last executing test programs: 14.720082468s ago: executing program 1 (id=247): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0xe, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x7ff}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0xc, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0, 0xaa9a}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000000}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x26}}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 13.691003745s ago: executing program 1 (id=248): r0 = fsopen(&(0x7f0000000500)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000000c0)='.\x00', 0x8000, 0x50) getdents(r2, 0x0, 0x0) 13.160422324s ago: executing program 0 (id=249): openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f0000000000), 0x1000000, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r1 = open_tree(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) fstat(r1, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) close_range(r2, 0xffffffffffffffff, 0x0) 13.006376823s ago: executing program 1 (id=250): timer_create(0x9, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) timer_gettime(r0, &(0x7f0000000000)) 10.164944799s ago: executing program 0 (id=251): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x2, 0x0, @loopback, 0x7}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0x398, @empty}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0), 0x4) 9.056164511s ago: executing program 0 (id=252): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4084) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000040)="2e00000010008188e6b62aa73772cc9f1ba1f848430000005e140602000000000e000a00100000000280", 0x2a}, {&(0x7f0000000400)="03000000", 0x4}], 0x2}, 0x40) 8.801209175s ago: executing program 0 (id=253): r0 = syz_clone(0xa8200780, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r1) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000004, 0x3b071, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4004004) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x800000, 0x0) syz_open_procfs(r0, &(0x7f0000000040)='smaps_rollup\x00') 8.279967433s ago: executing program 1 (id=254): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000002040), r0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000002080)={0x34, r1, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x4]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}]}, 0x34}, 0x1, 0x4000000000000000, 0x0, 0x882}, 0x0) 7.690444416s ago: executing program 1 (id=255): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffe}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) unshare(0x8000000) semget$private(0x0, 0x4000, 0x0) setitimer(0x0, 0x0, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000740)) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, 0x0, 0x1, 0x101, 0x0, 0x0, {0x7}}, 0x14}, 0x1, 0x0, 0x0, 0x24000000}, 0x4004000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000003c0)={0x1, {{0xa, 0x4e23, 0x8caa, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}}}, 0x84) syz_open_dev$tty20(0xc, 0x4, 0x1) 5.922081213s ago: executing program 0 (id=256): openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f0000000000), 0x1000000, &(0x7f0000000380)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) r1 = open_tree(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0) fstat(r1, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) close_range(r2, 0xffffffffffffffff, 0x0) 3.325396587s ago: executing program 0 (id=257): r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x1a5}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) r1 = socket$xdp(0x2c, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x218, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000000000)=""/59, 0x312000, 0x800, 0x0, 0x5}, 0x20) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, 0x3000}) 0s ago: executing program 1 (id=258): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x4fa7, 0x105, 0x2, 0x10000421, 0x2000001, 0xcc7, 0x7ffffffe, 0x6, 0x6, 0x3ff, 0x2, 0x300, 0x1, 0x3, 0x9, 0x0, 0x40400, 0x8, 0x48f3, 0x80000000, 0x80000089, 0xa, 0x1400000, 0x20001e52, 0xffffeadb, 0x3, 0x3d, 0x8, 0x4, 0xfffffffa, 0x485b]}) kernel console output (not intermixed with test programs): [ 46.304887][ T28] audit: type=1400 audit(46.240:56): avc: denied { read write } for pid=3080 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.307542][ T28] audit: type=1400 audit(46.240:57): avc: denied { open } for pid=3080 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:12702' (ED25519) to the list of known hosts. [ 61.231264][ T28] audit: type=1400 audit(61.170:58): avc: denied { name_bind } for pid=3083 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 62.732989][ T28] audit: type=1400 audit(62.650:59): avc: denied { execute } for pid=3084 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.747809][ T28] audit: type=1400 audit(62.690:60): avc: denied { execute_no_trans } for pid=3084 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.248383][ T28] audit: type=1400 audit(66.190:61): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.251492][ T28] audit: type=1400 audit(66.190:62): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.261201][ T3084] cgroup: Unknown subsys name 'net' [ 66.265712][ T28] audit: type=1400 audit(66.200:63): avc: denied { unmount } for pid=3084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.438068][ T3084] cgroup: Unknown subsys name 'cpuset' [ 66.443106][ T3084] cgroup: Unknown subsys name 'hugetlb' [ 66.445786][ T3084] cgroup: Unknown subsys name 'rlimit' [ 66.642155][ T28] audit: type=1400 audit(66.580:64): avc: denied { setattr } for pid=3084 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.647581][ T28] audit: type=1400 audit(66.580:65): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.651684][ T28] audit: type=1400 audit(66.580:66): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.841563][ T3086] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 66.842950][ T28] audit: type=1400 audit(66.780:67): avc: denied { relabelto } for pid=3086 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.857316][ T28] audit: type=1400 audit(66.790:68): avc: denied { write } for pid=3086 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.880717][ T28] audit: type=1400 audit(66.820:69): avc: denied { read } for pid=3084 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 66.882430][ T28] audit: type=1400 audit(66.820:70): avc: denied { open } for pid=3084 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.487978][ T3084] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 75.315364][ T28] audit: type=1400 audit(75.250:71): avc: denied { execmem } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 75.381243][ T28] audit: type=1400 audit(75.320:72): avc: denied { read } for pid=3089 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.383310][ T28] audit: type=1400 audit(75.320:73): avc: denied { open } for pid=3089 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.392771][ T28] audit: type=1400 audit(75.330:74): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 75.420150][ T28] audit: type=1400 audit(75.360:76): avc: denied { module_request } for pid=3089 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.420450][ T28] audit: type=1400 audit(75.360:75): avc: denied { module_request } for pid=3090 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.504076][ T28] audit: type=1400 audit(75.440:77): avc: denied { sys_module } for pid=3089 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 76.084708][ T28] audit: type=1400 audit(76.020:78): avc: denied { ioctl } for pid=3090 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.833348][ T3089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.839049][ T3089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.876494][ T3090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.881934][ T3090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.506147][ T3090] hsr_slave_0: entered promiscuous mode [ 77.511248][ T3090] hsr_slave_1: entered promiscuous mode [ 77.576130][ T3089] hsr_slave_0: entered promiscuous mode [ 77.590148][ T3089] hsr_slave_1: entered promiscuous mode [ 77.591537][ T3089] debugfs: 'hsr0' already exists in 'hsr' [ 77.592065][ T3089] Cannot create hsr debugfs directory [ 78.016286][ T28] audit: type=1400 audit(77.950:79): avc: denied { create } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.023676][ T28] audit: type=1400 audit(77.950:80): avc: denied { write } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.039872][ T3090] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.061779][ T3090] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.070342][ T3090] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.084401][ T3090] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 78.146406][ T3089] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 78.164515][ T3089] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.179271][ T3089] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.189366][ T3089] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.912456][ T3090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.990454][ T3089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.553008][ T3090] veth0_vlan: entered promiscuous mode [ 81.572992][ T3090] veth1_vlan: entered promiscuous mode [ 81.638607][ T3090] veth0_macvtap: entered promiscuous mode [ 81.649594][ T3090] veth1_macvtap: entered promiscuous mode [ 81.690021][ T3089] veth0_vlan: entered promiscuous mode [ 81.715349][ T3089] veth1_vlan: entered promiscuous mode [ 81.754073][ T1249] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.754673][ T1249] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.754767][ T1249] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.754828][ T1249] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.807558][ T3089] veth0_macvtap: entered promiscuous mode [ 81.816298][ T3089] veth1_macvtap: entered promiscuous mode [ 81.902937][ T1356] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.903699][ T1356] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.903940][ T1356] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.904406][ T1356] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.937491][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 81.937751][ T28] audit: type=1400 audit(81.860:82): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 81.938016][ T28] audit: type=1400 audit(81.860:83): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzkaller.089wm5/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 81.938177][ T28] audit: type=1400 audit(81.870:84): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 81.963454][ T28] audit: type=1400 audit(81.900:85): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzkaller.089wm5/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 81.974796][ T28] audit: type=1400 audit(81.910:86): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzkaller.089wm5/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 82.001796][ T28] audit: type=1400 audit(81.930:87): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 82.012733][ T28] audit: type=1400 audit(81.940:88): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 82.018319][ T28] audit: type=1400 audit(81.950:89): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="gadgetfs" ino=2616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 82.028227][ T28] audit: type=1400 audit(81.960:90): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 82.028428][ T28] audit: type=1400 audit(81.970:91): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 82.110241][ T3089] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 82.110243][ T3090] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 82.805225][ T3698] could not allocate digest TFM handle sha3-224-ce [ 82.913206][ T3703] syz.0.3 uses obsolete (PF_INET,SOCK_PACKET) [ 84.948052][ C1] vcan0: j1939_tp_rxtimer: 0x861be500: rx timeout, send abort [ 85.448860][ C1] vcan0: j1939_tp_rxtimer: 0x861be500: abort rx timeout. Force session deactivation [ 87.362545][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 87.363258][ T28] audit: type=1400 audit(87.290:122): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 89.834710][ T3744] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 89.851052][ T28] audit: type=1400 audit(89.790:123): avc: denied { connect } for pid=3743 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 91.424060][ T3751] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 91.429600][ T28] audit: type=1400 audit(91.370:124): avc: denied { getopt } for pid=3750 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 93.679880][ T28] audit: type=1400 audit(93.610:125): avc: denied { allowed } for pid=3765 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 93.683728][ T28] audit: type=1400 audit(93.620:126): avc: denied { create } for pid=3765 comm="syz.1.25" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 93.690354][ T28] audit: type=1400 audit(93.630:127): avc: denied { map } for pid=3765 comm="syz.1.25" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2734 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 93.690729][ T28] audit: type=1400 audit(93.630:128): avc: denied { read write } for pid=3765 comm="syz.1.25" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2734 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 96.695171][ T28] audit: type=1400 audit(96.630:129): avc: denied { prog_load } for pid=3779 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 96.695641][ T28] audit: type=1400 audit(96.630:130): avc: denied { bpf } for pid=3779 comm="syz.1.30" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 96.791987][ T28] audit: type=1400 audit(96.730:131): avc: denied { ioctl } for pid=3779 comm="syz.1.30" path="socket:[926]" dev="sockfs" ino=926 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 102.317479][ T28] audit: type=1400 audit(102.250:132): avc: denied { write } for pid=3799 comm="syz.1.36" name="mcfilter" dev="proc" ino=4026532700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 123.053218][ T28] audit: type=1400 audit(122.990:133): avc: denied { write } for pid=3876 comm="syz.1.63" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 123.057191][ T28] audit: type=1400 audit(122.990:134): avc: denied { open } for pid=3876 comm="syz.1.63" path="/23/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 123.071180][ T28] audit: type=1400 audit(123.010:135): avc: denied { ioctl } for pid=3876 comm="syz.1.63" path="/23/file0/file0" dev="fuse" ino=64 ioctlcmd=0x4d12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 124.863053][ T3896] fuse: Bad value for 'fd' [ 126.303632][ T3910] fuse: Bad value for 'fd' [ 128.379912][ T3925] fuse: Bad value for 'fd' [ 131.117354][ T28] audit: type=1400 audit(131.050:136): avc: denied { create } for pid=3940 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 139.987201][ T28] audit: type=1400 audit(139.920:137): avc: denied { create } for pid=3964 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 140.158492][ T28] audit: type=1400 audit(140.060:138): avc: denied { bind } for pid=3964 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 140.175881][ T28] audit: type=1400 audit(140.060:139): avc: denied { listen } for pid=3964 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 140.177425][ T28] audit: type=1400 audit(140.060:140): avc: denied { accept } for pid=3964 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 140.711321][ T28] audit: type=1400 audit(140.650:141): avc: denied { connect } for pid=3964 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 148.437274][ T10] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 148.588198][ T10] usb 2-1: Using ep0 maxpacket: 32 [ 148.610823][ T10] usb 2-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 148.642710][ T10] usb 2-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 148.643321][ T10] usb 2-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 148.645090][ T10] usb 2-1: Product: syz [ 148.646028][ T10] usb 2-1: Manufacturer: syz [ 148.647357][ T10] usb 2-1: SerialNumber: syz [ 148.759157][ T10] usb 2-1: config 0 descriptor?? [ 148.763428][ T3983] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 149.045366][ T23] usb 2-1: USB disconnect, device number 2 [ 149.968862][ C1] hrtimer: interrupt took 4880720 ns [ 154.207142][ T2871] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 154.424537][ T2871] usb 1-1: New USB device found, idVendor=0ccd, idProduct=00b3, bcdDevice=2d.ea [ 154.425745][ T2871] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 154.428843][ T2871] usb 1-1: Product: syz [ 154.430887][ T2871] usb 1-1: Manufacturer: syz [ 154.432614][ T2871] usb 1-1: SerialNumber: syz [ 154.460005][ T2871] usb 1-1: config 0 descriptor?? [ 162.572568][ T28] audit: type=1400 audit(162.510:142): avc: denied { create } for pid=4044 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 162.576554][ T28] audit: type=1400 audit(162.510:143): avc: denied { setopt } for pid=4044 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 162.639416][ T4047] fuse: Bad value for 'fd' [ 162.899109][ T28] audit: type=1400 audit(162.840:144): avc: denied { nlmsg_read } for pid=4048 comm="syz.1.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 164.677744][ T90] usb 1-1: USB disconnect, device number 2 [ 167.065589][ T4068] fuse: Bad value for 'fd' [ 171.678972][ T4082] fuse: Bad value for 'fd' [ 171.789501][ T4084] netlink: 252 bytes leftover after parsing attributes in process `syz.1.130'. [ 177.588426][ T28] audit: type=1400 audit(177.400:145): avc: denied { execute } for pid=4090 comm="syz.1.132" name="file0" dev="tmpfs" ino=409 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 177.588758][ T28] audit: type=1400 audit(177.400:146): avc: denied { execute_no_trans } for pid=4090 comm="syz.1.132" path="/74/file0" dev="tmpfs" ino=409 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 184.841358][ T28] audit: type=1400 audit(184.780:147): avc: denied { create } for pid=4105 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 184.860603][ T28] audit: type=1400 audit(184.800:148): avc: denied { write } for pid=4105 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 184.868384][ T4106] netlink: 12 bytes leftover after parsing attributes in process `syz.0.137'. [ 187.394463][ T28] audit: type=1400 audit(187.320:149): avc: denied { perfmon } for pid=4111 comm="syz.1.140" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 187.449904][ T28] audit: type=1400 audit(187.380:150): avc: denied { prog_run } for pid=4111 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 188.025931][ T28] audit: type=1400 audit(187.960:151): avc: denied { write } for pid=4113 comm="syz.0.142" path="socket:[3409]" dev="sockfs" ino=3409 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 189.115762][ T28] audit: type=1400 audit(189.050:152): avc: denied { bind } for pid=4121 comm="syz.1.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 189.997172][ T28] audit: type=1400 audit(189.930:153): avc: denied { map_read map_write } for pid=4129 comm="syz.1.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 190.277278][ T44] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 190.453800][ T44] usb 2-1: unable to get BOS descriptor or descriptor too short [ 190.462826][ T44] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 37, changing to 7 [ 190.463306][ T44] usb 2-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 116, changing to 7 [ 190.482422][ T44] usb 2-1: New USB device found, idVendor=0d8c, idProduct=0103, bcdDevice= 0.40 [ 190.482670][ T44] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 190.482888][ T44] usb 2-1: Product: syz [ 190.482929][ T44] usb 2-1: Manufacturer: syz [ 190.482952][ T44] usb 2-1: SerialNumber: syz [ 192.587421][ T9] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 192.745621][ T9] usb 1-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 192.745948][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 192.779433][ T9] usb 1-1: config 0 descriptor?? [ 192.786522][ T9] cp210x 1-1:0.0: cp210x converter detected [ 193.359194][ T9] cp210x 1-1:0.0: failed to get vendor val 0x000e size 3: -32 [ 193.807517][ T9] usb 1-1: cp210x converter now attached to ttyUSB0 [ 194.001687][ T3935] usb 1-1: USB disconnect, device number 3 [ 194.010276][ T3935] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 194.035078][ T3935] cp210x 1-1:0.0: device disconnected [ 195.524239][ T44] usb 2-1: Can't get UAC3 power state for id 10 [ 195.541296][ T44] usb 2-1: 2:0: failed to get current value for ch 0 (-32) [ 195.565749][ T44] usb 2-1: 2:0: cannot get min/max values for control 2 (id 2) [ 197.159679][ T28] audit: type=1400 audit(197.080:154): avc: denied { name_bind } for pid=4129 comm="syz.1.147" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 205.998964][ T3049] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 206.217337][ T3049] usb 1-1: Using ep0 maxpacket: 8 [ 206.232793][ T3049] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8D has an invalid bInterval 42, changing to 9 [ 206.234446][ T3049] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 206.235599][ T3049] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 206.236928][ T3049] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8B has invalid maxpacket 30768, setting to 1024 [ 206.238299][ T3049] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 1024 [ 206.243606][ T3049] usb 1-1: New USB device found, idVendor=05ac, idProduct=8215, bcdDevice=8f.58 [ 206.248972][ T3049] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 206.254444][ T3049] usb 1-1: config 0 descriptor?? [ 206.270810][ T4184] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 206.718486][ T28] audit: type=1400 audit(206.660:155): avc: denied { create } for pid=4183 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 206.754161][ T44] usb 1-1: USB disconnect, device number 4 [ 210.854294][ T28] audit: type=1400 audit(210.790:156): avc: denied { getopt } for pid=4199 comm="syz.0.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 211.181171][ T44] usb 2-1: USB disconnect, device number 3 [ 216.241491][ T4232] syzkaller0: entered promiscuous mode [ 216.249770][ T4232] syzkaller0: entered allmulticast mode [ 217.111903][ T28] audit: type=1400 audit(217.050:157): avc: denied { mounton } for pid=4240 comm="syz.1.161" path="/proc/203/task" dev="proc" ino=4356 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 220.988237][ T4247] netlink: 28 bytes leftover after parsing attributes in process `syz.1.164'. [ 220.988818][ T4247] netlink: 28 bytes leftover after parsing attributes in process `syz.1.164'. [ 221.007926][ T4247] Zero length message leads to an empty skb [ 222.084588][ T28] audit: type=1400 audit(222.020:158): avc: denied { create } for pid=4250 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 228.451872][ T4259] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 228.451872][ T4259] The task syz.1.169 (4259) triggered the difference, watch for misbehavior. [ 230.921217][ T4263] Illegal XDP return value 4294967274 on prog (id 2) dev syz_tun, expect packet loss! [ 233.549616][ T28] audit: type=1400 audit(233.490:159): avc: denied { ioctl } for pid=4266 comm="syz.0.173" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4422 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 233.663259][ T4269] netlink: 4 bytes leftover after parsing attributes in process `syz.1.174'. [ 234.139388][ T28] audit: type=1400 audit(234.080:160): avc: denied { create } for pid=4280 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 234.331701][ T28] audit: type=1400 audit(234.270:161): avc: denied { write } for pid=4283 comm="syz.0.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 263.839147][ T4338] netlink: 12 bytes leftover after parsing attributes in process `syz.1.195'. [ 271.303399][ T28] audit: type=1400 audit(271.240:162): avc: denied { sqpoll } for pid=4352 comm="syz.0.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 274.247258][ T28] audit: type=1400 audit(274.180:163): avc: denied { write } for pid=4370 comm="syz.1.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 274.248391][ T28] audit: type=1400 audit(274.180:164): avc: denied { nlmsg_write } for pid=4370 comm="syz.1.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 274.670711][ T4375] ptrace attach of "/syz-executor exec"[3089] was attempted by ""[4375] [ 275.130399][ T4378] random: crng reseeded on system resumption [ 275.955342][ T4385] tmpfs: Unsupported parameter 'huge' [ 276.490137][ T28] audit: type=1400 audit(276.430:165): avc: denied { create } for pid=4387 comm="syz.0.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 281.943438][ T28] audit: type=1400 audit(281.880:166): avc: denied { mounton } for pid=4413 comm="syz.0.222" path="/89/file0" dev="tmpfs" ino=488 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 285.317384][ T10] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 285.467284][ T10] usb 2-1: Using ep0 maxpacket: 32 [ 285.484740][ T10] usb 2-1: config 0 has an invalid interface number: 132 but max is 0 [ 285.486170][ T10] usb 2-1: config 0 has no interface number 0 [ 285.487748][ T10] usb 2-1: config 0 interface 132 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 285.509039][ T10] usb 2-1: New USB device found, idVendor=0413, idProduct=6023, bcdDevice=ec.e5 [ 285.510132][ T10] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 285.511198][ T10] usb 2-1: Product: syz [ 285.511834][ T10] usb 2-1: Manufacturer: syz [ 285.512485][ T10] usb 2-1: SerialNumber: syz [ 285.540325][ T10] usb 2-1: config 0 descriptor?? [ 295.792041][ T2871] usb 2-1: USB disconnect, device number 4 [ 296.207844][ T2871] usb 2-1: new full-speed USB device number 5 using dummy_hcd [ 296.370654][ T2871] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 296.371248][ T2871] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 296.387470][ T2871] usb 2-1: New USB device found, idVendor=060b, idProduct=700a, bcdDevice= 0.00 [ 296.387938][ T2871] usb 2-1: New USB device strings: Mfr=2, Product=0, SerialNumber=0 [ 296.388086][ T2871] usb 2-1: Manufacturer: syz [ 296.395992][ T2871] usb 2-1: config 0 descriptor?? [ 297.181470][ T2871] cougar 0003:060B:700A.0001: item fetching failed at offset 0/5 [ 297.182139][ T2871] cougar 0003:060B:700A.0001: parse failed [ 297.183596][ T2871] cougar 0003:060B:700A.0001: probe with driver cougar failed with error -22 [ 297.227286][ T3695] usb 2-1: USB disconnect, device number 5 [ 297.335032][ T4471] ======================================================= [ 297.335032][ T4471] WARNING: The mand mount option has been deprecated and [ 297.335032][ T4471] and is ignored by this kernel. Remove the mand [ 297.335032][ T4471] option from the mount to silence this warning. [ 297.335032][ T4471] ======================================================= [ 301.518358][ T28] audit: type=1400 audit(301.460:167): avc: denied { create } for pid=4480 comm="syz.1.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 301.525486][ T28] audit: type=1400 audit(301.460:168): avc: denied { bind } for pid=4480 comm="syz.1.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 301.539496][ T28] audit: type=1400 audit(301.480:169): avc: denied { create } for pid=4480 comm="syz.1.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 301.545123][ T28] audit: type=1400 audit(301.480:170): avc: denied { bind } for pid=4480 comm="syz.1.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 301.680967][ T28] audit: type=1400 audit(301.620:171): avc: denied { create } for pid=4482 comm="syz.1.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 305.489655][ T28] audit: type=1400 audit(305.430:172): avc: denied { connect } for pid=4512 comm="syz.1.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 305.579853][ T28] audit: type=1400 audit(305.520:173): avc: denied { read } for pid=4512 comm="syz.1.245" path="socket:[3849]" dev="sockfs" ino=3849 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 305.657591][ T23] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 306.018481][ T23] usb 1-1: Using ep0 maxpacket: 32 [ 306.177022][ T23] usb 1-1: config 4 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 306.177344][ T23] usb 1-1: config 4 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 306.240601][ T23] usb 1-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 306.241418][ T23] usb 1-1: New USB device strings: Mfr=255, Product=255, SerialNumber=0 [ 306.241473][ T23] usb 1-1: Product: syz [ 306.241500][ T23] usb 1-1: Manufacturer: syz [ 306.314442][ T23] hub 1-1:4.0: USB hub found [ 306.506325][ T23] hub 1-1:4.0: 2 ports detected [ 307.158140][ T23] usb 1-1: USB disconnect, device number 5 [ 307.180028][ T28] audit: type=1400 audit(307.120:174): avc: denied { mount } for pid=4523 comm="syz.1.248" name="/" dev="ramfs" ino=4711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 307.622416][ T28] audit: type=1400 audit(307.560:175): avc: denied { wake_alarm } for pid=4536 comm="syz.1.250" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 311.278287][ T28] audit: type=1400 audit(311.220:176): avc: denied { name_bind } for pid=4541 comm="syz.0.251" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 311.495989][ T28] audit: type=1400 audit(311.430:177): avc: denied { setopt } for pid=4543 comm="syz.0.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 311.507410][ T4544] netlink: 'syz.0.252': attribute type 10 has an invalid length. [ 313.798130][ T4554] syz.1.255 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 320.420113][ T28] audit: type=1400 audit(320.360:178): avc: denied { append } for pid=4566 comm="syz.1.258" name="comedi3" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 320.435288][ T4567] 8<--- cut here --- [ 320.435663][ T4567] Unable to handle kernel paging request at virtual address fee04fa7 when write SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 320.513956][ T4567] [fee04fa7] *pgd=80000080007003, *pmd=00000000 [ 320.516505][ T4567] Internal error: Oops: a06 [#1] SMP ARM [ 320.518124][ T4567] Modules linked in: [ 320.519245][ T4567] CPU: 1 UID: 0 PID: 4567 Comm: syz.1.258 Not tainted syzkaller #0 PREEMPT [ 320.519903][ T4567] Hardware name: ARM-Versatile Express [ 320.520313][ T4567] PC is at parport_attach+0x174/0x1d0 [ 320.521440][ T4567] LR is at parport_attach+0x164/0x1d0 [ 320.521666][ T4567] pc : [<81434054>] lr : [<81434044>] psr: 60000013 [ 320.521947][ T4567] sp : dfaf5d30 ip : dfaf5d30 fp : dfaf5d54 [ 320.522152][ T4567] r10: 82b2f06c r9 : 00000003 r8 : 8462acc0 [ 320.522362][ T4567] r7 : dfaf5d90 r6 : 8462acc0 r5 : 00000000 r4 : 00000000 [ 320.522609][ T4567] r3 : fee04fa7 r2 : 81e24af8 r1 : 00000001 r0 : 81433cc4 [ 320.522922][ T4567] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 320.523223][ T4567] Control: 30c5387d Table: 851c9600 DAC: 00000000 [ 320.523490][ T4567] Register r0 information: non-slab/vmalloc memory [ 320.524242][ T4567] Register r1 information: non-paged memory [ 320.524498][ T4567] Register r2 information: non-slab/vmalloc memory [ 320.524725][ T4567] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 320.525168][ T4567] Register r4 information: NULL pointer [ 320.525595][ T4567] Register r5 information: NULL pointer [ 320.525996][ T4567] Register r6 information: slab kmalloc-192 start 8462acc0 pointer offset 0 size 192 [ 320.527745][ T4567] Register r7 information: 2-page vmalloc region starting at 0xdfaf4000 allocated at kernel_clone+0xac/0x42c [ 320.528238][ T4567] Register r8 information: slab kmalloc-192 start 8462acc0 pointer offset 0 size 192 [ 320.528662][ T4567] Register r9 information: non-paged memory [ 320.528898][ T4567] Register r10 information: non-slab/vmalloc memory [ 320.529172][ T4567] Register r11 information: 2-page vmalloc region starting at 0xdfaf4000 allocated at kernel_clone+0xac/0x42c [ 320.529577][ T4567] Register r12 information: 2-page vmalloc region starting at 0xdfaf4000 allocated at kernel_clone+0xac/0x42c [ 320.530050][ T4567] Process syz.1.258 (pid: 4567, stack limit = 0xdfaf4000) [ 320.530408][ T4567] Stack: (0xdfaf5d30 to 0xdfaf6000) [ 320.530774][ T4567] 5d20: 82444c00 8462acc0 829d6740 829d6740 [ 320.531108][ T4567] 5d40: 81e24fb8 00000000 dfaf5d8c dfaf5d58 8142fbcc 81433eec 40946400 00000000 [ 320.531585][ T4567] 5d60: dfaf5d7c 200000c0 8462acc0 b5403587 40946400 00000003 00000003 840a8c40 [ 320.531934][ T4567] 5d80: dfaf5e4c dfaf5d90 8142b3d8 8142facc 656d6f63 705f6964 6f707261 00007472 [ 320.532251][ T4567] 5da0: 00000000 00004fa7 00000105 00000002 10000421 02000001 00000cc7 7ffffffe [ 320.532545][ T4567] 5dc0: 00000006 00000006 000003ff 00000002 00000300 00000001 00000003 00000009 [ 320.532841][ T4567] 5de0: 00000000 00040400 00000008 000048f3 80000000 80000089 0000000a 01400000 [ 320.533142][ T4567] 5e00: 20001e52 ffffeadb 00000003 0000003d 00000008 00000004 fffffffa 0000485b [ 320.533465][ T4567] 5e20: 00000000 6a381a3d 00000000 838d0cc0 8462acc0 200000c0 40946400 00000003 [ 320.533759][ T4567] 5e40: dfaf5f14 dfaf5e50 8142c6fc 8142b310 00000000 6a381a3d 00000000 00000000 [ 320.534073][ T4567] 5e60: 824b957c dfaf5ea4 0000005f 84781018 00000064 8462acf0 dfaf5ee4 dfaf5e88 [ 320.534373][ T4567] 5e80: 807cf448 807c5820 00000064 00000001 00000000 dfaf5ea4 830e1850 834ec000 [ 320.534668][ T4567] 5ea0: 00006400 0000000b dfaf5e98 00000000 00000000 6a381a3d 00000000 838d0cc0 [ 320.534958][ T4567] 5ec0: 40946400 200000c0 200000c0 838d0cc0 00000003 840a8c40 dfaf5ef4 dfaf5ee8 [ 320.535288][ T4567] 5ee0: 807cf578 6a381a3d dfaf5f14 00000000 838d0cc1 40946400 200000c0 838d0cc0 [ 320.536018][ T4567] 5f00: 00000003 840a8c40 dfaf5fa4 dfaf5f18 805908e4 8142c3b4 ecac8b10 840a8c40 [ 320.536336][ T4567] 5f20: dfaf5f3c dfaf5f30 81ae5274 81ae5140 dfaf5f54 dfaf5f40 8025a87c 8028c380 [ 320.536729][ T4567] 5f40: dfaf5fb0 40000000 dfaf5f84 dfaf5f58 80220bf8 8025a838 00000000 8281d2fc [ 320.537189][ T4567] 5f60: dfaf5fb0 0013e480 ecac8b10 80220b4c 00000000 6a381a3d dfaf5fac 00000000 [ 320.537569][ T4567] 5f80: 00000000 00346310 00000036 8020029c 840a8c40 00000036 00000000 dfaf5fa8 [ 320.537858][ T4567] 5fa0: 80200060 805906ac 00000000 00000000 00000003 40946400 200000c0 00000000 [ 320.538200][ T4567] 5fc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76f690dc [ 320.538589][ T4567] 5fe0: 76f68e88 76f68e78 00018ba0 001302e0 60000010 00000003 00000000 00000000 [ 320.538981][ T4567] Call trace: [ 320.539444][ T4567] [<81433ee0>] (parport_attach) from [<8142fbcc>] (comedi_device_attach+0x10c/0x248) [ 320.540187][ T4567] r6:00000000 r5:81e24fb8 r4:829d6740 [ 320.540520][ T4567] [<8142fac0>] (comedi_device_attach) from [<8142b3d8>] (do_devconfig_ioctl+0xd4/0x21c) [ 320.540972][ T4567] r10:840a8c40 r9:00000003 r8:00000003 r7:40946400 r6:b5403587 r5:8462acc0 [ 320.541367][ T4567] r4:200000c0 [ 320.541530][ T4567] [<8142b304>] (do_devconfig_ioctl) from [<8142c6fc>] (comedi_unlocked_ioctl+0x354/0x1dbc) [ 320.541957][ T4567] r8:00000003 r7:40946400 r6:200000c0 r5:8462acc0 r4:838d0cc0 [ 320.542212][ T4567] [<8142c3a8>] (comedi_unlocked_ioctl) from [<805908e4>] (sys_ioctl+0x244/0xb5c) [ 320.542630][ T4567] r10:840a8c40 r9:00000003 r8:838d0cc0 r7:200000c0 r6:40946400 r5:838d0cc1 [ 320.543003][ T4567] r4:00000000 [ 320.543194][ T4567] [<805906a0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 320.543592][ T4567] Exception stack(0xdfaf5fa8 to 0xdfaf5ff0) [ 320.543865][ T4567] 5fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 320.544243][ T4567] 5fc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76f690dc [ 320.544658][ T4567] 5fe0: 76f68e88 76f68e78 00018ba0 001302e0 [ 320.544918][ T4567] r10:00000036 r9:840a8c40 r8:8020029c r7:00000036 r6:00346310 r5:00000000 [ 320.545248][ T4567] r4:00000000 [ 320.545663][ T4567] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 320.548993][ T4567] ---[ end trace 0000000000000000 ]--- [ 320.569018][ T4567] Kernel panic - not syncing: Fatal exception [ 320.573197][ T4567] Rebooting in 86400 seconds.. VM DIAGNOSIS: 04:12:29 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000005 R03=81ae5b40 R04=00000006 R05=828f83c8 R06=00000004 R07=828f83c0 R08=840a8c40 R09=828f83c8 R10=00000000 R11=df801e84 R12=df801e88 R13=df801e78 R14=80341910 R15=81ae5b50 PSR=60000193 -ZC- A S svc32 s00=63697665 s01=20745f65 d00=20745f6563697665 s02=6564223d s03=706d7476 d01=706d74766564223d s04=20227366 s05=3d6f6e69 d02=3d6f6e6920227366 s06=20343137 s07=6e6f6373 d03=6e6f637320343137 s08=74786574 s09=6f6f723d d04=6f6f723d74786574 s10=79733a74 s11=6d646173 d05=6d64617379733a74 s12=733a725f s13=64617379 d06=64617379733a725f s14=20745f6d s15=6e6f6374 d07=6e6f637420745f6d s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000024 R01=76859008 R02=00040000 R03=00000000 R04=00000000 R05=00000000 R06=00000000 R07=00000003 R08=01c64ac0 R09=00000000 R10=00000001 R11=7eb102bc R12=00000001 R13=df949ff8 R14=7699f590 R15=7699f590 PSR=40030093 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000