last executing test programs: 6.118298011s ago: executing program 0 (id=5288): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000180)) 5.989492691s ago: executing program 0 (id=5289): r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000100), 0x272a80, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) sendto$l2tp6(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x40400000, @remote, 0x3}, 0x20) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4870}, 0x2006208c) 3.448284516s ago: executing program 1 (id=5295): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) write$P9_RMKDIR(r0, 0x0, 0x0) 3.366226332s ago: executing program 1 (id=5296): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x42}, 0x9, 0x3}, 0x20) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DISASSOCIATE(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x5c}, 0x1, 0x0, 0x0, 0x8001}, 0x8001) shutdown(r1, 0x0) 3.362748413s ago: executing program 0 (id=5297): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000002c0)={0x1d, r1, 0x1, {0x2, 0x78}, 0x1}, 0x18) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x44881}, 0x20004090) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x40881}, 0x80) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r0) 2.226421549s ago: executing program 1 (id=5298): mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x10010, 0x0) listxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300)=""/13, 0xd) r0 = msgget(0x2, 0x6c0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{0x303}, "d35879120c4712ac", "6586f67528d19883d83ca148f9e98d212adc69a586e44b88be5fc2b90c03f7c8", "f363f264", "48164f1eba9ca704"}, 0x38) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/15) 2.149029695s ago: executing program 1 (id=5299): timer_create(0x0, &(0x7f0000000180)={0x0, 0x11, 0x2}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x2400c900, &(0x7f0000000000)={0xa, 0x0, 0x1, @remote, 0x3, 0x1}, 0x20) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x20004000}, 0x40000) 2.060025972s ago: executing program 0 (id=5300): futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x149a40, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) preadv(r2, 0x0, 0x0, 0x0, 0x0) 1.889628235s ago: executing program 1 (id=5301): r0 = syz_usb_connect$cdc_ncm(0x2, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x30, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6, 0x24, 0x1a, 0x0, 0xe}}, {{0x9, 0x5, 0x81, 0x3, 0x10}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200, 0x0, 0xe}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) 1.82829781s ago: executing program 0 (id=5302): socket$inet(0x2, 0x3, 0x6) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd63"], 0xcfa4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 806.025178ms ago: executing program 0 (id=5303): r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x101102) read(r1, &(0x7f0000000200)=""/213, 0xd5) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0x335, @tick, 0x0, {}, 0xfc}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000080)={0x1, 0x0, 'client1\x00', 0x0, "f6daf2b1288eff5e", "f9986b273cab01bfbc15a17ca2803025aa10abd11cd645e718ba5010bab07543", 0x4, 0x175}) tkill(r0, 0x7) 0s ago: executing program 1 (id=5304): pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) splice(r1, 0x0, r0, 0x0, 0x1, 0x0) vmsplice(r0, &(0x7f00000013c0)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) write$hidraw(r0, &(0x7f0000000100)="8b", 0x1) close_range(r0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): [ 52.299930][ T31] audit: type=1400 audit(52.220:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.303018][ T31] audit: type=1400 audit(52.220:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:32493' (ED25519) to the list of known hosts. [ 64.326796][ T31] audit: type=1400 audit(64.240:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 66.380667][ T31] audit: type=1400 audit(66.270:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.475399][ T31] audit: type=1400 audit(66.390:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.664895][ T31] audit: type=1400 audit(69.580:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.672106][ T31] audit: type=1400 audit(69.590:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.690177][ T3093] cgroup: Unknown subsys name 'net' [ 69.700081][ T31] audit: type=1400 audit(69.620:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.844079][ T3093] cgroup: Unknown subsys name 'cpuset' [ 69.850861][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 69.851910][ T3093] cgroup: Unknown subsys name 'rlimit' [ 70.072842][ T31] audit: type=1400 audit(69.990:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 70.075419][ T31] audit: type=1400 audit(69.990:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 70.077435][ T31] audit: type=1400 audit(70.000:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 70.266190][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 70.271202][ T31] audit: type=1400 audit(70.190:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.283575][ T31] audit: type=1400 audit(70.200:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 70.323227][ T31] audit: type=1400 audit(70.240:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.324746][ T31] audit: type=1400 audit(70.240:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.104462][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 78.861636][ T31] audit: type=1400 audit(78.780:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.911938][ T31] audit: type=1400 audit(78.830:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.912974][ T31] audit: type=1400 audit(78.830:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.917849][ T31] audit: type=1400 audit(78.830:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.933788][ T31] audit: type=1400 audit(78.850:75): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.988391][ T31] audit: type=1400 audit(78.910:76): avc: denied { sys_module } for pid=3098 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 79.469126][ T31] audit: type=1400 audit(79.390:77): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=678 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 80.451885][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.461077][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.625260][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 80.639351][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.520905][ T3099] hsr_slave_0: entered promiscuous mode [ 81.524728][ T3099] hsr_slave_1: entered promiscuous mode [ 81.645780][ T3098] hsr_slave_0: entered promiscuous mode [ 81.651407][ T3098] hsr_slave_1: entered promiscuous mode [ 81.652645][ T3098] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 81.654813][ T3098] Cannot create hsr debugfs directory [ 82.050981][ T31] audit: type=1400 audit(81.970:78): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.051400][ T31] audit: type=1400 audit(81.970:79): avc: denied { write } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.054645][ T31] audit: type=1400 audit(81.970:80): avc: denied { read } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.065610][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 82.098166][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 82.109840][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 82.127770][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 82.201663][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 82.207279][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 82.213317][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 82.223377][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.834916][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.844826][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.462762][ T3098] veth0_vlan: entered promiscuous mode [ 85.484028][ T3098] veth1_vlan: entered promiscuous mode [ 85.540418][ T3098] veth0_macvtap: entered promiscuous mode [ 85.554737][ T3098] veth1_macvtap: entered promiscuous mode [ 85.613140][ T3098] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.614202][ T3098] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.620244][ T3098] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.620393][ T3098] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.775891][ T31] audit: type=1400 audit(85.680:81): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 85.801809][ T31] audit: type=1400 audit(85.720:82): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.aFSSe0/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 85.806022][ T31] audit: type=1400 audit(85.720:83): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 85.826050][ T31] audit: type=1400 audit(85.740:84): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.aFSSe0/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 85.850865][ T31] audit: type=1400 audit(85.770:85): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.aFSSe0/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2167 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 85.857949][ T3099] veth0_vlan: entered promiscuous mode [ 85.868039][ T31] audit: type=1400 audit(85.790:86): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 85.874924][ T31] audit: type=1400 audit(85.790:87): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=766 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 85.880608][ T31] audit: type=1400 audit(85.800:88): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="gadgetfs" ino=2168 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 85.889366][ T3099] veth1_vlan: entered promiscuous mode [ 85.891998][ T31] audit: type=1400 audit(85.810:89): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 85.894994][ T31] audit: type=1400 audit(85.810:90): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 85.978554][ T3098] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 85.997619][ T3099] veth0_macvtap: entered promiscuous mode [ 86.007281][ T3099] veth1_macvtap: entered promiscuous mode [ 86.070406][ T3099] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.071724][ T3099] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.072796][ T3099] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.073833][ T3099] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.824292][ T3886] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=260 sclass=netlink_route_socket pid=3886 comm=syz.0.48 [ 94.184284][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 94.184726][ T31] audit: type=1400 audit(94.100:99): avc: denied { audit_write } for pid=3963 comm="syz.0.74" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 97.479612][ T31] audit: type=1400 audit(97.400:100): avc: denied { execute } for pid=3997 comm="syz.0.89" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 97.984440][ T31] audit: type=1400 audit(97.900:101): avc: denied { create } for pid=4014 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 97.993249][ T31] audit: type=1400 audit(97.910:102): avc: denied { getopt } for pid=4014 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 98.001296][ T31] audit: type=1400 audit(97.920:103): avc: denied { create } for pid=4014 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 98.007055][ T31] audit: type=1400 audit(97.920:104): avc: denied { ioctl } for pid=4014 comm="syz.1.98" path="socket:[3474]" dev="sockfs" ino=3474 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 98.077030][ T31] audit: type=1400 audit(97.990:105): avc: denied { create } for pid=4016 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 103.580023][ T31] audit: type=1400 audit(103.490:106): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 104.122935][ T31] audit: type=1400 audit(104.040:107): avc: denied { append } for pid=4095 comm="syz.1.133" name="audio" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 117.519334][ T31] audit: type=1400 audit(117.440:108): avc: denied { map } for pid=4154 comm="syz.0.157" path="socket:[2706]" dev="sockfs" ino=2706 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 118.675783][ T4167] input: syz0 as /devices/virtual/input/input3 [ 119.144227][ T4183] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4183 comm=syz.0.169 [ 120.229145][ T31] audit: type=1400 audit(120.150:109): avc: denied { create } for pid=4212 comm="syz.0.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 120.281766][ T31] audit: type=1400 audit(120.200:110): avc: denied { create } for pid=4216 comm="syz.0.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 121.728296][ T4233] Zero length message leads to an empty skb [ 121.979309][ T31] audit: type=1400 audit(121.900:111): avc: denied { create } for pid=4241 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 121.999775][ T31] audit: type=1400 audit(121.920:112): avc: denied { connect } for pid=4241 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 122.245219][ T31] audit: type=1400 audit(122.160:113): avc: denied { write } for pid=4248 comm="syz.1.200" name="raw6" dev="proc" ino=4026532714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 122.509342][ T31] audit: type=1400 audit(122.430:114): avc: denied { setopt } for pid=4241 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 128.883983][ T4350] sctp: [Deprecated]: syz.1.245 (pid 4350) Use of int in maxseg socket option. [ 128.883983][ T4350] Use struct sctp_assoc_value instead [ 131.279703][ T31] audit: type=1400 audit(131.200:115): avc: denied { read } for pid=4392 comm="syz.1.265" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 131.280191][ T31] audit: type=1400 audit(131.200:116): avc: denied { open } for pid=4392 comm="syz.1.265" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 134.561028][ T31] audit: type=1400 audit(134.480:117): avc: denied { allowed } for pid=4437 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 135.093176][ T31] audit: type=1400 audit(135.010:118): avc: denied { ioctl } for pid=4437 comm="syz.0.286" path="socket:[4089]" dev="sockfs" ino=4089 ioctlcmd=0x891c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 141.429829][ T31] audit: type=1400 audit(141.350:119): avc: denied { write } for pid=4532 comm="syz.0.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 141.449392][ T31] audit: type=1400 audit(141.360:120): avc: denied { read } for pid=4532 comm="syz.0.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 141.455916][ T31] audit: type=1400 audit(141.370:121): avc: denied { listen } for pid=4532 comm="syz.0.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 141.714983][ T31] audit: type=1400 audit(141.630:122): avc: denied { ioctl } for pid=4532 comm="syz.0.329" path="socket:[5261]" dev="sockfs" ino=5261 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 146.224091][ T4567] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4567 comm=syz.0.343 [ 147.841178][ T31] audit: type=1400 audit(147.760:123): avc: denied { node_bind } for pid=4584 comm="syz.0.352" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 148.030851][ T31] audit: type=1400 audit(147.950:124): avc: denied { map_create } for pid=4586 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 148.031326][ T31] audit: type=1400 audit(147.950:125): avc: denied { map_read map_write } for pid=4586 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 152.574739][ T31] audit: type=1400 audit(152.490:126): avc: denied { name_bind } for pid=4635 comm="syz.0.376" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 153.399432][ T31] audit: type=1400 audit(153.320:127): avc: denied { create } for pid=4655 comm="syz.1.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 153.412837][ T31] audit: type=1400 audit(153.330:128): avc: denied { write } for pid=4655 comm="syz.1.386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 154.381528][ T31] audit: type=1400 audit(154.300:129): avc: denied { prog_load } for pid=4662 comm="syz.0.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 154.382051][ T31] audit: type=1400 audit(154.300:130): avc: denied { bpf } for pid=4662 comm="syz.0.388" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 154.393471][ T31] audit: type=1400 audit(154.310:131): avc: denied { perfmon } for pid=4662 comm="syz.0.388" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 154.410591][ T31] audit: type=1400 audit(154.330:132): avc: denied { prog_run } for pid=4662 comm="syz.0.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 155.046946][ T31] audit: type=1400 audit(154.960:133): avc: denied { mounton } for pid=4671 comm="syz.1.392" path="/proc/430/cgroup" dev="proc" ino=4795 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 159.637466][ T4705] syz.0.405 uses obsolete (PF_INET,SOCK_PACKET) [ 159.657764][ T31] audit: type=1400 audit(159.570:134): avc: denied { ioctl } for pid=4703 comm="syz.0.405" path="socket:[4878]" dev="sockfs" ino=4878 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 161.141663][ T31] audit: type=1400 audit(161.060:135): avc: denied { ioctl } for pid=4727 comm="syz.1.415" path="socket:[5517]" dev="sockfs" ino=5517 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 161.402129][ T31] audit: type=1400 audit(161.320:136): avc: denied { write } for pid=4727 comm="syz.1.415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 162.464281][ T31] audit: type=1400 audit(162.380:137): avc: denied { create } for pid=4759 comm="syz.0.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 162.471138][ T31] audit: type=1400 audit(162.390:138): avc: denied { bind } for pid=4759 comm="syz.0.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 162.477809][ T31] audit: type=1400 audit(162.400:139): avc: denied { accept } for pid=4759 comm="syz.0.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 162.482903][ T31] audit: type=1400 audit(162.400:140): avc: denied { write } for pid=4759 comm="syz.0.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 177.539803][ T31] audit: type=1400 audit(177.450:141): avc: denied { setopt } for pid=4895 comm="syz.0.489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 185.571698][ T43] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 185.581806][ T43] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 200.259264][ T5072] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5072 comm=syz.1.564 [ 206.658691][ T44] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 206.827195][ T44] usb 1-1: Using ep0 maxpacket: 16 [ 206.852924][ T44] usb 1-1: New USB device found, idVendor=12d1, idProduct=14f1, bcdDevice=31.4e [ 206.853318][ T44] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 206.853604][ T44] usb 1-1: Product: syz [ 206.853683][ T44] usb 1-1: Manufacturer: syz [ 206.853799][ T44] usb 1-1: SerialNumber: syz [ 206.863577][ T44] usb 1-1: config 0 descriptor?? [ 207.091045][ T44] usb 1-1: USB disconnect, device number 2 [ 214.877097][ T23] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 215.067191][ T23] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 215.099755][ T23] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 215.100210][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 215.100471][ T23] usb 2-1: SerialNumber: syz [ 215.808271][ T23] cdc_ether 2-1:1.0 usb0: register 'cdc_ether' at usb-dummy_hcd.1-1, CDC Ethernet Device, 42:42:42:42:42:42 [ 216.212778][ T23] usb 2-1: USB disconnect, device number 2 [ 216.215489][ T23] cdc_ether 2-1:1.0 usb0: unregister 'cdc_ether' usb-dummy_hcd.1-1, CDC Ethernet Device [ 216.467268][ T31] audit: type=1400 audit(216.380:142): avc: denied { connect } for pid=5230 comm="syz.1.618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 216.467760][ T31] audit: type=1400 audit(216.380:143): avc: denied { name_connect } for pid=5230 comm="syz.1.618" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 216.496864][ T31] audit: type=1400 audit(216.410:144): avc: denied { accept } for pid=5230 comm="syz.1.618" lport=35493 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 216.502312][ T31] audit: type=1400 audit(216.420:145): avc: denied { setopt } for pid=5230 comm="syz.1.618" lport=35493 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 223.339835][ T31] audit: type=1400 audit(223.260:146): avc: denied { create } for pid=5312 comm="syz.0.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 223.339976][ T5314] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 223.351770][ T31] audit: type=1400 audit(223.270:147): avc: denied { getopt } for pid=5312 comm="syz.0.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 226.039339][ T31] audit: type=1400 audit(225.960:148): avc: denied { connect } for pid=5346 comm="syz.1.667" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 226.045103][ T31] audit: type=1400 audit(225.960:149): avc: denied { read } for pid=5346 comm="syz.1.667" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 226.552362][ T31] audit: type=1400 audit(226.470:150): avc: denied { write } for pid=5346 comm="syz.1.667" laddr=fe80::4c84:a9ff:fe17:8a19 lport=58 faddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 226.943688][ T31] audit: type=1400 audit(226.860:151): avc: denied { read } for pid=5354 comm="syz.0.670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 228.549893][ T31] audit: type=1400 audit(228.470:152): avc: denied { getopt } for pid=5359 comm="syz.0.672" lport=33692 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 241.382934][ T31] audit: type=1400 audit(241.300:153): avc: denied { read } for pid=5457 comm="syz.0.713" path="socket:[7575]" dev="sockfs" ino=7575 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 241.393177][ T31] audit: type=1400 audit(241.310:154): avc: denied { ioctl } for pid=5457 comm="syz.0.713" path="socket:[7575]" dev="sockfs" ino=7575 ioctlcmd=0xab0a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 257.213015][ T31] audit: type=1400 audit(257.130:155): avc: denied { sqpoll } for pid=5613 comm="syz.1.784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 257.220581][ T31] audit: type=1400 audit(257.140:156): avc: denied { create } for pid=5613 comm="syz.1.784" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 257.742401][ T31] audit: type=1400 audit(257.660:157): avc: denied { write } for pid=5613 comm="syz.1.784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 258.348343][ T31] audit: type=1400 audit(258.260:158): avc: denied { create } for pid=5626 comm="syz.0.788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 267.539907][ T5712] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5712 comm=syz.1.825 [ 269.214611][ T31] audit: type=1400 audit(269.130:159): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 269.463025][ T31] audit: type=1400 audit(269.380:160): avc: denied { mounton } for pid=5746 comm="syz.1.843" path="/453/file0" dev="tmpfs" ino=2381 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 277.732708][ T31] audit: type=1400 audit(277.650:161): avc: denied { setopt } for pid=5782 comm="syz.1.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 285.297130][ T31] audit: type=1400 audit(285.210:162): avc: denied { mounton } for pid=5874 comm="syz.0.901" path="/418/file0" dev="tmpfs" ino=2209 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 301.488158][ T31] audit: type=1400 audit(301.410:163): avc: denied { mount } for pid=6000 comm="syz.0.950" name="/" dev="ramfs" ino=9463 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 302.065620][ T31] audit: type=1400 audit(301.980:164): avc: denied { name_bind } for pid=6006 comm="syz.1.953" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 309.641563][ T31] audit: type=1400 audit(309.560:165): avc: denied { bind } for pid=6089 comm="syz.1.991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 309.642082][ T31] audit: type=1400 audit(309.560:166): avc: denied { name_bind } for pid=6089 comm="syz.1.991" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 309.642230][ T31] audit: type=1400 audit(309.560:167): avc: denied { node_bind } for pid=6089 comm="syz.1.991" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 309.657112][ T31] audit: type=1400 audit(309.570:168): avc: denied { name_connect } for pid=6089 comm="syz.1.991" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 339.231529][ T31] audit: type=1400 audit(339.150:169): avc: denied { mount } for pid=6355 comm="syz.1.1108" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 339.274608][ T31] audit: type=1400 audit(339.190:170): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 345.365139][ T6404] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6404 comm=syz.0.1127 [ 351.455625][ T31] audit: type=1400 audit(351.370:171): avc: denied { shutdown } for pid=6476 comm="syz.1.1159" lport=47719 faddr=fc00:: fport=20001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 364.340914][ T31] audit: type=1400 audit(364.260:172): avc: denied { getopt } for pid=6568 comm="syz.1.1201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 382.017683][ T31] audit: type=1400 audit(381.930:173): avc: denied { block_suspend } for pid=6694 comm="syz.0.1256" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 389.677143][ T23] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 389.860414][ T23] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 389.861443][ T23] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 389.862212][ T23] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 389.862923][ T23] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 389.863530][ T23] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 389.866817][ T23] usb 1-1: config 0 descriptor?? [ 390.332484][ T23] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x3 [ 390.338088][ T23] plantronics 0003:047F:FFFF.0002: No inputs registered, leaving [ 390.352729][ T23] plantronics 0003:047F:FFFF.0002: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 390.644305][ T10] usb 1-1: USB disconnect, device number 3 [ 398.900292][ T6857] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6857 comm=syz.0.1318 [ 399.163947][ T31] audit: type=1400 audit(399.080:174): avc: denied { bind } for pid=6860 comm="syz.0.1321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 399.583455][ T31] audit: type=1400 audit(399.500:175): avc: denied { create } for pid=6866 comm="syz.0.1324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 399.600814][ T31] audit: type=1400 audit(399.520:176): avc: denied { write } for pid=6866 comm="syz.0.1324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 400.336997][ T6872] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6872 comm=syz.1.1327 [ 400.655013][ T31] audit: type=1400 audit(400.570:177): avc: denied { watch } for pid=6877 comm="syz.0.1329" path="/622" dev="tmpfs" ino=3268 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 404.827378][ T6920] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6920 comm=syz.0.1347 [ 411.878670][ T31] audit: type=1400 audit(411.800:178): avc: denied { write } for pid=7023 comm="syz.0.1393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 418.127393][ T31] audit: type=1400 audit(418.040:179): avc: denied { map } for pid=7089 comm="syz.1.1421" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 418.127918][ T31] audit: type=1400 audit(418.040:180): avc: denied { execute } for pid=7089 comm="syz.1.1421" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 419.459860][ T31] audit: type=1400 audit(419.380:181): avc: denied { name_bind } for pid=7097 comm="syz.0.1425" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 443.165472][ T7298] capability: warning: `syz.0.1508' uses 32-bit capabilities (legacy support in use) [ 453.310675][ T7351] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7351 comm=syz.0.1531 [ 458.047662][ T31] audit: type=1400 audit(457.960:182): avc: denied { ioctl } for pid=7408 comm="syz.1.1558" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=13656 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 463.878739][ T7451] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 463.878739][ T7451] The task syz.0.1574 (7451) triggered the difference, watch for misbehavior. [ 468.263808][ T7468] process 'syz.0.1582' launched '/dev/fd/3/./file1' with NULL argv: empty string added [ 468.278510][ T31] audit: type=1400 audit(468.200:183): avc: denied { execute_no_trans } for pid=7467 comm="syz.0.1582" path="/file1" dev="tmpfs" ino=3966 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 472.587891][ T7505] capability: warning: `syz.1.1600' uses deprecated v2 capabilities in a way that may be insecure [ 488.809654][ T31] audit: type=1400 audit(488.730:184): avc: denied { ioctl } for pid=7620 comm="syz.1.1650" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 488.813929][ T7621] binder: 7620:7621 ioctl c0306201 0 returned -14 [ 488.821931][ T31] audit: type=1400 audit(488.740:185): avc: denied { set_context_mgr } for pid=7620 comm="syz.1.1650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 493.683949][ T7668] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 512.062838][ T7758] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=7758 comm=syz.1.1707 [ 526.588508][ T31] audit: type=1400 audit(526.510:186): avc: denied { mount } for pid=7861 comm="syz.1.1753" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 528.131396][ T7874] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7874 comm=syz.1.1758 [ 532.697850][ T31] audit: type=1400 audit(532.620:187): avc: denied { create } for pid=7903 comm="syz.1.1772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 532.762770][ T31] audit: type=1400 audit(532.680:188): avc: denied { connect } for pid=7903 comm="syz.1.1772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 532.781071][ T31] audit: type=1400 audit(532.700:189): avc: denied { listen } for pid=7903 comm="syz.1.1772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 532.784036][ T31] audit: type=1400 audit(532.700:190): avc: denied { setopt } for pid=7903 comm="syz.1.1772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 536.658929][ T31] audit: type=1400 audit(536.580:191): avc: denied { nlmsg_write } for pid=7936 comm="syz.1.1788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 543.855711][ T31] audit: type=1400 audit(543.770:192): avc: denied { bind } for pid=7985 comm="syz.1.1809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 580.807425][ T31] audit: type=1400 audit(580.720:193): avc: denied { setopt } for pid=8350 comm="syz.0.1968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 587.199080][ T51] block nbd0: Receive control failed (result -107) [ 587.220032][ T8372] block nbd0: shutting down sockets [ 589.819333][ T8402] trusted_key: syz.0.1990 sent an empty control message without MSG_MORE. [ 594.292202][ T8454] loop0: detected capacity change from 0 to 7 [ 598.348620][ T31] audit: type=1400 audit(598.270:194): avc: denied { getopt } for pid=8492 comm="syz.1.2026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 598.618034][ T31] audit: type=1400 audit(598.540:195): avc: denied { mount } for pid=8496 comm="syz.0.2027" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 601.612709][ T8530] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8530 comm=syz.0.2042 [ 602.513002][ T8536] sctp: [Deprecated]: syz.0.2044 (pid 8536) Use of int in max_burst socket option. [ 602.513002][ T8536] Use struct sctp_assoc_value instead [ 612.052749][ T8582] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=37 sclass=netlink_audit_socket pid=8582 comm=syz.0.2065 [ 612.264342][ T31] audit: type=1400 audit(612.180:196): avc: denied { watch watch_reads } for pid=8583 comm="syz.0.2066" path="/962/file1" dev="tmpfs" ino=5046 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 614.297367][ T44] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 614.456799][ T44] usb 1-1: Using ep0 maxpacket: 16 [ 614.468944][ T44] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 614.470298][ T44] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 614.471869][ T44] usb 1-1: New USB device found, idVendor=05ac, idProduct=8241, bcdDevice= 0.00 [ 614.473925][ T44] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 614.485714][ T44] usb 1-1: config 0 descriptor?? [ 614.992483][ T44] input: HID 05ac:8241 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:05AC:8241.0003/input/input4 [ 615.070547][ T44] appleir 0003:05AC:8241.0003: input,hiddev0,hidraw0: USB HID v0.00 Device [HID 05ac:8241] on usb-dummy_hcd.0-1/input0 [ 616.720047][ T31] audit: type=1400 audit(616.640:197): avc: denied { associate } for pid=8634 comm="syz.0.2083" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 616.780279][ T23] usb 1-1: USB disconnect, device number 4 [ 619.707874][ T8670] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8670 comm=syz.0.2095 [ 623.499471][ T31] audit: type=1400 audit(623.420:198): avc: denied { remount } for pid=8712 comm="syz.1.2114" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 623.779728][ T31] audit: type=1400 audit(623.700:199): avc: denied { setattr } for pid=8717 comm="syz.0.2116" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 629.937117][ T31] audit: type=1400 audit(629.850:200): avc: denied { connect } for pid=8773 comm="syz.1.2140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 629.941083][ T8774] vcan0: tx drop: invalid sa for name 0x0000000000000003 [ 656.929018][ T31] audit: type=1400 audit(656.850:201): avc: denied { create } for pid=9004 comm="syz.0.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 656.935628][ T31] audit: type=1400 audit(656.850:202): avc: denied { bind } for pid=9004 comm="syz.0.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 656.941449][ T31] audit: type=1400 audit(656.860:203): avc: denied { setopt } for pid=9004 comm="syz.0.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 656.969135][ T31] audit: type=1400 audit(656.890:204): avc: denied { accept } for pid=9004 comm="syz.0.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 656.974108][ T31] audit: type=1400 audit(656.890:205): avc: denied { write } for pid=9004 comm="syz.0.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 659.115549][ T31] audit: type=1400 audit(659.030:206): avc: denied { create } for pid=9030 comm="syz.1.2253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 659.115608][ T9031] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 659.128250][ T31] audit: type=1400 audit(659.050:207): avc: denied { getopt } for pid=9030 comm="syz.1.2253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 659.402838][ T31] audit: type=1400 audit(659.320:208): avc: denied { bind } for pid=9034 comm="syz.1.2255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 659.403336][ T31] audit: type=1400 audit(659.320:209): avc: denied { name_bind } for pid=9034 comm="syz.1.2255" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 659.403493][ T31] audit: type=1400 audit(659.320:210): avc: denied { node_bind } for pid=9034 comm="syz.1.2255" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 676.382650][ T9176] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9176 comm=syz.0.2314 [ 710.472084][ T9456] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9456 comm=syz.0.2437 [ 737.790198][ T9694] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9694 comm=syz.1.2542 [ 749.108748][ T9739] sctp: [Deprecated]: syz.1.2562 (pid 9739) Use of int in maxseg socket option. [ 749.108748][ T9739] Use struct sctp_assoc_value instead [ 757.912559][ T9779] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9779 comm=syz.0.2580 [ 762.150834][ T9844] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9844 comm=syz.0.2607 [ 765.864276][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 765.864706][ T31] audit: type=1400 audit(765.780:214): avc: denied { setattr } for pid=9888 comm="syz.1.2628" name="fd" dev="proc" ino=21784 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 770.764574][ T9937] SELinux: syz.0.2649 (9937) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 810.514296][ T31] audit: type=1400 audit(810.430:215): avc: denied { create } for pid=10228 comm="syz.1.2781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 815.111105][T10275] SELinux: syz.1.2802 (10275) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 816.201596][ T31] audit: type=1400 audit(816.120:216): avc: denied { ioctl } for pid=10288 comm="syz.0.2809" path="socket:[23582]" dev="sockfs" ino=23582 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 816.226955][ T31] audit: type=1400 audit(816.140:217): avc: denied { write } for pid=10288 comm="syz.0.2809" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 823.982665][ T31] audit: type=1400 audit(823.900:218): avc: denied { setopt } for pid=10345 comm="syz.1.2831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 825.070958][ T31] audit: type=1400 audit(824.990:219): avc: denied { read } for pid=10364 comm="syz.0.2840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 826.798010][T10391] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10391 comm=syz.1.2850 [ 854.117648][ T31] audit: type=1400 audit(854.040:220): avc: denied { execute } for pid=10569 comm="syz.1.2927" path="/selinux/policy" dev="selinuxfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=file permissive=1 [ 883.394638][T10703] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10703 comm=syz.0.2981 [ 886.452995][ T31] audit: type=1400 audit(886.360:221): avc: denied { ioctl } for pid=10735 comm="syz.1.2995" path="socket:[24356]" dev="sockfs" ino=24356 ioctlcmd=0x89f4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 928.686666][ C1] hrtimer: interrupt took 586976 ns [ 930.808213][T10981] geneve2: entered promiscuous mode [ 930.809406][T10981] geneve2: entered allmulticast mode [ 953.172019][ T31] audit: type=1400 audit(953.090:222): avc: denied { ioctl } for pid=11126 comm="syz.0.3135" path="socket:[25952]" dev="sockfs" ino=25952 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 953.439096][ T31] audit: type=1400 audit(953.360:223): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 953.439525][ T31] audit: type=1400 audit(953.360:224): avc: denied { open } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 953.442217][ T31] audit: type=1400 audit(953.360:225): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 955.171206][ T31] audit: type=1400 audit(955.090:226): avc: denied { create } for pid=11145 comm="syz.1.3141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 955.212044][ T31] audit: type=1400 audit(955.130:227): avc: denied { read write } for pid=11145 comm="syz.1.3141" path="socket:[25989]" dev="sockfs" ino=25989 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 988.452621][ T31] audit: type=1400 audit(988.370:228): avc: denied { read } for pid=11324 comm="syz.1.3208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 990.072022][ T31] audit: type=1400 audit(989.990:229): avc: denied { relabelfrom } for pid=11308 comm="syz.0.3202" name="NETLINK" dev="sockfs" ino=26674 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 990.080414][T11309] SELinux: Context system_u:object_r:systemd_logind_var_run_t:s0 is not valid (left unmapped). [ 990.087313][ T31] audit: type=1400 audit(990.010:230): avc: denied { relabelto } for pid=11308 comm="syz.0.3202" name="NETLINK" dev="sockfs" ino=26674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=netlink_route_socket permissive=1 trawcon="system_u:object_r:systemd_logind_var_run_t:s0" [ 991.680914][T11332] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=770 sclass=netlink_audit_socket pid=11332 comm=syz.1.3210 [ 1000.510805][ T1793] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 1000.765541][ T1793] usb 2-1: Using ep0 maxpacket: 32 [ 1000.788702][ T1793] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1000.789025][ T1793] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1000.789652][ T1793] usb 2-1: New USB device found, idVendor=1e7d, idProduct=2d5a, bcdDevice= 0.00 [ 1000.789769][ T1793] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1000.830004][ T1793] usb 2-1: config 0 descriptor?? [ 1001.314956][ T1793] savu 0003:1E7D:2D5A.0004: hiddev0,hidraw0: USB HID v0.00 Device [HID 1e7d:2d5a] on usb-dummy_hcd.1-1/input0 [ 1001.608671][ T1793] usb 2-1: USB disconnect, device number 3 [ 1002.198609][ T31] audit: type=1400 audit(1002.120:231): avc: denied { create } for pid=11413 comm="syz.1.3236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1002.216979][ T31] audit: type=1400 audit(1002.130:232): avc: denied { write } for pid=11413 comm="syz.1.3236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1002.320789][ T31] audit: type=1400 audit(1002.170:233): avc: denied { ioctl } for pid=11413 comm="syz.1.3236" path="socket:[26339]" dev="sockfs" ino=26339 ioctlcmd=0x700c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1008.218994][T11445] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=265 sclass=netlink_audit_socket pid=11445 comm=syz.0.3246 [ 1025.327122][ T1793] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 1025.486246][ T1793] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1025.487061][ T1793] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1025.487232][ T1793] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1025.487379][ T1793] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1025.487493][ T1793] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1025.498347][ T1793] usb 2-1: config 0 descriptor?? [ 1025.962329][ T1793] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1025.962932][ T1793] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1025.963493][ T1793] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1025.963677][ T1793] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1025.963822][ T1793] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1025.964008][ T1793] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1025.965646][ T1793] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1025.965833][ T1793] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1025.965971][ T1793] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1025.966195][ T1793] plantronics 0003:047F:FFFF.0005: unknown main item tag 0x0 [ 1025.983435][ T1793] plantronics 0003:047F:FFFF.0005: No inputs registered, leaving [ 1025.995699][ T1793] plantronics 0003:047F:FFFF.0005: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 1026.232588][ T43] usb 2-1: USB disconnect, device number 4 [ 1035.727058][ T43] usb 1-1: new full-speed USB device number 5 using dummy_hcd [ 1035.888980][ T43] usb 1-1: too many endpoints for config 1 interface 0 altsetting 253: 65, using maximum allowed: 30 [ 1035.890430][ T43] usb 1-1: config 1 interface 0 altsetting 253 has 1 endpoint descriptor, different from the interface descriptor's value: 65 [ 1035.893252][ T43] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1035.902596][ T43] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1035.903868][ T43] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1035.907238][ T43] usb 1-1: Product: syz [ 1035.908890][ T43] usb 1-1: Manufacturer: syz [ 1035.910599][ T43] usb 1-1: SerialNumber: syz [ 1036.144197][ T43] usb 1-1: USB disconnect, device number 5 [ 1036.373218][ T31] audit: type=1400 audit(1036.290:234): avc: denied { ioctl } for pid=11652 comm="syz.0.3313" path="socket:[27065]" dev="sockfs" ino=27065 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1040.530983][ T31] audit: type=1400 audit(1040.450:235): avc: denied { watch } for pid=11694 comm="syz.1.3324" path="/1848/file0" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=dir permissive=1 [ 1040.564800][ T31] audit: type=1400 audit(1040.480:236): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1051.273074][T11777] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11777 comm=syz.1.3352 [ 1082.127519][T12032] mmap: syz.0.3446 (12032) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 1085.028252][ T31] audit: type=1400 audit(1084.950:237): avc: denied { lock } for pid=12077 comm="syz.1.3463" path="socket:[28717]" dev="sockfs" ino=28717 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1090.398784][ T31] audit: type=1400 audit(1090.320:238): avc: denied { read } for pid=12126 comm="syz.1.3479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1098.395763][ T31] audit: type=1400 audit(1098.310:239): avc: denied { getopt } for pid=12179 comm="syz.0.3500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1112.178928][T12288] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12288 comm=syz.1.3540 [ 1127.470843][T12391] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12391 comm=syz.0.3578 [ 1128.150146][ T31] audit: type=1400 audit(1128.070:240): avc: denied { create } for pid=12392 comm="syz.0.3579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1143.117034][ T1793] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 1143.301628][ T1793] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1143.302017][ T1793] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1143.305675][ T1793] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1143.306034][ T1793] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1143.306265][ T1793] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1143.324370][ T1793] usb 1-1: config 0 descriptor?? [ 1143.828606][ T1793] plantronics 0003:047F:FFFF.0006: No inputs registered, leaving [ 1143.833524][ T1793] plantronics 0003:047F:FFFF.0006: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 1144.080847][ T43] usb 1-1: USB disconnect, device number 6 [ 1153.249669][T12606] lo: entered promiscuous mode [ 1153.253104][T12605] lo: left promiscuous mode [ 1199.749710][ T31] audit: type=1400 audit(1199.670:241): avc: denied { bind } for pid=12893 comm="syz.0.3745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1199.765878][ T31] audit: type=1400 audit(1199.680:242): avc: denied { write } for pid=12893 comm="syz.0.3745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1237.950651][ T31] audit: type=1400 audit(1237.870:243): avc: denied { load_policy } for pid=13150 comm="syz.0.3841" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1237.954444][T13153] SELinux: policydb magic number 0x17 does not match expected magic number 0xf97cff8c [ 1237.958468][T13153] SELinux: failed to load policy [ 1240.305408][ T31] audit: type=1400 audit(1240.220:244): avc: denied { create } for pid=13183 comm="syz.1.3853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1240.321636][T13184] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=13184 comm=syz.1.3853 [ 1240.321898][ T31] audit: type=1400 audit(1240.240:245): avc: denied { write } for pid=13183 comm="syz.1.3853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1259.652641][ T31] audit: type=1400 audit(1259.570:246): avc: denied { module_request } for pid=13336 comm="syz.1.3906" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1298.997187][ T3788] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 1299.147075][ T3788] usb 2-1: Using ep0 maxpacket: 16 [ 1299.168728][ T3788] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1299.169126][ T3788] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1299.169867][ T3788] usb 2-1: New USB device found, idVendor=1e7d, idProduct=2d5a, bcdDevice= 0.00 [ 1299.170552][ T3788] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1299.180013][ T3788] usb 2-1: config 0 descriptor?? [ 1299.420906][ T3788] usbhid 2-1:0.0: can't add hid device: -71 [ 1299.421532][ T3788] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 1299.449251][ T3788] usb 2-1: USB disconnect, device number 5 [ 1318.027290][ T23] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 1318.222365][ T23] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1318.223989][ T23] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 1318.225206][ T23] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1318.269065][ T23] usb 1-1: config 0 descriptor?? [ 1318.873965][ T23] usbhid 1-1:0.0: can't add hid device: -71 [ 1318.875228][ T23] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 1318.894846][ T23] usb 1-1: USB disconnect, device number 7 [ 1335.324842][ T31] audit: type=1400 audit(1335.240:247): avc: denied { compute_member } for pid=13773 comm="syz.1.4059" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1373.631917][T13987] Process accounting resumed [ 1375.513558][ T31] audit: type=1400 audit(1375.430:248): avc: denied { append } for pid=14004 comm="syz.1.4140" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1375.527055][ T31] audit: type=1400 audit(1375.440:249): avc: denied { map } for pid=14004 comm="syz.1.4140" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1422.274184][T14300] 8021q: VLANs not supported on vcan0 [ 1432.483155][T14368] netlink: 'syz.0.4271': attribute type 4 has an invalid length. [ 1432.518711][T14368] netlink: 'syz.0.4271': attribute type 4 has an invalid length. [ 1442.619826][T14438] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14438 comm=syz.1.4295 [ 1442.668415][T14436] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14436 comm=syz.0.4294 [ 1452.107321][ T31] audit: type=1400 audit(1452.010:250): avc: denied { mounton } for pid=14492 comm="syz.0.4314" path="/proc/4479/task" dev="proc" ino=35216 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1561.477896][T13782] usb 2-1: new full-speed USB device number 6 using dummy_hcd [ 1561.652862][T13782] usb 2-1: unable to get BOS descriptor or descriptor too short [ 1561.659732][T13782] usb 2-1: not running at top speed; connect to a high speed hub [ 1561.679904][T13782] usb 2-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 1561.680252][T13782] usb 2-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 1561.680516][T13782] usb 2-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 1561.680649][T13782] usb 2-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 1561.680779][T13782] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1561.720630][T13782] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1561.721057][T13782] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1561.721412][T13782] usb 2-1: Product: syz [ 1561.721535][T13782] usb 2-1: Manufacturer: syz [ 1561.721605][T13782] usb 2-1: SerialNumber: syz [ 1562.202784][T13782] usb 2-1: 0:2 : does not exist [ 1562.231973][T13782] usb 2-1: USB disconnect, device number 6 [ 1574.955383][ T31] audit: type=1400 audit(1574.870:251): avc: denied { accept } for pid=15087 comm="syz.1.4525" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1579.345927][ T31] audit: type=1400 audit(1579.260:252): avc: denied { write } for pid=15109 comm="syz.1.4533" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1643.073669][T15561] sctp: [Deprecated]: syz.1.4707 (pid 15561) Use of int in maxseg socket option. [ 1643.073669][T15561] Use struct sctp_assoc_value instead [ 1759.240603][ T31] audit: type=1400 audit(2015.159:253): avc: denied { create } for pid=16209 comm="syz.0.4946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1759.282575][T16210] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=527 sclass=netlink_route_socket pid=16210 comm=syz.0.4946 [ 1761.953991][ T31] audit: type=1400 audit(2017.869:254): avc: denied { bind } for pid=16235 comm="syz.1.4956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1761.979779][ T31] audit: type=1400 audit(2017.899:255): avc: denied { accept } for pid=16235 comm="syz.1.4956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1803.601779][ T31] audit: type=1400 audit(2059.519:256): avc: denied { accept } for pid=16541 comm="syz.1.5067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 1820.487780][ T31] audit: type=1800 audit(2076.399:257): pid=16643 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed comm="syz.1.5103" name="dmabuf" dev="dmabuf" ino=4 res=0 errno=0 [ 1857.589848][ T31] audit: type=1400 audit(2113.499:258): avc: denied { setattr } for pid=16840 comm="syz.1.5168" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1869.379992][T16912] SELinux: failed to load policy [ 1885.428133][ T31] audit: type=1400 audit(2141.349:259): avc: denied { bind } for pid=16978 comm="syz.0.5216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1885.439977][ T31] audit: type=1400 audit(2141.359:260): avc: denied { listen } for pid=16978 comm="syz.0.5216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1885.445651][ T31] audit: type=1400 audit(2141.359:261): avc: denied { accept } for pid=16978 comm="syz.0.5216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1893.226068][ T31] audit: type=1400 audit(2149.139:262): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1924.542414][ T31] audit: type=1400 audit(2180.459:263): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1925.108233][T13782] usb 2-1: new full-speed USB device number 7 using dummy_hcd [ 1925.279037][T13782] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1925.279636][T13782] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid maxpacket 512, setting to 64 [ 1925.283872][T13782] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid maxpacket 512, setting to 64 [ 1925.308053][T13782] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1925.308455][T13782] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1925.308781][T13782] usb 2-1: Product: syz [ 1925.308989][T13782] usb 2-1: Manufacturer: syz [ 1925.309200][T13782] usb 2-1: SerialNumber: syz [ 1925.550550][T17232] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1925.551655][T17232] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1926.191116][T17232] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1926.208180][T17232] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1926.424189][T13782] cdc_ncm 2-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 1926.424581][T13782] cdc_ncm 2-1:1.0: dwNtbInMaxSize=16 is too small. Using 2048 [ 1926.424879][T13782] cdc_ncm 2-1:1.0: setting rx_max = 2048 [ 1926.637656][T13782] cdc_ncm 2-1:1.0: setting tx_max = 88 [ 1926.652729][T13782] cdc_ncm 2-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.1-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 1926.681382][T13782] usb 2-1: USB disconnect, device number 7 [ 1926.683226][T13782] cdc_ncm 2-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.1-1, CDC NCM (NO ZLP) [ 1926.800115][T13782] ------------[ cut here ** replaying previous printk message ** [ 1926.800115][T13782] ------------[ cut here ]------------ [ 1926.800813][T13782] WARNING: CPU: 0 PID: 13782 at lib/debugobjects.c:612 debug_print_object+0xc4/0xd8 [ 1926.802895][T13782] ODEBUG: free active (active state 0) object: 84f4d80c object type: work_struct hint: usbnet_deferred_kevent+0x0/0x394 [ 1926.805029][T13782] Modules linked in: [ 1926.806361][T13782] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1926.807877][T13782] CPU: 0 UID: 0 PID: 13782 Comm: kworker/0:1 Not tainted 6.16.0-rc1-syzkaller #0 PREEMPT [ 1926.808505][T13782] Hardware name: ARM-Versatile Express [ 1926.809101][T13782] Workqueue: usb_hub_wq hub_event [ 1926.809630][T13782] Call trace: [ 1926.810169][T13782] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1926.810833][T13782] r7:00000000 r6:828208bc r5:00000000 r4:8225e950 [ 1926.811219][T13782] [<80201ae4>] (show_stack) from [<8021fda8>] (dump_stack_lvl+0x54/0x7c) [ 1926.811630][T13782] [<8021fd54>] (dump_stack_lvl) from [<8021fde8>] (dump_stack+0x18/0x1c) [ 1926.812051][T13782] r5:00000000 r4:82a6fd18 [ 1926.812242][T13782] [<8021fdd0>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 1926.812580][T13782] [<802024f4>] (panic) from [<802585b8>] (get_taint+0x0/0x1c) [ 1926.812950][T13782] r3:8280c684 r2:00000001 r1:82245488 r0:8224ce38 [ 1926.813272][T13782] r7:808d05e4 [ 1926.813454][T13782] [<80258544>] (check_panic_on_warn) from [<8025871c>] (__warn+0x80/0x188) [ 1926.814024][T13782] [<8025869c>] (__warn) from [<80258a0c>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 1926.814588][T13782] r8:00000009 r7:822b6e10 r6:df9f5a84 r5:8421e000 r4:00000000 [ 1926.814920][T13782] [<80258828>] (warn_slowpath_fmt) from [<808d05e4>] (debug_print_object+0xc4/0xd8) [ 1926.815832][T13782] r10:00000005 r9:84f4d000 r8:81c01f18 r7:822e1ce0 r6:82adbee4 r5:df9f5b2c [ 1926.816476][T13782] r4:8280ccbc [ 1926.816681][T13782] [<808d0520>] (debug_print_object) from [<808d2030>] (debug_check_no_obj_freed+0x25c/0x2a4) [ 1926.817280][T13782] r8:84f4e000 r7:84f4d80c r6:00000100 r5:00000003 r4:00000000 [ 1926.817779][T13782] [<808d1dd4>] (debug_check_no_obj_freed) from [<80503b28>] (kfree+0x190/0x394) [ 1926.818287][T13782] r10:00000001 r9:8297facc r8:84f4d000 r7:805049cc r6:83002480 r5:ddeab620 [ 1926.819030][T13782] r4:84f4d000 [ 1926.819211][T13782] [<80503998>] (kfree) from [<805049cc>] (kvfree+0x2c/0x30) [ 1926.819757][T13782] r10:00000001 r9:8297facc r8:84f4d000 r7:00000000 r6:8571f400 r5:8560f800 [ 1926.820111][T13782] r4:84f4d000 [ 1926.820371][T13782] [<805049a0>] (kvfree) from [<815a0bb0>] (netdev_release+0x2c/0x34) [ 1926.821034][T13782] r5:8560f800 r4:84f4d000 [ 1926.821320][T13782] [<815a0b84>] (netdev_release) from [<80b2bffc>] (device_release+0x38/0xa8) [ 1926.822011][T13782] r5:8560f800 r4:84f4d3c0 [ 1926.822255][T13782] [<80b2bfc4>] (device_release) from [<81a35d70>] (kobject_put+0xa0/0x1f4) [ 1926.822827][T13782] r5:81d4ecfc r4:84f4d3c0 [ 1926.823023][T13782] [<81a35cd0>] (kobject_put) from [<80b2c228>] (put_device+0x18/0x1c) [ 1926.823555][T13782] r7:000000c0 r6:00000000 r5:00000000 r4:84f4d000 [ 1926.823878][T13782] [<80b2c210>] (put_device) from [<81551f4c>] (free_netdev+0x18c/0x244) [ 1926.824257][T13782] [<81551dc0>] (free_netdev) from [<80e1ede4>] (usbnet_disconnect+0xb8/0xfc) [ 1926.824889][T13782] r7:85492400 r6:84f4d7d4 r5:84f4d6c0 r4:00000000 [ 1926.825300][T13782] [<80e1ed2c>] (usbnet_disconnect) from [<80e8875c>] (usb_unbind_interface+0x84/0x2b4) [ 1926.825812][T13782] r8:85491488 r7:85492474 r6:85492430 r5:00000000 r4:85491400 [ 1926.826129][T13782] [<80e886d8>] (usb_unbind_interface) from [<80b342b0>] (device_remove+0x64/0x6c) [ 1926.826766][T13782] r10:00000001 r9:85491488 r8:00000044 r7:85492474 r6:8297facc r5:00000000 [ 1926.827247][T13782] r4:85492430 [ 1926.827457][T13782] [<80b3424c>] (device_remove) from [<80b357a0>] (device_release_driver_internal+0x18c/0x200) [ 1926.827908][T13782] r5:00000000 r4:85492430 [ 1926.828097][T13782] [<80b35614>] (device_release_driver_internal) from [<80b3582c>] (device_release_driver+0x18/0x1c) [ 1926.828524][T13782] r9:85491488 r8:832d6d40 r7:832d6d38 r6:832d6d0c r5:85492430 r4:832d6d30 [ 1926.829145][T13782] [<80b35814>] (device_release_driver) from [<80b33904>] (bus_remove_device+0xcc/0x120) [ 1926.829822][T13782] [<80b33838>] (bus_remove_device) from [<80b2dc60>] (device_del+0x148/0x38c) [ 1926.830254][T13782] r9:85491488 r8:8421e000 r7:04208060 r6:00000000 r5:85492430 r4:85492474 [ 1926.830920][T13782] [<80b2db18>] (device_del) from [<80e861ac>] (usb_disable_device+0xd4/0x1e8) [ 1926.831517][T13782] r10:00000001 r9:00000000 r8:00000000 r7:85492400 r6:85491400 r5:83c8fb48 [ 1926.831953][T13782] r4:00000001 [ 1926.832366][T13782] [<80e860d8>] (usb_disable_device) from [<80e7af28>] (usb_disconnect+0xec/0x29c) [ 1926.833270][T13782] r9:85401200 r8:854914cc r7:83f5e000 r6:85491488 r5:85491400 r4:60000013 [ 1926.833876][T13782] [<80e7ae3c>] (usb_disconnect) from [<80e7dbe8>] (hub_event+0xe78/0x194c) [ 1926.834394][T13782] r10:00000001 r9:00000100 r8:8405b100 r7:85491400 r6:83f5d800 r5:83f5e210 [ 1926.834872][T13782] r4:00000001 [ 1926.835042][T13782] [<80e7cd70>] (hub_event) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4) [ 1926.835452][T13782] r10:832d6f70 r9:83810205 r8:8421e000 r7:dddced40 r6:83810200 r5:8405b100 [ 1926.836170][T13782] r4:8575b000 [ 1926.836474][T13782] [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8) [ 1926.837138][T13782] r10:61c88647 r9:8421e000 r8:8575b02c r7:82804d40 r6:dddced40 r5:dddced60 [ 1926.837484][T13782] r4:8575b000 [ 1926.837635][T13782] [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280) [ 1926.838081][T13782] r10:00000000 r9:8575b000 r8:8027ed34 r7:dfdd1e60 r6:855e7a80 r5:8421e000 [ 1926.838424][T13782] r4:00000001 [ 1926.838581][T13782] [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1926.839087][T13782] Exception stack(0xdf9f5fb0 to 0xdf9f5ff8) [ 1926.839515][T13782] 5fa0: 00000000 00000000 00000000 00000000 [ 1926.839890][T13782] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1926.840248][T13782] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1926.840604][T13782] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [ 1926.840956][T13782] r4:854e8f80 [ 1926.844643][T13782] Rebooting in 86400 seconds.. VM DIAGNOSIS: 05:09:00 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=828208d0 R02=00000001 R03=82a730e0 R04=82a6fd18 R05=00000000 R06=828208bc R07=00000000 R08=df9f599c R09=8224ce3a R10=00000004 R11=df9f5974 R12=df9f5980 R13=df9f5960 R14=00000020 R15=81a2d320 PSR=80070193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=ddde6800 R02=0008d88e R03=00000005 R04=130a196b R05=0000001c R06=130140dd R07=0000001c R08=dddda130 R09=dddda180 R10=9aa73d00 R11=df8059dc R12=df8059e0 R13=df8059c0 R14=8033d840 R15=812d4714 PSR=00010193 ---- A S svc32 s00=0065706f s01=08014784 d00=080147840065706f s02=01c70800 s03=01c28002 d01=01c2800201c70800 s04=a4820800 s05=cc000204 d02=cc000204a4820800 s06=06060105 s07=00000008 d03=0000000806060105 s08=20080001 s09=05098002 d04=0509800220080001 s10=08098804 s11=060136fe d05=060136fe08098804 s12=00000806 s13=08000100 d06=0800010000000806 s14=0204a486 s15=06050180 d07=060501800204a486 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=40e379b5 s33=5cc910d2 d16=5cc910d240e379b5 s34=f77e7fb0 s35=14684658 d17=14684658f77e7fb0 s36=a98d6e98 s37=21f18930 d18=21f18930a98d6e98 s38=aa4eaa0a s39=81d9c70d d19=81d9c70daa4eaa0a s40=35643bfc s41=c5ea407d d20=c5ea407d35643bfc s42=b707347f s43=159a0647 d21=159a0647b707347f s44=46f309f1 s45=c5bbacd7 d22=c5bbacd746f309f1 s46=b822d2ef s47=29f87fb8 d23=29f87fb8b822d2ef s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=003c0000 s53=00280000 d26=00280000003c0000 s54=00140000 s55=00080000 d27=0008000000140000 s56=00000008 s57=00080004 d28=0008000400000008 s58=03e60000 s59=ffae0000 d29=ffae000003e60000 s60=0008ffff s61=00000000 d30=000000000008ffff s62=00000300 s63=ffbe0000 d31=ffbe000000000300 FPSCR: 00000000