last executing test programs: 16.996793956s ago: executing program 1 (id=13): socket$kcm(0x18, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="5c00000000010104000000000000000002001000240002801400018008000100e000000108000200e00000010c00028005000100000000001c0010800800014000000000d97405010000000008000240000000000800", @ANYRES8=r0], 0x5c}, 0x1, 0x0, 0x0, 0x2400c414}, 0x4000) 16.74912318s ago: executing program 1 (id=14): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000140)=@req3={0x1000, 0x3a, 0x40001000, 0x3a, 0x7ff, 0xf83, 0x3}, 0x1c) 16.648155815s ago: executing program 1 (id=15): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000006a000085000000860000008500000007000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x7}, 0x4) setsockopt$packet_int(r1, 0x107, 0x16, &(0x7f0000000000)=0x4, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f00000002c0)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x4e20, 0x101005, @remote, 0x7}, 0x1c) 14.820316757s ago: executing program 0 (id=22): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @multicast}, 0x10) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000080)={r1, 0x1, 0x6, @multicast}, 0x10) 14.739537841s ago: executing program 0 (id=23): syz_clone3(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') read$FUSE(r3, &(0x7f0000006b40)={0x2020}, 0x2020) 14.03950041s ago: executing program 1 (id=24): r0 = syz_usb_connect$cdc_ncm(0x0, 0x76, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x64, 0x2, 0x1, 0x0, 0x0, 0x0, "", {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd, 0x24, 0xf, 0x1, 0x0, 0x0, 0xffff}, {0x6}, [@mbim_extended={0x8, 0x24, 0x1c, 0xf44d, 0x80, 0x2}]}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0x4}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0xffffffac, {0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 12.130252576s ago: executing program 0 (id=25): r0 = epoll_create1(0x0) r1 = socket(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x2004}) shutdown(r1, 0x0) epoll_pwait(r0, &(0x7f0000000140)=[{}], 0x1, 0x1, 0x0, 0x0) 11.780608526s ago: executing program 0 (id=26): r0 = syz_open_dev$evdev(&(0x7f0000000000), 0xaa, 0x100) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000001c0)=""/154) 11.115855233s ago: executing program 1 (id=27): openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) setreuid(0x0, 0xee01) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x3d14, 0x3}) 10.738266233s ago: executing program 0 (id=28): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0xfffffd6f, &(0x7f0000000400)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) sched_setscheduler(0x0, 0x2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x3e}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x8}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x70) 5.888260012s ago: executing program 1 (id=29): r0 = syz_usb_connect$uac1(0x0, 0x72, &(0x7f00000000c0)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x40, 0x200c, 0x100b, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x60, 0x3, 0x1, 0x3, 0xa0, 0x2, "", {{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x2, 0xa}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x10, 0x2, 0x6, 0x0, {0x7, 0x25, 0x1, 0xc, 0x0, 0x40}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x200, 0x3, 0x3, 0x10, {0x7, 0x25, 0x1, 0xc, 0x8, 0x3ff}}}}}}}}]}}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$uac1(r0, &(0x7f0000000540)={0x14, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0003040000000403"]}, 0x0) syz_usb_control_io$uac2(r0, &(0x7f0000001a80)={0x14, 0x0, &(0x7f00000019c0)={0x0, 0x3, 0x2, @string={0x2}}}, 0x0) syz_usb_control_io(r0, &(0x7f0000001f80)={0x2c, 0x0, &(0x7f0000001e80)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0xc09}}, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000800)={0x84, &(0x7f00000003c0)={0x20, 0x16}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={0x40, 0x17, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0}) 0s ago: executing program 0 (id=30): socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeeb, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1eaa00000000000079100800000000009500000000000000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendto$packet(r3, 0x0, 0x0, 0x20008040, &(0x7f0000002400)={0x11, 0x88a8, r4, 0x1, 0xc, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2c}}, 0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000180)={0xffffffffffffffff, r4, 0x25, 0x1f, @val=@kprobe_multi=@syms={0x1, 0x0, 0x0}}, 0x30) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, 0x0) syz_clone(0xc0002080, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 52.257084][ T28] audit: type=1400 audit(52.180:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.257711][ T28] audit: type=1400 audit(52.180:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:47728' (ED25519) to the list of known hosts. [ 71.290722][ T28] audit: type=1400 audit(71.210:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 73.362193][ T28] audit: type=1400 audit(73.290:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 73.387474][ T28] audit: type=1400 audit(73.310:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 77.109389][ T28] audit: type=1400 audit(77.030:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 77.114192][ T28] audit: type=1400 audit(77.040:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 77.127294][ T3093] cgroup: Unknown subsys name 'net' [ 77.134791][ T28] audit: type=1400 audit(77.060:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 77.634893][ T3093] cgroup: Unknown subsys name 'cpuset' [ 77.644748][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 77.645840][ T3093] cgroup: Unknown subsys name 'rlimit' [ 77.893219][ T28] audit: type=1400 audit(77.820:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 77.895503][ T28] audit: type=1400 audit(77.820:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 77.899276][ T28] audit: type=1400 audit(77.820:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 78.106731][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 78.108562][ T28] audit: type=1400 audit(78.030:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 78.113565][ T28] audit: type=1400 audit(78.040:68): avc: denied { write } for pid=3095 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 78.149493][ T28] audit: type=1400 audit(78.070:69): avc: denied { read } for pid=3093 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 78.155043][ T28] audit: type=1400 audit(78.070:70): avc: denied { open } for pid=3093 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 85.975173][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 88.556465][ T28] audit: type=1400 audit(88.480:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 88.638223][ T28] audit: type=1400 audit(88.560:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 88.651052][ T28] audit: type=1400 audit(88.570:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 88.651462][ T28] audit: type=1400 audit(88.570:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 88.683452][ T28] audit: type=1400 audit(88.610:75): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 88.683930][ T28] audit: type=1400 audit(88.610:76): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 88.785592][ T28] audit: type=1400 audit(88.710:77): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 89.564158][ T28] audit: type=1400 audit(89.490:78): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 90.829497][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 90.841616][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 90.963282][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 90.973220][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 91.814683][ T3099] hsr_slave_0: entered promiscuous mode [ 91.821538][ T3099] hsr_slave_1: entered promiscuous mode [ 91.909840][ T3098] hsr_slave_0: entered promiscuous mode [ 91.914568][ T3098] hsr_slave_1: entered promiscuous mode [ 91.922053][ T3098] debugfs: 'hsr0' already exists in 'hsr' [ 91.923594][ T3098] Cannot create hsr debugfs directory [ 92.378103][ T28] audit: type=1400 audit(92.300:79): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 92.381763][ T28] audit: type=1400 audit(92.300:80): avc: denied { write } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 92.389891][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 92.406646][ T3099] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 92.413587][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 92.426100][ T3099] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 92.438919][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 92.447828][ T3099] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 92.466458][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 92.474884][ T3099] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 92.563178][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 92.573635][ T3098] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 92.576797][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 92.585512][ T3098] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 92.589582][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 92.598414][ T3098] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 92.602711][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 92.609303][ T3098] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 93.346632][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.435450][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 96.529541][ T3099] veth0_vlan: entered promiscuous mode [ 96.557607][ T3099] veth1_vlan: entered promiscuous mode [ 96.625684][ T3099] veth0_macvtap: entered promiscuous mode [ 96.643432][ T3099] veth1_macvtap: entered promiscuous mode [ 96.764424][ T51] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.773849][ T50] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.815392][ T50] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.816027][ T50] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 96.816574][ T3098] veth0_vlan: entered promiscuous mode [ 96.876162][ T3098] veth1_vlan: entered promiscuous mode [ 96.948669][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 96.951273][ T28] audit: type=1400 audit(96.870:82): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 96.960058][ T28] audit: type=1400 audit(96.880:83): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.0fSNyP/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 96.970907][ T28] audit: type=1400 audit(96.890:84): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 96.986379][ T28] audit: type=1400 audit(96.910:85): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.0fSNyP/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 96.994226][ T28] audit: type=1400 audit(96.920:86): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.0fSNyP/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2295 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 97.015036][ T28] audit: type=1400 audit(96.940:87): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 97.024320][ T28] audit: type=1400 audit(96.950:88): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 97.026184][ T28] audit: type=1400 audit(96.950:89): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=2297 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 97.035368][ T28] audit: type=1400 audit(96.960:90): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 97.037531][ T28] audit: type=1400 audit(96.960:91): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 97.075748][ T3098] veth0_macvtap: entered promiscuous mode [ 97.127919][ T3098] veth1_macvtap: entered promiscuous mode [ 97.149572][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 97.227295][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.228414][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.229247][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 97.229819][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 98.431719][ T3704] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 98.813330][ T3704] usb 1-1: unable to get BOS descriptor or descriptor too short [ 98.814148][ T3704] usb 1-1: no configurations [ 98.814481][ T3704] usb 1-1: can't read configurations, error -22 [ 102.412419][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 102.414385][ T28] audit: type=1400 audit(102.340:121): avc: denied { ioctl } for pid=3762 comm="syz.0.22" path="socket:[2409]" dev="sockfs" ino=2409 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 102.416166][ T3763] batadv_slave_1: entered promiscuous mode [ 102.419438][ T3763] batadv_slave_1: left promiscuous mode [ 103.823909][ T11] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 104.219619][ T11] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 104.221408][ T11] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 104.222474][ T11] usb 2-1: Product: syz [ 104.223277][ T11] usb 2-1: Manufacturer: syz [ 104.224229][ T11] usb 2-1: SerialNumber: syz [ 105.444393][ T11] cdc_ncm 2-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 105.447968][ T11] cdc_ncm 2-1:1.0: dwNtbInMaxSize=0 is too small. Using 2048 [ 105.449377][ T11] cdc_ncm 2-1:1.0: setting rx_max = 2048 [ 105.713912][ T11] cdc_ncm 2-1:1.0: setting tx_max = 184 [ 105.746584][ T11] cdc_ncm 2-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.1-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 105.965681][ T9] usb 2-1: USB disconnect, device number 2 [ 105.967597][ T9] cdc_ncm 2-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.1-1, CDC NCM (NO ZLP) [ 108.862094][ T3809] *** NOT YET: opcode 85 *** [ 111.631650][ T2883] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 111.793489][ T2883] usb 2-1: unable to get BOS descriptor or descriptor too short [ 111.837075][ T2883] usb 2-1: New USB device found, idVendor=200c, idProduct=100b, bcdDevice= 0.40 [ 111.837439][ T2883] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 111.837702][ T2883] usb 2-1: Product: syz [ 111.837753][ T2883] usb 2-1: Manufacturer: syz [ 111.837780][ T2883] usb 2-1: SerialNumber: syz [ 112.773292][ T2883] usb 2-1: 1:1: cannot get freq at ep 0x1 [ 119.287622][ T28] audit: type=1400 audit(119.210:122): avc: denied { write } for pid=3839 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 121.186095][ T3863] ------------[ cut here ]------------ [ 121.186587][ T3863] WARNING: kernel/signal.c:2174 at do_notify_parent+0x37c/0x384, CPU#0: syz.0.30/3863 [ 121.188994][ T3863] Modules linked in: [ 121.190072][ T3863] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 121.190910][ T3863] CPU: 0 UID: 0 PID: 3863 Comm: syz.0.30 Not tainted syzkaller #0 PREEMPT [ 121.191358][ T3863] Hardware name: ARM-Versatile Express [ 121.191809][ T3863] Call trace: [ 121.192193][ T3863] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 121.192742][ T3863] r7:82a1e6f8 r6:00000000 r5:8231c0d0 r4:00000001 [ 121.193059][ T3863] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 121.193423][ T3863] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 121.193745][ T3863] r7:82a1e6f8 r6:00000000 r5:8595b100 r4:82c7bd3c [ 121.193972][ T3863] [<8021e334>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 121.194284][ T3863] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 121.194591][ T3863] r7:80265f80 [ 121.194741][ T3863] [<80202818>] (panic) from [<802506a8>] (get_taint+0x0/0x1c) [ 121.195028][ T3863] r3:82a0b544 r2:00000001 r1:82302bb8 r0:8230a498 [ 121.195262][ T3863] [<80250630>] (check_panic_on_warn) from [<80250824>] (__warn+0x98/0x1ac) [ 121.195589][ T3863] [<8025078c>] (__warn) from [<80250ab0>] (warn_slowpath_fmt+0x178/0x1f4) [ 121.195903][ T3863] r8:00000009 r7:8230b694 r6:dfa45ebc r5:8595b100 r4:00000000 [ 121.196144][ T3863] [<8025093c>] (warn_slowpath_fmt) from [<80265f80>] (do_notify_parent+0x37c/0x384) [ 121.196519][ T3863] r10:8595b7f4 r9:00000000 r8:dfa45f68 r7:8595b9d0 r6:00000080 r5:8595b100 [ 121.196805][ T3863] r4:8595b100 [ 121.196962][ T3863] [<80265c04>] (do_notify_parent) from [<80257a90>] (do_exit+0x798/0xae4) [ 121.197282][ T3863] r8:dfa45f68 r7:8595b9d0 r6:83141c00 r5:8595b100 r4:85916200 [ 121.197532][ T3863] [<802572f8>] (do_exit) from [<80257f68>] (do_group_exit+0x0/0x8c) [ 121.197818][ T3863] r7:00000001 [ 121.197952][ T3863] [<80257f50>] (sys_exit) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 121.198404][ T3863] Exception stack(0xdfa45fa8 to 0xdfa45ff0) [ 121.198930][ T3863] 5fa0: 00000000 00000000 00000000 00000000 00000000 00000000 [ 121.199259][ T3863] 5fc0: 00000000 00000000 00000000 00000001 00346418 00000000 00000001 76f9b0dc [ 121.199573][ T3863] 5fe0: 76f9ae60 76f9ae50 00018f14 00130300 [ 121.201734][ T3863] Rebooting in 86400 seconds..