last executing test programs: 1m23.677061771s ago: executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x40008}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 8.723280542s ago: executing program 1: socket$unix(0x1, 0x1, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$KDSKBLED(0xffffffffffffffff, 0x5450, 0x0) 7.184685556s ago: executing program 1: sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000100)="f297c0eccf859705acf9834f5b4b6039b63eac61", 0x14}, {&(0x7f0000001400)="c98812c1be8a", 0x6}, {&(0x7f00000012c0)="406f2bef596a8a3130012ee7bf", 0xd}, {&(0x7f0000001300)="7f5549f794326461", 0x8}], 0x4, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) 6.123282924s ago: executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r0}, 0x10) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$vhost_msg_v2(r1, &(0x7f0000000000)={0x2, 0x0, {0x0, 0x0, 0x0}}, 0x48) 5.354505336s ago: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000047b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x143fdd, 0x80, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, &(0x7f0000000180), 0x20000000}, 0x20) 4.541093081s ago: executing program 1: socket$packet(0x11, 0x2, 0x300) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000000)='mnt/encrypted_dir\x00', 0x44080, &(0x7f0000000080)={[], [{@smackfshat={'smackfshat', 0x3d, ',\"\x94m\x8d\xae\xf8\xd1u\xcf\xd6-H\x9c\x85AV'}}, {@smackfshat={'smackfshat', 0x3d, '?:\x9f\xe3\x1ej!\x18\t\n\v\f\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&\'()*+,-./0123456789:;<=>?@'}}]}, 0x0, 0x236, &(0x7f0000000300)="$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") write$cgroup_int(r1, &(0x7f0000000200), 0xf000) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) mbind(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, &(0x7f0000000100), 0x3ff, 0x9) 3.194863445s ago: executing program 0: socket$unix(0x1, 0x1, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$KDSKBLED(0xffffffffffffffff, 0x5450, 0x0) 1.982298721s ago: executing program 1: sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000100)="f297c0eccf859705acf9834f5b4b6039b63eac610b", 0x15}, {&(0x7f0000001400)="c98812c1be8a", 0x6}, {&(0x7f00000012c0)="406f2bef596a8a3130012ee7bf", 0xd}, {&(0x7f0000001300)="7f5549f794326461", 0x8}], 0x4}, 0x0) 1.476702899s ago: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ppoll(&(0x7f0000000400)=[{r1}], 0x1, &(0x7f0000000440)={0x0, 0x989680}, 0x0, 0x0) 1.111580029s ago: executing program 1: socket$l2tp(0x2, 0x2, 0x73) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r0 = userfaultfd(0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) r1 = io_uring_setup(0x3eae, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000080)={&(0x7f0000c15000/0x1000)=nil, &(0x7f0000508000/0x4000)=nil, 0x1000}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8) 603.561017ms ago: executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x75, 0x1a1281) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000040)) 0s ago: executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket(0x10, 0x2, 0x0) openat$cgroup_pressure(r0, 0x0, 0x2, 0x0) kernel console output (not intermixed with test programs): [ 208.287755][ T1369] net_ratelimit: 1 callbacks suppressed [ 208.287955][ T1369] aoe: packet could not be sent on bond0. consider increasing tx_queue_len [ 208.292197][ T1369] aoe: packet could not be sent on teql0. consider increasing tx_queue_len [ 208.304624][ T1369] aoe: packet could not be sent on tunl0. consider increasing tx_queue_len [ 208.305723][ T1369] aoe: packet could not be sent on gre0. consider increasing tx_queue_len [ 208.306659][ T1369] aoe: packet could not be sent on gretap0. consider increasing tx_queue_len [ 208.307536][ T1369] aoe: packet could not be sent on erspan0. consider increasing tx_queue_len [ 208.308499][ T1369] aoe: packet could not be sent on ip_vti0. consider increasing tx_queue_len [ 208.309476][ T1369] aoe: packet could not be sent on ip6_vti0. consider increasing tx_queue_len [ 208.310439][ T1369] aoe: packet could not be sent on sit0. consider increasing tx_queue_len [ 208.311346][ T1369] aoe: packet could not be sent on ip6tnl0. consider increasing tx_queue_len Warning: Permanently added '[localhost]:15163' (ED25519) to the list of known hosts. [ 224.451623][ T30] audit: type=1400 audit(223.990:58): avc: denied { name_bind } for pid=3191 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 225.173221][ T30] audit: type=1400 audit(224.710:59): avc: denied { execute } for pid=3193 comm="sh" name="syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 225.182791][ T30] audit: type=1400 audit(224.720:60): avc: denied { execute_no_trans } for pid=3193 comm="sh" path="/syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:03:51 fuzzer started [ 235.878936][ T30] audit: type=1400 audit(235.420:61): avc: denied { node_bind } for pid=3193 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 236.004613][ T30] audit: type=1400 audit(235.540:62): avc: denied { name_bind } for pid=3193 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 1970/01/01 00:03:55 dialing manager at localhost:30002 [ 238.137839][ T30] audit: type=1400 audit(237.660:63): avc: denied { mounton } for pid=3205 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 238.160153][ T30] audit: type=1400 audit(237.680:64): avc: denied { mount } for pid=3205 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 238.227252][ T30] audit: type=1400 audit(237.760:65): avc: denied { setattr } for pid=3204 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 238.371800][ T30] audit: type=1400 audit(237.910:66): avc: denied { mounton } for pid=3203 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 238.405228][ T30] audit: type=1400 audit(237.940:67): avc: denied { mount } for pid=3203 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 238.454765][ T3203] cgroup: Unknown subsys name 'net' [ 238.489720][ T30] audit: type=1400 audit(238.030:68): avc: denied { unmount } for pid=3203 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 238.990096][ T3203] cgroup: Unknown subsys name 'rlimit' [ 239.021233][ T3211] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 239.030711][ T30] audit: type=1400 audit(238.570:69): avc: denied { relabelto } for pid=3211 comm="mkswap" name="swap-file" dev="vda" ino=1738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 239.041474][ T30] audit: type=1400 audit(238.580:70): avc: denied { write } for pid=3211 comm="mkswap" path="/swap-file" dev="vda" ino=1738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 239.209681][ T3206] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:03:58 starting 2 executor processes [ 247.219677][ T3217] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 247.380608][ T3217] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 247.412794][ T3216] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 247.580928][ T3216] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 251.744520][ T3217] hsr_slave_0: entered promiscuous mode [ 251.791405][ T3217] hsr_slave_1: entered promiscuous mode [ 252.352686][ T3216] hsr_slave_0: entered promiscuous mode [ 252.458102][ T3216] hsr_slave_1: entered promiscuous mode [ 252.506370][ T3216] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 252.509148][ T3216] Cannot create hsr debugfs directory [ 254.517192][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 254.517665][ T30] audit: type=1400 audit(254.060:81): avc: denied { create } for pid=3217 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 254.538559][ T30] audit: type=1400 audit(254.070:82): avc: denied { write } for pid=3217 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 254.555134][ T30] audit: type=1400 audit(254.090:83): avc: denied { read } for pid=3217 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 254.612743][ T3217] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 254.681047][ T3217] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 254.737417][ T3217] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 254.775634][ T3217] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 255.299873][ T3216] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 255.369459][ T3216] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 255.480622][ T3216] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 255.540821][ T3216] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 258.238429][ T3217] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.352493][ T3216] 8021q: adding VLAN 0 to HW filter on device bond0 [ 269.322724][ T3217] veth0_vlan: entered promiscuous mode [ 269.540994][ T3216] veth0_vlan: entered promiscuous mode [ 269.586955][ T3217] veth1_vlan: entered promiscuous mode [ 269.831905][ T3216] veth1_vlan: entered promiscuous mode [ 270.376293][ T3217] veth0_macvtap: entered promiscuous mode [ 270.522960][ T3217] veth1_macvtap: entered promiscuous mode [ 270.691930][ T3216] veth0_macvtap: entered promiscuous mode [ 270.770084][ T3216] veth1_macvtap: entered promiscuous mode [ 271.379852][ T3217] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.395774][ T3217] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.396672][ T3217] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.397443][ T3217] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.492408][ T3216] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.493091][ T3216] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.505293][ T3216] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.505916][ T3216] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 272.209839][ T30] audit: type=1400 audit(271.740:84): avc: denied { mounton } for pid=3217 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 272.320191][ T30] audit: type=1400 audit(271.850:85): avc: denied { mount } for pid=3217 comm="syz-executor.1" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 273.264812][ T30] audit: type=1400 audit(272.800:86): avc: denied { read write } for pid=3216 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 273.276611][ T30] audit: type=1400 audit(272.810:87): avc: denied { open } for pid=3216 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 273.278161][ T30] audit: type=1400 audit(272.810:88): avc: denied { ioctl } for pid=3216 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 274.105024][ T30] audit: type=1400 audit(273.640:89): avc: denied { create } for pid=3352 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 274.147169][ T30] audit: type=1400 audit(273.680:90): avc: denied { write } for pid=3352 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 276.955461][ T30] audit: type=1400 audit(276.470:91): avc: denied { prog_load } for pid=3359 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 276.957033][ T30] audit: type=1400 audit(276.470:92): avc: denied { bpf } for pid=3359 comm="syz-executor.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 276.969603][ T30] audit: type=1400 audit(276.510:93): avc: denied { create } for pid=3359 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 279.745893][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 279.746091][ T30] audit: type=1400 audit(279.280:95): avc: denied { perfmon } for pid=3361 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 291.958479][ T30] audit: type=1400 audit(281.320:96): avc: denied { write } for pid=3359 comm="syz-executor.1" laddr=::1 lport=7 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 293.726878][ T30] audit: type=1400 audit(293.260:97): avc: denied { setopt } for pid=3367 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 296.031669][ T30] audit: type=1400 audit(295.570:98): avc: denied { create } for pid=3374 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 296.121043][ T30] audit: type=1400 audit(295.660:99): avc: denied { getopt } for pid=3374 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 296.582897][ T30] audit: type=1400 audit(296.120:100): avc: denied { read write } for pid=3378 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 296.603164][ T30] audit: type=1400 audit(296.130:101): avc: denied { open } for pid=3378 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 297.409895][ T30] audit: type=1400 audit(296.950:102): avc: denied { map_create } for pid=3380 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 297.452638][ T30] audit: type=1400 audit(296.990:103): avc: denied { map_read map_write } for pid=3380 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 298.278600][ T30] audit: type=1400 audit(297.820:104): avc: denied { create } for pid=3385 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 298.302036][ T30] audit: type=1400 audit(297.840:105): avc: denied { bind } for pid=3385 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 298.342281][ T30] audit: type=1400 audit(297.880:106): avc: denied { accept } for pid=3385 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 298.371615][ T30] audit: type=1400 audit(297.910:107): avc: denied { write } for pid=3385 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 304.472872][ T3410] fuse: Unknown parameter 'grou00000000000000000000' [ 306.901120][ T30] audit: type=1400 audit(306.440:108): avc: denied { read } for pid=3416 comm="syz-executor.0" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 306.937525][ T30] audit: type=1400 audit(306.470:109): avc: denied { open } for pid=3416 comm="syz-executor.0" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 307.023054][ T30] audit: type=1400 audit(306.550:110): avc: denied { ioctl } for pid=3416 comm="syz-executor.0" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 307.042726][ T3417] binder: 3416:3417 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 307.927480][ T3420] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 307.929593][ T30] audit: type=1400 audit(307.470:111): avc: denied { setopt } for pid=3419 comm="syz-executor.0" lport=206 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 309.017075][ T30] audit: type=1400 audit(308.150:112): avc: denied { read } for pid=3414 comm="syz-executor.1" name="card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 309.022390][ T30] audit: type=1400 audit(308.160:113): avc: denied { open } for pid=3414 comm="syz-executor.1" path="/dev/dri/card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 309.409584][ T30] audit: type=1400 audit(308.380:114): avc: denied { ioctl } for pid=3414 comm="syz-executor.1" path="/dev/dri/card1" dev="devtmpfs" ino=620 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 311.012802][ T30] audit: type=1400 audit(310.550:115): avc: denied { mounton } for pid=3422 comm="syz-executor.0" path="/syzkaller-testdir3410210172/syzkaller.mhL7OT/16/file0" dev="vda" ino=1753 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 311.029460][ T3423] fuse: Unknown parameter 'grou00000000000000000000' [ 316.531910][ T30] audit: type=1400 audit(316.070:116): avc: denied { read } for pid=3431 comm="syz-executor.1" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 316.533272][ T30] audit: type=1400 audit(316.070:117): avc: denied { open } for pid=3431 comm="syz-executor.1" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 316.591207][ T30] audit: type=1400 audit(316.130:118): avc: denied { ioctl } for pid=3431 comm="syz-executor.1" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 317.660108][ T3434] fuse: Unknown parameter 'grou00000000000000000000' [ 319.868623][ T30] audit: type=1400 audit(319.400:119): avc: denied { name_bind } for pid=3442 comm="syz-executor.0" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 323.347173][ T3449] fuse: Unknown parameter 'group_i00000000000000000000' [ 324.773086][ T3452] RDS: rds_bind could not find a transport for ff::, load rds_tcp or rds_rdma? [ 325.085649][ T30] audit: type=1400 audit(324.300:120): avc: denied { bind } for pid=3444 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 332.782352][ T30] audit: type=1400 audit(332.320:121): avc: denied { read write } for pid=3459 comm="syz-executor.1" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 332.872045][ T30] audit: type=1400 audit(332.410:122): avc: denied { open } for pid=3459 comm="syz-executor.1" path="/dev/raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 333.036815][ T30] audit: type=1400 audit(332.570:123): avc: denied { ioctl } for pid=3459 comm="syz-executor.1" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 333.041404][ T3460] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 333.045722][ T3460] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 333.519893][ T3462] fuse: Unknown parameter 'group_i00000000000000000000' [ 336.876797][ T30] audit: type=1400 audit(336.410:124): avc: denied { bind } for pid=3470 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 339.446232][ T3476] fuse: Unknown parameter 'group_i00000000000000000000' [ 355.007579][ T30] audit: type=1400 audit(354.540:125): avc: denied { create } for pid=3525 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 355.019025][ T30] audit: type=1400 audit(354.560:126): avc: denied { write } for pid=3525 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 355.020558][ T30] audit: type=1400 audit(354.560:127): avc: denied { connect } for pid=3525 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 355.021808][ T30] audit: type=1400 audit(354.560:128): avc: denied { name_connect } for pid=3525 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 355.647153][ T30] audit: type=1400 audit(355.180:129): avc: denied { shutdown } for pid=3525 comm="syz-executor.0" lport=52234 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 370.419760][ T30] audit: type=1400 audit(369.960:130): avc: denied { prog_run } for pid=3543 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 372.404201][ C0] net_ratelimit: 1 callbacks suppressed [ 372.404412][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 376.931985][ T30] audit: type=1400 audit(376.470:131): avc: denied { setopt } for pid=3558 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 382.242707][ T30] audit: type=1400 audit(381.780:132): avc: denied { create } for pid=3578 comm="syz-executor.1" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 382.295541][ T30] audit: type=1400 audit(381.830:133): avc: denied { map } for pid=3578 comm="syz-executor.1" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4058 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 382.297624][ T30] audit: type=1400 audit(381.830:134): avc: denied { read write } for pid=3578 comm="syz-executor.1" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4058 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 385.474110][ C1] hrtimer: interrupt took 679344 ns [ 395.813079][ T30] audit: type=1400 audit(395.320:135): avc: denied { create } for pid=3596 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 395.893129][ T30] audit: type=1400 audit(395.430:136): avc: denied { ioctl } for pid=3596 comm="syz-executor.0" path="socket:[4695]" dev="sockfs" ino=4695 ioctlcmd=0x8b04 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 396.695697][ T30] audit: type=1400 audit(396.230:137): avc: denied { setopt } for pid=3599 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 396.725050][ T30] audit: type=1400 audit(396.250:138): avc: denied { bind } for pid=3599 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 396.732153][ T30] audit: type=1400 audit(396.270:139): avc: denied { name_bind } for pid=3599 comm="syz-executor.0" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 396.740651][ T30] audit: type=1400 audit(396.270:140): avc: denied { node_bind } for pid=3599 comm="syz-executor.0" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 396.742247][ T30] audit: type=1400 audit(396.280:141): avc: denied { name_connect } for pid=3599 comm="syz-executor.0" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 397.389538][ T30] audit: type=1400 audit(396.930:142): avc: denied { bind } for pid=3598 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 397.454829][ T30] audit: type=1400 audit(396.990:143): avc: denied { setopt } for pid=3598 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 400.580234][ T3608] fuse: Bad value for 'fd' [ 400.600553][ T30] audit: type=1400 audit(400.120:144): avc: denied { mount } for pid=3605 comm="syz-executor.0" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 401.774865][ T30] audit: type=1400 audit(401.300:145): avc: denied { unmount } for pid=3216 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 406.588811][ T3623] fuse: Bad value for 'fd' [ 409.147129][ T3628] pim6reg1: entered promiscuous mode [ 409.149225][ T3628] pim6reg1: entered allmulticast mode [ 412.727487][ T3638] fuse: Bad value for 'fd' [ 415.767713][ T3649] fuse: Bad value for 'fd' [ 416.369792][ T104] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 416.709294][ T104] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 417.008186][ T104] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 417.376184][ T104] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.311622][ T30] audit: type=1400 audit(417.850:146): avc: denied { read } for pid=3046 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 419.175796][ T3664] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 419.179598][ T3664] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 421.581735][ T3667] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 421.595510][ T3667] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 423.112240][ T104] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 423.238344][ T104] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 423.385945][ T104] bond0 (unregistering): Released all slaves [ 424.276235][ T104] hsr_slave_0: left promiscuous mode [ 424.336376][ T30] audit: type=1400 audit(423.870:147): avc: denied { create } for pid=3668 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 424.370693][ T104] hsr_slave_1: left promiscuous mode [ 424.375850][ T30] audit: type=1400 audit(423.910:148): avc: denied { listen } for pid=3668 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 424.438885][ T30] audit: type=1400 audit(423.970:149): avc: denied { connect } for pid=3668 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 424.590444][ T30] audit: type=1400 audit(424.120:150): avc: denied { accept } for pid=3668 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 424.720463][ T30] audit: type=1400 audit(424.260:151): avc: denied { create } for pid=3668 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 424.738571][ T104] veth1_macvtap: left promiscuous mode [ 424.741923][ T104] veth0_macvtap: left promiscuous mode [ 424.755802][ T104] veth1_vlan: left promiscuous mode [ 424.763145][ T30] audit: type=1400 audit(424.300:152): avc: denied { write } for pid=3668 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 424.765673][ T104] veth0_vlan: left promiscuous mode [ 424.807369][ T30] audit: type=1400 audit(424.320:153): avc: denied { nlmsg_read } for pid=3668 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 429.768916][ T30] audit: type=1400 audit(429.310:154): avc: denied { write } for pid=3686 comm="syz-executor.1" name="tcp" dev="proc" ino=4026532745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 429.943110][ T3687] loop1: detected capacity change from 0 to 1024 [ 430.052812][ T3687] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 430.086555][ T3687] EXT4-fs (loop1): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 430.137636][ T3687] EXT4-fs (loop1): revision level too high, forcing read-only mode [ 430.183278][ T3687] EXT4-fs (loop1): orphan cleanup on readonly fs [ 430.218197][ T3687] EXT4-fs error (device loop1): ext4_free_blocks:6589: comm syz-executor.1: Freeing blocks not in datazone - block = 0, count = 4096 [ 430.286093][ T3687] EXT4-fs (loop1): Remounting filesystem read-only [ 430.292251][ T3687] EXT4-fs (loop1): 1 orphan inode deleted [ 430.333131][ T3687] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 430.348076][ T3687] SELinux: (dev loop1, type ext4) getxattr errno 5 [ 430.481163][ T3687] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 430.499207][ T30] audit: type=1400 audit(430.030:155): avc: denied { read } for pid=3001 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 430.518425][ T30] audit: type=1400 audit(430.040:156): avc: denied { append } for pid=3001 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 430.520225][ T30] audit: type=1400 audit(430.050:157): avc: denied { open } for pid=3001 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 430.547682][ T30] audit: type=1400 audit(430.070:158): avc: denied { getattr } for pid=3001 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 434.225037][ T3694] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 438.490274][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 442.081445][ T3734] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 442.090300][ T3734] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 444.048051][ T3650] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 444.160524][ T3650] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 446.396592][ T3752] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 446.405555][ T30] audit: type=1400 audit(445.940:159): avc: denied { getopt } for pid=3750 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 448.045720][ T30] audit: type=1400 audit(447.560:160): avc: denied { ioctl } for pid=3757 comm="syz-executor.1" path="socket:[4961]" dev="sockfs" ino=4961 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 450.269497][ T3771] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 450.272788][ T3771] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 451.191821][ T3650] hsr_slave_0: entered promiscuous mode [ 451.239471][ T3650] hsr_slave_1: entered promiscuous mode [ 451.305869][ T3650] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 451.307030][ T3650] Cannot create hsr debugfs directory [ 453.395986][ T30] audit: type=1400 audit(452.930:161): avc: denied { read } for pid=3778 comm="syz-executor.1" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 453.398275][ T30] audit: type=1400 audit(452.930:162): avc: denied { open } for pid=3778 comm="syz-executor.1" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 453.427766][ T30] audit: type=1400 audit(452.970:163): avc: denied { ioctl } for pid=3778 comm="syz-executor.1" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x700b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 455.075374][ T3786] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 455.077566][ T3786] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 455.436903][ T3650] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 455.474995][ T3650] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 455.496115][ T3650] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 455.532858][ T3650] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 460.937604][ T3650] 8021q: adding VLAN 0 to HW filter on device bond0 [ 463.048518][ T30] audit: type=1400 audit(462.590:164): avc: denied { wake_alarm } for pid=3813 comm="syz-executor.1" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 475.869505][ T30] audit: type=1400 audit(475.410:165): avc: denied { create } for pid=3852 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 477.803049][ T3861] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 477.889187][ T3861] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 483.249670][ T3882] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 483.253143][ T3882] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 487.436077][ T3650] veth0_vlan: entered promiscuous mode [ 487.581364][ T3650] veth1_vlan: entered promiscuous mode [ 488.211253][ T3650] veth0_macvtap: entered promiscuous mode [ 488.408030][ T3650] veth1_macvtap: entered promiscuous mode [ 489.622944][ T3650] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 489.636353][ T3650] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 489.637404][ T3650] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 489.638114][ T3650] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 490.647340][ T30] audit: type=1400 audit(490.170:166): avc: denied { mounton } for pid=3650 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 491.715105][ T30] audit: type=1400 audit(491.250:167): avc: denied { read write } for pid=3902 comm="syz-executor.1" name="vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 491.741007][ T30] audit: type=1400 audit(491.280:168): avc: denied { open } for pid=3902 comm="syz-executor.1" path="/dev/vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 493.625734][ T3909] loop1: detected capacity change from 0 to 128 [ 496.092224][ T30] audit: type=1400 audit(495.620:169): avc: denied { ioctl } for pid=3916 comm="syz-executor.1" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5694 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 497.146442][ T3921] ================================================================== [ 497.147939][ T3921] BUG: KASAN: slab-use-after-free in contpte_clear_young_dirty_ptes+0x104/0x214 [ 497.148599][ T3921] Read of size 8 at addr ffff00000f1c1000 by task syz-executor.1/3921 [ 497.149153][ T3921] [ 497.149937][ T3921] CPU: 1 PID: 3921 Comm: syz-executor.1 Tainted: G W 6.10.0-rc1-syzkaller-00027-g4a4be1ad3a6e #0 [ 497.150865][ T3921] Hardware name: linux,dummy-virt (DT) [ 497.152002][ T3921] Call trace: [ 497.152808][ T3921] dump_backtrace+0x9c/0x11c [ 497.153305][ T3921] show_stack+0x18/0x24 [ 497.153803][ T3921] dump_stack_lvl+0xa4/0xf4 [ 497.154191][ T3921] print_report+0xf4/0x5a4 [ 497.154679][ T3921] kasan_report+0xc8/0x108 [ 497.155069][ T3921] __asan_report_load8_noabort+0x20/0x2c [ 497.155512][ T3921] contpte_clear_young_dirty_ptes+0x104/0x214 [ 497.155943][ T3921] madvise_free_pte_range+0xce8/0x10e0 [ 497.156500][ T3921] walk_pgd_range+0x8e8/0x14a4 [ 497.156911][ T3921] __walk_page_range+0x420/0x5e4 [ 497.157370][ T3921] walk_page_range+0x370/0x6f8 [ 497.158022][ T3921] madvise_free_single_vma+0x300/0x5a8 [ 497.158530][ T3921] madvise_vma_behavior+0x30c/0x1028 [ 497.158997][ T3921] madvise_walk_vmas+0x114/0x210 [ 497.159526][ T3921] do_madvise+0x20c/0x6c4 [ 497.159979][ T3921] __arm64_sys_madvise+0x88/0xdc [ 497.160399][ T3921] invoke_syscall+0x6c/0x25c [ 497.160799][ T3921] el0_svc_common.constprop.0+0xac/0x230 [ 497.161342][ T3921] do_el0_svc+0x40/0x58 [ 497.161854][ T3921] el0_svc+0x50/0x180 [ 497.162255][ T3921] el0t_64_sync_handler+0x100/0x12c [ 497.162681][ T3921] el0t_64_sync+0x190/0x194 [ 497.163295][ T3921] [ 497.163715][ T3921] Allocated by task 3349: [ 497.164461][ T3921] kasan_save_stack+0x3c/0x64 [ 497.164962][ T3921] kasan_save_track+0x20/0x3c [ 497.165356][ T3921] kasan_save_alloc_info+0x40/0x54 [ 497.165831][ T3921] __kasan_slab_alloc+0x8c/0x90 [ 497.166339][ T3921] kmem_cache_alloc_node_noprof+0x148/0x308 [ 497.166792][ T3921] __alloc_skb+0x208/0x2f0 [ 497.167303][ T3921] nsim_dev_trap_report_work+0x1ec/0xa40 [ 497.167737][ T3921] process_one_work+0x7bc/0x18a0 [ 497.168349][ T3921] worker_thread+0x764/0xc24 [ 497.168819][ T3921] kthread+0x27c/0x300 [ 497.169257][ T3921] ret_from_fork+0x10/0x20 [ 497.169756][ T3921] [ 497.170120][ T3921] Freed by task 3349: [ 497.170506][ T3921] kasan_save_stack+0x3c/0x64 [ 497.171117][ T3921] kasan_save_track+0x20/0x3c [ 497.171643][ T3921] kasan_save_free_info+0x4c/0x74 [ 497.172052][ T3921] poison_slab_object+0x114/0x15c [ 497.172522][ T3921] __kasan_slab_free+0x1c/0x44 [ 497.172902][ T3921] kmem_cache_free+0x124/0x46c [ 497.173338][ T3921] kfree_skbmem+0x118/0x1b0 [ 497.173781][ T3921] consume_skb+0xb4/0x14c [ 497.174196][ T3921] nsim_dev_trap_report_work+0x6a0/0xa40 [ 497.174615][ T3921] process_one_work+0x7bc/0x18a0 [ 497.175011][ T3921] worker_thread+0x764/0xc24 [ 497.175376][ T3921] kthread+0x27c/0x300 [ 497.175729][ T3921] ret_from_fork+0x10/0x20 [ 497.176130][ T3921] [ 497.176514][ T3921] The buggy address belongs to the object at ffff00000f1c1000 [ 497.176514][ T3921] which belongs to the cache skbuff_head_cache of size 232 [ 497.177306][ T3921] The buggy address is located 0 bytes inside of [ 497.177306][ T3921] freed 232-byte region [ffff00000f1c1000, ffff00000f1c10e8) [ 497.177963][ T3921] [ 497.178338][ T3921] The buggy address belongs to the physical page: [ 497.179090][ T3921] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff00000f1c1140 pfn:0x4f1c1 [ 497.180022][ T3921] anon flags: 0x1ffc00000000000(node=0|zone=0|lastcpupid=0x7ff) [ 497.181063][ T3921] page_type: 0xffffefff(slab) [ 497.182088][ T3921] raw: 01ffc00000000000 ffff00000a995780 0000000000000000 dead000000000001 [ 497.182609][ T3921] raw: ffff00000f1c1140 00000000000c0003 00000001ffffefff 0000000000000000 [ 497.183230][ T3921] page dumped because: kasan: bad access detected [ 497.183807][ T3921] [ 497.184106][ T3921] Memory state around the buggy address: [ 497.185361][ T3921] ffff00000f1c0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 497.185919][ T3921] ffff00000f1c0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 497.186552][ T3921] >ffff00000f1c1000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 497.187138][ T3921] ^ [ 497.187627][ T3921] ffff00000f1c1080: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc [ 497.188197][ T3921] ffff00000f1c1100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 497.188996][ T3921] ================================================================== [ 497.192213][ T3921] Disabling lock debugging due to kernel taint [ 497.228919][ T3005] Unable to handle kernel paging request at virtual address 007f00000f1c18f0 [ 497.229816][ T3005] Mem abort info: [ 497.230228][ T3005] ESR = 0x0000000096000004 [ 497.230716][ T3005] EC = 0x25: DABT (current EL), IL = 32 bits [ 497.231170][ T3005] SET = 0, FnV = 0 [ 497.231576][ T3005] EA = 0, S1PTW = 0 [ 497.231978][ T3005] FSC = 0x04: level 0 translation fault [ 497.232479][ T3005] Data abort info: [ 497.232975][ T3005] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 497.233411][ T3005] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 497.234476][ C0] Unable to handle kernel paging request at virtual address 007f00000f1c18f0 [ 497.235296][ C0] Mem abort info: [ 497.235653][ C0] ESR = 0x0000000096000004 [ 497.236020][ C0] EC = 0x25: DABT (current EL), IL = 32 bits [ 497.236448][ C0] SET = 0, FnV = 0 [ 497.236835][ C0] EA = 0, S1PTW = 0 [ 497.237221][ C0] FSC = 0x04: level 0 translation fault [ 497.237623][ C0] Data abort info: [ 497.237955][ C0] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 497.238363][ C0] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 497.238847][ C0] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 497.239420][ C0] [007f00000f1c18f0] address between user and kernel address ranges [ 497.240375][ C0] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP [ 497.241089][ C0] Modules linked in: [ 497.241557][ C0] CPU: 0 PID: 3005 Comm: klogd Tainted: G B W 6.10.0-rc1-syzkaller-00027-g4a4be1ad3a6e #0 [ 497.242090][ C0] Hardware name: linux,dummy-virt (DT) [ 497.242442][ C0] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 497.242891][ C0] pc : kmem_cache_alloc_node_noprof+0xec/0x308 [ 497.243357][ C0] lr : kmem_cache_alloc_node_noprof+0x7c/0x308 [ 497.244287][ C0] sp : ffff8000800078b0 [ 497.244692][ C0] x29: ffff8000800078b0 x28: dfff800000000000 x27: 0000000000000000 [ 497.245427][ C0] x26: ffff800083f8f070 x25: 00000000000000e8 x24: ffff800083f8f070 [ 497.246079][ C0] x23: ffff80008682d000 x22: 00000000ffffffff x21: ff7f00000f1c1880 [ 497.246786][ C0] x20: 0000000000002820 x19: ffff00000a995780 x18: 0000000000000000 [ 497.247459][ C0] x17: ffff7fffe3e87000 x16: ffff800080000000 x15: 00004c4b40000000 [ 497.248471][ C0] x14: 0000000000000000 x13: 0000000000000006 x12: 000000000000f1f1 [ 497.249310][ C0] x11: dfff800000000000 x10: 00000000f3000000 x9 : 00000000f201f1f1 [ 497.250016][ C0] x8 : 0000000000000000 x7 : 1ffff00010d0098c x6 : 1fffe0000296e781 [ 497.250716][ C0] x5 : dfff800000000000 x4 : ffff000014b73c08 x3 : 00000000000363e0 [ 497.251389][ C0] x2 : 0000000000000070 x1 : ff7f00000f1c1880 x0 : ffff00000a995780 [ 497.252071][ C0] Call trace: [ 497.252391][ C0] kmem_cache_alloc_node_noprof+0xec/0x308 [ 497.252862][ C0] __alloc_skb+0x208/0x2f0 [ 497.253286][ C0] __tcp_send_ack.part.0+0x64/0x624 [ 497.253883][ C0] tcp_send_ack+0x78/0x98 [ 497.254531][ C0] tcp_delack_timer_handler+0x244/0x414 [ 497.254948][ C0] tcp_delack_timer+0x74/0x2b0 [ 497.255483][ C0] call_timer_fn+0x1c8/0x7d8 [ 497.255869][ C0] __run_timers+0x6b4/0x97c [ 497.256589][ C0] run_timer_base+0x110/0x180 [ 497.257209][ C0] run_timer_softirq+0x1c/0x44 [ 497.257689][ C0] handle_softirqs+0x2f0/0xd80 [ 497.258106][ C0] __do_softirq+0x14/0x20 [ 497.258457][ C0] ____do_softirq+0x10/0x1c [ 497.258918][ C0] call_on_irq_stack+0x24/0x4c [ 497.259618][ C0] do_softirq_own_stack+0x1c/0x2c [ 497.260119][ C0] __irq_exit_rcu+0x334/0x434 [ 497.260510][ C0] irq_exit_rcu+0x14/0x80 [ 497.260871][ C0] el1_interrupt+0x38/0x54 [ 497.261680][ C0] el1h_64_irq_handler+0x18/0x24 [ 497.262179][ C0] el1h_64_irq+0x64/0x68 [ 497.262558][ C0] vprintk_store+0x560/0x828 [ 497.262927][ C0] vprintk_emit+0x88/0x434 [ 497.263278][ C0] vprintk_default+0x38/0x44 [ 497.263744][ C0] vprintk+0x17c/0x1bc [ 497.264219][ C0] _printk+0xa8/0xe0 [ 497.264622][ C0] die_kernel_fault+0x560/0x6e8 [ 497.265223][ C0] __do_kernel_fault+0x22c/0x25c [ 497.265753][ C0] do_translation_fault+0x170/0x1e8 [ 497.266607][ C0] do_mem_abort+0x68/0x1a4 [ 497.267058][ C0] el1_abort+0x3c/0x5c [ 497.267566][ C0] el1h_64_sync_handler+0xdc/0xe8 [ 497.268018][ C0] el1h_64_sync+0x64/0x68 [ 497.268401][ C0] kmem_cache_alloc_node_noprof+0xec/0x308 [ 497.269020][ C0] __alloc_skb+0x208/0x2f0 [ 497.269503][ C0] alloc_skb_with_frags+0xb4/0x520 [ 497.270053][ C0] sock_alloc_send_pskb+0x5e4/0x704 [ 497.270478][ C0] unix_dgram_sendmsg+0x2d4/0x129c [ 497.270921][ C0] __sock_sendmsg+0xc8/0x168 [ 497.271466][ C0] __sys_sendto+0x1a8/0x254 [ 497.271865][ C0] __arm64_sys_sendto+0xc0/0x134 [ 497.272279][ C0] invoke_syscall+0x6c/0x25c [ 497.272694][ C0] el0_svc_common.constprop.0+0xac/0x230 [ 497.273128][ C0] do_el0_svc+0x40/0x58 [ 497.273720][ C0] el0_svc+0x50/0x180 [ 497.274123][ C0] el0t_64_sync_handler+0x100/0x12c [ 497.274665][ C0] el0t_64_sync+0x190/0x194 [ 497.275710][ C0] Code: 54000de1 b9402a62 aa1503e1 aa1303e0 (f8626abc) [ 497.277384][ C0] ---[ end trace 0000000000000000 ]--- [ 497.278537][ C0] Kernel panic - not syncing: Oops: Fatal exception in interrupt [ 497.280085][ C0] SMP: stopping secondary CPUs [ 497.281788][ C0] Kernel Offset: disabled [ 497.282497][ C0] CPU features: 0x04,40001001,a0100000,0200421b [ 497.284028][ C0] Memory Limit: none [ 497.285331][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 23:48:38 Registers: info registers vcpu 0 CPU#0 PC=ffff800084efede8 X00=ffff80008d7e7fe0 X01=ffff800084efe44c X02=0000000000002820 X03=ffff80008001077c X04=0000000039a86685 X05=0000000000000102 X06=ffff000014799e00 X07=ffff8000844e78a8 X08=00000000000000d0 X09=ffff0000100fa5e0 X10=ffff700010000d8d X11=1ffff00010000d8d X12=ffff700010000d8e X13=0000000000000006 X14=0000000000000000 X15=1fffe000028f350f X16=0000000000000006 X17=551d3e0150e1d1e2 X18=ffff00001479a880 X19=ffff800080006de0 X20=ffff800080006dd0 X21=0000000000000000 X22=00000000ffffffff X23=ffff80008682d000 X24=ffff800083f81360 X25=0000000000000240 X26=ffff800083f81360 X27=0000000000000000 X28=0000000000000014 X29=ffff800080006c80 X30=ffff8000808830e0 SP=ffff800080006c80 PSTATE=00000005 ---- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=00524f5252450040:0000000000000000 Q05=00524f5252450040:0000000000000000 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffec101310:0000ffffec101310 Q17=ffffff80ffffffd0:0000ffffec1012e0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800081980694 X00=0000000000000002 X01=0000000000000000 X02=0000000000000002 X03=dfff800000000000 X04=0000000000000018 X05=1fffe000016cdc2f X06=0000000000000030 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700011d5cd6a X11=1ffff00011d5cd6a X12=ffff700011d5cd6b X13=205d313239335420 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=ffff00000f5fe480 X19=ffff00000b66e080 X20=ffff80008976b018 X21=ffff8000870267e0 X22=0000000000000032 X23=dfff800000000000 X24=ffff80008946ca43 X25=0000000000000003 X26=dfff800000000000 X27=0000000000000023 X28=ffff00000b66e080 X29=ffff80008eae6b00 X30=ffff800081980920 SP=ffff80008eae6b00 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=2f2f2f2f2f2f2f2f:2f2f2f2f2f2f2f2f Q01=0000000000343931:2f68637461772f76 Q02=c0fcc0fcc0000000:3000000000003000 Q03=0000000000000000:ff0000000000ff00 Q04=3003300330033003:3003300330033003 Q05=bcbcc00030000030:bcbcc00030000030 Q06=c00c000000000000:c00c000000000000 Q07=0000aaaae61fd790:000002da00000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000002000:0000000000000000 Q17=000000000000000b:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000