last executing test programs: 11.425001949s ago: executing program 1 (id=139): syz_emit_ethernet(0x86, &(0x7f0000000440)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x78, 0xfffc, 0x0, 0x2, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x0, 0x0, 0x3, 0x0, 0x0, {0x17, 0x4, 0x0, 0x0, 0x0, 0x65, 0x0, 0x6, 0x2f, 0x0, @remote, @multicast2, {[@noop, @timestamp_addr={0x44, 0xc, 0x2, 0x1, 0x0, [{@multicast2, 0x5}]}, @cipso={0x86, 0x38, 0x3, [{0x2, 0x12, "1600"/16}, {0x6, 0x2}, {0x2, 0xf, "d109567cb50ec760777fb80755"}, {0x5, 0xf, "f97ad55b9c2fe73a7c9e43126f"}]}]}}}}}}}, 0x0) 11.267352368s ago: executing program 1 (id=140): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000000c0)='kmem_cache_free\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r0}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) 8.504751129s ago: executing program 1 (id=155): r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000017c0), 0x4) 8.414104383s ago: executing program 0 (id=156): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000000}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008001500b7040000000000008500000058"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) setitimer(0x2, 0x0, 0x0) 8.216557684s ago: executing program 1 (id=157): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x19, 0x4, 0x4, 0x8}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001b00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r0}, &(0x7f0000001c00), &(0x7f0000001c40)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4ea3, 0x0, @loopback, 0x3}, 0x1c) sendmsg(r3, &(0x7f00000000c0)={0x0, 0x953a, &(0x7f0000000100)=[{&(0x7f0000000000)="2c10", 0xfff2}], 0x1, 0x0, 0x0, 0x2c}, 0x44004) 8.214865354s ago: executing program 0 (id=158): r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$VT_ACTIVATE(r0, 0x4b4a, 0x10000000000004) r1 = socket$key(0xf, 0x3, 0x2) r2 = socket(0x1e, 0x2, 0x0) chdir(0x0) write$binfmt_format(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x4000004) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0xfffffffc}, 0x10) sendmsg$key(r1, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000100)=ANY=[@ANYBLOB="02040003140000002cbd7000fcdbdf250600090008010000274b58773a9a7fdf777df6bbb5180020ddd9091cde4d3153b37f884bcac0b814550000000000000005"], 0xa0}, 0x1, 0x7}, 0x0) 7.876717102s ago: executing program 1 (id=159): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=@ipv4_newaddr={0x30, 0x14, 0x1, 0x30bd26, 0x25dfdbfd, {0x2, 0x8, 0x1, 0xfe, r4}, [@IFA_FLAGS={0x8, 0x8, 0x407}, @IFA_LOCAL={0x8, 0x2, @multicast2}, @IFA_BROADCAST={0x8, 0x4, @multicast2}]}, 0x30}, 0x1, 0x0, 0x0, 0x20014015}, 0x0) 715.931232ms ago: executing program 0 (id=160): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000040)={0x200000, 0x200000, 0x9, 0x0, 0x4}) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="dc", 0x1}], 0x8) 542.720712ms ago: executing program 0 (id=161): r0 = socket$netlink(0x10, 0x3, 0x9) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000017c0), 0x4) 340.510102ms ago: executing program 0 (id=162): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000200100000102"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000800), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) close_range(r2, 0xffffffffffffffff, 0x0) 442.89µs ago: executing program 1 (id=163): r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000740)={'ip6tnl0\x00', 0x0, 0x50, 0x0, 0x3, 0xfffffff9, 0x0, @local, @local, 0x7, 0x7, 0x202, 0x8}}) 0s ago: executing program 0 (id=164): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x3c}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x80) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:46656' (ED25519) to the list of known hosts. [ 138.424459][ T30] audit: type=1400 audit(137.850:46): avc: denied { name_bind } for pid=3314 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 138.764319][ T30] audit: type=1400 audit(138.190:47): avc: denied { execute } for pid=3315 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 138.770027][ T30] audit: type=1400 audit(138.200:48): avc: denied { execute_no_trans } for pid=3315 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 143.588765][ T30] audit: type=1400 audit(143.010:49): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 143.594725][ T30] audit: type=1400 audit(143.020:50): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 143.619184][ T3315] cgroup: Unknown subsys name 'net' [ 143.639448][ T30] audit: type=1400 audit(143.070:51): avc: denied { unmount } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 143.820381][ T3315] cgroup: Unknown subsys name 'cpuset' [ 143.856077][ T3315] cgroup: Unknown subsys name 'rlimit' [ 144.071096][ T30] audit: type=1400 audit(143.500:52): avc: denied { setattr } for pid=3315 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 144.080472][ T30] audit: type=1400 audit(143.510:53): avc: denied { mounton } for pid=3315 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 144.085330][ T30] audit: type=1400 audit(143.510:54): avc: denied { mount } for pid=3315 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 144.411761][ T3317] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 144.416468][ T30] audit: type=1400 audit(143.850:55): avc: denied { relabelto } for pid=3317 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 144.419304][ T30] audit: type=1400 audit(143.850:56): avc: denied { write } for pid=3317 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 144.497108][ T30] audit: type=1400 audit(143.920:57): avc: denied { read } for pid=3315 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 144.501313][ T30] audit: type=1400 audit(143.930:58): avc: denied { open } for pid=3315 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 144.520884][ T3315] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 158.739395][ T30] audit: type=1400 audit(158.170:59): avc: denied { execmem } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 158.824749][ T30] audit: type=1400 audit(158.250:60): avc: denied { read } for pid=3320 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 158.827326][ T30] audit: type=1400 audit(158.260:61): avc: denied { open } for pid=3320 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 158.835326][ T30] audit: type=1400 audit(158.260:62): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 158.862842][ T30] audit: type=1400 audit(158.290:63): avc: denied { module_request } for pid=3320 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 158.968340][ T30] audit: type=1400 audit(158.400:64): avc: denied { sys_module } for pid=3320 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 162.902019][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 162.921070][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 163.198135][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 163.213214][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 165.080806][ T3321] hsr_slave_0: entered promiscuous mode [ 165.097526][ T3321] hsr_slave_1: entered promiscuous mode [ 165.538724][ T3320] hsr_slave_0: entered promiscuous mode [ 165.545879][ T3320] hsr_slave_1: entered promiscuous mode [ 165.551075][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 165.554375][ T3320] Cannot create hsr debugfs directory [ 166.634957][ T30] audit: type=1400 audit(166.060:65): avc: denied { create } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 166.638736][ T30] audit: type=1400 audit(166.070:66): avc: denied { write } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 166.650019][ T30] audit: type=1400 audit(166.080:67): avc: denied { read } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 166.696885][ T3321] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 166.758304][ T3321] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 166.797665][ T3321] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 166.867241][ T3321] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 167.080203][ T3320] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 167.121010][ T3320] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 167.148002][ T3320] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 167.168006][ T3320] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 168.828746][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 168.985075][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 175.141460][ T3320] veth0_vlan: entered promiscuous mode [ 175.192327][ T3320] veth1_vlan: entered promiscuous mode [ 175.357651][ T3320] veth0_macvtap: entered promiscuous mode [ 175.391949][ T3320] veth1_macvtap: entered promiscuous mode [ 175.632306][ T1307] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 175.633110][ T1307] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 175.633268][ T1307] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 175.633474][ T1307] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 175.754339][ T3321] veth0_vlan: entered promiscuous mode [ 175.940255][ T30] audit: type=1400 audit(175.370:68): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 175.970262][ T30] audit: type=1400 audit(175.390:69): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.06SXcX/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 175.987580][ T30] audit: type=1400 audit(175.420:70): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 176.012530][ T30] audit: type=1400 audit(175.440:71): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.06SXcX/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 176.025928][ T30] audit: type=1400 audit(175.460:72): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.06SXcX/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4048 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 176.039263][ T3321] veth1_vlan: entered promiscuous mode [ 176.101919][ T30] audit: type=1400 audit(175.530:73): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 176.128473][ T30] audit: type=1400 audit(175.560:74): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 176.139413][ T30] audit: type=1400 audit(175.570:75): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="gadgetfs" ino=4060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 176.163314][ T30] audit: type=1400 audit(175.590:76): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 176.209093][ T30] audit: type=1400 audit(175.630:77): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 176.258799][ T3321] veth0_macvtap: entered promiscuous mode [ 176.276699][ T3321] veth1_macvtap: entered promiscuous mode [ 176.442357][ T3320] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 176.685026][ T1622] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.687265][ T1622] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.689344][ T1622] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 176.691647][ T1622] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 181.090181][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 181.094329][ T30] audit: type=1400 audit(180.520:88): avc: denied { prog_run } for pid=3488 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 183.651464][ T30] audit: type=1400 audit(183.050:89): avc: denied { read write } for pid=3507 comm="syz.0.19" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 183.660027][ T30] audit: type=1400 audit(183.080:90): avc: denied { open } for pid=3507 comm="syz.0.19" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 183.672997][ T30] audit: type=1400 audit(183.090:91): avc: denied { ioctl } for pid=3507 comm="syz.0.19" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 184.046050][ T3397] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 184.119292][ T3512] pim6reg1: entered promiscuous mode [ 184.119925][ T3512] pim6reg1: entered allmulticast mode [ 184.226032][ T3397] usb 1-1: Using ep0 maxpacket: 8 [ 184.372676][ T3397] usb 1-1: config index 0 descriptor too short (expected 5924, got 36) [ 184.373211][ T3397] usb 1-1: config 250 has an invalid interface number: 228 but max is -1 [ 184.374138][ T3397] usb 1-1: config 250 has 1 interface, different from the descriptor's value: 0 [ 184.374450][ T3397] usb 1-1: config 250 has no interface number 0 [ 184.374862][ T3397] usb 1-1: config 250 interface 228 altsetting 255 endpoint 0x1 has invalid maxpacket 65280, setting to 1024 [ 184.375140][ T3397] usb 1-1: config 250 interface 228 altsetting 255 bulk endpoint 0x1 has invalid maxpacket 1024 [ 184.375804][ T3397] usb 1-1: config 250 interface 228 altsetting 255 endpoint 0x82 has invalid wMaxPacketSize 0 [ 184.376072][ T3397] usb 1-1: config 250 interface 228 altsetting 255 bulk endpoint 0x82 has invalid maxpacket 0 [ 184.376302][ T3397] usb 1-1: config 250 interface 228 altsetting 255 has 2 endpoint descriptors, different from the interface descriptor's value: 17 [ 184.376577][ T3397] usb 1-1: config 250 interface 228 has no altsetting 0 [ 184.406817][ T3397] usb 1-1: New USB device found, idVendor=0525, idProduct=d292, bcdDevice= 0.07 [ 184.407329][ T3397] usb 1-1: New USB device strings: Mfr=0, Product=106, SerialNumber=59 [ 184.407690][ T3397] usb 1-1: Product: syz [ 184.407785][ T3397] usb 1-1: SerialNumber: syz [ 184.565728][ T3397] hub 1-1:250.228: bad descriptor, ignoring hub [ 184.566703][ T3397] hub 1-1:250.228: probe with driver hub failed with error -5 [ 184.832769][ T3397] usblp 1-1:250.228: usblp0: USB Bidirectional printer dev 2 if 228 alt 255 proto 3 vid 0x0525 pid 0xD292 [ 184.992805][ T3397] usb 1-1: USB disconnect, device number 2 [ 185.106999][ T3397] usblp0: removed [ 185.824205][ T30] audit: type=1400 audit(185.250:92): avc: denied { create } for pid=3522 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 187.366012][ T968] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 187.534482][ T968] usb 1-1: Using ep0 maxpacket: 8 [ 187.541380][ T968] usb 1-1: config index 0 descriptor too short (expected 5924, got 36) [ 187.542950][ T968] usb 1-1: config 250 has an invalid interface number: 228 but max is -1 [ 187.544509][ T968] usb 1-1: config 250 has 1 interface, different from the descriptor's value: 0 [ 187.545330][ T968] usb 1-1: config 250 has no interface number 0 [ 187.546103][ T968] usb 1-1: config 250 interface 228 altsetting 255 endpoint 0x1 has invalid maxpacket 65280, setting to 1024 [ 187.547199][ T968] usb 1-1: config 250 interface 228 altsetting 255 bulk endpoint 0x1 has invalid maxpacket 1024 [ 187.547998][ T968] usb 1-1: config 250 interface 228 altsetting 255 endpoint 0x82 has invalid wMaxPacketSize 0 [ 187.548816][ T968] usb 1-1: config 250 interface 228 altsetting 255 bulk endpoint 0x82 has invalid maxpacket 0 [ 187.549576][ T968] usb 1-1: config 250 interface 228 altsetting 255 has 2 endpoint descriptors, different from the interface descriptor's value: 17 [ 187.550719][ T968] usb 1-1: config 250 interface 228 has no altsetting 0 [ 187.578099][ T968] usb 1-1: New USB device found, idVendor=0525, idProduct=d292, bcdDevice= 0.07 [ 187.579308][ T968] usb 1-1: New USB device strings: Mfr=0, Product=106, SerialNumber=59 [ 187.580120][ T968] usb 1-1: Product: syz [ 187.580616][ T968] usb 1-1: SerialNumber: syz [ 187.616624][ T968] hub 1-1:250.228: bad descriptor, ignoring hub [ 187.617930][ T968] hub 1-1:250.228: probe with driver hub failed with error -5 [ 187.849058][ T968] usblp 1-1:250.228: usblp0: USB Bidirectional printer dev 3 if 228 alt 255 proto 3 vid 0x0525 pid 0xD292 [ 187.901844][ T968] usb 1-1: USB disconnect, device number 3 [ 188.038317][ T968] usblp0: removed [ 191.176120][ T3540] wg2: entered promiscuous mode [ 191.180468][ T3540] wg2: entered allmulticast mode [ 195.016746][ T30] audit: type=1400 audit(194.450:93): avc: denied { relabelfrom } for pid=3561 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 195.022510][ T30] audit: type=1400 audit(194.450:94): avc: denied { relabelto } for pid=3561 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 196.041577][ T3569] pim6reg1: entered promiscuous mode [ 196.042108][ T3569] pim6reg1: entered allmulticast mode [ 199.999173][ T30] audit: type=1400 audit(199.420:95): avc: denied { create } for pid=3596 comm="syz.0.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 204.555940][ T3623] wg2: entered promiscuous mode [ 204.557264][ T3623] wg2: entered allmulticast mode [ 205.047726][ T3627] syzkaller0: entered promiscuous mode [ 205.048688][ T3627] syzkaller0: entered allmulticast mode [ 208.636601][ T30] audit: type=1400 audit(208.070:96): avc: denied { create } for pid=3632 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 208.657055][ T30] audit: type=1400 audit(208.090:97): avc: denied { write } for pid=3632 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 213.964049][ T30] audit: type=1400 audit(213.390:98): avc: denied { write } for pid=3649 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 216.104609][ T30] audit: type=1400 audit(215.540:99): avc: denied { create } for pid=3653 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 221.795815][ T31] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 222.056445][ T31] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 222.057105][ T31] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 222.057636][ T31] usb 1-1: config 1 interface 1 altsetting 1 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 222.155661][ T31] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 222.156240][ T31] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 222.156425][ T31] usb 1-1: Product: syz [ 222.156572][ T31] usb 1-1: Manufacturer: syz [ 222.156667][ T31] usb 1-1: SerialNumber: syz [ 223.297548][ T31] cdc_ncm 1-1:1.0: bind() failure [ 223.392811][ T31] cdc_ncm 1-1:1.1: probe with driver cdc_ncm failed with error -71 [ 223.397857][ T31] cdc_mbim 1-1:1.1: probe with driver cdc_mbim failed with error -71 [ 223.405315][ T31] usbtest 1-1:1.1: probe with driver usbtest failed with error -71 [ 223.446577][ T31] usb 1-1: USB disconnect, device number 4 [ 223.756928][ T30] audit: type=1400 audit(223.180:100): avc: denied { create } for pid=3672 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 223.763229][ T30] audit: type=1400 audit(223.190:101): avc: denied { bind } for pid=3672 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 223.776598][ T30] audit: type=1400 audit(223.210:102): avc: denied { listen } for pid=3672 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 223.782420][ T30] audit: type=1400 audit(223.210:103): avc: denied { connect } for pid=3672 comm="syz.0.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 224.166950][ T30] audit: type=1400 audit(223.600:104): avc: denied { create } for pid=3674 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 224.186102][ T30] audit: type=1400 audit(223.610:105): avc: denied { write } for pid=3674 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 224.679334][ T30] audit: type=1400 audit(224.110:106): avc: denied { create } for pid=3678 comm="syz.0.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 224.688628][ T30] audit: type=1400 audit(224.120:107): avc: denied { setopt } for pid=3678 comm="syz.0.86" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 224.696448][ T30] audit: type=1400 audit(224.130:108): avc: denied { connect } for pid=3678 comm="syz.0.86" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 224.705939][ T30] audit: type=1400 audit(224.130:109): avc: denied { write } for pid=3678 comm="syz.0.86" laddr=fe80::4c4e:9dff:fe93:c2df lport=58 faddr=ff02::1 fport=65535 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 236.891052][ T3698] netlink: 4 bytes leftover after parsing attributes in process `syz.1.90'. [ 238.615682][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 238.617463][ T30] audit: type=1400 audit(238.040:111): avc: denied { read } for pid=3702 comm="syz.1.92" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 238.637283][ T30] audit: type=1400 audit(238.070:112): avc: denied { open } for pid=3702 comm="syz.1.92" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 259.318954][ T3734] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 263.321793][ T30] audit: type=1400 audit(262.750:113): avc: denied { setopt } for pid=3735 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 268.704767][ T3743] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 268.733079][ T3743] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 269.261873][ T30] audit: type=1400 audit(268.690:114): avc: denied { relabelfrom } for pid=3748 comm="syz.1.106" name="TCPv6" dev="sockfs" ino=5452 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 269.262423][ T3749] SELinux: Context system_u:object_r:mouse_device_t:s0 is not valid (left unmapped). [ 269.271505][ T30] audit: type=1400 audit(268.700:115): avc: denied { relabelto } for pid=3748 comm="syz.1.106" name="TCPv6" dev="sockfs" ino=5452 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=tcp_socket permissive=1 trawcon="system_u:object_r:mouse_device_t:s0" [ 273.443276][ T30] audit: type=1400 audit(272.860:116): avc: denied { read write } for pid=3753 comm="syz.0.108" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 273.467408][ T30] audit: type=1400 audit(272.880:117): avc: denied { open } for pid=3753 comm="syz.0.108" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 279.064677][ T3383] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 279.227915][ T3383] usb 1-1: Using ep0 maxpacket: 16 [ 279.295480][ T3383] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 279.302533][ T3383] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 279.306301][ T3383] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 18 [ 279.329458][ T3383] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 279.329934][ T3383] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 279.330310][ T3383] usb 1-1: SerialNumber: syz [ 279.405568][ T3383] hub 1-1:1.0: bad descriptor, ignoring hub [ 279.407412][ T3383] hub 1-1:1.0: probe with driver hub failed with error -5 [ 279.416620][ T3383] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -22 [ 287.748475][ T3776] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 287.749928][ T3776] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 293.808718][ T31] usb 1-1: USB disconnect, device number 5 [ 294.423857][ T30] audit: type=1326 audit(293.840:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3784 comm="syz.0.116" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 294.428790][ T30] audit: type=1326 audit(293.860:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3784 comm="syz.0.116" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 294.430522][ T30] audit: type=1326 audit(293.860:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3784 comm="syz.0.116" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 294.435902][ T30] audit: type=1326 audit(293.870:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3784 comm="syz.0.116" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 294.438460][ T30] audit: type=1326 audit(293.870:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3784 comm="syz.0.116" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 294.440823][ T30] audit: type=1326 audit(293.870:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3784 comm="syz.0.116" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 294.448795][ T30] audit: type=1326 audit(293.870:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3784 comm="syz.0.116" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 294.452468][ T30] audit: type=1326 audit(293.870:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3784 comm="syz.0.116" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 294.469183][ T30] audit: type=1326 audit(293.900:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3784 comm="syz.0.116" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 294.472589][ T30] audit: type=1326 audit(293.900:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3784 comm="syz.0.116" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 297.642132][ T3791] netlink: 4 bytes leftover after parsing attributes in process `syz.0.117'. [ 297.652187][ T3791] netlink: 12 bytes leftover after parsing attributes in process `syz.0.117'. [ 298.870641][ T3793] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 301.931610][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 301.935460][ T30] audit: type=1400 audit(301.360:142): avc: denied { load_policy } for pid=3797 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 302.002324][ T3798] SELinux: failed to load policy [ 302.295065][ T30] audit: type=1400 audit(301.720:143): avc: denied { append } for pid=3799 comm="syz.0.121" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 303.245469][ T30] audit: type=1326 audit(302.680:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3808 comm="syz.0.125" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 303.256196][ T30] audit: type=1326 audit(302.690:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3808 comm="syz.0.125" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 303.260973][ T30] audit: type=1326 audit(302.690:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3808 comm="syz.0.125" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 303.267574][ T30] audit: type=1326 audit(302.700:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3808 comm="syz.0.125" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 303.269222][ T30] audit: type=1326 audit(302.700:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3808 comm="syz.0.125" exe="/syz-executor" sig=0 arch=40000028 syscall=259 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 303.272953][ T30] audit: type=1326 audit(302.700:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3808 comm="syz.0.125" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x7ffc0000 [ 303.284471][ T30] audit: type=1326 audit(302.700:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3808 comm="syz.0.125" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1322c0 code=0x7ffc0000 [ 303.577902][ T30] audit: type=1400 audit(303.010:151): avc: denied { name_bind } for pid=3794 comm="syz.1.119" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 308.436344][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 308.443052][ T30] audit: type=1400 audit(307.870:153): avc: denied { name_bind } for pid=3822 comm="syz.1.131" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 310.051229][ T30] audit: type=1326 audit(309.480:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3843 comm="syz.1.140" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x125c64 code=0x0 [ 310.539256][ T30] audit: type=1400 audit(309.970:155): avc: denied { validate_trans } for pid=3850 comm="syz.0.143" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 310.865006][ T30] audit: type=1400 audit(310.280:156): avc: denied { connect } for pid=3854 comm="syz.0.145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 311.272104][ T30] audit: type=1400 audit(310.700:157): avc: denied { read write } for pid=3858 comm="syz.0.147" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 311.281353][ T30] audit: type=1400 audit(310.710:158): avc: denied { open } for pid=3858 comm="syz.0.147" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 311.299891][ T30] audit: type=1400 audit(310.730:159): avc: denied { ioctl } for pid=3858 comm="syz.0.147" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 311.874882][ T3866] IPv6: addrconf: prefix option has invalid lifetime [ 312.889653][ T3878] syz.0.156 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 313.035927][ T30] audit: type=1400 audit(312.470:160): avc: denied { create } for pid=3879 comm="syz.0.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 320.534594][ T30] audit: type=1401 audit(319.960:161): op=fscreate invalid_context=DC [ 320.965869][ T30] audit: type=1400 audit(320.380:162): avc: denied { read write } for pid=3897 comm="syz.0.162" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 320.967379][ T30] audit: type=1400 audit(320.380:163): avc: denied { open } for pid=3897 comm="syz.0.162" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 320.967923][ T30] audit: type=1400 audit(320.390:164): avc: denied { mounton } for pid=3897 comm="syz.0.162" path="/88/file0" dev="tmpfs" ino=464 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 321.107976][ T30] audit: type=1400 audit(320.540:165): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 321.352917][ T3903] ------------[ cut here ]------------ [ 321.354561][ T3903] verifier bug: error during ctx access conversion (0)(1) [ 321.370198][ T3903] WARNING: CPU: 0 PID: 3903 at kernel/bpf/verifier.c:21448 convert_ctx_accesses+0x1740/0x24a8 [ 321.370891][ T3903] Modules linked in: [ 321.371320][ T3903] CPU: 0 UID: 0 PID: 3903 Comm: syz.0.164 Not tainted syzkaller #0 PREEMPT [ 321.371707][ T3903] Hardware name: linux,dummy-virt (DT) [ 321.371984][ T3903] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 321.372295][ T3903] pc : convert_ctx_accesses+0x1740/0x24a8 [ 321.372577][ T3903] lr : convert_ctx_accesses+0x1740/0x24a8 [ 321.372794][ T3903] sp : ffff80008ed27520 [ 321.372974][ T3903] x29: ffff80008ed27520 x28: ffff000024640000 x27: 0000000000000000 [ 321.373386][ T3903] x26: 0000000000000000 x25: 0000000000000002 x24: ffff000024640670 [ 321.374852][ T3903] x23: ffff000024640000 x22: 0000000000000000 x21: dfff800000000000 [ 321.375229][ T3903] x20: 1fffe000048c8001 x19: ffff80008556b2a0 x18: 0000000000000000 [ 321.375567][ T3903] x17: 0000000000000000 x16: ffff00006a08a4c4 x15: 00000000ffdade84 [ 321.375908][ T3903] x14: 00000000000016f0 x13: 00000000000016f8 x12: ffff700011da4e0d [ 321.376235][ T3903] x11: 1ffff00011da4e0c x10: ffff700011da4e0c x9 : dfff800000000000 [ 321.376632][ T3903] x8 : ffff80008ed27068 x7 : ffff80008ed27190 x6 : ffff80008ed270e0 [ 321.376955][ T3903] x5 : ffff80008ed270c8 x4 : 1ffff00011da4e22 x3 : 1fffe0000d41313e [ 321.377282][ T3903] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000015740000 [ 321.378120][ T3903] Call trace: [ 321.378579][ T3903] convert_ctx_accesses+0x1740/0x24a8 (P) [ 321.378937][ T3903] bpf_check+0x3c74/0x9508 [ 321.379174][ T3903] bpf_prog_load+0xe2c/0x1b74 [ 321.379467][ T3903] __sys_bpf+0x9c4/0x29c8 [ 321.379684][ T3903] __arm64_sys_bpf+0x70/0xa4 [ 321.379940][ T3903] invoke_syscall+0x6c/0x258 [ 321.380144][ T3903] el0_svc_common.constprop.0+0xac/0x230 [ 321.380395][ T3903] do_el0_svc_compat+0x40/0x68 [ 321.380623][ T3903] el0_svc_compat+0x4c/0x184 [ 321.380870][ T3903] el0t_32_sync_handler+0x88/0xac [ 321.381087][ T3903] el0t_32_sync+0x19c/0x1a0 [ 321.381430][ T3903] irq event stamp: 0 [ 321.381620][ T3903] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 321.382302][ T3903] hardirqs last disabled at (0): [] copy_process+0x1394/0x53f4 [ 321.382650][ T3903] softirqs last enabled at (0): [] copy_process+0x13cc/0x53f4 [ 321.382988][ T3903] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 321.383270][ T3903] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 322.294616][ T53] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.380442][ T53] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.509302][ T53] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.687642][ T53] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 322.966254][ T30] audit: type=1400 audit(322.390:166): avc: denied { read } for pid=3165 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 323.816695][ T53] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 323.858244][ T53] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 323.900537][ T53] bond0 (unregistering): Released all slaves [ 324.100056][ T53] hsr_slave_0: left promiscuous mode [ 324.104404][ T53] hsr_slave_1: left promiscuous mode [ 324.124485][ T53] veth1_macvtap: left promiscuous mode [ 324.125101][ T53] veth0_macvtap: left promiscuous mode [ 324.125907][ T53] veth1_vlan: left promiscuous mode [ 324.126852][ T53] veth0_vlan: left promiscuous mode [ 326.766947][ T53] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 326.949926][ T53] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 327.157751][ T53] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 327.281580][ T53] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 328.455534][ T53] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 328.506709][ T53] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 328.557784][ T53] bond0 (unregistering): Released all slaves [ 328.729313][ T53] hsr_slave_0: left promiscuous mode [ 328.731869][ T53] hsr_slave_1: left promiscuous mode [ 328.764208][ T53] veth1_macvtap: left promiscuous mode [ 328.766075][ T53] veth0_macvtap: left promiscuous mode [ 328.768821][ T53] veth1_vlan: left promiscuous mode [ 328.769867][ T53] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 22:48:40 Registers: info registers vcpu 0 CPU#0 PC=ffff800081be6474 X00=0000000000000002 X01=0000000000000007 X02=0000000000000000 X03=1fffe00001da6a2f X04=0000000000000018 X05=ffff800087ac2480 X06=ffff700010f58490 X07=0000000000000001 X08=ffff800087ac2480 X09=dfff800000000000 X10=ffff700010f58490 X11=1ffff00010f58490 X12=ffff700010f58491 X13=205d333039335420 X14=3030303030303030 X15=3a34327820323030 X16=3030306666666620 X17=3736303436343230 X18=0000000000000000 X19=ffff00000ed35080 X20=ffff80008d4db018 X21=ffff800087b3e200 X22=0000000000000033 X23=dfff800000000000 X24=ffff00000ed44059 X25=0000000000000001 X26=ffff00000ed352d8 X27=ffff00000ed35080 X28=dfff800000000000 X29=ffff80008ed26ad0 X30=ffff800081be6700 SP=ffff80008ed26ad0 PSTATE=800003c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008174bab8 X00=ffff80008d511000 X01=0000000000000000 X02=1ffff00010e22166 X03=1fffe0000d41773e X04=1fffe0000d418e6e X05=ffff80008d1e2b40 X06=ffff700011a3c568 X07=0000000000000001 X08=ffff80008d1e2b43 X09=dfff800000000000 X10=ffff00006a0b104c X11=1ffff00011a3c568 X12=ffff700011a3c569 X13=0000000000000000 X14=ffff00006a0b1468 X15=ffff00006a0b1054 X16=ffff80008d4e0000 X17=ffff7fffe3003000 X18=0000000000000000 X19=ffff800087110b28 X20=000000000000001e X21=ffff00000e099b00 X22=ffff80008581b360 X23=000000000000000b X24=ffff80008550a2c0 X25=ffff7fffe3003000 X26=ffff000012531e48 X27=ffff000012531e40 X28=ffff6000024a63c9 X29=ffff80008d4e7ee0 X30=ffff800080369734 SP=ffff80008d4e7ee0 PSTATE=200000c5 --C- EL1h FPCR=00000000 FPSR=00000000 Q00=372f6b636f6c622f:7665642f7379732f Q01=00313a372f6b636f:6c622f7665642f73 Q02=0000000000000000:ffffff0000000000 Q03=ffffffff00000000:ffffffff00ff0000 Q04=0000000000000000:ffff0000ffff0f00 Q05=0000000000000000:00c00000cc00000c Q06=63627c2a6476787c:2a64767c2a72737c Q07=7361647c2a737369:63637c2a65686361 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc2fe5d30:0000ffffc2fe5d30 Q17=ffffff80ffffffd8:0000ffffc2fe5d00 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000