last executing test programs: 30.200634646s ago: executing program 1 (id=74): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x18) add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 29.84069703s ago: executing program 1 (id=76): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="24000000340001002bbd7004fee3db250400"], 0x24}, 0x1, 0x0, 0x0, 0x20040050}, 0x24000080) 29.618021835s ago: executing program 1 (id=78): prlimit64(0x0, 0xe, &(0x7f0000000440)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@abs={0x0, 0x0, 0x4e27}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r3}, 0x18) r4 = syz_open_dev$usbfs(&(0x7f0000000080), 0x74, 0x101301) openat(0xffffffffffffff9c, 0x0, 0x4441, 0x42) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000200)) 13.171765057s ago: executing program 1 (id=79): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002a00000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x2}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001cc0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x30bd27, 0x4000005, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x4, 0x0, 0x101, 0x3, 0xc, 0x13}, {0x7, 0x2, 0x8001, 0x200, 0x2, 0x7}, 0xffffff80, 0x947, 0xe03}}, @TCA_TBF_RTAB={0x404, 0x2, [0x6, 0x6, 0x6b16, 0x7, 0xfffffffd, 0x8, 0x8, 0x3, 0x7, 0x7, 0x5, 0x0, 0x80, 0x9, 0x30, 0x8, 0x81, 0x9, 0x2, 0x8, 0x40, 0x8, 0x80000001, 0x80, 0x10000400, 0x7a2, 0x5, 0x400, 0x3, 0xfffffffb, 0x6, 0x6, 0xaf8, 0x1, 0x3, 0x3ff, 0x9, 0x2, 0x3, 0x10001, 0x1, 0x5, 0x10001, 0x3, 0x59, 0x3, 0xd54e, 0x40, 0x6, 0xd, 0x0, 0x28, 0x9, 0xa4800000, 0x1, 0xa0, 0x1, 0x7, 0x4, 0x1, 0x7, 0x4, 0xff, 0x5, 0x7, 0x3ff, 0x3, 0xf6a5, 0x7fffffff, 0x8, 0x2, 0xcff, 0xfffffacf, 0x0, 0x4, 0x10001, 0xa, 0x1, 0x2, 0x8002, 0x5, 0x5, 0x5, 0xfffffffb, 0x5, 0x0, 0x4, 0x4edcaeea, 0x2, 0xe, 0xe, 0xfff, 0x4, 0x496c01fc, 0x4, 0x7fffffff, 0x9, 0x8, 0x12, 0x9, 0x80000001, 0x325b, 0x7, 0x0, 0x80000006, 0x2, 0x3, 0x5, 0x1, 0x18001, 0x5, 0x94, 0x2, 0x9, 0x7, 0x3, 0x5, 0x80, 0x1, 0xffffffff, 0x4, 0x0, 0x4, 0x3, 0x4, 0x5, 0xa993, 0x200, 0x6847adf1, 0x6, 0x9, 0x81, 0x7, 0x5, 0x5, 0x7fffffff, 0x8, 0xc, 0xd, 0x2, 0x1, 0x7fffffff, 0x8, 0x0, 0x8, 0x8, 0x91e, 0x4, 0xe, 0x8001, 0x8, 0x40000, 0x0, 0x9, 0xd, 0x5, 0x8, 0x100, 0x8, 0x0, 0x1, 0x2, 0x9, 0x6, 0x3ff, 0x5, 0x1, 0xf682, 0x40, 0x6, 0x8, 0x3, 0x1fffe, 0xfffdfffe, 0x5, 0x1, 0xfffffff8, 0xa608, 0x23972b48, 0x407, 0x2, 0x0, 0xd, 0x4, 0xa, 0x5, 0x6, 0x10, 0x5, 0x5, 0x10, 0x41, 0x2, 0x76, 0x3, 0xfffffffa, 0x7, 0x2, 0x120004, 0x40, 0x9, 0x6, 0x2ef, 0xfffffffb, 0xcf30, 0x8, 0x4, 0xffffff8a, 0x0, 0x4, 0x80000000, 0x4, 0x2, 0x0, 0x2, 0x6, 0xfff, 0x4, 0x1, 0x40, 0x5, 0x9, 0x5, 0x8, 0x80000000, 0x0, 0x3, 0xeff, 0x6, 0x8001, 0x8, 0xc, 0x3, 0x1, 0x0, 0x5, 0x8, 0x6c67, 0x800, 0xffffff59, 0x9, 0x0, 0x303, 0x7, 0x1, 0x2, 0x6, 0x6561, 0x7, 0x4, 0xc, 0x42, 0x3c04, 0x5f, 0x5fa, 0x1]}]}}]}, 0x45c}}, 0x8000) 13.059451095s ago: executing program 1 (id=80): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="160000000000000005000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000bc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x5, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x304}, "db748d6b120426ad", "4fe429faa1e90c473725b5e429ac42fa", "917e060b", "92816af8b4efb2ad"}, 0x28) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "a6341a1a379332f5", "1fd33c81cf7995313c09de00fd6ded74", "62266bd8", "1e00040000000100"}, 0x28) 12.476478874s ago: executing program 1 (id=81): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_open_dev$loop(0x0, 0x1ff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socket$netlink(0x10, 0x3, 0x8000000004) r4 = socket(0x2, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'team_slave_1\x00', 0x0}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, 0x0, &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x40f00, 0x40, '\x00', r5, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xff}, 0x94) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x5, {0x0, 0x0, 0x0, r5, {0xe, 0x1}, {0x0, 0x3}, {0x0, 0xffe0}}}, 0x24}}, 0x800) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xd, &(0x7f00000003c0)=ANY=[@ANYRES8=r0, @ANYRES32=0x0, @ANYBLOB="4a173a06680fd01414b2731fa9bb537c93a00b928e6c47e67446c0a56bf40f4f6c5a921ed69c9883a855b26831a1f649cd40317e5e11ea9d0ce9d4827daa488eb70e97904865e22bc28681bf3d2cc2", @ANYRES64=r6], &(0x7f00000001c0)='GPL\x00', 0x400, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x3000009, 0x46031, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) 1.95046403s ago: executing program 0 (id=105): r0 = syz_io_uring_setup(0x1ed3, &(0x7f0000000480)={0x0, 0x0, 0x10100, 0x20002, 0x277}, &(0x7f00000002c0)=0x0, &(0x7f0000000140)=0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[], 0x14}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='pids.current\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd_index=0x8, 0x0, 0x0, 0x40000009, 0x7, 0x1}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 1.700961976s ago: executing program 0 (id=106): socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fstat64(r0, &(0x7f0000000080)) 1.372629558s ago: executing program 0 (id=107): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto, @volatile={0x0, 0x0, 0x0, 0x9, 0x2}]}}, 0x0, 0x3e}, 0x28) 1.179370571s ago: executing program 0 (id=108): r0 = socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f00002dd000/0x2000)=nil, 0x2000, 0x300000c, 0x12, r0, 0x4000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/65, 0x328000, 0x800}, 0x20) madvise(&(0x7f0000037000/0x1000)=nil, 0x1000, 0x8) 250.776104ms ago: executing program 0 (id=109): syz_emit_ethernet(0xe, &(0x7f0000001500)={@random="ddd615c93f86", @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}, @void, {@generic={0x88a2}}}, 0x0) 0s ago: executing program 0 (id=110): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0xffff, 0x6, 0x1, 0x5, 0x2, 0xcc7, 0x5, 0x3, 0x5, 0x104, 0x804, 0x1, 0x8, 0x4, 0x6, 0xffffffff, 0x1, 0x1a44a, 0x2, 0x40000003, 0x89, 0x22, 0xf27, 0x6, 0xb, 0x2, 0x5, 0x8, 0xaa, 0x10000, 0xfffffff8]}) kernel console output (not intermixed with test programs): [ 47.733415][ T29] audit: type=1400 audit(47.650:56): avc: denied { read write } for pid=3084 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.735472][ T29] audit: type=1400 audit(47.650:57): avc: denied { open } for pid=3084 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:3336' (ED25519) to the list of known hosts. [ 59.964191][ T29] audit: type=1400 audit(59.880:58): avc: denied { name_bind } for pid=3087 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 62.132154][ T29] audit: type=1400 audit(62.050:59): avc: denied { execute } for pid=3088 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.139838][ T29] audit: type=1400 audit(62.050:60): avc: denied { execute_no_trans } for pid=3088 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.107690][ T29] audit: type=1400 audit(66.020:61): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.112416][ T29] audit: type=1400 audit(66.030:62): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.123408][ T3088] cgroup: Unknown subsys name 'net' [ 66.129154][ T29] audit: type=1400 audit(66.040:63): avc: denied { unmount } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.345058][ T3088] cgroup: Unknown subsys name 'cpuset' [ 66.348804][ T3088] cgroup: Unknown subsys name 'hugetlb' [ 66.350694][ T3088] cgroup: Unknown subsys name 'rlimit' [ 66.546441][ T29] audit: type=1400 audit(66.460:64): avc: denied { setattr } for pid=3088 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.548350][ T29] audit: type=1400 audit(66.460:65): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.550531][ T29] audit: type=1400 audit(66.460:66): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.727885][ T3090] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 66.729365][ T29] audit: type=1400 audit(66.640:67): avc: denied { relabelto } for pid=3090 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.735265][ T29] audit: type=1400 audit(66.650:68): avc: denied { write } for pid=3090 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 66.760911][ T29] audit: type=1400 audit(66.670:69): avc: denied { read } for pid=3088 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.764179][ T29] audit: type=1400 audit(66.670:70): avc: denied { open } for pid=3088 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 74.312126][ T3088] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 76.103161][ T29] audit: type=1400 audit(76.020:71): avc: denied { execmem } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 76.159122][ T29] audit: type=1400 audit(76.070:72): avc: denied { read } for pid=3093 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 76.161634][ T29] audit: type=1400 audit(76.070:73): avc: denied { open } for pid=3093 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 76.170720][ T29] audit: type=1400 audit(76.080:74): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 76.197513][ T29] audit: type=1400 audit(76.110:76): avc: denied { module_request } for pid=3093 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 76.199275][ T29] audit: type=1400 audit(76.110:75): avc: denied { module_request } for pid=3094 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 76.277632][ T29] audit: type=1400 audit(76.190:77): avc: denied { sys_module } for pid=3094 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 76.833351][ T29] audit: type=1400 audit(76.750:78): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 77.895341][ T3093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.905823][ T3093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.995260][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.002928][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.766392][ T3093] hsr_slave_0: entered promiscuous mode [ 78.770219][ T3093] hsr_slave_1: entered promiscuous mode [ 78.887887][ T3094] hsr_slave_0: entered promiscuous mode [ 78.891688][ T3094] hsr_slave_1: entered promiscuous mode [ 78.894015][ T3094] debugfs: 'hsr0' already exists in 'hsr' [ 78.895389][ T3094] Cannot create hsr debugfs directory [ 79.300107][ T29] audit: type=1400 audit(79.210:79): avc: denied { create } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.304429][ T29] audit: type=1400 audit(79.220:80): avc: denied { write } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.313133][ T3093] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 79.327823][ T3093] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 79.334518][ T3093] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 79.346560][ T3093] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 79.408124][ T3094] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 79.420110][ T3094] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 79.432604][ T3094] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 79.452231][ T3094] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 80.153973][ T3093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.225047][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.573962][ T3093] veth0_vlan: entered promiscuous mode [ 82.587156][ T3093] veth1_vlan: entered promiscuous mode [ 82.635460][ T3093] veth0_macvtap: entered promiscuous mode [ 82.649968][ T3093] veth1_macvtap: entered promiscuous mode [ 82.714774][ T1377] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.715207][ T1377] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.715259][ T1377] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.715293][ T1377] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.838851][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 82.840070][ T29] audit: type=1400 audit(82.750:82): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 82.847599][ T29] audit: type=1400 audit(82.760:83): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.qyXf6s/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 82.858860][ T29] audit: type=1400 audit(82.770:84): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 82.870396][ T29] audit: type=1400 audit(82.780:85): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.qyXf6s/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 82.873885][ T3094] veth0_vlan: entered promiscuous mode [ 82.892191][ T29] audit: type=1400 audit(82.800:86): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.qyXf6s/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2228 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 82.896364][ T3094] veth1_vlan: entered promiscuous mode [ 82.906845][ T29] audit: type=1400 audit(82.820:87): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 82.916998][ T29] audit: type=1400 audit(82.830:88): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 82.919904][ T29] audit: type=1400 audit(82.830:89): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="gadgetfs" ino=2229 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 82.938105][ T29] audit: type=1400 audit(82.850:90): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 82.942042][ T29] audit: type=1400 audit(82.850:91): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 82.983355][ T3094] veth0_macvtap: entered promiscuous mode [ 83.008211][ T3094] veth1_macvtap: entered promiscuous mode [ 83.043304][ T3093] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 83.096350][ T55] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.096740][ T55] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.102859][ T55] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.105469][ T55] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.712265][ T1384] usb 2-1: new low-speed USB device number 2 using dummy_hcd [ 84.871706][ T1384] usb 2-1: device descriptor read/64, error -71 [ 85.112451][ T1384] usb 2-1: new low-speed USB device number 3 using dummy_hcd [ 85.241826][ T1384] usb 2-1: device descriptor read/64, error -71 [ 85.353379][ T1384] usb usb2-port1: attempt power cycle [ 85.691695][ T1384] usb 2-1: new low-speed USB device number 4 using dummy_hcd [ 85.715097][ T1384] usb 2-1: device descriptor read/8, error -71 [ 85.951839][ T1384] usb 2-1: new low-speed USB device number 5 using dummy_hcd [ 85.973887][ T1384] usb 2-1: device descriptor read/8, error -71 [ 86.092360][ T1384] usb usb2-port1: unable to enumerate USB device [ 88.826377][ T3717] netlink: 12 bytes leftover after parsing attributes in process `syz.0.6'. [ 89.392481][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 89.394056][ T29] audit: type=1400 audit(89.310:106): avc: denied { create } for pid=3718 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 89.462293][ T29] audit: type=1400 audit(89.360:107): avc: denied { connect } for pid=3718 comm="syz.0.7" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 89.465503][ T29] audit: type=1400 audit(89.380:108): avc: denied { ioctl } for pid=3718 comm="syz.0.7" path="socket:[2267]" dev="sockfs" ino=2267 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 90.161680][ T29] audit: type=1400 audit(90.070:109): avc: denied { create } for pid=3720 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 90.163338][ T29] audit: type=1400 audit(90.070:110): avc: denied { sys_admin } for pid=3720 comm="syz.0.8" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 90.373813][ T3721] VFS: Mount too revealing [ 90.373794][ T29] audit: type=1400 audit(90.290:111): avc: denied { mount } for pid=3720 comm="syz.0.8" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 90.788519][ T29] audit: type=1400 audit(90.700:112): avc: denied { name_bind } for pid=3723 comm="syz.0.9" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 90.790656][ T29] audit: type=1400 audit(90.700:113): avc: denied { node_bind } for pid=3723 comm="syz.0.9" saddr=224.0.0.1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 90.841538][ T29] audit: type=1400 audit(90.750:114): avc: denied { create } for pid=3723 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 90.865442][ T29] audit: type=1400 audit(90.780:115): avc: denied { ioctl } for pid=3723 comm="syz.0.9" path="socket:[2278]" dev="sockfs" ino=2278 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 93.934185][ T3733] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 95.823169][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 95.823952][ T29] audit: type=1400 audit(95.730:120): avc: denied { create } for pid=3745 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 95.856725][ T29] audit: type=1326 audit(95.770:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3745 comm="syz.1.17" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 95.858837][ T29] audit: type=1326 audit(95.770:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3745 comm="syz.1.17" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 95.860697][ T29] audit: type=1326 audit(95.770:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3745 comm="syz.1.17" exe="/syz-executor" sig=0 arch=40000028 syscall=218 compat=0 ip=0x132320 code=0x7ffc0000 [ 95.872826][ T29] audit: type=1326 audit(95.770:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3745 comm="syz.1.17" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 95.875703][ T29] audit: type=1326 audit(95.790:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3745 comm="syz.1.17" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 97.282341][ T3754] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 97.401310][ C1] hrtimer: interrupt took 5487360 ns [ 97.440780][ T3754] usb 1-1: device descriptor read/64, error -71 [ 97.711812][ T3754] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 97.973308][ T3754] usb 1-1: device descriptor read/64, error -71 [ 98.083615][ T3754] usb usb1-port1: attempt power cycle [ 98.582615][ T3754] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 98.611858][ T3754] usb 1-1: device descriptor read/8, error -71 [ 98.972631][ T3754] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 99.041643][ T3754] usb 1-1: device descriptor read/8, error -71 [ 99.164484][ T3754] usb usb1-port1: unable to enumerate USB device [ 115.394464][ T29] audit: type=1400 audit(115.310:126): avc: denied { create } for pid=3770 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 115.409778][ T29] audit: type=1400 audit(115.320:127): avc: denied { write } for pid=3770 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 115.968817][ T29] audit: type=1326 audit(115.870:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3772 comm="syz.0.23" exe="/syz-executor" sig=9 arch=40000028 syscall=119 compat=0 ip=0xef3e8 code=0x0 [ 116.772788][ T29] audit: type=1326 audit(116.690:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3778 comm="syz.1.25" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 116.783285][ T29] audit: type=1326 audit(116.690:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3778 comm="syz.1.25" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 116.794985][ T29] audit: type=1326 audit(116.710:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3778 comm="syz.1.25" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 116.796544][ T29] audit: type=1326 audit(116.710:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3778 comm="syz.1.25" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 116.871712][ T29] audit: type=1326 audit(116.760:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3778 comm="syz.1.25" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 116.875133][ T29] audit: type=1326 audit(116.790:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3778 comm="syz.1.25" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 116.879508][ T29] audit: type=1326 audit(116.790:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3778 comm="syz.1.25" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 117.242097][ T3779] netlink: 4 bytes leftover after parsing attributes in process `syz.1.25'. [ 119.583353][ T3805] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 120.242037][ T3813] syzkaller0: entered promiscuous mode [ 120.243140][ T3813] syzkaller0: entered allmulticast mode [ 121.965780][ T3830] Zero length message leads to an empty skb [ 126.757148][ T29] kauditd_printk_skb: 75 callbacks suppressed [ 126.758573][ T29] audit: type=1400 audit(126.670:211): avc: denied { setopt } for pid=3877 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 126.927755][ T3879] veth2: entered promiscuous mode [ 126.927999][ T3879] veth2: entered allmulticast mode [ 129.927466][ T3903] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 129.944483][ T3903] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 135.389091][ T29] audit: type=1400 audit(135.300:212): avc: denied { execute } for pid=3985 comm="syz.1.60" name="file0" dev="tmpfs" ino=130 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 135.396659][ T3987] process 'syz.1.60' launched './file0' with NULL argv: empty string added [ 135.402027][ T29] audit: type=1400 audit(135.310:213): avc: denied { execute_no_trans } for pid=3985 comm="syz.1.60" path="/22/file0" dev="tmpfs" ino=130 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 135.913132][ T29] audit: type=1400 audit(135.830:214): avc: denied { create } for pid=3997 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 135.920277][ T29] audit: type=1400 audit(135.830:215): avc: denied { bind } for pid=3997 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 135.923662][ T29] audit: type=1400 audit(135.830:216): avc: denied { write } for pid=3997 comm="syz.0.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 136.008253][ T29] audit: type=1400 audit(135.920:217): avc: denied { create } for pid=4000 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 136.014722][ T29] audit: type=1400 audit(135.920:218): avc: denied { setopt } for pid=4000 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 136.732210][ T29] audit: type=1326 audit(136.640:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 136.736081][ T29] audit: type=1326 audit(136.650:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 136.748508][ T29] audit: type=1326 audit(136.660:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.68" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 154.709777][ T4047] sch_tbf: peakrate 7 is lower than or equals to rate 19 ! [ 154.916379][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 154.918815][ T29] audit: type=1400 audit(154.830:242): avc: denied { module_request } for pid=4048 comm="syz.1.80" kmod="crypto-gcm(aes)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 155.642428][ T29] audit: type=1400 audit(155.560:243): avc: denied { execmem } for pid=4053 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 156.942357][ T29] audit: type=1400 audit(156.850:244): avc: denied { write } for pid=4055 comm="syz.0.82" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 159.132298][ T29] audit: type=1400 audit(159.040:245): avc: denied { create } for pid=4062 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 159.818086][ T29] audit: type=1400 audit(159.730:246): avc: denied { create } for pid=4053 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 159.836995][ T29] audit: type=1400 audit(159.750:247): avc: denied { ioctl } for pid=4053 comm="syz.1.81" path="socket:[2582]" dev="sockfs" ino=2582 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 159.999486][ T29] audit: type=1400 audit(159.910:248): avc: denied { sys_module } for pid=4053 comm="syz.1.81" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 160.132276][ T29] audit: type=1326 audit(160.050:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4073 comm="syz.0.88" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 160.137979][ T29] audit: type=1326 audit(160.050:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4073 comm="syz.0.88" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 160.142098][ T29] audit: type=1326 audit(160.050:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4073 comm="syz.0.88" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 160.142420][ T29] audit: type=1326 audit(160.050:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4073 comm="syz.0.88" exe="/syz-executor" sig=0 arch=40000028 syscall=301 compat=0 ip=0x132320 code=0x7ffc0000 [ 160.142509][ T29] audit: type=1326 audit(160.050:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4073 comm="syz.0.88" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 160.142560][ T29] audit: type=1326 audit(160.050:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4073 comm="syz.0.88" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 160.142604][ T29] audit: type=1326 audit(160.050:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4073 comm="syz.0.88" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 160.142647][ T29] audit: type=1326 audit(160.050:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4073 comm="syz.0.88" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132320 code=0x7ffc0000 [ 160.142700][ T29] audit: type=1326 audit(160.050:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4073 comm="syz.0.88" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132320 code=0x7ffc0000 [ 160.272252][ T4068] netlink: 4 bytes leftover after parsing attributes in process `syz.1.81'. [ 160.882427][ T4083] veth0_vlan: entered allmulticast mode [ 161.034925][ T4085] wg2: entered promiscuous mode [ 161.036399][ T4085] wg2: entered allmulticast mode [ 165.282711][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 165.292884][ T29] audit: type=1400 audit(165.190:260): avc: denied { create } for pid=4107 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 165.302392][ T29] audit: type=1400 audit(165.210:261): avc: denied { write } for pid=4107 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 165.542427][ T29] audit: type=1400 audit(165.460:262): avc: denied { block_suspend } for pid=4109 comm="syz.0.103" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 165.556849][ T29] audit: type=1400 audit(165.470:263): avc: denied { nlmsg_read } for pid=4109 comm="syz.0.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 165.582780][ T4110] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4110 comm=syz.0.103 [ 165.793185][ T29] audit: type=1400 audit(165.710:264): avc: denied { create } for pid=4115 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 165.799415][ T29] audit: type=1400 audit(165.710:265): avc: denied { write } for pid=4115 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 165.813687][ T4116] netlink: 'syz.0.104': attribute type 7 has an invalid length. [ 165.958446][ T29] audit: type=1400 audit(165.870:266): avc: denied { allowed } for pid=4117 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 165.973398][ T29] audit: type=1400 audit(165.890:267): avc: denied { create } for pid=4117 comm="syz.0.105" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 165.978457][ T29] audit: type=1400 audit(165.890:268): avc: denied { map } for pid=4117 comm="syz.0.105" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3595 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 165.980959][ T29] audit: type=1400 audit(165.890:269): avc: denied { read write } for pid=4117 comm="syz.0.105" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3595 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 167.930380][ T4129] 8<--- cut here --- [ 167.942488][ T4129] Unable to handle kernel paging request at virtual address fee0ffff when write [ 167.943890][ T4129] [fee0ffff] *pgd=80000080007003, *pmd=00000000 [ 167.965284][ T4129] Internal error: Oops: a06 [#1] SMP ARM [ 167.967512][ T4129] Modules linked in: [ 167.968369][ T4129] CPU: 1 UID: 0 PID: 4129 Comm: syz.0.110 Not tainted syzkaller #0 PREEMPT [ 167.968871][ T4129] Hardware name: ARM-Versatile Express [ 167.969306][ T4129] PC is at parport_attach+0x174/0x1d0 [ 167.970238][ T4129] LR is at parport_attach+0x164/0x1d0 [ 167.970500][ T4129] pc : [<81408878>] lr : [<81408868>] psr: 60000013 [ 167.971705][ T4129] sp : e01c5d28 ip : e01c5d28 fp : e01c5d4c [ 167.972094][ T4129] r10: 82b28ad8 r9 : 00000003 r8 : 84043c00 [ 167.972472][ T4129] r7 : e01c5d88 r6 : 84043c00 r5 : 00000000 r4 : 00000000 [ 167.972737][ T4129] r3 : fee0ffff r2 : 81e1a338 r1 : 00000001 r0 : 814084e8 [ 167.973121][ T4129] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 167.973448][ T4129] Control: 30c5387d Table: 86003c40 DAC: 00000000 [ 167.973769][ T4129] Register r0 information: non-slab/vmalloc memory [ 167.974755][ T4129] Register r1 information: non-paged memory [ 167.975112][ T4129] Register r2 information: non-slab/vmalloc memory [ 167.975384][ T4129] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 167.976015][ T4129] Register r4 information: NULL pointer [ 167.976282][ T4129] Register r5 information: NULL pointer [ 167.976590][ T4129] Register r6 information: slab kmalloc-192 start 84043c00 pointer offset 0 size 192 [ 167.977690][ T4129] Register r7 information: 2-page vmalloc region starting at 0xe01c4000 allocated at kernel_clone+0xac/0x3ec [ 167.978285][ T4129] Register r8 information: slab kmalloc-192 start 84043c00 pointer offset 0 size 192 [ 167.979089][ T4129] Register r9 information: non-paged memory [ 167.979425][ T4129] Register r10 information: non-slab/vmalloc memory [ 167.979816][ T4129] Register r11 information: 2-page vmalloc region starting at 0xe01c4000 allocated at kernel_clone+0xac/0x3ec [ 167.980587][ T4129] Register r12 information: 2-page vmalloc region starting at 0xe01c4000 allocated at kernel_clone+0xac/0x3ec [ 167.981628][ T4129] Process syz.0.110 (pid: 4129, stack limit = 0xe01c4000) [ 167.982334][ T4129] Stack: (0xe01c5d28 to 0xe01c6000) [ 167.982773][ T4129] 5d20: 82432d94 84043c00 829d3f08 829d3f08 81e1a7f8 84043c44 [ 167.983142][ T4129] 5d40: e01c5d84 e01c5d50 81404520 81408710 84043c30 00000000 e01c5d74 200000c0 [ 167.983477][ T4129] 5d60: 84043c00 b5403587 84043c30 84598c00 40946400 00000003 e01c5e44 e01c5d88 [ 167.983780][ T4129] 5d80: 813ffe78 81404424 656d6f63 705f6964 6f707261 00007472 00000000 0000ffff [ 167.984093][ T4129] 5da0: 00000006 00000001 00000005 00000002 00000cc7 00000005 00000003 00000005 [ 167.984611][ T4129] 5dc0: 00000104 00000804 00000001 00000008 00000004 00000006 ffffffff 00000001 [ 167.984905][ T4129] 5de0: 0001a44a 00000002 40000003 00000089 00000022 00000f27 00000006 0000000b [ 167.985200][ T4129] 5e00: 00000002 00000005 00000008 000000aa 00010000 fffffff8 00000000 f75ad597 [ 167.985554][ T4129] 5e20: 00000000 863819c0 84043c00 200000c0 84043c30 84598c00 e01c5f14 e01c5e48 [ 167.985931][ T4129] 5e40: 81400e6c 813ffd84 00000000 00000000 00000000 00000000 00000000 f75ad597 [ 167.986218][ T4129] 5e60: 00000000 00000000 824a35ec 0000005f 84097408 00000064 8467d7a4 84598c00 [ 167.986535][ T4129] 5e80: e01c5ee4 e01c5e90 807b7d38 807ae25c 00000064 00000001 00000000 e01c5eac [ 167.986926][ T4129] 5ea0: 860cab50 8342fcc0 00006400 0000000b e01c5ea0 00000000 00000000 f75ad597 [ 167.987258][ T4129] 5ec0: 863819c0 40946400 200000c0 200000c0 863819c0 00000003 e01c5ef4 e01c5ee8 [ 167.987544][ T4129] 5ee0: 807b7e58 f75ad597 e01c5f14 40946400 00000000 863819c1 200000c0 863819c0 [ 167.987820][ T4129] 5f00: 00000003 84598c00 e01c5fa4 e01c5f18 805854f4 814008bc ecac8b10 84598c00 [ 167.988157][ T4129] 5f20: e01c5f3c e01c5f30 81aaf31c 81aaf1ec e01c5f54 e01c5f40 8025bcbc 8028e07c [ 167.988449][ T4129] 5f40: e01c5fb0 40000000 e01c5f84 e01c5f58 80221a38 8025bc78 00000000 8281d17c [ 167.988755][ T4129] 5f60: e01c5fb0 0014c880 ecac8b10 8022198c 00000000 f75ad597 e01c5fac 00000000 [ 167.989159][ T4129] 5f80: 00000000 00316310 00000036 8020029c 84598c00 00000036 00000000 e01c5fa8 [ 167.989512][ T4129] 5fa0: 80200060 805853d0 00000000 00000000 00000003 40946400 200000c0 00000000 [ 167.989789][ T4129] 5fc0: 00000000 00000000 00316310 00000036 00300000 00000000 00006364 76f170bc [ 167.990058][ T4129] 5fe0: 76f16ec0 76f16eb0 0001929c 00132320 60000010 00000003 00000000 00000000 [ 167.990457][ T4129] Call trace: [ 167.990850][ T4129] [<81408704>] (parport_attach) from [<81404520>] (comedi_device_attach+0x108/0x250) [ 167.991771][ T4129] r6:84043c44 r5:81e1a7f8 r4:829d3f08 [ 167.992103][ T4129] [<81404418>] (comedi_device_attach) from [<813ffe78>] (do_devconfig_ioctl+0x100/0x220) [ 167.992513][ T4129] r10:00000003 r9:40946400 r8:84598c00 r7:84043c30 r6:b5403587 r5:84043c00 [ 167.992852][ T4129] r4:200000c0 [ 167.993044][ T4129] [<813ffd78>] (do_devconfig_ioctl) from [<81400e6c>] (comedi_unlocked_ioctl+0x5bc/0x1c2c) [ 167.993447][ T4129] r8:84598c00 r7:84043c30 r6:200000c0 r5:84043c00 r4:863819c0 [ 167.993693][ T4129] [<814008b0>] (comedi_unlocked_ioctl) from [<805854f4>] (sys_ioctl+0x130/0xba0) [ 167.994067][ T4129] r10:84598c00 r9:00000003 r8:863819c0 r7:200000c0 r6:863819c1 r5:00000000 [ 167.994376][ T4129] r4:40946400 [ 167.994559][ T4129] [<805853c4>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 167.995013][ T4129] Exception stack(0xe01c5fa8 to 0xe01c5ff0) [ 167.995317][ T4129] 5fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 167.995822][ T4129] 5fc0: 00000000 00000000 00316310 00000036 00300000 00000000 00006364 76f170bc [ 167.996202][ T4129] 5fe0: 76f16ec0 76f16eb0 0001929c 00132320 [ 167.996449][ T4129] r10:00000036 r9:84598c00 r8:8020029c r7:00000036 r6:00316310 r5:00000000 [ 167.996870][ T4129] r4:00000000 [ 167.997378][ T4129] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 167.999589][ T4129] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 168.098026][ T4129] Kernel panic - not syncing: Fatal exception [ 168.101314][ T4129] Rebooting in 86400 seconds.. VM DIAGNOSIS: 05:43:47 Registers: info registers vcpu 0 CPU#0 R00=00000007 R01=7e98f000 R02=00000001 R03=00008244 R04=7e8dc16c R05=00000000 R06=00526ff0 R07=012e4680 R08=7e98f070 R09=7e8dc120 R10=00000001 R11=7e8dc104 R12=7e98f090 R13=7e8dc0a8 R14=76989c1c R15=7e993934 PSR=20010010 --C- A S usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=860d98c7 R01=00000639 R02=00000025 R03=6d726570 R04=822e020e R05=860d9f00 R06=822e0200 R07=85339dc0 R08=822e5160 R09=85339dc0 R10=84b20980 R11=ebd09aa4 R12=ebd09a88 R13=ebd09b10 R14=80904ec4 R15=81abcae8 PSR=600f0013 -ZC- A S svc32 s00=72656820 s01=2d2d2065 d00=2d2d206572656820 s02=00000000 s03=00000000 d01=0000000000000000 s04=ef0cee00 s05=ef0cee00 d02=ef0cee00ef0cee00 s06=08040200 s07=80402000 d03=8040200008040200 s08=00000c00 s09=c0200c03 d04=c0200c0300000c00 s10=08040201 s11=80402000 d05=8040200008040201 s12=08040201 s13=80402010 d06=8040201008040201 s14=08040201 s15=80402010 d07=8040201008040201 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000