last executing test programs: 6m37.441774269s ago: executing program 1 (id=33277): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) 6m37.200797083s ago: executing program 1 (id=33283): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r4, 0x0, 0x0, 0x805, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x0) 6m37.199716913s ago: executing program 1 (id=33285): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x24000]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r2, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40040) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500), 0x0, 0x4) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r4, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) getpgid(0x0) 6m37.136153089s ago: executing program 1 (id=33287): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) ptrace$setregset(0x4205, 0x0, 0x200, &(0x7f00000001c0)={&(0x7f0000000000)="c9453900", 0x4}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) ptrace$setregs(0x1a, r3, 0xc, &(0x7f0000000000)) 6m37.0369001s ago: executing program 1 (id=33289): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f00000001c0)=0x10) 6m36.964470647s ago: executing program 1 (id=33292): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x8002]}}, 0x0, 0x8, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r2, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, 0x0, 0x0) 6m21.921805343s ago: executing program 32 (id=33292): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x8002]}}, 0x0, 0x8, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r2, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, 0x0, 0x0) 3m19.705793506s ago: executing program 2 (id=36939): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x24000]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, 0x0, 0x0, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r2, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40040) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r4, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_open_procfs(0x0, 0x0) 3m19.640592293s ago: executing program 2 (id=36941): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40004) sendmmsg$inet6(r3, &(0x7f0000000480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r5 = add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000540)='user\x00', 0x0, &(0x7f0000000200)=',$:@^@,\x00', r5) 3m19.536818842s ago: executing program 2 (id=36942): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r4, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='freezer.state\x00', 0x275a, 0x0) 3m19.531526333s ago: executing program 2 (id=36943): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) rt_sigaction(0x34, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffc000/0x4000)=nil) brk(0x55555ede6001) 3m19.4615679s ago: executing program 2 (id=36945): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x8}) 3m19.423509144s ago: executing program 2 (id=36947): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0xb}, 0xe) sendmmsg$sock(r0, &(0x7f0000000f40)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000010c0)="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", 0x3f9}], 0x1}}], 0x1, 0x0) 3m4.399813848s ago: executing program 33 (id=36947): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0xb}, 0xe) sendmmsg$sock(r0, &(0x7f0000000f40)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000010c0)="be32f00266f1364660ba1b1279ab90db30a100c1d0f4abf844927730645c278511c6d7f630ef79beb8b00fa8471cf7b4c8a92dca836f506b5cf0bee445c779641200c485770dea1b25a865aa61990886b289bc2a4baecc1ec7448a64f1f142289ef6c017e23d79611d8482a4bd3a8d357f6855f5dea253478a331d12a00a384087fd8fd14b408ec5976bb5c3ff86695a882222c1ab0740688e1a7597f5219b044ac117aa3af540dd977432181187afc2042c90d457e54408502c9fb3e2686a7d627a355fa6519a2362e3f06f2c94e52091d37ab5f9ca6c564b86c80d775c28d0e4b1ee1ab6b2dee7f650cda6b0acc949ce54d0531ff78f4927483e6430a95c25d4069b1d6f7aab125927eb86975c9dd7f84527bcc0017dfe6f898c840c1400b26f52e54ad3ccbf923d61116c2a83c84dfa8c6a575c12fd382fe963e5b70b2edbbde9d358cc07d28679f376fd2e9c0aceac3bbf07002404710bb12bd892978bca674f010edbb6c8d88823e2f32d31c29f3152c8fb356253db70a554ad7bb06f87248e420524c5254eaee54fb53d826a5814a8e9e02546df741faa6ceefc84e450436f9ce8357a9df178830030bb9be24e56338ece67d25fd7b1777ff8fd63d14409c14f03ff7c179f3f90872c4473cb25704eada2365c3c694ae31017d6955414b1dfd2d1a11ce92bfb32b93f1f42c85cf32cc625876c5a212c5f41769c16a46b33a75af458c277f75fe8fd56cff1924874665aab927172c41974b23e0f9fadca53edc985182a16d02cbe8da3d033e58240d4bbef0a9793d062f89063d000af5bed9682eb0954a30f7ab83f816c35d3691e510194b105b8d2d344ba1faa3203c8009c3d26f8366b642b27c3a5842372bc6b6711d20387ae0d6aff53475055b7d4660949f8eaaf210c8b804d9cc9726438305159c6747531823e6cc9947db6e77c58d82d60ed0f61051d8554cd88050b97d9ff9ae8970298653503e8f222fdc38145164a710be1347d5c331c3d328b9850ac5eb72ea552c4a2d35ca228367db453220020f9e2c422d3d5ffa6109d40f0dc36d4a07dd8e284774671caaf61bb46131d0bd6011ac84af2955e7752fe4bd8a897c37cb2da9ccbc824fe9be0bf396ef4c2a9c500fc2d95d5a709e3ded3f5bf3e9dcda2c24f85816157f5cc0400f804c9332eef72a1e87e89202f9e400f9a497db0bdeaa1e2999dcb57b81c6f2bc95aa770b96e710f5c1711f9beca517c4709fb0e2759fe287535daeeb7abcfb984d5e10f50b1e49ec319ec6e7c6c7eca18a2b160d061a50ae7e850f5ef6505a7f84e222104aa26ce47fbaa75b469f830888593b818df2e85f1806cb7495ee76413cf73e6db0e759f5fdb208818f71624e59df5d40d1180d35fbca522b0e197eea212bddfef64dbf3cba172872212dfaaa0d5c8fb0be1453fc239427e", 0x3f9}], 0x1}}], 0x1, 0x0) 2.163975743s ago: executing program 3 (id=40296): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2000003, 0x4082172, 0xffffffffffffffff, 0x418a6000) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000005000/0x4000)=nil) capset(&(0x7f0000a31000)={0x20080522}, &(0x7f0000000080)) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) 1.838835485s ago: executing program 5 (id=40303): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r5, 0x0, 0x0, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r7, 0x29, 0x3b, 0x0, 0x0) 1.767005143s ago: executing program 5 (id=40305): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r7, 0x29, 0x3b, &(0x7f00000001c0)={0x2b}, 0x8) 1.765635183s ago: executing program 3 (id=40306): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFCONF(r5, 0x8912, 0x0) 1.728175987s ago: executing program 5 (id=40308): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='binder\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000003c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000003c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) 1.665030223s ago: executing program 0 (id=40309): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r7, 0x29, 0x3b, &(0x7f00000001c0)={0x2b}, 0x8) 1.59466279s ago: executing program 3 (id=40310): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) write(r0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000000c0)="f10dc44f7d20988057f85ab4dd61b58675fb03d944b014", 0x17}, {&(0x7f0000000640)="f14e4792586af7f2380c7d51d257826607fd39cc2d3571ac7e6b0f4edf17ed143170620ff63eaff5729afa9b529936", 0x2f}], 0x2) 1.380401932s ago: executing program 3 (id=40311): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r7, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r8, 0x29, 0x3b, &(0x7f00000001c0)={0x2b}, 0x8) 1.183736711s ago: executing program 3 (id=40313): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r5, &(0x7f0000003c00), 0x0, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r7, 0x29, 0x3b, 0x0, 0x0) 1.043650355s ago: executing program 3 (id=40314): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0xfffffffffffffebc, 0x0}}], 0x1, 0x8001) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r7, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r8, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mount(0x0, &(0x7f0000000040)='./cgroup\x00', 0x0, 0x208003, 0x0) 928.751417ms ago: executing program 5 (id=40316): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r7, 0x29, 0x3b, &(0x7f00000001c0)={0x2b}, 0x8) 650.901154ms ago: executing program 0 (id=40320): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) sendmmsg$inet6(r3, &(0x7f00000075c0), 0x0, 0x40804) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mount$binderfs(0x0, &(0x7f00000001c0)='./binderfs\x00', &(0x7f0000000280), 0x200000, &(0x7f0000000380)=ANY=[@ANYBLOB='max=00000000000000000000002,stats=']) 543.087476ms ago: executing program 5 (id=40322): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r5, &(0x7f0000003c00), 0x0, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r7, 0x29, 0x3b, 0x0, 0x0) 523.427527ms ago: executing program 4 (id=40323): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000000040), 0x4000152, 0x804) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = getpid() kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 447.288245ms ago: executing program 5 (id=40324): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='binder\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000003c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000003c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}, 0x3a}], [], 0x2f}) 393.045631ms ago: executing program 4 (id=40325): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) sendmmsg$inet6(r2, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40004) r3 = socket(0x10, 0x2, 0x0) write(r3, &(0x7f0000000040)="1c0000001a009b8a140000003b9b301f00"/27, 0x1b) 293.321051ms ago: executing program 4 (id=40326): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioprio_set$uid(0x3, 0x0, 0x2004) 283.734281ms ago: executing program 0 (id=40327): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, 0x0) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)={0x50, r6, 0x5, 0x70bd2a, 0x25dfdbfd, {}, [@WGDEVICE_A_PEERS={0x34, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x4}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_IFINDEX={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 216.917388ms ago: executing program 0 (id=40328): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) write(r0, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r3, &(0x7f0000000b80)=[{&(0x7f00000000c0)="f10dc44f7d20988057f85ab4dd61b58675fb03d944b014fb9cb34c", 0x1b}, {&(0x7f0000000640)="f14e4792586af7f2380c7d51d257826607fd39cc2d3571ac7e6b0f4edf17ed143170620ff63eaff5729afa9b529936", 0x2f}], 0x2) 173.728723ms ago: executing program 4 (id=40329): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r7, 0x29, 0x3b, 0x0, 0x0) 117.111268ms ago: executing program 0 (id=40330): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r7, 0x29, 0x3b, &(0x7f00000001c0)={0x2b}, 0x8) 52.163675ms ago: executing program 4 (id=40331): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) sendmmsg$inet6(r3, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40804) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mount$binderfs(0x0, &(0x7f00000001c0)='./binderfs\x00', &(0x7f0000000280), 0x200000, &(0x7f0000000380)=ANY=[@ANYBLOB='max=0000000000000000000000']) 24.187828ms ago: executing program 0 (id=40332): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r5, &(0x7f0000003c00), 0x0, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r7, 0x29, 0x3b, 0x0, 0x0) 0s ago: executing program 4 (id=40333): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r2, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFCONF(r6, 0x8912, 0x0) kernel console output (not intermixed with test programs): 2" path="/531/blkio.bfq.group_wait_time" dev="tmpfs" ino=3288 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1881.067998][ T36] audit: type=1400 audit(1763360897.402:139648): avc: denied { create } for pid=9778 comm="syz.0.35032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1881.088864][ T36] audit: type=1400 audit(1763360897.402:139649): avc: denied { ioctl } for pid=9778 comm="syz.0.35032" path="socket:[539128]" dev="sockfs" ino=539128 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1881.137801][ T36] audit: type=1400 audit(1763360897.402:139650): avc: denied { write } for pid=9778 comm="syz.0.35032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1881.178511][ T36] audit: type=1400 audit(1763360897.452:139651): avc: denied { execute } for pid=9780 comm="syz.2.35030" path="/4/blkio.bfq.group_wait_time" dev="tmpfs" ino=43 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1885.265391][ T9988] binder: Unknown parameter 'stat' [ 1885.700160][ T36] kauditd_printk_skb: 267 callbacks suppressed [ 1885.700177][ T36] audit: type=1400 audit(1763360902.212:139919): avc: denied { execute } for pid=10008 comm="syz.3.35143" path="/572/cpuacct.usage_percpu_sys" dev="tmpfs" ino=3514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1885.761302][ T36] audit: type=1400 audit(1763360902.272:139920): avc: denied { execute } for pid=10010 comm="syz.4.35144" path="/401/blkio.bfq.group_wait_time" dev="tmpfs" ino=2455 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1885.859855][ T36] audit: type=1400 audit(1763360902.272:139921): avc: denied { read write } for pid=5337 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1885.932201][ T36] audit: type=1400 audit(1763360902.272:139922): avc: denied { read write open } for pid=5337 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1885.953887][T10015] syzkaller0: entered promiscuous mode [ 1885.964998][T10015] syzkaller0: entered allmulticast mode [ 1885.999660][ T36] audit: type=1400 audit(1763360902.272:139923): avc: denied { ioctl } for pid=5337 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1886.065949][ T36] audit: type=1400 audit(1763360902.342:139924): avc: denied { execute } for pid=10012 comm="syz.3.35145" path="/573/blkio.bfq.group_wait_time" dev="tmpfs" ino=3520 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1886.131113][ T36] audit: type=1400 audit(1763360902.342:139925): avc: denied { mounton } for pid=10012 comm="syz.3.35145" path="/573/file0" dev="tmpfs" ino=3521 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1886.165269][T10022] debugfs: Bad value for 'uid' [ 1886.180119][T10022] debugfs: Bad value for 'uid' [ 1886.199600][ T36] audit: type=1400 audit(1763360902.342:139926): avc: denied { mount } for pid=10012 comm="syz.3.35145" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1886.249608][ T36] audit: type=1400 audit(1763360902.362:139927): avc: denied { unmount } for pid=5337 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1886.289597][ T36] audit: type=1400 audit(1763360902.362:139928): avc: denied { read write } for pid=5337 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1886.362131][T10025] loop5: detected capacity change from 0 to 7 [ 1887.412556][T10072] overlayfs: overlapping lowerdir path [ 1887.882353][T10096] debugfs: Bad value for 'uid' [ 1887.887267][T10096] debugfs: Bad value for 'uid' [ 1888.052304][T10106] overlayfs: overlapping lowerdir path [ 1888.196388][T10116] debugfs: Bad value for 'uid' [ 1888.201663][T10116] debugfs: Bad value for 'uid' [ 1888.430120][T10126] binder: Bad value for 'max' [ 1888.877486][T10142] loop5: detected capacity change from 0 to 7 [ 1889.346966][T10161] binder: Bad value for 'max' [ 1890.712337][ T36] kauditd_printk_skb: 263 callbacks suppressed [ 1890.712353][ T36] audit: type=1400 audit(1763360907.222:140192): avc: denied { execute } for pid=10199 comm="syz.0.35237" path="/579/blkio.bfq.group_wait_time" dev="tmpfs" ino=3581 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1890.753039][ T36] audit: type=1400 audit(1763360907.252:140193): avc: denied { create } for pid=10199 comm="syz.0.35237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1890.774905][ T36] audit: type=1400 audit(1763360907.252:140194): avc: denied { ioctl } for pid=10199 comm="syz.0.35237" path="socket:[542023]" dev="sockfs" ino=542023 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1890.805638][ T36] audit: type=1400 audit(1763360907.252:140195): avc: denied { write } for pid=10199 comm="syz.0.35237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1890.840184][ T36] audit: type=1400 audit(1763360907.312:140196): avc: denied { execute } for pid=10201 comm="syz.4.35236" path="/423/blkio.bfq.group_wait_time" dev="tmpfs" ino=2590 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1890.939601][ T36] audit: type=1400 audit(1763360907.382:140197): avc: denied { execute } for pid=10203 comm="syz.0.35238" path="/580/blkio.bfq.group_wait_time" dev="tmpfs" ino=3587 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1890.984692][ T36] audit: type=1400 audit(1763360907.392:140198): avc: denied { mounton } for pid=10201 comm="syz.4.35236" path="/423/file0" dev="tmpfs" ino=2591 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1891.028040][ T36] audit: type=1400 audit(1763360907.392:140199): avc: denied { mount } for pid=10201 comm="syz.4.35236" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1891.119608][ T36] audit: type=1400 audit(1763360907.392:140200): avc: denied { mounton } for pid=10201 comm="syz.4.35236" path="/423/file0" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1891.189620][ T36] audit: type=1400 audit(1763360907.392:140201): avc: denied { getattr } for pid=10201 comm="syz.4.35236" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1891.490478][T10214] debugfs: Bad value for 'uid' [ 1891.499584][T10214] debugfs: Bad value for 'uid' [ 1891.954605][T10220] bridge0: port 1(bridge_slave_0) entered blocking state [ 1891.971895][T10220] bridge0: port 1(bridge_slave_0) entered disabled state [ 1891.979093][T10220] bridge_slave_0: entered allmulticast mode [ 1891.987507][T10220] bridge_slave_0: entered promiscuous mode [ 1891.995822][T10220] bridge0: port 2(bridge_slave_1) entered blocking state [ 1892.013770][T10220] bridge0: port 2(bridge_slave_1) entered disabled state [ 1892.029642][T10220] bridge_slave_1: entered allmulticast mode [ 1892.037290][T10220] bridge_slave_1: entered promiscuous mode [ 1892.242282][ T9721] bridge_slave_1: left allmulticast mode [ 1892.248754][ T9721] bridge_slave_1: left promiscuous mode [ 1892.268300][ T9721] bridge0: port 2(bridge_slave_1) entered disabled state [ 1892.276098][ T9721] bridge_slave_0: left allmulticast mode [ 1892.289584][ T9721] bridge_slave_0: left promiscuous mode [ 1892.295303][ T9721] bridge0: port 1(bridge_slave_0) entered disabled state [ 1892.397758][ T9721] veth1_macvtap: left promiscuous mode [ 1892.403680][ T9721] veth0_vlan: left promiscuous mode [ 1892.459968][ T9721] veth0_to_batadv (unregistering): left allmulticast mode [ 1892.555921][T10220] bridge0: port 2(bridge_slave_1) entered blocking state [ 1892.563042][T10220] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1892.570376][T10220] bridge0: port 1(bridge_slave_0) entered blocking state [ 1892.577511][T10220] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1892.635601][ T9881] bridge0: port 1(bridge_slave_0) entered disabled state [ 1892.649053][ T9881] bridge0: port 2(bridge_slave_1) entered disabled state [ 1892.682679][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 1892.689845][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1892.703674][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 1892.711044][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1892.816354][T10220] veth0_vlan: entered promiscuous mode [ 1892.864596][T10220] veth1_macvtap: entered promiscuous mode [ 1895.739603][ T36] kauditd_printk_skb: 227 callbacks suppressed [ 1895.739624][ T36] audit: type=1400 audit(1763360912.242:140429): avc: denied { execute } for pid=10319 comm="syz.0.35291" path="/591/blkio.bfq.group_wait_time" dev="tmpfs" ino=3654 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1895.809607][ T36] audit: type=1400 audit(1763360912.292:140430): avc: denied { execute } for pid=10321 comm="syz.2.35289" path="/80/blkio.bfq.group_wait_time" dev="tmpfs" ino=508 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1895.860360][ T36] audit: type=1400 audit(1763360912.312:140431): avc: denied { execmem } for pid=10322 comm="syz.0.35292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1896.003284][ T36] audit: type=1400 audit(1763360912.512:140432): avc: denied { execute } for pid=10325 comm="syz.0.35293" path="/593/blkio.bfq.group_wait_time" dev="tmpfs" ino=3666 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1896.079657][ T36] audit: type=1400 audit(1763360912.552:140433): avc: denied { create } for pid=10325 comm="syz.0.35293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1896.119589][ T36] audit: type=1400 audit(1763360912.562:140434): avc: denied { write } for pid=10325 comm="syz.0.35293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1896.169604][ T36] audit: type=1400 audit(1763360912.562:140435): avc: denied { nlmsg_write } for pid=10325 comm="syz.0.35293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1896.219608][ T36] audit: type=1400 audit(1763360912.652:140436): avc: denied { execute } for pid=10327 comm="syz.0.35294" path="/594/blkio.bfq.group_wait_time" dev="tmpfs" ino=3672 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1896.264891][ T36] audit: type=1400 audit(1763360912.752:140437): avc: denied { execute } for pid=10329 comm="syz.0.35296" path="/595/blkio.bfq.group_wait_time" dev="tmpfs" ino=3678 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1896.328722][ T36] audit: type=1400 audit(1763360912.762:140438): avc: denied { write } for pid=10329 comm="syz.0.35296" name="raw6" dev="proc" ino=4026533007 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1896.680299][T10346] SELinux: Context is not valid (left unmapped). [ 1897.170895][ T9721] bridge_slave_1: left allmulticast mode [ 1897.176573][ T9721] bridge_slave_1: left promiscuous mode [ 1897.201112][ T9721] bridge0: port 2(bridge_slave_1) entered disabled state [ 1897.223473][T10376] debugfs: Bad value for 'uid' [ 1897.228300][T10376] debugfs: Bad value for 'uid' [ 1897.229800][ T9721] bridge_slave_0: left allmulticast mode [ 1897.238870][ T9721] bridge_slave_0: left promiscuous mode [ 1897.265287][ T9721] bridge0: port 1(bridge_slave_0) entered disabled state [ 1897.430389][ T9721] veth1_macvtap: left promiscuous mode [ 1897.435948][ T9721] veth0_vlan: left promiscuous mode [ 1897.661308][T10356] bridge0: port 1(bridge_slave_0) entered blocking state [ 1897.678580][T10356] bridge0: port 1(bridge_slave_0) entered disabled state [ 1897.686775][T10356] bridge_slave_0: entered allmulticast mode [ 1897.710147][T10356] bridge_slave_0: entered promiscuous mode [ 1897.727944][T10356] bridge0: port 2(bridge_slave_1) entered blocking state [ 1897.769587][T10356] bridge0: port 2(bridge_slave_1) entered disabled state [ 1897.786929][T10356] bridge_slave_1: entered allmulticast mode [ 1897.800710][T10356] bridge_slave_1: entered promiscuous mode [ 1898.196837][ T9881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1898.204108][ T9881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1898.253582][ T9721] bridge0: port 2(bridge_slave_1) entered blocking state [ 1898.260679][ T9721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1898.369177][T10356] veth0_vlan: entered promiscuous mode [ 1898.453757][T10356] veth1_macvtap: entered promiscuous mode [ 1900.751640][ T36] kauditd_printk_skb: 329 callbacks suppressed [ 1900.751658][ T36] audit: type=1400 audit(1763360917.262:140768): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1900.819860][ T36] audit: type=1400 audit(1763360917.262:140769): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1900.879596][ T36] audit: type=1400 audit(1763360917.262:140770): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1900.925837][ T36] audit: type=1400 audit(1763360917.262:140771): avc: denied { execute } for pid=10490 comm="syz.4.35369" path="/457/blkio.bfq.group_wait_time" dev="tmpfs" ino=2808 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1900.979591][ T36] audit: type=1400 audit(1763360917.322:140772): avc: denied { execute } for pid=10492 comm="syz.3.35370" path="/37/blkio.bfq.group_wait_time" dev="tmpfs" ino=246 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1901.020794][ T36] audit: type=1400 audit(1763360917.322:140773): avc: denied { read write } for pid=10492 comm="syz.3.35370" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1901.045380][ T36] audit: type=1400 audit(1763360917.322:140774): avc: denied { read write open } for pid=10492 comm="syz.3.35370" path="/dev/raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1901.259604][ T36] audit: type=1400 audit(1763360917.762:140775): avc: denied { execute } for pid=10494 comm="syz.2.35371" path="/93/blkio.bfq.group_wait_time" dev="tmpfs" ino=591 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1901.309593][ T36] audit: type=1400 audit(1763360917.802:140776): avc: denied { mounton } for pid=10494 comm="syz.2.35371" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1901.369598][ T36] audit: type=1400 audit(1763360917.862:140777): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1904.398896][T10614] loop5: detected capacity change from 0 to 7 [ 1905.768158][ T36] kauditd_printk_skb: 230 callbacks suppressed [ 1905.768176][ T36] audit: type=1400 audit(1763360922.272:141008): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1905.852348][ T36] audit: type=1400 audit(1763360922.272:141009): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1905.897030][ T36] audit: type=1400 audit(1763360922.272:141010): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1905.942177][ T36] audit: type=1400 audit(1763360922.312:141011): avc: denied { execute } for pid=10660 comm="syz.0.35451" path="/28/blkio.bfq.group_wait_time" dev="tmpfs" ino=191 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1906.009647][ T36] audit: type=1400 audit(1763360922.322:141012): avc: denied { execute } for pid=10662 comm="syz.3.35449" path="/61/blkio.bfq.group_wait_time" dev="tmpfs" ino=392 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1906.067391][ T36] audit: type=1400 audit(1763360922.322:141013): avc: denied { remount } for pid=10660 comm="syz.0.35451" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1906.132279][ T36] audit: type=1400 audit(1763360922.352:141014): avc: denied { execute } for pid=10659 comm="syz.2.35452" path="/121/blkio.bfq.group_wait_time" dev="tmpfs" ino=762 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1906.208660][ T36] audit: type=1400 audit(1763360922.362:141015): avc: denied { map } for pid=10659 comm="syz.2.35452" path="socket:[544581]" dev="sockfs" ino=544581 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1906.252505][ T36] audit: type=1400 audit(1763360922.362:141016): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1906.279651][ T36] audit: type=1400 audit(1763360922.362:141017): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1906.391699][T10686] loop5: detected capacity change from 0 to 7 [ 1908.519605][T12601] usb 4-1: new high-speed USB device number 56 using dummy_hcd [ 1908.699592][T12601] usb 4-1: Using ep0 maxpacket: 16 [ 1908.726300][T12601] usb 4-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 1908.749583][T12601] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1908.757624][T12601] usb 4-1: Product: syz [ 1908.769581][T12601] usb 4-1: Manufacturer: syz [ 1908.774214][T12601] usb 4-1: SerialNumber: syz [ 1908.792539][T12601] r8152-cfgselector 4-1: Unknown version 0x0000 [ 1908.809586][T12601] r8152-cfgselector 4-1: config 0 descriptor?? [ 1909.031768][T12601] r8152-cfgselector 4-1: Unknown version 0x0000 [ 1909.044835][T12601] r8152-cfgselector 4-1: bad CDC descriptors [ 1909.056758][T12601] r8152-cfgselector 4-1: USB disconnect, device number 56 [ 1910.825599][ T36] kauditd_printk_skb: 268 callbacks suppressed [ 1910.825616][ T36] audit: type=1400 audit(1763360927.332:141286): avc: denied { execute } for pid=10854 comm="syz.3.35546" path="/87/blkio.bfq.group_wait_time" dev="tmpfs" ino=549 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1910.886985][ T36] audit: type=1400 audit(1763360927.372:141287): avc: denied { write } for pid=10854 comm="syz.3.35546" name="sockstat" dev="proc" ino=4026532467 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1910.929627][ T36] audit: type=1400 audit(1763360927.372:141288): avc: denied { write } for pid=10854 comm="syz.3.35546" path="/proc/178/net/sockstat" dev="proc" ino=4026532467 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1911.019600][ T36] audit: type=1400 audit(1763360927.392:141289): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1911.069589][ T36] audit: type=1400 audit(1763360927.392:141290): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1911.109594][ T36] audit: type=1400 audit(1763360927.392:141291): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1911.159614][ T36] audit: type=1400 audit(1763360927.482:141292): avc: denied { execute } for pid=10856 comm="syz.3.35547" path="/88/blkio.bfq.group_wait_time" dev="tmpfs" ino=555 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1911.248411][ T36] audit: type=1400 audit(1763360927.752:141293): avc: denied { execute } for pid=10858 comm="syz.4.35548" path="/498/blkio.bfq.group_wait_time" dev="tmpfs" ino=3063 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1911.347965][ T36] audit: type=1400 audit(1763360927.852:141294): avc: denied { execute } for pid=10860 comm="syz.4.35550" path="/499/blkio.bfq.group_wait_time" dev="tmpfs" ino=3069 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1911.409584][ T36] audit: type=1400 audit(1763360927.902:141295): avc: denied { execute } for pid=10862 comm="syz.0.35549" path="/52/cpuacct.usage_sys" dev="tmpfs" ino=339 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1912.217434][T10913] netlink: 64 bytes leftover after parsing attributes in process `syz.2.35575'. [ 1914.345412][T11016] VFS: Mount too revealing [ 1915.862215][ T36] kauditd_printk_skb: 250 callbacks suppressed [ 1915.862232][ T36] audit: type=1400 audit(1763360932.372:141546): avc: denied { execute } for pid=11072 comm="syz.2.35652" path="/168/cpuacct.usage_percpu_sys" dev="tmpfs" ino=1054 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1915.895415][ T36] audit: type=1400 audit(1763360932.372:141547): avc: denied { read write } for pid=11072 comm="syz.2.35652" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1915.919930][ T36] audit: type=1400 audit(1763360932.372:141548): avc: denied { read write open } for pid=11072 comm="syz.2.35652" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1915.946679][ T36] audit: type=1400 audit(1763360932.432:141549): avc: denied { execute } for pid=11074 comm="syz.2.35653" path="/169/blkio.bfq.group_wait_time" dev="tmpfs" ino=1060 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1915.980322][ T36] audit: type=1400 audit(1763360932.492:141550): avc: denied { execute } for pid=11076 comm="syz.2.35654" path="/170/blkio.bfq.group_wait_time" dev="tmpfs" ino=1066 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1916.006216][ T36] audit: type=1400 audit(1763360932.492:141551): avc: denied { create } for pid=11076 comm="syz.2.35654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1916.033739][ T36] audit: type=1400 audit(1763360932.492:141552): avc: denied { write } for pid=11076 comm="syz.2.35654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1916.055570][ T36] audit: type=1400 audit(1763360932.552:141553): avc: denied { execute } for pid=11078 comm="syz.2.35655" path="/171/blkio.bfq.group_wait_time" dev="tmpfs" ino=1072 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1916.105130][ T36] audit: type=1400 audit(1763360932.552:141554): avc: denied { write } for pid=11078 comm="syz.2.35655" name="sockstat" dev="proc" ino=4026532384 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1916.131894][ T36] audit: type=1400 audit(1763360932.552:141555): avc: denied { write } for pid=11078 comm="syz.2.35655" path="/proc/354/net/sockstat" dev="proc" ino=4026532384 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1916.548413][T11113] netlink: 172 bytes leftover after parsing attributes in process `syz.4.35673'. [ 1916.567894][T11113] netlink: 16 bytes leftover after parsing attributes in process `syz.4.35673'. [ 1917.408562][T11131] netlink: 'syz.2.35680': attribute type 16 has an invalid length. [ 1917.428478][T11131] netlink: 'syz.2.35680': attribute type 2 has an invalid length. [ 1917.448727][T11131] netlink: 64086 bytes leftover after parsing attributes in process `syz.2.35680'. [ 1917.901383][T11147] veth0_to_batadv: entered allmulticast mode [ 1918.776641][T11184] 8021q: VLANs not supported on xfrm0 [ 1918.817366][T11189] 9pnet: Could not find request transport: 0xffffffffffffffff [ 1920.880299][ T36] kauditd_printk_skb: 320 callbacks suppressed [ 1920.880317][ T36] audit: type=1400 audit(1763360937.392:141876): avc: denied { execute } for pid=11271 comm="syz.0.35751" path="/87/blkio.bfq.group_wait_time" dev="tmpfs" ino=557 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1920.980697][ T36] audit: type=1400 audit(1763360937.492:141877): avc: denied { execute } for pid=11273 comm="syz.0.35753" path="/88/blkio.bfq.group_wait_time" dev="tmpfs" ino=563 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1921.027368][ T36] audit: type=1400 audit(1763360937.522:141878): avc: denied { create } for pid=11273 comm="syz.0.35753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1921.073031][ T36] audit: type=1400 audit(1763360937.522:141879): avc: denied { create } for pid=11273 comm="syz.0.35753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1921.112201][ T36] audit: type=1400 audit(1763360937.522:141880): avc: denied { write } for pid=11273 comm="syz.0.35753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1921.137797][ T36] audit: type=1400 audit(1763360937.572:141881): avc: denied { execute } for pid=11275 comm="syz.4.35752" path="/567/cpuacct.usage_sys" dev="tmpfs" ino=3502 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1921.168135][ T36] audit: type=1400 audit(1763360937.612:141882): avc: denied { execmem } for pid=11277 comm="syz.0.35755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1921.188667][ T36] audit: type=1400 audit(1763360937.612:141883): avc: denied { execute } for pid=11277 comm="syz.0.35755" path="/89/blkio.bfq.group_wait_time" dev="tmpfs" ino=569 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1921.213726][ T36] audit: type=1400 audit(1763360937.672:141884): avc: denied { execute } for pid=11282 comm="syz.2.35754" path="/191/blkio.bfq.group_wait_time" dev="tmpfs" ino=1195 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1921.269956][ T36] audit: type=1400 audit(1763360937.702:141885): avc: denied { execute } for pid=11285 comm="syz.2.35758" path="/192/blkio.bfq.group_wait_time" dev="tmpfs" ino=1202 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1922.825856][T11342] veth0_to_batadv: entered allmulticast mode [ 1926.188377][ T36] kauditd_printk_skb: 302 callbacks suppressed [ 1926.188394][ T36] audit: type=1400 audit(1763360942.692:142188): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1926.267222][ T36] audit: type=1400 audit(1763360942.732:142189): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1926.359582][ T36] audit: type=1400 audit(1763360942.732:142190): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1926.415799][ T36] audit: type=1400 audit(1763360942.772:142192): avc: denied { execute } for pid=11471 comm="syz.3.35850" path="/164/blkio.bfq.group_wait_time" dev="tmpfs" ino=1036 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1926.457293][ T36] audit: type=1400 audit(1763360942.772:142191): avc: denied { execute } for pid=11470 comm="syz.2.35851" path="/221/blkio.bfq.group_wait_time" dev="tmpfs" ino=1378 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1926.514797][ T36] audit: type=1400 audit(1763360942.772:142193): avc: denied { create } for pid=11470 comm="syz.2.35851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1926.569589][ T36] audit: type=1400 audit(1763360942.772:142194): avc: denied { write } for pid=11470 comm="syz.2.35851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1926.645109][ T36] audit: type=1400 audit(1763360942.772:142195): avc: denied { read } for pid=11470 comm="syz.2.35851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1926.689621][ T36] audit: type=1400 audit(1763360942.772:142196): avc: denied { read } for pid=11470 comm="syz.2.35851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1926.736065][ T36] audit: type=1400 audit(1763360942.772:142197): avc: denied { create } for pid=11470 comm="syz.2.35851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1928.319594][ T3249] usb 4-1: new high-speed USB device number 57 using dummy_hcd [ 1928.479583][ T3249] usb 4-1: Using ep0 maxpacket: 16 [ 1928.501173][ T3249] usb 4-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 1928.524962][ T3249] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1928.549589][ T3249] usb 4-1: Product: syz [ 1928.555765][ T3249] usb 4-1: Manufacturer: syz [ 1928.574050][ T3249] usb 4-1: SerialNumber: syz [ 1928.591995][ T3249] r8152-cfgselector 4-1: Unknown version 0x0000 [ 1928.603826][ T3249] r8152-cfgselector 4-1: config 0 descriptor?? [ 1928.837794][ T3249] r8152-cfgselector 4-1: Unknown version 0x0000 [ 1928.850756][ T3249] r8152-cfgselector 4-1: bad CDC descriptors [ 1928.858605][ T3249] r8152-cfgselector 4-1: USB disconnect, device number 57 [ 1928.980331][ T9881] bridge_slave_1: left allmulticast mode [ 1928.985994][ T9881] bridge_slave_1: left promiscuous mode [ 1928.999629][ T9881] bridge0: port 2(bridge_slave_1) entered disabled state [ 1929.010727][ T9881] bridge_slave_0: left allmulticast mode [ 1929.016613][ T9881] bridge_slave_0: left promiscuous mode [ 1929.024397][ T9881] bridge0: port 1(bridge_slave_0) entered disabled state [ 1929.145574][ T9881] veth1_macvtap: left promiscuous mode [ 1929.155196][ T9881] veth0_vlan: left promiscuous mode [ 1929.216686][ T9881] veth0_to_batadv (unregistering): left allmulticast mode [ 1929.281256][T11559] bridge0: port 1(bridge_slave_0) entered blocking state [ 1929.298209][T11559] bridge0: port 1(bridge_slave_0) entered disabled state [ 1929.305572][T11559] bridge_slave_0: entered allmulticast mode [ 1929.319980][T11559] bridge_slave_0: entered promiscuous mode [ 1929.327355][T11559] bridge0: port 2(bridge_slave_1) entered blocking state [ 1929.339569][T11559] bridge0: port 2(bridge_slave_1) entered disabled state [ 1929.355663][T11559] bridge_slave_1: entered allmulticast mode [ 1929.380523][T11559] bridge_slave_1: entered promiscuous mode [ 1929.638030][T11559] bridge0: port 2(bridge_slave_1) entered blocking state [ 1929.645156][T11559] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1929.652491][T11559] bridge0: port 1(bridge_slave_0) entered blocking state [ 1929.659637][T11559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1929.753577][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 1929.768314][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 1929.791199][ T9881] bridge0: port 1(bridge_slave_0) entered blocking state [ 1929.798242][ T9881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1929.830001][ T9881] bridge0: port 2(bridge_slave_1) entered blocking state [ 1929.837089][ T9881] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1929.849622][ T574] usb 4-1: new high-speed USB device number 58 using dummy_hcd [ 1929.945267][T11559] veth0_vlan: entered promiscuous mode [ 1929.985435][T11559] veth1_macvtap: entered promiscuous mode [ 1930.029617][ T574] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1930.049772][ T574] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1930.070797][ T574] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1930.088282][ T574] usb 4-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1930.098062][ T574] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1930.111755][ T574] usb 4-1: config 0 descriptor?? [ 1930.196700][T11622] veth0_to_batadv: entered allmulticast mode [ 1930.539927][ T574] plantronics 0003:047F:FFFF.0012: No inputs registered, leaving [ 1930.577415][ T574] plantronics 0003:047F:FFFF.0012: hiddev96,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.3-1/input0 [ 1930.873216][ T3249] usb 4-1: USB disconnect, device number 58 [ 1931.270348][ T36] kauditd_printk_skb: 447 callbacks suppressed [ 1931.270364][ T36] audit: type=1400 audit(1763360947.782:142645): avc: denied { execute } for pid=11691 comm="syz.2.35953" path="/257/blkio.bfq.group_wait_time" dev="tmpfs" ino=1605 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1931.349578][ T36] audit: type=1400 audit(1763360947.852:142646): avc: denied { execute } for pid=11693 comm="syz.2.35954" path="/258/blkio.bfq.group_wait_time" dev="tmpfs" ino=1611 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1931.396749][ T36] audit: type=1400 audit(1763360947.902:142647): avc: denied { execute } for pid=11695 comm="syz.2.35955" path="/259/blkio.bfq.group_wait_time" dev="tmpfs" ino=1617 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1931.449596][ T36] audit: type=1400 audit(1763360947.952:142648): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1931.529583][ T36] audit: type=1400 audit(1763360947.952:142649): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1931.591580][ T36] audit: type=1400 audit(1763360947.952:142650): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1931.627949][ T36] audit: type=1400 audit(1763360947.992:142651): avc: denied { execute } for pid=11697 comm="syz.3.35957" path="/176/blkio.bfq.group_wait_time" dev="tmpfs" ino=1111 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1931.708519][ T36] audit: type=1400 audit(1763360948.042:142652): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1931.779792][ T36] audit: type=1400 audit(1763360948.042:142653): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1931.830474][ T36] audit: type=1400 audit(1763360948.042:142654): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1932.211950][T11736] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 [ 1932.559581][T13321] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 1932.574404][T11760] veth0_to_batadv: entered allmulticast mode [ 1932.734576][T13321] usb 5-1: Using ep0 maxpacket: 16 [ 1932.769613][T13321] usb 5-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 1932.788857][T13321] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1932.807180][T13321] usb 5-1: Product: syz [ 1932.812963][T13321] usb 5-1: Manufacturer: syz [ 1932.817676][T13321] usb 5-1: SerialNumber: syz [ 1932.832765][T13321] r8152-cfgselector 5-1: Unknown version 0x0000 [ 1932.839578][T13321] r8152-cfgselector 5-1: config 0 descriptor?? [ 1932.850591][T11773] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11773 comm=syz.2.35993 [ 1933.057618][T13321] r8152-cfgselector 5-1: Unknown version 0x0000 [ 1933.072948][T13321] r8152-cfgselector 5-1: bad CDC descriptors [ 1933.098890][T13321] r8152-cfgselector 5-1: USB disconnect, device number 3 [ 1935.382899][T11876] overlayfs: overlapping lowerdir path [ 1936.311391][ T36] kauditd_printk_skb: 387 callbacks suppressed [ 1936.311408][ T36] audit: type=1400 audit(1763360952.822:143042): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1936.404419][ T36] audit: type=1400 audit(1763360952.862:143043): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1936.484092][ T36] audit: type=1400 audit(1763360952.862:143044): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1936.555569][ T36] audit: type=1400 audit(1763360952.942:143045): avc: denied { execute } for pid=11901 comm="syz.3.36056" path="/215/blkio.bfq.group_wait_time" dev="tmpfs" ino=1357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1936.605811][ T36] audit: type=1400 audit(1763360952.942:143046): avc: denied { read write } for pid=11901 comm="syz.3.36056" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1936.658093][ T36] audit: type=1400 audit(1763360952.942:143047): avc: denied { read write open } for pid=11901 comm="syz.3.36056" path="/dev/raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1936.687813][ T36] audit: type=1400 audit(1763360952.942:143048): avc: denied { ioctl } for pid=11901 comm="syz.3.36056" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1936.713641][T13321] usb 4-1: new high-speed USB device number 59 using dummy_hcd [ 1936.721979][ T36] audit: type=1400 audit(1763360952.942:143049): avc: denied { ioctl } for pid=11901 comm="syz.3.36056" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1936.748128][ T36] audit: type=1400 audit(1763360952.952:143050): avc: denied { ioctl } for pid=11901 comm="syz.3.36056" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1936.774390][ T36] audit: type=1400 audit(1763360952.952:143051): avc: denied { ioctl } for pid=11901 comm="syz.3.36056" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1936.919573][T13321] usb 4-1: Using ep0 maxpacket: 16 [ 1936.931696][T13321] usb 4-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 1936.950335][T13321] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1936.965130][T13321] usb 4-1: Product: syz [ 1936.969370][T13321] usb 4-1: Manufacturer: syz [ 1936.974001][T13321] usb 4-1: SerialNumber: syz [ 1937.009396][T13321] r8152-cfgselector 4-1: Unknown version 0x0000 [ 1937.015708][T13321] r8152-cfgselector 4-1: config 0 descriptor?? [ 1937.249598][T13321] r8152-cfgselector 4-1: Unknown version 0x0000 [ 1937.259611][T13321] r8152-cfgselector 4-1: bad CDC descriptors [ 1937.277046][T13321] r8152-cfgselector 4-1: USB disconnect, device number 59 [ 1939.833066][T12051] overlayfs: missing 'lowerdir' [ 1940.417367][T12076] netlink: 'syz.4.36143': attribute type 4 has an invalid length. [ 1940.789572][ T3249] usb 5-1: new high-speed USB device number 4 using dummy_hcd [ 1940.939565][ T3249] usb 5-1: Using ep0 maxpacket: 32 [ 1940.953092][ T3249] usb 5-1: config 0 has an invalid interface number: 184 but max is 0 [ 1940.969562][ T3249] usb 5-1: config 0 has no interface number 0 [ 1940.975681][ T3249] usb 5-1: config 0 interface 184 has no altsetting 0 [ 1940.994589][ T3249] usb 5-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 1941.010222][ T3249] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1941.029038][ T3249] usb 5-1: Product: syz [ 1941.038489][ T3249] usb 5-1: Manufacturer: syz [ 1941.048580][ T3249] usb 5-1: SerialNumber: syz [ 1941.069569][ T3249] usb 5-1: config 0 descriptor?? [ 1941.098830][ T3249] smsc75xx v1.0.0 [ 1941.390004][ T36] kauditd_printk_skb: 347 callbacks suppressed [ 1941.390020][ T36] audit: type=1400 audit(1763360957.902:143399): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1941.438244][ T36] audit: type=1400 audit(1763360957.932:143400): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1941.504035][ T36] audit: type=1400 audit(1763360957.932:143401): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1941.535977][ T3249] smsc75xx 5-1:0.184 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -71 [ 1941.571388][ T36] audit: type=1400 audit(1763360957.972:143402): avc: denied { execute } for pid=12100 comm="syz.3.36155" path="/236/blkio.bfq.group_wait_time" dev="tmpfs" ino=1485 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1941.572254][ T3249] smsc75xx 5-1:0.184 (unnamed net_device) (uninitialized): Failed to read PMT_CTL: -71 [ 1941.650598][ T3249] smsc75xx 5-1:0.184 (unnamed net_device) (uninitialized): device not ready in smsc75xx_bind [ 1941.659589][ T36] audit: type=1400 audit(1763360958.002:143403): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1941.671047][ T3249] smsc75xx 5-1:0.184: probe with driver smsc75xx failed with error -71 [ 1941.717117][ T36] audit: type=1400 audit(1763360958.002:143404): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1941.768812][ T36] audit: type=1400 audit(1763360958.002:143405): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1941.769672][ T3249] usb 5-1: USB disconnect, device number 4 [ 1941.872940][ T36] audit: type=1400 audit(1763360958.052:143406): avc: denied { execute } for pid=12102 comm="syz.3.36156" path="/237/blkio.bfq.io_wait_time_recursive" dev="tmpfs" ino=1491 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1941.936685][ T36] audit: type=1400 audit(1763360958.052:143407): avc: denied { execute } for pid=12102 comm="syz.3.36156" path="/237/cpuacct.usage_percpu" dev="tmpfs" ino=1492 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1941.969894][ T36] audit: type=1400 audit(1763360958.072:143408): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1946.402122][ T36] kauditd_printk_skb: 417 callbacks suppressed [ 1946.402139][ T36] audit: type=1400 audit(1763360962.912:143826): avc: denied { execute } for pid=12338 comm="syz.3.36273" path="/288/blkio.bfq.group_wait_time" dev="tmpfs" ino=1811 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1946.479565][ T36] audit: type=1400 audit(1763360962.942:143827): avc: denied { create } for pid=12338 comm="syz.3.36273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1946.519566][ T36] audit: type=1400 audit(1763360962.972:143828): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1946.577848][ T36] audit: type=1400 audit(1763360962.972:143829): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1946.623781][ T36] audit: type=1400 audit(1763360962.972:143830): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1946.689572][ T36] audit: type=1400 audit(1763360963.002:143831): avc: denied { execute } for pid=12340 comm="syz.4.36274" path="/85/blkio.bfq.group_wait_time" dev="tmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1946.729574][ T36] audit: type=1400 audit(1763360963.012:143832): avc: denied { execute } for pid=12342 comm="syz.3.36275" path="/289/blkio.bfq.group_wait_time" dev="tmpfs" ino=1817 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1946.760653][ T36] audit: type=1400 audit(1763360963.012:143833): avc: denied { create } for pid=12342 comm="syz.3.36275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1946.795642][ T36] audit: type=1400 audit(1763360963.022:143834): avc: denied { setopt } for pid=12342 comm="syz.3.36275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1946.823274][ T36] audit: type=1400 audit(1763360963.052:143835): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1946.894122][T12355] netlink: 'syz.2.36282': attribute type 4 has an invalid length. [ 1947.829583][T13321] usb 3-1: new high-speed USB device number 36 using dummy_hcd [ 1947.999567][T13321] usb 3-1: Using ep0 maxpacket: 16 [ 1948.019658][T13321] usb 3-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 1948.040371][T13321] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1948.048694][T13321] usb 3-1: Product: syz [ 1948.056644][T13321] usb 3-1: Manufacturer: syz [ 1948.066743][T13321] usb 3-1: SerialNumber: syz [ 1948.083830][T13321] r8152-cfgselector 3-1: Unknown version 0x0000 [ 1948.093586][T13321] r8152-cfgselector 3-1: config 0 descriptor?? [ 1948.320193][T13321] r8152-cfgselector 3-1: Unknown version 0x0000 [ 1948.343830][T13321] r8152-cfgselector 3-1: bad CDC descriptors [ 1948.370831][T13321] r8152-cfgselector 3-1: USB disconnect, device number 36 [ 1950.028222][T12490] veth0_to_batadv: entered allmulticast mode [ 1950.232809][T12496] netlink: 8 bytes leftover after parsing attributes in process `syz.3.36349'. [ 1951.471937][ T36] kauditd_printk_skb: 332 callbacks suppressed [ 1951.471955][ T36] audit: type=1400 audit(1763360967.982:144168): avc: denied { create } for pid=12534 comm="syz.4.36368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1951.510953][ T36] audit: type=1400 audit(1763360968.012:144169): avc: denied { create } for pid=12534 comm="syz.4.36368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1951.577604][ T36] audit: type=1400 audit(1763360968.012:144170): avc: denied { write } for pid=12534 comm="syz.4.36368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1951.619275][ T36] audit: type=1400 audit(1763360968.012:144171): avc: denied { read } for pid=12534 comm="syz.4.36368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1951.661769][ T36] audit: type=1400 audit(1763360968.012:144172): avc: denied { read } for pid=12534 comm="syz.4.36368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1951.703901][ T36] audit: type=1400 audit(1763360968.022:144173): avc: denied { write } for pid=12534 comm="syz.4.36368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1951.724695][ T36] audit: type=1400 audit(1763360968.102:144174): avc: denied { execute } for pid=12536 comm="syz.4.36370" path="/111/blkio.bfq.group_wait_time" dev="tmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1951.749772][ T36] audit: type=1400 audit(1763360968.192:144175): avc: denied { execute } for pid=12538 comm="syz.4.36372" path="/112/blkio.bfq.group_wait_time" dev="tmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1951.782558][ T36] audit: type=1400 audit(1763360968.292:144176): avc: denied { execute } for pid=12540 comm="syz.0.36369" path="/225/blkio.bfq.group_wait_time" dev="tmpfs" ino=1427 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1951.818214][ T36] audit: type=1400 audit(1763360968.302:144177): avc: denied { execute } for pid=12542 comm="syz.2.36371" path="/346/blkio.bfq.group_wait_time" dev="tmpfs" ino=2161 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1952.089584][T13321] usb 3-1: new high-speed USB device number 37 using dummy_hcd [ 1952.239560][T13321] usb 3-1: Using ep0 maxpacket: 32 [ 1952.251821][T13321] usb 3-1: config 0 has an invalid interface number: 184 but max is 0 [ 1952.269560][T13321] usb 3-1: config 0 has no interface number 0 [ 1952.285827][T13321] usb 3-1: config 0 interface 184 has no altsetting 0 [ 1952.299172][T13321] usb 3-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 1952.317862][T13321] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1952.329602][T13321] usb 3-1: Product: syz [ 1952.333796][T13321] usb 3-1: Manufacturer: syz [ 1952.348552][T13321] usb 3-1: SerialNumber: syz [ 1952.360315][T13321] usb 3-1: config 0 descriptor?? [ 1952.379248][T13321] smsc75xx v1.0.0 [ 1952.788833][T13321] smsc75xx 3-1:0.184 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -71 [ 1952.819779][T13321] smsc75xx 3-1:0.184 (unnamed net_device) (uninitialized): Failed to read PMT_CTL: -71 [ 1952.839241][T13321] smsc75xx 3-1:0.184 (unnamed net_device) (uninitialized): device not ready in smsc75xx_bind [ 1952.854853][T13321] smsc75xx 3-1:0.184: probe with driver smsc75xx failed with error -71 [ 1952.869653][T13321] usb 3-1: USB disconnect, device number 37 [ 1952.979588][ T3249] usb 5-1: new high-speed USB device number 5 using dummy_hcd [ 1953.139561][ T3249] usb 5-1: Using ep0 maxpacket: 32 [ 1953.147247][ T3249] usb 5-1: config 0 has an invalid interface number: 184 but max is 0 [ 1953.157017][ T3249] usb 5-1: config 0 has no interface number 0 [ 1953.163945][ T3249] usb 5-1: config 0 interface 184 has no altsetting 0 [ 1953.174925][ T3249] usb 5-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 1953.185140][ T3249] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1953.193895][ T3249] usb 5-1: Product: syz [ 1953.198160][ T3249] usb 5-1: Manufacturer: syz [ 1953.203832][ T3249] usb 5-1: SerialNumber: syz [ 1953.218756][ T3249] usb 5-1: config 0 descriptor?? [ 1953.231594][ T3249] smsc75xx v1.0.0 [ 1953.647847][ T3249] smsc75xx 5-1:0.184 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -71 [ 1953.681783][ T3249] smsc75xx 5-1:0.184 (unnamed net_device) (uninitialized): Failed to read PMT_CTL: -71 [ 1953.709561][ T3249] smsc75xx 5-1:0.184 (unnamed net_device) (uninitialized): device not ready in smsc75xx_bind [ 1953.723319][ T3249] smsc75xx 5-1:0.184: probe with driver smsc75xx failed with error -71 [ 1953.737783][ T3249] usb 5-1: USB disconnect, device number 5 [ 1956.505946][ T36] kauditd_printk_skb: 279 callbacks suppressed [ 1956.505963][ T36] audit: type=1400 audit(1763360973.012:144457): avc: denied { execute } for pid=12688 comm="syz.4.36443" path="/121/blkio.bfq.group_wait_time" dev="tmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1956.579555][ T36] audit: type=1400 audit(1763360973.012:144458): avc: denied { mounton } for pid=12688 comm="syz.4.36443" path="/121/bus" dev="tmpfs" ino=764 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1956.610611][ T36] audit: type=1400 audit(1763360973.022:144459): avc: denied { unlink } for pid=12688 comm="syz.4.36443" name="#2ad" dev="tmpfs" ino=768 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1956.634204][ T36] audit: type=1400 audit(1763360973.022:144460): avc: denied { mount } for pid=12688 comm="syz.4.36443" name="/" dev="overlay" ino=762 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1956.682123][ T36] audit: type=1400 audit(1763360973.052:144461): avc: denied { unmount } for pid=11559 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1956.742755][ T36] audit: type=1400 audit(1763360973.102:144462): avc: denied { execute } for pid=12690 comm="syz.0.36445" path="/249/blkio.bfq.group_wait_time" dev="tmpfs" ino=1576 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1956.768003][ T36] audit: type=1400 audit(1763360973.102:144463): avc: denied { create } for pid=12690 comm="syz.0.36445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1956.788682][ T36] audit: type=1400 audit(1763360973.122:144464): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1956.843602][ T36] audit: type=1400 audit(1763360973.122:144465): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1956.874676][ T36] audit: type=1400 audit(1763360973.122:144466): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1957.249567][ T3249] usb 4-1: new high-speed USB device number 60 using dummy_hcd [ 1957.419566][ T3249] usb 4-1: Using ep0 maxpacket: 16 [ 1957.441056][ T3249] usb 4-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 1957.459590][ T3249] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1957.477768][ T3249] usb 4-1: Product: syz [ 1957.482040][ T3249] usb 4-1: Manufacturer: syz [ 1957.486826][ T3249] usb 4-1: SerialNumber: syz [ 1957.510199][ T3249] r8152-cfgselector 4-1: Unknown version 0x0000 [ 1957.517073][ T3249] r8152-cfgselector 4-1: config 0 descriptor?? [ 1957.740325][ T3249] r8152-cfgselector 4-1: Unknown version 0x0000 [ 1957.759718][ T3249] r8152-cfgselector 4-1: bad CDC descriptors [ 1957.778957][ T3249] r8152-cfgselector 4-1: USB disconnect, device number 60 [ 1957.897977][T12742] netlink: 'syz.2.36469': attribute type 4 has an invalid length. [ 1958.749592][ T574] usb 4-1: new high-speed USB device number 61 using dummy_hcd [ 1958.841167][T12811] can: request_module (can-proto-6) failed. [ 1958.929560][ T574] usb 4-1: Using ep0 maxpacket: 32 [ 1958.937870][ T574] usb 4-1: config 0 has an invalid interface number: 184 but max is 0 [ 1958.947263][ T574] usb 4-1: config 0 has no interface number 0 [ 1958.954109][ T574] usb 4-1: config 0 interface 184 has no altsetting 0 [ 1958.972738][ T574] usb 4-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 1958.992840][ T574] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1959.009595][ T574] usb 4-1: Product: syz [ 1959.013853][ T574] usb 4-1: Manufacturer: syz [ 1959.018454][ T574] usb 4-1: SerialNumber: syz [ 1959.031288][ T574] usb 4-1: config 0 descriptor?? [ 1959.041997][ T574] smsc75xx v1.0.0 [ 1959.100854][T12825] netlink: 268 bytes leftover after parsing attributes in process `syz.2.36510'. [ 1959.449483][ T574] smsc75xx 4-1:0.184 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -71 [ 1959.482851][ T574] smsc75xx 4-1:0.184 (unnamed net_device) (uninitialized): Failed to read PMT_CTL: -71 [ 1959.502699][ T574] smsc75xx 4-1:0.184 (unnamed net_device) (uninitialized): device not ready in smsc75xx_bind [ 1959.529604][ T574] smsc75xx 4-1:0.184: probe with driver smsc75xx failed with error -71 [ 1959.551796][ T574] usb 4-1: USB disconnect, device number 61 [ 1960.360982][T12879] can: request_module (can-proto-6) failed. [ 1960.823903][T12906] can: request_module (can-proto-6) failed. [ 1961.589272][ T36] kauditd_printk_skb: 389 callbacks suppressed [ 1961.589290][ T36] audit: type=1400 audit(1763360978.092:144856): avc: denied { execute } for pid=12925 comm="syz.0.36562" path="/279/blkio.bfq.group_wait_time" dev="tmpfs" ino=1769 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1961.652709][ T36] audit: type=1400 audit(1763360978.112:144857): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1961.700874][ T36] audit: type=1400 audit(1763360978.112:144858): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1961.759555][ T36] audit: type=1400 audit(1763360978.112:144859): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1961.814238][T12936] netlink: 104 bytes leftover after parsing attributes in process `syz.2.36561'. [ 1961.836791][ T36] audit: type=1400 audit(1763360978.142:144860): avc: denied { execute } for pid=12927 comm="syz.4.36563" path="/157/blkio.bfq.group_wait_time" dev="tmpfs" ino=988 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1961.909554][ T36] audit: type=1400 audit(1763360978.162:144861): avc: denied { execute } for pid=12929 comm="syz.3.36560" path="/355/blkio.bfq.group_wait_time" dev="tmpfs" ino=2231 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1961.979565][ T36] audit: type=1400 audit(1763360978.192:144862): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1962.049561][ T36] audit: type=1400 audit(1763360978.192:144863): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1962.107600][ T36] audit: type=1400 audit(1763360978.192:144864): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1962.166960][ T36] audit: type=1400 audit(1763360978.242:144865): avc: denied { create } for pid=12933 comm="syz.3.36565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1962.523911][ T329] tipc: Subscription rejected, illegal request [ 1965.546184][T13068] netlink: 'syz.3.36631': attribute type 4 has an invalid length. [ 1965.942711][T13079] 9pnet_fd: Insufficient options for proto=fd [ 1966.521676][T13105] 9pnet_fd: Insufficient options for proto=fd [ 1966.596211][ T36] kauditd_printk_skb: 297 callbacks suppressed [ 1966.596228][ T36] audit: type=1400 audit(1763360983.102:145163): avc: denied { create } for pid=13108 comm="syz.3.36650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1966.636903][ T36] audit: type=1400 audit(1763360983.132:145164): avc: denied { ioctl } for pid=13108 comm="syz.3.36650" path="socket:[557908]" dev="sockfs" ino=557908 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1966.664142][ T36] audit: type=1400 audit(1763360983.132:145165): avc: denied { setopt } for pid=13108 comm="syz.3.36650" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1966.753506][ T36] audit: type=1400 audit(1763360983.162:145166): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1966.780164][T13115] netlink: 'syz.3.36653': attribute type 4 has an invalid length. [ 1966.798366][ T36] audit: type=1400 audit(1763360983.162:145167): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1966.860200][ T36] audit: type=1400 audit(1763360983.162:145168): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1966.888407][ T36] audit: type=1400 audit(1763360983.182:145169): avc: denied { execute } for pid=13111 comm="syz.2.36651" path="/420/blkio.bfq.group_wait_time" dev="tmpfs" ino=2625 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1966.915962][ T36] audit: type=1400 audit(1763360983.192:145170): avc: denied { execute } for pid=13110 comm="syz.0.36652" path="/310/blkio.bfq.group_wait_time" dev="tmpfs" ino=1957 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1966.943881][ T36] audit: type=1400 audit(1763360983.252:145171): avc: denied { execute } for pid=13114 comm="syz.3.36653" path="/383/blkio.bfq.group_wait_time" dev="tmpfs" ino=2398 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1966.970310][ T36] audit: type=1400 audit(1763360983.312:145172): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1967.038391][T13125] 9pnet_fd: Insufficient options for proto=fd [ 1967.881003][T13168] overlayfs: missing 'lowerdir' [ 1968.181179][T13178] can: request_module (can-proto-6) failed. [ 1968.299579][ T574] usb 4-1: new high-speed USB device number 62 using dummy_hcd [ 1968.449550][ T574] usb 4-1: Using ep0 maxpacket: 32 [ 1968.461357][ T574] usb 4-1: config index 0 descriptor too short (expected 29220, got 36) [ 1968.484826][ T574] usb 4-1: config 0 has too many interfaces: 81, using maximum allowed: 32 [ 1968.500511][ T574] usb 4-1: config 0 has 1 interface, different from the descriptor's value: 81 [ 1968.523431][ T574] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 1968.533910][ T574] usb 4-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 1968.544555][ T574] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1968.562447][ T574] usb 4-1: config 0 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 1968.573381][ T574] usb 4-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1968.603658][ T574] usb 4-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 1968.612762][ T574] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1968.624485][T13200] can: request_module (can-proto-6) failed. [ 1968.624996][ T574] usb 4-1: config 0 descriptor?? [ 1968.860789][ T574] usblp 4-1:0.0: usblp0: USB Bidirectional printer dev 62 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 1968.891173][ T574] usb 4-1: USB disconnect, device number 62 [ 1968.909742][ T574] usblp0: removed [ 1969.170874][T13223] netlink: 'syz.2.36706': attribute type 4 has an invalid length. [ 1969.379653][ T574] usb 4-1: new high-speed USB device number 63 using dummy_hcd [ 1969.539559][ T574] usb 4-1: Using ep0 maxpacket: 32 [ 1969.563221][ T574] usb 4-1: config index 0 descriptor too short (expected 29220, got 36) [ 1969.572362][ T574] usb 4-1: config 0 has too many interfaces: 81, using maximum allowed: 32 [ 1969.588077][ T574] usb 4-1: config 0 has 1 interface, different from the descriptor's value: 81 [ 1969.602816][ T574] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 1969.616421][ T574] usb 4-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 1969.626828][ T574] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1969.638258][ T574] usb 4-1: config 0 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 1969.648944][ T574] usb 4-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1969.663326][ T574] usb 4-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 1969.674463][ T574] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1969.689656][ T574] usb 4-1: config 0 descriptor?? [ 1969.700665][T13244] netlink: 'syz.0.36715': attribute type 4 has an invalid length. [ 1969.928784][ T574] usblp 4-1:0.0: usblp0: USB Bidirectional printer dev 63 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 1969.960647][ T574] usb 4-1: USB disconnect, device number 63 [ 1969.973742][ T574] usblp0: removed [ 1970.059594][T13270] can: request_module (can-proto-6) failed. [ 1970.941831][T13327] 9pnet_fd: Insufficient options for proto=fd [ 1971.625901][ T36] kauditd_printk_skb: 375 callbacks suppressed [ 1971.625921][ T36] audit: type=1400 audit(1763360988.132:145548): avc: denied { execute } for pid=13360 comm="syz.4.36771" path="/196/blkio.bfq.group_wait_time" dev="tmpfs" ino=1228 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1971.679565][ T36] audit: type=1400 audit(1763360988.172:145549): avc: denied { remount } for pid=13362 comm="syz.3.36772" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1971.736033][ T36] audit: type=1400 audit(1763360988.222:145550): avc: denied { execute } for pid=13362 comm="syz.3.36772" path="/408/blkio.bfq.group_wait_time" dev="tmpfs" ino=2552 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1971.799558][ T36] audit: type=1400 audit(1763360988.222:145551): avc: denied { name_bind } for pid=13362 comm="syz.3.36772" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1971.849586][ T36] audit: type=1400 audit(1763360988.222:145552): avc: denied { node_bind } for pid=13362 comm="syz.3.36772" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1971.912992][ T36] audit: type=1400 audit(1763360988.242:145553): avc: denied { execute } for pid=13364 comm="syz.4.36773" path="/197/blkio.bfq.group_wait_time" dev="tmpfs" ino=1234 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1971.968263][ T36] audit: type=1400 audit(1763360988.242:145554): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1971.984704][T13371] netlink: 'syz.3.36776': attribute type 4 has an invalid length. [ 1972.018449][T13373] can: request_module (can-proto-6) failed. [ 1972.045584][ T36] audit: type=1400 audit(1763360988.242:145555): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1972.073000][ T36] audit: type=1400 audit(1763360988.242:145556): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1972.127850][ T36] audit: type=1400 audit(1763360988.342:145557): avc: denied { execute } for pid=13366 comm="syz.3.36774" path="/409/blkio.bfq.group_wait_time" dev="tmpfs" ino=2558 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1972.649854][T13391] netlink: 'syz.2.36786': attribute type 4 has an invalid length. [ 1972.753235][T13393] 9pnet_fd: Insufficient options for proto=fd [ 1972.823620][T13397] netlink: 'syz.0.36789': attribute type 8 has an invalid length. [ 1972.831963][T13397] netlink: 60 bytes leftover after parsing attributes in process `syz.0.36789'. [ 1973.053873][T13410] can: request_module (can-proto-6) failed. [ 1973.162969][T13417] netlink: 12 bytes leftover after parsing attributes in process `syz.0.36800'. [ 1975.469589][T13493] random: crng reseeded on system resumption [ 1975.620345][T13504] tipc: Started in network mode [ 1975.625300][T13504] tipc: Node identity c6ebd1867e95, cluster identity 4711 [ 1975.633423][T13504] tipc: Enabled bearer , priority 0 [ 1975.649314][T13503] tipc: Disabling bearer [ 1976.682729][ T36] kauditd_printk_skb: 241 callbacks suppressed [ 1976.682748][ T36] audit: type=1400 audit(1763360993.192:145799): avc: denied { execute } for pid=13533 comm="syz.0.36857" path="/354/blkio.bfq.group_wait_time" dev="tmpfs" ino=2228 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1976.790623][ T36] audit: type=1400 audit(1763360993.302:145800): avc: denied { execute } for pid=13535 comm="syz.0.36858" path="/355/blkio.bfq.group_wait_time" dev="tmpfs" ino=2234 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1976.850187][ T36] audit: type=1400 audit(1763360993.362:145801): avc: denied { execute } for pid=13537 comm="syz.0.36861" path="/356/blkio.bfq.group_wait_time" dev="tmpfs" ino=2240 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1976.942671][ T36] audit: type=1400 audit(1763360993.452:145802): avc: denied { execute } for pid=13539 comm="syz.0.36862" path="/357/blkio.bfq.group_wait_time" dev="tmpfs" ino=2246 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1977.065043][ T36] audit: type=1400 audit(1763360993.572:145803): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1977.149556][ T36] audit: type=1400 audit(1763360993.572:145804): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1977.205488][T13550] 9pnet: Could not find request transport: fd0x0000000000000008 [ 1977.209564][ T36] audit: type=1400 audit(1763360993.572:145805): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1977.279547][ T36] audit: type=1400 audit(1763360993.602:145806): avc: denied { execute } for pid=13545 comm="syz.3.36860" path="/431/blkio.bfq.group_wait_time" dev="tmpfs" ino=2696 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1977.341282][ T36] audit: type=1400 audit(1763360993.602:145807): avc: denied { read } for pid=13545 comm="syz.3.36860" dev="nsfs" ino=4026532434 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1977.399574][ T36] audit: type=1400 audit(1763360993.602:145808): avc: denied { read open } for pid=13545 comm="syz.3.36860" path="net:[4026532434]" dev="nsfs" ino=4026532434 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1977.728961][T13579] can: request_module (can-proto-6) failed. [ 1978.046484][T13603] can: request_module (can-proto-6) failed. [ 1979.120777][T13664] binder: Binderfs stats mode cannot be changed during a remount [ 1979.587351][T13694] tipc: Enabling of bearer rejected, failed to enable media [ 1980.598836][T13726] netlink: 'syz.3.36952': attribute type 4 has an invalid length. [ 1981.309560][T11615] usb 4-1: new high-speed USB device number 64 using dummy_hcd [ 1981.472048][T11615] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1981.493126][T11615] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1981.519556][T11615] usb 4-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 1981.530383][T11615] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1981.549774][T11615] usb 4-1: config 0 descriptor?? [ 1981.689844][ T36] kauditd_printk_skb: 1835 callbacks suppressed [ 1981.689861][ T36] audit: type=1400 audit(1763360998.202:147644): avc: denied { setattr } for pid=9683 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1981.749561][ T36] audit: type=1400 audit(1763360998.202:147645): avc: denied { setattr } for pid=9683 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1981.751544][ T9683] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1981.782173][T13734] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1981.788723][T13734] audit: audit_lost=222 audit_rate_limit=0 audit_backlog_limit=64 [ 1981.798179][ T9683] audit: audit_lost=223 audit_rate_limit=0 audit_backlog_limit=64 [ 1981.799545][ T36] audit: type=1400 audit(1763360998.202:147646): avc: denied { setattr } for pid=9683 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1981.807549][T13734] audit: backlog limit exceeded [ 1981.834465][ T9683] audit: backlog limit exceeded [ 1981.841268][ T9683] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1981.859216][T13734] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1981.878656][T13734] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1981.904496][T11615] usbhid 4-1:0.0: can't add hid device: -71 [ 1981.919591][T11615] usbhid 4-1:0.0: probe with driver usbhid failed with error -71 [ 1981.934858][T11615] usb 4-1: USB disconnect, device number 64 [ 1983.117049][T13769] binder: Binderfs stats mode cannot be changed during a remount [ 1983.624497][T13790] can: request_module (can-proto-6) failed. [ 1985.851443][T13835] netlink: 'syz.0.37005': attribute type 4 has an invalid length. [ 1986.700399][ T36] kauditd_printk_skb: 3506 callbacks suppressed [ 1986.700417][ T36] audit: type=1400 audit(1763361003.212:151112): avc: denied { setattr } for pid=9683 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1986.772596][ T36] audit: type=1400 audit(1763361003.212:151113): avc: denied { setattr } for pid=9683 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1986.824719][ T9683] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1986.826493][T10220] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1986.841731][T10220] audit: audit_lost=238 audit_rate_limit=0 audit_backlog_limit=64 [ 1986.849561][ T36] audit: type=1400 audit(1763361003.212:151114): avc: denied { setattr } for pid=9683 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1986.849590][ T36] audit: type=1400 audit(1763361003.212:151115): avc: denied { setattr } for pid=9683 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1986.849643][ T36] audit: type=1400 audit(1763361003.212:151116): avc: denied { setattr } for pid=9683 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1986.873081][ T9683] audit: audit_lost=239 audit_rate_limit=0 audit_backlog_limit=64 [ 1986.935084][T10220] audit: backlog limit exceeded [ 1987.014392][T13867] binder: Binderfs stats mode cannot be changed during a remount [ 1987.276368][T13880] netlink: 'syz.0.37027': attribute type 4 has an invalid length. [ 1988.062238][T13902] netlink: 'syz.0.37038': attribute type 4 has an invalid length. [ 1988.955511][T13924] netlink: 'syz.0.37051': attribute type 4 has an invalid length. [ 1989.588097][T13945] can: request_module (can-proto-6) failed. [ 1989.676052][T13947] netlink: 'syz.4.37060': attribute type 4 has an invalid length. [ 1989.918200][T13953] netlink: 268 bytes leftover after parsing attributes in process `syz.4.37063'. [ 1990.279577][T13321] usb 5-1: new high-speed USB device number 6 using dummy_hcd [ 1990.442351][T13321] usb 5-1: Using ep0 maxpacket: 16 [ 1990.466737][T13321] usb 5-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 1990.486801][T13321] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1990.501167][T13321] usb 5-1: Product: syz [ 1990.505448][T13321] usb 5-1: Manufacturer: syz [ 1990.520378][T13321] usb 5-1: SerialNumber: syz [ 1990.542186][T13321] r8152-cfgselector 5-1: Unknown version 0x0000 [ 1990.548473][T13321] r8152-cfgselector 5-1: config 0 descriptor?? [ 1990.774901][T13321] r8152-cfgselector 5-1: Unknown version 0x0000 [ 1990.795436][T13321] r8152-cfgselector 5-1: bad CDC descriptors [ 1990.806377][T13321] r8152-cfgselector 5-1: USB disconnect, device number 6 [ 1991.095967][T13977] tipc: Started in network mode [ 1991.111522][T13977] tipc: Node identity 9633c290dc3c, cluster identity 4711 [ 1991.118798][T13977] tipc: Enabled bearer , priority 0 [ 1991.141332][T13976] tipc: Disabling bearer [ 1991.714295][ T36] kauditd_printk_skb: 3208 callbacks suppressed [ 1991.714312][ T36] audit: type=1400 audit(1763361008.222:154318): avc: denied { setattr } for pid=9683 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1991.789546][ T36] audit: type=1400 audit(1763361008.232:154319): avc: denied { execute } for pid=13997 comm="syz.4.37086" path="/287/blkio.bfq.group_wait_time" dev="tmpfs" ino=1795 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1991.847113][ T36] audit: type=1400 audit(1763361008.252:154320): avc: denied { setattr } for pid=9683 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1991.883277][ T9683] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1991.908423][ T36] audit: type=1400 audit(1763361008.252:154321): avc: denied { setattr } for pid=9683 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1991.919559][ T9683] audit: audit_lost=242 audit_rate_limit=0 audit_backlog_limit=64 [ 1991.949551][ T36] audit: type=1400 audit(1763361008.252:154322): avc: denied { setattr } for pid=9683 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1991.959576][ T9683] audit: backlog limit exceeded [ 1991.990981][T10220] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1991.991344][ T9683] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1992.171055][T14011] binder: Binderfs stats mode cannot be changed during a remount [ 1995.361046][T14081] bridge0: port 1(bridge_slave_0) entered blocking state [ 1995.368118][T14081] bridge0: port 1(bridge_slave_0) entered disabled state [ 1995.379658][T14081] bridge_slave_0: entered allmulticast mode [ 1995.386044][T14081] bridge_slave_0: entered promiscuous mode [ 1995.570143][ T329] bridge_slave_1: left allmulticast mode [ 1995.575829][ T329] bridge_slave_1: left promiscuous mode [ 1995.594510][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 1995.610447][ T329] bridge_slave_0: left allmulticast mode [ 1995.616225][ T329] bridge_slave_0: left promiscuous mode [ 1995.632823][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 1995.761440][T14081] bridge0: port 2(bridge_slave_1) entered blocking state [ 1995.768508][T14081] bridge0: port 2(bridge_slave_1) entered disabled state [ 1995.789935][T14081] bridge_slave_1: entered allmulticast mode [ 1995.796279][T14081] bridge_slave_1: entered promiscuous mode [ 1995.816552][ T329] veth1_macvtap: left promiscuous mode [ 1995.829586][ T329] veth0_vlan: left promiscuous mode [ 1995.885034][ T329] veth0_to_batadv (unregistering): left allmulticast mode [ 1996.165570][T14081] bridge0: port 2(bridge_slave_1) entered blocking state [ 1996.172670][T14081] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1996.180076][T14081] bridge0: port 1(bridge_slave_0) entered blocking state [ 1996.187119][T14081] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1996.259865][ T9721] bridge0: port 1(bridge_slave_0) entered disabled state [ 1996.268374][ T9721] bridge0: port 2(bridge_slave_1) entered disabled state [ 1996.326837][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 1996.334118][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1996.360180][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 1996.367238][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1996.481140][T14081] veth0_vlan: entered promiscuous mode [ 1996.551950][T14081] veth1_macvtap: entered promiscuous mode [ 1996.720575][ T36] kauditd_printk_skb: 2029 callbacks suppressed [ 1996.720592][ T36] audit: type=1400 audit(1763361013.232:156303): avc: denied { execute } for pid=14135 comm="syz.3.37149" path="/503/blkio.bfq.group_wait_time" dev="tmpfs" ino=3140 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1996.730465][T14136] tipc: Enabled bearer , priority 0 [ 1996.762101][ T36] audit: type=1400 audit(1763361013.232:156304): avc: denied { create } for pid=14135 comm="syz.3.37149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1996.783107][ T36] audit: type=1400 audit(1763361013.232:156305): avc: denied { write } for pid=14135 comm="syz.3.37149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1996.804807][T14135] tipc: Disabling bearer [ 1996.805841][ T36] audit: type=1400 audit(1763361013.232:156306): avc: denied { read } for pid=14135 comm="syz.3.37149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1996.832521][ T36] audit: type=1400 audit(1763361013.232:156307): avc: denied { read } for pid=14135 comm="syz.3.37149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1996.873546][ T36] audit: type=1400 audit(1763361013.242:156308): avc: denied { write } for pid=14135 comm="syz.3.37149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1996.919347][ T36] audit: type=1400 audit(1763361013.292:156309): avc: denied { execute } for pid=14137 comm="syz.4.37150" path="/305/blkio.bfq.group_wait_time" dev="tmpfs" ino=1907 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1996.979702][ T36] audit: type=1400 audit(1763361013.292:156310): avc: denied { mounton } for pid=14137 comm="syz.4.37150" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1997.078598][ T36] audit: type=1400 audit(1763361013.292:156311): avc: denied { mount } for pid=14137 comm="syz.4.37150" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1997.114071][ T36] audit: type=1400 audit(1763361013.332:156312): avc: denied { execute } for pid=14139 comm="syz.4.37151" path="/306/blkio.bfq.group_wait_time" dev="tmpfs" ino=1913 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1999.129982][T14221] can: request_module (can-proto-6) failed. [ 2000.879934][T14282] tipc: Enabled bearer , priority 0 [ 2000.897863][T14281] tipc: Disabling bearer [ 2001.734085][ T36] kauditd_printk_skb: 347 callbacks suppressed [ 2001.734102][ T36] audit: type=1400 audit(1763361018.242:156660): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2001.799579][ T36] audit: type=1400 audit(1763361018.282:156661): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2001.845229][ T36] audit: type=1400 audit(1763361018.282:156662): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2001.915614][ T36] audit: type=1400 audit(1763361018.322:156663): avc: denied { execute } for pid=14316 comm="syz.5.37238" path="/28/blkio.bfq.group_wait_time" dev="tmpfs" ino=188 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2001.967691][ T36] audit: type=1400 audit(1763361018.342:156664): avc: denied { create } for pid=14316 comm="syz.5.37238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2001.988993][ T36] audit: type=1400 audit(1763361018.342:156665): avc: denied { setopt } for pid=14316 comm="syz.5.37238" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2002.082619][ T36] audit: type=1400 audit(1763361018.382:156666): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2002.162629][ T36] audit: type=1400 audit(1763361018.382:156667): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2002.239580][ T36] audit: type=1400 audit(1763361018.382:156668): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2002.281935][ T36] audit: type=1400 audit(1763361018.412:156669): avc: denied { execute } for pid=14320 comm="syz.5.37239" path="/29/blkio.bfq.group_wait_time" dev="tmpfs" ino=194 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2005.166883][T14447] tipc: Started in network mode [ 2005.179587][T14447] tipc: Node identity 3e15162abe4d, cluster identity 4711 [ 2005.186801][T14447] tipc: Enabled bearer , priority 0 [ 2005.210272][T14446] tipc: Disabling bearer [ 2006.752272][ T36] kauditd_printk_skb: 375 callbacks suppressed [ 2006.752289][ T36] audit: type=1400 audit(1763361023.262:157045): avc: denied { execute } for pid=14494 comm="syz.3.37327" path="/542/blkio.bfq.group_wait_time" dev="tmpfs" ino=3375 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2006.839553][ T36] audit: type=1400 audit(1763361023.282:157046): avc: denied { execute } for pid=14498 comm="syz.4.37323" path="/347/blkio.bfq.group_wait_time" dev="tmpfs" ino=2166 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2006.909557][ T36] audit: type=1400 audit(1763361023.302:157047): avc: denied { execute } for pid=14495 comm="syz.5.37328" path="/51/blkio.bfq.group_wait_time" dev="tmpfs" ino=326 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2006.930439][T14504] tipc: Started in network mode [ 2006.969668][T14504] tipc: Node identity 8e00c1f7078d, cluster identity 4711 [ 2006.976904][T14504] tipc: Enabled bearer , priority 0 [ 2006.992010][T14506] can: request_module (can-proto-6) failed. [ 2007.009560][ T36] audit: type=1400 audit(1763361023.312:157048): avc: denied { create } for pid=14495 comm="syz.5.37328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2007.031170][T14502] tipc: Disabling bearer [ 2007.069537][ T36] audit: type=1400 audit(1763361023.312:157049): avc: denied { create } for pid=14495 comm="syz.5.37328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2007.131988][ T36] audit: type=1400 audit(1763361023.332:157050): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2007.157802][ T36] audit: type=1400 audit(1763361023.332:157051): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2007.279567][ T36] audit: type=1400 audit(1763361023.332:157052): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2007.355076][ T36] audit: type=1400 audit(1763361023.352:157053): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2007.434975][ T36] audit: type=1400 audit(1763361023.352:157054): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2007.437319][T14526] can: request_module (can-proto-6) failed. [ 2008.167794][T14553] can: request_module (can-proto-6) failed. [ 2008.852686][T14579] tipc: Enabled bearer , priority 0 [ 2008.886965][T14577] tipc: Disabling bearer [ 2009.559571][ T574] usb 5-1: new high-speed USB device number 7 using dummy_hcd [ 2009.739609][ T574] usb 5-1: Using ep0 maxpacket: 32 [ 2009.761466][ T574] usb 5-1: config 0 has an invalid interface number: 184 but max is 0 [ 2009.770213][ T574] usb 5-1: config 0 has no interface number 0 [ 2009.776323][ T574] usb 5-1: config 0 interface 184 has no altsetting 0 [ 2009.795210][ T574] usb 5-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 2009.814689][ T574] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2009.829531][ T574] usb 5-1: Product: syz [ 2009.833719][ T574] usb 5-1: Manufacturer: syz [ 2009.847272][ T574] usb 5-1: SerialNumber: syz [ 2009.865741][ T574] usb 5-1: config 0 descriptor?? [ 2009.894262][ T574] smsc75xx v1.0.0 [ 2010.298424][ T574] smsc75xx 5-1:0.184 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -71 [ 2010.349543][ T574] smsc75xx 5-1:0.184 (unnamed net_device) (uninitialized): Failed to read PMT_CTL: -71 [ 2010.359301][ T574] smsc75xx 5-1:0.184 (unnamed net_device) (uninitialized): device not ready in smsc75xx_bind [ 2010.379576][ T574] smsc75xx 5-1:0.184: probe with driver smsc75xx failed with error -71 [ 2010.400377][ T574] usb 5-1: USB disconnect, device number 7 [ 2010.482621][T14637] can: request_module (can-proto-6) failed. [ 2011.810219][ T36] kauditd_printk_skb: 382 callbacks suppressed [ 2011.810236][ T36] audit: type=1400 audit(1763361028.322:157437): avc: denied { ioctl } for pid=14664 comm="syz.3.37409" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2011.879942][ T36] audit: type=1400 audit(1763361028.392:157438): avc: denied { ioctl } for pid=14664 comm="syz.3.37409" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2011.959560][ T36] audit: type=1400 audit(1763361028.392:157439): avc: denied { execute } for pid=14666 comm="syz.4.37408" path="/360/blkio.bfq.group_wait_time" dev="tmpfs" ino=2245 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2011.984866][T13321] usb 4-1: new high-speed USB device number 65 using dummy_hcd [ 2012.019555][ T36] audit: type=1400 audit(1763361028.422:157440): avc: denied { execute } for pid=14668 comm="syz.4.37410" path="/361/blkio.bfq.group_wait_time" dev="tmpfs" ino=2251 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2012.083770][ T36] audit: type=1400 audit(1763361028.432:157441): avc: denied { name_bind } for pid=14668 comm="syz.4.37410" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2012.126075][ T36] audit: type=1400 audit(1763361028.432:157442): avc: denied { node_bind } for pid=14668 comm="syz.4.37410" saddr=::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2012.159541][T13321] usb 4-1: Using ep0 maxpacket: 32 [ 2012.169544][ T36] audit: type=1400 audit(1763361028.512:157443): avc: denied { ioctl } for pid=14664 comm="syz.3.37409" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2012.178976][T13321] usb 4-1: config 0 has an invalid interface number: 184 but max is 0 [ 2012.219528][T13321] usb 4-1: config 0 has no interface number 0 [ 2012.230739][T13321] usb 4-1: config 0 interface 184 has no altsetting 0 [ 2012.234979][ T36] audit: type=1400 audit(1763361028.522:157444): avc: denied { ioctl } for pid=14664 comm="syz.3.37409" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2012.251748][T13321] usb 4-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 2012.289547][ T36] audit: type=1400 audit(1763361028.522:157445): avc: denied { ioctl } for pid=14664 comm="syz.3.37409" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2012.299611][T13321] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2012.330652][T13321] usb 4-1: Product: syz [ 2012.335183][T13321] usb 4-1: Manufacturer: syz [ 2012.341533][T13321] usb 4-1: SerialNumber: syz [ 2012.346799][ T36] audit: type=1400 audit(1763361028.592:157446): avc: denied { ioctl } for pid=14664 comm="syz.3.37409" path="/dev/raw-gadget" dev="devtmpfs" ino=190 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2012.372574][T13321] usb 4-1: config 0 descriptor?? [ 2012.382420][T13321] smsc75xx v1.0.0 [ 2012.792136][T13321] smsc75xx 4-1:0.184 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -71 [ 2012.816250][T13321] smsc75xx 4-1:0.184 (unnamed net_device) (uninitialized): Failed to read PMT_CTL: -71 [ 2012.839550][T13321] smsc75xx 4-1:0.184 (unnamed net_device) (uninitialized): device not ready in smsc75xx_bind [ 2012.859579][T13321] smsc75xx 4-1:0.184: probe with driver smsc75xx failed with error -71 [ 2012.878130][T13321] usb 4-1: USB disconnect, device number 65 [ 2014.653072][T14753] rust_binder: 750: no such ref 4294967293 [ 2015.623847][T14799] tipc: Enabled bearer , priority 0 [ 2015.640646][T14798] tipc: Disabling bearer [ 2016.820548][ T36] kauditd_printk_skb: 380 callbacks suppressed [ 2016.820565][ T36] audit: type=1400 audit(1763361033.332:157827): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2016.863823][ T36] audit: type=1400 audit(1763361033.362:157828): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2016.915526][ T36] audit: type=1400 audit(1763361033.362:157829): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2017.008508][T14839] tipc: Enabled bearer , priority 0 [ 2017.019536][ T36] audit: type=1400 audit(1763361033.402:157830): avc: denied { read } for pid=14834 comm="syz.3.37494" dev="nsfs" ino=4026532434 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2017.051723][T14838] tipc: Disabling bearer [ 2017.079546][ T36] audit: type=1400 audit(1763361033.402:157831): avc: denied { read open } for pid=14834 comm="syz.3.37494" path="net:[4026532434]" dev="nsfs" ino=4026532434 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2017.154407][ T36] audit: type=1400 audit(1763361033.402:157832): avc: denied { create } for pid=14834 comm="syz.3.37494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2017.219549][ T36] audit: type=1400 audit(1763361033.422:157833): avc: denied { read write } for pid=10220 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2017.289548][ T36] audit: type=1400 audit(1763361033.422:157834): avc: denied { read write open } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2017.335680][ T36] audit: type=1400 audit(1763361033.422:157835): avc: denied { ioctl } for pid=10220 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2017.362499][ T36] audit: type=1400 audit(1763361033.462:157836): avc: denied { execute } for pid=14836 comm="syz.5.37495" path="/96/blkio.bfq.group_wait_time" dev="tmpfs" ino=598 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2019.840457][T14946] 9pnet_fd: Insufficient options for proto=fd [ 2020.230761][ T9721] bridge_slave_1: left allmulticast mode [ 2020.240836][ T9721] bridge_slave_1: left promiscuous mode [ 2020.246495][ T9721] bridge0: port 2(bridge_slave_1) entered disabled state [ 2020.267033][ T9721] bridge_slave_0: left allmulticast mode [ 2020.286350][ T9721] bridge_slave_0: left promiscuous mode [ 2020.300502][ T9721] bridge0: port 1(bridge_slave_0) entered disabled state [ 2020.540468][ T9721] tipc: Left network mode [ 2020.550045][T14949] bridge0: port 1(bridge_slave_0) entered blocking state [ 2020.559561][T14949] bridge0: port 1(bridge_slave_0) entered disabled state [ 2020.571366][T14949] bridge_slave_0: entered allmulticast mode [ 2020.578021][T14949] bridge_slave_0: entered promiscuous mode [ 2020.589583][ T9721] veth1_macvtap: left promiscuous mode [ 2020.599165][ T9721] veth0_vlan: left promiscuous mode [ 2020.671187][ T9721] veth0_to_batadv (unregistering): left allmulticast mode [ 2020.734932][T14949] bridge0: port 2(bridge_slave_1) entered blocking state [ 2020.755141][T14949] bridge0: port 2(bridge_slave_1) entered disabled state [ 2020.765283][T14949] bridge_slave_1: entered allmulticast mode [ 2020.779941][T14949] bridge_slave_1: entered promiscuous mode [ 2020.855894][T14996] rust_binder: 808: no such ref 4294967293 [ 2021.137077][ T9721] bridge0: port 1(bridge_slave_0) entered blocking state [ 2021.144164][ T9721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2021.193676][ T9721] bridge0: port 2(bridge_slave_1) entered blocking state [ 2021.200858][ T9721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2021.374230][T14949] veth0_vlan: entered promiscuous mode [ 2021.431409][T14949] veth1_macvtap: entered promiscuous mode [ 2021.851195][ T36] kauditd_printk_skb: 493 callbacks suppressed [ 2021.851213][ T36] audit: type=1400 audit(1763361038.362:158330): avc: denied { execute } for pid=15017 comm="syz.5.37579" path="/119/blkio.bfq.group_wait_time" dev="tmpfs" ino=744 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2021.932949][ T36] audit: type=1400 audit(1763361038.422:158331): avc: denied { execute } for pid=15020 comm="syz.3.37580" path="/2/blkio.bfq.group_wait_time" dev="tmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2021.990206][ T36] audit: type=1400 audit(1763361038.432:158332): avc: denied { create } for pid=15020 comm="syz.3.37580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2022.039576][ T36] audit: type=1400 audit(1763361038.432:158333): avc: denied { create } for pid=15020 comm="syz.3.37580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2022.079586][ T36] audit: type=1400 audit(1763361038.432:158334): avc: denied { write } for pid=15020 comm="syz.3.37580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2022.131353][ T36] audit: type=1400 audit(1763361038.432:158335): avc: denied { read } for pid=15020 comm="syz.3.37580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2022.189525][ T36] audit: type=1400 audit(1763361038.432:158336): avc: denied { read } for pid=15020 comm="syz.3.37580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2022.235619][ T36] audit: type=1400 audit(1763361038.432:158337): avc: denied { write } for pid=15020 comm="syz.3.37580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2022.286759][ T36] audit: type=1400 audit(1763361038.492:158338): avc: denied { create } for pid=15020 comm="syz.3.37580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2022.287759][T15030] netlink: 8 bytes leftover after parsing attributes in process `syz.4.37582'. [ 2022.327898][ T36] audit: type=1400 audit(1763361038.492:158339): avc: denied { create } for pid=15020 comm="syz.3.37580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2024.129546][ T574] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 2024.289555][ T574] usb 6-1: Using ep0 maxpacket: 32 [ 2024.306749][ T574] usb 6-1: config 0 has an invalid interface number: 184 but max is 0 [ 2024.319552][ T574] usb 6-1: config 0 has no interface number 0 [ 2024.334178][ T574] usb 6-1: config 0 interface 184 has no altsetting 0 [ 2024.361615][ T574] usb 6-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 2024.377842][ T574] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2024.386417][ T574] usb 6-1: Product: syz [ 2024.391634][ T574] usb 6-1: Manufacturer: syz [ 2024.396355][ T574] usb 6-1: SerialNumber: syz [ 2024.411406][ T574] usb 6-1: config 0 descriptor?? [ 2024.422970][ T574] smsc75xx v1.0.0 [ 2024.830744][ T574] smsc75xx 6-1:0.184 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -71 [ 2024.851373][ T574] smsc75xx 6-1:0.184 (unnamed net_device) (uninitialized): Failed to read PMT_CTL: -71 [ 2024.867705][ T574] smsc75xx 6-1:0.184 (unnamed net_device) (uninitialized): device not ready in smsc75xx_bind [ 2024.890935][ T574] smsc75xx 6-1:0.184: probe with driver smsc75xx failed with error -71 [ 2024.910822][ T574] usb 6-1: USB disconnect, device number 2 [ 2024.941432][ T9721] bridge_slave_1: left allmulticast mode [ 2024.947100][ T9721] bridge_slave_1: left promiscuous mode [ 2024.968179][ T9721] bridge0: port 2(bridge_slave_1) entered disabled state [ 2024.997252][ T9721] bridge_slave_0: left allmulticast mode [ 2025.007180][ T9721] bridge_slave_0: left promiscuous mode [ 2025.017352][ T9721] bridge0: port 1(bridge_slave_0) entered disabled state [ 2025.200157][ T9721] tipc: Left network mode [ 2025.201188][T15130] bridge0: port 1(bridge_slave_0) entered blocking state [ 2025.227900][T15130] bridge0: port 1(bridge_slave_0) entered disabled state [ 2025.239140][T15130] bridge_slave_0: entered allmulticast mode [ 2025.245568][T15130] bridge_slave_0: entered promiscuous mode [ 2025.253193][T15130] bridge0: port 2(bridge_slave_1) entered blocking state [ 2025.260329][T15130] bridge0: port 2(bridge_slave_1) entered disabled state [ 2025.267396][T15130] bridge_slave_1: entered allmulticast mode [ 2025.273869][T15130] bridge_slave_1: entered promiscuous mode [ 2025.284566][ T9721] veth1_macvtap: left promiscuous mode [ 2025.292006][ T9721] veth0_vlan: left promiscuous mode [ 2025.326468][ T9721] veth0_to_batadv (unregistering): left allmulticast mode [ 2025.655860][T15160] rust_binder: 262: no such ref 4294967293 [ 2025.725665][ T9881] bridge0: port 1(bridge_slave_0) entered blocking state [ 2025.732846][ T9881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2025.774653][ T329] bridge0: port 2(bridge_slave_1) entered blocking state [ 2025.781746][ T329] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2026.019606][T15130] veth0_vlan: entered promiscuous mode [ 2026.100906][T15130] veth1_macvtap: entered promiscuous mode [ 2026.863102][ T36] kauditd_printk_skb: 478 callbacks suppressed [ 2026.863119][ T36] audit: type=1400 audit(1763361043.372:158818): avc: denied { execute } for pid=15196 comm="syz.0.37662" name="file0" dev="tmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2026.909584][ T36] audit: type=1400 audit(1763361043.402:158819): avc: denied { execute_no_trans } for pid=15196 comm="syz.0.37662" path="/5/file0" dev="tmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2026.989562][ T36] audit: type=1400 audit(1763361043.402:158820): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2027.054260][ T36] audit: type=1400 audit(1763361043.402:158821): avc: denied { read write open } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2027.117061][ T36] audit: type=1400 audit(1763361043.402:158822): avc: denied { ioctl } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2027.184492][ T36] audit: type=1400 audit(1763361043.482:158823): avc: denied { execute } for pid=15198 comm="syz.3.37661" path="/19/blkio.bfq.group_wait_time" dev="tmpfs" ino=136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2027.253644][ T36] audit: type=1400 audit(1763361043.502:158824): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2027.312402][ T36] audit: type=1400 audit(1763361043.502:158825): avc: denied { read write open } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2027.384937][ T36] audit: type=1400 audit(1763361043.502:158826): avc: denied { ioctl } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2027.479532][ T36] audit: type=1400 audit(1763361043.552:158827): avc: denied { execute } for pid=15200 comm="syz.0.37663" path="/6/blkio.bfq.group_wait_time" dev="tmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2029.250539][T15305] overlayfs: missing 'lowerdir' [ 2031.870725][ T36] kauditd_printk_skb: 537 callbacks suppressed [ 2031.870743][ T36] audit: type=1400 audit(1763361048.382:159365): avc: denied { execute } for pid=15421 comm="syz.3.37774" path="/53/blkio.bfq.group_wait_time" dev="tmpfs" ino=342 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2031.932843][ T36] audit: type=1400 audit(1763361048.412:159366): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2031.964866][ T36] audit: type=1400 audit(1763361048.412:159367): avc: denied { read write open } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2032.069525][ T36] audit: type=1400 audit(1763361048.412:159368): avc: denied { ioctl } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2032.129562][ T36] audit: type=1400 audit(1763361048.442:159369): avc: denied { execute } for pid=15425 comm="syz.5.37775" path="/153/blkio.bfq.group_wait_time" dev="tmpfs" ino=954 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2032.209520][ T36] audit: type=1400 audit(1763361048.442:159370): avc: denied { create } for pid=15425 comm="syz.5.37775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2032.289553][ T36] audit: type=1400 audit(1763361048.472:159371): avc: denied { execute } for pid=15425 comm="syz.5.37775" path="/153/cpuacct.usage_percpu" dev="tmpfs" ino=955 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2032.349540][ T36] audit: type=1400 audit(1763361048.502:159372): avc: denied { execute } for pid=15427 comm="syz.3.37776" path="/54/blkio.bfq.group_wait_time" dev="tmpfs" ino=348 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2032.377267][T15442] overlayfs: missing 'workdir' [ 2032.393754][ T36] audit: type=1400 audit(1763361048.502:159373): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2032.447278][ T36] audit: type=1400 audit(1763361048.502:159374): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2033.284090][T15460] overlayfs: option "workdir=./file1" is useless in a non-upper mount, ignore [ 2033.319585][T15460] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 2034.063949][T15483] overlayfs: option "workdir=./file1" is useless in a non-upper mount, ignore [ 2034.089540][T15483] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 2034.260989][T15489] No source specified [ 2034.585479][T15503] overlayfs: option "workdir=./file1" is useless in a non-upper mount, ignore [ 2034.607116][T15503] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 2035.565391][T15565] No source specified [ 2036.920168][ T36] kauditd_printk_skb: 407 callbacks suppressed [ 2036.920184][ T36] audit: type=1400 audit(1763361053.432:159782): avc: denied { execute } for pid=15619 comm="syz.5.37870" path="/196/blkio.bfq.group_wait_time" dev="tmpfs" ino=1223 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2036.979519][ T36] audit: type=1400 audit(1763361053.432:159783): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2037.024481][ T36] audit: type=1400 audit(1763361053.432:159784): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2037.099525][ T36] audit: type=1400 audit(1763361053.432:159785): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2037.169540][ T36] audit: type=1400 audit(1763361053.572:159786): avc: denied { execute } for pid=15621 comm="syz.5.37872" path="/197/blkio.bfq.group_wait_time" dev="tmpfs" ino=1230 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2037.244205][ T36] audit: type=1400 audit(1763361053.592:159787): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2037.330889][ T36] audit: type=1400 audit(1763361053.592:159788): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2037.371478][T15630] netlink: 'syz.4.37875': attribute type 11 has an invalid length. [ 2037.388454][ T36] audit: type=1400 audit(1763361053.592:159789): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2037.391123][T15630] netlink: 3657 bytes leftover after parsing attributes in process `syz.4.37875'. [ 2037.434652][ T36] audit: type=1400 audit(1763361053.672:159790): avc: denied { execute } for pid=15623 comm="syz.5.37873" path="/198/blkio.bfq.group_wait_time" dev="tmpfs" ino=1236 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2037.505608][ T36] audit: type=1400 audit(1763361053.722:159791): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2038.722283][T15693] netlink: 'syz.5.37906': attribute type 11 has an invalid length. [ 2038.759571][T15693] netlink: 3657 bytes leftover after parsing attributes in process `syz.5.37906'. [ 2039.049526][T13321] usb 4-1: new high-speed USB device number 66 using dummy_hcd [ 2039.211350][T13321] usb 4-1: Using ep0 maxpacket: 32 [ 2039.239669][T13321] usb 4-1: config 0 has an invalid interface number: 184 but max is 0 [ 2039.269547][T13321] usb 4-1: config 0 has no interface number 0 [ 2039.275716][T13321] usb 4-1: config 0 interface 184 has no altsetting 0 [ 2039.299690][T13321] usb 4-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 2039.322628][T13321] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2039.349524][T13321] usb 4-1: Product: syz [ 2039.358061][T13321] usb 4-1: Manufacturer: syz [ 2039.378262][T13321] usb 4-1: SerialNumber: syz [ 2039.394877][T13321] usb 4-1: config 0 descriptor?? [ 2039.403108][T13321] smsc75xx v1.0.0 [ 2039.808791][T13321] smsc75xx 4-1:0.184 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000014: -71 [ 2039.813701][T15725] tmpfs: Bad value for 'huge' [ 2039.835816][T13321] smsc75xx 4-1:0.184 (unnamed net_device) (uninitialized): Failed to read PMT_CTL: -71 [ 2039.863741][T13321] smsc75xx 4-1:0.184 (unnamed net_device) (uninitialized): device not ready in smsc75xx_bind [ 2039.884223][T13321] smsc75xx 4-1:0.184: probe with driver smsc75xx failed with error -71 [ 2039.904022][T13321] usb 4-1: USB disconnect, device number 66 [ 2040.055056][T15738] netlink: 'syz.5.37929': attribute type 11 has an invalid length. [ 2040.063072][T15738] netlink: 3657 bytes leftover after parsing attributes in process `syz.5.37929'. [ 2040.415794][T15770] No source specified [ 2040.746887][T15794] tmpfs: Bad value for 'huge' [ 2041.994127][ T36] kauditd_printk_skb: 468 callbacks suppressed [ 2041.994144][ T36] audit: type=1400 audit(1763361058.502:160260): avc: denied { execute } for pid=15849 comm="syz.5.37984" path="/234/blkio.bfq.group_wait_time" dev="tmpfs" ino=1468 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2042.049591][ T36] audit: type=1400 audit(1763361058.512:160261): avc: denied { name_bind } for pid=15849 comm="syz.5.37984" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 2042.115955][ T36] audit: type=1400 audit(1763361058.512:160262): avc: denied { node_bind } for pid=15849 comm="syz.5.37984" saddr=::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2042.138665][ T36] audit: type=1400 audit(1763361058.562:160263): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2042.209527][ T36] audit: type=1400 audit(1763361058.562:160264): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2042.259532][ T36] audit: type=1400 audit(1763361058.562:160265): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2042.329535][ T36] audit: type=1400 audit(1763361058.582:160266): avc: denied { execute } for pid=15851 comm="syz.4.37985" path="/522/pids.events" dev="tmpfs" ino=3236 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2042.379544][ T36] audit: type=1400 audit(1763361058.602:160267): avc: denied { mounton } for pid=15851 comm="syz.4.37985" path="/syzcgroup/unified/syz4" dev="cgroup2" ino=233 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 2042.455634][ T36] audit: type=1400 audit(1763361058.672:160268): avc: denied { execute } for pid=15853 comm="syz.5.37986" path="/235/blkio.bfq.group_wait_time" dev="tmpfs" ino=1474 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2042.539974][ T36] audit: type=1400 audit(1763361058.722:160269): avc: denied { execute } for pid=15855 comm="syz.4.37989" path="/523/blkio.bfq.group_wait_time" dev="tmpfs" ino=3242 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2043.370819][T15906] tmpfs: Bad value for 'huge' [ 2043.774793][T15927] netlink: 'syz.3.38022': attribute type 11 has an invalid length. [ 2043.787771][T15927] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.38022'. [ 2044.732472][T15963] No source specified [ 2047.001248][ T36] kauditd_printk_skb: 407 callbacks suppressed [ 2047.001266][ T36] audit: type=1400 audit(1763361063.512:160677): avc: denied { execute } for pid=16042 comm="syz.5.38076" path="/243/blkio.bfq.group_wait_time" dev="tmpfs" ino=1525 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2047.099555][ T36] audit: type=1400 audit(1763361063.552:160678): avc: denied { create } for pid=16042 comm="syz.5.38076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2047.168659][ T36] audit: type=1400 audit(1763361063.552:160679): avc: denied { connect } for pid=16042 comm="syz.5.38076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2047.217395][ T36] audit: type=1400 audit(1763361063.582:160680): avc: denied { execute } for pid=16044 comm="syz.3.38083" path="/129/blkio.bfq.group_wait_time" dev="tmpfs" ino=801 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2047.269521][ T36] audit: type=1400 audit(1763361063.582:160681): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2047.329513][ T36] audit: type=1400 audit(1763361063.582:160682): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2047.386519][ T36] audit: type=1400 audit(1763361063.582:160683): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2047.440320][ T36] audit: type=1400 audit(1763361063.602:160684): avc: denied { create } for pid=16044 comm="syz.3.38083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2047.489615][ T36] audit: type=1400 audit(1763361063.602:160685): avc: denied { connect } for pid=16044 comm="syz.3.38083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2047.529538][ T36] audit: type=1400 audit(1763361063.632:160686): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2047.855214][T16068] binder: Unknown parameter 'contextnÈf@âÞ®N [ 2047.855214][T16068] úòFoðÀÄ"á™ÅÁ cß' [ 2050.051480][T16137] No source specified [ 2050.069915][T16140] netlink: 'syz.4.38130': attribute type 11 has an invalid length. [ 2050.079570][T16140] netlink: 3657 bytes leftover after parsing attributes in process `syz.4.38130'. [ 2050.239943][T16148] tmpfs: Bad value for 'huge' [ 2051.071868][T16184] tmpfs: Bad value for 'huge' [ 2051.441268][T16195] netlink: 'syz.5.38156': attribute type 11 has an invalid length. [ 2051.449198][T16195] netlink: 3657 bytes leftover after parsing attributes in process `syz.5.38156'. [ 2052.059192][ T36] kauditd_printk_skb: 334 callbacks suppressed [ 2052.059210][ T36] audit: type=1400 audit(1763361068.562:161021): avc: denied { execute } for pid=16209 comm="syz.0.38163" path="/103/pids.events" dev="tmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2052.151927][ T36] audit: type=1400 audit(1763361068.662:161022): avc: denied { execute } for pid=16211 comm="syz.0.38164" path="/104/blkio.bfq.group_wait_time" dev="tmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2052.209433][ T36] audit: type=1400 audit(1763361068.662:161023): avc: denied { execute } for pid=16213 comm="syz.4.38165" path="/565/blkio.bfq.group_wait_time" dev="tmpfs" ino=3499 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2052.264720][ T36] audit: type=1400 audit(1763361068.662:161024): avc: denied { name_bind } for pid=16213 comm="syz.4.38165" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 2052.309509][ T36] audit: type=1400 audit(1763361068.662:161025): avc: denied { node_bind } for pid=16213 comm="syz.4.38165" saddr=::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2052.371850][ T36] audit: type=1400 audit(1763361068.712:161026): avc: denied { execute } for pid=16215 comm="syz.4.38166" path="/566/blkio.bfq.group_wait_time" dev="tmpfs" ino=3505 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2052.439539][ T36] audit: type=1400 audit(1763361068.822:161027): avc: denied { execute } for pid=16217 comm="syz.4.38167" path="/567/blkio.bfq.group_wait_time" dev="tmpfs" ino=3511 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2052.496250][ T36] audit: type=1400 audit(1763361068.852:161028): avc: denied { execute } for pid=16219 comm="syz.0.38168" path="/105/blkio.bfq.group_wait_time" dev="tmpfs" ino=667 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2052.549931][ T36] audit: type=1400 audit(1763361068.872:161029): avc: denied { execute } for pid=16221 comm="syz.4.38169" path="/568/blkio.bfq.group_wait_time" dev="tmpfs" ino=3517 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2052.624678][ T36] audit: type=1400 audit(1763361068.882:161030): avc: denied { create } for pid=16221 comm="syz.4.38169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2053.715951][T16262] netlink: 'syz.3.38189': attribute type 11 has an invalid length. [ 2053.744244][T16262] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.38189'. [ 2055.568757][T16312] No source specified [ 2057.067683][ T36] kauditd_printk_skb: 250 callbacks suppressed [ 2057.067700][ T36] audit: type=1400 audit(1763361073.572:161281): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2057.121896][ T36] audit: type=1400 audit(1763361073.612:161282): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2057.182139][ T36] audit: type=1400 audit(1763361073.612:161283): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2057.217456][ T36] audit: type=1400 audit(1763361073.612:161284): avc: denied { execute } for pid=16349 comm="syz.3.38234" path="/180/blkio.bfq.group_wait_time" dev="tmpfs" ino=1114 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2057.260866][ T36] audit: type=1400 audit(1763361073.632:161285): avc: denied { name_bind } for pid=16351 comm="syz.4.38231" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 2057.289847][ T36] audit: type=1400 audit(1763361073.632:161286): avc: denied { node_bind } for pid=16351 comm="syz.4.38231" saddr=::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2057.354094][T16358] No source specified [ 2057.369524][ T36] audit: type=1400 audit(1763361073.632:161287): avc: denied { execute } for pid=16353 comm="syz.5.38235" path="/282/blkio.bfq.group_wait_time" dev="tmpfs" ino=1763 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2057.414360][ T36] audit: type=1400 audit(1763361073.682:161288): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2057.464726][ T36] audit: type=1400 audit(1763361073.682:161289): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2057.517098][ T36] audit: type=1400 audit(1763361073.682:161290): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2058.961086][T16403] netlink: 'syz.4.38260': attribute type 11 has an invalid length. [ 2058.979783][T16403] netlink: 3657 bytes leftover after parsing attributes in process `syz.4.38260'. [ 2059.978597][T16438] netlink: 'syz.0.38277': attribute type 11 has an invalid length. [ 2059.986658][T16438] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.38277'. [ 2060.178746][T16444] tmpfs: Bad value for 'huge' [ 2060.875960][T16463] netlink: 'syz.3.38290': attribute type 11 has an invalid length. [ 2060.899533][T16463] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.38290'. [ 2061.100566][ T329] bridge_slave_1: left allmulticast mode [ 2061.106246][ T329] bridge_slave_1: left promiscuous mode [ 2061.121637][ T329] bridge0: port 2(bridge_slave_1) entered disabled state [ 2061.160034][ T329] bridge_slave_0: left allmulticast mode [ 2061.165790][ T329] bridge_slave_0: left promiscuous mode [ 2061.179586][ T329] bridge0: port 1(bridge_slave_0) entered disabled state [ 2061.220641][T16470] tmpfs: Bad value for 'huge' [ 2061.404627][ T329] tipc: Left network mode [ 2061.434077][ T329] veth1_macvtap: left promiscuous mode [ 2061.449560][ T329] veth0_vlan: left promiscuous mode [ 2061.527123][ T329] veth0_to_batadv (unregistering): left allmulticast mode [ 2061.731450][T16464] bridge0: port 1(bridge_slave_0) entered blocking state [ 2061.757289][T16464] bridge0: port 1(bridge_slave_0) entered disabled state [ 2061.767639][T16464] bridge_slave_0: entered allmulticast mode [ 2061.789964][T16464] bridge_slave_0: entered promiscuous mode [ 2061.813142][T16464] bridge0: port 2(bridge_slave_1) entered blocking state [ 2061.833771][T16464] bridge0: port 2(bridge_slave_1) entered disabled state [ 2061.859552][T16464] bridge_slave_1: entered allmulticast mode [ 2061.876137][T16464] bridge_slave_1: entered promiscuous mode [ 2062.071039][ T36] kauditd_printk_skb: 279 callbacks suppressed [ 2062.071057][ T36] audit: type=1400 audit(1763361078.582:161570): avc: denied { create } for pid=16502 comm="syz.0.38308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2062.127639][ T36] audit: type=1400 audit(1763361078.612:161571): avc: denied { connect } for pid=16502 comm="syz.0.38308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2062.151984][ T36] audit: type=1400 audit(1763361078.612:161572): avc: denied { create } for pid=16502 comm="syz.0.38308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2062.192089][ T36] audit: type=1400 audit(1763361078.612:161573): avc: denied { connect } for pid=16502 comm="syz.0.38308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2062.233203][ T36] audit: type=1400 audit(1763361078.622:161574): avc: denied { create } for pid=16464 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2062.277187][ T36] audit: type=1400 audit(1763361078.622:161575): avc: denied { write } for pid=16464 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2062.311282][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 2062.318350][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2062.328209][ T36] audit: type=1400 audit(1763361078.622:161576): avc: denied { read } for pid=16464 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2062.329076][T15164] bridge0: port 2(bridge_slave_1) entered blocking state [ 2062.349765][T15164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2062.365244][ T36] audit: type=1400 audit(1763361078.622:161577): avc: denied { read } for pid=16464 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2062.387132][ T36] audit: type=1400 audit(1763361078.622:161578): avc: denied { write } for pid=16464 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2062.408786][ T36] audit: type=1400 audit(1763361078.662:161579): avc: denied { read } for pid=16464 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2062.540722][T16464] veth0_vlan: entered promiscuous mode [ 2062.622242][T16464] veth1_macvtap: entered promiscuous mode [ 2065.667604][T16597] No source specified [ 2066.435518][T16631] netlink: 'syz.4.38368': attribute type 11 has an invalid length. [ 2066.453658][T16631] netlink: 3657 bytes leftover after parsing attributes in process `syz.4.38368'. [ 2066.602759][T16635] No source specified [ 2066.882012][T16649] tmpfs: Bad value for 'huge' [ 2067.107012][ T36] kauditd_printk_skb: 357 callbacks suppressed [ 2067.107028][ T36] audit: type=1400 audit(1763361083.612:161937): avc: denied { execute } for pid=16658 comm="syz.4.38383" path="/18/cpuacct.usage_percpu_sys" dev="tmpfs" ino=128 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2067.158214][ T36] audit: type=1400 audit(1763361083.662:161938): avc: denied { execute } for pid=16659 comm="syz.5.38382" path="/323/blkio.bfq.group_wait_time" dev="tmpfs" ino=2029 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2067.196297][ T36] audit: type=1400 audit(1763361083.662:161939): avc: denied { create } for pid=16658 comm="syz.4.38383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2067.269504][ T36] audit: type=1400 audit(1763361083.662:161940): avc: denied { ioctl } for pid=16658 comm="syz.4.38383" path="socket:[580233]" dev="sockfs" ino=580233 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2067.314319][ T36] audit: type=1400 audit(1763361083.662:161941): avc: denied { write } for pid=16658 comm="syz.4.38383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2067.335520][ T36] audit: type=1400 audit(1763361083.732:161942): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2067.412119][ T36] audit: type=1400 audit(1763361083.732:161943): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2067.485929][ T36] audit: type=1400 audit(1763361083.732:161944): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2067.576780][ T36] audit: type=1400 audit(1763361083.782:161945): avc: denied { execute } for pid=16663 comm="syz.5.38384" path="/324/blkio.bfq.group_wait_time" dev="tmpfs" ino=2036 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2067.639541][ T36] audit: type=1400 audit(1763361083.842:161946): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2067.724724][T16677] netlink: 'syz.4.38394': attribute type 11 has an invalid length. [ 2067.732877][T16677] netlink: 3657 bytes leftover after parsing attributes in process `syz.4.38394'. [ 2068.671902][T16717] netlink: 'syz.3.38411': attribute type 11 has an invalid length. [ 2068.709517][T16717] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.38411'. [ 2069.095932][T16725] No source specified [ 2069.794714][T16753] No source specified [ 2070.439998][T16784] binder: Bad value for 'context' [ 2072.151244][ T36] kauditd_printk_skb: 315 callbacks suppressed [ 2072.151260][ T36] audit: type=1400 audit(1763361088.662:162262): avc: denied { execute } for pid=16836 comm="syz.4.38473" path="/46/blkio.bfq.group_wait_time" dev="tmpfs" ino=308 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2072.230030][ T36] audit: type=1400 audit(1763361088.692:162263): avc: denied { create } for pid=16836 comm="syz.4.38473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2072.269505][ T36] audit: type=1400 audit(1763361088.692:162264): avc: denied { bind } for pid=16836 comm="syz.4.38473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2072.316020][ T36] audit: type=1400 audit(1763361088.762:162265): avc: denied { execute } for pid=16838 comm="syz.5.38472" path="/349/blkio.bfq.group_wait_time" dev="tmpfs" ino=2208 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2072.382912][ T36] audit: type=1400 audit(1763361088.782:162266): avc: denied { execute } for pid=16840 comm="syz.4.38474" path="/47/blkio.bfq.group_wait_time" dev="tmpfs" ino=314 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2072.459555][ T36] audit: type=1400 audit(1763361088.782:162267): avc: denied { name_bind } for pid=16840 comm="syz.4.38474" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2072.528666][ T36] audit: type=1400 audit(1763361088.782:162268): avc: denied { node_bind } for pid=16840 comm="syz.4.38474" saddr=224.0.0.1 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2072.609544][ T36] audit: type=1400 audit(1763361088.802:162269): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2072.657421][ T36] audit: type=1400 audit(1763361088.802:162270): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2072.686739][ T36] audit: type=1400 audit(1763361088.802:162271): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2072.832522][T16861] tmpfs: Bad value for 'huge' [ 2073.282004][T16885] tmpfs: Bad value for 'huge' [ 2073.354105][T16889] No source specified [ 2074.053007][T16927] binder: Bad value for 'context' [ 2074.534698][T16946] tmpfs: Bad value for 'huge' [ 2075.645926][T16967] tmpfs: Bad value for 'huge' [ 2076.249523][T16995] No source specified [ 2077.207747][ T36] kauditd_printk_skb: 340 callbacks suppressed [ 2077.207764][ T36] audit: type=1400 audit(1763361093.712:162612): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2077.265165][ T36] audit: type=1400 audit(1763361093.752:162613): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2077.333197][ T36] audit: type=1400 audit(1763361093.752:162614): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2077.419548][ T36] audit: type=1400 audit(1763361093.832:162615): avc: denied { execute } for pid=17018 comm="syz.5.38562" path="/373/blkio.bfq.group_wait_time" dev="tmpfs" ino=2356 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2077.492234][ T36] audit: type=1400 audit(1763361093.872:162616): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2077.548818][ T36] audit: type=1400 audit(1763361093.872:162617): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2077.599496][ T36] audit: type=1400 audit(1763361093.872:162618): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2077.656308][ T36] audit: type=1400 audit(1763361093.962:162619): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2077.729504][ T36] audit: type=1400 audit(1763361093.982:162620): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2077.791393][T17025] netlink: 'syz.5.38566': attribute type 11 has an invalid length. [ 2077.799320][T17025] netlink: 3657 bytes leftover after parsing attributes in process `syz.5.38566'. [ 2077.819502][ T36] audit: type=1400 audit(1763361093.982:162621): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2077.971015][T17031] No source specified [ 2078.124730][T17038] No source specified [ 2079.564212][T17079] No source specified [ 2080.060210][T17105] netlink: 'syz.5.38605': attribute type 11 has an invalid length. [ 2080.087015][T17105] netlink: 3657 bytes leftover after parsing attributes in process `syz.5.38605'. [ 2080.367401][T17123] No source specified [ 2080.685564][T17139] No source specified [ 2081.161212][T17165] No source specified [ 2081.399985][ T9721] tipc: Subscription rejected, illegal request [ 2081.539507][ T331] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 2081.687334][T17199] binder: Bad value for 'context' [ 2081.692481][ T331] usb 6-1: Using ep0 maxpacket: 32 [ 2081.700691][ T331] usb 6-1: config 0 has an invalid interface number: 184 but max is 0 [ 2081.710792][ T331] usb 6-1: config 0 has no interface number 0 [ 2081.717859][ T331] usb 6-1: config 0 interface 184 has no altsetting 0 [ 2081.735230][ T331] usb 6-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 2081.745365][ T331] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2081.762225][ T331] usb 6-1: Product: syz [ 2081.777205][ T331] usb 6-1: Manufacturer: syz [ 2081.782512][ T331] usb 6-1: SerialNumber: syz [ 2081.797642][ T331] usb 6-1: config 0 descriptor?? [ 2081.805476][ T331] smsc75xx v1.0.0 [ 2081.825186][ T331] smsc75xx 6-1:0.184 (unnamed net_device) (uninitialized): usbnet_get_endpoints failed: -22 [ 2081.836045][ T331] smsc75xx 6-1:0.184: probe with driver smsc75xx failed with error -22 [ 2082.192979][T17231] No source specified [ 2082.211393][ T36] kauditd_printk_skb: 377 callbacks suppressed [ 2082.211411][ T36] audit: type=1400 audit(1763361098.722:162999): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2082.276694][ T36] audit: type=1400 audit(1763361098.752:163000): avc: denied { read write open } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2082.303971][ T36] audit: type=1400 audit(1763361098.752:163001): avc: denied { ioctl } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2082.331265][ T36] audit: type=1400 audit(1763361098.762:163002): avc: denied { execute } for pid=17233 comm="syz.0.38671" path="/206/blkio.bfq.group_wait_time" dev="tmpfs" ino=1304 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2082.356901][ T36] audit: type=1400 audit(1763361098.812:163003): avc: denied { execute } for pid=17232 comm="syz.4.38669" path="/98/blkio.bfq.group_wait_time" dev="tmpfs" ino=625 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2082.382088][ T36] audit: type=1400 audit(1763361098.842:163004): avc: denied { execute } for pid=17238 comm="syz.0.38672" path="/207/blkio.bfq.group_wait_time" dev="tmpfs" ino=1310 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2082.407709][ T36] audit: type=1400 audit(1763361098.892:163005): avc: denied { execute } for pid=17240 comm="syz.0.38674" path="/208/blkio.bfq.group_wait_time" dev="tmpfs" ino=1317 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2082.491548][ T36] audit: type=1400 audit(1763361098.892:163006): avc: denied { mounton } for pid=17240 comm="syz.0.38674" path="/208/bus" dev="tmpfs" ino=1319 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2082.541070][ T36] audit: type=1400 audit(1763361098.892:163007): avc: denied { unlink } for pid=17240 comm="syz.0.38674" name="#2cf" dev="tmpfs" ino=1323 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2082.589505][ T36] audit: type=1400 audit(1763361098.922:163008): avc: denied { execute } for pid=17236 comm="syz.3.38670" path="/293/blkio.bfq.group_wait_time" dev="tmpfs" ino=1821 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2082.701323][T17257] No source specified [ 2082.894921][T17267] netlink: 'syz.3.38686': attribute type 11 has an invalid length. [ 2082.907812][T17267] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.38686'. [ 2083.100329][T17277] No source specified [ 2083.229974][T17283] binder: Bad value for 'context' [ 2083.308274][T17285] tmpfs: Unknown parameter 'hu' [ 2083.908649][T17309] netlink: 'syz.4.38708': attribute type 11 has an invalid length. [ 2083.916678][T17309] netlink: 3657 bytes leftover after parsing attributes in process `syz.4.38708'. [ 2084.072430][T17320] netlink: 'syz.3.38712': attribute type 11 has an invalid length. [ 2084.089328][T17320] netlink: 3657 bytes leftover after parsing attributes in process `syz.3.38712'. [ 2084.162394][T17326] tmpfs: Bad value for 'huge' [ 2084.284996][ T9721] tipc: Subscription rejected, illegal request [ 2084.301364][ T331] usb 6-1: USB disconnect, device number 3 [ 2084.606647][T17358] netlink: 'syz.0.38732': attribute type 11 has an invalid length. [ 2084.625364][T17358] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.38732'. [ 2084.641536][T17362] tmpfs: Bad value for 'huge' [ 2087.260058][ T36] kauditd_printk_skb: 302 callbacks suppressed [ 2087.260093][ T36] audit: type=1400 audit(1763361103.772:163311): avc: denied { execute } for pid=17440 comm="syz.3.38772" path="/319/blkio.bfq.group_wait_time" dev="tmpfs" ino=1979 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2087.333726][ T36] audit: type=1400 audit(1763361103.812:163312): avc: denied { create } for pid=17440 comm="syz.3.38772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2087.399559][ T36] audit: type=1400 audit(1763361103.812:163313): avc: denied { create } for pid=17440 comm="syz.3.38772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2087.459496][ T36] audit: type=1400 audit(1763361103.812:163314): avc: denied { write } for pid=17440 comm="syz.3.38772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2087.519502][ T36] audit: type=1400 audit(1763361103.812:163315): avc: denied { read } for pid=17440 comm="syz.3.38772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2087.573226][ T36] audit: type=1400 audit(1763361103.812:163316): avc: denied { read } for pid=17440 comm="syz.3.38772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2087.614350][ T36] audit: type=1400 audit(1763361103.822:163317): avc: denied { write } for pid=17440 comm="syz.3.38772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2087.667298][ T36] audit: type=1400 audit(1763361103.832:163318): avc: denied { execute } for pid=17442 comm="syz.0.38773" path="/249/blkio.bfq.group_wait_time" dev="tmpfs" ino=1589 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2087.736247][ T36] audit: type=1400 audit(1763361103.832:163319): avc: denied { name_bind } for pid=17442 comm="syz.0.38773" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2087.794207][ T36] audit: type=1400 audit(1763361103.832:163320): avc: denied { node_bind } for pid=17442 comm="syz.0.38773" saddr=224.0.0.1 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2089.290711][T17543] tmpfs: Bad value for 'huge' [ 2089.822031][T17573] binder: Bad value for 'stats' [ 2089.924119][T17579] binder: Bad value for 'stats' [ 2090.709395][T15164] tipc: Subscription rejected, illegal request [ 2091.537114][T15164] tipc: Subscription rejected, illegal request [ 2092.220776][T17655] netlink: 'syz.0.38878': attribute type 11 has an invalid length. [ 2092.237160][T17655] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.38878'. [ 2092.270401][ T36] kauditd_printk_skb: 349 callbacks suppressed [ 2092.270418][ T36] audit: type=1400 audit(1763361108.782:163670): avc: denied { execute } for pid=17653 comm="syz.4.38880" path="/148/blkio.bfq.group_wait_time" dev="tmpfs" ino=962 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2092.371709][ T36] audit: type=1400 audit(1763361108.842:163671): avc: denied { execute } for pid=17658 comm="syz.3.38881" path="/331/blkio.bfq.group_wait_time" dev="tmpfs" ino=2056 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2092.438724][ T36] audit: type=1400 audit(1763361108.872:163672): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2092.509509][ T36] audit: type=1400 audit(1763361108.872:163673): avc: denied { read write open } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2092.586835][ T36] audit: type=1400 audit(1763361108.872:163674): avc: denied { ioctl } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2092.639542][ T36] audit: type=1400 audit(1763361108.912:163675): avc: denied { execute } for pid=17660 comm="syz.0.38882" path="/288/blkio.bfq.group_wait_time" dev="tmpfs" ino=1860 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2092.695145][ T36] audit: type=1400 audit(1763361108.922:163676): avc: denied { execute } for pid=17663 comm="syz.4.38883" path="/149/blkio.bfq.group_wait_time" dev="tmpfs" ino=969 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2092.769494][ T36] audit: type=1400 audit(1763361108.932:163677): avc: denied { mounton } for pid=17663 comm="syz.4.38883" path="/149/bus" dev="tmpfs" ino=971 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2092.812548][ T36] audit: type=1400 audit(1763361108.942:163678): avc: denied { unlink } for pid=17663 comm="syz.4.38883" name="#2e7" dev="tmpfs" ino=975 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2092.889332][ T36] audit: type=1400 audit(1763361108.942:163679): avc: denied { mount } for pid=17663 comm="syz.4.38883" name="/" dev="overlay" ino=968 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2092.911711][ T9721] tipc: Subscription rejected, illegal request [ 2093.814371][T17717] No source specified [ 2094.122250][T17736] No source specified [ 2094.528311][ T9721] tipc: Subscription rejected, illegal request [ 2095.090777][T17779] binder: Bad value for 'stats' [ 2096.116980][T17817] binder: Bad value for 'stats' [ 2097.323499][ T36] kauditd_printk_skb: 355 callbacks suppressed [ 2097.323517][ T36] audit: type=1400 audit(1763361113.832:164035): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2097.409910][ T36] audit: type=1400 audit(1763361113.832:164036): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2097.449647][ T36] audit: type=1400 audit(1763361113.832:164037): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2097.497625][ T36] audit: type=1400 audit(1763361113.872:164038): avc: denied { execute } for pid=17842 comm="syz.5.38973" path="/462/pids.events" dev="tmpfs" ino=2918 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2097.570394][ T36] audit: type=1400 audit(1763361113.902:164039): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2097.619500][ T36] audit: type=1400 audit(1763361113.902:164040): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2097.687565][ T36] audit: type=1400 audit(1763361113.902:164041): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2097.734205][ T36] audit: type=1400 audit(1763361113.962:164042): avc: denied { execute } for pid=17844 comm="syz.5.38974" path="/463/blkio.bfq.group_wait_time" dev="tmpfs" ino=2924 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2097.789493][ T36] audit: type=1400 audit(1763361113.972:164043): avc: denied { create } for pid=17844 comm="syz.5.38974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2097.859510][ T36] audit: type=1400 audit(1763361113.982:164044): avc: denied { connect } for pid=17844 comm="syz.5.38974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2098.258288][T17869] binder: Bad value for 'stats' [ 2099.618896][ T9721] tipc: Subscription rejected, illegal request [ 2099.870635][T17919] binder: Bad value for 'stats' [ 2099.878138][ T9721] tipc: Subscription rejected, illegal request [ 2100.603784][ T9721] tipc: Subscription rejected, illegal request [ 2101.238144][ T9721] tipc: Subscription rejected, illegal request [ 2102.250604][T17999] overlayfs: failed to resolve './file1': -2 [ 2102.376737][ T36] kauditd_printk_skb: 289 callbacks suppressed [ 2102.376754][ T36] audit: type=1400 audit(1763361118.882:164334): avc: denied { execute } for pid=18000 comm="syz.5.39053" path="/486/blkio.bfq.group_wait_time" dev="tmpfs" ino=3069 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2102.428027][ T36] audit: type=1400 audit(1763361118.932:164335): avc: denied { mounton } for pid=18000 comm="syz.5.39053" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 2102.479756][ T36] audit: type=1400 audit(1763361118.932:164336): avc: denied { mount } for pid=18000 comm="syz.5.39053" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2102.549494][ T36] audit: type=1400 audit(1763361118.962:164337): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2102.609514][ T36] audit: type=1400 audit(1763361118.962:164338): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2102.659499][ T36] audit: type=1400 audit(1763361118.962:164339): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2102.712477][ T36] audit: type=1400 audit(1763361118.992:164340): avc: denied { execute } for pid=18004 comm="syz.5.39054" path="/487/blkio.bfq.group_wait_time" dev="tmpfs" ino=3075 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2102.789570][ T36] audit: type=1400 audit(1763361119.022:164341): avc: denied { execute } for pid=18002 comm="syz.4.39051" path="/192/pids.events" dev="tmpfs" ino=1250 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2102.840124][ T36] audit: type=1400 audit(1763361119.032:164342): avc: denied { mounton } for pid=18004 comm="syz.5.39054" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 2102.899638][ T36] audit: type=1400 audit(1763361119.032:164343): avc: denied { mount } for pid=18004 comm="syz.5.39054" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2103.688846][T18045] No source specified [ 2103.754286][ T9721] tipc: Subscription rejected, illegal request [ 2103.837656][T18051] overlayfs: failed to resolve './file1': -2 [ 2104.207378][T18065] No source specified [ 2104.666338][T18081] No source specified [ 2105.836740][ T9721] tipc: Subscription rejected, illegal request [ 2106.285331][ T9721] tipc: Subscription rejected, illegal request [ 2107.066163][ T9721] tipc: Subscription rejected, illegal request [ 2107.380864][ T36] kauditd_printk_skb: 284 callbacks suppressed [ 2107.380882][ T36] audit: type=1400 audit(1763361123.892:164628): avc: denied { mounton } for pid=18148 comm="syz.4.39126" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 2107.381102][T18149] binder: Bad value for 'stats' [ 2107.490994][ T36] audit: type=1400 audit(1763361124.002:164629): avc: denied { execute } for pid=18150 comm="syz.4.39127" path="/207/blkio.bfq.group_wait_time" dev="tmpfs" ino=1350 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2107.741664][ T36] audit: type=1400 audit(1763361124.252:164630): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2107.803432][ T36] audit: type=1400 audit(1763361124.252:164631): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2107.869227][ T36] audit: type=1400 audit(1763361124.252:164632): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2107.939190][ T36] audit: type=1400 audit(1763361124.342:164633): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2107.987258][T18157] netlink: 'syz.5.39131': attribute type 11 has an invalid length. [ 2107.995310][ T36] audit: type=1400 audit(1763361124.342:164634): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2108.022538][T18157] netlink: 3657 bytes leftover after parsing attributes in process `syz.5.39131'. [ 2108.042060][ T36] audit: type=1400 audit(1763361124.342:164635): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2108.120725][ T36] audit: type=1400 audit(1763361124.412:164636): avc: denied { execute } for pid=18154 comm="syz.5.39130" path="/507/blkio.bfq.group_wait_time" dev="tmpfs" ino=3204 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2108.171412][ T36] audit: type=1400 audit(1763361124.422:164637): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2109.650839][ T9721] tipc: Subscription rejected, illegal request [ 2110.155886][T18201] tmpfs: Bad value for 'huge' [ 2110.669174][T18209] binder: Bad value for 'stats' [ 2111.057924][T18221] No source specified [ 2111.692740][T18253] No source specified [ 2112.121786][T18276] No source specified [ 2112.192271][T15164] tipc: Subscription rejected, illegal request [ 2112.390043][ T36] kauditd_printk_skb: 239 callbacks suppressed [ 2112.390061][ T36] audit: type=1400 audit(1763361128.902:164877): avc: denied { create } for pid=18288 comm="syz.3.39196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2112.462809][ T36] audit: type=1400 audit(1763361128.942:164878): avc: denied { execute } for pid=18291 comm="syz.5.39197" path="/527/blkio.bfq.group_wait_time" dev="tmpfs" ino=3340 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2112.533405][ T36] audit: type=1400 audit(1763361128.942:164879): avc: denied { create } for pid=18291 comm="syz.5.39197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2112.593558][ T36] audit: type=1400 audit(1763361128.942:164880): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2112.668881][ T36] audit: type=1400 audit(1763361128.962:164881): avc: denied { read write open } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2112.749564][ T36] audit: type=1400 audit(1763361128.962:164882): avc: denied { ioctl } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2112.796611][T18303] binder: Bad value for 'stats' [ 2112.829549][ T36] audit: type=1400 audit(1763361128.972:164883): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2112.916919][ T36] audit: type=1400 audit(1763361128.972:164884): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2112.949489][T15164] tipc: Subscription rejected, illegal request [ 2113.009511][ T36] audit: type=1400 audit(1763361128.972:164885): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2113.096887][ T36] audit: type=1400 audit(1763361129.042:164886): avc: denied { execute } for pid=18294 comm="syz.3.39199" path="/421/blkio.bfq.group_wait_time" dev="tmpfs" ino=2627 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2113.963038][T18341] tmpfs: Bad value for 'huge' [ 2114.024975][ T9721] tipc: Subscription rejected, illegal request [ 2114.396209][T15164] tipc: Subscription rejected, illegal request [ 2114.481261][T18361] binder: Bad value for 'stats' [ 2114.760951][ T9721] tipc: Subscription rejected, illegal request [ 2114.859065][ T9721] tipc: Subscription rejected, illegal request [ 2115.589495][ T3249] usb 5-1: new high-speed USB device number 8 using dummy_hcd [ 2115.765716][ T3249] usb 5-1: Using ep0 maxpacket: 32 [ 2115.782214][ T3249] usb 5-1: config 0 has an invalid interface number: 184 but max is 0 [ 2115.810309][ T3249] usb 5-1: config 0 has no interface number 0 [ 2115.816428][ T3249] usb 5-1: config 0 interface 184 has no altsetting 0 [ 2115.857833][ T3249] usb 5-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 2115.860724][ T9721] tipc: Subscription rejected, illegal request [ 2115.875390][ T3249] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2115.896064][ T3249] usb 5-1: Product: syz [ 2115.912165][ T3249] usb 5-1: Manufacturer: syz [ 2115.927495][ T3249] usb 5-1: SerialNumber: syz [ 2115.947692][ T3249] usb 5-1: config 0 descriptor?? [ 2115.961570][ T3249] smsc75xx v1.0.0 [ 2116.184820][ T3249] smsc75xx 5-1:0.184 (unnamed net_device) (uninitialized): usbnet_get_endpoints failed: -71 [ 2116.204340][ T3249] smsc75xx 5-1:0.184: probe with driver smsc75xx failed with error -71 [ 2116.224564][ T3249] usb 5-1: USB disconnect, device number 8 [ 2117.484768][ T36] kauditd_printk_skb: 283 callbacks suppressed [ 2117.484784][ T36] audit: type=1400 audit(1763361133.992:165170): avc: denied { execute } for pid=18424 comm="syz.0.39264" path="/375/blkio.bfq.group_wait_time" dev="tmpfs" ino=2420 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2117.686682][ T36] audit: type=1400 audit(1763361134.192:165171): avc: denied { execute } for pid=18426 comm="syz.4.39265" path="/227/blkio.bfq.group_wait_time" dev="tmpfs" ino=1489 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2117.748164][ T36] audit: type=1400 audit(1763361134.252:165172): avc: denied { execute } for pid=18428 comm="syz.4.39266" path="/228/blkio.bfq.group_wait_time" dev="tmpfs" ino=1496 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2117.899487][ T36] audit: type=1400 audit(1763361134.402:165173): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2117.969513][ T36] audit: type=1400 audit(1763361134.402:165174): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2118.030742][ T36] audit: type=1400 audit(1763361134.402:165175): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2118.122005][ T36] audit: type=1400 audit(1763361134.492:165176): avc: denied { execute } for pid=18432 comm="syz.5.39268" path="/554/blkio.bfq.group_wait_time" dev="tmpfs" ino=3511 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2118.199478][ T36] audit: type=1400 audit(1763361134.512:165177): avc: denied { mounton } for pid=18432 comm="syz.5.39268" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 2118.259612][ T36] audit: type=1400 audit(1763361134.512:165178): avc: denied { mount } for pid=18432 comm="syz.5.39268" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2118.299541][ T36] audit: type=1400 audit(1763361134.542:165179): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2118.895942][T18457] binder: Bad value for 'stats' [ 2119.724719][T18496] binder: Bad value for 'stats' [ 2119.839540][ T9721] tipc: Subscription rejected, illegal request [ 2119.940392][T18503] No source specified [ 2120.322408][T18515] binder: Bad value for 'stats' [ 2120.450750][T18521] binder: Bad value for 'stats' [ 2120.580460][ T9721] tipc: Subscription rejected, illegal request [ 2120.874708][T18537] binder: Bad value for 'stats' [ 2120.969858][T18541] binder: Bad value for 'stats' [ 2121.560759][ T9721] tipc: Subscription rejected, illegal request [ 2121.624224][T18563] binder: Bad value for 'stats' [ 2122.079828][T18582] binder: Bad value for 'stats' [ 2122.136112][ T9721] tipc: Subscription rejected, illegal request [ 2122.448583][T18590] No source specified [ 2122.516728][ T36] kauditd_printk_skb: 298 callbacks suppressed [ 2122.516744][ T36] audit: type=1400 audit(1763361139.022:165478): avc: denied { execute } for pid=18593 comm="syz.0.39348" path="/400/blkio.bfq.group_wait_time" dev="tmpfs" ino=2572 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2122.568462][ T36] audit: type=1400 audit(1763361139.062:165479): avc: denied { execute } for pid=18595 comm="syz.0.39349" path="/401/blkio.bfq.group_wait_time" dev="tmpfs" ino=2578 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2122.611114][ T36] audit: type=1400 audit(1763361139.102:165480): avc: denied { execute } for pid=18597 comm="syz.0.39350" path="/402/blkio.bfq.group_wait_time" dev="tmpfs" ino=2584 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2122.674123][ T36] audit: type=1400 audit(1763361139.112:165481): avc: denied { create } for pid=18597 comm="syz.0.39350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2122.720868][ T36] audit: type=1400 audit(1763361139.122:165482): avc: denied { setopt } for pid=18597 comm="syz.0.39350" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2122.750423][ T36] audit: type=1400 audit(1763361139.162:165483): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2122.776314][ T36] audit: type=1400 audit(1763361139.162:165484): avc: denied { read write open } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2122.807802][ T36] audit: type=1400 audit(1763361139.162:165485): avc: denied { ioctl } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2122.869543][ T36] audit: type=1400 audit(1763361139.222:165486): avc: denied { execute } for pid=18600 comm="syz.0.39351" path="/403/blkio.bfq.group_wait_time" dev="tmpfs" ino=2590 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2122.939476][ T36] audit: type=1400 audit(1763361139.322:165487): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2123.034898][T18608] binder: Bad value for 'stats' [ 2124.110445][T15164] tipc: Subscription rejected, illegal request [ 2124.178986][T18629] binder: Bad value for 'stats' [ 2124.181819][T18630] binder: Bad value for 'stats' [ 2124.495963][T15164] tipc: Subscription rejected, illegal request [ 2124.699608][T18652] binder: Bad value for 'stats' [ 2126.192520][T15164] tipc: Subscription rejected, illegal request [ 2126.315260][T18704] binder: Bad value for 'stats' [ 2126.616381][T18714] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2126.820176][T18728] overlayfs: missing 'lowerdir' [ 2127.047844][T15164] tipc: Subscription rejected, illegal request [ 2127.188150][T18746] overlayfs: missing 'lowerdir' [ 2127.301486][T18753] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2127.393740][T15164] tipc: Subscription rejected, illegal request [ 2127.487992][T18768] overlayfs: missing 'lowerdir' [ 2127.542751][ T36] kauditd_printk_skb: 287 callbacks suppressed [ 2127.542770][ T36] audit: type=1400 audit(1763361144.052:165775): avc: denied { execute } for pid=18771 comm="syz.0.39436" path="/422/blkio.bfq.group_wait_time" dev="tmpfs" ino=2713 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2127.629545][ T36] audit: type=1400 audit(1763361144.052:165776): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2127.718386][ T36] audit: type=1400 audit(1763361144.052:165777): avc: denied { read write open } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2127.789529][ T36] audit: type=1400 audit(1763361144.052:165778): avc: denied { ioctl } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2127.843289][ T36] audit: type=1400 audit(1763361144.122:165779): avc: denied { execute } for pid=18775 comm="syz.4.39438" path="/271/blkio.bfq.group_wait_time" dev="tmpfs" ino=1765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2127.931279][ T36] audit: type=1400 audit(1763361144.132:165780): avc: denied { execute } for pid=18773 comm="syz.3.39439" path="/482/blkio.bfq.group_wait_time" dev="tmpfs" ino=3020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2127.976521][ T36] audit: type=1400 audit(1763361144.182:165781): avc: denied { read write } for pid=14081 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2128.047592][ T36] audit: type=1400 audit(1763361144.182:165782): avc: denied { read write open } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2128.094138][ T36] audit: type=1400 audit(1763361144.182:165783): avc: denied { ioctl } for pid=14081 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2128.149487][ T36] audit: type=1400 audit(1763361144.272:165784): avc: denied { execute } for pid=18777 comm="syz.5.39440" path="/590/blkio.bfq.group_wait_time" dev="tmpfs" ino=3748 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2128.249556][T18784] No source specified [ 2128.613820][T18790] overlayfs: missing 'lowerdir' [ 2128.965210][T18798] binder: Bad value for 'stats' [ 2129.011924][T18800] tmpfs: Unknown parameter 'hu' [ 2129.070263][ T9721] tipc: Subscription rejected, illegal request [ 2129.251310][T18813] tmpfs: Bad value for 'huge' [ 2129.322270][T15164] tipc: Subscription rejected, illegal request [ 2129.585390][T18826] tmpfs: Unknown parameter 'hu' [ 2129.658359][ T9721] bridge_slave_1: left allmulticast mode [ 2129.669503][ T9721] bridge_slave_1: left promiscuous mode [ 2129.676096][ T9721] bridge0: port 2(bridge_slave_1) entered disabled state [ 2129.687752][ T9721] bridge_slave_0: left allmulticast mode [ 2129.715925][ T9721] bridge_slave_0: left promiscuous mode [ 2129.749543][ T9721] bridge0: port 1(bridge_slave_0) entered disabled state [ 2129.900905][T18818] bridge0: port 1(bridge_slave_0) entered blocking state [ 2129.919479][T18818] bridge0: port 1(bridge_slave_0) entered disabled state [ 2129.926585][T18818] bridge_slave_0: entered allmulticast mode [ 2129.943168][T18818] bridge_slave_0: entered promiscuous mode [ 2129.959473][ T9721] tipc: Left network mode [ 2129.960584][T18818] bridge0: port 2(bridge_slave_1) entered blocking state [ 2129.979921][T18818] bridge0: port 2(bridge_slave_1) entered disabled state [ 2130.012106][T18818] bridge_slave_1: entered allmulticast mode [ 2130.018460][T18818] bridge_slave_1: entered promiscuous mode [ 2130.051586][ T9721] veth1_macvtap: left promiscuous mode [ 2130.060160][ T9721] veth0_vlan: left promiscuous mode [ 2130.575924][ T329] bridge0: port 1(bridge_slave_0) entered blocking state [ 2130.583027][ T329] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2130.597475][T18855] binder: Bad value for 'stats' [ 2130.604406][T15164] bridge0: port 2(bridge_slave_1) entered blocking state [ 2130.611484][T15164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2130.746224][T18818] veth0_vlan: entered promiscuous mode [ 2130.799141][T18866] tmpfs: Bad value for 'huge' [ 2130.841275][ T9721] tipc: Subscription rejected, illegal request [ 2130.841865][T18818] veth1_macvtap: entered promiscuous mode [ 2130.934472][T18871] binder: Bad value for 'stats' [ 2131.066054][T18881] binder: Bad value for 'stats' [ 2131.195355][T18889] tmpfs: Bad value for 'huge' [ 2131.509720][T18911] binder: Bad value for 'stats' [ 2131.573571][ T9881] tipc: Subscription rejected, illegal request [ 2131.889348][T18927] binder: Bad value for 'stats' [ 2132.577775][ T36] kauditd_printk_skb: 374 callbacks suppressed [ 2132.577810][ T36] audit: type=1400 audit(1763361149.082:166159): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2132.626834][ T36] audit: type=1400 audit(1763361149.082:166160): avc: denied { read write open } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2132.653382][ T36] audit: type=1400 audit(1763361149.082:166161): avc: denied { ioctl } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2132.684028][ T36] audit: type=1400 audit(1763361149.192:166162): avc: denied { execute } for pid=18932 comm="syz.3.39513" path="/512/blkio.bfq.group_wait_time" dev="tmpfs" ino=3202 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2132.736825][ T36] audit: type=1400 audit(1763361149.202:166163): avc: denied { execute } for pid=18933 comm="syz.4.39512" path="/286/blkio.bfq.group_wait_time" dev="tmpfs" ino=1858 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2132.807571][ T36] audit: type=1400 audit(1763361149.212:166164): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2132.858853][ T36] audit: type=1400 audit(1763361149.212:166165): avc: denied { read write open } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2132.927784][T18939] binder: Bad value for 'stats' [ 2132.941757][ T36] audit: type=1400 audit(1763361149.212:166166): avc: denied { ioctl } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2132.999065][ T36] audit: type=1400 audit(1763361149.292:166167): avc: denied { execute } for pid=18936 comm="syz.3.39514" path="/513/cpuacct.usage_percpu_sys" dev="tmpfs" ino=3208 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2133.049474][ T36] audit: type=1400 audit(1763361149.302:166168): avc: denied { read write } for pid=18936 comm="syz.3.39514" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2133.317216][T18957] tmpfs: Bad value for 'huge' [ 2133.419031][T18961] binder: Bad value for 'stats' [ 2133.888126][T18971] binder: Bad value for 'stats' [ 2134.740545][T19003] binder: Bad value for 'stats' [ 2134.913201][ T9721] tipc: Subscription rejected, illegal request [ 2135.862434][T19063] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2136.529539][T19097] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2136.612233][ T9721] tipc: Subscription rejected, illegal request [ 2136.691738][T19109] tmpfs: Bad value for 'huge' [ 2137.050704][T19133] binder: Bad value for 'stats' [ 2137.171360][T19142] netlink: 8 bytes leftover after parsing attributes in process `syz.4.39616'. [ 2137.236547][ T9721] tipc: Subscription rejected, illegal request [ 2137.440503][T19163] tmpfs: Bad value for 'huge' [ 2137.610489][ T36] kauditd_printk_skb: 449 callbacks suppressed [ 2137.610507][ T36] audit: type=1400 audit(1763361154.122:166618): avc: denied { execute } for pid=19176 comm="syz.0.39634" path="/454/blkio.bfq.group_wait_time" dev="tmpfs" ino=2909 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2137.642448][ T36] audit: type=1400 audit(1763361154.132:166619): avc: denied { execute } for pid=19174 comm="syz.4.39635" path="/324/blkio.bfq.group_wait_time" dev="tmpfs" ino=2082 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2137.667322][ T9721] tipc: Subscription rejected, illegal request [ 2137.674472][ T36] audit: type=1400 audit(1763361154.142:166620): avc: denied { create } for pid=19174 comm="syz.4.39635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2137.694864][ T36] audit: type=1400 audit(1763361154.142:166621): avc: denied { connect } for pid=19174 comm="syz.4.39635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2137.715522][ T36] audit: type=1400 audit(1763361154.152:166622): avc: denied { write } for pid=19174 comm="syz.4.39635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2137.758119][ T36] audit: type=1400 audit(1763361154.152:166623): avc: denied { read } for pid=19174 comm="syz.4.39635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2137.763018][T19184] tmpfs: Bad value for 'huge' [ 2137.826453][ T36] audit: type=1400 audit(1763361154.182:166624): avc: denied { execute } for pid=19180 comm="syz.0.39636" path="/455/cpuacct.usage_percpu_sys" dev="tmpfs" ino=2915 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2137.851831][ T36] audit: type=1400 audit(1763361154.192:166625): avc: denied { read write } for pid=19180 comm="syz.0.39636" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2137.876273][ T36] audit: type=1400 audit(1763361154.192:166626): avc: denied { read write open } for pid=19180 comm="syz.0.39636" path="/dev/fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2137.910087][ T36] audit: type=1400 audit(1763361154.242:166627): avc: denied { execute } for pid=19175 comm="syz.3.39633" path="/545/blkio.bfq.group_wait_time" dev="tmpfs" ino=3400 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2138.051577][T19201] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2138.454348][T19227] binder: Bad value for 'stats' [ 2138.710485][T19243] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2138.793682][T19247] netlink: 8 bytes leftover after parsing attributes in process `syz.3.39669'. [ 2139.103839][T19261] binder: Bad value for 'stats' [ 2139.766624][T19289] binder: Bad value for 'stats' [ 2139.919624][T19299] tmpfs: Bad value for 'huge' [ 2140.015703][T19307] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2140.334394][T19321] tmpfs: Bad value for 'huge' [ 2140.607943][T19334] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2140.616117][T19331] binder: Bad value for 'stats' [ 2141.103890][T19356] binder: Bad value for 'stats' [ 2141.112645][T19357] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2141.710117][ T9721] tipc: Subscription rejected, illegal request [ 2141.854788][T19393] binder: Bad value for 'stats' [ 2142.269563][T19403] tmpfs: Bad value for 'huge' [ 2142.361390][T19405] binder: Unknown parameter 'sta' [ 2142.625384][ T36] kauditd_printk_skb: 405 callbacks suppressed [ 2142.625401][ T36] audit: type=1400 audit(1763361159.132:167033): avc: denied { read write open } for pid=18818 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2142.706761][ T36] audit: type=1400 audit(1763361159.162:167034): avc: denied { ioctl } for pid=18818 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2142.761200][ T36] audit: type=1400 audit(1763361159.192:167035): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2142.849478][ T36] audit: type=1400 audit(1763361159.192:167036): avc: denied { read write open } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2142.917147][ T36] audit: type=1400 audit(1763361159.192:167037): avc: denied { ioctl } for pid=14949 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2143.001017][ T36] audit: type=1400 audit(1763361159.292:167039): avc: denied { execute } for pid=19416 comm="syz.5.39754" path="/50/blkio.bfq.group_wait_time" dev="tmpfs" ino=323 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2143.012115][T19423] binder: Bad value for 'stats' [ 2143.079485][ T36] audit: type=1400 audit(1763361159.292:167038): avc: denied { execute } for pid=19417 comm="syz.3.39755" path="/590/blkio.bfq.group_wait_time" dev="tmpfs" ino=3671 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2143.129468][ T36] audit: type=1400 audit(1763361159.322:167040): avc: denied { create } for pid=19417 comm="syz.3.39755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2143.175517][ T36] audit: type=1400 audit(1763361159.322:167041): avc: denied { setopt } for pid=19417 comm="syz.3.39755" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2143.178164][T19427] binder: Unknown parameter 'stat' [ 2143.215445][ T36] audit: type=1400 audit(1763361159.342:167042): avc: denied { read write } for pid=14949 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2143.414552][T19435] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2143.626844][T19447] binder: Bad value for 'stats' [ 2143.663709][T19450] binder: Unknown parameter 'stat' [ 2143.670550][T19451] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2143.902105][T19467] binder: Bad value for 'stats' [ 2143.972110][T19472] binder: Unknown parameter 'stat' [ 2144.390946][T19487] binder: Bad value for 'stats' [ 2144.428521][T19489] binder: Bad value for 'stats' [ 2144.440171][ T9721] bridge_slave_1: left allmulticast mode [ 2144.457203][ T9721] bridge_slave_1: left promiscuous mode [ 2144.462946][ T9721] bridge0: port 2(bridge_slave_1) entered disabled state [ 2144.471632][ T9721] bridge_slave_0: left allmulticast mode [ 2144.477296][ T9721] bridge_slave_0: left promiscuous mode [ 2144.483104][ T9721] bridge0: port 1(bridge_slave_0) entered disabled state [ 2144.641311][ T9721] veth1_macvtap: left promiscuous mode [ 2144.644831][T19503] binder: Bad value for 'stats' [ 2144.679512][ T9721] veth0_vlan: left promiscuous mode [ 2144.682429][T19504] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2144.822519][T19477] bridge0: port 1(bridge_slave_0) entered blocking state [ 2144.834137][T19477] bridge0: port 1(bridge_slave_0) entered disabled state [ 2144.847720][T19477] bridge_slave_0: entered allmulticast mode [ 2144.854904][T19477] bridge_slave_0: entered promiscuous mode [ 2144.864692][T19477] bridge0: port 2(bridge_slave_1) entered blocking state [ 2144.872262][T19477] bridge0: port 2(bridge_slave_1) entered disabled state [ 2144.880397][T19477] bridge_slave_1: entered allmulticast mode [ 2144.886764][T19477] bridge_slave_1: entered promiscuous mode [ 2145.080430][T19516] netlink: 8 bytes leftover after parsing attributes in process `syz.0.39803'. [ 2145.150852][T19477] bridge0: port 2(bridge_slave_1) entered blocking state [ 2145.157953][T19477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2145.165273][T19477] bridge0: port 1(bridge_slave_0) entered blocking state [ 2145.172338][T19477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2145.219821][ T9721] bridge0: port 1(bridge_slave_0) entered disabled state [ 2145.227352][ T9721] bridge0: port 2(bridge_slave_1) entered disabled state [ 2145.252630][T19527] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2145.347164][ T9881] bridge0: port 1(bridge_slave_0) entered blocking state [ 2145.354252][ T9881] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2145.384324][ T9721] bridge0: port 2(bridge_slave_1) entered blocking state [ 2145.391476][ T9721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2145.543391][T19477] veth0_vlan: entered promiscuous mode [ 2145.564106][T15164] tipc: Subscription rejected, illegal request [ 2145.613003][T19477] veth1_macvtap: entered promiscuous mode [ 2145.656818][T19544] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2145.956466][T15164] tipc: Subscription rejected, illegal request [ 2146.087948][T19566] binder: Bad value for 'stats' [ 2146.170655][T19572] binder: Bad value for 'stats' [ 2146.357862][T19580] netlink: 8 bytes leftover after parsing attributes in process `syz.4.39830'. [ 2146.850649][T19602] binder: Bad value for 'stats' [ 2147.566757][ T9881] tipc: Subscription rejected, illegal request [ 2147.645703][ T36] kauditd_printk_skb: 492 callbacks suppressed [ 2147.645721][ T36] audit: type=1400 audit(1763361164.152:167535): avc: denied { execute } for pid=19639 comm="syz.3.39860" path="/4/blkio.bfq.group_wait_time" dev="tmpfs" ino=43 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2147.759471][ T36] audit: type=1400 audit(1763361164.162:167536): avc: denied { execute } for pid=19637 comm="syz.5.39859" path="/73/blkio.bfq.group_wait_time" dev="tmpfs" ino=464 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2147.826043][ T36] audit: type=1400 audit(1763361164.162:167537): avc: denied { read write } for pid=18818 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2147.881017][ T36] audit: type=1400 audit(1763361164.162:167538): avc: denied { read write open } for pid=18818 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2147.957946][ T36] audit: type=1400 audit(1763361164.162:167539): avc: denied { ioctl } for pid=18818 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2148.009580][ T36] audit: type=1400 audit(1763361164.202:167540): avc: denied { read write } for pid=19477 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2148.059466][ T36] audit: type=1400 audit(1763361164.202:167541): avc: denied { read write open } for pid=19477 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2148.135350][ T36] audit: type=1400 audit(1763361164.202:167542): avc: denied { ioctl } for pid=19477 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2148.189470][ T36] audit: type=1400 audit(1763361164.212:167543): avc: denied { execute } for pid=19641 comm="syz.5.39862" path="/74/blkio.bfq.group_wait_time" dev="tmpfs" ino=470 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2148.256707][ T36] audit: type=1400 audit(1763361164.222:167544): avc: denied { mounton } for pid=19641 comm="syz.5.39862" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 2148.269106][T19657] binder: Bad value for 'stats' [ 2149.038459][T19674] binder: Bad value for 'stats' [ 2150.853647][T19725] tmpfs: Bad value for 'huge' [ 2152.667533][ T36] kauditd_printk_skb: 252 callbacks suppressed [ 2152.667551][ T36] audit: type=1400 audit(1763361169.172:167797): avc: denied { read write } for pid=19477 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2152.724444][ T36] audit: type=1400 audit(1763361169.172:167798): avc: denied { read write open } for pid=19477 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2152.799462][ T36] audit: type=1400 audit(1763361169.172:167799): avc: denied { ioctl } for pid=19477 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2152.866229][ T36] audit: type=1400 audit(1763361169.232:167800): avc: denied { execute } for pid=19779 comm="syz.3.39931" path="/32/blkio.bfq.group_wait_time" dev="tmpfs" ino=212 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2152.919468][ T36] audit: type=1400 audit(1763361169.232:167801): avc: denied { execute } for pid=19778 comm="syz.4.39929" path="/402/blkio.bfq.group_wait_time" dev="tmpfs" ino=2555 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2152.969314][ T36] audit: type=1400 audit(1763361169.242:167802): avc: denied { read } for pid=19779 comm="syz.3.39931" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 2153.039459][ T36] audit: type=1400 audit(1763361169.242:167803): avc: denied { read open } for pid=19779 comm="syz.3.39931" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 2153.070078][ T36] audit: type=1400 audit(1763361169.242:167804): avc: denied { ioctl } for pid=19779 comm="syz.3.39931" path="/dev/kvm" dev="devtmpfs" ino=13 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 2153.120210][ T36] audit: type=1400 audit(1763361169.272:167805): avc: denied { name_bind } for pid=19778 comm="syz.4.39929" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2153.142429][ T36] audit: type=1400 audit(1763361169.272:167806): avc: denied { node_bind } for pid=19778 comm="syz.4.39929" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2153.405555][T19804] tmpfs: Bad value for 'huge' [ 2153.493939][T19811] binder: Bad value for 'stats' [ 2154.029495][T19829] tmpfs: Bad value for 'huge' [ 2154.239224][T19835] binder: Bad value for 'stats' [ 2154.691381][T19840] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2154.940647][T19850] binder: Bad value for 'stats' [ 2155.657409][T19867] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2155.710598][T19869] binder: Bad value for 'stats' [ 2155.764307][T19873] binder: Bad value for 'stats' [ 2155.863864][T19877] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2156.514518][T19887] binder: Bad value for 'stats' [ 2156.663450][T19893] netlink: 8 bytes leftover after parsing attributes in process `syz.0.39984'. [ 2156.819487][T19899] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2157.239498][T19911] binder: Bad value for 'stats' [ 2157.671458][ T36] kauditd_printk_skb: 268 callbacks suppressed [ 2157.671475][ T36] audit: type=1400 audit(1763361174.182:168075): avc: denied { execute } for pid=19936 comm="syz.5.40007" path="/109/blkio.bfq.group_wait_time" dev="tmpfs" ino=685 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2157.729459][ T36] audit: type=1400 audit(1763361174.222:168076): avc: denied { create } for pid=19936 comm="syz.5.40007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2157.750192][ T36] audit: type=1400 audit(1763361174.222:168077): avc: denied { bind } for pid=19936 comm="syz.5.40007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2157.771521][ T36] audit: type=1400 audit(1763361174.222:168078): avc: denied { listen } for pid=19936 comm="syz.5.40007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2157.792788][ T36] audit: type=1400 audit(1763361174.222:168079): avc: denied { create } for pid=19936 comm="syz.5.40007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2157.813465][ T36] audit: type=1400 audit(1763361174.222:168080): avc: denied { accept } for pid=19936 comm="syz.5.40007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2158.109321][ T36] audit: type=1400 audit(1763361174.612:168081): avc: denied { read write } for pid=19477 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2158.158993][ T36] audit: type=1400 audit(1763361174.612:168082): avc: denied { read write open } for pid=19477 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2158.210265][ T36] audit: type=1400 audit(1763361174.612:168083): avc: denied { ioctl } for pid=19477 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2158.260294][ T36] audit: type=1400 audit(1763361174.662:168084): avc: denied { execute } for pid=19939 comm="syz.3.40008" path="/52/blkio.bfq.group_wait_time" dev="tmpfs" ino=336 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2158.731739][T19964] binder: Bad value for 'stats' [ 2158.831016][T19967] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2159.240779][T19980] binder: Bad value for 'stats' [ 2159.502541][T19986] binder: Bad value for 'stats' [ 2160.350452][T20005] binder: Bad value for 'stats' [ 2160.845770][T20022] binder: Bad value for 'stats' [ 2160.924816][T20024] binder: Bad value for 'stats' [ 2161.876895][T20056] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2162.509569][T20079] binder: Bad value for 'stats' [ 2162.687366][ T36] kauditd_printk_skb: 260 callbacks suppressed [ 2162.687385][ T36] audit: type=1400 audit(1763361179.192:168345): avc: denied { execute } for pid=20085 comm="syz.0.40081" path="/576/blkio.bfq.group_wait_time" dev="tmpfs" ino=3646 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2162.700815][T20086] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2162.742513][ T36] audit: type=1400 audit(1763361179.202:168346): avc: denied { remount } for pid=20085 comm="syz.0.40081" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2162.794625][ T36] audit: type=1400 audit(1763361179.232:168347): avc: denied { execute } for pid=20087 comm="syz.3.40082" path="/69/blkio.bfq.group_wait_time" dev="tmpfs" ino=440 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2162.853810][ T36] audit: type=1400 audit(1763361179.242:168348): avc: denied { create } for pid=20087 comm="syz.3.40082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2162.890286][T20098] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2162.899302][ T36] audit: type=1400 audit(1763361179.242:168349): avc: denied { setopt } for pid=20087 comm="syz.3.40082" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2162.944994][ T36] audit: type=1400 audit(1763361179.272:168350): avc: denied { read write } for pid=19477 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2162.969864][ T36] audit: type=1400 audit(1763361179.272:168351): avc: denied { read write open } for pid=19477 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2163.079493][ T36] audit: type=1400 audit(1763361179.272:168352): avc: denied { ioctl } for pid=19477 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2163.127370][ T36] audit: type=1400 audit(1763361179.292:168353): avc: denied { execute } for pid=20089 comm="syz.4.40083" path="/435/cpuacct.usage_percpu_sys" dev="tmpfs" ino=2758 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2163.163807][ T36] audit: type=1400 audit(1763361179.302:168354): avc: denied { read write } for pid=20089 comm="syz.4.40083" name="fuse" dev="devtmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2163.211643][T20111] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2163.849333][T20142] tmpfs: Unknown parameter 'hu' [ 2165.890878][T20230] binder: Bad value for 'stats' [ 2165.984838][T20236] binder: Bad value for 'stats' [ 2166.580950][T20254] binder: Bad value for 'stats' [ 2166.947319][T20270] binder: Bad value for 'stats' [ 2167.008355][T20272] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2167.131450][T20278] binder: Bad value for 'stats' [ 2167.739840][ T36] kauditd_printk_skb: 359 callbacks suppressed [ 2167.739857][ T36] audit: type=1400 audit(1763361184.252:168714): avc: denied { read write } for pid=18818 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2167.780518][ T36] audit: type=1400 audit(1763361184.252:168715): avc: denied { read write open } for pid=18818 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2167.869472][ T36] audit: type=1400 audit(1763361184.252:168716): avc: denied { ioctl } for pid=18818 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2167.939469][ T36] audit: type=1400 audit(1763361184.362:168717): avc: denied { execmem } for pid=20297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2167.999484][ T36] audit: type=1400 audit(1763361184.372:168718): avc: denied { read write } for pid=18818 comm="syz-executor" name="loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2168.079456][ T36] audit: type=1400 audit(1763361184.372:168719): avc: denied { read write open } for pid=18818 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2168.159462][ T36] audit: type=1400 audit(1763361184.372:168720): avc: denied { ioctl } for pid=18818 comm="syz-executor" path="/dev/loop5" dev="devtmpfs" ino=826 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2168.249453][ T36] audit: type=1400 audit(1763361184.442:168721): avc: denied { execute } for pid=20298 comm="syz.5.40188" path="/146/blkio.bfq.group_wait_time" dev="tmpfs" ino=910 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2168.301901][ T36] audit: type=1400 audit(1763361184.472:168722): avc: denied { mounton } for pid=20298 comm="syz.5.40188" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 2168.333339][ T36] audit: type=1400 audit(1763361184.472:168723): avc: denied { mount } for pid=20298 comm="syz.5.40188" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2168.374424][T20302] bridge0: port 1(bridge_slave_0) entered blocking state [ 2168.399490][T20302] bridge0: port 1(bridge_slave_0) entered disabled state [ 2168.419510][T20302] bridge_slave_0: entered allmulticast mode [ 2168.425934][T20302] bridge_slave_0: entered promiscuous mode [ 2168.441314][T20302] bridge0: port 2(bridge_slave_1) entered blocking state [ 2168.448396][T20302] bridge0: port 2(bridge_slave_1) entered disabled state [ 2168.473621][T20302] bridge_slave_1: entered allmulticast mode [ 2168.484447][T20302] bridge_slave_1: entered promiscuous mode [ 2168.691272][ T9881] bridge_slave_1: left allmulticast mode [ 2168.697570][ T9881] bridge_slave_1: left promiscuous mode [ 2168.719542][ T9881] bridge0: port 2(bridge_slave_1) entered disabled state [ 2168.740667][ T9881] bridge_slave_0: left allmulticast mode [ 2168.746342][ T9881] bridge_slave_0: left promiscuous mode [ 2168.771154][ T9881] bridge0: port 1(bridge_slave_0) entered disabled state [ 2168.862931][T20317] binder: Bad value for 'stats' [ 2169.036973][ T9881] veth1_macvtap: left promiscuous mode [ 2169.051150][ T9881] veth0_vlan: left promiscuous mode [ 2169.266028][T20302] bridge0: port 2(bridge_slave_1) entered blocking state [ 2169.273337][T20302] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2169.280732][T20302] bridge0: port 1(bridge_slave_0) entered blocking state [ 2169.287767][T20302] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2169.380757][T15164] bridge0: port 1(bridge_slave_0) entered disabled state [ 2169.393563][T15164] bridge0: port 2(bridge_slave_1) entered disabled state [ 2169.453858][T15164] bridge0: port 1(bridge_slave_0) entered blocking state [ 2169.461050][T15164] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2169.482689][T15164] bridge0: port 2(bridge_slave_1) entered blocking state [ 2169.489839][T15164] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2169.605674][T20302] veth0_vlan: entered promiscuous mode [ 2169.706852][T20302] veth1_macvtap: entered promiscuous mode [ 2170.530968][T20353] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 Stopping sshd: [ 2171.284668][T20375] binder: Bad value for 'stats' stopped /usr/sbin/sshd (pid 201) OK Stopping crond: stopped /usr/sbin/crond (pid 194) OK Stopping dhcpcd... stopped /sbin/dhcpcd (pid 148) Stopping network: [ 2172.712007][T20408] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2172.763487][ T36] kauditd_printk_skb: 238 callbacks suppressed [ 2172.763504][ T36] audit: type=1400 audit(1763361189.272:168962): avc: denied { read write } for pid=19477 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2172.849469][ T36] audit: type=1400 audit(1763361189.272:168963): avc: denied { read write open } for pid=19477 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2172.880689][T20413] binder: Unknown parameter 'stat' [ 2172.939468][ T36] audit: type=1400 audit(1763361189.272:168964): avc: denied { ioctl } for pid=19477 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2173.043169][ T36] audit: type=1400 audit(1763361189.282:168965): avc: denied { search } for pid=20405 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2173.109460][ T36] audit: type=1400 audit(1763361189.362:168966): avc: denied { execute } for pid=20412 comm="syz.3.40228" path="/113/blkio.bfq.group_wait_time" dev="tmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2173.176355][ T36] audit: type=1400 audit(1763361189.392:168967): avc: denied { execute } for pid=20411 comm="syz.4.40227" path="/473/blkio.bfq.group_wait_time" dev="tmpfs" ino=2987 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2173.279489][ T36] audit: type=1400 audit(1763361189.392:168968): avc: denied { mounton } for pid=20411 comm="syz.4.40227" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 2173.381818][T20429] SELinux: security_context_str_to_sid (syste_uÝGй ‰:) failed with errno=-22 [ 2173.389489][ T36] audit: type=1400 audit(1763361189.432:168969): avc: denied { search } for pid=20410 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2173.459471][ T36] audit: type=1400 audit(1763361189.442:168970): avc: denied { create } for pid=20412 comm="syz.3.40228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2173.539502][ T36] audit: type=1400 audit(1763361189.442:168971): avc: denied { setopt } for pid=20412 comm="syz.3.40228" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2173.571572][T20432] binder: Bad value for 'stats' OK Stopping iptables: OK Stopping system message bus: [ 2175.121367][T20470] binder: Bad value for 'stats' done [ 2176.193714][T20507] binder: Bad value for 'stats' [ 2176.519562][T20525] netlink: 100 bytes leftover after parsing attributes in process `syz.5.40277'. [ 2176.987436][T20549] overlayfs: failed to clone lowerpath Stopping klogd: [ 2177.011404][T20549] overlayfs: failed to clone lowerpath OK [ 2177.161571][T20561] binder: Bad value for 'stats' Stopping acpid: [ 2177.769749][ T36] kauditd_printk_skb: 344 callbacks suppressed [ 2177.769774][ T36] audit: type=1400 audit(1763361194.282:169316): avc: denied { read write open } for pid=19477 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2177.840798][ T36] audit: type=1400 audit(1763361194.322:169317): avc: denied { ioctl } for pid=19477 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2177.899850][ T36] audit: type=1400 audit(1763361194.412:169318): avc: denied { execute } for pid=20597 comm="syz.3.40310" path="/146/blkio.bfq.group_wait_time" dev="tmpfs" ino=902 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2177.941418][ T36] audit: type=1400 audit(1763361194.452:169319): avc: denied { name_bind } for pid=20597 comm="syz.3.40310" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2177.999481][ T36] audit: type=1400 audit(1763361194.452:169320): avc: denied { node_bind } for pid=20597 comm="syz.3.40310" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2178.039454][ T36] audit: type=1400 audit(1763361194.492:169321): avc: denied { read write } for pid=19477 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2178.097953][ T36] audit: type=1400 audit(1763361194.492:169322): avc: denied { read write open } for pid=19477 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2178.144355][ T36] audit: type=1400 audit(1763361194.492:169323): avc: denied { ioctl } for pid=19477 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2178.199487][ T36] audit: type=1400 audit(1763361194.602:169324): avc: denied { execute } for pid=20599 comm="syz.3.40311" path="/147/blkio.bfq.group_wait_time" dev="tmpfs" ino=908 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2178.259467][ T36] audit: type=1400 audit(1763361194.692:169325): avc: denied { read write } for pid=19477 comm="syz-executor" name="loop3" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 OK Stopping syslogd: stopped /sbin/syslogd (pid 92) OK umount: can't remount debugfs read-only umount: sysfs busy - remounted read-only umount: devtmpfs busy - remounted read-only umount: can't remount /dev/root read-only The system is going down NOW! Connection to 10.128.1.72 closed by remote host. Sent SIGTERM to all processes [ 2179.773939][ T9881] bridge_slave_1: left allmulticast mode [ 2179.780106][ T9881] bridge_slave_1: left promiscuous mode [ 2179.785822][ T9881] bridge0: port 2(bridge_slave_1) entered disabled state [ 2179.794002][ T9881] bridge_slave_0: left allmulticast mode [ 2179.799755][ T9881] bridge_slave_0: left promiscuous mode [ 2179.805364][ T9881] bridge0: port 1(bridge_slave_0) entered disabled state [ 2180.100335][ T9881] veth1_macvtap: left promiscuous mode [ 2180.105873][ T9881] veth0_vlan: left promiscuous mode Sent SIGKILL to all processes Requesting system poweroff [ 2181.151340][ T9881] bridge_slave_1: left allmulticast mode [ 2181.157000][ T9881] bridge_slave_1: left promiscuous mode [ 2181.162665][ T9881] bridge0: port 2(bridge_slave_1) entered disabled state [ 2181.170062][ T9881] bridge_slave_0: left allmulticast mode [ 2181.175685][ T9881] bridge_slave_0: left promiscuous mode [ 2181.181360][ T9881] bridge0: port 1(bridge_slave_0) entered disabled state [ 2181.188813][ T9881] bridge_slave_1: left allmulticast mode [ 2181.194523][ T9881] bridge_slave_1: left promiscuous mode [ 2181.200125][ T9881] bridge0: port 2(bridge_slave_1) entered disabled state [ 2181.207660][ T9881] bridge_slave_0: left allmulticast mode [ 2181.213448][ T9881] bridge_slave_0: left promiscuous mode [ 2181.219065][ T9881] bridge0: port 1(bridge_slave_0) entered disabled state [ 2181.227287][ T9881] bridge_slave_1: left allmulticast mode [ 2181.232943][ T9881] bridge_slave_1: left promiscuous mode [ 2181.238548][ T9881] bridge0: port 2(bridge_slave_1) entered disabled state [ 2181.247199][ T9881] bridge_slave_0: left allmulticast mode [ 2181.252854][ T9881] bridge_slave_0: left promiscuous mode [ 2181.258456][ T9881] bridge0: port 1(bridge_slave_0) entered disabled state [ 2181.623475][ T9881] veth1_macvtap: left promiscuous mode [ 2181.629228][ T9881] veth0_vlan: left promiscuous mode [ 2181.634689][ T9881] veth1_macvtap: left promiscuous mode [ 2181.640223][ T9881] veth0_vlan: left promiscuous mode [ 2181.645608][ T9881] veth1_macvtap: left promiscuous mode [ 2181.651106][ T9881] veth0_vlan: left promiscuous mode [ 2181.716779][T20651] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 2181.723889][T20651] ACPI: PM: Preparing to enter system sleep state S5 [ 2181.730917][T20651] kvm: exiting hardware virtualization [ 2181.736424][T20651] reboot: Power down serialport: VM disconnected.