last executing test programs: 21.05582911s ago: executing program 1 (id=40): r0 = syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x8, 0x44040) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000100)=""/175) syz_usb_control_io$hid(r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, r3, 0xf8a29000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3a) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000400)=ANY=[@ANYBLOB="1400000010000100f7000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc08000340000000144c0000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a3100000000200003801c0000800c00018006000100d10300000c000440000000000000000114000000110001"], 0xb8}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1f, 0xf, &(0x7f00000004c0)=ANY=[], 0x0, 0x6, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_MSG_GETSETELEM(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x40, 0xd, 0xa, 0x801, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}]}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000805}, 0x8000) syz_usb_control_io(r0, &(0x7f00000000c0)={0x2c, &(0x7f0000000380)={0x60, 0x3, 0x8, {0x8, 0x9, "3d91419da546"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) 17.515355995s ago: executing program 0 (id=42): socket(0x10, 0x3, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0x639) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, 0x0) r1 = syz_io_uring_setup(0xd1, &(0x7f0000000480)={0x0, 0x0, 0x100, 0x0, 0x335}, &(0x7f0000000080)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r1, 0x47ba, 0x0, 0x0, 0x0, 0x0) 14.825254214s ago: executing program 0 (id=43): r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000001c0)={@remote}, 0x14) 2.156137656s ago: executing program 1 (id=44): socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000300)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac\x06\x9c&\xf5\xe3j\xfa\tcqM\xb8R\x86\xd9\xd2.\x9f\x12\xed\x10\f\xbd\x1a|\x8a\xbb\xda\xcfY\x98gU@\xf2M\xc0\xb5\xdf\x9a\x8d\xdb,n\xae\x0eT\x80\x8c\xfd\xd7\xb0\x94\x82t\x96\rKx\xc5\x9b\x8c\x87\x96\x8bc\xbc\xee\xcc\x9f\xe3F\x99V4\x8e;M\xa9\x823\xe3\xb3mG\x8f\xdb\xed\x1b\x05\xec\xfc\xd1\xb5\xfd\xec@\xdeU\xdd\xa4\xc1\xe4L)\x8e\xe5\x91\x8e\xd4\x89\xef\x95T\x05G\xac\xb8\xc1: )mh\xc7\xf1?\xbb\x13;\xad\x95\xd70\xb6\x0e\x7f\x84r\x0e\xbf\xc5\xf6\xd4\xdd\t\x14\x18\xf7\xefi\x93\x03\xd2\xf2\bK\"\xd2\xb5\xaa\xb8\xc8\xe0\xac\x99\xe8su\xcd\xc3E\x12\xd7\xdd\x96!\x16Tu\xe3\xf0\x84#R\xd9\xe3~Wj\xb0r\x87\'\xea\a\xcfOeK\x9daW\xf4\x87@\x9c\xf3\xf1K\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x91\xe6\xdb\xc2\xa5h\'\xdfIn\x97\x0263~\xeb\xbe(i\n\xc2k4\x7f\x12\xa9e`SOs\x8c\xb4\xe7FeQ\xc6$\x92j_U\xfa\b\xea\xb0bYkW\xc0\x05\aC{\xcc\x03T\x17\xa5Sk\x87P\xc2\x97D\xb2\xfa\x1b\x9fe\xf4\x10\x1a\xad\x92\xce\x88\x1b\xbc\xe14\x19\xaa\xd3\r\xf4\xa2\xc3\x9e=\xa0 \xe6j\xe5\x85\xf8\x97\x03\x15\xaa\x920\xdcrI\xd8\b\xfb\xc7\xe7xX\x00>d\xbb\xa71\xad\x9a\xfb\xe6\x13\x87\x93\\\xe5W-\xfc\xfd\xb8O\xb9j\xb8\xf2\x9dx\xb2\x86\xad\x92', 0x3) syz_io_uring_setup(0x3868, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0x1f400, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1600000004"], 0x50) io_uring_enter(r2, 0x2219, 0x7721, 0x16, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0x78) sendfile(r0, r1, &(0x7f00000001c0), 0x8) 2.005678187s ago: executing program 1 (id=45): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x16000000) 1.074270389s ago: executing program 0 (id=46): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x140) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$P9_RVERSION(r0, &(0x7f0000000c40)=ANY=[], 0x13) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={r2, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)=[0x7], &(0x7f0000000380), 0x0, 0x1}}, 0x40) 947.009207ms ago: executing program 0 (id=47): r0 = syz_open_dev$sndpcmc(&(0x7f0000000180), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r0, 0x4122, 0x0) 834.270655ms ago: executing program 0 (id=48): r0 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)=ANY=[@ANYBLOB="540000001000010400000000000000ffff000000", @ANYRES32=0x0, @ANYBLOB="0380000000000000240012800c0001006d6163766c616e00140002800800010008000000062102000100000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00]'], 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 635.809408ms ago: executing program 0 (id=49): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) 253.108103ms ago: executing program 1 (id=50): recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000003480)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000480)={0x2020}, 0x2020) 146.85997ms ago: executing program 1 (id=51): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x1, 0x0, &(0x7f0000000500)=""/67, 0x0, 0x4000}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, 0x0, &(0x7f00000000c0)=""/87, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000840)) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000080)=0x0) 0s ago: executing program 1 (id=52): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeeb, 0x8031, 0xffffffffffffffff, 0xbf5ce000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) prctl$PR_SET_IO_FLUSHER(0x43, 0x1) prctl$PR_SET_IO_FLUSHER(0x43, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000640), 0x1, 0x8000) ioctl$BLKREPORTZONE(r3, 0xc0101282, 0x0) kernel console output (not intermixed with test programs): [ 53.236748][ T29] audit: type=1400 audit(53.140:56): avc: denied { read write } for pid=3089 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.239747][ T29] audit: type=1400 audit(53.140:57): avc: denied { open } for pid=3089 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:8471' (ED25519) to the list of known hosts. [ 69.841602][ T29] audit: type=1400 audit(69.730:58): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 71.094830][ T29] audit: type=1400 audit(71.000:59): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 71.097965][ T29] audit: type=1400 audit(71.000:60): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 73.731821][ T29] audit: type=1400 audit(73.630:61): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 73.736596][ T29] audit: type=1400 audit(73.640:62): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 73.748097][ T3093] cgroup: Unknown subsys name 'net' [ 73.753608][ T29] audit: type=1400 audit(73.660:63): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 73.893841][ T3093] cgroup: Unknown subsys name 'cpuset' [ 73.902102][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 73.905644][ T3093] cgroup: Unknown subsys name 'rlimit' [ 74.218102][ T29] audit: type=1400 audit(74.120:64): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.227646][ T29] audit: type=1400 audit(74.120:65): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 74.227835][ T29] audit: type=1400 audit(74.130:66): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 74.449398][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 74.453175][ T29] audit: type=1400 audit(74.350:67): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 81.503700][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 83.595273][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 83.595685][ T29] audit: type=1400 audit(83.500:71): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 83.663010][ T29] audit: type=1400 audit(83.560:72): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.667125][ T29] audit: type=1400 audit(83.570:73): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.677909][ T29] audit: type=1400 audit(83.580:74): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 83.707030][ T29] audit: type=1400 audit(83.610:75): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 83.708681][ T29] audit: type=1400 audit(83.610:76): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 83.797546][ T29] audit: type=1400 audit(83.700:77): avc: denied { sys_module } for pid=3099 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 84.475541][ T29] audit: type=1400 audit(84.380:78): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 85.603396][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.613217][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.757294][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.767524][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.291073][ T3099] hsr_slave_0: entered promiscuous mode [ 86.295417][ T3099] hsr_slave_1: entered promiscuous mode [ 86.777114][ T3098] hsr_slave_0: entered promiscuous mode [ 86.778051][ T3098] hsr_slave_1: entered promiscuous mode [ 86.780889][ T29] audit: type=1400 audit(86.680:79): avc: denied { create } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 86.787006][ T3098] debugfs: 'hsr0' already exists in 'hsr' [ 86.788817][ T29] audit: type=1400 audit(86.690:80): avc: denied { write } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 86.789107][ T3098] Cannot create hsr debugfs directory [ 86.798757][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 86.821741][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 86.843887][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 86.851898][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 87.198501][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 87.208183][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 87.220581][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 87.230893][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 87.809540][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.993472][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.760683][ T3099] veth0_vlan: entered promiscuous mode [ 90.787984][ T3099] veth1_vlan: entered promiscuous mode [ 90.869388][ T3099] veth0_macvtap: entered promiscuous mode [ 90.884256][ T3099] veth1_macvtap: entered promiscuous mode [ 90.948832][ T3098] veth0_vlan: entered promiscuous mode [ 91.019209][ T3098] veth1_vlan: entered promiscuous mode [ 91.024336][ T1294] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.030272][ T1294] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.031908][ T1294] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.033853][ T1294] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.221668][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 91.224035][ T29] audit: type=1400 audit(91.120:82): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 91.246513][ T3098] veth0_macvtap: entered promiscuous mode [ 91.251824][ T29] audit: type=1400 audit(91.140:83): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.KgNbLq/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 91.264219][ T29] audit: type=1400 audit(91.160:84): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 91.278599][ T3098] veth1_macvtap: entered promiscuous mode [ 91.288289][ T29] audit: type=1400 audit(91.190:85): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.KgNbLq/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 91.297686][ T29] audit: type=1400 audit(91.200:86): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.KgNbLq/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2585 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 91.329953][ T29] audit: type=1400 audit(91.230:87): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 91.344133][ T29] audit: type=1400 audit(91.250:88): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 91.347009][ T29] audit: type=1400 audit(91.250:89): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=2587 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 91.362940][ T29] audit: type=1400 audit(91.260:90): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 91.365821][ T29] audit: type=1400 audit(91.270:91): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 91.427073][ T104] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.427513][ T104] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.429313][ T104] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.429702][ T104] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.560964][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 92.633833][ T95] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 92.793223][ T95] usb 1-1: Using ep0 maxpacket: 8 [ 92.799708][ T95] usb 1-1: config 32 interface 0 altsetting 0 endpoint 0x85 has invalid wMaxPacketSize 0 [ 92.800359][ T95] usb 1-1: New USB device found, idVendor=19b5, idProduct=0021, bcdDevice=98.c7 [ 92.800479][ T95] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 93.029997][ T95] usb 1-1: string descriptor 0 read error: -71 [ 93.060569][ T95] usb 1-1: USB disconnect, device number 2 [ 93.265845][ T3718] usb usb1: usbfs: interface 0 claimed by hub while 'syz.1.2' sets config #1 [ 93.803436][ T3707] usb 2-1: new full-speed USB device number 2 using dummy_hcd [ 94.047032][ T3707] usb 2-1: config 27 has an invalid descriptor of length 0, skipping remainder of the config [ 94.047336][ T3707] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0x8B has invalid wMaxPacketSize 0 [ 94.055474][ T3707] usb 2-1: config 27 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 94.055629][ T3707] usb 2-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 94.055669][ T3707] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 94.077729][ T3707] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 94.097374][ T3707] snd-usb-audio 2-1:27.0: probe with driver snd-usb-audio failed with error -2 [ 94.291270][ T3707] usb 2-1: USB disconnect, device number 2 [ 96.619612][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 96.622903][ T29] audit: type=1400 audit(96.490:111): avc: denied { create } for pid=3776 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 97.417754][ T29] audit: type=1400 audit(97.320:112): avc: denied { create } for pid=3780 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 97.451799][ T29] audit: type=1400 audit(97.340:113): avc: denied { bind } for pid=3780 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 97.987059][ T29] audit: type=1400 audit(97.890:114): avc: denied { setopt } for pid=3780 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 98.008873][ T29] audit: type=1400 audit(97.910:115): avc: denied { accept } for pid=3780 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 98.534615][ T3786] hsr0: entered promiscuous mode [ 98.541166][ T3786] macvtap1: entered promiscuous mode [ 105.252880][ T29] audit: type=1400 audit(105.150:116): avc: denied { name_bind } for pid=3799 comm="syz.1.19" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 105.257221][ T29] audit: type=1400 audit(105.160:117): avc: denied { node_bind } for pid=3799 comm="syz.1.19" saddr=255.255.255.255 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 105.645618][ T29] audit: type=1400 audit(105.550:118): avc: denied { create } for pid=3807 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 105.654702][ T29] audit: type=1400 audit(105.560:119): avc: denied { write } for pid=3807 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 105.689402][ T29] audit: type=1400 audit(105.590:120): avc: denied { write } for pid=3807 comm="syz.0.20" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 127.988190][ T29] audit: type=1400 audit(127.890:121): avc: denied { create } for pid=3838 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 127.991862][ T29] audit: type=1400 audit(127.890:122): avc: denied { setopt } for pid=3838 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 128.570089][ T29] audit: type=1400 audit(128.470:123): avc: denied { create } for pid=3843 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 128.689628][ T29] audit: type=1400 audit(128.590:124): avc: denied { setopt } for pid=3845 comm="syz.1.33" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 128.704045][ T29] audit: type=1400 audit(128.610:125): avc: denied { bind } for pid=3845 comm="syz.1.33" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 128.705828][ T29] audit: type=1400 audit(128.610:126): avc: denied { node_bind } for pid=3845 comm="syz.1.33" saddr=fec0:ffff::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 131.248178][ T3857] process 'syz.0.36' launched '/dev/fd/8' with NULL argv: empty string added [ 131.373518][ T29] audit: type=1400 audit(131.150:127): avc: denied { execute_no_trans } for pid=3852 comm="syz.0.36" path=2F6D656D66643A2D42D54E34A64579DBD1A7B153F13A29202864656C6574656429 dev="tmpfs" ino=1028 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 132.427799][ T29] audit: type=1400 audit(132.330:128): avc: denied { nlmsg_read } for pid=3849 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 132.476058][ T29] audit: type=1400 audit(132.380:129): avc: denied { create } for pid=3849 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 132.503893][ T29] audit: type=1400 audit(132.400:130): avc: denied { read } for pid=3849 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 143.402418][ C1] hrtimer: interrupt took 7683744 ns [ 149.624979][ T29] audit: type=1400 audit(149.530:131): avc: denied { create } for pid=3862 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 149.631879][ T29] audit: type=1400 audit(149.530:132): avc: denied { write } for pid=3862 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 162.308953][ T29] audit: type=1400 audit(162.210:133): avc: denied { create } for pid=3880 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 171.654150][ T3896] netlink: 8 bytes leftover after parsing attributes in process `syz.0.48'. [ 171.676582][ T3896] erspan0: entered promiscuous mode [ 171.680032][ T3896] erspan0: left promiscuous mode [ 174.837735][ T3915] ------------[ cut here ]------------ [ 174.838497][ T3915] WARNING: mm/highmem.c:622 at kunmap_local_indexed+0x294/0x2e8, CPU#1: syz.1.52/3915 [ 174.844364][ T3915] Modules linked in: [ 174.846052][ T3915] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 174.847429][ T3915] CPU: 1 UID: 0 PID: 3915 Comm: syz.1.52 Not tainted syzkaller #0 PREEMPT [ 174.847931][ T3915] Hardware name: ARM-Versatile Express [ 174.851542][ T3915] Call trace: [ 174.852949][ T3915] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 174.853688][ T3915] r7:82283bb8 r6:83e08c00 r5:00000000 r4:8229596c [ 174.854087][ T3915] [<80201b58>] (show_stack) from [<8021ee18>] (dump_stack_lvl+0x54/0x7c) [ 174.854574][ T3915] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 174.854912][ T3915] r5:00000000 r4:82a7bd14 [ 174.855109][ T3915] [<8021ee40>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 174.855479][ T3915] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 174.855802][ T3915] r7:804d0480 [ 174.856034][ T3915] [<80202850>] (panic) from [<802520b0>] (get_taint+0x0/0x1c) [ 174.856346][ T3915] r3:8280c704 r2:00000001 r1:8227c120 r0:82283bb8 [ 174.856579][ T3915] [<80252038>] (check_panic_on_warn) from [<80252228>] (__warn+0x94/0x1a4) [ 174.856994][ T3915] [<80252194>] (__warn) from [<802524b0>] (warn_slowpath_fmt+0x178/0x1f4) [ 174.857394][ T3915] r8:00000009 r7:822b05d4 r6:dfb59d34 r5:83e08c00 r4:00000000 [ 174.857792][ T3915] [<8025233c>] (warn_slowpath_fmt) from [<804d0480>] (kunmap_local_indexed+0x294/0x2e8) [ 174.858401][ T3915] r10:8280ca28 r9:dfb59e68 r8:00200000 r7:ffedd000 r6:00000001 r5:83e08c00 [ 174.858884][ T3915] r4:ffedd000 [ 174.859063][ T3915] [<804d01ec>] (kunmap_local_indexed) from [<80534e58>] (break_ksm_pmd_entry+0x168/0x270) [ 174.859768][ T3915] r7:ffedd000 r6:00200000 r5:04600000 r4:00000000 [ 174.860085][ T3915] [<80534cf0>] (break_ksm_pmd_entry) from [<804e9f0c>] (walk_pgd_range+0x3dc/0x63c) [ 174.860549][ T3915] r10:81c1f394 r9:001ee000 r8:dfb59e68 r7:80534cf0 r6:862d3000 r5:00200000 [ 174.860910][ T3915] r4:002e8000 [ 174.861082][ T3915] [<804e9b30>] (walk_pgd_range) from [<804ea1b0>] (__walk_page_range+0x44/0x64) [ 174.861507][ T3915] r10:00000000 r9:83e08c00 r8:81c1f394 r7:002e8000 r6:001ee000 r5:dfb59e68 [ 174.861906][ T3915] r4:85b92c00 [ 174.862070][ T3915] [<804ea16c>] (__walk_page_range) from [<804ea894>] (walk_page_range_vma_unsafe+0xb4/0x24c) [ 174.862763][ T3915] r9:83e08c00 r8:00000000 r7:81c1f394 r6:002e8000 r5:001ee000 r4:85b92c00 [ 174.863274][ T3915] [<804ea7e0>] (walk_page_range_vma_unsafe) from [<804eaa58>] (walk_page_range_vma+0x2c/0x34) [ 174.863784][ T3915] r7:dfb59ecc r6:002e8000 r5:81c1f394 r4:85b92c00 [ 174.864047][ T3915] [<804eaa2c>] (walk_page_range_vma) from [<80533c9c>] (break_ksm+0x5c/0x9c) [ 174.864528][ T3915] [<80533c40>] (break_ksm) from [<80534914>] (ksm_del_vmas+0x7c/0x108) [ 174.864872][ T3915] r7:00000000 r6:00000000 r5:00000043 r4:85b92c00 [ 174.865143][ T3915] [<80534898>] (ksm_del_vmas) from [<80539368>] (ksm_disable_merge_any+0x2c/0x54) [ 174.865554][ T3915] r4:84f91e00 [ 174.865747][ T3915] [<8053933c>] (ksm_disable_merge_any) from [<802705f8>] (sys_prctl+0xa14/0xb8c) [ 174.866206][ T3915] r5:00000043 r4:84f91e00 [ 174.866490][ T3915] [<8026fbe4>] (sys_prctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 174.866942][ T3915] Exception stack(0xdfb59fa8 to 0xdfb59ff0) [ 174.867357][ T3915] 9fa0: 00000000 00000000 00000043 00000000 00000000 00000000 [ 174.867770][ T3915] 9fc0: 00000000 00000000 0031644c 000000ac 00300000 00000000 00006364 76f150bc [ 174.868140][ T3915] 9fe0: 76f14ec0 76f14eb0 0001929c 00132320 [ 174.868436][ T3915] r10:000000ac r9:83e08c00 r8:8020029c r7:000000ac r6:0031644c r5:00000000 [ 174.868996][ T3915] r4:00000000 [ 174.871158][ T3915] Rebooting in 86400 seconds..