last executing test programs: 1h6m16.132018628s ago: executing program 0 (id=1374): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000200)=0x80) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0x5450, 0x0) 1h6m15.647170817s ago: executing program 0 (id=1376): r0 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = dup2(r0, r0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, 0x0}) 1h6m15.129544108s ago: executing program 0 (id=1378): r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x3000c085) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4840}, 0x44000) 1h6m14.577451158s ago: executing program 0 (id=1380): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000440)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) 1h6m13.949258783s ago: executing program 0 (id=1383): setreuid(0x0, 0xee00) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x10}, 0x10}}, 0x0) 1h6m12.289946627s ago: executing program 0 (id=1386): pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = fcntl$getown(r0, 0x9) sched_setscheduler(r1, 0x0, &(0x7f0000002300)) 1h6m12.289799546s ago: executing program 32 (id=1386): pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = fcntl$getown(r0, 0x9) sched_setscheduler(r1, 0x0, &(0x7f0000002300)) 39m27.061658788s ago: executing program 2 (id=5915): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80040, 0x0) dup3(r0, r1, 0x0) sendmsg$inet6(r1, &(0x7f0000000200)={&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}, 0x0) 39m26.689015312s ago: executing program 2 (id=5917): r0 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x40041}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 39m26.290824207s ago: executing program 2 (id=5919): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 39m25.739303958s ago: executing program 2 (id=5920): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x260) 39m25.324137594s ago: executing program 2 (id=5921): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket(0x1d, 0x2, 0x7) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x84}, 0x4881) 39m24.92093891s ago: executing program 2 (id=5922): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2041, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x10, "0062ba5d8200"}) r1 = syz_open_pts(r0, 0x20800) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000000)={0x24d, 0x3, 0x6, 0x4, 0xf3, "3b2e4acfb6c0991c7a4706da15a6c3a488faeb", 0x0, 0x2}) 39m24.92081592s ago: executing program 33 (id=5922): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2041, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x10, "0062ba5d8200"}) r1 = syz_open_pts(r0, 0x20800) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000000)={0x24d, 0x3, 0x6, 0x4, 0xf3, "3b2e4acfb6c0991c7a4706da15a6c3a488faeb", 0x0, 0x2}) 28m34.063183528s ago: executing program 3 (id=7364): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) 28m33.104689424s ago: executing program 3 (id=7365): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvmmsg$unix(r2, &(0x7f0000005f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$TIOCGSERIAL(r3, 0x541b, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 28m32.269286227s ago: executing program 3 (id=7366): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$inet6(r0, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002200)=[{0x0}, {0x0}, {&(0x7f00000001c0)="0f", 0x1}], 0x3}, 0x0) 28m31.491317297s ago: executing program 3 (id=7367): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup3(r1, r0, 0x0) write$P9_RGETLOCK(r0, &(0x7f0000002080)=ANY=[], 0x24) 28m31.030966704s ago: executing program 3 (id=7368): sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8010100}, 0xc, 0x0}, 0x24000000) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x83) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40086602, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f0000000200)='./bus\x00', 0x141842, 0x0) 28m30.273775463s ago: executing program 3 (id=7369): r0 = openat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)={0x41}, 0x18) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, 0x0, &(0x7f0000000000)) 27m44.61319426s ago: executing program 34 (id=7369): r0 = openat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)={0x41}, 0x18) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, 0x0, &(0x7f0000000000)) 5.161396187s ago: executing program 4 (id=10964): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PIO_CMAP(r2, 0x5451, 0x0) 4.948451746s ago: executing program 1 (id=10965): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000440)={r0, 0xffffffffffffffff}, 0x4) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f00000003c0)='.pending_reads\x00', 0x40, 0x0) fcntl$dupfd(r1, 0x0, r2) 4.490629184s ago: executing program 4 (id=10966): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x42, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, 0x0, 0x0) 4.190185485s ago: executing program 1 (id=10967): syz_usb_connect$cdc_ecm(0x3, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffff9c, &(0x7f0000001180), 0x2, 0x0) syz_usb_connect$cdc_ecm(0x3, 0x0, 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f00000025c0)) 3.716487324s ago: executing program 4 (id=10968): r0 = landlock_create_ruleset(&(0x7f0000000000)={0x8000}, 0x10, 0x0) landlock_restrict_self(r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) 3.135924807s ago: executing program 1 (id=10969): close(0xffffffffffffffff) signalfd(0xffffffffffffffff, 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r0, 0x5451, 0x0) 2.982984193s ago: executing program 4 (id=10970): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) 2.28102884s ago: executing program 4 (id=10971): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000200)) 1.762998591s ago: executing program 1 (id=10972): r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4b) close(r0) syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, 0x0) 1.560046998s ago: executing program 4 (id=10973): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000a80)={0x48, r1, 0x1, 0xfffffffe, 0x0, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xfb2e77a8993c191f}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffff}]}, 0x48}}, 0x20000000) 802.461269ms ago: executing program 1 (id=10974): r0 = io_uring_setup(0x6503, &(0x7f0000001300)={0x0, 0x8d5f, 0x1046, 0x0, 0x264}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, &(0x7f00000000c0), 0x0) io_uring_register$IORING_REGISTER_ENABLE_RINGS(r0, 0xc, 0x0, 0x0) io_uring_register$IORING_REGISTER_PBUF_STATUS(r0, 0x1a, 0x0, 0x1) 0s ago: executing program 1 (id=10975): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$mixer(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = dup2(r1, r0) ioctl$DRM_IOCTL_FREE_BUFS(r2, 0x4008641a, &(0x7f0000001140)={0x0, 0x0}) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:4763' (ED25519) to the list of known hosts. [ 199.948549][ T30] audit: type=1400 audit(199.540:46): avc: denied { name_bind } for pid=3311 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 200.350417][ T30] audit: type=1400 audit(199.940:47): avc: denied { execute } for pid=3312 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 200.362035][ T30] audit: type=1400 audit(199.950:48): avc: denied { execute_no_trans } for pid=3312 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 206.330091][ T30] audit: type=1400 audit(205.920:49): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 206.344731][ T30] audit: type=1400 audit(205.930:50): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 206.405465][ T3312] cgroup: Unknown subsys name 'net' [ 206.438107][ T30] audit: type=1400 audit(206.030:51): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 206.740638][ T3312] cgroup: Unknown subsys name 'cpuset' [ 206.805345][ T3312] cgroup: Unknown subsys name 'rlimit' [ 207.134480][ T30] audit: type=1400 audit(206.720:52): avc: denied { setattr } for pid=3312 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 207.150133][ T30] audit: type=1400 audit(206.730:53): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 207.151184][ T30] audit: type=1400 audit(206.740:54): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 207.942558][ T3314] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 207.948632][ T30] audit: type=1400 audit(207.540:55): avc: denied { relabelto } for pid=3314 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 207.955056][ T30] audit: type=1400 audit(207.540:56): avc: denied { write } for pid=3314 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 208.069968][ T30] audit: type=1400 audit(207.660:57): avc: denied { read } for pid=3312 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 208.071987][ T30] audit: type=1400 audit(207.660:58): avc: denied { open } for pid=3312 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 208.086408][ T3312] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 228.601202][ T30] audit: type=1400 audit(228.190:59): avc: denied { execmem } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 228.738092][ T30] audit: type=1400 audit(228.330:60): avc: denied { read } for pid=3317 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 228.742258][ T30] audit: type=1400 audit(228.330:61): avc: denied { open } for pid=3317 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 228.764958][ T30] audit: type=1400 audit(228.350:62): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 228.876382][ T30] audit: type=1400 audit(228.470:63): avc: denied { module_request } for pid=3317 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 229.065650][ T30] audit: type=1400 audit(228.660:64): avc: denied { sys_module } for pid=3317 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 236.298852][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 236.518385][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 236.575841][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 236.725811][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 239.320798][ T3317] hsr_slave_0: entered promiscuous mode [ 239.338821][ T3317] hsr_slave_1: entered promiscuous mode [ 239.952382][ T3318] hsr_slave_0: entered promiscuous mode [ 239.977315][ T3318] hsr_slave_1: entered promiscuous mode [ 239.984726][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 239.986691][ T3318] Cannot create hsr debugfs directory [ 242.078785][ T30] audit: type=1400 audit(241.670:65): avc: denied { create } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 242.081549][ T30] audit: type=1400 audit(241.670:66): avc: denied { write } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 242.087796][ T30] audit: type=1400 audit(241.680:67): avc: denied { read } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 242.101005][ T3317] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 242.164511][ T3317] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 242.259260][ T3317] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 242.301861][ T3317] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 242.746866][ T3318] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 242.778146][ T3318] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 242.814733][ T3318] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 242.836370][ T3318] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 246.055371][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.359986][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 259.725156][ T3318] veth0_vlan: entered promiscuous mode [ 259.975846][ T3318] veth1_vlan: entered promiscuous mode [ 260.215160][ T3317] veth0_vlan: entered promiscuous mode [ 260.439706][ T3317] veth1_vlan: entered promiscuous mode [ 260.631808][ T3318] veth0_macvtap: entered promiscuous mode [ 260.821477][ T3318] veth1_macvtap: entered promiscuous mode [ 261.279872][ T3317] veth0_macvtap: entered promiscuous mode [ 261.465041][ T3317] veth1_macvtap: entered promiscuous mode [ 261.498620][ T944] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.527728][ T944] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.530738][ T55] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.537081][ T55] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.161171][ T30] audit: type=1400 audit(261.750:68): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 262.238206][ T30] audit: type=1400 audit(261.820:69): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/syzkaller.Cuy7kM/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 262.309406][ T30] audit: type=1400 audit(261.900:70): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 262.359360][ T30] audit: type=1400 audit(261.950:71): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/syzkaller.Cuy7kM/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 262.380142][ T30] audit: type=1400 audit(261.970:72): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/syzkaller.Cuy7kM/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4087 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 262.482776][ T30] audit: type=1400 audit(262.070:73): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 262.534074][ T30] audit: type=1400 audit(262.120:74): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 262.561796][ T30] audit: type=1400 audit(262.150:75): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="gadgetfs" ino=4088 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 262.607720][ T30] audit: type=1400 audit(262.200:76): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 262.624419][ T30] audit: type=1400 audit(262.210:77): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 262.709081][ T944] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.726811][ T944] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.727811][ T944] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.728113][ T944] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.961757][ T3318] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 265.728894][ T3468] Zero length message leads to an empty skb [ 268.059913][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 268.061987][ T30] audit: type=1400 audit(267.650:82): avc: denied { create } for pid=3480 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 268.082055][ T30] audit: type=1400 audit(267.670:83): avc: denied { setattr } for pid=3480 comm="syz.0.8" name="RAW" dev="sockfs" ino=4142 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 268.811960][ T30] audit: type=1400 audit(268.400:84): avc: denied { write } for pid=3484 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 274.035999][ T3530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3530 comm=syz.0.31 [ 274.387222][ T3533] capability: warning: `syz.0.33' uses 32-bit capabilities (legacy support in use) [ 275.427134][ T30] audit: type=1400 audit(275.020:85): avc: denied { bind } for pid=3539 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 275.431123][ T30] audit: type=1400 audit(275.020:86): avc: denied { node_bind } for pid=3539 comm="syz.0.36" saddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 275.492243][ T30] audit: type=1400 audit(275.050:87): avc: denied { write } for pid=3539 comm="syz.0.36" laddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 278.251736][ T30] audit: type=1400 audit(277.840:88): avc: denied { audit_write } for pid=3559 comm="syz.0.46" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 280.749076][ T30] audit: type=1400 audit(280.340:89): avc: denied { read write } for pid=3574 comm="syz.0.54" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 280.754037][ T30] audit: type=1400 audit(280.340:90): avc: denied { open } for pid=3574 comm="syz.0.54" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 280.777656][ T30] audit: type=1400 audit(280.370:91): avc: denied { ioctl } for pid=3574 comm="syz.0.54" path="/dev/input/mice" dev="devtmpfs" ino=705 ioctlcmd=0x937b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 282.489069][ T30] audit: type=1400 audit(282.080:92): avc: denied { read } for pid=3585 comm="syz.0.59" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 282.517442][ T30] audit: type=1400 audit(282.110:93): avc: denied { open } for pid=3585 comm="syz.0.59" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 282.655902][ T30] audit: type=1400 audit(282.240:94): avc: denied { ioctl } for pid=3585 comm="syz.0.59" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 282.789892][ T30] audit: type=1400 audit(282.380:95): avc: denied { block_suspend } for pid=3587 comm="syz.1.60" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 283.947545][ T3592] syz.1.62 uses obsolete (PF_INET,SOCK_PACKET) [ 283.976304][ T30] audit: type=1400 audit(283.540:96): avc: denied { create } for pid=3591 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 284.028072][ T30] audit: type=1400 audit(283.620:97): avc: denied { ioctl } for pid=3591 comm="syz.1.62" path="socket:[5186]" dev="sockfs" ino=5186 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 285.992567][ T30] audit: type=1400 audit(285.580:98): avc: denied { execute } for pid=3603 comm="syz.0.67" name="file1" dev="tmpfs" ino=194 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 286.027052][ T3604] process 'syz.0.67' launched './file1' with NULL argv: empty string added [ 286.029613][ T30] audit: type=1400 audit(285.620:99): avc: denied { execute_no_trans } for pid=3603 comm="syz.0.67" path="/35/file1" dev="tmpfs" ino=194 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 291.759917][ T3643] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3643 comm=syz.0.86 [ 295.061239][ T30] audit: type=1400 audit(294.650:100): avc: denied { read } for pid=3666 comm="syz.0.99" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 295.061787][ T30] audit: type=1400 audit(294.650:101): avc: denied { open } for pid=3666 comm="syz.0.99" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 295.078173][ T30] audit: type=1400 audit(294.670:102): avc: denied { ioctl } for pid=3666 comm="syz.0.99" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 300.116510][ T30] audit: type=1400 audit(299.700:103): avc: denied { read } for pid=3703 comm="syz.1.117" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 300.117640][ T30] audit: type=1400 audit(299.700:104): avc: denied { open } for pid=3703 comm="syz.1.117" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 305.720724][ T30] audit: type=1400 audit(305.310:105): avc: denied { ioctl } for pid=3742 comm="syz.1.136" path="socket:[4545]" dev="sockfs" ino=4545 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 306.404004][ T30] audit: type=1400 audit(305.990:106): avc: denied { create } for pid=3749 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 314.962423][ T30] audit: type=1400 audit(314.550:107): avc: denied { map_create } for pid=3813 comm="syz.1.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 314.986527][ T30] audit: type=1400 audit(314.580:108): avc: denied { bpf } for pid=3813 comm="syz.1.171" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 314.992744][ T30] audit: type=1400 audit(314.580:109): avc: denied { map_read map_write } for pid=3813 comm="syz.1.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 318.700343][ T30] audit: type=1400 audit(318.290:110): avc: denied { create } for pid=3849 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 318.774550][ T30] audit: type=1400 audit(318.360:111): avc: denied { write } for pid=3849 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 323.976832][ T30] audit: type=1400 audit(323.570:112): avc: denied { read write } for pid=3889 comm="syz.0.208" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 323.993840][ T30] audit: type=1400 audit(323.580:113): avc: denied { open } for pid=3889 comm="syz.0.208" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 324.000749][ T3892] binder: 3889:3892 ioctl 400c620e 0 returned -14 [ 324.003807][ T30] audit: type=1400 audit(323.590:114): avc: denied { ioctl } for pid=3889 comm="syz.0.208" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 327.337909][ T30] audit: type=1400 audit(326.920:115): avc: denied { allowed } for pid=3919 comm="syz.1.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 327.348442][ T30] audit: type=1400 audit(326.940:116): avc: denied { create } for pid=3919 comm="syz.1.222" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 327.375265][ T3920] capability: warning: `syz.1.222' uses deprecated v2 capabilities in a way that may be insecure [ 337.390179][ T30] audit: type=1400 audit(336.980:117): avc: denied { create } for pid=4001 comm="syz.0.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 349.844916][ T30] audit: type=1400 audit(349.430:118): avc: denied { mount } for pid=4085 comm="syz.1.304" name="/" dev="configfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 358.765606][ T30] audit: type=1400 audit(358.350:119): avc: denied { write } for pid=4141 comm="syz.0.332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 360.714685][ T30] audit: type=1400 audit(360.300:120): avc: denied { perfmon } for pid=4154 comm="syz.0.338" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 362.729303][ T30] audit: type=1400 audit(362.310:121): avc: denied { read write } for pid=4168 comm="syz.1.345" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 362.739915][ T30] audit: type=1400 audit(362.320:122): avc: denied { open } for pid=4168 comm="syz.1.345" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 362.834195][ T30] audit: type=1400 audit(362.410:123): avc: denied { ioctl } for pid=4168 comm="syz.1.345" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 366.461931][ T30] audit: type=1400 audit(366.050:124): avc: denied { write } for pid=4197 comm="syz.1.358" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 366.492770][ T30] audit: type=1400 audit(366.080:125): avc: denied { ioctl } for pid=4197 comm="syz.1.358" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9377 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 367.219637][ T30] audit: type=1400 audit(366.810:126): avc: denied { connect } for pid=4206 comm="syz.1.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 367.249571][ T30] audit: type=1400 audit(366.820:127): avc: denied { write } for pid=4206 comm="syz.1.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 369.159533][ T4222] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65498 sclass=netlink_audit_socket pid=4222 comm=syz.0.370 [ 377.698965][ T30] audit: type=1400 audit(377.290:128): avc: denied { name_bind } for pid=4290 comm="syz.0.404" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 378.199950][ T30] audit: type=1400 audit(377.790:129): avc: denied { write } for pid=4293 comm="syz.0.405" name="arp" dev="proc" ino=4026532626 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 378.971007][ T30] audit: type=1400 audit(378.560:130): avc: denied { prog_load } for pid=4299 comm="syz.1.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 395.759212][ T30] audit: type=1400 audit(395.350:131): avc: denied { create } for pid=4409 comm="syz.1.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 395.802311][ T30] audit: type=1400 audit(395.380:132): avc: denied { setopt } for pid=4409 comm="syz.1.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 396.446432][ T30] audit: type=1400 audit(396.020:133): avc: denied { getopt } for pid=4409 comm="syz.1.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 401.701539][ T30] audit: type=1400 audit(401.290:134): avc: denied { create } for pid=4431 comm="syz.0.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 401.741662][ T30] audit: type=1400 audit(401.320:135): avc: denied { ioctl } for pid=4431 comm="syz.0.470" path="socket:[6761]" dev="sockfs" ino=6761 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 402.738035][ T30] audit: type=1400 audit(402.330:136): avc: denied { setopt } for pid=4435 comm="syz.0.472" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 406.838041][ T30] audit: type=1400 audit(406.430:137): avc: denied { create } for pid=4449 comm="syz.0.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 414.565713][ T30] audit: type=1400 audit(414.130:138): avc: denied { sqpoll } for pid=4478 comm="syz.0.493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 414.635438][ T30] audit: type=1400 audit(414.210:139): avc: denied { map } for pid=4478 comm="syz.0.493" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6844 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 414.638849][ T30] audit: type=1400 audit(414.230:140): avc: denied { read write } for pid=4478 comm="syz.0.493" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6844 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 415.464514][ T30] audit: type=1400 audit(415.050:141): avc: denied { connect } for pid=4483 comm="syz.0.495" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 421.406165][ T30] audit: type=1400 audit(421.000:142): avc: denied { read write } for pid=4521 comm="syz.0.514" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 421.417840][ T30] audit: type=1400 audit(421.010:143): avc: denied { open } for pid=4521 comm="syz.0.514" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 421.927054][ T30] audit: type=1400 audit(421.520:144): avc: denied { create } for pid=4525 comm="syz.0.516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 423.421934][ T30] audit: type=1400 audit(423.010:145): avc: denied { create } for pid=4541 comm="syz.1.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 423.442500][ T30] audit: type=1400 audit(423.030:146): avc: denied { write } for pid=4541 comm="syz.1.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 428.206227][ T30] audit: type=1400 audit(427.800:147): avc: denied { create } for pid=4586 comm="syz.1.547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 428.987083][ T30] audit: type=1400 audit(428.580:148): avc: denied { write } for pid=4593 comm="syz.0.551" path="socket:[7048]" dev="sockfs" ino=7048 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 429.639663][ T30] audit: type=1400 audit(429.230:149): avc: denied { create } for pid=4599 comm="syz.1.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 429.694284][ T30] audit: type=1400 audit(429.280:150): avc: denied { read write } for pid=4600 comm="syz.0.554" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 429.697325][ T30] audit: type=1400 audit(429.290:151): avc: denied { write } for pid=4599 comm="syz.1.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 429.706657][ T30] audit: type=1400 audit(429.300:152): avc: denied { open } for pid=4600 comm="syz.0.554" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 429.799976][ T967] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 429.805122][ T967] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 429.806886][ T967] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 429.808267][ T967] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 429.809685][ T967] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 429.811081][ T967] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 429.812432][ T967] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 429.816140][ T967] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 429.817596][ T967] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 429.819027][ T967] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 429.876974][ T967] hid-generic 0002:0004:0009.0001: hidraw0: HID v0.04 Device [syz0] on syz0 [ 430.529855][ T30] audit: type=1400 audit(430.110:153): avc: denied { create } for pid=4606 comm="syz.0.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 430.541426][ T4608] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4608 comm=syz.0.557 [ 431.231257][ T30] audit: type=1400 audit(430.820:154): avc: denied { read write } for pid=4610 comm="syz.0.559" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 431.236316][ T30] audit: type=1400 audit(430.820:155): avc: denied { open } for pid=4610 comm="syz.0.559" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 431.265590][ T30] audit: type=1400 audit(430.850:156): avc: denied { mounton } for pid=4610 comm="syz.0.559" path="/298/file0" dev="tmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 433.896529][ T4617] fido_id[4617]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 435.809347][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 435.815904][ T30] audit: type=1400 audit(435.400:159): avc: denied { write } for pid=4643 comm="syz.1.574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 436.384439][ T30] audit: type=1400 audit(435.960:160): avc: denied { ioctl } for pid=4647 comm="syz.1.576" path="socket:[7139]" dev="sockfs" ino=7139 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 441.938237][ T4686] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 451.238904][ T30] audit: type=1400 audit(450.830:161): avc: denied { accept } for pid=4734 comm="syz.0.617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 466.975363][ T30] audit: type=1400 audit(466.560:162): avc: denied { setopt } for pid=4836 comm="syz.0.667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 466.980778][ T30] audit: type=1400 audit(466.570:163): avc: denied { bind } for pid=4836 comm="syz.0.667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 471.512221][ T30] audit: type=1400 audit(471.100:164): avc: denied { execute } for pid=4872 comm="syz.1.685" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=8542 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 471.617375][ T30] audit: type=1400 audit(471.190:165): avc: denied { create } for pid=4872 comm="syz.1.685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 475.916055][ T30] audit: type=1400 audit(475.490:166): avc: denied { read } for pid=4906 comm="syz.1.701" name="userio" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 475.934351][ T30] audit: type=1400 audit(475.510:167): avc: denied { open } for pid=4906 comm="syz.1.701" path="/dev/userio" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 477.788828][ T30] audit: type=1400 audit(477.380:168): avc: denied { read } for pid=4922 comm="syz.0.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 480.428373][ T30] audit: type=1400 audit(480.020:169): avc: denied { checkpoint_restore } for pid=4948 comm="syz.1.722" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 484.274019][ T30] audit: type=1400 audit(483.860:170): avc: denied { write } for pid=4974 comm="syz.0.735" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 491.325784][ T30] audit: type=1400 audit(490.880:171): avc: denied { read } for pid=5031 comm="syz.0.764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 492.468813][ T30] audit: type=1400 audit(492.060:172): avc: denied { read } for pid=5040 comm="syz.1.768" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 492.494929][ T30] audit: type=1400 audit(492.070:173): avc: denied { open } for pid=5040 comm="syz.1.768" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 492.546334][ T30] audit: type=1400 audit(492.130:174): avc: denied { ioctl } for pid=5040 comm="syz.1.768" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 492.970781][ T3599] udevd[3599]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 516.468740][ T30] audit: type=1400 audit(516.060:175): avc: denied { node_bind } for pid=5248 comm="syz.1.870" saddr=255.255.255.255 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 521.736644][ T5287] block nbd0: shutting down sockets [ 523.719000][ T30] audit: type=1400 audit(523.310:176): avc: denied { create } for pid=5306 comm="syz.1.898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 523.765876][ T30] audit: type=1400 audit(523.350:177): avc: denied { write } for pid=5306 comm="syz.1.898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 523.818471][ T30] audit: type=1400 audit(523.400:178): avc: denied { read } for pid=5306 comm="syz.1.898" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 525.536122][ T30] audit: type=1400 audit(525.130:179): avc: denied { connect } for pid=5322 comm="syz.1.906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 526.064456][ T30] audit: type=1400 audit(525.640:180): avc: denied { write } for pid=5322 comm="syz.1.906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 528.232375][ T30] audit: type=1400 audit(527.820:181): avc: denied { create } for pid=5340 comm="syz.0.914" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 528.302540][ T30] audit: type=1400 audit(527.890:182): avc: denied { write } for pid=5340 comm="syz.0.914" name="file0" dev="tmpfs" ino=2491 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 528.335660][ T30] audit: type=1400 audit(527.920:183): avc: denied { open } for pid=5340 comm="syz.0.914" path="/483/file0" dev="tmpfs" ino=2491 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 528.866429][ T5341] block device autoloading is deprecated and will be removed. [ 529.200055][ T30] audit: type=1400 audit(528.790:184): avc: denied { unlink } for pid=3317 comm="syz-executor" name="file0" dev="tmpfs" ino=2491 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 529.344189][ T30] audit: type=1400 audit(528.930:185): avc: denied { read write } for pid=3317 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 529.364783][ T30] audit: type=1400 audit(528.930:186): avc: denied { open } for pid=3317 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 529.365711][ T30] audit: type=1400 audit(528.940:187): avc: denied { ioctl } for pid=3317 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 540.278379][ T30] audit: type=1400 audit(539.870:188): avc: denied { prog_run } for pid=5433 comm="syz.0.958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 554.147498][ T30] audit: type=1400 audit(553.740:189): avc: denied { setopt } for pid=5543 comm="syz.1.1012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 556.084416][ T30] audit: type=1400 audit(555.670:190): avc: denied { getopt } for pid=5560 comm="syz.1.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 561.966110][ T30] audit: type=1400 audit(561.540:191): avc: denied { mount } for pid=5609 comm="syz.1.1043" name="/" dev="autofs" ino=10819 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 562.132030][ T30] audit: type=1400 audit(561.720:192): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 569.137629][ T5671] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 581.247286][ T30] audit: type=1400 audit(580.840:193): avc: denied { setattr } for pid=5755 comm="syz.0.1113" name="ptmx" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 584.714475][ T30] audit: type=1400 audit(584.300:194): avc: denied { read } for pid=5779 comm="syz.1.1124" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 584.722789][ T30] audit: type=1400 audit(584.300:195): avc: denied { open } for pid=5779 comm="syz.1.1124" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 586.364559][ T30] audit: type=1400 audit(585.950:196): avc: denied { wake_alarm } for pid=5789 comm="syz.0.1129" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 595.750611][ T30] audit: type=1400 audit(595.340:197): avc: denied { create } for pid=5827 comm="syz.1.1148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 595.786586][ T30] audit: type=1400 audit(595.380:198): avc: denied { setopt } for pid=5827 comm="syz.1.1148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 599.171640][ T30] audit: type=1400 audit(598.760:199): avc: denied { read } for pid=5854 comm="syz.0.1161" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 599.182633][ T30] audit: type=1400 audit(598.770:200): avc: denied { open } for pid=5854 comm="syz.0.1161" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 599.237620][ T30] audit: type=1400 audit(598.830:201): avc: denied { write } for pid=5854 comm="syz.0.1161" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 603.376708][ T30] audit: type=1400 audit(602.930:202): avc: denied { connect } for pid=5888 comm="syz.1.1177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 623.981165][ T30] audit: type=1400 audit(623.570:203): avc: denied { setopt } for pid=6025 comm="syz.1.1244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 625.499488][ T30] audit: type=1400 audit(625.090:204): avc: denied { read } for pid=6039 comm="syz.0.1251" path="socket:[12579]" dev="sockfs" ino=12579 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 635.677939][ T30] audit: type=1400 audit(635.260:205): avc: denied { mount } for pid=6117 comm="syz.0.1289" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 645.380303][ T30] audit: type=1400 audit(644.960:206): avc: denied { write } for pid=6181 comm="syz.1.1321" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 645.390208][ T30] audit: type=1400 audit(644.980:207): avc: denied { ioctl } for pid=6181 comm="syz.1.1321" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 645.421562][ T6182] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 645.468988][ T6182] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 663.027771][ T6267] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6267 comm=syz.0.1361 [ 664.585990][ T30] audit: type=1400 audit(664.180:208): avc: denied { mount } for pid=6277 comm="syz.1.1368" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 664.591049][ T30] audit: type=1400 audit(664.180:209): avc: denied { remount } for pid=6277 comm="syz.1.1368" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 664.681589][ T30] audit: type=1400 audit(664.270:210): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 667.955093][ T30] audit: type=1400 audit(667.540:211): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 669.450417][ T1174] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 669.708840][ T1174] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 669.889064][ T1174] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 669.911501][ T30] audit: type=1400 audit(669.500:212): avc: denied { read } for pid=6317 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 669.916718][ T30] audit: type=1400 audit(669.510:213): avc: denied { open } for pid=6317 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 670.308881][ T1174] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 671.241347][ T30] audit: type=1400 audit(670.830:214): avc: denied { read } for pid=3162 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 674.035034][ T1174] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 674.121762][ T1174] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 674.194334][ T1174] bond0 (unregistering): Released all slaves [ 674.977268][ T1174] hsr_slave_0: left promiscuous mode [ 675.008581][ T1174] hsr_slave_1: left promiscuous mode [ 675.387280][ T1174] veth1_macvtap: left promiscuous mode [ 675.398447][ T1174] veth0_macvtap: left promiscuous mode [ 675.402101][ T1174] veth1_vlan: left promiscuous mode [ 675.430062][ T1174] veth0_vlan: left promiscuous mode [ 675.931566][ T30] audit: type=1400 audit(675.520:215): avc: denied { ioctl } for pid=6336 comm="syz.1.1394" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=13788 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 677.901649][ T30] audit: type=1400 audit(677.490:216): avc: denied { create } for pid=6344 comm="syz.1.1398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 677.931872][ T30] audit: type=1400 audit(677.520:217): avc: denied { write } for pid=6344 comm="syz.1.1398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 678.800083][ T30] audit: type=1400 audit(678.390:218): avc: denied { setopt } for pid=6350 comm="syz.1.1401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 696.211254][ T6317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 696.406430][ T6317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 705.285258][ T30] audit: type=1400 audit(704.840:219): avc: denied { ioctl } for pid=6479 comm="syz.1.1443" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x700f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 705.330060][ T6317] hsr_slave_0: entered promiscuous mode [ 705.377247][ T6317] hsr_slave_1: entered promiscuous mode [ 710.699930][ T6317] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 710.861592][ T6317] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 710.972574][ T6317] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 711.160953][ T6317] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 716.465875][ T6317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 741.297108][ T6317] veth0_vlan: entered promiscuous mode [ 741.557194][ T6317] veth1_vlan: entered promiscuous mode [ 742.418490][ T6317] veth0_macvtap: entered promiscuous mode [ 742.538970][ T6317] veth1_macvtap: entered promiscuous mode [ 742.789349][ T6667] syz_tun: entered allmulticast mode [ 743.391575][ T6335] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 743.395385][ T1221] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 743.397399][ T26] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 743.398468][ T26] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 744.387984][ T30] audit: type=1400 audit(743.970:220): avc: denied { mounton } for pid=6317 comm="syz-executor" path="/syzkaller.eOytNY/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 744.946935][ T30] audit: type=1400 audit(744.540:221): avc: denied { unmount } for pid=6317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 744.960228][ T30] audit: type=1400 audit(744.550:222): avc: denied { mounton } for pid=6317 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 793.998150][ T30] audit: type=1400 audit(793.590:223): avc: denied { setattr } for pid=6935 comm="syz.2.1622" name="LLC" dev="sockfs" ino=15891 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 795.055444][ T30] audit: type=1400 audit(794.640:224): avc: denied { write } for pid=6940 comm="syz.1.1624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 795.138813][ T30] audit: type=1400 audit(794.730:225): avc: denied { ioctl } for pid=6940 comm="syz.1.1624" path="socket:[15914]" dev="sockfs" ino=15914 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 800.587428][ T30] audit: type=1400 audit(800.170:226): avc: denied { getopt } for pid=6970 comm="syz.1.1638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 810.861455][ T30] audit: type=1400 audit(810.450:227): avc: denied { remount } for pid=7033 comm="syz.2.1670" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 810.877699][ T7034] ======================================================= [ 810.877699][ T7034] WARNING: The mand mount option has been deprecated and [ 810.877699][ T7034] and is ignored by this kernel. Remove the mand [ 810.877699][ T7034] option from the mount to silence this warning. [ 810.877699][ T7034] ======================================================= [ 811.279672][ T30] audit: type=1400 audit(810.870:228): avc: denied { read } for pid=7035 comm="syz.1.1671" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 811.327947][ T30] audit: type=1400 audit(810.920:229): avc: denied { open } for pid=7035 comm="syz.1.1671" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 811.544596][ T30] audit: type=1400 audit(811.130:230): avc: denied { map } for pid=7035 comm="syz.1.1671" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 811.674035][ T30] audit: type=1400 audit(811.230:231): avc: denied { ioctl } for pid=7035 comm="syz.1.1671" path="/dev/usbmon0" dev="devtmpfs" ino=696 ioctlcmd=0x9204 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 813.056036][ T30] audit: type=1400 audit(812.640:232): avc: denied { setopt } for pid=7045 comm="syz.2.1676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 817.262240][ T30] audit: type=1400 audit(816.840:233): avc: denied { bind } for pid=7066 comm="syz.2.1687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 817.275743][ T30] audit: type=1400 audit(816.850:234): avc: denied { mounton } for pid=7065 comm="syz.1.1686" path="/834/bus" dev="tmpfs" ino=4304 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 817.496473][ T30] audit: type=1400 audit(817.090:235): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 820.737983][ T30] audit: type=1400 audit(820.330:236): avc: denied { open } for pid=7088 comm="syz.2.1698" path="/dev/ptyq9" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 821.158756][ T7092] binfmt_misc: register: failed to install interpreter file ./file0 [ 822.088676][ T30] audit: type=1400 audit(821.680:237): avc: denied { create } for pid=7097 comm="syz.2.1703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 822.164737][ T30] audit: type=1400 audit(821.750:238): avc: denied { write } for pid=7097 comm="syz.2.1703" path="socket:[16468]" dev="sockfs" ino=16468 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 822.710102][ T30] audit: type=1400 audit(822.300:239): avc: denied { setopt } for pid=7097 comm="syz.2.1703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 834.111779][ T30] audit: type=1400 audit(833.700:240): avc: denied { read } for pid=7153 comm="syz.1.1728" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 834.127909][ T30] audit: type=1400 audit(833.720:241): avc: denied { open } for pid=7153 comm="syz.1.1728" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 881.764692][ T30] audit: type=1400 audit(881.350:242): avc: denied { create } for pid=7412 comm="syz.1.1854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 881.820759][ T30] audit: type=1400 audit(881.410:243): avc: denied { write } for pid=7412 comm="syz.1.1854" path="socket:[17741]" dev="sockfs" ino=17741 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 887.426072][ T30] audit: type=1400 audit(887.020:244): avc: denied { bind } for pid=7445 comm="syz.2.1871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 900.886745][ T7521] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7521 comm=syz.1.1907 [ 910.781654][ T30] audit: type=1400 audit(910.370:245): avc: denied { read } for pid=7566 comm="syz.2.1930" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 914.275673][ T30] audit: type=1400 audit(913.860:246): avc: denied { create } for pid=7578 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 914.346379][ T30] audit: type=1400 audit(913.940:247): avc: denied { write open } for pid=7578 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=4467 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 914.453892][ T30] audit: type=1400 audit(913.960:248): avc: denied { append } for pid=7578 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=4467 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 914.477476][ T30] audit: type=1400 audit(914.070:249): avc: denied { getattr } for pid=7578 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 915.825256][ T30] audit: type=1400 audit(915.400:250): avc: denied { read } for pid=7588 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 917.121378][ T30] audit: type=1400 audit(916.710:251): avc: denied { unlink } for pid=7596 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=4467 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 917.277262][ T30] audit: type=1400 audit(916.870:252): avc: denied { write } for pid=7598 comm="syz.1.1944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 917.338469][ T30] audit: type=1400 audit(916.930:253): avc: denied { read } for pid=7598 comm="syz.1.1944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 940.325511][ T30] audit: type=1400 audit(939.890:254): avc: denied { setattr } for pid=7724 comm="syz.2.2005" name="fd" dev="proc" ino=18181 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 949.387417][ T30] audit: type=1400 audit(948.980:255): avc: denied { setopt } for pid=7780 comm="syz.2.2032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 964.286984][ T30] audit: type=1400 audit(963.880:256): avc: denied { write } for pid=7853 comm="syz.1.2067" path="socket:[18403]" dev="sockfs" ino=18403 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 968.589644][ T30] audit: type=1400 audit(968.180:257): avc: denied { setopt } for pid=7880 comm="syz.1.2080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 969.676280][ T30] audit: type=1400 audit(969.270:258): avc: denied { write } for pid=7885 comm="syz.1.2083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 975.041113][ T7913] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7913 comm=syz.2.2096 [ 980.252378][ T7944] netlink: 4083 bytes leftover after parsing attributes in process `syz.2.2111'. [ 984.677502][ T30] audit: type=1400 audit(984.270:259): avc: denied { connect } for pid=7968 comm="syz.1.2123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 984.730777][ T30] audit: type=1400 audit(984.300:260): avc: denied { ioctl } for pid=7968 comm="syz.1.2123" path="socket:[19611]" dev="sockfs" ino=19611 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 985.871389][ T30] audit: type=1400 audit(985.460:261): avc: denied { setopt } for pid=7972 comm="syz.1.2125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1004.196038][ T30] audit: type=1400 audit(1003.760:262): avc: denied { bind } for pid=8075 comm="syz.1.2176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1020.047372][ T30] audit: type=1400 audit(1019.640:263): avc: denied { bind } for pid=8159 comm="syz.2.2218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1020.080331][ T30] audit: type=1400 audit(1019.660:264): avc: denied { accept } for pid=8159 comm="syz.2.2218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1040.167126][ T30] audit: type=1400 audit(1039.760:265): avc: denied { ioctl } for pid=8256 comm="syz.1.2265" path="socket:[20160]" dev="sockfs" ino=20160 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1052.401355][ T30] audit: type=1400 audit(1051.990:266): avc: denied { map } for pid=8341 comm="syz.1.2306" path="socket:[20284]" dev="sockfs" ino=20284 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1055.348751][ T30] audit: type=1400 audit(1054.920:267): avc: denied { name_bind } for pid=8365 comm="syz.2.2318" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1061.329996][ T30] audit: type=1400 audit(1060.920:268): avc: denied { create } for pid=8401 comm="syz.1.2335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1064.685801][ T3463] hid-generic 007F:6E8D:0005.0002: item fetching failed at offset 1/5 [ 1064.691892][ T3463] hid-generic 007F:6E8D:0005.0002: probe with driver hid-generic failed with error -22 [ 1070.462127][ T30] audit: type=1400 audit(1070.050:269): avc: denied { create } for pid=8452 comm="syz.1.2359" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1070.532389][ T30] audit: type=1400 audit(1070.120:270): avc: denied { read } for pid=8452 comm="syz.1.2359" name="file0" dev="tmpfs" ino=5693 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1070.549752][ T30] audit: type=1400 audit(1070.140:271): avc: denied { open } for pid=8452 comm="syz.1.2359" path="/1106/file0" dev="tmpfs" ino=5693 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1070.608581][ T30] audit: type=1400 audit(1070.200:272): avc: denied { ioctl } for pid=8452 comm="syz.1.2359" path="/1106/file0" dev="tmpfs" ino=5693 ioctlcmd=0x125d scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1070.875723][ T30] audit: type=1400 audit(1070.460:273): avc: denied { unlink } for pid=3318 comm="syz-executor" name="file0" dev="tmpfs" ino=5693 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1084.419798][ T8521] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8521 comm=syz.1.2391 [ 1098.482388][ T30] audit: type=1400 audit(1098.070:274): avc: denied { unlink } for pid=6317 comm="syz-executor" name=131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 dev="tmpfs" ino=2903 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1098.628757][ T30] audit: type=1400 audit(1098.220:275): avc: denied { ioctl } for pid=8599 comm="syz.1.2430" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1109.715507][ T30] audit: type=1400 audit(1109.300:276): avc: denied { setattr } for pid=8660 comm="syz.2.2460" name="" dev="pipefs" ino=13011 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1128.288941][ T30] audit: type=1400 audit(1127.880:277): avc: denied { validate_trans } for pid=8771 comm="syz.1.2512" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1138.161517][ T30] audit: type=1400 audit(1137.750:278): avc: denied { setopt } for pid=8821 comm="syz.2.2537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1160.989182][ T30] audit: type=1400 audit(1160.570:279): avc: denied { mount } for pid=8959 comm="syz.2.2606" name="/" dev="pstore" ino=3228 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1161.020998][ T30] audit: type=1400 audit(1160.610:280): avc: denied { remount } for pid=8959 comm="syz.2.2606" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1161.188573][ T30] audit: type=1400 audit(1160.760:281): avc: denied { unmount } for pid=6317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1162.915588][ T30] audit: type=1400 audit(1162.510:282): avc: denied { write } for pid=8968 comm="syz.2.2610" name="file0" dev="tmpfs" ino=3471 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1166.340181][ T30] audit: type=1400 audit(1165.920:283): avc: denied { ioctl } for pid=8992 comm="syz.2.2622" path="socket:[22603]" dev="sockfs" ino=22603 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1183.626701][ T9101] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1183.647304][ T9101] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1185.642692][ T30] audit: type=1400 audit(1185.230:284): avc: denied { module_load } for pid=9113 comm="syz.2.2680" path=2F6D656D66643A20C736BE918D183229219A25A2D238D606070EFCFE128F2613AE254054A3B03E5CECA9F951403641108C6E7C202864656C6574656429 dev="hugetlbfs" ino=23722 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=system permissive=1 [ 1185.943032][ T9114] Invalid ELF header magic: != ELF [ 1193.638196][ T9144] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9144 comm=syz.2.2695 [ 1198.411122][ T30] audit: type=1400 audit(1198.000:285): avc: denied { getattr } for pid=9167 comm="syz.1.2706" name="[userfaultfd]" dev="anon_inodefs" ino=22813 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1212.060890][ T30] audit: type=1400 audit(1211.650:286): avc: denied { write } for pid=9233 comm="syz.2.2737" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1216.191708][ T30] audit: type=1400 audit(1215.780:287): avc: denied { nlmsg_write } for pid=9252 comm="syz.2.2747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1243.392550][ T9410] loop7: detected capacity change from 0 to 7 [ 1254.414805][ T30] audit: type=1400 audit(1253.990:288): avc: denied { ioctl } for pid=9426 comm="syz.1.2833" path="/dev/ttyq6" dev="devtmpfs" ino=373 ioctlcmd=0x542a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1256.589370][ T9444] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9444 comm=syz.1.2841 [ 1293.000180][ T30] audit: type=1400 audit(1292.590:289): avc: denied { ioctl } for pid=9651 comm="syz.2.2943" path="socket:[25646]" dev="sockfs" ino=25646 ioctlcmd=0x5541 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1320.052316][ T9807] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2305 sclass=netlink_route_socket pid=9807 comm=syz.1.3016 [ 1333.041986][ T30] audit: type=1400 audit(1332.630:290): avc: denied { ioctl } for pid=9874 comm="syz.2.3053" path="socket:[24930]" dev="sockfs" ino=24930 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1337.800690][ T30] audit: type=1400 audit(1337.390:291): avc: denied { setattr } for pid=9908 comm="syz.2.3069" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1344.007535][ T9957] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9957 comm=syz.2.3092 [ 1344.387496][ T9960] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9960 comm=syz.2.3094 [ 1344.647287][ T30] audit: type=1400 audit(1344.230:292): avc: denied { relabelfrom } for pid=9961 comm="syz.1.3095" name="NETLINK" dev="sockfs" ino=26263 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1344.656307][ T30] audit: type=1400 audit(1344.240:293): avc: denied { relabelto } for pid=9961 comm="syz.1.3095" name="NETLINK" dev="sockfs" ino=26263 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_audit_socket permissive=1 [ 1353.912721][ T30] audit: type=1400 audit(1353.500:294): avc: denied { lock } for pid=10006 comm="syz.1.3115" path="socket:[25116]" dev="sockfs" ino=25116 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 1362.981815][T10071] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10071 comm=syz.2.3145 [ 1371.101258][ T30] audit: type=1400 audit(1370.680:295): avc: denied { setopt } for pid=10114 comm="syz.2.3167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1371.897053][ T30] audit: type=1400 audit(1371.490:296): avc: denied { read } for pid=10118 comm="syz.1.3168" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1371.899933][ T30] audit: type=1400 audit(1371.490:297): avc: denied { open } for pid=10118 comm="syz.1.3168" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1393.858243][T10255] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3232'. [ 1395.873973][ T30] audit: type=1400 audit(1395.460:298): avc: denied { mount } for pid=10264 comm="syz.2.3238" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1395.905836][ T30] audit: type=1400 audit(1395.490:299): avc: denied { remount } for pid=10264 comm="syz.2.3238" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1395.992395][ T30] audit: type=1400 audit(1395.580:300): avc: denied { unmount } for pid=6317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1403.967428][ T30] audit: type=1400 audit(1403.560:301): avc: denied { create } for pid=10321 comm="syz.2.3266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1404.008734][ T30] audit: type=1400 audit(1403.590:302): avc: denied { write } for pid=10321 comm="syz.2.3266" path="socket:[25595]" dev="sockfs" ino=25595 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1404.028524][ T30] audit: type=1400 audit(1403.620:303): avc: denied { nlmsg_read } for pid=10321 comm="syz.2.3266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1404.042030][ T30] audit: type=1400 audit(1403.630:304): avc: denied { nlmsg_write } for pid=10321 comm="syz.2.3266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1404.054791][ T30] audit: type=1400 audit(1403.650:305): avc: denied { read } for pid=10321 comm="syz.2.3266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1433.196799][T10547] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=10547 comm=syz.2.3377 [ 1471.999751][T10800] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1538 sclass=netlink_audit_socket pid=10800 comm=syz.2.3499 [ 1474.304741][ T30] audit: type=1400 audit(1473.890:306): avc: denied { append } for pid=10819 comm="syz.2.3509" name="loop6" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1480.659113][ T30] audit: type=1400 audit(1480.250:307): avc: denied { ioctl } for pid=10864 comm="syz.2.3531" path="socket:[28817]" dev="sockfs" ino=28817 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1484.606274][T10895] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10895 comm=syz.2.3546 [ 1484.690410][T10895] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1486.269833][T10907] ucma_write: process 2576 (syz.2.3551) changed security contexts after opening file descriptor, this is not allowed. [ 1497.775492][ T30] audit: type=1400 audit(1497.360:308): avc: denied { create } for pid=10973 comm="syz.1.3584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1497.790534][ T30] audit: type=1400 audit(1497.380:309): avc: denied { setopt } for pid=10973 comm="syz.1.3584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1505.466891][T11022] netlink: 56 bytes leftover after parsing attributes in process `syz.1.3607'. [ 1505.526643][T11022] netlink: 56 bytes leftover after parsing attributes in process `syz.1.3607'. [ 1514.081232][ T30] audit: type=1400 audit(1513.650:310): avc: granted { setsecparam } for pid=11077 comm="syz.1.3635" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1523.655332][ T30] audit: type=1400 audit(1523.240:311): avc: denied { getopt } for pid=11140 comm="syz.2.3666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1541.168215][T11257] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11257 comm=syz.2.3722 [ 1543.459784][ T30] audit: type=1400 audit(1543.050:312): avc: denied { write } for pid=11271 comm="syz.2.3729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1554.218605][ T30] audit: type=1400 audit(2000000009.270:313): avc: denied { read } for pid=11341 comm="syz.2.3763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1577.086617][ T30] audit: type=1400 audit(2000000032.140:314): avc: denied { getopt } for pid=11487 comm="syz.2.3834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1599.482005][T11631] input: syz1 as /devices/virtual/input/input1 [ 1609.467387][T11685] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11685 comm=syz.1.3928 [ 1613.728715][ T30] audit: type=1400 audit(2000000068.780:315): avc: denied { write } for pid=11710 comm="syz.1.3940" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1638.378598][ T30] audit: type=1400 audit(2000000093.430:316): avc: denied { lock } for pid=11863 comm="syz.2.4014" path="socket:[32255]" dev="sockfs" ino=32255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1644.247292][T11909] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=11909 comm=syz.1.4036 [ 1645.982298][ T30] audit: type=1400 audit(2000000101.030:317): avc: denied { mount } for pid=11918 comm="syz.2.4041" name="/" dev="pipefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1670.698866][T12070] sock: sock_set_timeout: `syz.1.4114' (pid 12070) tries to set negative timeout [ 1708.589622][T12287] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2579 sclass=netlink_tcpdiag_socket pid=12287 comm=syz.1.4220 [ 1720.367042][T12361] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12361 comm=syz.1.4256 [ 1722.364679][ T30] audit: type=1400 audit(2000000177.390:318): avc: denied { map } for pid=12370 comm="syz.1.4261" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1722.440630][T12371] binder_alloc: binder_alloc_mmap_handler: 12370 20ff8000-20ffc000 already mapped failed -16 [ 1742.247169][T12483] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12483 comm=syz.2.4315 [ 1748.429221][ T30] audit: type=1400 audit(2000000203.480:319): avc: denied { ioctl } for pid=12517 comm="syz.2.4333" path="pid:[4026532913]" dev="nsfs" ino=4026532913 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1755.876034][ T30] audit: type=1400 audit(2000000210.930:320): avc: denied { name_bind } for pid=12563 comm="syz.1.4355" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1760.088896][ T30] audit: type=1400 audit(2000000215.140:321): avc: denied { ioctl } for pid=12580 comm="syz.2.4363" path="socket:[34824]" dev="sockfs" ino=34824 ioctlcmd=0x891a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1789.751954][T12783] hugetlbfs: syz.1.4461 (12783): Using mlock ulimits for SHM_HUGETLB is obsolete [ 1809.001329][ T30] audit: type=1400 audit(2000000264.050:322): avc: denied { bind } for pid=12906 comm="syz.1.4521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1809.018140][ T30] audit: type=1400 audit(2000000264.070:323): avc: denied { name_bind } for pid=12906 comm="syz.1.4521" src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 1809.029856][ T30] audit: type=1400 audit(2000000264.080:324): avc: denied { node_bind } for pid=12906 comm="syz.1.4521" saddr=600::920:0:0:0 src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 1812.424987][T12929] serio: Serial port ptm0 [ 1820.988294][T12984] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12984 comm=syz.1.4558 [ 1828.525270][ T30] audit: type=1400 audit(2000000283.560:325): avc: denied { mount } for pid=13033 comm="syz.2.4584" name="/" dev="hugetlbfs" ino=36388 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1828.785868][ T30] audit: type=1400 audit(2000000283.820:326): avc: denied { unmount } for pid=6317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1831.609520][T13053] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13053 comm=syz.2.4592 [ 1886.170405][T13359] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=513 sclass=netlink_audit_socket pid=13359 comm=syz.1.4738 [ 1921.784231][T13577] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13577 comm=syz.1.4843 [ 1923.936153][T13584] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=15 sclass=netlink_audit_socket pid=13584 comm=syz.2.4847 [ 1946.071127][T13673] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13673 comm=syz.1.4889 [ 1958.489736][ T30] audit: type=1400 audit(2000000413.510:327): avc: denied { set_context_mgr } for pid=13756 comm="syz.2.4932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1981.295239][ T30] audit: type=1400 audit(2000000436.330:328): avc: denied { mount } for pid=13905 comm="syz.2.5005" name="/" dev="ramfs" ino=38891 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1990.847179][ T30] audit: type=1400 audit(2000000445.900:329): avc: denied { remount } for pid=13975 comm="syz.1.5039" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2002.567960][T14059] misc userio: Can't change port type on an already running userio instance [ 2003.597691][T13908] atkbd serio1: keyboard reset failed on [ 2034.237714][T14241] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=525 sclass=netlink_audit_socket pid=14241 comm=syz.2.5167 [ 2034.775699][T14245] mmap: syz.1.5168 (14245) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 2054.846483][T14368] misc userio: Begin command sent, but we're already running [ 2066.610064][T14426] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14426 comm=syz.1.5256 [ 2080.688140][ T30] audit: type=1400 audit(2000000535.740:330): avc: denied { write } for pid=14520 comm="syz.1.5302" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2080.788743][ T30] audit: type=1400 audit(2000000535.830:331): avc: denied { setattr } for pid=14520 comm="syz.1.5302" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2094.637980][T14618] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1025 sclass=netlink_xfrm_socket pid=14618 comm=syz.1.5349 [ 2105.678263][T14706] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=14706 comm=syz.2.5390 [ 2112.695433][T14741] input: syz0 as /devices/virtual/input/input3 [ 2113.211584][ T30] audit: type=1400 audit(2000000568.260:332): avc: denied { append } for pid=14742 comm="syz.1.5408" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2113.272911][T14744] usb usb1: usbfs: process 14744 (syz.1.5408) did not claim interface 0 before use [ 2114.392091][T14751] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pid=14751 comm=syz.2.5412 [ 2117.046913][ T30] audit: type=1400 audit(2000000572.080:333): avc: denied { bind } for pid=14771 comm="syz.2.5423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2135.321769][ T30] audit: type=1400 audit(2000000590.370:334): avc: denied { nlmsg_tty_audit } for pid=14901 comm="syz.1.5484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2146.918237][T14980] syz.2.5522(14980): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 2159.532014][ T30] audit: type=1400 audit(2000000614.580:335): avc: denied { read } for pid=15052 comm="syz.1.5557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2160.817640][T15060] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15060 comm=syz.2.5561 [ 2169.150225][ T30] audit: type=1400 audit(2000000624.200:336): avc: denied { watch watch_reads } for pid=15112 comm="syz.2.5585" path="/2490" dev="tmpfs" ino=12920 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2170.587673][T15120] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15120 comm=syz.2.5588 [ 2181.270174][T15191] binder: BINDER_SET_CONTEXT_MGR already set [ 2181.270732][T15191] binder: 15190:15191 ioctl 4018620d 20000040 returned -16 [ 2200.395200][T15308] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15308 comm=syz.2.5680 [ 2204.223751][ T30] audit: type=1400 audit(2000000659.270:337): avc: denied { write } for pid=15338 comm="syz.2.5696" path="socket:[44559]" dev="sockfs" ino=44559 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2206.156410][T15354] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15354 comm=syz.2.5704 [ 2211.467212][T15392] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=15392 comm=syz.2.5722 [ 2227.967998][ T30] audit: type=1400 audit(2000000683.020:338): avc: denied { setattr } for pid=15491 comm="syz.1.5771" name="cuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 2244.295061][T15607] loop4: detected capacity change from 0 to 524288000 [ 2245.435442][T15614] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15614 comm=syz.2.5829 [ 2249.016881][T15632] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15632 comm=syz.2.5838 [ 2268.586068][ T30] audit: type=1400 audit(2000000723.630:339): avc: denied { compute_member } for pid=15755 comm="syz.1.5897" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 2277.286274][ T30] audit: type=1400 audit(2000000732.330:340): avc: denied { mounton } for pid=15803 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2277.478287][ T6335] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2277.875669][ T6335] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2278.299711][ T6335] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2278.701182][ T6335] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2284.244589][ T6335] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2284.298958][ T6335] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2284.362338][ T6335] bond0 (unregistering): Released all slaves [ 2285.009255][ T6335] hsr_slave_0: left promiscuous mode [ 2285.025468][ T6335] hsr_slave_1: left promiscuous mode [ 2285.122168][ T6335] veth1_macvtap: left promiscuous mode [ 2285.125128][ T6335] veth0_macvtap: left promiscuous mode [ 2285.126632][ T6335] veth1_vlan: left promiscuous mode [ 2285.128709][ T6335] veth0_vlan: left promiscuous mode [ 2306.467663][T15803] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2306.501433][T15803] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2309.266404][ T30] audit: type=1400 audit(2000000764.310:341): avc: denied { name_bind } for pid=15909 comm="syz.1.5954" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 2315.830767][T15803] hsr_slave_0: entered promiscuous mode [ 2315.849973][T15803] hsr_slave_1: entered promiscuous mode [ 2320.361645][T15803] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2320.491399][T15803] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2320.568948][T15803] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2320.675099][T15803] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2327.872118][T15803] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2347.517516][T15803] veth0_vlan: entered promiscuous mode [ 2347.712392][T15803] veth1_vlan: entered promiscuous mode [ 2348.285134][T15803] veth0_macvtap: entered promiscuous mode [ 2348.467396][T15803] veth1_macvtap: entered promiscuous mode [ 2348.985978][ T6335] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2348.991778][ T6335] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2348.995474][ T6335] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2349.010711][ T6335] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2350.171018][ T30] audit: type=1400 audit(2000000805.220:342): avc: denied { mounton } for pid=15803 comm="syz-executor" path="/syzkaller.AQfsLB/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 2366.268680][ T30] audit: type=1400 audit(2000000821.320:343): avc: denied { mounton } for pid=16163 comm="syz.3.6031" path="/27/file0" dev="tmpfs" ino=159 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 2369.037638][ T30] audit: type=1400 audit(2000000824.080:344): avc: denied { create } for pid=16160 comm="syz.1.6028" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2389.464814][ T30] audit: type=1400 audit(2000000844.490:345): avc: denied { map } for pid=16257 comm="syz.3.6073" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2389.465381][ T30] audit: type=1400 audit(2000000844.500:346): avc: denied { execute } for pid=16257 comm="syz.3.6073" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2420.348098][T16391] vxcan0: tx address claim with dlc 0 [ 2470.597022][ T30] audit: type=1400 audit(2000000925.650:347): avc: denied { connect } for pid=16645 comm="syz.1.6262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2470.624109][ T30] audit: type=1400 audit(2000000925.670:348): avc: denied { bind } for pid=16645 comm="syz.1.6262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2479.460128][ T30] audit: type=1400 audit(2000000934.510:349): avc: denied { lock } for pid=16689 comm="syz.3.6282" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2480.641586][T16696] loop0: detected capacity change from 0 to 808 [ 2508.032629][T16836] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16836 comm=syz.1.6353 [ 2537.344907][ T30] audit: type=1400 audit(2000000992.400:350): avc: denied { name_bind } for pid=17022 comm="syz.3.6445" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 2576.239750][ T30] audit: type=1400 audit(2000001031.270:351): avc: denied { mount } for pid=17253 comm="syz.3.6559" name="/" dev="ramfs" ino=51010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 2577.919923][ T30] audit: type=1400 audit(2000001032.970:352): avc: denied { setopt } for pid=17261 comm="syz.1.6563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2581.581738][T17286] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=17286 comm=syz.3.6575 [ 2586.641177][T17314] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17314 comm=syz.1.6587 [ 2587.506925][ T30] audit: type=1400 audit(2000001042.550:353): avc: denied { create } for pid=17320 comm="syz.3.6592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 2587.576305][ T30] audit: type=1400 audit(2000001042.590:354): avc: denied { write } for pid=17320 comm="syz.3.6592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 2688.331431][T17851] cgroup: Unknown subsys name 'cpuset' [ 2693.219865][ T30] audit: type=1400 audit(2000001148.270:355): avc: denied { mount } for pid=17873 comm="syz.3.6861" name="/" dev="configfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 2694.206476][T17880] tun0: tun_chr_ioctl cmd 2148553947 [ 2760.902662][T18137] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18137 comm=syz.1.6985 [ 2776.901741][T18212] netlink: 12 bytes leftover after parsing attributes in process `syz.3.7024'. [ 2785.525318][T18253] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18253 comm=syz.3.7043 [ 2796.386238][T18294] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18294 comm=syz.3.7063 [ 2803.870128][ T30] audit: type=1400 audit(2000000043.030:356): avc: denied { mount } for pid=18317 comm="syz.3.7076" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 2804.539717][ T30] audit: type=1400 audit(2000000043.700:357): avc: denied { setattr } for pid=18323 comm="syz.3.7078" name="mixer" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 2807.482710][T18336] netlink: 'syz.1.7083': attribute type 13 has an invalid length. [ 2851.473694][ T30] audit: type=1400 audit(2000000090.630:358): avc: denied { search } for pid=18502 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2851.475530][ T30] audit: type=1400 audit(2000000090.640:359): avc: denied { search } for pid=18502 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=721 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2851.477313][ T30] audit: type=1400 audit(2000000090.640:360): avc: denied { search } for pid=18502 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=901 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2851.495030][ T30] audit: type=1400 audit(2000000090.650:361): avc: denied { search } for pid=18502 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=902 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2851.622354][ T30] audit: type=1400 audit(2000000090.780:362): avc: denied { read open } for pid=18506 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=902 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2851.687340][ T30] audit: type=1400 audit(2000000090.850:363): avc: denied { getattr } for pid=18506 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=902 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2852.210936][ T30] audit: type=1400 audit(2000000091.370:364): avc: denied { add_name } for pid=18502 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2854.935177][ T30] audit: type=1400 audit(2000000094.090:365): avc: denied { remove_name } for pid=18514 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=13558 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2867.215827][T18579] input: syz1 as /devices/virtual/input/input4 [ 2868.601040][ T30] audit: type=1400 audit(2000000107.760:366): avc: denied { shutdown } for pid=18586 comm="syz.3.7200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2880.540226][T18656] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44 sclass=netlink_audit_socket pid=18656 comm=syz.3.7234 [ 2903.671068][ T30] audit: type=1400 audit(2000000142.830:367): avc: denied { write } for pid=18792 comm="syz.3.7300" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2923.765942][T18911] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18911 comm=syz.3.7358 [ 2931.646875][ T30] audit: type=1400 audit(2000000170.800:368): avc: denied { setattr } for pid=15803 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 2944.760398][ T30] audit: type=1400 audit(2000000183.920:369): avc: denied { bind } for pid=18978 comm="syz.1.7393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2978.700084][T16307] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2979.498384][T16307] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2980.269530][T16307] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2980.656623][T16307] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2983.228732][T19052] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5125 sclass=netlink_audit_socket pid=19052 comm=syz.1.7423 [ 2989.148298][T16307] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2989.305301][T16307] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2989.455935][T16307] bond0 (unregistering): Released all slaves [ 2991.736676][T16307] hsr_slave_0: left promiscuous mode [ 2991.756987][T16307] hsr_slave_1: left promiscuous mode [ 2992.126266][T16307] veth1_macvtap: left promiscuous mode [ 2992.128756][T16307] veth0_macvtap: left promiscuous mode [ 2992.139503][T16307] veth1_vlan: left promiscuous mode [ 2992.145490][T16307] veth0_vlan: left promiscuous mode [ 3008.508957][T19036] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3008.639987][T19036] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3010.465008][T19146] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=637 sclass=netlink_route_socket pid=19146 comm=syz.1.7451 [ 3014.881920][T19036] hsr_slave_0: entered promiscuous mode [ 3014.917542][T19036] hsr_slave_1: entered promiscuous mode [ 3019.330720][T19036] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 3019.366975][T19036] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 3019.466779][T19036] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 3019.591629][T19036] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 3022.601127][T19203] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19203 comm=syz.1.7462 [ 3024.276905][T19036] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3028.068079][T19225] fuse: Bad value for 'fd' [ 3043.856869][T19036] veth0_vlan: entered promiscuous mode [ 3043.999850][T19036] veth1_vlan: entered promiscuous mode [ 3044.895495][T19036] veth0_macvtap: entered promiscuous mode [ 3045.196853][T19036] veth1_macvtap: entered promiscuous mode [ 3046.406603][ T6635] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3046.407547][ T6635] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3046.407856][ T6635] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3046.408185][ T6635] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3063.338715][ T30] audit: type=1400 audit(2000000302.500:370): avc: denied { setattr } for pid=19397 comm="syz.4.7521" name="[io_uring]" dev="anon_inodefs" ino=58584 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3064.116544][ T30] audit: type=1800 audit(2000000303.260:371): pid=19398 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=set_data cause=unavailable-hash-algorithm comm="syz.4.7521" name="/" dev="anon_inodefs" ino=58584 res=0 errno=0 [ 3097.951268][ T30] audit: type=1400 audit(2000000337.110:372): avc: denied { search } for pid=19562 comm="syz.4.7600" name="/" dev="configfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 3097.989115][ T30] audit: type=1400 audit(2000000337.140:373): avc: denied { setattr } for pid=19562 comm="syz.4.7600" name="/" dev="configfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 3136.342253][ T30] audit: type=1400 audit(2000000375.490:374): avc: denied { connect } for pid=19806 comm="syz.4.7720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3181.445571][T20049] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20049 comm=syz.1.7835 [ 3188.317567][T20092] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=20092 comm=syz.1.7856 [ 3225.799133][T20310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20310 comm=syz.4.7964 [ 3238.455705][T20373] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20373 comm=syz.4.7994 [ 3244.679559][T20411] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20411 comm=syz.1.8013 [ 3244.947013][T20413] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20413 comm=syz.4.8014 [ 3257.435341][T20472] support for cryptoloop has been removed. Use dm-crypt instead. [ 3263.005142][ T30] audit: type=1400 audit(2000000502.150:375): avc: denied { map } for pid=20504 comm="syz.4.8058" path="/proc/673/net/fib_trie" dev="proc" ino=4026532627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3306.869728][T20755] fuse: Bad value for 'fd' [ 3342.136563][T20948] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5136 sclass=netlink_audit_socket pid=20948 comm=syz.1.8276 [ 3351.589396][T20998] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20998 comm=syz.4.8300 [ 3356.110020][T21027] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pid=21027 comm=syz.4.8315 [ 3359.917759][ T30] audit: type=1400 audit(2000000599.080:376): avc: denied { read open } for pid=21055 comm="syz.1.8328" path="/" dev="configfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 3379.648156][T21180] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21180 comm=syz.4.8391 [ 3382.969298][T21204] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21204 comm=syz.1.8401 [ 3396.790503][ T30] audit: type=1400 audit(2000000635.950:377): avc: denied { mount } for pid=21289 comm="syz.4.8446" name="/" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 3409.758587][ T30] audit: type=1400 audit(2000000648.920:378): avc: denied { getopt } for pid=21383 comm="syz.4.8492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3413.507575][T21406] input: syz0 as /devices/virtual/input/input5 [ 3419.192682][T21432] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21432 comm=syz.4.8516 [ 3439.716075][T21571] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21571 comm=syz.4.8586 [ 3453.228478][T21646] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21646 comm=syz.4.8621 [ 3461.316682][T21698] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21698 comm=syz.1.8646 [ 3490.665650][ T49] block nbd4: Receive control failed (result -32) [ 3490.666356][T21835] block nbd4: shutting down sockets [ 3577.056698][T22170] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=273 sclass=netlink_tcpdiag_socket pid=22170 comm=syz.1.8872 [ 3589.139326][ T30] audit: type=1400 audit(2000000828.300:379): avc: denied { append } for pid=22198 comm="syz.4.8887" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 3597.901436][T22222] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pid=22222 comm=syz.1.8896 [ 3604.621853][T22242] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22242 comm=syz.1.8907 [ 3621.100422][ T30] audit: type=1400 audit(2000000860.240:380): avc: denied { map } for pid=22309 comm="syz.4.8941" path="socket:[67976]" dev="sockfs" ino=67976 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 3630.360124][T22350] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=22350 comm=syz.4.8960 [ 3640.107956][T22388] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1541 sclass=netlink_tcpdiag_socket pid=22388 comm=syz.4.8978 [ 3680.180551][ T30] audit: type=1400 audit(2000000919.340:381): avc: denied { getopt } for pid=22536 comm="syz.1.9049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3685.504466][ T30] audit: type=1400 audit(2000000924.660:382): avc: denied { ioctl } for pid=22559 comm="syz.4.9061" path="socket:[67284]" dev="sockfs" ino=67284 ioctlcmd=0x89b0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3765.023236][ C1] hrtimer: interrupt took 59762976 ns [ 3768.969634][T22856] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22856 comm=syz.4.9200 [ 3791.526944][ T30] audit: type=1400 audit(2000001030.690:383): avc: denied { ioctl } for pid=22933 comm="syz.1.9237" path="socket:[68908]" dev="sockfs" ino=68908 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3797.304210][ T30] audit: type=1400 audit(2000001036.440:384): avc: denied { read } for pid=22958 comm="syz.4.9250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3836.222122][T23114] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=23114 comm=syz.1.9323 [ 3857.582416][T23195] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=23195 comm=syz.4.9363 [ 3885.659703][ T30] audit: type=1400 audit(2000001124.800:385): avc: denied { bind } for pid=23313 comm="syz.1.9422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3914.529488][T23420] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23420 comm=syz.4.9472 [ 4015.681736][ T30] audit: type=1400 audit(2000001254.830:386): avc: denied { map } for pid=23807 comm="syz.4.9658" path="socket:[72264]" dev="sockfs" ino=72264 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4052.768982][ T30] audit: type=1400 audit(2000001291.930:387): avc: denied { read write } for pid=23954 comm="syz.4.9731" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 4052.779758][ T30] audit: type=1400 audit(2000001291.930:388): avc: denied { open } for pid=23954 comm="syz.4.9731" path="/1286/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 4067.267437][ T30] audit: type=1400 audit(2000001306.430:389): avc: denied { read } for pid=23999 comm="syz.1.9752" path="socket:[71590]" dev="sockfs" ino=71590 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4068.928994][ T30] audit: type=1400 audit(2000001308.090:390): avc: denied { watch watch_reads } for pid=24005 comm="syz.1.9755" path="pipe:[3468]" dev="pipefs" ino=3468 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 4089.442708][T24086] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1545 sclass=netlink_audit_socket pid=24086 comm=syz.1.9791 [ 4213.645817][T24560] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=24560 comm=syz.1.10023 [ 4260.188122][T24765] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24765 comm=syz.4.10124 [ 4261.536701][T24774] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24774 comm=syz.1.10128 [ 4278.907302][ T30] audit: type=1326 audit(2000001518.070:391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24875 comm="syz.1.10179" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x0 [ 4280.058167][T24883] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24883 comm=syz.4.10182 [ 4308.017713][T25042] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25042 comm=syz.1.10256 [ 4341.347383][ T30] audit: type=1400 audit(2000001580.500:392): avc: denied { load_policy } for pid=25221 comm="syz.4.10342" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 4342.223816][T25223] SELinux: failed to load policy [ 4345.231726][T25236] syz.4.10349: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 4345.298397][T25236] CPU: 1 UID: 0 PID: 25236 Comm: syz.4.10349 Not tainted syzkaller #0 PREEMPT [ 4345.298728][T25236] Hardware name: linux,dummy-virt (DT) [ 4345.299262][T25236] Call trace: [ 4345.299648][T25236] show_stack+0x18/0x24 (C) [ 4345.300009][T25236] dump_stack_lvl+0xdc/0xf4 [ 4345.300152][T25236] dump_stack+0x1c/0x28 [ 4345.300249][T25236] warn_alloc+0x1c0/0x308 [ 4345.300344][T25236] __vmalloc_node_range_noprof+0xaa4/0xe60 [ 4345.300449][T25236] vmalloc_user_noprof+0xe4/0x128 [ 4345.300543][T25236] xskq_create+0xd4/0x174 [ 4345.300631][T25236] xsk_setsockopt+0x370/0x624 [ 4345.300719][T25236] do_sock_setsockopt+0x17c/0x354 [ 4345.300825][T25236] __sys_setsockopt+0xcc/0x164 [ 4345.300913][T25236] __arm64_sys_setsockopt+0xa4/0x100 [ 4345.301002][T25236] invoke_syscall+0x6c/0x258 [ 4345.301095][T25236] el0_svc_common.constprop.0+0xac/0x230 [ 4345.301193][T25236] do_el0_svc_compat+0x40/0x68 [ 4345.301315][T25236] el0_svc_compat+0x4c/0x184 [ 4345.301426][T25236] el0t_32_sync_handler+0x88/0xac [ 4345.301518][T25236] el0t_32_sync+0x19c/0x1a0 [ 4345.388196][T25236] Mem-Info: [ 4345.390305][T25236] active_anon:4499 inactive_anon:0 isolated_anon:0 [ 4345.390305][T25236] active_file:13518 inactive_file:3196 isolated_file:0 [ 4345.390305][T25236] unevictable:768 dirty:24 writeback:0 [ 4345.390305][T25236] slab_reclaimable:7728 slab_unreclaimable:59772 [ 4345.390305][T25236] mapped:2703 shmem:824 pagetables:1161 [ 4345.390305][T25236] sec_pagetables:0 bounce:0 [ 4345.390305][T25236] kernel_misc_reclaimable:0 [ 4345.390305][T25236] free:264413 free_pcp:3294 free_cma:8000 [ 4345.391240][T25236] Node 0 active_anon:17996kB inactive_anon:0kB active_file:54072kB inactive_file:12784kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:10812kB dirty:96kB writeback:0kB shmem:3296kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:6888kB pagetables:4644kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 4345.391731][T25236] Node 0 DMA free:1057652kB boost:0kB min:22528kB low:28160kB high:33792kB reserved_highatomic:0KB free_highatomic:0KB active_anon:17996kB inactive_anon:0kB active_file:54072kB inactive_file:12784kB unevictable:3072kB writepending:96kB present:2097152kB managed:1532292kB mlocked:0kB bounce:0kB free_pcp:13176kB local_pcp:1328kB free_cma:32000kB [ 4345.392635][T25236] lowmem_reserve[]: 0 0 0 0 0 [ 4345.451564][T25236] Node 0 DMA: 1741*4kB (UME) 1010*8kB (UME) 371*16kB (UME) 190*32kB (UME) 123*64kB (UME) 102*128kB (UME) 38*256kB (UEC) 45*512kB (UM) 24*1024kB (UMC) 17*2048kB (UMC) 224*4096kB (UMC) = 1057652kB [ 4345.481611][T25236] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 4345.481786][T25236] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=32768kB [ 4345.481907][T25236] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 4345.482036][T25236] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=64kB [ 4345.482247][T25236] 17536 total pagecache pages [ 4345.482401][T25236] 0 pages in swap cache [ 4345.482617][T25236] Free swap = 124996kB [ 4345.482901][T25236] Total swap = 124996kB [ 4345.516483][T25236] 524288 pages RAM [ 4345.516781][T25236] 0 pages HighMem/MovableOnly [ 4345.516967][T25236] 141215 pages reserved [ 4345.517156][T25236] 8192 pages cma reserved [ 4345.517410][T25236] 0 pages hwpoisoned [ 4351.435997][T25270] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25270 comm=syz.1.10364 [ 4359.431142][T25310] ptrace attach of "/syz-executor exec"[3318] was attempted by "/syz-executor exec"[25310] [ 4374.851388][ T30] audit: type=1400 audit(2000001614.010:393): avc: denied { mounton } for pid=25372 comm="syz.4.10410" path="/proc/3427/cgroup" dev="proc" ino=76712 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 4395.230832][T25465] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=25465 comm=syz.1.10454 [ 4404.050721][ T30] audit: type=1400 audit(2000001643.210:394): avc: denied { nlmsg_read } for pid=25494 comm="syz.4.10467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 4432.017749][T25625] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25625 comm=syz.1.10530 [ 4497.775320][T25877] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25877 comm=syz.4.10652 [ 4499.484574][T25883] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25883 comm=syz.4.10655 [ 4542.678532][T26069] Injecting memory failure for pfn 0x48eba at process virtual address 0x20001000 [ 4542.716263][T26069] Memory failure: 0x48eba: recovery action for reserved kernel page: Ignored [ 4598.418136][T26323] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26323 comm=syz.4.10872 [ 4601.446924][T26338] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=26338 comm=syz.1.10879 [ 4631.889485][ T30] audit: type=1400 audit(2134219599.049:395): avc: denied { connect } for pid=26486 comm="syz.4.10953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4635.009426][T26501] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26501 comm=syz.4.10959 [ 4642.078212][T26529] nbd0: detected capacity change from 0 to 127 [ 4642.176484][ T49] block nbd0: Receive control failed (result -32) [ 4642.185760][ T893] block nbd0: Receive control failed (result -32) [ 4642.283403][T25760] [ 4642.285985][T25760] ====================================================== [ 4642.286423][T25760] WARNING: possible circular locking dependency detected [ 4642.286865][T25760] syzkaller #0 Not tainted [ 4642.287302][T25760] ------------------------------------------------------ [ 4642.287687][T25760] udevd/25760 is trying to acquire lock: [ 4642.288112][T25760] ffff000014345670 (&nsock->tx_lock){+.+.}-{4:4}, at: nbd_queue_rq+0x2cc/0xb54 [ 4642.290607][T25760] [ 4642.290607][T25760] but task is already holding lock: [ 4642.291265][T25760] ffff0000199d0178 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 4642.292017][T25760] [ 4642.292017][T25760] which lock already depends on the new lock. [ 4642.292017][T25760] [ 4642.292490][T25760] [ 4642.292490][T25760] the existing dependency chain (in reverse order) is: [ 4642.292952][T25760] [ 4642.292952][T25760] -> #6 (&cmd->lock){+.+.}-{4:4}: [ 4642.294035][T25760] __mutex_lock+0x144/0xffc [ 4642.294426][T25760] mutex_lock_nested+0x24/0x30 [ 4642.294836][T25760] nbd_queue_rq+0xa8/0xb54 [ 4642.295190][T25760] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 4642.295589][T25760] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 4642.296181][T25760] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 4642.296596][T25760] blk_mq_run_hw_queue+0x1e4/0x500 [ 4642.296975][T25760] blk_mq_dispatch_list+0x348/0xa50 [ 4642.297385][T25760] blk_mq_flush_plug_list+0xe8/0x508 [ 4642.297985][T25760] __blk_flush_plug+0x208/0x3b8 [ 4642.298335][T25760] __submit_bio+0x3a4/0x4ac [ 4642.298661][T25760] submit_bio_noacct_nocheck+0x59c/0xa8c [ 4642.299030][T25760] submit_bio_noacct+0x858/0x18f8 [ 4642.299399][T25760] submit_bio+0x32c/0x5f0 [ 4642.299717][T25760] submit_bh_wbc+0x310/0x480 [ 4642.300041][T25760] block_read_full_folio+0x26c/0x640 [ 4642.300422][T25760] blkdev_read_folio+0x1c/0x28 [ 4642.300765][T25760] filemap_read_folio+0xac/0x1fc [ 4642.301110][T25760] do_read_cache_folio+0x1c4/0x480 [ 4642.301520][T25760] read_cache_folio+0x44/0x6c [ 4642.301883][T25760] read_part_sector+0xac/0x5f4 [ 4642.302194][T25760] read_lba+0x15c/0x2ec [ 4642.302523][T25760] efi_partition+0x1dc/0x2154 [ 4642.302834][T25760] bdev_disk_changed+0x508/0xf0c [ 4642.303274][T25760] blkdev_get_whole+0x144/0x1e4 [ 4642.303749][T25760] bdev_open+0x1dc/0xa84 [ 4642.304163][T25760] blkdev_open+0x1d4/0x324 [ 4642.304485][T25760] do_dentry_open+0x6a4/0x103c [ 4642.304830][T25760] vfs_open+0x5c/0x2fc [ 4642.305140][T25760] path_openat+0x1490/0x24b4 [ 4642.305604][T25760] do_filp_open+0x184/0x360 [ 4642.305932][T25760] do_sys_openat2+0xe0/0x160 [ 4642.306260][T25760] __arm64_sys_openat+0x12c/0x1bc [ 4642.306602][T25760] invoke_syscall+0x6c/0x258 [ 4642.306980][T25760] el0_svc_common.constprop.0+0xac/0x230 [ 4642.307400][T25760] do_el0_svc+0x40/0x58 [ 4642.307762][T25760] el0_svc+0x50/0x1a0 [ 4642.308122][T25760] el0t_64_sync_handler+0xa0/0xe4 [ 4642.308498][T25760] el0t_64_sync+0x198/0x19c [ 4642.308951][T25760] [ 4642.308951][T25760] -> #5 (set->srcu){.+.+}-{0:0}: [ 4642.309713][T25760] __synchronize_srcu+0xa8/0x268 [ 4642.310142][T25760] synchronize_srcu+0x12c/0x370 [ 4642.310492][T25760] blk_mq_quiesce_queue+0xf4/0x15c [ 4642.310829][T25760] elevator_switch+0x11c/0x414 [ 4642.311285][T25760] elevator_change+0x294/0x424 [ 4642.311642][T25760] elevator_set_default+0x22c/0x2ac [ 4642.311980][T25760] blk_register_queue+0x278/0x3ac [ 4642.312306][T25760] __add_disk+0x518/0xb80 [ 4642.312625][T25760] add_disk_fwnode+0x114/0x4c0 [ 4642.313137][T25760] device_add_disk+0x14/0x20 [ 4642.313556][T25760] nbd_dev_add+0x5f0/0x9c0 [ 4642.314035][T25760] nbd_init+0xd4/0x1a8 [ 4642.314441][T25760] do_one_initcall+0x130/0x7f0 [ 4642.314790][T25760] kernel_init_freeable+0x48c/0x70c [ 4642.315142][T25760] kernel_init+0x24/0x1dc [ 4642.315465][T25760] ret_from_fork+0x10/0x20 [ 4642.315846][T25760] [ 4642.315846][T25760] -> #4 (&q->elevator_lock){+.+.}-{4:4}: [ 4642.316645][T25760] __mutex_lock+0x144/0xffc [ 4642.317014][T25760] mutex_lock_nested+0x24/0x30 [ 4642.317401][T25760] elevator_change+0x130/0x424 [ 4642.317737][T25760] elevator_set_none+0x90/0xe4 [ 4642.318071][T25760] __blk_mq_update_nr_hw_queues+0x3b4/0xd38 [ 4642.318471][T25760] blk_mq_update_nr_hw_queues+0x44/0x68 [ 4642.318836][T25760] nbd_start_device+0x128/0xa38 [ 4642.319175][T25760] nbd_genl_connect+0xcb4/0x14c4 [ 4642.319531][T25760] genl_family_rcv_msg_doit+0x1b8/0x280 [ 4642.319910][T25760] genl_rcv_msg+0x3ec/0x5bc [ 4642.320249][T25760] netlink_rcv_skb+0x19c/0x338 [ 4642.320604][T25760] genl_rcv+0x38/0x50 [ 4642.320926][T25760] netlink_unicast+0x424/0x700 [ 4642.321255][T25760] netlink_sendmsg+0x644/0xa54 [ 4642.321656][T25760] __sock_sendmsg+0xc8/0x168 [ 4642.322009][T25760] ____sys_sendmsg+0x500/0x764 [ 4642.322335][T25760] ___sys_sendmsg+0x11c/0x19c [ 4642.322661][T25760] __sys_sendmsg+0x114/0x19c [ 4642.323006][T25760] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 4642.323456][T25760] invoke_syscall+0x6c/0x258 [ 4642.323990][T25760] el0_svc_common.constprop.0+0xac/0x230 [ 4642.324443][T25760] do_el0_svc_compat+0x40/0x68 [ 4642.324792][T25760] el0_svc_compat+0x4c/0x184 [ 4642.325198][T25760] el0t_32_sync_handler+0x88/0xac [ 4642.325636][T25760] el0t_32_sync+0x19c/0x1a0 [ 4642.325978][T25760] [ 4642.325978][T25760] -> #3 (&q->q_usage_counter(io)#33){++++}-{0:0}: [ 4642.326804][T25760] blk_alloc_queue+0x538/0x644 [ 4642.327165][T25760] blk_mq_alloc_queue+0x144/0x220 [ 4642.327747][T25760] __blk_mq_alloc_disk+0x20/0x1a4 [ 4642.328237][T25760] nbd_dev_add+0x3c0/0x9c0 [ 4642.328598][T25760] nbd_init+0xd4/0x1a8 [ 4642.328937][T25760] do_one_initcall+0x130/0x7f0 [ 4642.329329][T25760] kernel_init_freeable+0x48c/0x70c [ 4642.329709][T25760] kernel_init+0x24/0x1dc [ 4642.330027][T25760] ret_from_fork+0x10/0x20 [ 4642.330330][T25760] [ 4642.330330][T25760] -> #2 (fs_reclaim){+.+.}-{0:0}: [ 4642.330966][T25760] fs_reclaim_acquire+0x138/0x160 [ 4642.331333][T25760] kmem_cache_alloc_node_noprof+0x64/0x3b8 [ 4642.331711][T25760] __alloc_skb+0x208/0x2f0 [ 4642.332037][T25760] tcp_stream_alloc_skb+0x2c/0x450 [ 4642.332389][T25760] tcp_sendmsg_locked+0xf34/0x39e8 [ 4642.332705][T25760] tcp_sendmsg+0x38/0x60 [ 4642.333141][T25760] inet_sendmsg+0x90/0xd4 [ 4642.333483][T25760] __sock_sendmsg+0xc8/0x168 [ 4642.333939][T25760] sock_write_iter+0x1cc/0x300 [ 4642.334316][T25760] vfs_write+0x7bc/0xb88 [ 4642.334636][T25760] ksys_write+0x18c/0x1d8 [ 4642.334976][T25760] __arm64_sys_write+0x6c/0x9c [ 4642.335373][T25760] invoke_syscall+0x6c/0x258 [ 4642.335722][T25760] el0_svc_common.constprop.0+0xac/0x230 [ 4642.336105][T25760] do_el0_svc+0x40/0x58 [ 4642.336411][T25760] el0_svc+0x50/0x1a0 [ 4642.336704][T25760] el0t_64_sync_handler+0xa0/0xe4 [ 4642.337041][T25760] el0t_64_sync+0x198/0x19c [ 4642.337414][T25760] [ 4642.337414][T25760] -> #1 (sk_lock-AF_INET){+.+.}-{0:0}: [ 4642.338038][T25760] lock_sock_nested+0x38/0xe8 [ 4642.338362][T25760] inet_shutdown+0x50/0x348 [ 4642.338665][T25760] kernel_sock_shutdown+0x54/0x84 [ 4642.339006][T25760] nbd_mark_nsock_dead+0x100/0x534 [ 4642.339371][T25760] sock_shutdown+0x134/0x234 [ 4642.339712][T25760] nbd_config_put+0x154/0x5b0 [ 4642.340037][T25760] nbd_release+0x7c/0x128 [ 4642.340382][T25760] blkdev_put_whole+0x98/0xf0 [ 4642.340712][T25760] bdev_release+0x2a4/0x510 [ 4642.341048][T25760] blkdev_release+0x14/0x24 [ 4642.341445][T25760] __fput+0x2c8/0x954 [ 4642.341759][T25760] ____fput+0x14/0x20 [ 4642.342040][T25760] task_work_run+0x128/0x210 [ 4642.342361][T25760] do_notify_resume+0x1d8/0x260 [ 4642.342661][T25760] el0_svc_compat+0x104/0x184 [ 4642.343177][T25760] el0t_32_sync_handler+0x88/0xac [ 4642.343555][T25760] el0t_32_sync+0x19c/0x1a0 [ 4642.343872][T25760] [ 4642.343872][T25760] -> #0 (&nsock->tx_lock){+.+.}-{4:4}: [ 4642.344512][T25760] __lock_acquire+0x1638/0x2380 [ 4642.344840][T25760] lock_acquire+0x310/0x38c [ 4642.345178][T25760] __mutex_lock+0x144/0xffc [ 4642.345564][T25760] mutex_lock_nested+0x24/0x30 [ 4642.345884][T25760] nbd_queue_rq+0x2cc/0xb54 [ 4642.346204][T25760] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 4642.346569][T25760] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 4642.346949][T25760] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 4642.347297][T25760] blk_mq_run_hw_queue+0x1e4/0x500 [ 4642.347618][T25760] blk_mq_dispatch_list+0x348/0xa50 [ 4642.347958][T25760] blk_mq_flush_plug_list+0xe8/0x508 [ 4642.348266][T25760] __blk_flush_plug+0x208/0x3b8 [ 4642.348581][T25760] __submit_bio+0x3a4/0x4ac [ 4642.348886][T25760] submit_bio_noacct_nocheck+0x59c/0xa8c [ 4642.349251][T25760] submit_bio_noacct+0x858/0x18f8 [ 4642.349637][T25760] submit_bio+0x32c/0x5f0 [ 4642.349933][T25760] submit_bh_wbc+0x310/0x480 [ 4642.350230][T25760] block_read_full_folio+0x26c/0x640 [ 4642.350557][T25760] blkdev_read_folio+0x1c/0x28 [ 4642.350871][T25760] filemap_read_folio+0xac/0x1fc [ 4642.351212][T25760] do_read_cache_folio+0x1c4/0x480 [ 4642.351555][T25760] read_cache_folio+0x44/0x6c [ 4642.351877][T25760] read_part_sector+0xac/0x5f4 [ 4642.352214][T25760] read_lba+0x15c/0x2ec [ 4642.352557][T25760] efi_partition+0x1dc/0x2154 [ 4642.352904][T25760] bdev_disk_changed+0x508/0xf0c [ 4642.353376][T25760] blkdev_get_whole+0x144/0x1e4 [ 4642.353858][T25760] bdev_open+0x1dc/0xa84 [ 4642.354160][T25760] blkdev_open+0x1d4/0x324 [ 4642.354489][T25760] do_dentry_open+0x6a4/0x103c [ 4642.354859][T25760] vfs_open+0x5c/0x2fc [ 4642.355170][T25760] path_openat+0x1490/0x24b4 [ 4642.355507][T25760] do_filp_open+0x184/0x360 [ 4642.355816][T25760] do_sys_openat2+0xe0/0x160 [ 4642.356145][T25760] __arm64_sys_openat+0x12c/0x1bc [ 4642.356496][T25760] invoke_syscall+0x6c/0x258 [ 4642.356790][T25760] el0_svc_common.constprop.0+0xac/0x230 [ 4642.357143][T25760] do_el0_svc+0x40/0x58 [ 4642.357501][T25760] el0_svc+0x50/0x1a0 [ 4642.357819][T25760] el0t_64_sync_handler+0xa0/0xe4 [ 4642.358168][T25760] el0t_64_sync+0x198/0x19c [ 4642.358561][T25760] [ 4642.358561][T25760] other info that might help us debug this: [ 4642.358561][T25760] [ 4642.359134][T25760] Chain exists of: [ 4642.359134][T25760] &nsock->tx_lock --> set->srcu --> &cmd->lock [ 4642.359134][T25760] [ 4642.360195][T25760] Possible unsafe locking scenario: [ 4642.360195][T25760] [ 4642.360638][T25760] CPU0 CPU1 [ 4642.360982][T25760] ---- ---- [ 4642.361326][T25760] lock(&cmd->lock); [ 4642.361752][T25760] lock(set->srcu); [ 4642.362197][T25760] lock(&cmd->lock); [ 4642.362650][T25760] lock(&nsock->tx_lock); [ 4642.363161][T25760] [ 4642.363161][T25760] *** DEADLOCK *** [ 4642.363161][T25760] [ 4642.363877][T25760] 3 locks held by udevd/25760: [ 4642.364311][T25760] #0: ffff0000147ee358 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0x2c4/0xa84 [ 4642.365127][T25760] #1: ffff0000147e0510 (set->srcu){.+.+}-{0:0}, at: blk_mq_run_hw_queue+0x19c/0x500 [ 4642.365959][T25760] #2: ffff0000199d0178 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 4642.366796][T25760] [ 4642.366796][T25760] stack backtrace: [ 4642.367226][T25760] CPU: 0 UID: 0 PID: 25760 Comm: udevd Not tainted syzkaller #0 PREEMPT [ 4642.367733][T25760] Hardware name: linux,dummy-virt (DT) [ 4642.368100][T25760] Call trace: [ 4642.368371][T25760] show_stack+0x18/0x24 (C) [ 4642.368746][T25760] dump_stack_lvl+0xa4/0xf4 [ 4642.369064][T25760] dump_stack+0x1c/0x28 [ 4642.369440][T25760] print_circular_bug+0x28c/0x370 [ 4642.369795][T25760] check_noncircular+0x168/0x17c [ 4642.370148][T25760] __lock_acquire+0x1638/0x2380 [ 4642.370509][T25760] lock_acquire+0x310/0x38c [ 4642.370841][T25760] __mutex_lock+0x144/0xffc [ 4642.371163][T25760] mutex_lock_nested+0x24/0x30 [ 4642.371527][T25760] nbd_queue_rq+0x2cc/0xb54 [ 4642.371865][T25760] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 4642.372212][T25760] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 4642.372590][T25760] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 4642.372937][T25760] blk_mq_run_hw_queue+0x1e4/0x500 [ 4642.373465][T25760] blk_mq_dispatch_list+0x348/0xa50 [ 4642.373787][T25760] blk_mq_flush_plug_list+0xe8/0x508 [ 4642.374238][T25760] __blk_flush_plug+0x208/0x3b8 [ 4642.374571][T25760] __submit_bio+0x3a4/0x4ac [ 4642.374867][T25760] submit_bio_noacct_nocheck+0x59c/0xa8c [ 4642.375188][T25760] submit_bio_noacct+0x858/0x18f8 [ 4642.375602][T25760] submit_bio+0x32c/0x5f0 [ 4642.375883][T25760] submit_bh_wbc+0x310/0x480 [ 4642.376161][T25760] block_read_full_folio+0x26c/0x640 [ 4642.376471][T25760] blkdev_read_folio+0x1c/0x28 [ 4642.376769][T25760] filemap_read_folio+0xac/0x1fc [ 4642.377078][T25760] do_read_cache_folio+0x1c4/0x480 [ 4642.377434][T25760] read_cache_folio+0x44/0x6c [ 4642.377760][T25760] read_part_sector+0xac/0x5f4 [ 4642.378102][T25760] read_lba+0x15c/0x2ec [ 4642.378443][T25760] efi_partition+0x1dc/0x2154 [ 4642.378766][T25760] bdev_disk_changed+0x508/0xf0c [ 4642.379127][T25760] blkdev_get_whole+0x144/0x1e4 [ 4642.379485][T25760] bdev_open+0x1dc/0xa84 [ 4642.379798][T25760] blkdev_open+0x1d4/0x324 [ 4642.380135][T25760] do_dentry_open+0x6a4/0x103c [ 4642.380464][T25760] vfs_open+0x5c/0x2fc [ 4642.380770][T25760] path_openat+0x1490/0x24b4 [ 4642.381087][T25760] do_filp_open+0x184/0x360 [ 4642.381476][T25760] do_sys_openat2+0xe0/0x160 [ 4642.381798][T25760] __arm64_sys_openat+0x12c/0x1bc [ 4642.382151][T25760] invoke_syscall+0x6c/0x258 [ 4642.382466][T25760] el0_svc_common.constprop.0+0xac/0x230 [ 4642.382769][T25760] do_el0_svc+0x40/0x58 [ 4642.383335][T25760] el0_svc+0x50/0x1a0 [ 4642.383785][T25760] el0t_64_sync_handler+0xa0/0xe4 [ 4642.384128][T25760] el0t_64_sync+0x198/0x19c [ 4642.655697][T25760] block nbd0: Dead connection, failed to find a fallback [ 4642.656259][T25760] block nbd0: shutting down sockets [ 4642.657123][T25760] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4642.657718][T25760] Buffer I/O error on dev nbd0, logical block 0, async page read [ 4642.659751][T25760] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4642.660027][T25760] Buffer I/O error on dev nbd0, logical block 1, async page read [ 4642.660779][T25760] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4642.661002][T25760] Buffer I/O error on dev nbd0, logical block 2, async page read [ 4642.661729][T25760] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4642.661954][T25760] Buffer I/O error on dev nbd0, logical block 3, async page read [ 4642.727640][T25760] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4642.729643][T25760] Buffer I/O error on dev nbd0, logical block 0, async page read [ 4642.735403][T25760] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4642.737399][T25760] Buffer I/O error on dev nbd0, logical block 1, async page read [ 4642.740954][T25760] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4642.744816][T25760] Buffer I/O error on dev nbd0, logical block 2, async page read [ 4642.747531][T25760] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4642.749193][T25760] Buffer I/O error on dev nbd0, logical block 3, async page read [ 4642.751377][T25760] nbd0: unable to read partition table [ 4642.775641][T25760] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4642.781173][T25760] Buffer I/O error on dev nbd0, logical block 0, async page read [ 4642.785851][T25760] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4642.789320][T25760] Buffer I/O error on dev nbd0, logical block 1, async page read [ 4642.862073][T25760] nbd0: unable to read partition table VM DIAGNOSIS: 05:20:25 Registers: info registers vcpu 0 CPU#0 PC=ffff800080345088 X00=00000000000000c0 X01=0000000000000001 X02=0000000000000000 X03=ffff800080351958 X04=ffff700011ea4b77 X05=ffff80008f525bb0 X06=ffff700011ea4b76 X07=0000000000000001 X08=ffff80008f525bb7 X09=dfff800000000000 X10=ffff700011ea4b76 X11=1ffff00011ea4b76 X12=ffff700011ea4b77 X13=0000000000000001 X14=0000000000000000 X15=0000000000000002 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff00006a08a5a9 X20=1ffff00011ea4b9a X21=000000000000000a X22=ffff800087241800 X23=ffff800086ad07b0 X24=ffff800087241800 X25=00000000000000c0 X26=000000000000001e X27=0000000000000022 X28=1fffe0000d4114b5 X29=ffff80008f525c30 X30=ffff800080345334 SP=ffff80008f525c30 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000809cb0bc X00=ffff8000857f4440 X01=0000000000000004 X02=0000000000000003 X03=1fffe000023cd3c9 X04=ffff800080249234 X05=00000000f1f1f1f1 X06=dfff800000000000 X07=ffff700014036f48 X08=ffff8000a01b7938 X09=dfff800000000000 X10=ffff700014036f26 X11=1ffff00014036f26 X12=ffff700010fd0f89 X13=0000000000000001 X14=1fffe0000d4198e6 X15=ffff000022ad8368 X16=0000000000000000 X17=1fffe00002d7cea8 X18=0000000000000000 X19=0000000000000000 X20=ffff800082685880 X21=ffff800085462d68 X22=0000000000000000 X23=ffff000011e69e40 X24=ffff000019c00000 X25=ffff80008d436b60 X26=0000000000000a05 X27=0000000000000a05 X28=dfff800000000000 X29=ffff8000a01b7a20 X30=ffff80008031d9f4 SP=ffff8000a01b7980 PSTATE=80000005 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000