last executing test programs: 18.476878787s ago: executing program 1 (id=57): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000005c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_STATION(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x24, r0, 0x121, 0x70bd2c, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xc}]}, 0x24}}, 0x0) 16.939951059s ago: executing program 1 (id=58): r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write(r0, 0x0, 0x0) 16.529861896s ago: executing program 1 (id=59): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22, @multicast1}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0xce22, 0x7f, @ipv4={'\x00', '\xff\xff', @multicast1}, 0xffffffff}, 0x1c) listen(r0, 0x0) listen(r1, 0x2) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000280)="580000001400192340834b80040d8c560a0677bc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd000000100001000c081000418e00000004fcff", 0x58}], 0x1) 15.353648334s ago: executing program 1 (id=60): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r0}, 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040), 0x0, 0x40) ioctl$SNDRV_PCM_IOCTL_RESET(r1, 0x4141, 0x0) 14.821550929s ago: executing program 1 (id=61): openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) clock_gettime(0x7, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TIOCCONS(r0, 0x541d) 14.330160662s ago: executing program 1 (id=62): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r3, 0x29, 0x3e, &(0x7f00002cef88)="d84f7398", 0x4) 7.10339862s ago: executing program 0 (id=66): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0xc2040) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000100)={0x81, 0xe, 0x4bf, 0x101, 0x17, "d4009b535c07454a"}) r2 = epoll_create(0x9) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000000c0)={0x10000000}) r3 = dup(r1) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000240)=0x12) read$FUSE(r3, &(0x7f0000002400)={0x2020}, 0x2020) 6.765368553s ago: executing program 0 (id=67): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x800001000088}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000700)) ioctl$KDSKBENT(0xffffffffffffffff, 0x560a, 0x0) r0 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) fchdir(r1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000000000000000380000000000000000191bda00002000010000000002"], 0x69) creat(0x0, 0x142) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r2) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000000)=ANY=[@ANYBLOB="88020000", @ANYRES16=r3, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r4, @ANYBLOB="6102330050300100080211000001080211000000505050505050"], 0x288}, 0x1, 0x0, 0x0, 0x800}, 0x0) 5.88869817s ago: executing program 0 (id=68): mount(0x0, &(0x7f0000000140)='.\x00', 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x1214040, 0x0) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000180)={0x73622a85, 0x2301, 0x400000000000001}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) r2 = dup3(r0, r1, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000001c0)={0x20, 0x0, &(0x7f0000002580)=[@request_death, @clear_death], 0x0, 0x0, 0x0}) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000480)={0x2020}, 0x2020) 5.219375085s ago: executing program 0 (id=69): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x43, 0x107, 0xbffffffe, 0x25dfdbfc, {0x7, 0x7c}}, 0x14}}, 0xc000) write(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x804}, 0x2002c810) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) recvmmsg(r2, 0x0, 0x0, 0x2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) pread64(r3, 0x0, 0x0, 0x7) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8b26, &(0x7f0000000000)={'wlan1\x00'}) 510.827626ms ago: executing program 0 (id=70): rseq(&(0x7f0000000400), 0x20, 0x0, 0x0) chmod(0x0, 0x257) rt_sigqueueinfo(0x0, 0x15, &(0x7f00000002c0)={0x21, 0x5, 0x5e2e}) 0s ago: executing program 0 (id=71): request_key(&(0x7f0000000040)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000400)='GPL\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) kernel console output (not intermixed with test programs): [ 52.821350][ T28] audit: type=1400 audit(52.720:56): avc: denied { read write } for pid=3079 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.824120][ T28] audit: type=1400 audit(52.730:57): avc: denied { open } for pid=3079 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:39397' (ED25519) to the list of known hosts. [ 68.868809][ T28] audit: type=1400 audit(68.760:58): avc: denied { name_bind } for pid=3082 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 70.185439][ T28] audit: type=1400 audit(70.080:59): avc: denied { execute } for pid=3083 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 70.261566][ T28] audit: type=1400 audit(70.140:60): avc: denied { execute_no_trans } for pid=3083 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 74.355553][ T28] audit: type=1400 audit(74.260:61): avc: denied { mounton } for pid=3083 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 74.359870][ T28] audit: type=1400 audit(74.260:62): avc: denied { mount } for pid=3083 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.377759][ T3083] cgroup: Unknown subsys name 'net' [ 74.387975][ T28] audit: type=1400 audit(74.290:63): avc: denied { unmount } for pid=3083 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.552972][ T3083] cgroup: Unknown subsys name 'cpuset' [ 74.559643][ T3083] cgroup: Unknown subsys name 'hugetlb' [ 74.560686][ T3083] cgroup: Unknown subsys name 'rlimit' [ 74.756070][ T28] audit: type=1400 audit(74.660:64): avc: denied { setattr } for pid=3083 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.758048][ T28] audit: type=1400 audit(74.660:65): avc: denied { mounton } for pid=3083 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 74.760594][ T28] audit: type=1400 audit(74.660:66): avc: denied { mount } for pid=3083 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 74.974044][ T3085] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 74.977101][ T28] audit: type=1400 audit(74.880:67): avc: denied { relabelto } for pid=3085 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 74.981630][ T28] audit: type=1400 audit(74.880:68): avc: denied { write } for pid=3085 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 75.020389][ T28] audit: type=1400 audit(74.920:69): avc: denied { read } for pid=3083 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 75.024737][ T28] audit: type=1400 audit(74.930:70): avc: denied { open } for pid=3083 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 82.225597][ T3083] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 84.503629][ T28] audit: type=1400 audit(84.410:71): avc: denied { execmem } for pid=3086 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 84.571868][ T28] audit: type=1400 audit(84.460:72): avc: denied { read } for pid=3088 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.573860][ T28] audit: type=1400 audit(84.480:73): avc: denied { open } for pid=3088 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 84.578122][ T28] audit: type=1400 audit(84.480:74): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 84.603927][ T28] audit: type=1400 audit(84.510:75): avc: denied { module_request } for pid=3089 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 84.605451][ T28] audit: type=1400 audit(84.510:76): avc: denied { module_request } for pid=3088 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 84.695628][ T28] audit: type=1400 audit(84.600:77): avc: denied { sys_module } for pid=3089 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 85.363616][ T28] audit: type=1400 audit(85.270:78): avc: denied { ioctl } for pid=3088 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 86.408717][ T3088] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.424214][ T3088] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.633136][ T3089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 86.636893][ T3089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.247068][ T3089] hsr_slave_0: entered promiscuous mode [ 87.254333][ T3089] hsr_slave_1: entered promiscuous mode [ 87.387234][ T3088] hsr_slave_0: entered promiscuous mode [ 87.389639][ T3088] hsr_slave_1: entered promiscuous mode [ 87.394316][ T3088] debugfs: 'hsr0' already exists in 'hsr' [ 87.395995][ T3088] Cannot create hsr debugfs directory [ 87.782201][ T28] audit: type=1400 audit(87.680:79): avc: denied { create } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 87.783167][ T28] audit: type=1400 audit(87.690:80): avc: denied { write } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 87.787730][ T3089] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 87.802288][ T3089] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 87.816154][ T3089] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 87.835249][ T3089] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 87.909391][ T3088] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 87.918148][ T3088] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 87.946759][ T3088] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 87.955757][ T3088] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 88.726090][ T3089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.793474][ T3088] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.377896][ T3088] veth0_vlan: entered promiscuous mode [ 91.392289][ T3088] veth1_vlan: entered promiscuous mode [ 91.463784][ T3088] veth0_macvtap: entered promiscuous mode [ 91.479318][ T3088] veth1_macvtap: entered promiscuous mode [ 91.589985][ T37] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.619668][ T37] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.624148][ T2521] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.627783][ T2521] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.674563][ T3089] veth0_vlan: entered promiscuous mode [ 91.742565][ T3089] veth1_vlan: entered promiscuous mode [ 91.753882][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 91.754199][ T28] audit: type=1400 audit(91.640:82): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 91.759823][ T28] audit: type=1400 audit(91.660:83): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/syzkaller.CB7ES9/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 91.766641][ T28] audit: type=1400 audit(91.670:84): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 91.779691][ T28] audit: type=1400 audit(91.680:85): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/syzkaller.CB7ES9/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 91.786104][ T28] audit: type=1400 audit(91.690:86): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/syzkaller.CB7ES9/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2180 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 91.809666][ T28] audit: type=1400 audit(91.710:87): avc: denied { unmount } for pid=3088 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 91.820469][ T28] audit: type=1400 audit(91.720:88): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 91.829940][ T28] audit: type=1400 audit(91.730:89): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="gadgetfs" ino=2181 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 91.839215][ T28] audit: type=1400 audit(91.740:90): avc: denied { mount } for pid=3088 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 91.854858][ T28] audit: type=1400 audit(91.760:91): avc: denied { mounton } for pid=3088 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 91.884390][ T3089] veth0_macvtap: entered promiscuous mode [ 91.897137][ T3089] veth1_macvtap: entered promiscuous mode [ 91.980237][ T3088] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 91.986445][ T37] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.005012][ T37] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.005488][ T37] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.005839][ T37] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.022426][ T42] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 94.192149][ T42] usb 1-1: Using ep0 maxpacket: 16 [ 94.359768][ T42] usb 1-1: unable to get BOS descriptor or descriptor too short [ 94.362307][ T42] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 94.362950][ T42] usb 1-1: can't read configurations, error -71 [ 94.931494][ T10] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 95.096358][ T10] usb 2-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.00 [ 95.096648][ T10] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 95.101862][ T10] usb 2-1: Product: syz [ 95.102236][ T10] usb 2-1: Manufacturer: syz [ 95.102284][ T10] usb 2-1: SerialNumber: syz [ 95.793020][ T10] rtl8150 2-1:1.0: eth1: rtl8150 is detected [ 96.005860][ T2874] usb 2-1: USB disconnect, device number 2 [ 97.274550][ T3886] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.8' sets config #-1 [ 97.579837][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 97.580213][ T28] audit: type=1326 audit(97.480:102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 97.584481][ T28] audit: type=1326 audit(97.490:103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 97.586093][ T28] audit: type=1326 audit(97.490:104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 97.587367][ T28] audit: type=1326 audit(97.490:105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 97.589349][ T28] audit: type=1326 audit(97.490:106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 97.590799][ T28] audit: type=1326 audit(97.490:107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 97.594105][ T28] audit: type=1326 audit(97.500:108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 97.595933][ T28] audit: type=1326 audit(97.500:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=71 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 97.597356][ T28] audit: type=1326 audit(97.500:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 97.598893][ T28] audit: type=1326 audit(97.500:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3928 comm="syz.0.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 98.491526][ T10] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 98.814751][ T10] usb 1-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.00 [ 98.815824][ T10] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 98.819408][ T10] usb 1-1: Product: syz [ 98.819769][ T10] usb 1-1: Manufacturer: syz [ 98.819820][ T10] usb 1-1: SerialNumber: syz [ 99.793488][ T10] rtl8150 1-1:1.0: eth1: rtl8150 is detected [ 100.112816][ T40] usb 1-1: USB disconnect, device number 4 [ 102.232533][ T707] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 102.438563][ T707] usb 1-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.00 [ 102.438897][ T707] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 102.439164][ T707] usb 1-1: Product: syz [ 102.439211][ T707] usb 1-1: Manufacturer: syz [ 102.439235][ T707] usb 1-1: SerialNumber: syz [ 103.284712][ T707] rtl8150 1-1:1.0: eth1: rtl8150 is detected [ 103.506429][ T707] usb 1-1: USB disconnect, device number 5 [ 103.742410][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 103.742965][ T28] audit: type=1400 audit(103.640:127): avc: denied { write } for pid=4072 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 103.776395][ T28] audit: type=1400 audit(103.680:128): avc: denied { write } for pid=4072 comm="syz.1.20" name="ptype" dev="proc" ino=4026532757 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 103.841559][ T28] audit: type=1400 audit(103.740:129): avc: denied { prog_load } for pid=4090 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 103.859368][ T28] audit: type=1400 audit(103.760:130): avc: denied { perfmon } for pid=4090 comm="syz.0.21" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 103.897833][ T4091] pimreg: entered allmulticast mode [ 104.254341][ T3845] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 104.412671][ T3845] usb 1-1: Using ep0 maxpacket: 32 [ 104.423516][ T3845] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 32 [ 104.458323][ T3845] usb 1-1: New USB device found, idVendor=0499, idProduct=1010, bcdDevice= a.f5 [ 104.460309][ T3845] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 104.464272][ T3845] usb 1-1: Product: syz [ 104.467129][ T3845] usb 1-1: Manufacturer: syz [ 104.469430][ T3845] usb 1-1: SerialNumber: syz [ 104.478793][ T3845] usb 1-1: config 0 descriptor?? [ 104.606507][ T4097] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 104.624687][ T3845] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 104.985014][ T3845] usb 1-1: USB disconnect, device number 6 [ 106.792036][ T9] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 106.989970][ T9] usb 2-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.00 [ 106.992449][ T9] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 106.994054][ T9] usb 2-1: Product: syz [ 106.994794][ T9] usb 2-1: Manufacturer: syz [ 106.995553][ T9] usb 2-1: SerialNumber: syz [ 107.678329][ T9] rtl8150 2-1:1.0: eth1: rtl8150 is detected [ 107.876131][ T2874] usb 2-1: USB disconnect, device number 3 [ 108.178457][ T28] audit: type=1400 audit(108.080:131): avc: denied { map_create } for pid=4155 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 108.178902][ T28] audit: type=1400 audit(108.080:132): avc: denied { map_read map_write } for pid=4155 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 109.942251][ T2874] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 110.119113][ T2874] usb 2-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.00 [ 110.119418][ T2874] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 110.119698][ T2874] usb 2-1: Product: syz [ 110.119750][ T2874] usb 2-1: Manufacturer: syz [ 110.119806][ T2874] usb 2-1: SerialNumber: syz [ 110.163888][ T40] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 110.322220][ T40] usb 1-1: Using ep0 maxpacket: 32 [ 110.330172][ T40] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 32 [ 110.342986][ T40] usb 1-1: New USB device found, idVendor=0499, idProduct=1010, bcdDevice= a.f5 [ 110.343499][ T40] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 110.344590][ T40] usb 1-1: Product: syz [ 110.345016][ T40] usb 1-1: Manufacturer: syz [ 110.345685][ T40] usb 1-1: SerialNumber: syz [ 110.368246][ T40] usb 1-1: config 0 descriptor?? [ 110.372181][ T4182] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 110.389815][ T40] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 110.598272][ T9] usb 1-1: USB disconnect, device number 7 [ 110.833506][ T2874] rtl8150 2-1:1.0: couldn't reset the device [ 110.834435][ T2874] rtl8150 2-1:1.0: probe with driver rtl8150 failed with error -5 [ 110.840110][ T2874] usb 2-1: USB disconnect, device number 4 [ 111.241939][ T9] usb 1-1: new full-speed USB device number 8 using dummy_hcd [ 111.399522][ T9] usb 1-1: New USB device found, idVendor=056e, idProduct=4010, bcdDevice=20.1c [ 111.400774][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 111.406137][ T9] usb 1-1: config 0 descriptor?? [ 112.454141][ T9] pegasus 1-1:0.0: probe with driver pegasus failed with error -71 [ 112.463566][ T9] usb 1-1: USB disconnect, device number 8 [ 112.559953][ T28] audit: type=1400 audit(112.460:133): avc: denied { mount } for pid=4241 comm="syz.0.36" name="/" dev="ramfs" ino=2342 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 112.604942][ T28] audit: type=1400 audit(112.510:134): avc: denied { execute } for pid=4241 comm="syz.0.36" name="file0" dev="ramfs" ino=2343 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 112.610444][ T4242] process 'syz.0.36' launched './file0' with NULL argv: empty string added [ 112.614243][ T28] audit: type=1400 audit(112.520:135): avc: denied { execute_no_trans } for pid=4241 comm="syz.0.36" path="/file0" dev="ramfs" ino=2343 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 112.726488][ T4244] capability: warning: `syz.0.37' uses deprecated v2 capabilities in a way that may be insecure [ 112.795692][ T28] audit: type=1400 audit(112.700:136): avc: denied { prog_run } for pid=4243 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 113.551971][ T707] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 113.787684][ T707] usb 1-1: New USB device found, idVendor=0bda, idProduct=8150, bcdDevice= 0.00 [ 113.788941][ T707] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 113.789879][ T707] usb 1-1: Product: syz [ 113.790531][ T707] usb 1-1: Manufacturer: syz [ 113.791999][ T707] usb 1-1: SerialNumber: syz [ 113.811604][ T28] audit: type=1400 audit(113.710:137): avc: denied { append } for pid=4252 comm="syz.1.39" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 114.528218][ T707] rtl8150 1-1:1.0: couldn't reset the device [ 114.528758][ T707] rtl8150 1-1:1.0: probe with driver rtl8150 failed with error -5 [ 114.537270][ T707] usb 1-1: USB disconnect, device number 9 [ 115.419363][ T28] audit: type=1400 audit(115.320:138): avc: denied { ioctl } for pid=4267 comm="syz.0.41" path="socket:[3414]" dev="sockfs" ino=3414 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 117.562126][ T28] audit: type=1400 audit(117.450:139): avc: denied { load_policy } for pid=4277 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 117.576548][ T4278] SELinux: failed to load policy [ 118.092568][ T4284] Zero length message leads to an empty skb [ 118.424528][ T28] audit: type=1400 audit(118.330:140): avc: denied { name_bind } for pid=4281 comm="syz.1.45" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 119.363744][ T42] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 119.571933][ T42] usb 2-1: Using ep0 maxpacket: 32 [ 119.593392][ T42] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 119.593836][ T42] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 119.594276][ T42] usb 2-1: New USB device found, idVendor=1e7d, idProduct=2d5a, bcdDevice= 0.00 [ 119.594344][ T42] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 119.598546][ T42] usb 2-1: config 0 descriptor?? [ 120.028510][ T28] audit: type=1400 audit(119.930:141): avc: denied { ioctl } for pid=4286 comm="syz.1.47" path="socket:[2377]" dev="sockfs" ino=2377 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 120.045628][ T4287] batadv_slave_0: entered promiscuous mode [ 120.063790][ T4286] batadv_slave_0: left promiscuous mode [ 120.084367][ T42] usbhid 2-1:0.0: can't add hid device: -71 [ 120.085427][ T42] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 120.089302][ T42] usb 2-1: USB disconnect, device number 5 [ 120.877116][ T28] audit: type=1400 audit(120.780:142): avc: denied { bind } for pid=4308 comm="syz.1.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 120.889300][ T28] audit: type=1400 audit(120.790:143): avc: denied { read } for pid=4308 comm="syz.1.52" path="socket:[2409]" dev="sockfs" ino=2409 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 121.399273][ T4311] netlink: 4 bytes leftover after parsing attributes in process `syz.1.52'. [ 122.215151][ T28] audit: type=1400 audit(122.120:144): avc: denied { allowed } for pid=4282 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 122.246813][ T28] audit: type=1400 audit(122.140:145): avc: denied { sqpoll } for pid=4282 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 122.273498][ T28] audit: type=1400 audit(122.180:146): avc: denied { create } for pid=4282 comm="syz.0.46" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 122.280796][ T28] audit: type=1400 audit(122.180:147): avc: denied { map } for pid=4282 comm="syz.0.46" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3452 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 122.293097][ T28] audit: type=1400 audit(122.200:148): avc: denied { read write } for pid=4282 comm="syz.0.46" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3452 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 124.320398][ T28] audit: type=1400 audit(124.220:149): avc: denied { read } for pid=4326 comm="syz.1.55" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 124.342091][ T28] audit: type=1400 audit(124.220:150): avc: denied { open } for pid=4326 comm="syz.1.55" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 124.454884][ T28] audit: type=1326 audit(124.360:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4328 comm="syz.1.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 124.456927][ T28] audit: type=1326 audit(124.360:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4328 comm="syz.1.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 124.462274][ T28] audit: type=1326 audit(124.360:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4328 comm="syz.1.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 124.476517][ T28] audit: type=1326 audit(124.360:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4328 comm="syz.1.56" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 124.502465][ T28] audit: type=1326 audit(124.360:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4328 comm="syz.1.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 124.504273][ T28] audit: type=1326 audit(124.360:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4328 comm="syz.1.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 124.506116][ T28] audit: type=1326 audit(124.360:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4328 comm="syz.1.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 124.507976][ T28] audit: type=1326 audit(124.360:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4328 comm="syz.1.56" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 135.775950][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 135.776307][ T28] audit: type=1400 audit(135.680:163): avc: denied { unmount } for pid=4356 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 143.555311][ T4376] ------------[ cut here ]------------ [ 143.556012][ T4376] WARNING: kernel/bpf/verifier.c:2763 at reg_bounds_sanity_check+0x3c0/0x428, CPU#1: syz.0.71/4376 [ 143.558371][ T4376] verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0xffffdfcd, 0xffffffffffffdfcc] s64=[0x80000000ffffdfcd, 0x7fffffffffffdfcc] u32=[0xffffdfcd, 0xffffdfcc] s32=[0xffffdfcd, 0xffffdfcc] var_off=(0xffffdfcc, 0xffffffff00000000) [ 143.559422][ T4376] Modules linked in: [ 143.560276][ T4376] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 143.561423][ T4376] CPU: 1 UID: 0 PID: 4376 Comm: syz.0.71 Not tainted syzkaller #0 PREEMPT [ 143.562112][ T4376] Hardware name: ARM-Versatile Express [ 143.562712][ T4376] Call trace: [ 143.563391][ T4376] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 143.564564][ T4376] r7:8281f900 r6:00000000 r5:822a4e64 r4:00000001 [ 143.565232][ T4376] [<80201af0>] (show_stack) from [<8021e454>] (dump_stack_lvl+0x5c/0x70) [ 143.565742][ T4376] [<8021e3f8>] (dump_stack_lvl) from [<8021e480>] (dump_stack+0x18/0x1c) [ 143.566337][ T4376] r7:8281f900 r6:00000000 r5:851e1800 r4:82a7fd14 [ 143.566715][ T4376] [<8021e468>] (dump_stack) from [<802025f4>] (vpanic+0x114/0x320) [ 143.567357][ T4376] [<802024e0>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0x104) [ 143.567960][ T4376] r7:803e024c [ 143.568223][ T4376] [<80202800>] (panic) from [<80250a68>] (get_taint+0x0/0x1c) [ 143.568821][ T4376] r3:8280c544 r2:00000001 r1:8228bc08 r0:822934c0 [ 143.569182][ T4376] [<802509f0>] (check_panic_on_warn) from [<80250be4>] (__warn+0x98/0x1ac) [ 143.569970][ T4376] [<80250b4c>] (__warn) from [<80250ee0>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 143.570497][ T4376] r8:00000009 r7:822ab79c r6:df9cd8c4 r5:851e1800 r4:00000000 [ 143.571110][ T4376] [<80250cfc>] (warn_slowpath_fmt) from [<803e024c>] (reg_bounds_sanity_check+0x3c0/0x428) [ 143.571690][ T4376] r10:85e18000 r9:ffffdfcd r8:80000000 r7:ffffdfcd r6:ffffdfcc r5:822abf00 [ 143.572502][ T4376] r4:85603a30 [ 143.572772][ T4376] [<803dfe8c>] (reg_bounds_sanity_check) from [<803ecf74>] (reg_set_min_max+0x1c4/0x288) [ 143.573606][ T4376] r10:00000001 r9:00000010 r8:85e18000 r7:85cacb10 r6:85603b10 r5:85603a30 [ 143.574036][ T4376] r4:85caca30 [ 143.574206][ T4376] [<803ecdb0>] (reg_set_min_max) from [<803fdbb8>] (check_cond_jmp_op+0xc7c/0x1980) [ 143.574666][ T4376] r10:85603800 r9:00000010 r8:85ef2100 r7:ffffffff r6:80000000 r5:85633f00 [ 143.575006][ T4376] r4:dfae90c0 r3:85caca30 [ 143.575180][ T4376] [<803fcf3c>] (check_cond_jmp_op) from [<80404228>] (do_check_common+0x259c/0x3228) [ 143.575553][ T4376] r10:85ef2100 r9:85e18000 r8:dfae90c0 r7:85e1e000 r6:00000018 r5:dfae9078 [ 143.575813][ T4376] r4:dfae9000 [ 143.575967][ T4376] [<80401c8c>] (do_check_common) from [<80407e7c>] (bpf_check+0x22e4/0x2d30) [ 143.576286][ T4376] r10:85e1e000 r9:00000001 r8:85e18000 r7:00000a7b r6:85e188bc r5:00000000 [ 143.576566][ T4376] r4:00000016 [ 143.576724][ T4376] [<80405b98>] (bpf_check) from [<803d959c>] (bpf_prog_load+0x5b8/0xdec) [ 143.579525][ T4376] r10:dfae9000 r9:851e1800 r8:85cadb30 r7:df9cdd18 r6:00000000 r5:00000000 [ 143.579944][ T4376] r4:df9cdeb0 [ 143.580195][ T4376] [<803d8fe4>] (bpf_prog_load) from [<803dadc4>] (__sys_bpf+0x2d8/0x2008) [ 143.580934][ T4376] r10:00000005 r9:00000000 r8:df9cde50 r7:00000048 r6:851e1800 r5:200054c0 [ 143.581227][ T4376] r4:00000000 [ 143.581492][ T4376] [<803daaec>] (__sys_bpf) from [<803dd08c>] (sys_bpf+0x2c/0x48) [ 143.582123][ T4376] r10:00000182 r9:851e1800 r8:8020029c r7:00000182 r6:00346310 r5:00000000 [ 143.582690][ T4376] r4:00000000 [ 143.582851][ T4376] [<803dd060>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 143.583283][ T4376] Exception stack(0xdf9cdfa8 to 0xdf9cdff0) [ 143.583672][ T4376] dfa0: 00000000 00000000 00000005 200054c0 00000048 00000000 [ 143.584092][ T4376] dfc0: 00000000 00000000 00346310 00000182 003462d8 00000000 00000001 76fc30dc [ 143.584612][ T4376] dfe0: 76fc2e88 76fc2e78 00018734 0012fc20 [ 143.587367][ T4376] Rebooting in 86400 seconds..