: type=1400 audit(2000000287.210:305): avc: denied { bind } for pid=6910 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 415.531490][ T31] audit: type=1400 audit(2000000287.270:306): avc: denied { write } for pid=6910 comm="syz-executor.0" path="socket:[9979]" dev="sockfs" ino=9979 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 417.125736][ T31] audit: type=1400 audit(2000000288.870:307): avc: denied { create } for pid=6925 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 417.946788][ T6937] random: crng reseeded on system resumption [ 418.586050][ T6946] loop1: detected capacity change from 0 to 128 [ 418.621892][ T6946] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (39871!=39978) [ 418.625297][ T6946] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 ro without journal. Quota mode: none. [ 418.861288][ T6938] EXT4-fs warning (device loop1): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.1: No space for directory leaf checksum. Please run e2fsck -D. [ 418.863222][ T6938] EXT4-fs error (device loop1): __ext4_find_entry:1693: inode #2: comm syz-executor.1: checksumming directory block 0 [ 418.872345][ T6938] EXT4-fs warning (device loop1): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.1: No space for directory leaf checksum. Please run e2fsck -D. [ 418.873144][ T6938] EXT4-fs error (device loop1): __ext4_find_entry:1693: inode #2: comm syz-executor.1: checksumming directory block 0 [ 418.966778][ T6173] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 419.679869][ T6960] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6960 comm=syz-executor.0 [ 419.692028][ T6958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6958 comm=syz-executor.0 [ 420.131650][ T31] audit: type=1400 audit(2000000291.870:308): avc: denied { listen } for pid=6963 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 420.624101][ T31] audit: type=1400 audit(2000000292.370:309): avc: denied { listen } for pid=6969 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 421.396477][ T31] audit: type=1804 audit(2000000293.140:310): pid=6975 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir3545148065/syzkaller.Xz5Ssv/111/file0" dev="vda" ino=697 res=1 errno=0 [ 422.109240][ T31] audit: type=1400 audit(2000000293.850:311): avc: denied { ioctl } for pid=6987 comm="syz-executor.1" path="socket:[10096]" dev="sockfs" ino=10096 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 422.406873][ T6988] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 422.980998][ T31] audit: type=1400 audit(2000000294.720:312): avc: denied { read } for pid=7000 comm="syz-executor.1" path="socket:[11092]" dev="sockfs" ino=11092 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 424.757621][ T31] audit: type=1400 audit(2000000296.500:313): avc: denied { accept } for pid=7018 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 428.366868][ T7037] loop1: detected capacity change from 0 to 1024 [ 428.378166][ T7037] EXT4-fs: Ignoring removed orlov option [ 428.386202][ T7037] EXT4-fs (loop1): Test dummy encryption mode enabled [ 428.387699][ T7037] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 428.388143][ T7037] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (12914!=20869) [ 428.398001][ T7037] EXT4-fs (loop1): invalid journal inode [ 428.405625][ T7037] EXT4-fs (loop1): can't get journal size [ 428.413616][ T7037] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 428.472372][ T6173] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 430.634413][ T31] audit: type=1804 audit(2000000302.380:314): pid=6984 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/syzkaller-testdir3545148065/syzkaller.Xz5Ssv/114/.log" dev="vda" ino=698 res=1 errno=0 [ 431.942890][ T7069] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2304 sclass=netlink_xfrm_socket pid=7069 comm=syz-executor.1 [ 432.277483][ T31] audit: type=1400 audit(2000000304.020:315): avc: denied { accept } for pid=7068 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 432.639825][ T31] audit: type=1400 audit(2000000304.380:316): avc: denied { ioctl } for pid=7085 comm="syz-executor.1" path="socket:[11302]" dev="sockfs" ino=11302 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 433.473029][ T7096] loop0: detected capacity change from 0 to 1024 [ 433.492136][ T7096] EXT4-fs: Ignoring removed orlov option [ 433.497534][ T7096] EXT4-fs (loop0): Test dummy encryption mode enabled [ 433.503811][ T7096] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 433.504411][ T7096] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (12914!=20869) [ 433.519287][ T7096] EXT4-fs (loop0): invalid journal inode [ 433.524937][ T7096] EXT4-fs (loop0): can't get journal size [ 433.537346][ T7096] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 433.587517][ T5434] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 434.754733][ T7110] fscrypt (vda, inode 699): Unsupported encryption modes (contents 0, filenames 0) [ 437.761357][ T31] audit: type=1400 audit(2000000309.500:317): avc: denied { setattr } for pid=7126 comm="syz-executor.1" name="KEY" dev="sockfs" ino=11373 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 437.919731][ T7133] vlan0: entered promiscuous mode [ 440.081924][ T7132] vlan0: left promiscuous mode [ 440.704292][ T31] audit: type=1400 audit(2000000312.450:318): avc: denied { bind } for pid=7150 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 441.381128][ T31] audit: type=1400 audit(2000000313.120:319): avc: denied { setopt } for pid=7153 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 441.567195][ T31] audit: type=1400 audit(2000000313.310:320): avc: denied { write } for pid=7153 comm="syz-executor.1" path="socket:[12372]" dev="sockfs" ino=12372 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 443.485470][ T31] audit: type=1800 audit(2000000315.230:321): pid=7163 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="vda" ino=698 res=0 errno=0 [ 446.571310][ T7182] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=31 sclass=netlink_route_socket pid=7182 comm=syz-executor.1 [ 446.586029][ T7182] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7182 comm=syz-executor.1 [ 446.711418][ T7186] loop1: detected capacity change from 0 to 512 [ 446.724121][ T7186] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a842601c, mo2=0002] [ 446.724800][ T7186] System zones: 1-12 [ 446.729061][ T7186] EXT4-fs error (device loop1): ext4_get_branch:178: inode #13: block 33619980: comm syz-executor.1: invalid block [ 446.731833][ T7186] EXT4-fs error (device loop1): ext4_free_branches:1027: inode #13: comm syz-executor.1: invalid indirect mapped block 1819239214 (level 1) [ 446.738957][ T7186] EXT4-fs error (device loop1): ext4_validate_block_bitmap:440: comm syz-executor.1: bg 0: block 361: padding at end of block bitmap is not set [ 446.749332][ T7186] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6551: Corrupt filesystem [ 446.753618][ T7186] EXT4-fs error (device loop1): ext4_clear_blocks:881: inode #13: comm syz-executor.1: attempt to clear invalid blocks 33619980 len 1 [ 446.757246][ T7186] EXT4-fs error (device loop1): ext4_free_branches:1027: inode #13: comm syz-executor.1: invalid indirect mapped block 1819239214 (level 0) [ 446.760841][ T7186] EXT4-fs (loop1): 1 truncate cleaned up [ 446.762057][ T7186] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 446.769766][ T7186] EXT4-fs error (device loop1): dx_probe:822: inode #2: comm syz-executor.1: Directory hole found for htree index block [ 446.787193][ T7186] EXT4-fs error (device loop1): dx_probe:822: inode #2: comm syz-executor.1: Directory hole found for htree index block [ 446.826344][ T6173] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 446.951102][ T31] audit: type=1804 audit(2000000318.690:322): pid=7192 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir738396479/syzkaller.JCsac4/86/file1" dev="vda" ino=698 res=1 errno=0 [ 446.962239][ T31] audit: type=1804 audit(2000000318.710:323): pid=7192 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/syzkaller-testdir738396479/syzkaller.JCsac4/86/file1" dev="vda" ino=698 res=1 errno=0 [ 446.971381][ T31] audit: type=1804 audit(2000000318.710:324): pid=7192 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/syzkaller-testdir738396479/syzkaller.JCsac4/86/file1" dev="vda" ino=698 res=1 errno=0 [ 448.522754][ T31] audit: type=1400 audit(2000000320.260:325): avc: denied { write } for pid=7198 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 450.037533][ T31] audit: type=1400 audit(2000000321.780:326): avc: denied { create } for pid=7210 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 452.763801][ T31] audit: type=1400 audit(2000000324.510:327): avc: denied { wake_alarm } for pid=7229 comm="syz-executor.1" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 455.028268][ T31] audit: type=1400 audit(2000000326.770:328): avc: denied { map } for pid=7258 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11573 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 455.029282][ T31] audit: type=1400 audit(2000000326.770:329): avc: denied { read write } for pid=7258 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11573 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 455.810945][ T31] audit: type=1400 audit(2000000327.550:330): avc: denied { setattr } for pid=7269 comm="syz-executor.0" name="RAW" dev="sockfs" ino=12593 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 456.027840][ T31] audit: type=1400 audit(2000000327.770:331): avc: denied { ioctl } for pid=7274 comm="syz-executor.0" path="socket:[11596]" dev="sockfs" ino=11596 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 456.170152][ T7285] fuse: Bad value for 'fd' [ 457.935693][ T31] audit: type=1400 audit(2000000329.680:332): avc: denied { append } for pid=7293 comm="syz-executor.0" name="nullb0" dev="devtmpfs" ino=669 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 459.137209][ T7313] loop0: detected capacity change from 0 to 1024 [ 459.142038][ T7313] EXT4-fs: Ignoring removed orlov option [ 459.146898][ T7313] EXT4-fs (loop0): Test dummy encryption mode enabled [ 459.148428][ T7313] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 459.148980][ T7313] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (12914!=20869) [ 459.157193][ T7313] EXT4-fs (loop0): invalid journal inode [ 459.157866][ T7313] EXT4-fs (loop0): can't get journal size [ 459.167972][ T7313] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 459.215133][ T5434] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 462.774317][ T31] audit: type=1400 audit(2000000334.520:333): avc: denied { ioctl } for pid=7341 comm="syz-executor.0" path="socket:[11673]" dev="sockfs" ino=11673 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 466.601317][ T31] audit: type=1400 audit(2000000338.340:334): avc: denied { accept } for pid=7392 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 467.289600][ T31] audit: type=1400 audit(2000000339.030:335): avc: denied { create } for pid=7406 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 467.582160][ T4148] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 467.767385][ T4148] usb 2-1: config 0 has no interfaces? [ 467.770840][ T4148] usb 2-1: New USB device found, idVendor=044e, idProduct=120b, bcdDevice= 0.00 [ 467.771065][ T4148] usb 2-1: New USB device strings: Mfr=0, Product=18, SerialNumber=0 [ 467.771199][ T4148] usb 2-1: Product: syz [ 467.774226][ T4148] usb 2-1: config 0 descriptor?? [ 467.989583][ T7407] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 467.992751][ T7407] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 468.040665][ T4148] usb 2-1: USB disconnect, device number 6 [ 470.777061][ T7443] loop0: detected capacity change from 0 to 128 [ 470.817780][ T7443] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (39871!=39978) [ 470.951313][ T7443] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 ro without journal. Quota mode: none. [ 471.075311][ T7442] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 471.076036][ T7442] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 471.297794][ T5434] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 474.831743][ T7467] sctp: [Deprecated]: syz-executor.0 (pid 7467) Use of struct sctp_assoc_value in delayed_ack socket option. [ 474.831743][ T7467] Use struct sctp_sack_info instead [ 475.017473][ T31] audit: type=1400 audit(2000000346.760:336): avc: denied { map } for pid=7470 comm="syz-executor.1" path="socket:[12837]" dev="sockfs" ino=12837 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 475.252287][ T7473] "syz-executor.1" (7473) uses obsolete ecb(arc4) skcipher [ 476.054892][ T31] audit: type=1400 audit(2000000347.800:337): avc: denied { setopt } for pid=7536 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 476.136003][ T31] audit: type=1400 audit(2000000347.880:338): avc: denied { setattr } for pid=7537 comm="syz-executor.1" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 478.714618][ T31] audit: type=1400 audit(2000000350.460:339): avc: denied { write } for pid=7548 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 478.717703][ T31] audit: type=1400 audit(2000000350.460:340): avc: denied { remove_name } for pid=7548 comm="syz-executor.0" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 478.719315][ T31] audit: type=1400 audit(2000000350.460:341): avc: denied { unlink } for pid=7548 comm="syz-executor.0" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 479.358124][ T7562] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7562 comm=syz-executor.1 [ 479.399557][ T31] audit: type=1400 audit(2000000351.140:342): avc: denied { ioctl } for pid=7561 comm="syz-executor.1" path="/dev/binderfs/binder1" dev="binder" ino=5 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 489.418476][ T31] audit: type=1400 audit(2000000361.160:343): avc: denied { connect } for pid=7627 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 489.429347][ T31] audit: type=1400 audit(2000000361.170:344): avc: denied { listen } for pid=7627 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 489.703326][ T7629] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7629 comm=syz-executor.1 [ 492.158464][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 492.198309][ T31] audit: type=1400 audit(2000000363.940:345): avc: denied { ioctl } for pid=7644 comm="syz-executor.1" path="socket:[13100]" dev="sockfs" ino=13100 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 493.996780][ T7666] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7666 comm=syz-executor.0 [ 499.851421][ T31] audit: type=1400 audit(2000000371.590:346): avc: denied { bind } for pid=7681 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 499.852530][ T31] audit: type=1400 audit(2000000371.590:347): avc: denied { name_bind } for pid=7681 comm="syz-executor.0" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 499.853225][ T31] audit: type=1400 audit(2000000371.590:348): avc: denied { node_bind } for pid=7681 comm="syz-executor.0" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 499.949838][ T31] audit: type=1400 audit(2000000371.690:349): avc: denied { mount } for pid=7681 comm="syz-executor.0" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 501.258350][ T7690] loop0: detected capacity change from 0 to 128 [ 501.282749][ T7690] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (39871!=39978) [ 501.292825][ T7690] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 ro without journal. Quota mode: none. [ 501.320972][ T7690] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 501.321869][ T7690] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 501.361633][ T5434] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 505.874430][ T7723] loop1: detected capacity change from 0 to 1024 [ 505.878077][ T7723] EXT4-fs: Ignoring removed orlov option [ 505.878794][ T7723] journal_path: Lookup failure for 'éq‰Y’3aK' [ 505.879422][ T7723] EXT4-fs: error: could not find journal device path [ 508.278363][ T31] audit: type=1400 audit(2000000380.020:350): avc: denied { watch } for pid=7739 comm="syz-executor.0" path="/syzkaller-testdir3545148065/syzkaller.Xz5Ssv/226/file0" dev="vda" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 508.746191][ T31] audit: type=1400 audit(2000000380.490:351): avc: denied { read write } for pid=6173 comm="syz-executor.1" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 508.747554][ T31] audit: type=1400 audit(2000000380.490:352): avc: denied { open } for pid=6173 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 508.748702][ T31] audit: type=1400 audit(2000000380.490:353): avc: denied { ioctl } for pid=6173 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 510.334139][ T7748] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2305 sclass=netlink_tcpdiag_socket pid=7748 comm=syz-executor.0 [ 511.398441][ T31] audit: type=1400 audit(2000000383.140:354): avc: denied { ioctl } for pid=7757 comm="syz-executor.1" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14342 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 512.965410][ T7767] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. [ 512.983615][ T31] audit: type=1400 audit(2000000384.730:355): avc: denied { module_request } for pid=7747 comm="syz-executor.0" kmod="net-pf-16-proto-16-family-IPVS" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 514.170029][ T7771] loop0: detected capacity change from 0 to 128 [ 514.186915][ T7771] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (39871!=39978) [ 514.195082][ T7771] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 ro without journal. Quota mode: none. [ 514.481978][ T31] audit: type=1400 audit(2000000386.230:356): avc: denied { lock } for pid=7776 comm="syz-executor.1" path="socket:[13362]" dev="sockfs" ino=13362 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 517.395235][ T31] audit: type=1400 audit(2000000389.140:357): avc: denied { unmount } for pid=6173 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 517.630891][ T31] audit: type=1400 audit(2000000389.380:358): avc: denied { getopt } for pid=7784 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 519.462534][ T3692] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 519.714172][ T3692] usb 2-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 519.716648][ T3692] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 519.835532][ T3692] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 519.841002][ T3692] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 519.841773][ T3692] usb 2-1: Product: syz [ 519.843000][ T3692] usb 2-1: Manufacturer: syz [ 519.844140][ T3692] usb 2-1: SerialNumber: syz [ 520.565401][ T3692] usb 2-1: 0:2 : does not exist [ 520.606783][ T3692] usb 2-1: USB disconnect, device number 7 [ 522.521078][ T4182] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 522.701420][ T4182] usb 2-1: Using ep0 maxpacket: 8 [ 522.733307][ T4182] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 522.734016][ T4182] usb 2-1: New USB device found, idVendor=046d, idProduct=0892, bcdDevice=6d.2a [ 522.734430][ T4182] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 522.739243][ T4182] usb 2-1: config 0 descriptor?? [ 524.904972][ T5434] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 525.391122][ T3692] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 525.571823][ T3692] usb 1-1: Using ep0 maxpacket: 8 [ 525.591844][ T3692] usb 1-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice=1e.8d [ 525.592417][ T3692] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 525.598157][ T3692] usb 1-1: config 0 descriptor?? [ 532.967762][ T4132] usb 2-1: USB disconnect, device number 8 [ 534.537880][ T31] audit: type=1400 audit(2000000406.280:359): avc: denied { getopt } for pid=7865 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 535.372010][ T3692] usb 1-1: USB disconnect, device number 4 [ 540.181420][ T31] audit: type=1800 audit(2000000411.920:360): pid=7886 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz-executor.0" name="file1" dev="vda" ino=698 res=0 errno=0 [ 546.161523][ T3955] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 546.391017][ T3955] usb 1-1: Using ep0 maxpacket: 32 [ 546.435125][ T3955] usb 1-1: unable to get BOS descriptor or descriptor too short [ 546.463516][ T3955] usb 1-1: config 0 has no interfaces? [ 546.492794][ T3955] usb 1-1: language id specifier not provided by device, defaulting to English [ 546.497783][ T3955] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 546.498898][ T3955] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 546.499098][ T3955] usb 1-1: Product: syz [ 546.499193][ T3955] usb 1-1: Manufacturer: syz [ 546.499287][ T3955] usb 1-1: SerialNumber: syz [ 546.519007][ T3955] usb 1-1: config 0 descriptor?? [ 546.744629][ T4148] usb 1-1: USB disconnect, device number 5 [ 548.821367][ T3955] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 549.023937][ T3955] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 549.028080][ T3955] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 549.030106][ T3955] usb 1-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 549.038817][ T3955] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 549.063623][ T3955] usb 1-1: config 0 descriptor?? [ 549.985753][ T3955] usb 1-1: string descriptor 0 read error: -71 [ 549.986838][ T3955] uclogic 0003:256C:006D.0003: failed retrieving string descriptor #200: -71 [ 549.987473][ T3955] uclogic 0003:256C:006D.0003: failed retrieving pen parameters: -71 [ 549.987785][ T3955] uclogic 0003:256C:006D.0003: failed probing pen v2 parameters: -71 [ 549.988743][ T3955] uclogic 0003:256C:006D.0003: failed probing parameters: -71 [ 549.989149][ T3955] uclogic 0003:256C:006D.0003: probe with driver uclogic failed with error -71 [ 549.997074][ T3955] usb 1-1: USB disconnect, device number 6 [ 562.200770][ T49] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 562.470594][ T49] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 562.471380][ T49] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 562.471789][ T49] usb 2-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 562.472217][ T49] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 562.497526][ T49] usb 2-1: config 0 descriptor?? [ 563.411122][ T49] usb 2-1: string descriptor 0 read error: -71 [ 563.414221][ T49] uclogic 0003:256C:006D.0004: failed retrieving string descriptor #200: -71 [ 563.414972][ T49] uclogic 0003:256C:006D.0004: failed retrieving pen parameters: -71 [ 563.415705][ T49] uclogic 0003:256C:006D.0004: failed probing pen v2 parameters: -71 [ 563.416132][ T49] uclogic 0003:256C:006D.0004: failed probing parameters: -71 [ 563.416792][ T49] uclogic 0003:256C:006D.0004: probe with driver uclogic failed with error -71 [ 563.438596][ T49] usb 2-1: USB disconnect, device number 9 [ 565.165062][ T8001] pim6reg1: entered promiscuous mode [ 565.165667][ T8001] pim6reg1: entered allmulticast mode [ 567.377396][ T8014] syzkaller0: entered promiscuous mode [ 567.378416][ T8014] syzkaller0: entered allmulticast mode [ 567.414918][ T31] audit: type=1400 audit(2000000439.160:361): avc: denied { relabelfrom } for pid=8013 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 567.415748][ T31] audit: type=1400 audit(2000000439.160:362): avc: denied { relabelto } for pid=8013 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 568.264239][ T31] audit: type=1400 audit(2000000440.000:363): avc: denied { name_bind } for pid=8024 comm="syz-executor.1" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 573.845474][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 576.524680][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 595.471222][ T4182] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 595.661125][ T4182] usb 1-1: Using ep0 maxpacket: 32 [ 595.689085][ T4182] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 595.690107][ T4182] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 9886, setting to 1024 [ 595.690560][ T4182] usb 1-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 595.690869][ T4182] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 595.702150][ T4182] usb 1-1: config 0 descriptor?? [ 595.728394][ T8125] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 595.735794][ T4182] hub 1-1:0.0: USB hub found [ 595.958470][ T4182] hub 1-1:0.0: 1 port detected [ 596.763402][ T4182] usb 1-1: reset high-speed USB device number 7 using dummy_hcd [ 597.653834][ T4299] usb 1-1: USB disconnect, device number 7 [ 603.133781][ T8159] loop0: detected capacity change from 0 to 1024 [ 605.591304][ T8169] loop1: detected capacity change from 0 to 2048 [ 606.075060][ T8169] loop1: unable to read partition table [ 606.075467][ T8169] loop1: partition table beyond EOD, truncated [ 606.075787][ T8169] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 607.473197][ T31] audit: type=1400 audit(2000000479.220:364): avc: denied { write } for pid=8179 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 608.342146][ T8183] loop0: detected capacity change from 0 to 2048 [ 610.922000][ T8220] loop0: detected capacity change from 0 to 512 [ 612.702840][ T31] audit: type=1400 audit(2000000484.450:365): avc: denied { write } for pid=8188 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 612.835592][ T31] audit: type=1400 audit(2000000484.580:366): avc: denied { read } for pid=8188 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 614.841077][ T31] audit: type=1400 audit(2000000486.580:367): avc: denied { set_context_mgr } for pid=8240 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 614.854985][ T31] audit: type=1400 audit(2000000486.600:368): avc: denied { map } for pid=8240 comm="syz-executor.1" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 614.877754][ T31] audit: type=1400 audit(2000000486.620:369): avc: denied { call } for pid=8240 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 619.685366][ T8261] trusted_key: syz-executor.1 sent an empty control message without MSG_MORE. [ 636.022610][ T8298] syzkaller0: entered allmulticast mode [ 638.291022][ T49] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 638.470797][ T49] usb 1-1: Using ep0 maxpacket: 32 [ 638.504220][ T49] usb 1-1: config 0 has an invalid interface number: 60 but max is 1 [ 638.505585][ T49] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 638.506020][ T49] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 2 [ 638.506363][ T49] usb 1-1: config 0 has no interface number 0 [ 638.535417][ T49] usb 1-1: New USB device found, idVendor=1235, idProduct=0010, bcdDevice=5b.95 [ 638.535982][ T49] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 638.536410][ T49] usb 1-1: Product: syz [ 638.536614][ T49] usb 1-1: Manufacturer: syz [ 638.536827][ T49] usb 1-1: SerialNumber: syz [ 638.568283][ T49] usb 1-1: config 0 descriptor?? [ 638.791484][ T49] usb 1-1: USB disconnect, device number 8 [ 640.666848][ T31] audit: type=1400 audit(2000000512.410:370): avc: denied { block_suspend } for pid=8325 comm="syz-executor.0" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 642.211737][ T31] audit: type=1326 audit(2000000513.950:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8338 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=40000028 syscall=240 compat=0 ip=0x51580 code=0x0 [ 644.957552][ T31] audit: type=1326 audit(2000000516.690:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8346 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=40000028 syscall=240 compat=0 ip=0x51580 code=0x7ffc0000 [ 644.988746][ T31] audit: type=1326 audit(2000000516.730:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8346 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=40000028 syscall=132 compat=0 ip=0x51580 code=0x7ffc0000 [ 644.989758][ T31] audit: type=1326 audit(2000000516.730:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8346 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=40000028 syscall=240 compat=0 ip=0x51580 code=0x7ffc0000 [ 645.004069][ T31] audit: type=1326 audit(2000000516.750:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8346 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=40000028 syscall=386 compat=0 ip=0x51580 code=0x7ffc0000 [ 645.005403][ T31] audit: type=1326 audit(2000000516.750:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8346 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=40000028 syscall=240 compat=0 ip=0x51580 code=0x7ffc0000 [ 645.017144][ T31] audit: type=1326 audit(2000000516.760:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8346 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=40000028 syscall=386 compat=0 ip=0x51580 code=0x7ffc0000 [ 645.056783][ T31] audit: type=1326 audit(2000000516.800:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8346 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=40000028 syscall=240 compat=0 ip=0x51580 code=0x7ffc0000 [ 645.059172][ T31] audit: type=1326 audit(2000000516.800:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8346 comm="syz-executor.1" exe="/syz-executor.1" sig=0 arch=40000028 syscall=240 compat=0 ip=0x51580 code=0x7ffc0000 [ 646.031161][ T8343] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 646.220653][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 646.220715][ T31] audit: type=1326 audit(2000000517.960:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8345 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=40000028 syscall=240 compat=0 ip=0x51580 code=0x7ffc0000 [ 646.277448][ T31] audit: type=1326 audit(2000000518.020:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8345 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=40000028 syscall=386 compat=0 ip=0x51580 code=0x7ffc0000 [ 646.295622][ T31] audit: type=1326 audit(2000000518.040:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8345 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=40000028 syscall=240 compat=0 ip=0x51580 code=0x7ffc0000 [ 646.299985][ T8343] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 646.301423][ T31] audit: type=1326 audit(2000000518.040:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8345 comm="syz-executor.0" exe="/syz-executor.0" sig=0 arch=40000028 syscall=240 compat=0 ip=0x51580 code=0x7ffc0000 [ 646.370792][ T8343] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 646.371399][ T8343] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 646.371708][ T8343] usb 2-1: Product: syz [ 646.372209][ T8343] usb 2-1: Manufacturer: syz [ 646.372392][ T8343] usb 2-1: SerialNumber: syz [ 647.567656][ T8343] cdc_ncm 2-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 647.569378][ T8343] cdc_ncm 2-1:1.0: dwNtbInMaxSize=0 is too small. Using 2048 [ 647.570047][ T8343] cdc_ncm 2-1:1.0: setting rx_max = 2048 [ 647.801431][ T8343] cdc_ncm 2-1:1.0: setting tx_max = 184 [ 647.807127][ T8343] cdc_ncm 2-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.1-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 647.828268][ T8343] usb 2-1: USB disconnect, device number 10 [ 647.833966][ T8343] cdc_ncm 2-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.1-1, CDC NCM (NO ZLP) [ 647.896621][ T8343] ------------[ cut here ]------------ [ 647.897383][ T8343] WARNING: CPU: 0 PID: 8343 at lib/debugobjects.c:514 debug_print_object+0xc4/0xd8 [ 647.898568][ T8343] ODEBUG: free active (active state 0) object: 84d5cfac object type: work_struct hint: usbnet_deferred_kevent+0x0/0x388 [ 647.902127][ T8343] Modules linked in: [ 647.903360][ T8343] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 647.904360][ T8343] CPU: 0 PID: 8343 Comm: kworker/0:2 Not tainted 6.10.0-rc1-syzkaller #0 [ 647.904776][ T8343] Hardware name: ARM-Versatile Express [ 647.905209][ T8343] Workqueue: usb_hub_wq hub_event [ 647.905783][ T8343] Call trace: [ 647.906285][ T8343] [<818d3698>] (dump_backtrace) from [<818d3794>] (show_stack+0x18/0x1c) [ 647.906873][ T8343] r7:00000000 r6:82622d44 r5:00000000 r4:81fe11d0 [ 647.907262][ T8343] [<818d377c>] (show_stack) from [<818f0da4>] (dump_stack_lvl+0x54/0x7c) [ 647.907738][ T8343] [<818f0d50>] (dump_stack_lvl) from [<818f0de4>] (dump_stack+0x18/0x1c) [ 647.908101][ T8343] r5:00000000 r4:8285fd18 [ 647.908359][ T8343] [<818f0dcc>] (dump_stack) from [<818d423c>] (panic+0x120/0x358) [ 647.908790][ T8343] [<818d411c>] (panic) from [<80243dcc>] (print_tainted+0x0/0xa0) [ 647.909096][ T8343] r3:8260c5c4 r2:00000001 r1:81fc9e40 r0:81fd1a90 [ 647.909349][ T8343] r7:8082725c [ 647.909510][ T8343] [<80243d58>] (check_panic_on_warn) from [<80243fc0>] (__warn+0x7c/0x180) [ 647.909839][ T8343] [<80243f44>] (__warn) from [<802442ac>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 647.910180][ T8343] r8:00000009 r7:8202fb80 r6:dfc7da7c r5:8477c800 r4:00000000 [ 647.910971][ T8343] [<802440c8>] (warn_slowpath_fmt) from [<8082725c>] (debug_print_object+0xc4/0xd8) [ 647.911687][ T8343] r10:00000005 r9:84d5c800 r8:81a02b44 r7:82058bf4 r6:828c3694 r5:dfc7db24 [ 647.912109][ T8343] r4:8260cda8 [ 647.912320][ T8343] [<80827198>] (debug_print_object) from [<80828afc>] (debug_check_no_obj_freed+0x254/0x2a0) [ 647.912799][ T8343] r8:84d5d000 r7:84d5cfac r6:00000100 r5:00000003 r4:00000000 [ 647.913155][ T8343] [<808288a8>] (debug_check_no_obj_freed) from [<804bb30c>] (kfree+0x1a0/0x340) [ 647.913655][ T8343] r10:827787f0 r9:84335480 r8:84d5c800 r7:80461630 r6:82c023c0 r5:ddea7060 [ 647.914008][ T8343] r4:84d5c800 [ 647.914165][ T8343] [<804bb16c>] (kfree) from [<80461630>] (kvfree+0x2c/0x30) [ 647.914575][ T8343] r10:827787f0 r9:84335480 r8:84d5c800 r7:00000000 r6:846dab40 r5:850c0c00 [ 647.914952][ T8343] r4:84d5c800 [ 647.915243][ T8343] [<80461604>] (kvfree) from [<8140952c>] (netdev_freemem+0x1c/0x20) [ 647.915643][ T8343] r5:850c0c00 r4:84d5c800 [ 647.915891][ T8343] [<81409510>] (netdev_freemem) from [<81444df4>] (netdev_release+0x2c/0x34) [ 647.916364][ T8343] [<81444dc8>] (netdev_release) from [<80a6019c>] (device_release+0x38/0xa8) [ 647.916938][ T8343] r5:850c0c00 r4:84d5cbb8 [ 647.917169][ T8343] [<80a60164>] (device_release) from [<818ad514>] (kobject_put+0xc8/0x1f8) [ 647.917631][ T8343] r5:81b4980c r4:84d5cbb8 [ 647.917953][ T8343] [<818ad44c>] (kobject_put) from [<80a603c8>] (put_device+0x18/0x1c) [ 647.918454][ T8343] r7:84334400 r6:84d5c90c r5:84d5c800 r4:00000000 [ 647.918772][ T8343] [<80a603b0>] (put_device) from [<813fa6c0>] (free_netdev+0x10c/0x18c) [ 647.919102][ T8343] [<813fa5b4>] (free_netdev) from [<80d33960>] (usbnet_disconnect+0xac/0xf0) [ 647.919547][ T8343] r6:84d5cf74 r5:84d5ce60 r4:00000000 [ 647.919869][ T8343] [<80d338b4>] (usbnet_disconnect) from [<80d92760>] (usb_unbind_interface+0x84/0x2c4) [ 647.920678][ T8343] r8:00000044 r7:84334430 r6:827787f0 r5:00000000 r4:84334400 [ 647.921198][ T8343] [<80d926dc>] (usb_unbind_interface) from [<80a6828c>] (device_remove+0x64/0x6c) [ 647.921606][ T8343] r10:00000000 r9:84335480 r8:00000044 r7:84334474 r6:827787f0 r5:00000000 [ 647.922033][ T8343] r4:84334430 [ 647.922185][ T8343] [<80a68228>] (device_remove) from [<80a697a4>] (device_release_driver_internal+0x18c/0x200) [ 647.922624][ T8343] r5:00000000 r4:84334430 [ 647.922894][ T8343] [<80a69618>] (device_release_driver_internal) from [<80a69830>] (device_release_driver+0x18/0x1c) [ 647.923437][ T8343] r9:84335480 r8:82f52b40 r7:82f52b38 r6:82f52b0c r5:84334430 r4:82f52b30 [ 647.923799][ T8343] [<80a69818>] (device_release_driver) from [<80a67914>] (bus_remove_device+0xcc/0x120) [ 647.924249][ T8343] [<80a67848>] (bus_remove_device) from [<80a61a2c>] (device_del+0x148/0x38c) [ 647.924679][ T8343] r9:84335480 r8:8477c800 r7:04208060 r6:00000000 r5:84334430 r4:84334474 [ 647.925017][ T8343] [<80a618e4>] (device_del) from [<80d901b8>] (usb_disable_device+0xdc/0x1f0) [ 647.925709][ T8343] r10:00000000 r9:00000000 r8:84334400 r7:84335400 r6:84fda548 r5:00000001 [ 647.926061][ T8343] r4:00000038 [ 647.926244][ T8343] [<80d900dc>] (usb_disable_device) from [<80d85018>] (usb_disconnect+0xec/0x29c) [ 647.926909][ T8343] r10:00000001 r9:8586d200 r8:843354c4 r7:838d1c00 r6:84335480 r5:84335400 [ 647.927381][ T8343] r4:60000013 [ 647.927556][ T8343] [<80d84f2c>] (usb_disconnect) from [<80d87cc8>] (hub_event+0xe78/0x194c) [ 647.927927][ T8343] r10:00000001 r9:00000100 r8:837def00 r7:84335400 r6:838d1400 r5:838d1e10 [ 647.928278][ T8343] r4:00000001 [ 647.928457][ T8343] [<80d86e50>] (hub_event) from [<802671bc>] (process_one_work+0x1c4/0x510) [ 647.928817][ T8343] r10:82e69c05 r9:8477c800 r8:00800000 r7:dddd00c0 r6:82e69c00 r5:837def00 [ 647.929203][ T8343] r4:84fc2400 [ 647.929396][ T8343] [<80266ff8>] (process_one_work) from [<80267df0>] (worker_thread+0x1ec/0x418) [ 647.930085][ T8343] r10:8477c800 r9:84fc242c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 647.930669][ T8343] r4:84fc2400 [ 647.930880][ T8343] [<80267c04>] (worker_thread) from [<80271228>] (kthread+0x104/0x134) [ 647.931428][ T8343] r10:00000000 r9:dfd05e90 r8:84fda880 r7:84fc2400 r6:80267c04 r5:8477c800 [ 647.931825][ T8343] r4:85145640 [ 647.932219][ T8343] [<80271124>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 647.932729][ T8343] Exception stack(0xdfc7dfb0 to 0xdfc7dff8) [ 647.933162][ T8343] dfa0: 00000000 00000000 00000000 00000000 [ 647.933717][ T8343] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 647.934141][ T8343] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 647.934559][ T8343] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80271124 r4:85145640 [ 647.937518][ T8343] Rebooting in 86400 seconds.. VM DIAGNOSIS: 08:17:43 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=81fe11d0 R02=00000000 R03=818f2b34 R04=826f5908 R05=826f5900 R06=00000028 R07=00000006 R08=826f5908 R09=00000000 R10=81fcc464 R11=dfc7d874 R12=dfc7d878 R13=dfc7d868 R14=818f17c8 R15=818f2b44 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000003 s17=7e9e2af0 d08=7e9e2af000000003 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=00000001 R02=000000c3 R03=00000000 R04=84149800 R05=00000001 R06=818fdc58 R07=00000056 R08=83446700 R09=ec321e98 R10=00000000 R11=ec321d94 R12=ec321d98 R13=ec321d70 R14=818fdc58 R15=8027e57c PSR=20000093 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=76f6a21a s17=00000000 d08=0000000076f6a21a s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000