last executing test programs: 6.751013177s ago: executing program 0 (id=2671): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close_range(r3, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r4, 0x0, 0xff69, 0x20000801, &(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) sendmsg$NL80211_CMD_UPDATE_FT_IES(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) 5.459344943s ago: executing program 0 (id=2673): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r1, r0, 0x0) r2 = accept(r0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) 5.149207071s ago: executing program 0 (id=2674): shmctl$IPC_RMID(0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) shmctl$IPC_SET(0x0, 0x1, 0x0) pipe2$watch_queue(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x0) r1 = shmget(0x2, 0x1000, 0x200, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_INFO(0x0, 0xe, 0x0) semtimedop(r1, &(0x7f0000000180)=[{}], 0x1, 0x0) 4.955116698s ago: executing program 0 (id=2675): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/anycast6\x00') close_range(r0, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r1, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getpeername$l2tp6(r0, 0x0, &(0x7f00000000c0)) 4.68375457s ago: executing program 0 (id=2676): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x14, 0x6, 0x1, 0x301}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup3(r2, r1, 0x0) sendmsg$IPCTNL_MSG_CT_GET_DYING(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x6, 0x1, 0x201}, 0x14}}, 0x0) recvmsg$unix(r3, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f00000003c0)={'ip6tnl0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @mcast2}}) 4.397387494s ago: executing program 0 (id=2677): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) 3.059436939s ago: executing program 1 (id=2679): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='freezer.state\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) r1 = io_uring_setup(0x104c, &(0x7f0000001440)) sendmsg$NL80211_CMD_DISASSOCIATE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f0000000040)={{}, "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"}) close(r1) 2.041338922s ago: executing program 1 (id=2680): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$packet(r2, 0x0, 0x0) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f00000004c0)) 1.745736898s ago: executing program 1 (id=2681): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x12, &(0x7f0000000040)=0x6, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000480)="fbbf0b5044e308cb7bd572aa2b42e9678bcf30eff9f3aed14dc94a114bd2b45956aebe2b108a87e865501a5f9e0383611afdd3f8bac3d5cfd7772a3ab48d0ba4b600731e357e38716c449fae7c28548a4f2105f44b8fd9b33041270ae01f1a405e3f650fc3b0926d481c364fca00000000000000006d3a3ede9fc738b8d86209c060161d5ddb5fcf3d09001117cdb9d055aa2d89fe3458720724853a876448d4a1fe9ef0569ad98a05ab5df763923b4e2c576e00000000000000000000000000000000002090666159e3075f7244cf4ec3d7814c0c934f44e200219e6dd7bc23397d5f2f2c76a5baddd0fd8c340362691ef226f7a0ac51b74b6be5ed6737948514cd466943d08eeb3895b80499da2b209da4f3ec5e3744ce3e863b0e04d0ec2f39edf50b6e08c4b47e448a35414763d687fbe3792ee15c5b9791310a346472723c100bf77a310b0ced8004b5ac6d48c40439f512e8ef34a53d65f55563f68136a577736ca5f6f66e01ef4ec2cdc8db34f6de50713adaa3f70189958263fddc1314f8a28ccdef6e1390c5fbaeadc3035d019f0dc75de307de6c0d010000000000000027083d1d5b4b013c503b863b560688d94de886b6dc73d5da2dfeff4bed1a49a975a6c8dbb480e4415ddca5657a5a8e3b111015499e952bb5e8d8f60de3d688df7802c6e8b27b31fac4e199038b79a3999920e634a5af162a9581b0e6647e410700246548234acacf9cb43ab332a37bbc926c39897395c974fda31536be523bf4260300730ae6136fecae5f0fa6ab2df8d98128b24589e3bbe5230e07dc5e0d65cc397e3f8204d48e59e8e294a6d7008ba8fba28cd5009fe1a7c569ce740078bf1c7389a6ba0f89257f0eac417aac0d2d89b05ee5dafa2f1d936c87264d077b2c0d5abdbc64ce943f895dd4c2e9dd7393543d89b00dc6b3a25045d4ec932366c67dfad087fa8dc104644828440bdf67dd97ebccb3bd", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) r1 = dup(r0) write$P9_RAUTH(r1, 0x0, 0x0) write$P9_RLERROR(r1, 0x0, 0x0) 800.220318ms ago: executing program 1 (id=2682): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000010201"], 0x14}}, 0x0) recvmsg$unix(r0, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000f00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close_range(r3, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r1, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) 383.480317ms ago: executing program 1 (id=2683): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept4$inet(r2, 0x0, 0x0, 0x0) sendmmsg$unix(r3, 0x0, 0x0, 0x0) 0s ago: executing program 1 (id=2684): r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = dup(r0) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x4, @tid=r2}, &(0x7f0000004200)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$PAGEMAP_SCAN(r1, 0xc0606610, &(0x7f0000000240)={0x60, 0x0, &(0x7f00001ad000/0x4000)=nil, &(0x7f0000085000/0x2000)=nil, 0x0, 0x0, 0x23}) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:27368' (ED25519) to the list of known hosts. [ 150.453742][ T30] audit: type=1400 audit(150.050:57): avc: denied { name_bind } for pid=3276 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 150.823467][ T30] audit: type=1400 audit(150.420:58): avc: denied { execute } for pid=3278 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 150.833114][ T30] audit: type=1400 audit(150.420:59): avc: denied { execute_no_trans } for pid=3278 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 156.169045][ T30] audit: type=1400 audit(155.770:60): avc: denied { mounton } for pid=3278 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 156.188831][ T30] audit: type=1400 audit(155.790:61): avc: denied { mount } for pid=3278 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 156.221118][ T3278] cgroup: Unknown subsys name 'net' [ 156.243296][ T30] audit: type=1400 audit(155.840:62): avc: denied { unmount } for pid=3278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 156.493783][ T3278] cgroup: Unknown subsys name 'rlimit' [ 156.724374][ T30] audit: type=1400 audit(156.320:63): avc: denied { setattr } for pid=3278 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 156.734129][ T30] audit: type=1400 audit(156.330:64): avc: denied { mounton } for pid=3278 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 156.739419][ T30] audit: type=1400 audit(156.340:65): avc: denied { mount } for pid=3278 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 157.234209][ T3281] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 157.248017][ T30] audit: type=1400 audit(156.840:66): avc: denied { relabelto } for pid=3281 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 157.249762][ T30] audit: type=1400 audit(156.840:67): avc: denied { write } for pid=3281 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 157.342005][ T30] audit: type=1400 audit(156.940:68): avc: denied { read } for pid=3278 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 157.344056][ T30] audit: type=1400 audit(156.940:69): avc: denied { open } for pid=3278 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 169.118622][ T3278] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 173.970957][ T30] audit: type=1400 audit(173.570:70): avc: denied { execmem } for pid=3283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 174.027586][ T30] audit: type=1400 audit(173.620:71): avc: denied { mounton } for pid=3284 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 174.028865][ T30] audit: type=1400 audit(173.620:72): avc: denied { mounton } for pid=3285 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 174.029722][ T30] audit: type=1400 audit(173.630:73): avc: denied { mount } for pid=3285 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 174.038538][ T30] audit: type=1400 audit(173.640:74): avc: denied { read } for pid=3284 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 174.046260][ T30] audit: type=1400 audit(173.640:75): avc: denied { open } for pid=3284 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 174.052320][ T30] audit: type=1400 audit(173.650:76): avc: denied { mounton } for pid=3284 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 174.100275][ T30] audit: type=1400 audit(173.700:77): avc: denied { module_request } for pid=3285 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 174.278288][ T30] audit: type=1400 audit(173.870:78): avc: denied { sys_module } for pid=3284 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 178.605121][ T3284] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 178.640857][ T3284] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 179.053726][ T3285] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 179.077846][ T3285] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 180.717241][ T3284] hsr_slave_0: entered promiscuous mode [ 180.731150][ T3284] hsr_slave_1: entered promiscuous mode [ 181.348489][ T3285] hsr_slave_0: entered promiscuous mode [ 181.355255][ T3285] hsr_slave_1: entered promiscuous mode [ 181.364712][ T3285] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 181.368298][ T3285] Cannot create hsr debugfs directory [ 182.517250][ T30] audit: type=1400 audit(182.110:79): avc: denied { create } for pid=3284 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 182.537439][ T30] audit: type=1400 audit(182.110:80): avc: denied { write } for pid=3284 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 182.539027][ T30] audit: type=1400 audit(182.130:81): avc: denied { read } for pid=3284 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 182.592804][ T3284] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 182.650251][ T3284] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 182.680869][ T3284] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 182.721665][ T3284] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 183.114230][ T3285] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 183.169177][ T3285] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 183.203984][ T3285] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 183.241989][ T3285] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 184.942494][ T3284] 8021q: adding VLAN 0 to HW filter on device bond0 [ 185.498592][ T3285] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.842771][ T3284] veth0_vlan: entered promiscuous mode [ 192.930630][ T3284] veth1_vlan: entered promiscuous mode [ 193.327576][ T3284] veth0_macvtap: entered promiscuous mode [ 193.417928][ T3284] veth1_macvtap: entered promiscuous mode [ 193.614689][ T3284] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.618492][ T3284] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.618981][ T3284] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.619362][ T3284] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.972687][ T30] audit: type=1400 audit(193.570:82): avc: denied { mount } for pid=3284 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 193.987409][ T30] audit: type=1400 audit(193.580:83): avc: denied { mounton } for pid=3284 comm="syz-executor" path="/syzkaller.ptjCqU/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 194.012332][ T30] audit: type=1400 audit(193.600:84): avc: denied { mount } for pid=3284 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 194.061968][ T30] audit: type=1400 audit(193.660:85): avc: denied { unmount } for pid=3284 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 194.093539][ T30] audit: type=1400 audit(193.690:86): avc: denied { mounton } for pid=3284 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1520 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 194.141522][ T3285] veth0_vlan: entered promiscuous mode [ 194.144210][ T30] audit: type=1400 audit(193.740:87): avc: denied { mount } for pid=3284 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 194.213207][ T3285] veth1_vlan: entered promiscuous mode [ 194.428485][ T3285] veth0_macvtap: entered promiscuous mode [ 194.471782][ T3285] veth1_macvtap: entered promiscuous mode [ 194.506764][ T30] audit: type=1400 audit(194.090:88): avc: denied { read write } for pid=3284 comm="syz-executor" name="loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 194.507734][ T30] audit: type=1400 audit(194.090:89): avc: denied { open } for pid=3284 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 194.508507][ T30] audit: type=1400 audit(194.100:90): avc: denied { ioctl } for pid=3284 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 194.998040][ T3285] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.998791][ T3285] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.999211][ T3285] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.999699][ T3285] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 195.982444][ T30] audit: type=1400 audit(195.580:91): avc: denied { read write } for pid=3425 comm="syz.0.3" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 196.653488][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 201.283519][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 201.283617][ T30] audit: type=1400 audit(200.880:102): avc: denied { create } for pid=3462 comm="syz.0.18" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 201.762781][ T30] audit: type=1400 audit(201.360:103): avc: denied { create } for pid=3467 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 203.792412][ T30] audit: type=1400 audit(203.390:104): avc: denied { create } for pid=3479 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 203.829832][ T30] audit: type=1400 audit(203.430:105): avc: denied { ioctl } for pid=3479 comm="syz.0.24" path="socket:[3881]" dev="sockfs" ino=3881 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 203.847027][ T30] audit: type=1400 audit(203.430:106): avc: denied { bind } for pid=3479 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 203.862430][ T30] audit: type=1400 audit(203.450:107): avc: denied { write } for pid=3479 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 206.534571][ T30] audit: type=1400 audit(206.130:108): avc: denied { execute } for pid=3493 comm="syz.0.29" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 207.539535][ T30] audit: type=1400 audit(207.140:109): avc: denied { read write } for pid=3497 comm="syz.0.31" name="virtual_nci" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 207.540495][ T30] audit: type=1400 audit(207.140:110): avc: denied { open } for pid=3497 comm="syz.0.31" path="/dev/virtual_nci" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 209.073313][ T30] audit: type=1400 audit(208.670:111): avc: denied { read write } for pid=3505 comm="syz.0.33" name="uinput" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 209.074242][ T30] audit: type=1400 audit(208.670:112): avc: denied { open } for pid=3505 comm="syz.0.33" path="/dev/uinput" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 209.106612][ T30] audit: type=1400 audit(208.690:113): avc: denied { ioctl } for pid=3505 comm="syz.0.33" path="/dev/uinput" dev="devtmpfs" ino=711 ioctlcmd=0x5569 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 209.144986][ T3506] input: syz0 as /devices/virtual/input/input1 [ 214.722124][ T3523] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 214.771876][ T30] audit: type=1400 audit(214.370:114): avc: denied { ioctl } for pid=3522 comm="syz.0.37" path="socket:[4254]" dev="sockfs" ino=4254 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 215.073683][ T3523] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 216.927144][ T30] audit: type=1400 audit(216.520:115): avc: denied { mounton } for pid=3530 comm="syz.0.40" path="/23/file0" dev="tmpfs" ino=145 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 222.087078][ T30] audit: type=1400 audit(221.680:116): avc: denied { name_bind } for pid=3561 comm="syz.1.53" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 223.788556][ T30] audit: type=1400 audit(223.360:117): avc: denied { ioctl } for pid=3572 comm="syz.0.57" path="/dev/udmabuf" dev="devtmpfs" ino=678 ioctlcmd=0x7542 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 226.313313][ T30] audit: type=1400 audit(225.910:118): avc: denied { connect } for pid=3590 comm="syz.0.63" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 227.720589][ T30] audit: type=1400 audit(227.320:119): avc: denied { create } for pid=3595 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 227.732361][ T30] audit: type=1400 audit(227.330:120): avc: denied { getopt } for pid=3595 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 230.215968][ T3609] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3609 comm=syz.1.70 [ 237.409966][ T30] audit: type=1400 audit(237.010:121): avc: denied { create } for pid=3642 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 237.436545][ T30] audit: type=1400 audit(237.030:122): avc: denied { setopt } for pid=3642 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 237.451011][ T30] audit: type=1400 audit(237.040:123): avc: denied { connect } for pid=3642 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 238.601456][ T30] audit: type=1400 audit(238.200:124): avc: denied { create } for pid=3645 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 238.618527][ T30] audit: type=1400 audit(238.210:125): avc: denied { connect } for pid=3645 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 241.581184][ T30] audit: type=1400 audit(241.180:126): avc: denied { write } for pid=3667 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 243.928711][ T3418] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 244.208396][ T3418] usb 2-1: Using ep0 maxpacket: 8 [ 244.247943][ T3418] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 64 [ 244.248321][ T3418] usb 2-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 32 [ 244.316619][ T3418] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 244.317549][ T3418] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 244.317914][ T3418] usb 2-1: Product: syz [ 244.318174][ T3418] usb 2-1: Manufacturer: syz [ 244.318444][ T3418] usb 2-1: SerialNumber: syz [ 244.766945][ T3418] cdc_ncm 2-1:1.0: CDC Union missing and no IAD found [ 244.768967][ T3418] cdc_ncm 2-1:1.0: bind() failure [ 244.923310][ T3418] cdc_ncm 2-1:1.1: CDC Union missing and no IAD found [ 244.924455][ T3418] cdc_ncm 2-1:1.1: bind() failure [ 244.965016][ T30] audit: type=1400 audit(244.560:127): avc: denied { create } for pid=3679 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 244.985178][ T30] audit: type=1400 audit(244.580:128): avc: denied { bind } for pid=3679 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 244.990482][ T30] audit: type=1400 audit(244.590:129): avc: denied { accept } for pid=3679 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 245.011899][ T30] audit: type=1400 audit(244.600:130): avc: denied { write } for pid=3679 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 245.101913][ T3418] usb 2-1: USB disconnect, device number 2 [ 245.873721][ T30] audit: type=1400 audit(245.470:131): avc: denied { create } for pid=3687 comm="syz.0.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 245.883197][ T30] audit: type=1400 audit(245.480:132): avc: denied { read } for pid=3089 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 245.896054][ T30] audit: type=1400 audit(245.490:133): avc: denied { append } for pid=3089 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 245.897189][ T30] audit: type=1400 audit(245.490:134): avc: denied { open } for pid=3089 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 245.898174][ T30] audit: type=1400 audit(245.490:135): avc: denied { getattr } for pid=3089 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 245.906985][ T30] audit: type=1400 audit(245.500:136): avc: denied { ioctl } for pid=3687 comm="syz.0.102" path="socket:[4540]" dev="sockfs" ino=4540 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 251.269728][ T3714] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65381 sclass=netlink_route_socket pid=3714 comm=syz.1.111 [ 257.149552][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 257.149663][ T30] audit: type=1400 audit(256.750:145): avc: denied { read } for pid=3749 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 257.663103][ T30] audit: type=1400 audit(257.250:146): avc: denied { create } for pid=3756 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 257.694811][ T30] audit: type=1400 audit(257.290:147): avc: denied { write } for pid=3756 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 260.042562][ T30] audit: type=1400 audit(259.640:148): avc: denied { create } for pid=3771 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 260.059099][ T30] audit: type=1400 audit(259.650:149): avc: denied { create } for pid=3771 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 260.068251][ T30] audit: type=1400 audit(259.670:150): avc: denied { write } for pid=3771 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 260.358539][ T30] audit: type=1400 audit(259.960:151): avc: denied { write } for pid=3773 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 268.400514][ T30] audit: type=1400 audit(268.000:152): avc: denied { read } for pid=3823 comm="syz.0.152" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 268.402303][ T30] audit: type=1400 audit(268.000:153): avc: denied { open } for pid=3823 comm="syz.0.152" path="/dev/loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 271.436947][ T30] audit: type=1400 audit(271.030:154): avc: denied { read } for pid=3839 comm="syz.0.159" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 271.437923][ T30] audit: type=1400 audit(271.030:155): avc: denied { open } for pid=3839 comm="syz.0.159" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 271.473629][ T30] audit: type=1400 audit(271.050:156): avc: denied { read } for pid=3839 comm="syz.0.159" name="card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 271.474693][ T30] audit: type=1400 audit(271.070:157): avc: denied { open } for pid=3839 comm="syz.0.159" path="/dev/dri/card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 271.490673][ T30] audit: type=1400 audit(271.090:158): avc: denied { ioctl } for pid=3839 comm="syz.0.159" path="/dev/fb0" dev="devtmpfs" ino=621 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 275.093283][ T30] audit: type=1400 audit(274.690:159): avc: denied { read } for pid=3857 comm="syz.1.167" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 275.102786][ T30] audit: type=1400 audit(274.700:160): avc: denied { open } for pid=3857 comm="syz.1.167" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 275.144128][ T30] audit: type=1400 audit(274.730:161): avc: denied { ioctl } for pid=3857 comm="syz.1.167" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 275.903622][ T3862] SELinux: Context system_u:object_r:chfn_exec_t:s0 is not valid (left unmapped). [ 275.911737][ T30] audit: type=1400 audit(275.510:162): avc: denied { relabelto } for pid=3861 comm="syz.0.169" name="cpuacct.usage_percpu" dev="tmpfs" ino=499 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:chfn_exec_t:s0" [ 275.912859][ T30] audit: type=1400 audit(275.510:163): avc: denied { associate } for pid=3861 comm="syz.0.169" name="cpuacct.usage_percpu" dev="tmpfs" ino=499 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:chfn_exec_t:s0" [ 275.971899][ T30] audit: type=1400 audit(275.570:164): avc: denied { unlink } for pid=3284 comm="syz-executor" name="cpuacct.usage_percpu" dev="tmpfs" ino=499 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:chfn_exec_t:s0" [ 279.523906][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 127.0.0.1:20002. Sending cookies. [ 279.731066][ T30] audit: type=1400 audit(279.330:165): avc: denied { read write } for pid=3889 comm="syz.0.180" name="vhost-net" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 279.733696][ T30] audit: type=1400 audit(279.330:166): avc: denied { open } for pid=3889 comm="syz.0.180" path="/dev/vhost-net" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 279.739410][ T30] audit: type=1400 audit(279.340:167): avc: denied { ioctl } for pid=3889 comm="syz.0.180" path="/dev/vhost-net" dev="devtmpfs" ino=718 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 289.345938][ T30] audit: type=1400 audit(288.940:168): avc: denied { setopt } for pid=3945 comm="syz.0.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 289.357790][ T30] audit: type=1400 audit(288.950:169): avc: denied { connect } for pid=3945 comm="syz.0.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 289.362210][ T30] audit: type=1400 audit(288.960:170): avc: denied { name_connect } for pid=3945 comm="syz.0.201" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 292.516551][ T30] audit: type=1400 audit(292.110:171): avc: denied { bind } for pid=3956 comm="syz.1.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 292.517461][ T30] audit: type=1400 audit(292.110:172): avc: denied { name_bind } for pid=3956 comm="syz.1.205" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 292.519939][ T30] audit: type=1400 audit(292.120:173): avc: denied { node_bind } for pid=3956 comm="syz.1.205" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 292.528141][ T30] audit: type=1400 audit(292.120:174): avc: denied { write } for pid=3956 comm="syz.1.205" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 292.537832][ T30] audit: type=1400 audit(292.120:175): avc: denied { name_connect } for pid=3956 comm="syz.1.205" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 297.810728][ T30] audit: type=1400 audit(297.410:176): avc: denied { create } for pid=3968 comm="syz.0.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 297.844103][ T3969] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3969 comm=syz.0.210 [ 297.846865][ T30] audit: type=1400 audit(297.440:177): avc: denied { write } for pid=3968 comm="syz.0.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 298.871276][ T30] audit: type=1400 audit(298.470:178): avc: denied { ioctl } for pid=3972 comm="syz.0.211" path="socket:[5026]" dev="sockfs" ino=5026 ioctlcmd=0x4b69 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 301.162719][ T3989] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=260 sclass=netlink_audit_socket pid=3989 comm=syz.0.217 [ 302.602455][ T30] audit: type=1400 audit(302.200:179): avc: denied { read } for pid=3995 comm="syz.0.220" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 302.603323][ T30] audit: type=1400 audit(302.200:180): avc: denied { open } for pid=3995 comm="syz.0.220" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 306.297311][ T30] audit: type=1400 audit(305.890:181): avc: denied { mount } for pid=4004 comm="syz.1.224" name="/" dev="configfs" ino=74 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 307.077913][ T30] audit: type=1400 audit(306.680:182): avc: denied { create } for pid=3997 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 307.108715][ T30] audit: type=1400 audit(306.700:183): avc: denied { ioctl } for pid=3997 comm="syz.0.221" path="socket:[5085]" dev="sockfs" ino=5085 ioctlcmd=0x8910 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 316.101313][ T30] audit: type=1400 audit(315.700:184): avc: denied { map } for pid=4037 comm="syz.1.235" path="socket:[5832]" dev="sockfs" ino=5832 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 319.167508][ T30] audit: type=1400 audit(318.760:185): avc: denied { mount } for pid=4051 comm="syz.0.239" name="/" dev="sockfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 321.265018][ T30] audit: type=1400 audit(320.860:186): avc: denied { connect } for pid=4065 comm="syz.0.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 322.547719][ C1] vxcan0: j1939_tp_rxtimer: 0xffff000014acd400: rx timeout, send abort [ 322.554912][ C1] vxcan0: j1939_xtp_rx_abort_one: 0xffff000014acd400: 0x20000: (3) A timeout occurred and this is the connection abort to close the session. [ 324.574265][ T30] audit: type=1400 audit(324.170:187): avc: denied { create } for pid=4077 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 324.608165][ T30] audit: type=1400 audit(324.210:188): avc: denied { write } for pid=4077 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 326.596539][ T30] audit: type=1400 audit(326.190:189): avc: denied { write } for pid=4091 comm="syz.0.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 326.810462][ T30] audit: type=1400 audit(326.400:190): avc: denied { setopt } for pid=4094 comm="syz.0.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 331.467229][ T30] audit: type=1400 audit(331.060:191): avc: denied { write } for pid=4122 comm="syz.0.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 334.570062][ T30] audit: type=1400 audit(334.170:192): avc: denied { setopt } for pid=4138 comm="syz.0.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 337.069430][ T28] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 337.268252][ T28] usb 1-1: Using ep0 maxpacket: 16 [ 337.272161][ C1] hrtimer: interrupt took 766320 ns [ 337.292473][ T28] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 337.293236][ T28] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 337.293938][ T28] usb 1-1: New USB device found, idVendor=0419, idProduct=0001, bcdDevice= 0.00 [ 337.294347][ T28] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 337.340527][ T28] usb 1-1: config 0 descriptor?? [ 337.899729][ T28] hid-generic 0003:0419:0001.0001: unknown main item tag 0x3 [ 337.901740][ T28] hid-generic 0003:0419:0001.0001: item fetching failed at offset 2/5 [ 337.909049][ T28] hid-generic 0003:0419:0001.0001: probe with driver hid-generic failed with error -22 [ 338.027776][ T1894] usb 1-1: USB disconnect, device number 2 [ 340.033176][ T30] audit: type=1400 audit(339.630:193): avc: denied { read } for pid=4165 comm="syz.1.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 340.050998][ T4166] Zero length message leads to an empty skb [ 340.326570][ T30] audit: type=1400 audit(339.920:194): avc: denied { setopt } for pid=4167 comm="syz.1.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 341.730894][ T30] audit: type=1400 audit(341.330:195): avc: denied { create } for pid=4177 comm="syz.0.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 341.741995][ T30] audit: type=1400 audit(341.340:196): avc: denied { write } for pid=4177 comm="syz.0.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 346.736216][ T30] audit: type=1400 audit(346.330:197): avc: denied { getopt } for pid=4195 comm="syz.0.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 353.614439][ T4235] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1546 sclass=netlink_audit_socket pid=4235 comm=syz.1.312 [ 353.869180][ T4237] process 'syz.1.313' launched './file1' with NULL argv: empty string added [ 353.883584][ T30] audit: type=1400 audit(353.470:198): avc: denied { execute_no_trans } for pid=4236 comm="syz.1.313" path="/147/file1" dev="tmpfs" ino=816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 354.034036][ T30] audit: type=1400 audit(353.630:199): avc: denied { listen } for pid=4239 comm="syz.0.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 354.559048][ T30] audit: type=1400 audit(354.160:200): avc: denied { ioctl } for pid=4239 comm="syz.0.314" path="socket:[6521]" dev="sockfs" ino=6521 ioctlcmd=0x5419 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 362.703170][ T30] audit: type=1400 audit(362.300:201): avc: denied { ioctl } for pid=4309 comm="syz.0.339" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=6647 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 364.399937][ T4316] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4316 comm=syz.1.341 [ 378.329510][ T30] audit: type=1400 audit(377.920:202): avc: denied { ioctl } for pid=4404 comm="syz.0.377" path="/dev/dri/card1" dev="devtmpfs" ino=620 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 386.088737][ T30] audit: type=1400 audit(385.690:203): avc: denied { create } for pid=4450 comm="syz.0.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 386.633678][ T30] audit: type=1400 audit(386.230:204): avc: denied { write } for pid=4450 comm="syz.0.394" path="socket:[6883]" dev="sockfs" ino=6883 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 395.546991][ T30] audit: type=1400 audit(395.140:205): avc: denied { getopt } for pid=4515 comm="syz.1.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 395.850360][ T30] audit: type=1400 audit(395.450:206): avc: denied { ioctl } for pid=4519 comm="syz.1.422" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9375 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 399.503932][ T30] audit: type=1400 audit(399.100:207): avc: denied { ioctl } for pid=4539 comm="syz.1.429" path="socket:[7030]" dev="sockfs" ino=7030 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 401.158392][ T4554] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=4554 comm=syz.0.435 [ 401.168967][ T4554] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4554 comm=syz.0.435 [ 411.921924][ T30] audit: type=1400 audit(411.520:208): avc: denied { read } for pid=4615 comm="syz.0.459" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 411.924597][ T30] audit: type=1400 audit(411.520:209): avc: denied { open } for pid=4615 comm="syz.0.459" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 411.977056][ T30] audit: type=1400 audit(411.570:210): avc: denied { ioctl } for pid=4615 comm="syz.0.459" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 411.978025][ T30] audit: type=1400 audit(411.570:211): avc: denied { set_context_mgr } for pid=4615 comm="syz.0.459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 411.987938][ T30] audit: type=1400 audit(411.590:212): avc: denied { map } for pid=4615 comm="syz.0.459" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 413.378382][ T30] audit: type=1400 audit(412.960:213): avc: denied { read } for pid=4626 comm="syz.1.464" path="socket:[7769]" dev="sockfs" ino=7769 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 414.619402][ T30] audit: type=1400 audit(414.220:214): avc: denied { read } for pid=4639 comm="syz.0.470" name="rtc0" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 414.621719][ T30] audit: type=1400 audit(414.220:215): avc: denied { open } for pid=4639 comm="syz.0.470" path="/dev/rtc0" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 422.781043][ T30] audit: type=1400 audit(422.370:216): avc: denied { create } for pid=4685 comm="syz.1.489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 429.500004][ T4710] capability: warning: `syz.1.498' uses 32-bit capabilities (legacy support in use) [ 431.666469][ T30] audit: type=1400 audit(431.260:217): avc: denied { prog_run } for pid=4720 comm="syz.1.502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 445.029704][ T30] audit: type=1400 audit(444.630:218): avc: denied { ioctl } for pid=4808 comm="syz.1.533" path="socket:[8059]" dev="sockfs" ino=8059 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 445.038284][ T30] audit: type=1400 audit(444.630:219): avc: denied { write } for pid=4808 comm="syz.1.533" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 448.452332][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 449.002528][ T30] audit: type=1400 audit(448.600:220): avc: denied { bind } for pid=4833 comm="syz.0.544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 449.271351][ T30] audit: type=1400 audit(448.870:221): avc: denied { getopt } for pid=4835 comm="syz.0.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 463.299163][ T4898] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4898 comm=syz.0.568 [ 481.172384][ T30] audit: type=1400 audit(480.770:222): avc: denied { block_suspend } for pid=5008 comm="syz.1.613" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 481.707737][ T5018] syz.1.617 uses obsolete (PF_INET,SOCK_PACKET) [ 481.811972][ T5019] input: syz0 as /devices/virtual/input/input2 [ 488.204563][ T5034] serio: Serial port pts0 [ 491.468042][ T30] audit: type=1400 audit(491.070:223): avc: denied { read } for pid=5038 comm="syz.1.625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 499.456114][ T30] audit: type=1400 audit(499.050:224): avc: denied { read write } for pid=5059 comm="syz.1.634" name="uhid" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 499.456931][ T30] audit: type=1400 audit(499.050:225): avc: denied { open } for pid=5059 comm="syz.1.634" path="/dev/uhid" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 511.417907][ T30] audit: type=1400 audit(511.020:226): avc: denied { create } for pid=5091 comm="syz.0.645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 511.449936][ T30] audit: type=1400 audit(511.050:227): avc: denied { write } for pid=5091 comm="syz.0.645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 532.250724][ T30] audit: type=1400 audit(531.850:228): avc: denied { append } for pid=5222 comm="syz.0.693" name="userio" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 532.283921][ T5223] misc userio: Begin command sent, but we're already running [ 546.287032][ T30] audit: type=1400 audit(545.880:229): avc: denied { read } for pid=5303 comm="syz.0.725" name="mice" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 546.288005][ T30] audit: type=1400 audit(545.880:230): avc: denied { open } for pid=5303 comm="syz.0.725" path="/dev/input/mice" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 554.523796][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 586.902664][ T106] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 586.980200][ T5398] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 587.023494][ T5398] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 587.123042][ T106] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 587.482134][ T106] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 587.867361][ T106] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 588.386688][ T30] audit: type=1400 audit(587.970:231): avc: denied { read } for pid=3134 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 590.134795][ T106] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 590.169268][ T106] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 590.197785][ T106] bond0 (unregistering): Released all slaves [ 590.702120][ T106] hsr_slave_0: left promiscuous mode [ 590.721066][ T106] hsr_slave_1: left promiscuous mode [ 590.800493][ T106] veth1_macvtap: left promiscuous mode [ 590.802223][ T106] veth0_macvtap: left promiscuous mode [ 590.803393][ T106] veth1_vlan: left promiscuous mode [ 590.812401][ T106] veth0_vlan: left promiscuous mode [ 596.890541][ T5398] hsr_slave_0: entered promiscuous mode [ 596.913825][ T5398] hsr_slave_1: entered promiscuous mode [ 599.708892][ T5398] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 599.752989][ T5398] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 599.797006][ T5398] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 599.827683][ T5398] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 602.679150][ T5517] serio: Serial port pts0 [ 603.511047][ T5398] 8021q: adding VLAN 0 to HW filter on device bond0 [ 611.651224][ T5398] veth0_vlan: entered promiscuous mode [ 611.744791][ T5398] veth1_vlan: entered promiscuous mode [ 612.069198][ T5398] veth0_macvtap: entered promiscuous mode [ 612.116803][ T5398] veth1_macvtap: entered promiscuous mode [ 612.324368][ T5398] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 612.325010][ T5398] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 612.330602][ T5398] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 612.331231][ T5398] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 612.648913][ T30] audit: type=1400 audit(612.240:232): avc: denied { mounton } for pid=5398 comm="syz-executor" path="/syzkaller.B38zuO/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 612.696522][ T30] audit: type=1400 audit(612.290:233): avc: denied { mount } for pid=5398 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 612.786364][ T30] audit: type=1400 audit(612.360:234): avc: denied { mounton } for pid=5398 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1520 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 633.061441][ T5681] serio: Serial port pts0 [ 635.816626][ T30] audit: type=1400 audit(635.410:235): avc: denied { mount } for pid=5694 comm="syz.1.844" name="/" dev="ramfs" ino=11818 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 636.341189][ T5703] serio: Serial port pts0 [ 636.854269][ T30] audit: type=1400 audit(636.450:236): avc: denied { ioctl } for pid=5705 comm="syz.0.849" path="socket:[11834]" dev="sockfs" ino=11834 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 662.278936][ T30] audit: type=1400 audit(661.880:237): avc: denied { read } for pid=5795 comm="syz.0.883" path="socket:[11987]" dev="sockfs" ino=11987 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 665.530489][ T5830] serio: Serial port pts0 [ 673.109954][ T30] audit: type=1400 audit(672.710:238): avc: denied { read } for pid=5850 comm="syz.0.905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 673.992122][ T30] audit: type=1400 audit(673.590:239): avc: denied { read } for pid=5856 comm="syz.1.907" dev="nsfs" ino=4026532726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 673.997755][ T30] audit: type=1400 audit(673.590:240): avc: denied { open } for pid=5856 comm="syz.1.907" path="net:[4026532726]" dev="nsfs" ino=4026532726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 679.629229][ T30] audit: type=1400 audit(679.230:241): avc: denied { watch watch_reads } for pid=5882 comm="syz.0.917" path="/63/file0" dev="tmpfs" ino=366 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 682.318790][ T5904] netlink: 35 bytes leftover after parsing attributes in process `syz.1.919'. [ 683.100281][ T30] audit: type=1400 audit(682.690:242): avc: denied { bind } for pid=5906 comm="syz.0.925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 683.108224][ T30] audit: type=1400 audit(682.700:243): avc: denied { listen } for pid=5906 comm="syz.0.925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 683.144634][ T30] audit: type=1400 audit(682.740:244): avc: denied { accept } for pid=5906 comm="syz.0.925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 683.150839][ T30] audit: type=1400 audit(682.750:245): avc: denied { write } for pid=5906 comm="syz.0.925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 685.878057][ T30] audit: type=1400 audit(685.470:246): avc: denied { create } for pid=5926 comm="syz.0.934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 685.981180][ T30] audit: type=1400 audit(685.580:247): avc: denied { ioctl } for pid=5926 comm="syz.0.934" path="socket:[12439]" dev="sockfs" ino=12439 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 688.084673][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 702.142562][ T6013] serio: Serial port pts0 [ 702.443268][ T30] audit: type=1400 audit(702.030:248): avc: denied { open } for pid=6014 comm="syz.1.966" path="/dev/ttyq7" dev="devtmpfs" ino=376 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 713.341269][ T6074] serio: Serial port pts0 [ 741.899498][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 742.524974][ T30] audit: type=1400 audit(742.120:249): avc: denied { map } for pid=6230 comm="syz.0.1048" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13016 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 742.528404][ T30] audit: type=1400 audit(742.130:250): avc: denied { read write } for pid=6230 comm="syz.0.1048" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13016 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 743.069209][ T30] audit: type=1400 audit(742.670:251): avc: denied { shutdown } for pid=6230 comm="syz.0.1048" laddr=fe80::12 lport=43016 faddr=fe80:: scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 743.151967][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 746.616918][ T6263] serio: Serial port pts0 [ 746.742287][ T6265] serio: Serial port pts1 [ 773.323864][ T30] audit: type=1400 audit(772.920:252): avc: denied { create } for pid=6387 comm="syz.0.1110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 773.328165][ T30] audit: type=1400 audit(772.930:253): avc: denied { write } for pid=6387 comm="syz.0.1110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 774.821408][ T6397] serio: Serial port pts0 [ 777.485021][ T30] audit: type=1400 audit(777.080:254): avc: denied { ioctl } for pid=6400 comm="syz.0.1115" path="/dev/rtc0" dev="devtmpfs" ino=712 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 791.726459][ T10] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 791.961983][ T6485] serio: Serial port pts0 [ 792.074334][ T10] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 792.074910][ T10] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 792.076200][ T10] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 792.076710][ T10] usb 2-1: New USB device found, idVendor=1a34, idProduct=0802, bcdDevice= 0.00 [ 792.077074][ T10] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 792.089345][ T10] usb 2-1: config 0 descriptor?? [ 792.621214][ T10] hid-generic 0003:1A34:0802.0002: hidraw0: USB HID v0.00 Device [HID 1a34:0802] on usb-dummy_hcd.1-1/input0 [ 798.323442][ T24] usb 2-1: USB disconnect, device number 3 [ 798.974809][ T30] audit: type=1400 audit(798.570:255): avc: denied { write } for pid=6506 comm="syz.1.1154" name="fd" dev="proc" ino=14504 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 798.981678][ T30] audit: type=1400 audit(798.570:256): avc: denied { add_name } for pid=6506 comm="syz.1.1154" name="3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 798.982471][ T30] audit: type=1400 audit(798.580:257): avc: denied { create } for pid=6506 comm="syz.1.1154" name="3" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 798.983093][ T30] audit: type=1400 audit(798.580:258): avc: denied { associate } for pid=6506 comm="syz.1.1154" name="3" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 805.177411][ T30] audit: type=1400 audit(804.770:259): avc: denied { shutdown } for pid=6539 comm="syz.0.1167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 805.504197][ T30] audit: type=1400 audit(805.100:260): avc: denied { setattr } for pid=6542 comm="syz.0.1168" name="PACKET" dev="sockfs" ino=14556 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 805.510152][ T30] audit: type=1400 audit(805.110:261): avc: denied { create } for pid=6542 comm="syz.0.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 816.248658][ T6619] input: syz0 as /devices/virtual/input/input3 [ 852.017436][ T30] audit: type=1400 audit(851.610:262): avc: denied { setattr } for pid=6751 comm="syz.0.1253" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 854.993134][ T30] audit: type=1400 audit(854.590:263): avc: denied { setopt } for pid=6765 comm="syz.1.1258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 856.283373][ T6769] TCP: TCP_TX_DELAY enabled [ 871.728141][ T30] audit: type=1400 audit(871.330:264): avc: denied { setopt } for pid=6859 comm="syz.1.1296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 883.692704][ T30] audit: type=1400 audit(883.290:265): avc: denied { create } for pid=6878 comm="syz.0.1303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 896.044356][ T30] audit: type=1400 audit(895.640:266): avc: denied { bind } for pid=6928 comm="syz.0.1322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 902.671029][ T30] audit: type=1400 audit(902.270:267): avc: denied { accept } for pid=6953 comm="syz.1.1331" lport=41661 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 906.721700][ T6970] serio: Serial port pts0 [ 907.966969][ T30] audit: type=1400 audit(907.560:268): avc: denied { write } for pid=6976 comm="syz.1.1339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 909.479366][ T6989] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6989 comm=syz.1.1345 [ 915.807058][ T7010] serio: Serial port pts0 [ 930.310051][ T7074] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7074 comm=syz.1.1376 [ 931.319023][ T7083] nbd1: detected capacity change from 0 to 12 [ 931.384471][ T7083] block nbd1: Send control failed (result -89) [ 931.387104][ T7083] block nbd1: Request send failed, requeueing [ 931.393611][ T50] block nbd1: Receive control failed (result -32) [ 931.413286][ T39] block nbd1: Dead connection, failed to find a fallback [ 931.417331][ T39] block nbd1: shutting down sockets [ 931.420317][ T39] I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 931.421919][ T39] Buffer I/O error on dev nbd1, logical block 0, async page read [ 931.432214][ T7083] I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 931.433442][ T7083] Buffer I/O error on dev nbd1, logical block 0, async page read [ 931.434323][ T7083] nbd1: unable to read partition table [ 932.954373][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 934.422690][ T7106] veth0_vlan: entered allmulticast mode [ 943.598856][ T28] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 943.865994][ T28] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 943.887522][ T28] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 943.888089][ T28] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 943.888436][ T28] usb 2-1: Product: syz [ 943.888711][ T28] usb 2-1: Manufacturer: syz [ 943.888983][ T28] usb 2-1: SerialNumber: syz [ 945.137634][ T28] cdc_ncm 2-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 945.138758][ T28] cdc_ncm 2-1:1.0: dwNtbInMaxSize=16 is too small. Using 2048 [ 945.139362][ T28] cdc_ncm 2-1:1.0: setting rx_max = 2048 [ 945.562108][ T28] cdc_ncm 2-1:1.0: setting tx_max = 88 [ 945.851467][ T28] cdc_ncm 2-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.1-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 945.910447][ T28] usb 2-1: USB disconnect, device number 4 [ 945.937363][ T28] cdc_ncm 2-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.1-1, CDC NCM (NO ZLP) [ 950.446455][ T7160] serio: Serial port pts0 [ 971.673213][ T7230] serio: Serial port pts0 [ 983.526162][ T7285] capability: warning: `syz.0.1455' uses deprecated v2 capabilities in a way that may be insecure [ 983.927912][ T30] audit: type=1400 audit(983.520:269): avc: denied { append } for pid=7288 comm="syz.0.1457" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 983.946746][ T30] audit: type=1400 audit(983.540:270): avc: denied { map } for pid=7288 comm="syz.0.1457" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 983.948512][ T30] audit: type=1400 audit(983.540:271): avc: denied { write execute } for pid=7288 comm="syz.0.1457" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 998.673203][ T30] audit: type=1400 audit(998.270:272): avc: denied { read } for pid=7341 comm="syz.1.1475" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 998.674290][ T30] audit: type=1400 audit(998.270:273): avc: denied { open } for pid=7341 comm="syz.1.1475" path="/newroot/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1018.766337][ T7462] serio: Serial port pts0 [ 1021.650805][ T30] audit: type=1400 audit(1021.250:274): avc: denied { setattr } for pid=7466 comm="syz.0.1526" name="zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 1027.537347][ T7490] serio: Serial port pts0 [ 1034.084197][ T7515] input: syz0 as /devices/virtual/input/input4 [ 1054.907178][ T7546] serio: Serial port pts0 [ 1097.380125][ T30] audit: type=1400 audit(1096.980:275): avc: denied { mounton } for pid=7765 comm="syz.1.1637" path="/proc/2158/task" dev="proc" ino=18521 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1098.728026][ T30] audit: type=1400 audit(1098.330:276): avc: denied { write } for pid=7775 comm="syz.0.1642" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1104.973598][ T30] audit: type=1400 audit(1104.570:277): avc: denied { read } for pid=7811 comm="syz.0.1654" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1104.987411][ T30] audit: type=1400 audit(1104.570:278): avc: denied { open } for pid=7811 comm="syz.0.1654" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1105.353962][ T30] audit: type=1400 audit(1104.950:279): avc: denied { setopt } for pid=7814 comm="syz.0.1655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1106.192546][ T7821] block nbd0: shutting down sockets [ 1108.088757][ T7805] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 1109.717251][ T30] audit: type=1400 audit(1109.300:280): avc: denied { read } for pid=7838 comm="syz.1.1665" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1111.158878][ T7848] SELinux: Context system_u:object_r:apt_var_lib_t:s0 is not valid (left unmapped). [ 1111.167074][ T30] audit: type=1400 audit(1110.760:281): avc: denied { relabelto } for pid=7847 comm="syz.1.1669" name="syz1" dev="cgroup2" ino=65 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 1111.172067][ T30] audit: type=1400 audit(1110.770:282): avc: denied { associate } for pid=7847 comm="syz.1.1669" name="syz1" dev="cgroup2" ino=65 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:apt_var_lib_t:s0" [ 1118.263268][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1141.266914][ T28] usb 1-1: new full-speed USB device number 3 using dummy_hcd [ 1141.488581][ T28] usb 1-1: New USB device found, idVendor=0b05, idProduct=173f, bcdDevice=9d.6b [ 1141.489070][ T28] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1141.489900][ T28] usb 1-1: Product: syz [ 1141.490213][ T28] usb 1-1: Manufacturer: syz [ 1141.490486][ T28] usb 1-1: SerialNumber: syz [ 1141.508099][ T28] usb 1-1: config 0 descriptor?? [ 1146.077039][ T8018] serio: Serial port pts0 [ 1155.870295][ T3348] usb 1-1: USB disconnect, device number 3 [ 1159.897947][ T8091] input: syz0 as /devices/virtual/input/input5 [ 1172.481906][ T8178] serio: Serial port pts0 [ 1183.946921][ T8230] serio: Serial port pts1 [ 1194.546275][ T30] audit: type=1400 audit(1194.140:283): avc: denied { name_bind } for pid=8271 comm="syz.0.1831" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1200.649763][ T30] audit: type=1400 audit(1200.250:284): avc: denied { read } for pid=8304 comm="syz.0.1844" path="socket:[20491]" dev="sockfs" ino=20491 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1205.508720][ T30] audit: type=1400 audit(1205.110:285): avc: denied { ioctl } for pid=8324 comm="syz.1.1852" path="socket:[20519]" dev="sockfs" ino=20519 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1205.953257][ T8327] serio: Serial port pts0 [ 1212.198040][ T8343] serio: Serial port pts0 [ 1212.670207][ T8345] serio: Serial port pts1 [ 1220.715938][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1224.466651][ T3348] usb 2-1: new full-speed USB device number 5 using dummy_hcd [ 1224.690817][ T3348] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1224.691405][ T3348] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1224.691942][ T3348] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 1224.692477][ T3348] usb 2-1: New USB device found, idVendor=1b96, idProduct=000a, bcdDevice= 0.00 [ 1224.692905][ T3348] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1224.720481][ T3348] usb 2-1: config 0 descriptor?? [ 1225.218720][ T3348] hid-generic 0003:1B96:000A.0003: unknown main item tag 0x0 [ 1225.219299][ T3348] hid-generic 0003:1B96:000A.0003: unknown main item tag 0x0 [ 1225.219743][ T3348] hid-generic 0003:1B96:000A.0003: unknown main item tag 0x0 [ 1225.220256][ T3348] hid-generic 0003:1B96:000A.0003: unknown main item tag 0x0 [ 1225.220668][ T3348] hid-generic 0003:1B96:000A.0003: unknown main item tag 0x0 [ 1225.246703][ T3348] hid-generic 0003:1B96:000A.0003: hidraw0: USB HID v0.00 Device [HID 1b96:000a] on usb-dummy_hcd.1-1/input0 [ 1225.380109][ T30] audit: type=1400 audit(1224.980:286): avc: denied { write } for pid=8399 comm="syz.1.1877" name="hidraw0" dev="devtmpfs" ino=1568 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1227.404885][ T28] usb 2-1: USB disconnect, device number 5 [ 1231.417648][ T8443] serio: Serial port pts0 [ 1236.617153][ T8474] serio: Serial port pts0 [ 1249.634377][ T8529] serio: Serial port pts1 [ 1261.350915][ T8566] serio: Serial port pts0 [ 1265.516458][ T8572] nbd0: detected capacity change from 0 to 23 [ 1267.375233][ T50] block nbd0: Receive control failed (result -104) [ 1270.719250][ T8590] serio: Serial port pts0 [ 1278.382895][ T8608] serio: Serial port pts0 [ 1288.664848][ T8626] serio: Serial port pts0 [ 1295.438416][ T30] audit: type=1400 audit(1295.030:287): avc: denied { mounton } for pid=8635 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1295.620947][ T25] block nbd0: Possible stuck request ffff000016000000: control (read@0,4096B). Runtime 30 seconds [ 1300.248863][ T8635] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1300.279069][ T8635] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1302.104515][ T30] audit: type=1400 audit(1301.700:288): avc: denied { connect } for pid=8698 comm="syz.1.1981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1302.118064][ T30] audit: type=1400 audit(1301.720:289): avc: denied { setopt } for pid=8698 comm="syz.1.1981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1302.130986][ T30] audit: type=1400 audit(1301.730:290): avc: denied { bind } for pid=8698 comm="syz.1.1981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1302.470890][ T8635] hsr_slave_0: entered promiscuous mode [ 1302.480096][ T8635] hsr_slave_1: entered promiscuous mode [ 1302.489477][ T8635] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1302.490036][ T8635] Cannot create hsr debugfs directory [ 1302.693402][ T30] audit: type=1400 audit(1302.290:291): avc: denied { read } for pid=8698 comm="syz.1.1981" path="socket:[21841]" dev="sockfs" ino=21841 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1303.397423][ T8635] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1303.572505][ T8635] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1303.746320][ T8635] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1303.901201][ T8635] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1304.437626][ T8635] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1304.457085][ T8635] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1304.471060][ T8635] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1304.490091][ T8635] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1306.034728][ T8635] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1312.299968][ T8635] veth0_vlan: entered promiscuous mode [ 1312.358477][ T8635] veth1_vlan: entered promiscuous mode [ 1312.505169][ T8635] veth0_macvtap: entered promiscuous mode [ 1312.530604][ T8635] veth1_macvtap: entered promiscuous mode [ 1312.681887][ T8635] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1312.682424][ T8635] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1312.682779][ T8635] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1312.684645][ T8635] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1312.977521][ T30] audit: type=1400 audit(1312.570:292): avc: denied { unmount } for pid=8635 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1315.586245][ T30] audit: type=1400 audit(1315.180:293): avc: denied { lock } for pid=8790 comm="syz.1.2001" path="socket:[21359]" dev="sockfs" ino=21359 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1316.826784][ T8803] serio: Serial port pts0 [ 1317.912901][ T8814] serio: Serial port pts1 [ 1325.697772][ T25] block nbd0: Possible stuck request ffff000016000000: control (read@0,4096B). Runtime 60 seconds [ 1333.184895][ T3104] udevd[3104]: worker [8569] /devices/virtual/block/nbd0 is taking a long time [ 1336.836122][ T8915] serio: Serial port pts0 [ 1343.310497][ T8952] pimreg: entered allmulticast mode [ 1343.332125][ T30] audit: type=1326 audit(1342.930:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8951 comm="syz.0.2066" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff8994a6e8 code=0x0 [ 1349.752356][ T30] audit: type=1400 audit(1349.350:295): avc: denied { ioctl } for pid=8956 comm="syz.0.2068" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1355.772199][ T25] block nbd0: Possible stuck request ffff000016000000: control (read@0,4096B). Runtime 90 seconds [ 1358.101569][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1362.394812][ C0] vcan0: j1939_tp_rxtimer: 0xffff00001cf16800: rx timeout, send abort [ 1362.897170][ C0] vcan0: j1939_tp_rxtimer: 0xffff00001cf16800: abort rx timeout. Force session deactivation [ 1364.026539][ T9047] serio: Serial port pts0 [ 1373.383008][ T9080] serio: Serial port pts0 [ 1385.840853][ T25] block nbd0: Possible stuck request ffff000016000000: control (read@0,4096B). Runtime 120 seconds [ 1391.264083][ T30] audit: type=1400 audit(1390.860:296): avc: denied { write } for pid=9150 comm="syz.1.2146" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1391.270523][ T30] audit: type=1400 audit(1390.870:297): avc: denied { ioctl } for pid=9150 comm="syz.1.2146" path="/dev/loop-control" dev="devtmpfs" ino=638 ioctlcmd=0x9418 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1393.330384][ T30] audit: type=1400 audit(1392.930:298): avc: denied { setopt } for pid=9158 comm="syz.1.2150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1397.630454][ T30] audit: type=1400 audit(1397.230:299): avc: denied { read } for pid=9187 comm="syz.0.2160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1400.986233][ T9225] serio: Serial port pts0 [ 1402.627822][ T9238] serio: Serial port pts1 [ 1414.321207][ T9268] serio: Serial port pts1 [ 1415.927225][ T25] block nbd0: Possible stuck request ffff000016000000: control (read@0,4096B). Runtime 150 seconds [ 1422.672033][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1424.812731][ T9312] serio: Serial port pts0 [ 1429.896654][ T30] audit: type=1400 audit(1429.490:300): avc: denied { read } for pid=9319 comm="syz.0.2215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1429.921531][ T30] audit: type=1400 audit(1429.520:301): avc: denied { remove_name } for pid=3089 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1429.922428][ T30] audit: type=1400 audit(1429.520:302): avc: denied { rename } for pid=3089 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1429.932713][ T30] audit: type=1400 audit(1429.530:303): avc: denied { create } for pid=3089 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1434.081130][ T9350] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=9350 comm=syz.1.2227 [ 1443.494709][ T9415] serio: Serial port pts0 [ 1445.040726][ T9424] serio: Serial port pts1 [ 1445.999007][ T25] block nbd0: Possible stuck request ffff000016000000: control (read@0,4096B). Runtime 180 seconds [ 1448.088500][ T3104] udevd[3104]: worker [8569] /devices/virtual/block/nbd0 timeout; kill it [ 1448.089707][ T3104] udevd[3104]: seq 8083 '/devices/virtual/block/nbd0' killed [ 1468.488983][ T9531] serio: Serial port pts0 [ 1468.747247][ T9535] EXT4-fs warning (device vda): ext4_group_extend:1869: need to use ext2online to resize further [ 1469.038499][ T9537] serio: Serial port pts1 [ 1476.106380][ T25] block nbd0: Possible stuck request ffff000016000000: control (read@0,4096B). Runtime 210 seconds [ 1487.693001][ T9577] serio: Serial port pts0 [ 1493.937725][ T9604] dvmrp1: entered allmulticast mode [ 1494.513261][ T9610] serio: Serial port pts0 [ 1499.727542][ T9635] serio: Serial port pts1 [ 1506.169910][ T25] block nbd0: Possible stuck request ffff000016000000: control (read@0,4096B). Runtime 240 seconds [ 1511.642682][ T9717] serio: Serial port pts0 [ 1511.853819][ T9719] serio: Serial port pts1 [ 1518.534699][ T9733] serio: Serial port pts1 [ 1531.159156][ T9753] serio: Serial port pts0 [ 1535.836147][ T9767] serio: Serial port pts1 [ 1536.242915][ T25] block nbd0: Possible stuck request ffff000016000000: control (read@0,4096B). Runtime 270 seconds [ 1540.016670][ T9795] serio: Serial port pts0 [ 1547.833126][ T9809] serio: Serial port pts0 [ 1551.797521][ T9821] serio: Serial port pts1 [ 1555.248521][ T9834] serio: Serial port pts0 [ 1560.503619][ T9849] serio: Serial port pts1 [ 1561.186395][ T9852] serio: Serial port pts0 [ 1566.327030][ T25] block nbd0: Possible stuck request ffff000016000000: control (read@0,4096B). Runtime 300 seconds [ 1587.759136][ T9954] SELinux: Context system_u:object_r:systemd_logger_exec_t:s0 is not valid (left unmapped). [ 1587.764269][ T30] audit: type=1400 audit(1587.360:304): avc: denied { relabelto } for pid=9953 comm="syz.1.2471" name="syz.bBS9ii" dev="vda" ino=1743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:systemd_logger_exec_t:s0" [ 1587.943763][ T30] audit: type=1400 audit(1587.540:305): avc: denied { map } for pid=9956 comm="syz.1.2472" path=2F73797A2E624253396969202864656C6574656429 dev="vda" ino=1743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:systemd_logger_exec_t:s0" [ 1587.944921][ T30] audit: type=1400 audit(1587.540:306): avc: denied { read write } for pid=9956 comm="syz.1.2472" path=2F73797A2E624253396969202864656C6574656429 dev="vda" ino=1743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:systemd_logger_exec_t:s0" [ 1592.369593][ T30] audit: type=1400 audit(1591.970:307): avc: denied { read } for pid=10000 comm="syz.1.2493" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1592.372778][ T30] audit: type=1400 audit(1591.970:308): avc: denied { open } for pid=10000 comm="syz.1.2493" path="/1281/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1592.492942][T10003] block device autoloading is deprecated and will be removed. [ 1592.520445][ T30] audit: type=1400 audit(1592.120:309): avc: denied { ioctl } for pid=10000 comm="syz.1.2493" path="/1281/file0/file0" dev="fuse" ino=0 ioctlcmd=0x935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1592.992025][ T30] audit: type=1400 audit(1592.590:310): avc: denied { open } for pid=10007 comm="syz.1.2495" path=2F73797A2E624253396969202864656C6574656429 dev="vda" ino=1743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:systemd_logger_exec_t:s0" [ 1592.993164][ T30] audit: type=1400 audit(1592.590:311): avc: denied { ioctl } for pid=10007 comm="syz.1.2495" path=2F73797A2E624253396969202864656C6574656429 dev="vda" ino=1743 ioctlcmd=0x6610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:systemd_logger_exec_t:s0" [ 1592.993596][T10008] __find_get_block_slow() failed. block=144115188075855872, b_blocknr=0, b_state=0x00106019, b_size=4096, device vda blocksize: 4096 [ 1592.994558][T10008] grow_buffers: requested out-of-range block 144115188075855872 for device vda [ 1592.995263][T10008] EXT4-fs warning (device vda): ext4_resize_fs:2018: can't read last block, resize aborted [ 1596.030086][ T30] audit: type=1400 audit(1595.630:312): avc: denied { bind } for pid=10026 comm="syz.0.2503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1596.048992][ T30] audit: type=1400 audit(1595.640:313): avc: denied { read } for pid=10026 comm="syz.0.2503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1596.407292][ T25] block nbd0: Possible stuck request ffff000016000000: control (read@0,4096B). Runtime 330 seconds [ 1596.595054][T10027] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 1606.128537][T10127] serio: Serial port pts0 [ 1606.815012][T10136] serio: Serial port pts1 [ 1616.140122][T10167] serio: Serial port pts0 [ 1624.571514][ T30] audit: type=1400 audit(1624.160:314): avc: denied { ioctl } for pid=10183 comm="syz.1.2567" path="socket:[27841]" dev="sockfs" ino=27841 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1626.491793][ T25] block nbd0: Possible stuck request ffff000016000000: control (read@0,4096B). Runtime 360 seconds [ 1636.564239][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 1637.883206][T10246] serio: Serial port pts0 [ 1643.845158][T10282] serio: Serial port pts0 [ 1649.814886][T10303] serio: Serial port pts0 [ 1653.726232][T10322] serio: Serial port pts1 [ 1656.561547][ T25] block nbd0: Possible stuck request ffff000016000000: control (read@0,4096B). Runtime 390 seconds [ 1661.085078][ T30] audit: type=1400 audit(1660.680:315): avc: denied { shutdown } for pid=10330 comm="syz.0.2624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1661.091607][ T30] audit: type=1400 audit(1660.690:316): avc: denied { read } for pid=10330 comm="syz.0.2624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1663.716787][T10345] serio: Serial port pts1 [ 1667.788778][ T30] audit: type=1400 audit(1667.390:317): avc: denied { map } for pid=10359 comm="syz.1.2636" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 1667.790400][ T30] audit: type=1400 audit(1667.390:318): avc: denied { execute } for pid=10359 comm="syz.1.2636" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 1670.330752][T10372] serio: Serial port pts1 [ 1670.331898][T10371] serio: Serial port pts0 [ 1678.213781][T10388] serio: Serial port pts0 [ 1679.549761][T10394] serio: Serial port pts1 [ 1686.648623][ T25] block nbd0: Possible stuck request ffff000016000000: control (read@0,4096B). Runtime 420 seconds [ 1694.766984][T10406] serio: Serial port pts0 [ 1696.409319][T10419] serio: Serial port pts1 [ 1702.684474][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1706.388134][T10467] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=10467 comm=syz.0.2676 [ 1706.402412][T10467] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=10467 comm=syz.0.2676 [ 1706.703994][T10469] serio: Serial port pts0 [ 1712.241569][ T31] INFO: task udevd:8569 blocked for more than 430 seconds. [ 1712.280255][ T31] Not tainted 6.11.0-rc7-syzkaller-00133-ge936e7d4a83b #0 [ 1712.281662][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1712.283043][ T31] task:udevd state:D stack:0 pid:8569 tgid:8569 ppid:3104 flags:0x0000000d [ 1712.284976][ T31] Call trace: SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1712.331591][ T31] __switch_to+0x1c8/0x2a4 [ 1712.332218][ T31] __schedule+0xacc/0x2920 [ 1712.332516][ T31] schedule+0xd0/0x304 [ 1712.332806][ T31] schedule_preempt_disabled+0x18/0x2c [ 1712.333111][ T31] __mutex_lock+0x4e8/0x840 [ 1712.333397][ T31] mutex_lock_nested+0x24/0x30 [ 1712.333697][ T31] bdev_open+0x2c4/0xa84 [ 1712.333987][ T31] blkdev_open+0x24c/0x37c [ 1712.334272][ T31] do_dentry_open+0x50c/0x1068 [ 1712.334579][ T31] vfs_open+0x5c/0x2fc [ 1712.334861][ T31] path_openat+0x16dc/0x2380 [ 1712.335150][ T31] do_filp_open+0x16c/0x330 [ 1712.345762][ T31] do_sys_openat2+0x12c/0x160 [ 1712.346251][ T31] __arm64_sys_openat+0x12c/0x1b8 [ 1712.346555][ T31] invoke_syscall+0x6c/0x258 [ 1712.346864][ T31] el0_svc_common.constprop.0+0xac/0x230 [ 1712.347178][ T31] do_el0_svc+0x40/0x58 [ 1712.347462][ T31] el0_svc+0x50/0x180 [ 1712.347790][ T31] el0t_64_sync_handler+0x100/0x12c [ 1712.348086][ T31] el0t_64_sync+0x190/0x194 [ 1712.348802][ T31] INFO: task syz.0.1939:8570 blocked for more than 430 seconds. [ 1712.349216][ T31] Not tainted 6.11.0-rc7-syzkaller-00133-ge936e7d4a83b #0 [ 1712.349547][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1712.349894][ T31] task:syz.0.1939 state:D stack:0 pid:8570 tgid:8570 ppid:5398 flags:0x00000001 [ 1712.350463][ T31] Call trace: [ 1712.350712][ T31] __switch_to+0x1c8/0x2a4 [ 1712.351011][ T31] __schedule+0xacc/0x2920 [ 1712.351294][ T31] schedule+0xd0/0x304 [ 1712.351577][ T31] schedule_preempt_disabled+0x18/0x2c [ 1712.351918][ T31] __mutex_lock+0x4e8/0x840 [ 1712.352199][ T31] mutex_lock_nested+0x24/0x30 [ 1712.352482][ T31] bdev_release+0x104/0x510 [ 1712.354528][ T31] blkdev_release+0x14/0x24 [ 1712.354936][ T31] __fput+0x2c4/0x964 [ 1712.356205][ T31] ____fput+0x10/0x1c [ 1712.356517][ T31] task_work_run+0x128/0x210 [ 1712.356861][ T31] do_notify_resume+0x1d4/0x25c [ 1712.357169][ T31] el0_svc+0x100/0x180 [ 1712.357448][ T31] el0t_64_sync_handler+0x100/0x12c [ 1712.357754][ T31] el0t_64_sync+0x190/0x194 [ 1712.358051][ T31] INFO: task syz.0.1939:8571 blocked for more than 430 seconds. [ 1712.358384][ T31] Not tainted 6.11.0-rc7-syzkaller-00133-ge936e7d4a83b #0 [ 1712.358714][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1712.359049][ T31] task:syz.0.1939 state:D stack:0 pid:8571 tgid:8570 ppid:5398 flags:0x00000009 [ 1712.359530][ T31] Call trace: [ 1712.359809][ T31] __switch_to+0x1c8/0x2a4 [ 1712.360111][ T31] __schedule+0xacc/0x2920 [ 1712.360388][ T31] schedule+0xd0/0x304 [ 1712.360664][ T31] schedule_preempt_disabled+0x18/0x2c [ 1712.360961][ T31] __mutex_lock+0x4e8/0x840 [ 1712.361244][ T31] mutex_lock_nested+0x24/0x30 [ 1712.361548][ T31] bdev_release+0x104/0x510 [ 1712.361849][ T31] blkdev_release+0x14/0x24 [ 1712.362124][ T31] __fput+0x2c4/0x964 [ 1712.362398][ T31] ____fput+0x10/0x1c [ 1712.362676][ T31] task_work_run+0x128/0x210 [ 1712.362959][ T31] do_notify_resume+0x1d4/0x25c [ 1712.363240][ T31] el0_svc+0x100/0x180 [ 1712.363502][ T31] el0t_64_sync_handler+0x100/0x12c [ 1712.363829][ T31] el0t_64_sync+0x190/0x194 [ 1712.364113][ T31] INFO: task syz.0.1939:8572 blocked for more than 430 seconds. [ 1712.370433][ T31] Not tainted 6.11.0-rc7-syzkaller-00133-ge936e7d4a83b #0 [ 1712.370872][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1712.371220][ T31] task:syz.0.1939 state:D stack:0 pid:8572 tgid:8570 ppid:5398 flags:0x00000009 [ 1712.371800][ T31] Call trace: [ 1712.372069][ T31] __switch_to+0x1c8/0x2a4 [ 1712.372401][ T31] __schedule+0xacc/0x2920 [ 1712.372708][ T31] schedule+0xd0/0x304 [ 1712.372989][ T31] io_schedule+0xac/0x114 [ 1712.373271][ T31] folio_wait_bit_common+0x2a8/0x6d0 [ 1712.373599][ T31] do_read_cache_folio+0x204/0x42c [ 1712.373900][ T31] read_cache_folio+0x44/0x6c [ 1712.374182][ T31] read_part_sector+0xac/0x2b0 [ 1712.374549][ T31] msdos_partition+0x100/0x1eb4 [ 1712.374847][ T31] bdev_disk_changed+0x504/0xec0 [ 1712.386057][ T31] blkdev_get_whole+0x144/0x1e4 [ 1712.386603][ T31] bdev_open+0x1dc/0xa84 [ 1712.386908][ T31] blkdev_open+0x24c/0x37c [ 1712.387204][ T31] do_dentry_open+0x50c/0x1068 [ 1712.387508][ T31] vfs_open+0x5c/0x2fc [ 1712.387844][ T31] path_openat+0x16dc/0x2380 [ 1712.390418][ T31] do_filp_open+0x16c/0x330 [ 1712.390853][ T31] do_sys_openat2+0x12c/0x160 [ 1712.391273][ T31] __arm64_sys_openat+0x12c/0x1b8 [ 1712.392866][ T31] invoke_syscall+0x6c/0x258 [ 1712.393256][ T31] el0_svc_common.constprop.0+0xac/0x230 [ 1712.393574][ T31] do_el0_svc+0x40/0x58 [ 1712.393852][ T31] el0_svc+0x50/0x180 [ 1712.394232][ T31] el0t_64_sync_handler+0x100/0x12c [ 1712.394538][ T31] el0t_64_sync+0x190/0x194 [ 1712.395080][ T31] [ 1712.395080][ T31] Showing all locks held in the system: [ 1712.401633][ T31] 1 lock held by khungtaskd/31: [ 1712.402108][ T31] #0: ffff800086c62ae0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x44/0x2d4 [ 1712.407957][ T31] 2 locks held by syslogd/3089: [ 1712.408326][ T31] 2 locks held by getty/3223: [ 1712.408622][ T31] #0: ffff000019a8f0a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 1712.409506][ T31] #1: ffff80008cc3b2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x93c/0xe9c [ 1712.410303][ T31] 1 lock held by syz-executor/3278: [ 1712.410638][ T31] 1 lock held by udevd/8569: [ 1712.410911][ T31] #0: ffff000015a8e4c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa84 [ 1712.424009][ T31] 1 lock held by syz.0.1939/8570: [ 1712.424311][ T31] #0: ffff000015a8e4c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0x104/0x510 [ 1712.425122][ T31] 1 lock held by syz.0.1939/8571: [ 1712.432902][ T31] #0: ffff000015a8e4c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0x104/0x510 [ 1712.433880][ T31] 1 lock held by syz.0.1939/8572: [ 1712.434164][ T31] #0: ffff000015a8e4c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa84 [ 1712.434950][ T31] 1 lock held by syz.0.2677/10469: [ 1712.440308][ T31] #0: ffff0000143c70a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 1712.441404][ T31] [ 1712.441705][ T31] ============================================= [ 1712.441705][ T31] [ 1712.442386][ T31] NMI backtrace for cpu 1 [ 1712.442926][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.11.0-rc7-syzkaller-00133-ge936e7d4a83b #0 [ 1712.443337][ T31] Hardware name: linux,dummy-virt (DT) [ 1712.443749][ T31] Call trace: [ 1712.443955][ T31] dump_backtrace+0x9c/0x11c [ 1712.444207][ T31] show_stack+0x18/0x24 [ 1712.444429][ T31] dump_stack_lvl+0xa4/0xf4 [ 1712.444675][ T31] dump_stack+0x1c/0x28 [ 1712.445027][ T31] nmi_cpu_backtrace+0x1b0/0x274 [ 1712.445351][ T31] nmi_trigger_cpumask_backtrace+0x25c/0x300 [ 1712.445641][ T31] arch_trigger_cpumask_backtrace+0x18/0x24 [ 1712.445987][ T31] watchdog+0xa74/0xd40 [ 1712.446241][ T31] kthread+0x27c/0x300 [ 1712.446514][ T31] ret_from_fork+0x10/0x20 [ 1712.447457][ T31] Sending NMI from CPU 1 to CPUs 0: [ 1712.448451][ C0] NMI backtrace for cpu 0 [ 1712.449098][ C0] CPU: 0 UID: 0 PID: 3093 Comm: klogd Not tainted 6.11.0-rc7-syzkaller-00133-ge936e7d4a83b #0 [ 1712.449500][ C0] Hardware name: linux,dummy-virt (DT) [ 1712.449966][ C0] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1712.450465][ C0] pc : _raw_spin_unlock_irqrestore+0x40/0xac [ 1712.450945][ C0] lr : _raw_spin_unlock_irqrestore+0x80/0xac [ 1712.451380][ C0] sp : ffff8000a0d67120 [ 1712.451794][ C0] x29: ffff8000a0d67120 x28: dfff800000000000 x27: 0000000000000000 [ 1712.452668][ C0] x26: 0000000000002ace x25: 0000000000000000 x24: 000000000001813e [ 1712.453356][ C0] x23: dead000000000122 x22: dead000000000100 x21: ffff800086686000 [ 1712.454064][ C0] x20: ffff80008c9cfb78 x19: 0000000000000000 x18: 000000004cb234cd [ 1712.454746][ C0] x17: 0000000000000000 x16: 0000000000000000 x15: ffff000014002880 [ 1712.455397][ C0] x14: 1fffe0000280050f x13: 1fffe00002800519 x12: ffff700011939f70 [ 1712.456227][ C0] x11: 1ffff00011939f6f x10: ffff800088354a40 x9 : ffff0000140028a0 [ 1712.456919][ C0] x8 : 00000000f3000000 x7 : 1fffe00002800514 x6 : 00000000f3f3f3f3 [ 1712.457753][ C0] x5 : 00000000f2f2f200 x4 : ffff7000141acdee x3 : 0000000000000001 [ 1712.458602][ C0] x2 : 0000000000000000 x1 : 0000000000000003 x0 : 00000000000000c0 [ 1712.459451][ C0] Call trace: [ 1712.459862][ C0] _raw_spin_unlock_irqrestore+0x40/0xac [ 1712.460405][ C0] debug_check_no_obj_freed+0x27c/0x4f4 [ 1712.460931][ C0] free_unref_page+0x2c4/0xd24 [ 1712.461456][ C0] __free_pages+0x12c/0x1d8 [ 1712.461925][ C0] __free_slab+0x10c/0x1dc [ 1712.462426][ C0] free_slab+0x30/0x138 [ 1712.462925][ C0] __put_partials+0x22c/0x254 [ 1712.463449][ C0] put_cpu_partial+0x1c0/0x2a0 [ 1712.464004][ C0] __slab_free+0x1fc/0x3b4 [ 1712.464895][ C0] ___cache_free+0xd0/0xe4 [ 1712.465420][ C0] qlist_free_all+0x7c/0x140 [ 1712.465719][ C0] kasan_quarantine_reduce+0x148/0x19c [ 1712.466294][ C0] __kasan_slab_alloc+0x60/0x90 [ 1712.466833][ C0] kmem_cache_alloc_node_noprof+0x148/0x308 [ 1712.467399][ C0] __alloc_skb+0x208/0x2f0 [ 1712.467903][ C0] alloc_skb_with_frags+0xb4/0x524 [ 1712.468394][ C0] sock_alloc_send_pskb+0x5e4/0x704 [ 1712.468910][ C0] unix_dgram_sendmsg+0x2d4/0x12a4 [ 1712.469484][ C0] __sock_sendmsg+0xc8/0x168 [ 1712.470038][ C0] __sys_sendto+0x1a8/0x254 [ 1712.470558][ C0] __arm64_sys_sendto+0xc0/0x134 [ 1712.471107][ C0] invoke_syscall+0x6c/0x258 [ 1712.471723][ C0] el0_svc_common.constprop.0+0xac/0x230 [ 1712.472324][ C0] do_el0_svc+0x40/0x58 [ 1712.472892][ C0] el0_svc+0x50/0x180 [ 1712.473418][ C0] el0t_64_sync_handler+0x100/0x12c [ 1712.474019][ C0] el0t_64_sync+0x190/0x194 [ 1712.514250][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 1712.515122][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.11.0-rc7-syzkaller-00133-ge936e7d4a83b #0 [ 1712.515867][ T31] Hardware name: linux,dummy-virt (DT) [ 1712.516214][ T31] Call trace: [ 1712.516424][ T31] dump_backtrace+0x9c/0x11c [ 1712.516779][ T31] show_stack+0x18/0x24 [ 1712.517009][ T31] dump_stack_lvl+0x38/0xf4 [ 1712.517249][ T31] dump_stack+0x1c/0x28 [ 1712.517470][ T31] panic+0x5a0/0x654 [ 1712.517698][ T31] watchdog+0x4bc/0xd40 [ 1712.517940][ T31] kthread+0x27c/0x300 [ 1712.518164][ T31] ret_from_fork+0x10/0x20 [ 1712.518817][ T31] SMP: stopping secondary CPUs [ 1712.519814][ T31] Kernel Offset: disabled [ 1712.520277][ T31] CPU features: 0x04,40001001,a0100000,0200421b [ 1712.521154][ T31] Memory Limit: none [ 1712.522167][ T31] Rebooting in 86400 seconds.. VM DIAGNOSIS: 09:44:22 Registers: info registers vcpu 0 CPU#0 PC=ffff800080239ff0 X00=00000000000000c0 X01=0000000000000000 X02=0000000000000000 X03=1fffe0000d3fbbdb X04=0000000000000000 X05=000000000000000a X06=ffff00000f286548 X07=0000000071cf92bf X08=c22c4cba1233067b X09=1ffff000111cd7aa X10=1ffff0001106a98c X11=0000000000000000 X12=0000000000000028 X13=1fffe00001e50cad X14=1fffe00001e50c8f X15=ffff00000f286480 X16=0000000000000000 X17=4974259dfc16f59e X18=000000001cf92bf7 X19=0000000000000000 X20=ffff000069ff2d00 X21=0000000000000000 X22=ffff00000daae03c X23=ffff800086a10edc X24=0000000000000000 X25=ffff800086a70670 X26=0000000000000000 X27=ffff000014001e00 X28=ffff00000daae000 X29=ffff800080006160 X30=ffff8000802517a4 SP=ffff8000800060d0 PSTATE=000000c5 ---- EL1h FPCR=00000000 FPSR=00000000 Q00=0100000000000000:0100000000000000 Q01=0000000100000000:0000000000000000 Q02=0000000000000001:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000001:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffffa1e9f50:0000fffffa1e9f50 Q17=ffffff80ffffffd0:0000fffffa1e9f20 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000802d6d5c X00=00000000000000c0 X01=0000000000000003 X02=0000000000000000 X03=1fffe0000d4001f9 X04=1ffff0001427af6c X05=0000000000000000 X06=ffff70001427af68 X07=0000000041b58ab3 X08=ffff00000fb5f0b8 X09=dfff800000000000 X10=ffff600001f6bebe X11=1fffe00001f6bebe X12=ffff600001f6bebf X13=1fffe000033648d9 X14=0000000000000191 X15=ffff00006a000f30 X16=0000000000000000 X17=0000000000000001 X18=000000005719242d X19=ffff800086a10fc8 X20=ffff7fffe35f0000 X21=0000000000000004 X22=1fffe000033648d4 X23=0000000000000028 X24=0000000000000003 X25=dfff800000000000 X26=ffff000019b23c00 X27=0000000000000000 X28=1ffff0001427af68 X29=ffff8000a13d7ab0 X30=ffff8000802d6d10 SP=ffff8000a13d7ab0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffe0a7b940:1192aea731b13700 Q02=0000ffff89ace000:ffffff80ffffffd8 Q03=0000ffffe0a7b9d0:0000ffffe0a7b9d0 Q04=0000ffffe0a7b9d0:0000ffffe0a7b988 Q05=0000ffffe0a7b9a0:0000ffffe0a7b9d0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffe0a7bbe0:0000ffffe0a7bbe0 Q17=ffffff80ffffffd0:0000ffffe0a7bbb0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000