last executing test programs: 2.658275917s ago: executing program 0 (id=1): r0 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000000c0)=0x81) read(r0, &(0x7f0000000140)=""/95, 0x5f) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000480)={{0xffffffff, 0x0, 0x1000, 0xfffffffc, 'syz0\x00'}, 0x2, 0x40, 0x5, 0x0, 0x0, 0x80001000, 'syz0\x00', 0x0}) 2.234548487s ago: executing program 1 (id=3): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000100)) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f0000000200)={0x73622a85, 0x1201, 0x1}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000000)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000001c0)={0x98, 0x0, &(0x7f0000003200)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, @transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x1472, 0x0, 0x0, 0x0, 0xff8, 0x0, &(0x7f00000031c0)={0x30, 0x30, 0x1e}}}], 0x0, 0x0, 0x0}) 1.719302042s ago: executing program 1 (id=4): mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) r0 = socket(0xa, 0x3, 0x3a) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) 1.444656391s ago: executing program 0 (id=5): syz_usb_connect$uac1(0x5, 0xa4, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) 1.442485491s ago: executing program 1 (id=6): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000200)={0x58, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x7}]}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x85}, 0x0) 815.217254ms ago: executing program 1 (id=7): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000780)={0x28, 0x3, 0x8, 0x201, 0x0, 0x0, {0x2, 0x0, 0x7}, [@CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @tcp=[@CTA_TIMEOUT_TCP_FIN_WAIT={0x8, 0x4, 0x1, 0x0, 0x7}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004011}, 0x0) 487.433146ms ago: executing program 1 (id=8): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x2c, 0x24, 0xd0f, 0x70bd2a, 0xfffffffd, {0x60, 0x0, 0x0, 0x0, {0x0, 0x2}, {0xffff}, {0x2}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000050}, 0x20008840) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f0000010040), 0x0, 0xffffffffffffffff, 0x4}, 0x38) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x6, 0x10, &(0x7f0000000500)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b702000001"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000000}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000940)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r0, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="000500000020"}) 0s ago: executing program 1 (id=9): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000480)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) prctl$PR_SET_IO_FLUSHER(0x43, 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) prctl$PR_SET_IO_FLUSHER(0x43, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) prlimit64(0x0, 0xe, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x7, 0x700, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x1, 0x14, 0x67, 0x0, 0x0, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0xe}, @empty}}}}) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@deltaction={0x48, 0x18, 0x1, 0x70bd2a, 0x25dfdc00, {0xa}, [@TCA_ACT_TAB={0x34, 0x1, [{0xc, 0x8f, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0x10, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x44000}, 0x20040844) ioctl$int_in(r5, 0x40000000af01, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r7, 0x4b72, &(0x7f0000000100)={0x1, 0x1, 0xa, 0x20, 0x138, &(0x7f0000000480)}) mremap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) kernel console output (not intermixed with test programs): [ 54.934807][ T29] audit: type=1400 audit(54.870:56): avc: denied { read write } for pid=3087 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 54.940994][ T29] audit: type=1400 audit(54.870:57): avc: denied { open } for pid=3087 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:29934' (ED25519) to the list of known hosts. [ 70.042304][ T29] audit: type=1400 audit(69.970:58): avc: denied { name_bind } for pid=3090 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 72.266327][ T29] audit: type=1400 audit(72.200:59): avc: denied { execute } for pid=3091 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 72.282703][ T29] audit: type=1400 audit(72.210:60): avc: denied { execute_no_trans } for pid=3091 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 75.759341][ T29] audit: type=1400 audit(75.690:61): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 75.764401][ T29] audit: type=1400 audit(75.700:62): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 75.776087][ T3091] cgroup: Unknown subsys name 'net' [ 75.782190][ T29] audit: type=1400 audit(75.710:63): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 75.954398][ T3091] cgroup: Unknown subsys name 'cpuset' [ 75.959919][ T3091] cgroup: Unknown subsys name 'hugetlb' [ 75.963041][ T3091] cgroup: Unknown subsys name 'rlimit' [ 76.185054][ T29] audit: type=1400 audit(76.120:64): avc: denied { setattr } for pid=3091 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.188552][ T29] audit: type=1400 audit(76.120:65): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 76.192547][ T29] audit: type=1400 audit(76.130:66): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 76.424776][ T3093] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 76.428351][ T29] audit: type=1400 audit(76.360:67): avc: denied { relabelto } for pid=3093 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.434319][ T29] audit: type=1400 audit(76.370:68): avc: denied { write } for pid=3093 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 76.476637][ T29] audit: type=1400 audit(76.410:69): avc: denied { read } for pid=3091 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.479006][ T29] audit: type=1400 audit(76.410:70): avc: denied { open } for pid=3091 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 84.292596][ T3091] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 86.454678][ T29] audit: type=1400 audit(86.390:71): avc: denied { execmem } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 86.529541][ T29] audit: type=1400 audit(86.460:72): avc: denied { read } for pid=3096 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.532288][ T29] audit: type=1400 audit(86.460:73): avc: denied { read } for pid=3097 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.533758][ T29] audit: type=1400 audit(86.460:74): avc: denied { open } for pid=3097 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.538080][ T29] audit: type=1400 audit(86.470:75): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 86.564869][ T29] audit: type=1400 audit(86.500:76): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 86.566610][ T29] audit: type=1400 audit(86.500:77): avc: denied { module_request } for pid=3097 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 86.648931][ T29] audit: type=1400 audit(86.580:78): avc: denied { sys_module } for pid=3096 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 87.418685][ T29] audit: type=1400 audit(87.350:79): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 88.569120][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.578003][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.717494][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.726538][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 89.630040][ T3096] hsr_slave_0: entered promiscuous mode [ 89.635410][ T3096] hsr_slave_1: entered promiscuous mode [ 89.689107][ T3097] hsr_slave_0: entered promiscuous mode [ 89.691122][ T3097] hsr_slave_1: entered promiscuous mode [ 89.695133][ T3097] debugfs: 'hsr0' already exists in 'hsr' [ 89.697144][ T3097] Cannot create hsr debugfs directory [ 90.179710][ T29] audit: type=1400 audit(90.110:80): avc: denied { create } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 90.190305][ T3096] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 90.217471][ T3096] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 90.234618][ T3096] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 90.252325][ T3096] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 90.346649][ T3097] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 90.365701][ T3097] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 90.378314][ T3097] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 90.393832][ T3097] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 91.020440][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 91.089172][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.046274][ T3097] veth0_vlan: entered promiscuous mode [ 94.077609][ T3097] veth1_vlan: entered promiscuous mode [ 94.165643][ T3096] veth0_vlan: entered promiscuous mode [ 94.187229][ T3097] veth0_macvtap: entered promiscuous mode [ 94.206033][ T3097] veth1_macvtap: entered promiscuous mode [ 94.210824][ T3096] veth1_vlan: entered promiscuous mode [ 94.326731][ T1268] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.330758][ T1268] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.335495][ T1268] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.336797][ T1268] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.372843][ T3096] veth0_macvtap: entered promiscuous mode [ 94.435761][ T3096] veth1_macvtap: entered promiscuous mode [ 94.492275][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 94.493514][ T29] audit: type=1400 audit(94.410:83): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 94.516666][ T29] audit: type=1400 audit(94.450:84): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.o92myT/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 94.527585][ T29] audit: type=1400 audit(94.460:85): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 94.536728][ T29] audit: type=1400 audit(94.470:86): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.o92myT/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 94.540286][ T29] audit: type=1400 audit(94.470:87): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.o92myT/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 94.551685][ T29] audit: type=1400 audit(94.480:88): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 94.556534][ T29] audit: type=1400 audit(94.490:89): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 94.561925][ T29] audit: type=1400 audit(94.500:90): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="gadgetfs" ino=3142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 94.568176][ T29] audit: type=1400 audit(94.500:91): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 94.571028][ T29] audit: type=1400 audit(94.500:92): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 94.635884][ T1359] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.640514][ T3097] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 94.643596][ T1359] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.653935][ T1359] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.656336][ T1268] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.268347][ T3707] Illegal XDP return value 4294967294 on prog (id 1) dev N/A, expect packet loss! [ 95.747470][ T3710] binder: BINDER_SET_CONTEXT_MGR already set [ 95.747787][ T3710] binder: 3709:3710 ioctl 4018620d 20000200 returned -16 [ 96.644213][ T3683] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 96.792629][ T3683] usb 1-1: device descriptor read/64, error -71 [ 97.031901][ T3683] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 97.172255][ T3683] usb 1-1: device descriptor read/64, error -71 [ 97.282944][ T3683] usb usb1-port1: attempt power cycle [ 97.632098][ T3683] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 97.655519][ T3683] usb 1-1: device descriptor read/8, error -71 [ 97.891962][ T3683] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 97.915876][ T3683] usb 1-1: device descriptor read/8, error -71 [ 98.022617][ T3683] usb usb1-port1: unable to enumerate USB device [ 102.768571][ T3730] ------------[ cut here ]------------ [ 102.769226][ T3730] WARNING: mm/highmem.c:622 at kunmap_local_indexed+0x294/0x2e8, CPU#0: syz.1.9/3730 [ 102.774282][ T3730] Modules linked in: [ 102.775274][ T3730] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 102.776277][ T3730] CPU: 0 UID: 0 PID: 3730 Comm: syz.1.9 Not tainted syzkaller #0 PREEMPT [ 102.776865][ T3730] Hardware name: ARM-Versatile Express [ 102.777429][ T3730] Call trace: [ 102.777942][ T3730] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 102.778578][ T3730] r7:82283ab8 r6:8441a400 r5:00000000 r4:8229586c [ 102.778910][ T3730] [<80201b58>] (show_stack) from [<8021ee18>] (dump_stack_lvl+0x54/0x7c) [ 102.779251][ T3730] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 102.779592][ T3730] r5:00000000 r4:82a7bd14 [ 102.779804][ T3730] [<8021ee40>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 102.780157][ T3730] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 102.780515][ T3730] r7:804d04b8 [ 102.780676][ T3730] [<80202850>] (panic) from [<802520b0>] (get_taint+0x0/0x1c) [ 102.781029][ T3730] r3:8280c704 r2:00000001 r1:8227c020 r0:82283ab8 [ 102.781278][ T3730] [<80252038>] (check_panic_on_warn) from [<80252228>] (__warn+0x94/0x1a4) [ 102.781617][ T3730] [<80252194>] (__warn) from [<802524b0>] (warn_slowpath_fmt+0x178/0x1f4) [ 102.781991][ T3730] r8:00000009 r7:822b04d4 r6:df945d34 r5:8441a400 r4:00000000 [ 102.782275][ T3730] [<8025233c>] (warn_slowpath_fmt) from [<804d04b8>] (kunmap_local_indexed+0x294/0x2e8) [ 102.782744][ T3730] r10:8280ca28 r9:df945e68 r8:00200000 r7:ffefe000 r6:00000001 r5:8441a400 [ 102.783049][ T3730] r4:ffefe000 [ 102.783219][ T3730] [<804d0224>] (kunmap_local_indexed) from [<80534e90>] (break_ksm_pmd_entry+0x168/0x270) [ 102.783615][ T3730] r7:ffefe000 r6:00200000 r5:04600000 r4:00000000 [ 102.783879][ T3730] [<80534d28>] (break_ksm_pmd_entry) from [<804e9f44>] (walk_pgd_range+0x3dc/0x63c) [ 102.784303][ T3730] r10:81c1f394 r9:001ee000 r8:df945e68 r7:80534d28 r6:85f6b000 r5:00200000 [ 102.784625][ T3730] r4:002e8000 [ 102.784809][ T3730] [<804e9b68>] (walk_pgd_range) from [<804ea1e8>] (__walk_page_range+0x44/0x64) [ 102.785195][ T3730] r10:00000000 r9:8441a400 r8:81c1f394 r7:002e8000 r6:001ee000 r5:df945e68 [ 102.785499][ T3730] r4:8511cb00 [ 102.785640][ T3730] [<804ea1a4>] (__walk_page_range) from [<804ea8cc>] (walk_page_range_vma_unsafe+0xb4/0x24c) [ 102.786045][ T3730] r9:8441a400 r8:00000000 r7:81c1f394 r6:002e8000 r5:001ee000 r4:8511cb00 [ 102.786367][ T3730] [<804ea818>] (walk_page_range_vma_unsafe) from [<804eaa90>] (walk_page_range_vma+0x2c/0x34) [ 102.786737][ T3730] r7:df945ecc r6:002e8000 r5:81c1f394 r4:8511cb00 [ 102.786981][ T3730] [<804eaa64>] (walk_page_range_vma) from [<80533cd4>] (break_ksm+0x5c/0x9c) [ 102.787702][ T3730] [<80533c78>] (break_ksm) from [<8053494c>] (ksm_del_vmas+0x7c/0x108) [ 102.788443][ T3730] r7:00000000 r6:00000000 r5:00000043 r4:8511cb00 [ 102.788790][ T3730] [<805348d0>] (ksm_del_vmas) from [<805393a0>] (ksm_disable_merge_any+0x2c/0x54) [ 102.789319][ T3730] r4:8468a940 [ 102.789476][ T3730] [<80539374>] (ksm_disable_merge_any) from [<802705f8>] (sys_prctl+0xa14/0xb8c) [ 102.789922][ T3730] r5:00000043 r4:8468a940 [ 102.790109][ T3730] [<8026fbe4>] (sys_prctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 102.790531][ T3730] Exception stack(0xdf945fa8 to 0xdf945ff0) [ 102.790943][ T3730] 5fa0: 00000000 00000000 00000043 00000000 00000000 00000000 [ 102.791294][ T3730] 5fc0: 00000000 00000000 0031644c 000000ac 00300000 00000000 00006364 76ee00bc [ 102.792081][ T3730] 5fe0: 76edfec0 76edfeb0 0001929c 00132320 [ 102.792589][ T3730] r10:000000ac r9:8441a400 r8:8020029c r7:000000ac r6:0031644c r5:00000000 [ 102.793086][ T3730] r4:00000000 [ 102.795738][ T3730] Rebooting in 86400 seconds..