last executing test programs: 6.901466616s ago: executing program 0 (id=244): r0 = inotify_init() r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2a, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x2}}}, 0x108) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x20, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, 0x108) close_range(r0, 0xffffffffffffffff, 0x0) 6.808735693s ago: executing program 0 (id=245): r0 = semget$private(0x0, 0x4, 0x202) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0xfff8, 0x1000}], 0x1, &(0x7f0000000080)) 6.728659598s ago: executing program 0 (id=246): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8002}, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bind$packet(r0, &(0x7f00000001c0)={0x11, 0x1a, r2, 0x1, 0xf, 0x6, @multicast}, 0x14) sendto$packet(r0, &(0x7f0000000180)="0b0312002e1164000200475400f6a13bb1000000086086", 0x17, 0x88a8ffff, &(0x7f0000000140)={0x11, 0x8100, r2}, 0x14) 6.447937556s ago: executing program 0 (id=247): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r0, &(0x7f0000000000)={@void, @void, @eth={@broadcast, @remote, @val={@void, {0x8100, 0x0, 0x0, 0x1}}, {@ipv4={0x800, @udp={{0x5, 0x4, 0x2, 0x15, 0x78, 0x65, 0x6400, 0x82, 0x11, 0x0, @multicast2, @multicast1}, {0x4e22, 0x4e23, 0x64, 0x0, @wg=@response={0x2, 0x4, 0x1, "c906a8284aec03d80133d69853f713bebea61484678f63278aad7a1b6b9502a5", "a639e893b14bf03620263e94605c1c58", {"70a3f41fc3650ee82fb051cdd4e82d7a", "984e933f0700000000000000fd6900"}}}}}}}}, 0x8a) 6.259683839s ago: executing program 0 (id=249): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r0}, 0x38) 6.127252877s ago: executing program 0 (id=251): socket$unix(0x1, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x8912, &(0x7f00000001c0)) 2.778858127s ago: executing program 1 (id=257): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000280)=""/100, 0x0, 0x64, 0x1, 0x1000}, 0x28) 2.209063745s ago: executing program 1 (id=258): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000d88000/0x1000)=nil, &(0x7f00007f2000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x2405a045) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_setup(0x56ab, &(0x7f0000000040)={0x0, 0x36d, 0xc000, 0x2c, 0xa0002f4}) 1.909449135s ago: executing program 1 (id=259): io_getevents(0x0, 0x3, 0x0, 0x0, 0x0) io_destroy(0x0) 1.629386143s ago: executing program 1 (id=260): r0 = syz_open_dev$loop(&(0x7f0000000740), 0x0, 0x0) ioctl$BLKFRAGET(r0, 0x1265, 0x0) 1.449407905s ago: executing program 1 (id=261): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), 0xffffffffffffffff) recvmmsg(r0, &(0x7f0000004100)=[{{0x0, 0x0, 0x0}, 0x8}, {{0x0, 0x0, 0x0}, 0x7}, {{0x0, 0x0, 0x0}, 0x6}, {{0x0, 0x0, 0x0}}], 0x4, 0x40010080, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="030704707900000000000100040004000180"], 0x18}}, 0x0) 0s ago: executing program 1 (id=262): socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) kernel console output (not intermixed with test programs): [ 53.487051][ T28] audit: type=1400 audit(53.380:56): avc: denied { read write } for pid=3080 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.491044][ T28] audit: type=1400 audit(53.380:57): avc: denied { open } for pid=3080 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:55089' (ED25519) to the list of known hosts. [ 68.798130][ T28] audit: type=1400 audit(68.690:58): avc: denied { name_bind } for pid=3083 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 70.125361][ T28] audit: type=1400 audit(70.020:59): avc: denied { execute } for pid=3084 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 70.147356][ T28] audit: type=1400 audit(70.040:60): avc: denied { execute_no_trans } for pid=3084 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 75.376060][ T28] audit: type=1400 audit(75.270:61): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 75.384851][ T28] audit: type=1400 audit(75.280:62): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 75.405892][ T3084] cgroup: Unknown subsys name 'net' [ 75.416129][ T28] audit: type=1400 audit(75.310:63): avc: denied { unmount } for pid=3084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 75.564812][ T3084] cgroup: Unknown subsys name 'cpuset' [ 75.571784][ T3084] cgroup: Unknown subsys name 'hugetlb' [ 75.572803][ T3084] cgroup: Unknown subsys name 'rlimit' [ 75.817409][ T28] audit: type=1400 audit(75.710:64): avc: denied { setattr } for pid=3084 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 75.822277][ T28] audit: type=1400 audit(75.720:65): avc: denied { mounton } for pid=3084 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 75.825176][ T28] audit: type=1400 audit(75.720:66): avc: denied { mount } for pid=3084 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 76.074272][ T3086] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 76.082870][ T28] audit: type=1400 audit(75.980:67): avc: denied { relabelto } for pid=3086 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.090306][ T28] audit: type=1400 audit(75.980:68): avc: denied { write } for pid=3086 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 76.139885][ T28] audit: type=1400 audit(76.040:69): avc: denied { read } for pid=3084 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.142704][ T28] audit: type=1400 audit(76.040:70): avc: denied { open } for pid=3084 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 83.871882][ T3084] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 85.968113][ T28] audit: type=1400 audit(85.860:71): avc: denied { execmem } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 86.037124][ T28] audit: type=1400 audit(85.930:72): avc: denied { read } for pid=3089 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.041535][ T28] audit: type=1400 audit(85.940:73): avc: denied { open } for pid=3089 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 86.056684][ T28] audit: type=1400 audit(85.950:74): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 86.090306][ T28] audit: type=1400 audit(85.990:75): avc: denied { module_request } for pid=3090 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 86.096614][ T28] audit: type=1400 audit(85.990:76): avc: denied { module_request } for pid=3089 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 86.186893][ T28] audit: type=1400 audit(86.080:77): avc: denied { sys_module } for pid=3090 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 86.734418][ T28] audit: type=1400 audit(86.630:78): avc: denied { ioctl } for pid=3090 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 87.845687][ T3090] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.855569][ T3090] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.086015][ T3089] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 88.096397][ T3089] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.801809][ T3090] hsr_slave_0: entered promiscuous mode [ 88.808104][ T3090] hsr_slave_1: entered promiscuous mode [ 89.072974][ T3089] hsr_slave_0: entered promiscuous mode [ 89.080622][ T3089] hsr_slave_1: entered promiscuous mode [ 89.084996][ T3089] debugfs: 'hsr0' already exists in 'hsr' [ 89.086283][ T3089] Cannot create hsr debugfs directory [ 89.437964][ T28] audit: type=1400 audit(89.330:79): avc: denied { create } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.441916][ T28] audit: type=1400 audit(89.340:80): avc: denied { write } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.486343][ T3090] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 89.505401][ T3090] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 89.515885][ T3090] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 89.536889][ T3090] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 89.623326][ T3089] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 89.632295][ T3089] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 89.646215][ T3089] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 89.660026][ T3089] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 90.387366][ T3090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 90.408255][ T3089] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.742311][ T3089] veth0_vlan: entered promiscuous mode [ 92.763546][ T3089] veth1_vlan: entered promiscuous mode [ 92.830209][ T3089] veth0_macvtap: entered promiscuous mode [ 92.837070][ T3089] veth1_macvtap: entered promiscuous mode [ 92.936494][ T2678] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.938149][ T2678] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.956782][ T2636] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 92.957228][ T2636] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.082515][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 93.083984][ T28] audit: type=1400 audit(92.960:82): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 93.095487][ T28] audit: type=1400 audit(92.990:83): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/syzkaller.flJwAc/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 93.104531][ T28] audit: type=1400 audit(93.000:84): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 93.115340][ T28] audit: type=1400 audit(93.010:85): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/syzkaller.flJwAc/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 93.121867][ T28] audit: type=1400 audit(93.020:86): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/syzkaller.flJwAc/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3177 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 93.142115][ T28] audit: type=1400 audit(93.040:87): avc: denied { unmount } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 93.150129][ T28] audit: type=1400 audit(93.050:88): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 93.154721][ T28] audit: type=1400 audit(93.050:89): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="gadgetfs" ino=3178 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 93.164823][ T28] audit: type=1400 audit(93.060:90): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 93.167989][ T28] audit: type=1400 audit(93.060:91): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 93.242178][ T3089] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 93.433939][ T3090] veth0_vlan: entered promiscuous mode [ 93.454979][ T3090] veth1_vlan: entered promiscuous mode [ 93.513613][ T3090] veth0_macvtap: entered promiscuous mode [ 93.522829][ T3090] veth1_macvtap: entered promiscuous mode [ 93.590483][ T2211] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.590858][ T2211] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.590948][ T2211] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.591017][ T2211] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 94.368239][ T3700] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 94.417014][ T3702] SELinux: Context system_u:object_r:src_t:s0 is not valid (left unmapped). [ 96.157437][ T3720] nvme_fabrics: missing parameter 'transport=%s' [ 96.157817][ T3720] nvme_fabrics: missing parameter 'nqn=%s' [ 98.203683][ T28] kauditd_printk_skb: 35 callbacks suppressed [ 98.205000][ T28] audit: type=1400 audit(98.100:127): avc: denied { bind } for pid=3742 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 98.215203][ T28] audit: type=1400 audit(98.110:128): avc: denied { write } for pid=3742 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 98.592482][ T3747] Zero length message leads to an empty skb [ 98.737950][ T28] audit: type=1400 audit(98.630:129): avc: denied { setopt } for pid=3753 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 98.816064][ T28] audit: type=1400 audit(98.710:130): avc: denied { ioctl } for pid=3753 comm="syz.1.15" path="socket:[3365]" dev="sockfs" ino=3365 ioctlcmd=0x662b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 98.920948][ T28] audit: type=1400 audit(98.820:131): avc: denied { ioctl } for pid=3755 comm="syz.0.16" path="socket:[2264]" dev="sockfs" ino=2264 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 99.167909][ T28] audit: type=1400 audit(99.060:132): avc: denied { create } for pid=3761 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 99.224333][ T28] audit: type=1400 audit(99.120:133): avc: denied { create } for pid=3761 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 99.437868][ T28] audit: type=1400 audit(99.330:134): avc: denied { prog_load } for pid=3765 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 99.445975][ T28] audit: type=1400 audit(99.340:135): avc: denied { bpf } for pid=3765 comm="syz.0.19" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 99.458117][ T28] audit: type=1400 audit(99.350:136): avc: denied { perfmon } for pid=3765 comm="syz.0.19" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 104.033738][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 104.034219][ T28] audit: type=1400 audit(103.930:148): avc: denied { ioctl } for pid=3785 comm="syz.1.28" path="socket:[2303]" dev="sockfs" ino=2303 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 104.589590][ T28] audit: type=1400 audit(104.480:149): avc: denied { write } for pid=3785 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 108.672169][ T3806] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 108.746554][ T28] audit: type=1400 audit(108.640:150): avc: denied { mounton } for pid=3804 comm="syz.0.37" path="/proc/31/task" dev="proc" ino=2327 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 108.882178][ T28] audit: type=1400 audit(108.780:151): avc: denied { associate } for pid=3808 comm="syz.0.37" name="core" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 111.448627][ C1] hrtimer: interrupt took 9095520 ns [ 113.839655][ T3837] syz.0.47 (3837): attempted to duplicate a private mapping with mremap. This is not supported. [ 115.893306][ T28] audit: type=1400 audit(115.790:152): avc: denied { read write } for pid=3844 comm="syz.0.51" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 115.896780][ T28] audit: type=1400 audit(115.790:153): avc: denied { open } for pid=3844 comm="syz.0.51" path="/26/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 116.164264][ T28] audit: type=1400 audit(116.060:154): avc: denied { unmount } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 116.400657][ T28] audit: type=1400 audit(116.300:155): avc: denied { getopt } for pid=3857 comm="syz.0.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 123.002202][ T28] audit: type=1326 audit(122.900:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.0.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 123.004607][ T28] audit: type=1326 audit(122.900:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.0.56" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 123.009919][ T28] audit: type=1326 audit(122.900:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.0.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 123.011832][ T28] audit: type=1326 audit(122.900:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.0.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 123.020689][ T28] audit: type=1326 audit(122.920:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.0.56" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 123.036920][ T28] audit: type=1326 audit(122.930:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.0.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 123.040425][ T28] audit: type=1326 audit(122.930:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.0.56" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 123.055036][ T28] audit: type=1326 audit(122.930:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.0.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 123.057215][ T28] audit: type=1326 audit(122.950:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.0.56" exe="/syz-executor" sig=0 arch=40000028 syscall=146 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 123.137010][ T28] audit: type=1326 audit(123.030:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3862 comm="syz.0.56" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 136.185723][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 136.186021][ T28] audit: type=1400 audit(136.080:168): avc: denied { append } for pid=3878 comm="syz.0.61" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 141.890836][ T28] audit: type=1400 audit(141.760:169): avc: denied { map_create } for pid=3900 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 141.891295][ T28] audit: type=1400 audit(141.760:170): avc: denied { map_read map_write } for pid=3900 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 142.031354][ T3901] Illegal XDP return value 2234345493 on prog (id 4) dev syz_tun, expect packet loss! [ 143.849704][ T3909] capability: warning: `syz.0.72' uses 32-bit capabilities (legacy support in use) [ 145.482706][ T3924] netlink: 8 bytes leftover after parsing attributes in process `syz.1.80'. [ 146.538814][ T28] audit: type=1400 audit(146.430:171): avc: denied { mount } for pid=3931 comm="syz.1.82" name="/" dev="ramfs" ino=3612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 146.742302][ T28] audit: type=1804 audit(146.640:172): pid=3932 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz.1.82" name="bus" dev="ramfs" ino=3613 res=1 errno=0 [ 149.875511][ T28] audit: type=1400 audit(149.770:173): avc: denied { mounton } for pid=3944 comm="syz.1.86" path="/41/file0" dev="tmpfs" ino=227 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 153.676666][ T28] audit: type=1400 audit(153.570:174): avc: denied { nlmsg_write } for pid=3952 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 153.682292][ T3953] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=64275 sclass=netlink_audit_socket pid=3953 comm=syz.1.88 [ 153.687159][ T28] audit: type=1400 audit(153.580:175): avc: denied { nlmsg_read } for pid=3952 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 154.729807][ T28] audit: type=1400 audit(154.620:176): avc: denied { create } for pid=3956 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 155.983308][ T28] audit: type=1326 audit(155.880:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 155.992488][ T28] audit: type=1326 audit(155.890:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xf32f8 code=0x7ffc0000 [ 155.997683][ T28] audit: type=1326 audit(155.890:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xf32f8 code=0x7ffc0000 [ 155.998310][ T28] audit: type=1326 audit(155.890:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 156.020278][ T28] audit: type=1326 audit(155.920:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xf32f8 code=0x7ffc0000 [ 156.260801][ T28] audit: type=1326 audit(156.160:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xf32f8 code=0x7ffc0000 [ 156.263351][ T28] audit: type=1326 audit(156.160:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xf32f8 code=0x7ffc0000 [ 156.271652][ T28] audit: type=1326 audit(156.170:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xf32f8 code=0x7ffc0000 [ 156.289453][ T28] audit: type=1326 audit(156.180:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xf32f8 code=0x7ffc0000 [ 156.309360][ T28] audit: type=1326 audit(156.180:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=0 ip=0xf32f8 code=0x7ffc0000 [ 159.763412][ T3975] netlink: 8 bytes leftover after parsing attributes in process `syz.1.98'. [ 172.403135][ T28] kauditd_printk_skb: 60 callbacks suppressed [ 172.403476][ T28] audit: type=1326 audit(172.300:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4019 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 172.409796][ T28] audit: type=1326 audit(172.300:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4019 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 172.414364][ T28] audit: type=1326 audit(172.310:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4019 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=309 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 172.420634][ T28] audit: type=1326 audit(172.320:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4019 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 172.425535][ T28] audit: type=1326 audit(172.320:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4019 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=310 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 172.427416][ T28] audit: type=1400 audit(172.320:252): avc: denied { write } for pid=4019 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 172.437861][ T28] audit: type=1326 audit(172.330:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4019 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 172.438267][ T28] audit: type=1326 audit(172.330:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4019 comm="syz.0.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 174.187663][ T4026] syzkaller0: entered promiscuous mode [ 174.188113][ T4026] syzkaller0: entered allmulticast mode [ 176.961709][ T4039] netlink: 3 bytes leftover after parsing attributes in process `syz.1.116'. [ 178.571871][ T4047] bond0: (slave bond_slave_0): Releasing backup interface [ 178.597455][ T4047] bond0: (slave bond_slave_1): Releasing backup interface [ 178.612054][ T4047] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 178.762363][ T28] audit: type=1400 audit(178.660:255): avc: denied { name_bind } for pid=4053 comm="syz.1.123" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 182.914612][ T28] audit: type=1400 audit(182.810:256): avc: denied { setopt } for pid=4079 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 186.669567][ T4095] vlan0: entered promiscuous mode [ 191.287347][ T28] audit: type=1400 audit(191.180:257): avc: denied { watch } for pid=4103 comm="syz.0.141" path="/73/file0" dev="tmpfs" ino=389 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 191.913778][ T28] audit: type=1400 audit(191.810:258): avc: denied { bind } for pid=4105 comm="syz.0.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 191.916187][ T28] audit: type=1400 audit(191.810:259): avc: denied { listen } for pid=4105 comm="syz.0.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 191.966460][ T28] audit: type=1400 audit(191.860:260): avc: denied { accept } for pid=4105 comm="syz.0.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 191.970259][ T28] audit: type=1400 audit(191.860:261): avc: denied { read } for pid=4105 comm="syz.0.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 192.665588][ T4110] netlink: 8 bytes leftover after parsing attributes in process `syz.0.144'. [ 192.670468][ T4110] netlink: 4 bytes leftover after parsing attributes in process `syz.0.144'. [ 193.498007][ T4125] 8021q: VLANs not supported on lo [ 193.783423][ T28] audit: type=1400 audit(193.680:262): avc: denied { setopt } for pid=4132 comm="syz.0.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 195.540140][ T4153] netlink: 12 bytes leftover after parsing attributes in process `syz.0.160'. [ 198.161638][ T4175] netlink: 12 bytes leftover after parsing attributes in process `syz.1.171'. [ 198.162273][ T4175] netlink: 20 bytes leftover after parsing attributes in process `syz.1.171'. [ 200.868009][ T4193] netlink: 'syz.1.178': attribute type 27 has an invalid length. [ 202.750083][ T2636] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.750386][ T2636] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.750572][ T2636] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 202.750706][ T2636] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 203.534288][ T28] audit: type=1400 audit(203.430:263): avc: denied { write } for pid=4202 comm="syz.1.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 211.367231][ T4232] syzkaller0: entered promiscuous mode [ 211.367656][ T4232] syzkaller0: entered allmulticast mode [ 211.449045][ T28] audit: type=1400 audit(211.340:264): avc: denied { map } for pid=4233 comm="syz.0.192" path="socket:[2871]" dev="sockfs" ino=2871 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 211.452357][ T28] audit: type=1400 audit(211.350:265): avc: denied { read accept } for pid=4233 comm="syz.0.192" path="socket:[2871]" dev="sockfs" ino=2871 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 212.530530][ T28] audit: type=1400 audit(212.430:266): avc: denied { block_suspend } for pid=4242 comm="syz.0.195" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 215.080488][ T28] audit: type=1400 audit(214.980:267): avc: denied { ioctl } for pid=4266 comm="syz.0.203" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4094 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 217.663632][ T4291] netlink: 16 bytes leftover after parsing attributes in process `syz.1.214'. [ 218.282460][ T28] audit: type=1400 audit(218.180:268): avc: denied { checkpoint_restore } for pid=4308 comm="syz.1.221" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 222.676610][ T4338] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=546 sclass=netlink_route_socket pid=4338 comm=syz.0.231 [ 224.582983][ T28] audit: type=1400 audit(224.470:269): avc: denied { execute } for pid=4358 comm="syz.0.238" path="/130/memory.events" dev="tmpfs" ino=683 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 238.420715][ T4421] ------------[ cut here ]------------ [ 238.421414][ T4421] WARNING: kernel/bpf/verifier.c:2763 at reg_bounds_sanity_check+0x3c0/0x428, CPU#1: syz.1.262/4421 [ 238.423387][ T4421] verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0xffffdfcd, 0xffffffffffffdfcc] s64=[0x80000000ffffdfcd, 0x7fffffffffffdfcc] u32=[0xffffdfcd, 0xffffdfcc] s32=[0xffffdfcd, 0xffffdfcc] var_off=(0xffffdfcc, 0xffffffff00000000) [ 238.424784][ T4421] Modules linked in: [ 238.425699][ T4421] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 238.426704][ T4421] CPU: 1 UID: 0 PID: 4421 Comm: syz.1.262 Not tainted syzkaller #0 PREEMPT [ 238.427295][ T4421] Hardware name: ARM-Versatile Express [ 238.427917][ T4421] Call trace: [ 238.428439][ T4421] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 238.429225][ T4421] r7:8281f940 r6:00000000 r5:822a7864 r4:00000001 [ 238.429643][ T4421] [<80201af0>] (show_stack) from [<8021e45c>] (dump_stack_lvl+0x5c/0x70) [ 238.430043][ T4421] [<8021e400>] (dump_stack_lvl) from [<8021e488>] (dump_stack+0x18/0x1c) [ 238.430381][ T4421] r7:8281f940 r6:00000000 r5:85269800 r4:82a80d14 [ 238.430994][ T4421] [<8021e470>] (dump_stack) from [<802025f4>] (vpanic+0x114/0x320) [ 238.431756][ T4421] [<802024e0>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0x104) [ 238.432320][ T4421] r7:803e0584 [ 238.432548][ T4421] [<80202800>] (panic) from [<80250a68>] (get_taint+0x0/0x1c) [ 238.433297][ T4421] r3:8280c544 r2:00000001 r1:8228e608 r0:82295ec0 [ 238.433569][ T4421] [<802509f0>] (check_panic_on_warn) from [<80250be4>] (__warn+0x98/0x1ac) [ 238.434110][ T4421] [<80250b4c>] (__warn) from [<80250ee0>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 238.434467][ T4421] r8:00000009 r7:822ae19c r6:ea6598c4 r5:85269800 r4:00000000 [ 238.434772][ T4421] [<80250cfc>] (warn_slowpath_fmt) from [<803e0584>] (reg_bounds_sanity_check+0x3c0/0x428) [ 238.435235][ T4421] r10:85978000 r9:ffffdfcd r8:80000000 r7:ffffdfcd r6:ffffdfcc r5:822ae900 [ 238.435570][ T4421] r4:86af4230 [ 238.435751][ T4421] [<803e01c4>] (reg_bounds_sanity_check) from [<803ed2ac>] (reg_set_min_max+0x1c4/0x288) [ 238.436165][ T4421] r10:00000001 r9:00000010 r8:85978000 r7:852d7310 r6:86af4310 r5:86af4230 [ 238.436486][ T4421] r4:852d7230 [ 238.436663][ T4421] [<803ed0e8>] (reg_set_min_max) from [<803fdef0>] (check_cond_jmp_op+0xc7c/0x1980) [ 238.437058][ T4421] r10:86af4000 r9:00000010 r8:85fc7c00 r7:ffffffff r6:80000000 r5:86004b40 [ 238.437413][ T4421] r4:ea7550c0 r3:852d7230 [ 238.437627][ T4421] [<803fd274>] (check_cond_jmp_op) from [<80404560>] (do_check_common+0x259c/0x3228) [ 238.438022][ T4421] r10:8597c000 r9:85978000 r8:ea7550c0 r7:8597e000 r6:00000018 r5:ea755078 [ 238.438409][ T4421] r4:ea755000 [ 238.438646][ T4421] [<80401fc4>] (do_check_common) from [<804081b4>] (bpf_check+0x22e4/0x2d30) [ 238.439242][ T4421] r10:8597e000 r9:00000001 r8:85978000 r7:00000a7b r6:859788bc r5:00000000 [ 238.439817][ T4421] r4:00000016 [ 238.440021][ T4421] [<80405ed0>] (bpf_check) from [<803d98d4>] (bpf_prog_load+0x5b8/0xdec) [ 238.440384][ T4421] r10:ea755000 r9:85269800 r8:8609a330 r7:ea659d18 r6:00000000 r5:00000000 [ 238.440722][ T4421] r4:ea659eb0 [ 238.440896][ T4421] [<803d931c>] (bpf_prog_load) from [<803db0fc>] (__sys_bpf+0x2d8/0x2008) [ 238.441255][ T4421] r10:00000005 r9:00000000 r8:ea659e50 r7:00000048 r6:85269800 r5:200054c0 [ 238.441625][ T4421] r4:00000000 [ 238.441797][ T4421] [<803dae24>] (__sys_bpf) from [<803dd3c4>] (sys_bpf+0x2c/0x48) [ 238.442194][ T4421] r10:00000182 r9:85269800 r8:8020029c r7:00000182 r6:00346450 r5:00000000 [ 238.442503][ T4421] r4:00000000 [ 238.442683][ T4421] [<803dd398>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 238.443113][ T4421] Exception stack(0xea659fa8 to 0xea659ff0) [ 238.443679][ T4421] 9fa0: 00000000 00000000 00000005 200054c0 00000048 00000000 [ 238.444490][ T4421] 9fc0: 00000000 00000000 00346450 00000182 00346418 00000000 003d0f00 76ec70dc [ 238.444845][ T4421] 9fe0: 76ec6e88 76ec6e78 00018ba0 001300f0 [ 238.447216][ T4421] Rebooting in 86400 seconds..