last executing test programs: 5m31.175090769s ago: executing program 1 (id=331): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfff) syz_emit_ethernet(0x8e, &(0x7f0000000140)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "8a35f2", 0x58, 0x6, 0xff, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x16, 0x2, 0x800, 0x0, 0x0, {[@mptcp=@remove_addr={0x1e, 0x41, 0x2, 0x0, "9e65a40abaa7f786918036821022960347f5045db2b5fc8ff98cdecbcca2d63561ff57f24382473ab7ba0b8d43326a91cb8a35abb29bf3787dbe70ce257f"}]}}}}}}}}, 0x0) 5m30.15224819s ago: executing program 1 (id=332): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)=@delchain={0x24, 0x65, 0x2, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x2}, {0x0, 0x1}, {0x0, 0xb}}}, 0x24}, 0x1, 0x0, 0x0, 0x81}, 0x20000080) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=@newlink={0x4c, 0x10, 0xffffffffffffffff, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x50a3a, 0x823}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe}, {0x4}}}, @IFLA_IFNAME={0x14}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000080}, 0x4008000) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0xffffffffffffff2f}}], 0x4000000000003b4, 0x2040000, &(0x7f0000003700)={0x77359400}) 5m27.798250154s ago: executing program 1 (id=334): mkdirat(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000500)={{}, {0x1, 0x7}, [], {0x4, 0x1}, [{}], {0x10, 0x1}}, 0x2c, 0x2) 5m26.080347963s ago: executing program 1 (id=336): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000580)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x1b5008, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000540)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2145499, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x80000, 0x0) 5m24.536089705s ago: executing program 1 (id=337): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000023c0)='./file0\x00', 0x0, 0x958028, &(0x7f0000000580)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=0xee00, @ANYBLOB]) r0 = syz_open_procfs(0x0, &(0x7f0000000700)='mounts\x00') read$FUSE(r0, &(0x7f00000076c0)={0x2020}, 0x2020) 5m19.708745178s ago: executing program 1 (id=338): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000001f40)=""/4079, 0x0, 0xfef, 0xc}, 0x28) 5m19.668939709s ago: executing program 32 (id=338): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000001f40)=""/4079, 0x0, 0xfef, 0xc}, 0x28) 38.386971439s ago: executing program 0 (id=582): r0 = syz_open_dev$loop(&(0x7f0000000240), 0x7, 0x180862) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/image_size', 0xc2802, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000080)={r1, 0x0, {0x0, 0x0, 0x0, 0x4, 0x4000000000000ffd, 0x0, 0x0, 0x1e, 0xc, "faf98317e5a1149989fc8dbe43ea6acc96e3a2503dc3bd3fe37d58128bbad0099cebdc25f5ab60c9e6d680f985881a7beda9d69098c8b534464c516bdd8a0f35", "32d8cc26f7061a74df2cfc06c89f3d9e234b30c50997d3bef409ff2176ff7bfe55cd4a5d83cd4a524bd3ffe70c7f3f800b2f7b6aa54cc50a1fcaed1e831fa79a", "675237601a8ca5b07dcc141802c4dae4162e43ac61b7ad3300", [0xfffffffffffffce8, 0xa]}}) io_setup(0x1, &(0x7f00000016c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000000)={0x4000000, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f00000001c0)="b1", 0x1, 0x0, 0x0, 0x0, r1}]) 35.206007186s ago: executing program 0 (id=583): socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffb000/0x2000)=nil) 24.085704189s ago: executing program 2 (id=586): r0 = syz_usb_connect$hid(0x2, 0x7b, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x810, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x90, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x3, 0x8, 0x1, {0x22, 0x7}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x6, 0x7}}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000400)={0x2c, &(0x7f0000000100)=ANY=[@ANYBLOB="200f070000000721b0f24e2500"], 0x0, 0x0, 0x0, 0x0}, 0x0) 23.488109253s ago: executing program 2 (id=587): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x2a, 0xa9}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(sm4)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000140)="2c385aa3d49100dc6626c892b6bc436a", 0x10) r4 = accept4(r3, 0x0, 0x0, 0x80000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r4) sendmsg$nl_route_sched_retired(r4, &(0x7f0000003840)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newtfilter={0x24, 0x2c, 0x804, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x4, 0xb}, {0xfff3, 0xe}, {0x10, 0x8}}}, 0x24}, 0x1, 0x0, 0x0, 0x539b1cfd2cf5b5e5}, 0x40000) 10.966403003s ago: executing program 2 (id=588): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x13) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f00000000c0)={0xfffffff8, 0x0, 0xfffbfffd, 0x3, 0x4f, "0c41920887e8d2b791f19dd026d76d7fcb366b", 0x4, 0x200}) write(r0, &(0x7f0000000200)='G', 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0x8) 10.129764477s ago: executing program 0 (id=589): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00'}, 0x94) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@link_local={0x3}, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010102}, @time_exceeded={0x3, 0x4, 0x0, 0x12, 0xfe, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x68, 0x0, 0x0, 0x1, 0x2, @loopback, @loopback}}}}}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x4000, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 9.555225959s ago: executing program 2 (id=590): madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) munlockall() madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='smaps\x00') read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 8.495862982s ago: executing program 2 (id=591): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) unshare(0x2040400) r0 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) unshare(0x2000400) fsmount(r0, 0x0, 0x2) 7.270202591s ago: executing program 2 (id=592): r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x60042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460e02fab7ff7f00000000000002000300fffeffffdf020000000000004000000000000000030300ef0000000000000000080038000100040004000d00030000000080000000000000000000000700000000000000080000000000400005200000000000000204"], 0x78) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_SEQ_SYNC(r0, 0x5101) 6.734000582s ago: executing program 0 (id=593): setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x1e8, 0x0, 0xffffffff, 0xffffffff, 0xf0, 0xffffffff, 0x188, 0xffffffff, 0xffffffff, 0x188, 0xffffffff, 0x7fffffe, 0x0, {[{{@uncond, 0x6, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ip={@local, @local, 0x0, 0x0, 'veth0_to_team\x00', 'veth1_virt_wifi\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE0={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x248) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x1c) syz_emit_ethernet(0x2a, &(0x7f0000000e80)={@link_local, @local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x4, 0x0, 0xfe, 0x11, 0x0, @local, @multicast1}, {0x0, 0x4e25, 0x8}}}}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) sendmsg$SMC_PNETID_GET(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r1, 0x0, 0x0) 5.496910291s ago: executing program 0 (id=594): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x208}, 0x0) recvmmsg(r3, &(0x7f0000001dc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/188, 0xbc, 0xdf0e}}], 0x1800, 0x2002, 0x0) 0s ago: executing program 0 (id=595): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:32524' (ED25519) to the list of known hosts. [ 222.264752][ T30] audit: type=1400 audit(221.720:46): avc: denied { name_bind } for pid=3313 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 222.628060][ T30] audit: type=1400 audit(222.080:47): avc: denied { execute } for pid=3314 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 222.632594][ T30] audit: type=1400 audit(222.090:48): avc: denied { execute_no_trans } for pid=3314 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 229.650400][ T30] audit: type=1400 audit(229.110:49): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 229.664119][ T30] audit: type=1400 audit(229.120:50): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 229.722098][ T3314] cgroup: Unknown subsys name 'net' [ 229.755162][ T30] audit: type=1400 audit(229.210:51): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 230.081694][ T3314] cgroup: Unknown subsys name 'cpuset' [ 230.118850][ T3314] cgroup: Unknown subsys name 'rlimit' [ 230.483234][ T30] audit: type=1400 audit(229.940:52): avc: denied { setattr } for pid=3314 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 230.493520][ T30] audit: type=1400 audit(229.950:53): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 230.505310][ T30] audit: type=1400 audit(229.960:54): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 231.286770][ T3316] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 231.295438][ T30] audit: type=1400 audit(230.750:55): avc: denied { relabelto } for pid=3316 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 231.307929][ T30] audit: type=1400 audit(230.760:56): avc: denied { write } for pid=3316 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 231.445894][ T30] audit: type=1400 audit(230.900:57): avc: denied { read } for pid=3314 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 231.455932][ T30] audit: type=1400 audit(230.900:58): avc: denied { open } for pid=3314 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 231.484205][ T3314] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 249.368150][ T30] audit: type=1400 audit(248.820:59): avc: denied { execmem } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 249.470701][ T30] audit: type=1400 audit(248.930:60): avc: denied { read } for pid=3319 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 249.479704][ T30] audit: type=1400 audit(248.940:61): avc: denied { open } for pid=3319 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 249.502581][ T30] audit: type=1400 audit(248.960:62): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 249.554136][ T30] audit: type=1400 audit(249.010:63): avc: denied { module_request } for pid=3319 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 249.794146][ T30] audit: type=1400 audit(249.250:64): avc: denied { sys_module } for pid=3319 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 259.660889][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 259.835268][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 260.187401][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 260.350870][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 263.759215][ T3321] hsr_slave_0: entered promiscuous mode [ 263.779871][ T3321] hsr_slave_1: entered promiscuous mode [ 264.288356][ T3319] hsr_slave_0: entered promiscuous mode [ 264.295319][ T3319] hsr_slave_1: entered promiscuous mode [ 264.305094][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 264.310883][ T3319] Cannot create hsr debugfs directory [ 266.935690][ T30] audit: type=1400 audit(266.390:65): avc: denied { create } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 266.943264][ T30] audit: type=1400 audit(266.400:66): avc: denied { write } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 266.974719][ T30] audit: type=1400 audit(266.430:67): avc: denied { read } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 267.063982][ T3321] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 267.185114][ T3321] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 267.304684][ T3321] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 267.498816][ T3321] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 267.910703][ T3319] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 267.962776][ T3319] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 268.065858][ T3319] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 268.115633][ T3319] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 271.032610][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.351105][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.368829][ T3321] veth0_vlan: entered promiscuous mode [ 283.496014][ T3321] veth1_vlan: entered promiscuous mode [ 283.772622][ T3319] veth0_vlan: entered promiscuous mode [ 283.949605][ T3319] veth1_vlan: entered promiscuous mode [ 283.982269][ T3321] veth0_macvtap: entered promiscuous mode [ 284.047206][ T3321] veth1_macvtap: entered promiscuous mode [ 284.331018][ T3319] veth0_macvtap: entered promiscuous mode [ 284.433026][ T3319] veth1_macvtap: entered promiscuous mode [ 284.449851][ T2614] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 284.452245][ T2614] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 284.484369][ T93] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 284.485039][ T93] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 285.003700][ T30] audit: type=1400 audit(284.460:68): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 285.053026][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 285.055851][ T30] audit: type=1400 audit(284.510:69): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzkaller.HM6Z9K/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 285.063641][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 285.071229][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 285.109470][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 285.134920][ T30] audit: type=1400 audit(284.590:70): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 285.215485][ T30] audit: type=1400 audit(284.670:71): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzkaller.HM6Z9K/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 285.321851][ T30] audit: type=1400 audit(284.710:72): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzkaller.HM6Z9K/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4176 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 285.460782][ T30] audit: type=1400 audit(284.900:73): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 285.478067][ T30] audit: type=1400 audit(284.930:74): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 285.508108][ T30] audit: type=1400 audit(284.950:75): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="gadgetfs" ino=3859 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 285.547476][ T30] audit: type=1400 audit(284.990:76): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 285.547954][ T30] audit: type=1400 audit(285.000:77): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 285.944191][ T3321] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 288.970385][ T3475] fuse: Unknown parameter 'group_id00000000000000000000' [ 290.038752][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 290.045807][ T30] audit: type=1400 audit(289.480:94): avc: denied { create } for pid=3481 comm="syz.1.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 290.053034][ T30] audit: type=1400 audit(289.510:95): avc: denied { setopt } for pid=3481 comm="syz.1.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 291.149987][ T30] audit: type=1400 audit(290.590:96): avc: denied { read write } for pid=3487 comm="syz.1.7" name="vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 291.153192][ T30] audit: type=1400 audit(290.610:97): avc: denied { open } for pid=3487 comm="syz.1.7" path="/dev/vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 291.171247][ T30] audit: type=1400 audit(290.620:98): avc: denied { ioctl } for pid=3487 comm="syz.1.7" path="/dev/vhost-net" dev="devtmpfs" ino=714 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 292.631494][ T3497] fuse: Bad value for 'user_id' [ 292.632287][ T3497] fuse: Bad value for 'user_id' [ 293.121501][ T30] audit: type=1400 audit(292.580:99): avc: denied { create } for pid=3498 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 293.155234][ T30] audit: type=1400 audit(292.600:100): avc: denied { connect } for pid=3498 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 293.192811][ T30] audit: type=1400 audit(292.650:101): avc: denied { read } for pid=3494 comm="syz.1.10" name="file0" dev="fuse" ino=16777218 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 293.228995][ T30] audit: type=1400 audit(292.670:102): avc: denied { open } for pid=3494 comm="syz.1.10" path="/7/file0/file0" dev="fuse" ino=16777218 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 293.252994][ T30] audit: type=1400 audit(292.700:103): avc: denied { read } for pid=3498 comm="syz.0.12" path="socket:[4266]" dev="sockfs" ino=4266 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 293.531621][ T3500] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 293.536401][ T3500] block device autoloading is deprecated and will be removed. [ 297.687909][ T3509] fuse: Bad value for 'user_id' [ 297.689495][ T3509] fuse: Bad value for 'user_id' [ 299.801324][ T3519] fuse: Bad value for 'user_id' [ 299.802393][ T3519] fuse: Bad value for 'user_id' [ 300.924626][ T3529] fuse: Bad value for 'fd' [ 301.705033][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 301.705986][ T30] audit: type=1400 audit(301.160:106): avc: denied { read write } for pid=3532 comm="syz.1.28" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 301.721774][ T30] audit: type=1400 audit(301.180:107): avc: denied { ioctl open } for pid=3532 comm="syz.1.28" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 302.563772][ T3539] fuse: Bad value for 'fd' [ 306.582976][ T3550] fuse: Bad value for 'fd' [ 310.308385][ T30] audit: type=1400 audit(309.760:108): avc: denied { prog_run } for pid=3556 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 311.465379][ T3561] fuse: Bad value for 'fd' [ 315.193754][ T30] audit: type=1400 audit(314.650:109): avc: denied { read } for pid=3567 comm="syz.1.44" name="vsock" dev="devtmpfs" ino=746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 315.196140][ T30] audit: type=1400 audit(314.650:110): avc: denied { open } for pid=3567 comm="syz.1.44" path="/dev/vsock" dev="devtmpfs" ino=746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 315.808706][ T3572] fuse: Bad value for 'fd' [ 319.425743][ T30] audit: type=1400 audit(318.880:111): avc: denied { write } for pid=3579 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 320.080041][ T3585] fuse: Bad value for 'fd' [ 322.357665][ T30] audit: type=1400 audit(321.810:112): avc: denied { write } for pid=3594 comm="syz.0.55" name="udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 322.384060][ T30] audit: type=1400 audit(321.840:113): avc: denied { ioctl } for pid=3594 comm="syz.0.55" path="/dev/udmabuf" dev="devtmpfs" ino=677 ioctlcmd=0x7542 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 323.041880][ T3597] fuse: Invalid rootmode [ 323.258959][ T30] audit: type=1400 audit(322.710:114): avc: denied { mount } for pid=3598 comm="syz.0.57" name="/" dev="configfs" ino=1089 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 324.135774][ T3607] fuse: Invalid rootmode [ 328.465907][ T3619] fuse: Invalid rootmode [ 331.587298][ T30] audit: type=1400 audit(331.040:115): avc: denied { create } for pid=3623 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 331.625601][ T30] audit: type=1400 audit(331.080:116): avc: denied { create } for pid=3623 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 331.631947][ T30] audit: type=1400 audit(331.080:117): avc: denied { ioctl } for pid=3623 comm="syz.0.68" path="socket:[4488]" dev="sockfs" ino=4488 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 332.635339][ T3630] fuse: Bad value for 'rootmode' [ 336.585474][ T3641] fuse: Bad value for 'rootmode' [ 338.113247][ T30] audit: type=1400 audit(337.570:118): avc: denied { write } for pid=3650 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 339.798814][ T3655] fuse: Bad value for 'rootmode' [ 344.449651][ T3666] fuse: Unknown parameter 'use00000000000000000000' [ 349.942042][ T3680] fuse: Unknown parameter 'use00000000000000000000' [ 356.840777][ T3693] fuse: Unknown parameter 'use00000000000000000000' [ 361.481659][ T30] audit: type=1400 audit(360.940:119): avc: denied { name_bind } for pid=3699 comm="syz.0.100" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 361.496113][ T30] audit: type=1400 audit(360.940:120): avc: denied { node_bind } for pid=3699 comm="syz.0.100" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 362.691870][ T3705] fuse: Unknown parameter 'user_i00000000000000000000' [ 363.881055][ T30] audit: type=1400 audit(363.340:121): avc: denied { read write } for pid=3710 comm="syz.0.105" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 363.885537][ T30] audit: type=1400 audit(363.340:122): avc: denied { open } for pid=3710 comm="syz.0.105" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 364.803176][ T3714] netlink: 8 bytes leftover after parsing attributes in process `syz.0.106'. [ 364.811478][ T3714] sch_tbf: burst 274 is lower than device lo mtu (65550) ! [ 367.671141][ T3716] fuse: Unknown parameter 'user_i00000000000000000000' [ 370.183062][ T3727] fuse: Unknown parameter 'user_i00000000000000000000' [ 371.528711][ T3739] fuse: Unknown parameter 'user_id00000000000000000000' [ 372.066314][ T3742] fuse: Bad value for 'fd' [ 373.561124][ T3750] fuse: Unknown parameter 'user_id00000000000000000000' [ 374.062335][ T3752] fuse: Bad value for 'fd' [ 379.630345][ T3764] fuse: Unknown parameter 'user_id00000000000000000000' [ 380.181128][ T3766] fuse: Bad value for 'fd' [ 381.258087][ T30] audit: type=1400 audit(380.710:123): avc: denied { read write } for pid=3771 comm="syz.1.133" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 381.262787][ T30] audit: type=1400 audit(380.710:124): avc: denied { open } for pid=3771 comm="syz.1.133" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 381.333666][ T30] audit: type=1400 audit(380.790:125): avc: denied { ioctl } for pid=3771 comm="syz.1.133" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 382.922104][ T3774] fuse: Bad value for 'fd' [ 385.573088][ T3784] fuse: Bad value for 'fd' [ 387.449977][ T3795] fuse: Bad value for 'fd' [ 388.388912][ T30] audit: type=1400 audit(387.850:126): avc: denied { write } for pid=3799 comm="syz.0.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 389.859266][ T3806] fuse: Unknown parameter '0x0000000000000003' [ 390.855764][ T3814] bond0: (slave bond_slave_0): Releasing backup interface [ 391.060765][ T3814] bond0: (slave bond_slave_1): Releasing backup interface [ 391.224716][ T30] audit: type=1400 audit(390.680:127): avc: denied { ioctl } for pid=3815 comm="syz.0.155" path="socket:[4825]" dev="sockfs" ino=4825 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 391.242150][ T30] audit: type=1400 audit(390.690:128): avc: denied { write } for pid=3815 comm="syz.0.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 391.913847][ T30] audit: type=1400 audit(391.370:129): avc: denied { ioctl } for pid=3812 comm="syz.1.154" path="socket:[4826]" dev="sockfs" ino=4826 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 391.982809][ T3821] fuse: Unknown parameter '0x0000000000000003' [ 394.082957][ T3832] fuse: Unknown parameter '0x0000000000000003' [ 396.360633][ T3844] fuse: Unknown parameter '0x0000000000000003' [ 398.130804][ T3852] fuse: Bad value for 'fd' [ 398.433821][ T3854] fuse: Unknown parameter '0x0000000000000003' [ 398.915248][ T30] audit: type=1400 audit(398.370:130): avc: denied { allowed } for pid=3855 comm="syz.0.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 398.983142][ T30] audit: type=1400 audit(398.440:131): avc: denied { map } for pid=3855 comm="syz.0.173" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5548 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 398.999227][ T30] audit: type=1400 audit(398.450:132): avc: denied { read write } for pid=3855 comm="syz.0.173" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5548 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 399.264859][ T3856] loop7: detected capacity change from 0 to 16384 [ 401.812729][ T3868] fuse: Unknown parameter '0x0000000000000003' [ 402.855533][ T30] audit: type=1400 audit(402.310:133): avc: denied { execute } for pid=3873 comm="syz.0.181" path="/85/net_prio.prioidx" dev="tmpfs" ino=468 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 404.004952][ T3882] fuse: Unknown parameter 'fd0x0000000000000003' [ 406.459478][ T30] audit: type=1400 audit(405.910:134): avc: denied { write } for pid=3887 comm="syz.1.187" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 407.584480][ T3896] fuse: Unknown parameter 'fd0x0000000000000003' [ 417.923097][ T3912] fuse: Unknown parameter 'fd0x0000000000000003' [ 423.773683][ T30] audit: type=1400 audit(423.230:135): avc: denied { name_bind } for pid=3931 comm="syz.1.205" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 424.296293][ T3937] netlink: 4 bytes leftover after parsing attributes in process `syz.1.207'. [ 427.273446][ T30] audit: type=1400 audit(426.730:136): avc: denied { ioctl } for pid=3944 comm="syz.1.210" path="socket:[5050]" dev="sockfs" ino=5050 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 427.294711][ T3945] bridge_slave_0: entered promiscuous mode [ 427.342739][ T3945] Illegal XDP return value 357400576 on prog (id 13) dev syz_tun, expect packet loss! [ 432.835270][ T30] audit: type=1400 audit(432.290:137): avc: denied { bind } for pid=3955 comm="syz.1.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 437.029590][ T30] audit: type=1400 audit(436.450:138): avc: denied { mounton } for pid=3963 comm="syz.0.218" path="/100/file0" dev="tmpfs" ino=549 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 438.709510][ T30] audit: type=1400 audit(437.920:139): avc: denied { create } for pid=3961 comm="syz.1.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 438.747699][ T30] audit: type=1400 audit(437.940:140): avc: denied { sys_admin } for pid=3961 comm="syz.1.217" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 459.535364][ T30] audit: type=1400 audit(458.980:141): avc: denied { setopt } for pid=3998 comm="syz.1.231" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 459.568910][ T30] audit: type=1400 audit(459.030:142): avc: denied { connect } for pid=3998 comm="syz.1.231" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 459.584604][ T30] audit: type=1400 audit(459.040:143): avc: denied { write } for pid=3998 comm="syz.1.231" laddr=::1 lport=60 faddr=::1 fport=20002 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 480.105831][ T4025] syzkaller0: entered promiscuous mode [ 480.108131][ T4025] syzkaller0: entered allmulticast mode [ 490.191503][ T30] audit: type=1400 audit(489.640:144): avc: denied { mounton } for pid=4030 comm="syz.0.241" path="/116/file0" dev="tmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 499.957275][ T30] audit: type=1400 audit(499.400:145): avc: denied { module_load } for pid=4048 comm="syz.0.247" path="/sys/power/pm_wakeup_irq" dev="sysfs" ino=878 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 510.552011][ T30] audit: type=1400 audit(509.980:146): avc: denied { block_suspend } for pid=4074 comm="syz.1.257" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 512.104201][ T30] audit: type=1400 audit(511.560:147): avc: denied { create } for pid=4079 comm="syz.1.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 512.157923][ T30] audit: type=1400 audit(511.610:148): avc: denied { setopt } for pid=4079 comm="syz.1.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 513.919553][ T30] audit: type=1400 audit(513.380:149): avc: denied { bind } for pid=4079 comm="syz.1.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 516.591017][ T30] audit: type=1400 audit(516.050:150): avc: denied { write } for pid=4090 comm="syz.0.264" name="vlan0" dev="proc" ino=4026532856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 516.675295][ T30] audit: type=1400 audit(516.130:151): avc: denied { create } for pid=4090 comm="syz.0.264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 516.685828][ T30] audit: type=1400 audit(516.140:152): avc: denied { ioctl } for pid=4090 comm="syz.0.264" path="socket:[6346]" dev="sockfs" ino=6346 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 528.295714][ T4105] netlink: 'syz.1.269': attribute type 3 has an invalid length. [ 545.553334][ T4138] netlink: 8 bytes leftover after parsing attributes in process `syz.1.282'. [ 545.557842][ T4138] netlink: 8 bytes leftover after parsing attributes in process `syz.1.282'. [ 545.578245][ T4138] netlink: 8 bytes leftover after parsing attributes in process `syz.1.282'. [ 545.580416][ T4138] netlink: 8 bytes leftover after parsing attributes in process `syz.1.282'. [ 551.572077][ T30] audit: type=1400 audit(551.030:153): avc: denied { sqpoll } for pid=4157 comm="syz.1.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 562.939771][ T4186] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 562.940427][ T4186] block device autoloading is deprecated and will be removed. [ 573.135255][ T4220] fuse: Unknown parameter 'group_i00000000000000000000' [ 584.084392][ T30] audit: type=1400 audit(583.540:154): avc: denied { getopt } for pid=4238 comm="syz.0.323" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 588.412462][ T30] audit: type=1400 audit(587.870:155): avc: denied { read } for pid=4251 comm="syz.1.329" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 594.459942][ T4269] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 594.720555][ T4269] netlink: 20 bytes leftover after parsing attributes in process `syz.0.335'. [ 595.452011][ T30] audit: type=1400 audit(594.910:156): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 610.860566][ T30] audit: type=1326 audit(610.310:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4291 comm="syz.0.344" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffadf5c068 code=0x7ffc0000 [ 610.884668][ T30] audit: type=1326 audit(610.340:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4291 comm="syz.0.344" exe="/syz-executor" sig=0 arch=c00000b7 syscall=285 compat=0 ip=0xffffadf5c068 code=0x7ffc0000 [ 610.894565][ T30] audit: type=1326 audit(610.340:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4291 comm="syz.0.344" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffadf5c068 code=0x7ffc0000 [ 610.944253][ T30] audit: type=1326 audit(610.390:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4291 comm="syz.0.344" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffadf5c068 code=0x7ffc0000 [ 623.386318][ T30] audit: type=1400 audit(622.840:161): avc: denied { mounton } for pid=4300 comm="syz.0.347" path="/proc/406/task" dev="proc" ino=6787 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 623.401816][ T30] audit: type=1400 audit(622.850:162): avc: denied { mount } for pid=4300 comm="syz.0.347" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 625.399601][ T4275] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 625.460137][ T4275] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 628.724226][ T30] audit: type=1400 audit(628.180:163): avc: denied { read } for pid=4332 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 630.992508][ T4275] hsr_slave_0: entered promiscuous mode [ 631.009399][ T4275] hsr_slave_1: entered promiscuous mode [ 631.051670][ T4275] debugfs: 'hsr0' already exists in 'hsr' [ 631.053907][ T4275] Cannot create hsr debugfs directory [ 634.390064][ T4275] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 634.555074][ T4275] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 634.667920][ T4275] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 634.798049][ T4275] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 635.769087][ T30] audit: type=1400 audit(635.220:164): avc: denied { mounton } for pid=4358 comm="syz.0.359" path="/187/file0" dev="tmpfs" ino=999 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 638.789304][ T4275] 8021q: adding VLAN 0 to HW filter on device bond0 [ 649.185294][ T4393] fuse: Bad value for 'fd' [ 652.826368][ T4275] veth0_vlan: entered promiscuous mode [ 653.030814][ T4275] veth1_vlan: entered promiscuous mode [ 653.383205][ T4275] veth0_macvtap: entered promiscuous mode [ 653.432987][ T4275] veth1_macvtap: entered promiscuous mode [ 654.082193][ T26] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 654.092933][ T26] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 654.186146][ T26] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 654.200392][ T26] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 655.101072][ T30] audit: type=1400 audit(654.560:165): avc: denied { mounton } for pid=4275 comm="syz-executor" path="/syzkaller.aEuprf/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 655.524105][ T30] audit: type=1400 audit(654.980:166): avc: denied { mounton } for pid=4275 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 656.449848][ T4413] fuse: Bad value for 'fd' [ 661.957352][ T30] audit: type=1400 audit(661.410:167): avc: denied { ioctl } for pid=4431 comm="syz.0.372" path="mnt:[4026532606]" dev="nsfs" ino=4026532606 ioctlcmd=0x940a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 665.433759][ T30] audit: type=1400 audit(664.860:168): avc: denied { name_bind } for pid=4439 comm="syz.0.375" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 668.630666][ T30] audit: type=1400 audit(668.090:169): avc: denied { create } for pid=4451 comm="syz.0.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 668.689195][ T30] audit: type=1400 audit(668.140:170): avc: denied { connect } for pid=4451 comm="syz.0.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 673.390367][ T30] audit: type=1400 audit(672.840:171): avc: denied { setattr } for pid=4463 comm="syz.2.385" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 682.223753][ T4510] netlink: 8 bytes leftover after parsing attributes in process `syz.2.403'. [ 690.121468][ T30] audit: type=1400 audit(689.580:172): avc: denied { wake_alarm } for pid=4543 comm="syz.0.419" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 698.520608][ T30] audit: type=1400 audit(697.970:173): avc: denied { setopt } for pid=4586 comm="syz.2.438" laddr=172.20.20.10 lport=20 faddr=172.20.20.187 fport=20002 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 699.570880][ T30] audit: type=1400 audit(699.020:174): avc: denied { bind } for pid=4591 comm="syz.2.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 700.119138][ T30] audit: type=1400 audit(699.570:175): avc: denied { accept } for pid=4591 comm="syz.2.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 701.154641][ T4597] netlink: 24 bytes leftover after parsing attributes in process `syz.2.441'. [ 722.193565][ T4626] netlink: 4 bytes leftover after parsing attributes in process `syz.2.453'. [ 725.920152][ T30] audit: type=1400 audit(725.370:176): avc: denied { bind } for pid=4633 comm="syz.2.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 725.972782][ T30] audit: type=1400 audit(725.430:177): avc: denied { accept } for pid=4633 comm="syz.2.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 726.911714][ T30] audit: type=1400 audit(726.370:178): avc: denied { bind } for pid=4638 comm="syz.2.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 729.699557][ T4653] netlink: 32 bytes leftover after parsing attributes in process `syz.0.463'. [ 732.369026][ T30] audit: type=1400 audit(731.820:179): avc: denied { mount } for pid=4667 comm="syz.0.469" name="/" dev="ramfs" ino=8527 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 732.434796][ T30] audit: type=1400 audit(731.890:180): avc: denied { map } for pid=4666 comm="syz.2.470" path="socket:[8528]" dev="sockfs" ino=8528 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 732.542762][ T4669] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 733.145182][ T4668] Injecting memory failure for pfn 0x572a1 at process virtual address 0x20001000 [ 733.308922][ T4668] Memory failure: 0x572a1: Sending SIGBUS to syz.0.469:4668 due to hardware memory corruption [ 733.313266][ T4668] Memory failure: 0x572a1: Failed to invalidate [ 733.321948][ T4668] Memory failure: 0x572a1: dirty unevictable LRU page still referenced by 1 users [ 733.323651][ T4668] Memory failure: 0x572a1: recovery action for dirty unevictable LRU page: Failed [ 733.550130][ T30] audit: type=1400 audit(732.990:181): avc: denied { create } for pid=4671 comm="syz.2.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 733.630022][ T30] audit: type=1400 audit(733.070:182): avc: denied { write } for pid=4671 comm="syz.2.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 734.392582][ T30] audit: type=1400 audit(733.850:183): avc: denied { read } for pid=4671 comm="syz.2.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 741.170334][ T4695] mmap: syz.2.480 (4695) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 754.543079][ T4740] syz_tun: entered allmulticast mode [ 754.594800][ T4739] syz_tun: left allmulticast mode [ 755.465057][ T4744] netlink: 8 bytes leftover after parsing attributes in process `syz.0.499'. [ 756.985722][ T4751] xt_l2tp: missing protocol rule (udp|l2tpip) [ 762.012202][ T1004] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 762.814791][ T1004] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 763.446083][ T1004] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 763.704346][ T1004] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 764.689585][ T30] audit: type=1400 audit(764.140:184): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 768.676077][ T1004] bond0 (unregistering): Released all slaves [ 769.494911][ T1004] hsr_slave_0: left promiscuous mode [ 769.559387][ T1004] hsr_slave_1: left promiscuous mode [ 770.044578][ T1004] veth1_macvtap: left promiscuous mode [ 770.047625][ T1004] veth0_macvtap: left promiscuous mode [ 770.060364][ T4800] netlink: 24 bytes leftover after parsing attributes in process `syz.2.517'. [ 770.127330][ T1004] veth1_vlan: left promiscuous mode [ 770.149540][ T1004] veth0_vlan: left promiscuous mode [ 771.785809][ T30] audit: type=1400 audit(771.240:185): avc: denied { create } for pid=4803 comm="syz.2.519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 774.419193][ T30] audit: type=1400 audit(773.870:186): avc: denied { create } for pid=4813 comm="syz.2.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 774.669286][ T30] audit: type=1400 audit(774.120:187): avc: denied { read write } for pid=4813 comm="syz.2.520" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 774.685009][ T30] audit: type=1400 audit(774.120:188): avc: denied { open } for pid=4813 comm="syz.2.520" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 775.175465][ T23] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 775.250217][ T23] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 777.421200][ T4817] fido_id[4817]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 778.842049][ T4823] netlink: 12 bytes leftover after parsing attributes in process `syz.0.524'. [ 782.132484][ T30] audit: type=1400 audit(781.560:189): avc: denied { create } for pid=4825 comm="syz.0.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 783.030313][ T30] audit: type=1400 audit(781.580:190): avc: denied { bind } for pid=4825 comm="syz.0.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 783.037689][ T30] audit: type=1400 audit(781.590:191): avc: denied { write } for pid=4825 comm="syz.0.526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 784.274568][ T30] audit: type=1400 audit(783.710:192): avc: denied { read write } for pid=4832 comm="syz.0.528" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 784.280481][ T30] audit: type=1400 audit(783.730:193): avc: denied { open } for pid=4832 comm="syz.0.528" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 786.304266][ T940] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 786.538064][ T940] usb 1-1: Using ep0 maxpacket: 8 [ 786.689774][ T940] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 786.694868][ T940] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 786.698819][ T940] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 786.701789][ T940] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 786.704062][ T940] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 786.707972][ T940] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 786.710054][ T940] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 787.189046][ T940] usb 1-1: GET_CAPABILITIES returned 0 [ 787.193400][ T940] usbtmc 1-1:16.0: can't read capabilities [ 787.676247][ T940] usb 1-1: USB disconnect, device number 2 [ 791.796042][ T30] audit: type=1400 audit(791.250:194): avc: denied { create } for pid=4844 comm="syz.0.532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 793.136227][ T30] audit: type=1400 audit(792.590:195): avc: denied { read } for pid=4850 comm="syz.0.534" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 793.142990][ T30] audit: type=1400 audit(792.590:196): avc: denied { open } for pid=4850 comm="syz.0.534" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 806.160810][ T30] audit: type=1400 audit(805.620:197): avc: denied { mounton } for pid=4890 comm="syz.2.545" path="/102/file0" dev="tmpfs" ino=537 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 806.171530][ T4891] fuse: Bad value for 'fd' [ 812.211123][ T4908] Zero length message leads to an empty skb [ 812.482980][ T4911] fuse: Bad value for 'fd' [ 821.954120][ T30] audit: type=1400 audit(821.410:198): avc: denied { create } for pid=4920 comm="syz.0.554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 821.991507][ T30] audit: type=1400 audit(821.450:199): avc: denied { ioctl } for pid=4920 comm="syz.0.554" path="socket:[9542]" dev="sockfs" ino=9542 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 822.001163][ T30] audit: type=1400 audit(821.450:200): avc: denied { connect } for pid=4920 comm="syz.0.554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 822.033740][ T30] audit: type=1400 audit(821.490:201): avc: denied { write } for pid=4920 comm="syz.0.554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 824.815711][ T4937] fuse: Bad value for 'fd' [ 825.792453][ T30] audit: type=1400 audit(825.250:202): avc: denied { read } for pid=4941 comm="syz.0.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 827.772298][ T30] audit: type=1400 audit(827.230:203): avc: denied { ioctl } for pid=4947 comm="syz.0.559" path="socket:[9560]" dev="sockfs" ino=9560 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 828.642013][ T4959] netlink: 8 bytes leftover after parsing attributes in process `syz.2.561'. [ 845.115012][ T30] audit: type=1400 audit(844.570:204): avc: denied { bind } for pid=5007 comm="syz.2.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 848.910964][ T5017] loop2: detected capacity change from 0 to 7 [ 857.308833][ T23] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 857.567666][ T23] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 857.569822][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 857.571571][ T23] usb 1-1: Product: syz [ 857.572660][ T23] usb 1-1: Manufacturer: syz [ 857.573753][ T23] usb 1-1: SerialNumber: syz [ 867.115713][ T23] usb 1-1: USB disconnect, device number 3 [ 882.041575][ T5069] loop7: detected capacity change from 0 to 7 [ 884.345592][ C0] invalid error, dev loop7, sector 0 op 0x1:(WRITE) flags 0x800 phys_seg 1 prio class 2 [ 884.347349][ C0] Buffer I/O error on dev loop7, logical block 0, lost async page write [ 896.066222][ T5084] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 896.131935][ T5084] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 900.985364][ T30] audit: type=1400 audit(900.350:205): avc: denied { setopt } for pid=5085 comm="syz.2.587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 900.987518][ T30] audit: type=1400 audit(900.390:206): avc: denied { write } for pid=5085 comm="syz.2.587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 900.988698][ T30] audit: type=1400 audit(900.410:207): avc: denied { read } for pid=5085 comm="syz.2.587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 920.253729][ T5111] ------------[ cut here ]------------ [ 920.254476][ T5111] verifier bug: not inlined functions bpf_perf_event_read#22 is missing func(1) [ 920.256359][ T5111] WARNING: CPU: 1 PID: 5111 at kernel/bpf/verifier.c:22838 do_misc_fixups+0xa938/0xcf04 [ 920.260063][ T5111] Modules linked in: [ 920.263366][ T5111] CPU: 1 UID: 0 PID: 5111 Comm: syz.0.595 Not tainted syzkaller #0 PREEMPT [ 920.264419][ T5111] Hardware name: linux,dummy-virt (DT) [ 920.265433][ T5111] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 920.266003][ T5111] pc : do_misc_fixups+0xa938/0xcf04 [ 920.266498][ T5111] lr : do_misc_fixups+0xa938/0xcf04 [ 920.266988][ T5111] sp : ffff8000a8037450 [ 920.267394][ T5111] x29: ffff8000a8037450 x28: ffff000021180000 x27: ffff000021186130 [ 920.268292][ T5111] x26: ffff000021186148 x25: ffff000021180000 x24: 0000000000000000 [ 920.271277][ T5111] x23: ffff000021186128 x22: 1ffff00011bfda13 x21: ffff80008dfed098 [ 920.271945][ T5111] x20: ffff800085584000 x19: ffff80008556d6a0 x18: ffff000021186168 [ 920.272589][ T5111] x17: 0000000000000000 x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 920.273226][ T5111] x14: 0000000000000000 x13: 0000000000008000 x12: ffff700015006e2d [ 920.273973][ T5111] x11: 1ffff00015006e2c x10: ffff700015006e2c x9 : dfff800000000000 [ 920.275009][ T5111] x8 : ffff8000a8037167 x7 : 0000000000000001 x6 : ffff700015006e2c [ 920.275694][ T5111] x5 : 1ffff00010e21c42 x4 : 1fffe000024d4001 x3 : dfff800000000000 [ 920.276363][ T5111] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000126a0000 [ 920.277374][ T5111] Call trace: [ 920.277979][ T5111] do_misc_fixups+0xa938/0xcf04 (P) [ 920.278619][ T5111] bpf_check+0x3c84/0x9508 [ 920.279019][ T5111] bpf_prog_load+0xe2c/0x1b74 [ 920.279385][ T5111] __sys_bpf+0x9c4/0x29c8 [ 920.279754][ T5111] __arm64_sys_bpf+0x70/0xa4 [ 920.280120][ T5111] invoke_syscall+0x6c/0x258 [ 920.280474][ T5111] el0_svc_common.constprop.0+0xac/0x230 [ 920.280868][ T5111] do_el0_svc+0x40/0x58 [ 920.281240][ T5111] el0_svc+0x50/0x1a0 [ 920.281603][ T5111] el0t_64_sync_handler+0xa0/0xe4 [ 920.281968][ T5111] el0t_64_sync+0x198/0x19c [ 920.282640][ T5111] irq event stamp: 366 [ 920.282982][ T5111] hardirqs last enabled at (365): [] exit_to_kernel_mode+0x38/0x118 [ 920.283999][ T5111] hardirqs last disabled at (366): [] el1_brk64+0x1c/0x48 [ 920.284605][ T5111] softirqs last enabled at (302): [] handle_softirqs+0x88c/0xdb4 [ 920.285163][ T5111] softirqs last disabled at (275): [] __do_softirq+0x14/0x20 [ 920.285861][ T5111] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 922.429572][ T1004] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 922.752626][ T1004] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 923.048334][ T1004] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 923.333559][ T1004] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 926.620494][ T1004] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 926.698839][ T1004] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 926.784621][ T1004] bond0 (unregistering): Released all slaves [ 927.186128][ T1004] hsr_slave_0: left promiscuous mode [ 927.223350][ T1004] hsr_slave_1: left promiscuous mode [ 927.385320][ T1004] veth1_macvtap: left promiscuous mode [ 927.387704][ T1004] veth0_macvtap: left promiscuous mode [ 927.389419][ T1004] veth1_vlan: left promiscuous mode [ 927.390507][ T1004] veth0_vlan: left promiscuous mode [ 933.981903][ T1004] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 934.329048][ T1004] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 934.561490][ T1004] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 934.874115][ T1004] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 938.523027][ T1004] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 938.611540][ T1004] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 938.664758][ T1004] bond0 (unregistering): Released all slaves [ 939.019627][ T1004] hsr_slave_0: left promiscuous mode [ 939.028790][ T1004] hsr_slave_1: left promiscuous mode [ 939.139478][ T1004] veth1_macvtap: left promiscuous mode [ 939.142284][ T1004] veth0_macvtap: left promiscuous mode [ 939.145567][ T1004] veth1_vlan: left promiscuous mode [ 939.149914][ T1004] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 16:45:43 Registers: info registers vcpu 0 CPU#0 PC=ffff8000844e0a40 X00=ffff000025203100 X01=0000000000000003 X02=0000000000000000 X03=1fffe0000262fbd8 X04=ffff700011a90271 X05=ffff80008d481384 X06=ffff700011a90270 X07=0000000000000001 X08=ffff80008d481387 X09=dfff800000000000 X10=ffff700011a90270 X11=1ffff00011a90270 X12=ffff700011a90271 X13=0000000000000000 X14=1fffe00003bf7c65 X15=ffff00000ecc0a00 X16=0000000000000000 X17=1fffe00003bf7b78 X18=ffff00000ecc0a10 X19=ffff00001dfbd940 X20=ffff000025203100 X21=0000000000000000 X22=1fffe00003bf7b9b X23=ffff00001dfbdcd8 X24=ffff8000889e5080 X25=1fffe00003da5d9b X26=1fffe00003bf7bd7 X27=ffff00001dfbd940 X28=ffff00001dfbdeb8 X29=ffff8000800069b0 X30=ffff8000844e0a40 SP=ffff8000800069b0 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=000000756c6c2570:6f6f6c2f7665642f Q02=65646e69620a0020:0000000000000005 Q03=ffffff000000ff00:0000000000000000 Q04=0000000000000000:fff000f000000000 Q05=bb448243222c92da:e3914ed4e87380b0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff1f01cf0:0000fffff1f01cf0 Q17=ffffff80ffffffd0:0000fffff1f01cc0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008034fce8 X00=00000000000003c0 X01=00000000ffffe47c X02=0000000000000000 X03=ffff80008034fc90 X04=ffff700015006d75 X05=ffff8000a8036ba0 X06=ffff700015006d74 X07=0000000000000001 X08=ffff8000a8036ba7 X09=dfff800000000000 X10=ffff700015006d74 X11=1ffff00015006d74 X12=ffff700015006d75 X13=00000000ffffffff X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=ffff000021186168 X19=1ffff00015006da5 X20=ffff8000a8036d20 X21=ffff8000a8036d28 X22=ffff800087220e60 X23=1ffff00015006d70 X24=ffff8000a8036ba0 X25=00000000ffffe47c X26=000000000000000d X27=00000000ffffe47c X28=1fffe0000d415ab5 X29=ffff8000a8036b20 X30=ffff80008034fc90 SP=ffff8000a8036b20 PSTATE=600003c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=000000756c6c2570:6f6f6c2f7665642f Q02=0000000000000000:ffffffff00000000 Q03=ffffff000000ff00:0000000000000000 Q04=0000000000000000:fff000f000000000 Q05=bb448243222c92da:e3914ed4e87380b0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffcc10bbf0:0000ffffcc10bbf0 Q17=ffffff80ffffffd0:0000ffffcc10bbc0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000