last executing test programs: 3.9998467s ago: executing program 1 (id=161): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581d7"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000001540)={0x24, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x22, 0xf, {[@global=@item_4={0x3, 0x1, 0x0, "c9c0e2f5"}, @local=@item_4={0x3, 0x2, 0x2, "71b9a7ab"}, @main=@item_4={0x3, 0x0, 0xb, "1000090e"}]}}, 0x0}, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000100), 0x0, 0x0) ioctl$HIDIOCSUSAGE(r1, 0x4018480c, 0x0) 3.616634393s ago: executing program 0 (id=163): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r0, 0x0, 0x8b}, 0x18) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000480)="d8000000180081064e81f782db44b904021d08000600ea09e8fe55a10a0015400100142603600e120800060000000401a80016000800014003e00200036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) 2.825381266s ago: executing program 0 (id=164): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000100)={0x200000000000001}, 0x8) 2.351918217s ago: executing program 0 (id=165): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000004c0), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "b68c52d2be3c0d90"}}, 0x48}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x4c000) r3 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=@newtfilter={0x24, 0x11, 0x1, 0x20000000, 0x0, {0x0, 0x0, 0x74, r4}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) close(0x3) 1.577797456s ago: executing program 0 (id=166): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000002580)=@delchain={0x5c0, 0x65, 0x0, 0x70bd28, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0xffe0, 0x6}}, [@TCA_CHAIN={0x8}, @TCA_RATE={0x6, 0x5, {0x1}}, @TCA_CHAIN={0x8}, @filter_kind_options=@f_route={{0xa}, {0x578, 0x2, [@TCA_ROUTE4_FROM={0x8}, @TCA_ROUTE4_FROM={0x8}, @TCA_ROUTE4_ACT={0x478, 0x6, [@m_connmark={0x15c, 0x16, 0x0, 0x0, {{0xd}, {0x90, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0x6, 0x20000000, 0x0, 0x2}, 0xfc00}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x101, 0x3, 0x0, 0x9, 0x80}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3ff, 0x9, 0x0, 0x6, 0x24}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x6, 0x0, 0xffffffffffffffff, 0x4, 0x100}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xa730, 0xfffffffb, 0x0, 0x7}}}]}, {0x9f, 0x6, "42012121cc9fbfe2407e02831c5ab0401ce076f76dab7bb6ae0a64154ae71554ba2ae0d8df2a4612ca446b0a5376b11c0dfcd0925ccc92b99fd4bd28ed20670675302955e2e004913edef6cf51a45329dc362c92e4346a7b2b6d38b7b9be61b2c971c007fd0d7c179286ea79cab9015fa32d7f163dcfd23b1a7501ccc936f04b0c6ffcee1637c651070a2a30b88a7f6bd55b9607eade4c41946fe2"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3}}}}, @m_nat={0x98, 0x1a, 0x0, 0x0, {{0x8}, {0x54, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x708b, 0x8494, 0x7, 0x20000001, 0xd}, @multicast1, @multicast1, 0xffffff00, 0x1}}, @TCA_NAT_PARMS={0x28, 0x1, {{0xcf59, 0x9, 0x1, 0xff, 0x8}, @private=0xa010100, @private=0xa010101, 0xffffffff, 0x1}}]}, {0x1d, 0x6, "6bde160313c9196616ebf42e69c109a47d9dfb3746f1319249"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x5}}}}, @m_skbedit={0x168, 0x13, 0x0, 0x0, {{0xc}, {0xc, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_MARK={0x8, 0x5, 0x101}]}, {0x131, 0x6, "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"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_gact={0x118, 0x19, 0x0, 0x0, {{0x9}, {0x4}, {0xe9, 0x6, "e465cbac503b2aa89a08d8f3e18e8adcf9874619697472960dda9a9386804c3a931659be9b934ccf3e8e328bf503fb5cc9f015200e1dfcb325f53c43702a1043c3fb90117c4a2095e9c7982e5bdda6f4c3492483e8a1b6fdb2d1047050ee7131bf26d3e1419836bfb7edfdbf222719d003add865b6717c358069497064a94dbd90aa6cd1a3bd9c6e8bc4248897913543c42f23697d3be146ce4655374fb7e7b92690738c5a5b5c11cc537774971763df98cfc01ff9181dce5775804e9025e2c9854e14b84b7e4c4b5da61cfd43c848d4bc89970e415d40c54a257375515be91f3f9fbc8331"}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}, @TCA_ROUTE4_ACT={0xec, 0x6, [@m_ife={0xe8, 0xb, 0x0, 0x0, {{0x8}, {0x54, 0x2, 0x0, 0x1, [@TCA_IFE_DMAC={0xa, 0x3, @broadcast}, @TCA_IFE_DMAC={0xa, 0x3, @multicast}, @TCA_IFE_SMAC={0xa, 0x4, @random="03413659759d"}, @TCA_IFE_SMAC={0xa}, @TCA_IFE_TYPE={0x6, 0x5, 0x115}, @TCA_IFE_DMAC={0xa}, @TCA_IFE_SMAC={0xa, 0x4, @local}]}, {0x70, 0x6, "065cfd76cd34e07caa0eebff5e5dd87d7665897d8033cb365cb0d6b53a5639560c602283c3a0032515e07e764a0e945bbd5d52c7a976c05b4c7f06c48aee8650786b104228f22c1fce4761d92eaf50be4cbd56002a13bc150afb2202bd6881264ad7e81a8e09b8d87ce94f28"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}]}}]}, 0x5c0}}, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x8}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 1.501851981s ago: executing program 1 (id=167): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000480)={'gretap0\x00', 0x0}) 1.231288743s ago: executing program 0 (id=168): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@RTM_NEWMDB={0x38, 0x54, 0x1, 0x0, 0x0, {0x7, r2}, [@MDBA_SET_ENTRY={0x20, 0x1, {r2, 0x1, 0x0, 0x0, {@ip4, 0x86dd}}}]}, 0x38}}, 0x0) 1.000275247s ago: executing program 1 (id=169): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000ab4000000060a01040000000000000000020000280900010073797a30000000000900020073797a320000000088000480100001800c000100636f756e7465720014000180090001006d6173710000000004000280600001800a0001006c696d6974"], 0xdc}}, 0x0) 602.261784ms ago: executing program 1 (id=170): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x11, @void, @value}, 0x94) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000000000000a0000000000ff00ff010000000000000000000000000001000001000000000000000000e0ff00000000000000bd0000000000000000001300e4ec010000000040000000000000000000000000000000000000013da51fd47aa2e2f70000000000000000000000000000000000000000000000000000000000000067ff00000000000000050000000a004e200e8a34c38f"], 0x310) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000400)=""/135, 0x87}], 0x1, 0x111, 0x0) 398.208133ms ago: executing program 0 (id=171): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x260c0, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @my=0x0}, 0x10) open$dir(0x0, 0x490a80, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004800)={r0, 0x0, 0x0}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000004880)) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000414) ppoll(&(0x7f00000000c0)=[{0xffffffffffffffff, 0x8b1f}, {0xffffffffffffffff, 0x0, 0x64}], 0x2, 0x0, 0x0, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_CONNECT={0x10, 0xa, 0x0, 0xffffffffffffffff, 0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, 0x0, &(0x7f00002bf000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) io_uring_enter(0xffffffffffffffff, 0x47f9, 0x0, 0x0, 0x0, 0x0) r1 = userfaultfd(0x80001) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) capget(0x0, &(0x7f0000002340)={0x0, 0x1, 0x9, 0x1, 0x3, 0xfff}) tgkill(0x0, 0x0, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_COPY(r1, 0xc028aa05, &(0x7f0000000000)={&(0x7f00001c4000/0x3000)=nil, &(0x7f0000000000/0xc00000)=nil, 0x3000, 0x0, 0x2}) 109.046979ms ago: executing program 1 (id=172): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) readv(r0, &(0x7f0000001440)=[{&(0x7f0000000040)=""/236, 0xec}, {0x0}], 0x2) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xe0c81) write$sndseq(r1, 0x0, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 0s ago: executing program 1 (id=173): socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x3, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x5) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) kernel console output (not intermixed with test programs): [ 56.565095][ T31] audit: type=1400 audit(56.470:68): avc: denied { read write } for pid=3107 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 56.586849][ T31] audit: type=1400 audit(56.490:69): avc: denied { open } for pid=3107 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:55506' (ED25519) to the list of known hosts. [ 69.950694][ T31] audit: type=1400 audit(69.840:70): avc: denied { name_bind } for pid=3108 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 72.544030][ T31] audit: type=1400 audit(72.430:71): avc: denied { execute } for pid=3110 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 72.581205][ T31] audit: type=1400 audit(72.490:72): avc: denied { execute_no_trans } for pid=3110 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 75.344619][ T31] audit: type=1400 audit(75.250:73): avc: denied { mounton } for pid=3110 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 75.351743][ T31] audit: type=1400 audit(75.260:74): avc: denied { mount } for pid=3110 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 75.363119][ T3110] cgroup: Unknown subsys name 'net' [ 75.372001][ T31] audit: type=1400 audit(75.280:75): avc: denied { unmount } for pid=3110 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 75.606517][ T3110] cgroup: Unknown subsys name 'cpuset' [ 75.613687][ T3110] cgroup: Unknown subsys name 'hugetlb' [ 75.614763][ T3110] cgroup: Unknown subsys name 'rlimit' [ 75.907398][ T31] audit: type=1400 audit(75.810:76): avc: denied { setattr } for pid=3110 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.908425][ T31] audit: type=1400 audit(75.810:77): avc: denied { mounton } for pid=3110 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 75.909291][ T31] audit: type=1400 audit(75.810:78): avc: denied { mount } for pid=3110 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 76.179466][ T3112] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 76.181635][ T31] audit: type=1400 audit(76.090:79): avc: denied { relabelto } for pid=3112 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.184865][ T31] audit: type=1400 audit(76.090:80): avc: denied { write } for pid=3112 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.220210][ T31] audit: type=1400 audit(76.130:81): avc: denied { read } for pid=3110 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.221481][ T31] audit: type=1400 audit(76.130:82): avc: denied { open } for pid=3110 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 83.478640][ T3110] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 85.959138][ T31] audit: type=1400 audit(85.870:83): avc: denied { execmem } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 86.030948][ T31] audit: type=1400 audit(85.940:84): avc: denied { read } for pid=3115 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.036813][ T31] audit: type=1400 audit(85.940:85): avc: denied { open } for pid=3115 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.045436][ T31] audit: type=1400 audit(85.950:86): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 86.077036][ T31] audit: type=1400 audit(85.980:87): avc: denied { module_request } for pid=3116 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 86.078459][ T31] audit: type=1400 audit(85.980:88): avc: denied { module_request } for pid=3115 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 86.208944][ T31] audit: type=1400 audit(86.120:89): avc: denied { sys_module } for pid=3116 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 87.193454][ T31] audit: type=1400 audit(87.100:90): avc: denied { ioctl } for pid=3116 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 88.768863][ T3116] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.790711][ T3116] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.811330][ T3115] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.842449][ T3115] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 89.827553][ T3116] hsr_slave_0: entered promiscuous mode [ 89.831133][ T3116] hsr_slave_1: entered promiscuous mode [ 89.997504][ T3115] hsr_slave_0: entered promiscuous mode [ 90.004807][ T3115] hsr_slave_1: entered promiscuous mode [ 90.008865][ T3115] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 90.009560][ T3115] Cannot create hsr debugfs directory [ 90.315474][ T31] audit: type=1400 audit(90.220:91): avc: denied { create } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 90.318676][ T31] audit: type=1400 audit(90.220:92): avc: denied { write } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 90.337770][ T3116] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 90.347586][ T3116] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 90.354921][ T3116] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 90.362687][ T3116] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 90.440355][ T3115] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 90.452613][ T3115] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 90.461372][ T3115] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 90.467436][ T3115] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 91.157659][ T3116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.249490][ T3115] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.565507][ T3116] veth0_vlan: entered promiscuous mode [ 94.592861][ T3116] veth1_vlan: entered promiscuous mode [ 94.662364][ T3116] veth0_macvtap: entered promiscuous mode [ 94.672622][ T3116] veth1_macvtap: entered promiscuous mode [ 94.757441][ T3116] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.758643][ T3116] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.759208][ T3116] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.759701][ T3116] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.924804][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 94.924934][ T31] audit: type=1400 audit(94.830:94): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 94.931736][ T3115] veth0_vlan: entered promiscuous mode [ 94.943147][ T31] audit: type=1400 audit(94.850:95): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/syzkaller.yJSg1b/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 94.949872][ T31] audit: type=1400 audit(94.860:96): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 94.957192][ T31] audit: type=1400 audit(94.860:97): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/syzkaller.yJSg1b/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 94.964807][ T31] audit: type=1400 audit(94.870:98): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/syzkaller.yJSg1b/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2013 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 94.974820][ T31] audit: type=1400 audit(94.880:99): avc: denied { unmount } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 94.981922][ T31] audit: type=1400 audit(94.890:100): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 94.986877][ T31] audit: type=1400 audit(94.890:101): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 94.993142][ T3115] veth1_vlan: entered promiscuous mode [ 94.994667][ T31] audit: type=1400 audit(94.900:102): avc: denied { mounton } for pid=3116 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 94.995662][ T31] audit: type=1400 audit(94.900:103): avc: denied { mount } for pid=3116 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 95.062065][ T3116] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 95.103262][ T3115] veth0_macvtap: entered promiscuous mode [ 95.120900][ T3115] veth1_macvtap: entered promiscuous mode [ 95.249300][ T3115] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.249883][ T3115] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.250307][ T3115] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.250694][ T3115] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.246394][ T3801] lo: entered promiscuous mode [ 97.765567][ T3796] lo: left promiscuous mode [ 101.001026][ T3819] syz.0.5 uses obsolete (PF_INET,SOCK_PACKET) [ 101.013210][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 101.014873][ T31] audit: type=1400 audit(100.920:121): avc: denied { map_create } for pid=3818 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 101.049092][ T31] audit: type=1400 audit(100.960:122): avc: denied { create } for pid=3818 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 101.056762][ T31] audit: type=1400 audit(100.960:123): avc: denied { bind } for pid=3818 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 101.063771][ T31] audit: type=1400 audit(100.970:124): avc: denied { accept } for pid=3818 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 101.070050][ T31] audit: type=1400 audit(100.980:125): avc: denied { write } for pid=3818 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 101.087534][ T31] audit: type=1400 audit(101.000:126): avc: denied { getopt } for pid=3818 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 102.845110][ T3828] lo: entered promiscuous mode [ 104.373310][ T3823] lo: left promiscuous mode [ 104.545522][ T31] audit: type=1400 audit(104.450:127): avc: denied { create } for pid=3839 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 107.778577][ T31] audit: type=1400 audit(107.690:128): avc: denied { read } for pid=3855 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 107.782238][ T31] audit: type=1400 audit(107.690:129): avc: denied { ioctl } for pid=3855 comm="syz.0.14" path="socket:[2283]" dev="sockfs" ino=2283 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 108.695580][ T31] audit: type=1400 audit(108.600:130): avc: denied { create } for pid=3863 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 108.709445][ T31] audit: type=1400 audit(108.620:131): avc: denied { getopt } for pid=3863 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 109.741181][ T31] audit: type=1400 audit(109.650:132): avc: denied { read } for pid=3863 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 110.592803][ T31] audit: type=1400 audit(110.500:133): avc: denied { create } for pid=3869 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 110.617418][ T31] audit: type=1400 audit(110.530:134): avc: denied { read } for pid=3869 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 110.628958][ T31] audit: type=1400 audit(110.540:135): avc: denied { ioctl } for pid=3869 comm="syz.1.19" path="socket:[2302]" dev="sockfs" ino=2302 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 110.651446][ T31] audit: type=1400 audit(110.560:136): avc: denied { write } for pid=3869 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 110.684971][ T31] audit: type=1400 audit(110.590:137): avc: denied { write } for pid=3869 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 110.730340][ T3870] raw_sendmsg: syz.1.19 forgot to set AF_INET. Fix it! [ 115.109838][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 115.109945][ T31] audit: type=1400 audit(115.020:143): avc: denied { read } for pid=3881 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 116.936739][ T31] audit: type=1400 audit(116.840:144): avc: denied { create } for pid=3896 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 120.317823][ T31] audit: type=1400 audit(120.230:145): avc: denied { read } for pid=3913 comm="syz.1.32" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 120.320731][ T31] audit: type=1400 audit(120.230:146): avc: denied { open } for pid=3913 comm="syz.1.32" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 127.647163][ T31] audit: type=1400 audit(127.550:147): avc: denied { create } for pid=3948 comm="syz.1.42" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 127.648348][ T31] audit: type=1400 audit(127.550:148): avc: denied { map } for pid=3948 comm="syz.1.42" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3332 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 127.650913][ T31] audit: type=1400 audit(127.550:149): avc: denied { read write } for pid=3948 comm="syz.1.42" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3332 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 131.954512][ T31] audit: type=1400 audit(131.860:150): avc: denied { write } for pid=3968 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 131.957330][ T31] audit: type=1400 audit(131.870:151): avc: denied { read } for pid=3968 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 135.359281][ T3983] fuse: Unknown parameter 'grou00000000000000000000' [ 137.525608][ T31] audit: type=1400 audit(137.430:152): avc: denied { getopt } for pid=3992 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 137.641692][ T31] audit: type=1400 audit(137.550:153): avc: denied { setopt } for pid=3992 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 139.729087][ T4001] lo: entered promiscuous mode [ 141.243438][ T3995] lo: left promiscuous mode [ 141.350799][ T4011] fuse: Unknown parameter 'group_i00000000000000000000' [ 144.802140][ T4030] fuse: Unknown parameter 'group_i00000000000000000000' [ 145.956994][ T4034] lo: entered promiscuous mode [ 146.483789][ T4027] lo: left promiscuous mode [ 151.366934][ T4062] fuse: Unknown parameter 'group_i00000000000000000000' [ 152.987213][ T4068] lo: entered promiscuous mode [ 153.513719][ T4063] lo: left promiscuous mode [ 156.809518][ T4088] fuse: Unknown parameter 'group_id00000000000000000000' [ 158.620273][ T4096] lo: entered promiscuous mode [ 159.141578][ T4092] lo: left promiscuous mode [ 164.059684][ T4125] lo: entered promiscuous mode [ 164.583373][ T4120] lo: left promiscuous mode [ 165.607774][ T4136] fuse: Bad value for 'user_id' [ 165.608305][ T4136] fuse: Bad value for 'user_id' [ 165.999882][ T31] audit: type=1400 audit(165.910:154): avc: denied { ioctl } for pid=4137 comm="syz.1.81" path="socket:[3579]" dev="sockfs" ino=3579 ioctlcmd=0x9401 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 166.019340][ T31] audit: type=1400 audit(165.930:155): avc: denied { ioctl } for pid=4137 comm="syz.1.81" path="socket:[3578]" dev="sockfs" ino=3578 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 167.707600][ T4149] lo: entered promiscuous mode [ 168.223940][ T4146] lo: left promiscuous mode [ 168.695590][ T31] audit: type=1400 audit(168.600:156): avc: denied { bind } for pid=4164 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 168.697873][ T31] audit: type=1400 audit(168.600:157): avc: denied { name_bind } for pid=4164 comm="syz.1.88" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 168.698978][ T31] audit: type=1400 audit(168.600:158): avc: denied { node_bind } for pid=4164 comm="syz.1.88" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 168.708355][ T31] audit: type=1400 audit(168.620:159): avc: denied { write } for pid=4164 comm="syz.1.88" lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 168.711794][ T31] audit: type=1400 audit(168.620:160): avc: denied { connect } for pid=4164 comm="syz.1.88" lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 168.713176][ T31] audit: type=1400 audit(168.620:161): avc: denied { name_connect } for pid=4164 comm="syz.1.88" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 168.918159][ T31] audit: type=1400 audit(168.830:162): avc: denied { read } for pid=4164 comm="syz.1.88" laddr=fe80::f lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 169.466737][ T31] audit: type=1400 audit(169.370:163): avc: denied { setopt } for pid=4174 comm="syz.1.92" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 170.697366][ T8] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 170.879988][ T8] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 170.880971][ T8] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 255, changing to 11 [ 170.881563][ T8] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 170.882089][ T8] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 170.882804][ T8] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 170.883205][ T8] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 170.901703][ T8] usb 2-1: config 0 descriptor?? [ 170.907812][ T4186] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 171.339759][ T8] plantronics 0003:047F:FFFF.0001: unknown main item tag 0xd [ 171.362072][ T8] plantronics 0003:047F:FFFF.0001: No inputs registered, leaving [ 171.381503][ T8] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 171.490544][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 171.490641][ T31] audit: type=1400 audit(171.400:165): avc: denied { prog_run } for pid=4204 comm="syz.0.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 172.065690][ T31] audit: type=1400 audit(171.970:166): avc: denied { execute } for pid=4206 comm="syz.0.100" path="/50/cpu.stat" dev="tmpfs" ino=282 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 173.441919][ T3988] usb 2-1: USB disconnect, device number 2 [ 174.117294][ T31] audit: type=1400 audit(174.010:167): avc: denied { ioctl } for pid=4230 comm="syz.1.105" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2639 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 176.972276][ T31] audit: type=1400 audit(176.880:168): avc: denied { setopt } for pid=4234 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 177.682209][ T31] audit: type=1400 audit(177.590:169): avc: denied { bind } for pid=4246 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 177.918827][ T31] audit: type=1400 audit(177.820:170): avc: denied { create } for pid=4246 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 177.966278][ T31] audit: type=1400 audit(177.870:171): avc: denied { write } for pid=4246 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 178.017911][ T4247] netlink: 4 bytes leftover after parsing attributes in process `syz.1.108'. [ 178.321096][ T4249] Zero length message leads to an empty skb [ 179.102558][ T31] audit: type=1400 audit(179.010:172): avc: denied { name_bind } for pid=4252 comm="syz.1.111" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 179.103764][ T31] audit: type=1400 audit(179.010:173): avc: denied { node_bind } for pid=4252 comm="syz.1.111" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 179.233904][ T31] audit: type=1400 audit(179.140:174): avc: denied { write } for pid=4252 comm="syz.1.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 179.238207][ T4253] netlink: 60 bytes leftover after parsing attributes in process `syz.1.111'. [ 179.240873][ T31] audit: type=1400 audit(179.150:175): avc: denied { nlmsg_write } for pid=4252 comm="syz.1.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 179.572279][ T4256] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 179.647149][ T31] audit: type=1400 audit(179.560:176): avc: denied { getopt } for pid=4255 comm="syz.1.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 180.819839][ T4260] input: syz1 as /devices/virtual/input/input4 [ 182.100944][ T31] audit: type=1400 audit(182.010:177): avc: denied { create } for pid=4269 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 184.084475][ T31] audit: type=1400 audit(183.990:178): avc: denied { setopt } for pid=4280 comm="syz.1.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 184.429777][ T31] audit: type=1400 audit(184.340:179): avc: denied { setopt } for pid=4282 comm="syz.1.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 185.026507][ T46] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 185.196625][ T46] usb 2-1: Using ep0 maxpacket: 32 [ 185.240536][ T46] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 185.241377][ T46] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 185.242006][ T46] usb 2-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 185.242396][ T46] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 185.256659][ T46] usb 2-1: config 0 descriptor?? [ 185.271695][ T46] hub 2-1:0.0: USB hub found [ 185.483027][ T46] hub 2-1:0.0: 1 port detected [ 186.148251][ T954] hub 2-1:0.0: activate --> -90 [ 186.670076][ T24] usb 2-1: USB disconnect, device number 3 [ 187.229501][ T31] audit: type=1400 audit(187.140:180): avc: denied { mounton } for pid=4302 comm="syz.1.123" path="/69/file0" dev="tmpfs" ino=379 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 194.740593][ T31] audit: type=1400 audit(194.650:181): avc: denied { read } for pid=4307 comm="syz.0.124" path="socket:[2730]" dev="sockfs" ino=2730 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 198.806952][ T31] audit: type=1400 audit(198.710:182): avc: denied { unmount } for pid=3116 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 199.324333][ T4315] Illegal XDP return value 4294967262 on prog (id 6) dev N/A, expect packet loss! [ 199.910955][ T31] audit: type=1400 audit(199.820:183): avc: denied { read } for pid=4319 comm="syz.1.129" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 199.911972][ T31] audit: type=1400 audit(199.820:184): avc: denied { open } for pid=4319 comm="syz.1.129" path="/71/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 199.980857][ T4325] block device autoloading is deprecated and will be removed. [ 200.013999][ T31] audit: type=1400 audit(199.920:185): avc: denied { ioctl } for pid=4319 comm="syz.1.129" path="/71/file0/file0" dev="fuse" ino=64 ioctlcmd=0x923 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 200.858068][ T4337] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 201.459966][ T31] audit: type=1400 audit(201.370:186): avc: denied { getopt } for pid=4342 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 201.491136][ T31] audit: type=1400 audit(201.400:187): avc: denied { bind } for pid=4340 comm="syz.0.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 202.038000][ T4348] netlink: 4 bytes leftover after parsing attributes in process `syz.0.135'. [ 204.098833][ T4357] netlink: 12 bytes leftover after parsing attributes in process `syz.0.141'. [ 204.532600][ T31] audit: type=1400 audit(204.440:188): avc: denied { append } for pid=4358 comm="syz.0.142" name="ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 206.271776][ T31] audit: type=1400 audit(206.180:189): avc: denied { ioctl } for pid=4371 comm="syz.1.149" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 207.186949][ T31] audit: type=1400 audit(207.080:190): avc: denied { getopt } for pid=4377 comm="syz.0.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 207.657771][ T31] audit: type=1400 audit(207.570:191): avc: denied { create } for pid=4381 comm="syz.0.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 207.678650][ T31] audit: type=1400 audit(207.590:192): avc: denied { bind } for pid=4381 comm="syz.0.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 208.422431][ T4386] IPv6: Can't replace route, no match found [ 208.452536][ T4386] netlink: 8 bytes leftover after parsing attributes in process `syz.1.154'. [ 208.506836][ T50] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 208.713160][ T50] usb 1-1: New USB device found, idVendor=1d50, idProduct=606f, bcdDevice=14.d4 [ 208.713844][ T50] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 208.718510][ T50] usb 1-1: config 0 descriptor?? [ 209.227010][ T50] gs_usb 1-1:0.0: Couldn't get device config: (err=-121) [ 209.227716][ T50] gs_usb 1-1:0.0: probe with driver gs_usb failed with error -121 [ 209.446627][ T4254] usb 1-1: USB disconnect, device number 2 [ 210.186686][ T88] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 210.356465][ T88] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 210.357057][ T88] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 210.357453][ T88] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 210.358054][ T88] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 210.358471][ T88] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 210.369254][ T88] usb 2-1: config 0 descriptor?? [ 210.429864][ T4419] netlink: 'syz.0.163': attribute type 21 has an invalid length. [ 210.894909][ T88] plantronics 0003:047F:FFFF.0002: ignoring exceeding usage max [ 210.920734][ T88] plantronics 0003:047F:FFFF.0002: No inputs registered, leaving [ 210.947122][ T88] plantronics 0003:047F:FFFF.0002: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 211.887312][ T31] audit: type=1400 audit(211.790:193): avc: denied { connect } for pid=4431 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 211.962357][ T4432] netlink: 4 bytes leftover after parsing attributes in process `syz.0.165'. [ 212.979580][ T3070] usb 2-1: USB disconnect, device number 4 [ 213.018711][ T4446] netlink: 80 bytes leftover after parsing attributes in process `syz.1.169'. [ 213.024810][ T4446] netlink: 80 bytes leftover after parsing attributes in process `syz.1.169'. [ 213.414274][ T31] audit: type=1400 audit(213.320:194): avc: denied { write } for pid=4456 comm="syz.1.170" name="mcfilter6" dev="proc" ino=4026532764 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 213.967581][ T31] audit: type=1400 audit(213.870:195): avc: denied { create } for pid=4462 comm="syz.1.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 214.261057][ T4465] ------------[ cut here ]------------ [ 214.261699][ T4465] WARNING: CPU: 0 PID: 4465 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 214.263382][ T4465] Modules linked in: [ 214.269826][ T4465] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 214.277352][ T4465] CPU: 0 UID: 0 PID: 4465 Comm: syz.0.171 Not tainted 6.12.0-rc3-syzkaller #0 [ 214.277963][ T4465] Hardware name: ARM-Versatile Express [ 214.278620][ T4465] Call trace: [ 214.279285][ T4465] [<81999478>] (dump_backtrace) from [<81999574>] (show_stack+0x18/0x1c) [ 214.280129][ T4465] r7:00000000 r6:82622f44 r5:00000000 r4:8203d3f8 [ 214.280629][ T4465] [<8199955c>] (show_stack) from [<819b7a04>] (dump_stack_lvl+0x54/0x7c) [ 214.281173][ T4465] [<819b79b0>] (dump_stack_lvl) from [<819b7a44>] (dump_stack+0x18/0x1c) [ 214.281673][ T4465] r5:00000000 r4:82870d18 [ 214.281918][ T4465] [<819b7a2c>] (dump_stack) from [<8199a0a0>] (panic+0x120/0x374) [ 214.282338][ T4465] [<81999f80>] (panic) from [<802420e0>] (get_taint+0x0/0x1c) [ 214.282733][ T4465] r3:8260c5c4 r2:00000001 r1:820257d8 r0:8202d240 [ 214.283089][ T4465] r7:8048c6dc [ 214.283293][ T4465] [<8024206c>] (check_panic_on_warn) from [<80242244>] (__warn+0x80/0x188) [ 214.283934][ T4465] [<802421c4>] (__warn) from [<802424c4>] (warn_slowpath_fmt+0x178/0x1f4) [ 214.284414][ T4465] r8:00000009 r7:82054e3c r6:dffb9d24 r5:843c9800 r4:00000000 [ 214.284816][ T4465] [<80242350>] (warn_slowpath_fmt) from [<8048c6dc>] (kunmap_local_indexed+0x20c/0x224) [ 214.285479][ T4465] r10:ffefde20 r9:83c73300 r8:20000000 r7:00000000 r6:00000003 r5:843c9800 [ 214.286354][ T4465] r4:ffefd000 [ 214.286577][ T4465] [<8048c4d0>] (kunmap_local_indexed) from [<80505b00>] (move_pages+0x7e8/0x149c) [ 214.287256][ T4465] r7:00000000 r6:84290780 r5:dee2d01c r4:ffefb000 [ 214.287762][ T4465] [<80505318>] (move_pages) from [<80581d40>] (userfaultfd_ioctl+0x114c/0x2080) [ 214.288447][ T4465] r10:83c73300 r9:dffb9e98 r8:00000001 r7:201c7000 r6:00000000 r5:20000000 [ 214.288833][ T4465] r4:85179080 [ 214.289043][ T4465] [<80580bf4>] (userfaultfd_ioctl) from [<8052f70c>] (sys_ioctl+0x134/0xda8) [ 214.289575][ T4465] r10:843c9800 r9:8521f6c0 r8:00000003 r7:20000000 r6:8521f6c1 r5:00000000 [ 214.289948][ T4465] r4:c028aa05 [ 214.290164][ T4465] [<8052f5d8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 214.290719][ T4465] Exception stack(0xdffb9fa8 to 0xdffb9ff0) [ 214.291261][ T4465] 9fa0: 00000000 00000000 00000003 c028aa05 20000000 00000000 [ 214.291719][ T4465] 9fc0: 00000000 00000000 00286380 00000036 00000000 00006364 003d0f00 76b110bc [ 214.292130][ T4465] 9fe0: 76b10ec0 76b10eb0 00018af8 00132ec0 [ 214.292502][ T4465] r10:00000036 r9:843c9800 r8:8020029c r7:00000036 r6:00286380 r5:00000000 [ 214.292881][ T4465] r4:00000000 [ 214.296133][ T4465] Rebooting in 86400 seconds.. VM DIAGNOSIS: 09:43:35 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=8203d3f8 R02=00000001 R03=819b9870 R04=826f89c8 R05=826f89c0 R06=00000028 R07=00000006 R08=826f89c8 R09=00000000 R10=00000000 R11=df801e9c R12=df801ea0 R13=df801e90 R14=819b8508 R15=819b9880 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=b9340000 R01=eb07b000 R02=00000001 R03=802199d8 R04=7f013000 R05=00000001 R06=828c1b28 R07=7f013000 R08=eb07b000 R09=8260cad0 R10=828c274c R11=e06a9dbc R12=e06a9dc0 R13=e06a9d90 R14=802109dc R15=802199f0 PSR=80000113 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000