last executing test programs: 1m51.693188321s ago: executing program 1 (id=528): r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r0, &(0x7f0000000100)="ab", 0x1, 0xe61e2840a154b0c0, 0x0, 0x0) 1m48.801933881s ago: executing program 1 (id=529): r0 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r0, 0xc00464b4, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000340)={0x8, 0x8169, 0x6, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, &(0x7f0000000400)={r2}) 1m48.446776655s ago: executing program 1 (id=530): r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000180)={'ip6tnl0\x00', 0x0}) 1m48.225681386s ago: executing program 1 (id=531): r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg$sock(r0, &(0x7f0000000480)=[{{&(0x7f0000000100)=@l2tp={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x13}, 0x3}, 0x80, 0x0}}, {{&(0x7f0000000700)=@in6={0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, '\x00', 0xe}, 0x62}, 0x80, 0x0}}], 0x2, 0x48094) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='blkio.bfq.io_queued\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) sendfile(r0, r1, 0x0, 0xffffffff000) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x6, @empty, 0x10001, 0x3}, 0x80) 1m44.822120816s ago: executing program 1 (id=533): r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @local}, 0x10) sendto$inet(r0, &(0x7f0000000100)="ab", 0x1, 0xe61e2840a154b0c0, 0x0, 0x0) 1m41.712425076s ago: executing program 1 (id=536): socket$nl_route(0x10, 0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0xb, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000009c0)=@newtaction={0x64, 0x30, 0x1, 0x0, 0x0, {}, [{0x50, 0x1, [@m_mpls={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) r3 = fsopen(&(0x7f0000000000)='proc\x00', 0x0) write$proc_mixer(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="414c5450434d0a50484f4e45495220274d69632043617074757265272030303030303030303030303030303030303030300a50484f4e45494e20274d617374657230506c61796261636b20566f6c756d65272030303030303030303030303030303030303030300a4449474954414c33202743442730303030303030303030300a535045414b4552202743442720303030e125714606a90c4630303030303000000000"], 0xe6) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x1d2) fsmount(r3, 0x0, 0x0) r4 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="b5", 0x1, 0xfffffffffffffffb) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r4, r5, 0x100000000000f7) keyctl$revoke(0x3, r4) r6 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$VT_GETSTATE(r6, 0x5603, &(0x7f0000000100)={0x2, 0x6, 0x401}) r7 = socket$inet(0xa, 0x801, 0x84) sendto$inet(r7, &(0x7f0000000080)='w', 0x34000, 0x0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x64010102}, 0x10) socket$netlink(0x10, 0x3, 0x4) 56.180476848s ago: executing program 32 (id=536): socket$nl_route(0x10, 0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0xb, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000009c0)=@newtaction={0x64, 0x30, 0x1, 0x0, 0x0, {}, [{0x50, 0x1, [@m_mpls={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) r3 = fsopen(&(0x7f0000000000)='proc\x00', 0x0) write$proc_mixer(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="414c5450434d0a50484f4e45495220274d69632043617074757265272030303030303030303030303030303030303030300a50484f4e45494e20274d617374657230506c61796261636b20566f6c756d65272030303030303030303030303030303030303030300a4449474954414c33202743442730303030303030303030300a535045414b4552202743442720303030e125714606a90c4630303030303000000000"], 0xe6) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x1d2) fsmount(r3, 0x0, 0x0) r4 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="b5", 0x1, 0xfffffffffffffffb) pipe2$watch_queue(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r4, r5, 0x100000000000f7) keyctl$revoke(0x3, r4) r6 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$VT_GETSTATE(r6, 0x5603, &(0x7f0000000100)={0x2, 0x6, 0x401}) r7 = socket$inet(0xa, 0x801, 0x84) sendto$inet(r7, &(0x7f0000000080)='w', 0x34000, 0x0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x64010102}, 0x10) socket$netlink(0x10, 0x3, 0x4) 55.108832852s ago: executing program 0 (id=552): socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x24004800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000b40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8b07, &(0x7f0000000440)={'wlan1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x27}}) 54.732603658s ago: executing program 0 (id=553): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0xfffffffd, {}, [{0x90, 0x1, [@m_ct={0x44, 0x5, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x0, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fsopen(&(0x7f0000000040)='afs\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="580000001500add427323b472545b4560a117fff0b0082001b59000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee0000000000000000020000", 0x56}, {&(0x7f0000000000)="abd9", 0x2}], 0x2) 46.143121888s ago: executing program 0 (id=554): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) timer_create(0x2, 0x0, &(0x7f0000000000)=0x0) timer_settime(0x0, 0x0, 0x0, 0x0) rseq(&(0x7f0000000040), 0x20, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) io_setup(0x7, &(0x7f0000000280)) ioctl$SOUND_MIXER_WRITE_RECSRC(0xffffffffffffffff, 0xc0044dff, 0x0) timer_gettime(r0, &(0x7f0000000300)) 45.763331725s ago: executing program 0 (id=555): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, 0x5, 0x6, 0x5, 0x0, 0x0, {0x7, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x804) 45.425577668s ago: executing program 0 (id=556): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000400000014000500fc01000000000000000000000000080008000200050000000a0006"], 0x4c}}, 0x0) 45.212510678s ago: executing program 0 (id=557): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000040)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x26, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 0s ago: executing program 33 (id=557): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000040)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x26, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:12574' (ED25519) to the list of known hosts. [ 124.932843][ T30] audit: type=1400 audit(124.630:58): avc: denied { name_bind } for pid=3294 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 125.187720][ T30] audit: type=1400 audit(124.880:59): avc: denied { execute } for pid=3296 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 125.196192][ T30] audit: type=1400 audit(124.890:60): avc: denied { execute_no_trans } for pid=3296 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 128.835844][ T30] audit: type=1400 audit(128.530:61): avc: denied { mounton } for pid=3296 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 128.845628][ T30] audit: type=1400 audit(128.540:62): avc: denied { mount } for pid=3296 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 128.876340][ T3296] cgroup: Unknown subsys name 'net' [ 128.894090][ T30] audit: type=1400 audit(128.590:63): avc: denied { unmount } for pid=3296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 129.313721][ T3296] cgroup: Unknown subsys name 'cpuset' [ 129.346446][ T3296] cgroup: Unknown subsys name 'rlimit' [ 129.731911][ T30] audit: type=1400 audit(129.430:64): avc: denied { setattr } for pid=3296 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 129.735792][ T30] audit: type=1400 audit(129.430:65): avc: denied { mounton } for pid=3296 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 129.742500][ T30] audit: type=1400 audit(129.430:66): avc: denied { mount } for pid=3296 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 130.060982][ T3298] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 130.066404][ T30] audit: type=1400 audit(129.760:67): avc: denied { relabelto } for pid=3298 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 130.072552][ T30] audit: type=1400 audit(129.770:68): avc: denied { write } for pid=3298 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 130.136230][ T30] audit: type=1400 audit(129.830:69): avc: denied { read } for pid=3296 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 130.140270][ T30] audit: type=1400 audit(129.830:70): avc: denied { open } for pid=3296 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 130.152868][ T3296] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 145.205119][ T30] audit: type=1400 audit(144.900:72): avc: denied { execmem } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 145.205776][ T30] audit: type=1400 audit(144.900:71): avc: denied { execmem } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 145.253689][ T30] audit: type=1400 audit(144.950:73): avc: denied { read } for pid=3302 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 145.255597][ T30] audit: type=1400 audit(144.950:74): avc: denied { open } for pid=3302 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 145.266752][ T30] audit: type=1400 audit(144.960:75): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 145.312816][ T30] audit: type=1400 audit(145.010:76): avc: denied { module_request } for pid=3301 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 145.482832][ T30] audit: type=1400 audit(145.180:77): avc: denied { sys_module } for pid=3302 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 149.924806][ T3301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 150.027523][ T3301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 150.045139][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 150.136704][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 152.079241][ T3301] hsr_slave_0: entered promiscuous mode [ 152.094192][ T3301] hsr_slave_1: entered promiscuous mode [ 152.522628][ T3302] hsr_slave_0: entered promiscuous mode [ 152.526625][ T3302] hsr_slave_1: entered promiscuous mode [ 152.530613][ T3302] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 152.532432][ T3302] Cannot create hsr debugfs directory [ 153.693259][ T30] audit: type=1400 audit(153.390:78): avc: denied { create } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 153.699270][ T30] audit: type=1400 audit(153.390:79): avc: denied { write } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 153.719699][ T30] audit: type=1400 audit(153.400:80): avc: denied { read } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 153.743573][ T3301] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 153.785760][ T3301] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 153.819843][ T3301] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 153.845470][ T3301] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 154.147124][ T3302] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 154.176137][ T3302] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 154.197238][ T3302] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 154.219613][ T3302] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 155.804136][ T3301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 155.981859][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.464348][ T3301] veth0_vlan: entered promiscuous mode [ 161.509930][ T3301] veth1_vlan: entered promiscuous mode [ 161.631095][ T3302] veth0_vlan: entered promiscuous mode [ 161.696579][ T3302] veth1_vlan: entered promiscuous mode [ 161.852521][ T3301] veth0_macvtap: entered promiscuous mode [ 161.894217][ T3301] veth1_macvtap: entered promiscuous mode [ 162.021114][ T3302] veth0_macvtap: entered promiscuous mode [ 162.054378][ T3302] veth1_macvtap: entered promiscuous mode [ 162.251342][ T3301] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 162.252836][ T3301] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 162.253049][ T3301] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 162.253221][ T3301] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 162.361241][ T3302] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 162.361795][ T3302] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 162.365312][ T3302] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 162.365827][ T3302] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 162.604912][ T30] audit: type=1400 audit(162.300:81): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 162.620097][ T30] audit: type=1400 audit(162.310:82): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzkaller.byruWP/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 162.646533][ T30] audit: type=1400 audit(162.340:83): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 162.701603][ T30] audit: type=1400 audit(162.400:84): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzkaller.byruWP/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 162.712831][ T30] audit: type=1400 audit(162.400:85): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzkaller.byruWP/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3472 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 162.800747][ T30] audit: type=1400 audit(162.500:86): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 162.820975][ T30] audit: type=1400 audit(162.520:87): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 162.832259][ T30] audit: type=1400 audit(162.520:88): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="gadgetfs" ino=3033 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 163.036164][ T30] audit: type=1400 audit(162.730:89): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 163.041912][ T30] audit: type=1400 audit(162.740:90): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 163.256510][ T3302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 164.434598][ T3447] FAULT_INJECTION: forcing a failure. [ 164.434598][ T3447] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 164.436307][ T3447] CPU: 0 UID: 0 PID: 3447 Comm: syz.0.3 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 164.436421][ T3447] Hardware name: linux,dummy-virt (DT) [ 164.436730][ T3447] Call trace: [ 164.436958][ T3447] show_stack+0x18/0x24 (C) [ 164.437780][ T3447] dump_stack_lvl+0xdc/0xf4 [ 164.438147][ T3447] dump_stack+0x1c/0x28 [ 164.438200][ T3447] should_fail_ex+0x5a0/0x6ac [ 164.438252][ T3447] should_fail+0x14/0x20 [ 164.438295][ T3447] should_fail_usercopy+0x1c/0x28 [ 164.438339][ T3447] _inline_copy_from_user+0x38/0x130 [ 164.438387][ T3447] copy_msghdr_from_user+0xa0/0x130 [ 164.438431][ T3447] ___sys_sendmsg+0xfc/0x19c [ 164.438507][ T3447] __sys_sendmsg+0x114/0x198 [ 164.438552][ T3447] __arm64_sys_sendmsg+0x70/0xa0 [ 164.438595][ T3447] invoke_syscall+0x6c/0x258 [ 164.438638][ T3447] el0_svc_common.constprop.0+0xac/0x230 [ 164.438687][ T3447] do_el0_svc+0x40/0x58 [ 164.438730][ T3447] el0_svc+0x50/0x180 [ 164.438776][ T3447] el0t_64_sync_handler+0x10c/0x138 [ 164.438822][ T3447] el0t_64_sync+0x198/0x19c [ 165.676856][ T3454] trusted_key: encrypted_key: master key parameter 'tB$(3tGG*:Okf9{C&' is invalid [ 167.902357][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 167.907844][ T30] audit: type=1400 audit(167.600:120): avc: denied { read } for pid=3480 comm="syz.1.17" path="socket:[3546]" dev="sockfs" ino=3546 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 167.911637][ T30] audit: type=1400 audit(167.600:121): avc: denied { write } for pid=3480 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 170.169674][ T30] audit: type=1400 audit(169.850:122): avc: denied { ioctl } for pid=3502 comm="syz.0.25" path="socket:[3563]" dev="sockfs" ino=3563 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 170.410406][ T30] audit: type=1400 audit(170.100:123): avc: denied { create } for pid=3502 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 171.577997][ T3521] FAULT_INJECTION: forcing a failure. [ 171.577997][ T3521] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 171.582325][ T3521] CPU: 0 UID: 0 PID: 3521 Comm: syz.0.31 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 171.582438][ T3521] Hardware name: linux,dummy-virt (DT) [ 171.582473][ T3521] Call trace: [ 171.582502][ T3521] show_stack+0x18/0x24 (C) [ 171.582589][ T3521] dump_stack_lvl+0xdc/0xf4 [ 171.582641][ T3521] dump_stack+0x1c/0x28 [ 171.582682][ T3521] should_fail_ex+0x5a0/0x6ac [ 171.582732][ T3521] should_fail+0x14/0x20 [ 171.582775][ T3521] should_fail_usercopy+0x1c/0x28 [ 171.582819][ T3521] strncpy_from_user+0x34/0x2d0 [ 171.582874][ T3521] setxattr_copy+0x6c/0x174 [ 171.582923][ T3521] path_setxattrat+0xe4/0x1d4 [ 171.582965][ T3521] __arm64_sys_fsetxattr+0xac/0x108 [ 171.583008][ T3521] invoke_syscall+0x6c/0x258 [ 171.583053][ T3521] el0_svc_common.constprop.0+0xac/0x230 [ 171.583096][ T3521] do_el0_svc+0x40/0x58 [ 171.583138][ T3521] el0_svc+0x50/0x180 [ 171.583183][ T3521] el0t_64_sync_handler+0x10c/0x138 [ 171.583228][ T3521] el0t_64_sync+0x198/0x19c [ 172.136404][ T30] audit: type=1400 audit(171.830:124): avc: denied { setattr } for pid=3527 comm="syz.0.34" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 172.323374][ T30] audit: type=1400 audit(172.020:125): avc: denied { create } for pid=3529 comm="syz.0.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 172.329221][ T30] audit: type=1400 audit(172.020:126): avc: denied { ioctl } for pid=3529 comm="syz.0.35" path="socket:[3593]" dev="sockfs" ino=3593 ioctlcmd=0x890c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 172.347364][ T30] audit: type=1400 audit(172.040:127): avc: denied { map_create } for pid=3529 comm="syz.0.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 172.359939][ T30] audit: type=1400 audit(172.050:128): avc: denied { bpf } for pid=3529 comm="syz.0.35" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 172.360587][ T30] audit: type=1400 audit(172.050:129): avc: denied { perfmon } for pid=3529 comm="syz.0.35" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 172.831400][ T3534] FAULT_INJECTION: forcing a failure. [ 172.831400][ T3534] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 172.834688][ T3534] CPU: 1 UID: 0 PID: 3534 Comm: syz.0.36 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 172.834769][ T3534] Hardware name: linux,dummy-virt (DT) [ 172.834808][ T3534] Call trace: [ 172.834838][ T3534] show_stack+0x18/0x24 (C) [ 172.834922][ T3534] dump_stack_lvl+0xdc/0xf4 [ 172.834972][ T3534] dump_stack+0x1c/0x28 [ 172.835014][ T3534] should_fail_ex+0x5a0/0x6ac [ 172.835064][ T3534] should_fail_alloc_page+0x70/0xb8 [ 172.835134][ T3534] prepare_alloc_pages+0x1a8/0x560 [ 172.835190][ T3534] __alloc_frozen_pages_noprof+0x144/0x1f5c [ 172.835240][ T3534] alloc_pages_mpol+0xfc/0x400 [ 172.835290][ T3534] folio_alloc_mpol_noprof+0x18/0x190 [ 172.835333][ T3534] vma_alloc_folio_noprof+0x104/0x1bc [ 172.835376][ T3534] vma_alloc_zeroed_movable_folio+0x50/0x6c [ 172.835426][ T3534] __handle_mm_fault+0x2010/0x35c4 [ 172.835472][ T3534] handle_mm_fault+0x330/0x7a8 [ 172.835516][ T3534] do_page_fault+0x1f4/0xca0 [ 172.835562][ T3534] do_translation_fault+0x184/0x1e8 [ 172.835609][ T3534] do_mem_abort+0x68/0x1a4 [ 172.835655][ T3534] el0_da+0x5c/0x174 [ 172.835700][ T3534] el0t_64_sync_handler+0xc4/0x138 [ 172.835745][ T3534] el0t_64_sync+0x198/0x19c [ 172.845600][ T3534] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 173.471758][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 173.472274][ T30] audit: type=1400 audit(173.160:131): avc: denied { ioctl } for pid=3539 comm="syz.0.39" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=711 ioctlcmd=0x6607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 173.499190][ T30] audit: type=1400 audit(173.190:132): avc: denied { read } for pid=3539 comm="syz.0.39" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 173.499837][ T30] audit: type=1400 audit(173.190:133): avc: denied { open } for pid=3539 comm="syz.0.39" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 173.664275][ T30] audit: type=1400 audit(173.360:134): avc: denied { ioctl } for pid=3539 comm="syz.0.39" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 174.079161][ T30] audit: type=1400 audit(173.770:135): avc: denied { setopt } for pid=3548 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 174.436995][ T3553] Zero length message leads to an empty skb [ 174.639536][ T3556] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3556 comm=syz.1.45 [ 175.034022][ T30] audit: type=1400 audit(174.730:136): avc: denied { allowed } for pid=3558 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 176.194250][ T3573] FAULT_INJECTION: forcing a failure. [ 176.194250][ T3573] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 176.194795][ T3573] CPU: 1 UID: 0 PID: 3573 Comm: syz.1.50 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 176.194868][ T3573] Hardware name: linux,dummy-virt (DT) [ 176.194906][ T3573] Call trace: [ 176.194934][ T3573] show_stack+0x18/0x24 (C) [ 176.195019][ T3573] dump_stack_lvl+0xdc/0xf4 [ 176.195071][ T3573] dump_stack+0x1c/0x28 [ 176.195165][ T3573] should_fail_ex+0x5a0/0x6ac [ 176.195223][ T3573] should_fail+0x14/0x20 [ 176.195267][ T3573] should_fail_usercopy+0x1c/0x28 [ 176.195312][ T3573] _inline_copy_from_user+0x38/0x130 [ 176.195359][ T3573] copy_msghdr_from_user+0xa0/0x130 [ 176.195438][ T3573] ___sys_sendmsg+0xfc/0x19c [ 176.195486][ T3573] __sys_sendmsg+0x114/0x198 [ 176.195531][ T3573] __arm64_sys_sendmsg+0x70/0xa0 [ 176.195574][ T3573] invoke_syscall+0x6c/0x258 [ 176.195650][ T3573] el0_svc_common.constprop.0+0xac/0x230 [ 176.195700][ T3573] do_el0_svc+0x40/0x58 [ 176.195780][ T3573] el0_svc+0x50/0x180 [ 176.195830][ T3573] el0t_64_sync_handler+0x10c/0x138 [ 176.195909][ T3573] el0t_64_sync+0x198/0x19c [ 177.013570][ T3581] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 177.032334][ T3581] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 177.116446][ T3583] FAULT_INJECTION: forcing a failure. [ 177.116446][ T3583] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 177.117007][ T3583] CPU: 1 UID: 0 PID: 3583 Comm: syz.0.55 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 177.117072][ T3583] Hardware name: linux,dummy-virt (DT) [ 177.117105][ T3583] Call trace: [ 177.117133][ T3583] show_stack+0x18/0x24 (C) [ 177.117284][ T3583] dump_stack_lvl+0xdc/0xf4 [ 177.117461][ T3583] dump_stack+0x1c/0x28 [ 177.117644][ T3583] should_fail_ex+0x5a0/0x6ac [ 177.117743][ T3583] should_fail+0x14/0x20 [ 177.117843][ T3583] should_fail_usercopy+0x1c/0x28 [ 177.118004][ T3583] _inline_copy_from_user+0x38/0x130 [ 177.118128][ T3583] copy_msghdr_from_user+0xa0/0x130 [ 177.118190][ T3583] ___sys_sendmsg+0xfc/0x19c [ 177.118237][ T3583] __sys_sendmsg+0x114/0x198 [ 177.118280][ T3583] __arm64_sys_sendmsg+0x70/0xa0 [ 177.118323][ T3583] invoke_syscall+0x6c/0x258 [ 177.118367][ T3583] el0_svc_common.constprop.0+0xac/0x230 [ 177.118409][ T3583] do_el0_svc+0x40/0x58 [ 177.118450][ T3583] el0_svc+0x50/0x180 [ 177.118518][ T3583] el0t_64_sync_handler+0x10c/0x138 [ 177.118568][ T3583] el0t_64_sync+0x198/0x19c [ 177.264207][ T30] audit: type=1400 audit(176.960:137): avc: denied { prog_load } for pid=3580 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 177.381782][ T30] audit: type=1400 audit(177.080:138): avc: denied { mount } for pid=3584 comm="syz.0.56" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 177.687983][ T3587] FAULT_INJECTION: forcing a failure. [ 177.687983][ T3587] name failslab, interval 1, probability 0, space 0, times 1 [ 177.700814][ T3587] CPU: 0 UID: 0 PID: 3587 Comm: syz.0.57 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 177.700897][ T3587] Hardware name: linux,dummy-virt (DT) [ 177.700931][ T3587] Call trace: [ 177.700959][ T3587] show_stack+0x18/0x24 (C) [ 177.701034][ T3587] dump_stack_lvl+0xdc/0xf4 [ 177.701084][ T3587] dump_stack+0x1c/0x28 [ 177.701133][ T3587] should_fail_ex+0x5a0/0x6ac [ 177.701183][ T3587] should_failslab+0xbc/0x11c [ 177.701230][ T3587] __kmalloc_noprof+0xd0/0x4d0 [ 177.701276][ T3587] tomoyo_realpath_from_path+0x90/0x534 [ 177.701327][ T3587] tomoyo_path_number_perm+0x200/0x438 [ 177.701373][ T3587] tomoyo_file_ioctl+0x1c/0x28 [ 177.701481][ T3587] security_file_ioctl+0x8c/0x19c [ 177.701563][ T3587] __arm64_sys_ioctl+0x90/0x188 [ 177.701611][ T3587] invoke_syscall+0x6c/0x258 [ 177.701655][ T3587] el0_svc_common.constprop.0+0xac/0x230 [ 177.701698][ T3587] do_el0_svc+0x40/0x58 [ 177.701739][ T3587] el0_svc+0x50/0x180 [ 177.701786][ T3587] el0t_64_sync_handler+0x10c/0x138 [ 177.701831][ T3587] el0t_64_sync+0x198/0x19c [ 177.709759][ T3587] ERROR: Out of memory at tomoyo_realpath_from_path. [ 178.660225][ T3599] FAULT_INJECTION: forcing a failure. [ 178.660225][ T3599] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 178.661786][ T3599] CPU: 0 UID: 0 PID: 3599 Comm: syz.0.61 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 178.661908][ T3599] Hardware name: linux,dummy-virt (DT) [ 178.661944][ T3599] Call trace: [ 178.661973][ T3599] show_stack+0x18/0x24 (C) [ 178.662047][ T3599] dump_stack_lvl+0xdc/0xf4 [ 178.662098][ T3599] dump_stack+0x1c/0x28 [ 178.662140][ T3599] should_fail_ex+0x5a0/0x6ac [ 178.662215][ T3599] should_fail_alloc_page+0x70/0xb8 [ 178.662279][ T3599] prepare_alloc_pages+0x1a8/0x560 [ 178.662324][ T3599] __alloc_frozen_pages_noprof+0x144/0x1f5c [ 178.662372][ T3599] alloc_pages_mpol+0xfc/0x400 [ 178.662420][ T3599] folio_alloc_mpol_noprof+0x18/0x190 [ 178.662462][ T3599] vma_alloc_folio_noprof+0x104/0x1bc [ 178.662504][ T3599] vma_alloc_zeroed_movable_folio+0x50/0x6c [ 178.662554][ T3599] __handle_mm_fault+0x2010/0x35c4 [ 178.662600][ T3599] handle_mm_fault+0x330/0x7a8 [ 178.662644][ T3599] do_page_fault+0x1f4/0xca0 [ 178.662690][ T3599] do_translation_fault+0x184/0x1e8 [ 178.662736][ T3599] do_mem_abort+0x68/0x1a4 [ 178.662781][ T3599] el0_da+0x5c/0x174 [ 178.662826][ T3599] el0t_64_sync_handler+0xc4/0x138 [ 178.662880][ T3599] el0t_64_sync+0x198/0x19c [ 178.672635][ T3599] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 178.675370][ T30] audit: type=1400 audit(178.370:139): avc: denied { write } for pid=3598 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 179.091706][ T30] audit: type=1400 audit(178.790:140): avc: denied { read } for pid=3601 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 179.424989][ T3606] FAULT_INJECTION: forcing a failure. [ 179.424989][ T3606] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 179.425848][ T3606] CPU: 1 UID: 0 PID: 3606 Comm: syz.0.63 Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 179.425943][ T3606] Hardware name: linux,dummy-virt (DT) [ 179.425981][ T3606] Call trace: [ 179.426010][ T3606] show_stack+0x18/0x24 (C) [ 179.426083][ T3606] dump_stack_lvl+0xdc/0xf4 [ 179.426138][ T3606] dump_stack+0x1c/0x28 [ 179.426181][ T3606] should_fail_ex+0x5a0/0x6ac [ 179.426230][ T3606] should_fail+0x14/0x20 [ 179.426273][ T3606] should_fail_usercopy+0x1c/0x28 [ 179.426316][ T3606] simple_read_from_buffer+0x94/0x1f0 [ 179.426365][ T3606] proc_fail_nth_read+0x160/0x248 [ 179.426408][ T3606] vfs_read+0x18c/0x97c [ 179.426456][ T3606] ksys_read+0xec/0x1d8 [ 179.426513][ T3606] __arm64_sys_read+0x6c/0x9c [ 179.426563][ T3606] invoke_syscall+0x6c/0x258 [ 179.426608][ T3606] el0_svc_common.constprop.0+0xac/0x230 [ 179.426652][ T3606] do_el0_svc+0x40/0x58 [ 179.426693][ T3606] el0_svc+0x50/0x180 [ 179.426762][ T3606] el0t_64_sync_handler+0x10c/0x138 [ 179.426812][ T3606] el0t_64_sync+0x198/0x19c [ 181.027535][ T30] audit: type=1400 audit(180.720:141): avc: denied { create } for pid=3621 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 189.861855][ T30] audit: type=1400 audit(189.550:142): avc: denied { setopt } for pid=3705 comm="syz.1.98" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 190.995889][ T30] audit: type=1400 audit(190.690:143): avc: denied { map } for pid=3717 comm="syz.0.102" path="socket:[4626]" dev="sockfs" ino=4626 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 191.721064][ T11] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 191.771243][ T30] audit: type=1400 audit(191.470:144): avc: denied { append } for pid=3726 comm="syz.1.105" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 191.906092][ T11] usb 1-1: Using ep0 maxpacket: 16 [ 191.961272][ T11] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 77, changing to 10 [ 191.962094][ T11] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 16384, setting to 1024 [ 191.962321][ T11] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 191.962753][ T11] usb 1-1: New USB device found, idVendor=1781, idProduct=0898, bcdDevice= 0.00 [ 191.962919][ T11] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 192.039153][ T11] usb 1-1: config 0 descriptor?? [ 192.116177][ T30] audit: type=1400 audit(191.810:145): avc: denied { create } for pid=3728 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 192.125368][ T30] audit: type=1400 audit(191.820:146): avc: denied { setopt } for pid=3728 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 192.137210][ T30] audit: type=1400 audit(191.830:147): avc: denied { write } for pid=3728 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 192.180799][ T11] input: PXRC Flight Controller Adapter as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/input/input3 [ 192.307303][ T11] usb 1-1: USB disconnect, device number 2 [ 192.377823][ T30] audit: type=1400 audit(192.070:148): avc: denied { shutdown } for pid=3730 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 192.382810][ T30] audit: type=1400 audit(192.080:149): avc: denied { setopt } for pid=3730 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 192.439888][ T30] audit: type=1400 audit(192.120:150): avc: denied { create } for pid=3730 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 192.462863][ T30] audit: type=1400 audit(192.160:151): avc: denied { name_bind } for pid=3730 comm="syz.1.107" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 193.093351][ T3736] netlink: 36 bytes leftover after parsing attributes in process `syz.1.107'. [ 193.095425][ T3736] netlink: 16 bytes leftover after parsing attributes in process `syz.1.107'. [ 193.096850][ T3736] netlink: 36 bytes leftover after parsing attributes in process `syz.1.107'. [ 193.099783][ T3736] netlink: 36 bytes leftover after parsing attributes in process `syz.1.107'. [ 195.202777][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 195.204146][ T30] audit: type=1400 audit(194.900:158): avc: denied { create } for pid=3748 comm="syz.0.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 195.221891][ T30] audit: type=1400 audit(194.900:159): avc: denied { read } for pid=3107 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 195.222458][ T30] audit: type=1400 audit(194.910:160): avc: denied { ioctl } for pid=3748 comm="syz.0.112" path="socket:[4699]" dev="sockfs" ino=4699 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 195.234392][ T30] audit: type=1400 audit(194.920:161): avc: denied { append } for pid=3107 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 195.234975][ T30] audit: type=1400 audit(194.920:162): avc: denied { open } for pid=3107 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 195.235239][ T30] audit: type=1400 audit(194.920:163): avc: denied { getattr } for pid=3107 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 195.336110][ T30] audit: type=1400 audit(195.030:164): avc: denied { name_bind } for pid=3752 comm="syz.1.113" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 195.612953][ T30] audit: type=1400 audit(195.310:165): avc: denied { prog_run } for pid=3754 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 195.704411][ T30] audit: type=1400 audit(195.400:166): avc: denied { write } for pid=3756 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 196.762237][ T30] audit: type=1400 audit(196.460:167): avc: denied { create } for pid=3765 comm="syz.0.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 198.159509][ T9] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 198.319000][ T9] usb 1-1: Using ep0 maxpacket: 16 [ 198.424372][ T9] usb 1-1: unable to get BOS descriptor or descriptor too short [ 198.442121][ T9] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 198.442718][ T9] usb 1-1: can't read configurations, error -71 [ 200.320604][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 200.321151][ T30] audit: type=1400 audit(200.020:173): avc: denied { create } for pid=3784 comm="syz.0.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 202.515884][ T30] audit: type=1400 audit(202.210:174): avc: denied { create } for pid=3796 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 202.567491][ T30] audit: type=1400 audit(202.250:175): avc: denied { write } for pid=3796 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 204.606950][ T30] audit: type=1400 audit(204.300:176): avc: denied { ioctl } for pid=3804 comm="syz.0.131" path="socket:[4010]" dev="sockfs" ino=4010 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 204.617936][ T3805] syzkaller1: entered promiscuous mode [ 204.619330][ T3805] syzkaller1: entered allmulticast mode [ 205.468023][ T30] audit: type=1400 audit(205.160:177): avc: denied { read } for pid=3808 comm="syz.0.133" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 205.470630][ T30] audit: type=1400 audit(205.170:178): avc: denied { open } for pid=3808 comm="syz.0.133" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 205.496475][ T30] audit: type=1400 audit(205.190:179): avc: denied { ioctl } for pid=3808 comm="syz.0.133" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 206.129674][ T30] audit: type=1400 audit(205.820:180): avc: denied { bind } for pid=3812 comm="syz.0.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 206.140199][ T30] audit: type=1400 audit(205.830:181): avc: denied { setopt } for pid=3812 comm="syz.0.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 206.141952][ T30] audit: type=1400 audit(205.830:182): avc: denied { write } for pid=3812 comm="syz.0.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 208.073443][ T3827] netlink: 'syz.0.140': attribute type 1 has an invalid length. [ 208.074520][ T3827] netlink: 232 bytes leftover after parsing attributes in process `syz.0.140'. [ 210.347438][ T30] audit: type=1400 audit(210.040:183): avc: denied { ioctl } for pid=3846 comm="syz.0.147" path="socket:[4056]" dev="sockfs" ino=4056 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 211.460254][ T30] audit: type=1400 audit(211.160:184): avc: denied { bind } for pid=3862 comm="syz.1.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 211.840411][ T30] audit: type=1400 audit(211.540:185): avc: denied { create } for pid=3869 comm="syz.0.155" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 211.868665][ T30] audit: type=1400 audit(211.560:186): avc: denied { map } for pid=3869 comm="syz.0.155" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4084 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 211.873365][ T30] audit: type=1400 audit(211.570:187): avc: denied { read write } for pid=3869 comm="syz.0.155" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4084 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 213.075629][ T30] audit: type=1400 audit(212.770:188): avc: denied { connect } for pid=3882 comm="syz.0.160" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 213.108876][ T30] audit: type=1400 audit(212.800:189): avc: denied { write } for pid=3882 comm="syz.0.160" laddr=fe80::840e:20ff:fe69:88c9 lport=58 faddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 213.497376][ T30] audit: type=1400 audit(213.190:190): avc: denied { ioctl } for pid=3888 comm="syz.1.163" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5135 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 213.842921][ T3893] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 213.845119][ T3893] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 214.372110][ T3897] syz.1.167 uses obsolete (PF_INET,SOCK_PACKET) [ 216.533383][ T3911] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 218.192283][ T30] audit: type=1400 audit(217.890:191): avc: denied { execute } for pid=3933 comm="syz.1.181" path="/79/cpu.stat" dev="tmpfs" ino=418 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 218.289023][ T3365] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 218.483299][ T30] audit: type=1400 audit(218.180:192): avc: denied { mounton } for pid=3930 comm="syz.0.180" path="/proc/212/task" dev="proc" ino=5203 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 218.523769][ T30] audit: type=1400 audit(218.220:193): avc: denied { mount } for pid=3930 comm="syz.0.180" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 218.577094][ T3365] usb 1-1: unable to get BOS descriptor or descriptor too short [ 218.579272][ T3365] usb 1-1: no configurations [ 218.583692][ T3365] usb 1-1: can't read configurations, error -22 [ 219.489757][ T30] audit: type=1400 audit(219.180:194): avc: denied { name_bind } for pid=3939 comm="syz.0.184" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 222.959596][ T3435] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 223.199221][ T3435] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 16 [ 223.243306][ T3435] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 223.244474][ T3435] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 223.245553][ T3435] usb 1-1: Product: syz [ 223.246295][ T3435] usb 1-1: Manufacturer: syz [ 223.247028][ T3435] usb 1-1: SerialNumber: syz [ 223.298814][ T3967] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 223.507256][ T30] audit: type=1400 audit(223.200:195): avc: denied { read } for pid=3973 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 223.550687][ T3435] usblp 1-1:1.0: usblp0: USB Bidirectional printer dev 7 if 0 alt 0 proto 2 vid 0x0525 pid 0xA4A8 [ 223.746588][ T11] usb 1-1: USB disconnect, device number 7 [ 223.872268][ T11] usblp0: removed [ 224.467113][ T30] audit: type=1400 audit(224.160:196): avc: denied { create } for pid=3978 comm="syz.0.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 224.481176][ T30] audit: type=1400 audit(224.170:197): avc: denied { write } for pid=3978 comm="syz.0.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 225.052709][ T30] audit: type=1400 audit(224.750:198): avc: denied { create } for pid=3984 comm="syz.0.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 225.604388][ T30] audit: type=1400 audit(225.300:199): avc: denied { write } for pid=3984 comm="syz.0.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 225.608434][ T30] audit: type=1400 audit(225.300:200): avc: denied { nlmsg_read } for pid=3984 comm="syz.0.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 226.586393][ T3992] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 228.769343][ T9] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 228.919362][ T9] usb 1-1: Using ep0 maxpacket: 8 [ 228.940963][ T9] usb 1-1: config 168 descriptor has 1 excess byte, ignoring [ 228.941640][ T9] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 228.942103][ T9] usb 1-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 228.942305][ T9] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 228.942511][ T9] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 228.988994][ T9] usb 1-1: config 168 descriptor has 1 excess byte, ignoring [ 228.989561][ T9] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 228.989729][ T9] usb 1-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 228.989887][ T9] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 228.990034][ T9] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 229.029208][ T9] usb 1-1: config 168 descriptor has 1 excess byte, ignoring [ 229.029684][ T9] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 255, changing to 11 [ 229.030067][ T9] usb 1-1: config 168 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 229.030241][ T9] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 229.030389][ T9] usb 1-1: config 168 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 229.058679][ T9] usb 1-1: string descriptor 0 read error: -22 [ 229.059641][ T9] usb 1-1: New USB device found, idVendor=0a07, idProduct=0064, bcdDevice=40.6e [ 229.059812][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 229.124538][ T9] adutux 1-1:168.0: ADU100 now attached to /dev/usb/adutux0 [ 229.329614][ T9] usb 1-1: USB disconnect, device number 8 [ 230.945281][ T4015] xt_hashlimit: size too large, truncated to 1048576 [ 231.675128][ T4029] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 231.677449][ T4029] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 232.243460][ T30] audit: type=1400 audit(231.940:201): avc: denied { setopt } for pid=4032 comm="syz.1.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 235.702217][ T30] audit: type=1400 audit(235.390:202): avc: denied { write } for pid=4057 comm="syz.1.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 235.702819][ T30] audit: type=1400 audit(235.390:203): avc: denied { nlmsg_write } for pid=4057 comm="syz.1.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 235.776160][ T4059] netlink: 24 bytes leftover after parsing attributes in process `syz.1.230'. [ 236.188971][ T30] audit: type=1400 audit(235.880:204): avc: denied { create } for pid=4062 comm="syz.1.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 237.561745][ T4075] syz_tun: entered allmulticast mode [ 237.730462][ T4074] syz_tun: left allmulticast mode [ 238.965997][ T26] nci: nci_ntf_packet: unknown ntf opcode 0x2 [ 243.862781][ T12] bond0: (slave bond_slave_0): interface is now down [ 243.864645][ T12] bond0: (slave bond_slave_1): interface is now down [ 243.889584][ T12] bond0: now running without any active interface! [ 244.915684][ T3365] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 245.133763][ T3365] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 245.134216][ T3365] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 245.134566][ T3365] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 245.134846][ T3365] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 245.135072][ T3365] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 245.175144][ T3365] usb 1-1: config 0 descriptor?? [ 245.252228][ T30] audit: type=1400 audit(244.950:205): avc: denied { create } for pid=4115 comm="syz.1.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 245.287568][ T4116] netlink: 'syz.1.251': attribute type 4 has an invalid length. [ 246.040776][ T3365] usbhid 1-1:0.0: can't add hid device: -71 [ 246.042970][ T3365] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 246.057705][ T3365] usb 1-1: USB disconnect, device number 9 [ 247.360885][ T3434] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 247.682276][ T3434] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 247.684466][ T3434] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 247.687865][ T3434] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 247.689701][ T3434] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 247.689869][ T3434] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 247.727197][ T3434] usb 1-1: config 0 descriptor?? [ 248.216456][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.217284][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.217587][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.217816][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.218034][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.243781][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.244457][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.244866][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.245267][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.245807][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.246022][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.246226][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.246427][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.246625][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.246844][ T3434] hid-generic 0003:047F:FFFF.0001: unknown main item tag 0x0 [ 248.332589][ T3434] hid-generic 0003:047F:FFFF.0001: hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 251.934047][ T4148] syz_tun: entered allmulticast mode [ 251.957619][ T4146] syz_tun: left allmulticast mode [ 258.526230][ T11] usb 1-1: USB disconnect, device number 10 [ 265.269509][ T3365] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 265.429259][ T3365] usb 1-1: Using ep0 maxpacket: 16 [ 265.459603][ T3365] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 265.502283][ T3365] usb 1-1: New USB device found, idVendor=05ac, idProduct=0244, bcdDevice= 0.00 [ 265.504732][ T3365] usb 1-1: New USB device strings: Mfr=1, Product=0, SerialNumber=2 [ 265.509032][ T3365] usb 1-1: Manufacturer: syz [ 265.509367][ T3365] usb 1-1: SerialNumber: syz [ 265.546590][ T3365] usb 1-1: config 0 descriptor?? [ 265.575367][ T3365] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 265.868961][ T4194] input: syz0 as /devices/virtual/input/input5 [ 266.071060][ T11] usb 1-1: USB disconnect, device number 11 [ 273.961495][ T4228] loop2: detected capacity change from 0 to 7 [ 279.835389][ T30] audit: type=1400 audit(279.520:206): avc: denied { sqpoll } for pid=4243 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 280.295600][ T4247] netlink: 830 bytes leftover after parsing attributes in process `syz.0.300'. [ 283.177087][ T30] audit: type=1400 audit(282.870:207): avc: denied { read append } for pid=4253 comm="syz.0.303" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 283.183564][ T30] audit: type=1400 audit(282.880:208): avc: denied { open } for pid=4253 comm="syz.0.303" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 283.187597][ T30] audit: type=1400 audit(282.880:209): avc: denied { map } for pid=4253 comm="syz.0.303" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 283.191368][ T30] audit: type=1400 audit(282.890:210): avc: denied { write execute } for pid=4253 comm="syz.0.303" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 283.206536][ T4254] mmap: syz.0.303 (4254) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 285.003260][ T30] audit: type=1400 audit(284.680:211): avc: denied { recv } for pid=3296 comm="syz-executor" saddr=127.0.0.1 src=43344 daddr=127.0.0.1 dest=30002 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 285.043671][ T30] audit: type=1400 audit(284.740:212): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30002 daddr=127.0.0.1 dest=43344 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 287.369864][ T4269] netlink: 36 bytes leftover after parsing attributes in process `syz.0.307'. [ 287.371104][ T4269] netlink: 16 bytes leftover after parsing attributes in process `syz.0.307'. [ 287.373357][ T4269] netlink: 36 bytes leftover after parsing attributes in process `syz.0.307'. [ 287.374943][ T4269] netlink: 36 bytes leftover after parsing attributes in process `syz.0.307'. [ 291.646296][ T30] audit: type=1400 audit(291.340:213): avc: denied { read write } for pid=4275 comm="syz.1.309" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 291.649358][ T30] audit: type=1400 audit(291.340:214): avc: denied { open } for pid=4275 comm="syz.1.309" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 291.662285][ T30] audit: type=1400 audit(291.360:215): avc: denied { mounton } for pid=4275 comm="syz.1.309" path="/121/file0" dev="tmpfs" ino=630 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 291.712587][ T30] audit: type=1400 audit(291.410:216): avc: denied { mount } for pid=4275 comm="syz.1.309" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 291.940672][ T30] audit: type=1400 audit(291.630:217): avc: denied { mounton } for pid=4277 comm="syz.0.310" path="/187/file0" dev="tmpfs" ino=958 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 292.249894][ T30] audit: type=1400 audit(291.940:218): avc: denied { read } for pid=4275 comm="syz.1.309" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 292.251693][ T30] audit: type=1400 audit(291.950:219): avc: denied { open } for pid=4275 comm="syz.1.309" path="/121/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 292.320420][ T4279] block device autoloading is deprecated and will be removed. [ 292.327930][ T30] audit: type=1400 audit(292.020:220): avc: denied { ioctl } for pid=4275 comm="syz.1.309" path="/121/file0/file0" dev="fuse" ino=64 ioctlcmd=0x92b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 292.367001][ T4276] md2: using deprecated bitmap file support [ 293.025641][ T30] audit: type=1400 audit(292.720:221): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 294.578115][ T30] audit: type=1400 audit(294.270:222): avc: denied { create } for pid=4284 comm="syz.0.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 297.282522][ T30] audit: type=1400 audit(296.980:223): avc: denied { create } for pid=4294 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 297.291006][ T30] audit: type=1400 audit(296.990:224): avc: denied { ioctl } for pid=4294 comm="syz.1.316" path="socket:[5803]" dev="sockfs" ino=5803 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 297.307671][ T30] audit: type=1400 audit(297.000:225): avc: denied { write } for pid=4294 comm="syz.1.316" path="socket:[5803]" dev="sockfs" ino=5803 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 300.571440][ T4301] ip6_vti0: entered promiscuous mode [ 301.516510][ T4307] netlink: 'syz.0.321': attribute type 5 has an invalid length. [ 302.646560][ T30] audit: type=1400 audit(302.340:226): avc: denied { write } for pid=4317 comm="syz.0.326" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 302.706274][ T4318] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 302.928733][ T30] audit: type=1400 audit(302.620:227): avc: denied { read } for pid=4319 comm="syz.0.327" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 302.930708][ T30] audit: type=1400 audit(302.630:228): avc: denied { open } for pid=4319 comm="syz.0.327" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 302.936236][ T30] audit: type=1400 audit(302.630:229): avc: denied { ioctl } for pid=4319 comm="syz.0.327" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7007 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 303.740049][ T9] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 303.941254][ T9] usb 1-1: unable to get BOS descriptor or descriptor too short [ 303.952317][ T30] audit: type=1400 audit(303.650:230): avc: denied { ioctl } for pid=4327 comm="syz.1.331" path="socket:[5851]" dev="sockfs" ino=5851 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.965026][ T9] usb 1-1: config 1 interface 0 altsetting 3 endpoint 0x81 has an invalid bInterval 94, changing to 10 [ 303.965618][ T9] usb 1-1: config 1 interface 0 altsetting 3 endpoint 0x81 has invalid maxpacket 25502, setting to 1024 [ 303.965947][ T9] usb 1-1: config 1 interface 0 has no altsetting 0 [ 303.993814][ T9] usb 1-1: string descriptor 0 read error: -22 [ 303.994628][ T9] usb 1-1: New USB device found, idVendor=172f, idProduct=0501, bcdDevice= 0.40 [ 303.994793][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 310.048818][ T30] audit: type=1400 audit(309.740:231): avc: denied { write } for pid=4382 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 310.050532][ T30] audit: type=1400 audit(309.750:232): avc: denied { read } for pid=4382 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 346.107770][ T30] audit: type=1400 audit(345.800:233): avc: denied { ioctl } for pid=4685 comm="syz.1.486" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0xe500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 346.843777][ T4694] ipvlan2: entered promiscuous mode [ 353.137109][ T30] audit: type=1400 audit(352.830:234): avc: denied { create } for pid=4722 comm="syz.1.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 354.845746][ T4731] netlink: 4 bytes leftover after parsing attributes in process `syz.0.504'. [ 355.442861][ T4735] netlink: 64 bytes leftover after parsing attributes in process `syz.0.506'. [ 359.444557][ T30] audit: type=1400 audit(359.140:235): avc: denied { ioctl } for pid=4736 comm="syz.0.507" path="socket:[8361]" dev="sockfs" ino=8361 ioctlcmd=0xf515 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 368.099010][ T30] audit: type=1400 audit(367.790:236): avc: denied { create } for pid=4771 comm="syz.1.517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 368.113052][ T30] audit: type=1400 audit(367.810:237): avc: denied { setopt } for pid=4771 comm="syz.1.517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 375.294409][ T30] audit: type=1400 audit(374.990:238): avc: denied { create } for pid=4787 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 375.325168][ T30] audit: type=1400 audit(375.020:239): avc: denied { bind } for pid=4787 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 375.341919][ T30] audit: type=1400 audit(375.030:240): avc: denied { listen } for pid=4787 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 375.364606][ T30] audit: type=1400 audit(375.060:241): avc: denied { connect } for pid=4787 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 375.431022][ T30] audit: type=1400 audit(375.130:242): avc: denied { write } for pid=4787 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 399.645711][ T30] audit: type=1400 audit(399.190:243): avc: denied { write } for pid=4832 comm="syz.1.536" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 400.500611][ T30] audit: type=1400 audit(400.160:244): avc: denied { name_connect } for pid=4832 comm="syz.1.536" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 411.533606][ T30] audit: type=1400 audit(411.230:245): avc: denied { recv } for pid=0 comm="swapper/0" saddr=fe80::2 daddr=ff02::1 netif=eth0 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 424.893644][ T30] audit: type=1400 audit(424.590:246): avc: denied { read } for pid=4876 comm="syz.0.548" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 424.897844][ T30] audit: type=1400 audit(424.590:247): avc: denied { open } for pid=4876 comm="syz.0.548" path="net:[4026532631]" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 445.584545][ T30] audit: type=1400 audit(445.280:248): avc: denied { nlmsg_write } for pid=4894 comm="syz.0.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 446.931948][ T4885] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 446.955117][ T4885] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 448.876420][ T4885] hsr_slave_0: entered promiscuous mode [ 448.885122][ T4885] hsr_slave_1: entered promiscuous mode [ 448.895423][ T4885] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 448.904666][ T4885] Cannot create hsr debugfs directory [ 451.026052][ T30] audit: type=1326 audit(450.720:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9995bce8 code=0x7ffc0000 [ 451.026657][ T30] audit: type=1326 audit(450.720:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9995bce8 code=0x7ffc0000 [ 451.035028][ T30] audit: type=1326 audit(450.730:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=107 compat=0 ip=0xffff9995bce8 code=0x7ffc0000 [ 451.037262][ T30] audit: type=1326 audit(450.730:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9995bce8 code=0x7ffc0000 [ 451.060638][ T30] audit: type=1326 audit(450.730:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=110 compat=0 ip=0xffff9995bce8 code=0x7ffc0000 [ 451.069186][ T30] audit: type=1326 audit(450.730:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9995bce8 code=0x7ffc0000 [ 451.069700][ T30] audit: type=1326 audit(450.740:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=293 compat=0 ip=0xffff9995bce8 code=0x7ffc0000 [ 451.070208][ T30] audit: type=1326 audit(450.740:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9995bce8 code=0x7ffc0000 [ 451.070689][ T30] audit: type=1326 audit(450.740:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffff9995bce8 code=0x7ffc0000 [ 451.070990][ T30] audit: type=1326 audit(450.760:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4924 comm="syz.0.554" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9995bce8 code=0x7ffc0000 [ 451.777711][ T4931] netlink: 16 bytes leftover after parsing attributes in process `syz.0.556'. [ 743.170186][ T33] INFO: task kworker/0:0:9 blocked for more than 430 seconds. [ 743.170681][ T33] Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 [ 743.179012][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 743.179354][ T33] task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000008 [ 743.179927][ T33] Workqueue: usb_hub_wq hub_event [ 743.180222][ T33] Call trace: [ 743.180528][ T33] __switch_to+0x204/0x4bc (T) [ 743.180636][ T33] __schedule+0xd34/0x3188 [ 743.180720][ T33] schedule+0xd0/0x344 [ 743.180802][ T33] schedule_timeout+0x1ec/0x224 [ 743.180881][ T33] __wait_for_common+0x1d0/0x3f8 [ 743.180958][ T33] wait_for_completion+0x20/0x2c [ 743.181034][ T33] devtmpfs_submit_req+0xac/0x114 [ 743.181119][ T33] devtmpfs_create_node+0x120/0x18c [ 743.181209][ T33] device_add+0xbd0/0x12bc [ 743.181292][ T33] usb_new_device+0x778/0x16a4 [ 743.181373][ T33] hub_event+0x1e9c/0x365c [ 743.181518][ T33] process_one_work+0x7cc/0x18d4 [ 743.181608][ T33] worker_thread+0x734/0xb84 [ 743.181688][ T33] kthread+0x348/0x5fc [ 743.181767][ T33] ret_from_fork+0x10/0x20 [ 743.181984][ T33] INFO: task kworker/0:1:11 blocked for more than 430 seconds. [ 743.182067][ T33] Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 [ 743.182142][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 743.182200][ T33] task:kworker/0:1 state:D stack:0 pid:11 tgid:11 ppid:2 task_flags:0x4288060 flags:0x00000008 [ 743.182438][ T33] Workqueue: md_misc mddev_delayed_delete [ 743.182577][ T33] Call trace: [ 743.182634][ T33] __switch_to+0x204/0x4bc (T) [ 743.182720][ T33] __schedule+0xd34/0x3188 [ 743.182801][ T33] schedule+0xd0/0x344 [ 743.182881][ T33] schedule_timeout+0x1ec/0x224 [ 743.182958][ T33] __wait_for_common+0x1d0/0x3f8 [ 743.183033][ T33] wait_for_completion+0x20/0x2c [ 743.183109][ T33] devtmpfs_submit_req+0xac/0x114 [ 743.183195][ T33] devtmpfs_delete_node+0xd8/0x128 [ 743.183273][ T33] device_del+0x59c/0x7b4 [ 743.183351][ T33] del_gendisk+0x3fc/0x87c [ 743.183435][ T33] md_kobj_release+0x84/0xd8 [ 743.183515][ T33] kobject_put+0x17c/0x430 [ 743.183596][ T33] mddev_delayed_delete+0x14/0x20 [ 743.183676][ T33] process_one_work+0x7cc/0x18d4 [ 743.183756][ T33] worker_thread+0x734/0xb84 [ 743.183835][ T33] kthread+0x348/0x5fc [ 743.183913][ T33] ret_from_fork+0x10/0x20 [ 743.184340][ T33] [ 743.184340][ T33] Showing all locks held in the system: [ 743.184532][ T33] 3 locks held by kworker/0:0/9: [ 743.184636][ T33] #0: ffff00000f21cd48 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 743.185345][ T33] #1: ffff80008d4d7c80 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 743.185765][ T33] #2: ffff0000170b7198 (&dev->mutex){....}-{4:4}, at: hub_event+0x10c/0x365c [ 743.186311][ T33] 2 locks held by kworker/0:1/11: [ 743.186384][ T33] #0: ffff00000ef92548 ((wq_completion)md_misc){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 743.186725][ T33] #1: ffff80008d4f7c80 ((work_completion)(&mddev->del_work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 743.187062][ T33] 2 locks held by kdevtmpfs/25: [ 743.187130][ T33] #0: ffff00000e4982c8 (&type->i_mutex_dir_key/1){+.+.}-{4:4}, at: __kern_path_locked+0xd4/0x1f8 [ 743.187600][ T33] #1: ffff80008771a4e8 (major_names_lock){+.+.}-{4:4}, at: blk_probe_dev+0x30/0x168 [ 743.187942][ T33] 3 locks held by kworker/u8:1/26: [ 743.188005][ T33] #0: ffff00000d831148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 743.202675][ T33] #1: ffff80008d5f7c80 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 743.205131][ T33] #2: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 743.209006][ T33] 1 lock held by khungtaskd/33: [ 743.209757][ T33] #0: ffff80008728da60 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x18/0x1c4 [ 743.212298][ T33] 3 locks held by kworker/u8:7/1543: [ 743.212960][ T33] #0: ffff000017d9e148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 743.215502][ T33] #1: ffff80008f507c80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 743.218550][ T33] #2: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 743.220959][ T33] 1 lock held by klogd/3111: [ 743.221651][ T33] 2 locks held by getty/3241: [ 743.222294][ T33] #0: ffff00001804b0a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 743.224847][ T33] #1: ffff80008d50b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e4/0xdb4 [ 743.227549][ T33] 2 locks held by sshd/3294: [ 743.230188][ T33] 3 locks held by syz-executor/3296: [ 743.230963][ T33] 3 locks held by syz.1.536/4838: [ 743.231624][ T33] #0: ffff800087a33cc8 (tty_mutex){+.+.}-{4:4}, at: tty_open+0x3c4/0xb04 [ 743.234130][ T33] #1: ffff000013cf41c0 (&tty->legacy_mutex){+.+.}-{4:4}, at: tty_lock+0x48/0x90 [ 743.236924][ T33] #2: ffff80008719e340 (console_lock){+.+.}-{0:0}, at: con_install+0xa4/0x4c4 [ 743.240236][ T33] 2 locks held by syz-executor/4885: [ 743.240910][ T33] #0: ffff800087091bb8 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0xb8/0x218 [ 743.243781][ T33] #1: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x4b8/0x1810 [ 743.246313][ T33] 1 lock held by syz.0.557/4933: [ 743.246948][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 743.250733][ T33] 1 lock held by syz-executor/4935: [ 743.251416][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 743.253888][ T33] [ 743.254446][ T33] ============================================= [ 743.254446][ T33] [ 743.255686][ T33] Kernel panic - not syncing: hung_task: blocked tasks [ 743.256275][ T33] CPU: 0 UID: 0 PID: 33 Comm: khungtaskd Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 743.256582][ T33] Hardware name: linux,dummy-virt (DT) [ 743.256763][ T33] Call trace: [ 743.256916][ T33] show_stack+0x18/0x24 (C) [ 743.257098][ T33] dump_stack_lvl+0x38/0xf4 [ 743.257279][ T33] dump_stack+0x1c/0x28 [ 743.257474][ T33] panic+0x5b0/0x664 [ 743.257632][ T33] watchdog+0x658/0x1140 [ 743.257800][ T33] kthread+0x348/0x5fc [ 743.257959][ T33] ret_from_fork+0x10/0x20 [ 743.258823][ T33] SMP: stopping secondary CPUs [ 743.259755][ T33] Kernel Offset: disabled [ 743.259956][ T33] CPU features: 0x0410,00040068,01000400,0200421b [ 743.260216][ T33] Memory Limit: none [ 743.263275][ T33] Rebooting in 86400 seconds.. VM DIAGNOSIS: 11:13:34 Registers: info registers vcpu 0 CPU#0 PC=ffff80008544667c X00=ffff800085446678 X01=ffff800083d66950 X02=0000000000000000 X03=ffff800080402058 X04=ffff700011a1f559 X05=ffff80008d0faac0 X06=ffff700011a1f558 X07=0000000000000001 X08=ffff80008d0faac3 X09=dfff800000000000 X10=ffff700011a1f558 X11=1ffff00011a1f558 X12=ffff700011a1f559 X13=0000000000000000 X14=1fffe0000d418836 X15=185002956f8cc601 X16=89790000c5e7ffff X17=6bf5152dac4c9e3c X18=ffff000016a17280 X19=ffff80008d0faac0 X20=000000acc2a57c00 X21=ffff8000802a7a7c X22=dfff800000000000 X23=0000000000021fac X24=ffff80008d0faac8 X25=ffff8000870908f0 X26=0000000000000004 X27=ffff800087090000 X28=1fffe0000d41753f X29=ffff800080006530 X30=ffff800083d66968 SP=ffff800080006530 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=ffffffffffffffff:ffffffffffffffff Q01=0000000f00000054:0000000000000050 Q02=f00ff00ff00ff00f:f00ff00ff00ff00f Q03=000000000000000f:f000f000f000f000 Q04=f00ff00ff00ff00f:f00ff00ff00ff00f Q05=0000000ff0f0f0f0:0000000ff0f0f0f0 Q06=0000f00000000000:0000f00000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085445da4 X00=0000000000000001 X01=ffff8000800332c8 X02=0000000000000000 X03=1fffe00002606001 X04=0000000000000001 X05=00000000000000c8 X06=ffff000013030ac0 X07=7486b79a8cf9d1d7 X08=0000000000000000 X09=ffff8000896fc000 X10=ffff700014290e8c X11=1ffff00014290e8c X12=ffff700014290e8d X13=0000000000000000 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff800080033198 X20=ffff8000a1487440 X21=ffff000013030000 X22=0000000000000000 X23=0000000000000001 X24=ffff0000279aedc0 X25=ffff0000279aedc0 X26=ffff0000279aec80 X27=ffff00000dd71840 X28=fffffdffc09e6b80 X29=ffff8000a1487480 X30=ffff80008098d468 SP=ffff8000a14875c0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=730073250a0d0a0d:7525203a6874676e Q02=f00ff00ff00ff00f:f00ff00ff00ff00f Q03=000f000f00000000:000f000000000000 Q04=f00ff00ff00ff00f:f00ff00ff00ff00f Q05=0f0f00000f000000:0f0f00000f000000 Q06=cccccccccc00c300:cccccccccc00c300 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000