last executing test programs: 8.354644021s ago: executing program 1 (id=2): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ee}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000500)={r1, 0x0, 0x2d, 0x0, @val=@netfilter={0xa, 0x4, 0x600, 0x1}}, 0x20) r2 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000300)={0xa, 0x4e20, 0x5, @mcast1}, 0x1c) 5.424396539s ago: executing program 1 (id=5): r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000300)={0x0, 0xffffffffffffff36, &(0x7f0000000200)="952bb3e006ae9a4c3a"}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0x40044583, 0x0) 4.379880315s ago: executing program 0 (id=6): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d40)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() sendmsg$unix(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000007c0)='>', 0x1}], 0x1, &(0x7f0000001040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r2, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="1c000000000000000100000402000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="e5ffff6e18"], 0xa0}, 0x4004881) 4.014537824s ago: executing program 0 (id=7): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r0}, &(0x7f00000008c0), &(0x7f0000000880)=r1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00:'], 0x48) 3.183881359s ago: executing program 0 (id=8): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000083c0)={{0x1}}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000005600)='sys_enter\x00', r2, 0x0, 0x2}, 0x18) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x4, 0x8}) readv(r0, 0x0, 0x0) 2.134439365s ago: executing program 0 (id=9): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendfile(r3, r2, 0x0, 0x7ffff088) 804.024997ms ago: executing program 0 (id=10): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r1, 0x0, 0x8}, 0x18) chmod(0x0, 0x5) 0s ago: executing program 0 (id=11): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=@framed={{0x18, 0x2, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x75}]}, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r1, 0x0, 0x0}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:14026' (ED25519) to the list of known hosts. [ 213.670730][ T30] audit: type=1400 audit(213.170:46): avc: denied { name_bind } for pid=3316 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 214.079698][ T30] audit: type=1400 audit(213.580:47): avc: denied { execute } for pid=3317 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 214.089312][ T30] audit: type=1400 audit(213.590:48): avc: denied { execute_no_trans } for pid=3317 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 221.183268][ T30] audit: type=1400 audit(220.680:49): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 221.193095][ T30] audit: type=1400 audit(220.690:50): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 221.226938][ T3317] cgroup: Unknown subsys name 'net' [ 221.250090][ T30] audit: type=1400 audit(220.750:51): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 221.535722][ T3317] cgroup: Unknown subsys name 'cpuset' [ 221.607711][ T3317] cgroup: Unknown subsys name 'rlimit' [ 221.908790][ T30] audit: type=1400 audit(221.410:52): avc: denied { setattr } for pid=3317 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 221.913219][ T30] audit: type=1400 audit(221.410:53): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 221.920093][ T30] audit: type=1400 audit(221.420:54): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 222.722948][ T3319] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 222.732088][ T30] audit: type=1400 audit(222.230:55): avc: denied { relabelto } for pid=3319 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 222.746487][ T30] audit: type=1400 audit(222.240:56): avc: denied { write } for pid=3319 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 222.872319][ T30] audit: type=1400 audit(222.370:57): avc: denied { read } for pid=3317 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 222.878855][ T30] audit: type=1400 audit(222.370:58): avc: denied { open } for pid=3317 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 222.919748][ T3317] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 238.086024][ T30] audit: type=1400 audit(237.580:59): avc: denied { execmem } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 238.251539][ T30] audit: type=1400 audit(237.750:60): avc: denied { read } for pid=3322 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 238.258083][ T30] audit: type=1400 audit(237.760:61): avc: denied { open } for pid=3322 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 238.282005][ T30] audit: type=1400 audit(237.780:62): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 238.369031][ T30] audit: type=1400 audit(237.860:64): avc: denied { module_request } for pid=3322 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 238.372783][ T30] audit: type=1400 audit(237.860:63): avc: denied { module_request } for pid=3323 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 238.635839][ T30] audit: type=1400 audit(238.130:65): avc: denied { sys_module } for pid=3322 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 247.173471][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 247.383405][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 247.413426][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 247.592822][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 250.436409][ T3322] hsr_slave_0: entered promiscuous mode [ 250.462330][ T3322] hsr_slave_1: entered promiscuous mode [ 251.201737][ T3323] hsr_slave_0: entered promiscuous mode [ 251.216946][ T3323] hsr_slave_1: entered promiscuous mode [ 251.223049][ T3323] debugfs: 'hsr0' already exists in 'hsr' [ 251.230049][ T3323] Cannot create hsr debugfs directory [ 253.970284][ T30] audit: type=1400 audit(253.470:66): avc: denied { create } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 253.977263][ T30] audit: type=1400 audit(253.470:67): avc: denied { write } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 253.997487][ T30] audit: type=1400 audit(253.490:68): avc: denied { read } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 254.053216][ T3322] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 254.171294][ T3322] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 254.225501][ T3322] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 254.273425][ T3322] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 254.899272][ T3323] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 254.998765][ T3323] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 255.050495][ T3323] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 255.147462][ T3323] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 258.612827][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.125722][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.903748][ T3322] veth0_vlan: entered promiscuous mode [ 271.046799][ T3322] veth1_vlan: entered promiscuous mode [ 271.359716][ T3322] veth0_macvtap: entered promiscuous mode [ 271.429700][ T3322] veth1_macvtap: entered promiscuous mode [ 271.962688][ T41] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 272.010266][ T41] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 272.010849][ T41] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 272.011028][ T41] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 272.101723][ T3323] veth0_vlan: entered promiscuous mode [ 272.303819][ T3323] veth1_vlan: entered promiscuous mode [ 272.509681][ T30] audit: type=1400 audit(272.000:69): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 272.552933][ T30] audit: type=1400 audit(272.050:70): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/syzkaller.CLFl3d/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 272.586008][ T30] audit: type=1400 audit(272.080:71): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 272.673752][ T30] audit: type=1400 audit(272.170:72): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/syzkaller.CLFl3d/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 272.695957][ T30] audit: type=1400 audit(272.190:73): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/syzkaller.CLFl3d/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 272.749269][ T30] audit: type=1400 audit(272.250:74): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 272.773614][ T30] audit: type=1400 audit(272.260:75): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 272.778432][ T30] audit: type=1400 audit(272.270:76): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="gadgetfs" ino=3933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 272.802051][ T30] audit: type=1400 audit(272.300:77): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 272.810110][ T30] audit: type=1400 audit(272.310:78): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 273.087771][ T3323] veth0_macvtap: entered promiscuous mode [ 273.132589][ T3322] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 273.206045][ T3323] veth1_macvtap: entered promiscuous mode [ 274.039566][ T1105] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.040707][ T1105] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.043491][ T1105] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.055336][ T1105] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 277.565493][ T3473] SELinux: failed to load policy [ 277.790225][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 277.790649][ T30] audit: type=1400 audit(277.290:89): avc: denied { prog_run } for pid=3471 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 278.455424][ T30] audit: type=1400 audit(277.950:90): avc: denied { read } for pid=3477 comm="syz.1.5" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 278.473482][ T30] audit: type=1400 audit(277.970:91): avc: denied { open } for pid=3477 comm="syz.1.5" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 278.570059][ T30] audit: type=1400 audit(278.060:92): avc: denied { ioctl } for pid=3477 comm="syz.1.5" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 278.635300][ T30] audit: type=1400 audit(278.120:93): avc: denied { create } for pid=3475 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 278.673423][ T30] audit: type=1400 audit(278.170:94): avc: denied { name_bind } for pid=3475 comm="syz.0.4" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 278.686321][ T30] audit: type=1400 audit(278.180:95): avc: denied { node_bind } for pid=3475 comm="syz.0.4" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 282.043545][ T30] audit: type=1326 audit(281.540:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3489 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 282.053900][ T30] audit: type=1326 audit(281.550:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3489 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 282.116105][ T30] audit: type=1326 audit(281.610:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3489 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 284.219749][ T3495] ------------[ cut here ]------------ [ 284.220403][ T3495] verifier bug: not inlined functions bpf_send_signal_thread#117 is missing func(1) [ 284.226445][ T3495] WARNING: CPU: 0 PID: 3495 at kernel/bpf/verifier.c:22838 do_misc_fixups+0xa938/0xcf04 [ 284.231054][ T3495] Modules linked in: [ 284.234417][ T3495] CPU: 0 UID: 0 PID: 3495 Comm: syz.0.11 Not tainted syzkaller #0 PREEMPT [ 284.235325][ T3495] Hardware name: linux,dummy-virt (DT) [ 284.236064][ T3495] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 284.236491][ T3495] pc : do_misc_fixups+0xa938/0xcf04 [ 284.236793][ T3495] lr : do_misc_fixups+0xa938/0xcf04 [ 284.237099][ T3495] sp : ffff8000a1767450 [ 284.237386][ T3495] x29: ffff8000a1767450 x28: ffff000017688000 x27: ffff00001768e130 [ 284.237944][ T3495] x26: ffff00001768e148 x25: ffff000017688000 x24: 0000000000000000 [ 284.238392][ T3495] x23: ffff00001768e128 x22: 1ffff00011adfa13 x21: ffff80008d6fd098 [ 284.238805][ T3495] x20: ffff8000855855c0 x19: ffff80008556d4a0 x18: 0000000000000000 [ 284.239219][ T3495] x17: 0000000000000000 x16: ffff00006a08a4c4 x15: 0000000000000000 [ 284.239622][ T3495] x14: 00000000000016f0 x13: 0000000000000000 x12: ffff7000142ecdf3 [ 284.240049][ T3495] x11: 1ffff000142ecdf2 x10: ffff7000142ecdf2 x9 : dfff800000000000 [ 284.240516][ T3495] x8 : ffff8000a1766f98 x7 : ffff8000a17670c0 x6 : ffff8000a1767010 [ 284.240952][ T3495] x5 : ffff8000a1766ff8 x4 : 0000000000000000 x3 : 1fffe0000d41313e [ 284.241360][ T3495] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000130bdac0 [ 284.241925][ T3495] Call trace: [ 284.242397][ T3495] do_misc_fixups+0xa938/0xcf04 (P) [ 284.242805][ T3495] bpf_check+0x3c84/0x9508 [ 284.243089][ T3495] bpf_prog_load+0xe2c/0x1b74 [ 284.243355][ T3495] __sys_bpf+0x9c4/0x29c8 [ 284.243604][ T3495] __arm64_sys_bpf+0x70/0xa4 [ 284.243867][ T3495] invoke_syscall+0x6c/0x258 [ 284.244278][ T3495] el0_svc_common.constprop.0+0xac/0x230 [ 284.244582][ T3495] do_el0_svc_compat+0x40/0x68 [ 284.244973][ T3495] el0_svc_compat+0x4c/0x184 [ 284.245236][ T3495] el0t_32_sync_handler+0x88/0xac [ 284.245534][ T3495] el0t_32_sync+0x19c/0x1a0 [ 284.246036][ T3495] irq event stamp: 612 [ 284.246308][ T3495] hardirqs last enabled at (611): [] finish_task_switch.isra.0+0x1a8/0x854 [ 284.246762][ T3495] hardirqs last disabled at (612): [] el1_brk64+0x1c/0x48 [ 284.247142][ T3495] softirqs last enabled at (560): [] handle_softirqs+0x88c/0xdb4 [ 284.247584][ T3495] softirqs last disabled at (517): [] __do_softirq+0x14/0x20 [ 284.248155][ T3495] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 285.997338][ T981] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 286.349708][ T981] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 286.695573][ T981] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 287.098342][ T981] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 287.852377][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 287.852801][ T30] audit: type=1400 audit(287.350:128): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 289.768709][ T981] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 289.855475][ T981] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 289.921759][ T981] bond0 (unregistering): Released all slaves [ 290.403551][ T981] hsr_slave_0: left promiscuous mode [ 290.429618][ T981] hsr_slave_1: left promiscuous mode [ 290.588524][ T981] veth1_macvtap: left promiscuous mode [ 290.592192][ T981] veth0_macvtap: left promiscuous mode [ 290.602551][ T981] veth1_vlan: left promiscuous mode [ 290.613266][ T981] veth0_vlan: left promiscuous mode [ 297.349701][ T981] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 297.592546][ T981] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 297.808241][ T981] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 297.942032][ T981] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 300.451904][ T981] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 300.498899][ T981] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 300.572609][ T981] bond0 (unregistering): Released all slaves [ 300.946145][ T981] hsr_slave_0: left promiscuous mode [ 300.962732][ T981] hsr_slave_1: left promiscuous mode [ 301.028164][ T981] veth1_macvtap: left promiscuous mode [ 301.029048][ T981] veth0_macvtap: left promiscuous mode [ 301.032914][ T981] veth1_vlan: left promiscuous mode [ 301.036458][ T981] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 06:02:45 Registers: info registers vcpu 0 CPU#0 PC=ffff8000853bafa4 X00=ffff0000130be058 X01=0000000000000000 X02=0000000000000003 X03=1fffe00002617c0b X04=1fffe00002617b5a X05=ffff8000871b1ba0 X06=ffff700010e36374 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700010e36374 X11=1ffff00010e36374 X12=ffff700010e36375 X13=0000000000000001 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff0000130bdac0 X20=ffff800085485aa0 X21=ffff0000176f6600 X22=ffff8000a1767450 X23=ffff800080606cc0 X24=0000000000000009 X25=0000000000000000 X26=0000000000000000 X27=ffff800085485880 X28=000000000000001d X29=ffff8000a1767060 X30=ffff8000853baf34 SP=ffff8000a1767030 PSTATE=100003c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=65642f000a732520:7325207334362e25 Q02=656820747563205b:2d2d2d2d2d2d2d2d Q03=000000ff0000ff00:00ff0000000000ff Q04=0000000000000000:000f00f00f00000f Q05=2d2d2d2d2d2d2d2d:2d5d206572656820 Q06=6474656e20316d69:7376656474656e20 Q07=202c315b20746573:203a336d69737665 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffcef6fc00:0000ffffcef6fc00 Q17=ffffff80ffffffd0:0000ffffcef6fbd0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800080311b0c X00=0000000000000000 X01=0000000000000000 X02=ffff00000f713c80 X03=ffff800085440918 X04=0000000000000008 X05=ffff8000a1857908 X06=ffff8000a1857920 X07=ffff8000a1857a00 X08=ffff8000a18578a8 X09=dfff800000000000 X10=ffff70001430af1a X11=1ffff0001430af1a X12=ffff70001430af1b X13=0000000000000000 X14=0000000000013e40 X15=ffff00000f713c88 X16=ffff00006a08a4c4 X17=0000000000000000 X18=0000000000000000 X19=1ffff0001430af88 X20=0000000000000008 X21=0000000020000208 X22=00000000ffffff2e X23=0000000020000208 X24=ffff00000f713c80 X25=00000000ffffff36 X26=ffff600001ee2795 X27=0000000000000008 X28=ffff800085fd80e0 X29=ffff8000a1857bb0 X30=ffff800083667738 SP=ffff8000a1857bb0 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=372f6b636f6c622f:7665642f7379732f Q01=00303a372f6b636f:6c622f7665642f73 Q02=0000000000000000:ffffff0000000000 Q03=ffffffff00000000:ffffffff00ff0000 Q04=0000000000000000:ffff0000ffff0f00 Q05=0000000000000000:00c00000cc000000 Q06=63627c2a6476787c:2a64767c2a72737c Q07=7361647c2a737369:63637c2a65686361 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffca1bd9c0:0000ffffca1bd9c0 Q17=ffffff80ffffffd8:0000ffffca1bd990 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000