last executing test programs: 3.631904845s ago: executing program 1 (id=108): r0 = io_uring_setup(0x6d4f, &(0x7f0000000340)={0x0, 0x5a27, 0x400}) r1 = epoll_create(0x7ff40000) epoll_wait(r1, 0x0, 0x14e, 0xfffffffd) close_range(r0, 0xffffffffffffffff, 0x0) 2.729268361s ago: executing program 1 (id=116): syz_usb_control_io(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0x0, &(0x7f0000000180)={0x0, 0x3, 0x2, @string={0x2}}, 0x0, 0x0, 0x0}, &(0x7f0000000a40)={0x44, 0x0, 0x0, &(0x7f0000000500)={0x0, 0x8, 0x1, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x3f, 0x40, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000001a40), 0x1003, r0}, 0x38) 2.279654324s ago: executing program 0 (id=118): unshare(0x40000000) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001680)=@raw={'raw\x00', 0x3c1, 0x3, 0x2dc, 0x0, 0x111, 0x4b4, 0xec, 0xd4feffff, 0x214, 0x202, 0x225, 0x214, 0x278, 0x3, 0x0, {[{{@ipv6={@dev={0xfe, 0x80, '\x00', 0xfc}, @empty, [], [], 'veth1_vlan\x00', 'team_slave_0\x00'}, 0x0, 0xa4, 0xec}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x81, 'syz1\x00'}}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, [], [0x0, 0xffffffff], 'veth1_to_hsr\x00', 'erspan0\x00'}, 0x0, 0xe0, 0x128, 0x0, {}, [@common=@unspec=@limit={{0x3c}, {0x0, 0x8000000}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xa, 'syz1\x00', {0x7f}}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x338) 1.986263282s ago: executing program 0 (id=119): r0 = socket$inet6(0xa, 0x3, 0xff) r1 = dup2(r0, r0) fsmount(r1, 0x1, 0xa) 1.810632128s ago: executing program 0 (id=120): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) poll(0x0, 0x0, 0xf5) 1.440235498s ago: executing program 1 (id=121): mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_MFC_PROXY(r0, 0x0, 0xd2, &(0x7f00000000c0)={@private=0xa010102, @rand_addr=0x640100ff, 0x2, "c8fc5e70b1b5ae627a3c9f580df57e22f2b08c58288b6cb58b74354989fa5393", 0x0, 0x5, 0xfffffffc, 0xff}, 0x3c) setsockopt$MRT_DEL_MFC(r0, 0x0, 0xcd, &(0x7f0000000200)={@private=0xa010102, @rand_addr=0x64010101, 0xffffffffffffffff, "199e2dc8deb01f37cb8976e515630b9600cb908db480b86d640bdb5b6ca3120a", 0x80000002, 0xfffffffe, 0xffffffff, 0x1}, 0x3c) 1.413407829s ago: executing program 0 (id=122): r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, &(0x7f0000000140)) 1.258625583s ago: executing program 1 (id=123): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x1, 0xe, 0x334f9e1d5f8fe0b, @void, @value}, 0x28) 1.168306856s ago: executing program 0 (id=124): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/59, 0x3b}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x2}, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000880)=ANY=[], 0xd8}}, 0x0) 1.017633481s ago: executing program 1 (id=125): r0 = syz_open_dev$sndmidi(&(0x7f0000000040), 0x2, 0x141101) r1 = dup(r0) mq_timedsend(r1, 0x0, 0x0, 0x2, 0x0) 779.680517ms ago: executing program 1 (id=126): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x18, 0x10, &(0x7f0000000c00)=ANY=[@ANYBLOB="93b5054dcdd1f1aeb7151fd5a16305467cf4e708c5b44eda4da60e97934c885714f2c528f919c122d2996a79bc770d3c91b6a9f44aa5c4ec1895f10479832c751896f0805bdacb542f1dd283c60d4872529bd65a82d7414f41526445b75a60a8f1cdc38403efcddc6e2bbbd5921366a2374291f5169c59ee247d521d512c6420f8bf613998db5506e72f87", @ANYBLOB="da2261875f58323cf5704ca92bdcc7e39a892ad9ce2e9482b397d74faa777043c79850203e844203a9e2442046a6d5429a7a66ed82d75475981032f61c1771fdfdafc95b6573e353000000"], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x9d, &(0x7f0000000140)=""/157, 0x41000, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x6) r0 = syz_clone(0x800c000, &(0x7f0000001480), 0x0, 0x0, 0x0, 0x0) kcmp(r0, 0x0, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000740)=0x2) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000ce8cce93804500009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f}}, 0x20) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x518, 0x0, 0x18c, 0x203, 0x340, 0x19030000, 0x450, 0x2e0, 0x2e0, 0x450, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x2f8, 0x340, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4}, {}, {}, {0x16}, {}, {}, {}, {}, {0x0, 0xff}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x20}]}}, @common=@hl={{0x24}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}, {{@uncond, 0x0, 0xc8, 0x110, 0x0, {}, [@inet=@rpfilter={{0x24}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x574) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0x2, 0x4e21, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, r5}}, 0x48) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f0000000380)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000580)=0x1, r8, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0xfffffffc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}, {0xa, 0x4e20, 0x0, @remote}, r8}}, 0x48) close(r7) openat$adsp1(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0xd0) listen(r3, 0x2) openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x42, 0x0) 0s ago: executing program 0 (id=127): r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/59, 0x304000, 0x800}, 0x20) mremap(&(0x7f00003eb000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000003000/0x1000)=nil) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, 0x3000}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) kernel console output (not intermixed with test programs): [ 53.335935][ T31] audit: type=1400 audit(53.250:68): avc: denied { read write } for pid=3081 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.338562][ T31] audit: type=1400 audit(53.250:69): avc: denied { open } for pid=3081 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:13092' (ED25519) to the list of known hosts. [ 63.927606][ T31] audit: type=1400 audit(63.840:70): avc: denied { name_bind } for pid=3082 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 65.808900][ T31] audit: type=1400 audit(65.720:71): avc: denied { execute } for pid=3084 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.834424][ T31] audit: type=1400 audit(65.740:72): avc: denied { execute_no_trans } for pid=3084 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 70.734705][ T31] audit: type=1400 audit(70.630:73): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 70.735886][ T31] audit: type=1400 audit(70.640:74): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 70.744829][ T3084] cgroup: Unknown subsys name 'net' [ 70.748910][ T31] audit: type=1400 audit(70.660:75): avc: denied { unmount } for pid=3084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 70.990623][ T3084] cgroup: Unknown subsys name 'cpuset' [ 70.997496][ T3084] cgroup: Unknown subsys name 'hugetlb' [ 70.998577][ T3084] cgroup: Unknown subsys name 'rlimit' [ 71.319558][ T31] audit: type=1400 audit(71.230:76): avc: denied { setattr } for pid=3084 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 71.320915][ T31] audit: type=1400 audit(71.230:77): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 71.321535][ T31] audit: type=1400 audit(71.230:78): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 71.530366][ T3086] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 71.532192][ T31] audit: type=1400 audit(71.440:79): avc: denied { relabelto } for pid=3086 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 71.542096][ T31] audit: type=1400 audit(71.450:80): avc: denied { write } for pid=3086 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 71.581065][ T31] audit: type=1400 audit(71.490:81): avc: denied { read } for pid=3084 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 71.582132][ T31] audit: type=1400 audit(71.490:82): avc: denied { open } for pid=3084 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 79.020099][ T3084] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 81.365060][ T31] audit: type=1400 audit(81.280:83): avc: denied { execmem } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 81.424586][ T31] audit: type=1400 audit(81.330:84): avc: denied { read } for pid=3090 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.425685][ T31] audit: type=1400 audit(81.330:85): avc: denied { open } for pid=3090 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 81.426596][ T31] audit: type=1400 audit(81.330:86): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 81.447391][ T31] audit: type=1400 audit(81.360:87): avc: denied { module_request } for pid=3090 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 81.545640][ T31] audit: type=1400 audit(81.460:88): avc: denied { sys_module } for pid=3090 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 82.145838][ T31] audit: type=1400 audit(82.060:89): avc: denied { ioctl } for pid=3090 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 83.628332][ T3090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.640876][ T3090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.761879][ T3089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 83.770032][ T3089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.961719][ T3089] hsr_slave_0: entered promiscuous mode [ 84.971760][ T3089] hsr_slave_1: entered promiscuous mode [ 85.085720][ T3090] hsr_slave_0: entered promiscuous mode [ 85.089150][ T3090] hsr_slave_1: entered promiscuous mode [ 85.091405][ T3090] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 85.091963][ T3090] Cannot create hsr debugfs directory [ 85.539949][ T31] audit: type=1400 audit(85.450:90): avc: denied { create } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 85.541564][ T31] audit: type=1400 audit(85.450:91): avc: denied { write } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 85.542480][ T31] audit: type=1400 audit(85.450:92): avc: denied { read } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 85.557520][ T3089] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 85.575232][ T3089] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 85.597110][ T3089] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 85.617004][ T3089] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 85.688138][ T3090] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 85.701355][ T3090] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 85.716142][ T3090] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 85.729693][ T3090] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 86.711907][ T3090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.800562][ T3089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.737257][ T3090] veth0_vlan: entered promiscuous mode [ 89.748502][ T3090] veth1_vlan: entered promiscuous mode [ 89.785946][ T3090] veth0_macvtap: entered promiscuous mode [ 89.792719][ T3090] veth1_macvtap: entered promiscuous mode [ 89.839518][ T3090] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.840038][ T3090] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.840255][ T3090] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.840540][ T3090] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.957692][ T31] audit: type=1400 audit(89.870:93): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 89.961826][ T31] audit: type=1400 audit(89.870:94): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzkaller.QOW9Gd/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 89.970411][ T31] audit: type=1400 audit(89.880:95): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 89.980658][ T31] audit: type=1400 audit(89.890:96): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzkaller.QOW9Gd/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 89.995424][ T31] audit: type=1400 audit(89.900:97): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzkaller.QOW9Gd/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1824 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 90.000033][ T31] audit: type=1400 audit(89.910:98): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 90.008525][ T31] audit: type=1400 audit(89.920:99): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 90.017676][ T31] audit: type=1400 audit(89.930:100): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 90.020928][ T31] audit: type=1400 audit(89.930:101): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 90.022514][ T31] audit: type=1400 audit(89.930:102): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 90.042335][ T3089] veth0_vlan: entered promiscuous mode [ 90.077682][ T3089] veth1_vlan: entered promiscuous mode [ 90.079585][ T3090] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 90.131148][ T3089] veth0_macvtap: entered promiscuous mode [ 90.140297][ T3089] veth1_macvtap: entered promiscuous mode [ 90.200741][ T3089] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.201233][ T3089] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.201543][ T3089] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.201802][ T3089] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.320724][ T3770] netlink: 'syz.1.2': attribute type 4 has an invalid length. [ 90.342327][ T3770] netlink: 'syz.1.2': attribute type 4 has an invalid length. [ 95.638395][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 95.638510][ T31] audit: type=1400 audit(95.270:123): avc: denied { map_read map_write } for pid=3785 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.355812][ T31] audit: type=1400 audit(96.330:124): avc: denied { ioctl } for pid=3785 comm="syz.0.6" path="socket:[1853]" dev="sockfs" ino=1853 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 98.284601][ T31] audit: type=1400 audit(98.190:125): avc: denied { setopt } for pid=3804 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 98.286816][ T31] audit: type=1400 audit(98.200:126): avc: denied { getopt } for pid=3804 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 98.363149][ T3807] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 98.366910][ T31] audit: type=1400 audit(98.280:127): avc: denied { getopt } for pid=3806 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 98.454394][ T1783] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 98.625144][ T1783] usb 2-1: Using ep0 maxpacket: 8 [ 98.631005][ T1783] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 98.631545][ T1783] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 98.632024][ T1783] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x8B has invalid maxpacket 12336, setting to 1024 [ 98.632331][ T1783] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 1024 [ 98.632572][ T1783] usb 2-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 98.633023][ T1783] usb 2-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 98.633205][ T1783] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 99.672206][ T1783] usb 2-1: GET_CAPABILITIES returned 0 [ 99.672485][ T1783] usbtmc 2-1:16.0: can't read capabilities [ 99.891658][ T1783] usb 2-1: USB disconnect, device number 2 [ 100.110350][ T31] audit: type=1400 audit(100.020:128): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 100.942492][ T31] audit: type=1400 audit(100.850:129): avc: denied { setopt } for pid=3817 comm="syz.0.14" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 106.670016][ T31] audit: type=1400 audit(106.230:130): avc: denied { bind } for pid=3844 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 106.670849][ T31] audit: type=1400 audit(106.230:131): avc: denied { name_bind } for pid=3844 comm="syz.1.19" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 106.671542][ T31] audit: type=1400 audit(106.230:132): avc: denied { node_bind } for pid=3844 comm="syz.1.19" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 106.672263][ T31] audit: type=1400 audit(106.480:133): avc: denied { write } for pid=3844 comm="syz.1.19" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 113.353939][ T31] audit: type=1400 audit(113.260:134): avc: denied { sqpoll } for pid=3850 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 113.418103][ T31] audit: type=1400 audit(113.300:135): avc: denied { map } for pid=3850 comm="syz.1.21" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=1959 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 113.419282][ T31] audit: type=1400 audit(113.300:136): avc: denied { read write } for pid=3850 comm="syz.1.21" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=1959 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 114.138003][ T3854] netlink: 'syz.1.22': attribute type 4 has an invalid length. [ 114.530418][ T31] audit: type=1400 audit(114.440:137): avc: denied { read } for pid=3855 comm="syz.1.23" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 114.531330][ T31] audit: type=1400 audit(114.440:138): avc: denied { open } for pid=3855 comm="syz.1.23" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 114.536197][ T31] audit: type=1400 audit(114.450:139): avc: denied { ioctl } for pid=3855 comm="syz.1.23" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 114.550883][ T31] audit: type=1400 audit(114.450:140): avc: denied { set_context_mgr } for pid=3855 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 114.556476][ T31] audit: type=1400 audit(114.470:141): avc: denied { append } for pid=3855 comm="syz.1.23" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 114.614259][ T31] audit: type=1400 audit(114.520:142): avc: denied { map } for pid=3855 comm="syz.1.23" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 115.144438][ T31] audit: type=1400 audit(115.050:143): avc: denied { call } for pid=3855 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 115.187373][ T3856] binder_alloc: 3855: binder_alloc_buf, no vma [ 119.810942][ T3868] netlink: 'syz.1.27': attribute type 4 has an invalid length. [ 120.090758][ T31] audit: type=1400 audit(120.000:144): avc: denied { prog_run } for pid=3869 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 120.694731][ T31] audit: type=1400 audit(120.600:145): avc: denied { connect } for pid=3873 comm="syz.1.30" laddr=::ffff:0.0.0.0 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 120.704245][ T31] audit: type=1400 audit(120.610:146): avc: denied { name_connect } for pid=3873 comm="syz.1.30" dest=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 121.229489][ T3875] netlink: 'syz.1.30': attribute type 21 has an invalid length. [ 121.230153][ T3875] netlink: 128 bytes leftover after parsing attributes in process `syz.1.30'. [ 121.231222][ T3875] netlink: 'syz.1.30': attribute type 5 has an invalid length. [ 121.231541][ T3875] netlink: 'syz.1.30': attribute type 6 has an invalid length. [ 121.231846][ T3875] netlink: 3 bytes leftover after parsing attributes in process `syz.1.30'. [ 121.278988][ T31] audit: type=1400 audit(121.190:147): avc: denied { write } for pid=3873 comm="syz.1.30" name="igmp" dev="proc" ino=4026532680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 123.357490][ T3877] capability: warning: `syz.1.31' uses deprecated v2 capabilities in a way that may be insecure [ 124.905950][ T3879] netlink: 'syz.1.32': attribute type 4 has an invalid length. [ 125.176031][ T31] audit: type=1400 audit(125.090:148): avc: denied { write } for pid=3880 comm="syz.1.33" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 125.179824][ T31] audit: type=1400 audit(125.090:149): avc: denied { read } for pid=3880 comm="syz.1.33" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 125.836652][ T31] audit: type=1400 audit(125.750:150): avc: denied { connect } for pid=3884 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 126.237476][ T3889] netlink: 'syz.0.37': attribute type 4 has an invalid length. [ 126.437864][ T31] audit: type=1400 audit(126.350:151): avc: denied { ioctl } for pid=3890 comm="syz.0.39" path="mnt:[4026532654]" dev="nsfs" ino=4026532654 ioctlcmd=0x940c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 128.388236][ T31] audit: type=1400 audit(128.300:152): avc: denied { create } for pid=3901 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 129.814277][ T31] audit: type=1400 audit(129.720:153): avc: denied { create } for pid=3906 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 136.095372][ T31] audit: type=1400 audit(135.780:154): avc: denied { create } for pid=3901 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 136.552847][ T31] audit: type=1400 audit(136.290:155): avc: denied { setopt } for pid=3901 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 145.344901][ T31] audit: type=1400 audit(145.250:156): avc: denied { create } for pid=3916 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 159.765718][ T31] audit: type=1400 audit(159.680:157): avc: denied { watch watch_reads } for pid=3941 comm="syz.0.53" path="/20" dev="tmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 161.032609][ T31] audit: type=1400 audit(160.940:158): avc: denied { create } for pid=3948 comm="syz.0.56" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 161.239896][ T31] audit: type=1400 audit(161.150:159): avc: denied { unlink } for pid=3089 comm="syz-executor" name="file0" dev="tmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 161.830153][ T31] audit: type=1400 audit(161.740:160): avc: denied { ioctl } for pid=3953 comm="syz.0.58" path="socket:[3251]" dev="sockfs" ino=3251 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 161.834013][ T31] audit: type=1400 audit(161.740:161): avc: denied { setopt } for pid=3953 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 161.836598][ T3954] lo: entered promiscuous mode [ 161.839068][ T3953] lo: left promiscuous mode [ 164.751025][ T31] audit: type=1400 audit(164.660:162): avc: denied { create } for pid=3960 comm="syz.0.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 169.627330][ T31] audit: type=1400 audit(169.540:163): avc: denied { name_bind } for pid=3979 comm="syz.0.69" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 172.657432][ T31] audit: type=1400 audit(172.570:164): avc: denied { create } for pid=3996 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 172.678147][ T31] audit: type=1400 audit(172.590:165): avc: denied { create } for pid=3996 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 172.707411][ T31] audit: type=1400 audit(172.620:166): avc: denied { read } for pid=3996 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 178.416014][ T31] audit: type=1400 audit(178.330:167): avc: denied { create } for pid=4012 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 178.431178][ T31] audit: type=1400 audit(178.340:168): avc: denied { getopt } for pid=4012 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 178.448350][ T4013] netlink: 24 bytes leftover after parsing attributes in process `syz.1.79'. [ 178.450659][ T4013] netlink: 56 bytes leftover after parsing attributes in process `syz.1.79'. [ 178.457603][ T31] audit: type=1400 audit(178.370:169): avc: denied { module_load } for pid=4012 comm="syz.1.79" path="/newroot/sys/power/wakeup_count" dev="sysfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 179.219674][ T31] audit: type=1400 audit(179.130:170): avc: denied { create } for pid=4037 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 179.221501][ T31] audit: type=1400 audit(179.130:171): avc: denied { bind } for pid=4037 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 179.752201][ T31] audit: type=1400 audit(179.650:172): avc: denied { accept } for pid=4037 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 179.752803][ T31] audit: type=1400 audit(179.660:173): avc: denied { setopt } for pid=4037 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 181.638370][ T31] audit: type=1400 audit(181.550:174): avc: denied { name_bind } for pid=4056 comm="syz.1.84" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 181.639981][ T31] audit: type=1400 audit(181.550:175): avc: denied { node_bind } for pid=4056 comm="syz.1.84" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 182.961895][ T4076] tmpfs: Unsupported parameter 'huge' [ 183.022776][ T31] audit: type=1400 audit(182.930:176): avc: denied { write } for pid=4068 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 190.303137][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 190.304971][ T31] audit: type=1400 audit(189.690:178): avc: denied { append } for pid=4097 comm="syz.1.98" name="nullb0" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 191.974753][ T4100] netlink: 8 bytes leftover after parsing attributes in process `syz.1.98'. [ 192.004530][ T4100] vlan2: entered promiscuous mode [ 192.005154][ T4100] syz_tun: entered promiscuous mode [ 216.694580][ T31] audit: type=1400 audit(216.530:179): avc: denied { create } for pid=4128 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 216.695561][ T31] audit: type=1400 audit(216.540:180): avc: denied { setopt } for pid=4128 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 217.162773][ T4134] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 217.204873][ T4129] input: syz0 as /devices/virtual/input/input3 [ 217.229567][ T31] audit: type=1400 audit(217.140:181): avc: denied { bind } for pid=4128 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 217.760846][ T4146] netlink: 4696 bytes leftover after parsing attributes in process `syz.0.110'. [ 217.971285][ T31] audit: type=1400 audit(217.880:182): avc: denied { bind } for pid=4149 comm="syz.0.112" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 217.974232][ T31] audit: type=1400 audit(217.890:183): avc: denied { node_bind } for pid=4149 comm="syz.0.112" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 218.235247][ T31] audit: type=1400 audit(218.150:184): avc: denied { create } for pid=4153 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 218.243282][ T31] audit: type=1400 audit(218.150:185): avc: denied { write } for pid=4153 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 218.480897][ T31] audit: type=1400 audit(218.390:186): avc: denied { create } for pid=4156 comm="syz.0.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 218.492569][ T31] audit: type=1400 audit(218.400:187): avc: denied { setopt } for pid=4156 comm="syz.0.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 221.601379][ T4212] ------------[ cut here ]------------ [ 221.602073][ T4212] WARNING: CPU: 1 PID: 4212 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 221.605284][ T4212] Modules linked in: [ 221.609440][ T4212] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 221.610522][ T4212] CPU: 1 UID: 0 PID: 4212 Comm: syz.0.127 Not tainted 6.12.0-syzkaller #0 [ 221.610930][ T4212] Hardware name: ARM-Versatile Express [ 221.611427][ T4212] Call trace: [ 221.611884][ T4212] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 221.612507][ T4212] r7:00000000 r6:82623304 r5:00000000 r4:820413b8 [ 221.612825][ T4212] [<819b809c>] (show_stack) from [<819d60dc>] (dump_stack_lvl+0x54/0x7c) [ 221.613216][ T4212] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 221.613567][ T4212] r5:00000000 r4:82874d18 [ 221.613821][ T4212] [<819d6104>] (dump_stack) from [<819b8be0>] (panic+0x120/0x374) [ 221.614384][ T4212] [<819b8ac0>] (panic) from [<802426d0>] (get_taint+0x0/0x1c) [ 221.614933][ T4212] r3:8260c604 r2:00000001 r1:82029878 r0:82031344 [ 221.615221][ T4212] r7:80492e7c [ 221.615399][ T4212] [<8024265c>] (check_panic_on_warn) from [<80242834>] (__warn+0x80/0x188) [ 221.615736][ T4212] [<802427b4>] (__warn) from [<80242ab4>] (warn_slowpath_fmt+0x178/0x1f4) [ 221.616114][ T4212] r8:00000009 r7:82059090 r6:e4759d24 r5:83fcec00 r4:00000000 [ 221.616390][ T4212] [<80242940>] (warn_slowpath_fmt) from [<80492e7c>] (kunmap_local_indexed+0x20c/0x224) [ 221.616832][ T4212] r10:ffedcfe8 r9:83f98600 r8:20000000 r7:fffffff0 r6:00000003 r5:83fcec00 [ 221.617226][ T4212] r4:ffedc000 [ 221.617405][ T4212] [<80492c70>] (kunmap_local_indexed) from [<8050cd58>] (move_pages+0x7e8/0x149c) [ 221.617811][ T4212] r7:fffffff0 r6:f562e75f r5:dee7ae78 r4:ffeda000 [ 221.618089][ T4212] [<8050c570>] (move_pages) from [<8058b378>] (userfaultfd_ioctl+0x111c/0x2080) [ 221.618529][ T4212] r10:83f98600 r9:e4759e98 r8:00000001 r7:21000000 r6:00000000 r5:20000040 [ 221.618875][ T4212] r4:84ed5080 [ 221.619054][ T4212] [<8058a25c>] (userfaultfd_ioctl) from [<80536ea8>] (sys_ioctl+0x138/0xd88) [ 221.619504][ T4212] r10:83fcec00 r9:00000003 r8:84ef8300 r7:20000040 r6:84ef8301 r5:00000000 [ 221.619838][ T4212] r4:c028aa05 [ 221.620013][ T4212] [<80536d70>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 221.620497][ T4212] Exception stack(0xe4759fa8 to 0xe4759ff0) [ 221.620930][ T4212] 9fa0: 00000000 00000000 00000003 c028aa05 20000040 00000000 [ 221.621376][ T4212] 9fc0: 00000000 00000000 002862f0 00000036 00000000 00006364 003d0f00 76b810bc [ 221.621789][ T4212] 9fe0: 76b80ec0 76b80eb0 00018af0 00133450 [ 221.622160][ T4212] r10:00000036 r9:83fcec00 r8:8020029c r7:00000036 r6:002862f0 r5:00000000 [ 221.622530][ T4212] r4:00000000 [ 221.626505][ T4212] Rebooting in 86400 seconds.. VM DIAGNOSIS: 15:47:48 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=820413b8 R02=00000001 R03=819d7f48 R04=00000006 R05=826faf88 R06=00000000 R07=826faf80 R08=84474800 R09=00000028 R10=826faf88 R11=df801eac R12=df801eb0 R13=df801ea0 R14=8031ce20 R15=819d7f58 PSR=20000193 --C- A S svc32 s00=e4000000 s01=ffffffff d00=ffffffffe4000000 s02=ac000000 s03=fffb4407 d01=fffb4407ac000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=005d4e7e s09=00ebb1f2 d04=00ebb1f2005d4e7e s10=00000000 s11=00000000 d05=0000000000000000 s12=0130ba00 s13=ff004e6f d06=ff004e6f0130ba00 s14=00000000 s15=ffffffff d07=ffffffff00000000 s16=fe000000 s17=1241e4e9 d08=1241e4e9fe000000 s18=8c000000 s19=fffceea3 d09=fffceea38c000000 s20=fe4c45a0 s21=ff004e74 d10=ff004e74fe4c45a0 s22=ffffffff s23=ffffffff d11=ffffffffffffffff s24=e65d4e7e s25=ffffffff d12=ffffffffe65d4e7e s26=ac000000 s27=fffb4407 d13=fffb4407ac000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=ff7d0107 s33=00fb1737 d16=00fb1737ff7d0107 s34=ffffffff s35=00000000 d17=00000000ffffffff s36=fe162b53 s37=ff77c311 d18=ff77c311fe162b53 s38=ffffffff s39=ffffffff d19=ffffffffffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=fb65f552 s43=ffffffff d21=fffffffffb65f552 s44=fffffff9 s45=ffffffff d22=fffffffffffffff9 s46=fe7751c6 s47=ffffffff d23=fffffffffe7751c6 s48=ffacdf2c s49=1241e4e9 d24=1241e4e9ffacdf2c s50=e2db11b2 s51=ffffffff d25=ffffffffe2db11b2 s52=01a64c48 s53=fe58ca04 d26=fe58ca0401a64c48 s54=fe2cd85e s55=feac7a76 d27=feac7a76fe2cd85e s56=fe1ffa26 s57=009f59ea d28=009f59eafe1ffa26 s58=004facf5 s59=fe2cd85e d29=fe2cd85e004facf5 s60=abb509f3 s61=fffb4407 d30=fffb4407abb509f3 s62=31823ccc s63=fff6c9a3 d31=fff6c9a331823ccc FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=826296f0 R01=00000001 R02=000862e3 R03=819d7f48 R04=00000006 R05=826faf88 R06=00000000 R07=826faf80 R08=83fcec00 R09=00000028 R10=826faf88 R11=df805d9c R12=df805da0 R13=df805d90 R14=8031ce20 R15=819d7f58 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000