last executing test programs: 4.750011063s ago: executing program 1 (id=450): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x20, &(0x7f0000000200)={&(0x7f0000000040)=""/50, 0x32, 0x0, &(0x7f00000001c0)=""/4, 0x4}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r0, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b00000000000000000000000000000100000000", @ANYRES32, @ANYBLOB="000000000000f4ffffffffffffff000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000500"/27], 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x19, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000063012200000000009500"/32], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x1af83a7195852c3, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100006f00000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x9fd, 0x84, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r3}, 0x38) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) 2.391352188s ago: executing program 0 (id=451): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000007c0)) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r0) r4 = fcntl$dupfd(r1, 0x0, r2) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af30, &(0x7f0000000080)={0x0, r3}) 2.391025688s ago: executing program 1 (id=452): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000080)={0x48, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x48}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x48}}, 0x0) 1.989234386s ago: executing program 0 (id=453): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002380)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x5f) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 1.720164468s ago: executing program 0 (id=454): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x0, 0x200000, 0x0, 0x0, 0xffffffff, 0x8003}}}}]}, 0x4c}}, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@getchain={0x24, 0x66, 0xfcd66a900070b359, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x0) 1.651726071s ago: executing program 1 (id=455): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000380)={0x5}) 1.410686188s ago: executing program 0 (id=456): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000340), 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000a80)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], [0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x2) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_DEV_DESTROY(r0, 0x5502) 1.310976217s ago: executing program 1 (id=457): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000040)='fib_table_lookup\x00', r3}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 1.1395787s ago: executing program 0 (id=458): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/592]}, 0x2a0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x4000004) ioctl$sock_SIOCBRDELBR(r0, 0x89a2, &(0x7f0000000000)='bridge0\x00') syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @random="de9ea3f675c1", @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @mcast2, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 958.602525ms ago: executing program 1 (id=459): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000040)={0x8, 0x7, 0xa, 0x1001}) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/168, 0xa8}], 0x1) 750.527325ms ago: executing program 1 (id=460): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) r0 = userfaultfd(0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) r1 = io_uring_setup(0x3eae, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) mlock(&(0x7f00004ef000/0x4000)=nil, 0x4000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000080)={&(0x7f0000c15000/0x1000)=nil, &(0x7f0000508000/0x4000)=nil, 0x1000}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8) epoll_create1(0x80000) 0s ago: executing program 0 (id=461): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000200)={0x34, r1, 0x607, 0x0, 0x0, {}, [@IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x34}, 0x1, 0xa00}, 0x0) kernel console output (not intermixed with test programs): [ 56.742776][ T31] audit: type=1400 audit(56.650:68): avc: denied { read write } for pid=3106 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 56.743904][ T31] audit: type=1400 audit(56.660:69): avc: denied { open } for pid=3106 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:44490' (ED25519) to the list of known hosts. [ 69.663562][ T31] audit: type=1400 audit(69.570:70): avc: denied { name_bind } for pid=3107 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 71.452206][ T31] audit: type=1400 audit(71.350:71): avc: denied { execute } for pid=3109 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 71.464997][ T31] audit: type=1400 audit(71.380:72): avc: denied { execute_no_trans } for pid=3109 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 76.341219][ T31] audit: type=1400 audit(76.250:73): avc: denied { mounton } for pid=3109 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 76.346733][ T31] audit: type=1400 audit(76.260:74): avc: denied { mount } for pid=3109 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 76.365254][ T3109] cgroup: Unknown subsys name 'net' [ 76.375408][ T31] audit: type=1400 audit(76.290:75): avc: denied { unmount } for pid=3109 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 76.591125][ T3109] cgroup: Unknown subsys name 'cpuset' [ 76.598422][ T3109] cgroup: Unknown subsys name 'hugetlb' [ 76.599496][ T3109] cgroup: Unknown subsys name 'rlimit' [ 76.835256][ T31] audit: type=1400 audit(76.750:76): avc: denied { setattr } for pid=3109 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.838292][ T31] audit: type=1400 audit(76.750:77): avc: denied { mounton } for pid=3109 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 76.840311][ T31] audit: type=1400 audit(76.750:78): avc: denied { mount } for pid=3109 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 77.082921][ T3111] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 77.084381][ T31] audit: type=1400 audit(77.000:79): avc: denied { relabelto } for pid=3111 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.089299][ T31] audit: type=1400 audit(77.000:80): avc: denied { write } for pid=3111 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 77.130918][ T31] audit: type=1400 audit(77.040:81): avc: denied { read } for pid=3109 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.134352][ T31] audit: type=1400 audit(77.040:82): avc: denied { open } for pid=3109 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 84.239710][ T3109] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 86.582176][ T31] audit: type=1400 audit(86.490:83): avc: denied { execmem } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 86.616939][ T31] audit: type=1400 audit(86.530:84): avc: denied { read } for pid=3114 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.617963][ T31] audit: type=1400 audit(86.530:85): avc: denied { open } for pid=3114 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.619054][ T31] audit: type=1400 audit(86.530:86): avc: denied { mounton } for pid=3114 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 86.645897][ T31] audit: type=1400 audit(86.560:87): avc: denied { module_request } for pid=3114 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 86.752789][ T31] audit: type=1400 audit(86.660:88): avc: denied { sys_module } for pid=3114 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 87.738269][ T31] audit: type=1400 audit(87.650:89): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 89.447381][ T3114] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 89.454999][ T3116] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 89.459390][ T3114] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 89.465423][ T3116] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 90.810821][ T3116] hsr_slave_0: entered promiscuous mode [ 90.817162][ T3116] hsr_slave_1: entered promiscuous mode [ 90.860528][ T3114] hsr_slave_0: entered promiscuous mode [ 90.865411][ T3114] hsr_slave_1: entered promiscuous mode [ 90.867173][ T3114] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 90.867715][ T3114] Cannot create hsr debugfs directory [ 91.467895][ T31] audit: type=1400 audit(91.380:90): avc: denied { create } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 91.470200][ T31] audit: type=1400 audit(91.380:91): avc: denied { write } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 91.473160][ T31] audit: type=1400 audit(91.390:92): avc: denied { read } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 91.480436][ T3116] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 91.490735][ T3116] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 91.506344][ T3116] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 91.516612][ T3116] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 91.564535][ T3114] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 91.577322][ T3114] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 91.594368][ T3114] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 91.606003][ T3114] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 92.539526][ T3116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.607218][ T3114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 95.850328][ T3116] veth0_vlan: entered promiscuous mode [ 95.885113][ T3116] veth1_vlan: entered promiscuous mode [ 95.978106][ T3116] veth0_macvtap: entered promiscuous mode [ 95.995008][ T3116] veth1_macvtap: entered promiscuous mode [ 96.059006][ T3116] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.068039][ T3116] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.069389][ T3116] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.070153][ T3116] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.249702][ T31] audit: type=1400 audit(96.160:93): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 96.250598][ T31] audit: type=1400 audit(96.160:94): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/syzkaller.My9dFZ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 96.260459][ T31] audit: type=1400 audit(96.170:95): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 96.269260][ T31] audit: type=1400 audit(96.170:96): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/syzkaller.My9dFZ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 96.280741][ T31] audit: type=1400 audit(96.190:97): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/syzkaller.My9dFZ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1018 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 96.305502][ T3114] veth0_vlan: entered promiscuous mode [ 96.324465][ T31] audit: type=1400 audit(96.240:98): avc: denied { unmount } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 96.329958][ T31] audit: type=1400 audit(96.240:99): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 96.338972][ T3114] veth1_vlan: entered promiscuous mode [ 96.347638][ T31] audit: type=1400 audit(96.260:100): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 96.348893][ T31] audit: type=1400 audit(96.260:101): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 96.349887][ T31] audit: type=1400 audit(96.260:102): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 96.439596][ T3116] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 96.480394][ T3114] veth0_macvtap: entered promiscuous mode [ 96.513096][ T3114] veth1_macvtap: entered promiscuous mode [ 96.626883][ T3114] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.627566][ T3114] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.629696][ T3114] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.630041][ T3114] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.489016][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 101.489138][ T31] audit: type=1400 audit(101.400:121): avc: denied { create } for pid=3841 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 101.675718][ T31] audit: type=1400 audit(101.590:122): avc: denied { ioctl } for pid=3841 comm="syz.0.9" path="socket:[2262]" dev="sockfs" ino=2262 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 101.884242][ T31] audit: type=1400 audit(101.800:123): avc: denied { create } for pid=3846 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 101.893551][ T31] audit: type=1400 audit(101.810:124): avc: denied { write } for pid=3846 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 102.010673][ T31] audit: type=1400 audit(101.920:125): avc: denied { ioctl } for pid=3846 comm="syz.0.11" path="socket:[3133]" dev="sockfs" ino=3133 ioctlcmd=0x6429 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 102.014336][ T31] audit: type=1400 audit(101.930:126): avc: denied { write } for pid=3846 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 102.634411][ T31] audit: type=1400 audit(102.550:127): avc: denied { write } for pid=3868 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 103.628957][ T31] audit: type=1400 audit(103.540:128): avc: denied { create } for pid=3876 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 103.632965][ T31] audit: type=1400 audit(103.540:129): avc: denied { write } for pid=3876 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 105.565792][ T31] audit: type=1400 audit(105.480:130): avc: denied { bind } for pid=3893 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 108.752020][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 108.752129][ T31] audit: type=1400 audit(108.660:133): avc: denied { lock } for pid=3907 comm="syz.1.28" path="/dev/rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 111.003780][ T31] audit: type=1400 audit(110.920:134): avc: denied { read } for pid=3928 comm="syz.1.33" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 111.021101][ T31] audit: type=1400 audit(110.930:135): avc: denied { open } for pid=3928 comm="syz.1.33" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 111.031938][ T31] audit: type=1400 audit(110.940:136): avc: denied { ioctl } for pid=3928 comm="syz.1.33" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 112.624283][ T31] audit: type=1400 audit(112.540:137): avc: denied { setopt } for pid=3933 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 112.686454][ T31] audit: type=1400 audit(112.600:138): avc: denied { ioctl } for pid=3933 comm="syz.1.35" path="socket:[3237]" dev="sockfs" ino=3237 ioctlcmd=0x6611 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 114.389785][ T31] audit: type=1400 audit(114.300:139): avc: denied { listen } for pid=3953 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 114.684379][ T31] audit: type=1400 audit(114.600:140): avc: denied { create } for pid=3953 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 114.714419][ T3954] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3954 comm=syz.1.39 [ 114.716056][ T31] audit: type=1400 audit(114.630:141): avc: denied { write } for pid=3953 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 114.722992][ T31] audit: type=1400 audit(114.640:142): avc: denied { accept } for pid=3953 comm="syz.1.39" lport=55720 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 115.364936][ T3970] FAULT_INJECTION: forcing a failure. [ 115.364936][ T3970] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 115.366666][ T3970] CPU: 1 UID: 0 PID: 3970 Comm: syz.1.41 Not tainted 6.12.0-rc2-syzkaller #0 [ 115.367406][ T3970] Hardware name: ARM-Versatile Express [ 115.367942][ T3970] Call trace: [ 115.369018][ T3970] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 115.370720][ T3970] r7:00000000 r6:00000000 r5:60000013 r4:8203d394 [ 115.371290][ T3970] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 115.372065][ T3970] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 115.373033][ T3970] r5:00000000 r4:8274e1c4 [ 115.373646][ T3970] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 115.374158][ T3970] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 115.374673][ T3970] r6:00000000 r5:e06d9f68 r4:00000002 [ 115.375090][ T3970] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 115.375535][ T3970] [<808e5324>] (should_fail_usercopy) from [<8054e664>] (simple_read_from_buffer+0x8c/0x134) [ 115.376021][ T3970] [<8054e5d8>] (simple_read_from_buffer) from [<805c3164>] (proc_fail_nth_read+0xb8/0x100) [ 115.376969][ T3970] r10:00000001 r9:805c30ac r8:00000002 r7:e06d9f68 r6:0000000f r5:76b59f30 [ 115.377871][ T3970] r4:8380ec00 r3:e06d9e9f [ 115.378202][ T3970] [<805c30ac>] (proc_fail_nth_read) from [<80515ddc>] (vfs_read+0x98/0x324) [ 115.379058][ T3970] r8:76b59f30 r7:e06d9f68 r6:8380ec00 r5:0000000f r4:851fe6c0 [ 115.379748][ T3970] [<80515d44>] (vfs_read) from [<80516a8c>] (ksys_read+0x78/0xf8) [ 115.380144][ T3970] r10:00000003 r9:8380ec00 r8:8020029c r7:00000000 r6:00000000 r5:851fe6c0 [ 115.380496][ T3970] r4:851fe6c3 [ 115.380796][ T3970] [<80516a14>] (ksys_read) from [<80516b1c>] (sys_read+0x10/0x14) [ 115.381261][ T3970] r7:00000003 r6:00000004 r5:76b59f30 r4:0000000f [ 115.381669][ T3970] [<80516b0c>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 115.382372][ T3970] Exception stack(0xe06d9fa8 to 0xe06d9ff0) [ 115.382861][ T3970] 9fa0: 0000000f 76b59f30 00000004 76b59f30 0000000f 00000000 [ 115.383426][ T3970] 9fc0: 0000000f 76b59f30 00000004 00000003 00000000 00006364 003d0f00 76b5a0bc [ 115.383913][ T3970] 9fe0: 00000158 76b59ed0 000d8408 00130d94 [ 116.370428][ T3976] FAULT_INJECTION: forcing a failure. [ 116.370428][ T3976] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.371172][ T3976] CPU: 0 UID: 0 PID: 3976 Comm: syz.0.44 Not tainted 6.12.0-rc2-syzkaller #0 [ 116.372130][ T3976] Hardware name: ARM-Versatile Express [ 116.372415][ T3976] Call trace: [ 116.372666][ T3976] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 116.373168][ T3976] r7:20001140 r6:e07e5e30 r5:60000013 r4:8203d394 [ 116.373485][ T3976] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 116.373894][ T3976] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 116.374298][ T3976] r5:00000000 r4:8274e1c4 [ 116.374490][ T3976] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 116.374902][ T3976] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 116.375281][ T3976] r6:e07e5e30 r5:00000000 r4:e07e5f38 [ 116.375533][ T3976] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 116.376359][ T3976] [<808e5324>] (should_fail_usercopy) from [<81486488>] (copy_msghdr_from_user+0x50/0x130) [ 116.377063][ T3976] [<81486438>] (copy_msghdr_from_user) from [<814865e0>] (___sys_sendmsg+0x78/0xd0) [ 116.377553][ T3976] r8:00004008 r7:00000000 r6:8321af00 r5:e07e5f38 r4:e07e5e74 [ 116.377895][ T3976] [<81486568>] (___sys_sendmsg) from [<81486b1c>] (sys_sendmsg+0x78/0xbc) [ 116.378294][ T3976] r10:00000128 r9:84c8a400 r8:8020029c r7:00004008 r6:20001140 r5:8321af00 [ 116.378648][ T3976] r4:00000000 [ 116.378870][ T3976] [<81486aa4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 116.379290][ T3976] Exception stack(0xe07e5fa8 to 0xe07e5ff0) [ 116.379615][ T3976] 5fa0: 00000000 00000000 00000005 20001140 00004008 00000000 [ 116.380034][ T3976] 5fc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b250bc [ 116.380408][ T3976] 5fe0: 76b24ec0 76b24eb0 00018af8 00132ec0 [ 116.380741][ T3976] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 116.835031][ T31] audit: type=1400 audit(116.750:143): avc: denied { create } for pid=3988 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 116.862460][ T31] audit: type=1400 audit(116.770:144): avc: denied { write } for pid=3988 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 117.415983][ T31] audit: type=1400 audit(117.330:145): avc: denied { write } for pid=3996 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 120.286489][ T31] audit: type=1400 audit(120.200:146): avc: denied { ioctl } for pid=4017 comm="syz.0.53" path="socket:[3368]" dev="sockfs" ino=3368 ioctlcmd=0x8936 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 120.660377][ T31] audit: type=1400 audit(120.570:147): avc: denied { create } for pid=4030 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 120.702797][ T31] audit: type=1400 audit(120.610:148): avc: denied { create } for pid=4029 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 120.715340][ T31] audit: type=1400 audit(120.630:149): avc: denied { accept } for pid=4029 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 121.006318][ T4037] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 121.027636][ T31] audit: type=1400 audit(120.940:150): avc: denied { setopt } for pid=4036 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 121.049573][ T31] audit: type=1400 audit(120.960:151): avc: denied { setopt } for pid=4036 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 121.195152][ T4034] capability: warning: `syz.0.58' uses 32-bit capabilities (legacy support in use) [ 121.311042][ T31] audit: type=1400 audit(121.220:152): avc: denied { prog_load } for pid=4041 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 121.315640][ T31] audit: type=1400 audit(121.220:153): avc: denied { bpf } for pid=4041 comm="syz.0.61" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 121.316468][ T31] audit: type=1400 audit(121.230:154): avc: denied { perfmon } for pid=4041 comm="syz.0.61" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 121.352112][ T31] audit: type=1400 audit(121.250:155): avc: denied { prog_run } for pid=4041 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 124.968186][ T4068] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4068 comm=syz.1.69 [ 126.072584][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 126.072783][ T31] audit: type=1400 audit(125.980:157): avc: denied { create } for pid=4069 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 126.093378][ T31] audit: type=1400 audit(126.010:158): avc: denied { create } for pid=4069 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 126.486101][ T31] audit: type=1400 audit(126.400:159): avc: denied { read } for pid=4069 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 126.522847][ T4070] Zero length message leads to an empty skb [ 126.536365][ T31] audit: type=1400 audit(126.450:160): avc: denied { create } for pid=4069 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 126.574615][ T31] audit: type=1400 audit(126.490:161): avc: denied { setopt } for pid=4069 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 126.904408][ T31] audit: type=1400 audit(126.810:162): avc: denied { setopt } for pid=4072 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 128.030266][ T31] audit: type=1400 audit(127.940:163): avc: denied { compute_member } for pid=4083 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 128.247145][ T4087] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 128.459189][ T31] audit: type=1400 audit(128.370:164): avc: denied { read } for pid=4085 comm="syz.0.77" path="socket:[2724]" dev="sockfs" ino=2724 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 128.521893][ T31] audit: type=1400 audit(128.430:165): avc: denied { connect } for pid=4085 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 128.541852][ T31] audit: type=1400 audit(128.430:166): avc: denied { name_connect } for pid=4085 comm="syz.0.77" dest=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 136.609576][ T4156] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=272 sclass=netlink_route_socket pid=4156 comm=syz.0.88 [ 136.610625][ T4156] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4156 comm=syz.0.88 [ 136.698767][ T4158] FAULT_INJECTION: forcing a failure. [ 136.698767][ T4158] name failslab, interval 1, probability 0, space 0, times 1 [ 136.699492][ T4158] CPU: 1 UID: 0 PID: 4158 Comm: syz.1.89 Not tainted 6.12.0-rc2-syzkaller #0 [ 136.699865][ T4158] Hardware name: ARM-Versatile Express [ 136.700116][ T4158] Call trace: [ 136.700357][ T4158] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 136.700822][ T4158] r7:00000d40 r6:8440e4a8 r5:60000013 r4:8203d394 [ 136.701139][ T4158] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 136.702117][ T4158] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 136.702516][ T4158] r5:00000000 r4:82718bdc [ 136.703051][ T4158] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 136.703487][ T4158] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 136.703916][ T4158] r6:8440e4a8 r5:00000018 r4:82c01240 [ 136.704184][ T4158] [<804e811c>] (should_failslab) from [<804cd5ac>] (__kmalloc_noprof+0x9c/0x458) [ 136.704623][ T4158] [<804cd510>] (__kmalloc_noprof) from [<80750e68>] (tomoyo_encode2+0x64/0xf0) [ 136.705116][ T4158] r10:00000fff r9:82f19000 r8:00000000 r7:830983b8 r6:8440e4a8 r5:8512effd [ 136.705474][ T4158] r4:8512eff0 [ 136.705805][ T4158] [<80750e04>] (tomoyo_encode2) from [<80750f18>] (tomoyo_encode+0x24/0x30) [ 136.707238][ T4158] r9:82f19000 r8:00000000 r7:830983b8 r6:8440e4a8 r5:00001000 r4:8512eff1 [ 136.707911][ T4158] [<80750ef4>] (tomoyo_encode) from [<80750fa4>] (tomoyo_realpath_from_path+0x80/0x17c) [ 136.708942][ T4158] r5:00001000 r4:8512e000 [ 136.709191][ T4158] [<80750f24>] (tomoyo_realpath_from_path) from [<8074d0a4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 136.709699][ T4158] r10:837de000 r9:00000000 r8:00000003 r7:00005452 r6:00000004 r5:81ad18e8 [ 136.710090][ T4158] r4:8440e4a8 r3:824ba340 [ 136.710323][ T4158] [<8074cfd8>] (tomoyo_path_number_perm) from [<80751970>] (tomoyo_file_ioctl+0x1c/0x20) [ 136.710777][ T4158] r9:8440e480 r8:00000003 r7:00000000 r6:00000000 r5:00005452 r4:8440e480 [ 136.711155][ T4158] [<80751954>] (tomoyo_file_ioctl) from [<806fffbc>] (security_file_ioctl+0x64/0x1e4) [ 136.712992][ T4158] [<806fff58>] (security_file_ioctl) from [<8052f570>] (sys_ioctl+0x50/0xda8) [ 136.713915][ T4158] r7:00000000 r6:8440e481 r5:00000000 r4:00005452 [ 136.714225][ T4158] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 136.714653][ T4158] Exception stack(0xdfa79fa8 to 0xdfa79ff0) [ 136.715058][ T4158] 9fa0: 00000000 00000000 00000003 00005452 00000000 00000000 [ 136.715467][ T4158] 9fc0: 00000000 00000000 00130e70 00000036 00000000 00006364 003d0f00 76b5a0bc [ 136.715873][ T4158] 9fe0: 76b59ec0 76b59eb0 00018af8 00132ec0 [ 136.716185][ T4158] r10:00000036 r9:837de000 r8:8020029c r7:00000036 r6:00130e70 r5:00000000 [ 136.716565][ T4158] r4:00000000 [ 136.718884][ T4158] ERROR: Out of memory at tomoyo_realpath_from_path. [ 137.277772][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 137.277839][ T31] audit: type=1400 audit(137.190:170): avc: denied { ioctl } for pid=4168 comm="syz.1.91" path="socket:[3530]" dev="sockfs" ino=3530 ioctlcmd=0x8917 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 137.297286][ T31] audit: type=1400 audit(137.210:171): avc: denied { getopt } for pid=4168 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 140.901096][ T31] audit: type=1400 audit(140.810:172): avc: denied { ioctl } for pid=4205 comm="syz.1.96" path="socket:[3560]" dev="sockfs" ino=3560 ioctlcmd=0x8981 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 141.620758][ T31] audit: type=1400 audit(141.530:173): avc: denied { write } for pid=4229 comm="syz.1.104" path="socket:[2925]" dev="sockfs" ino=2925 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 142.257059][ T31] audit: type=1400 audit(142.170:174): avc: denied { setattr } for pid=4234 comm="syz.0.106" name="NETLINK" dev="sockfs" ino=3620 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 143.182974][ T31] audit: type=1400 audit(143.090:175): avc: denied { ioctl } for pid=4253 comm="syz.0.110" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 144.626288][ T31] audit: type=1400 audit(144.540:176): avc: denied { map_read map_write } for pid=4287 comm="syz.0.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 146.193117][ T31] audit: type=1400 audit(146.110:177): avc: denied { create } for pid=4287 comm="syz.0.119" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 146.211096][ T31] audit: type=1400 audit(146.120:178): avc: denied { ioctl } for pid=4287 comm="syz.0.119" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3703 ioctlcmd=0xaa03 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 149.685228][ T4289] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 155.401119][ T4347] FAULT_INJECTION: forcing a failure. [ 155.401119][ T4347] name failslab, interval 1, probability 0, space 0, times 0 [ 155.423725][ T4347] CPU: 0 UID: 0 PID: 4347 Comm: syz.0.129 Not tainted 6.12.0-rc2-syzkaller #0 [ 155.424348][ T4347] Hardware name: ARM-Versatile Express [ 155.424929][ T4347] Call trace: [ 155.425431][ T4347] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 155.426828][ T4347] r7:00000dc0 r6:00000dc0 r5:60000013 r4:8203d394 [ 155.427216][ T4347] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 155.427628][ T4347] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 155.428024][ T4347] r5:00000000 r4:82718bdc [ 155.428256][ T4347] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 155.429102][ T4347] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 155.429609][ T4347] r6:00000dc0 r5:00000019 r4:82c01240 [ 155.429896][ T4347] [<804e811c>] (should_failslab) from [<804cddfc>] (__kmalloc_node_noprof+0xa0/0x464) [ 155.430329][ T4347] [<804cdd5c>] (__kmalloc_node_noprof) from [<8046d2ac>] (__kvmalloc_node_noprof+0x2c/0x110) [ 155.430881][ T4347] r10:81a22500 r9:8366b500 r8:805d0900 r7:ffffffff r6:00000dc0 r5:00000019 [ 155.431703][ T4347] r4:83495800 [ 155.432288][ T4347] [<8046d280>] (__kvmalloc_node_noprof) from [<805d0900>] (proc_sys_call_handler+0x128/0x2dc) [ 155.434792][ T4347] r8:00000000 r7:e0061ef0 r6:e0061f08 r5:00000001 r4:83495800 [ 155.438796][ T4347] [<805d07d8>] (proc_sys_call_handler) from [<805d0ac8>] (proc_sys_write+0x14/0x18) [ 155.442056][ T4347] r10:81a22500 r9:20000200 r8:e0061f68 r7:840c3000 r6:00000018 r5:8440e600 [ 155.442438][ T4347] r4:805d0ab4 [ 155.442667][ T4347] [<805d0ab4>] (proc_sys_write) from [<8051683c>] (vfs_write+0x274/0x44c) [ 155.443157][ T4347] [<805165c8>] (vfs_write) from [<80516b98>] (ksys_write+0x78/0xf8) [ 155.443577][ T4347] r10:00000004 r9:840c3000 r8:8020029c r7:00000000 r6:00000000 r5:8440e600 [ 155.446291][ T4347] r4:8440e603 [ 155.451431][ T4347] [<80516b20>] (ksys_write) from [<80516c28>] (sys_write+0x10/0x14) [ 155.452310][ T4347] r7:00000004 r6:00130e70 r5:00000000 r4:00000000 [ 155.452647][ T4347] [<80516c18>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 155.453190][ T4347] Exception stack(0xe0061fa8 to 0xe0061ff0) [ 155.453665][ T4347] 1fa0: 00000000 00000000 00000004 20000200 00000018 00000000 [ 155.454098][ T4347] 1fc0: 00000000 00000000 00130e70 00000004 00000000 00006364 003d0f00 76b250bc [ 155.454485][ T4347] 1fe0: 76b24ec0 76b24eb0 00018af8 00132ec0 [ 156.125572][ T4354] FAULT_INJECTION: forcing a failure. [ 156.125572][ T4354] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 156.126427][ T4354] CPU: 0 UID: 0 PID: 4354 Comm: syz.1.131 Not tainted 6.12.0-rc2-syzkaller #0 [ 156.126843][ T4354] Hardware name: ARM-Versatile Express [ 156.127120][ T4354] Call trace: [ 156.127342][ T4354] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 156.128156][ T4354] r7:20000380 r6:dff3de30 r5:60000013 r4:8203d394 [ 156.128417][ T4354] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 156.128783][ T4354] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 156.129354][ T4354] r5:00000000 r4:8274e1c4 [ 156.129561][ T4354] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 156.129901][ T4354] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 156.130330][ T4354] r6:dff3de30 r5:00000000 r4:dff3df38 [ 156.130568][ T4354] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 156.131090][ T4354] [<808e5324>] (should_fail_usercopy) from [<81486488>] (copy_msghdr_from_user+0x50/0x130) [ 156.131980][ T4354] [<81486438>] (copy_msghdr_from_user) from [<814865e0>] (___sys_sendmsg+0x78/0xd0) [ 156.132579][ T4354] r8:00000001 r7:00000000 r6:833cc000 r5:dff3df38 r4:dff3de74 [ 156.138818][ T4354] [<81486568>] (___sys_sendmsg) from [<81486b1c>] (sys_sendmsg+0x78/0xbc) [ 156.142138][ T4354] r10:00000128 r9:83d20000 r8:8020029c r7:00000001 r6:20000380 r5:833cc000 [ 156.142513][ T4354] r4:00000000 [ 156.142717][ T4354] [<81486aa4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 156.143189][ T4354] Exception stack(0xdff3dfa8 to 0xdff3dff0) [ 156.143582][ T4354] dfa0: 00000000 00000000 00000004 20000380 00000001 00000000 [ 156.144152][ T4354] dfc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b5a0bc [ 156.144656][ T4354] dfe0: 76b59ec0 76b59eb0 00018af8 00132ec0 [ 156.144977][ T4354] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 157.219088][ T31] audit: type=1400 audit(157.130:179): avc: denied { bind } for pid=4365 comm="syz.0.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 157.597617][ T31] audit: type=1400 audit(157.500:180): avc: denied { read } for pid=4368 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 158.374084][ T4377] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4377 comm=syz.0.139 [ 162.053514][ T31] audit: type=1400 audit(161.970:181): avc: denied { write } for pid=4412 comm="syz.0.154" dev="sockfs" ino=3890 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 162.054173][ T31] audit: type=1400 audit(161.970:182): avc: denied { setattr } for pid=4412 comm="syz.0.154" name="ALG" dev="sockfs" ino=3890 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 162.054887][ T31] audit: type=1400 audit(161.970:183): avc: denied { ioctl } for pid=4412 comm="syz.0.154" path="socket:[3890]" dev="sockfs" ino=3890 ioctlcmd=0x542a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 169.617768][ T31] audit: type=1400 audit(169.530:184): avc: denied { unmount } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 185.399536][ T4467] FAULT_INJECTION: forcing a failure. [ 185.399536][ T4467] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 185.400801][ T4467] CPU: 0 UID: 0 PID: 4467 Comm: syz.0.171 Not tainted 6.12.0-rc2-syzkaller #0 [ 185.401107][ T4467] Hardware name: ARM-Versatile Express [ 185.401625][ T4467] Call trace: [ 185.401858][ T4467] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 185.407692][ T4467] r7:00000080 r6:8369ec00 r5:60000013 r4:8203d394 [ 185.408271][ T4467] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 185.408862][ T4467] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 185.409362][ T4467] r5:00000000 r4:8274e1c4 [ 185.409550][ T4467] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 185.409910][ T4467] [<808e5130>] (should_fail_ex) from [<808e5320>] (should_fail+0x14/0x18) [ 185.410247][ T4467] r6:8369ec00 r5:200000c0 r4:20000080 [ 185.410456][ T4467] [<808e530c>] (should_fail) from [<808e5340>] (should_fail_usercopy+0x1c/0x20) [ 185.410799][ T4467] [<808e5324>] (should_fail_usercopy) from [<806ecca4>] (sys_mq_open+0x50/0x338) [ 185.411132][ T4467] [<806ecc54>] (sys_mq_open) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 185.411819][ T4467] Exception stack(0xdfc19fa8 to 0xdfc19ff0) [ 185.412266][ T4467] 9fa0: 00000000 00000000 20000080 00000080 00000026 200000c0 [ 185.418834][ T4467] 9fc0: 00000000 00000000 00130e70 00000112 00000000 00006364 003d0f00 76b250bc [ 185.419423][ T4467] 9fe0: 76b24ec0 76b24eb0 00018af8 00132ec0 [ 185.419712][ T4467] r10:00000112 r9:8369ec00 r8:8020029c r7:00000112 r6:00130e70 r5:00000000 [ 185.420014][ T4467] r4:00000000 [ 185.753915][ T31] audit: type=1400 audit(185.670:185): avc: denied { create } for pid=4473 comm="syz.0.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 185.757027][ T31] audit: type=1400 audit(185.670:186): avc: denied { setopt } for pid=4473 comm="syz.0.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 185.921945][ T31] audit: type=1400 audit(185.830:187): avc: denied { map } for pid=4473 comm="syz.0.172" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 185.925151][ T31] audit: type=1400 audit(185.830:188): avc: denied { read write } for pid=4473 comm="syz.0.172" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 188.305150][ T31] audit: type=1400 audit(188.220:189): avc: denied { create } for pid=4497 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 188.328720][ T31] audit: type=1400 audit(188.240:190): avc: denied { setopt } for pid=4497 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 188.341973][ T31] audit: type=1400 audit(188.240:191): avc: denied { ioctl } for pid=4497 comm="syz.0.179" path="socket:[4052]" dev="sockfs" ino=4052 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 189.124809][ T31] audit: type=1400 audit(189.040:192): avc: denied { connect } for pid=4508 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 189.137305][ T31] audit: type=1400 audit(189.050:193): avc: denied { ioctl } for pid=4508 comm="syz.1.182" path="socket:[4066]" dev="sockfs" ino=4066 ioctlcmd=0x6629 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 189.511809][ T31] audit: type=1400 audit(189.420:194): avc: denied { connect } for pid=4511 comm="syz.0.183" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 190.170112][ T4514] SELinux: Context system_u:object_r:devicekit_var_run_t:s0 is not valid (left unmapped). [ 204.495396][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 204.495544][ T31] audit: type=1400 audit(204.410:197): avc: denied { ioctl } for pid=4575 comm="syz.1.205" path="socket:[5172]" dev="sockfs" ino=5172 ioctlcmd=0x6687 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 206.101964][ T31] audit: type=1400 audit(206.010:198): avc: denied { unmount } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 209.497285][ T4607] FAULT_INJECTION: forcing a failure. [ 209.497285][ T4607] name failslab, interval 1, probability 0, space 0, times 0 [ 209.498406][ T4607] CPU: 0 UID: 0 PID: 4607 Comm: syz.1.211 Not tainted 6.12.0-rc2-syzkaller #0 [ 209.498959][ T4607] Hardware name: ARM-Versatile Express [ 209.499184][ T4607] Call trace: [ 209.499501][ T4607] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 209.499950][ T4607] r7:00400cc0 r6:00400cc0 r5:60000113 r4:8203d394 [ 209.500503][ T4607] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 209.500947][ T4607] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 209.501783][ T4607] r5:00000000 r4:82718bdc [ 209.502174][ T4607] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 209.502913][ T4607] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 209.503312][ T4607] r6:00400cc0 r5:00000014 r4:82c02000 [ 209.503555][ T4607] [<804e811c>] (should_failslab) from [<804cddfc>] (__kmalloc_node_noprof+0xa0/0x464) [ 209.503980][ T4607] [<804cdd5c>] (__kmalloc_node_noprof) from [<8046d2ac>] (__kvmalloc_node_noprof+0x2c/0x110) [ 209.504396][ T4607] r10:00000000 r9:dfa39e64 r8:8054d03c r7:ffffffff r6:00400cc0 r5:00000014 [ 209.504984][ T4607] r4:00000000 [ 209.505174][ T4607] [<8046d280>] (__kvmalloc_node_noprof) from [<8054d03c>] (simple_xattr_alloc+0x30/0x5c) [ 209.505606][ T4607] r8:851aa030 r7:83fe1e38 r6:8203d394 r5:dfa39e64 r4:00000000 [ 209.505957][ T4607] [<8054d00c>] (simple_xattr_alloc) from [<8054d130>] (simple_xattr_set+0x28/0x184) [ 209.506365][ T4607] r7:83fe1e38 r6:8203d394 r5:dfa39e64 r4:8203d394 [ 209.506653][ T4607] [<8054d108>] (simple_xattr_set) from [<80464f2c>] (shmem_xattr_handler_set+0x194/0x1a8) [ 209.507080][ T4607] r9:dfa39e64 r8:851aa030 r7:0000003d r6:851aa000 r5:83fe1e58 r4:8203d394 [ 209.507437][ T4607] [<80464d98>] (shmem_xattr_handler_set) from [<8054b750>] (__vfs_setxattr+0xb4/0xc8) [ 209.507886][ T4607] r9:80464d98 r8:00000000 r7:8203d394 r6:84840440 r5:8271ed74 r4:83fe1e58 [ 209.508233][ T4607] [<8054b69c>] (__vfs_setxattr) from [<8054c010>] (__vfs_setxattr_noperm+0x7c/0x204) [ 209.508655][ T4607] r9:8271ed74 r8:00000000 r7:83fe1e58 r6:00000001 r5:dfa39e64 r4:84840440 [ 209.509048][ T4607] [<8054bf94>] (__vfs_setxattr_noperm) from [<8054c280>] (__vfs_setxattr_locked+0xe8/0x118) [ 209.509503][ T4607] r10:dfa39de8 r9:00000000 r8:83fe1e58 r7:00000000 r6:dfa39e64 r5:8271ed74 [ 209.509848][ T4607] r4:84840440 [ 209.510047][ T4607] [<8054c198>] (__vfs_setxattr_locked) from [<8054c340>] (vfs_setxattr+0x90/0x180) [ 209.510517][ T4607] r8:8271ed74 r7:dfa39e64 r6:84840440 r5:83fe1ed8 r4:dfa39e50 [ 209.510835][ T4607] [<8054c2b0>] (vfs_setxattr) from [<8054c670>] (do_setxattr+0x94/0x9c) [ 209.511275][ T4607] r10:000000e4 r9:84840440 r8:8271ed74 r7:00000000 r6:00000000 r5:dfa39e64 [ 209.511948][ T4607] r4:dfa39e50 [ 209.512553][ T4607] [<8054c5dc>] (do_setxattr) from [<8054c8c0>] (__do_sys_fsetxattr+0x124/0x140) [ 209.513366][ T4607] r9:8369d400 r8:8369d400 r7:20000000 r6:8527c9c0 r5:8527c9c1 r4:00000000 [ 209.513915][ T4607] [<8054c79c>] (__do_sys_fsetxattr) from [<8054c950>] (sys_fsetxattr+0x1c/0x24) [ 209.514216][ T4607] r8:8020029c r7:000000e4 r6:00130e70 r5:00000000 r4:00000000 [ 209.514409][ T4607] [<8054c934>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 209.514647][ T4607] Exception stack(0xdfa39fa8 to 0xdfa39ff0) [ 209.514808][ T4607] 9fa0: 00000000 00000000 00000003 20000000 00000000 00000000 [ 209.515090][ T4607] 9fc0: 00000000 00000000 00130e70 000000e4 00000000 00006364 003d0f00 76b390bc [ 209.515328][ T4607] 9fe0: 76b38ec0 76b38eb0 00018af8 00132ec0 [ 212.042838][ T4621] netlink: 1508 bytes leftover after parsing attributes in process `syz.0.215'. [ 212.689820][ T31] audit: type=1400 audit(212.600:199): avc: denied { ioctl } for pid=4624 comm="syz.1.217" path="socket:[4399]" dev="sockfs" ino=4399 ioctlcmd=0x8906 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 212.778521][ T4633] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4633 comm=syz.1.217 [ 212.792374][ T31] audit: type=1400 audit(212.710:200): avc: denied { setattr } for pid=4624 comm="syz.1.217" name="PACKET" dev="sockfs" ino=4399 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 216.146384][ T31] audit: type=1400 audit(216.060:201): avc: denied { connect } for pid=4646 comm="syz.1.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 247.092954][ T31] audit: type=1400 audit(247.000:202): avc: denied { create } for pid=4703 comm="syz.0.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 247.506463][ T31] audit: type=1400 audit(247.420:203): avc: denied { write } for pid=4703 comm="syz.0.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 267.312377][ T31] audit: type=1400 audit(267.220:204): avc: denied { read } for pid=4783 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 267.410099][ T4786] FAULT_INJECTION: forcing a failure. [ 267.410099][ T4786] name failslab, interval 1, probability 0, space 0, times 0 [ 267.416925][ T4786] CPU: 0 UID: 0 PID: 4786 Comm: syz.0.256 Not tainted 6.12.0-rc2-syzkaller #0 [ 267.417657][ T4786] Hardware name: ARM-Versatile Express [ 267.417966][ T4786] Call trace: [ 267.418171][ T4786] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 267.418564][ T4786] r7:84c89800 r6:00000cc0 r5:60000013 r4:8203d394 [ 267.418812][ T4786] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 267.419152][ T4786] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 267.419511][ T4786] r5:00000000 r4:82718bdc [ 267.419689][ T4786] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 267.420041][ T4786] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 267.420371][ T4786] r6:00000cc0 r5:8532c180 r4:82c01240 [ 267.420588][ T4786] [<804e811c>] (should_failslab) from [<804cc5d4>] (__kmalloc_cache_noprof+0x4c/0x344) [ 267.421007][ T4786] [<804cc588>] (__kmalloc_cache_noprof) from [<8137a0a0>] (snd_card_file_add+0x2c/0xcc) [ 267.421995][ T4786] r10:81c16774 r9:84c89800 r8:00000000 r7:00000003 r6:83f30040 r5:8532c180 [ 267.423487][ T4786] r4:00000000 [ 267.427774][ T4786] [<8137a074>] (snd_card_file_add) from [<813a8c90>] (snd_pcm_oss_open+0x9c/0x560) [ 267.428962][ T4786] r10:81c16774 r9:84c89800 r8:00000000 r7:00000003 r6:83bfea00 r5:8532c180 [ 267.429554][ T4786] r4:00000000 r3:84c89800 [ 267.429754][ T4786] [<813a8bf4>] (snd_pcm_oss_open) from [<81379214>] (soundcore_open+0x170/0x1d8) [ 267.430161][ T4786] r10:81c16774 r9:0000000c r8:83bfca58 r7:00000003 r6:8291e79c r5:8532c180 [ 267.430491][ T4786] r4:00000013 [ 267.430681][ T4786] [<813790a4>] (soundcore_open) from [<8051c9f4>] (chrdev_open+0xb4/0x214) [ 267.431081][ T4786] r10:00000000 r9:8532c180 r8:8532c1a8 r7:81c14fc4 r6:8532c180 r5:83bfca58 [ 267.431657][ T4786] r4:82fc5200 r3:813790a4 [ 267.432024][ T4786] [<8051c940>] (chrdev_open) from [<80510b58>] (do_dentry_open+0x144/0x4c0) [ 267.439174][ T4786] r9:8532c180 r8:8532c1a8 r7:8051c940 r6:83bfca58 r5:00000000 r4:8532c180 [ 267.440321][ T4786] [<80510a14>] (do_dentry_open) from [<805129cc>] (vfs_open+0x2c/0xec) [ 267.441014][ T4786] r9:8532c180 r8:dfa41e58 r7:00000000 r6:8532c1a8 r5:8271ed74 r4:8532c180 [ 267.441386][ T4786] [<805129a0>] (vfs_open) from [<8052b0f0>] (path_openat+0x770/0x11a4) [ 267.442512][ T4786] r6:dfa41f20 r5:8271ed74 r4:00010400 [ 267.442899][ T4786] [<8052a980>] (path_openat) from [<8052bbc0>] (do_filp_open+0x9c/0x138) [ 267.443261][ T4786] r10:00000142 r9:84c89800 r8:00000001 r7:dfa41e58 r6:dfa41f20 r5:84c89800 [ 267.443583][ T4786] r4:82e49000 [ 267.443773][ T4786] [<8052bb24>] (do_filp_open) from [<80512e78>] (do_sys_openat2+0xbc/0xe4) [ 267.444157][ T4786] r8:8020029c r7:ffffff9c r6:00000004 r5:dfa41f58 r4:82e49000 [ 267.444486][ T4786] [<80512dbc>] (do_sys_openat2) from [<80513280>] (sys_openat+0x98/0xd4) [ 267.444906][ T4786] r7:00000142 r6:00130e70 r5:20001e80 r4:ffffff9c [ 267.445188][ T4786] [<805131e8>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 267.445553][ T4786] Exception stack(0xdfa41fa8 to 0xdfa41ff0) [ 267.445838][ T4786] 1fa0: 00000000 00000000 ffffff9c 20001e80 00010400 00000000 [ 267.446206][ T4786] 1fc0: 00000000 00000000 00130e70 00000142 00000000 00006364 003d0f00 76b250bc [ 267.446601][ T4786] 1fe0: 76b24ec0 76b24eb0 00018af8 00132ec0 [ 267.446877][ T4786] r5:00000000 r4:00000000 [ 268.130113][ T4800] FAULT_INJECTION: forcing a failure. [ 268.130113][ T4800] name failslab, interval 1, probability 0, space 0, times 0 [ 268.130793][ T4800] CPU: 0 UID: 0 PID: 4800 Comm: syz.0.259 Not tainted 6.12.0-rc2-syzkaller #0 [ 268.131145][ T4800] Hardware name: ARM-Versatile Express [ 268.131740][ T4800] Call trace: [ 268.132031][ T4800] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 268.132635][ T4800] r7:840c3000 r6:00000dc0 r5:60000013 r4:8203d394 [ 268.135614][ T4800] [<81998edc>] (show_stack) from [<819b73a0>] (dump_stack_lvl+0x70/0x7c) [ 268.141558][ T4800] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 268.142276][ T4800] r5:00000000 r4:82718bdc [ 268.142612][ T4800] [<819b73ac>] (dump_stack) from [<808e52bc>] (should_fail_ex+0x18c/0x1dc) [ 268.143008][ T4800] [<808e5130>] (should_fail_ex) from [<804e8188>] (should_failslab+0x6c/0x94) [ 268.143423][ T4800] r6:00000dc0 r5:dfb9df38 r4:82c01240 [ 268.143680][ T4800] [<804e811c>] (should_failslab) from [<804cc5d4>] (__kmalloc_cache_noprof+0x4c/0x344) [ 268.144084][ T4800] [<804cc588>] (__kmalloc_cache_noprof) from [<8166fc98>] (tcp_sendmsg_fastopen+0x94/0x188) [ 268.144523][ T4800] r10:24040080 r9:dfb9df38 r8:00000000 r7:dfb9dd04 r6:00000000 r5:dfb9df38 [ 268.146411][ T4800] r4:84075280 [ 268.146675][ T4800] [<8166fc04>] (tcp_sendmsg_fastopen) from [<81670654>] (tcp_sendmsg_locked+0x8c8/0xd34) [ 268.147080][ T4800] r8:84075280 r7:24040080 r6:00000000 r5:dfb9df38 r4:00000000 [ 268.147374][ T4800] [<8166fd8c>] (tcp_sendmsg_locked) from [<81670af0>] (tcp_sendmsg+0x30/0x44) [ 268.147766][ T4800] r10:24040080 r9:dfb9ddd4 r8:dfb9ddd4 r7:00000000 r6:00000000 r5:dfb9df38 [ 268.148102][ T4800] r4:84075280 [ 268.148278][ T4800] [<81670ac0>] (tcp_sendmsg) from [<8174b658>] (inet6_sendmsg+0x40/0x4c) [ 268.148659][ T4800] r7:00000000 r6:84075280 r5:00000000 r4:dfb9df38 [ 268.148965][ T4800] [<8174b618>] (inet6_sendmsg) from [<81483698>] (__sock_sendmsg+0x44/0x78) [ 268.149363][ T4800] r7:00000000 r6:83201b80 r5:dfb9df38 r4:00000000 [ 268.149670][ T4800] [<81483654>] (__sock_sendmsg) from [<8148469c>] (____sys_sendmsg+0x2ac/0x2cc) [ 268.150131][ T4800] r7:00000000 r6:00000000 r5:83201b80 r4:dfb9df38 [ 268.150415][ T4800] [<814843f0>] (____sys_sendmsg) from [<81486604>] (___sys_sendmsg+0x9c/0xd0) [ 268.150826][ T4800] r10:dfb9de34 r9:20000580 r8:24040080 r7:00000000 r6:83201b80 r5:dfb9df38 [ 268.151221][ T4800] r4:00000000 [ 268.151568][ T4800] [<81486568>] (___sys_sendmsg) from [<81486b1c>] (sys_sendmsg+0x78/0xbc) [ 268.152872][ T4800] r10:00000128 r9:840c3000 r8:8020029c r7:24040080 r6:20000580 r5:83201b80 [ 268.157643][ T4800] r4:00000000 [ 268.161418][ T4800] [<81486aa4>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 268.162022][ T4800] Exception stack(0xdfb9dfa8 to 0xdfb9dff0) [ 268.162299][ T4800] dfa0: 00000000 00000000 00000005 20000580 24040080 00000000 [ 268.162689][ T4800] dfc0: 00000000 00000000 00130e70 00000128 00000000 00006364 003d0f00 76b250bc [ 268.163066][ T4800] dfe0: 76b24ec0 76b24eb0 00018af8 00132ec0 [ 268.163350][ T4800] r7:00000128 r6:00130e70 r5:00000000 r4:00000000 [ 273.447115][ T4862] pim6reg1: entered promiscuous mode [ 273.447816][ T4862] pim6reg1: entered allmulticast mode [ 274.003462][ T4876] pim6reg1: entered promiscuous mode [ 274.004052][ T4876] pim6reg1: entered allmulticast mode [ 275.873092][ T4902] pim6reg1: entered promiscuous mode [ 275.874295][ T4902] pim6reg1: entered allmulticast mode [ 277.983915][ T4928] pim6reg1: entered promiscuous mode [ 277.984377][ T4928] pim6reg1: entered allmulticast mode [ 291.457585][ T31] audit: type=1400 audit(291.370:205): avc: denied { create } for pid=5111 comm="syz.1.320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 293.738586][ T5138] cgroup: fork rejected by pids controller in /syz1 [ 294.375274][ T2966] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 294.479560][ T2966] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 294.598802][ T2966] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 294.683943][ T2966] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 295.158444][ T2966] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 295.166598][ T2966] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 295.170313][ T2966] bond0 (unregistering): Released all slaves [ 295.302822][ T2966] hsr_slave_0: left promiscuous mode [ 295.315832][ T2966] hsr_slave_1: left promiscuous mode [ 295.373057][ T2966] veth1_macvtap: left promiscuous mode [ 295.373708][ T2966] veth0_macvtap: left promiscuous mode [ 295.374107][ T2966] veth1_vlan: left promiscuous mode [ 295.374546][ T2966] veth0_vlan: left promiscuous mode [ 298.791260][ T31] audit: type=1400 audit(298.700:206): avc: denied { setopt } for pid=5280 comm="syz.0.346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 299.304239][ T5288] netlink: 61211 bytes leftover after parsing attributes in process `syz.0.347'. [ 301.705303][ T5155] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 301.745950][ T5155] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 305.053244][ T5155] hsr_slave_0: entered promiscuous mode [ 305.057366][ T5155] hsr_slave_1: entered promiscuous mode [ 305.605806][ T31] audit: type=1400 audit(305.520:207): avc: denied { block_suspend } for pid=5503 comm="syz.0.358" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 306.556584][ T31] audit: type=1400 audit(306.470:208): avc: denied { mounton } for pid=5564 comm="syz.0.361" path="/217/file0" dev="tmpfs" ino=1143 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 306.866115][ T5155] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 306.895872][ T5155] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 306.913600][ T5155] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 306.928181][ T5155] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 307.145611][ T31] audit: type=1400 audit(307.060:209): avc: denied { mounton } for pid=5564 comm="syz.0.361" path="/217/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 309.243589][ T5155] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.478564][ T31] audit: type=1400 audit(310.390:210): avc: denied { watch watch_reads } for pid=5628 comm="syz.0.368" path="/224" dev="tmpfs" ino=1177 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 317.658042][ T5704] syz.0.380[5704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.658500][ T5704] syz.0.380[5704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.659893][ T5704] syz.0.380[5704] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 317.829632][ T5155] veth0_vlan: entered promiscuous mode [ 317.921782][ T5155] veth1_vlan: entered promiscuous mode [ 318.127058][ T5155] veth0_macvtap: entered promiscuous mode [ 318.216820][ T5155] veth1_macvtap: entered promiscuous mode [ 318.453295][ T5155] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.454158][ T5155] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.454578][ T5155] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 318.455012][ T5155] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.559833][ T5752] Driver unsupported XDP return value 0 on prog (id 95) dev N/A, expect packet loss! [ 323.235383][ T31] audit: type=1400 audit(323.150:211): avc: denied { create } for pid=5784 comm="syz.0.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 334.594036][ T5852] syz.1.408[5852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.594460][ T5852] syz.1.408[5852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.595559][ T5852] syz.1.408[5852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.476974][ C1] hrtimer: interrupt took 5047504 ns [ 336.697943][ T2966] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.802520][ T2966] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.957404][ T2966] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 337.076952][ T2966] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 337.827918][ T2966] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 337.846423][ T2966] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 337.863089][ T2966] bond0 (unregistering): Released all slaves [ 338.025484][ T2966] hsr_slave_0: left promiscuous mode [ 338.034705][ T2966] hsr_slave_1: left promiscuous mode [ 338.058579][ T2966] veth1_macvtap: left promiscuous mode [ 338.059148][ T2966] veth0_macvtap: left promiscuous mode [ 338.060803][ T2966] veth1_vlan: left promiscuous mode [ 338.061228][ T2966] veth0_vlan: left promiscuous mode [ 347.015736][ T5867] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 347.026314][ T5867] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 350.195013][ T5867] hsr_slave_0: entered promiscuous mode [ 350.215663][ T5867] hsr_slave_1: entered promiscuous mode [ 350.235090][ T5867] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 350.252258][ T5867] Cannot create hsr debugfs directory [ 351.833020][ T31] audit: type=1400 audit(351.720:212): avc: denied { create } for pid=6246 comm="syz.1.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 352.484605][ T31] audit: type=1400 audit(352.390:213): avc: denied { name_bind } for pid=6287 comm="syz.1.435" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 352.485566][ T31] audit: type=1400 audit(352.390:214): avc: denied { node_bind } for pid=6287 comm="syz.1.435" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 352.721695][ T5867] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 352.814712][ T5867] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 352.892332][ T5867] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 352.930520][ T5867] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 354.050815][ T31] audit: type=1400 audit(353.960:215): avc: denied { name_bind } for pid=6317 comm="syz.1.439" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 355.350434][ T5867] 8021q: adding VLAN 0 to HW filter on device bond0 [ 356.873521][ T31] audit: type=1400 audit(356.790:216): avc: denied { nlmsg_write } for pid=6338 comm="syz.1.441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 356.887735][ T31] audit: type=1400 audit(356.800:217): avc: denied { bind } for pid=6338 comm="syz.1.441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 362.332092][ T31] audit: type=1400 audit(362.240:218): avc: denied { execute } for pid=6406 comm="syz.1.448" path="/47/bus" dev="tmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 362.814995][ T6414] ptrace attach of "/syz-executor exec"[5155] was attempted by ""[6414] [ 364.050301][ T5867] veth0_vlan: entered promiscuous mode [ 364.102343][ T5867] veth1_vlan: entered promiscuous mode [ 364.256379][ T5867] veth0_macvtap: entered promiscuous mode [ 364.303006][ T5867] veth1_macvtap: entered promiscuous mode [ 364.552791][ T5867] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 364.553431][ T5867] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 364.554021][ T5867] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 364.554434][ T5867] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 365.844196][ T31] audit: type=1400 audit(365.760:219): avc: denied { setopt } for pid=6441 comm="syz.0.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 366.329405][ T6450] input: syz1 as /devices/virtual/input/input7 [ 368.006601][ T6478] ------------[ cut here ]------------ [ 368.007334][ T6478] WARNING: CPU: 1 PID: 6478 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 368.007964][ T6478] Modules linked in: [ 368.008747][ T6478] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 368.009443][ T6478] CPU: 1 UID: 0 PID: 6478 Comm: syz.1.460 Not tainted 6.12.0-rc2-syzkaller #0 [ 368.010149][ T6478] Hardware name: ARM-Versatile Express [ 368.010438][ T6478] Call trace: [ 368.011075][ T6478] [<81998df8>] (dump_backtrace) from [<81998ef4>] (show_stack+0x18/0x1c) [ 368.012509][ T6478] r7:00000000 r6:826228c4 r5:00000000 r4:8203d394 [ 368.013467][ T6478] [<81998edc>] (show_stack) from [<819b7384>] (dump_stack_lvl+0x54/0x7c) [ 368.013964][ T6478] [<819b7330>] (dump_stack_lvl) from [<819b73c4>] (dump_stack+0x18/0x1c) [ 368.014508][ T6478] r5:00000000 r4:82870d18 [ 368.014791][ T6478] [<819b73ac>] (dump_stack) from [<81999a20>] (panic+0x120/0x374) [ 368.015259][ T6478] [<81999900>] (panic) from [<802420e0>] (get_taint+0x0/0x1c) [ 368.015761][ T6478] r3:8260c5c4 r2:00000001 r1:82025774 r0:8202d1dc [ 368.016072][ T6478] r7:8048c614 [ 368.016263][ T6478] [<8024206c>] (check_panic_on_warn) from [<80242244>] (__warn+0x80/0x188) [ 368.016801][ T6478] [<802421c4>] (__warn) from [<802424c4>] (warn_slowpath_fmt+0x178/0x1f4) [ 368.017362][ T6478] r8:00000009 r7:82054dd8 r6:e009dd24 r5:84e8d400 r4:00000000 [ 368.017774][ T6478] [<80242350>] (warn_slowpath_fmt) from [<8048c614>] (kunmap_local_indexed+0x20c/0x224) [ 368.018334][ T6478] r10:ffedc0a8 r9:84141800 r8:20508000 r7:fffffffe r6:00000003 r5:84e8d400 [ 368.018763][ T6478] r4:ffedc000 [ 368.018972][ T6478] [<8048c408>] (kunmap_local_indexed) from [<80505a48>] (move_pages+0x7e8/0x149c) [ 368.019597][ T6478] r7:fffffffe r6:00000000 r5:83f27810 r4:ffeda840 [ 368.019941][ T6478] [<80505260>] (move_pages) from [<80581c70>] (userfaultfd_ioctl+0x114c/0x2080) [ 368.020434][ T6478] r10:84141800 r9:e009de98 r8:00000001 r7:20c16000 r6:00000000 r5:20000080 [ 368.020913][ T6478] r4:8522d000 [ 368.021137][ T6478] [<80580b24>] (userfaultfd_ioctl) from [<8052f654>] (sys_ioctl+0x134/0xda8) [ 368.022087][ T6478] r10:84e8d400 r9:85330780 r8:00000003 r7:20000080 r6:85330781 r5:00000000 [ 368.022475][ T6478] r4:c028aa05 [ 368.022665][ T6478] [<8052f520>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 368.023284][ T6478] Exception stack(0xe009dfa8 to 0xe009dff0) [ 368.023618][ T6478] dfa0: 00000000 00000000 00000003 c028aa05 20000080 00000000 [ 368.024148][ T6478] dfc0: 00000000 00000000 00286380 00000036 00000000 00006364 003d0f00 76ae10bc [ 368.024593][ T6478] dfe0: 76ae0ec0 76ae0eb0 00018af8 00132ec0 [ 368.024937][ T6478] r10:00000036 r9:84e8d400 r8:8020029c r7:00000036 r6:00286380 r5:00000000 [ 368.025304][ T6478] r4:00000000 [ 368.027151][ T6478] Rebooting in 86400 seconds.. VM DIAGNOSIS: 03:01:07 Registers: info registers vcpu 0 CPU#0 R00=827bb6b8 R01=821dee1c R02=5b914000 R03=819b91f0 R04=828b5200 R05=00011e74 R06=00011e74 R07=72e79600 R08=df969e50 R09=00000000 R10=841c3c00 R11=df801e24 R12=df801e28 R13=df801e18 R14=8123a8ec R15=819b9200 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=7eed214d s17=76f026b0 d08=76f026b07eed214d s18=0040031f s19=00000000 d09=000000000040031f s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84139c40 R01=0000002e R02=eb125000 R03=eb125018 R04=82873422 R05=84139c40 R06=809e85e4 R07=82873463 R08=8287341c R09=00000048 R10=00000001 R11=e009d9d8 R12=00000002 R13=e009d9cc R14=82757e24 R15=809e85f4 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000