last executing test programs: 6.876109108s ago: executing program 0 (id=117): r0 = syz_io_uring_setup(0x49e, &(0x7f0000000500)={0x0, 0x69af, 0x1, 0x0, 0x20a}, &(0x7f0000000140), &(0x7f0000000240)) io_uring_register$IORING_REGISTER_PBUF_STATUS(r0, 0x1a, &(0x7f0000000100)={0x10000}, 0x1) 6.411066807s ago: executing program 0 (id=118): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x29}, 0x1, 0x0, 0x0, 0x20000890}, 0x4008001) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0x0, 0x20000000000000bb, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb714000008"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x4, 0x200008, 0x4, 0x20000}, 0x10}, 0x94) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000001800010800000000000000850a600000000000000500000014000500200100000000000000000300000000001c00090008000000", @ANYRES32=r0], 0x4c}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) 6.025430826s ago: executing program 0 (id=119): r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa07, &(0x7f0000000280)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}}) 5.433881441s ago: executing program 0 (id=122): sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x38, 0x4, 0x6, 0x801, 0x0, 0x0, {0xa, 0x0, 0x8}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000050}, 0xdbcc7a2431de4ec6) 5.112367611s ago: executing program 0 (id=123): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000001100)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="310301000000000000000900000008000300", @ANYRES32=r2], 0x24}, 0x1, 0x0, 0x0, 0x20000095}, 0x200480c4) 4.961830221s ago: executing program 1 (id=124): r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0xfff3}}, [@qdisc_kind_options=@q_pfifo={{0xa}, {0x8}}]}, 0x38}}, 0x0) 4.140492225s ago: executing program 1 (id=125): prlimit64(0x0, 0xe, &(0x7f0000000600)={0x9, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_getevents(r0, 0x4, 0x4, &(0x7f00000019c0)=[{}, {}, {}, {}], 0x0) io_submit(r0, 0x1, &(0x7f00000009c0)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x8}]) 2.276864461s ago: executing program 0 (id=126): mknod(&(0x7f0000000000)='./bus\x00', 0x1000, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000380)="00b565", 0x3}], 0x1) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) tee(r1, r2, 0x3, 0x0) 1.57750428s ago: executing program 1 (id=127): r0 = socket(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, 0x0, 0xdbcc7a2431de4ec6) 1.132872696s ago: executing program 1 (id=128): r0 = socket(0x2d, 0x2, 0x0) connect$unix(r0, 0x0, 0x0) 553.52983ms ago: executing program 1 (id=129): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket(0x10, 0x803, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000004c0)={'veth1_virt_wifi\x00'}) r3 = bpf$BPF_LINK_CREATE_XDP(0x1c, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000009c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20080, 0x80e1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x3, &(0x7f0000000480)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000680)={r3, r5, 0x4, r2}, 0x10) close_range(r1, 0xffffffffffffffff, 0x0) 0s ago: executing program 1 (id=130): syz_usb_connect(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001964d408861a92e03f53010203010902"], 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_disconnect(r0) syz_usb_connect(0x4, 0x24, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$EVIOCRMFF(r0, 0xc0085504, &(0x7f0000000080)) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:46818' (ED25519) to the list of known hosts. [ 215.643052][ T30] audit: type=1400 audit(215.110:46): avc: denied { name_bind } for pid=3320 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 216.109393][ T30] audit: type=1400 audit(215.580:47): avc: denied { execute } for pid=3321 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 216.113607][ T30] audit: type=1400 audit(215.580:48): avc: denied { execute_no_trans } for pid=3321 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 223.101853][ T30] audit: type=1400 audit(222.570:49): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 223.147487][ T30] audit: type=1400 audit(222.610:50): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 223.208793][ T3321] cgroup: Unknown subsys name 'net' [ 223.317168][ T30] audit: type=1400 audit(222.780:51): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 223.594696][ T3321] cgroup: Unknown subsys name 'cpuset' [ 223.658704][ T3321] cgroup: Unknown subsys name 'rlimit' [ 223.973478][ T30] audit: type=1400 audit(223.440:52): avc: denied { setattr } for pid=3321 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 223.981654][ T30] audit: type=1400 audit(223.450:53): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 223.989910][ T30] audit: type=1400 audit(223.460:54): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 224.718855][ T3323] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 224.725263][ T30] audit: type=1400 audit(224.190:55): avc: denied { relabelto } for pid=3323 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 224.734314][ T30] audit: type=1400 audit(224.200:56): avc: denied { write } for pid=3323 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 224.872421][ T30] audit: type=1400 audit(224.340:57): avc: denied { read } for pid=3321 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 224.888031][ T30] audit: type=1400 audit(224.340:58): avc: denied { open } for pid=3321 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 224.897696][ T3321] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 238.203887][ T30] audit: type=1400 audit(237.670:59): avc: denied { execmem } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 238.352259][ T30] audit: type=1400 audit(237.820:60): avc: denied { read } for pid=3331 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 238.361816][ T30] audit: type=1400 audit(237.820:61): avc: denied { open } for pid=3331 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 238.392929][ T30] audit: type=1400 audit(237.860:62): avc: denied { mounton } for pid=3331 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 238.489383][ T30] audit: type=1400 audit(237.950:63): avc: denied { module_request } for pid=3332 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 238.714669][ T30] audit: type=1400 audit(238.180:64): avc: denied { sys_module } for pid=3332 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 245.815259][ T3332] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 245.841982][ T3332] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 246.656286][ T3331] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 246.682255][ T3331] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 248.845710][ T3332] hsr_slave_0: entered promiscuous mode [ 248.854716][ T3332] hsr_slave_1: entered promiscuous mode [ 250.449271][ T3331] hsr_slave_0: entered promiscuous mode [ 250.460396][ T3331] hsr_slave_1: entered promiscuous mode [ 250.470484][ T3331] debugfs: 'hsr0' already exists in 'hsr' [ 250.473928][ T3331] Cannot create hsr debugfs directory [ 251.089167][ T30] audit: type=1400 audit(250.550:65): avc: denied { create } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 251.090081][ T30] audit: type=1400 audit(250.550:66): avc: denied { write } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 251.113970][ T30] audit: type=1400 audit(250.580:67): avc: denied { read } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 251.145505][ T3332] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 251.224778][ T3332] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 251.263813][ T3332] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 251.302599][ T3332] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 253.347179][ T3331] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 253.401039][ T3331] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 253.471020][ T3331] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 253.532626][ T3331] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 255.308957][ T3332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.122937][ T3331] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.025722][ T3332] veth0_vlan: entered promiscuous mode [ 267.181123][ T3332] veth1_vlan: entered promiscuous mode [ 267.597188][ T3332] veth0_macvtap: entered promiscuous mode [ 267.693274][ T3332] veth1_macvtap: entered promiscuous mode [ 268.168885][ T969] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 268.170094][ T969] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 268.205171][ T969] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 268.215721][ T969] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 268.889976][ T30] audit: type=1400 audit(268.350:68): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 268.913252][ T30] audit: type=1400 audit(268.380:69): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.8XJ9ON/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 268.949343][ T30] audit: type=1400 audit(268.420:70): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 269.011566][ T30] audit: type=1400 audit(268.470:71): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.8XJ9ON/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 269.032417][ T30] audit: type=1400 audit(268.500:72): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.8XJ9ON/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3910 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 269.110978][ T30] audit: type=1400 audit(268.580:73): avc: denied { unmount } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 269.213643][ T30] audit: type=1400 audit(268.680:74): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 269.247622][ T30] audit: type=1400 audit(268.710:75): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="gadgetfs" ino=3911 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 269.342513][ T30] audit: type=1400 audit(268.810:76): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 269.358446][ T30] audit: type=1400 audit(268.820:77): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 269.822388][ T3332] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 270.210594][ T3331] veth0_vlan: entered promiscuous mode [ 270.373449][ T3331] veth1_vlan: entered promiscuous mode [ 271.131999][ T3331] veth0_macvtap: entered promiscuous mode [ 271.311729][ T3331] veth1_macvtap: entered promiscuous mode [ 271.860658][ T26] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.863479][ T26] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.868517][ T26] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.884888][ T98] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.768872][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 275.773567][ T30] audit: type=1400 audit(275.230:87): avc: denied { create } for pid=3481 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 275.903546][ T30] audit: type=1400 audit(275.370:88): avc: denied { ioctl } for pid=3481 comm="syz.0.1" path="socket:[3958]" dev="sockfs" ino=3958 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 276.464859][ T30] audit: type=1400 audit(275.930:89): avc: denied { map_create } for pid=3481 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 276.490704][ T30] audit: type=1400 audit(275.950:90): avc: denied { bpf } for pid=3481 comm="syz.0.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 276.614797][ T30] audit: type=1400 audit(276.080:91): avc: denied { map_read map_write } for pid=3481 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 276.682585][ T30] audit: type=1400 audit(276.150:92): avc: denied { prog_load } for pid=3481 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 276.724778][ T30] audit: type=1400 audit(276.180:93): avc: denied { perfmon } for pid=3481 comm="syz.0.1" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 277.300133][ T30] audit: type=1400 audit(276.760:94): avc: denied { bind } for pid=3481 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 278.374004][ T30] audit: type=1400 audit(277.840:95): avc: denied { create } for pid=3497 comm="syz.1.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 278.404469][ T30] audit: type=1400 audit(277.870:96): avc: denied { bind } for pid=3497 comm="syz.1.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 280.232967][ T3505] fuse: Unknown parameter 'group_id00000000000000000000' [ 280.830035][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 280.830783][ T30] audit: type=1400 audit(280.300:101): avc: denied { read } for pid=3506 comm="syz.1.8" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 280.852708][ T30] audit: type=1400 audit(280.320:102): avc: denied { open } for pid=3506 comm="syz.1.8" path="/dev/dri/card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 281.029112][ T30] audit: type=1400 audit(280.470:103): avc: denied { ioctl } for pid=3506 comm="syz.1.8" path="/dev/dri/card1" dev="devtmpfs" ino=619 ioctlcmd=0x64c6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 281.928970][ T30] audit: type=1400 audit(281.400:104): avc: denied { create } for pid=3511 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 281.952070][ T30] audit: type=1400 audit(281.420:105): avc: denied { connect } for pid=3511 comm="syz.1.10" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 282.051768][ T30] audit: type=1400 audit(281.490:106): avc: denied { write } for pid=3511 comm="syz.1.10" laddr=fe80::13 lport=60 faddr=fe80::d fport=3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 284.061198][ T3519] fuse: Unknown parameter 'group_id00000000000000000000' [ 285.154169][ T3521] netlink: 'syz.1.14': attribute type 4 has an invalid length. [ 285.344172][ T3521] netlink: 'syz.1.14': attribute type 4 has an invalid length. [ 286.176207][ T30] audit: type=1400 audit(285.640:107): avc: denied { ioctl } for pid=3522 comm="syz.1.15" path="socket:[4164]" dev="sockfs" ino=4164 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 292.984247][ T30] audit: type=1400 audit(292.450:108): avc: denied { create } for pid=3529 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 293.073051][ T3530] syz.1.16 uses obsolete (PF_INET,SOCK_PACKET) [ 296.036081][ T3537] syzkaller0: entered promiscuous mode [ 296.043875][ T3537] syzkaller0: entered allmulticast mode [ 301.140735][ T3540] fuse: Bad value for 'user_id' [ 301.141479][ T3540] fuse: Bad value for 'user_id' [ 304.592905][ T30] audit: type=1400 audit(304.060:109): avc: denied { name_bind } for pid=3543 comm="syz.0.20" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 304.621267][ T30] audit: type=1400 audit(304.080:110): avc: denied { node_bind } for pid=3543 comm="syz.0.20" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 306.669983][ T30] audit: type=1400 audit(306.140:111): avc: denied { unmount } for pid=3545 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 307.585597][ T30] audit: type=1400 audit(307.050:112): avc: denied { mount } for pid=3541 comm="syz.1.19" name="/" dev="hugetlbfs" ino=4033 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 307.903268][ T30] audit: type=1400 audit(307.360:113): avc: denied { write } for pid=3550 comm="syz.0.22" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 308.431213][ T3553] fuse: Bad value for 'user_id' [ 308.433540][ T3553] fuse: Bad value for 'user_id' [ 309.142014][ T30] audit: type=1400 audit(308.610:114): avc: denied { read write } for pid=3554 comm="syz.0.24" name="udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 309.145932][ T30] audit: type=1400 audit(308.610:115): avc: denied { open } for pid=3554 comm="syz.0.24" path="/dev/udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 309.165284][ T30] audit: type=1400 audit(308.630:116): avc: denied { ioctl } for pid=3554 comm="syz.0.24" path="/dev/udmabuf" dev="devtmpfs" ino=677 ioctlcmd=0x7542 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 309.195462][ T30] audit: type=1400 audit(308.660:117): avc: denied { allowed } for pid=3554 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 309.213571][ T30] audit: type=1400 audit(308.680:118): avc: denied { create } for pid=3554 comm="syz.0.24" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 309.962193][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 309.963012][ T30] audit: type=1400 audit(309.430:121): avc: denied { write } for pid=3556 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 312.386263][ T30] audit: type=1400 audit(311.840:122): avc: denied { read write } for pid=3563 comm="syz.0.28" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 312.389071][ T30] audit: type=1400 audit(311.850:123): avc: denied { open } for pid=3563 comm="syz.0.28" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 313.079616][ T30] audit: type=1400 audit(312.550:124): avc: denied { create } for pid=3565 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 313.119645][ T30] audit: type=1400 audit(312.580:125): avc: denied { write } for pid=3565 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 313.124854][ T30] audit: type=1400 audit(312.590:126): avc: denied { nlmsg_write } for pid=3565 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 313.640487][ T30] audit: type=1400 audit(313.100:127): avc: denied { create } for pid=3567 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 313.702226][ T30] audit: type=1400 audit(313.170:128): avc: denied { bind } for pid=3567 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 316.652550][ T3580] fuse: Bad value for 'group_id' [ 316.653330][ T3580] fuse: Bad value for 'group_id' [ 319.919757][ T3590] fuse: Bad value for 'group_id' [ 319.920479][ T3590] fuse: Bad value for 'group_id' [ 324.284943][ T3603] fuse: Bad value for 'group_id' [ 324.285318][ T3603] fuse: Bad value for 'group_id' [ 325.890352][ T30] audit: type=1400 audit(325.360:129): avc: denied { create } for pid=3604 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 325.907640][ T30] audit: type=1400 audit(325.370:130): avc: denied { getopt } for pid=3604 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 326.471937][ T30] audit: type=1400 audit(325.900:131): avc: denied { connect } for pid=3596 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 326.472442][ T30] audit: type=1400 audit(325.910:132): avc: denied { bind } for pid=3596 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 326.472833][ T30] audit: type=1400 audit(325.920:133): avc: denied { write } for pid=3596 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 338.008953][ T30] audit: type=1400 audit(337.480:134): avc: denied { create } for pid=3611 comm="syz.1.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 338.825397][ T30] audit: type=1400 audit(338.290:135): avc: denied { create } for pid=3615 comm="syz.0.50" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 338.841944][ T30] audit: type=1400 audit(338.310:136): avc: denied { ioctl } for pid=3615 comm="syz.0.50" path="socket:[4355]" dev="sockfs" ino=4355 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 339.404204][ T3620] Zero length message leads to an empty skb [ 339.942857][ T30] audit: type=1400 audit(339.410:137): avc: denied { mounton } for pid=3622 comm="syz.0.51" path="/30/file0" dev="tmpfs" ino=177 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 341.265364][ T30] audit: type=1400 audit(340.720:138): avc: denied { map } for pid=3626 comm="syz.0.53" path="/dev/dri/card0" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 341.265917][ T30] audit: type=1400 audit(340.720:139): avc: denied { execute } for pid=3626 comm="syz.0.53" path="/dev/dri/card0" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 359.132215][ T3644] fuse: Unknown parameter 'fd0x0000000000000003' [ 359.159790][ T30] audit: type=1400 audit(358.620:140): avc: denied { create } for pid=3643 comm="syz.1.60" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 359.267960][ T30] audit: type=1400 audit(358.730:141): avc: denied { unlink } for pid=3332 comm="syz-executor" name="file0" dev="tmpfs" ino=146 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 360.404695][ T3648] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 360.425970][ T3648] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 360.959293][ T30] audit: type=1400 audit(360.430:142): avc: denied { bind } for pid=3649 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 361.017608][ T30] audit: type=1400 audit(360.470:143): avc: denied { write } for pid=3649 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 362.992649][ T3654] fuse: Unknown parameter 'fd0x0000000000000003' [ 363.592869][ T30] audit: type=1400 audit(363.060:144): avc: denied { create } for pid=3655 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 364.406053][ T30] audit: type=1400 audit(363.870:145): avc: denied { ioctl } for pid=3660 comm="syz.0.68" path="socket:[5214]" dev="sockfs" ino=5214 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 364.870303][ T30] audit: type=1400 audit(364.340:146): avc: denied { write } for pid=3655 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 365.460992][ T3668] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 365.492821][ T3668] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 366.653243][ T30] audit: type=1400 audit(366.120:147): avc: denied { connect } for pid=3671 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 366.765217][ T3673] netlink: 4 bytes leftover after parsing attributes in process `syz.0.69'. [ 368.320825][ T3678] fuse: Unknown parameter 'fd0x0000000000000003' [ 370.968892][ T30] audit: type=1400 audit(370.430:148): avc: denied { create } for pid=3689 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 370.991329][ T30] audit: type=1400 audit(370.460:149): avc: denied { write } for pid=3689 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 372.114209][ T3694] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 372.146247][ T30] audit: type=1400 audit(371.610:150): avc: denied { getopt } for pid=3693 comm="syz.0.75" laddr=fe80::16 lport=40759 faddr=fe80::38 fport=20001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 376.562104][ T3710] fuse: Unknown parameter 'grou00000000000000000000' [ 377.842221][ T30] audit: type=1400 audit(377.300:151): avc: denied { create } for pid=3713 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 377.865346][ T30] audit: type=1400 audit(377.330:152): avc: denied { write } for pid=3713 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 377.898799][ T30] audit: type=1400 audit(377.360:153): avc: denied { read } for pid=3713 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 378.390385][ T30] audit: type=1400 audit(377.850:154): avc: denied { create } for pid=3715 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 378.414249][ T30] audit: type=1400 audit(377.880:155): avc: denied { getopt } for pid=3715 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 378.921350][ T30] audit: type=1400 audit(378.390:156): avc: denied { setopt } for pid=3717 comm="syz.0.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 378.930038][ T3718] veth1_to_bond: entered allmulticast mode [ 378.935375][ T3717] veth1_to_bond: left allmulticast mode [ 379.128063][ T3720] fuse: Unknown parameter 'grou00000000000000000000' [ 381.554782][ T3734] fuse: Unknown parameter 'grou00000000000000000000' [ 382.089987][ T30] audit: type=1400 audit(381.550:157): avc: denied { write } for pid=3733 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 384.199994][ T30] audit: type=1400 audit(383.670:158): avc: denied { create } for pid=3742 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 384.214128][ T30] audit: type=1400 audit(383.680:159): avc: denied { setopt } for pid=3742 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 384.422731][ T3745] fuse: Unknown parameter 'group_i00000000000000000000' [ 384.977277][ T30] audit: type=1400 audit(384.440:160): avc: denied { read write } for pid=3747 comm="syz.0.101" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 384.983324][ T30] audit: type=1400 audit(384.450:161): avc: denied { open } for pid=3747 comm="syz.0.101" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 385.160908][ T30] audit: type=1400 audit(384.630:162): avc: denied { prog_run } for pid=3746 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 385.175097][ T30] audit: type=1400 audit(384.640:163): avc: denied { ioctl } for pid=3746 comm="syz.1.100" path="socket:[4534]" dev="sockfs" ino=4534 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 385.663977][ T3751] fuse: Unknown parameter '0x0000000000000003' [ 386.454520][ T3756] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pid=3756 comm=syz.0.104 [ 386.994268][ T3758] fuse: Unknown parameter 'group_i00000000000000000000' [ 388.431809][ T3762] fuse: Unknown parameter '0x0000000000000003' [ 389.315864][ T30] audit: type=1400 audit(388.780:164): avc: denied { setopt } for pid=3763 comm="syz.0.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 389.383955][ T30] audit: type=1400 audit(388.850:165): avc: denied { write } for pid=3763 comm="syz.0.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 389.400362][ T30] audit: type=1400 audit(388.860:166): avc: denied { read } for pid=3763 comm="syz.0.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 389.811832][ T26] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 389.812832][ T26] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 389.813111][ T26] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 389.813373][ T26] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 390.872840][ T3769] fuse: Unknown parameter 'group_i00000000000000000000' [ 393.684682][ T3782] fuse: Unknown parameter 'group_id00000000000000000000' [ 395.255240][ T30] audit: type=1400 audit(394.720:167): avc: denied { ioctl } for pid=3790 comm="syz.0.119" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5398 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 395.315407][ T3793] fuse: Unknown parameter 'group_id00000000000000000000' [ 400.078624][ T30] audit: type=1400 audit(399.530:168): avc: denied { create } for pid=3815 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 400.079602][ T30] audit: type=1400 audit(399.540:169): avc: denied { connect } for pid=3815 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 401.255746][ T3820] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 401.261964][ T3820] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 401.282334][ T30] audit: type=1400 audit(400.750:170): avc: denied { read } for pid=3819 comm="syz.1.130" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 401.297693][ T30] audit: type=1400 audit(400.750:171): avc: denied { open } for pid=3819 comm="syz.1.130" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 401.630797][ T3820] ------------[ cut here ]------------ [ 401.631311][ T3820] WARNING: CPU: 1 PID: 3820 at mm/page_alloc.c:5154 __alloc_frozen_pages_noprof+0x414/0x1f2c [ 401.638039][ T3820] Modules linked in: [ 401.639978][ T3820] CPU: 1 UID: 0 PID: 3820 Comm: syz.1.130 Not tainted syzkaller #0 PREEMPT [ 401.640744][ T3820] Hardware name: linux,dummy-virt (DT) [ 401.641521][ T3820] pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 401.642008][ T3820] pc : __alloc_frozen_pages_noprof+0x414/0x1f2c [ 401.642445][ T3820] lr : alloc_pages_mpol+0xfc/0x400 [ 401.643014][ T3820] sp : ffff8000a09077f0 [ 401.643385][ T3820] x29: ffff8000a09077f0 x28: 0000000000000010 x27: 0000000000000004 [ 401.644169][ T3820] x26: 0000000000000000 x25: 0000000000040cc0 x24: 0000000000000010 [ 401.644815][ T3820] x23: 1ffff00011a75b68 x22: 1ffff00014120f20 x21: 1ffff00014120f56 [ 401.645399][ T3820] x20: 0000000000000000 x19: ffff80008d3adb40 x18: 0000000000000000 [ 401.646008][ T3820] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000020000080 [ 401.646795][ T3820] x14: 00000000f1f1f1f1 x13: 0000000000000000 x12: ffff700014120fab [ 401.647489][ T3820] x11: 00000000f204f204 x10: 00000000f200f204 x9 : 00000000f2000000 [ 401.648180][ T3820] x8 : 00000000f2f2f2f2 x7 : 00000000f3f3f3f3 x6 : 0000000000000001 [ 401.648748][ T3820] x5 : ffff00000fb13d00 x4 : 0000000000000000 x3 : 0000000000000000 [ 401.649332][ T3820] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff800088d3e6e7 [ 401.650105][ T3820] Call trace: [ 401.650702][ T3820] __alloc_frozen_pages_noprof+0x414/0x1f2c (P) [ 401.651271][ T3820] alloc_pages_mpol+0xfc/0x400 [ 401.651654][ T3820] alloc_frozen_pages_noprof+0x178/0x1ec [ 401.652017][ T3820] ___kmalloc_large_node+0x118/0x154 [ 401.652357][ T3820] __kmalloc_large_node_noprof+0x28/0x88 [ 401.652711][ T3820] __kmalloc_noprof+0x588/0x824 [ 401.653022][ T3820] raw_alloc_io_data+0xc8/0x144 [ 401.653370][ T3820] raw_ioctl+0xe3c/0x2640 [ 401.653684][ T3820] __arm64_compat_sys_ioctl+0x1d0/0x238 [ 401.654035][ T3820] invoke_syscall+0x6c/0x258 [ 401.654340][ T3820] el0_svc_common.constprop.0+0xac/0x230 [ 401.654748][ T3820] do_el0_svc_compat+0x40/0x68 [ 401.655076][ T3820] el0_svc_compat+0x50/0x248 [ 401.655428][ T3820] el0t_32_sync_handler+0x88/0xac [ 401.655783][ T3820] el0t_32_sync+0x19c/0x1a0 [ 401.656505][ T3820] irq event stamp: 822 [ 401.656874][ T3820] hardirqs last enabled at (821): [] kasan_quarantine_put+0x1c8/0x228 [ 401.657405][ T3820] hardirqs last disabled at (822): [] el1_brk64+0x20/0x54 [ 401.657944][ T3820] softirqs last enabled at (798): [] fpsimd_restore_current_state+0x44/0x6bc [ 401.658514][ T3820] softirqs last disabled at (796): [] fpsimd_restore_current_state+0x14/0x6bc [ 401.659360][ T3820] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 405.141815][ T30] audit: type=1400 audit(404.590:172): avc: denied { read } for pid=3171 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 407.054858][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 407.105471][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 407.186260][ T26] bond0 (unregistering): Released all slaves [ 407.635190][ T26] hsr_slave_0: left promiscuous mode [ 407.651456][ T26] hsr_slave_1: left promiscuous mode [ 412.057993][ T26] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 412.316293][ T26] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 412.643204][ T26] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 412.870241][ T26] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 415.765021][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 415.825541][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 415.893438][ T26] bond0 (unregistering): Released all slaves [ 416.369283][ T26] hsr_slave_0: left promiscuous mode [ 416.392252][ T26] hsr_slave_1: left promiscuous mode [ 416.535256][ T26] veth1_macvtap: left promiscuous mode [ 416.541663][ T26] veth0_macvtap: left promiscuous mode [ 416.543803][ T26] veth1_vlan: left promiscuous mode [ 416.545839][ T26] veth0_vlan: left promiscuous mode