last executing test programs: 3.624948554s ago: executing program 0 (id=397): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xc2dc}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000140)='%pB \x00'}, 0x20) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000580)='\\\x00\x00\x00', 0x4}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x10) 2.842044357s ago: executing program 0 (id=399): r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)={r1}) 2.330071582s ago: executing program 1 (id=402): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x19, 0x1, 0x70bd2a, 0x0, {{@in=@multicast2, @in=@dev={0xac, 0x14, 0x14, 0x15}, 0x0, 0x8, 0x0, 0x0, 0xa, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, {0x8000, 0xa9, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa00, 0x40800000000000, 0x800000000000002}}}, 0xb8}}, 0x40) recvmsg(0xffffffffffffffff, 0x0, 0x2000) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001100)=@migrate={0xa0, 0x21, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x5c}}, [@migrate={0x50, 0x11, [{@in=@loopback=0xac1414aa, @in=@loopback, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@loopback, 0x3c, 0x4, 0x0, 0x0, 0x2, 0xa}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 2.230731358s ago: executing program 0 (id=403): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001340)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1, 0x0, 0x49}}, @NFT_MSG_DELCHAIN={0x2c, 0x5, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x68}}, 0x0) 1.729312543s ago: executing program 1 (id=404): r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000900)="0f198d5aa5caa1c55b84b414797cbdd4e8c576a921a070fc828060506683fd1106a961ac55b5b8ea3342ca7de5559ca2c14e05e42aed8ba14b2c78cb540f71a817d80fbf1945a046ebda494a8048a106a4d49d7f214735ada53397db3b203885ce39ee48d69465935eade21ce36e61826c52c82f038341d9bab5687c740ed3c18897094e7e1391eb84a4052e03c0c7c39ae86d454938f65e284620b99481c33d9f5e5b7a6c0d7548723f55b213c76be37f40c850c38e265758ebd8238257a146d6eced16fd658a784c928fea7a841db1a7fd6520442dae5fc0d3a3d3a5f16fcf6fe4f062ecdad7d0f3c6cd339339533c0ef28ad1e2729907094c3de93c1b1b00ad6df89507000000fb7565d3a8e9eaea020ed173c2179fb03e0944460989240a689c7fe795d310be4e7a6b778a903280dbf426b39c3603c49049980767e31edb997f59785184cbd7b9070400000073c745f71db0906cb51780f908fa61634af8ac85d9f04f3dff0a948e81cd3229a59aaeb00995358155343e3239588a0383e4df109d5ca24276d0d83a27d0e9bf681c1bbea12a6f3c20ad50f63430333bb327eb6ae32fe8809065bce26d2dc2fbb2b48d404637d61fd86852e0e1b6ccc6f75b1107aaa5f60ef45f94e953b3f213c3cb4ca4c716565078c666f84e1a99bb4cb5c7190648132f6ff1f6cb79b93f20752753c938da6241607a742361d995188b23cb4b8269e98e822585695962620673433748e476f7cc3e37db88639c525ff3a502c82c283b00aecfe7734ab369e1ed7c75e27a5a333641817baa3ea37844e20e6266c5095abf9d47ca5f8ad93f1a4d8795daec222ada00d65cf91425fae7939ceaa8d94ec1ab5082e1d251c27b3132119b350e81771f3733be232ffb90c03a818bf458aac3314007c3e35d5e4bed6b897608b01e7e26a54433e5f5c74a2ee3c2fc50067be05a677f122b7dba7010830b879a41b579d44158fb89ea05761d2d369853bea84dfb8081ed7b891dcb3bb3361534fdc5252e4964aed936ad2838e7af14fc65c7c1c6d44c6256f2462ae83cfd6a6b2651da607fe79d345e5080098e9e6e7482cc5c267e00d8d09dcde70b60fe6220fe9530547201664db91cf1885ecc2f106b66cd99131523c99f6102ddd7403791b3a7ac59b256cc4c938fe01740ae4f19b5204ca305b1666b0c2a7e5015d6d530995843adfbac3954306d4cd82257d4d2c3283d45dbae43548fed9879328f114f7c8238ac955391b24614d91be1701ae07c170a9c299fcf3d0ac4cea07e88fbf66b697883af17a06ac3f9954eb2fbd20f101802cd023fc48c5d464c16059cc9dce8558c5322ac7612db0e2725427628c2c41a21f0d2f3962e32f710bf9e216ff1694e8d88c8a81328744b36d9ef9f08c0ea3ccd4f8729e2f00a048162834a", 0x3f0}, {&(0x7f00000003c0)="128b9306006d4810e5ac5040ad9201847839fc378469d5", 0x17}], 0x3, 0x0, 0x0, 0x15}, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0xfffffff4}, 0x0) 1.637330899s ago: executing program 0 (id=405): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x2, [{0x3}]}, @struct={0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffc}]}}, 0x0, 0x3a, 0x0, 0x1}, 0x28) 1.367673397s ago: executing program 0 (id=406): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="340000000b060104001f9c49437d1a65e700000205000100070000000c000780080009400000ffff0900020073797a3100000000"], 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x20004804) 1.367266397s ago: executing program 1 (id=407): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000006c0)='syz0\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000700)={r0, r1, 0xe, 0x0, @void}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r0, r2, 0x5, 0x0, @void}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r3, r0, 0x4, r0}, 0x6) 1.078616737s ago: executing program 1 (id=408): r0 = socket$kcm(0x1e, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r1 = socket$kcm(0x1e, 0x4, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000840)="0b42a596edafee7a4d4ab50fa4719e13a85655ce2d1b064449c08e3b7579f4d98778d34a6ca2037729904179c32dbcb852521c8adaa495377d1fb14b4045cf0dce7d5c24ac9febb9ee4476f8ebeef0a4c55bad25d121b54e626a984ffef35f7ee98c1d395d8499a04e4f367e4726bca610a3f92ecc69c1c9540a647bbd278166818b1f7467", 0x85}], 0x1}, 0x40010) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000008c0), 0x43) setsockopt$sock_attach_bpf(r1, 0x1, 0x21, &(0x7f00000000c0), 0x66) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfdef) close(0x3) 627.295157ms ago: executing program 0 (id=409): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) r5 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r5, 0x10f, 0x87, &(0x7f00000008c0), 0x43) sendmsg$kcm(r5, &(0x7f0000000100)={&(0x7f0000001540)=@tipc, 0x80, 0x0}, 0x0) 269.487801ms ago: executing program 1 (id=410): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xb, 0x10, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x800}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xf535}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0xb6}}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r2, 0x0, 0x10, 0x1, &(0x7f00000006c0)="051cf3b75a97acbf", &(0x7f0000000700)=""/8, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x1b) 0s ago: executing program 1 (id=411): r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000780)={&(0x7f0000000000)=@in6={0xa, 0x4001, 0x0, @empty}, 0x80, 0x0}, 0x20000001) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)=ANY=[], 0x20}, 0x5) kernel console output (not intermixed with test programs): [ 53.169164][ T29] audit: type=1400 audit(53.080:56): avc: denied { read write } for pid=3086 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.171104][ T29] audit: type=1400 audit(53.080:57): avc: denied { open } for pid=3086 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:65258' (ED25519) to the list of known hosts. [ 69.403066][ T29] audit: type=1400 audit(69.310:58): avc: denied { name_bind } for pid=3089 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 71.421015][ T29] audit: type=1400 audit(71.330:59): avc: denied { execute } for pid=3090 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 71.435275][ T29] audit: type=1400 audit(71.340:60): avc: denied { execute_no_trans } for pid=3090 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 74.446473][ T29] audit: type=1400 audit(74.360:61): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 74.450582][ T29] audit: type=1400 audit(74.360:62): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.470399][ T3090] cgroup: Unknown subsys name 'net' [ 74.482989][ T29] audit: type=1400 audit(74.390:63): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.640972][ T3090] cgroup: Unknown subsys name 'cpuset' [ 74.649489][ T3090] cgroup: Unknown subsys name 'hugetlb' [ 74.650429][ T3090] cgroup: Unknown subsys name 'rlimit' [ 74.885755][ T29] audit: type=1400 audit(74.800:64): avc: denied { setattr } for pid=3090 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.896618][ T29] audit: type=1400 audit(74.810:65): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 74.897667][ T29] audit: type=1400 audit(74.810:66): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 75.113640][ T3092] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 75.119298][ T29] audit: type=1400 audit(75.030:67): avc: denied { relabelto } for pid=3092 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.125881][ T29] audit: type=1400 audit(75.040:68): avc: denied { write } for pid=3092 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 75.164198][ T29] audit: type=1400 audit(75.080:69): avc: denied { read } for pid=3090 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.164701][ T29] audit: type=1400 audit(75.080:70): avc: denied { open } for pid=3090 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 82.075506][ T3090] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 84.295959][ T29] audit: type=1400 audit(84.210:71): avc: denied { execmem } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 84.369997][ T29] audit: type=1400 audit(84.280:72): avc: denied { read } for pid=3095 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.374498][ T29] audit: type=1400 audit(84.280:73): avc: denied { open } for pid=3095 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.380749][ T29] audit: type=1400 audit(84.290:74): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 84.421046][ T29] audit: type=1400 audit(84.330:75): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 84.421526][ T29] audit: type=1400 audit(84.330:76): avc: denied { module_request } for pid=3095 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 84.517860][ T29] audit: type=1400 audit(84.430:77): avc: denied { sys_module } for pid=3096 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 85.023721][ T29] audit: type=1400 audit(84.940:78): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 86.060799][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.068472][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.188910][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.194595][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.943674][ T3096] hsr_slave_0: entered promiscuous mode [ 86.946260][ T3096] hsr_slave_1: entered promiscuous mode [ 87.088456][ T3095] hsr_slave_0: entered promiscuous mode [ 87.089407][ T3095] hsr_slave_1: entered promiscuous mode [ 87.091710][ T3095] debugfs: 'hsr0' already exists in 'hsr' [ 87.094861][ T3095] Cannot create hsr debugfs directory [ 87.279366][ T29] audit: type=1400 audit(87.190:79): avc: denied { create } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 87.285399][ T3096] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 87.287981][ T29] audit: type=1400 audit(87.190:80): avc: denied { write } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 87.301746][ T3096] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 87.321132][ T3096] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 87.341028][ T3096] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 87.637392][ T3095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 87.648760][ T3095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 87.660651][ T3095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 87.671418][ T3095] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 88.170209][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.407884][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.694877][ T3095] veth0_vlan: entered promiscuous mode [ 90.718602][ T3095] veth1_vlan: entered promiscuous mode [ 90.791142][ T3096] veth0_vlan: entered promiscuous mode [ 90.807617][ T3096] veth1_vlan: entered promiscuous mode [ 90.825035][ T3095] veth0_macvtap: entered promiscuous mode [ 90.844161][ T3095] veth1_macvtap: entered promiscuous mode [ 90.879811][ T3096] veth0_macvtap: entered promiscuous mode [ 90.895290][ T3096] veth1_macvtap: entered promiscuous mode [ 90.991164][ T61] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.993218][ T61] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.993401][ T61] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.993471][ T61] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.993539][ T61] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.993603][ T61] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.993665][ T61] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.993728][ T61] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.132144][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 91.146416][ T29] audit: type=1400 audit(91.040:82): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 91.152934][ T29] audit: type=1400 audit(91.060:83): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.eGAC8N/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 91.153515][ T29] audit: type=1400 audit(91.060:84): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 91.169755][ T29] audit: type=1400 audit(91.080:85): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.eGAC8N/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 91.177149][ T29] audit: type=1400 audit(91.090:86): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/syzkaller.eGAC8N/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2534 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 91.191919][ T29] audit: type=1400 audit(91.100:87): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 91.199420][ T29] audit: type=1400 audit(91.110:88): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 91.201491][ T29] audit: type=1400 audit(91.110:89): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="gadgetfs" ino=2535 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 91.216727][ T29] audit: type=1400 audit(91.130:90): avc: denied { mount } for pid=3096 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 91.218417][ T29] audit: type=1400 audit(91.130:91): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 91.276220][ T3096] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 92.313537][ T23] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 92.508553][ T23] usb 2-1: too many endpoints for config 0 interface 0 altsetting 0: 196, using maximum allowed: 30 [ 92.510361][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 92.513633][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 92.515756][ T23] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 196 [ 92.517801][ T23] usb 2-1: New USB device found, idVendor=04d9, idProduct=a055, bcdDevice= 0.00 [ 92.519036][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 92.525309][ T23] usb 2-1: config 0 descriptor?? [ 92.999193][ T23] holtek_kbd 0003:04D9:A055.0001: unknown main item tag 0x0 [ 93.008529][ T23] holtek_kbd 0003:04D9:A055.0001: hidraw0: USB HID v10.00 Device [HID 04d9:a055] on usb-dummy_hcd.1-1/input0 [ 93.203784][ T23] usb 2-1: USB disconnect, device number 2 [ 93.314397][ T3737] capability: warning: `syz.0.6' uses deprecated v2 capabilities in a way that may be insecure [ 94.678450][ T3749] netlink: 'syz.1.10': attribute type 10 has an invalid length. [ 94.678887][ T3749] netlink: 40 bytes leftover after parsing attributes in process `syz.1.10'. [ 94.696309][ T3749] A link change request failed with some changes committed already. Interface netdevsim3 may have been left with an inconsistent configuration, please check. [ 97.393639][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 97.395033][ T29] audit: type=1400 audit(97.310:120): avc: denied { map_create } for pid=3750 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.401935][ T29] audit: type=1400 audit(97.310:121): avc: denied { map_read map_write } for pid=3750 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 99.601167][ T29] audit: type=1400 audit(99.310:122): avc: denied { ioctl } for pid=3760 comm="syz.1.15" path="socket:[2595]" dev="sockfs" ino=2595 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 113.308533][ T29] audit: type=1400 audit(113.220:123): avc: denied { name_bind } for pid=3770 comm="syz.0.17" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 113.311681][ T29] audit: type=1400 audit(113.220:124): avc: denied { node_bind } for pid=3770 comm="syz.0.17" saddr=::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 113.641916][ T29] audit: type=1400 audit(113.550:125): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 115.713200][ T29] audit: type=1400 audit(115.620:126): avc: denied { read } for pid=3792 comm="syz.1.26" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 115.727295][ T29] audit: type=1400 audit(115.620:127): avc: denied { open } for pid=3792 comm="syz.1.26" path="/10/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 115.815622][ T3795] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 115.816384][ T3795] block device autoloading is deprecated and will be removed. [ 115.966530][ T29] audit: type=1400 audit(115.880:128): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 116.572747][ T29] audit: type=1400 audit(116.480:129): avc: denied { name_bind } for pid=3801 comm="syz.1.28" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 119.336718][ T29] audit: type=1400 audit(119.250:130): avc: denied { create } for pid=3804 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 119.339484][ T29] audit: type=1400 audit(119.250:131): avc: denied { ioctl } for pid=3804 comm="syz.1.29" path="socket:[2658]" dev="sockfs" ino=2658 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 119.356057][ T3805] netlink: 36 bytes leftover after parsing attributes in process `syz.1.29'. [ 119.375775][ T3805] netlink: 'syz.1.29': attribute type 10 has an invalid length. [ 119.377921][ T3805] syz_tun: entered promiscuous mode [ 120.165344][ T29] audit: type=1400 audit(120.030:132): avc: denied { read } for pid=3809 comm="syz.1.31" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 120.165729][ T29] audit: type=1400 audit(120.030:133): avc: denied { open } for pid=3809 comm="syz.1.31" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 120.167257][ T29] audit: type=1400 audit(120.040:134): avc: denied { ioctl } for pid=3809 comm="syz.1.31" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 120.168264][ T29] audit: type=1400 audit(120.040:135): avc: denied { set_context_mgr } for pid=3809 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 120.168467][ T29] audit: type=1400 audit(120.060:136): avc: denied { map } for pid=3809 comm="syz.1.31" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 120.168655][ T29] audit: type=1400 audit(120.070:137): avc: denied { call } for pid=3809 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 120.179861][ T29] audit: type=1400 audit(120.090:138): avc: denied { transfer } for pid=3809 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 124.162734][ C1] hrtimer: interrupt took 10275536 ns [ 129.686348][ T29] audit: type=1400 audit(129.600:139): avc: denied { create } for pid=3817 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 129.713019][ T29] audit: type=1400 audit(129.620:140): avc: denied { ioctl } for pid=3817 comm="syz.1.34" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2009 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 133.707732][ T29] audit: type=1400 audit(133.620:141): avc: denied { create } for pid=3833 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 133.787882][ T29] audit: type=1400 audit(133.700:142): avc: denied { write } for pid=3833 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 133.793404][ T29] audit: type=1400 audit(133.710:143): avc: denied { nlmsg_read } for pid=3833 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 133.794365][ T3834] netlink: 48 bytes leftover after parsing attributes in process `syz.0.41'. [ 133.818258][ T29] audit: type=1400 audit(133.730:144): avc: denied { read } for pid=3833 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 134.249669][ T29] audit: type=1326 audit(134.160:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3835 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127fac code=0x7ffc0000 [ 134.293091][ T29] audit: type=1326 audit(134.160:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3835 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef3f8 code=0x7ffc0000 [ 134.293785][ T29] audit: type=1326 audit(134.200:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3835 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127fac code=0x7ffc0000 [ 134.293864][ T29] audit: type=1326 audit(134.200:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3835 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef3f8 code=0x7ffc0000 [ 138.291496][ T3847] sch_tbf: burst 0 is lower than device veth1_macvtap mtu (1514) ! [ 138.491526][ T29] kauditd_printk_skb: 55 callbacks suppressed [ 138.501135][ T29] audit: type=1400 audit(138.390:204): avc: denied { create } for pid=3848 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 139.927468][ T3858] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 140.884912][ T29] audit: type=1400 audit(140.800:205): avc: denied { nlmsg_write } for pid=3867 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 141.405754][ T29] audit: type=1400 audit(141.320:206): avc: denied { create } for pid=3871 comm="syz.0.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 141.425114][ T29] audit: type=1400 audit(141.340:207): avc: denied { write } for pid=3871 comm="syz.0.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 141.640339][ T3874] netlink: 'syz.0.55': attribute type 10 has an invalid length. [ 141.640781][ T3874] netlink: 'syz.0.55': attribute type 16 has an invalid length. [ 141.640978][ T3874] netlink: 156 bytes leftover after parsing attributes in process `syz.0.55'. [ 141.858943][ T3876] Zero length message leads to an empty skb [ 142.786392][ T29] audit: type=1400 audit(142.700:208): avc: denied { create } for pid=3882 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 142.804927][ T29] audit: type=1400 audit(142.720:209): avc: denied { write } for pid=3882 comm="syz.0.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 144.624709][ T3898] tap0: tun_chr_ioctl cmd 2147767511 [ 145.953041][ T29] audit: type=1400 audit(145.860:210): avc: denied { setopt } for pid=3917 comm="syz.1.71" lport=17 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 147.395347][ T29] audit: type=1400 audit(147.310:211): avc: denied { setopt } for pid=3928 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 147.401285][ T29] audit: type=1400 audit(147.310:212): avc: denied { write } for pid=3928 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 148.414265][ T29] audit: type=1400 audit(148.320:213): avc: denied { append } for pid=3939 comm="syz.1.80" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 148.622839][ T3940] syzkaller0: entered promiscuous mode [ 148.625378][ T3940] syzkaller0: entered allmulticast mode [ 149.954535][ T29] audit: type=1400 audit(149.860:214): avc: denied { create } for pid=3952 comm="syz.1.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 149.972983][ T29] audit: type=1400 audit(149.880:215): avc: denied { setopt } for pid=3952 comm="syz.1.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 151.121140][ T3965] fuse: Bad value for 'group_id' [ 151.121682][ T3965] fuse: Bad value for 'group_id' [ 152.560990][ T3979] fuse: Bad value for 'group_id' [ 152.561500][ T3979] fuse: Bad value for 'group_id' [ 153.546767][ T29] audit: type=1400 audit(153.460:216): avc: denied { create } for pid=3985 comm="syz.1.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 153.554748][ T29] audit: type=1400 audit(153.470:217): avc: denied { write } for pid=3985 comm="syz.1.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 153.771857][ T3990] netlink: 60 bytes leftover after parsing attributes in process `syz.1.98'. [ 153.785475][ T3990] netlink: 60 bytes leftover after parsing attributes in process `syz.1.98'. [ 153.797813][ T3990] netlink: 60 bytes leftover after parsing attributes in process `syz.1.98'. [ 153.814708][ T3990] netlink: 60 bytes leftover after parsing attributes in process `syz.1.98'. [ 154.296962][ T3994] netlink: 60 bytes leftover after parsing attributes in process `syz.1.100'. [ 154.302739][ T3994] netlink: 60 bytes leftover after parsing attributes in process `syz.1.100'. [ 154.306571][ T3994] netlink: 60 bytes leftover after parsing attributes in process `syz.1.100'. [ 157.509736][ T4008] netlink: 52 bytes leftover after parsing attributes in process `syz.1.106'. [ 157.514499][ T4008] tc_dump_action: action bad kind [ 158.177897][ T29] audit: type=1400 audit(158.090:218): avc: denied { create } for pid=4014 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 162.200509][ T4047] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 162.458050][ T29] audit: type=1400 audit(162.370:219): avc: denied { create } for pid=4048 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 162.786392][ T4054] netlink: 184 bytes leftover after parsing attributes in process `syz.1.124'. [ 163.246114][ T4058] sch_tbf: peakrate 188 is lower than or equals to rate 7012629537550284465 ! [ 164.534279][ T4080] fuse: Unknown parameter 'grou00000000000000000000' [ 165.095655][ T29] audit: type=1400 audit(165.010:220): avc: denied { write } for pid=4086 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 167.901414][ T4103] fuse: Unknown parameter 'grou00000000000000000000' [ 170.598828][ T4114] fuse: Unknown parameter 'grou00000000000000000000' [ 176.807297][ T4132] fuse: Unknown parameter 'group_i00000000000000000000' [ 177.753510][ T29] audit: type=1400 audit(177.660:221): avc: denied { setopt } for pid=4133 comm="syz.0.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 184.208367][ T29] audit: type=1400 audit(184.120:222): avc: denied { create } for pid=4159 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 184.266770][ T29] audit: type=1400 audit(184.150:223): avc: denied { connect } for pid=4159 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 184.267159][ T29] audit: type=1400 audit(184.170:224): avc: denied { setopt } for pid=4159 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 184.295448][ T29] audit: type=1400 audit(184.200:225): avc: denied { bind } for pid=4159 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 184.324015][ T29] audit: type=1400 audit(184.240:226): avc: denied { write } for pid=4159 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 185.134059][ T4162] fuse: Unknown parameter 'group_id00000000000000000000' [ 188.105757][ T4172] fuse: Unknown parameter 'group_id00000000000000000000' [ 189.166330][ T29] audit: type=1400 audit(189.080:227): avc: denied { create } for pid=4183 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 189.788179][ T4190] fuse: Unknown parameter 'group_id00000000000000000000' [ 190.385577][ T4196] netlink: 52 bytes leftover after parsing attributes in process `syz.0.177'. [ 190.924275][ T4203] fuse: Bad value for 'user_id' [ 190.924943][ T4203] fuse: Bad value for 'user_id' [ 192.041470][ T4214] syzkaller0: entered allmulticast mode [ 193.135898][ T4228] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4228 comm=syz.0.190 [ 193.240479][ T4230] fuse: Bad value for 'user_id' [ 193.241294][ T4230] fuse: Bad value for 'user_id' [ 195.810394][ T29] audit: type=1400 audit(195.720:228): avc: denied { relabelfrom } for pid=4263 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 195.810791][ T29] audit: type=1400 audit(195.720:229): avc: denied { relabelto } for pid=4263 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 196.079138][ T4274] fuse: Bad value for 'fd' [ 196.573378][ T4281] netlink: 24 bytes leftover after parsing attributes in process `syz.1.212'. [ 196.917346][ T4286] fuse: Bad value for 'fd' [ 199.384469][ T4292] netlink: 24 bytes leftover after parsing attributes in process `syz.0.218'. [ 200.417857][ T4308] netlink: 'syz.0.226': attribute type 11 has an invalid length. [ 200.516706][ T4309] fuse: Invalid rootmode [ 201.365514][ T4322] fuse: Invalid rootmode [ 202.536812][ T4332] fuse: Bad value for 'rootmode' [ 205.785272][ T4347] fuse: Bad value for 'rootmode' [ 207.786143][ T4376] netlink: 8 bytes leftover after parsing attributes in process `syz.0.258'. [ 208.253820][ T29] audit: type=1400 audit(208.170:230): avc: denied { create } for pid=4381 comm="syz.1.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 209.698260][ T4403] fuse: Unknown parameter 'use00000000000000000000' [ 211.699848][ T4430] netlink: 40 bytes leftover after parsing attributes in process `syz.0.280'. [ 212.018508][ T4437] fuse: Unknown parameter 'user_i00000000000000000000' [ 212.696378][ T4445] netlink: 12 bytes leftover after parsing attributes in process `syz.1.286'. [ 213.025963][ T4452] fuse: Unknown parameter 'user_i00000000000000000000' [ 214.839365][ T4477] netlink: 60 bytes leftover after parsing attributes in process `syz.1.299'. [ 214.854351][ T4477] netlink: 60 bytes leftover after parsing attributes in process `syz.1.299'. [ 214.858376][ T4477] netlink: 60 bytes leftover after parsing attributes in process `syz.1.299'. [ 219.389979][ T4531] netlink: 14 bytes leftover after parsing attributes in process `syz.1.317'. [ 219.390515][ T4531] veth1: entered promiscuous mode [ 221.406316][ T4556] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 221.462763][ T4562] Driver unsupported XDP return value 0 on prog (id 86) dev N/A, expect packet loss! [ 225.009652][ T4579] netlink: 'syz.1.336': attribute type 10 has an invalid length. [ 228.216754][ T4603] fuse: Bad value for 'fd' [ 228.612627][ T29] audit: type=1400 audit(228.510:231): avc: denied { create } for pid=4604 comm="syz.1.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 230.011536][ T4616] netlink: 80 bytes leftover after parsing attributes in process `syz.0.350'. [ 230.503365][ T4621] fuse: Bad value for 'fd' [ 230.823552][ T4625] netlink: 104 bytes leftover after parsing attributes in process `syz.1.354'. [ 231.388368][ T4634] fuse: Unknown parameter '0x0000000000000003' [ 231.877849][ T4640] *** NOT YET: opcode c3 *** [ 232.504742][ T4648] fuse: Unknown parameter '0x0000000000000003' [ 233.274546][ T4657] netpci0: tun_chr_ioctl cmd 1074025677 [ 233.275689][ T4657] netpci0: linktype set to 780 [ 233.587207][ T4663] netlink: 12 bytes leftover after parsing attributes in process `syz.1.369'. [ 233.896330][ T4665] fuse: Unknown parameter '0x0000000000000003' [ 234.329335][ T29] audit: type=1400 audit(234.240:232): avc: denied { read } for pid=4668 comm="syz.0.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 235.175551][ T4674] netlink: 'syz.1.374': attribute type 6 has an invalid length. [ 235.176009][ T4674] netlink: 'syz.1.374': attribute type 7 has an invalid length. [ 235.176210][ T4674] netlink: 'syz.1.374': attribute type 8 has an invalid length. [ 235.558117][ T4678] fuse: Unknown parameter '0x0000000000000003' [ 238.807788][ T4688] netlink: 16 bytes leftover after parsing attributes in process `syz.0.379'. [ 239.018925][ T4691] fuse: Unknown parameter '0x0000000000000003' [ 240.183716][ T4700] netlink: 60 bytes leftover after parsing attributes in process `syz.0.384'. [ 240.189872][ T4699] netlink: 60 bytes leftover after parsing attributes in process `syz.0.384'. [ 240.786542][ T4709] fuse: Unknown parameter '0x0000000000000003' [ 242.380888][ T4732] fuse: Unknown parameter 'fd0x0000000000000003' [ 244.764773][ T29] audit: type=1400 audit(244.680:233): avc: denied { create } for pid=4798 comm="syz.1.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 246.353650][ T29] audit: type=1400 audit(246.270:234): avc: denied { create } for pid=4814 comm="syz.1.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 247.391773][ T4825] ------------[ cut here ]------------ [ 247.392838][ T4825] WARNING: kernel/sched/core.c:10569 at sched_mm_cid_fork+0x34c/0x45c, CPU#0: kworker/u8:18/4825 [ 247.396943][ T4825] Modules linked in: [ 247.397850][ T4825] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 247.398838][ T4825] CPU: 0 UID: 0 PID: 4825 Comm: kworker/u8:18 Not tainted syzkaller #0 PREEMPT [ 247.399373][ T4825] Hardware name: ARM-Versatile Express [ 247.400025][ T4825] Call trace: [ 247.400477][ T4825] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 247.401134][ T4825] r7:82283bb8 r6:85e72400 r5:00000000 r4:8229596c [ 247.401469][ T4825] [<80201b58>] (show_stack) from [<8021ee18>] (dump_stack_lvl+0x54/0x7c) [ 247.401791][ T4825] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 247.402281][ T4825] r5:00000000 r4:82a7bd14 [ 247.402482][ T4825] [<8021ee40>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 247.402918][ T4825] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 247.403383][ T4825] r7:80295b38 [ 247.403541][ T4825] [<80202850>] (panic) from [<802520b0>] (get_taint+0x0/0x1c) [ 247.403915][ T4825] r3:8280c704 r2:00000001 r1:8227c120 r0:82283bb8 [ 247.404177][ T4825] [<80252038>] (check_panic_on_warn) from [<80252228>] (__warn+0x94/0x1a4) [ 247.404507][ T4825] [<80252194>] (__warn) from [<802524b0>] (warn_slowpath_fmt+0x178/0x1f4) [ 247.404831][ T4825] r8:00000009 r7:822867ac r6:e83a5e8c r5:85e72400 r4:00000000 [ 247.405075][ T4825] [<8025233c>] (warn_slowpath_fmt) from [<80295b38>] (sched_mm_cid_fork+0x34c/0x45c) [ 247.405469][ T4825] r10:85afb858 r9:8291bbf4 r8:82ad3ad0 r7:00000006 r6:85e72400 r5:85afb800 [ 247.405748][ T4825] r4:00000000 [ 247.405892][ T4825] [<802957ec>] (sched_mm_cid_fork) from [<80295c58>] (sched_mm_cid_after_execve+0x10/0x14) [ 247.406223][ T4825] r10:85afb858 r9:8291bbf4 r8:82ad3ad0 r7:00000006 r6:fffffffc r5:85afb800 [ 247.406489][ T4825] r4:85e72400 [ 247.406678][ T4825] [<80295c48>] (sched_mm_cid_after_execve) from [<8057399c>] (bprm_execve+0x14c/0x540) [ 247.407057][ T4825] [<80573850>] (bprm_execve) from [<805750e8>] (kernel_execve+0xf8/0x190) [ 247.407386][ T4825] r10:00000000 r9:00000000 r8:828f58f0 r7:84e2dcc0 r6:83223000 r5:85afb800 [ 247.407686][ T4825] r4:00000000 [ 247.407836][ T4825] [<80574ff0>] (kernel_execve) from [<80270e80>] (call_usermodehelper_exec_async+0xf0/0x160) [ 247.408207][ T4825] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:84e2d7c0 r4:83f0ff00 [ 247.408503][ T4825] [<80270d90>] (call_usermodehelper_exec_async) from [<80200114>] (ret_from_fork+0x14/0x20) [ 247.408963][ T4825] Exception stack(0xe83a5fb0 to 0xe83a5ff8) [ 247.409363][ T4825] 5fa0: 00000000 00000000 00000000 00000000 [ 247.409705][ T4825] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 247.410004][ T4825] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 247.410323][ T4825] r7:00000000 r6:00000000 r5:80270d90 r4:84e2d7c0 [ 247.413708][ T4825] Rebooting in 86400 seconds..