last executing test programs: 13.332591588s ago: executing program 0 (id=160): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000001600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000040002850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x20c8, 0x11, 0x0, 0x27) 10.621283753s ago: executing program 0 (id=164): r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x655e, 0x4) r1 = dup2(r0, r0) write$tun(r1, &(0x7f0000000440)=ANY=[], 0x46) recvmmsg(r1, &(0x7f00000049c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}], 0x1, 0x2000, 0x0) 10.341562476s ago: executing program 0 (id=166): capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x58) syz_open_procfs(0x0, 0x0) 10.085663964s ago: executing program 0 (id=168): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000770000000e000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r0}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) 9.620550623s ago: executing program 0 (id=170): r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x655e, 0x4) r1 = dup2(r0, r0) write$tun(r1, &(0x7f0000000440)=ANY=[], 0x46) recvmmsg(r1, &(0x7f00000049c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}], 0x1, 0x2000, 0x0) 9.440657817s ago: executing program 0 (id=172): r0 = socket(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfc, 0x1}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', r1}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001500)=@newtaction={0x18, 0x30, 0x829, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) 5.779061473s ago: executing program 1 (id=176): r0 = socket$inet6(0xa, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r0, &(0x7f0000004740)=[{{0x0, 0x0, 0x0}, 0xfffffffe}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 4.53005994s ago: executing program 1 (id=177): r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x655e, 0x4) r1 = dup2(r0, r0) write$tun(r1, &(0x7f0000000440)=ANY=[], 0x46) recvmmsg(r1, &(0x7f00000049c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}], 0x1, 0x2000, 0x0) 4.190863824s ago: executing program 1 (id=178): syz_emit_ethernet(0x3e, &(0x7f0000000780)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "6410a6", 0x8, 0x0, 0x0, @private2, @local, {[@hopopts={0x3b}]}}}}}, 0x0) 3.901165599s ago: executing program 1 (id=179): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000003680)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000380), 0x208e24b) lseek(r1, 0x0, 0x5) 1.059638939s ago: executing program 1 (id=180): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000118110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014002000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2, 0xffffffffffffffff}, 0x4) close(0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r1}, 0x10) msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 0s ago: executing program 1 (id=181): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000009c0)={'vcan0\x00', 0x0}) setsockopt$SO_J1939_FILTER(r0, 0x6b, 0x1, 0x0, 0x0) r2 = socket$can_j1939(0x1d, 0x2, 0x7) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, 0x0, 0x0) bind$can_j1939(r2, &(0x7f0000000080)={0x1d, r1}, 0x18) sendmsg$can_j1939(r2, &(0x7f00000001c0)={&(0x7f0000000040), 0x18, &(0x7f0000000180)={&(0x7f00000000c0)="92", 0x1a000}}, 0xee) r4 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$can_j1939(r0, 0x0, 0x20008000) r5 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f000000c300)=@newtfilter={0x3c, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x74, r6}, [@filter_kind_options=@f_flow={{0x9}, {0x4}}, @TCA_CHAIN={0x8, 0xb, 0x7}]}, 0x3c}, 0x1, 0xf0ffffffffffff}, 0x4000) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) kernel console output (not intermixed with test programs): [ 52.260018][ T31] audit: type=1400 audit(52.190:68): avc: denied { read write } for pid=3107 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.261133][ T31] audit: type=1400 audit(52.200:69): avc: denied { open } for pid=3107 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:63341' (ED25519) to the list of known hosts. [ 65.564870][ T31] audit: type=1400 audit(65.500:70): avc: denied { name_bind } for pid=3108 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 68.202073][ T31] audit: type=1400 audit(68.140:71): avc: denied { execute } for pid=3110 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 68.226843][ T31] audit: type=1400 audit(68.160:72): avc: denied { execute_no_trans } for pid=3110 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 71.533298][ T31] audit: type=1400 audit(71.470:73): avc: denied { mounton } for pid=3110 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 71.536610][ T31] audit: type=1400 audit(71.480:74): avc: denied { mount } for pid=3110 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 71.550863][ T3110] cgroup: Unknown subsys name 'net' [ 71.559452][ T31] audit: type=1400 audit(71.500:75): avc: denied { unmount } for pid=3110 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 71.756760][ T3110] cgroup: Unknown subsys name 'cpuset' [ 71.762724][ T3110] cgroup: Unknown subsys name 'hugetlb' [ 71.764845][ T3110] cgroup: Unknown subsys name 'rlimit' [ 72.020536][ T31] audit: type=1400 audit(71.960:76): avc: denied { setattr } for pid=3110 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 72.021562][ T31] audit: type=1400 audit(71.960:77): avc: denied { mounton } for pid=3110 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 72.022647][ T31] audit: type=1400 audit(71.960:78): avc: denied { mount } for pid=3110 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 72.285036][ T3112] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 72.285884][ T31] audit: type=1400 audit(72.230:79): avc: denied { relabelto } for pid=3112 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.291677][ T31] audit: type=1400 audit(72.230:80): avc: denied { write } for pid=3112 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 72.324557][ T31] audit: type=1400 audit(72.260:81): avc: denied { read } for pid=3110 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.325425][ T31] audit: type=1400 audit(72.260:82): avc: denied { open } for pid=3110 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 78.659696][ T3110] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 80.686320][ T31] audit: type=1400 audit(80.630:83): avc: denied { execmem } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 80.747269][ T31] audit: type=1400 audit(80.690:84): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 80.747952][ T31] audit: type=1400 audit(80.690:85): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 80.756941][ T31] audit: type=1400 audit(80.700:86): avc: denied { read } for pid=3115 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.757557][ T31] audit: type=1400 audit(80.700:87): avc: denied { open } for pid=3115 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.761415][ T31] audit: type=1400 audit(80.700:88): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 80.797987][ T31] audit: type=1400 audit(80.740:90): avc: denied { module_request } for pid=3115 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.798811][ T31] audit: type=1400 audit(80.740:89): avc: denied { module_request } for pid=3116 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.904636][ T31] audit: type=1400 audit(80.830:91): avc: denied { sys_module } for pid=3116 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 81.649742][ T31] audit: type=1400 audit(81.590:92): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 82.695242][ T3115] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.699343][ T3115] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.925751][ T3116] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.931879][ T3116] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.577963][ T3115] hsr_slave_0: entered promiscuous mode [ 83.580748][ T3115] hsr_slave_1: entered promiscuous mode [ 83.796804][ T3115] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.810722][ T3115] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.814941][ T3115] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.818622][ T3115] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.866786][ T3116] hsr_slave_0: entered promiscuous mode [ 83.867779][ T3116] hsr_slave_1: entered promiscuous mode [ 83.868512][ T3116] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 83.868750][ T3116] Cannot create hsr debugfs directory [ 84.115831][ T3116] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 84.120430][ T3116] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 84.130961][ T3116] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 84.137597][ T3116] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 84.482199][ T3115] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.879862][ T3116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.142760][ T3115] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 87.036289][ T3115] veth0_vlan: entered promiscuous mode [ 87.051456][ T3115] veth1_vlan: entered promiscuous mode [ 87.097000][ T3115] veth0_macvtap: entered promiscuous mode [ 87.106752][ T3115] veth1_macvtap: entered promiscuous mode [ 87.155593][ T3115] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.156346][ T3115] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.156666][ T3115] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.156991][ T3115] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.252190][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 87.252248][ T31] audit: type=1400 audit(87.190:96): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 87.257402][ T31] audit: type=1400 audit(87.200:97): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/syzkaller.qjbodq/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 87.260171][ T31] audit: type=1400 audit(87.200:98): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 87.268693][ T31] audit: type=1400 audit(87.210:99): avc: denied { unmount } for pid=3115 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 87.274078][ T31] audit: type=1400 audit(87.210:100): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 87.276091][ T31] audit: type=1400 audit(87.210:101): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 87.394464][ T31] audit: type=1400 audit(87.320:102): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 87.395396][ T31] audit: type=1400 audit(87.330:103): avc: denied { open } for pid=3115 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 87.396189][ T31] audit: type=1400 audit(87.330:104): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 87.486072][ T31] audit: type=1400 audit(87.430:105): avc: denied { prog_load } for pid=3793 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 87.544619][ T3795] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1'. [ 87.569906][ T3795] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 87.722198][ T3116] veth0_vlan: entered promiscuous mode [ 87.738265][ T3116] veth1_vlan: entered promiscuous mode [ 87.751336][ T3795] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 87.821135][ T3795] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 87.838815][ T3116] veth0_macvtap: entered promiscuous mode [ 87.848793][ T3116] veth1_macvtap: entered promiscuous mode [ 87.878889][ T3795] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 87.921441][ T3116] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.921970][ T3116] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.922293][ T3116] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.922594][ T3116] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.982132][ T3795] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.016883][ T3795] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.042584][ T3795] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.067151][ T3795] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.995886][ T3828] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6'. [ 91.067775][ T3828] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 91.217075][ T3828] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 91.331026][ T3828] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 91.467400][ T3828] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 91.578400][ T3828] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.605847][ T3828] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.621866][ T3828] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.659757][ T3828] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.615463][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 92.615547][ T31] audit: type=1400 audit(92.560:141): avc: denied { create } for pid=3851 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 92.676118][ T31] audit: type=1400 audit(92.600:142): avc: denied { write } for pid=3851 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 92.788621][ T31] audit: type=1400 audit(92.720:143): avc: denied { create } for pid=3851 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 92.796995][ T3854] netlink: 148 bytes leftover after parsing attributes in process `syz.0.10'. [ 92.801353][ T31] audit: type=1400 audit(92.740:144): avc: denied { write } for pid=3851 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 92.802694][ T31] audit: type=1400 audit(92.740:145): avc: denied { nlmsg_write } for pid=3851 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 93.082920][ T3863] netlink: 8 bytes leftover after parsing attributes in process `syz.0.13'. [ 93.112291][ T3863] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.168360][ T3863] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.233201][ T3863] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.311470][ T3863] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 93.430789][ T3863] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.458557][ T3863] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.487866][ T3863] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.502702][ T3863] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.558022][ T31] audit: type=1400 audit(97.500:146): avc: denied { create } for pid=3883 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 109.553040][ T31] audit: type=1400 audit(109.490:147): avc: denied { read write } for pid=3116 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 109.557058][ T31] audit: type=1400 audit(109.490:148): avc: denied { open } for pid=3116 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 109.564037][ T31] audit: type=1400 audit(109.490:149): avc: denied { ioctl } for pid=3116 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 109.574333][ T31] audit: type=1400 audit(109.510:150): avc: denied { read } for pid=2930 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 109.579301][ T31] audit: type=1400 audit(109.520:151): avc: denied { search } for pid=2930 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 109.580139][ T31] audit: type=1400 audit(109.520:152): avc: denied { append } for pid=2930 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 109.580819][ T31] audit: type=1400 audit(109.520:153): avc: denied { open } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 109.581483][ T31] audit: type=1400 audit(109.520:154): avc: denied { getattr } for pid=2930 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 109.614293][ T31] audit: type=1400 audit(109.550:155): avc: denied { read } for pid=3914 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 109.620503][ T31] audit: type=1400 audit(109.560:156): avc: denied { create } for pid=3914 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 109.630595][ T3915] netlink: 36 bytes leftover after parsing attributes in process `syz.1.18'. [ 109.724520][ T3917] netlink: 8 bytes leftover after parsing attributes in process `syz.1.19'. [ 109.730488][ T3917] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 109.781836][ T3917] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 109.845813][ T3917] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 109.901698][ T3917] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 109.991558][ T3917] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.007999][ T3917] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.023240][ T3917] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 110.038802][ T3917] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 111.615023][ T3948] netlink: 8 bytes leftover after parsing attributes in process `syz.1.25'. [ 111.623293][ T3948] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 111.709704][ T3948] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 111.877104][ T3948] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 111.995709][ T3948] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 113.797515][ T3948] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.828156][ T3948] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.850387][ T3948] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 113.879916][ T3948] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 114.884130][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 114.884218][ T31] audit: type=1326 audit(114.820:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3981 comm="syz.1.30" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 114.924575][ T31] audit: type=1326 audit(114.860:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3981 comm="syz.1.30" exe="/syz-executor" sig=0 arch=40000028 syscall=387 compat=0 ip=0x132da0 code=0x7ffc0000 [ 114.937257][ T31] audit: type=1326 audit(114.870:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3981 comm="syz.1.30" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 114.964580][ T31] audit: type=1326 audit(114.900:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3981 comm="syz.1.30" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 115.390505][ T31] audit: type=1400 audit(115.330:190): avc: denied { read open } for pid=3985 comm="syz.1.32" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 115.692762][ T31] audit: type=1400 audit(115.630:191): avc: denied { block_suspend } for pid=3990 comm="syz.1.34" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 117.276547][ T31] audit: type=1400 audit(117.220:192): avc: denied { create } for pid=4013 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 117.282462][ T31] audit: type=1400 audit(117.220:193): avc: denied { write } for pid=4013 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 117.336835][ T31] audit: type=1326 audit(117.280:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4015 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 117.337376][ T31] audit: type=1326 audit(117.280:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4015 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 123.894243][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 123.894337][ T31] audit: type=1400 audit(123.830:208): avc: denied { name_bind } for pid=4058 comm="syz.0.59" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 123.905726][ T31] audit: type=1400 audit(123.850:209): avc: denied { node_bind } for pid=4058 comm="syz.0.59" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 127.389991][ T4066] netlink: 14 bytes leftover after parsing attributes in process `syz.0.61'. [ 135.144107][ T31] audit: type=1326 audit(135.070:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 135.173965][ T31] audit: type=1326 audit(135.090:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 135.179980][ T31] audit: type=1326 audit(135.100:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 135.180640][ T31] audit: type=1326 audit(135.100:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 135.198237][ T31] audit: type=1326 audit(135.100:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=176 compat=0 ip=0x132da0 code=0x7ffc0000 [ 135.198973][ T31] audit: type=1326 audit(135.100:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 135.199562][ T31] audit: type=1326 audit(135.110:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 135.200177][ T31] audit: type=1326 audit(135.130:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 135.200759][ T31] audit: type=1326 audit(135.140:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 135.201339][ T31] audit: type=1326 audit(135.140:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4087 comm="syz.0.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 144.695412][ T4211] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 144.704491][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 144.704607][ T31] audit: type=1400 audit(144.600:230): avc: denied { getopt } for pid=4194 comm="syz.0.74" lport=141 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 144.741069][ T31] audit: type=1400 audit(144.670:231): avc: denied { ioctl } for pid=4194 comm="syz.0.74" path="socket:[2780]" dev="sockfs" ino=2780 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 145.632420][ T31] audit: type=1400 audit(145.570:232): avc: denied { validate_trans } for pid=4212 comm="syz.0.75" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 149.387050][ T31] audit: type=1400 audit(149.330:233): avc: denied { execute } for pid=4219 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 149.389595][ T31] audit: type=1400 audit(149.330:234): avc: denied { execute_no_trans } for pid=4219 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 149.467954][ T31] audit: type=1400 audit(149.380:235): avc: denied { execmem } for pid=4219 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 149.509354][ T31] audit: type=1400 audit(149.450:236): avc: denied { mounton } for pid=4222 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 149.510704][ T31] audit: type=1400 audit(149.450:237): avc: denied { mount } for pid=4222 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 149.544522][ T31] audit: type=1400 audit(149.470:238): avc: denied { mounton } for pid=4222 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 149.787320][ T4225] netlink: 24 bytes leftover after parsing attributes in process `syz.0.80'. [ 150.056490][ T4227] syz.0.81[4227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.057167][ T4227] syz.0.81[4227] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 150.405057][ T31] audit: type=1400 audit(150.350:239): avc: denied { create } for pid=4229 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 151.805611][ T31] audit: type=1400 audit(151.750:240): avc: denied { listen } for pid=4239 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 153.266985][ T4268] netlink: 76 bytes leftover after parsing attributes in process `syz.0.89'. [ 154.496657][ T4329] netlink: 76 bytes leftover after parsing attributes in process `syz.0.93'. [ 155.541821][ T4389] netlink: 76 bytes leftover after parsing attributes in process `syz.0.97'. [ 156.549597][ T4222] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.560169][ T4222] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 157.194494][ T4449] netlink: 32 bytes leftover after parsing attributes in process `syz.0.101'. [ 157.477439][ T31] audit: type=1326 audit(157.420:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.0.102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 157.478527][ T31] audit: type=1326 audit(157.420:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.0.102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 157.494813][ T31] audit: type=1326 audit(157.430:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.0.102" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 157.495802][ T31] audit: type=1326 audit(157.430:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.0.102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 157.501850][ T31] audit: type=1326 audit(157.440:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.0.102" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 157.515901][ T31] audit: type=1326 audit(157.440:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.0.102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 157.517089][ T31] audit: type=1326 audit(157.440:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.0.102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 157.518345][ T31] audit: type=1326 audit(157.460:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.0.102" exe="/syz-executor" sig=0 arch=40000028 syscall=65 compat=0 ip=0x132da0 code=0x7ffc0000 [ 157.519327][ T31] audit: type=1326 audit(157.460:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.0.102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 157.521078][ T31] audit: type=1326 audit(157.460:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.0.102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 158.055388][ T4460] netlink: 32 bytes leftover after parsing attributes in process `syz.0.105'. [ 161.018706][ T4222] hsr_slave_0: entered promiscuous mode [ 161.030246][ T4222] hsr_slave_1: entered promiscuous mode [ 161.041386][ T4222] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 161.042012][ T4222] Cannot create hsr debugfs directory [ 161.335940][ T4540] syz.0.108 uses obsolete (PF_INET,SOCK_PACKET) [ 162.212029][ T4222] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 162.365281][ T4222] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 162.429302][ T4222] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 162.477623][ T4222] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 162.838460][ T4222] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 162.866690][ T4222] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 162.884604][ T4222] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 162.924782][ T4222] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 164.980689][ T4617] IPv6: Can't replace route, no match found [ 165.187779][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 165.187900][ T31] audit: type=1400 audit(165.130:252): avc: denied { ioctl } for pid=4618 comm="syz.0.112" path="socket:[2949]" dev="sockfs" ino=2949 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 165.191895][ T31] audit: type=1400 audit(165.130:253): avc: denied { write } for pid=4618 comm="syz.0.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 165.485154][ T4622] netlink: 8 bytes leftover after parsing attributes in process `syz.0.113'. [ 166.203923][ T4222] 8021q: adding VLAN 0 to HW filter on device bond0 [ 167.265219][ T4636] Zero length message leads to an empty skb [ 167.408242][ T4639] syz.0.116 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 176.091172][ T3181] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 176.101841][ T3181] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 176.109468][ T3181] bond0 (unregistering): Released all slaves [ 176.168374][ T3181] hsr_slave_0: left promiscuous mode [ 176.171282][ T3181] hsr_slave_1: left promiscuous mode [ 176.178242][ T3181] veth1_macvtap: left promiscuous mode [ 176.178866][ T3181] veth0_macvtap: left promiscuous mode [ 176.179371][ T3181] veth1_vlan: left promiscuous mode [ 176.179971][ T3181] veth0_vlan: left promiscuous mode [ 177.357008][ T4222] veth0_vlan: entered promiscuous mode [ 177.370593][ T4222] veth1_vlan: entered promiscuous mode [ 177.411377][ T4222] veth0_macvtap: entered promiscuous mode [ 177.416977][ T4222] veth1_macvtap: entered promiscuous mode [ 177.459479][ T4222] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.460014][ T4222] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.460497][ T4222] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.460825][ T4222] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.527859][ T31] audit: type=1400 audit(177.470:254): avc: denied { mounton } for pid=4222 comm="syz-executor" path="/syzkaller.swpoDz/syz-tmp" dev="vda" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 177.529588][ T31] audit: type=1400 audit(177.470:255): avc: denied { mount } for pid=4222 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 177.531729][ T31] audit: type=1400 audit(177.470:256): avc: denied { mounton } for pid=4222 comm="syz-executor" path="/syzkaller.swpoDz/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 177.534748][ T31] audit: type=1400 audit(177.480:257): avc: denied { mount } for pid=4222 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 177.554898][ T31] audit: type=1400 audit(177.490:258): avc: denied { unmount } for pid=4222 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 177.555697][ T31] audit: type=1400 audit(177.490:259): avc: denied { mounton } for pid=4222 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 177.556490][ T31] audit: type=1400 audit(177.490:260): avc: denied { mount } for pid=4222 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 177.640851][ T31] audit: type=1400 audit(177.580:261): avc: denied { read } for pid=4673 comm="syz.1.79" laddr=::1 lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 182.272263][ T4695] syz.1.125[4695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.272621][ T4695] syz.1.125[4695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.388189][ T31] audit: type=1400 audit(184.330:262): avc: denied { create } for pid=4716 comm="syz.0.132" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 184.396334][ T31] audit: type=1400 audit(184.330:263): avc: denied { map } for pid=4716 comm="syz.0.132" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4225 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 184.397377][ T31] audit: type=1400 audit(184.330:264): avc: denied { read write } for pid=4716 comm="syz.0.132" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4225 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 185.950070][ T31] audit: type=1400 audit(185.890:265): avc: denied { create } for pid=4723 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 185.991351][ T31] audit: type=1400 audit(185.930:266): avc: denied { setopt } for pid=4723 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 186.475724][ T31] audit: type=1400 audit(186.420:267): avc: denied { write } for pid=4733 comm="syz.1.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 186.476317][ T31] audit: type=1400 audit(186.420:268): avc: denied { nlmsg_write } for pid=4733 comm="syz.1.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 186.493987][ T31] audit: type=1326 audit(186.430:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4733 comm="syz.1.139" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 186.494683][ T31] audit: type=1326 audit(186.430:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4733 comm="syz.1.139" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 186.499637][ T31] audit: type=1326 audit(186.440:271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4733 comm="syz.1.139" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 190.044896][ T4767] netlink: 4 bytes leftover after parsing attributes in process `syz.1.152'. [ 191.188006][ T4777] pim6reg1: entered promiscuous mode [ 191.189214][ T4777] pim6reg1: entered allmulticast mode [ 192.897323][ T4693] coredump: 207(syz.0.121): written to core: VMAs: 23, size 40165376; core: 27805758 bytes, pos 40169472 [ 193.206742][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 193.206843][ T31] audit: type=1326 audit(193.130:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4769 comm="syz.1.154" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 193.226439][ T31] audit: type=1326 audit(193.170:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4769 comm="syz.1.154" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 193.228981][ T31] audit: type=1326 audit(193.170:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4769 comm="syz.1.154" exe="/syz-executor" sig=0 arch=40000028 syscall=356 compat=0 ip=0x132da0 code=0x7ffc0000 [ 193.230977][ T31] audit: type=1326 audit(193.170:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4769 comm="syz.1.154" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 193.232409][ T31] audit: type=1326 audit(193.170:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4769 comm="syz.1.154" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 194.206926][ T31] audit: type=1400 audit(194.140:319): avc: denied { sqpoll } for pid=4789 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 194.696322][ T31] audit: type=1400 audit(194.640:320): avc: denied { create } for pid=4791 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 194.734317][ T31] audit: type=1400 audit(194.670:321): avc: denied { connect } for pid=4791 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 195.229731][ T31] audit: type=1400 audit(195.160:322): avc: denied { execute } for pid=4793 comm="syz.1.163" path="/21/net_prio.prioidx" dev="tmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 195.643130][ T31] audit: type=1326 audit(195.580:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4798 comm="syz.1.165" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 196.887442][ T4813] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 197.041521][ T4813] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 197.318431][ T4813] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 197.467554][ T4813] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 197.607886][ T4813] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.638687][ T4813] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.729028][ T4813] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.866827][ T4813] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 200.656454][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 200.656579][ T31] audit: type=1400 audit(200.600:342): avc: denied { name_bind } for pid=4838 comm="syz.1.176" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 206.239193][ T31] audit: type=1400 audit(206.180:343): avc: denied { create } for pid=4850 comm="syz.1.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 206.263143][ T31] audit: type=1400 audit(206.200:344): avc: denied { ioctl } for pid=4850 comm="syz.1.181" path="socket:[4521]" dev="sockfs" ino=4521 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 206.266462][ T31] audit: type=1400 audit(206.210:345): avc: denied { setopt } for pid=4850 comm="syz.1.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 206.305008][ T31] audit: type=1400 audit(206.250:346): avc: denied { bind } for pid=4850 comm="syz.1.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 206.310464][ T31] audit: type=1400 audit(206.250:347): avc: denied { write } for pid=4850 comm="syz.1.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 206.535357][ T4851] netlink: 28 bytes leftover after parsing attributes in process `syz.1.181'. [ 206.551146][ T4851] ------------[ cut here ]------------ [ 206.551866][ T4851] WARNING: CPU: 1 PID: 4851 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 206.553051][ T4851] refcount_t: underflow; use-after-free. [ 206.553392][ T4851] Modules linked in: [ 206.554849][ T4851] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 206.557732][ T4851] CPU: 1 UID: 0 PID: 4851 Comm: syz.1.181 Not tainted 6.11.0-syzkaller #0 [ 206.558404][ T4851] Hardware name: ARM-Versatile Express [ 206.559171][ T4851] Call trace: [ 206.559745][ T4851] [<81985f40>] (dump_backtrace) from [<8198603c>] (show_stack+0x18/0x1c) [ 206.560792][ T4851] r7:00000000 r6:826228c4 r5:00000000 r4:82035a48 [ 206.561230][ T4851] [<81986024>] (show_stack) from [<819a431c>] (dump_stack_lvl+0x54/0x7c) [ 206.561738][ T4851] [<819a42c8>] (dump_stack_lvl) from [<819a435c>] (dump_stack+0x18/0x1c) [ 206.562260][ T4851] r5:00000000 r4:8286dd18 [ 206.562599][ T4851] [<819a4344>] (dump_stack) from [<81986b68>] (panic+0x120/0x370) [ 206.563064][ T4851] [<81986a48>] (panic) from [<802421dc>] (get_taint+0x0/0x1c) [ 206.563995][ T4851] r3:8260c5c4 r2:00000001 r1:8201e0ec r0:82025eb8 [ 206.564764][ T4851] r7:808348c0 [ 206.564966][ T4851] [<80242168>] (check_panic_on_warn) from [<8024233c>] (__warn+0x80/0x188) [ 206.565483][ T4851] [<802422bc>] (__warn) from [<8024262c>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 206.566024][ T4851] r8:00000009 r7:82084ad8 r6:dfb11854 r5:84b60c00 r4:00000000 [ 206.566761][ T4851] [<80242448>] (warn_slowpath_fmt) from [<808348c0>] (refcount_warn_saturate+0x13c/0x174) [ 206.567312][ T4851] r10:84c7aa00 r9:0000006c r8:8515781c r7:00000000 r6:81813f34 r5:00000002 [ 206.567887][ T4851] r4:84a130c0 [ 206.568142][ T4851] [<80834784>] (refcount_warn_saturate) from [<814867d0>] (sk_skb_reason_drop+0x1d8/0x248) [ 206.568656][ T4851] [<814865f8>] (sk_skb_reason_drop) from [<81813f34>] (j1939_session_destroy+0x78/0x200) [ 206.569159][ T4851] r9:0000006c r8:8515781c r7:00000000 r6:84c7aa50 r5:84c7aa00 r4:84a130c0 [ 206.569574][ T4851] [<81813ebc>] (j1939_session_destroy) from [<81817918>] (j1939_cancel_active_session+0x1f0/0x1fc) [ 206.570147][ T4851] r6:85157814 r5:84c7aa04 r4:85157810 [ 206.570567][ T4851] [<81817728>] (j1939_cancel_active_session) from [<81810c74>] (j1939_netdev_notify+0x108/0x150) [ 206.571075][ T4851] r10:84b60c00 r9:00000000 r8:ffffffcd r7:00000001 r6:85157000 r5:00000002 [ 206.571503][ T4851] r4:85157810 [ 206.571784][ T4851] [<81810b6c>] (j1939_netdev_notify) from [<8027149c>] (notifier_call_chain+0x74/0x1ac) [ 206.572296][ T4851] r7:00000001 r6:827e6e64 r5:827e6e84 r4:81810b6c [ 206.572616][ T4851] [<80271428>] (notifier_call_chain) from [<802716b8>] (raw_notifier_call_chain+0x20/0x28) [ 206.573107][ T4851] r10:821f0774 r9:00000000 r8:85410000 r7:00000001 r6:84b50d00 r5:00000002 [ 206.573807][ T4851] r4:dfb119dc [ 206.574437][ T4851] [<80271698>] (raw_notifier_call_chain) from [<814a1508>] (call_netdevice_notifiers_info+0x54/0xa0) [ 206.575945][ T4851] [<814a14b4>] (call_netdevice_notifiers_info) from [<814a19a4>] (dev_close_many+0xfc/0x150) [ 206.576498][ T4851] r6:dfb11a48 r5:dfb1192c r4:8541011c [ 206.576870][ T4851] [<814a18a8>] (dev_close_many) from [<814acd08>] (unregister_netdevice_many_notify+0x194/0x9c0) [ 206.577381][ T4851] r9:00000001 r8:dfb11a48 r7:8541011c r6:dfb11ab0 r5:dfb11a48 r4:dfb1199c [ 206.578327][ T4851] [<814acb74>] (unregister_netdevice_many_notify) from [<814bc8e4>] (rtnl_dellink+0x134/0x354) [ 206.579162][ T4851] r10:00000001 r9:00000000 r8:00000050 r7:84b50d00 r6:ffffffff r5:849529c0 [ 206.579681][ T4851] r4:84a8b680 [ 206.580029][ T4851] [<814bc7b0>] (rtnl_dellink) from [<814bb02c>] (rtnetlink_rcv_msg+0x138/0x334) [ 206.580830][ T4851] r9:00000000 r8:8291ebd8 r7:849529c0 r6:8291ebd8 r5:00000001 r4:84a8b680 [ 206.581247][ T4851] [<814baef4>] (rtnetlink_rcv_msg) from [<81594e18>] (netlink_rcv_skb+0xc0/0x120) SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 206.581784][ T4851] r10:00000000 r9:00000000 r8:84b50d00 r7:0000003c r6:84a8b680 r5:814baef4 [ 206.582709][ T4851] r4:849529c0 [ 206.582914][ T4851] [<81594d58>] (netlink_rcv_skb) from [<814b99cc>] (rtnetlink_rcv+0x18/0x1c) [ 206.583533][ T4851] r7:849529c0 r6:84c5f880 r5:0000003c r4:84d15800 [ 206.584418][ T4851] [<814b99b4>] (rtnetlink_rcv) from [<81594600>] (netlink_unicast+0x19c/0x29c) [ 206.585576][ T4851] [<81594464>] (netlink_unicast) from [<815948dc>] (netlink_sendmsg+0x1dc/0x43c) [ 206.586055][ T4851] r9:00000000 r8:00000000 r7:8514d000 r6:0000003c r5:849529c0 r4:dfb11f38 [ 206.586452][ T4851] [<81594700>] (netlink_sendmsg) from [<8147147c>] (__sock_sendmsg+0x44/0x78) [ 206.587159][ T4851] r10:00004000 r9:dfb11dd4 r8:dfb11dd4 r7:00000000 r6:831ec780 r5:dfb11f38 [ 206.587858][ T4851] r4:00000000 [ 206.588412][ T4851] [<81471438>] (__sock_sendmsg) from [<81472480>] (____sys_sendmsg+0x2ac/0x2cc) [ 206.589385][ T4851] r7:00000000 r6:00000000 r5:831ec780 r4:dfb11f38 [ 206.589831][ T4851] [<814721d4>] (____sys_sendmsg) from [<814743ec>] (___sys_sendmsg+0x9c/0xd0) [ 206.590327][ T4851] r10:dfb11e34 r9:20000140 r8:00004000 r7:00000000 r6:831ec780 r5:dfb11f38 [ 206.590774][ T4851] r4:00000000 [ 206.590993][ T4851] [<81474350>] (___sys_sendmsg) from [<81474904>] (sys_sendmsg+0x78/0xbc) [ 206.591512][ T4851] r10:00000128 r9:84b60c00 r8:8020029c r7:00004000 r6:20000140 r5:831ec780 [ 206.591871][ T4851] r4:00000000 [ 206.592100][ T4851] [<8147488c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 206.592614][ T4851] Exception stack(0xdfb11fa8 to 0xdfb11ff0) [ 206.593097][ T4851] 1fa0: 00000000 00000000 00000006 20000140 00004000 00000000 [ 206.593774][ T4851] 1fc0: 00000000 00000000 002862f0 00000128 00000000 00006364 003d0f00 76b240bc [ 206.594392][ T4851] 1fe0: 76b23ec0 76b23eb0 000189d0 00132da0 [ 206.594751][ T4851] r7:00000128 r6:002862f0 r5:00000000 r4:00000000 [ 206.597383][ T4851] Rebooting in 86400 seconds.. VM DIAGNOSIS: 01:41:07 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=82035a48 R02=00000001 R03=819a60a8 R04=826f5508 R05=826f5500 R06=00000028 R07=00000006 R08=826f5508 R09=00000000 R10=dddd0400 R11=82601c54 R12=82601c58 R13=82601c48 R14=819a4d40 R15=819a60b8 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=8413b840 R01=00000020 R02=eaef5000 R03=eaef5018 R04=828704a6 R05=8413b840 R06=809d9144 R07=828704bc R08=8287046c R09=00000051 R10=00000001 R11=dfb1160c R12=00000002 R13=dfb11600 R14=827544dc R15=809d9154 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000