last executing test programs: 17.215938208s ago: executing program 1 (id=107): signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0x9]}, 0x8, 0x5180aa798909aa4a) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000a40)={'ip6_vti0\x00', 0x0}) getpid() r1 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000080)={{0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2b}}, {0x0, @local}, 0x8, {0x2, 0x4e23, @broadcast}, 'veth1_to_bond\x00'}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/arp\x00') preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000200)=""/233, 0xe9}], 0x1, 0xfff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 16.866883966s ago: executing program 1 (id=108): socket$inet_tcp(0x2, 0x1, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="1500000065ffff0480000008003950323030"], 0x15) dup(0xffffffffffffffff) openat$binderfs(0xffffffffffffff9c, 0x0, 0x1002, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2041, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x49de, 0xfff6, 0x3, 0xbfff, 0x0, "ec28a144f13d7607"}) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x4, 0x0, 0x19, "0062ba7d820000a75e0000000000fcff00"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0x44) 14.198795996s ago: executing program 1 (id=110): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000000)=0x5aa, 0x4) 13.725593971s ago: executing program 1 (id=112): getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="6d9310000000f4dbdf2501000000"], 0x28}, 0x1, 0x0, 0x0, 0x20048090}, 0x880) creat(0x0, 0x0) 13.200121268s ago: executing program 1 (id=114): pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f00000001c0)=0x7ff, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x2000}, 0x1c) socket$packet(0x11, 0x2, 0x300) writev(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x3, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x406f413, 0x0) 3.209764452s ago: executing program 0 (id=123): setrlimit(0x7, &(0x7f0000000400)) openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) 3.138875165s ago: executing program 0 (id=124): pipe(0x0) r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setns(r1, 0x24020000) umount2(&(0x7f0000000040)='.\x00', 0x6) 3.0471985s ago: executing program 0 (id=125): timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000000)=0xb6, 0x4) recvfrom(r1, 0x0, 0x0, 0x32, 0x0, 0x0) syz_emit_ethernet(0xbe, &(0x7f0000000240)={@local, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x4e22, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x1, "a324647ae3941d1747380b57bb23a78bd1175c15533631d10cd068c525e1cdf1", "6868aaf371b13a6a21324c50a094ab38785b31fe60b985a578ad106fd0eafef54485b61e1df4a065c451bf0f24279510", "7d8608ddf3268d2045b27ebf8ee672bc4421549386a5a5903b20b9f4", {"96775e3b6484c1851f6984768a7bb2fb", "412a7c8e5fffae9a88c46a3056c4319a"}}}}}}}, 0x0) r2 = dup2(r1, r1) recvmmsg(r2, &(0x7f000000b100)=[{{0x0, 0x0, 0x0}, 0x72c1}, {{0x0, 0x0, 0x0}, 0x3}], 0x2, 0x100, 0x0) 397.897589ms ago: executing program 1 (id=126): socket(0x10, 0x3, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x0, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000001, 0x13, r0, 0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) mount$binderfs(0x0, 0x0, 0x0, 0xc0000, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'erspan0\x00'}) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0x3, 0x4) sendmsg$key(0xffffffffffffffff, 0x0, 0x4400c030) socket$inet6_udplite(0xa, 0x2, 0x88) sched_setscheduler(0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 310.452463ms ago: executing program 0 (id=127): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000180)=@v2={0x2000000, [{0x4, 0x5f20925c}, {0x6fd3, 0x3}]}, 0x14, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], &(0x7f00000002c0)=""/203, 0xfffffffffffffe5f) 130.924463ms ago: executing program 0 (id=128): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="300000001800010000fffffffe0000000aa0000008000000ac1414aa140001"], 0x30}}, 0x0) 0s ago: executing program 0 (id=129): openat(0xffffffffffffff9c, 0x0, 0x40, 0x0) r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000000000)=""/59, 0x304000, 0x800, 0x0, 0x3}, 0x20) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, 0x3000, 0x2}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x19) socket$packet(0x11, 0x3, 0x300) read$FUSE(0xffffffffffffffff, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 48.347746][ T31] audit: type=1400 audit(48.260:56): avc: denied { read write } for pid=3095 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.374219][ T31] audit: type=1400 audit(48.280:57): avc: denied { open } for pid=3095 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:26087' (ED25519) to the list of known hosts. [ 59.924478][ T31] audit: type=1400 audit(59.820:58): avc: denied { name_bind } for pid=3098 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 61.790866][ T31] audit: type=1400 audit(61.700:59): avc: denied { execute } for pid=3099 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 61.813703][ T31] audit: type=1400 audit(61.730:60): avc: denied { execute_no_trans } for pid=3099 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.535341][ T31] audit: type=1400 audit(64.450:61): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 64.542844][ T31] audit: type=1400 audit(64.450:62): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 64.560575][ T3099] cgroup: Unknown subsys name 'net' [ 64.571614][ T31] audit: type=1400 audit(64.480:63): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 64.770610][ T3099] cgroup: Unknown subsys name 'cpuset' [ 64.778740][ T3099] cgroup: Unknown subsys name 'hugetlb' [ 64.781776][ T3099] cgroup: Unknown subsys name 'rlimit' [ 65.028928][ T31] audit: type=1400 audit(64.940:64): avc: denied { setattr } for pid=3099 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 65.031018][ T31] audit: type=1400 audit(64.940:65): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 65.035961][ T31] audit: type=1400 audit(64.940:66): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 65.216763][ T3101] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 65.223493][ T31] audit: type=1400 audit(65.130:67): avc: denied { relabelto } for pid=3101 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 65.228980][ T31] audit: type=1400 audit(65.140:68): avc: denied { write } for pid=3101 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 65.262589][ T31] audit: type=1400 audit(65.170:69): avc: denied { read } for pid=3099 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 65.262886][ T31] audit: type=1400 audit(65.170:70): avc: denied { open } for pid=3099 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.571268][ T3099] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 74.461685][ T31] audit: type=1400 audit(74.370:71): avc: denied { execmem } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 74.538654][ T31] audit: type=1400 audit(74.450:72): avc: denied { read } for pid=3104 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.539089][ T31] audit: type=1400 audit(74.450:73): avc: denied { open } for pid=3104 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.549967][ T31] audit: type=1400 audit(74.460:74): avc: denied { mounton } for pid=3104 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 74.579124][ T31] audit: type=1400 audit(74.490:75): avc: denied { module_request } for pid=3105 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.579584][ T31] audit: type=1400 audit(74.490:76): avc: denied { module_request } for pid=3104 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.659284][ T31] audit: type=1400 audit(74.570:77): avc: denied { sys_module } for pid=3105 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.305524][ T31] audit: type=1400 audit(75.220:78): avc: denied { ioctl } for pid=3104 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.482778][ T3104] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.510620][ T3104] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.517314][ T3105] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.565772][ T3105] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.396289][ T3104] hsr_slave_0: entered promiscuous mode [ 77.400384][ T3104] hsr_slave_1: entered promiscuous mode [ 77.505778][ T3105] hsr_slave_0: entered promiscuous mode [ 77.508053][ T3105] hsr_slave_1: entered promiscuous mode [ 77.514560][ T3105] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 77.517367][ T3105] Cannot create hsr debugfs directory [ 77.960163][ T31] audit: type=1400 audit(77.870:79): avc: denied { create } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.967270][ T31] audit: type=1400 audit(77.880:80): avc: denied { write } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.979342][ T3104] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 77.996233][ T3104] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.011775][ T3104] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.026870][ T3104] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.032673][ T3105] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.066072][ T3105] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.080668][ T3105] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.095871][ T3105] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 78.805785][ T3104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.848839][ T3105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.564666][ T3105] veth0_vlan: entered promiscuous mode [ 81.587840][ T3105] veth1_vlan: entered promiscuous mode [ 81.640934][ T3104] veth0_vlan: entered promiscuous mode [ 81.664099][ T3104] veth1_vlan: entered promiscuous mode [ 81.690018][ T3105] veth0_macvtap: entered promiscuous mode [ 81.709458][ T3105] veth1_macvtap: entered promiscuous mode [ 81.756934][ T3104] veth0_macvtap: entered promiscuous mode [ 81.779816][ T3104] veth1_macvtap: entered promiscuous mode [ 81.824833][ T3105] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.825515][ T3105] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.829164][ T3105] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.829539][ T3105] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.879523][ T3104] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.881169][ T3104] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.883949][ T3104] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.885023][ T3104] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.009503][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 82.010016][ T31] audit: type=1400 audit(81.920:82): avc: denied { mount } for pid=3105 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 82.026257][ T31] audit: type=1400 audit(81.940:83): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/syzkaller.WBWdBq/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 82.032855][ T31] audit: type=1400 audit(81.940:84): avc: denied { mount } for pid=3105 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 82.049212][ T31] audit: type=1400 audit(81.960:85): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/syzkaller.WBWdBq/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 82.053297][ T31] audit: type=1400 audit(81.960:86): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/syzkaller.WBWdBq/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2340 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 82.110010][ T31] audit: type=1400 audit(82.020:87): avc: denied { unmount } for pid=3105 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 82.127265][ T31] audit: type=1400 audit(82.040:88): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=770 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 82.129225][ T31] audit: type=1400 audit(82.040:89): avc: denied { mount } for pid=3105 comm="syz-executor" name="/" dev="gadgetfs" ino=2346 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 82.145284][ T31] audit: type=1400 audit(82.060:90): avc: denied { mount } for pid=3105 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 82.147736][ T31] audit: type=1400 audit(82.060:91): avc: denied { mounton } for pid=3105 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 82.281199][ T3105] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 82.281198][ T3104] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 84.195078][ T3819] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 84.913206][ T3827] sit0: entered allmulticast mode [ 84.980963][ T3827] sit0: entered promiscuous mode [ 87.035191][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 87.035463][ T31] audit: type=1400 audit(86.950:129): avc: denied { unmount } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 87.243149][ T3862] netlink: 8 bytes leftover after parsing attributes in process `syz.0.24'. [ 87.300223][ T31] audit: type=1400 audit(87.210:130): avc: denied { kexec_image_load } for pid=3860 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 87.994592][ T3865] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 88.038612][ T31] audit: type=1400 audit(87.950:131): avc: denied { create } for pid=3874 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 88.045156][ T31] audit: type=1400 audit(87.960:132): avc: denied { bind } for pid=3874 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 88.058920][ T31] audit: type=1400 audit(87.970:133): avc: denied { listen } for pid=3874 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 88.076595][ T31] audit: type=1400 audit(87.990:134): avc: denied { connect } for pid=3874 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 88.101284][ T31] audit: type=1400 audit(88.010:135): avc: denied { write } for pid=3874 comm="syz.1.27" path="socket:[2453]" dev="sockfs" ino=2453 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 88.128660][ T31] audit: type=1400 audit(88.040:136): avc: denied { accept } for pid=3874 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 88.135132][ T31] audit: type=1400 audit(88.050:137): avc: denied { read } for pid=3874 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 88.299793][ T3865] usb 1-1: unable to get BOS descriptor or descriptor too short [ 88.317594][ T3865] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 88.318814][ T3865] usb 1-1: can't read configurations, error -71 [ 88.594131][ T31] audit: type=1326 audit(88.490:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3884 comm="syz.0.29" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 88.601447][ T3886] capability: warning: `syz.0.29' uses deprecated v2 capabilities in a way that may be insecure [ 92.606575][ T3945] netlink: 'syz.0.39': attribute type 27 has an invalid length. [ 92.702931][ T3946] serio: Serial port ptm0 [ 93.462876][ T3945] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.463450][ T3945] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.463793][ T3945] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.464033][ T3945] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 94.336762][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 94.339167][ T31] audit: type=1400 audit(94.250:149): avc: denied { ioctl } for pid=3957 comm="syz.0.42" path="socket:[2514]" dev="sockfs" ino=2514 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 94.566564][ T31] audit: type=1400 audit(94.480:150): avc: denied { create } for pid=3958 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 94.583039][ T31] audit: type=1400 audit(94.490:151): avc: denied { write } for pid=3958 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 99.067545][ T31] audit: type=1400 audit(98.980:152): avc: denied { create } for pid=3985 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 100.485366][ T31] audit: type=1400 audit(100.400:153): avc: denied { name_bind } for pid=3995 comm="syz.1.50" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 104.087193][ T31] audit: type=1400 audit(104.000:154): avc: denied { bind } for pid=4001 comm="syz.1.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 104.095009][ T4002] vxcan1: tx address claim with dest, not broadcast [ 109.998292][ T31] audit: type=1400 audit(109.910:155): avc: denied { create } for pid=4005 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 116.605821][ T31] audit: type=1400 audit(116.520:156): avc: denied { connect } for pid=4010 comm="syz.0.55" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 116.617770][ T31] audit: type=1400 audit(116.530:157): avc: denied { write } for pid=4010 comm="syz.0.55" path="socket:[3109]" dev="sockfs" ino=3109 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 117.347306][ T31] audit: type=1326 audit(117.260:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4016 comm="syz.0.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 117.352947][ T31] audit: type=1326 audit(117.260:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4016 comm="syz.0.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 117.364010][ T31] audit: type=1326 audit(117.280:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4016 comm="syz.0.58" exe="/syz-executor" sig=0 arch=40000028 syscall=306 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 117.365818][ T31] audit: type=1326 audit(117.280:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4016 comm="syz.0.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 117.374963][ T31] audit: type=1326 audit(117.280:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4016 comm="syz.0.58" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 117.520887][ T4019] SELinux: syz.0.59 (4019) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 118.372792][ T31] audit: type=1400 audit(118.280:163): avc: denied { create } for pid=4033 comm="syz.0.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 118.648631][ T31] audit: type=1400 audit(118.560:164): avc: denied { create } for pid=4035 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 118.665550][ T31] audit: type=1400 audit(118.580:165): avc: denied { write } for pid=4035 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 136.335251][ T31] audit: type=1326 audit(136.240:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4046 comm="syz.1.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 136.343021][ T31] audit: type=1326 audit(136.250:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4046 comm="syz.1.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 136.375049][ T31] audit: type=1326 audit(136.290:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4046 comm="syz.1.68" exe="/syz-executor" sig=0 arch=40000028 syscall=303 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 136.383334][ T31] audit: type=1326 audit(136.290:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4046 comm="syz.1.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 136.387369][ T31] audit: type=1326 audit(136.300:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4046 comm="syz.1.68" exe="/syz-executor" sig=0 arch=40000028 syscall=301 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 136.397195][ T31] audit: type=1326 audit(136.300:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4046 comm="syz.1.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 141.335567][ T4059] netlink: 'syz.0.74': attribute type 10 has an invalid length. [ 142.640229][ T31] audit: type=1400 audit(142.550:172): avc: denied { write } for pid=4073 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 146.717709][ T31] audit: type=1400 audit(146.630:173): avc: denied { load_policy } for pid=4096 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 146.755084][ T4097] SELinux: failed to load policy [ 147.088784][ T31] audit: type=1326 audit(147.000:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.1.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 147.098983][ T31] audit: type=1326 audit(147.000:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.1.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 147.147975][ T31] audit: type=1326 audit(147.060:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.1.83" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 147.166753][ T31] audit: type=1326 audit(147.080:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.1.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 147.168710][ T31] audit: type=1326 audit(147.080:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.1.83" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 147.171105][ T31] audit: type=1326 audit(147.080:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.1.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 147.172778][ T31] audit: type=1326 audit(147.080:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.1.83" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 147.174861][ T31] audit: type=1326 audit(147.090:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.1.83" exe="/syz-executor" sig=0 arch=40000028 syscall=70 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 147.193560][ T4103] netlink: 100 bytes leftover after parsing attributes in process `syz.0.84'. [ 147.652954][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 147.653666][ T31] audit: type=1400 audit(147.550:184): avc: denied { append } for pid=4106 comm="syz.1.85" name="001" dev="devtmpfs" ino=687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 151.563247][ T3908] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 151.762668][ T3908] usb 1-1: New USB device found, idVendor=093a, idProduct=2476, bcdDevice= d.5b [ 151.763198][ T3908] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 151.763550][ T3908] usb 1-1: Product: syz [ 151.763756][ T3908] usb 1-1: Manufacturer: syz [ 151.763977][ T3908] usb 1-1: SerialNumber: syz [ 152.306170][ T3908] usb 1-1: USB disconnect, device number 4 [ 152.472950][ T31] audit: type=1400 audit(152.370:185): avc: denied { read write } for pid=4147 comm="syz.0.98" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 152.473445][ T31] audit: type=1400 audit(152.370:186): avc: denied { open } for pid=4147 comm="syz.0.98" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 153.147500][ T31] audit: type=1400 audit(153.060:187): avc: denied { unmount } for pid=3104 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 154.650923][ T31] audit: type=1400 audit(154.560:188): avc: denied { name_bind } for pid=4160 comm="syz.1.101" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 155.843288][ T4166] TCP: TCP_TX_DELAY enabled [ 156.855366][ T31] audit: type=1400 audit(156.770:189): avc: denied { mount } for pid=4171 comm="syz.1.106" name="/" dev="configfs" ino=1101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 156.882560][ T31] audit: type=1400 audit(156.790:190): avc: denied { search } for pid=4171 comm="syz.1.106" name="/" dev="configfs" ino=1101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 156.889433][ T31] audit: type=1400 audit(156.800:191): avc: denied { search } for pid=4171 comm="syz.1.106" name="/" dev="configfs" ino=1101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 156.897523][ T31] audit: type=1400 audit(156.800:192): avc: denied { read open } for pid=4171 comm="syz.1.106" path="/" dev="configfs" ino=1101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 157.172899][ T31] audit: type=1400 audit(157.070:193): avc: denied { ioctl } for pid=4173 comm="syz.1.107" path="socket:[3359]" dev="sockfs" ino=3359 ioctlcmd=0x8955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 160.316712][ T31] audit: type=1400 audit(160.230:194): avc: denied { create } for pid=4182 comm="syz.1.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 160.326521][ T31] audit: type=1400 audit(160.240:195): avc: denied { setopt } for pid=4182 comm="syz.1.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 165.564655][ T31] audit: type=1400 audit(165.480:196): avc: denied { write } for pid=4199 comm="syz.0.117" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 166.084494][ T3964] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 166.263404][ T3964] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 166.266398][ T3964] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 166.270668][ T3964] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 166.275930][ T3964] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 166.278263][ T3964] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 166.280368][ T3964] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 166.287171][ T3964] usb 1-1: config 0 descriptor?? [ 166.746655][ T3964] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 168.715298][ T3953] usb 1-1: USB disconnect, device number 5 [ 170.765505][ T31] audit: type=1400 audit(170.680:197): avc: denied { ioctl } for pid=4232 comm="syz.0.121" path="socket:[3416]" dev="sockfs" ino=3416 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 170.772915][ T31] audit: type=1400 audit(170.680:198): avc: denied { bind } for pid=4232 comm="syz.0.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 170.778754][ T31] audit: type=1400 audit(170.690:199): avc: denied { setopt } for pid=4232 comm="syz.0.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 170.782780][ T31] audit: type=1400 audit(170.690:200): avc: denied { write } for pid=4232 comm="syz.0.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 171.066054][ T31] audit: type=1400 audit(170.980:201): avc: denied { unmount } for pid=4238 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 173.817591][ T31] audit: type=1400 audit(173.730:202): avc: denied { map } for pid=4243 comm="syz.1.126" path="/dev/usbmon0" dev="devtmpfs" ino=682 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 173.830608][ T31] audit: type=1400 audit(173.740:203): avc: denied { ioctl } for pid=4243 comm="syz.1.126" path="socket:[3443]" dev="sockfs" ino=3443 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 174.056338][ T4244] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 174.209366][ T31] audit: type=1400 audit(174.120:204): avc: denied { ioctl } for pid=4251 comm="syz.0.129" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2778 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 174.216694][ T31] audit: type=1400 audit(174.130:205): avc: denied { create } for pid=4251 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 174.220749][ T31] audit: type=1400 audit(174.130:206): avc: denied { setopt } for pid=4251 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 174.446707][ T4252] ------------[ cut here ]------------ [ 174.447218][ T4252] WARNING: CPU: 0 PID: 4252 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 174.449821][ T4252] Modules linked in: [ 174.454816][ T4252] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 174.456221][ T4252] CPU: 0 UID: 0 PID: 4252 Comm: syz.0.129 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 174.456908][ T4252] Hardware name: ARM-Versatile Express [ 174.457485][ T4252] Call trace: [ 174.457911][ T4252] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 174.458569][ T4252] r7:00000000 r6:8282083c r5:00000000 r4:8225b4e0 [ 174.458913][ T4252] [<80201ae4>] (show_stack) from [<8021fdf4>] (dump_stack_lvl+0x54/0x7c) [ 174.459284][ T4252] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 174.459677][ T4252] r5:00000000 r4:82a6dd18 [ 174.459953][ T4252] [<8021fe1c>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 174.460267][ T4252] [<802024f4>] (panic) from [<80258578>] (get_taint+0x0/0x1c) [ 174.460588][ T4252] r3:8280c684 r2:00000001 r1:82242028 r0:822499c0 [ 174.460826][ T4252] r7:804bc12c [ 174.460967][ T4252] [<80258504>] (check_panic_on_warn) from [<802586dc>] (__warn+0x80/0x188) [ 174.461258][ T4252] [<8025865c>] (__warn) from [<8025895c>] (warn_slowpath_fmt+0x178/0x1f4) [ 174.461731][ T4252] r8:00000009 r7:822752b8 r6:dfcf9d1c r5:849c9800 r4:00000000 [ 174.462358][ T4252] [<802587e8>] (warn_slowpath_fmt) from [<804bc12c>] (kunmap_local_indexed+0x20c/0x224) [ 174.463058][ T4252] r10:00000000 r9:deba6404 r8:dece0e08 r7:00a00000 r6:00000003 r5:849c9800 [ 174.463489][ T4252] r4:ffefd000 [ 174.463635][ T4252] [<804bbf20>] (kunmap_local_indexed) from [<805373a0>] (move_pages+0xb24/0x19c8) [ 174.464030][ T4252] r7:00a00000 r6:fffffff0 r5:846f3b44 r4:85569800 [ 174.464319][ T4252] [<8053687c>] (move_pages) from [<805be4b4>] (userfaultfd_ioctl+0xff8/0x21c4) [ 174.464833][ T4252] r10:85569800 r9:dfcf9e98 r8:21000000 r7:00000001 r6:00000000 r5:20000040 [ 174.465219][ T4252] r4:85a0f000 [ 174.465387][ T4252] [<805bd4bc>] (userfaultfd_ioctl) from [<805679c4>] (sys_ioctl+0x130/0xdc8) [ 174.465892][ T4252] r10:849c9800 r9:85e10600 r8:00000003 r7:20000040 r6:85e10601 r5:00000000 [ 174.466296][ T4252] r4:c028aa05 [ 174.466562][ T4252] [<80567894>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 174.467060][ T4252] Exception stack(0xdfcf9fa8 to 0xdfcf9ff0) [ 174.467559][ T4252] 9fa0: 00000000 00000000 00000003 c028aa05 20000040 00000000 [ 174.468042][ T4252] 9fc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76b8e0bc [ 174.468484][ T4252] 9fe0: 76b8dec0 76b8deb0 000193a4 00131fc0 [ 174.468849][ T4252] r10:00000036 r9:849c9800 r8:8020029c r7:00000036 r6:002f6300 r5:00000000 [ 174.469263][ T4252] r4:00000000 [ 174.473352][ T4252] Rebooting in 86400 seconds.. VM DIAGNOSIS: 06:39:39 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000005 R03=81a25380 R04=00000006 R05=828f8dc8 R06=00000000 R07=828f8dc0 R08=849c9800 R09=00000028 R10=828f8dc8 R11=df801d04 R12=df801d08 R13=df801cf8 R14=80340894 R15=81a25390 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=00000000 R02=00000004 R03=81a25380 R04=00000006 R05=828f8dc8 R06=00000000 R07=828f8dc0 R08=84246000 R09=00000028 R10=828f8dc8 R11=df805e8c R12=df805e90 R13=df805e80 R14=80340894 R15=81a25390 PSR=60010093 -ZC- A S svc32 s00=0008004b s01=004b9003 d00=004b90030008004b s02=98030108 s03=1008004b d01=1008004b98030108 s04=7e88031f s05=02800800 d02=028008007e88031f s06=027e9003 s07=ffffffff d03=ffffffff027e9003 s08=7e980303 s09=03000800 d04=030008007e980303 s10=ff027ea0 s11=03ffffff d05=03ffffffff027ea0 s12=007ea803 s13=b0030008 d06=b0030008007ea803 s14=0008007e s15=060164c2 d07=060164c20008007e s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=80027e80 s33=74800374 d16=7480037480027e80 s34=03540400 s35=08007488 d17=0800748803540400 s36=74900301 s37=fffc0800 d18=fffc080074900301 s38=031fffff s39=08007e88 d19=08007e88031fffff s40=90030280 s41=ffff027e d20=ffff027e90030280 s42=0303ffff s43=08007e98 d21=08007e980303ffff s44=7ea00300 s45=ffffff02 d22=ffffff027ea00300 s46=a80303ff s47=0008007e d23=0008007ea80303ff s48=0e5d4508 s49=7979a292 d24=7979a2920e5d4508 s50=b763ca22 s51=989afd23 d25=989afd23b763ca22 s52=59cb052a s53=702ce0fb d26=702ce0fb59cb052a s54=7b859ff2 s55=4f04b7b1 d27=4f04b7b17b859ff2 s56=c3641a96 s57=5ce8ce3c d28=5ce8ce3cc3641a96 s58=f8032b3c s59=c14f3d8e d29=c14f3d8ef8032b3c s60=413fa655 s61=907edc46 d30=907edc46413fa655 s62=de5b27f5 s63=c4080f5b d31=c4080f5bde5b27f5 FPSCR: 00000000