last executing test programs: 14.303131361s ago: executing program 0 (id=26): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)=@newtfilter={0x6c, 0x2c, 0xd27, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0xfff3, 0x7}, {}, {0xa, 0x1}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x3c, 0x2, [@TCA_CGROUP_EMATCHES={0x38, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x2c, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x28, 0x1, 0x0, 0x0, {{0xe38, 0x9, 0x4}, [@TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}]}}]}]}]}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x80}, 0x40010) 13.659769574s ago: executing program 0 (id=27): unshare(0x2a020400) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) 13.254000175s ago: executing program 0 (id=28): socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002, 0x2000}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x3, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000080)="44f9b108b1cdc885c9c533d21f474bec8bfef1df1e2da71e578dc6b91d09f7ab15378571d8e27546090000006e75436914ab717528ee4b7a9beaf908d11137c11903064e83b4951f4d433a5404970c85d92d7083fd38844cbb0c6c5eb508ddc2dc7a590aa7941b1e9eeb5a688138dea09b776cbfa784cbf550bf3074fb0d775da4df5a3f48bbdf452eeb6b923da9d0e25b80f76a873664b5753444fe05f33e5f91045540836c3cd6af10f0cd018f0c6f57f926ac959a5628c45088fbe0c87fbe6cbcda4662d2a12f6d00"/215, 0xd0d0c2ac, 0x1, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x406f413, 0x0) 8.980695092s ago: executing program 1 (id=29): sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x4048084) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x804e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000008c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0902000000000000000001000000050002000a00000014000700ff00000000000000000000000000000108000b00", @ANYRES8], 0x38}}, 0x0) 1.769614809s ago: executing program 1 (id=30): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x8) close(r0) openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000000), 0x0, 0x0) read$FUSE(r0, &(0x7f000000c400)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, r1, {0x7, 0x1f, 0xffffffff, 0x640184, 0x1, 0x8001, 0x2, 0x0, 0x0, 0x0, 0x20, 0x7}}, 0x50) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) close(0x3) 1.700053683s ago: executing program 1 (id=31): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000e00), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r1, 0x1, 0x70bd27, 0x25dfdbff, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_PS_STATE={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x444}, 0x80) 1.377184029s ago: executing program 1 (id=32): r0 = syz_genetlink_get_family_id$smc(&(0x7f0000000100), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010000000000000000000200000014000200626f6e64300000000000f97300000000090001"], 0x43}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 1.309983943s ago: executing program 1 (id=33): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000500)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0xa802, 0x0) close(r1) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r4 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0xb, 0xd}, {}, {0x8, 0xfff1}}}, 0x24}, 0x1, 0x0, 0x0, 0x48050}, 0x40004) 1.051246076s ago: executing program 1 (id=34): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a040007000000b6f1ffff0000854105001a"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a000000000000040000000000000000000000210000000000010000000000000200010001"], 0x70}}, 0x0) sendmmsg(r3, &(0x7f0000000180), 0x3ef, 0x0) 450.358417ms ago: executing program 0 (id=35): r0 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x4001, @local}, 0x10, 0x0}, 0x30004001) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="070000000000ffe700000200009614000180060001000200000008000300ac1414"], 0x28}}, 0x0) 309.571484ms ago: executing program 0 (id=36): socket$packet(0x11, 0x3, 0x300) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = socket(0x11, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x5, r2, 0x1, 0x2, 0x6, @broadcast}, 0x14) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008188040f80ec59acbc0413010048100000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) 0s ago: executing program 0 (id=37): r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) pipe(&(0x7f00000045c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000001440)=[{&(0x7f0000001a00)="ce", 0x1}], 0x1, 0x4) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, 0x3000}) read$FUSE(r1, &(0x7f0000001a40)={0x2020}, 0x2083) kernel console output (not intermixed with test programs): [ 46.870565][ T31] audit: type=1400 audit(46.790:56): avc: denied { read write } for pid=3094 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.873091][ T31] audit: type=1400 audit(46.790:57): avc: denied { open } for pid=3094 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:26267' (ED25519) to the list of known hosts. [ 58.014891][ T31] audit: type=1400 audit(57.930:58): avc: denied { name_bind } for pid=3097 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 59.906715][ T31] audit: type=1400 audit(59.820:59): avc: denied { execute } for pid=3098 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 59.929488][ T31] audit: type=1400 audit(59.830:60): avc: denied { execute_no_trans } for pid=3098 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.594920][ T31] audit: type=1400 audit(62.510:61): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 62.598057][ T31] audit: type=1400 audit(62.510:62): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 62.611017][ T3098] cgroup: Unknown subsys name 'net' [ 62.616677][ T31] audit: type=1400 audit(62.530:63): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 62.793143][ T3098] cgroup: Unknown subsys name 'cpuset' [ 62.800166][ T3098] cgroup: Unknown subsys name 'hugetlb' [ 62.801408][ T3098] cgroup: Unknown subsys name 'rlimit' [ 63.101534][ T31] audit: type=1400 audit(63.020:64): avc: denied { setattr } for pid=3098 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.104706][ T31] audit: type=1400 audit(63.020:65): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 63.110184][ T31] audit: type=1400 audit(63.020:66): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 63.268421][ T3100] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 63.272078][ T31] audit: type=1400 audit(63.190:67): avc: denied { relabelto } for pid=3100 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 63.274691][ T31] audit: type=1400 audit(63.190:68): avc: denied { write } for pid=3100 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 63.297381][ T31] audit: type=1400 audit(63.210:69): avc: denied { read } for pid=3098 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 63.304223][ T31] audit: type=1400 audit(63.210:70): avc: denied { open } for pid=3098 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.790290][ T3098] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 71.644791][ T31] audit: type=1400 audit(71.560:71): avc: denied { execmem } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 71.706756][ T31] audit: type=1400 audit(71.620:72): avc: denied { read } for pid=3103 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 71.719700][ T31] audit: type=1400 audit(71.630:73): avc: denied { open } for pid=3103 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 71.720221][ T31] audit: type=1400 audit(71.630:74): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 71.739494][ T31] audit: type=1400 audit(71.650:75): avc: denied { module_request } for pid=3104 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 71.779873][ T31] audit: type=1400 audit(71.700:76): avc: denied { sys_module } for pid=3104 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 72.231050][ T31] audit: type=1400 audit(72.140:77): avc: denied { ioctl } for pid=3104 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.337931][ T3103] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.376479][ T3103] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.438221][ T3104] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.485134][ T3104] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.302307][ T3103] hsr_slave_0: entered promiscuous mode [ 74.306535][ T3103] hsr_slave_1: entered promiscuous mode [ 74.382119][ T3104] hsr_slave_0: entered promiscuous mode [ 74.384102][ T3104] hsr_slave_1: entered promiscuous mode [ 74.386877][ T3104] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 74.387859][ T3104] Cannot create hsr debugfs directory [ 74.828112][ T31] audit: type=1400 audit(74.740:78): avc: denied { create } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.836412][ T31] audit: type=1400 audit(74.750:79): avc: denied { write } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.836807][ T31] audit: type=1400 audit(74.750:80): avc: denied { read } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.847066][ T3103] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 74.860533][ T3103] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 74.878035][ T3103] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 74.913258][ T3103] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 74.972335][ T3104] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 74.988068][ T3104] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 74.999743][ T3104] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 75.009502][ T3104] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 75.686594][ T3104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.695703][ T3103] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.922509][ T3103] veth0_vlan: entered promiscuous mode [ 77.934313][ T3103] veth1_vlan: entered promiscuous mode [ 77.996841][ T3104] veth0_vlan: entered promiscuous mode [ 78.003353][ T3103] veth0_macvtap: entered promiscuous mode [ 78.022330][ T3104] veth1_vlan: entered promiscuous mode [ 78.025356][ T3103] veth1_macvtap: entered promiscuous mode [ 78.088126][ T3104] veth0_macvtap: entered promiscuous mode [ 78.098139][ T3103] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.098552][ T3103] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.100491][ T3103] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.100592][ T3103] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.117624][ T3104] veth1_macvtap: entered promiscuous mode [ 78.255170][ T31] audit: type=1400 audit(78.170:81): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 78.264035][ T31] audit: type=1400 audit(78.180:82): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.kI9TfD/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 78.274319][ T31] audit: type=1400 audit(78.190:83): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 78.282104][ T31] audit: type=1400 audit(78.190:84): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.kI9TfD/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 78.282662][ T31] audit: type=1400 audit(78.200:85): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/syzkaller.kI9TfD/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2232 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 78.306125][ T31] audit: type=1400 audit(78.220:86): avc: denied { unmount } for pid=3103 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 78.316848][ T31] audit: type=1400 audit(78.230:87): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=770 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 78.323169][ T31] audit: type=1400 audit(78.230:88): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="gadgetfs" ino=2233 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 78.327062][ T31] audit: type=1400 audit(78.240:89): avc: denied { mount } for pid=3103 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 78.330939][ T31] audit: type=1400 audit(78.240:90): avc: denied { mounton } for pid=3103 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 78.342664][ T3104] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.343961][ T3104] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.345156][ T3104] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.346415][ T3104] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.385577][ T3103] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 78.822501][ T3803] process 'syz.1.4' launched './file2' with NULL argv: empty string added [ 83.474295][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 83.474753][ T31] audit: type=1400 audit(83.390:107): avc: denied { name_bind } for pid=3816 comm="syz.0.10" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 83.482686][ T31] audit: type=1400 audit(83.390:108): avc: denied { node_bind } for pid=3816 comm="syz.0.10" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 83.738172][ T31] audit: type=1326 audit(83.650:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.0.11" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 83.770065][ T31] audit: type=1326 audit(83.650:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.0.11" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 83.776424][ T31] audit: type=1326 audit(83.690:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.0.11" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 83.794895][ T31] audit: type=1326 audit(83.710:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.0.11" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 83.801938][ T31] audit: type=1326 audit(83.720:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.0.11" exe="/syz-executor" sig=0 arch=40000028 syscall=361 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 83.804211][ T31] audit: type=1326 audit(83.720:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.0.11" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131fc0 code=0x7ffc0000 [ 95.679211][ T31] audit: type=1400 audit(95.590:115): avc: denied { connect } for pid=3832 comm="syz.1.17" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 95.679586][ T31] audit: type=1400 audit(95.590:116): avc: denied { write } for pid=3832 comm="syz.1.17" laddr=fe80::a8aa:aaff:feaa:aa16 lport=255 faddr=ff01::1 fport=65534 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.941040][ T31] audit: type=1400 audit(99.790:117): avc: denied { read } for pid=3834 comm="syz.1.18" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 99.941492][ T31] audit: type=1400 audit(99.790:118): avc: denied { open } for pid=3834 comm="syz.1.18" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 102.758846][ C0] hrtimer: interrupt took 9861776 ns [ 107.391963][ T31] audit: type=1400 audit(107.310:119): avc: denied { ioctl } for pid=3843 comm="syz.0.21" path="socket:[2314]" dev="sockfs" ino=2314 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 110.836286][ T3853] smc: net device bond0 applied user defined pnetid SYZ0 [ 110.910599][ T31] audit: type=1400 audit(110.830:120): avc: denied { map_create } for pid=3854 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 113.233007][ T31] audit: type=1400 audit(113.150:121): avc: denied { create } for pid=3854 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 113.236647][ T31] audit: type=1400 audit(113.150:122): avc: denied { bind } for pid=3854 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 113.250378][ T31] audit: type=1400 audit(113.170:123): avc: denied { setopt } for pid=3854 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 113.684679][ T31] audit: type=1400 audit(113.600:124): avc: denied { kexec_image_load } for pid=3858 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 118.279523][ T3859] kexec: Could not allocate control_code_buffer [ 119.645198][ T31] audit: type=1400 audit(119.560:125): avc: denied { create } for pid=3868 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 119.662795][ T31] audit: type=1400 audit(119.580:126): avc: denied { name_bind } for pid=3868 comm="syz.0.28" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 130.898154][ T31] audit: type=1400 audit(130.810:127): avc: denied { mounton } for pid=3874 comm="syz.1.30" path="/13/file0" dev="tmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 131.297054][ T3882] netlink: 12 bytes leftover after parsing attributes in process `syz.1.32'. [ 131.412112][ T3884] syzkaller0: entered promiscuous mode [ 131.414107][ T3884] syzkaller0: entered allmulticast mode [ 132.577146][ T31] audit: type=1400 audit(132.490:128): avc: denied { bind } for pid=3893 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 132.582727][ T3894] netlink: 'syz.0.36': attribute type 10 has an invalid length. [ 132.689459][ T31] audit: type=1400 audit(132.600:129): avc: denied { create } for pid=3897 comm="syz.0.37" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 132.694633][ T31] audit: type=1400 audit(132.610:130): avc: denied { ioctl } for pid=3897 comm="syz.0.37" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3202 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 132.718352][ T3898] ------------[ cut here ]------------ [ 132.719985][ T3898] WARNING: CPU: 1 PID: 3898 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 132.721297][ T3898] Modules linked in: [ 132.722400][ T3898] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 132.723705][ T3898] CPU: 1 UID: 0 PID: 3898 Comm: syz.0.37 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT [ 132.725309][ T3898] Hardware name: ARM-Versatile Express [ 132.726107][ T3898] Call trace: [ 132.726557][ T3898] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 132.727235][ T3898] r7:00000000 r6:8282083c r5:00000000 r4:8225b4e0 [ 132.727643][ T3898] [<80201ae4>] (show_stack) from [<8021fdf4>] (dump_stack_lvl+0x54/0x7c) [ 132.728030][ T3898] [<8021fda0>] (dump_stack_lvl) from [<8021fe34>] (dump_stack+0x18/0x1c) [ 132.728415][ T3898] r5:00000000 r4:82a6dd18 [ 132.728766][ T3898] [<8021fe1c>] (dump_stack) from [<80202614>] (panic+0x120/0x374) [ 132.729423][ T3898] [<802024f4>] (panic) from [<80258578>] (get_taint+0x0/0x1c) [ 132.729793][ T3898] r3:8280c684 r2:00000001 r1:82242028 r0:822499c0 [ 132.730073][ T3898] r7:804bc12c [ 132.730244][ T3898] [<80258504>] (check_panic_on_warn) from [<802586dc>] (__warn+0x80/0x188) [ 132.730597][ T3898] [<8025865c>] (__warn) from [<8025895c>] (warn_slowpath_fmt+0x178/0x1f4) [ 132.730970][ T3898] r8:00000009 r7:822752b8 r6:e000dd1c r5:85a29800 r4:00000000 [ 132.731273][ T3898] [<802587e8>] (warn_slowpath_fmt) from [<804bc12c>] (kunmap_local_indexed+0x20c/0x224) [ 132.731722][ T3898] r10:00000000 r9:deb66ae0 r8:decf5cb8 r7:00a00000 r6:00000003 r5:85a29800 [ 132.732094][ T3898] r4:ffedc000 [ 132.732269][ T3898] [<804bbf20>] (kunmap_local_indexed) from [<805373a0>] (move_pages+0xb24/0x19c8) [ 132.732671][ T3898] r7:00a00000 r6:00000000 r5:84c8a55c r4:84a8f000 [ 132.732957][ T3898] [<8053687c>] (move_pages) from [<805be4b4>] (userfaultfd_ioctl+0xff8/0x21c4) [ 132.733392][ T3898] r10:84a8f000 r9:e000de98 r8:21000000 r7:00000001 r6:00000000 r5:20000040 [ 132.733747][ T3898] r4:8c9b3000 [ 132.733928][ T3898] [<805bd4bc>] (userfaultfd_ioctl) from [<805679c4>] (sys_ioctl+0x130/0xdc8) [ 132.734381][ T3898] r10:85a29800 r9:848eb780 r8:00000003 r7:20000040 r6:848eb781 r5:00000000 [ 132.734731][ T3898] r4:c028aa05 [ 132.734934][ T3898] [<80567894>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 132.735375][ T3898] Exception stack(0xe000dfa8 to 0xe000dff0) [ 132.735819][ T3898] dfa0: 00000000 00000000 00000003 c028aa05 20000040 00000000 [ 132.736294][ T3898] dfc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76b1e0bc [ 132.736854][ T3898] dfe0: 76b1dec0 76b1deb0 000193a4 00131fc0 [ 132.737255][ T3898] r10:00000036 r9:85a29800 r8:8020029c r7:00000036 r6:002f6300 r5:00000000 [ 132.737662][ T3898] r4:00000000 [ 132.740466][ T3898] Rebooting in 86400 seconds.. VM DIAGNOSIS: 08:49:14 Registers: info registers vcpu 0 CPU#0 R00=84f84400 R01=00000000 R02=0000916d R03=81a25380 R04=00000006 R05=828f8dc8 R06=00000000 R07=828f8dc0 R08=85a28000 R09=00000028 R10=828f8dc8 R11=df801cec R12=df801cf0 R13=df801ce0 R14=80340894 R15=81a25390 PSR=20000193 --C- A S svc32 s00=64617379 s01=20745f6d d00=20745f6d64617379 s02=61667265 s03=66746c75 d01=66746c7561667265 s04=20225d64 s05=3d766564 d02=3d76656420225d64 s06=6f6e6122 s07=6e695f6e d03=6e695f6e6f6e6122 s08=6665646f s09=69202273 d04=692022736665646f s10=333d6f6e s11=20323032 d05=20323032333d6f6e s12=74636f69 s13=646d636c d06=646d636c74636f69 s14=6178303d s15=20663361 d07=206633616178303d s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000024 R01=00000000 R02=00000000 R03=60000093 R04=00000000 R05=00000024 R06=dddd83d5 R07=00000000 R08=00000000 R09=00000000 R10=82828450 R11=e000db64 R12=00000001 R13=e000dae0 R14=00013a88 R15=802e45ec PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000