last executing test programs: 3.160143687s ago: executing program 1 (id=50): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000023c0)='./file0\x00', 0x0, 0x958028, &(0x7f0000000180)={[{@gid={'gid', 0x3d, r1}}]}) r2 = syz_open_procfs(0x0, &(0x7f0000001180)='mountinfo\x00') read$FUSE(r2, &(0x7f0000002780)={0x2020}, 0x7d4) 2.757481448s ago: executing program 1 (id=52): r0 = socket(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000040)="24000000180003041dfffd946f610500020100000005fe060c10880008000f00fff3c00e140000001a00ffffba16a0aa1c091dbfa1090000", 0x38}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000005b80)=[{{0x0, 0x0, 0x0}, 0x2}, {{0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000bc0)=""/187, 0xbb}, {&(0x7f0000000c80)=""/189, 0xbd}, {&(0x7f0000002a80)=""/4080, 0xff0}, {&(0x7f0000000dc0)=""/200, 0xc8}, {&(0x7f0000000ec0)=""/214, 0xd6}], 0x5}, 0x8}], 0x2, 0x20, 0x0) 2.232053565s ago: executing program 0 (id=54): sendmsg$NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, 0x0, 0x8, 0x70bd26, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x7ff, 0x6b}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x8800}, 0x4000) 2.231831635s ago: executing program 1 (id=55): r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@cgroup=r0, 0xffffffffffffffff, 0x20, 0x0, 0x0, @void, @value=0x0}, 0x20) 1.80268922s ago: executing program 0 (id=56): syz_open_dev$usbfs(&(0x7f00000000c0), 0x201, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x541b, 0x0) 1.769457194s ago: executing program 1 (id=57): r0 = socket$inet6_udp(0xa, 0x2, 0x0) sync_file_range(r0, 0x10000, 0x5, 0xc28328e84b9789ad) 1.467409893s ago: executing program 0 (id=58): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000640)={0x0}, 0x1, 0x0, 0x0, 0x20004001}, 0x0) 1.203804176s ago: executing program 1 (id=59): r0 = memfd_create(&(0x7f0000000540)='y\x105\xfb\xf7u\x83%\x1f\xe09@:r\xc2\xb9x0\x90P\x03\x00\x00\x00\x00\x00\x00\x00\xfe,\x1c\xf1\xdd\xcf]\xac\xbc\t\xbb\xfc\xa4j\x9f\xceX\x8f5=\xaa\xd5\xe9n\xab s\xa5\x00\x8d\tV\t\x91\x18\x06O\xb0=D\xda\xb6F\x1a\xc82\x8b\xc0l\xd0\x89d\xe6\xb7\xd8\x97\xb8\xde\xa3\x89\"%/u\x17\xdam\x8d\x01Lh\x1e^\x9ej\x1c\xc5\xf0\xf6\x92\x05\x9aH\x00\'\xd4\x94d[\v\xfc\xad\x0f\xa8\xc5\xad\x001\x8b%\xaa?\x00\x00\x00\x00\x00\x00\x00\nj\x8c\xef\x90\xc0Z\xfa\x1a\xb3\xf0wVq\xe9d\xf8N\x80\xd1g\xd8e\xc8\x16\xad1\x02\xab\xce3\xb2\xb0\xd1\x11\xf0\xc2Gj+kV', 0x2) fcntl$addseals(r0, 0x409, 0x4) ftruncate(r0, 0xfbff) 917.311593ms ago: executing program 0 (id=60): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_LLC_SET_PARAMS(r0, 0x0, 0x10) 666.769425ms ago: executing program 1 (id=61): syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='setgroups\x00') sendmsg$inet(0xffffffffffffffff, 0x0, 0x4051) sendmsg$inet(0xffffffffffffffff, 0x0, 0x20008840) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') 251.062208ms ago: executing program 0 (id=62): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x0, 0x0, 0xff, 0x3}, 0x20) 0s ago: executing program 0 (id=63): r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x4, 0x24, &(0x7f00000000c0)=ANY=[], 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCRMFF(r0, 0xc0085504, &(0x7f0000000080)) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:4687' (ED25519) to the list of known hosts. [ 226.618673][ T30] audit: type=1400 audit(226.130:46): avc: denied { name_bind } for pid=3319 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 227.080941][ T30] audit: type=1400 audit(226.590:47): avc: denied { execute } for pid=3320 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 227.089265][ T30] audit: type=1400 audit(226.600:48): avc: denied { execute_no_trans } for pid=3320 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 235.593684][ T30] audit: type=1400 audit(235.100:49): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 235.644776][ T30] audit: type=1400 audit(235.150:50): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 235.698308][ T3320] cgroup: Unknown subsys name 'net' [ 235.783299][ T30] audit: type=1400 audit(235.290:51): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 236.134064][ T3320] cgroup: Unknown subsys name 'cpuset' [ 236.198381][ T3320] cgroup: Unknown subsys name 'rlimit' [ 236.517087][ T30] audit: type=1400 audit(236.030:52): avc: denied { setattr } for pid=3320 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 236.521274][ T30] audit: type=1400 audit(236.030:53): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 236.530795][ T30] audit: type=1400 audit(236.040:54): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 237.285158][ T3322] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 237.295105][ T30] audit: type=1400 audit(236.800:55): avc: denied { relabelto } for pid=3322 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 237.304533][ T30] audit: type=1400 audit(236.810:56): avc: denied { write } for pid=3322 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 237.444637][ T30] audit: type=1400 audit(236.950:57): avc: denied { read } for pid=3320 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 237.454128][ T30] audit: type=1400 audit(236.960:58): avc: denied { open } for pid=3320 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 237.490698][ T3320] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 260.376240][ T30] audit: type=1400 audit(259.880:59): avc: denied { execmem } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 260.460753][ T30] audit: type=1400 audit(259.970:60): avc: denied { read } for pid=3325 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 260.469205][ T30] audit: type=1400 audit(259.980:61): avc: denied { open } for pid=3325 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 260.487407][ T30] audit: type=1400 audit(260.000:62): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 260.543643][ T30] audit: type=1400 audit(260.050:63): avc: denied { module_request } for pid=3326 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 260.856718][ T30] audit: type=1400 audit(260.360:64): avc: denied { sys_module } for pid=3326 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 268.453863][ T3325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 268.649325][ T3325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 268.837808][ T3326] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 269.135727][ T3326] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 272.276677][ T3325] hsr_slave_0: entered promiscuous mode [ 272.299885][ T3325] hsr_slave_1: entered promiscuous mode [ 273.135814][ T3326] hsr_slave_0: entered promiscuous mode [ 273.148441][ T3326] hsr_slave_1: entered promiscuous mode [ 273.158036][ T3326] debugfs: 'hsr0' already exists in 'hsr' [ 273.161412][ T3326] Cannot create hsr debugfs directory [ 275.728857][ T30] audit: type=1400 audit(275.240:65): avc: denied { create } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 275.750318][ T30] audit: type=1400 audit(275.260:66): avc: denied { write } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 275.773245][ T3325] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 275.773546][ T30] audit: type=1400 audit(275.270:67): avc: denied { read } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 275.838884][ T3325] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 275.887188][ T3325] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 276.021645][ T3325] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 276.458451][ T3326] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 276.488076][ T3326] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 276.556407][ T3326] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 276.626887][ T3326] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 279.169277][ T3325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 279.625431][ T3326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.890605][ T3325] veth0_vlan: entered promiscuous mode [ 291.037161][ T3325] veth1_vlan: entered promiscuous mode [ 291.488981][ T3326] veth0_vlan: entered promiscuous mode [ 291.571029][ T3325] veth0_macvtap: entered promiscuous mode [ 291.681801][ T3325] veth1_macvtap: entered promiscuous mode [ 291.691350][ T3326] veth1_vlan: entered promiscuous mode [ 292.153410][ T3326] veth0_macvtap: entered promiscuous mode [ 292.281853][ T1139] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.289352][ T1139] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.329910][ T3326] veth1_macvtap: entered promiscuous mode [ 292.354631][ T1139] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.355821][ T1139] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.185660][ T30] audit: type=1400 audit(292.690:68): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 293.227529][ T30] audit: type=1400 audit(292.740:69): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzkaller.xcZgTg/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 293.259193][ T30] audit: type=1400 audit(292.770:70): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 293.319753][ T30] audit: type=1400 audit(292.830:71): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzkaller.xcZgTg/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 293.381669][ T30] audit: type=1400 audit(292.870:72): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzkaller.xcZgTg/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3836 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 293.420938][ T1139] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.422083][ T1139] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.424816][ T1139] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.425167][ T1139] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.457315][ T30] audit: type=1400 audit(292.960:73): avc: denied { unmount } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 293.487999][ T30] audit: type=1400 audit(293.000:74): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 293.553769][ T30] audit: type=1400 audit(293.060:75): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="gadgetfs" ino=3838 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 293.634126][ T30] audit: type=1400 audit(293.140:76): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 293.712834][ T30] audit: type=1400 audit(293.180:77): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 294.167298][ T3325] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 296.709506][ T3474] netlink: 156 bytes leftover after parsing attributes in process `syz.0.1'. [ 298.367691][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 298.369285][ T30] audit: type=1400 audit(297.880:90): avc: denied { create } for pid=3482 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 298.385043][ T3483] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 298.398348][ T30] audit: type=1400 audit(297.910:91): avc: denied { getopt } for pid=3482 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 298.706020][ T30] audit: type=1400 audit(298.200:92): avc: denied { bind } for pid=3484 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 298.725387][ T30] audit: type=1400 audit(298.240:93): avc: denied { setopt } for pid=3484 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 299.104895][ T3486] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 299.418393][ T3486] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 299.749564][ T3486] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 299.917256][ T30] audit: type=1400 audit(299.430:94): avc: denied { ioctl } for pid=3484 comm="syz.1.7" path="socket:[3872]" dev="sockfs" ino=3872 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 300.318793][ T3491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3491 comm=syz.0.8 [ 300.429152][ T3486] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 302.209727][ T1139] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.647349][ T2152] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.979398][ T1139] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 303.371442][ T1139] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 306.464032][ T3507] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3507 comm=syz.1.13 [ 307.870291][ T3510] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 310.657141][ T3512] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.074780][ T3512] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.125672][ T30] audit: type=1400 audit(310.640:95): avc: denied { name_bind } for pid=3498 comm="syz.0.10" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 311.557920][ T3512] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 312.160054][ T3512] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 312.236354][ T30] audit: type=1400 audit(311.730:96): avc: denied { prog_run } for pid=3498 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 316.174830][ T1139] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 316.400781][ T1139] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 316.666143][ T1139] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 317.098727][ T1139] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.193988][ T3530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3530 comm=syz.0.18 [ 319.079799][ T30] audit: type=1400 audit(318.590:97): avc: denied { allowed } for pid=3534 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 319.178840][ T30] audit: type=1400 audit(318.690:98): avc: denied { create } for pid=3534 comm="syz.0.21" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 319.220321][ T30] audit: type=1400 audit(318.730:99): avc: denied { create } for pid=3534 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 319.260911][ T30] audit: type=1400 audit(318.770:100): avc: denied { connect } for pid=3534 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 319.801568][ T30] audit: type=1400 audit(319.310:101): avc: denied { setopt } for pid=3534 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 321.039619][ T3544] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 321.358907][ T3544] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 321.695914][ T3544] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.217114][ T3544] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.057087][ T26] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 323.146415][ T2152] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 323.280944][ T1139] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 323.728054][ T1139] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 323.906526][ T3553] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3553 comm=syz.1.25 [ 324.566602][ T30] audit: type=1400 audit(324.070:102): avc: denied { name_bind } for pid=3555 comm="syz.0.26" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 325.539744][ T30] audit: type=1326 audit(325.050:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.0.29" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbd75b9e8 code=0x7ffc0000 [ 325.568484][ T30] audit: type=1326 audit(325.080:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.0.29" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbd75b9e8 code=0x7ffc0000 [ 325.569136][ T30] audit: type=1326 audit(325.080:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.0.29" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbd75b9e8 code=0x7ffc0000 [ 325.569573][ T30] audit: type=1326 audit(325.080:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.0.29" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbd75b9e8 code=0x7ffc0000 [ 325.574598][ T30] audit: type=1326 audit(325.080:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.0.29" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbd75b9e8 code=0x7ffc0000 [ 325.596005][ T30] audit: type=1326 audit(325.110:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.0.29" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbd75b9e8 code=0x7ffc0000 [ 325.608717][ T30] audit: type=1326 audit(325.120:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.0.29" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbd75b9e8 code=0x7ffc0000 [ 325.625767][ T30] audit: type=1326 audit(325.140:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.0.29" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbd75b9e8 code=0x7ffc0000 [ 325.639000][ T30] audit: type=1326 audit(325.150:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3561 comm="syz.0.29" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbd75b9e8 code=0x7ffc0000 [ 326.258948][ T3566] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3566 comm=syz.0.31 [ 327.083513][ T3570] IPv6: addrconf: prefix option has invalid lifetime [ 328.710900][ T3580] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3580 comm=syz.1.36 [ 330.331092][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 330.331561][ T30] audit: type=1400 audit(329.840:120): avc: denied { watch watch_reads } for pid=3589 comm="syz.0.40" path="/20" dev="tmpfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 331.314368][ T3596] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3596 comm=syz.0.43 [ 332.541306][ T30] audit: type=1400 audit(332.050:121): avc: denied { create } for pid=3601 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 332.856460][ T30] audit: type=1400 audit(332.360:122): avc: denied { ioctl } for pid=3603 comm="syz.0.46" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4740 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 333.821544][ T30] audit: type=1400 audit(333.330:123): avc: denied { create } for pid=3611 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 333.834714][ T30] audit: type=1400 audit(333.350:124): avc: denied { getopt } for pid=3611 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 333.855132][ T30] audit: type=1400 audit(333.360:125): avc: denied { mount } for pid=3611 comm="syz.1.50" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 333.871661][ T30] audit: type=1400 audit(333.380:126): avc: denied { remount } for pid=3611 comm="syz.1.50" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 333.965202][ T30] audit: type=1400 audit(333.480:127): avc: denied { unmount } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 335.619676][ T3629] Zero length message leads to an empty skb [ 336.418936][ T30] audit: type=1326 audit(335.930:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3633 comm="syz.1.61" exe="/syz-executor" sig=9 arch=c00000b7 syscall=98 compat=0 ip=0xffff9755b9e8 code=0x0 [ 336.937778][ T30] audit: type=1400 audit(336.450:129): avc: denied { read } for pid=3638 comm="syz.0.63" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 336.941637][ T30] audit: type=1400 audit(336.450:130): avc: denied { open } for pid=3638 comm="syz.0.63" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 337.225426][ T30] audit: type=1400 audit(336.730:131): avc: denied { read write } for pid=3638 comm="syz.0.63" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 337.230606][ T30] audit: type=1400 audit(336.730:132): avc: denied { open } for pid=3638 comm="syz.0.63" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 337.231272][ T3639] ------------[ cut here ]------------ [ 337.231694][ T3639] WARNING: CPU: 0 PID: 3639 at mm/page_alloc.c:5154 __alloc_frozen_pages_noprof+0x414/0x1f2c [ 337.237005][ T3639] Modules linked in: [ 337.238216][ T3639] CPU: 0 UID: 0 PID: 3639 Comm: syz.0.63 Not tainted syzkaller #0 PREEMPT [ 337.238786][ T3639] Hardware name: linux,dummy-virt (DT) [ 337.239333][ T3639] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 337.239655][ T3639] pc : __alloc_frozen_pages_noprof+0x414/0x1f2c [ 337.239923][ T3639] lr : alloc_pages_mpol+0xfc/0x400 [ 337.240195][ T3639] sp : ffff8000a1c07800 [ 337.240452][ T3639] x29: ffff8000a1c07800 x28: 0000000000000013 x27: 0000000000000004 [ 337.240993][ T3639] x26: 0000000000000000 x25: 0000000000040cc0 x24: 0000000000000013 [ 337.241395][ T3639] x23: 1ffff00011a75b68 x22: 1ffff00014380f22 x21: 1ffff00014380f58 [ 337.241730][ T3639] x20: 0000000000000000 x19: ffff80008d3adb40 x18: 0000000000000000 [ 337.242170][ T3639] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000020000080 [ 337.242615][ T3639] x14: 00000000f1f1f1f1 x13: 0000000000000000 x12: ffff700014380fad [ 337.243202][ T3639] x11: 00000000f204f204 x10: 00000000f200f204 x9 : 00000000f2000000 [ 337.243622][ T3639] x8 : 00000000f2f2f2f2 x7 : 00000000f3f3f3f3 x6 : 0000000000000001 [ 337.243916][ T3639] x5 : ffff000018319e80 x4 : 0000000000000000 x3 : 0000000000000000 [ 337.243940][ T30] audit: type=1400 audit(336.730:133): avc: denied { ioctl } for pid=3638 comm="syz.0.63" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 337.244066][ T3639] [ 337.245079][ T3639] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff800088d3e6e7 [ 337.245562][ T3639] Call trace: [ 337.245973][ T3639] __alloc_frozen_pages_noprof+0x414/0x1f2c (P) [ 337.246336][ T3639] alloc_pages_mpol+0xfc/0x400 [ 337.246543][ T3639] alloc_frozen_pages_noprof+0x178/0x1ec [ 337.246729][ T3639] ___kmalloc_large_node+0x118/0x154 [ 337.246907][ T3639] __kmalloc_large_node_noprof+0x28/0x88 [ 337.247078][ T3639] __kmalloc_noprof+0x588/0x824 [ 337.247243][ T3639] raw_alloc_io_data+0xc8/0x144 [ 337.247438][ T3639] raw_ioctl+0xe3c/0x2640 [ 337.247602][ T3639] __arm64_sys_ioctl+0x124/0x1a4 [ 337.247781][ T3639] invoke_syscall+0x6c/0x258 [ 337.247950][ T3639] el0_svc_common.constprop.0+0xac/0x230 [ 337.248187][ T3639] do_el0_svc+0x40/0x58 [ 337.248554][ T3639] el0_svc+0x54/0x288 [ 337.248773][ T3639] el0t_64_sync_handler+0xa0/0xe4 [ 337.248977][ T3639] el0t_64_sync+0x198/0x19c [ 337.249459][ T3639] irq event stamp: 774 [ 337.249810][ T3639] hardirqs last enabled at (773): [] kasan_quarantine_put+0x1c8/0x228 [ 337.250315][ T3639] hardirqs last disabled at (774): [] el1_brk64+0x20/0x54 [ 337.250579][ T3639] softirqs last enabled at (756): [] fpsimd_restore_current_state+0x44/0x6bc [ 337.250846][ T3639] softirqs last disabled at (754): [] fpsimd_restore_current_state+0x14/0x6bc [ 337.251268][ T3639] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 338.735777][ T2152] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.931096][ T2152] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 339.117917][ T2152] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 339.289840][ T2152] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 340.500895][ T30] audit: type=1400 audit(340.010:134): avc: denied { read } for pid=3170 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 342.595110][ T2152] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 342.688480][ T2152] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 342.751344][ T2152] bond0 (unregistering): Released all slaves [ 343.114683][ T2152] hsr_slave_0: left promiscuous mode [ 343.135499][ T2152] hsr_slave_1: left promiscuous mode [ 343.258170][ T2152] veth1_macvtap: left promiscuous mode [ 343.261892][ T2152] veth0_macvtap: left promiscuous mode [ 343.267943][ T2152] veth1_vlan: left promiscuous mode [ 343.271077][ T2152] veth0_vlan: left promiscuous mode [ 350.296680][ T2152] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 350.505103][ T2152] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 350.667035][ T2152] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 350.861111][ T2152] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 353.343787][ T2152] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 353.409637][ T2152] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 353.458886][ T2152] bond0 (unregistering): Released all slaves [ 353.838171][ T2152] hsr_slave_0: left promiscuous mode [ 353.851459][ T2152] hsr_slave_1: left promiscuous mode [ 353.958983][ T2152] veth1_macvtap: left promiscuous mode [ 353.961844][ T2152] veth0_macvtap: left promiscuous mode [ 353.973638][ T2152] veth1_vlan: left promiscuous mode [ 353.976728][ T2152] veth0_vlan: left promiscuous mode