last executing test programs: 3.240282982s ago: executing program 0 (id=17): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x35451d7003101a08, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) 3.239943122s ago: executing program 1 (id=18): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000200)=0x632a, 0x4) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000000)=0xb2, 0x4) sendmmsg$inet6(r0, &(0x7f0000000e00)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}], 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x320, 0x140, 0x5c, 0x160, 0x140, 0x3e0, 0x250, 0x228, 0x25a, 0x250, 0x228, 0x4, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'veth0_to_batadv\x00', 'pim6reg\x00', {0xff}, {}, 0x3a}, 0x5002, 0xf8, 0x140, 0x52020000, {0x0, 0x6802000000000000}, [@common=@icmp6={{0x28}, {0x12, "d176", 0x1}}, @common=@unspec=@state={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x1}}}, {{@ipv6={@local, @empty, [0xffffffff], [], 'veth1_to_hsr\x00', 'dummy0\x00'}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x10, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00', {0x2}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x380) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0xda7e, 0xc000, 0xc, 0xa0002f5}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0xfffffffffffffda2, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x24, &(0x7f0000000000)=0xa, 0x4) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) 2.442184626s ago: executing program 1 (id=19): r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000500)={0xa, 0x4e20, 0xffffffff, @empty, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e1d, 0x9, @local, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x7e, &(0x7f00000001c0)={@link_local, @multicast, @void, {@ipv6={0x86dd, @udp={0xa, 0x6, '\x00', 0x48, 0x11, 0x0, @local, @local, {[], {0x4e1d, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "dc521c259b538a2bf2a113dc2eeec0a072edf20b6d59027f", "d646c098cfc27eb8549d66e7b219c2c3b85e4508546e551af9e59631718ba089"}}}}}}}, 0x0) 2.340307491s ago: executing program 0 (id=20): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x40801, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x5437, 0x0) 1.741965324s ago: executing program 0 (id=21): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000008c0)=';', 0x1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000200)=0x632a, 0x4) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000000)=0xb2, 0x4) sendmmsg$inet6(r0, &(0x7f0000000e00)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/19, 0x13}, 0xcf}], 0x1, 0x2023, 0x0) 1.741553444s ago: executing program 1 (id=22): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c40)=@newlink={0x23c, 0x10, 0x403, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x428a4, 0x4200}, [@IFLA_NET_NS_PID={0x8}, @IFLA_LINKMODE={0x5, 0x11, 0x9}, @IFLA_NET_NS_FD={0x8}, @IFLA_GROUP={0x8, 0x1b, 0x4}, @IFLA_MASTER={0x8}, @IFLA_EXT_MASK={0x8, 0x1d, 0x8}, @IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ip6vti={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x14, 0x4, @loopback}]}}}, @IFLA_PORT_SELF={0x0, 0x19, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x0, 0x5, "15cd653690fda12b9f3ba1cf424bc530"}]}, @IFLA_GROUP={0x8, 0x1b, 0x400000}, @IFLA_EXT_MASK={0x8, 0x1d, 0x2}, @IFLA_ALT_IFNAME={0x14, 0x35, 'veth0\x00'}]}, 0x23c}}, 0x8000) 1.392182653s ago: executing program 0 (id=23): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, [@call={0x85, 0x0, 0x0, 0x2a}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000340)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001240)={r0, 0xfffffffe, 0xe, 0x0, &(0x7f0000000080)="925a95e24550ec24e8e1a95586dd", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.178543665s ago: executing program 1 (id=24): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x35451d7003101a08, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) 1.031104093s ago: executing program 0 (id=25): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$packet(0x11, 0x2, 0x300) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f00000006c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001700000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r2, r1, 0x25, 0x0, @void}, 0x10) syz_emit_ethernet(0x56, &(0x7f00000028c0)={@broadcast, @remote, @val={@void, {0x8100, 0x3, 0x1}}, {@mpls_mc={0x8848, {[], @ipv6=@icmpv6={0x4, 0x6, "698ce9", 0x1c, 0x3a, 0x0, @private0, @ipv4={'\x00', '\xff\xff', @broadcast}, {[], @mlv2_query={0x82, 0x0, 0x0, 0xd, 0x80, @loopback, 0x1, 0x1}}}}}}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x1, @local}, 0x4a, {0x2, 0x4e23, @dev}}) socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_NEW(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="38000000000901080000000000000000000000010900010073797a3100000000180002001400"], 0x38}, 0x1, 0x0, 0x0, 0x801}, 0x2000000) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/arp\x00') preadv(r4, &(0x7f0000000080)=[{&(0x7f0000000b40)=""/119, 0x77}], 0x1, 0x4000ffe, 0x0) 702.337511ms ago: executing program 1 (id=26): openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) open(&(0x7f0000000000)='./file0\x00', 0x1607c0, 0x78e22799f4a46ffe) 250.424646ms ago: executing program 1 (id=27): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1f000000}, 0x48) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f000068c000/0xc000)=nil, &(0x7f0000817000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r0 = io_uring_setup(0x4fee, &(0x7f0000000040)={0x0, 0x3cb1, 0x1c080, 0xa, 0x20002f7}) io_uring_enter(r0, 0x2219, 0x7721, 0x1e, 0x0, 0x0) 0s ago: executing program 0 (id=28): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000000000002000002e0000002000000000000000000000000deffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000100000002ea"], 0x110) kernel console output (not intermixed with test programs): [ 46.922769][ T28] audit: type=1400 audit(46.840:56): avc: denied { read write } for pid=3083 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.924622][ T28] audit: type=1400 audit(46.840:57): avc: denied { open } for pid=3083 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:41463' (ED25519) to the list of known hosts. [ 62.358499][ T28] audit: type=1400 audit(62.270:58): avc: denied { name_bind } for pid=3086 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.004569][ T28] audit: type=1400 audit(63.920:59): avc: denied { execute } for pid=3087 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.008521][ T28] audit: type=1400 audit(63.920:60): avc: denied { execute_no_trans } for pid=3087 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.501577][ T28] audit: type=1400 audit(66.420:61): avc: denied { mounton } for pid=3087 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.505111][ T28] audit: type=1400 audit(66.420:62): avc: denied { mount } for pid=3087 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.516681][ T3087] cgroup: Unknown subsys name 'net' [ 66.524117][ T28] audit: type=1400 audit(66.440:63): avc: denied { unmount } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.656988][ T3087] cgroup: Unknown subsys name 'cpuset' [ 66.662945][ T3087] cgroup: Unknown subsys name 'hugetlb' [ 66.663792][ T3087] cgroup: Unknown subsys name 'rlimit' [ 66.853838][ T28] audit: type=1400 audit(66.770:64): avc: denied { setattr } for pid=3087 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.856085][ T28] audit: type=1400 audit(66.770:65): avc: denied { mounton } for pid=3087 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.860833][ T28] audit: type=1400 audit(66.770:66): avc: denied { mount } for pid=3087 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.023755][ T3089] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.026295][ T28] audit: type=1400 audit(66.940:67): avc: denied { relabelto } for pid=3089 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 73.779342][ T3087] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 75.795133][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 75.800053][ T28] audit: type=1400 audit(75.710:71): avc: denied { execmem } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 75.851852][ T28] audit: type=1400 audit(75.770:72): avc: denied { read } for pid=3092 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.853821][ T28] audit: type=1400 audit(75.770:73): avc: denied { open } for pid=3092 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.860009][ T28] audit: type=1400 audit(75.770:74): avc: denied { mounton } for pid=3092 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 75.868970][ T28] audit: type=1400 audit(75.780:75): avc: denied { module_request } for pid=3092 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.941419][ T28] audit: type=1400 audit(75.860:76): avc: denied { sys_module } for pid=3094 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 76.495793][ T28] audit: type=1400 audit(76.410:77): avc: denied { ioctl } for pid=3092 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 77.521070][ T3092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.528611][ T3092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.653105][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.662031][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.466639][ T3092] hsr_slave_0: entered promiscuous mode [ 78.468826][ T3092] hsr_slave_1: entered promiscuous mode [ 78.522349][ T3094] hsr_slave_0: entered promiscuous mode [ 78.523532][ T3094] hsr_slave_1: entered promiscuous mode [ 78.525912][ T3094] debugfs: 'hsr0' already exists in 'hsr' [ 78.526408][ T3094] Cannot create hsr debugfs directory [ 78.868459][ T28] audit: type=1400 audit(78.780:78): avc: denied { create } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.878767][ T3094] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.880848][ T28] audit: type=1400 audit(78.790:79): avc: denied { write } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.881167][ T28] audit: type=1400 audit(78.790:80): avc: denied { read } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.894633][ T3094] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.903547][ T3094] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.909255][ T3094] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 79.007837][ T3092] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 79.018223][ T3092] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 79.028665][ T3092] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 79.037390][ T3092] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 79.557139][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.913371][ T3092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.395248][ T3094] veth0_vlan: entered promiscuous mode [ 82.413997][ T3094] veth1_vlan: entered promiscuous mode [ 82.485508][ T3094] veth0_macvtap: entered promiscuous mode [ 82.497658][ T3094] veth1_macvtap: entered promiscuous mode [ 82.597078][ T1703] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.597786][ T1703] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.598200][ T1703] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.598439][ T1703] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.793876][ T28] audit: type=1400 audit(82.710:81): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 82.814759][ T28] audit: type=1400 audit(82.730:82): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.qfRiOY/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 82.820870][ T28] audit: type=1400 audit(82.740:83): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 82.829156][ T28] audit: type=1400 audit(82.740:84): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.qfRiOY/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 82.840263][ T28] audit: type=1400 audit(82.750:85): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.qfRiOY/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2018 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 82.850932][ T28] audit: type=1400 audit(82.770:86): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 82.858465][ T28] audit: type=1400 audit(82.770:87): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 82.866144][ T28] audit: type=1400 audit(82.780:88): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="gadgetfs" ino=2325 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 82.875667][ T28] audit: type=1400 audit(82.790:89): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 82.882238][ T28] audit: type=1400 audit(82.800:90): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 82.955775][ T3094] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 83.197414][ T3092] veth0_vlan: entered promiscuous mode [ 83.230147][ T3092] veth1_vlan: entered promiscuous mode [ 83.302635][ T3092] veth0_macvtap: entered promiscuous mode [ 83.318417][ T3092] veth1_macvtap: entered promiscuous mode [ 83.377326][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.377615][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.383743][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.384571][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.101154][ T3710] capability: warning: `syz.1.4' uses deprecated v2 capabilities in a way that may be insecure [ 85.879823][ C1] hrtimer: interrupt took 8310240 ns [ 88.302356][ T28] kauditd_printk_skb: 14 callbacks suppressed [ 88.306061][ T28] audit: type=1400 audit(88.220:105): avc: denied { prog_run } for pid=3726 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 88.693599][ T28] audit: type=1400 audit(88.610:106): avc: denied { create } for pid=3728 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 88.698588][ T28] audit: type=1400 audit(88.610:107): avc: denied { write } for pid=3728 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 89.314569][ T28] audit: type=1400 audit(89.220:108): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 89.583113][ T28] audit: type=1400 audit(89.470:109): avc: denied { create } for pid=3739 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 89.604469][ T28] audit: type=1400 audit(89.520:110): avc: denied { setopt } for pid=3739 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 89.960333][ T28] audit: type=1400 audit(89.850:111): avc: denied { ioctl } for pid=3739 comm="syz.1.14" path="socket:[3179]" dev="sockfs" ino=3179 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 89.994424][ T28] audit: type=1400 audit(89.910:112): avc: denied { write } for pid=3739 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 89.995398][ T3741] af_packet: tpacket_rcv: packet too big, clamped from 1 to 4294967272. macoff=96 [ 91.662000][ T28] audit: type=1400 audit(91.580:113): avc: denied { name_bind } for pid=3758 comm="syz.1.19" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 92.478039][ T3765] netlink: 452 bytes leftover after parsing attributes in process `syz.1.22'. [ 93.694377][ T28] audit: type=1400 audit(93.610:114): avc: denied { create } for pid=3770 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 93.695246][ T3771] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 93.985471][ T3775] ------------[ cut here ]------------ [ 93.986311][ T3775] WARNING: kernel/bpf/verifier.c:2824 at reg_bounds_sanity_check+0x3c0/0x428, CPU#0: syz.1.27/3775 [ 93.993399][ T3775] verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0xffffdfcd, 0xffffffffffffdfcc] s64=[0x80000000ffffdfcd, 0x7fffffffffffdfcc] u32=[0xffffdfcd, 0xffffdfcc] s32=[0xffffdfcd, 0xffffdfcc] var_off=(0xffffdfcc, 0xffffffff00000000) [ 93.994702][ T3775] Modules linked in: [ 93.995816][ T3775] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 93.996616][ T3775] CPU: 0 UID: 0 PID: 3775 Comm: syz.1.27 Not tainted syzkaller #0 PREEMPT [ 93.997024][ T3775] Hardware name: ARM-Versatile Express [ 93.997465][ T3775] Call trace: [ 93.997978][ T3775] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 93.998608][ T3775] r7:8281f9b4 r6:00000000 r5:822a88f8 r4:00000001 [ 93.998950][ T3775] [<80201af0>] (show_stack) from [<8021e410>] (dump_stack_lvl+0x5c/0x70) [ 93.999358][ T3775] [<8021e3b4>] (dump_stack_lvl) from [<8021e43c>] (dump_stack+0x18/0x1c) [ 93.999883][ T3775] r7:8281f9b4 r6:00000000 r5:84796200 r4:82a80d14 [ 94.000183][ T3775] [<8021e424>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 94.000472][ T3775] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 94.000767][ T3775] r7:803e145c [ 94.000905][ T3775] [<80202818>] (panic) from [<80250a70>] (get_taint+0x0/0x1c) [ 94.001189][ T3775] r3:8280c544 r2:00000001 r1:8228f604 r0:82296ed0 [ 94.001395][ T3775] [<802509f8>] (check_panic_on_warn) from [<80250bec>] (__warn+0x98/0x1ac) [ 94.001853][ T3775] [<80250b54>] (__warn) from [<80250ee8>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 94.002244][ T3775] r8:00000009 r7:822af25c r6:dfb618c4 r5:84796200 r4:00000000 [ 94.002475][ T3775] [<80250d04>] (warn_slowpath_fmt) from [<803e145c>] (reg_bounds_sanity_check+0x3c0/0x428) [ 94.002994][ T3775] r10:861b0000 r9:ffffdfcd r8:80000000 r7:ffffdfcd r6:ffffdfcc r5:822afa04 [ 94.003278][ T3775] r4:8532e230 [ 94.003420][ T3775] [<803e109c>] (reg_bounds_sanity_check) from [<803ee3cc>] (reg_set_min_max+0x1d4/0x298) [ 94.003759][ T3775] r10:00000001 r9:00000010 r8:861b0000 r7:85dad310 r6:8532e310 r5:8532e230 [ 94.004108][ T3775] r4:85dad230 [ 94.004245][ T3775] [<803ee1f8>] (reg_set_min_max) from [<803ff0a4>] (check_cond_jmp_op+0xc84/0x1988) [ 94.004607][ T3775] r10:8532e000 r9:00000010 r8:861ee180 r7:ffffffff r6:80000000 r5:86156600 [ 94.004877][ T3775] r4:dfbad0c0 r3:85dad230 [ 94.005049][ T3775] [<803fe420>] (check_cond_jmp_op) from [<80405700>] (do_check_common+0x2584/0x3214) [ 94.005562][ T3775] r10:861b4000 r9:861b0000 r8:dfbad0c0 r7:861b6000 r6:00000018 r5:dfbad078 [ 94.006003][ T3775] r4:dfbad000 [ 94.006219][ T3775] [<8040317c>] (do_check_common) from [<80409300>] (bpf_check+0x228c/0x2d2c) [ 94.006658][ T3775] r10:861b6000 r9:00000001 r8:861b0000 r7:00000a7b r6:861b08bc r5:00000000 [ 94.006958][ T3775] r4:00000016 [ 94.007098][ T3775] [<80407074>] (bpf_check) from [<803da79c>] (bpf_prog_load+0x5b8/0xdec) [ 94.007984][ T3775] r10:dfbad000 r9:84796200 r8:85dab330 r7:dfb61d18 r6:00000000 r5:00000000 [ 94.008244][ T3775] r4:dfb61eb0 [ 94.008383][ T3775] [<803da1e4>] (bpf_prog_load) from [<803dbfc4>] (__sys_bpf+0x2d8/0x2038) [ 94.008773][ T3775] r10:00000005 r9:00000000 r8:dfb61e50 r7:00000048 r6:84796200 r5:200054c0 [ 94.009032][ T3775] r4:00000000 [ 94.009169][ T3775] [<803dbcec>] (__sys_bpf) from [<803de2bc>] (sys_bpf+0x2c/0x48) [ 94.009621][ T3775] r10:00000182 r9:84796200 r8:8020029c r7:00000182 r6:00346310 r5:00000000 [ 94.010245][ T3775] r4:00000000 [ 94.010758][ T3775] [<803de290>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 94.011180][ T3775] Exception stack(0xdfb61fa8 to 0xdfb61ff0) [ 94.011682][ T3775] 1fa0: 00000000 00000000 00000005 200054c0 00000048 00000000 [ 94.012189][ T3775] 1fc0: 00000000 00000000 00346310 00000182 003462d8 00000000 003d0f00 76f760dc [ 94.012514][ T3775] 1fe0: 76f75e88 76f75e78 00018bc4 00130300 [ 94.015142][ T3775] Rebooting in 86400 seconds..