last executing test programs: 4.502101306s ago: executing program 1 (id=261): r0 = openat$ttyprintk(0xffffff9c, &(0x7f00000003c0), 0x0, 0x0) fstat(r0, &(0x7f0000000340)) 3.940614458s ago: executing program 1 (id=263): openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) 3.239049883s ago: executing program 0 (id=264): r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr(r0, &(0x7f00000025c0)=@random={'security.', '/dev/zero\x00'}, 0x0, 0x0, 0x1) 3.080047816s ago: executing program 1 (id=265): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000000c0), 0x4) 2.749379563s ago: executing program 0 (id=266): r0 = socket$nl_route(0x10, 0x3, 0x0) tee(r0, 0xffffffffffffffff, 0x0, 0x0) 2.229446804s ago: executing program 0 (id=267): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmmsg$alg(r0, 0x0, 0x0, 0x0) 2.188416455s ago: executing program 1 (id=268): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000002640)={0x14, 0x0, 0x1, 0x70bd2b}, 0x14}}, 0x888) 1.461668s ago: executing program 1 (id=269): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BSS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40000000}, 0x801) 1.276448293s ago: executing program 0 (id=270): r0 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'gre0\x00'}) 989.40246ms ago: executing program 1 (id=271): clock_nanosleep(0x2, 0x0, &(0x7f0000000300)={0x0, 0x989680}, 0x0) init_module(&(0x7f0000000300), 0xaf, 0x0) 781.917694ms ago: executing program 0 (id=272): r0 = socket$nl_audit(0x10, 0x3, 0x9) connect$unix(r0, &(0x7f00000016c0)=@abs, 0x6e) 0s ago: executing program 0 (id=273): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b6a, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:43644' (ED25519) to the list of known hosts. [ 194.530594][ T29] audit: type=1400 audit(194.000:58): avc: denied { name_bind } for pid=3273 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 194.989596][ T29] audit: type=1400 audit(194.460:59): avc: denied { execute } for pid=3275 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 194.997850][ T29] audit: type=1400 audit(194.460:60): avc: denied { execute_no_trans } for pid=3275 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 201.345122][ T29] audit: type=1400 audit(200.810:61): avc: denied { mounton } for pid=3275 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 201.355347][ T29] audit: type=1400 audit(200.820:62): avc: denied { mount } for pid=3275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 201.385811][ T3275] cgroup: Unknown subsys name 'net' [ 201.408042][ T29] audit: type=1400 audit(200.870:63): avc: denied { unmount } for pid=3275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 201.897630][ T3275] cgroup: Unknown subsys name 'cpuset' [ 201.961331][ T3275] cgroup: Unknown subsys name 'rlimit' [ 202.497397][ T29] audit: type=1400 audit(201.960:64): avc: denied { setattr } for pid=3275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 202.504803][ T29] audit: type=1400 audit(201.970:65): avc: denied { mounton } for pid=3275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 202.512210][ T29] audit: type=1400 audit(201.980:66): avc: denied { mount } for pid=3275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 202.965680][ T3277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 202.974999][ T29] audit: type=1400 audit(202.440:67): avc: denied { relabelto } for pid=3277 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 202.988837][ T29] audit: type=1400 audit(202.450:68): avc: denied { write } for pid=3277 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 203.144859][ T29] audit: type=1400 audit(202.610:69): avc: denied { read } for pid=3275 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 203.155045][ T29] audit: type=1400 audit(202.610:70): avc: denied { open } for pid=3275 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 203.192196][ T3275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 214.137780][ T29] audit: type=1400 audit(213.600:71): avc: denied { execmem } for pid=3283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 214.198641][ T29] audit: type=1400 audit(213.670:72): avc: denied { read } for pid=3285 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 214.201939][ T29] audit: type=1400 audit(213.670:73): avc: denied { open } for pid=3285 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 214.220645][ T29] audit: type=1400 audit(213.690:74): avc: denied { mounton } for pid=3285 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 214.275243][ T29] audit: type=1400 audit(213.740:75): avc: denied { module_request } for pid=3285 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 214.424464][ T29] audit: type=1400 audit(213.890:76): avc: denied { sys_module } for pid=3285 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 221.895228][ T3287] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 222.084424][ T3287] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 222.119638][ T3285] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 222.264520][ T3285] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.871094][ T3287] hsr_slave_0: entered promiscuous mode [ 224.981399][ T3287] hsr_slave_1: entered promiscuous mode [ 225.507870][ T3285] hsr_slave_0: entered promiscuous mode [ 225.561629][ T3285] hsr_slave_1: entered promiscuous mode [ 225.608884][ T3285] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 225.611470][ T3285] Cannot create hsr debugfs directory [ 227.745693][ T29] audit: type=1400 audit(227.210:77): avc: denied { create } for pid=3287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 227.774964][ T29] audit: type=1400 audit(227.240:78): avc: denied { write } for pid=3287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 227.779730][ T29] audit: type=1400 audit(227.240:79): avc: denied { read } for pid=3287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 227.840750][ T3287] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 227.952974][ T3287] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 227.995703][ T3287] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 228.035611][ T3287] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 228.438404][ T3285] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 228.518901][ T3285] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 228.614098][ T3285] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 228.728545][ T3285] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 231.921378][ T3287] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.033496][ T3285] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.584361][ T3287] veth0_vlan: entered promiscuous mode [ 241.690148][ T3287] veth1_vlan: entered promiscuous mode [ 241.901694][ T3285] veth0_vlan: entered promiscuous mode [ 242.022146][ T3285] veth1_vlan: entered promiscuous mode [ 242.125050][ T3287] veth0_macvtap: entered promiscuous mode [ 242.259221][ T3287] veth1_macvtap: entered promiscuous mode [ 242.725785][ T3285] veth0_macvtap: entered promiscuous mode [ 242.866998][ T3285] veth1_macvtap: entered promiscuous mode [ 243.010812][ T3287] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.013242][ T3287] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.014121][ T3287] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.014932][ T3287] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.834150][ T3285] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.835298][ T3285] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.836185][ T3285] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.838626][ T3285] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 244.221137][ T29] audit: type=1400 audit(243.680:80): avc: denied { mount } for pid=3287 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 244.245465][ T29] audit: type=1400 audit(243.700:81): avc: denied { mounton } for pid=3287 comm="syz-executor" path="/syzkaller.MHRBbu/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 244.273337][ T29] audit: type=1400 audit(243.720:82): avc: denied { mount } for pid=3287 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 244.383100][ T29] audit: type=1400 audit(243.850:83): avc: denied { mounton } for pid=3287 comm="syz-executor" path="/syzkaller.MHRBbu/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 244.442834][ T29] audit: type=1400 audit(243.910:84): avc: denied { mounton } for pid=3287 comm="syz-executor" path="/syzkaller.MHRBbu/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3525 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 244.584471][ T29] audit: type=1400 audit(244.050:85): avc: denied { unmount } for pid=3287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 244.666039][ T29] audit: type=1400 audit(244.130:86): avc: denied { mounton } for pid=3287 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 244.799678][ T29] audit: type=1400 audit(244.260:87): avc: denied { mount } for pid=3287 comm="syz-executor" name="/" dev="gadgetfs" ino=4316 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 244.969011][ T29] audit: type=1400 audit(244.430:88): avc: denied { mount } for pid=3287 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 244.992758][ T29] audit: type=1400 audit(244.460:89): avc: denied { mounton } for pid=3287 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 245.611869][ T3287] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 250.749043][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 250.749281][ T29] audit: type=1400 audit(250.190:99): avc: denied { write } for pid=3444 comm="syz.1.12" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 250.818510][ T3443] Zero length message leads to an empty skb [ 251.929120][ T3453] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=3453 comm=syz.0.16 [ 258.574618][ T29] audit: type=1400 audit(258.030:100): avc: denied { create } for pid=3500 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 258.575991][ T29] audit: type=1400 audit(258.040:101): avc: denied { write } for pid=3500 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 259.631087][ T29] audit: type=1400 audit(258.880:102): avc: denied { create } for pid=3503 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 260.012602][ T29] audit: type=1400 audit(259.480:103): avc: denied { create } for pid=3506 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 260.025238][ T29] audit: type=1400 audit(259.490:104): avc: denied { ioctl } for pid=3506 comm="syz.0.42" path="socket:[4442]" dev="sockfs" ino=4442 ioctlcmd=0x662c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 260.878389][ T29] audit: type=1400 audit(260.340:105): avc: denied { setopt } for pid=3511 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 262.011291][ T29] audit: type=1400 audit(261.480:106): avc: denied { read } for pid=3518 comm="syz.1.48" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 262.038993][ T29] audit: type=1400 audit(261.510:107): avc: denied { open } for pid=3518 comm="syz.1.48" path="/dev/input/mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 262.075765][ T29] audit: type=1400 audit(261.540:108): avc: denied { ioctl } for pid=3518 comm="syz.1.48" path="/dev/input/mice" dev="devtmpfs" ino=704 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 262.221791][ T29] audit: type=1400 audit(261.680:109): avc: denied { read write } for pid=3521 comm="syz.0.50" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 271.114687][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 271.114887][ T29] audit: type=1400 audit(270.580:111): avc: denied { create } for pid=3567 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 271.166004][ T29] audit: type=1400 audit(270.630:112): avc: denied { bind } for pid=3567 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 271.184935][ T29] audit: type=1400 audit(270.650:113): avc: denied { name_bind } for pid=3567 comm="syz.1.73" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 271.224661][ T29] audit: type=1400 audit(270.690:114): avc: denied { node_bind } for pid=3567 comm="syz.1.73" saddr=172.20.20.187 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 274.345229][ T29] audit: type=1400 audit(273.530:115): avc: denied { create } for pid=3580 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 274.347586][ T29] audit: type=1400 audit(273.550:116): avc: denied { read } for pid=3580 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 274.933012][ T29] audit: type=1400 audit(274.280:117): avc: denied { create } for pid=3584 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 274.933908][ T29] audit: type=1400 audit(274.290:118): avc: denied { getopt } for pid=3584 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 275.772006][ T29] audit: type=1400 audit(275.240:119): avc: denied { setattr } for pid=3586 comm="syz.0.82" name="ptmx" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 283.906280][ T29] audit: type=1400 audit(283.370:120): avc: denied { create } for pid=3633 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 284.050642][ T29] audit: type=1400 audit(283.480:121): avc: denied { write } for pid=3633 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 285.384460][ T29] audit: type=1400 audit(284.850:122): avc: denied { read } for pid=3639 comm="syz.0.109" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 285.415202][ T29] audit: type=1400 audit(284.880:123): avc: denied { open } for pid=3639 comm="syz.0.109" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 285.491945][ T29] audit: type=1400 audit(284.960:124): avc: denied { ioctl } for pid=3639 comm="syz.0.109" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 289.208859][ T29] audit: type=1400 audit(288.670:125): avc: denied { create } for pid=3659 comm="syz.0.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 289.238681][ T29] audit: type=1400 audit(288.680:126): avc: denied { setopt } for pid=3659 comm="syz.0.119" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 293.706001][ T29] audit: type=1400 audit(293.140:127): avc: denied { setopt } for pid=3679 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 294.647781][ T29] audit: type=1400 audit(294.110:128): avc: denied { create } for pid=3688 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 294.674317][ T29] audit: type=1400 audit(294.140:129): avc: denied { ioctl } for pid=3688 comm="syz.0.133" path="socket:[4011]" dev="sockfs" ino=4011 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 296.548669][ T29] audit: type=1400 audit(296.010:130): avc: denied { prog_load } for pid=3700 comm="syz.1.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 296.560189][ T29] audit: type=1400 audit(296.020:131): avc: denied { bpf } for pid=3700 comm="syz.1.139" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 296.574750][ T29] audit: type=1400 audit(296.040:132): avc: denied { read } for pid=3086 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 296.580857][ T29] audit: type=1400 audit(296.040:133): avc: denied { append } for pid=3086 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 296.605647][ T29] audit: type=1400 audit(296.070:134): avc: denied { open } for pid=3086 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 296.617898][ T29] audit: type=1400 audit(296.070:135): avc: denied { getattr } for pid=3086 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 296.619747][ T29] audit: type=1400 audit(296.080:136): avc: denied { perfmon } for pid=3700 comm="syz.1.139" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 296.758637][ T29] audit: type=1400 audit(296.220:137): avc: denied { prog_run } for pid=3700 comm="syz.1.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 301.028306][ T29] audit: type=1400 audit(300.500:138): avc: denied { getopt } for pid=3722 comm="syz.1.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 305.154394][ T3753] random: crng reseeded on system resumption [ 305.157692][ T29] audit: type=1400 audit(304.610:139): avc: denied { write } for pid=3751 comm="syz.0.164" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 305.158855][ T29] audit: type=1400 audit(304.620:140): avc: denied { open } for pid=3751 comm="syz.0.164" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 305.244235][ T29] audit: type=1400 audit(304.710:141): avc: denied { read } for pid=3751 comm="syz.0.164" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 305.621276][ T29] audit: type=1400 audit(305.090:142): avc: denied { read } for pid=3755 comm="syz.0.167" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 305.624367][ T29] audit: type=1400 audit(305.090:143): avc: denied { open } for pid=3755 comm="syz.0.167" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 305.672862][ T29] audit: type=1400 audit(305.140:144): avc: denied { ioctl } for pid=3755 comm="syz.0.167" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 309.273403][ T3780] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 309.309221][ T29] audit: type=1400 audit(308.780:145): avc: denied { getopt } for pid=3779 comm="syz.1.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 314.057938][ T29] audit: type=1400 audit(313.520:146): avc: denied { open } for pid=3810 comm="syz.0.193" path="/dev/ptyq4" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 314.114945][ T29] audit: type=1400 audit(313.580:147): avc: denied { ioctl } for pid=3810 comm="syz.0.193" path="/dev/ptyq4" dev="devtmpfs" ino=115 ioctlcmd=0x540d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 315.399997][ T29] audit: type=1400 audit(314.860:148): avc: denied { setattr } for pid=3820 comm="syz.1.199" name="sockcreate" dev="proc" ino=5193 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 315.830885][ T29] audit: type=1400 audit(315.300:149): avc: denied { getopt } for pid=3822 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 321.283259][ T3852] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3852 comm=syz.0.213 [ 325.999733][ T29] audit: type=1400 audit(325.450:150): avc: denied { create } for pid=3875 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 326.061183][ T29] audit: type=1400 audit(325.530:151): avc: denied { lock } for pid=3875 comm="syz.0.225" path="socket:[5078]" dev="sockfs" ino=5078 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 326.968581][ T29] audit: type=1400 audit(326.430:152): avc: denied { append } for pid=3879 comm="syz.0.227" name="loop5" dev="devtmpfs" ino=642 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 334.962163][ T29] audit: type=1400 audit(334.360:153): avc: denied { read write } for pid=3918 comm="syz.0.247" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 334.964013][ T29] audit: type=1400 audit(334.380:154): avc: denied { open } for pid=3918 comm="syz.0.247" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 335.569699][ T29] audit: type=1400 audit(334.980:155): avc: denied { write } for pid=3917 comm="syz.1.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 335.772304][ T29] audit: type=1400 audit(335.200:156): avc: denied { getopt } for pid=3920 comm="syz.0.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 340.478506][ T29] audit: type=1400 audit(339.860:157): avc: denied { setattr } for pid=3953 comm="syz.0.264" name="zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 343.358345][ C1] [ 343.358874][ C1] ============================= [ 343.359174][ C1] [ BUG: Invalid wait context ] [ 343.359922][ C1] 6.13.0-rc6-syzkaller-00290-gbe548645527a #0 Not tainted [ 343.360506][ C1] ----------------------------- [ 343.360849][ C1] syz.1.271/3967 is trying to lock: [ 343.361322][ C1] ffff00007fc1ffd8 (&zone->lock){-.-.}-{3:3}, at: get_page_from_freelist+0xaa4/0x20f0 [ 343.364131][ C1] other info that might help us debug this: [ 343.364562][ C1] context-{2:2} [ 343.364955][ C1] 2 locks held by syz.1.271/3967: [ 343.365373][ C1] #0: ffff0000126942f8 (&vma->vm_lock->lock){++++}-{4:4}, at: lock_vma_under_rcu+0x128/0x648 [ 343.366649][ C1] #1: ffff000069f98698 (&pcp->lock){+.+.}-{3:3}, at: get_page_from_freelist+0x428/0x20f0 [ 343.367428][ C1] stack backtrace: [ 343.368138][ C1] CPU: 1 UID: 0 PID: 3967 Comm: syz.1.271 Not tainted 6.13.0-rc6-syzkaller-00290-gbe548645527a #0 [ 343.368629][ C1] Hardware name: linux,dummy-virt (DT) [ 343.369392][ C1] Call trace: [ 343.369864][ C1] show_stack+0x18/0x24 (C) [ 343.370319][ C1] dump_stack_lvl+0xa4/0xf4 [ 343.370651][ C1] dump_stack+0x1c/0x28 [ 343.370934][ C1] __lock_acquire+0x1514/0x6604 [ 343.371254][ C1] lock_acquire+0x450/0x76c [ 343.371636][ C1] _raw_spin_lock_irqsave+0x58/0x80 [ 343.371974][ C1] get_page_from_freelist+0xaa4/0x20f0 [ 343.372293][ C1] __alloc_pages_noprof+0x1b4/0x2248 [ 343.372592][ C1] alloc_pages_mpol_noprof+0x104/0x490 [ 343.372902][ C1] alloc_pages_noprof+0x178/0x1ec [ 343.373201][ C1] stack_depot_save_flags+0x2b0/0x9e0 [ 343.373525][ C1] kasan_save_stack+0x50/0x64 [ 343.373812][ C1] __kasan_record_aux_stack+0xa0/0xb8 [ 343.374110][ C1] kasan_record_aux_stack+0x14/0x20 [ 343.374401][ C1] task_work_add+0x9c/0x35c [ 343.374691][ C1] run_posix_cpu_timers+0x520/0x814 [ 343.375083][ C1] update_process_times+0x16c/0x444 [ 343.375505][ C1] tick_nohz_handler+0x198/0x40c [ 343.375895][ C1] __hrtimer_run_queues+0x5ec/0x964 [ 343.376412][ C1] hrtimer_interrupt+0x2a0/0x768 [ 343.376740][ C1] arch_timer_handler_phys+0x40/0x6c [ 343.377214][ C1] handle_percpu_devid_irq+0x19c/0x30c [ 343.377532][ C1] generic_handle_domain_irq+0x78/0xa4 [ 343.377837][ C1] gic_handle_irq+0x54/0x184 [ 343.378202][ C1] call_on_irq_stack+0x24/0x4c [ 343.378490][ C1] do_interrupt_handler+0x12c/0x150 [ 343.378787][ C1] el1_interrupt+0x34/0x54 [ 343.379076][ C1] el1h_64_irq_handler+0x18/0x24 [ 343.379372][ C1] el1h_64_irq+0x6c/0x70 [ 343.379803][ C1] _raw_spin_unlock_irqrestore+0x40/0xac (P) [ 343.380154][ C1] __rmqueue_pcplist+0x590/0x1178 [ 343.380459][ C1] get_page_from_freelist+0x4a0/0x20f0 [ 343.380760][ C1] __alloc_pages_noprof+0x1b4/0x2248 [ 343.381063][ C1] alloc_pages_mpol_noprof+0x104/0x490 [ 343.381381][ C1] folio_alloc_mpol_noprof+0x18/0xa0 [ 343.381690][ C1] vma_alloc_folio_noprof+0x104/0x1bc [ 343.381985][ C1] vma_alloc_zeroed_movable_folio+0x50/0x6c [ 343.382313][ C1] __handle_mm_fault+0x1fec/0x3580 [ 343.382609][ C1] handle_mm_fault+0x32c/0x798 [ 343.382890][ C1] do_page_fault+0x1e8/0xeac [ 343.383199][ C1] do_translation_fault+0x184/0x1e8 [ 343.383522][ C1] do_mem_abort+0x68/0x1a4 [ 343.383810][ C1] el0_da+0x5c/0x174 [ 343.384098][ C1] el0t_64_sync_handler+0xc4/0x138 [ 343.384398][ C1] el0t_64_sync+0x198/0x19c [ 343.761790][ T3973] Invalid ELF header type: 0 != 1 [ 343.824804][ T29] audit: type=1400 audit(343.230:158): avc: denied { module_load } for pid=3967 comm="syz.1.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 344.871072][ T1220] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 345.042851][ T1220] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 345.218553][ T1220] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 345.410211][ T1220] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 345.844174][ T29] audit: type=1400 audit(345.310:159): avc: denied { read } for pid=3131 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 348.280381][ T1220] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 348.361730][ T1220] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 348.423227][ T1220] bond0 (unregistering): Released all slaves [ 348.609270][ T1220] hsr_slave_0: left promiscuous mode [ 348.663012][ T1220] hsr_slave_1: left promiscuous mode [ 348.794599][ T1220] veth1_macvtap: left promiscuous mode [ 348.796156][ T1220] veth0_macvtap: left promiscuous mode [ 348.798947][ T1220] veth1_vlan: left promiscuous mode [ 348.802111][ T1220] veth0_vlan: left promiscuous mode [ 356.244987][ T1220] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 356.420055][ T1220] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 356.621190][ T1220] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 356.825282][ T1220] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.815175][ T1220] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 359.868841][ T1220] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 359.931791][ T1220] bond0 (unregistering): Released all slaves [ 360.102520][ T1220] hsr_slave_0: left promiscuous mode [ 360.180422][ T1220] hsr_slave_1: left promiscuous mode [ 360.303702][ T1220] veth1_macvtap: left promiscuous mode [ 360.304784][ T1220] veth0_macvtap: left promiscuous mode [ 360.306160][ T1220] veth1_vlan: left promiscuous mode [ 360.308491][ T1220] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 00:44:38 Registers: info registers vcpu 0 CPU#0 PC=ffff800080012104 X00=ffff00000f968010 X01=0000000000000000 X02=0000000000000003 X03=1fffe00001f2d002 X04=0000000000000000 X05=0000000000000000 X06=ffff8000847123b8 X07=ffff00000f968000 X08=0000000041b58ab3 X09=ffff700011af0f2e X10=00000000f3f3f3f3 X11=00000000f3000000 X12=dfff800000000000 X13=000000000000f1f1 X14=1ffff000110e6afc X15=1fffe00001f2d14c X16=0000000000000000 X17=0000000000000000 X18=00000000abcc5b74 X19=ffff00000f968000 X20=0000000000000002 X21=0000000000000000 X22=0000000000000000 X23=ffff800086f89660 X24=0000000000000000 X25=ffff8000847123b8 X26=1ffff00011af0f2e X27=ffff800086d8ce08 X28=ffff800086d96fb8 X29=ffff80008d7878f0 X30=ffff8000847123dc SP=ffff80008d7878d0 PSTATE=100003c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008044cc90 X00=1ffff00010ccb1ea X01=dfff800000000000 X02=ffff8000865e4000 X03=0000000000000007 X04=ffff800086658f54 X05=0000000000000000 X06=1ffff00010c6094c X07=dfff800000000000 X08=1ffff000119eaccd X09=0000000041b58ab3 X10=ffff7000119eace1 X11=1ffff000119eace1 X12=ffff7000119eace2 X13=0000000000000006 X14=0000000000000000 X15=fffffffffffd4350 X16=0000000000000000 X17=0000000000000000 X18=0000000000000004 X19=000000000001d087 X20=0000000000000000 X21=ffff8000865e4d38 X22=000000000003a10e X23=ffff8000808d5d18 X24=ffff80008cf56360 X25=ffff80008cf56380 X26=ffff800080000000 X27=000000000003a10e X28=000000000001d087 X29=ffff80008cf56210 X30=ffff80008044dd54 SP=ffff80008cf56210 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffdbe5ec00:c6e0b66f5db9b500 Q02=0000ffffdbe5ebe0:ffffff80ffffffd8 Q03=0000ffffdbe5ec90:0000ffffdbe5ec90 Q04=0000ffffdbe5ec90:0000ffff7ef2ec88 Q05=0000ffffdbe5ec60:0000ffffdbe5ec90 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdbe5eeb0:0000ffffdbe5eeb0 Q17=ffffff80ffffffd0:0000ffffdbe5ee80 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000