last executing test programs: 13.113205633s ago: executing program 1 (id=105): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000b40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x38, r1, 0x1, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_TX_RATES={0x10, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x5, 0x1, [0x4]}]}]}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000008}, 0x10) 9.918760779s ago: executing program 1 (id=107): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x29}, {0x0, 0x0, 0x7, 0xfff, 0x0, 0x2, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x29}, {0x0, 0x0, 0x9, 0x0, 0x0, 0x2, 0xffffffffffffffff}, {0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x7}}, 0xb8}}, 0x10) 9.320009773s ago: executing program 1 (id=109): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000400), r1) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)={0x3c, r2, 0x60b, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r3}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x3}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x1}]}, 0x3c}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000400), r7) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000000)={'wpan1\x00', 0x0}) r10 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r10, &(0x7f0000000040)={0x0, 0x33, &(0x7f0000000340)={&(0x7f00000000c0)={0x3c, r8, 0x60b, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r9}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x3}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5}]}, 0x3c}}, 0x0) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)={0x2c, 0x0, 0x60b, 0x0, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x4}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r9}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x7}]}, 0x2c}}, 0x0) 5.58691868s ago: executing program 1 (id=112): r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000100)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev, 0x5}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001440)=ANY=[@ANYBLOB="0017"], 0xc0) sendmmsg$inet6(r0, 0x0, 0x0, 0x4000000) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x0) 5.479862434s ago: executing program 0 (id=113): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newsa={0xf0, 0x10, 0x713, 0x70bd28, 0x0, {{@in=@empty, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x4e23, 0xfffd, 0x0, 0x0, 0x2, 0x0, 0x80, 0x3c, 0x0, 0xffffffffffffffff}, {@in=@empty, 0x0, 0x32}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {0x0, 0x0, 0x7fff, 0x100000001, 0x6, 0x800}, {0x0, 0x0, 0x2, 0xfffffffffffffffc}, {0xc, 0x0, 0x1000000}, 0x70bd28, 0x0, 0x2}}, 0xf0}, 0x1, 0x0, 0x0, 0x400c0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@newtaction={0x48, 0x30, 0x53b, 0x70bd2b, 0x0, {0x9}, [{0x34, 0x1, [@m_sample={0x30, 0x1, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc, 0x4, {0x3}}}}]}]}, 0x48}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x30, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2, 0x0, 0xfffe}, [@NFTA_RULE_EXPRESSIONS={0x1c, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x2}]}}}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x5}}}, 0x58}, 0x1, 0x0, 0x0, 0x840}, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000080)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa86dd60f4adf7001000800000000000000000000000000000374d99f400000000000000000000000000013c0040af44ae88673c"], 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)=ANY=[@ANYBLOB="3800000054000100010000000000000007000000", @ANYRES32=0x0, @ANYBLOB=' \x00\t\x00', @ANYRES32=0x0, @ANYBLOB="01000300ac1e000100000000000000000000000086dd"], 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03003f000b05d25a806c8c6394f90324fc60100002000a000300053582c137153e3704020180fc0b09000c00", 0x33fe0}], 0x1}, 0x0) 5.134851198s ago: executing program 1 (id=114): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x100004, 0x220104, 0xb, 0x1}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000380), &(0x7f0000000380), 0x2, r1}, 0x38) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/40, &(0x7f00000001c0), &(0x7f00000000c0), 0x1, r1}, 0x38) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl(r3, 0x8b2a, &(0x7f0000000040)) r4 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r4, &(0x7f0000002680)=[{{&(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000300)="3ef7ac8433", 0x5}], 0x1}}, {{&(0x7f0000000480)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000180)="913a04a26f7dc1b95734aea8871de3c5e2", 0x11}, {&(0x7f0000000380)="52f08475bb054d218f1fcb6058794a939597b56be10a26fdb8fd09682fa9eec03517787eb81735d7b48f8b309e", 0x2d}, {&(0x7f0000000400)="539e6796fd484c7208bc8855b017c708b2b3232faf8a200e992c1cc556aa55394423acb195dee5e73de6", 0x2a}, {&(0x7f00000006c0)="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", 0x47d}], 0x4}}], 0x2, 0x4004081) setsockopt$sock_int(r4, 0x1, 0x7, &(0x7f0000000000), 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1400000015000103000000000000000001"], 0x14}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x890c, &(0x7f0000000000)=@generic={0x0, 0x2}) socket$inet_icmp(0x2, 0x2, 0x1) 4.880493108s ago: executing program 0 (id=115): r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'veth0\x00', 0x3}, 0x18) 4.476439314s ago: executing program 0 (id=116): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f00000000c0)='GPL\x00'}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1200000004000000080000000b"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000300)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB='\a'], 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r3, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r1}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.throttle.io_serviced\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000000), 0xffffff6a) sendfile(r0, r4, 0x0, 0xffffffff004) 1.453394213s ago: executing program 0 (id=117): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="fc00000019000100000000000000000000000000000000000000000000000000440000000000000000000000000000bb00000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000007000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000004400050020010000000000000000000000000000000000022b0000000a000000fc0100000000000000000000000000000000000004"], 0xfc}}, 0x0) r1 = socket(0x2, 0x3, 0x6) bind$inet(r1, &(0x7f0000000080)={0x2, 0xfffa, @local}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x48892, &(0x7f0000000000)={0x2, 0x4e22, @multicast1}, 0x10) 458.502413ms ago: executing program 0 (id=118): r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000100)={0x200000000000001}, 0x8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev, 0x5}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001440)=ANY=[@ANYBLOB="0017"], 0xc0) sendmmsg$inet6(r0, 0x0, 0x0, 0x4000000) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x0) 160.893205ms ago: executing program 1 (id=119): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000024c0)={0x3c, r2, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @local}]}, 0x3c}, 0x1, 0x0, 0x0, 0x805}, 0x20000010) 0s ago: executing program 0 (id=120): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000021000200000000003b810000850000006d000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20001000}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:32535' (ED25519) to the list of known hosts. [ 199.758990][ T30] audit: type=1400 audit(199.310:46): avc: denied { name_bind } for pid=3311 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 200.320793][ T30] audit: type=1400 audit(199.880:47): avc: denied { execute } for pid=3312 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 200.326532][ T30] audit: type=1400 audit(199.880:48): avc: denied { execute_no_trans } for pid=3312 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 207.777322][ T30] audit: type=1400 audit(207.330:49): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 207.793849][ T30] audit: type=1400 audit(207.340:50): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 207.840479][ T3312] cgroup: Unknown subsys name 'net' [ 207.909087][ T30] audit: type=1400 audit(207.430:51): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 208.207100][ T3312] cgroup: Unknown subsys name 'cpuset' [ 208.263567][ T3312] cgroup: Unknown subsys name 'rlimit' [ 208.572980][ T30] audit: type=1400 audit(208.130:52): avc: denied { setattr } for pid=3312 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 208.577707][ T30] audit: type=1400 audit(208.130:53): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 208.585083][ T30] audit: type=1400 audit(208.140:54): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 209.327388][ T3314] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 209.339044][ T30] audit: type=1400 audit(208.890:55): avc: denied { relabelto } for pid=3314 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 209.353740][ T30] audit: type=1400 audit(208.900:56): avc: denied { write } for pid=3314 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 209.503267][ T30] audit: type=1400 audit(209.060:57): avc: denied { read } for pid=3312 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 209.511099][ T30] audit: type=1400 audit(209.060:58): avc: denied { open } for pid=3312 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 209.543034][ T3312] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 230.026169][ T30] audit: type=1400 audit(229.580:59): avc: denied { execmem } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 230.237823][ T30] audit: type=1400 audit(229.790:60): avc: denied { read } for pid=3317 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 230.247169][ T30] audit: type=1400 audit(229.800:61): avc: denied { open } for pid=3317 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 230.266086][ T30] audit: type=1400 audit(229.820:62): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 230.339478][ T30] audit: type=1400 audit(229.890:63): avc: denied { module_request } for pid=3317 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 230.706510][ T30] audit: type=1400 audit(230.260:64): avc: denied { sys_module } for pid=3317 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 237.532423][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.594683][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 238.690054][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 238.712715][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 242.103320][ T3317] hsr_slave_0: entered promiscuous mode [ 242.143597][ T3317] hsr_slave_1: entered promiscuous mode [ 243.370850][ T3318] hsr_slave_0: entered promiscuous mode [ 243.378700][ T3318] hsr_slave_1: entered promiscuous mode [ 243.384309][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 243.397095][ T3318] Cannot create hsr debugfs directory [ 245.777676][ T30] audit: type=1400 audit(245.330:65): avc: denied { create } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 245.799139][ T30] audit: type=1400 audit(245.350:66): avc: denied { write } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 245.824731][ T30] audit: type=1400 audit(245.380:67): avc: denied { read } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 245.895091][ T3317] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 246.023926][ T3317] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 246.106759][ T3317] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 246.166885][ T3317] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 246.877412][ T3318] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 246.935323][ T3318] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 247.010442][ T3318] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 247.123336][ T3318] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 250.664018][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.752562][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 263.567793][ T3317] veth0_vlan: entered promiscuous mode [ 263.657731][ T3317] veth1_vlan: entered promiscuous mode [ 264.196470][ T3317] veth0_macvtap: entered promiscuous mode [ 264.296625][ T3318] veth0_vlan: entered promiscuous mode [ 264.331552][ T3317] veth1_macvtap: entered promiscuous mode [ 264.383910][ T3318] veth1_vlan: entered promiscuous mode [ 264.777256][ T41] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 264.785251][ T41] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 264.786163][ T41] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 264.786584][ T41] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 264.874086][ T3318] veth0_macvtap: entered promiscuous mode [ 265.070841][ T3318] veth1_macvtap: entered promiscuous mode [ 265.262590][ T30] audit: type=1400 audit(264.810:68): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 265.333120][ T30] audit: type=1400 audit(264.880:69): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzkaller.2LXUXn/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 265.355338][ T30] audit: type=1400 audit(264.910:70): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 265.432870][ T30] audit: type=1400 audit(264.990:71): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzkaller.2LXUXn/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 265.453353][ T30] audit: type=1400 audit(265.010:72): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzkaller.2LXUXn/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4220 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 265.538754][ T30] audit: type=1400 audit(265.090:73): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 265.567028][ T30] audit: type=1400 audit(265.120:74): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 265.583435][ T30] audit: type=1400 audit(265.140:75): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="gadgetfs" ino=4221 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 265.625724][ T30] audit: type=1400 audit(265.180:76): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 265.642431][ T30] audit: type=1400 audit(265.190:77): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 265.705149][ T26] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 265.722747][ T26] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 265.723266][ T26] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 265.723642][ T26] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 265.945771][ T3317] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 271.393580][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 271.403371][ T30] audit: type=1400 audit(270.950:90): avc: denied { create } for pid=3483 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 271.973105][ T30] audit: type=1400 audit(271.530:91): avc: denied { connect } for pid=3483 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 272.164011][ T30] audit: type=1400 audit(271.720:92): avc: denied { execute } for pid=3483 comm="syz.0.8" path="/4/blkio.bfq.io_service_bytes_recursive" dev="tmpfs" ino=38 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 275.659440][ T30] audit: type=1400 audit(275.210:93): avc: denied { prog_load } for pid=3497 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 275.660172][ T30] audit: type=1400 audit(275.210:94): avc: denied { bpf } for pid=3497 comm="syz.0.14" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 275.717630][ T30] audit: type=1400 audit(275.270:95): avc: denied { perfmon } for pid=3497 comm="syz.0.14" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 275.774182][ T30] audit: type=1400 audit(275.330:96): avc: denied { ioctl } for pid=3500 comm="syz.1.15" path="socket:[4315]" dev="sockfs" ino=4315 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 275.929031][ T30] audit: type=1400 audit(275.480:97): avc: denied { prog_run } for pid=3497 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 275.979599][ T30] audit: type=1400 audit(275.530:98): avc: denied { map_create } for pid=3497 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 276.033311][ T30] audit: type=1400 audit(275.590:99): avc: denied { map_read map_write } for pid=3497 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 277.384749][ T30] audit: type=1400 audit(276.940:100): avc: denied { create } for pid=3508 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 277.427036][ T30] audit: type=1400 audit(276.970:101): avc: denied { setopt } for pid=3508 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 277.428649][ T30] audit: type=1400 audit(276.970:102): avc: denied { write } for pid=3508 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 280.357130][ T3523] syzkaller0: entered promiscuous mode [ 280.363863][ T3523] syzkaller0: entered allmulticast mode [ 281.802831][ T30] audit: type=1400 audit(281.360:103): avc: denied { create } for pid=3527 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 281.832243][ T30] audit: type=1400 audit(281.390:104): avc: denied { write } for pid=3527 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 283.802451][ T30] audit: type=1400 audit(283.360:105): avc: denied { create } for pid=3534 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 283.872913][ T30] audit: type=1400 audit(283.430:106): avc: denied { bind } for pid=3534 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 283.932812][ T30] audit: type=1400 audit(283.480:107): avc: denied { read } for pid=3534 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 284.794635][ T30] audit: type=1400 audit(284.350:108): avc: denied { create } for pid=3539 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 286.007829][ T30] audit: type=1400 audit(285.560:109): avc: denied { create } for pid=3538 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 290.433962][ T30] audit: type=1400 audit(289.990:110): avc: denied { connect } for pid=3567 comm="syz.0.38" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 291.235462][ T30] audit: type=1400 audit(290.790:111): avc: denied { ioctl } for pid=3571 comm="syz.0.40" path="socket:[4405]" dev="sockfs" ino=4405 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 292.734450][ T30] audit: type=1400 audit(292.280:112): avc: denied { name_bind } for pid=3577 comm="syz.1.41" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 292.772415][ T30] audit: type=1400 audit(292.290:113): avc: denied { node_bind } for pid=3577 comm="syz.1.41" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 293.725783][ T30] audit: type=1400 audit(293.280:114): avc: denied { create } for pid=3577 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 294.551724][ T3584] netlink: 'syz.1.43': attribute type 12 has an invalid length. [ 295.426434][ T30] audit: type=1400 audit(294.960:115): avc: denied { create } for pid=3585 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 295.475813][ T30] audit: type=1400 audit(295.030:116): avc: denied { write } for pid=3585 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 295.484533][ T30] audit: type=1400 audit(295.040:117): avc: denied { nlmsg_write } for pid=3585 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 297.121430][ T30] audit: type=1400 audit(296.670:118): avc: denied { write } for pid=3594 comm="syz.1.48" laddr=fe80::bcfd:8cff:fed3:b1d0 lport=58 faddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 300.311065][ T3602] syz.0.51 uses obsolete (PF_INET,SOCK_PACKET) [ 300.341959][ T30] audit: type=1400 audit(299.900:119): avc: denied { ioctl } for pid=3601 comm="syz.0.51" path="socket:[4448]" dev="sockfs" ino=4448 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 301.890789][ T30] audit: type=1400 audit(301.440:120): avc: denied { create } for pid=3601 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 301.950916][ T30] audit: type=1400 audit(301.500:121): avc: denied { bind } for pid=3601 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 305.529564][ T30] audit: type=1400 audit(305.080:122): avc: denied { create } for pid=3621 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 305.572289][ T30] audit: type=1400 audit(305.130:123): avc: denied { ioctl } for pid=3621 comm="syz.1.57" path="socket:[4468]" dev="sockfs" ino=4468 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 305.579573][ T30] audit: type=1400 audit(305.130:124): avc: denied { bind } for pid=3621 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 305.602198][ T30] audit: type=1400 audit(305.160:125): avc: denied { connect } for pid=3621 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 305.616195][ T30] audit: type=1400 audit(305.170:126): avc: denied { write } for pid=3621 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 307.333607][ T3625] netlink: 8 bytes leftover after parsing attributes in process `syz.0.58'. [ 307.334241][ T3625] netlink: 4 bytes leftover after parsing attributes in process `syz.0.58'. [ 307.351885][ T3625] netlink: 'syz.0.58': attribute type 14 has an invalid length. [ 308.547643][ T3627] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3597 sclass=netlink_route_socket pid=3627 comm=syz.0.59 [ 313.910594][ T30] audit: type=1400 audit(313.460:127): avc: denied { create } for pid=3639 comm="syz.0.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 314.275402][ T3643] Zero length message leads to an empty skb [ 315.325474][ T3648] netlink: 8 bytes leftover after parsing attributes in process `syz.0.68'. [ 319.275830][ T30] audit: type=1400 audit(318.830:128): avc: denied { setopt } for pid=3658 comm="syz.0.73" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 320.003787][ T30] audit: type=1400 audit(319.560:129): avc: denied { setopt } for pid=3664 comm="syz.0.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 320.011961][ T30] audit: type=1400 audit(319.570:130): avc: denied { accept } for pid=3664 comm="syz.0.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 320.042022][ T30] audit: type=1400 audit(319.600:131): avc: denied { create } for pid=3664 comm="syz.0.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 323.337385][ T3673] vlan2: entered allmulticast mode [ 323.347356][ T3673] veth0_vlan: entered allmulticast mode [ 323.965194][ T30] audit: type=1400 audit(323.520:132): avc: denied { create } for pid=3674 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 326.566350][ T3688] netlink: 32 bytes leftover after parsing attributes in process `syz.1.86'. [ 333.522766][ T3726] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 335.069310][ T30] audit: type=1400 audit(334.620:133): avc: denied { create } for pid=3734 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 335.127131][ T30] audit: type=1400 audit(334.680:134): avc: denied { bind } for pid=3734 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 335.153422][ T30] audit: type=1400 audit(334.710:135): avc: denied { listen } for pid=3734 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 335.174691][ T30] audit: type=1400 audit(334.730:136): avc: denied { read } for pid=3734 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 335.493178][ T30] audit: type=1400 audit(335.050:137): avc: denied { write } for pid=3738 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 346.383582][ T30] audit: type=1400 audit(345.940:138): avc: denied { create } for pid=3777 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 348.156367][ T30] audit: type=1400 audit(347.710:139): avc: denied { bind } for pid=3789 comm="syz.0.117" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 348.162662][ T30] audit: type=1400 audit(347.720:140): avc: denied { name_bind } for pid=3789 comm="syz.0.117" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 348.166446][ T30] audit: type=1400 audit(347.720:141): avc: denied { node_bind } for pid=3789 comm="syz.0.117" saddr=172.20.20.170 src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 349.265465][ T3796] ------------[ cut here ]------------ [ 349.266152][ T3796] verifier bug: not inlined functions bpf_send_signal#109 is missing func(1) [ 349.267992][ T3796] WARNING: CPU: 0 PID: 3796 at kernel/bpf/verifier.c:22838 do_misc_fixups+0xa938/0xcf04 [ 349.272303][ T3796] Modules linked in: [ 349.274610][ T3796] CPU: 0 UID: 0 PID: 3796 Comm: syz.0.120 Not tainted syzkaller #0 PREEMPT [ 349.275674][ T3796] Hardware name: linux,dummy-virt (DT) [ 349.276479][ T3796] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 349.277025][ T3796] pc : do_misc_fixups+0xa938/0xcf04 [ 349.277416][ T3796] lr : do_misc_fixups+0xa938/0xcf04 [ 349.277910][ T3796] sp : ffff8000a1e77450 [ 349.278301][ T3796] x29: ffff8000a1e77450 x28: ffff000021440000 x27: ffff000021446130 [ 349.279240][ T3796] x26: ffff000021446148 x25: ffff000021440000 x24: 0000000000000000 [ 349.279895][ T3796] x23: ffff000021446128 x22: 1ffff00011b4b20b x21: ffff80008da59058 [ 349.280537][ T3796] x20: ffff8000855855c0 x19: ffff80008556d6a0 x18: ffff000021446168 [ 349.281137][ T3796] x17: 0000000000000000 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 349.281772][ T3796] x14: 0000000000000000 x13: 0000000000000000 x12: ffff7000143cee01 [ 349.282574][ T3796] x11: 1ffff000143cee00 x10: ffff7000143cee00 x9 : dfff800000000000 [ 349.283399][ T3796] x8 : ffff8000a1e77008 x7 : ffff8000a1e77130 x6 : ffff8000a1e77080 [ 349.284156][ T3796] x5 : ffff8000a1e77068 x4 : 0000000000000000 x3 : 1fffe0000d41313e [ 349.284785][ T3796] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000014efdac0 [ 349.285714][ T3796] Call trace: [ 349.286304][ T3796] do_misc_fixups+0xa938/0xcf04 (P) [ 349.286885][ T3796] bpf_check+0x3c84/0x9508 [ 349.287288][ T3796] bpf_prog_load+0xe2c/0x1b74 [ 349.287711][ T3796] __sys_bpf+0x9c4/0x29c8 [ 349.288305][ T3796] __arm64_sys_bpf+0x70/0xa4 [ 349.288652][ T3796] invoke_syscall+0x6c/0x258 [ 349.289094][ T3796] el0_svc_common.constprop.0+0xac/0x230 [ 349.289472][ T3796] do_el0_svc_compat+0x40/0x68 [ 349.289849][ T3796] el0_svc_compat+0x4c/0x184 [ 349.290200][ T3796] el0t_32_sync_handler+0x88/0xac [ 349.290586][ T3796] el0t_32_sync+0x19c/0x1a0 [ 349.291225][ T3796] irq event stamp: 332 [ 349.291551][ T3796] hardirqs last enabled at (331): [] __schedule+0x23b0/0x3180 [ 349.292088][ T3796] hardirqs last disabled at (332): [] el1_brk64+0x1c/0x48 [ 349.292560][ T3796] softirqs last enabled at (250): [] handle_softirqs+0x88c/0xdb4 [ 349.293083][ T3796] softirqs last disabled at (227): [] __do_softirq+0x14/0x20 [ 349.293734][ T3796] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 351.013300][ T12] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 351.326020][ T12] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 351.566769][ T12] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 351.745950][ T12] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 352.293140][ T30] audit: type=1400 audit(351.840:142): avc: denied { read } for pid=3162 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 354.827206][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 354.902210][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 354.969380][ T12] bond0 (unregistering): Released all slaves [ 355.484529][ T12] hsr_slave_0: left promiscuous mode [ 355.512945][ T12] hsr_slave_1: left promiscuous mode [ 355.657716][ T12] veth1_macvtap: left promiscuous mode [ 355.663268][ T12] veth0_macvtap: left promiscuous mode [ 355.676382][ T12] veth1_vlan: left promiscuous mode [ 355.685683][ T12] veth0_vlan: left promiscuous mode [ 362.073751][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 362.394796][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 362.684708][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 362.955445][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 365.896436][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 365.947093][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 366.016172][ T12] bond0 (unregistering): Released all slaves [ 366.394272][ T12] hsr_slave_0: left promiscuous mode [ 366.412287][ T12] hsr_slave_1: left promiscuous mode [ 366.546397][ T12] veth1_macvtap: left promiscuous mode [ 366.547807][ T12] veth0_macvtap: left promiscuous mode [ 366.560032][ T12] veth1_vlan: left promiscuous mode [ 366.561223][ T12] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 14:14:26 Registers: info registers vcpu 0 CPU#0 PC=ffff80008025f65c X00=ffff800088ccdca0 X01=ffff000014efdac0 X02=0000000000000000 X03=0000000000000000 X04=ffff8000854ee5c8 X05=ffff800088ccdca8 X06=0054504d45455250 X07=0054504d45455250 X08=ffff800088ccdca7 X09=dfff800000000000 X10=ffff700011199b94 X11=1ffff00011199b94 X12=ffff700011199b95 X13=0000000000000001 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=ffff000021446168 X19=dfff800000000000 X20=1ffff000143cedf6 X21=ffff800088b83b23 X22=0000000000000002 X23=ffff000014efe340 X24=ffff800088ccb1a0 X25=0000000000000000 X26=0000000000000000 X27=0000000000000ed4 X28=ffff8000866013e0 X29=ffff8000a1e76f80 X30=ffff80008025f5b4 SP=ffff8000a1e76f80 PSTATE=600003c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085442530 X00=dfff800000000000 X01=0000000000000007 X02=0000000000000000 X03=0000000000000000 X04=ffff00000f623c88 X05=dfff800000000000 X06=1fffe00001ec4791 X07=ffff7000145f0e7a X08=0000000041b58ab3 X09=ffff8000897e6000 X10=ffff00000f624710 X11=0000000000000000 X12=0000000000000088 X13=0000000000000000 X14=0000000000000000 X15=ffff000015f65830 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff00000dc02140 X20=0000000000000c40 X21=0000000000001000 X22=ffff000017f84000 X23=ffff8000811435d4 X24=0000000000001000 X25=0000000000000001 X26=0000000000000001 X27=ffff00001c94a5e0 X28=0000000000001000 X29=ffff8000a2f87190 X30=ffff8000809c6e70 SP=ffff8000a2f87010 PSTATE=200000c5 --C- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000