last executing test programs: 30m29.710040631s ago: executing program 1 (id=1149): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r1, &(0x7f00000148c0)={0x0, 0x0, &(0x7f0000014880)={0x0}}, 0xc4c4) 30m29.020894129s ago: executing program 1 (id=1151): r0 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000002b00), 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f00000000c0)='4.\x00', &(0x7f0000000100)='./file0\x00', r1) 30m28.452995272s ago: executing program 1 (id=1154): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0, 0xffffffffffffffc4}}], 0x0, 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x3, 0x0) 30m28.174348063s ago: executing program 1 (id=1156): r0 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = dup2(r0, r0) ioctl$SNDCTL_DSP_GETTRIGGER(r1, 0x80045010, &(0x7f00000002c0)) 30m27.579618727s ago: executing program 1 (id=1157): r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x10) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 30m27.24282871s ago: executing program 1 (id=1158): r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) fcntl$setown(r1, 0x8, r0) 29m41.103285149s ago: executing program 32 (id=1158): r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) fcntl$setown(r1, 0x8, r0) 28m17.260475695s ago: executing program 0 (id=1372): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='net_prio.prioidx\x00', 0x275a, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0x5452, &(0x7f0000000400)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) read(r1, 0x0, 0xfffffe54) 28m16.442352388s ago: executing program 0 (id=1375): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') syz_open_dev$tty20(0xc, 0x4, 0x1) 28m16.023555825s ago: executing program 0 (id=1376): r0 = openat$sequencer2(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = dup(r0) read$hiddev(r1, &(0x7f0000000000)=""/45, 0x2d) 28m15.540966645s ago: executing program 0 (id=1378): r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) memfd_create(0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 28m15.16120798s ago: executing program 0 (id=1380): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) 28m14.650945481s ago: executing program 0 (id=1382): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)={0x1c, 0x0, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c160) 27m28.782358888s ago: executing program 33 (id=1382): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)={0x1c, 0x0, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c160) 10m52.40487764s ago: executing program 2 (id=4226): r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$tcp_mem(r0, 0x0, 0x0) 10m51.66135584s ago: executing program 2 (id=4228): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = dup(r0) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, 0x0) 10m51.163288991s ago: executing program 2 (id=4230): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$selinux_create(r1, 0x0, 0x0) 10m50.94146208s ago: executing program 2 (id=4232): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 10m50.473956689s ago: executing program 2 (id=4234): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x10) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x1e80c2, 0x0) 10m49.844390055s ago: executing program 2 (id=4236): socketpair(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0x840}, 0x400) 10m4.44326495s ago: executing program 34 (id=4236): socketpair(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r1) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0x840}, 0x400) 4.16381336s ago: executing program 3 (id=5899): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) read(r1, 0x0, 0x0) 3.92066982s ago: executing program 4 (id=5901): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) write$P9_RLERROR(r2, 0x0, 0x0) 3.497778348s ago: executing program 3 (id=5902): r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) getsockopt$inet6_int(r0, 0x29, 0x19, 0x0, &(0x7f0000000180)) 3.20402486s ago: executing program 4 (id=5903): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r0, r1, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, 0x0) 2.770920517s ago: executing program 3 (id=5904): pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) close(r0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x0, "e91be44fdb5730d1", "186c9a29f254b19e08d0c5fecc954ecbab6e2700a4fc0e61f3abaf49e8488579"}) 2.618666863s ago: executing program 4 (id=5905): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000f00)={0x14}, 0x14}}, 0x0) 2.324366325s ago: executing program 4 (id=5906): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_ASSOCIATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000002880)={&(0x7f0000002840)={0x1c, r0, 0x1, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4000815}, 0x40850) 2.023411158s ago: executing program 3 (id=5907): pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000100)="eb", 0x20000101}], 0x1, 0x0) fcntl$setpipe(r0, 0x407, 0x2000000) write$P9_RWSTAT(r0, &(0x7f0000000080)={0x7, 0x7f, 0x1}, 0x7) 1.434730852s ago: executing program 3 (id=5908): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$l2tp(r1, 0x0, 0x0, 0x20000843, 0x0, 0x0) 969.592631ms ago: executing program 3 (id=5909): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000a80)={0x48, r1, 0x1, 0xfffffffe, 0x0, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xfb2e77a8993c191f}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffff}]}, 0x48}}, 0x20000000) 380.386285ms ago: executing program 4 (id=5910): r0 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$vcsa(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) dup2(r0, r1) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f00000003c0)=0x0) 0s ago: executing program 4 (id=5911): r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r1, r0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r2, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x4080) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:55532' (ED25519) to the list of known hosts. [ 229.664338][ T30] audit: type=1400 audit(229.200:46): avc: denied { name_bind } for pid=3312 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 230.245189][ T30] audit: type=1400 audit(229.780:47): avc: denied { execute } for pid=3313 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 230.252239][ T30] audit: type=1400 audit(229.780:48): avc: denied { execute_no_trans } for pid=3313 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 237.939678][ T30] audit: type=1400 audit(237.470:49): avc: denied { mounton } for pid=3313 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 237.957012][ T30] audit: type=1400 audit(237.480:50): avc: denied { mount } for pid=3313 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 238.022279][ T3313] cgroup: Unknown subsys name 'net' [ 238.057995][ T30] audit: type=1400 audit(237.590:51): avc: denied { unmount } for pid=3313 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 238.295030][ T3313] cgroup: Unknown subsys name 'cpuset' [ 238.363976][ T3313] cgroup: Unknown subsys name 'rlimit' [ 238.646903][ T30] audit: type=1400 audit(238.180:52): avc: denied { setattr } for pid=3313 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 238.654526][ T30] audit: type=1400 audit(238.180:53): avc: denied { mounton } for pid=3313 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 238.660278][ T30] audit: type=1400 audit(238.190:54): avc: denied { mount } for pid=3313 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 239.244157][ T3315] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 239.249095][ T30] audit: type=1400 audit(238.780:55): avc: denied { relabelto } for pid=3315 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 239.256407][ T30] audit: type=1400 audit(238.790:56): avc: denied { write } for pid=3315 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 239.389902][ T30] audit: type=1400 audit(238.920:57): avc: denied { read } for pid=3313 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 239.396551][ T30] audit: type=1400 audit(238.920:58): avc: denied { open } for pid=3313 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 239.430282][ T3313] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 259.014485][ T30] audit: type=1400 audit(258.540:59): avc: denied { execmem } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 259.175023][ T30] audit: type=1400 audit(258.710:60): avc: denied { read } for pid=3318 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 259.186433][ T30] audit: type=1400 audit(258.720:61): avc: denied { open } for pid=3318 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 259.207747][ T30] audit: type=1400 audit(258.740:62): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 259.305107][ T30] audit: type=1400 audit(258.840:63): avc: denied { module_request } for pid=3319 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 259.307638][ T30] audit: type=1400 audit(258.840:64): avc: denied { module_request } for pid=3318 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 259.648059][ T30] audit: type=1400 audit(259.180:65): avc: denied { sys_module } for pid=3318 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 267.051057][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 267.088383][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 267.465577][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 267.488575][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 269.872034][ T3319] hsr_slave_0: entered promiscuous mode [ 269.890708][ T3319] hsr_slave_1: entered promiscuous mode [ 271.544724][ T3318] hsr_slave_0: entered promiscuous mode [ 271.570402][ T3318] hsr_slave_1: entered promiscuous mode [ 271.580411][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 271.586740][ T3318] Cannot create hsr debugfs directory [ 272.982701][ T30] audit: type=1400 audit(272.510:66): avc: denied { create } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 272.983309][ T30] audit: type=1400 audit(272.510:67): avc: denied { write } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 272.983694][ T30] audit: type=1400 audit(272.510:68): avc: denied { read } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 273.060043][ T3319] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 273.175158][ T3319] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 273.262961][ T3319] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 273.477930][ T3319] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 274.290852][ T3318] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 274.329081][ T3318] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 274.367073][ T3318] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 274.406517][ T3318] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 276.597229][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.888626][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.199092][ T3319] veth0_vlan: entered promiscuous mode [ 290.350961][ T3318] veth0_vlan: entered promiscuous mode [ 290.453953][ T3319] veth1_vlan: entered promiscuous mode [ 290.537278][ T3318] veth1_vlan: entered promiscuous mode [ 291.099869][ T3318] veth0_macvtap: entered promiscuous mode [ 291.149112][ T3319] veth0_macvtap: entered promiscuous mode [ 291.219626][ T3319] veth1_macvtap: entered promiscuous mode [ 291.259942][ T3318] veth1_macvtap: entered promiscuous mode [ 292.028662][ T992] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.036474][ T992] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.108955][ T992] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.115248][ T992] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.117427][ T992] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.117964][ T992] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.118370][ T992] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.118747][ T992] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.005262][ T30] audit: type=1400 audit(292.520:69): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 293.059396][ T30] audit: type=1400 audit(292.580:70): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/syzkaller.GMnN82/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 293.085903][ T30] audit: type=1400 audit(292.610:71): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 293.129890][ T30] audit: type=1400 audit(292.660:72): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/syzkaller.GMnN82/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 293.154548][ T30] audit: type=1400 audit(292.680:73): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/syzkaller.GMnN82/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4346 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 293.256400][ T30] audit: type=1400 audit(292.780:74): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 293.330652][ T30] audit: type=1400 audit(292.860:75): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 293.389920][ T30] audit: type=1400 audit(292.920:76): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="gadgetfs" ino=4349 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 293.489722][ T30] audit: type=1400 audit(293.020:77): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 293.499057][ T30] audit: type=1400 audit(293.030:78): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 293.807038][ T3319] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 299.421000][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 299.432861][ T30] audit: type=1400 audit(298.950:83): avc: denied { map_create } for pid=3487 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 299.456268][ T30] audit: type=1400 audit(298.990:84): avc: denied { bpf } for pid=3487 comm="syz.0.11" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 299.552921][ T30] audit: type=1400 audit(299.080:85): avc: denied { map_read map_write } for pid=3487 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 309.388722][ T30] audit: type=1400 audit(308.920:86): avc: denied { prog_load } for pid=3561 comm="syz.1.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 309.401945][ T30] audit: type=1400 audit(308.930:87): avc: denied { perfmon } for pid=3561 comm="syz.1.48" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 310.049931][ T30] audit: type=1400 audit(309.580:88): avc: denied { create } for pid=3566 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 310.119151][ T30] audit: type=1400 audit(309.640:89): avc: denied { setopt } for pid=3566 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 313.972062][ T30] audit: type=1400 audit(313.500:90): avc: denied { write } for pid=3604 comm="syz.1.69" path="socket:[4628]" dev="sockfs" ino=4628 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 317.817146][ T30] audit: type=1400 audit(317.350:91): avc: denied { create } for pid=3640 comm="syz.1.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 317.860438][ T30] audit: type=1400 audit(317.390:92): avc: denied { bind } for pid=3640 comm="syz.1.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 317.920777][ T30] audit: type=1400 audit(317.450:93): avc: denied { write } for pid=3640 comm="syz.1.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 319.622766][ T30] audit: type=1400 audit(319.150:94): avc: denied { create } for pid=3653 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 319.637132][ T30] audit: type=1400 audit(319.170:95): avc: denied { setopt } for pid=3653 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 322.089738][ T30] audit: type=1400 audit(321.580:96): avc: denied { create } for pid=3677 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 322.200998][ T30] audit: type=1400 audit(321.730:97): avc: denied { write } for pid=3677 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 323.559490][ T3687] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=258 sclass=netlink_route_socket pid=3687 comm=syz.1.108 [ 324.080698][ T3692] capability: warning: `syz.1.111' uses deprecated v2 capabilities in a way that may be insecure [ 325.808918][ T30] audit: type=1400 audit(325.340:98): avc: denied { write } for pid=3703 comm="syz.1.117" name="ip6_mr_cache" dev="proc" ino=4026532663 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 327.422870][ T30] audit: type=1400 audit(326.960:99): avc: denied { read } for pid=3721 comm="syz.1.126" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 327.427381][ T30] audit: type=1400 audit(326.960:100): avc: denied { open } for pid=3721 comm="syz.1.126" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 327.566454][ T30] audit: type=1400 audit(327.100:101): avc: denied { ioctl } for pid=3721 comm="syz.1.126" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x643a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 328.413637][ T30] audit: type=1400 audit(327.940:102): avc: denied { read write } for pid=3726 comm="syz.0.129" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 328.433060][ T30] audit: type=1400 audit(327.960:103): avc: denied { open } for pid=3726 comm="syz.0.129" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 328.453053][ T30] audit: type=1400 audit(327.980:104): avc: denied { ioctl } for pid=3726 comm="syz.0.129" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 328.896444][ T9] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 329.246306][ T9] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 329.247024][ T9] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 329.457622][ T9] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 329.462657][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 329.464861][ T9] usb 1-1: Product: syz [ 329.466227][ T9] usb 1-1: Manufacturer: syz [ 329.467584][ T9] usb 1-1: SerialNumber: syz [ 330.045621][ T3727] SELinux: syz.0.129 (3727) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 335.095634][ T9] usb 1-1: 0:2 : does not exist [ 335.282984][ T9] usb 1-1: USB disconnect, device number 2 [ 338.806256][ T3464] udevd[3464]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 344.763297][ T3797] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=3797 comm=syz.0.162 [ 345.129756][ T30] audit: type=1400 audit(344.660:105): avc: denied { read write } for pid=3799 comm="syz.0.163" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 345.138767][ T30] audit: type=1400 audit(344.660:106): avc: denied { open } for pid=3799 comm="syz.0.163" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 347.359329][ T30] audit: type=1400 audit(346.890:107): avc: denied { create } for pid=3815 comm="syz.0.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 347.445981][ T30] audit: type=1400 audit(346.980:108): avc: denied { connect } for pid=3815 comm="syz.0.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 347.494858][ T30] audit: type=1400 audit(347.030:109): avc: denied { write } for pid=3815 comm="syz.0.171" path="socket:[5281]" dev="sockfs" ino=5281 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 348.642289][ T30] audit: type=1400 audit(348.170:110): avc: denied { create } for pid=3823 comm="syz.1.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 348.709085][ T30] audit: type=1400 audit(348.230:111): avc: denied { setopt } for pid=3823 comm="syz.1.175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 352.192295][ T30] audit: type=1400 audit(351.720:112): avc: denied { create } for pid=3842 comm="syz.1.184" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 352.237397][ T30] audit: type=1400 audit(351.770:113): avc: denied { write } for pid=3842 comm="syz.1.184" name="file0" dev="tmpfs" ino=490 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 352.246384][ T30] audit: type=1400 audit(351.780:114): avc: denied { open } for pid=3842 comm="syz.1.184" path="/93/file0" dev="tmpfs" ino=490 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 352.270806][ T30] audit: type=1400 audit(351.800:115): avc: denied { ioctl } for pid=3842 comm="syz.1.184" path="/93/file0" dev="tmpfs" ino=490 ioctlcmd=0x4c09 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 352.412640][ T30] audit: type=1400 audit(351.940:116): avc: denied { unlink } for pid=3319 comm="syz-executor" name="file0" dev="tmpfs" ino=490 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 358.367028][ T30] audit: type=1400 audit(357.900:117): avc: denied { write } for pid=3874 comm="syz.1.199" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 363.083262][ T3904] Zero length message leads to an empty skb [ 367.824306][ T30] audit: type=1400 audit(367.340:118): avc: denied { mounton } for pid=3931 comm="syz.0.225" path="/104/file0" dev="tmpfs" ino=549 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 367.924214][ T30] audit: type=1400 audit(367.450:119): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 369.734956][ T30] audit: type=1400 audit(369.260:120): avc: denied { write } for pid=3941 comm="syz.0.229" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 370.063769][ T30] audit: type=1400 audit(369.590:121): avc: denied { create } for pid=3943 comm="syz.0.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 371.717092][ T30] audit: type=1400 audit(371.250:122): avc: denied { create } for pid=3959 comm="syz.0.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 371.757395][ T30] audit: type=1400 audit(371.290:123): avc: denied { ioctl } for pid=3959 comm="syz.0.238" path="socket:[5542]" dev="sockfs" ino=5542 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 375.027309][ T30] audit: type=1400 audit(374.560:124): avc: denied { write } for pid=3982 comm="syz.0.249" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 376.152044][ T30] audit: type=1400 audit(375.680:125): avc: denied { create } for pid=3990 comm="syz.0.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 376.160765][ T30] audit: type=1400 audit(375.690:126): avc: denied { bind } for pid=3990 comm="syz.0.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 380.290504][ T30] audit: type=1400 audit(379.820:127): avc: denied { open } for pid=4019 comm="syz.1.267" path="/dev/ptyq7" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 383.225228][ T4036] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4036 comm=syz.1.275 [ 383.617025][ T30] audit: type=1400 audit(383.150:128): avc: denied { write } for pid=4037 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 384.356757][ T30] audit: type=1400 audit(383.890:129): avc: denied { read write } for pid=4043 comm="syz.0.279" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 384.360596][ T30] audit: type=1400 audit(383.890:130): avc: denied { open } for pid=4043 comm="syz.0.279" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 384.417093][ T30] audit: type=1400 audit(383.950:131): avc: denied { ioctl } for pid=4043 comm="syz.0.279" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0xaf60 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 408.136219][ T30] audit: type=1400 audit(407.670:132): avc: denied { setattr } for pid=4212 comm="syz.1.361" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 415.734929][ T30] audit: type=1400 audit(415.250:133): avc: denied { create } for pid=4256 comm="syz.0.383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 415.835930][ T30] audit: type=1400 audit(415.360:134): avc: denied { write } for pid=4256 comm="syz.0.383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 424.617105][ T30] audit: type=1400 audit(424.150:135): avc: denied { prog_run } for pid=4322 comm="syz.0.416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 425.393130][ T4333] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 425.397406][ T4333] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 425.417168][ T4333] SELinux: syz.1.420 (4333) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 427.240247][ T4347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=4347 comm=syz.0.428 [ 430.908754][ T30] audit: type=1400 audit(430.440:136): avc: denied { setopt } for pid=4367 comm="syz.0.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 430.955638][ T30] audit: type=1400 audit(430.480:137): avc: denied { map } for pid=4367 comm="syz.0.439" path="socket:[7255]" dev="sockfs" ino=7255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 430.968665][ T30] audit: type=1400 audit(430.500:138): avc: denied { read } for pid=4367 comm="syz.0.439" path="socket:[7255]" dev="sockfs" ino=7255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 431.849581][ T30] audit: type=1400 audit(431.380:139): avc: denied { ioctl } for pid=4371 comm="syz.1.441" path="/dev/ttyq7" dev="devtmpfs" ino=374 ioctlcmd=0x5401 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 432.578570][ T4380] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 434.798893][ T30] audit: type=1400 audit(434.330:140): avc: denied { read write } for pid=4391 comm="syz.1.450" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 434.810051][ T30] audit: type=1400 audit(434.330:141): avc: denied { open } for pid=4391 comm="syz.1.450" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 434.888902][ T30] audit: type=1400 audit(434.420:142): avc: denied { ioctl } for pid=4391 comm="syz.1.450" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 436.267080][ T4402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4402 comm=syz.0.455 [ 445.775102][ T4466] capability: warning: `syz.0.487' uses 32-bit capabilities (legacy support in use) [ 446.795452][ T30] audit: type=1400 audit(446.330:143): avc: denied { connect } for pid=4473 comm="syz.1.491" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 447.682228][ T30] audit: type=1400 audit(447.210:144): avc: denied { read write } for pid=4480 comm="syz.0.495" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 447.689906][ T30] audit: type=1400 audit(447.220:145): avc: denied { open } for pid=4480 comm="syz.0.495" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 447.726599][ T30] audit: type=1400 audit(447.260:146): avc: denied { read write } for pid=4480 comm="syz.0.495" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 447.732941][ T30] audit: type=1400 audit(447.260:147): avc: denied { open } for pid=4480 comm="syz.0.495" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 451.600116][ T30] audit: type=1400 audit(451.130:148): avc: denied { setopt } for pid=4512 comm="syz.1.510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 452.907471][ T30] audit: type=1400 audit(452.440:149): avc: denied { setopt } for pid=4523 comm="syz.0.516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 455.438180][ T30] audit: type=1400 audit(454.970:150): avc: denied { read write } for pid=4541 comm="syz.0.525" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 455.493011][ T30] audit: type=1400 audit(455.000:151): avc: denied { open } for pid=4541 comm="syz.0.525" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 455.540229][ T30] audit: type=1400 audit(455.070:152): avc: denied { ioctl } for pid=4541 comm="syz.0.525" path="/dev/binderfs/binder1" dev="binder" ino=5 ioctlcmd=0x6207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 455.552754][ T30] audit: type=1400 audit(455.080:153): avc: denied { set_context_mgr } for pid=4541 comm="syz.0.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 455.595099][ T4543] binder: BINDER_SET_CONTEXT_MGR already set [ 455.595867][ T4543] binder: 4541:4543 ioctl 40046207 0 returned -16 [ 457.037376][ T30] audit: type=1400 audit(456.570:154): avc: denied { append } for pid=4551 comm="syz.0.530" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 460.578703][ T4573] netlink: 16 bytes leftover after parsing attributes in process `syz.1.540'. [ 461.000132][ T30] audit: type=1400 audit(460.510:155): avc: denied { allowed } for pid=4574 comm="syz.0.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 461.213002][ T30] audit: type=1400 audit(460.740:156): avc: denied { create } for pid=4574 comm="syz.0.541" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 466.907044][ T30] audit: type=1400 audit(466.430:157): avc: denied { ioctl } for pid=4610 comm="syz.1.559" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7652 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 467.520144][ T30] audit: type=1400 audit(467.050:158): avc: denied { setopt } for pid=4614 comm="syz.1.561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 472.205504][ T4645] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 472.252145][ T30] audit: type=1400 audit(471.780:159): avc: denied { ioctl } for pid=4643 comm="syz.1.576" path="socket:[8397]" dev="sockfs" ino=8397 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 478.220673][ T30] audit: type=1400 audit(477.740:160): avc: denied { create } for pid=4688 comm="syz.0.598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 478.243863][ T30] audit: type=1400 audit(477.780:161): avc: denied { bind } for pid=4688 comm="syz.0.598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 478.297178][ T30] audit: type=1400 audit(477.830:162): avc: denied { setopt } for pid=4688 comm="syz.0.598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 480.240965][ T4704] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4704 comm=syz.1.605 [ 480.522571][ T30] audit: type=1400 audit(480.050:163): avc: denied { nlmsg_write } for pid=4705 comm="syz.0.606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 491.876808][ T4803] ucma_write: process 670 (syz.0.654) changed security contexts after opening file descriptor, this is not allowed. [ 493.675104][ T30] audit: type=1400 audit(493.210:164): avc: denied { connect } for pid=4824 comm="syz.1.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 493.694027][ T30] audit: type=1400 audit(493.230:165): avc: denied { write } for pid=4824 comm="syz.1.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 502.884982][ T30] audit: type=1400 audit(502.410:166): avc: denied { create } for pid=4890 comm="syz.0.697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 512.284343][ T30] audit: type=1400 audit(511.810:167): avc: denied { read } for pid=4965 comm="syz.0.733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 514.766156][ T30] audit: type=1400 audit(514.290:168): avc: denied { setattr } for pid=4982 comm="syz.0.741" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 516.477456][ T30] audit: type=1400 audit(516.010:169): avc: denied { ioctl } for pid=4994 comm="syz.0.747" path="socket:[9039]" dev="sockfs" ino=9039 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 518.785043][ T30] audit: type=1400 audit(518.320:170): avc: denied { getopt } for pid=5015 comm="syz.1.758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 540.245635][ T30] audit: type=1400 audit(539.770:171): avc: denied { mount } for pid=5168 comm="syz.1.830" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 540.257317][ T30] audit: type=1400 audit(539.790:172): avc: denied { remount } for pid=5168 comm="syz.1.830" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 540.314928][ T30] audit: type=1400 audit(539.850:173): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 549.423856][ T30] audit: type=1400 audit(548.950:174): avc: denied { connect } for pid=5243 comm="syz.0.867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 555.667924][ T5300] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5300 comm=syz.1.892 [ 559.232689][ T30] audit: type=1400 audit(558.760:175): avc: denied { mount } for pid=5329 comm="syz.1.907" name="/" dev="ramfs" ino=10550 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 559.246617][ T30] audit: type=1400 audit(558.780:176): avc: denied { remount } for pid=5329 comm="syz.1.907" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 559.340931][ T30] audit: type=1400 audit(558.870:177): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 563.522942][ T30] audit: type=1400 audit(563.050:178): avc: denied { read append } for pid=5356 comm="syz.0.921" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 563.524819][ T30] audit: type=1400 audit(563.050:179): avc: denied { open } for pid=5356 comm="syz.0.921" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 563.546867][ T30] audit: type=1400 audit(563.080:180): avc: denied { ioctl } for pid=5356 comm="syz.0.921" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x700a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 567.514735][ T30] audit: type=1400 audit(567.020:181): avc: denied { create } for pid=5390 comm="syz.0.937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 567.608366][ T30] audit: type=1400 audit(567.140:182): avc: denied { write } for pid=5390 comm="syz.0.937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 568.717708][ T30] audit: type=1400 audit(568.250:183): avc: denied { read } for pid=5390 comm="syz.0.937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 571.184254][ T5417] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5417 comm=syz.0.947 [ 571.677158][ T30] audit: type=1400 audit(571.200:184): avc: denied { read write } for pid=5420 comm="syz.0.949" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.677656][ T30] audit: type=1400 audit(571.200:185): avc: denied { open } for pid=5420 comm="syz.0.949" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 572.282819][ T30] audit: type=1400 audit(571.790:186): avc: denied { create } for pid=5423 comm="syz.0.951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 578.167099][ T30] audit: type=1400 audit(577.700:187): avc: denied { block_suspend } for pid=5472 comm="syz.1.975" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 584.048334][ T5514] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5514 comm=syz.1.995 [ 585.438468][ T30] audit: type=1400 audit(584.970:188): avc: denied { mount } for pid=5525 comm="syz.1.1001" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 598.658904][ T30] audit: type=1400 audit(598.190:189): avc: denied { ioctl } for pid=5605 comm="syz.0.1041" path="socket:[11343]" dev="sockfs" ino=11343 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 619.953017][ T30] audit: type=1400 audit(619.490:190): avc: denied { write } for pid=5777 comm="syz.1.1127" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 619.959389][ T30] audit: type=1400 audit(619.490:191): avc: denied { open } for pid=5777 comm="syz.1.1127" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 619.963752][ T5779] random: crng reseeded on system resumption [ 620.028774][ T30] audit: type=1400 audit(619.560:192): avc: denied { ioctl } for pid=5777 comm="syz.1.1127" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3314 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 620.349947][ T30] audit: type=1400 audit(619.880:193): avc: denied { execute } for pid=5781 comm="syz.1.1128" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=11234 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 620.508069][ T30] audit: type=1400 audit(620.040:194): avc: denied { setopt } for pid=5781 comm="syz.1.1128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 623.576741][ T5806] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 624.018610][ T5806] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 624.355286][ T5806] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 624.720311][ T5806] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 626.184535][ T26] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 626.588298][ T26] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 627.004269][ T63] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 627.346670][ T63] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 629.929354][ T30] audit: type=1400 audit(629.460:195): avc: denied { setattr } for pid=3319 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 630.824486][ T31] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 631.044112][ T31] usb 1-1: Using ep0 maxpacket: 32 [ 631.160606][ T31] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 631.164632][ T31] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 631.167527][ T31] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 631.169252][ T31] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 631.170835][ T31] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 631.173727][ T31] usb 1-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 631.175236][ T31] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 631.229930][ T31] usb 1-1: config 0 descriptor?? [ 631.569828][ T31] usblp 1-1:0.0: usblp0: USB Bidirectional printer dev 3 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 641.635477][ T9] usb 1-1: USB disconnect, device number 3 [ 641.916496][ T9] usblp0: removed [ 661.972631][ T30] audit: type=1400 audit(661.490:196): avc: denied { mount } for pid=5921 comm="syz.0.1196" name="/" dev="pstore" ino=2577 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 676.158994][ T992] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 676.399532][ T992] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 676.648878][ T992] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 677.054095][ T992] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 678.235846][ T30] audit: type=1400 audit(677.770:197): avc: denied { read } for pid=3163 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 680.236097][ T30] audit: type=1400 audit(679.760:198): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 683.445958][ T992] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 683.524648][ T992] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 683.596147][ T992] bond0 (unregistering): Released all slaves [ 684.485169][ T992] hsr_slave_0: left promiscuous mode [ 684.544507][ T992] hsr_slave_1: left promiscuous mode [ 684.873324][ T992] veth1_macvtap: left promiscuous mode [ 684.877460][ T992] veth0_macvtap: left promiscuous mode [ 684.904585][ T992] veth1_vlan: left promiscuous mode [ 684.909628][ T992] veth0_vlan: left promiscuous mode [ 692.090249][ T30] audit: type=1400 audit(691.620:199): avc: denied { create } for pid=6053 comm="syz.0.1254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 694.135882][ T30] audit: type=1400 audit(693.670:200): avc: denied { write } for pid=6061 comm="syz.0.1258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 702.562675][ T30] audit: type=1400 audit(702.080:201): avc: denied { node_bind } for pid=6107 comm="syz.0.1274" saddr=172.30.255.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 709.085609][ T5983] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 709.269442][ T5983] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 718.176280][ T5983] hsr_slave_0: entered promiscuous mode [ 718.180742][ T5983] hsr_slave_1: entered promiscuous mode [ 719.287288][ T30] audit: type=1400 audit(718.820:202): avc: denied { ioctl } for pid=6203 comm="syz.0.1303" path="socket:[13017]" dev="sockfs" ino=13017 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 722.946337][ T5983] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 723.027282][ T5983] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 723.099649][ T5983] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 723.195192][ T5983] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 726.580802][ T5983] 8021q: adding VLAN 0 to HW filter on device bond0 [ 728.392983][ T30] audit: type=1400 audit(727.910:203): avc: denied { setattr } for pid=6249 comm="syz.0.1315" name="RAW" dev="sockfs" ino=13774 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 735.894368][ T6293] binder: 6291:6293 ioctl c0306201 0 returned -14 [ 735.915071][ T6293] binder: 6291:6293 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 735.918378][ T6293] binder: 6293 RLIMIT_NICE not set [ 749.591749][ T5983] veth0_vlan: entered promiscuous mode [ 749.830265][ T5983] veth1_vlan: entered promiscuous mode [ 750.880445][ T5983] veth0_macvtap: entered promiscuous mode [ 751.017393][ T5983] veth1_macvtap: entered promiscuous mode [ 752.086903][ T54] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 752.089505][ T54] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 752.116430][ T54] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 752.117096][ T54] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 753.177677][ T30] audit: type=1400 audit(752.710:204): avc: denied { mounton } for pid=5983 comm="syz-executor" path="/syzkaller.UiL0Pd/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 753.338001][ T30] audit: type=1400 audit(752.870:205): avc: denied { mount } for pid=5983 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 753.657110][ T30] audit: type=1400 audit(753.190:206): avc: denied { unmount } for pid=5983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 753.689045][ T30] audit: type=1400 audit(753.220:207): avc: denied { mounton } for pid=5983 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 755.135762][ T30] audit: type=1400 audit(754.670:208): avc: denied { create } for pid=6385 comm="syz.0.1356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 755.160240][ T30] audit: type=1400 audit(754.690:209): avc: denied { write } for pid=6385 comm="syz.0.1356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 755.257014][ T30] audit: type=1400 audit(754.790:210): avc: denied { read } for pid=6385 comm="syz.0.1356" path="socket:[14365]" dev="sockfs" ino=14365 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 808.727700][ T30] audit: type=1400 audit(808.260:211): avc: denied { read } for pid=6575 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 808.763452][ T30] audit: type=1400 audit(808.290:212): avc: denied { open } for pid=6575 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 808.847394][ T26] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 809.323847][ T26] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 810.070017][ T26] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 810.795997][ T26] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 816.319469][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 816.417436][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 816.478534][ T26] bond0 (unregistering): Released all slaves [ 817.032632][ T26] hsr_slave_0: left promiscuous mode [ 817.104330][ T26] hsr_slave_1: left promiscuous mode [ 817.303459][ T26] veth1_macvtap: left promiscuous mode [ 817.305117][ T26] veth0_macvtap: left promiscuous mode [ 817.308533][ T26] veth1_vlan: left promiscuous mode [ 817.312875][ T26] veth0_vlan: left promiscuous mode [ 841.558130][ T6575] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 841.729612][ T6575] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 845.260149][ T30] audit: type=1400 audit(844.790:213): avc: denied { write } for pid=6716 comm="syz.2.1496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 852.069687][ T6575] hsr_slave_0: entered promiscuous mode [ 852.089389][ T6575] hsr_slave_1: entered promiscuous mode [ 852.103161][ T6575] debugfs: 'hsr0' already exists in 'hsr' [ 852.103547][ T6575] Cannot create hsr debugfs directory [ 855.148138][ T6575] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 855.289824][ T6575] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 855.408185][ T6575] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 855.480145][ T6575] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 856.318710][ T6773] block nbd2: shutting down sockets [ 857.055932][ T30] audit: type=1400 audit(856.590:214): avc: denied { ioctl } for pid=6778 comm="syz.2.1513" path="socket:[15784]" dev="sockfs" ino=15784 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 861.928158][ T6575] 8021q: adding VLAN 0 to HW filter on device bond0 [ 864.029324][ T30] audit: type=1400 audit(863.560:215): avc: denied { name_bind } for pid=6808 comm="syz.2.1522" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 888.060412][ T6575] veth0_vlan: entered promiscuous mode [ 888.390384][ T6575] veth1_vlan: entered promiscuous mode [ 889.570469][ T6575] veth0_macvtap: entered promiscuous mode [ 889.725369][ T6575] veth1_macvtap: entered promiscuous mode [ 890.103810][ T26] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 890.111154][ T26] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 890.149826][ T26] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 890.153679][ T26] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 898.320399][ T30] audit: type=1400 audit(897.840:216): avc: denied { getopt } for pid=6966 comm="syz.2.1572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 903.590458][ T30] audit: type=1400 audit(903.100:217): avc: denied { create } for pid=6991 comm="syz.3.1583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 907.229818][ T30] audit: type=1400 audit(906.760:218): avc: denied { append } for pid=7007 comm="syz.3.1591" name="system" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 912.376015][ T30] audit: type=1400 audit(911.910:219): avc: denied { execute } for pid=7033 comm="syz.2.1603" path="/dev/audio1" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 915.943472][ T30] audit: type=1400 audit(915.470:220): avc: denied { bind } for pid=7055 comm="syz.2.1615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 915.944290][ T30] audit: type=1400 audit(915.470:221): avc: denied { node_bind } for pid=7055 comm="syz.2.1615" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 919.621040][ T30] audit: type=1400 audit(919.150:222): avc: denied { accept } for pid=7083 comm="syz.2.1628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 920.884556][ T30] audit: type=1400 audit(920.420:223): avc: denied { map } for pid=7092 comm="syz.3.1633" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 925.727866][ T7122] netlink: 45 bytes leftover after parsing attributes in process `syz.2.1647'. [ 927.354098][ T30] audit: type=1400 audit(926.870:224): avc: denied { bind } for pid=7127 comm="syz.2.1650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 933.118024][ T30] audit: type=1400 audit(932.650:225): avc: denied { write } for pid=7166 comm="syz.2.1670" path="socket:[17445]" dev="sockfs" ino=17445 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 936.655323][ T30] audit: type=1400 audit(936.190:226): avc: denied { write } for pid=7195 comm="syz.3.1684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 936.669978][ T7196] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7196 comm=syz.3.1684 [ 954.192665][ T30] audit: type=1400 audit(953.720:227): avc: denied { read } for pid=7282 comm="syz.3.1726" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 954.197252][ T30] audit: type=1400 audit(953.730:228): avc: denied { open } for pid=7282 comm="syz.3.1726" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 999.419939][ T30] audit: type=1400 audit(998.930:229): avc: denied { create } for pid=7553 comm="syz.3.1857" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 999.461661][ T30] audit: type=1400 audit(998.990:230): avc: denied { mounton } for pid=7553 comm="syz.3.1857" path="/158/file0" dev="tmpfs" ino=827 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 999.918829][ T30] audit: type=1400 audit(999.450:231): avc: denied { unlink } for pid=6575 comm="syz-executor" name="file0" dev="tmpfs" ino=827 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1010.018755][ T30] audit: type=1400 audit(1009.520:232): avc: denied { create } for pid=7612 comm="syz.3.1886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1010.050291][ T30] audit: type=1400 audit(1009.580:233): avc: denied { write } for pid=7612 comm="syz.3.1886" path="socket:[18287]" dev="sockfs" ino=18287 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1026.131092][ T7691] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2304 sclass=netlink_tcpdiag_socket pid=7691 comm=syz.3.1922 [ 1033.165079][ T7725] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7725 comm=syz.2.1939 [ 1041.687345][ T30] audit: type=1400 audit(1041.220:234): avc: denied { read } for pid=7765 comm="syz.3.1960" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1041.696825][ T30] audit: type=1400 audit(1041.220:235): avc: denied { open } for pid=7765 comm="syz.3.1960" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1048.740073][ T7780] deleting an unspecified loop device is not supported. [ 1048.742689][ T30] audit: type=1400 audit(1048.270:236): avc: denied { ioctl } for pid=7765 comm="syz.3.1960" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1059.465861][ T30] audit: type=1400 audit(1059.000:237): avc: denied { mount } for pid=7839 comm="syz.2.1994" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1059.500622][ T30] audit: type=1400 audit(1059.030:238): avc: denied { remount } for pid=7839 comm="syz.2.1994" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1059.704428][ T30] audit: type=1400 audit(1059.230:239): avc: denied { unmount } for pid=5983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1060.523004][ T30] audit: type=1400 audit(1060.040:240): avc: denied { module_load } for pid=7845 comm="syz.3.1997" path=2F6D656D66643A20C736BE918D183229219A25A2D238D606070EFCFE128F2613AE254054A3B03E5CECA9F951403641108C6E7C202864656C6574656429 dev="hugetlbfs" ino=18907 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=system permissive=1 [ 1060.648081][ T7847] Invalid ELF header magic: != ELF [ 1063.745940][ T7871] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7871 comm=syz.2.2009 [ 1072.759311][ T7924] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7924 comm=syz.2.2035 [ 1072.866366][ T7924] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1077.899344][ T30] audit: type=1400 audit(1077.430:241): avc: denied { setopt } for pid=7955 comm="syz.3.2051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1078.793294][ T7964] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7964 comm=syz.3.2055 [ 1088.227418][ T8012] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8012 comm=syz.3.2079 [ 1093.926214][ T30] audit: type=1400 audit(1093.460:242): avc: denied { ioctl } for pid=8038 comm="syz.2.2092" path="socket:[19230]" dev="sockfs" ino=19230 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1096.567535][ T8058] lo speed is unknown, defaulting to 1000 [ 1096.596831][ T8058] lo speed is unknown, defaulting to 1000 [ 1096.639998][ T8058] lo speed is unknown, defaulting to 1000 [ 1096.796782][ T8058] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 1097.027292][ T8058] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 1097.701016][ T8058] lo speed is unknown, defaulting to 1000 [ 1097.794288][ T8058] lo speed is unknown, defaulting to 1000 [ 1115.526388][ T30] audit: type=1400 audit(1115.060:243): avc: denied { write } for pid=8164 comm="syz.2.2151" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1135.020937][ T30] audit: type=1400 audit(1134.550:244): avc: denied { create } for pid=8274 comm="syz.2.2205" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1135.073902][ T30] audit: type=1400 audit(1134.600:245): avc: denied { read } for pid=8274 comm="syz.2.2205" name="file0" dev="tmpfs" ino=2600 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1135.079875][ T30] audit: type=1400 audit(1134.610:246): avc: denied { open } for pid=8274 comm="syz.2.2205" path="/503/file0" dev="tmpfs" ino=2600 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1135.113942][ T30] audit: type=1400 audit(1134.640:247): avc: denied { ioctl } for pid=8274 comm="syz.2.2205" path="/503/file0" dev="tmpfs" ino=2600 ioctlcmd=0x125e scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1135.235097][ T30] audit: type=1400 audit(1134.770:248): avc: denied { unlink } for pid=5983 comm="syz-executor" name="file0" dev="tmpfs" ino=2600 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1137.190411][ T8289] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8289 comm=syz.3.2212 [ 1149.730554][ T8355] usb usb1: usbfs: process 8355 (syz.2.2244) did not claim interface 0 before use [ 1154.750521][ T8380] netlink: 64 bytes leftover after parsing attributes in process `syz.2.2257'. [ 1156.337080][ T30] audit: type=1400 audit(1155.870:249): avc: denied { setopt } for pid=8391 comm="syz.2.2263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1157.199886][ T30] audit: type=1400 audit(1156.730:250): avc: denied { write } for pid=8396 comm="syz.3.2266" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1163.454693][ T8438] netlink: 'syz.3.2286': attribute type 13 has an invalid length. [ 1171.596696][ T26] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1171.600585][ T26] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1171.606466][ T26] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1171.612896][ T26] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1179.395648][ T8511] SELinux: syz.2.2318 (8511) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1193.218564][ T8591] usb usb1: usbfs: process 8591 (syz.3.2358) did not claim interface 0 before use [ 1199.125523][ T30] audit: type=1400 audit(1198.660:251): avc: denied { read } for pid=8639 comm="syz.2.2383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1203.477089][ T30] audit: type=1400 audit(1203.010:252): avc: denied { create } for pid=8667 comm="syz.2.2396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1212.159703][ T8711] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8711 comm=syz.3.2417 [ 1226.312080][ T30] audit: type=1400 audit(1225.840:253): avc: denied { read } for pid=8793 comm="syz.3.2458" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1226.344164][ T30] audit: type=1400 audit(1225.840:254): avc: denied { open } for pid=8793 comm="syz.3.2458" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1226.387209][ T30] audit: type=1400 audit(1225.910:255): avc: denied { map } for pid=8793 comm="syz.3.2458" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1226.460568][ T30] audit: type=1400 audit(1225.990:256): avc: denied { ioctl } for pid=8793 comm="syz.3.2458" path="/dev/usbmon0" dev="devtmpfs" ino=696 ioctlcmd=0x9204 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1230.614513][ T30] audit: type=1400 audit(1230.140:257): avc: denied { write } for pid=8826 comm="syz.3.2475" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1242.408843][ T30] audit: type=1400 audit(1241.940:258): avc: denied { bind } for pid=8892 comm="syz.2.2507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1256.839283][ T8982] block nbd2: shutting down sockets [ 1282.549845][ T30] audit: type=1400 audit(1282.080:259): avc: denied { setopt } for pid=9154 comm="syz.3.2633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1289.646233][ T30] audit: type=1400 audit(1289.180:260): avc: denied { ioctl } for pid=9205 comm="syz.3.2658" path="socket:[23036]" dev="sockfs" ino=23036 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1303.149097][ T30] audit: type=1400 audit(1302.680:261): avc: denied { read } for pid=9298 comm="syz.2.2702" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1313.903372][ T30] audit: type=1400 audit(1313.440:262): avc: denied { accept } for pid=9365 comm="syz.3.2735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1343.786587][ T30] audit: type=1400 audit(1343.320:263): avc: denied { connect } for pid=9517 comm="syz.2.2807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1357.146366][ T30] audit: type=1400 audit(1356.680:264): avc: denied { append } for pid=9600 comm="syz.3.2846" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1378.994941][ T30] audit: type=1400 audit(1378.530:265): avc: denied { getopt } for pid=9750 comm="syz.2.2920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1386.970236][ T9801] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9801 comm=syz.3.2945 [ 1397.245363][ T9857] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=9857 comm=syz.3.2970 [ 1398.578170][ T9863] netlink: 'syz.2.2975': attribute type 29 has an invalid length. [ 1398.615352][ T9863] netlink: 'syz.2.2975': attribute type 29 has an invalid length. [ 1401.386608][ T30] audit: type=1400 audit(1400.920:266): avc: denied { execute } for pid=9886 comm="syz.2.2987" name="file0" dev="tmpfs" ino=4618 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1402.887389][ T30] audit: type=1400 audit(1402.420:267): avc: denied { mounton } for pid=9898 comm="syz.3.2994" path="/725/bus" dev="tmpfs" ino=3743 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1402.937510][ T30] audit: type=1400 audit(1402.460:268): avc: denied { unmount } for pid=6575 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1404.646972][ T9912] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2999'. [ 1406.715246][ T30] audit: type=1400 audit(1406.250:269): avc: denied { getopt } for pid=9923 comm="syz.3.3006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1446.613695][T10183] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10183 comm=syz.2.3132 [ 1449.232657][ T30] audit: type=1400 audit(1448.760:270): avc: denied { read } for pid=10200 comm="syz.2.3141" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1450.113976][ T30] audit: type=1400 audit(1449.650:271): avc: denied { ioctl } for pid=10207 comm="syz.2.3145" path="socket:[27738]" dev="sockfs" ino=27738 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1453.260404][ T30] audit: type=1400 audit(1452.790:272): avc: denied { read } for pid=10228 comm="syz.3.3156" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1453.302937][ T30] audit: type=1400 audit(1452.790:273): avc: denied { open } for pid=10228 comm="syz.3.3156" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1475.136549][T10357] netlink: 56 bytes leftover after parsing attributes in process `syz.3.3218'. [ 1475.147857][T10357] netlink: 56 bytes leftover after parsing attributes in process `syz.3.3218'. [ 1482.260319][ T30] audit: type=1400 audit(1481.790:274): avc: denied { write } for pid=10414 comm="syz.2.3247" path="socket:[27261]" dev="sockfs" ino=27261 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1499.053398][ T30] audit: type=1400 audit(1498.580:275): avc: denied { bind } for pid=10517 comm="syz.2.3298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1511.899934][ T30] audit: type=1400 audit(1511.430:276): avc: denied { getopt } for pid=10568 comm="syz.3.3323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1522.638075][ T30] audit: type=1400 audit(1522.150:277): avc: denied { create } for pid=10619 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1522.682433][ T30] audit: type=1400 audit(1522.200:278): avc: denied { write open } for pid=10619 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=6843 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1522.704705][ T30] audit: type=1400 audit(1522.240:279): avc: denied { append } for pid=10619 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=6843 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1522.845836][ T30] audit: type=1400 audit(1522.380:280): avc: denied { getattr } for pid=10619 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1523.949257][ T30] audit: type=1400 audit(1523.480:281): avc: denied { read } for pid=10633 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1525.813290][ T30] audit: type=1400 audit(1525.340:282): avc: denied { unlink } for pid=10639 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=6843 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1527.713763][T10656] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10656 comm=syz.3.3363 [ 1537.989328][ T30] audit: type=1400 audit(1537.520:283): avc: denied { map } for pid=10721 comm="syz.2.3394" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28481 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1537.990954][ T30] audit: type=1400 audit(1537.520:284): avc: denied { read write } for pid=10721 comm="syz.2.3394" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28481 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1546.693713][T10768] SELinux: Context system_u:object_r:hald_var_run_t:s0 is not valid (left unmapped). [ 1546.724426][ T30] audit: type=1400 audit(1546.230:285): avc: denied { relabelto } for pid=10767 comm="syz.3.3416" name="file0" dev="tmpfs" ino=4861 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 1546.725332][ T30] audit: type=1400 audit(1546.250:286): avc: denied { associate } for pid=10767 comm="syz.3.3416" name="file0" dev="tmpfs" ino=4861 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hald_var_run_t:s0" [ 1546.889477][ T30] audit: type=1400 audit(1546.370:287): avc: denied { unlink } for pid=6575 comm="syz-executor" name="file0" dev="tmpfs" ino=4861 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 1546.949593][ T30] audit: type=1400 audit(1546.480:288): avc: denied { listen } for pid=10769 comm="syz.2.3417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1551.226360][ T30] audit: type=1400 audit(1550.760:289): avc: denied { setattr } for pid=10797 comm="syz.3.3431" name="ptmx" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 1554.457924][T10823] usb usb1: usbfs: process 10823 (syz.3.3443) did not claim interface 6 before use [ 1554.999241][T10827] ptrace attach of "/syz-executor exec"[10829] was attempted by "/syz-executor exec"[10827] [ 1564.077458][ T30] audit: type=1400 audit(1563.610:290): avc: denied { read } for pid=10881 comm="syz.3.3473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1569.270519][ T30] audit: type=1400 audit(1568.800:291): avc: denied { sqpoll } for pid=10909 comm="syz.2.3485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1602.426659][T11110] snd_dummy snd_dummy.0: control 0:0:0:syz1:0 is already present [ 1609.568076][T11167] netlink: 'syz.2.3609': attribute type 29 has an invalid length. [ 1611.177347][ T30] audit: type=1400 audit(1610.710:292): avc: denied { map } for pid=11175 comm="syz.3.3614" path="socket:[30269]" dev="sockfs" ino=30269 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1625.113975][T11275] Injecting memory failure for pfn 0x7116c at process virtual address 0x2036c000 [ 1625.118705][T11275] Memory failure: 0x7116c: recovery action for unsplit thp: Failed [ 1626.506008][T11285] usb usb1: usbfs: process 11285 (syz.3.3666) did not claim interface 0 before use [ 1652.229853][ T30] audit: type=1400 audit(1651.760:293): avc: denied { read } for pid=11437 comm="syz.2.3740" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1652.235908][ T30] audit: type=1400 audit(1651.760:294): avc: denied { open } for pid=11437 comm="syz.2.3740" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1657.479565][T11463] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2305 sclass=netlink_route_socket pid=11463 comm=syz.3.3750 [ 1664.824028][ T30] audit: type=1400 audit(1664.350:295): avc: denied { setattr } for pid=11508 comm="syz.2.3772" name="" dev="pipefs" ino=12644 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1678.114442][ T30] audit: type=1400 audit(1677.650:296): avc: denied { read } for pid=11609 comm="syz.3.3821" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1678.121123][ T30] audit: type=1400 audit(1677.650:297): avc: denied { open } for pid=11609 comm="syz.3.3821" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1678.209137][ T30] audit: type=1400 audit(1677.690:298): avc: denied { ioctl } for pid=11609 comm="syz.3.3821" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1681.716926][ T30] audit: type=1400 audit(1681.250:299): avc: denied { shutdown } for pid=11641 comm="syz.2.3838" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1681.720014][ T30] audit: type=1400 audit(1681.250:300): avc: denied { read } for pid=11641 comm="syz.2.3838" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1690.063199][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 1690.064091][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 1690.064446][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 1690.064587][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 1690.064816][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 1690.065071][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 1690.065325][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 1690.065583][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 1690.065883][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 1690.066145][ T23] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 1690.150592][ T23] hid-generic 0003:0004:0000.0001: hidraw0: USB HID v0.00 Device [syz0] on syz1 [ 1692.856586][T11696] fido_id[11696]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1693.240431][T10707] hid-generic 0000:007F:FFFFFFFE.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1700.479478][T11743] fido_id[11743]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1701.464727][ T30] audit: type=1400 audit(1700.980:301): avc: denied { relabelfrom } for pid=11761 comm="syz.2.3894" name="NETLINK" dev="sockfs" ino=32270 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1701.472013][ T30] audit: type=1400 audit(1701.000:302): avc: denied { relabelto } for pid=11761 comm="syz.2.3894" name="NETLINK" dev="sockfs" ino=32270 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_audit_socket permissive=1 [ 1706.839298][ T30] audit: type=1400 audit(1706.370:303): avc: denied { mount } for pid=11789 comm="syz.3.3908" name="/" dev="configfs" ino=1097 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1714.442172][ T30] audit: type=1400 audit(1713.970:304): avc: denied { write } for pid=11835 comm="syz.3.3929" path="socket:[31714]" dev="sockfs" ino=31714 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1717.704374][ T30] audit: type=1400 audit(1717.220:305): avc: denied { mount } for pid=11862 comm="syz.2.3943" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1717.730113][ T30] audit: type=1400 audit(1717.260:306): avc: denied { remount } for pid=11862 comm="syz.2.3943" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1717.866998][ T30] audit: type=1400 audit(1717.400:307): avc: denied { unmount } for pid=5983 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1727.236583][T11914] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=11914 comm=syz.2.3968 [ 1727.809418][T11916] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11916 comm=syz.3.3969 [ 1731.613391][ T30] audit: type=1400 audit(1731.150:308): avc: denied { write } for pid=11944 comm="syz.3.3984" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1731.641022][ T30] audit: type=1400 audit(1731.170:309): avc: denied { ioctl } for pid=11944 comm="syz.3.3984" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9377 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1736.476256][ T30] audit: type=1400 audit(1735.990:310): avc: denied { setattr } for pid=11976 comm="syz.2.3999" name="nbd2" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1740.533487][ T30] audit: type=1400 audit(1740.060:311): avc: denied { name_bind } for pid=11995 comm="syz.2.4007" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 1740.590586][T11997] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11997 comm=syz.3.4008 [ 1760.074027][ T30] audit: type=1400 audit(1759.600:312): avc: denied { read } for pid=12140 comm="syz.2.4079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1764.483333][ T30] audit: type=1400 audit(1764.010:313): avc: denied { ioctl } for pid=12161 comm="syz.3.4088" path="socket:[33945]" dev="sockfs" ino=33945 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1784.050702][T12299] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12299 comm=syz.2.4155 [ 1836.760817][T10121] hid_parser_main: 51 callbacks suppressed [ 1836.772317][T10121] hid-generic 0000:0006:0007.0003: unknown main item tag 0x0 [ 1836.774707][T10121] hid-generic 0000:0006:0007.0003: unknown main item tag 0x0 [ 1836.777554][T10121] hid-generic 0000:0006:0007.0003: unknown main item tag 0x0 [ 1836.779054][T10121] hid-generic 0000:0006:0007.0003: unknown main item tag 0x0 [ 1836.780437][T10121] hid-generic 0000:0006:0007.0003: unknown main item tag 0x0 [ 1836.783937][T10121] hid-generic 0000:0006:0007.0003: unknown main item tag 0x0 [ 1836.785149][T10121] hid-generic 0000:0006:0007.0003: unknown main item tag 0x0 [ 1836.787308][T10121] hid-generic 0000:0006:0007.0003: unknown main item tag 0x0 [ 1836.788446][T10121] hid-generic 0000:0006:0007.0003: unknown main item tag 0x0 [ 1836.789579][T10121] hid-generic 0000:0006:0007.0003: unknown main item tag 0x0 [ 1836.896575][T10121] hid-generic 0000:0006:0007.0003: hidraw0: HID v0.0b Device [syz1] on syz1 [ 1839.148523][T12575] fido_id[12575]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1853.340959][ T30] audit: type=1400 audit(1852.870:314): avc: denied { mounton } for pid=12618 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1854.305015][ T5988] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1855.057492][ T5988] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1855.465774][ T5988] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1855.905044][ T5988] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1861.473807][ T5988] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1861.542524][ T5988] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1861.594586][ T5988] bond0 (unregistering): Released all slaves [ 1862.204600][ T5988] hsr_slave_0: left promiscuous mode [ 1862.245395][ T5988] hsr_slave_1: left promiscuous mode [ 1862.579414][ T5988] veth1_macvtap: left promiscuous mode [ 1862.606691][ T5988] veth0_macvtap: left promiscuous mode [ 1862.608964][ T5988] veth1_vlan: left promiscuous mode [ 1862.610059][ T5988] veth0_vlan: left promiscuous mode [ 1869.035764][ T30] audit: type=1400 audit(1868.570:315): avc: denied { name_bind } for pid=12680 comm="syz.3.4333" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1870.886011][ T6929] lo speed is unknown, defaulting to 1000 [ 1870.890217][ T6929] syz0: Port: 1 Link DOWN [ 1874.828764][ T30] audit: type=1400 audit(1874.360:316): avc: denied { write } for pid=12704 comm="syz.3.4341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1883.319420][ T30] audit: type=1400 audit(1882.850:317): avc: denied { create } for pid=12747 comm="syz.3.4354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1885.198070][T12618] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1885.527981][T12618] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1896.680354][T12618] hsr_slave_0: entered promiscuous mode [ 1896.729720][T12618] hsr_slave_1: entered promiscuous mode [ 1902.329183][T12618] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1902.500467][T12618] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1902.660959][T12618] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1902.768787][ T30] audit: type=1400 audit(1902.290:318): avc: denied { name_bind } for pid=12826 comm="syz.3.4382" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1902.908583][T12618] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1910.807231][T12618] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1924.007619][T12918] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pid=12918 comm=syz.3.4402 [ 1937.846636][T12618] veth0_vlan: entered promiscuous mode [ 1937.969166][T12618] veth1_vlan: entered promiscuous mode [ 1938.229779][T12618] veth0_macvtap: entered promiscuous mode [ 1938.297481][T12618] veth1_macvtap: entered promiscuous mode [ 1938.979480][ T5988] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1938.995216][ T5988] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1938.997882][ T5988] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1939.000352][ T5988] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1940.385956][ T30] audit: type=1400 audit(1939.920:319): avc: denied { mounton } for pid=12618 comm="syz-executor" path="/syzkaller.qVeneP/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1972.418347][ T30] audit: type=1400 audit(1971.910:320): avc: denied { name_bind } for pid=13159 comm="syz.3.4500" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 2034.045698][T13510] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13510 comm=syz.4.4668 [ 2042.916129][T13565] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=13565 comm=syz.4.4695 [ 2045.155877][T13583] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13583 comm=syz.3.4704 [ 2047.190562][T13599] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1549 sclass=netlink_route_socket pid=13599 comm=syz.4.4712 [ 2057.380714][ T30] audit: type=1400 audit(2056.906:321): avc: denied { ioctl } for pid=13656 comm="syz.4.4739" path="socket:[38604]" dev="sockfs" ino=38604 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2060.570479][ T30] audit: type=1400 audit(2060.096:322): avc: denied { read } for pid=13679 comm="syz.4.4750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2070.374229][T13738] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13738 comm=syz.4.4779 [ 2080.758804][T13789] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13789 comm=syz.4.4804 [ 2103.065861][T13919] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13919 comm=syz.4.4865 [ 2117.502616][ T30] audit: type=1400 audit(2117.026:323): avc: denied { compute_member } for pid=14002 comm="syz.4.4904" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 2173.932717][ T30] audit: type=1400 audit(2173.456:324): avc: denied { remount } for pid=14264 comm="syz.4.5030" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2189.030064][ T30] audit: type=1400 audit(2188.556:325): avc: denied { mount } for pid=14341 comm="syz.3.5068" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 2202.708955][ T30] audit: type=1400 audit(2202.236:326): avc: denied { module_load } for pid=14436 comm="syz.3.5114" path="/sys/power/wakeup_count" dev="sysfs" ino=874 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 2219.687388][T14559] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14559 comm=syz.4.5172 [ 2232.595226][ T30] audit: type=1400 audit(2232.116:327): avc: denied { connect } for pid=14632 comm="syz.3.5207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2234.534046][ T30] audit: type=1400 audit(2234.026:328): avc: denied { mount } for pid=14643 comm="syz.4.5212" name="/" dev="autofs" ino=41717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 2236.009687][T14653] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14653 comm=syz.4.5217 [ 2238.948360][T14668] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=14668 comm=syz.4.5223 [ 2245.034754][ T30] audit: type=1400 audit(2244.546:329): avc: denied { remount } for pid=14708 comm="syz.3.5243" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2258.055496][ T30] audit: type=1400 audit(2257.566:330): avc: denied { ioctl } for pid=14785 comm="syz.3.5279" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0xe501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2277.478498][ T30] audit: type=1400 audit(2277.006:331): avc: denied { setopt } for pid=14885 comm="syz.3.5326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2278.918922][ T30] audit: type=1400 audit(2278.446:332): avc: denied { getopt } for pid=14894 comm="syz.3.5330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2282.752533][T14921] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14921 comm=syz.3.5342 [ 2282.813940][T14922] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14922 comm=syz.4.5343 [ 2289.127597][T14963] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14963 comm=syz.3.5363 [ 2299.373829][T15039] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15039 comm=syz.3.5400 [ 2308.054395][T15099] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15099 comm=syz.3.5429 [ 2309.154189][T15109] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15109 comm=syz.4.5434 [ 2319.714049][ T30] audit: type=1400 audit(2319.216:333): avc: denied { connect } for pid=15187 comm="syz.4.5473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2355.813841][ T30] audit: type=1400 audit(2355.336:334): avc: denied { watch watch_reads } for pid=15432 comm="syz.4.5593" path="/594" dev="tmpfs" ino=3142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2361.977853][T15470] loop0: detected capacity change from 0 to 2000 [ 2372.507220][T15524] syz.4.5636: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 2372.518012][T15524] CPU: 1 UID: 0 PID: 15524 Comm: syz.4.5636 Not tainted syzkaller #0 PREEMPT [ 2372.518137][T15524] Hardware name: linux,dummy-virt (DT) [ 2372.518476][T15524] Call trace: [ 2372.518719][T15524] show_stack+0x18/0x24 (C) [ 2372.519565][T15524] dump_stack_lvl+0xdc/0xf4 [ 2372.519635][T15524] dump_stack+0x1c/0x28 [ 2372.519683][T15524] warn_alloc+0x1c0/0x308 [ 2372.519799][T15524] __vmalloc_node_range_noprof+0xaa4/0xe60 [ 2372.519853][T15524] vmalloc_user_noprof+0xe4/0x128 [ 2372.519898][T15524] xskq_create+0xd4/0x174 [ 2372.519941][T15524] xsk_setsockopt+0x370/0x624 [ 2372.519982][T15524] do_sock_setsockopt+0x17c/0x354 [ 2372.520034][T15524] __sys_setsockopt+0xcc/0x164 [ 2372.520075][T15524] __arm64_sys_setsockopt+0xa4/0x100 [ 2372.520136][T15524] invoke_syscall+0x6c/0x258 [ 2372.520184][T15524] el0_svc_common.constprop.0+0xac/0x230 [ 2372.520227][T15524] do_el0_svc_compat+0x40/0x68 [ 2372.520277][T15524] el0_svc_compat+0x4c/0x184 [ 2372.520324][T15524] el0t_32_sync_handler+0x88/0xac [ 2372.520367][T15524] el0t_32_sync+0x19c/0x1a0 [ 2372.520693][T15524] Mem-Info: [ 2372.547511][T15524] active_anon:4369 inactive_anon:0 isolated_anon:0 [ 2372.547511][T15524] active_file:12513 inactive_file:4497 isolated_file:0 [ 2372.547511][T15524] unevictable:768 dirty:28 writeback:0 [ 2372.547511][T15524] slab_reclaimable:7664 slab_unreclaimable:59144 [ 2372.547511][T15524] mapped:2712 shmem:826 pagetables:1054 [ 2372.547511][T15524] sec_pagetables:0 bounce:0 [ 2372.547511][T15524] kernel_misc_reclaimable:0 [ 2372.547511][T15524] free:263633 free_pcp:5281 free_cma:8000 [ 2372.548289][T15524] Node 0 active_anon:17404kB inactive_anon:0kB active_file:50052kB inactive_file:17988kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:10848kB dirty:112kB writeback:0kB shmem:3304kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:6848kB pagetables:4216kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 2372.553393][T15524] Node 0 DMA free:1054532kB boost:0kB min:22528kB low:28160kB high:33792kB reserved_highatomic:0KB free_highatomic:0KB active_anon:17404kB inactive_anon:0kB active_file:50052kB inactive_file:17988kB unevictable:3072kB writepending:112kB present:2097152kB managed:1532220kB mlocked:0kB bounce:0kB free_pcp:21124kB local_pcp:7904kB free_cma:32000kB [ 2372.553942][T15524] lowmem_reserve[]: 0 0 0 0 0 [ 2372.554342][T15524] Node 0 DMA: 2253*4kB (UME) 756*8kB (UM) 195*16kB (UME) 330*32kB (UM) 160*64kB (UME) 100*128kB (UM) 59*256kB (UMEC) 37*512kB (UME) 22*1024kB (UMC) 18*2048kB (UMC) 222*4096kB (UMC) = 1054532kB [ 2372.570612][T15524] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2372.570754][T15524] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=32768kB [ 2372.570803][T15524] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2372.570844][T15524] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=64kB [ 2372.570960][T15524] 17832 total pagecache pages [ 2372.571068][T15524] 0 pages in swap cache [ 2372.571507][T15524] Free swap = 124996kB [ 2372.605201][T15524] Total swap = 124996kB [ 2372.606204][T15524] 524288 pages RAM [ 2372.606436][T15524] 0 pages HighMem/MovableOnly [ 2372.606636][T15524] 141233 pages reserved [ 2372.606833][T15524] 8192 pages cma reserved [ 2372.607057][T15524] 1 pages hwpoisoned [ 2398.576505][T15698] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2398.617432][T15698] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2399.235875][T15702] ======================================================= [ 2399.235875][T15702] WARNING: The mand mount option has been deprecated and [ 2399.235875][T15702] and is ignored by this kernel. Remove the mand [ 2399.235875][T15702] option from the mount to silence this warning. [ 2399.235875][T15702] ======================================================= [ 2408.277260][ T30] audit: type=1400 audit(2407.796:335): avc: denied { ioctl } for pid=15765 comm="syz.3.5754" path="socket:[45680]" dev="sockfs" ino=45680 ioctlcmd=0x89b0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2436.163814][ T30] audit: type=1400 audit(2435.676:336): avc: denied { append } for pid=15986 comm="syz.3.5864" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2436.184951][ T30] audit: type=1400 audit(2435.716:337): avc: denied { append } for pid=15986 comm="syz.3.5864" name="loop6" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2436.199792][T15987] loop6: detected capacity change from 0 to 524287999 [ 2436.333909][T15989] 4¥: renamed from wg0 (while UP) [ 2448.653869][T16033] serio: Serial port ptm0 [ 2457.473138][T16091] nbd0: detected capacity change from 0 to 127 [ 2457.513964][T16095] block nbd0: Receive control failed (result -32) [ 2457.517909][ T48] block nbd0: Receive control failed (result -32) [ 2457.557529][T16029] [ 2457.560658][T16029] ====================================================== [ 2457.562494][T16029] WARNING: possible circular locking dependency detected [ 2457.562989][T16029] syzkaller #0 Not tainted [ 2457.563325][T16029] ------------------------------------------------------ [ 2457.563743][T16029] udevd/16029 is trying to acquire lock: [ 2457.564144][T16029] ffff000017a95870 (&nsock->tx_lock){+.+.}-{4:4}, at: nbd_queue_rq+0x2cc/0xb54 [ 2457.566422][T16029] [ 2457.566422][T16029] but task is already holding lock: [ 2457.566822][T16029] ffff000012be51f8 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 2457.567639][T16029] [ 2457.567639][T16029] which lock already depends on the new lock. [ 2457.567639][T16029] [ 2457.568144][T16029] [ 2457.568144][T16029] the existing dependency chain (in reverse order) is: [ 2457.568581][T16029] [ 2457.568581][T16029] -> #6 (&cmd->lock){+.+.}-{4:4}: [ 2457.569423][T16029] __mutex_lock+0x144/0xffc [ 2457.570003][T16029] mutex_lock_nested+0x24/0x30 [ 2457.570636][T16029] nbd_queue_rq+0xa8/0xb54 [ 2457.571162][T16029] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 2457.571792][T16029] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 2457.572624][T16029] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 2457.573239][T16029] blk_mq_run_hw_queue+0x1e4/0x500 [ 2457.574092][T16029] blk_mq_dispatch_list+0x348/0xa50 [ 2457.574607][T16029] blk_mq_flush_plug_list+0xe8/0x508 [ 2457.574993][T16029] __blk_flush_plug+0x208/0x3b8 [ 2457.575453][T16029] __submit_bio+0x3a4/0x4ac [ 2457.575942][T16029] submit_bio_noacct_nocheck+0x59c/0xa8c [ 2457.576317][T16029] submit_bio_noacct+0x858/0x18f8 [ 2457.576798][T16029] submit_bio+0x32c/0x5f0 [ 2457.577133][T16029] submit_bh_wbc+0x310/0x480 [ 2457.577472][T16029] block_read_full_folio+0x2ac/0x640 [ 2457.577999][T16029] blkdev_read_folio+0x1c/0x28 [ 2457.578430][T16029] filemap_read_folio+0xac/0x1fc [ 2457.578769][T16029] do_read_cache_folio+0x1c4/0x480 [ 2457.579231][T16029] read_cache_folio+0x44/0x6c [ 2457.579546][T16029] read_part_sector+0xac/0x5f4 [ 2457.579861][T16029] read_lba+0x15c/0x2ec [ 2457.580322][T16029] efi_partition+0x1dc/0x2154 [ 2457.580723][T16029] bdev_disk_changed+0x508/0xf0c [ 2457.581174][T16029] blkdev_get_whole+0x144/0x1e4 [ 2457.581628][T16029] bdev_open+0x1dc/0xa84 [ 2457.582147][T16029] blkdev_open+0x270/0x3dc [ 2457.582533][T16029] do_dentry_open+0x6a4/0x103c [ 2457.582929][T16029] vfs_open+0x5c/0x2fc [ 2457.583328][T16029] path_openat+0x1490/0x24b4 [ 2457.583655][T16029] do_filp_open+0x184/0x360 [ 2457.584133][T16029] do_sys_openat2+0xe0/0x160 [ 2457.584478][T16029] __arm64_sys_openat+0x12c/0x1bc [ 2457.584804][T16029] invoke_syscall+0x6c/0x258 [ 2457.585122][T16029] el0_svc_common.constprop.0+0xac/0x230 [ 2457.585592][T16029] do_el0_svc+0x40/0x58 [ 2457.585929][T16029] el0_svc+0x50/0x1a0 [ 2457.586266][T16029] el0t_64_sync_handler+0xa0/0xe4 [ 2457.586637][T16029] el0t_64_sync+0x198/0x19c [ 2457.587135][T16029] [ 2457.587135][T16029] -> #5 (set->srcu){.+.+}-{0:0}: [ 2457.588086][T16029] __synchronize_srcu+0xa8/0x268 [ 2457.588458][T16029] synchronize_srcu+0x12c/0x370 [ 2457.588938][T16029] blk_mq_quiesce_queue+0xf4/0x15c [ 2457.589303][T16029] elevator_switch+0x11c/0x414 [ 2457.589631][T16029] elevator_change+0x294/0x424 [ 2457.590440][T16029] elevator_set_default+0x22c/0x2ac [ 2457.590870][T16029] blk_register_queue+0x278/0x3ac [ 2457.591575][T16029] __add_disk+0x518/0xb80 [ 2457.591898][T16029] add_disk_fwnode+0x114/0x4c0 [ 2457.592567][T16029] device_add_disk+0x14/0x20 [ 2457.593016][T16029] nbd_dev_add+0x5f0/0x9c0 [ 2457.593339][T16029] nbd_init+0xd4/0x1a8 [ 2457.593660][T16029] do_one_initcall+0x130/0x7f0 [ 2457.594175][T16029] kernel_init_freeable+0x48c/0x70c [ 2457.594743][T16029] kernel_init+0x24/0x1dc [ 2457.595076][T16029] ret_from_fork+0x10/0x20 [ 2457.595489][T16029] [ 2457.595489][T16029] -> #4 (&q->elevator_lock){+.+.}-{4:4}: [ 2457.596211][T16029] __mutex_lock+0x144/0xffc [ 2457.596535][T16029] mutex_lock_nested+0x24/0x30 [ 2457.596866][T16029] elevator_change+0x130/0x424 [ 2457.597447][T16029] elevator_set_none+0x90/0xe4 [ 2457.597867][T16029] __blk_mq_update_nr_hw_queues+0x3b4/0xd38 [ 2457.598233][T16029] blk_mq_update_nr_hw_queues+0x44/0x68 [ 2457.598577][T16029] nbd_start_device+0x128/0xa38 [ 2457.599037][T16029] nbd_genl_connect+0xcb4/0x14c4 [ 2457.599479][T16029] genl_family_rcv_msg_doit+0x1b8/0x280 [ 2457.599947][T16029] genl_rcv_msg+0x3ec/0x5bc [ 2457.600310][T16029] netlink_rcv_skb+0x19c/0x338 [ 2457.600631][T16029] genl_rcv+0x38/0x50 [ 2457.600986][T16029] netlink_unicast+0x424/0x700 [ 2457.601330][T16029] netlink_sendmsg+0x644/0xa54 [ 2457.601724][T16029] __sock_sendmsg+0xc8/0x168 [ 2457.602190][T16029] ____sys_sendmsg+0x500/0x764 [ 2457.602511][T16029] ___sys_sendmsg+0x11c/0x19c [ 2457.602833][T16029] __sys_sendmsg+0x114/0x19c [ 2457.603318][T16029] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 2457.603712][T16029] invoke_syscall+0x6c/0x258 [ 2457.604178][T16029] el0_svc_common.constprop.0+0xac/0x230 [ 2457.604545][T16029] do_el0_svc_compat+0x40/0x68 [ 2457.604863][T16029] el0_svc_compat+0x4c/0x184 [ 2457.606034][T16029] el0t_32_sync_handler+0x88/0xac [ 2457.606371][T16029] el0t_32_sync+0x19c/0x1a0 [ 2457.606745][T16029] [ 2457.606745][T16029] -> #3 (&q->q_usage_counter(io)#33){++++}-{0:0}: [ 2457.607644][T16029] blk_alloc_queue+0x538/0x644 [ 2457.608182][T16029] blk_mq_alloc_queue+0x144/0x220 [ 2457.608550][T16029] __blk_mq_alloc_disk+0x20/0x1a4 [ 2457.609120][T16029] nbd_dev_add+0x3c0/0x9c0 [ 2457.609440][T16029] nbd_init+0xd4/0x1a8 [ 2457.610184][T16029] do_one_initcall+0x130/0x7f0 [ 2457.610559][T16029] kernel_init_freeable+0x48c/0x70c [ 2457.610996][T16029] kernel_init+0x24/0x1dc [ 2457.611410][T16029] ret_from_fork+0x10/0x20 [ 2457.611889][T16029] [ 2457.611889][T16029] -> #2 (fs_reclaim){+.+.}-{0:0}: [ 2457.612552][T16029] fs_reclaim_acquire+0x138/0x160 [ 2457.612909][T16029] kmem_cache_alloc_node_noprof+0x64/0x3b8 [ 2457.613296][T16029] __alloc_skb+0x208/0x2f0 [ 2457.613627][T16029] tcp_stream_alloc_skb+0x2c/0x450 [ 2457.613993][T16029] tcp_sendmsg_locked+0xf34/0x39e8 [ 2457.614343][T16029] tcp_sendmsg+0x38/0x60 [ 2457.614679][T16029] inet_sendmsg+0x90/0xd4 [ 2457.615033][T16029] __sock_sendmsg+0xc8/0x168 [ 2457.615408][T16029] sock_write_iter+0x1cc/0x300 [ 2457.615739][T16029] vfs_write+0x7bc/0xb88 [ 2457.616184][T16029] ksys_write+0x18c/0x1d8 [ 2457.616543][T16029] __arm64_sys_write+0x6c/0x9c [ 2457.616896][T16029] invoke_syscall+0x6c/0x258 [ 2457.617308][T16029] el0_svc_common.constprop.0+0xac/0x230 [ 2457.617698][T16029] do_el0_svc+0x40/0x58 [ 2457.618033][T16029] el0_svc+0x50/0x1a0 [ 2457.618373][T16029] el0t_64_sync_handler+0xa0/0xe4 [ 2457.618729][T16029] el0t_64_sync+0x198/0x19c [ 2457.619078][T16029] [ 2457.619078][T16029] -> #1 (sk_lock-AF_INET){+.+.}-{0:0}: [ 2457.619773][T16029] lock_sock_nested+0x38/0xe8 [ 2457.620126][T16029] inet_shutdown+0x50/0x348 [ 2457.620446][T16029] kernel_sock_shutdown+0x54/0x84 [ 2457.620795][T16029] nbd_mark_nsock_dead+0x100/0x534 [ 2457.621201][T16029] sock_shutdown+0x134/0x234 [ 2457.621692][T16029] nbd_config_put+0x154/0x5b0 [ 2457.622570][T16029] nbd_release+0x7c/0x128 [ 2457.622914][T16029] blkdev_put_whole+0x98/0xf0 [ 2457.623292][T16029] bdev_release+0x2a4/0x510 [ 2457.623654][T16029] blkdev_release+0x14/0x24 [ 2457.624137][T16029] __fput+0x2c8/0x954 [ 2457.624443][T16029] ____fput+0x14/0x20 [ 2457.624786][T16029] task_work_run+0x128/0x210 [ 2457.625118][T16029] do_notify_resume+0x1d8/0x260 [ 2457.625521][T16029] el0_svc_compat+0x104/0x184 [ 2457.625878][T16029] el0t_32_sync_handler+0x88/0xac [ 2457.626223][T16029] el0t_32_sync+0x19c/0x1a0 [ 2457.626534][T16029] [ 2457.626534][T16029] -> #0 (&nsock->tx_lock){+.+.}-{4:4}: [ 2457.627242][T16029] __lock_acquire+0x1638/0x2380 [ 2457.627574][T16029] lock_acquire+0x310/0x38c [ 2457.627891][T16029] __mutex_lock+0x144/0xffc [ 2457.628236][T16029] mutex_lock_nested+0x24/0x30 [ 2457.628553][T16029] nbd_queue_rq+0x2cc/0xb54 [ 2457.628877][T16029] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 2457.629256][T16029] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 2457.629624][T16029] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 2457.629993][T16029] blk_mq_run_hw_queue+0x1e4/0x500 [ 2457.630337][T16029] blk_mq_dispatch_list+0x348/0xa50 [ 2457.630678][T16029] blk_mq_flush_plug_list+0xe8/0x508 [ 2457.631190][T16029] __blk_flush_plug+0x208/0x3b8 [ 2457.631602][T16029] __submit_bio+0x3a4/0x4ac [ 2457.631907][T16029] submit_bio_noacct_nocheck+0x59c/0xa8c [ 2457.632346][T16029] submit_bio_noacct+0x858/0x18f8 [ 2457.632694][T16029] submit_bio+0x32c/0x5f0 [ 2457.633029][T16029] submit_bh_wbc+0x310/0x480 [ 2457.633357][T16029] block_read_full_folio+0x2ac/0x640 [ 2457.633701][T16029] blkdev_read_folio+0x1c/0x28 [ 2457.634049][T16029] filemap_read_folio+0xac/0x1fc [ 2457.634358][T16029] do_read_cache_folio+0x1c4/0x480 [ 2457.634672][T16029] read_cache_folio+0x44/0x6c [ 2457.634997][T16029] read_part_sector+0xac/0x5f4 [ 2457.635410][T16029] read_lba+0x15c/0x2ec [ 2457.635707][T16029] efi_partition+0x1dc/0x2154 [ 2457.636032][T16029] bdev_disk_changed+0x508/0xf0c [ 2457.636356][T16029] blkdev_get_whole+0x144/0x1e4 [ 2457.636693][T16029] bdev_open+0x1dc/0xa84 [ 2457.637008][T16029] blkdev_open+0x270/0x3dc [ 2457.637361][T16029] do_dentry_open+0x6a4/0x103c [ 2457.637778][T16029] vfs_open+0x5c/0x2fc [ 2457.638098][T16029] path_openat+0x1490/0x24b4 [ 2457.638420][T16029] do_filp_open+0x184/0x360 [ 2457.638945][T16029] do_sys_openat2+0xe0/0x160 [ 2457.639502][T16029] __arm64_sys_openat+0x12c/0x1bc [ 2457.639972][T16029] invoke_syscall+0x6c/0x258 [ 2457.640312][T16029] el0_svc_common.constprop.0+0xac/0x230 [ 2457.640786][T16029] do_el0_svc+0x40/0x58 [ 2457.641302][T16029] el0_svc+0x50/0x1a0 [ 2457.641632][T16029] el0t_64_sync_handler+0xa0/0xe4 [ 2457.642216][T16029] el0t_64_sync+0x198/0x19c [ 2457.642651][T16029] [ 2457.642651][T16029] other info that might help us debug this: [ 2457.642651][T16029] [ 2457.643373][T16029] Chain exists of: [ 2457.643373][T16029] &nsock->tx_lock --> set->srcu --> &cmd->lock [ 2457.643373][T16029] [ 2457.644624][T16029] Possible unsafe locking scenario: [ 2457.644624][T16029] [ 2457.645235][T16029] CPU0 CPU1 [ 2457.645539][T16029] ---- ---- [ 2457.645867][T16029] lock(&cmd->lock); [ 2457.646577][T16029] lock(set->srcu); [ 2457.647320][T16029] lock(&cmd->lock); [ 2457.647896][T16029] lock(&nsock->tx_lock); [ 2457.648337][T16029] [ 2457.648337][T16029] *** DEADLOCK *** [ 2457.648337][T16029] [ 2457.649163][T16029] 3 locks held by udevd/16029: [ 2457.649525][T16029] #0: ffff000014932358 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0x2c4/0xa84 [ 2457.650394][T16029] #1: ffff000014954690 (set->srcu){.+.+}-{0:0}, at: blk_mq_run_hw_queue+0x19c/0x500 [ 2457.651309][T16029] #2: ffff000012be51f8 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 2457.652197][T16029] [ 2457.652197][T16029] stack backtrace: [ 2457.652630][T16029] CPU: 1 UID: 0 PID: 16029 Comm: udevd Not tainted syzkaller #0 PREEMPT [ 2457.653070][T16029] Hardware name: linux,dummy-virt (DT) [ 2457.653523][T16029] Call trace: [ 2457.653914][T16029] show_stack+0x18/0x24 (C) [ 2457.654301][T16029] dump_stack_lvl+0xa4/0xf4 [ 2457.654646][T16029] dump_stack+0x1c/0x28 [ 2457.654935][T16029] print_circular_bug+0x28c/0x370 [ 2457.655335][T16029] check_noncircular+0x168/0x17c [ 2457.655758][T16029] __lock_acquire+0x1638/0x2380 [ 2457.656116][T16029] lock_acquire+0x310/0x38c [ 2457.656464][T16029] __mutex_lock+0x144/0xffc [ 2457.656855][T16029] mutex_lock_nested+0x24/0x30 [ 2457.657233][T16029] nbd_queue_rq+0x2cc/0xb54 [ 2457.657543][T16029] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 2457.658400][T16029] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 2457.659154][T16029] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 2457.659512][T16029] blk_mq_run_hw_queue+0x1e4/0x500 [ 2457.659956][T16029] blk_mq_dispatch_list+0x348/0xa50 [ 2457.660333][T16029] blk_mq_flush_plug_list+0xe8/0x508 [ 2457.660663][T16029] __blk_flush_plug+0x208/0x3b8 [ 2457.661020][T16029] __submit_bio+0x3a4/0x4ac [ 2457.661533][T16029] submit_bio_noacct_nocheck+0x59c/0xa8c [ 2457.661928][T16029] submit_bio_noacct+0x858/0x18f8 [ 2457.662920][T16029] submit_bio+0x32c/0x5f0 [ 2457.663347][T16029] submit_bh_wbc+0x310/0x480 [ 2457.663660][T16029] block_read_full_folio+0x2ac/0x640 [ 2457.664008][T16029] blkdev_read_folio+0x1c/0x28 [ 2457.664341][T16029] filemap_read_folio+0xac/0x1fc [ 2457.664668][T16029] do_read_cache_folio+0x1c4/0x480 [ 2457.665039][T16029] read_cache_folio+0x44/0x6c [ 2457.665365][T16029] read_part_sector+0xac/0x5f4 [ 2457.665710][T16029] read_lba+0x15c/0x2ec [ 2457.666083][T16029] efi_partition+0x1dc/0x2154 [ 2457.666425][T16029] bdev_disk_changed+0x508/0xf0c [ 2457.666767][T16029] blkdev_get_whole+0x144/0x1e4 [ 2457.667157][T16029] bdev_open+0x1dc/0xa84 [ 2457.667493][T16029] blkdev_open+0x270/0x3dc [ 2457.667811][T16029] do_dentry_open+0x6a4/0x103c [ 2457.668151][T16029] vfs_open+0x5c/0x2fc [ 2457.668468][T16029] path_openat+0x1490/0x24b4 [ 2457.668830][T16029] do_filp_open+0x184/0x360 [ 2457.669178][T16029] do_sys_openat2+0xe0/0x160 [ 2457.669518][T16029] __arm64_sys_openat+0x12c/0x1bc [ 2457.669866][T16029] invoke_syscall+0x6c/0x258 [ 2457.670208][T16029] el0_svc_common.constprop.0+0xac/0x230 [ 2457.670632][T16029] do_el0_svc+0x40/0x58 [ 2457.670999][T16029] el0_svc+0x50/0x1a0 [ 2457.671475][T16029] el0t_64_sync_handler+0xa0/0xe4 [ 2457.672049][T16029] el0t_64_sync+0x198/0x19c [ 2457.760305][T16029] block nbd0: Dead connection, failed to find a fallback [ 2457.765878][T16029] block nbd0: shutting down sockets [ 2457.767973][T16029] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2457.770168][T16029] Buffer I/O error on dev nbd0, logical block 0, async page read [ 2457.780890][T16029] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2457.807692][T16029] Buffer I/O error on dev nbd0, logical block 0, async page read [ 2457.810333][T16029] nbd0: unable to read partition table [ 2457.829223][T16029] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2457.833531][T16029] Buffer I/O error on dev nbd0, logical block 0, async page read [ 2457.849890][T16029] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2457.852916][T16029] Buffer I/O error on dev nbd0, logical block 0, async page read [ 2457.857776][T16029] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2457.859844][T16029] Buffer I/O error on dev nbd0, logical block 0, async page read [ 2457.866549][T16029] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2457.868774][T16029] Buffer I/O error on dev nbd0, logical block 0, async page read [ 2457.875374][T16029] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2457.877700][T16029] Buffer I/O error on dev nbd0, logical block 0, async page read [ 2457.946849][T16029] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2457.949467][T16029] Buffer I/O error on dev nbd0, logical block 0, async page read [ 2457.953035][T16029] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2457.955354][T16029] Buffer I/O error on dev nbd0, logical block 1, async page read [ 2457.957802][T16029] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2457.959886][T16029] Buffer I/O error on dev nbd0, logical block 2, async page read [ 2457.968224][T16029] nbd0: unable to read partition table [ 2458.007388][T16029] nbd0: unable to read partition table VM DIAGNOSIS: 14:37:42 Registers: info registers vcpu 0 CPU#0 PC=ffff8000802e4bd4 X00=0000000000000001 X01=1ffff0001423af47 X02=1ffff0001423af48 X03=1fffe0000254e792 X04=0000000000000000 X05=ffff8000a11d7670 X06=ffff70001423aece X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff70001423aece X11=1ffff0001423aece X12=ffff70001423aecf X13=0000000000000000 X14=1fffe000025aec65 X15=ffff000031ebb8c0 X16=0000000000000000 X17=1fffe000025aeb78 X18=ffff000031ebb8d0 X19=ffff8000a11d7a20 X20=ffff0000196f7240 X21=0000000000000000 X22=ffff8000a11d7a38 X23=ffff8000a11d7a40 X24=1ffff0001423af47 X25=1ffff0001423af41 X26=0000000000000003 X27=ffff8000a11d7a08 X28=0000000000000000 X29=ffff8000a11d76e0 X30=ffff8000802e4bd4 SP=ffff8000a11d76e0 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085468f6c X00=00000000000000c0 X01=0000000000000001 X02=0000000000000001 X03=ffff8000803223e0 X04=ffff700010f5a501 X05=ffff800087ad2800 X06=ffff700010f5a500 X07=0000000000000001 X08=ffff800087ad2800 X09=dfff800000000000 X10=ffff700010f5a500 X11=1ffff00010f5a500 X12=ffff700010f5a501 X13=205d393230363154 X14=7d2e2b2e2b7b296b X15=202c7d343a347b2d X16=5f64626e203a7461 X17=71725f6575657571 X18=0000000000000000 X19=00000000000000c0 X20=ffff800087ad2800 X21=ffff80008fce5c90 X22=1fffe00001dc825b X23=0000000000000001 X24=1fffe00001dc825a X25=ffff00000ee412d0 X26=ffff00000ee412d8 X27=ffff00000ee41080 X28=ffff80008fce5c90 X29=ffff80008fce5a00 X30=ffff800085468f5c SP=ffff80008fce5a00 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000