last executing test programs: 1m1.9681316s ago: executing program 0 (id=276): syz_usb_connect$printer(0x0, 0x36, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7e12c12476000000ff80ff07fdffffeb000080"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = dup(r1) ioctl$TFD_IOC_SET_TICKS(r2, 0x40085400, 0x0) 59.646578806s ago: executing program 1 (id=280): r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='}.\'\x00', 0x0) ioctl$TIOCMSET(r1, 0x5450, 0x0) msgctl$IPC_RMID(r0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/firmware/fdt', 0x0, 0x0) mlockall(0x1) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, 0x0) 56.358880786s ago: executing program 1 (id=281): pipe2(&(0x7f0000002840)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x5450, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000340), 0xffffff46) prlimit64(0x0, 0x7, &(0x7f0000000100)={0x80000001, 0xfffffffffffffff8}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='gid_map\x00') fcntl$lock(r1, 0x0, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{}, {0x0, 0x3938700}}, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x5451, 0x0) 56.027990508s ago: executing program 1 (id=282): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$inet6(r2, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x5452, &(0x7f0000000100)={'dummy0\x00'}) 55.867205444s ago: executing program 1 (id=283): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='freezer.state\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 55.07994309s ago: executing program 1 (id=284): r0 = timerfd_create(0x0, 0x0) close(r0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept4$inet(r0, 0x0, 0x0, 0x0) write$P9_RGETATTR(r3, 0x0, 0x0) 54.928667456s ago: executing program 1 (id=285): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "0000000000000000000080ffffffffffff00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) r2 = dup(r1) ioctl$SNDCTL_DSP_GETTRIGGER(r2, 0x80045010, 0x0) 46.745031502s ago: executing program 0 (id=286): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[], 0x33fe0}}, 0x0) r1 = io_uring_setup(0x1049, &(0x7f0000001440)) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x5452, &(0x7f00000000c0)={0x0, "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"}) close(r1) socketpair$unix(0x1, 0x2, 0x0, 0x0) 45.903898304s ago: executing program 0 (id=287): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = memfd_create(&(0x7f00000001c0)='\xd4\xb4y\x05(p\xe2\xbd%\x02\xe1\x89|\xe0un\x00\xde\xac\xeb\x7ft\x92\xda\xce\x0f\x89X\x82\xd8q\'\x00\x00\x00\x00J6h\x8c\xf2\xd8f\xbe/\xcdnw\xb2\xc1otY\xe9\xe5g\xf0BBu\x88\x88\xec\xe6\x06\xa7\xfb\b\x00\x84\x05\"\x0e\xcd\xf4\x901\xf1\xf7\a\n\xc2S\x82\x93\a\x19A\xa1B\xe1B\x12\xd6\xb7\xf0\x8a\n\xfc\x15\xf3', 0x3) r3 = dup3(r1, r0, 0x0) r4 = accept4$packet(r3, 0x0, 0x0, 0x0) close_range(r2, r4, 0x0) 45.708399462s ago: executing program 0 (id=288): r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) r2 = inotify_init1(0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = fcntl$dupfd(r0, 0x0, r2) r4 = accept$inet6(r3, 0x0, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 45.474693376s ago: executing program 0 (id=289): ioctl$KDGKBENT(0xffffffffffffffff, 0x5451, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r1, r0, 0x0) r2 = accept4$unix(r0, 0x0, 0x0, 0x0) read$char_usb(r2, 0x0, 0x0) 45.265341856s ago: executing program 0 (id=290): timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$cgroup_int(r1, &(0x7f0000000380), 0xffffff8d) write$cgroup_freezer_state(r1, &(0x7f0000000200)='FREEZING\x00', 0x9) close(r1) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 9.088796246s ago: executing program 32 (id=285): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "0000000000000000000080ffffffffffff00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) r2 = dup(r1) ioctl$SNDCTL_DSP_GETTRIGGER(r2, 0x80045010, 0x0) 0s ago: executing program 33 (id=290): timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$cgroup_int(r1, &(0x7f0000000380), 0xffffff8d) write$cgroup_freezer_state(r1, &(0x7f0000000200)='FREEZING\x00', 0x9) close(r1) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:58290' (ED25519) to the list of known hosts. [ 125.696842][ T30] audit: type=1400 audit(125.440:58): avc: denied { name_bind } for pid=3294 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 125.951251][ T30] audit: type=1400 audit(125.700:59): avc: denied { execute } for pid=3296 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 125.954087][ T30] audit: type=1400 audit(125.700:60): avc: denied { execute_no_trans } for pid=3296 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 129.739849][ T30] audit: type=1400 audit(129.490:61): avc: denied { mounton } for pid=3296 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 129.760547][ T30] audit: type=1400 audit(129.510:62): avc: denied { mount } for pid=3296 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 129.791559][ T3296] cgroup: Unknown subsys name 'net' [ 129.808429][ T30] audit: type=1400 audit(129.560:63): avc: denied { unmount } for pid=3296 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 130.191210][ T3296] cgroup: Unknown subsys name 'cpuset' [ 130.225303][ T3296] cgroup: Unknown subsys name 'rlimit' [ 130.735039][ T30] audit: type=1400 audit(130.480:64): avc: denied { setattr } for pid=3296 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 130.741335][ T30] audit: type=1400 audit(130.490:65): avc: denied { mounton } for pid=3296 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 130.744662][ T30] audit: type=1400 audit(130.490:66): avc: denied { mount } for pid=3296 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 131.012747][ T3298] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 131.018588][ T30] audit: type=1400 audit(130.770:67): avc: denied { relabelto } for pid=3298 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 131.023225][ T30] audit: type=1400 audit(130.770:68): avc: denied { write } for pid=3298 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 131.100235][ T30] audit: type=1400 audit(130.850:69): avc: denied { read } for pid=3296 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 131.103202][ T30] audit: type=1400 audit(130.850:70): avc: denied { open } for pid=3296 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 131.114686][ T3296] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 137.466527][ T30] audit: type=1400 audit(137.210:71): avc: denied { execmem } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 137.525160][ T30] audit: type=1400 audit(137.270:72): avc: denied { read } for pid=3301 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 137.525744][ T30] audit: type=1400 audit(137.270:73): avc: denied { open } for pid=3301 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 137.532087][ T30] audit: type=1400 audit(137.280:74): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 137.570820][ T30] audit: type=1400 audit(137.320:75): avc: denied { module_request } for pid=3301 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 137.693044][ T30] audit: type=1400 audit(137.440:76): avc: denied { sys_module } for pid=3301 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 141.841313][ T3301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 141.873558][ T3301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 142.205659][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 142.224514][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 143.890545][ T3301] hsr_slave_0: entered promiscuous mode [ 143.898518][ T3301] hsr_slave_1: entered promiscuous mode [ 144.274541][ T3303] hsr_slave_0: entered promiscuous mode [ 144.285892][ T3303] hsr_slave_1: entered promiscuous mode [ 144.295928][ T3303] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 144.301676][ T3303] Cannot create hsr debugfs directory [ 145.661279][ T30] audit: type=1400 audit(145.410:77): avc: denied { create } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 145.667382][ T30] audit: type=1400 audit(145.410:78): avc: denied { write } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 145.679857][ T30] audit: type=1400 audit(145.430:79): avc: denied { read } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 145.702601][ T3301] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 145.765747][ T3301] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 145.818899][ T3301] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 145.895871][ T3301] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 146.161182][ T3303] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 146.199913][ T3303] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 146.219128][ T3303] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 146.259284][ T3303] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 147.843518][ T3301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.485367][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 154.057759][ T3301] veth0_vlan: entered promiscuous mode [ 154.103649][ T3301] veth1_vlan: entered promiscuous mode [ 154.290460][ T3303] veth0_vlan: entered promiscuous mode [ 154.325431][ T3301] veth0_macvtap: entered promiscuous mode [ 154.384454][ T3301] veth1_macvtap: entered promiscuous mode [ 154.394098][ T3303] veth1_vlan: entered promiscuous mode [ 154.602515][ T3303] veth0_macvtap: entered promiscuous mode [ 154.677412][ T3303] veth1_macvtap: entered promiscuous mode [ 154.691767][ T3301] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.692641][ T3301] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.692824][ T3301] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.693014][ T3301] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.961109][ T3303] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.961627][ T3303] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.964398][ T3303] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.964706][ T3303] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.081156][ T30] audit: type=1400 audit(154.820:80): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 155.135274][ T30] audit: type=1400 audit(154.880:81): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzkaller.YzX3ep/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 155.154464][ T30] audit: type=1400 audit(154.900:82): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 155.191667][ T30] audit: type=1400 audit(154.930:83): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzkaller.YzX3ep/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 155.206055][ T30] audit: type=1400 audit(154.950:84): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzkaller.YzX3ep/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 155.267138][ T30] audit: type=1400 audit(155.010:85): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 155.310901][ T30] audit: type=1400 audit(155.060:86): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 155.331462][ T30] audit: type=1400 audit(155.080:87): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="gadgetfs" ino=2762 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 155.523959][ T30] audit: type=1400 audit(155.270:88): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 155.535078][ T30] audit: type=1400 audit(155.270:89): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 155.807675][ T3301] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 158.492809][ T3459] serio: Serial port pts0 [ 158.821271][ T3463] serio: Serial port pts1 [ 173.541430][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 173.541959][ T30] audit: type=1400 audit(173.290:94): avc: denied { read write } for pid=3469 comm="syz.1.11" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 173.544862][ T30] audit: type=1400 audit(173.290:95): avc: denied { open } for pid=3469 comm="syz.1.11" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 173.629222][ T30] audit: type=1400 audit(173.370:96): avc: denied { mount } for pid=3469 comm="syz.1.11" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 174.274801][ T30] audit: type=1400 audit(174.020:97): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 175.950035][ T30] audit: type=1400 audit(175.700:98): avc: denied { name_bind } for pid=3486 comm="syz.1.18" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 175.954547][ T30] audit: type=1400 audit(175.700:99): avc: denied { node_bind } for pid=3486 comm="syz.1.18" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 182.729634][ T30] audit: type=1400 audit(182.480:100): avc: denied { create } for pid=3529 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 182.738083][ T30] audit: type=1400 audit(182.480:101): avc: denied { setopt } for pid=3529 comm="syz.0.36" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 183.332325][ T30] audit: type=1400 audit(183.080:102): avc: denied { write } for pid=3536 comm="syz.1.39" name="psched" dev="proc" ino=4026532680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 186.988955][ T30] audit: type=1400 audit(186.740:103): avc: denied { read write } for pid=3551 comm="syz.1.45" name="udmabuf" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 186.989657][ T30] audit: type=1400 audit(186.740:104): avc: denied { open } for pid=3551 comm="syz.1.45" path="/dev/udmabuf" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 187.005638][ T3552] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 187.023066][ T30] audit: type=1400 audit(186.770:105): avc: denied { ioctl } for pid=3551 comm="syz.1.45" path="/dev/udmabuf" dev="devtmpfs" ino=676 ioctlcmd=0x7542 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 187.233650][ T30] audit: type=1400 audit(186.980:106): avc: denied { create } for pid=3554 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 207.057404][ T30] audit: type=1400 audit(206.800:107): avc: denied { create } for pid=3591 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 207.069972][ T30] audit: type=1400 audit(206.820:108): avc: denied { setopt } for pid=3591 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 207.078368][ T30] audit: type=1400 audit(206.830:109): avc: denied { bind } for pid=3591 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 207.082697][ T30] audit: type=1400 audit(206.830:110): avc: denied { listen } for pid=3591 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 207.097848][ T30] audit: type=1400 audit(206.840:111): avc: denied { connect } for pid=3591 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 207.130794][ T30] audit: type=1400 audit(206.880:112): avc: denied { write } for pid=3591 comm="syz.1.59" path="socket:[3051]" dev="sockfs" ino=3051 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 208.984509][ T3595] serio: Serial port pts0 [ 219.654778][ T3612] serio: Serial port pts1 [ 232.759675][ T30] audit: type=1400 audit(232.510:113): avc: denied { create } for pid=3632 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 232.773155][ T30] audit: type=1400 audit(232.510:114): avc: denied { setattr } for pid=3632 comm="syz.1.73" name="PACKET" dev="sockfs" ino=4079 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 239.431244][ T30] audit: type=1400 audit(239.180:115): avc: denied { create } for pid=3649 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 239.460957][ T3650] Zero length message leads to an empty skb [ 239.463657][ T30] audit: type=1400 audit(239.210:116): avc: denied { write } for pid=3649 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 242.213233][ T30] audit: type=1400 audit(241.960:117): avc: denied { allowed } for pid=3668 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 242.235565][ T30] audit: type=1400 audit(241.980:118): avc: denied { create } for pid=3668 comm="syz.1.88" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 242.837638][ T30] audit: type=1400 audit(242.580:119): avc: denied { write } for pid=3668 comm="syz.1.88" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 244.571357][ T3683] serio: Serial port pts0 [ 245.910466][ T30] audit: type=1400 audit(245.660:120): avc: denied { create } for pid=3687 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 245.927127][ T30] audit: type=1400 audit(245.660:121): avc: denied { setopt } for pid=3687 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 246.205261][ T3688] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 246.220625][ T30] audit: type=1400 audit(245.970:122): avc: denied { ioctl } for pid=3687 comm="syz.0.95" path="socket:[5192]" dev="sockfs" ino=5192 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 246.223814][ T30] audit: type=1400 audit(245.970:123): avc: denied { bind } for pid=3687 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 247.092848][ T30] audit: type=1400 audit(246.840:124): avc: denied { create } for pid=3690 comm="syz.0.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 247.123408][ T30] audit: type=1400 audit(246.870:125): avc: denied { write } for pid=3690 comm="syz.0.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 247.595089][ T30] audit: type=1400 audit(247.340:126): avc: denied { listen } for pid=3695 comm="syz.0.98" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 247.600274][ T3696] 8021q: VLANs not supported on vcan0 [ 250.347260][ T30] audit: type=1400 audit(250.090:127): avc: denied { prog_load } for pid=3708 comm="syz.0.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 250.347907][ T30] audit: type=1400 audit(250.090:128): avc: denied { bpf } for pid=3708 comm="syz.0.103" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 250.368186][ T30] audit: type=1400 audit(250.110:129): avc: denied { map_create } for pid=3708 comm="syz.0.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 251.732959][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 251.733404][ T30] audit: type=1400 audit(251.480:132): avc: denied { accept } for pid=3718 comm="syz.0.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 251.739856][ T30] audit: type=1400 audit(251.490:133): avc: denied { read } for pid=3718 comm="syz.0.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 254.385302][ T3735] serio: Serial port pts1 [ 261.742940][ T30] audit: type=1400 audit(261.490:134): avc: denied { prog_run } for pid=3761 comm="syz.1.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 261.825937][ T30] audit: type=1400 audit(261.570:135): avc: denied { setopt } for pid=3761 comm="syz.1.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 262.069521][ T30] audit: type=1400 audit(261.820:136): avc: denied { mounton } for pid=3766 comm="syz.0.128" path="/72/file0" dev="tmpfs" ino=436 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 263.214712][ T30] audit: type=1400 audit(262.960:137): avc: denied { write } for pid=3780 comm="syz.1.134" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 265.728811][ T3807] serio: Serial port pts0 [ 266.990682][ T3390] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 267.167987][ T3390] usb 1-1: Using ep0 maxpacket: 8 [ 267.197257][ T3390] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 11 [ 267.198958][ T3390] usb 1-1: New USB device found, idVendor=044f, idProduct=b654, bcdDevice= 0.00 [ 267.199278][ T3390] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 267.235275][ T3390] usb 1-1: config 0 descriptor?? [ 267.636682][ T3390] usbhid 1-1:0.0: can't add hid device: -71 [ 267.638266][ T3390] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 267.741858][ T3390] usb 1-1: USB disconnect, device number 2 [ 271.064722][ T3837] serio: Serial port pts1 [ 272.256882][ T3847] serio: Serial port pts0 [ 274.953712][ T3850] serio: Serial port pts0 [ 277.445369][ T3858] serio: Serial port pts1 [ 280.983712][ T3865] serio: Serial port pts0 [ 283.237324][ T3870] serio: Serial port pts1 [ 289.524923][ T3877] serio: Serial port pts1 [ 296.272820][ T3883] serio: Serial port pts0 [ 305.450558][ T3896] serio: Serial port pts1 [ 312.540117][ T30] audit: type=1400 audit(312.290:138): avc: denied { create } for pid=3907 comm="syz.1.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 316.854517][ T3924] serio: Serial port pts0 [ 323.374419][ T3932] serio: Serial port pts1 [ 334.150645][ T3959] serio: Serial port pts0 [ 339.249000][ T30] audit: type=1400 audit(339.000:139): avc: denied { getopt } for pid=3978 comm="syz.1.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 339.455188][ T30] audit: type=1400 audit(339.200:140): avc: denied { execute } for pid=3980 comm="syz.1.205" path=2F6D656D66643AC0873A2A18C16BA7875BA06F38AA4BA5D30B86CA3C7FFD368D7DD8F247B8CA65299086E39608E0FAB1D84EB257CB8D7D336C6D38A537C9202864656C6574656429 dev="tmpfs" ino=1029 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 340.352103][ T3986] syz.0.207 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 340.377060][ T30] audit: type=1400 audit(340.120:141): avc: denied { read } for pid=3985 comm="syz.0.207" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 340.391211][ T30] audit: type=1400 audit(340.140:142): avc: denied { open } for pid=3985 comm="syz.0.207" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 340.400503][ T30] audit: type=1400 audit(340.150:143): avc: denied { ioctl } for pid=3985 comm="syz.0.207" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 343.198692][ T30] audit: type=1400 audit(342.940:144): avc: denied { create } for pid=4002 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 343.201789][ T30] audit: type=1400 audit(342.950:145): avc: denied { bind } for pid=4002 comm="syz.1.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 343.208029][ T30] audit: type=1400 audit(342.950:146): avc: denied { name_bind } for pid=4002 comm="syz.1.215" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 343.217456][ T30] audit: type=1400 audit(342.950:147): avc: denied { node_bind } for pid=4002 comm="syz.1.215" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 343.218157][ T30] audit: type=1400 audit(342.960:148): avc: denied { write } for pid=4002 comm="syz.1.215" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 346.720725][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 346.721692][ T30] audit: type=1400 audit(346.470:156): avc: denied { create } for pid=4023 comm="syz.1.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 346.744819][ T30] audit: type=1400 audit(346.490:157): avc: denied { ioctl } for pid=4023 comm="syz.1.223" path="socket:[4911]" dev="sockfs" ino=4911 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 348.320182][ T30] audit: type=1400 audit(348.070:158): avc: denied { mounton } for pid=4036 comm="syz.1.229" path="/111/file0" dev="tmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 355.174788][ T4072] serio: Serial port pts0 [ 356.622061][ T30] audit: type=1400 audit(356.370:159): avc: denied { read } for pid=4075 comm="syz.0.245" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 356.627740][ T30] audit: type=1400 audit(356.370:160): avc: denied { open } for pid=4075 comm="syz.0.245" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 358.424781][ T30] audit: type=1400 audit(358.170:161): avc: denied { create } for pid=4084 comm="syz.0.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 358.452107][ T30] audit: type=1400 audit(358.200:162): avc: denied { ioctl } for pid=4084 comm="syz.0.247" path="socket:[5849]" dev="sockfs" ino=5849 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 358.473802][ T30] audit: type=1400 audit(358.220:163): avc: denied { bind } for pid=4084 comm="syz.0.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 372.415632][ T30] audit: type=1400 audit(372.160:164): avc: denied { read } for pid=4134 comm="syz.1.268" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 372.417702][ T30] audit: type=1400 audit(372.160:165): avc: denied { open } for pid=4134 comm="syz.1.268" path="/128/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 372.477013][ T4136] block device autoloading is deprecated and will be removed. [ 372.503480][ T30] audit: type=1400 audit(372.250:166): avc: denied { ioctl } for pid=4134 comm="syz.1.268" path="/128/file0/file0" dev="fuse" ino=64 ioctlcmd=0x921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 374.640584][ T4153] serio: Serial port pts0 [ 381.711624][ T4177] serio: Serial port pts1 [ 428.162183][ T12] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 428.390629][ T12] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 428.610020][ T12] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 428.795839][ T12] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 429.382173][ T30] audit: type=1400 audit(429.130:167): avc: denied { read } for pid=3152 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 432.438435][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 432.515244][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 432.573295][ T12] bond0 (unregistering): Released all slaves [ 433.062130][ T12] hsr_slave_0: left promiscuous mode [ 433.148147][ T12] hsr_slave_1: left promiscuous mode [ 433.274627][ T12] veth1_macvtap: left promiscuous mode [ 433.278395][ T12] veth0_macvtap: left promiscuous mode [ 433.280166][ T12] veth1_vlan: left promiscuous mode [ 433.281845][ T12] veth0_vlan: left promiscuous mode [ 805.208197][ T33] INFO: task kworker/0:1:11 blocked for more than 430 seconds. [ 805.208828][ T33] Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 [ 805.209304][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 805.209736][ T33] task:kworker/0:1 state:D stack:0 pid:11 tgid:11 ppid:2 task_flags:0x4288060 flags:0x00000008 [ 805.210632][ T33] Workqueue: md_misc mddev_delayed_delete [ 805.211891][ T33] Call trace: [ 805.212069][ T33] __switch_to+0x204/0x4bc (T) [ 805.212292][ T33] __schedule+0xd34/0x3188 [ 805.212409][ T33] schedule+0xd0/0x344 [ 805.212501][ T33] schedule_timeout+0x1ec/0x224 [ 805.212579][ T33] __wait_for_common+0x1d0/0x3f8 [ 805.212654][ T33] wait_for_completion+0x20/0x2c [ 805.217490][ T33] devtmpfs_submit_req+0xac/0x114 [ 805.217705][ T33] devtmpfs_delete_node+0xd8/0x128 [ 805.217798][ T33] device_del+0x59c/0x7b4 [ 805.217917][ T33] del_gendisk+0x3fc/0x87c [ 805.218003][ T33] md_kobj_release+0x84/0xd8 [ 805.218132][ T33] kobject_put+0x17c/0x430 [ 805.218221][ T33] mddev_delayed_delete+0x14/0x20 [ 805.218300][ T33] process_one_work+0x7cc/0x18d4 [ 805.218391][ T33] worker_thread+0x734/0xb84 [ 805.218496][ T33] kthread+0x348/0x5fc [ 805.218615][ T33] ret_from_fork+0x10/0x20 [ 805.219314][ T33] [ 805.219314][ T33] Showing all locks held in the system: [ 805.219523][ T33] 2 locks held by kworker/0:1/11: [ 805.219629][ T33] #0: ffff00000f37d148 ((wq_completion)md_misc){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 805.220521][ T33] #1: ffff80008d4f7c80 ((work_completion)(&mddev->del_work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 805.221131][ T33] 4 locks held by kworker/u8:0/12: [ 805.221202][ T33] #0: ffff00000dd62948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 805.221610][ T33] #1: ffff80008d507c80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 805.221961][ T33] #2: ffff8000887cf0f0 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xd4/0x93c [ 805.222424][ T33] #3: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 805.222832][ T33] 2 locks held by kdevtmpfs/25: [ 805.222915][ T33] #0: ffff00000de30950 (&type->i_mutex_dir_key/1){+.+.}-{4:4}, at: __kern_path_locked+0xd4/0x1f8 [ 805.223325][ T33] #1: ffff80008771a4e8 (major_names_lock){+.+.}-{4:4}, at: blk_probe_dev+0x30/0x168 [ 805.223707][ T33] 2 locks held by pr/ttyAMA0/31: [ 805.223782][ T33] 1 lock held by khungtaskd/33: [ 805.223857][ T33] #0: ffff80008728da60 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x18/0x1c4 [ 805.224317][ T33] 3 locks held by kworker/u8:6/150: [ 805.224463][ T33] #0: ffff00000d831148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 805.224839][ T33] #1: ffff80008dcc7c80 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 805.225210][ T33] #2: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 805.225584][ T33] 3 locks held by kworker/u8:7/159: [ 805.225649][ T33] #0: ffff000017b10948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 805.226005][ T33] #1: ffff80008dd97c80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 805.265064][ T33] #2: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 805.265539][ T33] 1 lock held by klogd/3111: [ 805.265654][ T33] 1 lock held by dhcpcd/3152: [ 805.265721][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 805.276930][ T33] 2 locks held by getty/3241: [ 805.277575][ T33] #0: ffff000017eff0a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 805.278217][ T33] #1: ffff80008d50b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e4/0xdb4 [ 805.279401][ T33] 2 locks held by sshd/3294: [ 805.279476][ T33] 2 locks held by syz-executor/3296: [ 805.279603][ T33] 1 lock held by syz.1.285/4177: [ 805.279677][ T33] #0: ffff800087a33cc8 (tty_mutex){+.+.}-{4:4}, at: tty_release_struct+0x8c/0xcc [ 805.280467][ T33] 3 locks held by syz.0.290/4193: [ 805.280546][ T33] #0: ffff800087a33cc8 (tty_mutex){+.+.}-{4:4}, at: tty_open+0x3c4/0xb04 [ 805.281017][ T33] #1: ffff00001cd3e1c0 (&tty->legacy_mutex){+.+.}-{4:4}, at: tty_lock+0x48/0x90 [ 805.281479][ T33] #2: ffff80008719e340 (console_lock){+.+.}-{0:0}, at: con_install+0xa4/0x4c4 [ 805.282083][ T33] 1 lock held by syz-executor/4197: [ 805.282147][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x4b8/0x1810 ** replaying previous printk message ** [ 805.282147][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x4b8/0x1810 [ 805.283058][ T33] 1 lock held by syz-executor/4221: [ 805.283122][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 805.284109][ T33] [ 805.284184][ T33] ============================================= [ 805.284184][ T33] [ 805.284716][ T33] Kernel panic - not syncing: hung_task: blocked tasks [ 805.287823][ T33] CPU: 1 UID: 0 PID: 33 Comm: khungtaskd Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 805.288196][ T33] Hardware name: linux,dummy-virt (DT) [ 805.288708][ T33] Call trace: [ 805.289175][ T33] show_stack+0x18/0x24 (C) [ 805.289629][ T33] dump_stack_lvl+0x38/0xf4 [ 805.289825][ T33] dump_stack+0x1c/0x28 [ 805.289995][ T33] panic+0x5b0/0x664 [ 805.290164][ T33] watchdog+0x658/0x1140 [ 805.290342][ T33] kthread+0x348/0x5fc [ 805.290522][ T33] ret_from_fork+0x10/0x20 [ 805.291128][ T33] SMP: stopping secondary CPUs [ 805.292198][ T33] Kernel Offset: disabled [ 805.292415][ T33] CPU features: 0x0410,00040068,01000400,0200421b [ 805.292685][ T33] Memory Limit: none [ 805.295273][ T33] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:19:47 Registers: info registers vcpu 0 CPU#0 PC=ffff80008544667c X00=ffff800085446678 X01=0000000000000000 X02=0000000000000000 X03=1fffe00002f2c3c9 X04=1fffe00002f2c3c9 X05=ffff8000800068c0 X06=ffff700010000d18 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700010000d18 X11=1ffff00010000d18 X12=ffff700010000d19 X13=0000000000000000 X14=1fffe0000d418836 X15=18509ff2476f6ad5 X16=64240000d7f8ffff X17=db87ddb6f66af6e2 X18=ffff00003402d280 X19=ffff8000872d0730 X20=ffff000017961e40 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff8000872d0700 X25=0000000000000000 X26=0000000000000004 X27=ffff8000872d0730 X28=1fffe0000d41bb5e X29=ffff800080006830 X30=ffff8000804282fc SP=ffff800080006830 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000000000000000:000000000000000a Q02=0000aaaabd72ace7:0000aaaabd72abf0 Q03=0000fffff6090610:0000fffff6090378 Q04=0000000000000000:0000000000000000 Q05=0000fffff60902d0:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:000001f40000000a Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff60906e0:0000fffff60906e0 Q17=ffffff80ffffffd0:0000fffff60906b0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008544667c X00=ffff800085446678 X01=0000000000000000 X02=0000000000000000 X03=1fffe00001df4791 X04=1ffff00011a16e20 X05=ffff80008d9273f8 X06=ffff80008d927410 X07=ffff80008d9274f0 X08=ffff80008d9273b8 X09=dfff800000000000 X10=ffff700011b24e76 X11=1ffff00011b24e76 X12=ffff700011b24e77 X13=0000000000000001 X14=0000000000000000 X15=0000000000000001 X16=7367616c665f6b73 X17=303838323478303a X18=0000000000004006 X19=ffff8000872d0730 X20=ffff00000efa3c80 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff8000872d0700 X25=0000000000000000 X26=0000000000000004 X27=ffff8000872d0730 X28=ffff00000efa3c80 X29=ffff80008d927430 X30=ffff8000804282fc SP=ffff80008d927430 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000000000000000:000000000000000a Q02=0000aaaabd72ace7:0000aaaabd72abf0 Q03=0000fffff6090610:0000fffff6090378 Q04=0000000000000000:0000000000000000 Q05=0000fffff60902d0:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:000001f40000000a Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff60906e0:0000fffff60906e0 Q17=ffffff80ffffffd0:0000fffff60906b0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000