last executing test programs: 3.278783918s ago: executing program 0 (id=470): r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800200001"], 0x48) close_range(r0, 0xffffffffffffffff, 0x0) 3.019568085s ago: executing program 0 (id=471): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x2000}, 0x4) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000840)={@multicast, @remote, @void, {@ipv6={0x86dd, @tipc_packet={0x5, 0x6, "ec3e9a", 0x30, 0x6, 0x1, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', {[@hopopts={0x6c}], @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa, 0xb, 0x2, 0x80, 0x0, 0x0, 0x9, 0xe3, 0x4, 0x4e21, 0x4e24, 0x1, 0x1}}}}}}}, 0x0) 2.93042845s ago: executing program 0 (id=472): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x101e01, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x15) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000002c0)=0x7e) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000540)=0x9) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)=0x7) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000001c0)=0x40) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x7e) 2.78019732s ago: executing program 0 (id=473): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e27, 0xa4e8, @loopback, 0x6}, 0x1c) sendmmsg(r1, &(0x7f0000000ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x22008841) 2.219505746s ago: executing program 1 (id=476): r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f00000003c0), 0x8040, 0x0) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000040), 0xa0301, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r1, 0xc004500a, &(0x7f0000001340)) ioctl$SNDCTL_DSP_SETTRIGGER(r1, 0x40045010, &(0x7f0000000000)=0x6728) write$dsp(r1, &(0x7f00000012c0)="a52876830a602214f6b4e928d758f38a5a7cb4b31c4c09289e9ebb6286784ca3", 0x4000) close_range(r0, 0xffffffffffffffff, 0x0) 1.948763114s ago: executing program 1 (id=477): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1400000010"], 0x7c}, 0x1, 0x0, 0x0, 0xc4}, 0x890) sendmmsg(r0, &(0x7f0000000dc0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000600)="ded6428a5918ee0d654fa3090616", 0xe}], 0x1}}], 0x1, 0x4088) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r2 = accept4(r1, 0x0, 0x0, 0x800) sendmmsg$alg(r2, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="f78d9ca38fff48f3be52163448412ba8", 0xfffffe3f}, {&(0x7f0000000140)="ebe3a0e9796cfd1647e299f4e376fdba128280b372219d205e81f4a7f71c1926aae1efd7e0054a863f3d5cfe6cb55b5bb9fa6935849e6098ed884e7cb51726b360fbb37b4fe035bbb095873048"}, {&(0x7f00000003c0)="e8700e444d50a969ff67347cff6127e6ef12ee3819271482a4975a52c1ab9b8b4db3945d1032005eabe97b4dc33a47d3a158da988456d30026b433186f53cdcdb93a4722bf306a10470d50f5cb1ece9ead3459bab1cf1538cd0b157653c5e892962c80f158c443e9c6ad7d2a8103ef2f4b93766b9a21501f94c1568b13756b66f74f46cf801704d2da8b96c34070b233af0afcc436712e58ed25e721193af05a045ad3fdc928f02f3dbad19d3e66eebda2e63f3f46ef4511cee26d7b48241847bf9e343ef4674c45e2a085060f11"}], 0x1, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x40800) recvmsg(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x7ffff000}, {&(0x7f0000000200)=""/83, 0x20000253}], 0x2}, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000013c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000680)=ANY=[@ANYBLOB="f4060000", @ANYRES16=r3, @ANYBLOB="01000000000000e14f003b00000008000300", @ANYRES32=r4, @ANYBLOB="d506330080000000ffffffffffff080211000001"], 0x6f4}}, 0x0) 1.346798903s ago: executing program 1 (id=478): r0 = socket$igmp6(0xa, 0x3, 0x2) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) getsockopt$inet_tcp_int(r1, 0x6, 0x2, 0x0, &(0x7f00000002c0)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x8, 0x3, 0x4c8, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3f8, 0xffffffff, 0xffffffff, 0x3f8, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'bridge0\x00'}, 0x0, 0x148, 0x170, 0x0, {}, [@common=@unspec=@helper={{0x48}}, @common=@inet=@hashlimit1={{0x58}, {'bond_slave_1\x00', {0x41, 0x1ff, 0x6, 0xb0e2, 0x10001, 0x84e, 0xfffffffb, 0x18, 0x8}, {0x1}}}]}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'erspan0\x00', 'gre0\x00', {0xff}, {}, 0x0, 0x0, 0x0, 0x4b}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'vcan0\x00', {0x3, 0x0, 0x41, 0xfffffffe, 0x2, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x528) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000001180), 0x0, 0x0) pidfd_send_signal(r2, 0x0, &(0x7f0000002280)={0x0, 0x0, 0xfffffffe}, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000640)='/sys/power/pm_test', 0x42, 0x0) writev(r3, &(0x7f0000000440)=[{&(0x7f00000001c0)="2c1cbf6d78c76cca14f0b1dfd5af514fcc6f5bd69ce4df3145e02c97dd3c0a", 0x1f}], 0x1) syz_emit_ethernet(0x42, &(0x7f0000000240)=ANY=[@ANYBLOB="bbbbbbbbbbbb00000000000086dd6076b2af00062f00fc000004cba1414ec4b4b50000000000ff0200000000000000000000000000010000883e"], 0x0) 1.23751944s ago: executing program 1 (id=479): r0 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000180)={'sit0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x27}}) 1.129855106s ago: executing program 1 (id=480): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0xf3a, 0xb) write$binfmt_elf64(r2, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x5, 0x6, 0x5, 0xd, 0x3, 0x3, 0x952d, 0x169, 0x40, 0x273, 0x7, 0x5, 0x38, 0x1, 0x1, 0x4, 0x2}, [{0x6474e551, 0x7, 0x9, 0x3, 0x0, 0x6, 0x65, 0xe8}]}, 0x78) write(r0, 0x0, 0x0) 118.577272ms ago: executing program 0 (id=481): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x3, 'nicvf0\x00', 0x1}, 0x18) 118.320722ms ago: executing program 0 (id=482): r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000040)=0x91, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @mcast2, 0x3}, 0x1c) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) 0s ago: executing program 1 (id=483): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x4f27, 0x0, 0x4, 0x4, 0x5, 0x5, 0x7, 0x7, 0x54c6cff3, 0xfd, 0x2, 0x7, 0x1, 0x1, 0x6, 0x5, 0x0, 0x7f, 0x3, 0x40000003, 0x89, 0xcaa3, 0x0, 0x20001e5b, 0x3, 0xe66, 0x3, 0x8, 0x4086, 0x0, 0xfffffff8]}) close(0x3) kernel console output (not intermixed with test programs): [ 46.894179][ T29] audit: type=1400 audit(46.820:56): avc: denied { read write } for pid=3085 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.895803][ T29] audit: type=1400 audit(46.830:57): avc: denied { open } for pid=3085 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:32264' (ED25519) to the list of known hosts. [ 62.401052][ T29] audit: type=1400 audit(62.320:58): avc: denied { name_bind } for pid=3088 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 64.265983][ T29] audit: type=1400 audit(64.190:59): avc: denied { execute } for pid=3089 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 64.292636][ T29] audit: type=1400 audit(64.220:60): avc: denied { execute_no_trans } for pid=3089 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 67.892218][ T29] audit: type=1400 audit(67.820:61): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.897829][ T29] audit: type=1400 audit(67.830:62): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.915526][ T3089] cgroup: Unknown subsys name 'net' [ 67.925093][ T29] audit: type=1400 audit(67.860:63): avc: denied { unmount } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 68.089648][ T3089] cgroup: Unknown subsys name 'cpuset' [ 68.097974][ T3089] cgroup: Unknown subsys name 'hugetlb' [ 68.098875][ T3089] cgroup: Unknown subsys name 'rlimit' [ 68.332915][ T29] audit: type=1400 audit(68.260:64): avc: denied { setattr } for pid=3089 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.345614][ T29] audit: type=1400 audit(68.280:65): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.346712][ T29] audit: type=1400 audit(68.280:66): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.578616][ T3091] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.581816][ T29] audit: type=1400 audit(68.510:67): avc: denied { relabelto } for pid=3091 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.587853][ T29] audit: type=1400 audit(68.520:68): avc: denied { write } for pid=3091 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 68.626350][ T29] audit: type=1400 audit(68.560:69): avc: denied { read } for pid=3089 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 68.628425][ T29] audit: type=1400 audit(68.560:70): avc: denied { open } for pid=3089 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 74.530960][ T3089] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 76.507847][ T29] audit: type=1400 audit(76.440:71): avc: denied { execmem } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 76.560318][ T29] audit: type=1400 audit(76.490:72): avc: denied { read } for pid=3094 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 76.560798][ T29] audit: type=1400 audit(76.490:73): avc: denied { open } for pid=3094 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 76.569008][ T29] audit: type=1400 audit(76.500:74): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 76.593195][ T29] audit: type=1400 audit(76.520:75): avc: denied { module_request } for pid=3094 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 76.655042][ T29] audit: type=1400 audit(76.580:76): avc: denied { sys_module } for pid=3094 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 77.243452][ T29] audit: type=1400 audit(77.170:77): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 78.317752][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.327807][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.413425][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.423085][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.049538][ T3095] hsr_slave_0: entered promiscuous mode [ 79.053186][ T3095] hsr_slave_1: entered promiscuous mode [ 79.357662][ T3094] hsr_slave_0: entered promiscuous mode [ 79.360973][ T3094] hsr_slave_1: entered promiscuous mode [ 79.362955][ T3094] debugfs: 'hsr0' already exists in 'hsr' [ 79.366174][ T3094] Cannot create hsr debugfs directory [ 79.513687][ T29] audit: type=1400 audit(79.440:78): avc: denied { create } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.519587][ T29] audit: type=1400 audit(79.450:79): avc: denied { write } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.522143][ T29] audit: type=1400 audit(79.450:80): avc: denied { read } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.530714][ T3095] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 79.544823][ T3095] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 79.550428][ T3095] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 79.563630][ T3095] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 79.846771][ T3094] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 79.857099][ T3094] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 79.871316][ T3094] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 79.886039][ T3094] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 80.520779][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.751461][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.535861][ T3095] veth0_vlan: entered promiscuous mode [ 83.588752][ T3095] veth1_vlan: entered promiscuous mode [ 83.690429][ T3095] veth0_macvtap: entered promiscuous mode [ 83.705879][ T3095] veth1_macvtap: entered promiscuous mode [ 83.826431][ T119] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.832335][ T3094] veth0_vlan: entered promiscuous mode [ 83.835335][ T119] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.836517][ T119] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.837595][ T119] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.868707][ T3094] veth1_vlan: entered promiscuous mode [ 83.963342][ T29] audit: type=1400 audit(83.890:81): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 83.972547][ T29] audit: type=1400 audit(83.900:82): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.cy1nFf/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 83.981412][ T29] audit: type=1400 audit(83.910:83): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 84.001368][ T29] audit: type=1400 audit(83.930:84): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.cy1nFf/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 84.008356][ T29] audit: type=1400 audit(83.940:85): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.cy1nFf/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2298 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 84.031237][ T29] audit: type=1400 audit(83.960:86): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 84.040131][ T29] audit: type=1400 audit(83.970:87): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 84.045493][ T29] audit: type=1400 audit(83.970:88): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="gadgetfs" ino=2299 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.052666][ T29] audit: type=1400 audit(83.980:89): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.060864][ T3094] veth0_macvtap: entered promiscuous mode [ 84.067592][ T29] audit: type=1400 audit(83.990:90): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.102291][ T3094] veth1_macvtap: entered promiscuous mode [ 84.161219][ T3095] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 84.257048][ T1994] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.262388][ T1994] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.266752][ T1994] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.267276][ T1994] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.828556][ T3715] netlink: 'syz.0.5': attribute type 15 has an invalid length. [ 86.335085][ T3719] Illegal XDP return value 371717360 on prog (id 1) dev N/A, expect packet loss! [ 89.095635][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 89.097233][ T29] audit: type=1400 audit(89.020:111): avc: denied { name_bind } for pid=3726 comm="syz.1.11" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 89.097624][ T29] audit: type=1400 audit(89.020:112): avc: denied { node_bind } for pid=3726 comm="syz.1.11" saddr=::1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 89.547425][ T29] audit: type=1326 audit(89.480:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3730 comm="syz.1.13" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 89.554842][ T29] audit: type=1326 audit(89.480:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3730 comm="syz.1.13" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 89.557232][ T29] audit: type=1326 audit(89.460:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3730 comm="syz.1.13" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 89.566376][ T29] audit: type=1326 audit(89.500:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3730 comm="syz.1.13" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x111af8 code=0x7ffc0000 [ 89.569626][ T29] audit: type=1326 audit(89.500:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3730 comm="syz.1.13" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x111af8 code=0x7ffc0000 [ 89.572269][ T29] audit: type=1326 audit(89.500:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3730 comm="syz.1.13" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 89.596662][ T29] audit: type=1326 audit(89.510:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3730 comm="syz.1.13" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 89.599414][ T29] audit: type=1326 audit(89.510:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3730 comm="syz.1.13" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 96.139274][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 96.141209][ T29] audit: type=1400 audit(96.060:133): avc: denied { name_bind } for pid=3748 comm="syz.1.20" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 96.810723][ T29] audit: type=1400 audit(96.740:134): avc: denied { create } for pid=3752 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 96.835834][ T29] audit: type=1400 audit(96.770:135): avc: denied { bind } for pid=3752 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 96.841799][ T29] audit: type=1400 audit(96.770:136): avc: denied { listen } for pid=3752 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 96.915608][ T29] audit: type=1400 audit(96.850:137): avc: denied { connect } for pid=3752 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 97.078562][ T29] audit: type=1400 audit(97.010:138): avc: denied { write } for pid=3752 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 98.704593][ T29] audit: type=1400 audit(98.610:139): avc: denied { map_create } for pid=3759 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 98.741105][ T29] audit: type=1400 audit(98.670:140): avc: denied { create } for pid=3759 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 98.773492][ T3760] netlink: 60 bytes leftover after parsing attributes in process `syz.0.25'. [ 99.120130][ T29] audit: type=1400 audit(99.050:141): avc: denied { map_read map_write } for pid=3761 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 100.236480][ T29] audit: type=1400 audit(100.170:142): avc: denied { create } for pid=3773 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 101.184972][ T3782] netlink: 'syz.1.33': attribute type 4 has an invalid length. [ 101.877768][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 101.879360][ T29] audit: type=1400 audit(101.810:144): avc: denied { create } for pid=3791 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 101.899166][ T29] audit: type=1400 audit(101.830:145): avc: denied { write } for pid=3791 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 104.889660][ T3808] netlink: 'syz.0.44': attribute type 10 has an invalid length. [ 105.318087][ T29] audit: type=1400 audit(105.250:146): avc: denied { watch } for pid=3809 comm="syz.0.45" path="/28" dev="tmpfs" ino=156 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 110.190385][ T29] audit: type=1400 audit(110.110:147): avc: denied { setopt } for pid=3830 comm="syz.0.54" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 110.223721][ T3831] pim6reg: entered allmulticast mode [ 110.241683][ T3831] pim6reg: left allmulticast mode [ 114.936114][ T3890] Zero length message leads to an empty skb [ 115.439773][ T29] audit: type=1400 audit(115.340:148): avc: denied { ioctl } for pid=3891 comm="syz.1.71" path="socket:[3453]" dev="sockfs" ino=3453 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 117.376175][ T29] audit: type=1400 audit(117.310:149): avc: denied { mounton } for pid=3906 comm="syz.1.76" path="/29/file0" dev="tmpfs" ino=163 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 118.969023][ T29] audit: type=1400 audit(118.900:150): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 119.876478][ T3920] syz.1.80 uses obsolete (PF_INET,SOCK_PACKET) [ 119.881422][ T3920] capability: warning: `syz.1.80' uses deprecated v2 capabilities in a way that may be insecure [ 120.002921][ T29] audit: type=1326 audit(119.930:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3919 comm="syz.1.80" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x0 [ 125.513807][ T29] audit: type=1400 audit(125.440:152): avc: denied { setopt } for pid=3948 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 127.922014][ T29] audit: type=1400 audit(127.850:153): avc: denied { bind } for pid=3965 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 127.934647][ T29] audit: type=1400 audit(127.850:154): avc: denied { setopt } for pid=3965 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 128.594693][ T29] audit: type=1400 audit(128.510:155): avc: denied { create } for pid=3975 comm="syz.1.91" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 128.596071][ T29] audit: type=1400 audit(128.520:156): avc: denied { map } for pid=3975 comm="syz.1.91" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3598 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 128.597194][ T29] audit: type=1400 audit(128.520:157): avc: denied { read write } for pid=3975 comm="syz.1.91" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3598 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 128.715232][ T29] audit: type=1400 audit(128.650:158): avc: denied { execute } for pid=3975 comm="syz.1.91" path="/40/rdma.current" dev="tmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 128.951455][ T29] audit: type=1400 audit(128.880:159): avc: denied { map } for pid=3977 comm="syz.1.92" path="socket:[2598]" dev="sockfs" ino=2598 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 128.959757][ T29] audit: type=1400 audit(128.890:160): avc: denied { read accept } for pid=3977 comm="syz.1.92" path="socket:[2598]" dev="sockfs" ino=2598 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 129.072969][ T29] audit: type=1400 audit(129.000:161): avc: denied { connect } for pid=3979 comm="syz.1.93" lport=47 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 133.196458][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 133.197363][ T29] audit: type=1400 audit(133.130:166): avc: denied { create } for pid=4015 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 133.222693][ T29] audit: type=1400 audit(133.150:167): avc: denied { write } for pid=4015 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 134.698885][ T29] audit: type=1400 audit(134.630:168): avc: denied { append } for pid=4025 comm="syz.1.114" name="001" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 135.760303][ T29] audit: type=1400 audit(135.690:169): avc: denied { create } for pid=4032 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 135.811254][ T29] audit: type=1400 audit(135.740:170): avc: denied { write } for pid=4032 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 136.388442][ T29] audit: type=1400 audit(136.290:171): avc: denied { mounton } for pid=4036 comm="syz.1.119" path="/syzcgroup/net/syz1/cgroup.procs" dev="cgroup" ino=44 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=file permissive=1 [ 137.614223][ C1] hrtimer: interrupt took 10128080 ns [ 139.886042][ T29] audit: type=1400 audit(139.820:172): avc: denied { bind } for pid=4055 comm="syz.1.128" lport=127 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 139.887448][ T29] audit: type=1400 audit(139.820:173): avc: denied { node_bind } for pid=4055 comm="syz.1.128" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 140.716748][ T4060] netlink: 12 bytes leftover after parsing attributes in process `syz.1.130'. [ 140.724829][ T4060] bridge_slave_1: entered promiscuous mode [ 140.822989][ T4060] netlink: 12 bytes leftover after parsing attributes in process `syz.1.130'. [ 143.516771][ T29] audit: type=1400 audit(143.450:174): avc: denied { connect } for pid=4070 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 143.519291][ T29] audit: type=1400 audit(143.450:175): avc: denied { create } for pid=4070 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 144.208609][ T4071] netlink: 20 bytes leftover after parsing attributes in process `syz.1.135'. [ 144.650591][ T4076] hsr0: entered promiscuous mode [ 144.651266][ T4076] macsec1: entered promiscuous mode [ 145.461439][ T29] audit: type=1400 audit(145.390:176): avc: denied { ioctl } for pid=4083 comm="syz.1.139" path="socket:[3775]" dev="sockfs" ino=3775 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 163.130582][ T29] audit: type=1400 audit(163.060:177): avc: denied { create } for pid=4144 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 163.139033][ T29] audit: type=1400 audit(163.070:178): avc: denied { sys_admin } for pid=4144 comm="syz.1.157" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 163.339122][ T4150] netlink: 'syz.1.159': attribute type 13 has an invalid length. [ 163.433583][ T4150] hsr0: left promiscuous mode [ 163.815521][ T29] audit: type=1400 audit(163.740:179): avc: denied { getopt } for pid=4160 comm="syz.0.163" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 164.186646][ T29] audit: type=1400 audit(164.120:180): avc: denied { create } for pid=4168 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 164.200716][ T29] audit: type=1400 audit(164.130:181): avc: denied { setopt } for pid=4168 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 164.708954][ T29] audit: type=1400 audit(164.640:182): avc: denied { bind } for pid=4168 comm="syz.0.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 165.720868][ T29] audit: type=1400 audit(165.650:183): avc: denied { getopt } for pid=4179 comm="syz.1.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 165.866795][ T29] audit: type=1400 audit(165.800:184): avc: denied { create } for pid=4182 comm="syz.0.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 165.978750][ T29] audit: type=1400 audit(165.910:185): avc: denied { create } for pid=4186 comm="syz.0.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 166.238586][ T4196] netlink: 8 bytes leftover after parsing attributes in process `syz.0.178'. [ 166.244818][ T4196] netlink: 8 bytes leftover after parsing attributes in process `syz.0.178'. [ 166.246748][ T4196] netlink: 8 bytes leftover after parsing attributes in process `syz.0.178'. [ 167.091446][ T29] audit: type=1400 audit(167.020:186): avc: denied { bind } for pid=4218 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 167.929430][ T4230] netlink: 8 bytes leftover after parsing attributes in process `syz.1.192'. [ 170.255427][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 170.255839][ T29] audit: type=1400 audit(170.190:189): avc: denied { create } for pid=4261 comm="syz.0.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 170.265703][ T29] audit: type=1400 audit(170.200:190): avc: denied { bind } for pid=4261 comm="syz.0.206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 175.291186][ T29] audit: type=1400 audit(175.220:191): avc: denied { getopt } for pid=4299 comm="syz.1.220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 176.583384][ T4312] netlink: 'syz.1.226': attribute type 9 has an invalid length. [ 176.627688][ T4312] bond_slave_0: entered promiscuous mode [ 176.628033][ T4312] bond_slave_1: entered promiscuous mode [ 176.656347][ T4312] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 177.744400][ T29] audit: type=1400 audit(177.670:192): avc: denied { name_bind } for pid=4327 comm="syz.0.233" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 177.978868][ T29] audit: type=1400 audit(177.910:193): avc: denied { name_bind } for pid=4330 comm="syz.1.234" src=4096 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 179.267183][ T4337] netlink: 60 bytes leftover after parsing attributes in process `syz.1.237'. [ 179.316239][ T4337] netlink: 60 bytes leftover after parsing attributes in process `syz.1.237'. [ 180.275577][ T29] audit: type=1326 audit(180.190:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4340 comm="syz.1.239" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x0 [ 184.365167][ T29] audit: type=1400 audit(184.290:195): avc: denied { create } for pid=4367 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 186.844906][ T4377] netlink: 28 bytes leftover after parsing attributes in process `syz.0.253'. [ 187.394934][ T29] audit: type=1400 audit(187.330:196): avc: denied { getopt } for pid=4367 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 188.918806][ T4401] pimreg: entered allmulticast mode [ 188.940739][ T4401] pimreg: left allmulticast mode [ 190.834965][ T29] audit: type=1400 audit(190.730:197): avc: denied { cmd } for pid=4419 comm="syz.0.264" path="socket:[4275]" dev="sockfs" ino=4275 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 191.138493][ T29] audit: type=1400 audit(191.070:198): avc: denied { bind } for pid=4423 comm="syz.0.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 191.162344][ T4424] netlink: 4 bytes leftover after parsing attributes in process `syz.0.266'. [ 191.179156][ T4424] veth1_macvtap: left promiscuous mode [ 191.398834][ T29] audit: type=1400 audit(191.330:199): avc: denied { connect } for pid=4429 comm="syz.0.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 191.412512][ T29] audit: type=1400 audit(191.340:200): avc: denied { setopt } for pid=4429 comm="syz.0.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 191.425266][ T29] audit: type=1400 audit(191.360:201): avc: denied { bind } for pid=4429 comm="syz.0.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 191.438213][ T29] audit: type=1400 audit(191.370:202): avc: denied { write } for pid=4429 comm="syz.0.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 191.498006][ T29] audit: type=1400 audit(191.430:203): avc: denied { read } for pid=4429 comm="syz.0.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 191.900910][ T4434] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 192.095579][ T29] audit: type=1400 audit(192.030:204): avc: denied { connect } for pid=4439 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 192.596584][ T29] audit: type=1400 audit(192.530:205): avc: denied { write } for pid=4439 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 194.996482][ T4458] netlink: 96 bytes leftover after parsing attributes in process `syz.0.279'. [ 195.792205][ T4465] netlink: 6 bytes leftover after parsing attributes in process `syz.0.281'. [ 195.825467][ T4465] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 196.154560][ T29] audit: type=1400 audit(196.080:206): avc: denied { write } for pid=4468 comm="syz.0.283" name="psched" dev="proc" ino=4026532664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 196.188468][ T4469] netlink: 8 bytes leftover after parsing attributes in process `syz.0.283'. [ 197.524500][ T29] audit: type=1326 audit(197.440:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4486 comm="syz.1.291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 197.524946][ T29] audit: type=1326 audit(197.440:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4486 comm="syz.1.291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 197.525439][ T29] audit: type=1326 audit(197.450:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4486 comm="syz.1.291" exe="/syz-executor" sig=0 arch=40000028 syscall=156 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 197.525519][ T29] audit: type=1326 audit(197.450:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4486 comm="syz.1.291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 197.525576][ T29] audit: type=1326 audit(197.450:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4486 comm="syz.1.291" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 198.428785][ T29] audit: type=1400 audit(198.360:212): avc: denied { mount } for pid=4491 comm="syz.1.293" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 203.419992][ T4525] netlink: 'syz.0.307': attribute type 1 has an invalid length. [ 203.420578][ T4525] netlink: 'syz.0.307': attribute type 2 has an invalid length. [ 205.405764][ T4533] syz_tun: entered allmulticast mode [ 205.501030][ T4532] syz_tun: left allmulticast mode [ 206.260788][ T29] audit: type=1400 audit(206.190:213): avc: denied { getopt } for pid=4538 comm="syz.0.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 206.599047][ T4541] geneve1: Caught tx_queue_len zero misconfig [ 206.645264][ T4541] netlink: 8 bytes leftover after parsing attributes in process `syz.1.314'. [ 206.744865][ T29] audit: type=1400 audit(206.660:214): avc: denied { setopt } for pid=4542 comm="syz.0.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 207.176789][ T29] audit: type=1400 audit(207.110:215): avc: denied { setopt } for pid=4544 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 207.234876][ T29] audit: type=1400 audit(207.160:216): avc: denied { ioctl } for pid=4544 comm="syz.1.316" path="socket:[5524]" dev="sockfs" ino=5524 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 207.327992][ T29] audit: type=1400 audit(207.260:217): avc: denied { write } for pid=4544 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 207.756255][ T4549] gre0: entered promiscuous mode [ 207.764873][ T4549] gre0: entered allmulticast mode [ 209.143638][ T29] audit: type=1400 audit(209.070:218): avc: denied { bind } for pid=4550 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 212.156732][ T4551] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 212.157159][ T4551] syz.1.319: vmalloc error: size 536870904, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 212.162530][ T4551] CPU: 0 UID: 0 PID: 4551 Comm: syz.1.319 Not tainted syzkaller #0 PREEMPT [ 212.162740][ T4551] Hardware name: ARM-Versatile Express [ 212.162918][ T4551] Call trace: [ 212.163136][ T4551] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 212.163821][ T4551] r7:600e0013 r6:600e0013 r5:822a20d0 r4:00000000 [ 212.164143][ T4551] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 212.164251][ T4551] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 212.164291][ T4551] r7:00000000 r6:822bdbf4 r5:84ff9800 r4:00000000 [ 212.164300][ T4551] [<8021ed80>] (dump_stack) from [<80506e10>] (warn_alloc+0xdc/0x184) [ 212.164331][ T4551] [<80506d34>] (warn_alloc) from [<804f4f78>] (__vmalloc_node_range_noprof+0xbc/0x668) [ 212.164365][ T4551] r3:1ffffff8 r2:822bdbf4 [ 212.164432][ T4551] r7:822bdc2c r6:00000dc0 r5:ff800000 r4:df800000 [ 212.164519][ T4551] [<804f4ebc>] (__vmalloc_node_range_noprof) from [<80516ffc>] (__kvmalloc_node_noprof+0x298/0x714) [ 212.164591][ T4551] r10:8531e800 r9:000029c0 r8:84ff9800 r7:00000000 r6:e4231cf8 r5:00000400 [ 212.164608][ T4551] r4:1ffffff8 [ 212.164619][ T4551] [<80516d64>] (__kvmalloc_node_noprof) from [<81763250>] (xt_alloc_entry_offsets+0x28/0x34) [ 212.164675][ T4551] r10:8531e800 r9:e4231d00 r8:85c30f80 r7:00000000 r6:e4231cf8 r5:8531e840 [ 212.164686][ T4551] r4:07fffffe [ 212.164695][ T4551] [<81763228>] (xt_alloc_entry_offsets) from [<818f2c00>] (translate_table+0x74/0x764) [ 212.164735][ T4551] [<818f2b8c>] (translate_table) from [<818f3dc8>] (do_replace+0xf4/0x5f0) [ 212.164775][ T4551] r10:00000000 r9:200017a0 r8:85c30f80 r7:8531e840 r6:e4231cf8 r5:000002b0 [ 212.164787][ T4551] r4:8531e800 [ 212.164796][ T4551] [<818f3cd4>] (do_replace) from [<818f43f8>] (do_ip6t_set_ctl+0x134/0x29c) [ 212.164835][ T4551] r10:00000126 r9:81591d64 r8:00000310 r7:853f4524 r6:e4231da8 r5:00000040 [ 212.164845][ T4551] r4:84fcd280 [ 212.164854][ T4551] [<818f42c4>] (do_ip6t_set_ctl) from [<816eaf68>] (nf_setsockopt+0x54/0x70) [ 212.164911][ T4551] r10:00000126 r9:81591d64 r8:00000310 r7:853f4524 r6:00000040 r5:818f42c4 [ 212.164949][ T4551] r4:829f4938 [ 212.164958][ T4551] [<816eaf18>] (nf_setsockopt) from [<818aa208>] (ipv6_setsockopt+0x9c/0xbc) [ 212.164997][ T4551] r6:00000310 r5:84fcd280 r4:00000040 [ 212.165006][ T4551] [<818aa170>] (ipv6_setsockopt) from [<8179a264>] (tcp_setsockopt+0x3c/0x58) [ 212.165042][ T4551] r6:00000029 r5:853f4000 r4:818aa16c [ 212.165052][ T4551] [<8179a22c>] (tcp_setsockopt) from [<81591d9c>] (sock_common_setsockopt+0x38/0x40) [ 212.165086][ T4551] r4:8179a228 [ 212.165095][ T4551] [<81591d68>] (sock_common_setsockopt) from [<8199e6ac>] (smc_setsockopt+0xac/0x354) [ 212.165126][ T4551] r4:00000040 [ 212.165134][ T4551] [<8199e604>] (smc_setsockopt) from [<8158d5e4>] (do_sock_setsockopt+0x70/0xc8) [ 212.165174][ T4551] r9:84ff9800 r8:00000310 r7:8582e500 r6:00000040 r5:00000029 r4:8199e600 [ 212.165184][ T4551] [<8158d574>] (do_sock_setsockopt) from [<81591000>] (__sys_setsockopt+0x7c/0xc4) [ 212.165222][ T4551] r8:00000000 r7:84c42c00 r6:84c42c01 r5:00000040 r4:00000029 [ 212.165231][ T4551] [<81590f84>] (__sys_setsockopt) from [<81591064>] (sys_setsockopt+0x1c/0x24) [ 212.165290][ T4551] r8:8020029c r7:00000126 r6:00346318 r5:00000000 r4:00000310 [ 212.165299][ T4551] [<81591048>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 212.165385][ T4551] Exception stack(0xe4231fa8 to 0xe4231ff0) [ 212.165554][ T4551] 1fa0: 00000310 00000000 00000003 00000029 00000040 20001740 [ 212.165595][ T4551] 1fc0: 00000310 00000000 00346318 00000126 003462d8 00000000 00000001 76f660dc [ 212.165611][ T4551] 1fe0: 76f65e88 76f65e78 00018734 0012fc20 [ 212.182645][ T4551] Mem-Info: [ 212.183112][ T4551] active_anon:7018 inactive_anon:0 isolated_anon:0 [ 212.183112][ T4551] active_file:6144 inactive_file:35356 isolated_file:0 [ 212.183112][ T4551] unevictable:768 dirty:12 writeback:0 [ 212.183112][ T4551] slab_reclaimable:1080 slab_unreclaimable:5746 [ 212.183112][ T4551] mapped:5232 shmem:6506 pagetables:339 [ 212.183112][ T4551] sec_pagetables:0 bounce:0 [ 212.183112][ T4551] kernel_misc_reclaimable:0 [ 212.183112][ T4551] free:428912 free_pcp:614 free_cma:4032 [ 212.183442][ T4551] Node 0 active_anon:28072kB inactive_anon:0kB active_file:24576kB inactive_file:141424kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:20928kB dirty:48kB writeback:0kB shmem:26024kB kernel_stack:1592kB pagetables:1356kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 212.183791][ T4551] Normal free:1381108kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:1032kB unevictable:0kB writepending:24kB zspages:0kB present:1556480kB managed:1426900kB mlocked:0kB bounce:0kB free_pcp:2456kB local_pcp:1232kB free_cma:0kB [ 212.193891][ T4551] lowmem_reserve[]: 0 4224 4224 [ 212.206902][ T4551] Normal: 3*4kB (ME) 1*8kB (U) 0*16kB 31*32kB (U) 20*64kB (UME) 6*128kB (UM) 7*256kB (UM) 6*512kB (UM) 7*1024kB (UME) 3*2048kB (ME) 332*4096kB (UM) = 1381108kB [ 212.209261][ T4551] 48008 total pagecache pages [ 212.209379][ T4551] 0 pages in swap cache [ 212.209409][ T4551] Free swap = 124996kB [ 212.209430][ T4551] Total swap = 124996kB [ 212.209550][ T4551] 524288 pages RAM [ 212.209581][ T4551] 135168 pages HighMem/MovableOnly [ 212.209609][ T4551] 32395 pages reserved [ 212.209639][ T4551] 4096 pages cma reserved [ 212.263297][ T4559] netlink: 'syz.0.321': attribute type 11 has an invalid length. [ 212.268830][ T4559] netlink: 44 bytes leftover after parsing attributes in process `syz.0.321'. [ 212.446372][ T4565] netlink: 60 bytes leftover after parsing attributes in process `syz.0.324'. [ 212.449072][ T4565] netlink: 60 bytes leftover after parsing attributes in process `syz.0.324'. [ 212.456844][ T4565] netlink: 60 bytes leftover after parsing attributes in process `syz.0.324'. [ 218.145028][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 219.126449][ T4596] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=4596 comm=syz.1.335 [ 219.129358][ T4596] netlink: 'syz.1.335': attribute type 29 has an invalid length. [ 219.133111][ T4592] netlink: 'syz.1.335': attribute type 29 has an invalid length. [ 219.662483][ T4600] can0: slcan on ttyS3. [ 219.674736][ T4600] capability: warning: `syz.1.338' uses 32-bit capabilities (legacy support in use) [ 219.805193][ T4600] can0 (unregistered): slcan off ttyS3. [ 219.866862][ T4600] can0: slcan on ttyS3. [ 219.946124][ T4599] can0 (unregistered): slcan off ttyS3. [ 221.830980][ T29] audit: type=1400 audit(221.760:219): avc: denied { create } for pid=4616 comm="syz.0.340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 224.851908][ T29] audit: type=1400 audit(224.780:220): avc: denied { ioctl } for pid=4633 comm="syz.0.347" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4544 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 225.817317][ T4642] netlink: 64 bytes leftover after parsing attributes in process `syz.1.349'. [ 228.738741][ T4667] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 229.106004][ T29] audit: type=1400 audit(229.040:221): avc: denied { watch watch_reads } for pid=4673 comm="syz.0.363" path="/proc/368" dev="proc" ino=4625 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 230.236514][ T4688] process 'syz.0.369' launched '/dev/fd/4' with NULL argv: empty string added [ 230.238363][ T29] audit: type=1400 audit(230.170:222): avc: denied { execute_no_trans } for pid=4687 comm="syz.0.369" path=2F6D656D66643A2D42D54E34A64579DBD1A7B153F13A29202864656C6574656429 dev="tmpfs" ino=1043 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 235.689787][ T29] audit: type=1400 audit(235.620:223): avc: denied { create } for pid=4723 comm="syz.0.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 235.697610][ T29] audit: type=1400 audit(235.630:224): avc: denied { bind } for pid=4723 comm="syz.0.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 236.202572][ T29] audit: type=1400 audit(236.130:225): avc: denied { accept } for pid=4723 comm="syz.0.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 261.243677][ T29] audit: type=1400 audit(261.170:226): avc: denied { map } for pid=4810 comm="syz.1.410" path="socket:[4829]" dev="sockfs" ino=4829 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 276.896952][ T29] audit: type=1400 audit(276.830:227): avc: denied { write } for pid=4893 comm="syz.1.446" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 278.200677][ T4912] faux_driver vkms: [drm] Unknown color mode 9; guessing buffer size. [ 278.916797][ T29] audit: type=1400 audit(278.850:228): avc: denied { mount } for pid=4919 comm="syz.0.458" name="/" dev="ramfs" ino=5012 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 278.946131][ T29] audit: type=1400 audit(278.880:229): avc: denied { execute } for pid=4919 comm="syz.0.458" name="file2" dev="ramfs" ino=5013 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 278.951080][ T29] audit: type=1400 audit(278.880:230): avc: denied { execute_no_trans } for pid=4919 comm="syz.0.458" path="/file2" dev="ramfs" ino=5013 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 280.302568][ T29] audit: type=1400 audit(280.230:231): avc: denied { read write } for pid=4937 comm="syz.0.465" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 280.305546][ T29] audit: type=1400 audit(280.230:232): avc: denied { open } for pid=4937 comm="syz.0.465" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 280.317285][ T29] audit: type=1400 audit(280.250:233): avc: denied { ioctl } for pid=4937 comm="syz.0.465" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 280.558500][ T4946] netlink: 16 bytes leftover after parsing attributes in process `syz.0.469'. [ 281.010859][ T29] audit: type=1400 audit(280.940:234): avc: denied { setopt } for pid=4944 comm="syz.1.468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 282.827534][ T4981] sit0: entered allmulticast mode [ 284.281744][ T4991] 8<--- cut here --- [ 284.282294][ T4991] Unable to handle kernel paging request at virtual address fee04f27 when write [ 284.282431][ T4991] [fee04f27] *pgd=80000080007003, *pmd=00000000 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 284.305111][ T29] audit: type=1400 audit(284.230:235): avc: denied { read } for pid=2901 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 284.305531][ T29] audit: type=1400 audit(284.230:236): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 284.307576][ T29] audit: type=1400 audit(284.230:237): avc: denied { search } for pid=2901 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 284.308966][ T29] audit: type=1400 audit(284.230:238): avc: denied { add_name } for pid=2901 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 284.310244][ T29] audit: type=1400 audit(284.230:239): avc: denied { create } for pid=2901 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 284.311613][ T29] audit: type=1400 audit(284.230:240): avc: denied { append open } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 284.311915][ T29] audit: type=1400 audit(284.230:241): avc: denied { getattr } for pid=2901 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 284.345746][ T4991] [ 284.347335][ T4991] Internal error: Oops: a06 [#1] SMP ARM [ 284.349355][ T4991] Modules linked in: [ 284.349855][ T4991] CPU: 0 UID: 0 PID: 4991 Comm: syz.1.483 Not tainted syzkaller #0 PREEMPT [ 284.350493][ T4991] Hardware name: ARM-Versatile Express [ 284.350910][ T4991] PC is at parport_attach+0x174/0x1d0 [ 284.351408][ T4991] LR is at parport_attach+0x164/0x1d0 [ 284.351804][ T4991] pc : [<814012a4>] lr : [<81401294>] psr: 60000013 [ 284.352270][ T4991] sp : ea7b1d30 ip : ea7b1d30 fp : ea7b1d54 [ 284.352636][ T4991] r10: 82b28b30 r9 : 00000003 r8 : 84508b40 [ 284.353189][ T4991] r7 : ea7b1d90 r6 : 84508b40 r5 : 00000000 r4 : 00000000 [ 284.353701][ T4991] r3 : fee04f27 r2 : 81e24f44 r1 : 00000001 r0 : 81400f14 [ 284.354689][ T4991] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 284.355220][ T4991] Control: 30c5387d Table: 860c7480 DAC: fffffffd [ 284.355591][ T4991] Register r0 information: non-slab/vmalloc memory [ 284.356827][ T4991] Register r1 information: non-paged memory [ 284.357309][ T4991] Register r2 information: non-slab/vmalloc memory [ 284.357818][ T4991] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 284.358696][ T4991] Register r4 information: NULL pointer [ 284.359116][ T4991] Register r5 information: NULL pointer [ 284.359537][ T4991] Register r6 information: slab kmalloc-192 start 84508b40 pointer offset 0 size 192 [ 284.361056][ T4991] Register r7 information: 2-page vmalloc region starting at 0xea7b0000 allocated at kernel_clone+0xac/0x3f4 [ 284.361997][ T4991] Register r8 information: slab kmalloc-192 start 84508b40 pointer offset 0 size 192 [ 284.362811][ T4991] Register r9 information: non-paged memory [ 284.363313][ T4991] Register r10 information: non-slab/vmalloc memory [ 284.363795][ T4991] Register r11 information: 2-page vmalloc region starting at 0xea7b0000 allocated at kernel_clone+0xac/0x3f4 [ 284.364365][ T4991] Register r12 information: 2-page vmalloc region starting at 0xea7b0000 allocated at kernel_clone+0xac/0x3f4 [ 284.365035][ T4991] Process syz.1.483 (pid: 4991, stack limit = 0xea7b0000) [ 284.365350][ T4991] Stack: (0xea7b1d30 to 0xea7b2000) [ 284.366478][ T4991] 1d20: ea7b1d4c ea7b1d40 829d3948 829d3948 [ 284.366827][ T4991] 1d40: 81e25404 00000000 ea7b1d8c ea7b1d58 813fced0 8140113c 40946400 00000000 [ 284.367131][ T4991] 1d60: ea7b1d7c 200000c0 84508b40 b5403587 40946400 84ffc800 00000003 84508b70 [ 284.367428][ T4991] 1d80: ea7b1e4c ea7b1d90 813f8800 813fcdd0 656d6f63 705f6964 6f707261 00007472 [ 284.367819][ T4991] 1da0: 00000000 00004f27 00000000 00000004 00000004 00000005 00000005 00000007 [ 284.368199][ T4991] 1dc0: 00000007 54c6cff3 000000fd 00000002 00000007 00000001 00000001 00000006 [ 284.368651][ T4991] 1de0: 00000005 00000000 0000007f 00000003 40000003 00000089 0000caa3 00000000 [ 284.369013][ T4991] 1e00: 20001e5b 00000003 00000e66 00000003 00000008 00004086 00000000 fffffff8 [ 284.369380][ T4991] 1e20: 00000000 dac22a2e 00000000 8563b480 84508b40 200000c0 40946400 84ffc800 [ 284.369706][ T4991] 1e40: ea7b1f14 ea7b1e50 813f9380 813f8738 00000000 dac22a2e 00000000 00000000 [ 284.370034][ T4991] 1e60: 824b15ec ea7b1ea4 0000005f 838097f8 00000064 83919cfc ea7b1ee4 ea7b1e88 [ 284.370418][ T4991] 1e80: 807b404c 807aa6c8 00000064 00000001 00000000 ea7b1ea4 84bf8d90 834dbee0 [ 284.370790][ T4991] 1ea0: 00006400 0000000b ea7b1e98 00000000 00000000 dac22a2e 00000000 8563b480 [ 284.371102][ T4991] 1ec0: 40946400 200000c0 200000c0 8563b480 00000003 84ffc800 ea7b1ef4 ea7b1ee8 [ 284.371406][ T4991] 1ee0: 807b417c dac22a2e ea7b1f14 00000000 8563b481 40946400 200000c0 8563b480 [ 284.371761][ T4991] 1f00: 00000003 84ffc800 ea7b1fa4 ea7b1f18 8058223c 813f9288 ecac8b10 84ffc800 [ 284.372065][ T4991] 1f20: ea7b1f3c ea7b1f30 81aa6d78 81aa6c48 ea7b1f54 ea7b1f40 8025ba7c 8028ef68 [ 284.372367][ T4991] 1f40: ea7b1fb0 40000000 ea7b1f84 ea7b1f58 80221a54 8025ba38 00000000 8281cf7c [ 284.372685][ T4991] 1f60: ea7b1fb0 0013ddc0 ecac8b10 802219a8 00000000 dac22a2e ea7b1fac 00000000 [ 284.373010][ T4991] 1f80: 00000000 00346310 00000036 8020029c 84ffc800 00000036 00000000 ea7b1fa8 [ 284.373326][ T4991] 1fa0: 80200060 80582004 00000000 00000000 00000003 40946400 200000c0 00000000 [ 284.373613][ T4991] 1fc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76f660dc [ 284.374093][ T4991] 1fe0: 76f65e88 76f65e78 00018734 0012fc20 60000010 00000003 00000000 00000000 [ 284.374527][ T4991] Call trace: [ 284.374784][ T4991] [<81401130>] (parport_attach) from [<813fced0>] (comedi_device_attach+0x10c/0x248) [ 284.375175][ T4991] r6:00000000 r5:81e25404 r4:829d3948 [ 284.375368][ T4991] [<813fcdc4>] (comedi_device_attach) from [<813f8800>] (do_devconfig_ioctl+0xd4/0x21c) [ 284.375837][ T4991] r10:84508b70 r9:00000003 r8:84ffc800 r7:40946400 r6:b5403587 r5:84508b40 [ 284.376123][ T4991] r4:200000c0 [ 284.376277][ T4991] [<813f872c>] (do_devconfig_ioctl) from [<813f9380>] (comedi_unlocked_ioctl+0x104/0x1c88) [ 284.376637][ T4991] r8:84ffc800 r7:40946400 r6:200000c0 r5:84508b40 r4:8563b480 [ 284.376895][ T4991] [<813f927c>] (comedi_unlocked_ioctl) from [<8058223c>] (sys_ioctl+0x244/0xb58) [ 284.377252][ T4991] r10:84ffc800 r9:00000003 r8:8563b480 r7:200000c0 r6:40946400 r5:8563b481 [ 284.377553][ T4991] r4:00000000 [ 284.377724][ T4991] [<80581ff8>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 284.378245][ T4991] Exception stack(0xea7b1fa8 to 0xea7b1ff0) [ 284.378767][ T4991] 1fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 284.379082][ T4991] 1fc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76f660dc [ 284.379394][ T4991] 1fe0: 76f65e88 76f65e78 00018734 0012fc20 [ 284.379766][ T4991] r10:00000036 r9:84ffc800 r8:8020029c r7:00000036 r6:00346310 r5:00000000 [ 284.380080][ T4991] r4:00000000 [ 284.380482][ T4991] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 284.382426][ T4991] ---[ end trace 0000000000000000 ]--- [ 284.468097][ T4991] Kernel panic - not syncing: Fatal exception [ 284.471150][ T4991] Rebooting in 86400 seconds.. VM DIAGNOSIS: 07:39:21 Registers: info registers vcpu 0 CPU#0 R00=02107280 R01=7ebe208c R02=00000010 R03=00000024 R04=00000010 R05=02107260 R06=7ebe208c R07=00000000 R08=00000000 R09=00000010 R10=00000008 R11=00000223 R12=02107280 R13=7ebe1ff8 R14=76dea09c R15=76a271c0 PSR=80030010 N--- A S usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=85f37000 R01=000000c0 R02=0000000e R03=82b08e0c R04=82b08e0c R05=20000013 R06=00000000 R07=61c88647 R08=00000100 R09=85f37a80 R10=00000000 R11=df805af4 R12=82af518c R13=df805a80 R14=81ab4750 R15=8051423c PSR=60000013 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000