last executing test programs: 28.059727147s ago: executing program 0 (id=198): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r1, &(0x7f0000001080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000100)=0x80) dup3(r0, r2, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg$unix(r3, &(0x7f00000015c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x6, 0xb, 0x0, &(0x7f0000000000)) 25.408653863s ago: executing program 0 (id=211): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) ioctl$TIOCGPTLCK(r1, 0x541b, &(0x7f00000001c0)) 25.335781179s ago: executing program 0 (id=212): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mlockall(0x0) ioctl$TIOCNOTTY(r0, 0x5413) 25.243391318s ago: executing program 0 (id=213): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r0, r1, 0x2}, 0x10) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@cgroup=r2, 0x2, 0x0, 0x0, &(0x7f0000001440)=[0x0], 0x1, 0x0, 0x0, 0x0, 0x0}, 0x40) 25.150724276s ago: executing program 0 (id=214): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000300)={{r0, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f0000000780)='%pi6 \x00'}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 25.126722138s ago: executing program 0 (id=215): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x16, 0x0, &(0x7f0000000000)="b9ff03076044238c9e9e15f088a84cb688a84d7286dd", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x90) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f0000000000)="b9ff03076003008cb89e08008100", 0x0, 0xe2, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 9.119074616s ago: executing program 1 (id=232): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x0) r1 = accept$inet(r0, 0x0, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) 8.050762581s ago: executing program 1 (id=233): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0x541b, 0x0) write$P9_RWRITE(r1, 0x0, 0x0) 7.72949508s ago: executing program 1 (id=234): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x3938700}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvfrom$unix(r2, &(0x7f0000001100)=""/176, 0xb0, 0x0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000200)={'#! ', '', [{0x20, '#!2'}, {0x20, '#! '}, {0x20, '/proc/sys/net/ipv4/tcp_congestion_control\x00'}, {}], 0xa, "8855d1bef46f70e481dbdabbfc3bcc3f005c1079e7344e4392717247b88b05708cd1663511237737ac00004c03fa9d00005380"}, 0xfffffe59) sendmsg$unix(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000001c0)='D', 0x1}], 0x1}, 0x0) close(r1) recvmmsg(0xffffffffffffffff, &(0x7f0000000640)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) rt_sigreturn() r3 = eventfd2(0x0, 0x0) r4 = dup2(r3, r3) write$FUSE_INTERRUPT(r4, &(0x7f00000020c0)={0x10, 0xffffffffffffffda}, 0x10) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0xfffffffffffffffe}, 0x20) 4.349999112s ago: executing program 1 (id=235): rt_sigreturn() r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x8, 0x0) rt_sigreturn() mknod(&(0x7f0000000040)='./file0\x00', 0x1000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 1.970035204s ago: executing program 1 (id=236): pipe2$9p(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r2, 0x26, &(0x7f0000000000)) fcntl$lock(r2, 0x7, &(0x7f00000006c0)={0x1}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r4 = dup(r3) dup3(r4, r2, 0x0) rt_sigreturn() futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) close(r5) memfd_create(&(0x7f0000000300)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde%\x00]\xd8\xebD\x82S\x17?\xd6As\xc2\xb1\x9aF\xe2\xba[\xc7%\x88 \xeeQR\x9f\x81\x8b\xdc\xc7\xdc\xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5*T\x1e^\xf7o\xff\xff\xff\xffwI\x02\xf3\xe3\x8d.\xd1=\xcf\xbf\x81\xcb\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xce\x83\xab\x05\x19-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6\xff\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad\x06\xdd\xaf\x84\xf4\"\x13\xcf\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\xf1\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xcf\x7f\b\x94 2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94', 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x3938700}}, 0x0) fallocate(r5, 0x0, 0x0, 0x8000007) 0s ago: executing program 1 (id=237): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x4c, &(0x7f0000000000), 0x4) sendmsg$inet(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$SIOCSIFHWADDR(r2, 0xff08, 0x0) kernel console output (not intermixed with test programs): [ 48.289652][ T31] audit: type=1400 audit(48.230:68): avc: denied { read write } for pid=2997 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.292040][ T31] audit: type=1400 audit(48.230:69): avc: denied { open } for pid=2997 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:5823' (ED25519) to the list of known hosts. [ 58.313739][ T31] audit: type=1400 audit(58.250:70): avc: denied { name_bind } for pid=2998 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 60.832480][ T31] audit: type=1400 audit(60.770:71): avc: denied { execute } for pid=3000 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 60.849586][ T31] audit: type=1400 audit(60.790:72): avc: denied { execute_no_trans } for pid=3000 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.574452][ T31] audit: type=1400 audit(63.510:73): avc: denied { mounton } for pid=3000 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 63.580115][ T31] audit: type=1400 audit(63.520:74): avc: denied { mount } for pid=3000 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.595844][ T3000] cgroup: Unknown subsys name 'net' [ 63.605385][ T31] audit: type=1400 audit(63.540:75): avc: denied { unmount } for pid=3000 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.780276][ T3000] cgroup: Unknown subsys name 'hugetlb' [ 63.780930][ T3000] cgroup: Unknown subsys name 'rlimit' [ 64.056258][ T31] audit: type=1400 audit(63.990:76): avc: denied { setattr } for pid=3000 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 64.058016][ T31] audit: type=1400 audit(63.990:77): avc: denied { mounton } for pid=3000 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 64.059266][ T31] audit: type=1400 audit(64.000:78): avc: denied { mount } for pid=3000 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 64.294763][ T3002] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 64.296049][ T31] audit: type=1400 audit(64.230:79): avc: denied { relabelto } for pid=3002 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 64.302184][ T31] audit: type=1400 audit(64.240:80): avc: denied { write } for pid=3002 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 64.328647][ T31] audit: type=1400 audit(64.270:81): avc: denied { read } for pid=3000 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 64.329476][ T31] audit: type=1400 audit(64.270:82): avc: denied { open } for pid=3000 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 71.210507][ T3000] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 73.018075][ T31] audit: type=1400 audit(72.950:83): avc: denied { execmem } for pid=3003 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 73.068618][ T31] audit: type=1400 audit(73.010:84): avc: denied { mounton } for pid=3005 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 73.077994][ T31] audit: type=1400 audit(73.010:85): avc: denied { mount } for pid=3005 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 73.078682][ T31] audit: type=1400 audit(73.010:86): avc: denied { read } for pid=3005 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 73.079297][ T31] audit: type=1400 audit(73.010:87): avc: denied { open } for pid=3005 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 73.082792][ T31] audit: type=1400 audit(73.020:88): avc: denied { mounton } for pid=3005 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 73.104599][ T31] audit: type=1400 audit(73.040:89): avc: denied { module_request } for pid=3005 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 73.210480][ T31] audit: type=1400 audit(73.150:90): avc: denied { sys_module } for pid=3005 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 73.900187][ T31] audit: type=1400 audit(73.830:91): avc: denied { ioctl } for pid=3005 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.020669][ T3005] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.025072][ T3005] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.180529][ T3006] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 75.187213][ T3006] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.956886][ T3005] hsr_slave_0: entered promiscuous mode [ 75.962413][ T3005] hsr_slave_1: entered promiscuous mode [ 76.168182][ T31] audit: type=1400 audit(76.100:92): avc: denied { create } for pid=3005 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 76.173436][ T3005] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 76.183913][ T3005] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 76.189984][ T3005] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 76.194200][ T3005] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 76.323212][ T3006] hsr_slave_0: entered promiscuous mode [ 76.324910][ T3006] hsr_slave_1: entered promiscuous mode [ 76.326259][ T3006] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 76.326606][ T3006] Cannot create hsr debugfs directory [ 76.585041][ T3006] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 76.594344][ T3006] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 76.602219][ T3006] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 76.609210][ T3006] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 76.956802][ T3005] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.412038][ T3006] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.954682][ T3005] veth0_vlan: entered promiscuous mode [ 79.982949][ T3005] veth1_vlan: entered promiscuous mode [ 80.043991][ T3005] veth0_macvtap: entered promiscuous mode [ 80.056001][ T3005] veth1_macvtap: entered promiscuous mode [ 80.121392][ T3005] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.122194][ T3005] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.122513][ T3005] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.122805][ T3005] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.244335][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 80.244420][ T31] audit: type=1400 audit(80.180:95): avc: denied { mount } for pid=3005 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 80.258667][ T31] audit: type=1400 audit(80.190:96): avc: denied { mounton } for pid=3005 comm="syz-executor" path="/syzkaller.YQxaEh/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 80.259658][ T31] audit: type=1400 audit(80.190:97): avc: denied { mount } for pid=3005 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 80.276087][ T31] audit: type=1400 audit(80.210:98): avc: denied { unmount } for pid=3005 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 80.282346][ T31] audit: type=1400 audit(80.220:99): avc: denied { mounton } for pid=3005 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 80.298450][ T31] audit: type=1400 audit(80.220:100): avc: denied { mount } for pid=3005 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 80.421432][ T31] audit: type=1400 audit(80.360:101): avc: denied { read write } for pid=3005 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 80.428391][ T31] audit: type=1400 audit(80.360:102): avc: denied { open } for pid=3005 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 80.429466][ T31] audit: type=1400 audit(80.360:103): avc: denied { ioctl } for pid=3005 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 80.501349][ T3006] veth0_vlan: entered promiscuous mode [ 80.518105][ T3006] veth1_vlan: entered promiscuous mode [ 80.590986][ T3006] veth0_macvtap: entered promiscuous mode [ 80.601169][ T3006] veth1_macvtap: entered promiscuous mode [ 80.683050][ T3006] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.683658][ T3006] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.684003][ T3006] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.684316][ T3006] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.956942][ T31] audit: type=1400 audit(80.890:104): avc: denied { prog_load } for pid=3692 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 81.025447][ T3693] netlink: 'syz.1.2': attribute type 3 has an invalid length. [ 81.030981][ T3693] netlink: 'syz.1.2': attribute type 3 has an invalid length. [ 81.045637][ T3693] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2'. [ 94.593364][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 94.593519][ T31] audit: type=1400 audit(94.530:119): avc: denied { read } for pid=3749 comm="syz.1.29" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 95.366143][ T31] audit: type=1400 audit(95.300:120): avc: denied { ioctl } for pid=3759 comm="syz.0.34" path="socket:[3204]" dev="sockfs" ino=3204 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 95.572180][ T31] audit: type=1400 audit(95.510:121): avc: denied { write } for pid=3759 comm="syz.0.34" name="anycast6" dev="proc" ino=4026532709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 95.728892][ T3767] capability: warning: `syz.0.36' uses deprecated v2 capabilities in a way that may be insecure [ 96.051903][ T3771] mmap: syz.0.38 (3771) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 96.493914][ T31] audit: type=1400 audit(96.430:122): avc: denied { map_read map_write } for pid=3780 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 98.134485][ T2855] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 98.249215][ T2855] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 98.352008][ T2855] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 98.518536][ T2855] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 99.069610][ T2855] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 99.089053][ T2855] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 99.092240][ T2855] bond0 (unregistering): Released all slaves [ 99.255886][ T2855] hsr_slave_0: left promiscuous mode [ 99.269196][ T2855] hsr_slave_1: left promiscuous mode [ 99.276077][ T2855] veth1_macvtap: left promiscuous mode [ 99.276565][ T2855] veth0_macvtap: left promiscuous mode [ 99.276971][ T2855] veth1_vlan: left promiscuous mode [ 99.277799][ T2855] veth0_vlan: left promiscuous mode [ 103.888636][ T3799] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 103.920180][ T3799] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 105.691454][ T3799] hsr_slave_0: entered promiscuous mode [ 105.693803][ T3799] hsr_slave_1: entered promiscuous mode [ 106.303971][ T3799] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 106.323033][ T3799] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 106.340954][ T3799] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 106.351180][ T3799] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 107.495921][ T3799] 8021q: adding VLAN 0 to HW filter on device bond0 [ 108.070171][ T31] audit: type=1400 audit(108.010:123): avc: denied { write } for pid=4179 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 109.120949][ T31] audit: type=1400 audit(109.060:124): avc: denied { mounton } for pid=4201 comm="syz.1.62" path="/proc/61/task" dev="proc" ino=3358 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 111.519687][ T3799] veth0_vlan: entered promiscuous mode [ 111.554560][ T3799] veth1_vlan: entered promiscuous mode [ 111.624633][ T3799] veth0_macvtap: entered promiscuous mode [ 111.643620][ T3799] veth1_macvtap: entered promiscuous mode [ 111.751724][ T3799] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 111.752229][ T3799] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 111.752565][ T3799] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 111.752871][ T3799] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.750255][ T31] audit: type=1400 audit(113.690:125): avc: denied { create } for pid=4252 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 113.760557][ T31] audit: type=1400 audit(113.700:126): avc: denied { getopt } for pid=4252 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 118.914803][ T4297] Zero length message leads to an empty skb [ 119.093035][ T4301] tap0: tun_chr_ioctl cmd 1074025677 [ 119.094424][ T4301] tap0: linktype set to 804 [ 119.452379][ T31] audit: type=1400 audit(119.390:127): avc: denied { mounton } for pid=4308 comm="syz.1.87" path="/31/file0" dev="tmpfs" ino=186 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 119.471658][ T31] audit: type=1400 audit(119.410:128): avc: denied { unmount } for pid=3006 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 122.857056][ T31] audit: type=1400 audit(122.790:129): avc: denied { read } for pid=4329 comm="syz.1.96" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 122.858323][ T31] audit: type=1400 audit(122.790:130): avc: denied { open } for pid=4329 comm="syz.1.96" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 123.257911][ T31] audit: type=1400 audit(123.190:131): avc: denied { ioctl } for pid=4331 comm="syz.0.97" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 127.755544][ T4368] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 127.808767][ T31] audit: type=1400 audit(127.750:132): avc: denied { ioctl } for pid=4369 comm="syz.0.114" path="socket:[3651]" dev="sockfs" ino=3651 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 127.978717][ T31] audit: type=1400 audit(127.910:133): avc: denied { name_bind } for pid=4376 comm="syz.0.118" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 127.988298][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 128.554399][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 128.923226][ T31] audit: type=1400 audit(128.860:134): avc: denied { execute } for pid=4413 comm="syz.0.135" path=2F6D656D66643AC0873A2A18C16BA7875BA06F38AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA936147D4FD1E42DC6062CEBB4865299086E39608E0FAB1D84EB257CB8D7D336C6D38A537C9202864656C6574656429 dev="tmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 134.846951][ T4448] wg2: entered promiscuous mode [ 134.848517][ T4448] wg2: entered allmulticast mode [ 135.195063][ T31] audit: type=1400 audit(135.130:135): avc: denied { mounton } for pid=4456 comm="syz.0.153" path="/proc/146/cgroup" dev="proc" ino=4162 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 135.202075][ T31] audit: type=1400 audit(135.140:136): avc: denied { mounton } for pid=4456 comm="syz.0.153" path="/proc/146/cgroup" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 135.363909][ T4458] IPv6: sit1: Disabled Multicast RS [ 147.972845][ T31] audit: type=1400 audit(147.910:137): avc: denied { create } for pid=4481 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 149.079664][ T31] audit: type=1400 audit(149.010:138): avc: denied { create } for pid=4488 comm="syz.0.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 152.309651][ T31] audit: type=1400 audit(152.250:139): avc: denied { create } for pid=4505 comm="syz.0.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 152.362547][ T31] audit: type=1400 audit(152.300:140): avc: denied { setopt } for pid=4505 comm="syz.0.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 157.837935][ T31] audit: type=1400 audit(157.770:141): avc: denied { ioctl } for pid=4513 comm="syz.0.173" path="socket:[3924]" dev="sockfs" ino=3924 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 159.138272][ T31] audit: type=1400 audit(159.080:142): avc: denied { create } for pid=4521 comm="syz.0.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 169.131753][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 169.995763][ T2855] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 170.065691][ T2855] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 170.122514][ T2855] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 170.182045][ T2855] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 170.455520][ T2855] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 170.462929][ T2855] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 170.468532][ T2855] bond0 (unregistering): Released all slaves [ 170.598187][ T2855] hsr_slave_0: left promiscuous mode [ 170.600618][ T2855] hsr_slave_1: left promiscuous mode [ 170.610720][ T2855] veth1_macvtap: left promiscuous mode [ 170.611111][ T2855] veth0_macvtap: left promiscuous mode [ 170.611462][ T2855] veth1_vlan: left promiscuous mode [ 170.611758][ T2855] veth0_vlan: left promiscuous mode [ 173.408221][ T1573] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 173.588584][ T1573] usb 2-1: Using ep0 maxpacket: 8 [ 173.625351][ T1573] usb 2-1: config 179 has an invalid interface number: 65 but max is 0 [ 173.625663][ T1573] usb 2-1: config 179 has no interface number 0 [ 173.625915][ T1573] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 173.626154][ T1573] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1025, setting to 1024 [ 173.626564][ T1573] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 173.626761][ T1573] usb 2-1: config 179 interface 65 altsetting 0 endpoint 0x83 has invalid maxpacket 41728, setting to 1024 [ 173.626981][ T1573] usb 2-1: config 179 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 173.630992][ T4604] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 173.634090][ T4604] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 173.635785][ T1573] usb 2-1: New USB device found, idVendor=12ab, idProduct=90a3, bcdDevice=1e.eb [ 173.635996][ T1573] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 173.654190][ T4765] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 173.938893][ T1573] input: Generic X-Box pad as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:179.65/input/input3 [ 174.162240][ C1] xpad 2-1:179.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 174.162831][ C1] xpad 2-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 174.164429][ T1573] usb 2-1: USB disconnect, device number 2 [ 174.176130][ T1573] xpad 2-1:179.65: xpad_try_sending_next_out_packet - usb_submit_urb failed with result -19 [ 176.160716][ T4604] hsr_slave_0: entered promiscuous mode [ 176.163959][ T4604] hsr_slave_1: entered promiscuous mode [ 177.619107][ T4604] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 177.636009][ T4604] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 177.655758][ T4604] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 177.687025][ T4604] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 179.634877][ T4604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.951241][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 187.900631][ T4604] veth0_vlan: entered promiscuous mode [ 187.940775][ T4604] veth1_vlan: entered promiscuous mode [ 188.131198][ T4604] veth0_macvtap: entered promiscuous mode [ 188.142580][ T4604] veth1_macvtap: entered promiscuous mode [ 188.234963][ T4604] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.235482][ T4604] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.235805][ T4604] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 188.236108][ T4604] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 189.012253][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 189.088096][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 189.164628][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 189.266031][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 189.708894][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 189.730304][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 189.735175][ T11] bond0 (unregistering): Released all slaves [ 189.887861][ T11] hsr_slave_0: left promiscuous mode [ 189.907912][ T11] hsr_slave_1: left promiscuous mode [ 189.915469][ T11] veth1_macvtap: left promiscuous mode [ 189.915958][ T11] veth0_macvtap: left promiscuous mode [ 189.916353][ T11] veth1_vlan: left promiscuous mode [ 189.916700][ T11] veth0_vlan: left promiscuous mode [ 194.779166][ T5087] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.785839][ T5087] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 195.383950][ T5314] 8<--- cut here --- [ 195.384364][ T5314] Unable to handle kernel NULL pointer dereference at virtual address 00000008 when read [ 195.384875][ T5314] [00000008] *pgd=8528a003, *pmd=fee7f003 [ 195.386213][ T5314] Internal error: Oops: 205 [#1] PREEMPT SMP ARM [ 195.387002][ T5314] Modules linked in: [ 195.387780][ T5314] CPU: 1 PID: 5314 Comm: syz.1.237 Not tainted 6.10.0-syzkaller #0 [ 195.388681][ T5314] Hardware name: ARM-Versatile Express [ 195.389136][ T5314] PC is at path_from_stashed+0x1c/0x308 [ 195.390122][ T5314] LR is at open_namespace+0x44/0xbc [ 195.390446][ T5314] pc : [<8053af54>] lr : [<8054d6f8>] psr: 80000013 [ 195.390948][ T5314] sp : dfa85e80 ip : 836e6c00 fp : dfa85ec4 [ 195.391299][ T5314] r10: 836e6c00 r9 : 00000005 r8 : 8422ae40 [ 195.391599][ T5314] r7 : 82caa250 r6 : 836e6c00 r5 : 00000000 r4 : 84412f50 [ 195.391923][ T5314] r3 : dfa85ecc r2 : 00000008 r1 : 82c95800 r0 : 00000008 [ 195.392301][ T5314] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 195.392639][ T5314] Control: 30c5387d Table: 8461dec0 DAC: 00000000 [ 195.393008][ T5314] Register r0 information: non-paged memory [ 195.393801][ T5314] Register r1 information: slab kmalloc-1k start 82c95800 pointer offset 0 size 1024 [ 195.394737][ T5314] Register r2 information: non-paged memory [ 195.395013][ T5314] Register r3 information: 2-page vmalloc region starting at 0xdfa84000 allocated at kernel_clone+0xac/0x3e4 [ 195.395701][ T5314] Register r4 information: slab anon_vma_chain start 84412f50 pointer offset 0 size 40 [ 195.396235][ T5314] Register r5 information: NULL pointer [ 195.396522][ T5314] Register r6 information: slab task_struct start 836e6c00 pointer offset 0 size 3072 [ 195.397050][ T5314] Register r7 information: slab mnt_cache start 82caa240 pointer offset 16 size 184 [ 195.397744][ T5314] Register r8 information: slab filp start 8422ae40 pointer offset 0 size 160 [ 195.398289][ T5314] Register r9 information: non-paged memory [ 195.398654][ T5314] Register r10 information: slab task_struct start 836e6c00 pointer offset 0 size 3072 [ 195.399237][ T5314] Register r11 information: 2-page vmalloc region starting at 0xdfa84000 allocated at kernel_clone+0xac/0x3e4 [ 195.399735][ T5314] Register r12 information: slab task_struct start 836e6c00 pointer offset 0 size 3072 [ 195.400218][ T5314] Process syz.1.237 (pid: 5314, stack limit = 0xdfa84000) [ 195.400785][ T5314] Stack: (0xdfa85e80 to 0xdfa86000) [ 195.401218][ T5314] 5e80: 805525e4 836e6c00 dfa85ebc dfa85e98 8027c93c 802ac404 00000000 84412f50 [ 195.401736][ T5314] 5ea0: 00000000 836e6c00 83cbf480 8422ae40 00000005 836e6c00 dfa85ef4 dfa85ec8 [ 195.402300][ T5314] 5ec0: 8054d6f8 8053af44 dfa85ef4 00000000 00000000 b8a6f9fc 84412f50 84412f50 [ 195.402662][ T5314] 5ee0: 83cbec00 00000008 dfa85f14 dfa85ef8 8055271c 8054d6c0 0000ff08 00000000 [ 195.403007][ T5314] 5f00: 8422ae41 00000000 dfa85fa4 dfa85f18 8051a7f0 805525a4 836e6c00 00000001 [ 195.403463][ T5314] 5f20: ecac8b10 836e6c00 dfa85f44 dfa85f38 81903eac 81903d7c dfa85f5c dfa85f48 [ 195.403811][ T5314] 5f40: 8024b544 8027aebc 40000000 dfa85fb0 dfa85f84 dfa85f60 80202dd8 8024b500 [ 195.404139][ T5314] 5f60: 8261c90c dfa85fb0 0014aa30 ecac8b10 80202cc0 b8a6f9fc dfa85fac 00000000 [ 195.404464][ T5314] 5f80: 00000000 002642e0 00000036 8020029c 836e6c00 00000036 00000000 dfa85fa8 [ 195.404841][ T5314] 5fa0: 80200060 8051a6c8 00000000 00000000 00000005 0000ff08 00000000 00000000 [ 195.405171][ T5314] 5fc0: 00000000 00000000 002642e0 00000036 7e948766 7e948767 003d0f00 76be00bc [ 195.405541][ T5314] 5fe0: 76bdfec8 76bdfeb8 000183ec 00130580 60000010 00000005 00000000 00000000 [ 195.405983][ T5314] Call trace: [ 195.406408][ T5314] [<8053af38>] (path_from_stashed) from [<8054d6f8>] (open_namespace+0x44/0xbc) [ 195.407161][ T5314] r10:836e6c00 r9:00000005 r8:8422ae40 r7:83cbf480 r6:836e6c00 r5:00000000 [ 195.407772][ T5314] r4:84412f50 [ 195.408088][ T5314] [<8054d6b4>] (open_namespace) from [<8055271c>] (pidfd_ioctl+0x184/0x4c4) [ 195.408451][ T5314] r6:00000008 r5:83cbec00 r4:84412f50 [ 195.408684][ T5314] [<80552598>] (pidfd_ioctl) from [<8051a7f0>] (sys_ioctl+0x134/0xda4) [ 195.409075][ T5314] r7:00000000 r6:8422ae41 r5:00000000 r4:0000ff08 [ 195.409458][ T5314] [<8051a6bc>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 195.409955][ T5314] Exception stack(0xdfa85fa8 to 0xdfa85ff0) [ 195.410222][ T5314] 5fa0: 00000000 00000000 00000005 0000ff08 00000000 00000000 [ 195.410709][ T5314] 5fc0: 00000000 00000000 002642e0 00000036 7e948766 7e948767 003d0f00 76be00bc [ 195.411075][ T5314] 5fe0: 76bdfec8 76bdfeb8 000183ec 00130580 [ 195.411413][ T5314] r10:00000036 r9:836e6c00 r8:8020029c r7:00000036 r6:002642e0 r5:00000000 [ 195.411879][ T5314] r4:00000000 [ 195.412479][ T5314] Code: e24dd01c e1a07001 e5911004 ee1dcf70 (e5905000) SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 195.459807][ T5314] ---[ end trace 0000000000000000 ]--- [ 195.461894][ T5314] Kernel panic - not syncing: Fatal exception [ 195.464525][ T5314] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:38:17 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000002 R03=819046e4 R04=826f5408 R05=826f5400 R06=00000028 R07=00000006 R08=826f5408 R09=00000000 R10=8349b6ac R11=dfb55e44 R12=dfb55e48 R13=dfb55e38 R14=81903378 R15=819046f4 PSR=60000193 -ZC- A S svc32 s00=05ec76f0 s01=00000001 d00=0000000105ec76f0 s02=dea713f1 s03=00000000 d01=00000000dea713f1 s04=919fb7aa s05=366ec849 d02=366ec849919fb7aa s06=00000000 s07=00000000 d03=0000000000000000 s08=88d72c60 s09=93303bdf d04=93303bdf88d72c60 s10=00000000 s11=00000000 d05=0000000000000000 s12=ffffffff s13=00000000 d06=00000000ffffffff s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=e5da40e4 s21=8f82ddb8 d10=8f82ddb8e5da40e4 s22=7229627e s23=00000000 d11=000000007229627e s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83ce0c40 R01=00000030 R02=eb115000 R03=00000000 R04=828642e1 R05=83ce0c40 R06=809b3ca0 R07=828642ef R08=82864298 R09=00000058 R10=60000193 R11=dfa85acc R12=00000002 R13=dfa85ac0 R14=82753548 R15=809b3cf8 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000