last executing test programs: 5.009183856s ago: executing program 1 (id=579): r0 = syz_usb_connect(0x2, 0x3f, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000016038308c5109a8146e40102230109022d0001000000000904000003030000000905be3b"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000bc0)={0x84, &(0x7f0000000600)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000480)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0}) syz_usb_control_io$rtl8150(r0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffffff, 0x40186e8d, 0x0) getdents64(r1, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 4.777706585s ago: executing program 0 (id=580): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="18020000004000000000000000000000850000003d00000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000740)=ANY=[@ANYRES32, @ANYRES32=r1, @ANYBLOB='\a'], 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={0xffffffffffffffff, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r0}, 0x20) sendmmsg$inet6(r0, &(0x7f0000000b00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000ac0)="b0", 0x1}], 0x1}}], 0x1, 0x0) 4.271747096s ago: executing program 0 (id=581): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)={0x0, 0x0, 0xfffffffe, 0x0, 0x3a5f, 0x8}) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000040)={0x2, 0x1, 0x18, 0x7, 0x73, 0x0}) 3.822823615s ago: executing program 0 (id=582): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_UDP_ZERO_CSUM6_TX={0x5}]}}}]}, 0x3c}}, 0x2000000) 3.588883084s ago: executing program 1 (id=583): capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)) r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x15) 3.292743486s ago: executing program 0 (id=584): socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) connect$can_bcm(r0, &(0x7f0000000140)={0x1d, r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@getchain={0x24, 0x11, 0x839, 0x70bd25, 0x0, {0x0, 0x0, 0x0, r4, {0xb, 0x6}, {0x3, 0xfff9}, {0x2}}}, 0x24}}, 0x0) 3.221196989s ago: executing program 1 (id=585): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB="1200000004000000080000000b"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000740)=ANY=[@ANYRES32=r1, @ANYRES32, @ANYBLOB='\a'], 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000500)={r1, &(0x7f0000000240), &(0x7f00000004c0)=@tcp6=r0}, 0x20) sendmmsg$inet6(r0, &(0x7f0000000b00)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000ac0)="b0", 0x1}], 0x1}}], 0x1, 0x0) 2.802120745s ago: executing program 0 (id=586): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xaac2}}]}, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r0, 0x2000012, 0xe, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb}, 0x50) 2.801853366s ago: executing program 1 (id=587): r0 = syz_usb_connect(0x2, 0x3f, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000016038308c5109a8146e40102230109022d0001000000000904000003030000000905be3b"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000bc0)={0x84, &(0x7f0000000600)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000480)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000380), 0x0}) syz_usb_control_io$rtl8150(r0, 0x0, 0x0) 1.875363144s ago: executing program 1 (id=588): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000002280)={'syzkaller0\x00', @random="001300"}) 118.937935ms ago: executing program 0 (id=589): openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080), 0x101801, 0x0) r0 = syz_io_uring_setup(0x22f, &(0x7f0000000140)={0x0, 0x5325, 0x10000, 0x3, 0x100002cf}, &(0x7f0000000100)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000009c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xffffffffffffff31}) io_uring_enter(r0, 0x7a98, 0x9257, 0x48, 0x0, 0xffffff29) 0s ago: executing program 1 (id=590): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x20000000000000bb, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bea100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001fc0)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x1, 0x8, 0x9}, 0x10, 0xffffffffffffffff, r2, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x11, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000001800010800000000000000850a603f00000000000500000014000500200100000000000000000100000000001c00090008000000", @ANYRES32=r1], 0x4c}}, 0x0) kernel console output (not intermixed with test programs): [ 52.073908][ T31] audit: type=1400 audit(51.990:56): avc: denied { read write } for pid=3115 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.075950][ T31] audit: type=1400 audit(51.990:57): avc: denied { open } for pid=3115 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:64317' (ED25519) to the list of known hosts. [ 66.380576][ T31] audit: type=1400 audit(66.290:58): avc: denied { name_bind } for pid=3118 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 68.610893][ T31] audit: type=1400 audit(68.520:59): avc: denied { execute } for pid=3119 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.629830][ T31] audit: type=1400 audit(68.550:60): avc: denied { execute_no_trans } for pid=3119 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 71.553187][ T31] audit: type=1400 audit(71.470:61): avc: denied { mounton } for pid=3119 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 71.553554][ T31] audit: type=1400 audit(71.470:62): avc: denied { mount } for pid=3119 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 71.569875][ T3119] cgroup: Unknown subsys name 'net' [ 71.578292][ T31] audit: type=1400 audit(71.490:63): avc: denied { unmount } for pid=3119 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 71.784807][ T3119] cgroup: Unknown subsys name 'cpuset' [ 71.793841][ T3119] cgroup: Unknown subsys name 'hugetlb' [ 71.794842][ T3119] cgroup: Unknown subsys name 'rlimit' [ 72.070718][ T31] audit: type=1400 audit(71.990:64): avc: denied { setattr } for pid=3119 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 72.072668][ T31] audit: type=1400 audit(71.990:65): avc: denied { mounton } for pid=3119 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 72.073639][ T31] audit: type=1400 audit(71.990:66): avc: denied { mount } for pid=3119 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 72.284982][ T3121] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 72.286350][ T31] audit: type=1400 audit(72.200:67): avc: denied { relabelto } for pid=3121 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.293011][ T31] audit: type=1400 audit(72.210:68): avc: denied { write } for pid=3121 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 72.323046][ T31] audit: type=1400 audit(72.240:69): avc: denied { read } for pid=3119 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.324441][ T31] audit: type=1400 audit(72.240:70): avc: denied { open } for pid=3119 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 80.737902][ T3119] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 82.706372][ T31] audit: type=1400 audit(82.620:71): avc: denied { execmem } for pid=3122 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 82.770134][ T31] audit: type=1400 audit(82.690:72): avc: denied { read } for pid=3124 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 82.770587][ T31] audit: type=1400 audit(82.690:73): avc: denied { open } for pid=3124 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 82.775575][ T31] audit: type=1400 audit(82.690:74): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 82.804702][ T31] audit: type=1400 audit(82.720:75): avc: denied { module_request } for pid=3124 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 82.859857][ T31] audit: type=1400 audit(82.780:76): avc: denied { sys_module } for pid=3125 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 83.524660][ T31] audit: type=1400 audit(83.440:77): avc: denied { ioctl } for pid=3124 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 84.603512][ T3124] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.612402][ T3124] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 84.866298][ T3125] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 84.875001][ T3125] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.473320][ T3124] hsr_slave_0: entered promiscuous mode [ 85.479869][ T3124] hsr_slave_1: entered promiscuous mode [ 85.943966][ T31] audit: type=1400 audit(85.860:78): avc: denied { create } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 85.950894][ T31] audit: type=1400 audit(85.870:79): avc: denied { write } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 85.951235][ T31] audit: type=1400 audit(85.870:80): avc: denied { read } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 85.954460][ T3125] hsr_slave_0: entered promiscuous mode [ 85.959821][ T3125] hsr_slave_1: entered promiscuous mode [ 85.962238][ T3125] debugfs: 'hsr0' already exists in 'hsr' [ 85.964909][ T3125] Cannot create hsr debugfs directory [ 85.966644][ T3124] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 85.981736][ T3124] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 85.991694][ T3124] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 86.048773][ T3124] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 86.405133][ T3125] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 86.419674][ T3125] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 86.431233][ T3125] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 86.443828][ T3125] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 86.906253][ T3124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.353009][ T3125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.686873][ T3124] veth0_vlan: entered promiscuous mode [ 89.702449][ T3124] veth1_vlan: entered promiscuous mode [ 89.752281][ T3124] veth0_macvtap: entered promiscuous mode [ 89.762787][ T3124] veth1_macvtap: entered promiscuous mode [ 89.854885][ T1053] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.855727][ T1053] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.865462][ T1053] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.866930][ T1053] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.024840][ T31] audit: type=1400 audit(89.940:81): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 90.038874][ T31] audit: type=1400 audit(89.950:82): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/syzkaller.i1B19X/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 90.039300][ T31] audit: type=1400 audit(89.950:83): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 90.048802][ T31] audit: type=1400 audit(89.960:84): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/syzkaller.i1B19X/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 90.054157][ T31] audit: type=1400 audit(89.970:85): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/syzkaller.i1B19X/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 90.073823][ T31] audit: type=1400 audit(89.990:86): avc: denied { unmount } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 90.082864][ T31] audit: type=1400 audit(90.000:87): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 90.086571][ T31] audit: type=1400 audit(90.000:88): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="gadgetfs" ino=1934 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 90.096676][ T31] audit: type=1400 audit(90.010:89): avc: denied { mount } for pid=3124 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 90.101657][ T31] audit: type=1400 audit(90.020:90): avc: denied { mounton } for pid=3124 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 90.176955][ T3124] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 90.371204][ T3125] veth0_vlan: entered promiscuous mode [ 90.398830][ T3125] veth1_vlan: entered promiscuous mode [ 90.514165][ T3125] veth0_macvtap: entered promiscuous mode [ 90.534421][ T3125] veth1_macvtap: entered promiscuous mode [ 90.639609][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.639993][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.640123][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.640196][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.626905][ T3831] syz.0.7 uses obsolete (PF_INET,SOCK_PACKET) [ 92.180928][ T3835] tmpfs: Unsupported parameter 'mpol' [ 103.099791][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 103.101948][ T3857] fuse: Unknown parameter 'use00000000000000000000' [ 103.102196][ T31] audit: type=1400 audit(103.020:108): avc: denied { mounton } for pid=3855 comm="syz.1.18" path="/2/file0" dev="tmpfs" ino=28 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 105.549792][ T31] audit: type=1400 audit(105.470:109): avc: denied { unmount } for pid=3124 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 105.892880][ T3890] fuse: Unknown parameter 'use00000000000000000000' [ 106.089831][ T31] audit: type=1400 audit(105.990:110): avc: denied { create } for pid=3891 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 109.004093][ T31] audit: type=1400 audit(108.920:111): avc: denied { create } for pid=3900 comm="syz.0.28" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 109.024348][ T31] audit: type=1400 audit(108.940:112): avc: denied { ioctl } for pid=3900 comm="syz.0.28" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3127 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 111.752845][ T31] audit: type=1400 audit(111.670:113): avc: denied { create } for pid=3911 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 111.759700][ T31] audit: type=1400 audit(111.680:114): avc: denied { bind } for pid=3911 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 111.943304][ T31] audit: type=1400 audit(111.860:115): avc: denied { accept } for pid=3911 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 112.551894][ T31] audit: type=1400 audit(112.470:116): avc: denied { write } for pid=3915 comm="syz.0.34" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 112.554215][ T31] audit: type=1400 audit(112.470:117): avc: denied { open } for pid=3915 comm="syz.0.34" path="/22/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 112.570373][ T3918] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 112.573303][ T3918] block device autoloading is deprecated and will be removed. [ 112.670124][ T31] audit: type=1400 audit(112.590:118): avc: denied { create } for pid=3922 comm="syz.0.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 112.679703][ T31] audit: type=1400 audit(112.600:119): avc: denied { setopt } for pid=3922 comm="syz.0.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 112.956665][ T3923] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 112.956777][ T31] audit: type=1400 audit(112.870:120): avc: denied { create } for pid=3922 comm="syz.0.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 114.154564][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 114.154897][ T31] audit: type=1400 audit(114.070:126): avc: denied { ioctl } for pid=3952 comm="syz.1.45" path="socket:[2614]" dev="sockfs" ino=2614 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 114.337782][ T31] audit: type=1400 audit(114.250:127): avc: denied { bind } for pid=3958 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 114.345698][ T31] audit: type=1400 audit(114.260:128): avc: denied { setopt } for pid=3958 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 117.528014][ T31] audit: type=1400 audit(117.430:129): avc: denied { associate } for pid=3985 comm="syz.0.59" name="core" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 118.566175][ T95] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 118.601191][ T95] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 119.558871][ T4008] fuse: Bad value for 'fd' [ 120.382162][ T31] audit: type=1400 audit(120.300:130): avc: denied { allowed } for pid=4013 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 120.999985][ T31] audit: type=1400 audit(120.920:131): avc: denied { create } for pid=4013 comm="syz.1.72" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:fusefs_t tclass=chr_file permissive=1 [ 121.346594][ T4019] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 121.354711][ T4019] 8021q: VLANs not supported on ip_vti0 [ 121.510191][ T4021] fuse: Bad value for 'fd' [ 125.288378][ T9] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 125.304690][ T9] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 128.971519][ T31] audit: type=1400 audit(128.890:132): avc: denied { mount } for pid=4068 comm="syz.0.88" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 130.349106][ T31] audit: type=1400 audit(130.270:133): avc: denied { create } for pid=4086 comm="syz.1.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 132.474632][ T4095] fuse: Bad value for 'fd' [ 141.777038][ T4130] fuse: Unknown parameter '0x0000000000000004' [ 142.096886][ T31] audit: type=1400 audit(142.010:134): avc: denied { map } for pid=4131 comm="syz.0.114" path="socket:[2885]" dev="sockfs" ino=2885 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 142.351476][ T31] audit: type=1400 audit(142.270:135): avc: denied { map } for pid=4133 comm="syz.0.115" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2886 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 142.353587][ T31] audit: type=1400 audit(142.270:136): avc: denied { read write } for pid=4133 comm="syz.0.115" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2886 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 143.220260][ T4138] fuse: Bad value for 'fd' [ 143.468905][ T4141] fuse: Unknown parameter '0x0000000000000004' [ 143.738230][ T31] audit: type=1400 audit(143.650:137): avc: denied { sqpoll } for pid=4140 comm="syz.0.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 143.843523][ T31] audit: type=1326 audit(143.740:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4143 comm="syz.1.120" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 143.845114][ T31] audit: type=1326 audit(143.740:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4143 comm="syz.1.120" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 143.845318][ T31] audit: type=1326 audit(143.740:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4143 comm="syz.1.120" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 143.845359][ T31] audit: type=1326 audit(143.740:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4143 comm="syz.1.120" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 143.845383][ T31] audit: type=1326 audit(143.740:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4143 comm="syz.1.120" exe="/syz-executor" sig=0 arch=40000028 syscall=227 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 143.845407][ T31] audit: type=1326 audit(143.740:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4143 comm="syz.1.120" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 145.378904][ T4152] fuse: Bad value for 'fd' [ 145.631628][ T4154] fuse: Unknown parameter '0x0000000000000004' [ 146.387629][ T4162] fuse: Bad value for 'fd' [ 146.815457][ T4164] fuse: Unknown parameter 'fd0x0000000000000004' [ 147.261917][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 147.262254][ T31] audit: type=1400 audit(147.130:146): avc: denied { create } for pid=4167 comm="syz.0.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 147.523826][ T31] audit: type=1326 audit(147.440:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4169 comm="syz.1.133" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x0 [ 147.634630][ T4174] fuse: Unknown parameter 'fd0x0000000000000004' [ 149.093725][ T4189] fuse: Unknown parameter 'fd0x0000000000000004' [ 149.543620][ T31] audit: type=1326 audit(149.460:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 149.543948][ T31] audit: type=1326 audit(149.460:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 149.544032][ T31] audit: type=1326 audit(149.460:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 149.558907][ T31] audit: type=1326 audit(149.480:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 149.560417][ T31] audit: type=1326 audit(149.480:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 149.561765][ T31] audit: type=1326 audit(149.480:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 149.564564][ T31] audit: type=1326 audit(149.480:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 149.566687][ T31] audit: type=1326 audit(149.480:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4194 comm="syz.0.143" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 154.491378][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 154.492499][ T31] audit: type=1400 audit(154.410:168): avc: denied { setopt } for pid=4213 comm="syz.0.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 155.162809][ T4223] mmap: syz.1.152 (4223) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 155.813315][ T31] audit: type=1400 audit(155.730:169): avc: denied { append } for pid=4245 comm="syz.1.154" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.083697][ T31] audit: type=1400 audit(158.000:170): avc: denied { read } for pid=4267 comm="syz.0.161" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 158.658808][ T4272] fuse: Bad value for 'fd' [ 159.489120][ T31] audit: type=1400 audit(159.410:171): avc: denied { unlink } for pid=3124 comm="syz-executor" name="file4" dev="tmpfs" ino=494 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 163.358268][ T31] audit: type=1326 audit(163.260:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4298 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 163.359991][ T31] audit: type=1326 audit(163.270:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4298 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 163.361737][ T31] audit: type=1326 audit(163.270:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4298 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 163.363459][ T31] audit: type=1326 audit(163.270:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4298 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 163.366026][ T31] audit: type=1326 audit(163.280:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4298 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=398 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 163.378521][ T31] audit: type=1326 audit(163.300:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4298 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 163.380742][ T31] audit: type=1326 audit(163.300:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4298 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 163.382811][ T31] audit: type=1326 audit(163.270:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4298 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 163.385145][ T31] audit: type=1326 audit(163.300:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4298 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 163.389206][ T31] audit: type=1326 audit(163.310:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4298 comm="syz.1.175" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 168.639887][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 168.644085][ T31] audit: type=1400 audit(168.560:201): avc: denied { create } for pid=4319 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 168.662554][ T31] audit: type=1400 audit(168.580:202): avc: denied { bind } for pid=4319 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 168.672240][ T31] audit: type=1400 audit(168.590:203): avc: denied { connect } for pid=4319 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 168.708046][ T31] audit: type=1400 audit(168.610:204): avc: denied { listen } for pid=4319 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 168.716028][ T31] audit: type=1400 audit(168.630:205): avc: denied { accept } for pid=4319 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 172.145582][ T31] audit: type=1326 audit(172.060:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4336 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 172.149052][ T31] audit: type=1326 audit(172.070:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4336 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 172.150430][ T31] audit: type=1326 audit(172.070:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4336 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 172.153312][ T31] audit: type=1326 audit(172.070:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4336 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 172.154883][ T31] audit: type=1326 audit(172.070:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4336 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 173.658165][ T31] kauditd_printk_skb: 105 callbacks suppressed [ 173.662249][ T31] audit: type=1326 audit(173.570:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4336 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fd54 code=0x7ffc0000 [ 173.669157][ T31] audit: type=1326 audit(173.590:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4336 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fd54 code=0x7ffc0000 [ 173.673784][ T31] audit: type=1326 audit(173.590:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4338 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 173.685593][ T31] audit: type=1326 audit(173.600:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4336 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fd54 code=0x7ffc0000 [ 173.686018][ T31] audit: type=1326 audit(173.600:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4336 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 173.693289][ T31] audit: type=1326 audit(173.610:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4336 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fd54 code=0x7ffc0000 [ 173.705126][ T31] audit: type=1326 audit(173.620:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4336 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fd54 code=0x7ffc0000 [ 173.718844][ T31] audit: type=1326 audit(173.630:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4336 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fd54 code=0x7ffc0000 [ 173.732122][ T31] audit: type=1326 audit(173.650:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4336 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fd54 code=0x7ffc0000 [ 173.742728][ T31] audit: type=1326 audit(173.660:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4336 comm="syz.0.192" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fd54 code=0x7ffc0000 [ 186.573731][ T31] kauditd_printk_skb: 73 callbacks suppressed [ 186.574810][ T31] audit: type=1400 audit(186.490:399): avc: denied { setopt } for pid=4382 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 186.704537][ T31] audit: type=1326 audit(186.620:400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4386 comm="syz.1.211" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x0 [ 191.149215][ T31] audit: type=1326 audit(191.070:401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4408 comm="syz.0.221" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 191.150673][ T31] audit: type=1326 audit(191.070:402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4408 comm="syz.0.221" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 191.156026][ T31] audit: type=1326 audit(191.070:403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4408 comm="syz.0.221" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 191.160851][ T31] audit: type=1326 audit(191.080:404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4408 comm="syz.0.221" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 191.163908][ T31] audit: type=1326 audit(191.080:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4408 comm="syz.0.221" exe="/syz-executor" sig=0 arch=40000028 syscall=357 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 191.164340][ T31] audit: type=1326 audit(191.080:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4408 comm="syz.0.221" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 191.172548][ T31] audit: type=1326 audit(191.090:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4408 comm="syz.0.221" exe="/syz-executor" sig=0 arch=40000028 syscall=346 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 191.684195][ T31] audit: type=1326 audit(191.600:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4408 comm="syz.0.221" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 191.684602][ T31] audit: type=1326 audit(191.600:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4408 comm="syz.0.221" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322a0 code=0x7ffc0000 [ 206.691569][ T31] audit: type=1400 audit(206.610:410): avc: denied { watch } for pid=4484 comm="syz.0.252" path="/proc/294" dev="proc" ino=3898 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 208.274868][ T4500] "syz.1.259" (4500) uses obsolete ecb(arc4) skcipher [ 208.286112][ T31] audit: type=1400 audit(208.200:411): avc: denied { write } for pid=4499 comm="syz.1.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 208.297757][ T31] audit: type=1400 audit(208.210:412): avc: denied { read } for pid=4499 comm="syz.1.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 212.075959][ T31] audit: type=1400 audit(211.990:413): avc: denied { name_bind } for pid=4525 comm="syz.0.269" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 213.782130][ T31] audit: type=1400 audit(213.700:414): avc: denied { watch watch_reads } for pid=4560 comm="syz.1.285" path="/132/file1" dev="tmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 214.022380][ T4568] trusted_key: encrypted_key: master key parameter 'r×] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 444.649916][ T5801] r7:00000000 r6:8281f77c r5:00000000 r4:82260aec [ 444.650319][ T5801] [<80201b08>] (show_stack) from [<8021fbe4>] (dump_stack_lvl+0x54/0x7c) [ 444.650698][ T5801] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 444.651077][ T5801] r5:00000000 r4:82a77d18 [ 444.651312][ T5801] [<8021fc0c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 444.651670][ T5801] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 444.652062][ T5801] r7:80e4dcc4 [ 444.652232][ T5801] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 444.652749][ T5801] r3:8280c684 r2:00000001 r1:82247508 r0:8224ef84 [ 444.653044][ T5801] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 444.653415][ T5801] [<80254a44>] (__warn) from [<80254d44>] (warn_slowpath_fmt+0x178/0x1f4) [ 444.653803][ T5801] r8:00000009 r7:82348270 r6:dfa798e4 r5:8404e000 r4:00000000 [ 444.654096][ T5801] [<80254bd0>] (warn_slowpath_fmt) from [<80e4dcc4>] (nsim_fib_event_nb+0x218/0x52c) [ 444.654578][ T5801] r10:85452600 r9:86680e84 r8:00000001 r7:85452600 r6:dfa799ec r5:86680c00 [ 444.654966][ T5801] r4:849d6e00 [ 444.655137][ T5801] [<80e4daac>] (nsim_fib_event_nb) from [<802855fc>] (notifier_call_chain+0x60/0x1b4) [ 444.655634][ T5801] r10:dfa799ec r9:dfa79b34 r8:80e4daac r7:00000000 r6:ffffffff r5:849d6e00 [ 444.655980][ T5801] r4:00000000 [ 444.656305][ T5801] [<8028559c>] (notifier_call_chain) from [<80285878>] (atomic_notifier_call_chain+0x3c/0x50) [ 444.656800][ T5801] r10:dfa79a40 r9:dfa79b34 r8:00000003 r7:00000005 r6:dfa799ec r5:00000001 [ 444.657557][ T5801] r4:85909888 [ 444.657760][ T5801] [<8028583c>] (atomic_notifier_call_chain) from [<815b924c>] (call_fib_notifiers+0x44/0x58) [ 444.660471][ T5801] r6:85909880 r5:dfa799ec r4:00000001 [ 444.666776][ T5801] [<815b9208>] (call_fib_notifiers) from [<81871e2c>] (call_fib6_notifiers+0x18/0x1c) [ 444.668057][ T5801] r7:00000000 r6:85452600 r5:00000000 r4:00000000 [ 444.668363][ T5801] [<81871e14>] (call_fib6_notifiers) from [<818477d4>] (call_fib6_multipath_entry_notifiers+0x48/0x6c) [ 444.668883][ T5801] [<8184778c>] (call_fib6_multipath_entry_notifiers) from [<8184402c>] (ip6_route_multipath_add+0x5c8/0x7ac) [ 444.669445][ T5801] r4:00000001 [ 444.669611][ T5801] [<81843a64>] (ip6_route_multipath_add) from [<81844290>] (inet6_rtm_newroute+0x80/0xc4) [ 444.670043][ T5801] r10:00000000 r9:00000000 r8:82c1f5a8 r7:858bfe40 r6:86744b40 r5:858bfe40 [ 444.670500][ T5801] r4:dfa79c48 [ 444.670666][ T5801] [<81844210>] (inet6_rtm_newroute) from [<815922c8>] (rtnetlink_rcv_msg+0x2e0/0x334) [ 444.671056][ T5801] r6:0000000a r5:81844210 r4:86744b40 [ 444.671298][ T5801] [<81591fe8>] (rtnetlink_rcv_msg) from [<81672424>] (netlink_rcv_skb+0xc0/0x120) [ 444.671726][ T5801] r10:00000000 r9:00000000 r8:85820ec0 r7:0000004c r6:86744b40 r5:81591fe8 [ 444.672066][ T5801] r4:858bfe40 [ 444.672240][ T5801] [<81672364>] (netlink_rcv_skb) from [<81590e94>] (rtnetlink_rcv+0x18/0x1c) [ 444.672625][ T5801] r7:858bfe40 r6:859095c0 r5:0000004c r4:84cb5400 [ 444.672988][ T5801] [<81590e7c>] (rtnetlink_rcv) from [<81671bf0>] (netlink_unicast+0x1f0/0x30c) [ 444.673362][ T5801] [<81671a00>] (netlink_unicast) from [<81671ed8>] (netlink_sendmsg+0x1cc/0x444) [ 444.673731][ T5801] r9:00000000 r8:00000000 r7:85878400 r6:0000004c r5:858bfe40 r4:dfa79f20 [ 444.674101][ T5801] [<81671d0c>] (netlink_sendmsg) from [<81543bb0>] (__sock_sendmsg+0x44/0x78) [ 444.674503][ T5801] r10:00000000 r9:dfa79dc4 r8:dfa79dc4 r7:00000000 r6:8502a000 r5:dfa79f20 [ 444.675025][ T5801] r4:00000000 [ 444.675193][ T5801] [<81543b6c>] (__sock_sendmsg) from [<81544f08>] (____sys_sendmsg+0x298/0x2cc) [ 444.675682][ T5801] r7:00000000 r6:8502a000 r5:00000000 r4:dfa79f20 [ 444.675924][ T5801] [<81544c70>] (____sys_sendmsg) from [<81546ed0>] (___sys_sendmsg+0x9c/0xd0) [ 444.676303][ T5801] r10:dfa79e24 r9:20000100 r8:00000000 r7:00000000 r6:8502a000 r5:dfa79f20 [ 444.676641][ T5801] r4:00000000 [ 444.676820][ T5801] [<81546e34>] (___sys_sendmsg) from [<81547368>] (__sys_sendmsg+0x8c/0xe0) [ 444.677619][ T5801] r10:00000128 r9:8404e000 r8:85447180 r7:00000000 r6:20000100 r5:85447181 [ 444.678187][ T5801] r4:00000003 [ 444.678379][ T5801] [<815472dc>] (__sys_sendmsg) from [<815473d0>] (sys_sendmsg+0x14/0x18) [ 444.678876][ T5801] r8:8020029c r7:00000128 r6:00306308 r5:00000000 r4:00000000 [ 444.679176][ T5801] [<815473bc>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 444.679758][ T5801] Exception stack(0xdfa79fa8 to 0xdfa79ff0) [ 444.680262][ T5801] 9fa0: 00000000 00000000 00000003 20000100 00000000 00000000 [ 444.680807][ T5801] 9fc0: 00000000 00000000 00306308 00000128 002f0000 00000000 00006364 76fd90bc [ 444.681251][ T5801] 9fe0: 76fd8ec0 76fd8eb0 0001948c 001322a0 [ 444.683982][ T5801] Rebooting in 86400 seconds.. VM DIAGNOSIS: 03:01:10 Registers: info registers vcpu 0 CPU#0 R00=841c5c40 R01=00000067 R02=eb82f000 R03=00000000 R04=82abb124 R05=841c5c40 R06=80a79c5c R07=82abb144 R08=82826ef8 R09=00000000 R10=00000552 R11=dfa79644 R12=00000002 R13=dfa79638 R14=829590c4 R15=80a79cb4 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=7e93d6f8 R01=76eb0e90 R02=7e93d7bc R03=00000000 R04=7e93d6f8 R05=7e93d818 R06=00000000 R07=7e93d7f8 R08=7e93d858 R09=76c96b00 R10=00000000 R11=00000000 R12=00000000 R13=7e93d6f8 R14=76dc0a30 R15=76da14fc PSR=20070010 --C- A S usr32 s00=3278302b s01=302f3831 d00=302f38313278302b s02=54205b5d s03=31303835 d01=3130383554205b5d s04=4157205d s05=4e494e52 d02=4e494e524157205d s06=43203a47 s07=203a5550 d03=203a555043203a47 s08=49502030 s09=35203a44 d04=35203a4449502030 s10=20313038 s11=64207461 d05=6420746120313038 s12=65766972 s13=6e2f7372 d06=6e2f737265766972 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000