last executing test programs: 1.753495591s ago: executing program 1 (id=536): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$kcm(0x11, 0xa, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'veth1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x3a, &(0x7f0000000580)={&(0x7f0000000680)=ANY=[@ANYBLOB="8c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000005000128009000100766c616e0000000040000280060001000000000004000480280003800c00010040000000060000000c0001000004000000000000d8fd010006000000090000000600050088a8000008000a00", @ANYRES32=r2, @ANYBLOB="08000500", @ANYRES32=r2], 0x8c}, 0x1, 0xba01, 0x0, 0x4004001}, 0x0) 1.482384066s ago: executing program 1 (id=538): r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc1105518, &(0x7f0000000040)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x1, [0x327cf3e4, 0xfffffffffffffff9, 0x0, 0x5, 0xfffffffffffffffc, 0x0, 0x0, 0x8000, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x100000000000, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x9, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x5, 0x3, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0xa, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1]}) 1.370308501s ago: executing program 1 (id=540): r0 = socket$netlink(0x10, 0x3, 0x10) socket$key(0xf, 0x3, 0x2) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) 1.035074188s ago: executing program 0 (id=543): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec85"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) getpid() mkdirat(0xffffffffffffff9c, 0x0, 0x0) syz_emit_ethernet(0x5e, 0x0, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(r1, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000140)={0x2c, r2, 0x1, 0x0, 0x0, {0x1c}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}]}, 0x2c}}, 0x0) 710.464554ms ago: executing program 0 (id=544): sched_setscheduler(0x0, 0x2, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x2) readv(r1, &(0x7f0000000000)=[{&(0x7f0000001300)=""/244, 0x940}], 0x1) 511.218654ms ago: executing program 0 (id=545): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000007000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, 0x0, 0x0) 417.575549ms ago: executing program 1 (id=546): r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x11e, 0x22, 0xffffffffffffffff, &(0x7f0000000540)) 417.337379ms ago: executing program 0 (id=547): r0 = socket$nl_rdma(0x10, 0x3, 0x14) recvmsg(r0, 0x0, 0x120) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x10, 0x1401, 0x201, 0x70bd25, 0x25dfdbfd}, 0x10}, 0x1, 0x0, 0x0, 0x4}, 0x4040800) 289.902936ms ago: executing program 1 (id=548): mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x32, 0xffffffffffffffff, 0xffffd000) fsopen(&(0x7f0000000100)='configfs\x00', 0x0) 179.600431ms ago: executing program 0 (id=549): r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r3) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="01980000000000002000128008000100677265001400028008000100", @ANYRES32], 0x40}, 0x1, 0x0, 0x0, 0x4014}, 0x0) r4 = socket(0x10, 0x3, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x44, 0x24, 0x5820a61ca228659, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, r5, {0x0, 0x9}, {0xffff, 0xffff}, {0x0, 0x7}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_USC={0x10, 0x3, {0x6, 0x2}}}}]}, 0x44}}, 0x800) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001900)=@newtfilter={0x34, 0x28, 0xd27, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, r5, {0x6, 0x9}, {0x9, 0x9}, {0xffe0, 0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x44084) 166.92µs ago: executing program 0 (id=550): r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000e09d7040460a2196324f01020301090224000100000000090400000206d3450009050102100000000009058b0240"], 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000700)={0x84, &(0x7f0000000240)={0x40, 0xa, 0x6, "6ef1989edd08"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000500)={0x3f, &(0x7f0000000000)=ANY=[@ANYBLOB="20131d00000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f00000007c0)={0x84, &(0x7f0000000300)={0x0, 0x5, 0x2, "01a3"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 0s ago: executing program 1 (id=551): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000040)={0xa, 0x4e20, 0xfffffffc, @remote, 0x2}, 0x1c, 0x0}, 0x20008814) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000780)={@local}, 0x14) kernel console output (not intermixed with test programs): [ 47.543537][ T31] audit: type=1400 audit(47.460:56): avc: denied { read write } for pid=3110 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.545645][ T31] audit: type=1400 audit(47.470:57): avc: denied { open } for pid=3110 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:13308' (ED25519) to the list of known hosts. [ 58.868522][ T31] audit: type=1400 audit(58.790:58): avc: denied { name_bind } for pid=3113 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 60.200554][ T31] audit: type=1400 audit(60.120:59): avc: denied { execute } for pid=3114 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 60.255550][ T31] audit: type=1400 audit(60.160:60): avc: denied { execute_no_trans } for pid=3114 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.031828][ T31] audit: type=1400 audit(63.950:61): avc: denied { mounton } for pid=3114 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 64.038463][ T31] audit: type=1400 audit(63.960:62): avc: denied { mount } for pid=3114 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 64.057156][ T3114] cgroup: Unknown subsys name 'net' [ 64.067681][ T31] audit: type=1400 audit(63.990:63): avc: denied { unmount } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 64.295609][ T3114] cgroup: Unknown subsys name 'cpuset' [ 64.305389][ T3114] cgroup: Unknown subsys name 'hugetlb' [ 64.306892][ T3114] cgroup: Unknown subsys name 'rlimit' [ 64.536062][ T31] audit: type=1400 audit(64.460:64): avc: denied { setattr } for pid=3114 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 64.538950][ T31] audit: type=1400 audit(64.460:65): avc: denied { mounton } for pid=3114 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 64.542302][ T31] audit: type=1400 audit(64.460:66): avc: denied { mount } for pid=3114 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 64.740647][ T3116] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 64.745849][ T31] audit: type=1400 audit(64.670:67): avc: denied { relabelto } for pid=3116 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 64.749207][ T31] audit: type=1400 audit(64.670:68): avc: denied { write } for pid=3116 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 64.781369][ T31] audit: type=1400 audit(64.700:69): avc: denied { read } for pid=3114 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 64.785344][ T31] audit: type=1400 audit(64.700:70): avc: denied { open } for pid=3114 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.434771][ T3114] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 74.396421][ T31] audit: type=1400 audit(74.320:71): avc: denied { execmem } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 74.456480][ T31] audit: type=1400 audit(74.380:72): avc: denied { read } for pid=3120 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.458423][ T31] audit: type=1400 audit(74.380:73): avc: denied { open } for pid=3120 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.462224][ T31] audit: type=1400 audit(74.380:74): avc: denied { mounton } for pid=3120 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 74.476796][ T31] audit: type=1400 audit(74.400:75): avc: denied { module_request } for pid=3120 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.541694][ T31] audit: type=1400 audit(74.460:76): avc: denied { sys_module } for pid=3119 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.180542][ T31] audit: type=1400 audit(75.100:77): avc: denied { ioctl } for pid=3119 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.478426][ T3119] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.482492][ T3119] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.606710][ T3120] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.611625][ T3120] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.292573][ T3119] hsr_slave_0: entered promiscuous mode [ 77.297922][ T3119] hsr_slave_1: entered promiscuous mode [ 77.705807][ T3120] hsr_slave_0: entered promiscuous mode [ 77.707564][ T3120] hsr_slave_1: entered promiscuous mode [ 77.712579][ T3120] debugfs: 'hsr0' already exists in 'hsr' [ 77.715912][ T3120] Cannot create hsr debugfs directory [ 77.813647][ T31] audit: type=1400 audit(77.730:78): avc: denied { create } for pid=3119 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.814071][ T31] audit: type=1400 audit(77.730:79): avc: denied { write } for pid=3119 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.814361][ T31] audit: type=1400 audit(77.730:80): avc: denied { read } for pid=3119 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.822413][ T3119] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 77.834225][ T3119] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 77.841002][ T3119] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 77.847477][ T3119] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.090916][ T3120] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.099072][ T3120] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.105794][ T3120] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.110538][ T3120] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 78.580169][ T3119] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.697037][ T3120] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.118460][ T3119] veth0_vlan: entered promiscuous mode [ 81.186289][ T3119] veth1_vlan: entered promiscuous mode [ 81.278245][ T3119] veth0_macvtap: entered promiscuous mode [ 81.291679][ T3119] veth1_macvtap: entered promiscuous mode [ 81.379740][ T1055] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.380636][ T1055] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.380780][ T1055] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.380918][ T1055] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.559302][ T31] audit: type=1400 audit(81.480:81): avc: denied { mount } for pid=3119 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 81.566365][ T31] audit: type=1400 audit(81.490:82): avc: denied { mounton } for pid=3119 comm="syz-executor" path="/syzkaller.QAN6kA/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 81.573357][ T31] audit: type=1400 audit(81.490:83): avc: denied { mount } for pid=3119 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 81.585879][ T31] audit: type=1400 audit(81.500:84): avc: denied { mounton } for pid=3119 comm="syz-executor" path="/syzkaller.QAN6kA/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 81.588399][ T31] audit: type=1400 audit(81.510:85): avc: denied { mounton } for pid=3119 comm="syz-executor" path="/syzkaller.QAN6kA/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3098 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 81.612103][ T31] audit: type=1400 audit(81.530:86): avc: denied { unmount } for pid=3119 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 81.623553][ T31] audit: type=1400 audit(81.540:87): avc: denied { mounton } for pid=3119 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 81.623986][ T31] audit: type=1400 audit(81.540:88): avc: denied { mount } for pid=3119 comm="syz-executor" name="/" dev="gadgetfs" ino=3099 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 81.632037][ T31] audit: type=1400 audit(81.550:89): avc: denied { mount } for pid=3119 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 81.635591][ T31] audit: type=1400 audit(81.560:90): avc: denied { mounton } for pid=3119 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 81.701933][ T3119] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 81.869517][ T3120] veth0_vlan: entered promiscuous mode [ 81.890728][ T3120] veth1_vlan: entered promiscuous mode [ 81.971570][ T3120] veth0_macvtap: entered promiscuous mode [ 81.994344][ T3120] veth1_macvtap: entered promiscuous mode [ 82.061901][ T2967] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.062430][ T2967] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.062531][ T2967] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.062595][ T2967] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.101449][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 89.101826][ T31] audit: type=1326 audit(89.010:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3833 comm="syz.1.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 89.110446][ T31] audit: type=1326 audit(89.030:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3833 comm="syz.1.9" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1300b8 code=0x7ffc0000 [ 89.114745][ T31] audit: type=1326 audit(89.030:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3833 comm="syz.1.9" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1300b8 code=0x7ffc0000 [ 89.129241][ T31] audit: type=1326 audit(89.040:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3833 comm="syz.1.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 89.131069][ T31] audit: type=1326 audit(89.050:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3833 comm="syz.1.9" exe="/syz-executor" sig=0 arch=40000028 syscall=219 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 89.146653][ T31] audit: type=1326 audit(89.060:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3833 comm="syz.1.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 93.265472][ T3848] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 93.275880][ T31] audit: type=1400 audit(93.200:108): avc: denied { relabelto } for pid=3847 comm="syz.1.14" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 93.278611][ T31] audit: type=1400 audit(93.200:109): avc: denied { associate } for pid=3847 comm="syz.1.14" name="/" dev="cgroup2" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 93.817557][ T31] audit: type=1400 audit(93.740:110): avc: denied { create } for pid=3850 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 94.594539][ T31] audit: type=1400 audit(94.510:111): avc: denied { mount } for pid=3855 comm="syz.1.17" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 94.618534][ T31] audit: type=1400 audit(94.540:112): avc: denied { unmount } for pid=3855 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 95.564208][ T3861] syz.1.19 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 96.410291][ T31] audit: type=1400 audit(96.330:113): avc: denied { create } for pid=3866 comm="syz.1.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 96.431163][ T31] audit: type=1400 audit(96.350:114): avc: denied { connect } for pid=3866 comm="syz.1.22" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 96.501243][ T31] audit: type=1400 audit(96.420:115): avc: denied { write } for pid=3866 comm="syz.1.22" path="socket:[2331]" dev="sockfs" ino=2331 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 96.863547][ T31] audit: type=1400 audit(96.780:116): avc: denied { create } for pid=3873 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 96.887513][ T31] audit: type=1400 audit(96.810:117): avc: denied { write } for pid=3873 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 96.927351][ T31] audit: type=1400 audit(96.830:118): avc: denied { block_suspend } for pid=3873 comm="syz.0.24" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 96.927680][ T31] audit: type=1400 audit(96.850:120): avc: denied { create } for pid=3873 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 96.928413][ T31] audit: type=1400 audit(96.840:119): avc: denied { create } for pid=3876 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 97.214468][ T3883] netlink: 24 bytes leftover after parsing attributes in process `syz.1.26'. [ 101.580161][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 101.580496][ T31] audit: type=1326 audit(101.500:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.1.37" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 101.603293][ T31] audit: type=1326 audit(101.520:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.1.37" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 101.605759][ T31] audit: type=1326 audit(101.520:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.1.37" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 101.615738][ T31] audit: type=1326 audit(101.540:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.1.37" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 101.626562][ T31] audit: type=1326 audit(101.550:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.1.37" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 101.745061][ T31] audit: type=1326 audit(101.570:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.1.37" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 101.757760][ T31] audit: type=1326 audit(101.680:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.1.37" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 101.759935][ T31] audit: type=1326 audit(101.680:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.1.37" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 101.761749][ T31] audit: type=1326 audit(101.680:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.1.37" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 101.767356][ T31] audit: type=1326 audit(101.690:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.1.37" exe="/syz-executor" sig=0 arch=40000028 syscall=343 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 108.614113][ T3971] process 'syz.1.49' launched './file1' with NULL argv: empty string added [ 108.614107][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 108.614225][ T31] audit: type=1400 audit(108.530:143): avc: denied { execute } for pid=3970 comm="syz.1.49" name="file1" dev="tmpfs" ino=227 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 108.617576][ T31] audit: type=1400 audit(108.540:144): avc: denied { execute_no_trans } for pid=3970 comm="syz.1.49" path="/41/file1" dev="tmpfs" ino=227 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 109.239789][ T3976] Zero length message leads to an empty skb [ 109.756372][ T31] audit: type=1400 audit(109.680:145): avc: denied { allowed } for pid=3979 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 109.789619][ T31] audit: type=1400 audit(109.680:146): avc: denied { create } for pid=3979 comm="syz.1.53" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 109.795970][ T31] audit: type=1400 audit(109.700:147): avc: denied { map } for pid=3979 comm="syz.1.53" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2409 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 109.886761][ T31] audit: type=1400 audit(109.700:148): avc: denied { read write } for pid=3979 comm="syz.1.53" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2409 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 113.127254][ T31] audit: type=1326 audit(113.050:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4005 comm="syz.1.60" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 113.131457][ T31] audit: type=1326 audit(113.050:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4005 comm="syz.1.60" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 113.135268][ T31] audit: type=1326 audit(113.050:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4005 comm="syz.1.60" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 113.138048][ T31] audit: type=1326 audit(113.060:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4005 comm="syz.1.60" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 114.387255][ T4022] pimreg: entered allmulticast mode [ 114.407552][ T4022] pimreg: left allmulticast mode [ 118.093394][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 118.094528][ T31] audit: type=1326 audit(118.000:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4040 comm="syz.1.72" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 118.097014][ T31] audit: type=1326 audit(118.000:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4040 comm="syz.1.72" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 118.099165][ T31] audit: type=1326 audit(118.000:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4040 comm="syz.1.72" exe="/syz-executor" sig=0 arch=40000028 syscall=351 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 118.101539][ T31] audit: type=1326 audit(118.000:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4040 comm="syz.1.72" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 118.104391][ T31] audit: type=1326 audit(118.000:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4040 comm="syz.1.72" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 120.343890][ T31] audit: type=1400 audit(120.260:167): avc: denied { create } for pid=4055 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 120.358396][ T31] audit: type=1400 audit(120.280:168): avc: denied { connect } for pid=4055 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 124.789506][ T31] audit: type=1400 audit(124.710:169): avc: denied { ioctl } for pid=4064 comm="syz.0.82" path="socket:[2532]" dev="sockfs" ino=2532 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 124.818440][ T31] audit: type=1400 audit(124.740:170): avc: denied { bind } for pid=4064 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 124.840887][ T31] audit: type=1400 audit(124.760:171): avc: denied { write } for pid=4064 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 124.841243][ T31] audit: type=1400 audit(124.760:172): avc: denied { read } for pid=4064 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 126.255847][ T31] audit: type=1400 audit(126.150:173): avc: denied { create } for pid=4067 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 126.277633][ T31] audit: type=1400 audit(126.190:174): avc: denied { write } for pid=4067 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 130.936917][ T31] audit: type=1400 audit(130.860:175): avc: denied { ioctl } for pid=4085 comm="syz.0.89" path="socket:[2569]" dev="sockfs" ino=2569 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 130.941799][ T4086] netlink: 8 bytes leftover after parsing attributes in process `syz.0.89'. [ 130.968887][ T4086] hsr0: entered promiscuous mode [ 130.969588][ T4086] macvtap1: entered allmulticast mode [ 131.023796][ T4086] hsr0: entered allmulticast mode [ 131.025919][ T4086] hsr_slave_0: entered allmulticast mode [ 131.028435][ T4086] hsr_slave_1: entered allmulticast mode [ 133.256830][ T31] audit: type=1400 audit(133.180:176): avc: denied { listen } for pid=4097 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 133.260155][ T31] audit: type=1400 audit(133.180:177): avc: denied { connect } for pid=4097 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 133.452191][ T31] audit: type=1400 audit(133.370:178): avc: denied { read } for pid=4097 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 136.048844][ T31] audit: type=1400 audit(135.970:179): avc: denied { bind } for pid=4102 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 136.137110][ T31] audit: type=1400 audit(136.040:180): avc: denied { accept } for pid=4102 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 136.783955][ T31] audit: type=1400 audit(136.700:181): avc: denied { connect } for pid=4102 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 136.789474][ T4104] netlink: 4 bytes leftover after parsing attributes in process `syz.0.94'. [ 145.105377][ T4120] netlink: 28 bytes leftover after parsing attributes in process `syz.0.98'. [ 146.542135][ T31] audit: type=1400 audit(146.460:182): avc: denied { mounton } for pid=4127 comm="syz.0.99" path="/proc/64/cgroup" dev="proc" ino=3548 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 146.864553][ T4130] capability: warning: `syz.0.100' uses 32-bit capabilities (legacy support in use) [ 147.360260][ T31] audit: type=1400 audit(147.280:183): avc: denied { ioctl } for pid=4131 comm="syz.0.101" path="socket:[2595]" dev="sockfs" ino=2595 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 147.361591][ T4132] syzkaller0: entered promiscuous mode [ 147.361745][ T4132] syzkaller0: entered allmulticast mode [ 147.605219][ T31] audit: type=1400 audit(147.530:184): avc: denied { create } for pid=4137 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 147.636307][ T31] audit: type=1400 audit(147.560:185): avc: denied { setopt } for pid=4137 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 147.710770][ T31] audit: type=1400 audit(147.630:186): avc: denied { connect } for pid=4137 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 149.016091][ T31] audit: type=1326 audit(148.910:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4149 comm="syz.0.106" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 149.016280][ T31] audit: type=1326 audit(148.940:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4149 comm="syz.0.106" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 149.023947][ T31] audit: type=1326 audit(148.950:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4149 comm="syz.0.106" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 149.024569][ T31] audit: type=1326 audit(148.950:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4149 comm="syz.0.106" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 149.038518][ T31] audit: type=1326 audit(148.960:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4149 comm="syz.0.106" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 151.604477][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 151.615099][ T31] audit: type=1400 audit(151.530:250): avc: denied { create } for pid=4191 comm="syz.0.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 152.016794][ T31] audit: type=1326 audit(151.940:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 152.018419][ T31] audit: type=1326 audit(151.940:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 152.029035][ T31] audit: type=1326 audit(151.950:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 152.030702][ T31] audit: type=1326 audit(151.950:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 152.031575][ T31] audit: type=1326 audit(151.950:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 152.035854][ T31] audit: type=1326 audit(151.960:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 152.041630][ T31] audit: type=1326 audit(151.960:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 152.046177][ T31] audit: type=1326 audit(151.970:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 152.047217][ T31] audit: type=1326 audit(151.970:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 154.579238][ T4211] netlink: 'syz.0.124': attribute type 1 has an invalid length. [ 155.697916][ T4227] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4227 comm=syz.0.130 [ 160.955681][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 160.955982][ T31] audit: type=1400 audit(160.880:272): avc: denied { ioctl } for pid=4256 comm="syz.1.138" path="socket:[3689]" dev="sockfs" ino=3689 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 162.793667][ T31] audit: type=1400 audit(162.690:273): avc: denied { create } for pid=4287 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 164.400484][ T4303] netlink: 196 bytes leftover after parsing attributes in process `syz.1.144'. [ 166.517205][ T4319] netlink: 8 bytes leftover after parsing attributes in process `syz.1.150'. [ 166.518077][ T4319] netlink: 4 bytes leftover after parsing attributes in process `syz.1.150'. [ 168.111155][ T31] audit: type=1400 audit(168.030:274): avc: denied { mount } for pid=4330 comm="syz.1.155" name="/" dev="ramfs" ino=3737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 168.601209][ T31] audit: type=1400 audit(168.520:275): avc: denied { load_policy } for pid=4333 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 168.708901][ T4334] SELinux: failed to load policy [ 169.468294][ T31] audit: type=1400 audit(169.390:276): avc: denied { audit_write } for pid=4341 comm="syz.1.159" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 169.473687][ T31] audit: type=1107 audit(169.390:277): pid=4341 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='%Ô' [ 169.745087][ T4345] binfmt_misc: register: failed to install interpreter file ./file0 [ 171.536954][ T31] audit: type=1400 audit(171.460:278): avc: denied { compute_member } for pid=4360 comm="syz.1.165" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 173.151037][ T4373] netlink: 16 bytes leftover after parsing attributes in process `syz.1.168'. [ 192.262059][ T31] audit: type=1400 audit(192.180:279): avc: denied { lock } for pid=4428 comm="syz.0.187" path="net:[4026532645]" dev="nsfs" ino=4026532645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 192.757538][ T4385] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x4 [ 192.769299][ T4385] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x2 [ 192.779494][ T4385] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 192.784117][ T4385] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 192.790836][ T4385] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 192.794800][ T4385] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 192.803457][ T4385] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 192.823194][ T4385] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 192.826050][ T4385] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 192.836185][ T4385] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 192.864182][ T4385] hid-generic 0000:3000000:0000.0001: hidraw0: HID v0.00 Device [sy] on syz0 [ 194.549284][ T31] audit: type=1400 audit(194.470:280): avc: denied { name_bind } for pid=4441 comm="syz.0.190" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 195.122278][ T31] audit: type=1326 audit(195.040:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4441 comm="syz.0.190" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 195.122453][ T31] audit: type=1326 audit(195.040:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4441 comm="syz.0.190" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 195.147078][ T31] audit: type=1326 audit(195.070:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4441 comm="syz.0.190" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 195.149261][ T31] audit: type=1326 audit(195.070:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4441 comm="syz.0.190" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 195.150715][ T31] audit: type=1326 audit(195.070:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4441 comm="syz.0.190" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 195.156080][ T31] audit: type=1326 audit(195.080:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4441 comm="syz.0.190" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 195.156383][ T31] audit: type=1326 audit(195.080:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4441 comm="syz.0.190" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 195.156667][ T31] audit: type=1326 audit(195.080:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4441 comm="syz.0.190" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 197.173860][ T4449] syz.0.191 uses obsolete (PF_INET,SOCK_PACKET) [ 197.444098][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 197.445234][ T31] audit: type=1400 audit(197.370:317): avc: denied { create } for pid=4448 comm="syz.0.191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 197.449610][ T31] audit: type=1400 audit(197.370:318): avc: denied { bind } for pid=4448 comm="syz.0.191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 200.099294][ T4456] netlink: 92 bytes leftover after parsing attributes in process `syz.0.193'. [ 201.117999][ T31] audit: type=1400 audit(201.040:319): avc: denied { create } for pid=4459 comm="syz.0.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 201.225023][ T31] audit: type=1400 audit(201.150:320): avc: denied { ioctl } for pid=4459 comm="syz.0.195" path="socket:[2967]" dev="sockfs" ino=2967 ioctlcmd=0x891a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 202.362127][ T31] audit: type=1400 audit(202.280:321): avc: denied { write } for pid=4463 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 202.735293][ T4466] geneve2: entered allmulticast mode [ 202.748636][ T1055] netdevsim netdevsim0 netdevsim0: set [1, 1] type 2 family 0 port 20000 - 0 [ 202.748964][ T1055] netdevsim netdevsim0 netdevsim1: set [1, 1] type 2 family 0 port 20000 - 0 [ 202.749200][ T1055] netdevsim netdevsim0 netdevsim2: set [1, 1] type 2 family 0 port 20000 - 0 [ 202.749410][ T1055] netdevsim netdevsim0 netdevsim3: set [1, 1] type 2 family 0 port 20000 - 0 [ 202.758893][ T31] audit: type=1400 audit(202.680:322): avc: denied { append } for pid=4465 comm="syz.0.198" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 204.133370][ T31] audit: type=1400 audit(204.040:323): avc: denied { create } for pid=4478 comm="syz.0.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 204.193526][ T31] audit: type=1400 audit(204.110:324): avc: denied { ioctl } for pid=4478 comm="syz.0.201" path="socket:[2988]" dev="sockfs" ino=2988 ioctlcmd=0x8954 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 207.287778][ T31] audit: type=1400 audit(207.200:325): avc: denied { mount } for pid=4484 comm="syz.0.203" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 207.298113][ T4485] ======================================================= [ 207.298113][ T4485] WARNING: The mand mount option has been deprecated and [ 207.298113][ T4485] and is ignored by this kernel. Remove the mand [ 207.298113][ T4485] option from the mount to silence this warning. [ 207.298113][ T4485] ======================================================= [ 207.313706][ T31] audit: type=1400 audit(207.220:326): avc: denied { remount } for pid=4484 comm="syz.0.203" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 207.526795][ T4485] syzkaller0: entered promiscuous mode [ 207.533738][ T4485] syzkaller0: entered allmulticast mode [ 208.147117][ T31] audit: type=1400 audit(208.070:327): avc: denied { unmount } for pid=3119 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 212.416386][ T31] audit: type=1400 audit(212.340:328): avc: denied { mounton } for pid=4503 comm="syz.0.209" path="/84/bus" dev="tmpfs" ino=446 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 213.053393][ T31] audit: type=1400 audit(212.970:329): avc: denied { unmount } for pid=3119 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 215.379905][ T4506] hsr0: left allmulticast mode [ 215.382103][ T4506] hsr_slave_0: left allmulticast mode [ 215.382214][ T4506] hsr_slave_1: left allmulticast mode [ 215.732368][ T12] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 215.733047][ T12] netdevsim netdevsim0 netdevsim0: unset [1, 1] type 2 family 0 port 20000 - 0 [ 215.733206][ T12] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 215.733336][ T12] netdevsim netdevsim0 netdevsim1: unset [1, 1] type 2 family 0 port 20000 - 0 [ 215.733581][ T12] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 215.733672][ T12] netdevsim netdevsim0 netdevsim2: unset [1, 1] type 2 family 0 port 20000 - 0 [ 215.733776][ T12] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 215.733902][ T12] netdevsim netdevsim0 netdevsim3: unset [1, 1] type 2 family 0 port 20000 - 0 [ 217.227004][ T4519] netlink: 48 bytes leftover after parsing attributes in process `syz.1.215'. [ 217.371604][ T31] audit: type=1400 audit(217.290:330): avc: denied { create } for pid=4520 comm="syz.1.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 217.377860][ T31] audit: type=1400 audit(217.300:331): avc: denied { write } for pid=4520 comm="syz.1.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 217.676682][ T31] audit: type=1400 audit(217.600:332): avc: denied { lock } for pid=4523 comm="syz.1.218" path="socket:[4103]" dev="sockfs" ino=4103 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 218.116005][ T31] audit: type=1400 audit(218.040:333): avc: denied { bind } for pid=4527 comm="syz.0.220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 219.123362][ T31] audit: type=1400 audit(219.040:334): avc: denied { setopt } for pid=4539 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 219.513190][ T31] audit: type=1400 audit(219.430:335): avc: denied { bind } for pid=4539 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 220.744974][ T31] audit: type=1326 audit(220.670:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4561 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 220.765991][ T31] audit: type=1326 audit(220.690:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4561 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 220.773795][ T31] audit: type=1326 audit(220.690:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4561 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 220.794405][ T31] audit: type=1326 audit(220.720:339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4561 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 221.663139][ T4569] netlink: 'syz.0.234': attribute type 1 has an invalid length. [ 221.673485][ T4569] netlink: 'syz.0.234': attribute type 2 has an invalid length. [ 221.680894][ T4569] netlink: 4 bytes leftover after parsing attributes in process `syz.0.234'. [ 222.385344][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 222.386662][ T31] audit: type=1326 audit(222.310:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4563 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 222.388746][ T31] audit: type=1326 audit(222.310:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4572 comm="syz.0.236" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 222.391617][ T31] audit: type=1326 audit(222.310:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4572 comm="syz.0.236" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 222.395028][ T31] audit: type=1326 audit(222.310:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4572 comm="syz.0.236" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 222.396913][ T31] audit: type=1326 audit(222.310:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4572 comm="syz.0.236" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 222.436394][ T31] audit: type=1326 audit(222.360:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4561 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xef4f8 code=0x7ffc0000 [ 222.438735][ T31] audit: type=1326 audit(222.360:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4561 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 222.440984][ T31] audit: type=1326 audit(222.360:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4561 comm="syz.1.232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 223.207152][ T4577] syz_tun: entered allmulticast mode [ 223.213953][ T4577] syz_tun: left allmulticast mode [ 225.468079][ T31] audit: type=1326 audit(225.390:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4589 comm="syz.1.244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 225.473410][ T31] audit: type=1326 audit(225.390:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4589 comm="syz.1.244" exe="/syz-executor" sig=0 arch=40000028 syscall=372 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 227.145874][ T4605] netlink: 16 bytes leftover after parsing attributes in process `syz.1.250'. [ 228.179281][ T4613] netlink: 'syz.1.254': attribute type 1 has an invalid length. [ 231.006224][ T4627] netdevsim netdevsim1: Direct firmware load for ./file0/file1 failed with error -2 [ 231.008220][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 231.009092][ T31] audit: type=1400 audit(230.930:386): avc: denied { firmware_load } for pid=4626 comm="syz.1.260" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 231.011929][ T4627] netdevsim netdevsim1: Falling back to sysfs fallback for: ./file0/file1 [ 233.613112][ T31] audit: type=1400 audit(233.520:387): avc: denied { create } for pid=4630 comm="syz.1.261" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 233.686359][ T31] audit: type=1400 audit(233.610:388): avc: denied { write } for pid=4630 comm="syz.1.261" name="file0" dev="tmpfs" ino=818 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 233.689439][ T31] audit: type=1400 audit(233.610:389): avc: denied { open } for pid=4630 comm="syz.1.261" path="/158/file0" dev="tmpfs" ino=818 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 233.749064][ T31] audit: type=1400 audit(233.670:390): avc: denied { unlink } for pid=3120 comm="syz-executor" name="file0" dev="tmpfs" ino=818 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 233.888366][ T4634] netlink: 16 bytes leftover after parsing attributes in process `syz.1.262'. [ 234.393937][ T4638] netlink: 12 bytes leftover after parsing attributes in process `syz.1.264'. [ 239.165671][ T31] audit: type=1326 audit(239.090:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4716 comm="syz.1.270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 239.172136][ T31] audit: type=1326 audit(239.090:392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4716 comm="syz.1.270" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 239.183575][ T31] audit: type=1326 audit(239.100:393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4716 comm="syz.1.270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 239.200588][ T31] audit: type=1326 audit(239.110:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4716 comm="syz.1.270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 239.204943][ T31] audit: type=1326 audit(239.130:395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4716 comm="syz.1.270" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 239.207110][ T31] audit: type=1326 audit(239.130:396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4716 comm="syz.1.270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 239.215745][ T31] audit: type=1326 audit(239.140:397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4716 comm="syz.1.270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 239.233759][ T31] audit: type=1326 audit(239.160:398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4716 comm="syz.1.270" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 239.255345][ T31] audit: type=1326 audit(239.180:399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4716 comm="syz.1.270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 239.258833][ T31] audit: type=1326 audit(239.180:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4716 comm="syz.1.270" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.255390][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 244.256432][ T31] audit: type=1326 audit(244.170:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.282" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.261946][ T31] audit: type=1326 audit(244.180:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.282" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.278705][ T31] audit: type=1326 audit(244.200:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.282" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.281304][ T31] audit: type=1326 audit(244.200:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.282" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.296579][ T31] audit: type=1326 audit(244.220:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.282" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.306193][ T31] audit: type=1326 audit(244.230:414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.282" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.309416][ T31] audit: type=1326 audit(244.230:415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.282" exe="/syz-executor" sig=0 arch=40000028 syscall=439 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.323551][ T31] audit: type=1326 audit(244.230:416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.282" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 244.326554][ T31] audit: type=1326 audit(244.250:417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4746 comm="syz.1.282" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 246.457023][ T31] audit: type=1326 audit(246.380:418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4768 comm="syz.1.290" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 253.101739][ T4632] Process accounting resumed [ 254.500424][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 254.500786][ T31] audit: type=1326 audit(254.420:427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4800 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 254.502489][ T31] audit: type=1326 audit(254.420:428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4800 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 254.509636][ T31] audit: type=1326 audit(254.430:429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4800 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 254.510431][ T31] audit: type=1326 audit(254.430:430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4800 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 254.510531][ T31] audit: type=1326 audit(254.430:431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4800 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 254.596303][ T31] audit: type=1326 audit(254.480:432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4800 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 254.596628][ T31] audit: type=1326 audit(254.480:433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4800 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 254.596833][ T31] audit: type=1326 audit(254.490:434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4800 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 254.597003][ T31] audit: type=1326 audit(254.490:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4800 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 254.597065][ T31] audit: type=1326 audit(254.490:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4800 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=315 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 255.340565][ T3988] hid_parser_main: 6 callbacks suppressed [ 255.340859][ T3988] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 255.341194][ T3988] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 255.341310][ T3988] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 255.341400][ T3988] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 255.341547][ T3988] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 255.341641][ T3988] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 255.341729][ T3988] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 255.341879][ T3988] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 255.341979][ T3988] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 255.342144][ T3988] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 255.358278][ T3988] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [sy] on syz0 [ 258.935212][ T4835] netlink: 12 bytes leftover after parsing attributes in process `syz.0.316'. [ 259.554760][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 259.555063][ T31] audit: type=1400 audit(259.470:461): avc: denied { getopt } for pid=4837 comm="syz.0.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 260.601473][ T31] audit: type=1400 audit(260.520:462): avc: granted { setsecparam } for pid=4850 comm="syz.0.320" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 262.157319][ T4859] tmpfs: Unsupported parameter 'mpol' [ 268.767408][ T4907] futex_wake_op: syz.0.333 tries to shift op by -1; fix this program [ 269.540444][ T31] audit: type=1326 audit(269.460:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.0.337" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 269.555425][ T31] audit: type=1326 audit(269.470:464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.0.337" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 269.560153][ T31] audit: type=1326 audit(269.480:465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.0.337" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 269.583857][ T31] audit: type=1326 audit(269.480:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.0.337" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 269.584336][ T31] audit: type=1326 audit(269.500:467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.0.337" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 269.584542][ T31] audit: type=1326 audit(269.500:468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.0.337" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 269.584714][ T31] audit: type=1326 audit(269.500:469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.0.337" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 269.584776][ T31] audit: type=1326 audit(269.500:470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.0.337" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 269.584820][ T31] audit: type=1326 audit(269.500:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.0.337" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 269.602108][ T31] audit: type=1326 audit(269.520:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4916 comm="syz.0.337" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 270.986395][ T4930] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 274.432009][ T4942] mmap: syz.0.346 (4942) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 274.680494][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 274.680740][ T31] audit: type=1326 audit(274.600:490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 274.686146][ T31] audit: type=1326 audit(274.610:491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 274.693453][ T31] audit: type=1326 audit(274.610:492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x13497c code=0x7ffc0000 [ 274.726841][ T31] audit: type=1326 audit(274.650:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 274.735492][ T31] audit: type=1326 audit(274.660:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=278 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 274.735889][ T31] audit: type=1326 audit(274.660:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 274.741086][ T31] audit: type=1326 audit(274.660:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4944 comm="syz.0.347" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 275.320771][ T31] audit: type=1400 audit(275.240:497): avc: denied { getopt } for pid=4948 comm="syz.0.349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 275.604046][ T31] audit: type=1326 audit(275.510:498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4952 comm="syz.0.351" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 275.604465][ T31] audit: type=1326 audit(275.520:499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4952 comm="syz.0.351" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 276.606442][ T4971] netlink: 16 bytes leftover after parsing attributes in process `syz.1.358'. [ 284.196660][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 284.196992][ T31] audit: type=1400 audit(284.120:518): avc: denied { override_creds } for pid=5006 comm="syz.0.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 284.700670][ T5013] netlink: 12 bytes leftover after parsing attributes in process `syz.0.371'. [ 284.879111][ T5016] netlink: 'syz.0.372': attribute type 3 has an invalid length. [ 300.233577][ T31] audit: type=1326 audit(300.150:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5059 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 300.234915][ T31] audit: type=1326 audit(300.150:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5059 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 300.235045][ T31] audit: type=1326 audit(300.150:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5059 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 300.235110][ T31] audit: type=1326 audit(300.150:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5059 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 300.235176][ T31] audit: type=1326 audit(300.160:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5059 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 300.249919][ T31] audit: type=1326 audit(300.170:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5059 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 300.252545][ T31] audit: type=1326 audit(300.170:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5059 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 300.269414][ T31] audit: type=1326 audit(300.190:526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5059 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=349 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 300.269961][ T31] audit: type=1326 audit(300.190:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5059 comm="syz.0.385" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 303.946395][ T5072] netlink: 56 bytes leftover after parsing attributes in process `syz.0.390'. [ 304.434441][ T5078] netlink: 24 bytes leftover after parsing attributes in process `syz.0.393'. [ 321.406907][ T31] audit: type=1326 audit(321.320:528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5130 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 321.433146][ T31] audit: type=1326 audit(321.350:529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5130 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 321.435642][ T31] audit: type=1326 audit(321.360:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5130 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 321.436121][ T31] audit: type=1326 audit(321.360:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5130 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 321.436194][ T31] audit: type=1326 audit(321.360:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5130 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 321.438201][ T31] audit: type=1326 audit(321.360:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5130 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 321.439037][ T31] audit: type=1326 audit(321.360:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5130 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 321.439866][ T31] audit: type=1326 audit(321.360:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5130 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 321.445832][ T31] audit: type=1326 audit(321.370:536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5130 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 321.456024][ T31] audit: type=1326 audit(321.380:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5130 comm="syz.0.410" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 326.262609][ T5163] netlink: 100 bytes leftover after parsing attributes in process `syz.1.425'. [ 327.405177][ T5170] netlink: 180 bytes leftover after parsing attributes in process `syz.1.428'. [ 327.429149][ T5169] netlink: 180 bytes leftover after parsing attributes in process `syz.1.428'. [ 327.887681][ T31] kauditd_printk_skb: 53 callbacks suppressed [ 327.888663][ T31] audit: type=1400 audit(327.810:591): avc: denied { watch watch_reads } for pid=5171 comm="syz.1.429" path="/220" dev="tmpfs" ino=1128 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 328.284185][ T31] audit: type=1326 audit(328.210:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5174 comm="syz.1.430" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 328.295557][ T31] audit: type=1326 audit(328.220:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5174 comm="syz.1.430" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 328.297692][ T31] audit: type=1326 audit(328.220:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5174 comm="syz.1.430" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 328.300388][ T31] audit: type=1326 audit(328.220:595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5174 comm="syz.1.430" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 328.318376][ T31] audit: type=1326 audit(328.240:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5174 comm="syz.1.430" exe="/syz-executor" sig=0 arch=40000028 syscall=141 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 328.320381][ T31] audit: type=1326 audit(328.240:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5174 comm="syz.1.430" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 328.322091][ T31] audit: type=1326 audit(328.240:598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5174 comm="syz.1.430" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 332.757819][ T31] audit: type=1326 audit(332.680:599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5187 comm="syz.1.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 332.760884][ T31] audit: type=1326 audit(332.680:600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5187 comm="syz.1.435" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 332.915461][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 332.916177][ T31] audit: type=1326 audit(332.820:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5187 comm="syz.1.435" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 332.917461][ T31] audit: type=1326 audit(332.840:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5187 comm="syz.1.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 332.918518][ T31] audit: type=1326 audit(332.840:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5187 comm="syz.1.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 332.919567][ T31] audit: type=1326 audit(332.840:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5187 comm="syz.1.435" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 332.940327][ T31] audit: type=1326 audit(332.860:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5187 comm="syz.1.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 333.023955][ T31] audit: type=1326 audit(332.890:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5187 comm="syz.1.435" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 334.638519][ T31] audit: type=1400 audit(334.560:621): avc: denied { write } for pid=5210 comm="syz.1.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 334.932306][ T31] audit: type=1326 audit(334.850:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5214 comm="syz.1.444" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 334.935971][ T31] audit: type=1326 audit(334.850:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5214 comm="syz.1.444" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 334.957770][ T31] audit: type=1326 audit(334.860:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5214 comm="syz.1.444" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 338.953638][ T5248] capability: warning: `syz.0.457' uses deprecated v2 capabilities in a way that may be insecure [ 338.963604][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 338.971502][ T31] audit: type=1400 audit(338.890:653): avc: denied { setopt } for pid=5246 comm="syz.0.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 339.653199][ T31] audit: type=1326 audit(339.540:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5255 comm="syz.0.459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 339.653512][ T31] audit: type=1326 audit(339.560:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5255 comm="syz.0.459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 339.689590][ T31] audit: type=1326 audit(339.610:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5255 comm="syz.0.459" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 339.702059][ T31] audit: type=1326 audit(339.620:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5255 comm="syz.0.459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 339.704985][ T31] audit: type=1326 audit(339.620:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5255 comm="syz.0.459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 339.727658][ T31] audit: type=1326 audit(339.650:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5255 comm="syz.0.459" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 339.729935][ T31] audit: type=1326 audit(339.650:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5255 comm="syz.0.459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 339.734917][ T31] audit: type=1326 audit(339.660:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5255 comm="syz.0.459" exe="/syz-executor" sig=0 arch=40000028 syscall=243 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 339.793453][ T31] audit: type=1326 audit(339.710:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5255 comm="syz.0.459" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 341.971142][ T5278] netlink: 4 bytes leftover after parsing attributes in process `syz.0.468'. [ 346.093099][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 346.093344][ T31] audit: type=1800 audit(346.010:686): pid=5304 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed comm="syz.1.478" name="/" dev="fuse" ino=5 res=0 errno=0 [ 346.237552][ T31] audit: type=1400 audit(346.160:687): avc: denied { unmount } for pid=3120 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 351.651674][ T31] audit: type=1400 audit(351.570:688): avc: denied { setopt } for pid=5345 comm="syz.0.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 356.697794][ T31] audit: type=1400 audit(356.620:689): avc: denied { relabelfrom } for pid=5379 comm="syz.1.510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 356.699452][ T31] audit: type=1400 audit(356.620:690): avc: denied { relabelto } for pid=5379 comm="syz.1.510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 356.820183][ T12] syzkaller0: tun_net_xmit 76 [ 356.820578][ T12] syzkaller0: tun_net_xmit 48 [ 356.849150][ T4117] syzkaller0: tun_net_xmit 76 [ 356.875123][ T5381] syzkaller0: create flow: hash 4238987227 index 1 [ 356.876377][ T4117] syzkaller0: tun_net_xmit 76 [ 356.940535][ T5379] syzkaller0: delete flow: hash 4238987227 index 1 [ 357.561002][ T5398] netlink: 'syz.1.515': attribute type 2 has an invalid length. [ 357.561354][ T5398] netlink: 16 bytes leftover after parsing attributes in process `syz.1.515'. [ 358.227930][ T5400] netlink: 14 bytes leftover after parsing attributes in process `syz.1.516'. [ 363.206618][ T31] audit: type=1400 audit(363.120:691): avc: denied { name_bind } for pid=5445 comm="syz.1.530" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 363.463358][ T5448] netlink: 'syz.1.531': attribute type 4 has an invalid length. [ 363.464630][ T5448] netlink: 14345 bytes leftover after parsing attributes in process `syz.1.531'. [ 363.866412][ T5456] netlink: 8 bytes leftover after parsing attributes in process `syz.0.534'. [ 363.877177][ T5458] netlink: 12 bytes leftover after parsing attributes in process `syz.1.536'. [ 363.877866][ T5458] netlink: 12 bytes leftover after parsing attributes in process `syz.1.536'. [ 364.013648][ T5464] netlink: 44 bytes leftover after parsing attributes in process `syz.0.537'. [ 364.515013][ T5472] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 364.605222][ T5472] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 364.772198][ T5472] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 364.885617][ T5472] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 364.984743][ T5486] serio: Serial port ptm0 [ 365.049988][ T12] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 365.071446][ T12] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 365.100832][ T12] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 365.115119][ T1055] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 365.137947][ T31] audit: type=1400 audit(365.060:692): avc: denied { getopt } for pid=5491 comm="syz.0.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 366.048020][ T4142] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 366.431513][ T4142] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 16 [ 366.442624][ T4142] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 366.498257][ T4142] usb 1-1: New USB device found, idVendor=0a46, idProduct=9621, bcdDevice=4f.32 [ 366.501101][ T4142] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 366.503599][ T4142] usb 1-1: Product: syz [ 366.503992][ T4142] usb 1-1: Manufacturer: syz [ 366.504375][ T4142] usb 1-1: SerialNumber: syz [ 366.513511][ T4142] usb 1-1: config 0 descriptor?? [ 366.531807][ T5511] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 366.537399][ T5511] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 366.783624][ T5511] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 366.784557][ T5511] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 367.873751][ T4142] dm9601 1-1:0.0 (unnamed net_device) (uninitialized): MDIO read error: -71 [ 367.879358][ T4142] dm9601 1-1:0.0 eth1: register 'dm9601' at usb-dummy_hcd.0-1, Davicom DM96xx USB 10/100 Ethernet, 6e:f1:98:9e:dd:08 [ 367.897001][ T4142] usb 1-1: USB disconnect, device number 2 [ 367.899542][ T4142] dm9601 1-1:0.0 eth1: unregister 'dm9601' usb-dummy_hcd.0-1, Davicom DM96xx USB 10/100 Ethernet [ 368.005605][ T4142] ------------[ cut here ]------------ [ 368.006048][ T4142] WARNING: CPU: 1 PID: 4142 at lib/debugobjects.c:612 debug_print_object+0xc4/0xd8 [ 368.008458][ T4142] ODEBUG: free active (active state 0) object: 84892804 object type: work_struct hint: usbnet_deferred_kevent+0x0/0x38c [ 368.009446][ T4142] Modules linked in: [ 368.010157][ T4142] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 368.011200][ T4142] CPU: 1 UID: 0 PID: 4142 Comm: kworker/1:31 Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 368.012772][ T4142] Hardware name: ARM-Versatile Express [ 368.013360][ T4142] Workqueue: usb_hub_wq hub_event [ 368.013951][ T4142] Call trace: [ 368.014336][ T4142] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 368.014959][ T4142] r7:00000000 r6:8281f77c r5:00000000 r4:82260338 [ 368.015371][ T4142] [<80201b08>] (show_stack) from [<8021fb74>] (dump_stack_lvl+0x54/0x7c) [ 368.016126][ T4142] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 368.016555][ T4142] r5:00000000 r4:82a77d18 [ 368.016950][ T4142] [<8021fb9c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 368.017462][ T4142] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 368.017856][ T4142] r7:808dc204 [ 368.018016][ T4142] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 368.018281][ T4142] r3:8280c684 r2:00000001 r1:82246d48 r0:8224e7c4 [ 368.018464][ T4142] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 368.019122][ T4142] [<80254a44>] (__warn) from [<80254db4>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 368.019506][ T4142] r8:00000009 r7:822b979c r6:dfb95a84 r5:838aa400 r4:00000000 [ 368.019918][ T4142] [<80254bd0>] (warn_slowpath_fmt) from [<808dc204>] (debug_print_object+0xc4/0xd8) [ 368.020369][ T4142] r10:00000005 r9:84892000 r8:81c01ea8 r7:822e4d70 r6:82ae3d24 r5:dfb95b2c [ 368.020707][ T4142] r4:8280ccc0 [ 368.020863][ T4142] [<808dc140>] (debug_print_object) from [<808ddc68>] (debug_check_no_obj_freed+0x25c/0x2a4) [ 368.021453][ T4142] r8:84893000 r7:84892804 r6:00000100 r5:00000003 r4:00000000 [ 368.021743][ T4142] [<808dda0c>] (debug_check_no_obj_freed) from [<804ff460>] (kfree+0x190/0x394) [ 368.022166][ T4142] r10:00000100 r9:8297e260 r8:84892000 r7:805002ec r6:83002480 r5:dde9c440 [ 368.022493][ T4142] r4:84892000 [ 368.022789][ T4142] [<804ff2d0>] (kfree) from [<805002ec>] (kvfree+0x2c/0x30) [ 368.023226][ T4142] r10:00000100 r9:8297e260 r8:84892000 r7:00000000 r6:85aded00 r5:847a8500 [ 368.023625][ T4142] r4:84892000 [ 368.023886][ T4142] [<805002c0>] (kvfree) from [<815c1c80>] (netdev_release+0x2c/0x34) [ 368.024271][ T4142] r5:847a8500 r4:84892000 [ 368.024537][ T4142] [<815c1c54>] (netdev_release) from [<80b3cd34>] (device_release+0x38/0xa8) [ 368.025022][ T4142] r5:847a8500 r4:848923a0 [ 368.025210][ T4142] [<80b3ccfc>] (device_release) from [<81a12670>] (kobject_put+0xa0/0x1f4) [ 368.025647][ T4142] r5:81d4ecec r4:848923a0 [ 368.025888][ T4142] [<81a125d0>] (kobject_put) from [<80b3cf80>] (put_device+0x18/0x1c) [ 368.026241][ T4142] r7:000000c0 r6:00000000 r5:00000000 r4:84892000 [ 368.026483][ T4142] [<80b3cf68>] (put_device) from [<81572480>] (free_netdev+0x190/0x248) [ 368.026826][ T4142] [<815722f0>] (free_netdev) from [<80e31c44>] (usbnet_disconnect+0xb8/0xfc) [ 368.027170][ T4142] r7:85b50800 r6:848927d4 r5:848926c0 r4:00000000 [ 368.027551][ T4142] [<80e31b8c>] (usbnet_disconnect) from [<80e9c424>] (usb_unbind_interface+0x84/0x2bc) [ 368.028130][ T4142] r8:85b51088 r7:85b50874 r6:85b50830 r5:00000000 r4:85b51000 [ 368.028502][ T4142] [<80e9c3a0>] (usb_unbind_interface) from [<80b450f8>] (device_remove+0x64/0x6c) [ 368.028991][ T4142] r10:00000100 r9:85b51088 r8:00000044 r7:85b50874 r6:8297e260 r5:00000000 [ 368.029281][ T4142] r4:85b50830 [ 368.029424][ T4142] [<80b45094>] (device_remove) from [<80b465e8>] (device_release_driver_internal+0x18c/0x200) [ 368.029842][ T4142] r5:00000000 r4:85b50830 [ 368.030070][ T4142] [<80b4645c>] (device_release_driver_internal) from [<80b46674>] (device_release_driver+0x18/0x1c) [ 368.030459][ T4142] r9:85b51088 r8:832b3840 r7:832b3838 r6:832b380c r5:85b50830 r4:832b3830 [ 368.030706][ T4142] [<80b4665c>] (device_release_driver) from [<80b4473c>] (bus_remove_device+0xcc/0x120) [ 368.031046][ T4142] [<80b44670>] (bus_remove_device) from [<80b3e9d4>] (device_del+0x148/0x38c) [ 368.031349][ T4142] r9:85b51088 r8:838aa400 r7:04208060 r6:00000000 r5:85b50830 r4:85b50874 [ 368.031592][ T4142] [<80b3e88c>] (device_del) from [<80e99e60>] (usb_disable_device+0xd4/0x1e8) [ 368.031953][ T4142] r10:00000100 r9:00000000 r8:00000000 r7:85b50800 r6:85b51000 r5:85a6f908 [ 368.032204][ T4142] r4:00000002 [ 368.032341][ T4142] [<80e99d8c>] (usb_disable_device) from [<80e8ec28>] (usb_disconnect+0xec/0x2ac) [ 368.032720][ T4142] r9:85854400 r8:85b510cc r7:83caf800 r6:85b51088 r5:85b51000 r4:60000113 [ 368.032976][ T4142] [<80e8eb3c>] (usb_disconnect) from [<80e91c24>] (hub_event+0x1194/0x1950) [ 368.033302][ T4142] r10:00000100 r9:83c0a52c r8:83caf000 r7:85b51000 r6:83c03e00 r5:00000001 [ 368.033578][ T4142] r4:00000001 [ 368.033714][ T4142] [<80e90a90>] (hub_event) from [<8027a3bc>] (process_one_work+0x1b4/0x4f4) [ 368.034047][ T4142] r10:832b3a70 r9:83805405 r8:838aa400 r7:ddde2d40 r6:83805400 r5:83c0a52c [ 368.034332][ T4142] r4:85673e80 [ 368.034463][ T4142] [<8027a208>] (process_one_work) from [<8027b004>] (worker_thread+0x1fc/0x3d8) [ 368.034786][ T4142] r10:61c88647 r9:838aa400 r8:85673eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 368.035096][ T4142] r4:85673e80 [ 368.035235][ T4142] [<8027ae08>] (worker_thread) from [<80281fec>] (kthread+0x12c/0x280) [ 368.035550][ T4142] r10:00000000 r9:85673e80 r8:8027ae08 r7:dfb2de60 r6:85a4f780 r5:838aa400 [ 368.035871][ T4142] r4:00000001 [ 368.036015][ T4142] [<80281ec0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 368.042431][ T4142] Exception stack(0xdfb95fb0 to 0xdfb95ff8) [ 368.043002][ T4142] 5fa0: 00000000 00000000 00000000 00000000 [ 368.043475][ T4142] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 368.043884][ T4142] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 368.044252][ T4142] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ec0 [ 368.044571][ T4142] r4:85b41840 [ 368.046458][ T4142] Rebooting in 86400 seconds.. VM DIAGNOSIS: 14:01:44 Registers: info registers vcpu 0 CPU#0 R00=fffff000 R01=01243000 R02=90f00000 R03=01243085 R04=85b79a80 R05=01243000 R06=e9ce2fdf R07=04e00000 R08=855ac340 R09=ded3e4bc R10=85b79a80 R11=dfc15dcc R12=85b79a80 R13=dfc15da8 R14=90f00000 R15=802308a8 PSR=00000113 ---- A S svc32 s00=ffee0000 s01=0008ffff d00=0008ffffffee0000 s02=00000000 s03=00000300 d01=0000030000000000 s04=d8c50b0a s05=9c71c7c4 d02=9c71c7c4d8c50b0a s06=278fc49a s07=93027a54 d03=93027a54278fc49a s08=50e52e2a s09=a7ed5f95 d04=a7ed5f9550e52e2a s10=fab70951 s11=2b5594ee d05=2b5594eefab70951 s12=00000005 s13=00000000 d06=0000000000000005 s14=00000000 s15=c3040000 d07=c304000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=ba792a30 s33=34da5824 d16=34da5824ba792a30 s34=3e545830 s35=1cd6730b d17=1cd6730b3e545830 s36=006c215b s37=190ab040 d18=190ab040006c215b s38=ab4d78c8 s39=32e056be d19=32e056beab4d78c8 s40=efb48df3 s41=e57ee781 d20=e57ee781efb48df3 s42=b6b7c2ee s43=559efbd3 d21=559efbd3b6b7c2ee s44=90b575e9 s45=a4679edb d22=a4679edb90b575e9 s46=e9dd3eca s47=eca7fd7f d23=eca7fd7fe9dd3eca s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=003c0000 s53=00280000 d26=00280000003c0000 s54=00140000 s55=00080000 d27=0008000000140000 s56=00000008 s57=00080004 d28=0008000400000008 s58=03e60000 s59=ffae0000 d29=ffae000003e60000 s60=0008ffff s61=00000000 d30=000000000008ffff s62=00000300 s63=ffbe0000 d31=ffbe000000000300 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83cba040 R01=00000065 R02=eb63f000 R03=eb63f018 R04=82abb154 R05=83cba040 R06=80a7927c R07=82abb162 R08=82826ee0 R09=00000000 R10=00000504 R11=dfb9575c R12=00000002 R13=dfb95750 R14=82959084 R15=80a7928c PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000005 s07=00000000 d03=0000000000000005 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000