last executing test programs: 8.867214589s ago: executing program 0 (id=345): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @dev={0xfe, 0x80, '\x00', 0x25}, 0x1, 0x6, 0x0, 0x100, 0x4, 0x2540229}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000800)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0, 0x0, 0x6, 0x0, 0x100, 0x6, 0x180107}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000380)={@mcast2, @ipv4={'\x00', '\xff\xff', @empty}, @local, 0x0, 0x6, 0x0, 0x100, 0x4, 0x86020086, r2}) 8.527362791s ago: executing program 0 (id=346): r0 = timerfd_create(0x8, 0x80000) timerfd_settime(r0, 0x3, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0xfff) syz_clone3(&(0x7f0000000900)={0x23800000, &(0x7f0000000040), 0x0, 0x0, {0x27}, 0x0, 0x0, 0x0, 0x0}, 0x58) io_setup(0x8, &(0x7f0000000600)) clock_adjtime(0x0, &(0x7f0000000000)={0xffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x2, 0x3b9ac9ff, 0x0, 0x0, 0x0, 0x0, 0x5a6c103, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffd}) 7.866998702s ago: executing program 0 (id=347): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x38}, 0x1, 0x0, 0x0, 0x24040804}, 0x4008000) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x30) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[], 0x48}}, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ptrace(0x10, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) r3 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f0000000380)={0x1d, r4, 0x1, {0x0, 0x0, 0x1}, 0xfd}, 0x18) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=@getchain={0x24, 0x11, 0x1, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r2, {0x8}, {0x7, 0xf}, {0x0, 0xe}}}, 0x24}, 0x1, 0x0, 0x0, 0x44060}, 0x98) 7.013955415s ago: executing program 0 (id=349): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000180)={0x28, 0x3, 0x6, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x20080854}, 0x10) 6.009125247s ago: executing program 0 (id=351): r0 = io_uring_setup(0x3c93, &(0x7f0000000900)={0x0, 0x1246, 0x80, 0x1, 0xe0}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="5766b1b827f6003300", 0x10) shutdown(r1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 6.008666617s ago: executing program 1 (id=352): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000001400)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 5.888612124s ago: executing program 0 (id=353): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x81c0, 0x0) 5.888279465s ago: executing program 1 (id=354): r0 = socket$packet(0x11, 0x2, 0x300) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000700003b0000000000800000850000007500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20020084, &(0x7f00000018c0)={0x2, 0x4e20}, 0x10) 5.767131592s ago: executing program 1 (id=355): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000880)={0x14, 0x0, 0x4f79951a91b7df8f, 0x70bd2c, 0x3}, 0x14}, 0x1, 0x0, 0x0, 0x4005}, 0x40000) recvmmsg(r0, &(0x7f0000000140)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000580)=""/208, 0xd0}], 0x1}, 0x7d}], 0x1, 0x10162, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x20000000, '\x00', 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x8}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x7}, {}, {}, {}, {0x18, 0x8, 0x2, 0x0, r1}, {}, {0x46, 0x0, 0x0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x5, 0x0, 0xb, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001180)={r3, 0x62, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000001200)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x8, 0x0, 0x0}}, 0x10) 5.457433802s ago: executing program 1 (id=356): socket(0x2, 0xa, 0x300) syz_emit_ethernet(0x36, &(0x7f00000002c0)={@link_local, @local, @void, {@ipv4={0x8035, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x64, 0x0, 0x4, 0x2, 0x0, @empty, @multicast2}, @timestamp_reply={0x11, 0x0, 0x0, 0xe000, 0x2, 0x2}}}}}, 0x0) 5.108110563s ago: executing program 1 (id=357): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000548000/0x3000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000ff6000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 0s ago: executing program 1 (id=358): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = syz_open_procfs(0x0, &(0x7f0000000480)='task\x00') fchdir(r1) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r2 = syz_clone(0x80004080, 0x0, 0x2b, 0x0, 0x0, 0x0) syz_open_procfs(r2, &(0x7f0000000180)='maps\x00') close_range(r0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): [ 51.614966][ T28] audit: type=1400 audit(51.520:56): avc: denied { read write } for pid=3077 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 51.615506][ T28] audit: type=1400 audit(51.520:57): avc: denied { open } for pid=3077 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:47329' (ED25519) to the list of known hosts. [ 68.300983][ T28] audit: type=1400 audit(68.200:58): avc: denied { name_bind } for pid=3080 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 70.121887][ T28] audit: type=1400 audit(70.010:59): avc: denied { execute } for pid=3081 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 70.140941][ T28] audit: type=1400 audit(70.050:60): avc: denied { execute_no_trans } for pid=3081 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 75.200958][ T28] audit: type=1400 audit(75.100:61): avc: denied { mounton } for pid=3081 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 75.208011][ T28] audit: type=1400 audit(75.110:62): avc: denied { mount } for pid=3081 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 75.237431][ T3081] cgroup: Unknown subsys name 'net' [ 75.247150][ T28] audit: type=1400 audit(75.150:63): avc: denied { unmount } for pid=3081 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 75.418057][ T3081] cgroup: Unknown subsys name 'cpuset' [ 75.426110][ T3081] cgroup: Unknown subsys name 'hugetlb' [ 75.427049][ T3081] cgroup: Unknown subsys name 'rlimit' [ 75.671284][ T28] audit: type=1400 audit(75.580:64): avc: denied { setattr } for pid=3081 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.674250][ T28] audit: type=1400 audit(75.580:65): avc: denied { mounton } for pid=3081 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 75.678390][ T28] audit: type=1400 audit(75.580:66): avc: denied { mount } for pid=3081 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 75.880639][ T3083] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 75.883205][ T28] audit: type=1400 audit(75.790:67): avc: denied { relabelto } for pid=3083 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.886405][ T28] audit: type=1400 audit(75.790:68): avc: denied { write } for pid=3083 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 75.924271][ T28] audit: type=1400 audit(75.830:69): avc: denied { read } for pid=3081 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.926261][ T28] audit: type=1400 audit(75.830:70): avc: denied { open } for pid=3081 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 84.320015][ T3081] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 86.366888][ T28] audit: type=1400 audit(86.270:71): avc: denied { execmem } for pid=3084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 86.436354][ T28] audit: type=1400 audit(86.340:72): avc: denied { read } for pid=3086 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.436815][ T28] audit: type=1400 audit(86.340:73): avc: denied { open } for pid=3086 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.447667][ T28] audit: type=1400 audit(86.350:74): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 86.477244][ T28] audit: type=1400 audit(86.380:75): avc: denied { module_request } for pid=3087 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 86.477666][ T28] audit: type=1400 audit(86.380:76): avc: denied { module_request } for pid=3086 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 86.566580][ T28] audit: type=1400 audit(86.470:77): avc: denied { sys_module } for pid=3086 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 87.184770][ T28] audit: type=1400 audit(87.090:78): avc: denied { ioctl } for pid=3087 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 88.268681][ T3087] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.298401][ T3087] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.307423][ T3086] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.325228][ T3086] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 89.068406][ T3087] hsr_slave_0: entered promiscuous mode [ 89.076502][ T3087] hsr_slave_1: entered promiscuous mode [ 89.232019][ T3086] hsr_slave_0: entered promiscuous mode [ 89.233918][ T3086] hsr_slave_1: entered promiscuous mode [ 89.239387][ T3086] debugfs: 'hsr0' already exists in 'hsr' [ 89.244164][ T3086] Cannot create hsr debugfs directory [ 89.546587][ T28] audit: type=1400 audit(89.450:79): avc: denied { create } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.547077][ T28] audit: type=1400 audit(89.450:80): avc: denied { write } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.582109][ T3087] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 89.593357][ T3087] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 89.608738][ T3087] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 89.616640][ T3087] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 89.638302][ T3087] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 89.647528][ T3087] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 89.649180][ T3087] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 89.657521][ T3087] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 89.744398][ T3086] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 89.754357][ T3086] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 89.757221][ T3086] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 89.768509][ T3086] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 89.775916][ T3086] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 89.787770][ T3086] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 89.793507][ T3086] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 89.802971][ T3086] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 90.417002][ T3087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.554236][ T3086] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.086929][ T3086] veth0_vlan: entered promiscuous mode [ 93.123895][ T3087] veth0_vlan: entered promiscuous mode [ 93.132446][ T3086] veth1_vlan: entered promiscuous mode [ 93.156108][ T3087] veth1_vlan: entered promiscuous mode [ 93.174300][ T3086] veth0_macvtap: entered promiscuous mode [ 93.193162][ T3086] veth1_macvtap: entered promiscuous mode [ 93.247637][ T2534] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.249088][ T2534] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.256714][ T2534] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.257048][ T2534] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.304286][ T3087] veth0_macvtap: entered promiscuous mode [ 93.334684][ T3087] veth1_macvtap: entered promiscuous mode [ 93.395979][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 93.397656][ T28] audit: type=1400 audit(93.300:82): avc: denied { mount } for pid=3086 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 93.403069][ T28] audit: type=1400 audit(93.310:83): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/syzkaller.iNf80y/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 93.407123][ T28] audit: type=1400 audit(93.310:84): avc: denied { mount } for pid=3086 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 93.416238][ T28] audit: type=1400 audit(93.320:85): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/syzkaller.iNf80y/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 93.418573][ T28] audit: type=1400 audit(93.320:86): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/syzkaller.iNf80y/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2514 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 93.451446][ T28] audit: type=1400 audit(93.360:87): avc: denied { unmount } for pid=3086 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 93.467278][ T2498] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.467551][ T2498] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.467745][ T2498] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.467791][ T2498] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.475962][ T28] audit: type=1400 audit(93.380:88): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 93.481007][ T28] audit: type=1400 audit(93.380:89): avc: denied { mount } for pid=3086 comm="syz-executor" name="/" dev="gadgetfs" ino=2515 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 93.488689][ T28] audit: type=1400 audit(93.390:90): avc: denied { mount } for pid=3086 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 93.492678][ T28] audit: type=1400 audit(93.390:91): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 93.635899][ T3086] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 94.611384][ T9] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 94.791104][ T9] usb 1-1: Using ep0 maxpacket: 8 [ 94.800344][ T9] usb 1-1: config 179 has an invalid interface number: 65 but max is 0 [ 94.801192][ T9] usb 1-1: config 179 has no interface number 0 [ 94.801737][ T9] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 94.802431][ T9] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1025, setting to 1024 [ 94.803287][ T9] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 94.803967][ T9] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0x83 has invalid maxpacket 41728, setting to 1024 [ 94.804614][ T9] usb 1-1: config 179 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 94.805720][ T9] usb 1-1: New USB device found, idVendor=12ab, idProduct=90a3, bcdDevice=1e.eb [ 94.806290][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 94.819089][ T3696] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 95.475488][ T9] input: Generic X-Box pad as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:179.65/input/input3 [ 95.693497][ T3696] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 95.718578][ T3696] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 95.968553][ C0] xpad 1-1:179.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 95.968787][ C0] xpad 1-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 95.979097][ T9] usb 1-1: USB disconnect, device number 2 [ 111.228950][ T28] kauditd_printk_skb: 57 callbacks suppressed [ 111.234844][ T28] audit: type=1400 audit(111.130:149): avc: denied { mount } for pid=3752 comm="syz.0.14" name="/" dev="ramfs" ino=952 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 114.872168][ T28] audit: type=1400 audit(114.760:150): avc: denied { prog_run } for pid=3768 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 124.487843][ T3795] veth3: entered allmulticast mode [ 125.003068][ T28] audit: type=1400 audit(124.910:151): avc: denied { create } for pid=3812 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 125.007040][ T28] audit: type=1400 audit(124.910:152): avc: denied { setopt } for pid=3812 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 126.433597][ T28] audit: type=1400 audit(126.310:153): avc: denied { allowed } for pid=3812 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 126.503012][ T28] audit: type=1400 audit(126.410:154): avc: denied { write } for pid=3812 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 126.573899][ T28] audit: type=1400 audit(126.480:155): avc: denied { nlmsg_write } for pid=3812 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 128.818982][ T28] audit: type=1400 audit(384.712:156): avc: denied { execute } for pid=3817 comm="syz.1.29" dev="tmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 128.823969][ T3818] process 'syz.1.29' launched '/dev/fd/3' with NULL argv: empty string added [ 128.832843][ T28] audit: type=1400 audit(384.732:157): avc: denied { execute_no_trans } for pid=3817 comm="syz.1.29" path=2F6D656D66643A5B0B7827A5291AA9FDFAADD16D64C8854858A9250C1A6501202864656C6574656429 dev="tmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 131.465178][ T28] audit: type=1400 audit(387.362:158): avc: denied { unmount } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 133.330723][ T3644] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 133.480768][ T3644] usb 2-1: Using ep0 maxpacket: 8 [ 133.487398][ T3644] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1056, setting to 1024 [ 133.487726][ T3644] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 8 [ 133.488023][ T3644] usb 2-1: New USB device found, idVendor=06a3, idProduct=0ccd, bcdDevice= 0.00 [ 133.488090][ T3644] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 133.494790][ T3644] usb 2-1: config 0 descriptor?? [ 133.501267][ T3831] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 133.962290][ T3644] saitek 0003:06A3:0CCD.0001: unknown main item tag 0x0 [ 133.962852][ T3644] saitek 0003:06A3:0CCD.0001: unknown main item tag 0x0 [ 133.963258][ T3644] saitek 0003:06A3:0CCD.0001: unknown main item tag 0x0 [ 133.963541][ T3644] saitek 0003:06A3:0CCD.0001: unknown main item tag 0x0 [ 133.963800][ T3644] saitek 0003:06A3:0CCD.0001: unknown main item tag 0x0 [ 133.964075][ T3644] saitek 0003:06A3:0CCD.0001: unknown main item tag 0x0 [ 133.964354][ T3644] saitek 0003:06A3:0CCD.0001: unknown main item tag 0x0 [ 133.964619][ T3644] saitek 0003:06A3:0CCD.0001: unknown main item tag 0x0 [ 133.964885][ T3644] saitek 0003:06A3:0CCD.0001: unknown main item tag 0x0 [ 133.965141][ T3644] saitek 0003:06A3:0CCD.0001: unknown main item tag 0x0 [ 133.975576][ T3644] saitek 0003:06A3:0CCD.0001: hidraw0: USB HID v0.08 Device [HID 06a3:0ccd] on usb-dummy_hcd.1-1/input0 [ 134.156166][ T1509] usb 2-1: USB disconnect, device number 2 [ 134.327274][ T28] audit: type=1400 audit(390.222:159): avc: denied { ioctl } for pid=3853 comm="syz.0.36" path="socket:[3081]" dev="sockfs" ino=3081 ioctlcmd=0x8b18 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 134.374274][ T28] audit: type=1400 audit(390.272:160): avc: denied { create } for pid=3852 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 134.378152][ T28] audit: type=1400 audit(390.272:161): avc: denied { setopt } for pid=3852 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 134.620744][ T28] audit: type=1400 audit(390.512:162): avc: denied { create } for pid=3863 comm="syz.0.40" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 134.623449][ T28] audit: type=1400 audit(390.512:163): avc: denied { ioctl } for pid=3863 comm="syz.0.40" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3095 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 134.947156][ T28] audit: type=1400 audit(390.842:164): avc: denied { name_bind } for pid=3868 comm="syz.1.42" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 135.162600][ T28] audit: type=1400 audit(391.062:165): avc: denied { read } for pid=3863 comm="syz.0.40" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3095 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 135.851119][ T28] audit: type=1400 audit(391.752:166): avc: denied { create } for pid=3874 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 135.871291][ T28] audit: type=1400 audit(391.772:167): avc: denied { bind } for pid=3874 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 136.483866][ T28] audit: type=1400 audit(392.382:168): avc: denied { setopt } for pid=3874 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 136.542008][ T28] audit: type=1400 audit(392.442:169): avc: denied { accept } for pid=3873 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 138.899551][ T28] audit: type=1400 audit(394.792:170): avc: denied { mounton } for pid=3893 comm="syz.1.48" path="/20/file0" dev="tmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 139.064228][ T28] audit: type=1400 audit(394.962:171): avc: denied { write } for pid=3893 comm="syz.1.48" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 139.064712][ T28] audit: type=1400 audit(394.962:172): avc: denied { open } for pid=3893 comm="syz.1.48" path="/20/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 141.790369][ T28] audit: type=1400 audit(397.682:173): avc: denied { create } for pid=3909 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 141.804573][ T28] audit: type=1400 audit(397.702:174): avc: denied { read } for pid=3909 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 142.302397][ T28] audit: type=1400 audit(398.202:175): avc: denied { setopt } for pid=3909 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 142.318085][ T28] audit: type=1400 audit(398.212:176): avc: denied { write } for pid=3909 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 142.351897][ T28] audit: type=1400 audit(398.252:177): avc: denied { create } for pid=3914 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 142.715926][ T3921] bond0: (slave bond_slave_0): Releasing backup interface [ 142.778896][ T3921] bond0: (slave bond_slave_1): Releasing backup interface [ 142.799253][ T3921] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 146.349995][ T3644] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 146.544410][ T3644] usb 2-1: config 1 has an invalid interface number: 7 but max is 0 [ 146.545578][ T3644] usb 2-1: config 1 has no interface number 0 [ 146.560388][ T3644] usb 2-1: config 1 interface 7 altsetting 0 has an endpoint descriptor with address 0xDB, changing to 0x8B [ 146.562619][ T3644] usb 2-1: config 1 interface 7 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 146.564176][ T3644] usb 2-1: config 1 interface 7 altsetting 0 endpoint 0x6 has an invalid bInterval 0, changing to 7 [ 146.594435][ T3644] usb 2-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 146.594806][ T3644] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 146.595048][ T3644] usb 2-1: Product: syz [ 146.595286][ T3644] usb 2-1: Manufacturer: syz [ 146.595467][ T3644] usb 2-1: SerialNumber: syz [ 146.605148][ T3935] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 146.813594][ T3935] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 146.832714][ T3644] usb 2-1: No status endpoint found [ 147.072194][ T3935] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 147.074350][ T3935] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 147.404991][ T3644] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 147.630760][ T3644] usb 1-1: Using ep0 maxpacket: 8 [ 147.861358][ T3644] usb 1-1: New USB device found, idVendor=0582, idProduct=0025, bcdDevice= 0.40 [ 147.861908][ T3644] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 147.862247][ T3644] usb 1-1: Product: syz [ 147.862418][ T3644] usb 1-1: Manufacturer: syz [ 147.862581][ T3644] usb 1-1: SerialNumber: syz [ 148.517324][ T3644] usb 1-1: uac_clock_source_is_valid(): cannot get clock validity for id 0 [ 148.517884][ T3644] usb 1-1: clock source 0 is not valid, cannot use [ 148.793561][ T3644] usb 1-1: uac_clock_source_is_valid(): cannot get clock validity for id 0 [ 148.801832][ T3644] usb 1-1: uac_clock_source_is_valid(): cannot get clock validity for id 0 [ 148.802147][ T3644] usb 1-1: clock source 0 is not valid, cannot use [ 148.803944][ T3644] usb 1-1: 2:1: cannot get freq (v2/v3): err -71 [ 148.805494][ T3644] usb 1-1: uac_clock_source_is_valid(): cannot get clock validity for id 0 [ 148.902106][ T3644] usb 1-1: USB disconnect, device number 3 [ 154.786879][ T28] audit: type=1400 audit(410.682:178): avc: denied { append } for pid=4020 comm="syz.0.76" name="comedi3" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 154.951135][ T28] audit: type=1400 audit(410.852:179): avc: denied { map } for pid=4020 comm="syz.0.76" path="/dev/comedi3" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 155.456711][ T28] audit: type=1400 audit(411.352:180): avc: denied { create } for pid=4022 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 155.476361][ T28] audit: type=1400 audit(411.372:181): avc: denied { bind } for pid=4022 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 155.506691][ T28] audit: type=1400 audit(411.402:182): avc: denied { listen } for pid=4022 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 155.513340][ T28] audit: type=1400 audit(411.412:183): avc: denied { accept } for pid=4022 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 157.233515][ T3644] usb 2-1: USB disconnect, device number 3 [ 157.995995][ T4038] misc userio: Can't change port type on an already running userio instance [ 159.423353][ T28] audit: type=1804 audit(415.312:184): pid=4054 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=open_writers comm="syz.0.86" name="/newroot/53/file0" dev="tmpfs" ino=288 res=1 errno=0 [ 159.773546][ T28] audit: type=1400 audit(415.672:185): avc: denied { create } for pid=4056 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 159.936799][ T28] audit: type=1400 audit(415.832:186): avc: denied { setopt } for pid=4056 comm="syz.0.87" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 159.983403][ T28] audit: type=1400 audit(415.882:187): avc: denied { connect } for pid=4056 comm="syz.0.87" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 159.998428][ T28] audit: type=1400 audit(415.892:188): avc: denied { write } for pid=4056 comm="syz.0.87" laddr=fe80::12 lport=58 faddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 160.478335][ T28] audit: type=1400 audit(416.372:189): avc: denied { map } for pid=4058 comm="syz.0.88" path="socket:[2882]" dev="sockfs" ino=2882 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 167.271536][ T28] audit: type=1400 audit(423.172:190): avc: denied { write } for pid=4063 comm="syz.1.90" name="igmp" dev="proc" ino=4026532676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 175.507118][ T4070] netlink: 276 bytes leftover after parsing attributes in process `syz.0.91'. [ 176.074670][ T28] audit: type=1400 audit(431.972:191): avc: denied { map } for pid=4078 comm="syz.1.95" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3267 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 176.110815][ T28] audit: type=1400 audit(432.012:192): avc: denied { write } for pid=4078 comm="syz.1.95" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3267 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 192.002171][ T28] audit: type=1400 audit(447.902:193): avc: denied { read } for pid=4108 comm="syz.0.105" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 192.003635][ T28] audit: type=1400 audit(447.902:194): avc: denied { open } for pid=4108 comm="syz.0.105" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 192.010206][ T28] audit: type=1400 audit(447.902:195): avc: denied { ioctl } for pid=4108 comm="syz.0.105" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 192.017906][ T28] audit: type=1400 audit(447.912:196): avc: denied { set_context_mgr } for pid=4108 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 192.038972][ T4109] binder: 4108:4109 unknown command 0 [ 192.041384][ T4109] binder: 4108:4109 ioctl c0306201 20000080 returned -22 [ 192.054230][ T28] audit: type=1400 audit(447.952:197): avc: denied { write } for pid=4108 comm="syz.0.105" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 192.058866][ T28] audit: type=1400 audit(447.952:198): avc: denied { map } for pid=4108 comm="syz.0.105" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 192.085430][ T28] audit: type=1400 audit(447.982:199): avc: denied { call } for pid=4108 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 192.216979][ T28] audit: type=1400 audit(448.112:200): avc: denied { name_bind } for pid=4110 comm="syz.0.106" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 192.222536][ T28] audit: type=1400 audit(448.122:201): avc: denied { node_bind } for pid=4110 comm="syz.0.106" saddr=255.255.255.255 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 193.633816][ T4116] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14385 sclass=netlink_route_socket pid=4116 comm=syz.1.108 [ 193.781957][ T28] audit: type=1400 audit(449.682:202): avc: denied { override_creds } for pid=4117 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 197.350676][ T28] audit: type=1400 audit(453.242:203): avc: denied { write } for pid=4132 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 198.896640][ T28] audit: type=1400 audit(454.792:204): avc: denied { view } for pid=4139 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 201.055577][ T4149] netlink: 51 bytes leftover after parsing attributes in process `syz.1.120'. [ 202.510924][ T28] audit: type=1400 audit(458.402:205): avc: denied { create } for pid=4167 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 202.515923][ T28] audit: type=1400 audit(458.412:206): avc: denied { create } for pid=4167 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 202.661255][ T28] audit: type=1400 audit(458.562:207): avc: denied { listen } for pid=4167 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 209.474809][ T4189] netlink: 'syz.0.136': attribute type 1 has an invalid length. [ 209.690909][ T28] audit: type=1400 audit(465.592:208): avc: denied { mounton } for pid=4190 comm="syz.0.137" path="/proc/179/task" dev="proc" ino=4105 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 209.886781][ T4185] mmap: syz.1.135 (4185) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 210.549465][ T4200] capability: warning: `syz.0.141' uses deprecated v2 capabilities in a way that may be insecure [ 210.653750][ T28] audit: type=1326 audit(466.552:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4202 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 210.655867][ T28] audit: type=1326 audit(466.552:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4202 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 210.658366][ T28] audit: type=1326 audit(466.552:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4202 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=164 compat=0 ip=0x130300 code=0x7ffc0000 [ 210.661063][ T28] audit: type=1326 audit(466.552:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4202 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 210.663741][ T28] audit: type=1326 audit(466.552:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4202 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 210.665843][ T28] audit: type=1326 audit(466.562:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4202 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=328 compat=0 ip=0x130300 code=0x7ffc0000 [ 210.667878][ T28] audit: type=1326 audit(466.562:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4202 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 210.670958][ T28] audit: type=1326 audit(466.562:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4202 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 210.677581][ T28] audit: type=1326 audit(466.572:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4202 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x130300 code=0x7ffc0000 [ 217.058425][ T4258] capability: warning: `syz.1.159' uses 32-bit capabilities (legacy support in use) [ 224.610331][ T9] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 224.760612][ T9] usb 2-1: Using ep0 maxpacket: 32 [ 224.770018][ T9] usb 2-1: config 155 has an invalid descriptor of length 0, skipping remainder of the config [ 224.770357][ T9] usb 2-1: config 155 interface 0 altsetting 0 has an endpoint descriptor with address 0xE2, changing to 0x82 [ 224.770543][ T9] usb 2-1: config 155 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 224.770745][ T9] usb 2-1: config 155 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 11 [ 224.792157][ T9] usb 2-1: New USB device found, idVendor=15c2, idProduct=ffdc, bcdDevice=bd.30 [ 224.792464][ T9] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 224.792734][ T9] usb 2-1: Product: syz [ 224.792835][ T9] usb 2-1: Manufacturer: syz [ 224.792871][ T9] usb 2-1: SerialNumber: syz [ 224.823335][ C0] imon 2-1:155.0: imon usb_rx_callback_intf0: status(-71) [ 224.825566][ T9] input: iMON Panel, Knob and Mouse(15c2:ffdc) as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:155.0/input/input6 [ 225.050533][ T9] imon 2-1:155.0: Unknown 0xffdc device, defaulting to VFD and iMON IR [ 225.050885][ T9] (id 0x00) [ 225.170711][ T9] rc_core: IR keymap rc-imon-pad not found [ 225.171142][ T9] Registered IR keymap rc-empty [ 225.171838][ T9] imon 2-1:155.0: Looks like you're trying to use an IR protocol this device does not support [ 225.172232][ T9] imon 2-1:155.0: Unsupported IR protocol specified, overriding to iMON IR protocol [ 225.261358][ T9] rc rc0: iMON Remote (15c2:ffdc) as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:155.0/rc/rc0 [ 225.262203][ T9] input: iMON Remote (15c2:ffdc) as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:155.0/rc/rc0/input7 [ 225.267173][ T9] imon 2-1:155.0: iMON device (15c2:ffdc, intf0) on usb<2:4> initialized [ 228.252641][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 228.253149][ T28] audit: type=1400 audit(484.152:230): avc: denied { create } for pid=4318 comm="syz.0.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 228.487524][ T28] audit: type=1400 audit(484.382:231): avc: denied { ioctl } for pid=4322 comm="syz.0.179" path="socket:[4270]" dev="sockfs" ino=4270 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 229.022916][ T4323] Zero length message leads to an empty skb [ 238.981986][ T1509] usb 2-1: USB disconnect, device number 4 [ 248.815745][ T28] audit: type=1400 audit(504.712:232): avc: denied { setopt } for pid=4387 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 248.880031][ T28] audit: type=1400 audit(504.762:233): avc: denied { bind } for pid=4387 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 249.472102][ T28] audit: type=1400 audit(505.372:234): avc: denied { relabelfrom } for pid=4387 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 249.475190][ T28] audit: type=1400 audit(505.372:235): avc: denied { relabelto } for pid=4387 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 250.473659][ T28] audit: type=1400 audit(506.372:236): avc: denied { bind } for pid=4387 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 250.521503][ T4397] fuse: Bad value for 'fd' [ 253.644109][ T4426] netlink: 63 bytes leftover after parsing attributes in process `syz.1.208'. [ 254.596641][ T28] audit: type=1400 audit(510.482:237): avc: denied { create } for pid=4430 comm="syz.1.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 254.622621][ T28] audit: type=1400 audit(510.522:238): avc: denied { setopt } for pid=4430 comm="syz.1.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 255.633918][ T28] audit: type=1400 audit(511.532:239): avc: denied { bind } for pid=4430 comm="syz.1.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 255.944405][ T4432] *** NOT YET: opcode c3 *** [ 258.734261][ T4447] fuse: Bad value for 'fd' [ 258.734313][ T28] audit: type=1400 audit(514.632:240): avc: denied { mounton } for pid=4445 comm="syz.0.217" path="/108/file0" dev="tmpfs" ino=570 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 259.336015][ T28] audit: type=1400 audit(515.232:241): avc: denied { ioctl } for pid=4451 comm="syz.1.220" path="socket:[4404]" dev="sockfs" ino=4404 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 260.560842][ T28] audit: type=1400 audit(516.452:242): avc: denied { create } for pid=4456 comm="syz.1.222" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 260.701499][ T28] audit: type=1400 audit(516.602:243): avc: denied { unlink } for pid=3087 comm="syz-executor" name="file0" dev="tmpfs" ino=586 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 265.736276][ T28] audit: type=1400 audit(521.632:244): avc: denied { rename } for pid=4490 comm="syz.0.236" name="file0" dev="tmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 268.864789][ T28] audit: type=1400 audit(524.752:245): avc: denied { create } for pid=4513 comm="syz.1.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 268.950995][ T28] audit: type=1400 audit(524.842:246): avc: denied { setopt } for pid=4513 comm="syz.1.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 268.951464][ T28] audit: type=1400 audit(524.842:247): avc: denied { write } for pid=4513 comm="syz.1.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 269.183836][ T28] audit: type=1400 audit(525.082:248): avc: denied { nlmsg_read } for pid=4513 comm="syz.1.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 269.732257][ T3644] usb 2-1: new full-speed USB device number 5 using dummy_hcd [ 269.913669][ T3644] usb 2-1: not running at top speed; connect to a high speed hub [ 269.918412][ T3644] usb 2-1: config 7 has an invalid interface number: 192 but max is 0 [ 269.918735][ T3644] usb 2-1: config 7 has no interface number 0 [ 269.919011][ T3644] usb 2-1: config 7 interface 192 altsetting 1 has a duplicate endpoint with address 0x8, skipping [ 269.919156][ T3644] usb 2-1: config 7 interface 192 altsetting 1 endpoint 0x4 has invalid maxpacket 1024, setting to 64 [ 269.919249][ T3644] usb 2-1: config 7 interface 192 altsetting 1 has an invalid descriptor for endpoint zero, skipping [ 269.919321][ T3644] usb 2-1: config 7 interface 192 has no altsetting 0 [ 269.965281][ T3644] usb 2-1: New USB device found, idVendor=13b1, idProduct=0020, bcdDevice=52.31 [ 269.965679][ T3644] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 269.966099][ T3644] usb 2-1: Product: 㡻酥渚ᓶ覆场탬侁蜢䫪컱ᧆ泹䴪湭徣ꎴᴪᫌ㛊㐷좉㽥ﯷ䚤ꂡଋၙ䀿椸邓嶖躪ퟹᙓ蹑᱗鮂뮇െꮪ芶ᕨ䓗毢埤镎ꝯ䂝ﳭḩ쀢㚗)㰗楎䮜됯ᜨ嵦੥쵏룈ꀐ鼅⤷蕈䶜¯ᕂꡰ壄༔仒빯שּׁ愾犋畂Ķ᝱츦蛁ˤツ鮂㨗黇힒㫉쳑《ᕀ蛞燗鸝꿘큜ﵛៜ催 [ 269.966162][ T3644] usb 2-1: Manufacturer: 埔∞빜瀤☋䈄ʹ鍲쀿救⪄뚁勔좣賥Ҍ斁阗邓ょ쇥췄䥿뽒 奝暱勢쟳䟧睿槽ꕄ溿뇿鸙뱙诡呒곆퉪社瀑䙢၃艌㈡勦煣໒篋쬹亞蕡攴곡缒齍裘۵饵患ዞ싾榷堬껇밌鄵᥮䭦㸊ꓧ띩Ạ熳ო佔㎃币믜䬥뎦叄갃茥痶ﮩ쳑豶⛾鷪Ꭾ狗䠑硍ȗ㎯礽थ [ 269.966202][ T3644] usb 2-1: SerialNumber: syz [ 270.235793][ T3644] usb 2-1: USB disconnect, device number 5 [ 275.519467][ T28] audit: type=1326 audit(531.412:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4564 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 275.531941][ T28] audit: type=1326 audit(531.432:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4564 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 275.535266][ T28] audit: type=1326 audit(531.432:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4564 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=295 compat=0 ip=0x130300 code=0x7ffc0000 [ 275.536567][ T28] audit: type=1326 audit(531.432:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4564 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 275.538001][ T28] audit: type=1326 audit(531.432:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4564 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 275.543357][ T28] audit: type=1326 audit(531.442:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4564 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=164 compat=0 ip=0x130300 code=0x7ffc0000 [ 275.543670][ T28] audit: type=1326 audit(531.442:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4564 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 275.543753][ T28] audit: type=1326 audit(531.442:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4564 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 275.550900][ T28] audit: type=1326 audit(531.452:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4564 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=374 compat=0 ip=0x130300 code=0x7ffc0000 [ 275.554353][ T28] audit: type=1326 audit(531.452:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4564 comm="syz.1.259" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 276.061472][ T4567] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 277.602545][ T4581] netlink: 4 bytes leftover after parsing attributes in process `syz.0.266'. [ 279.244954][ T4590] syzkaller0: mtu less than device minimum [ 280.762977][ T4601] netlink: 4 bytes leftover after parsing attributes in process `syz.0.274'. [ 280.768057][ T4601] netlink: 16 bytes leftover after parsing attributes in process `syz.0.274'. [ 281.353926][ T4606] RDS: rds_bind could not find a transport for fe88::101, load rds_tcp or rds_rdma? [ 281.473059][ T4607] netlink: 9275 bytes leftover after parsing attributes in process `syz.1.277'. [ 281.753589][ T4610] sit0: entered allmulticast mode [ 281.769460][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 281.772040][ T28] audit: type=1400 audit(537.662:263): avc: denied { read } for pid=4609 comm="syz.1.279" lport=115 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 281.894669][ T4610] sit0: entered promiscuous mode [ 289.743766][ T4683] netlink: 60 bytes leftover after parsing attributes in process `syz.1.297'. [ 290.073013][ T4683] netlink: 60 bytes leftover after parsing attributes in process `syz.1.297'. [ 290.712892][ T4692] Illegal XDP return value 4294967274 on prog (id 25) dev N/A, expect packet loss! [ 291.375794][ T4697] netlink: 64 bytes leftover after parsing attributes in process `syz.1.301'. [ 292.334480][ T4707] netlink: 24 bytes leftover after parsing attributes in process `syz.0.305'. [ 293.981831][ T4713] netlink: 'syz.1.308': attribute type 19 has an invalid length. [ 293.982506][ T4713] netlink: 'syz.1.308': attribute type 27 has an invalid length. [ 293.989355][ T4713] netlink: 'syz.1.308': attribute type 28 has an invalid length. [ 293.992652][ T4713] netlink: 'syz.1.308': attribute type 29 has an invalid length. [ 293.995693][ T4713] netlink: 'syz.1.308': attribute type 30 has an invalid length. [ 293.998426][ T4713] netlink: 'syz.1.308': attribute type 31 has an invalid length. [ 294.011003][ T4713] netlink: 'syz.1.308': attribute type 32 has an invalid length. [ 294.013480][ T4713] netlink: 'syz.1.308': attribute type 33 has an invalid length. [ 294.020968][ T4713] netlink: 'syz.1.308': attribute type 35 has an invalid length. [ 294.021385][ T4713] netlink: 'syz.1.308': attribute type 37 has an invalid length. [ 294.022037][ T4713] netlink: 72 bytes leftover after parsing attributes in process `syz.1.308'. [ 294.963572][ T4722] netlink: 14 bytes leftover after parsing attributes in process `syz.1.312'. [ 295.592064][ T28] audit: type=1400 audit(551.482:264): avc: denied { create } for pid=4726 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 297.662332][ T4745] netlink: 132 bytes leftover after parsing attributes in process `syz.0.321'. [ 299.066998][ T28] audit: type=1400 audit(554.952:265): avc: denied { remount } for pid=4754 comm="syz.0.324" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 303.728295][ T4786] netlink: 20 bytes leftover after parsing attributes in process `syz.0.336'. [ 307.632347][ T28] audit: type=1400 audit(563.532:266): avc: denied { wake_alarm } for pid=4810 comm="syz.0.346" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 308.200023][ T28] audit: type=1400 audit(567.095:267): avc: denied { create } for pid=4813 comm="syz.0.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 308.260708][ T28] audit: type=1400 audit(567.155:268): avc: denied { ioctl } for pid=4813 comm="syz.0.347" path="socket:[5185]" dev="sockfs" ino=5185 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 308.480209][ T28] audit: type=1400 audit(567.375:269): avc: denied { bind } for pid=4813 comm="syz.0.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 308.524290][ T4814] netlink: 4 bytes leftover after parsing attributes in process `syz.0.347'. [ 309.861001][ T28] audit: type=1400 audit(568.765:270): avc: denied { setopt } for pid=4831 comm="syz.0.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 310.342516][ T1147] aoe: packet could not be sent on ipvlan1. consider increasing tx_queue_len [ 310.599089][ T4841] syz.1.356 uses obsolete (PF_INET,SOCK_PACKET) [ 315.949276][ T28] audit: type=1400 audit(574.845:271): avc: denied { associate } for pid=4849 comm="syz.1.358" name="core" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 315.982786][ T4849] ------------[ cut here ]------------ [ 315.983257][ T4849] WARNING: kernel/signal.c:2174 at do_notify_parent+0x37c/0x384, CPU#1: syz.1.358/4849 [ 315.986021][ T4849] Modules linked in: [ 315.986891][ T4849] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 315.987963][ T4849] CPU: 1 UID: 0 PID: 4849 Comm: syz.1.358 Not tainted syzkaller #0 PREEMPT [ 315.988493][ T4849] Hardware name: ARM-Versatile Express [ 315.989410][ T4849] Call trace: [ 315.990068][ T4849] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 315.990783][ T4849] r7:82a1e6fc r6:00000000 r5:8231ad74 r4:00000001 [ 315.991103][ T4849] [<80201af0>] (show_stack) from [<8021e2fc>] (dump_stack_lvl+0x5c/0x70) [ 315.991445][ T4849] [<8021e2a0>] (dump_stack_lvl) from [<8021e328>] (dump_stack+0x18/0x1c) [ 315.991791][ T4849] r7:82a1e6fc r6:00000000 r5:8531b100 r4:82c7bd3c [ 315.992024][ T4849] [<8021e310>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 315.992326][ T4849] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 315.992731][ T4849] r7:80265f80 [ 315.992958][ T4849] [<80202818>] (panic) from [<802506a8>] (get_taint+0x0/0x1c) [ 315.993375][ T4849] r3:82a0b544 r2:00000001 r1:8230185c r0:8230913c [ 315.993626][ T4849] [<80250630>] (check_panic_on_warn) from [<80250824>] (__warn+0x98/0x1ac) [ 315.994048][ T4849] [<8025078c>] (__warn) from [<80250ab0>] (warn_slowpath_fmt+0x178/0x1f4) [ 315.994395][ T4849] r8:00000009 r7:8230a338 r6:dfb29de4 r5:8531b100 r4:00000000 [ 315.994670][ T4849] [<8025093c>] (warn_slowpath_fmt) from [<80265f80>] (do_notify_parent+0x37c/0x384) [ 315.995041][ T4849] r10:8531b7f4 r9:00000000 r8:dfb29e90 r7:8531b9d0 r6:00000080 r5:8531b100 [ 315.995349][ T4849] r4:8531b100 [ 315.995524][ T4849] [<80265c04>] (do_notify_parent) from [<80257a90>] (do_exit+0x798/0xae4) [ 315.995854][ T4849] r8:dfb29e90 r7:8531b9d0 r6:833abc00 r5:8531b100 r4:84879880 [ 315.996107][ T4849] [<802572f8>] (do_exit) from [<80257fa8>] (do_group_exit+0x40/0x8c) [ 315.996416][ T4849] r7:0000000a [ 315.996584][ T4849] [<80257f68>] (do_group_exit) from [<80268fd0>] (get_signal+0xa8c/0xab4) [ 315.996911][ T4849] r7:0000000a r4:8531b100 [ 315.997089][ T4849] [<80268544>] (get_signal) from [<8022a648>] (do_work_pending+0x11c/0x4e8) [ 315.997444][ T4849] r10:00000001 r9:8531b100 r8:00000000 r7:8531b96c r6:00000000 r5:dfb29fb0 [ 315.997733][ T4849] r4:8531b100 [ 315.997928][ T4849] [<8022a52c>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 315.998364][ T4849] Exception stack(0xdfb29fb0 to 0xdfb29ff8) [ 315.998753][ T4849] 9fa0: 00000000 00000020 00000000 00000000 [ 315.999099][ T4849] 9fc0: 00000000 00000000 0000002b 00000078 003462d8 00000000 00000001 76f290dc [ 315.999400][ T4849] 9fe0: 76f28e60 00000020 00018ee0 00130300 20000010 ffffffff [ 315.999934][ T4849] r10:00000001 r9:8531b100 r8:00000000 r7:8531b100 r6:ffffffff r5:20000010 [ 316.000241][ T4849] r4:00130300 [ 316.005171][ T4849] Rebooting in 86400 seconds..