last executing test programs: 8.050785821s ago: executing program 0 (id=139): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) fallocate(r0, 0x11, 0x0, 0x0) 7.951198156s ago: executing program 0 (id=140): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newlink={0x5c, 0x10, 0xffffffffffffffff, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x8117}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_BROADCAST={0xa, 0x2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x44}}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x18}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x28001}, 0x8000002) 7.779661116s ago: executing program 0 (id=141): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x32cc0000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) mlock2(&(0x7f000000e000/0x1000)=nil, 0x1000, 0x0) r0 = userfaultfd(0x801) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x0, 0x0}, 0x6) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r1, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000000)={r2, 0x20, &(0x7f0000000280)={&(0x7f0000000080)=""/238, 0xffffffffffffff80, 0x0, 0x0}}, 0x1e) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x2}) ioctl$UFFDIO_POISON(r0, 0xc020aa08, &(0x7f00000000c0)={{&(0x7f00001d5000/0x2000)=nil, 0x2000}}) 3.504655024s ago: executing program 0 (id=146): bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x0, 0x0}, 0x6) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300)=r0, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r1, 0x20, &(0x7f00000007c0)={&(0x7f0000000800)=""/243, 0xfffffffffffffdb4, 0x0, 0x0}}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x1000)=nil, &(0x7f000012d000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f00005a4000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f000012d000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x48000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x0, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x2}, 0x94) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000)=0x9, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0xfffffd0a}, 0x10) r2 = io_uring_setup(0x1b7b, &(0x7f0000000040)={0x0, 0x970, 0x1f480, 0x0, 0x39d}) io_uring_enter(r2, 0x5cdd, 0x2e15, 0x17, 0x0, 0x0) 3.382423651s ago: executing program 1 (id=147): r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) wait4(r0, 0x0, 0x40000000, 0x0) ptrace$setregset(0x4205, r0, 0x403, &(0x7f0000000000)={0x0}) 3.090440067s ago: executing program 1 (id=148): mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) r0 = socket(0x28, 0x801, 0x0) close(0x3) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x42, 0x85) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x90000) tee(r1, r0, 0x80000003, 0xc) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffe}]}) close_range(r2, 0xffffffffffffffff, 0x0) 2.893737269s ago: executing program 0 (id=149): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1800040000000000000000000000000085002000430000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x21, 0xffffffffffffffff, 0x0, 0x3, '\x00', 0x0, 0x38}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x4, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="85000000250000006a"], 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x284}, 0x94) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff43}, 0x94) 2.32066475s ago: executing program 0 (id=150): sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x20004041) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000300)=0x5, 0x4) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000280)={0x2, 0x4e23, @empty}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x7ff, 0xf83, 0x24}, 0x1c) sendto$inet(r0, &(0x7f0000000040)="ee", 0xffffffffffffff75, 0x20004010, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r0, 0x0, r2, 0x0, 0x7ffff000, 0x3) 1.915776023s ago: executing program 1 (id=151): r0 = socket(0xa, 0x1, 0x0) listen(r0, 0x7f) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x48800}, 0x20004044) 1.590759792s ago: executing program 1 (id=152): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001700)={r1, r0, 0x16, 0x0, @val=@tcx}, 0x1c) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x9, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000004c0)={r3, r2, 0x16, 0x0, @void}, 0x10) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000002180)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r4, 0xffffffffffffffff, 0x0) 912.625849ms ago: executing program 1 (id=153): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp', 0x5) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x2, 0x200, @loopback, 0x7}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200080c0, &(0x7f00000001c0)={0xa, 0x2, 0x8000, @loopback, 0x9}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr', 0x3) sendto$inet6(r0, &(0x7f0000000180)="d8", 0x1, 0x20000040, 0x0, 0x0) 0s ago: executing program 1 (id=154): prlimit64(0x0, 0x2, &(0x7f0000000000)={0x9, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) unshare(0x28000600) syz_clone(0x4000400, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x80, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r0, 0x0, 0x2, 0x0) kernel console output (not intermixed with test programs): [ 51.262577][ T28] audit: type=1400 audit(51.170:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 51.265149][ T28] audit: type=1400 audit(51.170:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:18761' (ED25519) to the list of known hosts. [ 69.690990][ T28] audit: type=1400 audit(69.590:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 71.798885][ T28] audit: type=1400 audit(71.700:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 71.830486][ T28] audit: type=1400 audit(71.730:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 74.822935][ T28] audit: type=1400 audit(74.730:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 74.826538][ T28] audit: type=1400 audit(74.730:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.837331][ T3093] cgroup: Unknown subsys name 'net' [ 74.843376][ T28] audit: type=1400 audit(74.750:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 75.035345][ T3093] cgroup: Unknown subsys name 'cpuset' [ 75.042668][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 75.043710][ T3093] cgroup: Unknown subsys name 'rlimit' [ 75.305296][ T28] audit: type=1400 audit(75.210:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.307475][ T28] audit: type=1400 audit(75.210:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 75.312218][ T28] audit: type=1400 audit(75.210:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 75.518483][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 75.522599][ T28] audit: type=1400 audit(75.430:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.527670][ T28] audit: type=1400 audit(75.430:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 75.571312][ T28] audit: type=1400 audit(75.480:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.574530][ T28] audit: type=1400 audit(75.480:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 83.077508][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 85.244522][ T28] audit: type=1400 audit(85.150:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 85.297903][ T28] audit: type=1400 audit(85.200:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 85.301616][ T28] audit: type=1400 audit(85.200:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 85.307926][ T28] audit: type=1400 audit(85.210:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 85.332751][ T28] audit: type=1400 audit(85.240:75): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 85.333096][ T28] audit: type=1400 audit(85.240:76): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 85.416748][ T28] audit: type=1400 audit(85.320:78): avc: denied { sys_module } for pid=3098 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 85.417345][ T28] audit: type=1400 audit(85.320:77): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 86.073382][ T28] audit: type=1400 audit(85.980:79): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 87.414242][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.418700][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.433535][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.437533][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.471755][ T3099] hsr_slave_0: entered promiscuous mode [ 88.476327][ T3099] hsr_slave_1: entered promiscuous mode [ 88.488200][ T3098] hsr_slave_0: entered promiscuous mode [ 88.494126][ T3098] hsr_slave_1: entered promiscuous mode [ 88.496753][ T3098] debugfs: 'hsr0' already exists in 'hsr' [ 88.498174][ T3098] Cannot create hsr debugfs directory [ 89.054519][ T28] audit: type=1400 audit(88.960:80): avc: denied { create } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.065993][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 89.077604][ T3098] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 89.106671][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 89.115181][ T3098] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 89.119241][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 89.131530][ T3098] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 89.147637][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 89.156387][ T3098] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 89.216264][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 89.227390][ T3099] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 89.237082][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 89.244186][ T3099] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 89.256649][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 89.264709][ T3099] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 89.274241][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 89.282080][ T3099] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 90.109159][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.131844][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.303753][ T3098] veth0_vlan: entered promiscuous mode [ 93.337206][ T3098] veth1_vlan: entered promiscuous mode [ 93.351110][ T3099] veth0_vlan: entered promiscuous mode [ 93.397436][ T3099] veth1_vlan: entered promiscuous mode [ 93.441724][ T3098] veth0_macvtap: entered promiscuous mode [ 93.463348][ T3098] veth1_macvtap: entered promiscuous mode [ 93.501412][ T3099] veth0_macvtap: entered promiscuous mode [ 93.522009][ T3099] veth1_macvtap: entered promiscuous mode [ 93.593885][ T2739] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.594528][ T2739] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.597561][ T2739] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.603350][ T2739] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.719125][ T64] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.723554][ T64] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.723982][ T64] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.724243][ T64] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.771243][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 93.771736][ T28] audit: type=1400 audit(93.670:83): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 93.793621][ T28] audit: type=1400 audit(93.700:84): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.GLzQ4y/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 93.813324][ T28] audit: type=1400 audit(93.720:85): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 93.832952][ T28] audit: type=1400 audit(93.740:86): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.GLzQ4y/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 93.841214][ T28] audit: type=1400 audit(93.740:87): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/syzkaller.GLzQ4y/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 93.865047][ T28] audit: type=1400 audit(93.770:88): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 93.871652][ T28] audit: type=1400 audit(93.770:89): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 93.878689][ T28] audit: type=1400 audit(93.780:90): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="gadgetfs" ino=3227 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 93.885793][ T28] audit: type=1400 audit(93.790:91): avc: denied { mount } for pid=3098 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 93.901411][ T28] audit: type=1400 audit(93.800:92): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 93.976314][ T3098] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 95.081731][ T93] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 95.260493][ T93] usb 2-1: Using ep0 maxpacket: 32 [ 95.273003][ T93] usb 2-1: config 0 has an invalid interface number: 67 but max is 0 [ 95.274275][ T93] usb 2-1: config 0 has no interface number 0 [ 95.304292][ T93] usb 2-1: New USB device found, idVendor=0424, idProduct=9901, bcdDevice=c2.57 [ 95.305437][ T93] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 95.306297][ T93] usb 2-1: Product: syz [ 95.306687][ T93] usb 2-1: Manufacturer: syz [ 95.307128][ T93] usb 2-1: SerialNumber: syz [ 95.310115][ T93] usb 2-1: config 0 descriptor?? [ 95.963703][ T93] smsc95xx 2-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000030: -32 [ 95.969978][ T93] smsc95xx 2-1:0.67 (unnamed net_device) (uninitialized): Error reading E2P_CMD [ 97.150533][ T93] smsc95xx 2-1:0.67 (unnamed net_device) (uninitialized): Failed to write reg index 0x00000014: -71 [ 97.154585][ T93] smsc95xx 2-1:0.67: probe with driver smsc95xx failed with error -71 [ 97.172953][ T93] usb 2-1: USB disconnect, device number 2 [ 97.502513][ T3729] capability: warning: `syz.1.5' uses 32-bit capabilities (legacy support in use) [ 99.110142][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 99.113358][ T28] audit: type=1400 audit(99.010:108): avc: denied { map_read map_write } for pid=3743 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 103.504218][ T28] audit: type=1400 audit(103.410:109): avc: denied { create } for pid=3767 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 103.572655][ T28] audit: type=1400 audit(103.480:110): avc: denied { sys_admin } for pid=3767 comm="syz.0.18" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 105.127758][ T28] audit: type=1400 audit(105.020:111): avc: denied { create } for pid=3774 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 105.211133][ T28] audit: type=1400 audit(105.120:112): avc: denied { write } for pid=3774 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 106.885011][ T28] audit: type=1400 audit(106.790:113): avc: denied { append } for pid=3781 comm="syz.1.25" name="event1" dev="devtmpfs" ino=755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 107.580619][ T94] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 107.606323][ T28] audit: type=1326 audit(107.510:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.0.26" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 107.606902][ T28] audit: type=1326 audit(107.510:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.0.26" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 107.607136][ T28] audit: type=1326 audit(107.510:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.0.26" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 107.607225][ T28] audit: type=1326 audit(107.510:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.0.26" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 107.619238][ T28] audit: type=1326 audit(107.520:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.0.26" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 107.650244][ T28] audit: type=1326 audit(107.550:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.0.26" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 107.650564][ T28] audit: type=1326 audit(107.550:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.0.26" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 107.740536][ T94] usb 2-1: device descriptor read/64, error -71 [ 108.033672][ T94] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 108.192045][ T94] usb 2-1: device descriptor read/64, error -71 [ 108.301556][ T94] usb usb2-port1: attempt power cycle [ 108.680442][ T94] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 108.716733][ T94] usb 2-1: device descriptor read/8, error -71 [ 108.985635][ T94] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 109.020060][ T94] usb 2-1: device descriptor read/8, error -71 [ 109.135432][ T94] usb usb2-port1: unable to enumerate USB device [ 109.616381][ T3795] netlink: 8 bytes leftover after parsing attributes in process `syz.0.28'. [ 110.610729][ T28] kauditd_printk_skb: 23 callbacks suppressed [ 110.611153][ T28] audit: type=1400 audit(110.510:144): avc: denied { map } for pid=3829 comm="syz.0.29" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2347 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 110.632841][ T28] audit: type=1400 audit(110.540:145): avc: denied { read write } for pid=3829 comm="syz.0.29" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2347 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 111.824453][ T28] audit: type=1400 audit(111.730:146): avc: denied { create } for pid=3832 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 111.844877][ T28] audit: type=1400 audit(111.740:147): avc: denied { setopt } for pid=3832 comm="syz.0.30" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 115.970077][ T28] audit: type=1400 audit(115.870:148): avc: denied { create } for pid=3842 comm="syz.0.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 116.003276][ T28] audit: type=1400 audit(115.910:149): avc: denied { ioctl } for pid=3842 comm="syz.0.35" path="socket:[2384]" dev="sockfs" ino=2384 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 117.145194][ T28] audit: type=1326 audit(117.050:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3846 comm="syz.0.37" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 117.145781][ T28] audit: type=1326 audit(117.050:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3846 comm="syz.0.37" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 117.146131][ T28] audit: type=1326 audit(117.050:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3846 comm="syz.0.37" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 117.146244][ T28] audit: type=1326 audit(117.050:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3846 comm="syz.0.37" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 117.146295][ T28] audit: type=1326 audit(117.050:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3846 comm="syz.0.37" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 117.146348][ T28] audit: type=1326 audit(117.050:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3846 comm="syz.0.37" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 117.160583][ T28] audit: type=1326 audit(117.060:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3846 comm="syz.0.37" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 117.172475][ T28] audit: type=1326 audit(117.080:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3846 comm="syz.0.37" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 122.423232][ T3873] gretap1: entered allmulticast mode [ 123.018638][ T28] kauditd_printk_skb: 91 callbacks suppressed [ 123.019132][ T28] audit: type=1400 audit(122.920:249): avc: denied { name_bind } for pid=3880 comm="syz.0.47" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 124.191530][ T28] audit: type=1400 audit(124.100:250): avc: denied { execute } for pid=3882 comm="syz.0.48" path=2F6D656D66643AF365099F9138C07901631F6E7578202864656C6574656429 dev="tmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 124.293275][ T28] audit: type=1400 audit(124.200:251): avc: denied { getopt } for pid=3882 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 124.806048][ T28] audit: type=1400 audit(124.710:252): avc: denied { name_bind } for pid=3886 comm="syz.0.50" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 127.662090][ T3894] *** NOT YET: opcode 85 *** [ 129.926529][ T28] audit: type=1400 audit(129.830:253): avc: denied { setopt } for pid=3901 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 130.673144][ T28] audit: type=1400 audit(130.580:254): avc: denied { write } for pid=3901 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 132.911245][ T28] audit: type=1400 audit(132.820:255): avc: denied { ioctl } for pid=3914 comm="syz.0.61" path="socket:[2481]" dev="sockfs" ino=2481 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 133.134078][ T3915] Zero length message leads to an empty skb [ 133.611253][ T3923] netlink: 32 bytes leftover after parsing attributes in process `syz.0.64'. [ 134.235252][ T28] audit: type=1400 audit(134.140:256): avc: denied { wake_alarm } for pid=3926 comm="syz.0.66" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 140.180599][ T28] audit: type=1400 audit(140.080:257): avc: denied { mounton } for pid=3948 comm="syz.0.73" path="/57/file0" dev="tmpfs" ino=309 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 145.902621][ T28] audit: type=1400 audit(145.810:258): avc: denied { write } for pid=3969 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 146.415683][ T28] audit: type=1400 audit(146.320:259): avc: denied { ioctl } for pid=3973 comm="syz.1.83" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3519 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 147.356340][ T28] audit: type=1400 audit(147.260:260): avc: denied { mount } for pid=3978 comm="syz.1.85" name="/" dev="ramfs" ino=2584 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 153.505593][ T3999] netlink: 4 bytes leftover after parsing attributes in process `syz.1.92'. [ 154.700805][ T28] audit: type=1326 audit(154.600:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.95" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 154.701236][ T28] audit: type=1326 audit(154.600:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.95" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 154.724594][ T28] audit: type=1326 audit(154.630:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.95" exe="/syz-executor" sig=0 arch=40000028 syscall=331 compat=0 ip=0x130300 code=0x7ffc0000 [ 154.727598][ T28] audit: type=1326 audit(154.630:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.95" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 154.727969][ T28] audit: type=1326 audit(154.630:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.95" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 154.733167][ T28] audit: type=1326 audit(154.640:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.95" exe="/syz-executor" sig=0 arch=40000028 syscall=370 compat=0 ip=0x130300 code=0x7ffc0000 [ 154.737024][ T28] audit: type=1326 audit(154.640:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.95" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 154.737371][ T28] audit: type=1326 audit(154.640:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.95" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 154.753847][ T28] audit: type=1326 audit(154.660:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.95" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x130300 code=0x7ffc0000 [ 154.757661][ T28] audit: type=1326 audit(154.660:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.95" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 154.952489][ T4014] netlink: 67 bytes leftover after parsing attributes in process `syz.1.97'. [ 156.011110][ T4021] netlink: 12 bytes leftover after parsing attributes in process `syz.1.100'. [ 166.883014][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 166.883371][ T28] audit: type=1400 audit(166.790:273): avc: denied { sqpoll } for pid=4034 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 168.178206][ T4053] syzkaller0: entered promiscuous mode [ 168.179153][ T4053] syzkaller0: entered allmulticast mode [ 171.456823][ T28] audit: type=1400 audit(171.360:274): avc: denied { connect } for pid=4062 comm="syz.1.114" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 171.471602][ T28] audit: type=1400 audit(171.380:275): avc: denied { write } for pid=4062 comm="syz.1.114" laddr=fe80::13 lport=60 faddr=fe80::d fport=3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 171.618629][ T4065] netlink: 16 bytes leftover after parsing attributes in process `syz.1.115'. [ 175.262821][ T28] audit: type=1400 audit(175.170:276): avc: denied { create } for pid=4074 comm="syz.1.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 179.476020][ T4106] netlink: 4 bytes leftover after parsing attributes in process `syz.1.125'. [ 183.201535][ T28] audit: type=1400 audit(183.110:277): avc: denied { block_suspend } for pid=4137 comm="syz.1.134" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 193.777499][ T4159] bond_slave_0: entered promiscuous mode [ 193.777951][ T4159] bond_slave_1: entered promiscuous mode [ 193.795378][ T4159] vlan2: entered promiscuous mode [ 193.795835][ T4159] bond0: entered promiscuous mode [ 199.033652][ T28] audit: type=1400 audit(198.940:278): avc: denied { create } for pid=4183 comm="syz.1.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 199.764263][ T41] af_packet: tpacket_rcv: packet too big, clamped from 80 to 4294967272. macoff=96 [ 203.974219][ T4200] ------------[ cut here ]------------ [ 203.978325][ T4200] WARNING: kernel/signal.c:2174 at do_notify_parent+0x37c/0x384, CPU#1: syz.1.154/4200 [ 203.983976][ T4200] Modules linked in: [ 203.984886][ T4200] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 203.986419][ T4200] CPU: 1 UID: 0 PID: 4200 Comm: syz.1.154 Not tainted syzkaller #0 PREEMPT [ 203.987472][ T4200] Hardware name: ARM-Versatile Express [ 203.988807][ T4200] Call trace: [ 203.989395][ T4200] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 203.990425][ T4200] r7:82a1e6f8 r6:00000000 r5:8231c0d0 r4:00000001 [ 203.990839][ T4200] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 203.991178][ T4200] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 203.991526][ T4200] r7:82a1e6f8 r6:00000000 r5:846dbd40 r4:82c7bd3c [ 203.991782][ T4200] [<8021e334>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 203.992075][ T4200] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 203.992383][ T4200] r7:80265f80 [ 203.992548][ T4200] [<80202818>] (panic) from [<802506a8>] (get_taint+0x0/0x1c) [ 203.992926][ T4200] r3:82a0b544 r2:00000001 r1:82302bb8 r0:8230a498 [ 203.993203][ T4200] [<80250630>] (check_panic_on_warn) from [<80250824>] (__warn+0x98/0x1ac) [ 203.993559][ T4200] [<8025078c>] (__warn) from [<80250ab0>] (warn_slowpath_fmt+0x178/0x1f4) [ 203.993901][ T4200] r8:00000009 r7:8230b694 r6:df9c9de4 r5:846dbd40 r4:00000000 [ 203.994165][ T4200] [<8025093c>] (warn_slowpath_fmt) from [<80265f80>] (do_notify_parent+0x37c/0x384) [ 203.994599][ T4200] r10:846dc434 r9:00000000 r8:df9c9e90 r7:846dc610 r6:00000080 r5:846dbd40 [ 203.994950][ T4200] r4:846dbd40 [ 203.995212][ T4200] [<80265c04>] (do_notify_parent) from [<80257a90>] (do_exit+0x798/0xae4) [ 203.995570][ T4200] r8:df9c9e90 r7:846dc610 r6:833e7880 r5:846dbd40 r4:846ebd40 [ 203.995843][ T4200] [<802572f8>] (do_exit) from [<80257fa8>] (do_group_exit+0x40/0x8c) [ 203.996139][ T4200] r7:00112104 [ 203.996305][ T4200] [<80257f68>] (do_group_exit) from [<80268fd0>] (get_signal+0xa8c/0xab4) [ 203.996671][ T4200] r7:00112104 r4:846dbd40 [ 203.996842][ T4200] [<80268544>] (get_signal) from [<8022a74c>] (do_work_pending+0x220/0x4e8) [ 203.997208][ T4200] r10:00000109 r9:00112108 r8:fffffdfc r7:00112104 r6:ffffffff r5:df9c9fb0 [ 203.997547][ T4200] r4:846dbd40 [ 203.997712][ T4200] [<8022a52c>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 203.998181][ T4200] Exception stack(0xdf9c9fb0 to 0xdf9c9ff8) [ 203.998621][ T4200] 9fa0: 00000000 00000000 76fdfdf0 76fdfdfc [ 203.999044][ T4200] 9fc0: 00000000 00000000 00000000 00000109 003462d8 00000000 00000001 76fe00dc [ 203.999441][ T4200] 9fe0: 76fdfdb8 76fdfda4 0010b524 00112104 60000010 00000000 [ 203.999969][ T4200] r10:00000109 r9:846dbd40 r8:8020029c r7:00000109 r6:00000000 r5:00000000 [ 204.000357][ T4200] r4:00000000 [ 204.003195][ T4200] Rebooting in 86400 seconds..