last executing test programs: 1m37.760752422s ago: executing program 0 (id=316): r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000800)) write$binfmt_misc(r1, &(0x7f0000000000), 0xbe) socketpair(0x1, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) sendto$l2tp6(r2, &(0x7f00000000c0)='O', 0xfffffffffffffde4, 0x20044040, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x20) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f00000000c0)={0x0, 'ip6gretap0\x00', {}, 0x2}) r3 = dup(r0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r3, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000ac0)={0x14, 0x0, 0x0, 0x3}, 0x14}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000180)=0x8001000, 0x4) 1m37.462488011s ago: executing program 0 (id=317): r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x5451, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x6, 0xb, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000002c40), 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x0, @tid=r1}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000003740), 0x0, 0x0) write$cgroup_pressure(r2, &(0x7f0000000100)={'full', 0x20, 0x0, 0x20, 0xffffffffffffffff}, 0x2f) 1m36.908772735s ago: executing program 0 (id=318): ioctl$BTRFS_IOC_BALANCE_CTL(0xffffffffffffffff, 0x5451, 0x0) rt_sigpending(0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x14, &(0x7f00000017c0)={0x0, 0xea60}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000003f80)={0x0, 0x0, 0x0}, 0x40000022) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x5451, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = mq_open(&(0x7f0000000040)='#][-\x00', 0x40, 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r1, 0x5450, 0x0) 1m36.728320312s ago: executing program 0 (id=319): eventfd2(0x0, 0x0) eventfd2(0x0, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000680), 0x8, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5450) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$RNDADDENTROPY(r0, 0x5450, 0x0) r1 = mq_open(&(0x7f0000000080)='+#,!\x00', 0x40, 0x0, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r1, 0x5450, 0x0) 1m36.541068041s ago: executing program 0 (id=320): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setresuid(0x0, 0x0, 0x0) pipe2(0x0, 0x0) socket$unix(0x1, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r0, 0x5451, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 1m36.351916608s ago: executing program 0 (id=322): r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xffb) r1 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) epoll_create1(0x0) gettid() mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[]) read$FUSE(r0, &(0x7f0000002140)={0x2020}, 0x140a) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000600)={{0x0, 0x0, 0x4, 0xffffffff, 'syz0\x00', 0x1}, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) 50.888821001s ago: executing program 32 (id=322): r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0xffb) r1 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) epoll_create1(0x0) gettid() mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x2, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4c}}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[]) read$FUSE(r0, &(0x7f0000002140)={0x2020}, 0x140a) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000600)={{0x0, 0x0, 0x4, 0xffffffff, 'syz0\x00', 0x1}, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) 47.163559783s ago: executing program 1 (id=332): socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)=0x7fff) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r0 = epoll_create1(0x0) ioctl$PIO_FONTX(r0, 0x5450, 0x0) r1 = mq_open(&(0x7f0000000140)='memory.events\x00', 0x40, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x5450, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) ioctl$BTRFS_IOC_SPACE_INFO(r1, 0x5450, 0x0) 46.772253411s ago: executing program 1 (id=333): r0 = epoll_create1(0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x5451, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r1, &(0x7f0000000480)="fbbf0b5044e308cb7bd572aa2b42e9678bcf30eff9f3aed14dc94a114bd2b45956aebe2b108a87e865501a5f9e0383611afdd3f8bac3d5cfd7772a3ab48d0ba4b600731e357e38716c449fae7c28548a4f2105f44b8fd9b33041270ae01f1a405e3f650fc3b0926d481c364fca00000000000000006d3a3ede9fc738b8d86209c060161d5ddb5fcf3d09001117cdb9d055aa2d89fe3458720724853a876448d4a1fe9ef0569ad98a05ab5df763923b4e2c576e00000000000000000000000000000000002090666159e3075f7244cf4ec3d7814c0c934f44e200219e6dd7bc23397d5f2f2c76a5baddd0fd8c340362691ef226f7a0ac51b74b6be5ed6737948514cd466943d08eeb3895b80499da2b209da4f3ec5e3744ce3e863b0e04d0ec2f39edf50b6e08c4b47e448a35414763d687fbe3792ee15c5b9791310a346472723c100bf77a310b0ced8004b5ac6d48c40439f512e8ef34a53d65f55563f68136a577736ca5f6f66e01ef4ec2cdc8db34f6de50713adaa3f70189958263fddc1314f8a28ccdef6e1390c5fbaeadc3035d019f0dc75de307de6c0d010000000000000027083d1d5b4b013c503b863b560688d94de886b6dc73d5da2dfeff4bed1a49a975a6c8dbb480e4415ddca5657a5a8e3b111015499e952bb5e8d8f60de3d688df7802c6e8b27b31fac4e199038b79a3999920e634a5af162a9581b0e6647e410700246548234acacf9cb43ab332a37bbc926c39897395c974fda31536be523bf4260300730ae6136fecae5f0fa6ab2df8d98128b24589e3bbe5230e07dc5e0d65cc397e3f8204d48e59e8e294a6d7008ba8fba28cd5009fe1a7c569ce740078bf1c7389a6ba0f89257f0eac417aac0d2d89b05ee5dafa2f1d936c87264d077b2c0d5abdbc64ce943f895dd4c2e9dd7393543d89b00dc6b3a25045d4ec932366c67dfad087fa8dc104644828440bdf67dd97ebccb3bd", 0xfffffea5, 0xc000, 0x0, 0xfffffcef) r2 = fcntl$dupfd(r1, 0x0, r1) write$P9_RLCREATE(r2, 0x0, 0x0) write$P9_RLOPEN(r2, 0x0, 0x0) 45.984838058s ago: executing program 1 (id=334): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x140b, 0x200, 0x70bd28, 0x25dfdbff}, 0x10}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000000) 45.721026463s ago: executing program 1 (id=335): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) fsetxattr$security_ima(r0, &(0x7f0000002f80), &(0x7f0000002fc0), 0x1, 0x1) 45.510459244s ago: executing program 1 (id=336): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r0, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f00000009c0)={0x14, 0x0, 0x1, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x20004000}, 0x40042) 45.285199096s ago: executing program 1 (id=337): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100), r2) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="24cf3347a9520360d353d19bf507482b23b20ad73a43da996d099c0600ecc5d1ebacd1a06ba1501428746efa339e46ad22f941a87921db0d3d", @ANYRESDEC=r3, @ANYBLOB="f900adee5aeeb8c0d3e1a6ebd12a19d5f2726157bd276e03ce3645589afe7b3910fac75f81db163f7a3e217504637bdf91d54c7b4fc6ed2533d82929bbd0c221c2257934a5b183f37fbca2379e56745bdccff1fff24e7e1048693deb2aa0a928737af2cd861d325648775e1d3e3dd9ae7d71168db5133d3e05808757d5eda6c3c656b30e7e96b5daeb1933bf17aad7cccb07c6b8a25927c5d4f0756c832aae60a5d9669f2ea9323b51e188764b53a6c2b427642e796ce2a3a1cf08a94fd4a646910a76d1ebf62362a9991410755f4187b651743235509493d964dc"], 0x34}, 0x1, 0x0, 0x0, 0x4008880}, 0xc095) bind$can_j1939(r2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r4 = socket$inet_icmp(0x2, 0x2, 0x1) r5 = accept4$inet(r4, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x80000) r6 = openat$mice(0xffffffffffffff9c, &(0x7f00000002c0), 0x80) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0xb52, 0x6, 0x7, 0xe, 0xfffffffe}) fcntl$getown(r6, 0x9) r7 = syz_open_dev$audion(&(0x7f0000000100), 0x9, 0x543) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000080), &(0x7f0000000180), 0x2, 0x1) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) write$cgroup_subtree(r7, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@loopback, 0x2f}) r8 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000c940)=[{{0x0, 0x0, &(0x7f00000001c0)}}], 0x1, 0x0, 0x0) pwritev2(r8, &(0x7f00000002c0), 0x0, 0x6, 0xc5, 0x0) write$selinux_user(r8, 0x0, 0x0) 0s ago: executing program 33 (id=337): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$UI_SET_ABSBIT(r2, 0x40045567, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100), r2) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="24cf3347a9520360d353d19bf507482b23b20ad73a43da996d099c0600ecc5d1ebacd1a06ba1501428746efa339e46ad22f941a87921db0d3d", @ANYRESDEC=r3, @ANYBLOB="f900adee5aeeb8c0d3e1a6ebd12a19d5f2726157bd276e03ce3645589afe7b3910fac75f81db163f7a3e217504637bdf91d54c7b4fc6ed2533d82929bbd0c221c2257934a5b183f37fbca2379e56745bdccff1fff24e7e1048693deb2aa0a928737af2cd861d325648775e1d3e3dd9ae7d71168db5133d3e05808757d5eda6c3c656b30e7e96b5daeb1933bf17aad7cccb07c6b8a25927c5d4f0756c832aae60a5d9669f2ea9323b51e188764b53a6c2b427642e796ce2a3a1cf08a94fd4a646910a76d1ebf62362a9991410755f4187b651743235509493d964dc"], 0x34}, 0x1, 0x0, 0x0, 0x4008880}, 0xc095) bind$can_j1939(r2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) r4 = socket$inet_icmp(0x2, 0x2, 0x1) r5 = accept4$inet(r4, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x80000) r6 = openat$mice(0xffffffffffffff9c, &(0x7f00000002c0), 0x80) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000000c0)={0xb52, 0x6, 0x7, 0xe, 0xfffffffe}) fcntl$getown(r6, 0x9) r7 = syz_open_dev$audion(&(0x7f0000000100), 0x9, 0x543) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000080), &(0x7f0000000180), 0x2, 0x1) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) socket$nl_generic(0x10, 0x3, 0x10) write$cgroup_subtree(r7, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@loopback, 0x2f}) r8 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f000000c940)=[{{0x0, 0x0, &(0x7f00000001c0)}}], 0x1, 0x0, 0x0) pwritev2(r8, &(0x7f00000002c0), 0x0, 0x6, 0xc5, 0x0) write$selinux_user(r8, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:7261' (ED25519) to the list of known hosts. [ 125.014847][ T30] audit: type=1400 audit(124.740:58): avc: denied { name_bind } for pid=3293 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 125.324598][ T30] audit: type=1400 audit(125.050:59): avc: denied { execute } for pid=3295 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 125.331238][ T30] audit: type=1400 audit(125.060:60): avc: denied { execute_no_trans } for pid=3295 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 128.954519][ T30] audit: type=1400 audit(128.680:61): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 128.961716][ T30] audit: type=1400 audit(128.690:62): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 128.985477][ T3295] cgroup: Unknown subsys name 'net' [ 129.002618][ T30] audit: type=1400 audit(128.730:63): avc: denied { unmount } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 129.408387][ T3295] cgroup: Unknown subsys name 'cpuset' [ 129.438508][ T3295] cgroup: Unknown subsys name 'rlimit' [ 129.741690][ T30] audit: type=1400 audit(129.470:64): avc: denied { setattr } for pid=3295 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 129.744274][ T30] audit: type=1400 audit(129.470:65): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 129.748146][ T30] audit: type=1400 audit(129.470:66): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 130.022007][ T3297] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 130.027802][ T30] audit: type=1400 audit(129.750:67): avc: denied { relabelto } for pid=3297 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 130.031614][ T30] audit: type=1400 audit(129.760:68): avc: denied { write } for pid=3297 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 130.090797][ T30] audit: type=1400 audit(129.820:69): avc: denied { read } for pid=3295 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 130.093260][ T30] audit: type=1400 audit(129.820:70): avc: denied { open } for pid=3295 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 130.111077][ T3295] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 136.121037][ T30] audit: type=1400 audit(135.850:71): avc: denied { execmem } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 136.197191][ T30] audit: type=1400 audit(135.920:72): avc: denied { read } for pid=3301 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 136.206905][ T30] audit: type=1400 audit(135.930:73): avc: denied { open } for pid=3300 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 136.216312][ T30] audit: type=1400 audit(135.940:74): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 136.254818][ T30] audit: type=1400 audit(135.980:75): avc: denied { module_request } for pid=3301 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 136.257681][ T30] audit: type=1400 audit(135.980:76): avc: denied { module_request } for pid=3300 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 136.369722][ T30] audit: type=1400 audit(136.090:77): avc: denied { sys_module } for pid=3300 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 140.657473][ T3300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 140.752322][ T3300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 140.765258][ T3301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 140.841459][ T3301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 142.390515][ T3300] hsr_slave_0: entered promiscuous mode [ 142.398940][ T3300] hsr_slave_1: entered promiscuous mode [ 142.803789][ T3301] hsr_slave_0: entered promiscuous mode [ 142.810457][ T3301] hsr_slave_1: entered promiscuous mode [ 142.813313][ T3301] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 142.817972][ T3301] Cannot create hsr debugfs directory [ 143.962567][ T30] audit: type=1400 audit(143.690:78): avc: denied { create } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 143.980418][ T30] audit: type=1400 audit(143.710:79): avc: denied { write } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 143.985458][ T30] audit: type=1400 audit(143.710:80): avc: denied { read } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 144.002598][ T3300] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 144.034971][ T3300] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 144.097241][ T3300] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 144.122011][ T3300] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 144.413398][ T3301] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 144.441776][ T3301] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 144.475591][ T3301] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 144.502315][ T3301] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 145.902907][ T3300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 146.202334][ T3301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 152.120592][ T3300] veth0_vlan: entered promiscuous mode [ 152.194201][ T3300] veth1_vlan: entered promiscuous mode [ 152.365703][ T3301] veth0_vlan: entered promiscuous mode [ 152.434081][ T3301] veth1_vlan: entered promiscuous mode [ 152.529079][ T3300] veth0_macvtap: entered promiscuous mode [ 152.572265][ T3300] veth1_macvtap: entered promiscuous mode [ 152.731317][ T3301] veth0_macvtap: entered promiscuous mode [ 152.774521][ T3300] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.775377][ T3300] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.778070][ T3300] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.778713][ T3300] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.800836][ T3301] veth1_macvtap: entered promiscuous mode [ 153.178944][ T3301] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.186717][ T3301] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.192397][ T3301] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.206878][ T30] audit: type=1400 audit(152.930:81): avc: denied { mount } for pid=3300 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 153.216535][ T30] audit: type=1400 audit(152.940:82): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/syzkaller.Gnp3MI/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 153.220981][ T3301] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 153.269553][ T30] audit: type=1400 audit(153.000:83): avc: denied { mount } for pid=3300 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 153.329136][ T30] audit: type=1400 audit(153.050:84): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/syzkaller.Gnp3MI/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 153.347877][ T30] audit: type=1400 audit(153.070:85): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/syzkaller.Gnp3MI/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 153.401744][ T30] audit: type=1400 audit(153.130:86): avc: denied { unmount } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 153.418554][ T30] audit: type=1400 audit(153.140:87): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 153.428477][ T30] audit: type=1400 audit(153.160:88): avc: denied { mount } for pid=3300 comm="syz-executor" name="/" dev="gadgetfs" ino=2800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 153.583865][ T30] audit: type=1400 audit(153.310:89): avc: denied { mounton } for pid=3300 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 153.621084][ T30] audit: type=1400 audit(153.320:90): avc: denied { mount } for pid=3300 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 153.934854][ T3300] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 154.699124][ T3441] Zero length message leads to an empty skb [ 159.181291][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 159.182449][ T30] audit: type=1400 audit(158.910:106): avc: denied { read write } for pid=3476 comm="syz.0.15" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 159.188079][ T30] audit: type=1400 audit(158.910:107): avc: denied { open } for pid=3476 comm="syz.0.15" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 159.206252][ T30] audit: type=1400 audit(158.930:108): avc: denied { ioctl } for pid=3476 comm="syz.0.15" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0xf507 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 164.670352][ T3496] serio: Serial port pts0 [ 168.495033][ T3505] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=3505 comm=syz.1.24 [ 170.676691][ T30] audit: type=1400 audit(170.400:109): avc: denied { create } for pid=3516 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 170.682789][ T30] audit: type=1400 audit(170.410:110): avc: denied { ioctl } for pid=3516 comm="syz.0.26" path="socket:[3884]" dev="sockfs" ino=3884 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 171.632447][ T30] audit: type=1400 audit(171.360:111): avc: denied { map_create } for pid=3522 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 171.634084][ T30] audit: type=1400 audit(171.360:112): avc: denied { bpf } for pid=3522 comm="syz.1.27" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 172.415278][ T30] audit: type=1400 audit(172.140:113): avc: denied { map_read map_write } for pid=3522 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 174.667690][ T30] audit: type=1400 audit(174.400:114): avc: denied { create } for pid=3535 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 174.674643][ T30] audit: type=1400 audit(174.400:115): avc: denied { ioctl } for pid=3535 comm="syz.0.32" path="socket:[2972]" dev="sockfs" ino=2972 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 174.690976][ T30] audit: type=1400 audit(174.420:116): avc: denied { bind } for pid=3535 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 174.703729][ T30] audit: type=1400 audit(174.430:117): avc: denied { write } for pid=3535 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 175.609953][ T30] audit: type=1400 audit(175.340:118): avc: denied { read write } for pid=3540 comm="syz.1.34" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 175.628344][ T3541] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 175.644292][ T3541] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 176.551251][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 176.553915][ T30] audit: type=1400 audit(176.280:121): avc: denied { name_bind } for pid=3548 comm="syz.1.37" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 176.944460][ T30] audit: type=1400 audit(176.670:122): avc: denied { write } for pid=3549 comm="syz.0.38" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 179.266254][ T30] audit: type=1400 audit(178.990:123): avc: denied { nlmsg_write } for pid=3558 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 180.305310][ T30] audit: type=1400 audit(179.890:124): avc: denied { create } for pid=3555 comm="syz.0.39" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 183.226332][ T30] audit: type=1400 audit(182.940:125): avc: denied { write } for pid=3568 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 183.242857][ T30] audit: type=1400 audit(182.970:126): avc: denied { read } for pid=3106 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 183.251718][ T30] audit: type=1400 audit(182.980:127): avc: denied { append } for pid=3106 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 183.266415][ T30] audit: type=1400 audit(182.990:129): avc: denied { open } for pid=3106 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 183.267024][ T30] audit: type=1400 audit(182.990:130): avc: denied { getattr } for pid=3106 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 183.267483][ T30] audit: type=1400 audit(182.980:128): avc: denied { create } for pid=3568 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 183.601980][ T30] audit: type=1400 audit(183.320:131): avc: denied { prog_load } for pid=3570 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 183.603800][ T30] audit: type=1400 audit(183.330:132): avc: denied { perfmon } for pid=3570 comm="syz.1.45" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 184.814593][ T30] audit: type=1400 audit(184.540:133): avc: denied { unlink } for pid=3300 comm="syz-executor" name="file0" dev="tmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 194.257900][ T3587] serio: Serial port pts0 [ 200.397612][ T30] audit: type=1400 audit(200.120:134): avc: denied { create } for pid=3594 comm="syz.1.50" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 201.135198][ T3600] serio: Serial port pts0 [ 202.504857][ T3609] serio: Serial port pts1 [ 216.750683][ T30] audit: type=1400 audit(216.470:135): avc: denied { bind } for pid=3616 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 216.752485][ T30] audit: type=1400 audit(216.480:136): avc: denied { listen } for pid=3616 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 216.762515][ T30] audit: type=1400 audit(216.490:137): avc: denied { connect } for pid=3616 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 216.790558][ T30] audit: type=1400 audit(216.520:138): avc: denied { write } for pid=3616 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 216.794258][ T30] audit: type=1400 audit(216.520:139): avc: denied { accept } for pid=3616 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 216.803736][ T30] audit: type=1400 audit(216.530:140): avc: denied { read } for pid=3616 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 217.651613][ T3622] 8021q: VLANs not supported on ip_vti0 [ 217.654902][ T30] audit: type=1400 audit(217.380:141): avc: denied { read write } for pid=3621 comm="syz.1.58" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 217.659807][ T30] audit: type=1400 audit(217.380:142): avc: denied { open } for pid=3621 comm="syz.1.58" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 217.673984][ T30] audit: type=1400 audit(217.400:143): avc: denied { ioctl } for pid=3621 comm="syz.1.58" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 219.009337][ T30] audit: type=1400 audit(218.740:144): avc: denied { ioctl } for pid=3623 comm="syz.1.59" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4160 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 219.508480][ T3389] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 219.706583][ T3389] usb 1-1: config 1 interface 0 altsetting 6 endpoint 0x81 has invalid maxpacket 1648, setting to 1024 [ 219.707478][ T3389] usb 1-1: config 1 interface 0 altsetting 6 bulk endpoint 0x82 has invalid maxpacket 16 [ 219.707739][ T3389] usb 1-1: config 1 interface 0 altsetting 6 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 219.707950][ T3389] usb 1-1: config 1 interface 0 has no altsetting 0 [ 219.753190][ T3389] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 219.753678][ T3389] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 219.753831][ T3389] usb 1-1: Product: Ь [ 219.753970][ T3389] usb 1-1: Manufacturer:  [ 219.754114][ T3389] usb 1-1: SerialNumber: 혅ɽȦੈ捧㐼첈椔䪠ᳩ镜縏뼸춠⯧䔃俨᳹౭黊鸽쵙끈둧폷୒壣掔᾿淉㧺㥯ⁿ윫覺쐜⮓繎㰗皍蔜馌秮皛峻괬媬霠싿擯靱芶頜臒㳓ꢜ剐᝟䚹慊㲯䭃迧⭞ힶ蟎ⵒ㙝Ảං鹚ӧ꫎䤫ⲩ렻躙ⅇ✟淿短疝뢤夶摺︀魒期蔷橰뇕왛殐㛽ꮁ땹 [ 220.477676][ T3627] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 220.482182][ T3627] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 220.494484][ T3627] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 221.700264][ T3389] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -22 [ 221.731129][ T3389] usb 1-1: USB disconnect, device number 2 [ 227.804193][ T3649] serio: Serial port pts0 [ 230.161277][ T3658] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 230.166973][ T3658] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 233.222667][ T3674] serio: Serial port pts0 [ 235.510039][ T30] audit: type=1400 audit(235.240:145): avc: denied { create } for pid=3690 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 235.527855][ T30] audit: type=1400 audit(235.240:146): avc: denied { connect } for pid=3690 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 237.240819][ T30] audit: type=1400 audit(236.950:147): avc: denied { mount } for pid=3703 comm="syz.0.84" name="/" dev="ramfs" ino=4270 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 237.306807][ T30] audit: type=1400 audit(237.030:148): avc: denied { execute } for pid=3703 comm="syz.0.84" path="/file1" dev="ramfs" ino=5145 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 240.097119][ T3719] serio: Serial port pts0 [ 240.706703][ T30] audit: type=1400 audit(240.420:149): avc: denied { mounton } for pid=3722 comm="syz.1.90" path="/45/file0" dev="tmpfs" ino=272 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 243.231477][ T30] audit: type=1400 audit(242.960:150): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 251.521274][ T30] audit: type=1400 audit(251.250:151): avc: denied { mounton } for pid=3748 comm="syz.1.97" path="/52/file0" dev="tmpfs" ino=312 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 258.997976][ T3771] serio: Serial port pts0 [ 260.062560][ T30] audit: type=1400 audit(259.790:152): avc: denied { allowed } for pid=3775 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 263.215742][ T30] audit: type=1400 audit(262.940:153): avc: denied { read } for pid=3798 comm="syz.0.112" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 263.216949][ T30] audit: type=1400 audit(262.940:154): avc: denied { open } for pid=3798 comm="syz.0.112" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 263.751133][ T30] audit: type=1400 audit(263.480:155): avc: denied { ioctl } for pid=3798 comm="syz.0.112" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 265.504896][ T30] audit: type=1400 audit(265.230:156): avc: denied { create } for pid=3807 comm="syz.0.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 265.729865][ T30] audit: type=1400 audit(265.450:157): avc: denied { execute } for pid=3809 comm="syz.0.116" path=2F6D656D66643AC0873A2A18C16BA7875BA06F383449AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EA537C9202864656C6574656429 dev="tmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 269.854775][ T3821] serio: Serial port pts0 [ 272.704425][ T30] audit: type=1400 audit(272.430:158): avc: denied { setopt } for pid=3831 comm="syz.1.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 272.757157][ T30] audit: type=1400 audit(272.460:159): avc: denied { write } for pid=3831 comm="syz.1.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 276.223322][ T30] audit: type=1400 audit(275.950:160): avc: denied { create } for pid=3841 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 276.236893][ T30] audit: type=1400 audit(275.960:161): avc: denied { create } for pid=3841 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 276.252706][ T30] audit: type=1400 audit(275.980:162): avc: denied { ioctl } for pid=3841 comm="syz.1.124" path="socket:[5339]" dev="sockfs" ino=5339 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 276.278610][ T30] audit: type=1400 audit(276.000:163): avc: denied { bind } for pid=3841 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 276.284967][ T30] audit: type=1400 audit(276.010:164): avc: denied { write } for pid=3841 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 276.777914][ T30] audit: type=1400 audit(276.510:165): avc: denied { create } for pid=3844 comm="syz.1.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 276.782465][ T30] audit: type=1400 audit(276.510:166): avc: denied { write } for pid=3844 comm="syz.1.125" path="socket:[5340]" dev="sockfs" ino=5340 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 276.782610][ T3845] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=15 sclass=netlink_tcpdiag_socket pid=3845 comm=syz.1.125 [ 276.796953][ T30] audit: type=1400 audit(276.520:167): avc: denied { read } for pid=3844 comm="syz.1.125" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 278.597231][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 278.600034][ T30] audit: type=1400 audit(278.320:171): avc: denied { create } for pid=3857 comm="syz.0.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 278.623033][ T30] audit: type=1400 audit(278.350:172): avc: denied { write } for pid=3857 comm="syz.0.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 278.631995][ T30] audit: type=1400 audit(278.360:173): avc: denied { ioctl } for pid=3857 comm="syz.0.130" path="socket:[5362]" dev="sockfs" ino=5362 ioctlcmd=0x940e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 278.689879][ T30] audit: type=1400 audit(278.420:174): avc: denied { read } for pid=3857 comm="syz.0.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 281.826648][ T30] audit: type=1400 audit(281.540:175): avc: denied { map } for pid=3867 comm="syz.0.134" path="socket:[4518]" dev="sockfs" ino=4518 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 282.206281][ T30] audit: type=1400 audit(281.930:176): avc: denied { ioctl } for pid=3869 comm="syz.0.135" path="socket:[5396]" dev="sockfs" ino=5396 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 285.994630][ T30] audit: type=1400 audit(285.720:177): avc: denied { sqpoll } for pid=3896 comm="syz.0.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 286.008135][ T30] audit: type=1400 audit(285.740:178): avc: denied { map } for pid=3896 comm="syz.0.143" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4568 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 286.008881][ T30] audit: type=1400 audit(285.740:179): avc: denied { read write } for pid=3896 comm="syz.0.143" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4568 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 288.483687][ T30] audit: type=1400 audit(288.210:180): avc: denied { read } for pid=3906 comm="syz.1.146" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 288.492140][ T30] audit: type=1400 audit(288.210:181): avc: denied { open } for pid=3906 comm="syz.1.146" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 290.769152][ T30] audit: type=1400 audit(290.500:182): avc: denied { open } for pid=3913 comm="syz.0.147" path="/dev/ptyq5" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 291.669384][ T30] audit: type=1400 audit(291.400:183): avc: denied { read } for pid=3926 comm="syz.1.153" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 291.672728][ T30] audit: type=1400 audit(291.400:184): avc: denied { open } for pid=3926 comm="syz.1.153" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 291.680289][ T30] audit: type=1400 audit(291.410:185): avc: denied { ioctl } for pid=3926 comm="syz.1.153" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 296.743135][ T30] audit: type=1400 audit(296.470:186): avc: denied { setattr } for pid=3950 comm="syz.0.160" name="rfkill" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:wireless_device_t tclass=chr_file permissive=1 [ 297.378881][ T30] audit: type=1400 audit(297.100:187): avc: denied { setopt } for pid=3954 comm="syz.1.162" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 297.384860][ T3956] 8021q: VLANs not supported on wg0 [ 297.388424][ T30] audit: type=1400 audit(297.110:188): avc: denied { ioctl } for pid=3954 comm="syz.1.162" path="socket:[4684]" dev="sockfs" ino=4684 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 297.392517][ T30] audit: type=1400 audit(297.120:189): avc: denied { map } for pid=3954 comm="syz.1.162" path="socket:[4684]" dev="sockfs" ino=4684 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 297.395365][ T30] audit: type=1400 audit(297.120:190): avc: denied { read accept } for pid=3954 comm="syz.1.162" path="socket:[4684]" dev="sockfs" ino=4684 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 297.418066][ T30] audit: type=1400 audit(297.150:191): avc: denied { getopt } for pid=3954 comm="syz.1.162" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 297.871822][ T30] audit: type=1400 audit(297.600:192): avc: denied { create } for pid=3957 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 297.875373][ T30] audit: type=1400 audit(297.600:193): avc: denied { getopt } for pid=3957 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 298.078787][ T30] audit: type=1400 audit(297.810:194): avc: denied { write } for pid=3957 comm="syz.1.163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 298.086740][ T30] audit: type=1400 audit(297.810:195): avc: denied { ioctl } for pid=3957 comm="syz.1.163" path="socket:[5507]" dev="sockfs" ino=5507 ioctlcmd=0x55c9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 304.041977][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 304.046501][ T30] audit: type=1400 audit(303.770:197): avc: denied { append } for pid=3985 comm="syz.0.171" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 304.833694][ T3993] capability: warning: `syz.0.172' uses deprecated v2 capabilities in a way that may be insecure [ 307.138327][ T30] audit: type=1400 audit(306.810:198): avc: denied { setattr } for pid=3994 comm="syz.1.173" name="mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 307.140961][ T30] audit: type=1400 audit(306.840:199): avc: denied { lock } for pid=3994 comm="syz.1.173" path="socket:[4772]" dev="sockfs" ino=4772 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 307.145473][ T30] audit: type=1400 audit(306.850:200): avc: denied { create } for pid=3994 comm="syz.1.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 307.159901][ T30] audit: type=1400 audit(306.870:201): avc: denied { ioctl } for pid=3994 comm="syz.1.173" path="socket:[4773]" dev="sockfs" ino=4773 ioctlcmd=0x4160 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 309.300243][ T4001] pimreg: entered allmulticast mode [ 310.085383][ T30] audit: type=1400 audit(309.810:202): avc: denied { create } for pid=4008 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 310.098852][ T30] audit: type=1400 audit(309.830:203): avc: denied { getopt } for pid=4008 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 310.099413][ T30] audit: type=1400 audit(309.830:204): avc: denied { write } for pid=4008 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 313.369520][ T30] audit: type=1400 audit(313.100:205): avc: denied { write } for pid=4018 comm="syz.0.183" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 313.410963][ T4019] input: syz0 as /devices/virtual/input/input1 [ 314.722032][ T30] audit: type=1400 audit(314.450:206): avc: denied { lock } for pid=4025 comm="syz.1.186" path="socket:[4839]" dev="sockfs" ino=4839 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 318.460517][ T30] audit: type=1400 audit(318.180:207): avc: denied { read } for pid=4041 comm="syz.0.193" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 318.533875][ T30] audit: type=1400 audit(318.260:208): avc: denied { open } for pid=4041 comm="syz.0.193" path="/94/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 318.661820][ T4044] block device autoloading is deprecated and will be removed. [ 318.680866][ T30] audit: type=1400 audit(318.410:209): avc: denied { ioctl } for pid=4041 comm="syz.0.193" path="/94/file0/file0" dev="fuse" ino=64 ioctlcmd=0x92b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 318.735633][ T4042] md2: using deprecated bitmap file support [ 321.433239][ T30] audit: type=1400 audit(321.160:210): avc: denied { block_suspend } for pid=4055 comm="syz.0.197" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 332.053742][ T30] audit: type=1400 audit(331.780:211): avc: denied { write } for pid=4106 comm="syz.1.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 332.465127][ T4111] serio: Serial port pts0 [ 363.680477][ T4196] serio: Serial port pts0 [ 363.833104][ T30] audit: type=1400 audit(363.560:212): avc: denied { ioctl } for pid=4197 comm="syz.1.248" path="socket:[6286]" dev="sockfs" ino=6286 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 364.167681][ T4200] serio: Serial port pts1 [ 366.273899][ T30] audit: type=1400 audit(366.000:213): avc: denied { create } for pid=4209 comm="syz.1.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 366.298818][ T30] audit: type=1400 audit(366.020:214): avc: denied { write } for pid=4209 comm="syz.1.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 375.159609][ T30] audit: type=1400 audit(374.890:215): avc: denied { read } for pid=4223 comm="syz.1.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 378.995473][ T4240] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 379.041015][ T30] audit: type=1400 audit(378.770:216): avc: denied { write } for pid=4239 comm="syz.0.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 379.061546][ T4240] 8021q: VLANs not supported on wg2 [ 391.096520][ T30] audit: type=1400 audit(390.820:217): avc: denied { setopt } for pid=4271 comm="syz.1.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 397.462682][ T30] audit: type=1400 audit(397.190:218): avc: denied { read } for pid=4290 comm="syz.1.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 397.472333][ T4291] 8021q: VLANs not supported on gre0 [ 397.476673][ T30] audit: type=1400 audit(397.200:219): avc: denied { ioctl } for pid=4290 comm="syz.1.279" path="socket:[6014]" dev="sockfs" ino=6014 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 400.181544][ T30] audit: type=1400 audit(399.910:220): avc: denied { append } for pid=4309 comm="syz.1.287" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 405.213583][ T30] audit: type=1400 audit(404.940:221): avc: denied { create } for pid=4328 comm="syz.0.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 405.225196][ T30] audit: type=1400 audit(404.950:222): avc: denied { ioctl } for pid=4328 comm="syz.0.295" path="socket:[6502]" dev="sockfs" ino=6502 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 405.263952][ T30] audit: type=1400 audit(404.990:223): avc: denied { getopt } for pid=4328 comm="syz.0.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 405.265531][ T4329] 8021q: VLANs not supported on vxcan1 [ 409.245561][ T30] audit: type=1400 audit(408.970:224): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 409.936978][ T30] audit: type=1400 audit(409.660:225): avc: denied { write } for pid=4356 comm="syz.1.307" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 410.514035][ T4362] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 410.521587][ T4362] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 410.534174][ T30] audit: type=1400 audit(410.260:226): avc: denied { bind } for pid=4361 comm="syz.1.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 410.845325][ T4366] 8021q: VLANs not supported on sit0 [ 411.143595][ T30] audit: type=1400 audit(410.870:227): avc: denied { append } for pid=4371 comm="syz.1.312" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 411.529066][ T30] audit: type=1400 audit(411.260:228): avc: denied { create } for pid=4376 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 411.534465][ T30] audit: type=1400 audit(411.260:229): avc: denied { ioctl } for pid=4376 comm="syz.0.316" path="socket:[7251]" dev="sockfs" ino=7251 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 411.544947][ T30] audit: type=1400 audit(411.270:230): avc: denied { write } for pid=4376 comm="syz.0.316" path="socket:[7251]" dev="sockfs" ino=7251 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 411.590300][ T4378] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4378 comm=syz.0.316 [ 412.183186][ T4377] batadv_slave_1: entered promiscuous mode [ 412.192371][ T30] audit: type=1400 audit(411.920:231): avc: denied { nlmsg_read } for pid=4375 comm="syz.1.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 412.249836][ T4375] batadv_slave_1: left promiscuous mode [ 458.818451][ T30] audit: type=1400 audit(458.540:232): avc: denied { ioctl } for pid=4409 comm="syz.1.330" path="socket:[6630]" dev="sockfs" ino=6630 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 462.741630][ T4412] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 462.758197][ T4412] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 463.542422][ T30] audit: type=1400 audit(463.270:233): avc: denied { setattr } for pid=4450 comm="syz.1.335" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 464.856641][ T4412] hsr_slave_0: entered promiscuous mode [ 464.859972][ T4412] hsr_slave_1: entered promiscuous mode [ 464.862323][ T4412] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 464.862605][ T4412] Cannot create hsr debugfs directory [ 465.164647][ T30] audit: type=1400 audit(464.890:234): avc: denied { accept } for pid=4455 comm="syz.1.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 466.222850][ T4466] SELinux: syz.1.337 (4466) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 763.627857][ T33] INFO: task kworker/1:0:23 blocked for more than 430 seconds. [ 763.628851][ T33] Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 [ 763.629056][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 763.629599][ T33] task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4288060 flags:0x00000008 [ 763.630698][ T33] Workqueue: md_misc mddev_delayed_delete [ 763.632633][ T33] Call trace: [ 763.632950][ T33] __switch_to+0x204/0x4bc (T) [ 763.633319][ T33] __schedule+0xd34/0x3188 [ 763.633521][ T33] schedule+0xd0/0x344 [ 763.633685][ T33] schedule_timeout+0x1ec/0x224 [ 763.633837][ T33] __wait_for_common+0x1d0/0x3f8 [ 763.633977][ T33] wait_for_completion+0x20/0x2c [ 763.634116][ T33] devtmpfs_submit_req+0xac/0x114 [ 763.634288][ T33] devtmpfs_delete_node+0xd8/0x128 [ 763.634430][ T33] device_del+0x59c/0x7b4 [ 763.634569][ T33] del_gendisk+0x3fc/0x87c [ 763.634715][ T33] md_kobj_release+0x84/0xd8 [ 763.634869][ T33] kobject_put+0x17c/0x430 [ 763.635022][ T33] mddev_delayed_delete+0x14/0x20 [ 763.635172][ T33] process_one_work+0x7cc/0x18d4 [ 763.635350][ T33] worker_thread+0x734/0xb84 [ 763.635523][ T33] kthread+0x348/0x5fc [ 763.635682][ T33] ret_from_fork+0x10/0x20 [ 763.647443][ T33] [ 763.647443][ T33] Showing all locks held in the system: [ 763.647676][ T33] 2 locks held by kworker/1:0/23: [ 763.647791][ T33] #0: ffff00000ef82948 ((wq_completion)md_misc){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 763.648551][ T33] #1: ffff80008d5c7c80 ((work_completion)(&mddev->del_work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 763.649102][ T33] 2 locks held by kdevtmpfs/25: [ 763.649174][ T33] #0: ffff00000de30950 (&type->i_mutex_dir_key/1){+.+.}-{4:4}, at: __kern_path_locked+0xd4/0x1f8 [ 763.649703][ T33] #1: ffff80008771a4e8 (major_names_lock){+.+.}-{4:4}, at: blk_probe_dev+0x30/0x168 [ 763.650115][ T33] 3 locks held by pr/ttyAMA0/32: [ 763.650192][ T33] 1 lock held by khungtaskd/33: [ 763.650269][ T33] #0: ffff80008728da60 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x18/0x1c4 [ 763.650707][ T33] 3 locks held by kworker/u8:5/154: [ 763.650798][ T33] #0: ffff00000d831148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 763.651228][ T33] #1: ffff80008dce7c80 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 763.651623][ T33] #2: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 763.652011][ T33] 3 locks held by kworker/u8:7/172: [ 763.652108][ T33] #0: ffff000012f09948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 763.652514][ T33] #1: ffff80008dc77c80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 763.652884][ T33] #2: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 763.653303][ T33] 1 lock held by klogd/3110: [ 763.653424][ T33] 1 lock held by dhcpcd/3151: [ 763.653504][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 763.653857][ T33] 2 locks held by getty/3241: [ 763.653919][ T33] #0: ffff0000175a80a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 763.654374][ T33] #1: ffff80008d50b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e4/0xdb4 [ 763.654758][ T33] 3 locks held by syz.0.322/4394: [ 763.654823][ T33] #0: ffff800087a33cc8 (tty_mutex){+.+.}-{4:4}, at: tty_open+0x3c4/0xb04 [ 763.655312][ T33] #1: ffff0000173531c0 (&tty->legacy_mutex){+.+.}-{4:4}, at: tty_lock+0x48/0x90 [ 763.655650][ T33] #2: ffff80008719e340 (console_lock){+.+.}-{0:0}, at: con_install+0xa4/0x4c4 [ 763.667168][ T33] 2 locks held by syz-executor/4412: [ 763.667249][ T33] #0: ffff800087091bb8 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0xb8/0x218 [ 763.667779][ T33] #1: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x4b8/0x1810 [ 763.668123][ T33] 1 lock held by syz.1.337/4456: [ 763.668188][ T33] #0: ffff800087a33cc8 (tty_mutex){+.+.}-{4:4}, at: tty_open+0x3c4/0xb04 [ 763.668568][ T33] 1 lock held by syz.1.337/4460: [ 763.668697][ T33] #0: ffff800087a33cc8 (tty_mutex){+.+.}-{4:4}, at: tty_open+0x3c4/0xb04 [ 763.669111][ T33] 2 locks held by syz.1.337/4463: [ 763.669190][ T33] #0: ffff00000de52420 (sb_writers){.+.+}-{0:0}, at: mnt_want_write+0x3c/0xb0 [ 763.669666][ T33] #1: ffff00000de30950 (&type->i_mutex_dir_key#2){++++}-{4:4}, at: path_openat+0xcbc/0x25e4 [ 763.670221][ T33] 1 lock held by syz.1.337/4465: [ 763.670284][ T33] #0: ffff800087a33cc8 (tty_mutex){+.+.}-{4:4}, at: tty_open+0x3c4/0xb04 [ 763.670745][ T33] 1 lock held by syz-executor/4468: [ 763.670841][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 763.671421][ T33] [ 763.671488][ T33] ============================================= [ 763.671488][ T33] [ 763.672027][ T33] Kernel panic - not syncing: hung_task: blocked tasks [ 763.678711][ T33] CPU: 1 UID: 0 PID: 33 Comm: khungtaskd Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 763.679091][ T33] Hardware name: linux,dummy-virt (DT) [ 763.679326][ T33] Call trace: [ 763.679577][ T33] show_stack+0x18/0x24 (C) [ 763.679783][ T33] dump_stack_lvl+0x38/0xf4 [ 763.679963][ T33] dump_stack+0x1c/0x28 [ 763.680133][ T33] panic+0x5b0/0x664 [ 763.680295][ T33] watchdog+0x658/0x1140 [ 763.680505][ T33] kthread+0x348/0x5fc [ 763.680741][ T33] ret_from_fork+0x10/0x20 [ 763.681460][ T33] SMP: stopping secondary CPUs [ 763.682607][ T33] Kernel Offset: disabled [ 763.682809][ T33] CPU features: 0x0410,00040068,01000400,0200421b [ 763.683065][ T33] Memory Limit: none [ 763.685696][ T33] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:33:05 Registers: info registers vcpu 0 CPU#0 PC=ffff80008544667c X00=ffff800085446678 X01=0000000000000000 X02=0000000000000000 X03=1fffe00001cbf3c9 X04=00000000fdeace5a X05=0000000000040000 X06=ffff00000e5faa18 X07=6a3db40ad285ce4b X08=0000000000000000 X09=ffff8000896fc000 X10=ffff00000e5fa8d8 X11=0000000000000000 X12=000000000000009e X13=0000000000000000 X14=1fffe0000d418836 X15=1850ee67e93502a3 X16=3cff0000edb9ffff X17=c466832ac7b493bd X18=ffff00003ad82640 X19=ffff8000872d0730 X20=ffff00000e5f9e40 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff8000872d0700 X25=0000000000000000 X26=0000000000000004 X27=ffff8000872d0730 X28=ffff00006a0a5580 X29=ffff8000800066b0 X30=ffff8000804282fc SP=ffff8000800066b0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000000000000000:000000000000000a Q02=0000aaaacca6b5c1:0000aaaacca6b4f0 Q03=0000fffff5b0ac00:0000fffff5b0a968 Q04=0000000000000000:0000000000000000 Q05=0000fffff5b0a8c0:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:000001f40000000a Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff5b0acd0:0000fffff5b0acd0 Q17=ffffff80ffffffd0:0000fffff5b0aca0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085421c5c X00=2dc9fd108e8d4800 X01=ffff8000865a8323 X02=0000000000000001 X03=1ffff00011b24da9 X04=1ffff00011b24da0 X05=dfff800000000000 X06=0000000000000020 X07=0000000000000001 X08=0000000000000010 X09=0000000000000004 X10=0000000000000000 X11=0000000000000000 X12=0000000000000000 X13=00000000fffffffd X14=000000000000000f X15=0000000000000002 X16=7367616c665f6b73 X17=303838323478303a X18=0000000000004006 X19=000000000000000b X20=1ffff00011b24dfe X21=ffff80008d927160 X22=0000000000000000 X23=ffff80008544d4c0 X24=0000000000000001 X25=ffff80008d927620 X26=00000000ffffffff X27=ffff80008d927843 X28=0000000000000006 X29=ffff80008d926fb0 X30=ffff8000804530d4 SP=ffff80008d926fb0 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000000000000000:000000000000000a Q02=0000aaaacca6b5c1:0000aaaacca6b4f0 Q03=0000fffff5b0ac00:0000fffff5b0a968 Q04=0000000000000000:0000000000000000 Q05=0000fffff5b0a8c0:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:000001f40000000a Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff5b0acd0:0000fffff5b0acd0 Q17=ffffff80ffffffd0:0000fffff5b0aca0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000