last executing test programs: 25.167938796s ago: executing program 0 (id=123): r0 = getpid() ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x4}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) process_vm_readv(r0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) 21.949349761s ago: executing program 0 (id=124): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6312, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) eventfd2(0xc00, 0x80800) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) unshare(0x64000600) socket$nl_netfilter(0x10, 0x3, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) 13.219394025s ago: executing program 0 (id=127): syz_usb_connect(0x0, 0x36, &(0x7f0000001780)={{0x12, 0x1, 0x250, 0x13, 0x3, 0xe0, 0x20, 0x7ca, 0xa309, 0x7f92, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0xfc, 0x4, 0xc0, 0x9, [{{0x9, 0x4, 0x5b, 0x3, 0x2, 0xa5, 0x9f, 0x19, 0x0, [], [{{0x9, 0x5, 0x80, 0xc, 0x40, 0x5, 0xca, 0xff}}, {{0x9, 0x5, 0x8, 0x0, 0x438, 0x0, 0x57, 0xf}}]}}]}}]}}, &(0x7f0000000b40)={0xa, &(0x7f0000000640)={0xa, 0x6, 0x250, 0x1, 0x2f, 0xd, 0x8, 0x1}, 0x0, 0x0}) 11.836820579s ago: executing program 0 (id=129): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$sndctrl(0x0, 0x100, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f0000000000)=ANY=[@ANYRES32=r1, @ANYRESOCT=r0]) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8c}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x13) 2.540803317s ago: executing program 1 (id=142): timer_create(0x2, 0x0, &(0x7f0000003b00)=0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) timer_gettime(r0, &(0x7f0000003bc0)) 2.281171216s ago: executing program 1 (id=143): socket$packet(0x11, 0x3, 0x300) r0 = socket(0xa, 0x801, 0x0) getsockopt(r0, 0x29, 0x40, &(0x7f0000b3ffac)=""/84, &(0x7f0000001ffc)=0x54) r1 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], 0x0, 0x10001, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={0x0}, 0x18) openat$sndseq(0xffffffffffffff9c, 0x0, 0x44100) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) lseek(r3, 0x9, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'veth1_to_bond\x00'}) 1.592480189s ago: executing program 1 (id=144): bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) io_setup(0x2004, &(0x7f0000000680)) io_setup(0xf447, &(0x7f0000000280)) 860.172355ms ago: executing program 0 (id=145): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a78000000060a010400000000000000000200000038000480340001800a0001006d617463680000002400028008000100756470000e0003007acc6338a90000b03bd9000008000240000000000900010073797a30000000000900020073797a32"], 0xa0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 538.313279ms ago: executing program 1 (id=146): bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000540)={@cgroup, 0xffffffffffffffff, 0x1d, 0x0, 0x0, @void, @value}, 0x20) 371.016642ms ago: executing program 0 (id=147): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'dummy0\x00', 0x0}) r2 = socket$packet(0x11, 0x2, 0x300) socket(0x10, 0x3, 0x1) openat$sysfs(0xffffffffffffff9c, 0x0, 0x202, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r3}, &(0x7f0000000000), &(0x7f00000000c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_emit_ethernet(0x16, &(0x7f0000000140)={@local, @link_local, @void, {@llc_tr={0x11, {@snap={0xaa, 0x1, "c2", "d5a2bb", 0x8808}}}}}, 0x0) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @remote}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x11, 0x839, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r1, {0xc}, {0xfff3, 0x8}}}, 0x24}}, 0x20040000) 260.1667ms ago: executing program 1 (id=148): r0 = socket$igmp6(0xa, 0x3, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c80)={'ipvlan1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000020c0)={@ipv4={'\x00', '\xff\xff', @empty}, 0x80, r2}) 0s ago: executing program 1 (id=149): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$sndctrl(0x0, 0x100, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r2, 0xc008551b, &(0x7f0000000000)=ANY=[@ANYRES32=r1, @ANYRESOCT=r0]) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8c}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x13) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:59810' (ED25519) to the list of known hosts. [ 155.144461][ T30] audit: type=1400 audit(154.690:48): avc: denied { name_bind } for pid=3308 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 155.555895][ T30] audit: type=1400 audit(155.100:49): avc: denied { execute } for pid=3309 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 155.567243][ T30] audit: type=1400 audit(155.110:50): avc: denied { execute_no_trans } for pid=3309 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 159.767400][ T30] audit: type=1400 audit(159.310:51): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 159.778178][ T30] audit: type=1400 audit(159.320:52): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 159.818126][ T3309] cgroup: Unknown subsys name 'net' [ 159.845706][ T30] audit: type=1400 audit(159.390:53): avc: denied { unmount } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 160.323745][ T3309] cgroup: Unknown subsys name 'cpuset' [ 160.355359][ T3309] cgroup: Unknown subsys name 'rlimit' [ 160.715504][ T30] audit: type=1400 audit(160.260:54): avc: denied { setattr } for pid=3309 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 160.719599][ T30] audit: type=1400 audit(160.260:55): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 160.725887][ T30] audit: type=1400 audit(160.260:56): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 161.223569][ T3311] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 161.228743][ T30] audit: type=1400 audit(160.770:57): avc: denied { relabelto } for pid=3311 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 161.235927][ T30] audit: type=1400 audit(160.770:58): avc: denied { write } for pid=3311 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 161.316303][ T30] audit: type=1400 audit(160.860:59): avc: denied { read } for pid=3309 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 161.319276][ T30] audit: type=1400 audit(160.860:60): avc: denied { open } for pid=3309 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 161.333391][ T3309] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 174.239815][ T30] audit: type=1400 audit(173.780:61): avc: denied { execmem } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 174.331248][ T30] audit: type=1400 audit(173.870:62): avc: denied { read } for pid=3314 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 174.335063][ T30] audit: type=1400 audit(173.880:63): avc: denied { open } for pid=3314 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 174.353790][ T30] audit: type=1400 audit(173.900:64): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 174.428246][ T30] audit: type=1400 audit(173.970:65): avc: denied { module_request } for pid=3314 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 174.721755][ T30] audit: type=1400 audit(174.260:66): avc: denied { sys_module } for pid=3314 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 179.841757][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 179.921313][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.079437][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 180.226307][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 182.299263][ T3314] hsr_slave_0: entered promiscuous mode [ 182.308575][ T3314] hsr_slave_1: entered promiscuous mode [ 182.841081][ T3315] hsr_slave_0: entered promiscuous mode [ 182.846856][ T3315] hsr_slave_1: entered promiscuous mode [ 182.857048][ T3315] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 182.861528][ T3315] Cannot create hsr debugfs directory [ 184.194486][ T30] audit: type=1400 audit(183.740:67): avc: denied { create } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 184.204432][ T30] audit: type=1400 audit(183.750:68): avc: denied { write } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 184.207690][ T30] audit: type=1400 audit(183.750:69): avc: denied { read } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 184.249805][ T3314] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 184.309306][ T3314] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 184.356371][ T3314] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 184.383702][ T3314] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 184.693294][ T3315] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 184.726020][ T3315] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 184.758176][ T3315] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 184.787865][ T3315] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 186.196140][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 186.671865][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.230018][ T3314] veth0_vlan: entered promiscuous mode [ 193.313845][ T3314] veth1_vlan: entered promiscuous mode [ 193.598266][ T3314] veth0_macvtap: entered promiscuous mode [ 193.647517][ T3314] veth1_macvtap: entered promiscuous mode [ 193.723387][ T3315] veth0_vlan: entered promiscuous mode [ 193.863758][ T3315] veth1_vlan: entered promiscuous mode [ 194.093350][ T3314] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.095083][ T3314] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.095831][ T3314] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.096300][ T3314] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.451474][ T30] audit: type=1400 audit(193.990:70): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 194.469844][ T30] audit: type=1400 audit(194.010:71): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/syzkaller.I0aQ0a/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 194.497875][ T30] audit: type=1400 audit(194.040:72): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 194.524720][ T30] audit: type=1400 audit(194.070:73): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/syzkaller.I0aQ0a/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 194.537540][ T30] audit: type=1400 audit(194.080:74): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/syzkaller.I0aQ0a/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2915 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 194.618411][ T3315] veth0_macvtap: entered promiscuous mode [ 194.646169][ T3315] veth1_macvtap: entered promiscuous mode [ 194.724750][ T30] audit: type=1400 audit(194.270:75): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 194.766504][ T30] audit: type=1400 audit(194.310:76): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 194.791189][ T30] audit: type=1400 audit(194.330:77): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="gadgetfs" ino=3543 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 194.823965][ T30] audit: type=1400 audit(194.370:78): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 194.831718][ T30] audit: type=1400 audit(194.370:79): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 194.899939][ T3315] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.903326][ T3315] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.904637][ T3315] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.906039][ T3315] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 195.214140][ T3314] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 198.143492][ T3458] input: syz1 as /devices/virtual/input/input1 [ 200.774893][ T3462] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 200.775551][ T3462] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 200.776024][ T3462] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 200.776255][ T3462] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 201.007676][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 201.011203][ T30] audit: type=1400 audit(200.550:95): avc: denied { create } for pid=3468 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 201.029253][ T30] audit: type=1400 audit(200.570:96): avc: denied { create } for pid=3468 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 201.048390][ T30] audit: type=1400 audit(200.590:97): avc: denied { connect } for pid=3468 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 201.635232][ T30] audit: type=1400 audit(201.180:98): avc: denied { perfmon } for pid=3470 comm="syz.1.7" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 201.682764][ T30] audit: type=1326 audit(201.220:99): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.7" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8355a768 code=0x7ffc0000 [ 201.711448][ T30] audit: type=1326 audit(201.250:100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.7" exe="/syz-executor" sig=0 arch=c00000b7 syscall=8 compat=0 ip=0xffff8355a768 code=0x7ffc0000 [ 201.729110][ T30] audit: type=1326 audit(201.260:101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3470 comm="syz.1.7" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8355a768 code=0x7ffc0000 [ 204.866630][ T3480] input: syz1 as /devices/virtual/input/input2 [ 205.691828][ T30] audit: type=1400 audit(205.230:102): avc: denied { create } for pid=3483 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 205.696672][ T30] audit: type=1400 audit(205.240:103): avc: denied { getopt } for pid=3483 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 206.207062][ T30] audit: type=1400 audit(205.740:104): avc: denied { map_create } for pid=3485 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 206.218568][ T30] audit: type=1400 audit(205.760:105): avc: denied { map_read map_write } for pid=3485 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 208.732635][ T3497] netdevsim netdevsim1: Direct firmware load for ./file0 failed with error -2 [ 208.738157][ T3497] netdevsim netdevsim1: Falling back to sysfs fallback for: ./file0 [ 208.738746][ T30] audit: type=1400 audit(208.280:106): avc: denied { firmware_load } for pid=3496 comm="syz.1.17" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 213.182554][ T30] audit: type=1400 audit(212.730:107): avc: denied { create } for pid=3501 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 213.189822][ T30] audit: type=1400 audit(212.730:108): avc: denied { write } for pid=3501 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 213.661363][ T3507] input: syz1 as /devices/virtual/input/input3 [ 215.339011][ T30] audit: type=1400 audit(214.880:109): avc: denied { read } for pid=3510 comm="syz.0.21" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 215.343065][ T30] audit: type=1400 audit(214.880:110): avc: denied { open } for pid=3510 comm="syz.0.21" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 215.351241][ T30] audit: type=1400 audit(214.890:111): avc: denied { ioctl } for pid=3510 comm="syz.0.21" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 226.115295][ T3543] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 226.305045][ T3543] syz.1.32: attempt to access beyond end of device [ 226.305045][ T3543] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 237.173229][ T30] audit: type=1400 audit(236.720:112): avc: denied { create } for pid=3568 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 237.614833][ T30] audit: type=1400 audit(237.160:113): avc: denied { prog_run } for pid=3570 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 238.746860][ T3577] netlink: 'syz.0.45': attribute type 21 has an invalid length. [ 238.748926][ T3577] netlink: 'syz.0.45': attribute type 1 has an invalid length. [ 238.749518][ T3577] netlink: 144 bytes leftover after parsing attributes in process `syz.0.45'. [ 239.872402][ T30] audit: type=1400 audit(239.410:114): avc: denied { write } for pid=3580 comm="syz.0.47" name="rt_acct" dev="proc" ino=4026532648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 239.892189][ T30] audit: type=1400 audit(239.430:115): avc: denied { create } for pid=3580 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 241.689943][ T30] audit: type=1400 audit(241.230:116): avc: denied { write } for pid=3589 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 242.407070][ T30] audit: type=1400 audit(241.950:117): avc: denied { connect } for pid=3593 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 242.413868][ T30] audit: type=1400 audit(241.950:118): avc: denied { name_connect } for pid=3593 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 242.581830][ T30] audit: type=1400 audit(242.130:119): avc: denied { create } for pid=3597 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 242.588915][ T30] audit: type=1400 audit(242.130:120): avc: denied { connect } for pid=3597 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 242.595454][ T30] audit: type=1400 audit(242.140:121): avc: denied { write } for pid=3597 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 242.613532][ T30] audit: type=1400 audit(242.160:122): avc: denied { ioctl } for pid=3597 comm="syz.0.55" path="socket:[3752]" dev="sockfs" ino=3752 ioctlcmd=0x8907 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 242.628105][ T30] audit: type=1400 audit(242.170:123): avc: denied { read } for pid=3597 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 242.864192][ T30] audit: type=1326 audit(242.410:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3599 comm="syz.0.56" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa895a768 code=0x7ffc0000 [ 242.867420][ T30] audit: type=1326 audit(242.410:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3599 comm="syz.0.56" exe="/syz-executor" sig=0 arch=c00000b7 syscall=440 compat=0 ip=0xffffa895a768 code=0x7ffc0000 [ 242.868119][ T30] audit: type=1326 audit(242.410:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3599 comm="syz.0.56" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa895a768 code=0x7ffc0000 [ 247.494769][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 247.495414][ T30] audit: type=1326 audit(247.040:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3611 comm="syz.1.60" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8355a768 code=0x7ffc0000 [ 247.501635][ T30] audit: type=1326 audit(247.040:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3611 comm="syz.1.60" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8355a768 code=0x7ffc0000 [ 248.358929][ T3615] netlink: 20 bytes leftover after parsing attributes in process `syz.1.61'. [ 248.359578][ T3615] netlink: 8 bytes leftover after parsing attributes in process `syz.1.61'. [ 251.675730][ T3626] netlink: 56 bytes leftover after parsing attributes in process `syz.0.65'. [ 254.854396][ T30] audit: type=1400 audit(254.390:166): avc: denied { allowed } for pid=3634 comm="syz.1.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 254.859582][ T30] audit: type=1400 audit(254.400:167): avc: denied { create } for pid=3634 comm="syz.1.68" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 254.941330][ T30] audit: type=1400 audit(254.480:168): avc: denied { name_bind } for pid=3634 comm="syz.1.68" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 254.942236][ T30] audit: type=1400 audit(254.480:169): avc: denied { node_bind } for pid=3634 comm="syz.1.68" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 256.085895][ T30] audit: type=1400 audit(255.630:170): avc: denied { watch } for pid=3640 comm="syz.0.71" path="/44" dev="tmpfs" ino=234 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 256.392813][ T30] audit: type=1400 audit(255.920:171): avc: denied { ioctl } for pid=3639 comm="syz.1.70" path="socket:[4357]" dev="sockfs" ino=4357 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 263.909055][ T30] audit: type=1400 audit(263.450:172): avc: denied { bind } for pid=3656 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 264.221861][ T30] audit: type=1400 audit(263.760:173): avc: denied { create } for pid=3658 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 264.223715][ T30] audit: type=1400 audit(263.770:174): avc: denied { setopt } for pid=3658 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 264.236215][ T30] audit: type=1400 audit(263.780:175): avc: denied { write } for pid=3658 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 269.583982][ T3681] netlink: 404 bytes leftover after parsing attributes in process `syz.1.82'. [ 269.585046][ T3681] ksmbd: Daemon and kernel module version mismatch. ksmbd: 0, kernel module: 1. User-space ksmbd should terminate. [ 270.013544][ T30] audit: type=1400 audit(269.550:176): avc: denied { ioctl } for pid=3683 comm="syz.0.84" path="socket:[3863]" dev="sockfs" ino=3863 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 275.482308][ T30] audit: type=1400 audit(275.030:177): avc: denied { shutdown } for pid=3710 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 275.578337][ T30] audit: type=1400 audit(275.120:178): avc: denied { setopt } for pid=3710 comm="syz.0.93" lport=47467 faddr=fc02:: scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 287.661216][ T30] audit: type=1400 audit(287.210:179): avc: denied { execute } for pid=3747 comm="syz.1.107" name="file0" dev="tmpfs" ino=239 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 288.009070][ T3750] Zero length message leads to an empty skb [ 288.014653][ T3750] capability: warning: `syz.1.108' uses deprecated v2 capabilities in a way that may be insecure [ 295.188309][ T30] audit: type=1400 audit(294.730:180): avc: denied { create } for pid=3770 comm="syz.0.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 295.193554][ T30] audit: type=1400 audit(294.740:181): avc: denied { connect } for pid=3770 comm="syz.0.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 295.577032][ T3773] netlink: 'syz.0.116': attribute type 4 has an invalid length. [ 299.069658][ T3777] netlink: 'syz.0.116': attribute type 4 has an invalid length. [ 302.622568][ T30] audit: type=1400 audit(302.160:182): avc: denied { write } for pid=3783 comm="syz.1.120" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 302.638408][ T3784] usb usb1: usbfs: interface 0 claimed by hub while 'syz.1.120' sets config #1 [ 318.244717][ T30] audit: type=1400 audit(317.790:183): avc: denied { create } for pid=3803 comm="syz.1.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 318.411980][ T30] audit: type=1400 audit(317.950:184): avc: denied { read write } for pid=3806 comm="syz.0.127" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 318.412966][ T30] audit: type=1400 audit(317.950:185): avc: denied { open } for pid=3806 comm="syz.0.127" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 318.418515][ T30] audit: type=1400 audit(317.950:186): avc: denied { ioctl } for pid=3806 comm="syz.0.127" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 318.732213][ T10] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 318.912664][ T10] usb 1-1: Using ep0 maxpacket: 32 [ 318.943977][ T10] usb 1-1: unable to get BOS descriptor or descriptor too short [ 318.964692][ T10] usb 1-1: config 252 has an invalid interface number: 91 but max is 0 [ 318.965373][ T10] usb 1-1: config 252 has no interface number 0 [ 318.965704][ T10] usb 1-1: config 252 interface 91 altsetting 3 has an invalid descriptor for endpoint zero, skipping [ 318.966145][ T10] usb 1-1: config 252 interface 91 altsetting 3 endpoint 0x8 has invalid maxpacket 1080, setting to 64 [ 318.966410][ T10] usb 1-1: config 252 interface 91 has no altsetting 0 [ 318.995998][ T10] usb 1-1: New USB device found, idVendor=07ca, idProduct=a309, bcdDevice=7f.92 [ 319.002436][ T10] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 319.003035][ T10] usb 1-1: Product: syz [ 319.003188][ T10] usb 1-1: Manufacturer: syz [ 319.003324][ T10] usb 1-1: SerialNumber: syz [ 319.498475][ T10] usb 1-1: USB disconnect, device number 2 [ 323.797276][ T30] audit: type=1400 audit(323.340:187): avc: denied { create } for pid=3823 comm="syz.1.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 323.828063][ T30] audit: type=1400 audit(323.370:188): avc: denied { getopt } for pid=3823 comm="syz.1.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 325.656064][ T30] audit: type=1400 audit(325.200:189): avc: denied { create } for pid=3829 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 325.769645][ T30] audit: type=1400 audit(325.310:190): avc: denied { write } for pid=3829 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 328.957335][ T30] audit: type=1326 audit(328.500:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8355a768 code=0x7ffc0000 [ 328.970564][ T30] audit: type=1326 audit(328.500:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8355a768 code=0x7ffc0000 [ 328.971135][ T30] audit: type=1326 audit(328.500:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8355a768 code=0x7ffc0000 [ 328.971621][ T30] audit: type=1326 audit(328.510:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8355a768 code=0x7ffc0000 [ 328.972006][ T30] audit: type=1326 audit(328.510:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8355a768 code=0x7ffc0000 [ 328.972347][ T30] audit: type=1326 audit(328.510:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8355a768 code=0x7ffc0000 [ 328.972722][ T30] audit: type=1326 audit(328.520:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8355a768 code=0x7ffc0000 [ 328.984178][ T30] audit: type=1326 audit(328.520:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=108 compat=0 ip=0xffff8355a768 code=0x7ffc0000 [ 328.988397][ T30] audit: type=1326 audit(328.530:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8355a768 code=0x7ffc0000 [ 330.755855][ T3852] netlink: 20 bytes leftover after parsing attributes in process `syz.0.145'. [ 330.762187][ T3852] x_tables: ip_tables: udp match: only valid for protocol 17 [ 331.292869][ T30] audit: type=1400 audit(330.840:200): avc: denied { ioctl } for pid=3858 comm="syz.1.148" path="socket:[4699]" dev="sockfs" ino=4699 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 331.454093][ T3856] dummy0: entered promiscuous mode [ 331.470052][ T3856] netlink: 4 bytes leftover after parsing attributes in process `syz.0.147'. [ 331.620040][ T3856] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:578 [ 331.637092][ T3856] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 3856, name: syz.0.147 [ 331.639666][ T3856] preempt_count: 0, expected: 0 [ 331.642067][ T3856] RCU nest depth: 1, expected: 0 [ 331.643717][ T3856] 2 locks held by syz.0.147/3856: [ 331.645307][ T3856] #0: ffff800088807028 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_dellink+0x208/0x7ac [ 331.655953][ T3856] #1: ffff8000872abb60 (rcu_read_lock){....}-{1:3}, at: packet_notifier+0x50/0x664 [ 331.665801][ T3856] CPU: 0 UID: 0 PID: 3856 Comm: syz.0.147 Not tainted 6.15.0-syzkaller-02148-g44ed0f35df34 #0 PREEMPT [ 331.666210][ T3856] Hardware name: linux,dummy-virt (DT) [ 331.666735][ T3856] Call trace: [ 331.667108][ T3856] show_stack+0x18/0x24 (C) [ 331.667410][ T3856] dump_stack_lvl+0xdc/0xf4 [ 331.667543][ T3856] dump_stack+0x1c/0x28 [ 331.667640][ T3856] __might_resched+0x3dc/0x5bc [ 331.667735][ T3856] __might_sleep+0x94/0x154 [ 331.667823][ T3856] __mutex_lock+0xcc/0x9d8 [ 331.667926][ T3856] mutex_lock_nested+0x24/0x30 [ 331.668016][ T3856] dev_set_promiscuity+0x7c/0x1d0 [ 331.668116][ T3856] packet_dev_mc+0x5c/0x22c [ 331.668205][ T3856] packet_notifier+0x430/0x664 [ 331.668294][ T3856] notifier_call_chain+0x11c/0x49c [ 331.668386][ T3856] raw_notifier_call_chain+0x18/0x24 [ 331.668473][ T3856] call_netdevice_notifiers_info+0x88/0xe8 [ 331.668560][ T3856] unregister_netdevice_many_notify+0xac0/0x1be8 [ 331.668652][ T3856] rtnl_dellink+0x2ec/0x7ac [ 331.668782][ T3856] rtnetlink_rcv_msg+0x65c/0x8d4 [ 331.668879][ T3856] netlink_rcv_skb+0x1a8/0x348 [ 331.668989][ T3856] rtnetlink_rcv+0x18/0x24 [ 331.669077][ T3856] netlink_unicast+0x3c0/0x670 [ 331.669167][ T3856] netlink_sendmsg+0x644/0xa54 [ 331.669254][ T3856] __sock_sendmsg+0xc8/0x168 [ 331.669351][ T3856] ____sys_sendmsg+0x504/0x768 [ 331.669439][ T3856] ___sys_sendmsg+0x11c/0x19c [ 331.669530][ T3856] __sys_sendmsg+0x114/0x19c [ 331.669621][ T3856] __arm64_sys_sendmsg+0x70/0xa0 [ 331.669709][ T3856] invoke_syscall+0x6c/0x258 [ 331.669794][ T3856] el0_svc_common.constprop.0+0xac/0x230 [ 331.669879][ T3856] do_el0_svc+0x40/0x58 [ 331.670051][ T3856] el0_svc+0x50/0x180 [ 331.670149][ T3856] el0t_64_sync_handler+0x10c/0x138 [ 331.670274][ T3856] el0t_64_sync+0x198/0x19c [ 331.705670][ T3856] [ 331.706417][ T3856] ============================= [ 331.706816][ T3856] [ BUG: Invalid wait context ] [ 331.707785][ T3856] 6.15.0-syzkaller-02148-g44ed0f35df34 #0 Tainted: G W [ 331.708340][ T3856] ----------------------------- [ 331.708755][ T3856] syz.0.147/3856 is trying to lock: [ 331.709206][ T3856] ffff0000133cad10 (&dev_instance_lock_key#3){+.+.}-{4:4}, at: dev_set_promiscuity+0x7c/0x1d0 [ 331.710968][ T3856] other info that might help us debug this: [ 331.711427][ T3856] context-{5:5} [ 331.711804][ T3856] 2 locks held by syz.0.147/3856: [ 331.712194][ T3856] #0: ffff800088807028 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_dellink+0x208/0x7ac [ 331.713192][ T3856] #1: ffff8000872abb60 (rcu_read_lock){....}-{1:3}, at: packet_notifier+0x50/0x664 [ 331.714239][ T3856] stack backtrace: [ 331.714643][ T3856] CPU: 0 UID: 0 PID: 3856 Comm: syz.0.147 Tainted: G W 6.15.0-syzkaller-02148-g44ed0f35df34 #0 PREEMPT [ 331.715437][ T3856] Tainted: [W]=WARN [ 331.715732][ T3856] Hardware name: linux,dummy-virt (DT) [ 331.716116][ T3856] Call trace: [ 331.716371][ T3856] show_stack+0x18/0x24 (C) [ 331.716703][ T3856] dump_stack_lvl+0xa4/0xf4 [ 331.717036][ T3856] dump_stack+0x1c/0x28 [ 331.717334][ T3856] __lock_acquire+0xaf8/0x2380 [ 331.717652][ T3856] lock_acquire+0x310/0x38c [ 331.718000][ T3856] __mutex_lock+0x144/0x9d8 [ 331.718312][ T3856] mutex_lock_nested+0x24/0x30 [ 331.718621][ T3856] dev_set_promiscuity+0x7c/0x1d0 [ 331.718958][ T3856] packet_dev_mc+0x5c/0x22c [ 331.719262][ T3856] packet_notifier+0x430/0x664 [ 331.719580][ T3856] notifier_call_chain+0x11c/0x49c [ 331.719921][ T3856] raw_notifier_call_chain+0x18/0x24 [ 331.720401][ T3856] call_netdevice_notifiers_info+0x88/0xe8 [ 331.720845][ T3856] unregister_netdevice_many_notify+0xac0/0x1be8 [ 331.721228][ T3856] rtnl_dellink+0x2ec/0x7ac [ 331.721543][ T3856] rtnetlink_rcv_msg+0x65c/0x8d4 [ 331.721861][ T3856] netlink_rcv_skb+0x1a8/0x348 [ 331.722228][ T3856] rtnetlink_rcv+0x18/0x24 [ 331.722529][ T3856] netlink_unicast+0x3c0/0x670 [ 331.722817][ T3856] netlink_sendmsg+0x644/0xa54 [ 331.723132][ T3856] __sock_sendmsg+0xc8/0x168 [ 331.723441][ T3856] ____sys_sendmsg+0x504/0x768 [ 331.723755][ T3856] ___sys_sendmsg+0x11c/0x19c [ 331.724076][ T3856] __sys_sendmsg+0x114/0x19c [ 331.724391][ T3856] __arm64_sys_sendmsg+0x70/0xa0 [ 331.724711][ T3856] invoke_syscall+0x6c/0x258 [ 331.725030][ T3856] el0_svc_common.constprop.0+0xac/0x230 [ 331.725367][ T3856] do_el0_svc+0x40/0x58 [ 331.725666][ T3856] el0_svc+0x50/0x180 [ 331.726008][ T3856] el0t_64_sync_handler+0x10c/0x138 [ 331.726356][ T3856] el0t_64_sync+0x198/0x19c [ 331.733824][ T3856] dummy0 (unregistering): left promiscuous mode SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 332.914699][ T1575] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 333.103715][ T1575] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 333.274247][ T1575] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 333.453198][ T1575] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 335.962247][ T1575] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 336.045584][ T1575] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 336.119938][ T1575] bond0 (unregistering): Released all slaves [ 336.347689][ T1575] hsr_slave_0: left promiscuous mode [ 336.364952][ T1575] hsr_slave_1: left promiscuous mode [ 336.409659][ T1575] veth1_macvtap: left promiscuous mode [ 336.413433][ T1575] veth0_macvtap: left promiscuous mode [ 336.415288][ T1575] veth1_vlan: left promiscuous mode [ 336.416547][ T1575] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 02:51:46 Registers: info registers vcpu 0 CPU#0 PC=ffff80008545eedc X00=ffff80008545eed8 X01=0000000000000000 X02=1ffff00010d941ef X03=00000000f3f3f300 X04=00000000f1f1f1f1 X05=ffff800086ca0f78 X06=ffff700010000d54 X07=0000000041b58ab3 X08=ffff8000800069a7 X09=dfff800000000000 X10=ffff700010000d34 X11=1ffff00010000d34 X12=ffff700010000d35 X13=0000000000000000 X14=1fffe000031bdc65 X15=1850c61e3edf5287 X16=34030000b4caffff X17=7daefcfc1c806179 X18=ffff00001e4ca8c0 X19=ffff80008705bc60 X20=1ffff00010000d54 X21=ffff000016ede030 X22=000000000000001a X23=ffff000016ede0b0 X24=ffff800080344724 X25=1fffe00002ddbc09 X26=ffff000016ede040 X27=ffff000016ede048 X28=ffff000016ede000 X29=ffff800080006a50 X30=ffff800081bb4550 SP=ffff800080006a50 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=00524f5252450040:0000000000000000 Q05=00524f5252450040:0000000000000000 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff61d0150:0000fffff61d0150 Q17=ffffff80ffffffd0:0000fffff61d0120 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800080989b60 X00=0000000000000004 X01=ffff00000fc25ac0 X02=0000000000000010 X03=1fffe0000d419dfa X04=0000000000000001 X05=00000000f1f1f1f1 X06=dfff800000000000 X07=ffff700014546e42 X08=0000000041b58ab3 X09=dfff800000000000 X10=ffff700014546e48 X11=1ffff00014546dfc X12=ffff700014546dfd X13=0000000000000000 X14=0000000020000000 X15=0000000020936000 X16=0000000000000000 X17=1ffff00014546f00 X18=1ffff00014546ec0 X19=ffff8000870ade58 X20=ffff00001d596410 X21=ffff800080a6e514 X22=1fffe00003ab2c81 X23=ffff80008545e6f8 X24=0000000000000000 X25=ffff8000870b0000 X26=0000000000000000 X27=00000000ffffffff X28=1ffff00014546ebc X29=ffff8000a2a37190 X30=ffff80008545e724 SP=ffff8000a2a37230 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000fffff7a4f780:76dc214cea8ec200 Q02=0000fffff7a4f760:ffffff80ffffffd8 Q03=0000fffff7a4f810:0000fffff7a4f810 Q04=0000fffff7a4f810:0000ffff83536848 Q05=0000fffff7a4f7e0:0000fffff7a4f810 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff7a4fa30:0000fffff7a4fa30 Q17=ffffff80ffffffd0:0000fffff7a4fa00 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000