last executing test programs: 1h7m48.045381934s ago: executing program 1 (id=1131): r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000001080)=@file={0x1, './file0\x00'}, 0x6e) ioctl$SIOCGETVIFCNT(r0, 0x89e0, 0x0) 1h7m47.41053732s ago: executing program 1 (id=1133): r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000240)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000000180)={0x78, 0x0, r1}, 0x78) 1h7m46.798968227s ago: executing program 1 (id=1135): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r0, 0x0, r1, 0x0, 0x7ffff000, 0x0) 1h7m46.252436549s ago: executing program 1 (id=1136): setuid(0xee00) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x890c, &(0x7f00000002c0)={0x3, 'veth0_to_bridge\x00'}) 1h7m45.939936383s ago: executing program 1 (id=1138): r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x10) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 1h7m45.426947954s ago: executing program 1 (id=1140): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x20000000ec071, 0xffffffffffffffff, 0x4000) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) 1h6m59.08854973s ago: executing program 32 (id=1140): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x20000000ec071, 0xffffffffffffffff, 0x4000) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) 48m8.400335927s ago: executing program 2 (id=4675): mknod$loop(0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000140)='./file4\x00', 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file4\x00', 0xffffffffffffff9c, &(0x7f00000006c0)='./file5\x00', 0x0) 48m7.980330283s ago: executing program 2 (id=4677): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000000)) 48m7.720712293s ago: executing program 2 (id=4679): r0 = syz_open_dev$sndctrl(&(0x7f0000001440), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000100)=0x9) syz_open_dev$sndpcmp(&(0x7f0000000040), 0x0, 0xa2465) 48m7.444627894s ago: executing program 2 (id=4681): openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) 48m7.02150368s ago: executing program 2 (id=4682): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) 48m6.816112708s ago: executing program 2 (id=4684): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 47m21.606513046s ago: executing program 33 (id=4684): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f00000000c0)={'ip6tnl0\x00', 0x0}) 22m18.54376018s ago: executing program 0 (id=9236): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x275a, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) ioctl$sock_inet6_SIOCDELRT(r1, 0x5450, 0x0) 22m17.924052674s ago: executing program 0 (id=9238): r0 = socket$netlink(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs, 0x6e) 22m17.616323531s ago: executing program 0 (id=9239): r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = fcntl$dupfd(r0, 0x0, r0) write$sysctl(r1, &(0x7f0000000000)='4\x00', 0x2) 22m17.147600631s ago: executing program 0 (id=9241): r0 = syz_clone(0x0, 0x0, 0x9, 0x0, 0x0, 0x0) r1 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) kcmp(r0, r0, 0x3, 0xffffffffffffffff, r1) 22m16.604142663s ago: executing program 0 (id=9243): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x10) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x1e80c2, 0x0) 22m16.211130082s ago: executing program 0 (id=9244): r0 = openat$sequencer(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = dup(r0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) 21m29.653137253s ago: executing program 34 (id=9244): r0 = openat$sequencer(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = dup(r0) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x0) 38.583747081s ago: executing program 4 (id=11837): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/diskstats\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000), 0x4) 37.708297656s ago: executing program 4 (id=11839): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "000080f100df000000a7d9de16c708db7200"}) r1 = syz_open_pts(r0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)) 37.185787285s ago: executing program 4 (id=11840): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x16) dup3(r0, r1, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14, 0x0, 0x10, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x80) 36.477563093s ago: executing program 4 (id=11842): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x262) 35.634913506s ago: executing program 4 (id=11844): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup2(r1, r0) sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}, 0x1, 0x0, 0x0, 0x4000001}, 0x1) 34.905778684s ago: executing program 4 (id=11847): pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) dup3(r1, r0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000180)='ramfs\x00', &(0x7f00000001c0)='.pending_reads\x00', 0x0) 34.905593124s ago: executing program 35 (id=11847): pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) dup3(r1, r0, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000180)='ramfs\x00', &(0x7f00000001c0)='.pending_reads\x00', 0x0) 6.152948381s ago: executing program 3 (id=11874): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x439c1, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x12, 0x0, "8b76643a4657ee50478c37cc1f700df119c9a1fbe789c8ea00948b833a239a2438d565482f5819ec5befcfbb3516e8d8f46c10aeeb0d3bd9690bd053631418b29e0431ebb156b10f468c2b50484df275"}, 0xd8) 5.204507757s ago: executing program 3 (id=11875): r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r0, r1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x6, 0xb, 0x0, &(0x7f0000000000)) 4.345113111s ago: executing program 3 (id=11876): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x9, 0x42, 0x40, 0xc0, 0x1}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r0}, 0x38) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x2, r0}, 0x38) 2.224826533s ago: executing program 3 (id=11877): r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) lstat(&(0x7f0000004680)='./file0\x00', 0x0) 1.186446264s ago: executing program 3 (id=11878): r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f00000005c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) ioctl$USBDEVFS_ALLOC_STREAMS(r0, 0x8008551c, &(0x7f0000000140)={0xe021, 0x1, [{0x1, 0x1}]}) 0s ago: executing program 3 (id=11879): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000a80)={0x48, r1, 0x1, 0xfffffffe, 0x0, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xfb2e77a8993c191f}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffff}]}, 0x48}}, 0x20000000) kernel console output (not intermixed with test programs): 40][ T30] audit: type=1400 audit(955.110:233): avc: denied { getopt } for pid=7040 comm="syz.2.1659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 960.085325][ T30] audit: type=1400 audit(959.550:234): avc: denied { ioctl } for pid=7057 comm="syz.0.1667" path="socket:[16042]" dev="sockfs" ino=16042 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 965.772474][ T30] audit: type=1400 audit(965.230:235): avc: denied { append } for pid=7091 comm="syz.2.1684" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 979.823611][ T30] audit: type=1400 audit(979.280:236): avc: denied { bind } for pid=7157 comm="syz.0.1715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 990.127208][ T7186] lo: entered promiscuous mode [ 990.130225][ T7186] lo: entered allmulticast mode [ 990.172836][ T7186] tunl0: entered promiscuous mode [ 990.175200][ T7186] tunl0: entered allmulticast mode [ 990.210912][ T7186] gre0: entered promiscuous mode [ 990.244084][ T7186] gre0: entered allmulticast mode [ 990.248026][ T7186] gretap0: entered promiscuous mode [ 990.249218][ T7186] gretap0: entered allmulticast mode [ 990.256321][ T7186] erspan0: entered promiscuous mode [ 990.257596][ T7186] erspan0: entered allmulticast mode [ 990.262981][ T7186] ip_vti0: entered promiscuous mode [ 990.264522][ T7186] ip_vti0: entered allmulticast mode [ 990.268944][ T7186] ip6_vti0: entered promiscuous mode [ 990.270425][ T7186] ip6_vti0: entered allmulticast mode [ 990.287049][ T7186] sit0: entered promiscuous mode [ 990.302893][ T7186] sit0: entered allmulticast mode [ 990.309636][ T7186] ip6tnl0: entered promiscuous mode [ 990.310129][ T7186] ip6tnl0: entered allmulticast mode [ 990.369226][ T7186] ip6gre0: entered promiscuous mode [ 990.370165][ T7186] ip6gre0: entered allmulticast mode [ 990.399110][ T7186] syz_tun: entered promiscuous mode [ 990.400196][ T7186] syz_tun: entered allmulticast mode [ 990.448222][ T7186] ip6gretap0: entered promiscuous mode [ 990.448748][ T7186] ip6gretap0: entered allmulticast mode [ 990.470974][ T7186] vcan0: entered promiscuous mode [ 990.474193][ T7186] vcan0: entered allmulticast mode [ 990.479627][ T7186] bond0: entered promiscuous mode [ 990.486729][ T7186] bond_slave_0: entered promiscuous mode [ 990.493143][ T7186] bond_slave_1: entered promiscuous mode [ 990.494647][ T7186] bond0: entered allmulticast mode [ 990.494926][ T7186] bond_slave_0: entered allmulticast mode [ 990.495113][ T7186] bond_slave_1: entered allmulticast mode [ 990.499537][ T7186] dummy0: entered promiscuous mode [ 990.505064][ T7186] dummy0: entered allmulticast mode [ 990.508524][ T7186] nlmon0: entered promiscuous mode [ 990.508936][ T7186] nlmon0: entered allmulticast mode [ 990.535768][ T7186] vxcan0: entered promiscuous mode [ 990.536534][ T7186] vxcan0: entered allmulticast mode [ 990.553786][ T7186] vxcan1: entered promiscuous mode [ 990.565744][ T7186] vxcan1: entered allmulticast mode [ 990.567309][ T7186] veth0: entered promiscuous mode [ 990.583990][ T7186] veth0: entered allmulticast mode [ 990.610495][ T7186] veth1: entered promiscuous mode [ 990.648256][ T7186] veth1: entered allmulticast mode [ 990.698563][ T7186] wg0: entered promiscuous mode [ 990.699359][ T7186] wg0: entered allmulticast mode [ 990.728697][ T7186] wg1: entered promiscuous mode [ 990.729621][ T7186] wg1: entered allmulticast mode [ 990.749669][ T7186] wg2: entered promiscuous mode [ 990.753234][ T7186] wg2: entered allmulticast mode [ 990.765898][ T7186] veth0_to_bridge: entered promiscuous mode [ 990.767912][ T7186] veth0_to_bridge: entered allmulticast mode [ 990.781063][ T7186] bridge_slave_0: entered promiscuous mode [ 990.785992][ T7186] bridge_slave_0: entered allmulticast mode [ 990.795038][ T7186] veth1_to_bridge: entered promiscuous mode [ 990.796979][ T7186] veth1_to_bridge: entered allmulticast mode [ 990.810926][ T7186] bridge_slave_1: entered promiscuous mode [ 990.814707][ T7186] bridge_slave_1: entered allmulticast mode [ 990.828552][ T7186] veth0_to_bond: entered promiscuous mode [ 990.830511][ T7186] veth0_to_bond: entered allmulticast mode [ 990.849231][ T7186] veth1_to_bond: entered promiscuous mode [ 990.857074][ T7186] veth1_to_bond: entered allmulticast mode [ 990.869675][ T7186] veth0_to_team: entered promiscuous mode [ 990.877758][ T7186] veth0_to_team: entered allmulticast mode [ 990.898256][ T7186] team_slave_0: entered promiscuous mode [ 990.900184][ T7186] team_slave_0: entered allmulticast mode [ 990.911076][ T7186] veth1_to_team: entered promiscuous mode [ 990.914493][ T7186] veth1_to_team: entered allmulticast mode [ 990.927594][ T7186] team_slave_1: entered promiscuous mode [ 990.929598][ T7186] team_slave_1: entered allmulticast mode [ 990.938328][ T7186] veth0_to_batadv: entered promiscuous mode [ 990.940257][ T7186] veth0_to_batadv: entered allmulticast mode [ 990.948509][ T7186] batadv_slave_0: entered promiscuous mode [ 990.950371][ T7186] batadv_slave_0: entered allmulticast mode [ 990.959808][ T7186] veth1_to_batadv: entered promiscuous mode [ 990.963337][ T7186] veth1_to_batadv: entered allmulticast mode [ 990.977021][ T7186] batadv_slave_1: entered promiscuous mode [ 990.980146][ T7186] batadv_slave_1: entered allmulticast mode [ 991.006492][ T7186] xfrm0: entered promiscuous mode [ 991.008929][ T7186] xfrm0: entered allmulticast mode [ 991.016750][ T7186] veth0_to_hsr: entered promiscuous mode [ 991.018264][ T7186] veth0_to_hsr: entered allmulticast mode [ 991.027692][ T7186] hsr_slave_0: entered allmulticast mode [ 991.034269][ T7186] veth1_to_hsr: entered promiscuous mode [ 991.035415][ T7186] veth1_to_hsr: entered allmulticast mode [ 991.039731][ T7186] hsr_slave_1: entered allmulticast mode [ 991.050245][ T7186] hsr0: entered promiscuous mode [ 991.056675][ T7186] hsr0: entered allmulticast mode [ 991.078394][ T7186] veth1_virt_wifi: entered promiscuous mode [ 991.079568][ T7186] veth1_virt_wifi: entered allmulticast mode [ 991.088583][ T7186] veth0_virt_wifi: entered promiscuous mode [ 991.097330][ T7186] veth0_virt_wifi: entered allmulticast mode [ 991.157005][ T7186] veth1_vlan: entered allmulticast mode [ 991.187158][ T7186] veth0_vlan: entered allmulticast mode [ 991.275140][ T7186] vlan0: entered promiscuous mode [ 991.276544][ T7186] vlan0: entered allmulticast mode [ 991.300752][ T7186] vlan1: entered promiscuous mode [ 991.338389][ T7186] vlan1: entered allmulticast mode [ 991.362624][ T7186] macvlan0: entered promiscuous mode [ 991.368169][ T7186] macvlan0: entered allmulticast mode [ 991.429588][ T7186] macvlan1: entered promiscuous mode [ 991.443615][ T7186] macvlan1: entered allmulticast mode [ 991.475972][ T7186] ipvlan0: entered promiscuous mode [ 991.478454][ T7186] ipvlan0: entered allmulticast mode [ 991.523952][ T7186] ipvlan1: entered promiscuous mode [ 991.524389][ T7186] ipvlan1: entered allmulticast mode [ 991.606189][ T7186] veth1_macvtap: entered allmulticast mode [ 991.628662][ T7186] veth0_macvtap: entered allmulticast mode [ 991.666747][ T7186] macvtap0: entered promiscuous mode [ 991.667800][ T7186] macvtap0: entered allmulticast mode [ 991.749923][ T7186] macsec0: entered promiscuous mode [ 991.774904][ T7186] macsec0: entered allmulticast mode [ 991.805511][ T7186] geneve0: entered promiscuous mode [ 991.806195][ T7186] geneve0: entered allmulticast mode [ 991.816309][ T7186] geneve1: entered promiscuous mode [ 991.816998][ T7186] geneve1: entered allmulticast mode [ 991.829868][ T7186] netdevsim netdevsim2 netdevsim0: entered promiscuous mode [ 991.830384][ T7186] netdevsim netdevsim2 netdevsim0: entered allmulticast mode [ 991.848212][ T7186] netdevsim netdevsim2 netdevsim1: entered promiscuous mode [ 991.849093][ T7186] netdevsim netdevsim2 netdevsim1: entered allmulticast mode [ 991.888476][ T7186] netdevsim netdevsim2 netdevsim2: entered promiscuous mode [ 991.915780][ T7186] netdevsim netdevsim2 netdevsim2: entered allmulticast mode [ 991.949322][ T7186] netdevsim netdevsim2 netdevsim3: entered promiscuous mode [ 991.956118][ T7186] netdevsim netdevsim2 netdevsim3: entered allmulticast mode [ 1002.505704][ T7252] block nbd2: shutting down sockets [ 1009.024066][ T7298] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7298 comm=syz.2.1783 [ 1016.308038][ T30] audit: type=1400 audit(1015.770:237): avc: denied { bind } for pid=7351 comm="syz.2.1810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1016.369391][ T30] audit: type=1400 audit(1015.820:238): avc: denied { write } for pid=7351 comm="syz.2.1810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1039.075664][ T30] audit: type=1400 audit(1038.530:239): avc: denied { bind } for pid=7479 comm="syz.0.1872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1040.872289][ T30] audit: type=1400 audit(1040.330:240): avc: denied { bind } for pid=7492 comm="syz.2.1879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1040.934398][ T30] audit: type=1400 audit(1040.390:241): avc: denied { accept } for pid=7492 comm="syz.2.1879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1046.706842][ T30] audit: type=1400 audit(1046.170:242): avc: denied { setopt } for pid=7528 comm="syz.2.1898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1047.079443][ T30] audit: type=1400 audit(1046.540:243): avc: denied { write } for pid=7532 comm="syz.2.1899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1063.908203][ T30] audit: type=1400 audit(1063.370:244): avc: denied { read } for pid=7648 comm="syz.0.1955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1072.106954][ T30] audit: type=1400 audit(1071.570:245): avc: denied { connect } for pid=7695 comm="syz.0.1979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1073.522670][ T7703] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2305 sclass=netlink_route_socket pid=7703 comm=syz.0.1981 [ 1081.250766][ T30] audit: type=1400 audit(1080.700:246): avc: denied { mount } for pid=7748 comm="syz.2.2003" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1081.312477][ T30] audit: type=1400 audit(1080.770:247): avc: denied { remount } for pid=7748 comm="syz.2.2003" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1081.597060][ T30] audit: type=1400 audit(1081.050:248): avc: denied { unmount } for pid=5995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1089.145521][ T30] audit: type=1400 audit(1088.560:249): avc: denied { mount } for pid=7793 comm="syz.0.2026" name="/" dev="configfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1091.169652][ T7808] random: crng reseeded on system resumption [ 1104.657890][ T7876] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7876 comm=syz.2.2065 [ 1112.872516][ T30] audit: type=1400 audit(1112.330:250): avc: denied { write } for pid=7929 comm="syz.2.2091" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1112.873034][ T30] audit: type=1400 audit(1112.330:251): avc: denied { open } for pid=7929 comm="syz.2.2091" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1131.144211][ T30] audit: type=1400 audit(1130.610:252): avc: denied { unmount } for pid=8058 comm="syz.0.2154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1136.757301][ T7096] hid_parser_main: 33 callbacks suppressed [ 1136.760079][ T7096] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1136.760438][ T7096] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1136.760780][ T7096] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1136.776138][ T7096] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1136.776583][ T7096] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1136.776812][ T7096] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1136.777124][ T7096] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1136.777383][ T7096] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1136.777646][ T7096] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1136.777849][ T7096] hid-generic 0003:0004:0000.0004: unknown main item tag 0x0 [ 1136.816836][ T7096] hid-generic 0003:0004:0000.0004: hidraw0: USB HID v0.00 Device [syz0] on syz1 [ 1138.679416][ T8101] fido_id[8101]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1142.849616][ T8134] binder: 8133:8134 ioctl 400c620e 0 returned -14 [ 1150.662934][ T30] audit: type=1400 audit(1150.110:253): avc: denied { create } for pid=8180 comm="syz.2.2212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1150.708194][ T30] audit: type=1400 audit(1150.170:254): avc: denied { write } for pid=8180 comm="syz.2.2212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1151.199758][ T30] audit: type=1400 audit(1150.660:255): avc: denied { getopt } for pid=8182 comm="syz.2.2213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1158.033257][ T8225] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8225 comm=syz.2.2233 [ 1158.776293][ T30] audit: type=1400 audit(1158.230:256): avc: denied { write } for pid=8228 comm="syz.2.2235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1168.896828][ T30] audit: type=1400 audit(1168.360:257): avc: denied { setattr } for pid=8300 comm="syz.2.2270" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1172.840395][ T7096] hid_parser_main: 8 callbacks suppressed [ 1172.852216][ T7096] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1172.883546][ T7096] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1174.433090][ T30] audit: type=1400 audit(1173.880:258): avc: denied { create } for pid=8337 comm="syz.2.2288" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1174.468780][ T30] audit: type=1400 audit(1173.930:259): avc: denied { read } for pid=8337 comm="syz.2.2288" name="file0" dev="tmpfs" ino=2640 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1174.483638][ T30] audit: type=1400 audit(1173.940:260): avc: denied { open } for pid=8337 comm="syz.2.2288" path="/511/file0" dev="tmpfs" ino=2640 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1174.534957][ T30] audit: type=1400 audit(1173.990:261): avc: denied { ioctl } for pid=8337 comm="syz.2.2288" path="/511/file0" dev="tmpfs" ino=2640 ioctlcmd=0x125d scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1174.738647][ T30] audit: type=1400 audit(1174.190:262): avc: denied { unlink } for pid=5995 comm="syz-executor" name="file0" dev="tmpfs" ino=2640 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1175.737507][ T8331] fido_id[8331]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1176.877310][ T8347] SELinux: Context system_u:object_r:hald_var_run_t:s0 is not valid (left unmapped). [ 1176.885765][ T30] audit: type=1400 audit(1176.350:263): avc: denied { relabelto } for pid=8346 comm="syz.0.2293" name="file0" dev="tmpfs" ino=6240 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 1176.903729][ T30] audit: type=1400 audit(1176.350:264): avc: denied { associate } for pid=8346 comm="syz.0.2293" name="file0" dev="tmpfs" ino=6240 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hald_var_run_t:s0" [ 1176.994064][ T30] audit: type=1400 audit(1176.450:265): avc: denied { unlink } for pid=3318 comm="syz-executor" name="file0" dev="tmpfs" ino=6240 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 1187.516680][ T8427] binfmt_misc: register: failed to install interpreter file ./file0 [ 1216.875931][ T30] audit: type=1400 audit(1216.330:266): avc: denied { mount } for pid=8609 comm="syz.2.2420" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1216.897624][ T30] audit: type=1400 audit(1216.360:267): avc: denied { unmount } for pid=8609 comm="syz.2.2420" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1218.833028][ T30] audit: type=1400 audit(1218.290:268): avc: granted { setsecparam } for pid=8622 comm="syz.2.2427" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1225.838106][ T8641] mmap: syz.0.2435 (8641) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 1229.425358][ T8691] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8691 comm=syz.0.2459 [ 1247.184534][ T8820] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8820 comm=syz.0.2520 [ 1251.312247][ T30] audit: type=1400 audit(1250.770:269): avc: denied { create } for pid=8839 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1251.313139][ T30] audit: type=1400 audit(1250.770:270): avc: denied { write open } for pid=8839 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=5167 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1251.414004][ T30] audit: type=1400 audit(1250.860:271): avc: denied { append } for pid=8839 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=5167 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1251.542380][ T30] audit: type=1400 audit(1250.970:272): avc: denied { getattr } for pid=8839 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1252.568171][ T30] audit: type=1400 audit(1252.030:273): avc: denied { read } for pid=8850 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1253.513817][ T30] audit: type=1400 audit(1252.970:274): avc: denied { unlink } for pid=8856 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=5167 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1260.182630][ T8902] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=8902 comm=syz.2.2556 [ 1278.425806][ T30] audit: type=1400 audit(1277.880:275): avc: denied { append } for pid=8999 comm="syz.2.2603" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1286.038785][ T30] audit: type=1400 audit(1285.500:276): avc: denied { wake_alarm } for pid=9056 comm="syz.0.2630" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1299.098827][ T5664] hid-generic 0001:0009:0001.0006: item fetching failed at offset 0/1 [ 1299.107261][ T5664] hid-generic 0001:0009:0001.0006: probe with driver hid-generic failed with error -22 [ 1301.136040][ T30] audit: type=1400 audit(1300.590:277): avc: denied { ioctl } for pid=9164 comm="syz.0.2683" path="socket:[23734]" dev="sockfs" ino=23734 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1305.093624][ T9182] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9182 comm=syz.2.2690 [ 1314.266518][ T30] audit: type=1400 audit(1313.730:278): avc: denied { execute } for pid=9240 comm="syz.2.2718" path=2F6D656D66643A25202864656C6574656429 dev="hugetlbfs" ino=23842 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 1318.247250][ T9265] netlink: 56 bytes leftover after parsing attributes in process `syz.2.2730'. [ 1318.264807][ T9265] netlink: 56 bytes leftover after parsing attributes in process `syz.2.2730'. [ 1332.656269][ T9365] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2776'. [ 1337.818019][ T30] audit: type=1400 audit(1337.280:279): avc: denied { getopt } for pid=9397 comm="syz.2.2793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1344.500183][ T30] audit: type=1400 audit(1343.960:280): avc: denied { getopt } for pid=9438 comm="syz.0.2813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1344.843706][ T6350] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1344.844243][ T6350] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1344.844649][ T6350] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1344.844852][ T6350] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1344.845051][ T6350] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1344.845229][ T6350] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1344.845408][ T6350] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1344.845534][ T6350] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1344.845658][ T6350] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1344.845783][ T6350] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 1344.894468][ T6350] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [sy] on syz0 [ 1346.998600][ T9447] fido_id[9447]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1367.229849][ T30] audit: type=1400 audit(1366.690:281): avc: denied { remount } for pid=9582 comm="syz.0.2883" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1370.003996][ T9605] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9605 comm=syz.2.2894 [ 1372.469337][ T9621] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9621 comm=syz.2.2902 [ 1374.790989][ T30] audit: type=1400 audit(1374.250:282): avc: denied { create } for pid=9637 comm="syz.0.2910" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1374.839708][ T30] audit: type=1400 audit(1374.300:283): avc: denied { write } for pid=9637 comm="syz.0.2910" name="file0" dev="tmpfs" ino=7778 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1374.855094][ T30] audit: type=1400 audit(1374.300:284): avc: denied { open } for pid=9637 comm="syz.0.2910" path="/1512/file0" dev="tmpfs" ino=7778 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1375.148667][ T30] audit: type=1400 audit(1374.610:285): avc: denied { unlink } for pid=3318 comm="syz-executor" name="file0" dev="tmpfs" ino=7778 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1381.033676][ T30] audit: type=1400 audit(1380.490:286): avc: denied { ioctl } for pid=9684 comm="syz.2.2932" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4b32 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1384.627152][ T30] audit: type=1400 audit(1384.090:287): avc: denied { ioctl } for pid=9702 comm="syz.2.2941" path="/852/file0" dev="tmpfs" ino=4395 ioctlcmd=0x70c9 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1402.821203][ C0] vkms_vblank_simulate: vblank timer overrun [ 1411.705578][ T9907] netlink: 56 bytes leftover after parsing attributes in process `syz.0.3040'. [ 1411.723066][ T9907] netlink: 56 bytes leftover after parsing attributes in process `syz.0.3040'. [ 1413.523156][ T9923] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9923 comm=syz.2.3048 [ 1424.269490][ T30] audit: type=1400 audit(1423.730:288): avc: denied { mount } for pid=9995 comm="syz.0.3084" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1424.315772][ T9997] ======================================================= [ 1424.315772][ T9997] WARNING: The mand mount option has been deprecated and [ 1424.315772][ T9997] and is ignored by this kernel. Remove the mand [ 1424.315772][ T9997] option from the mount to silence this warning. [ 1424.315772][ T9997] ======================================================= [ 1424.319830][ T30] audit: type=1400 audit(1423.780:289): avc: denied { remount } for pid=9995 comm="syz.0.3084" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1424.550571][ T30] audit: type=1400 audit(1423.990:290): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1431.450376][T10056] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10056 comm=syz.2.3113 [ 1453.330403][ T30] audit: type=1400 audit(1452.790:291): avc: denied { node_bind } for pid=10217 comm="syz.2.3193" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1453.867514][T10222] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1453.917186][T10222] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1453.985056][T10222] SELinux: syz.2.3195 (10222) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1457.058629][T10228] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10228 comm=syz.0.3197 [ 1466.240778][ T30] audit: type=1400 audit(1465.700:292): avc: denied { write } for pid=10282 comm="syz.0.3225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1470.763996][T10313] Injecting memory failure for pfn 0x81d6c at process virtual address 0x2036c000 [ 1470.778609][T10313] Memory failure: 0x81d6c: recovery action for unsplit thp: Failed [ 1488.967624][T10447] syz.0.3304 uses obsolete (PF_INET,SOCK_PACKET) [ 1503.183017][ T30] audit: type=1400 audit(1502.640:293): avc: denied { setattr } for pid=10553 comm="syz.0.3355" name="sequencer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 1514.887252][ T30] audit: type=1400 audit(1514.340:294): avc: denied { setopt } for pid=10629 comm="syz.2.3393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1515.507581][ T30] audit: type=1400 audit(1514.970:295): avc: denied { read } for pid=10633 comm="syz.2.3395" name="file0" dev="tmpfs" ino=5513 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1516.234695][ T30] audit: type=1400 audit(1515.700:296): avc: denied { bind } for pid=10638 comm="syz.2.3397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1518.643767][ T30] audit: type=1400 audit(1518.110:297): avc: denied { remount } for pid=10663 comm="syz.2.3410" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1526.556033][T10706] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10706 comm=syz.0.3430 [ 1528.087664][T10718] netlink: 'syz.2.3435': attribute type 29 has an invalid length. [ 1529.027423][ T30] audit: type=1400 audit(1528.490:298): avc: denied { write } for pid=10725 comm="syz.0.3441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1563.012784][T10986] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=10986 comm=syz.2.3566 [ 1569.349635][ T30] audit: type=1400 audit(1568.810:299): avc: denied { unlink } for pid=5995 comm="syz-executor" name=131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 dev="tmpfs" ino=5949 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1581.477865][T11095] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1593.784048][T11194] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11194 comm=syz.2.3670 [ 1594.274103][T11197] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11197 comm=syz.2.3671 [ 1600.003104][ T30] audit: type=1400 audit(1599.470:300): avc: denied { setopt } for pid=11235 comm="syz.2.3688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1634.229137][ T30] audit: type=1400 audit(1633.690:301): avc: denied { sqpoll } for pid=11465 comm="syz.0.3799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1638.613652][ T30] audit: type=1400 audit(1638.070:302): avc: denied { getopt } for pid=11492 comm="syz.2.3812" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1641.154273][T11518] SELinux: syz.2.3824 (11518) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1647.774570][ T9] hid (null): global environment stack underflow [ 1647.874572][ T9] hid-generic 0003:0005:7FFF.0008: global environment stack underflow [ 1647.875250][ T9] hid-generic 0003:0005:7FFF.0008: item 0 0 1 11 parsing failed [ 1647.879858][ T9] hid-generic 0003:0005:7FFF.0008: probe with driver hid-generic failed with error -22 [ 1660.983189][ T30] audit: type=1400 audit(1660.440:303): avc: denied { remount } for pid=11674 comm="syz.2.3900" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1661.082433][ T30] audit: type=1400 audit(1660.540:304): avc: denied { unmount } for pid=5995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1669.608752][ T30] audit: type=1400 audit(1669.070:305): avc: denied { mount } for pid=11741 comm="syz.2.3932" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 1669.659130][ T30] audit: type=1400 audit(1669.110:306): avc: denied { remount } for pid=11741 comm="syz.2.3932" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 1669.795670][ T30] audit: type=1400 audit(1669.250:307): avc: denied { unmount } for pid=5995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 1681.579617][T11823] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=11823 comm=syz.2.3972 [ 1692.558515][T11912] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11912 comm=syz.2.4015 [ 1694.277247][T11923] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11923 comm=syz.2.4021 [ 1701.962158][ T30] audit: type=1400 audit(1701.420:308): avc: denied { name_bind } for pid=11953 comm="syz.2.4036" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 1706.232650][ T30] audit: type=1400 audit(1705.690:309): avc: denied { ioctl } for pid=11988 comm="syz.0.4051" path="net:[4026532620]" dev="nsfs" ino=4026532620 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1710.467549][ T23] hid_parser_main: 22 callbacks suppressed [ 1710.476706][ T23] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 1710.498492][ T23] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz0] on syz0 [ 1713.784262][T12031] fido_id[12031]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1714.625946][ T30] audit: type=1400 audit(1714.090:310): avc: denied { ioctl } for pid=12049 comm="syz.2.4080" path="socket:[32814]" dev="sockfs" ino=32814 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1722.917072][ T30] audit: type=1400 audit(1722.380:311): avc: denied { bind } for pid=12112 comm="syz.2.4111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1726.338100][ T30] audit: type=1400 audit(1725.800:312): avc: denied { append } for pid=12151 comm="syz.0.4130" name="system" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1728.510802][ T30] audit: type=1400 audit(1727.970:313): avc: denied { mount } for pid=12173 comm="syz.2.4141" name="/" dev="pstore" ino=3171 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1728.530603][ T30] audit: type=1400 audit(1727.990:314): avc: denied { remount } for pid=12173 comm="syz.2.4141" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1728.699920][ T30] audit: type=1400 audit(1728.160:315): avc: denied { unmount } for pid=5995 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1731.335097][ T30] audit: type=1400 audit(1730.770:316): avc: denied { setopt } for pid=12202 comm="syz.2.4155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1737.823484][ T30] audit: type=1400 audit(1737.280:317): avc: denied { create } for pid=12271 comm="syz.0.4188" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1737.929724][ T30] audit: type=1400 audit(1737.390:318): avc: denied { mounton } for pid=12271 comm="syz.0.4188" path="/2185/file0" dev="tmpfs" ino=11225 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1750.918488][ T30] audit: type=1400 audit(1750.380:319): avc: denied { create } for pid=12387 comm="syz.2.4245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1750.990707][ T30] audit: type=1400 audit(1750.440:320): avc: denied { connect } for pid=12387 comm="syz.2.4245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1760.727567][ T30] audit: type=1400 audit(1760.190:321): avc: denied { read } for pid=12482 comm="syz.0.4292" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1763.603513][ T30] audit: type=1400 audit(1763.060:322): avc: denied { ioctl } for pid=12513 comm="syz.0.4307" path="socket:[33642]" dev="sockfs" ino=33642 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1780.737007][T12662] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=12662 comm=syz.0.4376 [ 1790.750684][ T30] audit: type=1400 audit(1790.210:323): avc: denied { write } for pid=12738 comm="syz.0.4418" path="socket:[34695]" dev="sockfs" ino=34695 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1793.059923][ T30] audit: type=1400 audit(1792.520:324): avc: denied { setcheckreqprot } for pid=12757 comm="syz.2.4423" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1817.305341][ T30] audit: type=1400 audit(1816.760:325): avc: denied { setopt } for pid=12977 comm="syz.0.4530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1823.338082][T13011] deleting an unspecified loop device is not supported. [ 1833.323738][ T30] audit: type=1400 audit(1832.780:326): avc: denied { bind } for pid=13070 comm="syz.2.4574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1836.076161][ T30] audit: type=1400 audit(1835.540:327): avc: denied { setopt } for pid=13073 comm="syz.2.4576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1858.219170][ T30] audit: type=1400 audit(1857.680:328): avc: denied { read } for pid=13255 comm="syz.2.4661" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1870.937372][T13331] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2304 sclass=netlink_tcpdiag_socket pid=13331 comm=syz.0.4698 [ 1903.798698][ T30] audit: type=1400 audit(1903.260:329): avc: denied { name_bind } for pid=13438 comm="syz.0.4749" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1907.783689][ T30] audit: type=1400 audit(1907.240:330): avc: denied { mounton } for pid=13458 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1908.667201][T11523] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1909.135611][T11523] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1909.613539][T11523] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1910.115491][T11523] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1915.119044][T11523] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1915.224364][T11523] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1915.359376][T11523] bond0 (unregistering): Released all slaves [ 1932.619378][T13458] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1932.710024][T13458] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1940.027172][T13458] hsr_slave_0: entered promiscuous mode [ 1940.113134][T13458] hsr_slave_1: entered promiscuous mode [ 1945.808263][T13458] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1945.899860][T13458] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1945.974317][T13458] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1946.029439][T13458] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1952.234944][ T30] audit: type=1400 audit(1951.700:331): avc: denied { create } for pid=13682 comm="syz.0.4828" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=udp_socket permissive=1 [ 1952.418516][T13458] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1955.683003][ T30] audit: type=1400 audit(1955.140:332): avc: denied { getattr } for pid=13701 comm="syz.0.4833" name="[userfaultfd]" dev="anon_inodefs" ino=38989 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1974.489396][T13458] veth0_vlan: entered promiscuous mode [ 1974.696908][T13458] veth1_vlan: entered promiscuous mode [ 1975.238442][T13458] veth0_macvtap: entered promiscuous mode [ 1975.336779][T13458] veth1_macvtap: entered promiscuous mode [ 1976.336409][T13694] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1976.360574][T13694] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1976.366381][T13694] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1976.393908][T11523] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1983.874919][T13848] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=13848 comm=syz.3.4875 [ 1984.382243][ T30] audit: type=1400 audit(1983.840:333): avc: denied { write } for pid=13850 comm="syz.3.4878" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1991.276859][T13902] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13902 comm=syz.0.4902 [ 2005.836223][ T30] audit: type=1400 audit(2005.300:334): avc: denied { getopt } for pid=13979 comm="syz.0.4941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2011.805343][ T30] audit: type=1400 audit(2011.260:335): avc: denied { associate } for pid=14015 comm="syz.3.4959" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 2035.087006][ T30] audit: type=1400 audit(2034.550:336): avc: denied { map } for pid=14156 comm="syz.3.5023" path="/proc/175/net/pfkey" dev="proc" ino=4026532735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2035.098928][ T30] audit: type=1400 audit(2034.560:337): avc: denied { execute } for pid=14156 comm="syz.3.5023" path="/proc/175/net/pfkey" dev="proc" ino=4026532735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2041.213522][ T30] audit: type=1400 audit(2040.660:338): avc: denied { setattr } for pid=14202 comm="syz.3.5045" name="nbd3" dev="devtmpfs" ino=656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2044.066763][ T30] audit: type=1400 audit(2043.530:339): avc: denied { listen } for pid=14220 comm="syz.0.5053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2044.117577][ T30] audit: type=1400 audit(2043.570:340): avc: denied { ioctl } for pid=14220 comm="syz.0.5053" path="socket:[39898]" dev="sockfs" ino=39898 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2082.575977][T14470] ALSA: seq fatal error: cannot create timer (-19) [ 2099.717137][T14568] netlink: 'syz.0.5216': attribute type 29 has an invalid length. [ 2099.726334][T14568] netlink: 'syz.0.5216': attribute type 29 has an invalid length. [ 2127.788209][T14744] netlink: 24 bytes leftover after parsing attributes in process `syz.3.5299'. [ 2138.114722][T14809] netlink: 64 bytes leftover after parsing attributes in process `syz.0.5332'. [ 2145.093402][ T30] audit: type=1400 audit(2144.530:341): avc: denied { read } for pid=14856 comm="syz.0.5354" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2145.097398][ T30] audit: type=1400 audit(2144.550:342): avc: denied { open } for pid=14856 comm="syz.0.5354" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2159.735618][ T30] audit: type=1400 audit(2159.180:343): avc: denied { nlmsg_read } for pid=14949 comm="syz.0.5398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2174.507236][ T30] audit: type=1400 audit(2173.970:344): avc: denied { setopt } for pid=15056 comm="syz.0.5452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2178.784264][ T30] audit: type=1400 audit(2178.240:345): avc: denied { accept } for pid=15084 comm="syz.0.5466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2185.056300][ T30] audit: type=1400 audit(2184.520:346): avc: denied { remount } for pid=15134 comm="syz.0.5491" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2185.084378][T15135] option changes via remount are deprecated (pid=15134 comm=syz.0.5491) [ 2219.750489][ T30] audit: type=1400 audit(2219.210:347): avc: denied { connect } for pid=15388 comm="syz.0.5616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2221.805149][ T30] audit: type=1400 audit(2221.260:348): avc: denied { remount } for pid=15400 comm="syz.3.5622" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 2229.070579][T15460] usb usb1: usbfs: process 15460 (syz.0.5651) did not claim interface 6 before use [ 2229.614233][T15464] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2051 sclass=netlink_route_socket pid=15464 comm=syz.0.5653 [ 2229.774973][T15466] netlink: 184 bytes leftover after parsing attributes in process `syz.3.5654'. [ 2236.934796][T15514] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15514 comm=syz.0.5677 [ 2252.440312][ T4270] hid-generic 0002:0004:0009.000A: unknown main item tag 0x0 [ 2252.450600][ T4270] hid-generic 0002:0004:0009.000A: unknown main item tag 0x0 [ 2252.454689][ T4270] hid-generic 0002:0004:0009.000A: unknown main item tag 0x0 [ 2252.456470][ T4270] hid-generic 0002:0004:0009.000A: unknown main item tag 0x0 [ 2252.458320][ T4270] hid-generic 0002:0004:0009.000A: unknown main item tag 0x0 [ 2252.460050][ T4270] hid-generic 0002:0004:0009.000A: unknown main item tag 0x0 [ 2252.464008][ T4270] hid-generic 0002:0004:0009.000A: unknown main item tag 0x0 [ 2252.466136][ T4270] hid-generic 0002:0004:0009.000A: unknown main item tag 0x0 [ 2252.468180][ T4270] hid-generic 0002:0004:0009.000A: unknown main item tag 0x0 [ 2252.469973][ T4270] hid-generic 0002:0004:0009.000A: unknown main item tag 0x0 [ 2252.536329][ T4270] hid-generic 0002:0004:0009.000A: hidraw0: HID v0.04 Device [syz0] on syz0 [ 2254.375028][T15627] fido_id[15627]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2258.539617][ C0] vkms_vblank_simulate: vblank timer overrun [ 2292.770551][ T30] audit: type=1400 audit(2292.230:349): avc: denied { setattr } for pid=15887 comm="syz.0.5860" name="" dev="pipefs" ino=45615 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 2302.380620][T15954] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15954 comm=syz.0.5892 [ 2331.667075][ T30] audit: type=1400 audit(2331.130:350): avc: denied { read write } for pid=16153 comm="syz.0.5991" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 2331.678856][ T30] audit: type=1400 audit(2331.140:351): avc: denied { open } for pid=16153 comm="syz.0.5991" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 2335.808842][ T30] audit: type=1400 audit(2335.260:352): avc: denied { mounton } for pid=16182 comm="syz.0.6005" path="/3222/file0" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 [ 2356.821034][T16250] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16250 comm=syz.3.6036 [ 2359.847394][T16272] SELinux: Context system_u:object_r:dhcp_etc_t:s0 is not valid (left unmapped). [ 2365.325612][T16312] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16312 comm=syz.0.6066 [ 2372.984398][T16365] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16365 comm=syz.0.6092 [ 2376.162327][T16393] binder: 16390:16393 ioctl 4018620d 0 returned -22 [ 2376.170057][T16393] binder: 16390:16393 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 2376.244632][T16393] binder: 16393 RLIMIT_NICE not set [ 2376.245610][T16393] binder: 16390:16393 ioctl c0306201 20000280 returned -11 [ 2379.978775][T16431] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16431 comm=syz.3.6125 [ 2403.542840][T11523] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2403.543743][T11523] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2403.544425][T11523] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2403.544687][T11523] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2414.626922][T16647] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=16647 comm=syz.0.6226 [ 2419.494956][T16683] SELinux: syz.3.6244 (16683) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 2441.245268][ T30] audit: type=1400 audit(2440.710:353): avc: denied { bind } for pid=16840 comm="syz.0.6322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2441.257422][ T30] audit: type=1400 audit(2440.720:354): avc: denied { listen } for pid=16840 comm="syz.0.6322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2445.090679][T16879] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16879 comm=syz.0.6341 [ 2452.172311][ T30] audit: type=1400 audit(2451.630:355): avc: denied { setattr } for pid=16912 comm="syz.3.6357" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2464.036914][T17008] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17008 comm=syz.3.6402 [ 2469.195403][T17051] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17051 comm=syz.3.6424 [ 2477.289244][ T30] audit: type=1400 audit(2476.750:356): avc: denied { read } for pid=17118 comm="syz.3.6458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2488.718559][ T30] audit: type=1400 audit(2488.180:357): avc: denied { ioctl } for pid=17183 comm="syz.3.6488" path="socket:[49882]" dev="sockfs" ino=49882 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2509.143269][T17286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17286 comm=syz.0.6535 [ 2514.230544][ T30] audit: type=1400 audit(2513.680:358): avc: denied { map } for pid=17319 comm="syz.0.6552" path="/dev/dri/card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2514.233620][ T30] audit: type=1400 audit(2513.680:359): avc: denied { execute } for pid=17319 comm="syz.0.6552" path="/dev/dri/card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2562.468695][ T30] audit: type=1400 audit(2561.930:360): avc: denied { setattr } for pid=17645 comm="syz.0.6716" name="tty20" dev="devtmpfs" ino=39 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 2567.278802][ T30] audit: type=1400 audit(2566.740:361): avc: denied { create } for pid=17684 comm="syz.0.6732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2567.338302][ T30] audit: type=1400 audit(2566.800:362): avc: denied { setopt } for pid=17684 comm="syz.0.6732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2580.980778][T17783] snd_dummy snd_dummy.0: control 0:0:0:syz1:0 is already present [ 2592.574845][T17820] binder: BINDER_SET_CONTEXT_MGR already set [ 2592.575327][T17820] binder: 17819:17820 ioctl 40046207 0 returned -16 [ 2603.000609][T17907] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1793 sclass=netlink_route_socket pid=17907 comm=syz.3.6835 [ 2622.787327][T18034] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18034 comm=syz.0.6898 [ 2635.845310][T18125] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18125 comm=syz.3.6942 [ 2639.998678][ T30] audit: type=1400 audit(2639.460:363): avc: denied { create } for pid=18162 comm="syz.3.6961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 2640.113273][ T30] audit: type=1400 audit(2639.570:364): avc: denied { write } for pid=18162 comm="syz.3.6961" path="socket:[52614]" dev="sockfs" ino=52614 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 2640.356578][T18167] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18167 comm=syz.0.6963 [ 2647.533585][ T30] audit: type=1400 audit(2646.990:365): avc: denied { audit_write } for pid=18220 comm="syz.0.6989" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2647.538434][ T30] audit: type=1107 audit(2647.000:366): pid=18220 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 2647.579735][ T30] audit: type=1107 audit(2647.040:367): pid=18220 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='TÆ3' [ 2681.928238][T18436] snd_dummy snd_dummy.0: control 0:0:0:syz1:0 is already present [ 2693.833777][T18519] binder: BINDER_SET_CONTEXT_MGR already set [ 2693.844798][T18519] binder: 18517:18519 ioctl 40046207 0 returned -16 [ 2735.980410][T18780] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18780 comm=syz.3.7263 [ 2746.617599][ T30] audit: type=1400 audit(2746.080:368): avc: denied { map } for pid=18858 comm="syz.3.7302" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2753.698049][ T30] audit: type=1400 audit(2753.160:369): avc: denied { mount } for pid=18894 comm="syz.0.7320" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 2753.950969][ T30] audit: type=1400 audit(2753.390:370): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 2757.014927][T18918] netlink: 4 bytes leftover after parsing attributes in process `syz.3.7329'. [ 2764.645308][T18971] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=18971 comm=syz.0.7356 [ 2794.236350][T19173] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19173 comm=syz.3.7454 [ 2813.373768][T19266] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=19266 comm=syz.0.7500 [ 2813.970898][ T30] audit: type=1400 audit(2813.430:371): avc: denied { ioctl } for pid=19267 comm="syz.3.7501" path="socket:[56513]" dev="sockfs" ino=56513 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2815.519465][ T30] audit: type=1400 audit(2814.980:372): avc: denied { write } for pid=19277 comm="syz.0.7507" path="socket:[56527]" dev="sockfs" ino=56527 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2818.052149][ T30] audit: type=1400 audit(2817.510:373): avc: denied { bind } for pid=19294 comm="syz.0.7514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2820.137392][ T30] audit: type=1400 audit(2819.600:374): avc: denied { write } for pid=19306 comm="syz.3.7520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2820.157888][ T30] audit: type=1400 audit(2819.620:375): avc: denied { read } for pid=19306 comm="syz.3.7520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2821.150525][ T30] audit: type=1400 audit(2820.610:376): avc: denied { module_load } for pid=19313 comm="syz.0.7523" path=2F6D656D66643A20C736BE918D183229219A25A2D238D606070EFCFE128F2613AE254054A3B03E5CECA9F951403641108C6E7C202864656C6574656429 dev="hugetlbfs" ino=57590 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=system permissive=1 [ 2821.264564][T19314] Invalid ELF header magic: != ELF [ 2827.136422][T19346] netlink: 'syz.0.7538': attribute type 13 has an invalid length. [ 2891.840759][T19763] netlink: 16 bytes leftover after parsing attributes in process `syz.3.7742'. [ 2931.685847][ T30] audit: type=1400 audit(2931.150:377): avc: denied { ioctl } for pid=19955 comm="syz.0.7835" path="socket:[58710]" dev="sockfs" ino=58710 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2959.506196][ T30] audit: type=1400 audit(2958.970:378): avc: denied { read } for pid=20143 comm="syz.3.7920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2961.819870][T18144] hid_parser_main: 7 callbacks suppressed [ 2961.842136][T18144] hid-generic 0000:0006:0007.000B: unknown main item tag 0x0 [ 2961.842626][T18144] hid-generic 0000:0006:0007.000B: unknown main item tag 0x0 [ 2961.842968][T18144] hid-generic 0000:0006:0007.000B: unknown main item tag 0x0 [ 2961.843175][T18144] hid-generic 0000:0006:0007.000B: unknown main item tag 0x0 [ 2961.843306][T18144] hid-generic 0000:0006:0007.000B: unknown main item tag 0x0 [ 2961.843433][T18144] hid-generic 0000:0006:0007.000B: unknown main item tag 0x0 [ 2961.843558][T18144] hid-generic 0000:0006:0007.000B: unknown main item tag 0x0 [ 2961.843682][T18144] hid-generic 0000:0006:0007.000B: unknown main item tag 0x0 [ 2961.843806][T18144] hid-generic 0000:0006:0007.000B: unknown main item tag 0x0 [ 2961.843953][T18144] hid-generic 0000:0006:0007.000B: unknown main item tag 0x0 [ 2961.874695][T18144] hid-generic 0000:0006:0007.000B: hidraw0: HID v0.0b Device [syz1] on syz1 [ 2962.699146][T20171] fido_id[20171]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2962.915517][T20179] usb usb1: usbfs: process 20179 (syz.3.7937) did not claim interface 0 before use [ 2980.626618][T20323] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20323 comm=syz.3.8006 [ 2992.040587][ T30] audit: type=1400 audit(2991.500:379): avc: denied { map } for pid=20400 comm="syz.3.8045" path="socket:[60387]" dev="sockfs" ino=60387 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2992.048837][ T30] audit: type=1400 audit(2991.510:380): avc: denied { read } for pid=20400 comm="syz.3.8045" path="socket:[60387]" dev="sockfs" ino=60387 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3036.520174][T20696] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 3036.520174][T20696] The task syz.0.8188 (20696) triggered the difference, watch for misbehavior. [ 3038.537702][T20698] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65498 sclass=netlink_audit_socket pid=20698 comm=syz.3.8189 [ 3041.252343][ T30] audit: type=1400 audit(3040.710:381): avc: denied { write } for pid=20719 comm="syz.3.8200" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3044.226724][ C0] vkms_vblank_simulate: vblank timer overrun [ 3068.265000][T20825] usb usb1: usbfs: process 20825 (syz.0.8250) did not claim interface 0 before use [ 3088.436743][T20952] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8312'. [ 3100.717906][T21063] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21063 comm=syz.0.8366 [ 3123.976461][ T30] audit: type=1400 audit(3123.440:382): avc: denied { ioctl } for pid=21232 comm="syz.0.8450" path="socket:[63782]" dev="sockfs" ino=63782 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3181.564912][T21532] syz_tun: entered allmulticast mode [ 3183.127655][T21548] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21548 comm=syz.0.8601 [ 3186.286744][T21573] lo speed is unknown, defaulting to 1000 [ 3186.299510][T21573] lo speed is unknown, defaulting to 1000 [ 3186.343097][T21573] lo speed is unknown, defaulting to 1000 [ 3186.427716][T21573] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 3186.513399][T21573] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 3186.809888][T21573] lo speed is unknown, defaulting to 1000 [ 3186.866952][T21573] lo speed is unknown, defaulting to 1000 [ 3201.930906][T21664] usb usb1: usbfs: process 21664 (syz.3.8653) did not claim interface 0 before use [ 3221.087208][T21789] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21789 comm=syz.3.8712 [ 3226.803818][T21819] block device autoloading is deprecated and will be removed. [ 3260.002065][T22001] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=22001 comm=syz.0.8815 [ 3260.473190][ T30] audit: type=1400 audit(3259.930:383): avc: denied { read } for pid=22004 comm="syz.0.8817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3264.098202][ T30] audit: type=1400 audit(3263.560:384): avc: denied { ioctl } for pid=22029 comm="syz.3.8830" path="/dev/input/mice" dev="devtmpfs" ino=705 ioctlcmd=0x937b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 3283.466346][T22164] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22164 comm=syz.0.8895 [ 3310.965700][T22314] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22314 comm=syz.0.8969 [ 3310.988565][T22314] netlink: 'syz.0.8969': attribute type 16 has an invalid length. [ 3311.025046][T22314] netlink: 64130 bytes leftover after parsing attributes in process `syz.0.8969'. [ 3312.615178][T22320] binfmt_misc: register: failed to install interpreter file ./bus [ 3321.023863][ T30] audit: type=1400 audit(3320.470:385): avc: denied { checkpoint_restore } for pid=22370 comm="syz.0.8996" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3351.738001][ T30] audit: type=1400 audit(3351.190:386): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3351.747051][ T30] audit: type=1400 audit(3351.210:387): avc: denied { open } for pid=3318 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3351.747924][ T30] audit: type=1400 audit(3351.210:388): avc: denied { ioctl } for pid=3318 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1640 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3352.449265][ T30] audit: type=1400 audit(3351.900:389): avc: denied { read write } for pid=22557 comm="syz.0.9087" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 3352.480448][ T30] audit: type=1400 audit(3351.940:390): avc: denied { open } for pid=22557 comm="syz.0.9087" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 3353.553757][ T30] audit: type=1400 audit(3353.000:391): avc: denied { create } for pid=22561 comm="syz.0.9089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3353.620830][ T30] audit: type=1400 audit(3353.080:392): avc: denied { ioctl } for pid=22561 comm="syz.0.9089" path="socket:[67941]" dev="sockfs" ino=67941 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3357.728705][ T30] audit: type=1400 audit(3357.180:393): avc: denied { create } for pid=22575 comm="syz.0.9097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3357.755231][ T30] audit: type=1400 audit(3357.210:394): avc: denied { bind } for pid=22575 comm="syz.0.9097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3357.767749][ T30] audit: type=1400 audit(3357.230:395): avc: denied { setopt } for pid=22575 comm="syz.0.9097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3359.767618][ T30] audit: type=1400 audit(3359.230:396): avc: denied { create } for pid=22589 comm="syz.0.9103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3359.817597][ T30] audit: type=1400 audit(3359.280:397): avc: denied { setopt } for pid=22589 comm="syz.0.9103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3364.714612][ T30] audit: type=1400 audit(3364.170:398): avc: denied { read } for pid=22610 comm="syz.3.9113" dev="nsfs" ino=4026532616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3364.749971][ T30] audit: type=1400 audit(3364.210:399): avc: denied { open } for pid=22610 comm="syz.3.9113" path="net:[4026532616]" dev="nsfs" ino=4026532616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3364.769425][ T30] audit: type=1400 audit(3364.230:400): avc: denied { create } for pid=22610 comm="syz.3.9113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3364.916034][ T30] audit: type=1400 audit(3364.380:401): avc: denied { write } for pid=22610 comm="syz.3.9113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3366.328039][ T30] audit: type=1400 audit(3365.790:402): avc: denied { create } for pid=22618 comm="syz.0.9117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3366.335156][ T30] audit: type=1400 audit(3365.800:403): avc: denied { lock } for pid=22618 comm="syz.0.9117" path="socket:[67280]" dev="sockfs" ino=67280 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3368.696922][ T30] audit: type=1400 audit(3368.160:404): avc: denied { write } for pid=22630 comm="syz.0.9123" name="arp" dev="proc" ino=4026532648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3374.034974][ T30] audit: type=1400 audit(3373.490:405): avc: denied { module_request } for pid=22658 comm="syz.3.9137" kmod="netdev-syztnl1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3374.685714][ T30] audit: type=1400 audit(3374.150:406): avc: denied { sys_module } for pid=22658 comm="syz.3.9137" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3376.307447][T22673] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22673 comm=syz.0.9143 [ 3377.184760][ T30] audit: type=1400 audit(3376.640:407): avc: denied { read write } for pid=22675 comm="syz.3.9145" name="vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3377.195488][ T30] audit: type=1400 audit(3376.660:408): avc: denied { open } for pid=22675 comm="syz.3.9145" path="/dev/vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3377.215112][ T30] audit: type=1400 audit(3376.680:409): avc: denied { ioctl } for pid=22675 comm="syz.3.9145" path="/dev/vhost-net" dev="devtmpfs" ino=714 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3380.562466][ T30] audit: type=1400 audit(3380.020:410): avc: denied { create } for pid=22693 comm="syz.3.9153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3385.726136][ T30] audit: type=1400 audit(3385.190:411): avc: denied { create } for pid=22718 comm="syz.3.9165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3385.822448][ T30] audit: type=1400 audit(3385.280:412): avc: denied { setopt } for pid=22718 comm="syz.3.9165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3390.737178][ T30] audit: type=1400 audit(3390.200:413): avc: denied { mount } for pid=22747 comm="syz.3.9179" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 3391.559273][ T30] audit: type=1400 audit(3391.020:414): avc: denied { prog_load } for pid=22753 comm="syz.0.9183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3391.570050][ T30] audit: type=1400 audit(3391.020:415): avc: denied { bpf } for pid=22753 comm="syz.0.9183" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3391.570595][ T30] audit: type=1400 audit(3391.030:416): avc: denied { perfmon } for pid=22753 comm="syz.0.9183" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3393.376511][ T30] audit: type=1400 audit(3392.840:417): avc: denied { create } for pid=22762 comm="syz.3.9187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3393.454619][ T30] audit: type=1400 audit(3392.900:418): avc: denied { write } for pid=22762 comm="syz.3.9187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3393.597847][ T30] audit: type=1400 audit(3393.060:419): avc: denied { read } for pid=22765 comm="syz.0.9188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3394.490253][ T30] audit: type=1400 audit(3393.950:420): avc: denied { create } for pid=22771 comm="syz.0.9191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3394.534004][ T30] audit: type=1400 audit(3393.980:421): avc: denied { setopt } for pid=22771 comm="syz.0.9191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3394.549333][ T30] audit: type=1400 audit(3394.000:422): avc: denied { write } for pid=22771 comm="syz.0.9191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3401.013882][ T30] audit: type=1400 audit(3400.470:423): avc: denied { read } for pid=22807 comm="syz.3.9208" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3401.024858][ T30] audit: type=1400 audit(3400.470:424): avc: denied { open } for pid=22807 comm="syz.3.9208" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3402.310120][ T30] audit: type=1400 audit(3401.770:425): avc: denied { create } for pid=22816 comm="syz.3.9213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3402.454333][ T30] audit: type=1400 audit(3401.910:426): avc: denied { write } for pid=22816 comm="syz.3.9213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3405.357385][ T30] audit: type=1400 audit(3404.820:427): avc: denied { read } for pid=22838 comm="syz.0.9223" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3405.358383][ T30] audit: type=1400 audit(3404.820:428): avc: denied { open } for pid=22838 comm="syz.0.9223" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3405.389059][ T30] audit: type=1400 audit(3404.850:429): avc: denied { ioctl } for pid=22838 comm="syz.0.9223" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64bd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3407.436507][ C0] vkms_vblank_simulate: vblank timer overrun [ 3412.754126][ T30] audit: type=1400 audit(3412.190:430): avc: denied { setattr } for pid=3318 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 3431.176865][ T30] audit: type=1400 audit(3430.640:431): avc: denied { read } for pid=22935 comm="syz.3.9271" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3431.178749][ T30] audit: type=1400 audit(3430.640:432): avc: denied { open } for pid=22935 comm="syz.3.9271" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3431.215788][ T30] audit: type=1400 audit(3430.680:433): avc: denied { ioctl } for pid=22935 comm="syz.3.9271" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3433.512892][ T30] audit: type=1400 audit(3432.960:434): avc: denied { search } for pid=22941 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3433.513484][ T30] audit: type=1400 audit(3432.960:435): avc: denied { search } for pid=22941 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=587 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3433.513941][ T30] audit: type=1400 audit(3432.970:436): avc: denied { search } for pid=22941 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=735 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3433.514220][ T30] audit: type=1400 audit(3432.970:437): avc: denied { search } for pid=22941 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=736 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3433.574320][ T30] audit: type=1400 audit(3433.040:438): avc: denied { read open } for pid=22944 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=736 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3433.582335][ T30] audit: type=1400 audit(3433.040:439): avc: denied { getattr } for pid=22944 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=736 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3433.772565][ T30] audit: type=1400 audit(3433.230:440): avc: denied { add_name } for pid=22941 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3446.489921][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 3446.490748][ T30] audit: type=1400 audit(3445.950:448): avc: denied { allowed } for pid=22985 comm="syz.3.9293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3446.523978][ T30] audit: type=1400 audit(3445.980:449): avc: denied { create } for pid=22985 comm="syz.3.9293" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3459.309730][ T30] audit: type=1400 audit(3458.770:450): avc: denied { execute } for pid=23018 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3459.337285][ T30] audit: type=1400 audit(3458.790:451): avc: denied { execute_no_trans } for pid=23018 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3459.384850][ T30] audit: type=1400 audit(3458.840:452): avc: denied { execmem } for pid=23018 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3459.433556][ T30] audit: type=1400 audit(3458.890:453): avc: denied { mounton } for pid=23019 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 3463.103092][ T30] audit: type=1400 audit(3462.560:454): avc: denied { read } for pid=3163 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 3463.546993][ T30] audit: type=1400 audit(3463.000:455): avc: denied { write } for pid=23033 comm="syz.3.9313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3466.983649][T11523] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3467.073580][T11523] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3467.106843][T11523] bond0 (unregistering): Released all slaves [ 3467.752086][T11523] hsr_slave_0: left promiscuous mode [ 3467.792451][T11523] hsr_slave_1: left promiscuous mode [ 3477.396606][ T30] audit: type=1400 audit(3476.860:456): avc: denied { read } for pid=23075 comm="syz.3.9327" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3477.437511][ T30] audit: type=1400 audit(3476.890:457): avc: denied { open } for pid=23075 comm="syz.3.9327" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3477.525057][ T30] audit: type=1400 audit(3476.990:458): avc: denied { ioctl } for pid=23075 comm="syz.3.9327" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3487.618135][ T30] audit: type=1400 audit(3487.080:459): avc: denied { map_create } for pid=23107 comm="syz.3.9333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3487.624384][ T30] audit: type=1400 audit(3487.080:460): avc: denied { map_read map_write } for pid=23107 comm="syz.3.9333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3489.429719][T23019] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3489.496505][T23019] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3496.908895][T23019] hsr_slave_0: entered promiscuous mode [ 3496.920825][T23019] hsr_slave_1: entered promiscuous mode [ 3496.936977][T23019] debugfs: 'hsr0' already exists in 'hsr' [ 3496.937656][T23019] Cannot create hsr debugfs directory [ 3499.250859][ T30] audit: type=1400 audit(3498.710:461): avc: denied { read } for pid=23155 comm="syz.3.9345" name="vsock" dev="devtmpfs" ino=746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3499.254788][ T30] audit: type=1400 audit(3498.710:462): avc: denied { open } for pid=23155 comm="syz.3.9345" path="/dev/vsock" dev="devtmpfs" ino=746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3500.122094][T23019] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 3500.216454][T23019] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 3500.305635][T23019] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 3500.469144][T23019] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 3505.293790][ T30] audit: type=1400 audit(3504.730:463): avc: denied { create } for pid=23184 comm="syz.3.9351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3505.335851][ T30] audit: type=1400 audit(3504.780:464): avc: denied { setopt } for pid=23184 comm="syz.3.9351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3507.385162][T23019] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3512.037565][ T30] audit: type=1400 audit(3511.500:465): avc: denied { read } for pid=23204 comm="syz.3.9356" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 3512.087196][ T30] audit: type=1400 audit(3511.500:466): avc: denied { open } for pid=23204 comm="syz.3.9356" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 3512.153286][ T30] audit: type=1400 audit(3511.610:467): avc: denied { ioctl } for pid=23204 comm="syz.3.9356" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0xaa04 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 3525.385177][ T30] audit: type=1400 audit(3524.850:468): avc: denied { read } for pid=23265 comm="syz.3.9370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3526.085026][ T30] audit: type=1400 audit(3525.550:469): avc: denied { shutdown } for pid=23265 comm="syz.3.9370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3534.763636][T23019] veth0_vlan: entered promiscuous mode [ 3534.902915][T23019] veth1_vlan: entered promiscuous mode [ 3535.860875][T23019] veth0_macvtap: entered promiscuous mode [ 3536.040660][T23019] veth1_macvtap: entered promiscuous mode [ 3536.193273][ T30] audit: type=1400 audit(3535.660:470): avc: denied { bind } for pid=23307 comm="syz.3.9380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3536.823103][ T999] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3536.825953][ T999] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3536.850985][ T999] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3536.906595][T16544] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3538.188038][ T30] audit: type=1400 audit(3537.650:471): avc: denied { mounton } for pid=23019 comm="syz-executor" path="/syzkaller.cTiKIS/syz-tmp" dev="vda" ino=1880 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 3538.214943][ T30] audit: type=1400 audit(3537.680:472): avc: denied { mount } for pid=23019 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3538.238500][ T30] audit: type=1400 audit(3537.700:473): avc: denied { mounton } for pid=23019 comm="syz-executor" path="/syzkaller.cTiKIS/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3538.266410][ T30] audit: type=1400 audit(3537.730:474): avc: denied { mount } for pid=23019 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3538.306992][ T30] audit: type=1400 audit(3537.770:475): avc: denied { mounton } for pid=23019 comm="syz-executor" path="/syzkaller.cTiKIS/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 3538.336697][ T30] audit: type=1400 audit(3537.780:476): avc: denied { mounton } for pid=23019 comm="syz-executor" path="/syzkaller.cTiKIS/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=70697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 3538.493103][ T30] audit: type=1400 audit(3537.950:477): avc: denied { unmount } for pid=23019 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 3538.605307][ T30] audit: type=1400 audit(3538.030:478): avc: denied { mounton } for pid=23019 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 3538.660919][ T30] audit: type=1400 audit(3538.120:479): avc: denied { mount } for pid=23019 comm="syz-executor" name="/" dev="gadgetfs" ino=4171 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 3549.824809][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 3549.828682][ T30] audit: type=1400 audit(3549.280:484): avc: denied { ioctl } for pid=23353 comm="syz.4.9398" path="socket:[70776]" dev="sockfs" ino=70776 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3559.464874][ T30] audit: type=1400 audit(3558.930:485): avc: denied { read } for pid=23403 comm="syz.4.9423" path="socket:[70867]" dev="sockfs" ino=70867 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3561.315904][ T30] audit: type=1400 audit(3560.770:486): avc: denied { write } for pid=23414 comm="syz.4.9428" name="userio" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3561.469540][T23415] misc userio: Can't change port type on an already running userio instance [ 3561.890914][ T30] audit: type=1400 audit(3561.350:487): avc: denied { watch watch_reads } for pid=23418 comm="syz.4.9429" path="pipe:[69785]" dev="pipefs" ino=69785 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 3566.667187][ T30] audit: type=1400 audit(3566.120:488): avc: denied { create } for pid=23446 comm="syz.4.9443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3566.695901][ T30] audit: type=1400 audit(3566.160:489): avc: denied { bind } for pid=23446 comm="syz.4.9443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3566.772299][ T30] audit: type=1400 audit(3566.220:490): avc: denied { accept } for pid=23446 comm="syz.4.9443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3566.789801][ T30] audit: type=1400 audit(3566.250:491): avc: denied { write } for pid=23446 comm="syz.4.9443" path="socket:[70425]" dev="sockfs" ino=70425 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3571.297942][ T30] audit: type=1400 audit(3570.760:492): avc: denied { node_bind } for pid=23471 comm="syz.4.9455" saddr=255.255.255.255 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3573.129661][ T30] audit: type=1400 audit(3572.590:493): avc: denied { name_bind } for pid=23477 comm="syz.3.9458" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 3575.478167][ T30] audit: type=1400 audit(3574.940:494): avc: denied { execute } for pid=23491 comm="syz.3.9464" path="/2016/bus" dev="tmpfs" ino=10349 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3576.955642][ T30] audit: type=1400 audit(3576.420:495): avc: denied { ioctl } for pid=23503 comm="syz.4.9471" path="socket:[70509]" dev="sockfs" ino=70509 ioctlcmd=0x89b0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3577.533261][ T30] audit: type=1400 audit(3576.990:496): avc: denied { block_suspend } for pid=23506 comm="syz.4.9473" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3585.783909][T23545] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=23545 comm=syz.4.9491 [ 3592.532511][ T30] audit: type=1400 audit(3591.980:497): avc: denied { ioctl } for pid=23571 comm="syz.3.9504" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=70618 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3596.460791][ T30] audit: type=1400 audit(3595.920:498): avc: denied { connect } for pid=23592 comm="syz.3.9514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3603.868422][T23620] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23620 comm=syz.3.9526 [ 3605.883952][ T30] audit: type=1400 audit(3605.340:499): avc: denied { ioctl } for pid=23628 comm="syz.4.9531" path="socket:[71277]" dev="sockfs" ino=71277 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3608.607043][ T30] audit: type=1400 audit(3608.060:500): avc: denied { write } for pid=23640 comm="syz.3.9537" path="socket:[71749]" dev="sockfs" ino=71749 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3615.322827][ T30] audit: type=1326 audit(3614.750:501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23672 comm="syz.3.9553" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c44 code=0x0 [ 3622.535724][ T30] audit: type=1400 audit(3621.990:502): avc: denied { prog_run } for pid=23702 comm="syz.4.9566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3629.024062][ T30] audit: type=1400 audit(3628.490:503): avc: denied { bind } for pid=23728 comm="syz.3.9578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3629.030299][ T30] audit: type=1400 audit(3628.490:504): avc: denied { node_bind } for pid=23728 comm="syz.3.9578" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 3632.269299][ T30] audit: type=1400 audit(3631.730:505): avc: denied { checkpoint_restore } for pid=23743 comm="syz.4.9587" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3659.118001][ T30] audit: type=1400 audit(3658.580:506): avc: denied { connect } for pid=23851 comm="syz.3.9637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3659.152742][ T30] audit: type=1400 audit(3658.610:507): avc: denied { write } for pid=23851 comm="syz.3.9637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3661.968868][ T30] audit: type=1400 audit(3661.430:508): avc: denied { ioctl } for pid=23857 comm="syz.3.9639" path="socket:[72105]" dev="sockfs" ino=72105 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3665.626378][ T30] audit: type=1400 audit(3665.090:509): avc: denied { read } for pid=23871 comm="syz.3.9644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3673.822194][ T30] audit: type=1400 audit(3673.270:510): avc: denied { connect } for pid=23906 comm="syz.3.9662" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3678.375751][T23933] serio: Serial port ptm0 [ 3682.492631][ T30] audit: type=1400 audit(3681.940:511): avc: denied { read write } for pid=23958 comm="syz.4.9687" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 3682.496442][ T30] audit: type=1400 audit(3681.950:512): avc: denied { open } for pid=23958 comm="syz.4.9687" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 3682.514525][ T30] audit: type=1400 audit(3681.950:513): avc: denied { mounton } for pid=23958 comm="syz.4.9687" path="/180/file0" dev="tmpfs" ino=956 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3682.847055][ T30] audit: type=1400 audit(3682.310:514): avc: denied { unmount } for pid=23019 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3684.298680][ T30] audit: type=1400 audit(3683.760:515): avc: denied { ioctl } for pid=23967 comm="syz.4.9692" path="/dev/dma_heap/system" dev="devtmpfs" ino=674 ioctlcmd=0x1284 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3688.555445][ T30] audit: type=1400 audit(3688.020:516): avc: denied { nlmsg_write } for pid=23988 comm="syz.4.9702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 3691.719654][ T30] audit: type=1400 audit(3691.160:517): avc: denied { mounton } for pid=24001 comm="syz.4.9709" path="/proc/395/cgroup" dev="proc" ino=72941 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 3710.950876][T24084] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24084 comm=syz.3.9748 [ 3712.393946][ T30] audit: type=1400 audit(3711.860:518): avc: denied { mount } for pid=24087 comm="syz.3.9750" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 3726.066254][ T30] audit: type=1400 audit(3725.530:519): avc: denied { getopt } for pid=24145 comm="syz.4.9778" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3736.683003][ T30] audit: type=1400 audit(3736.140:520): avc: denied { append } for pid=24195 comm="syz.4.9803" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 3738.244406][ T30] audit: type=1400 audit(3737.690:521): avc: denied { setopt } for pid=24206 comm="syz.4.9808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3738.293963][ T30] audit: type=1400 audit(3737.760:522): avc: denied { map } for pid=24206 comm="syz.4.9808" path="socket:[73778]" dev="sockfs" ino=73778 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3746.250206][T24249] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24249 comm=syz.4.9829 [ 3769.377642][ T30] audit: type=1400 audit(3768.840:523): avc: denied { write } for pid=24358 comm="syz.3.9884" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3769.749640][T24359] input: syz0 as /devices/virtual/input/input9 [ 3775.108226][ T30] audit: type=1400 audit(3774.570:524): avc: denied { create } for pid=24386 comm="syz.3.9898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3775.398230][ T30] audit: type=1400 audit(3774.860:525): avc: denied { setopt } for pid=24386 comm="syz.3.9898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3775.416626][T24387] syz.3.9898: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 3775.528742][T24387] CPU: 1 UID: 0 PID: 24387 Comm: syz.3.9898 Not tainted syzkaller #0 PREEMPT [ 3775.528937][T24387] Hardware name: linux,dummy-virt (DT) [ 3775.529351][T24387] Call trace: [ 3775.529617][T24387] show_stack+0x18/0x24 (C) [ 3775.529859][T24387] dump_stack_lvl+0xdc/0xf4 [ 3775.529940][T24387] dump_stack+0x1c/0x28 [ 3775.530024][T24387] warn_alloc+0x1c0/0x308 [ 3775.530077][T24387] __vmalloc_node_range_noprof+0xaa4/0xe60 [ 3775.530125][T24387] vmalloc_user_noprof+0xe4/0x128 [ 3775.530216][T24387] xskq_create+0xd4/0x174 [ 3775.530264][T24387] xsk_setsockopt+0x370/0x624 [ 3775.530306][T24387] do_sock_setsockopt+0x17c/0x354 [ 3775.530386][T24387] __sys_setsockopt+0xcc/0x164 [ 3775.530436][T24387] __arm64_sys_setsockopt+0xa4/0x100 [ 3775.530479][T24387] invoke_syscall+0x6c/0x258 [ 3775.530522][T24387] el0_svc_common.constprop.0+0xac/0x230 [ 3775.530599][T24387] do_el0_svc_compat+0x40/0x68 [ 3775.530645][T24387] el0_svc_compat+0x4c/0x184 [ 3775.530736][T24387] el0t_32_sync_handler+0x88/0xac [ 3775.530824][T24387] el0t_32_sync+0x19c/0x1a0 [ 3775.720158][T24387] Mem-Info: [ 3775.726895][T24387] active_anon:6730 inactive_anon:0 isolated_anon:0 [ 3775.726895][T24387] active_file:14542 inactive_file:2998 isolated_file:0 [ 3775.726895][T24387] unevictable:768 dirty:8 writeback:0 [ 3775.726895][T24387] slab_reclaimable:7732 slab_unreclaimable:30652 [ 3775.726895][T24387] mapped:2815 shmem:1858 pagetables:1323 [ 3775.726895][T24387] sec_pagetables:0 bounce:0 [ 3775.726895][T24387] kernel_misc_reclaimable:0 [ 3775.726895][T24387] free:190421 free_pcp:4694 free_cma:8000 [ 3775.728158][T24387] Node 0 active_anon:26920kB inactive_anon:0kB active_file:58168kB inactive_file:11992kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:11260kB dirty:32kB writeback:0kB shmem:7432kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:7008kB pagetables:5292kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 3775.728758][T24387] Node 0 DMA free:761684kB boost:0kB min:22528kB low:28160kB high:33792kB reserved_highatomic:0KB free_highatomic:0KB active_anon:26920kB inactive_anon:0kB active_file:58168kB inactive_file:11992kB unevictable:3072kB writepending:32kB present:2097152kB managed:1532220kB mlocked:0kB bounce:0kB free_pcp:18776kB local_pcp:6644kB free_cma:32000kB [ 3775.729568][T24387] lowmem_reserve[]: 0 0 0 0 0 [ 3775.729976][T24387] Node 0 DMA: 21*4kB (UE) 446*8kB (UE) 331*16kB (UE) 153*32kB (UME) 205*64kB (UME) 86*128kB (UM) 83*256kB (UMC) 58*512kB (UME) 49*1024kB (UMC) 16*2048kB (UC) 144*4096kB (UMC) = 761684kB [ 3775.858314][T24387] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3775.858623][T24387] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=32768kB [ 3775.858828][T24387] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3775.859040][T24387] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=64kB [ 3775.859352][T24387] 19394 total pagecache pages [ 3775.859610][T24387] 0 pages in swap cache [ 3775.859862][T24387] Free swap = 124996kB [ 3775.860077][T24387] Total swap = 124996kB [ 3775.860471][T24387] 524288 pages RAM [ 3775.860671][T24387] 0 pages HighMem/MovableOnly [ 3775.860856][T24387] 141233 pages reserved [ 3775.887286][T24387] 8192 pages cma reserved [ 3775.915243][T24387] 1 pages hwpoisoned [ 3780.859854][ T30] audit: type=1400 audit(3780.320:526): avc: denied { ioctl } for pid=24410 comm="syz.3.9907" path="/dev/ptyqa" dev="devtmpfs" ino=121 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 3785.549825][ T30] audit: type=1400 audit(3785.010:527): avc: denied { audit_write } for pid=24432 comm="syz.3.9918" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3796.592539][ T30] audit: type=1400 audit(3796.040:528): avc: denied { mount } for pid=24463 comm="syz.4.9932" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 3803.105218][ T30] audit: type=1400 audit(3802.570:529): avc: denied { execute } for pid=24482 comm="syz.3.9941" path="/selinux/policy" dev="selinuxfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=file permissive=1 [ 3804.565227][T24493] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24493 comm=syz.4.9946 [ 3815.853993][T24544] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3815.859366][T24544] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3819.499131][ T30] audit: type=1400 audit(3818.960:530): avc: denied { ioctl } for pid=24562 comm="syz.4.9978" path="socket:[74521]" dev="sockfs" ino=74521 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3820.078161][ T30] audit: type=1400 audit(3819.540:531): avc: denied { read } for pid=24565 comm="syz.4.9979" name="usbmon1" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3820.080208][ T30] audit: type=1400 audit(3819.540:532): avc: denied { open } for pid=24565 comm="syz.4.9979" path="/dev/usbmon1" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3820.638514][ T30] audit: type=1400 audit(3820.100:533): avc: denied { ioctl } for pid=24565 comm="syz.4.9979" path="/dev/usbmon1" dev="devtmpfs" ino=697 ioctlcmd=0x9203 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3823.039337][ T30] audit: type=1400 audit(3822.500:534): avc: denied { write } for pid=24586 comm="syz.4.9989" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 3823.052917][ T30] audit: type=1400 audit(3822.510:535): avc: denied { name_bind } for pid=24585 comm="syz.3.9987" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3844.167813][T24682] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24682 comm=syz.3.10034 [ 3853.096222][T24713] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24713 comm=syz.4.10049 [ 3859.329188][ T30] audit: type=1400 audit(3858.790:536): avc: denied { write } for pid=24739 comm="syz.4.10062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3868.337475][ T30] audit: type=1400 audit(3867.800:537): avc: denied { name_bind } for pid=24784 comm="syz.4.10085" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 3871.078818][ T30] audit: type=1400 audit(3870.540:538): avc: denied { write } for pid=24801 comm="syz.3.10091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3873.383571][ T30] audit: type=1400 audit(3872.830:539): avc: denied { map } for pid=24815 comm="syz.3.10098" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=75210 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3873.418361][ T30] audit: type=1400 audit(3872.880:540): avc: denied { read write } for pid=24815 comm="syz.3.10098" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=75210 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3875.746275][ T30] audit: type=1400 audit(3875.210:541): avc: denied { bind } for pid=24824 comm="syz.4.10102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3875.791867][ T30] audit: type=1400 audit(3875.240:542): avc: denied { listen } for pid=24824 comm="syz.4.10102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3879.843606][T24837] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=24837 comm=syz.4.10108 [ 3881.583572][T24845] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24845 comm=syz.4.10112 [ 3887.103245][ T30] audit: type=1400 audit(3886.560:543): avc: denied { create } for pid=24858 comm="syz.4.10119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3907.528007][ T30] audit: type=1400 audit(3906.990:544): avc: denied { set_context_mgr } for pid=24928 comm="syz.4.10154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 3907.559660][T24930] binder: BINDER_SET_CONTEXT_MGR already set [ 3907.594158][T24930] binder: 24928:24930 ioctl 4018620d 200002c0 returned -16 [ 3909.304506][ T30] audit: type=1400 audit(3908.740:545): avc: denied { mount } for pid=24931 comm="syz.3.10155" name="/" dev="configfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 3909.438403][ T30] audit: type=1400 audit(3908.900:546): avc: denied { search } for pid=24931 comm="syz.3.10155" name="/" dev="configfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 3909.572968][ T30] audit: type=1400 audit(3909.030:547): avc: denied { setattr } for pid=24931 comm="syz.3.10155" name="/" dev="configfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 3922.178300][T24967] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24967 comm=syz.3.10171 [ 3942.416143][T25063] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10217'. [ 3947.607256][T25083] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25083 comm=syz.4.10227 [ 3954.988144][ T30] audit: type=1400 audit(3954.430:548): avc: denied { unmount } for pid=23019 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3974.727530][ T30] audit: type=1400 audit(3974.190:549): avc: denied { create } for pid=25209 comm="syz.3.10291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3974.763706][T25217] netlink: 36 bytes leftover after parsing attributes in process `syz.3.10291'. [ 3974.768468][ T30] audit: type=1400 audit(3974.230:550): avc: denied { write } for pid=25209 comm="syz.3.10291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3980.344691][ T30] audit: type=1400 audit(3979.800:551): avc: denied { write } for pid=25240 comm="syz.4.10301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3980.355562][T25241] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1025 sclass=netlink_xfrm_socket pid=25241 comm=syz.4.10301 [ 3997.204715][T25326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1549 sclass=netlink_route_socket pid=25326 comm=syz.4.10343 [ 4001.259442][ T30] audit: type=1400 audit(4000.710:552): avc: denied { create } for pid=25350 comm="syz.4.10356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 4001.351986][ T30] audit: type=1400 audit(4000.810:553): avc: denied { write } for pid=25350 comm="syz.4.10356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 4016.647039][ T30] audit: type=1400 audit(4016.110:554): avc: denied { bind } for pid=25429 comm="syz.4.10393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4016.712750][ T30] audit: type=1400 audit(4016.170:555): avc: denied { read } for pid=25429 comm="syz.4.10393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4051.875219][T25555] 4¥: renamed from wg0 (while UP) [ 4059.490490][ T30] audit: type=1400 audit(4058.950:556): avc: denied { execute } for pid=25577 comm="syz.4.10464" path="/dev/audio1" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 4059.599060][ T30] audit: type=1400 audit(4059.050:557): avc: denied { map } for pid=25578 comm="syz.3.10463" path="socket:[78336]" dev="sockfs" ino=78336 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 4067.568584][ T30] audit: type=1400 audit(4067.030:558): avc: denied { create } for pid=25603 comm="syz.4.10476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4067.664320][ T30] audit: type=1400 audit(4067.120:559): avc: denied { connect } for pid=25603 comm="syz.4.10476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4077.795453][T25636] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4077.967818][T25636] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4082.392897][ T30] audit: type=1400 audit(4081.800:560): avc: denied { create } for pid=25644 comm="syz.3.10495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4082.440349][ T30] audit: type=1400 audit(4081.900:561): avc: denied { bind } for pid=25644 comm="syz.3.10495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4082.546682][ T30] audit: type=1400 audit(4082.010:562): avc: denied { write } for pid=25647 comm="syz.4.10497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4084.436427][T25658] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25658 comm=syz.3.10501 [ 4087.176058][ T30] audit: type=1400 audit(4086.640:563): avc: denied { connect } for pid=25671 comm="syz.4.10508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4087.233285][ T30] audit: type=1400 audit(4086.690:564): avc: denied { listen } for pid=25671 comm="syz.4.10508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4087.282622][ T30] audit: type=1400 audit(4086.700:565): avc: denied { accept } for pid=25671 comm="syz.4.10508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4110.533502][T25776] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4110.547609][T25776] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4125.584127][ T30] audit: type=1400 audit(4125.040:566): avc: denied { lock } for pid=25848 comm="syz.3.10595" path="socket:[78986]" dev="sockfs" ino=78986 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 4150.907943][T25964] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25964 comm=syz.3.10651 [ 4161.592002][ T30] audit: type=1400 audit(4161.050:567): avc: denied { getopt } for pid=26014 comm="syz.3.10676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4181.004576][ T30] audit: type=1400 audit(4180.470:568): avc: denied { read } for pid=26076 comm="syz.4.10705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 4182.462847][ T30] audit: type=1400 audit(4181.910:569): avc: denied { ioctl } for pid=26079 comm="syz.4.10707" path="net:[4026532738]" dev="nsfs" ino=4026532738 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4195.897349][T26123] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26123 comm=syz.3.10726 [ 4203.524219][T26144] ptrace attach of "/syz-executor exec"[13458] was attempted by "/syz-executor exec"[26144] [ 4206.257530][T26156] misc userio: Begin command sent, but we're already running [ 4223.695134][ T30] audit: type=1400 audit(4223.150:570): avc: denied { name_bind } for pid=26216 comm="syz.3.10773" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 4228.612501][ T30] audit: type=1400 audit(4228.070:571): avc: denied { connect } for pid=26240 comm="syz.4.10785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4234.312549][ T30] audit: type=1400 audit(4233.770:572): avc: denied { read } for pid=26271 comm="syz.4.10801" path="socket:[79708]" dev="sockfs" ino=79708 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4237.395592][ T30] audit: type=1400 audit(4236.860:573): avc: denied { write } for pid=26288 comm="syz.4.10809" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 4241.196788][T26302] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26302 comm=syz.4.10815 [ 4241.679766][T26304] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26304 comm=syz.3.10816 [ 4260.442489][ T30] audit: type=1400 audit(4259.900:574): avc: denied { lock } for pid=26369 comm="syz.3.10848" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 4270.503396][T26403] SELinux: syz.3.10863 (26403) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 4272.525681][T26408] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26408 comm=syz.4.10866 [ 4274.672143][ T30] audit: type=1400 audit(4274.130:575): avc: denied { ioctl } for pid=26411 comm="syz.4.10868" path="socket:[80973]" dev="sockfs" ino=80973 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4274.700339][ T30] audit: type=1400 audit(4274.160:576): avc: denied { setopt } for pid=26411 comm="syz.4.10868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4283.519417][ T30] audit: type=1400 audit(4282.980:577): avc: denied { read write } for pid=26433 comm="syz.3.10879" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 4283.592896][ T30] audit: type=1400 audit(4283.030:578): avc: denied { open } for pid=26433 comm="syz.3.10879" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 4283.740091][ T30] audit: type=1400 audit(4283.200:579): avc: denied { mounton } for pid=26434 comm="syz.4.10880" path="/906/file0" dev="loop0" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 4283.740333][T26435] loop0: Can't mount, would change RO state [ 4285.084713][T26439] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=18 sclass=netlink_audit_socket pid=26439 comm=syz.4.10881 [ 4301.425166][ T30] audit: type=1400 audit(4300.880:580): avc: denied { remount } for pid=26492 comm="syz.3.10907" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4304.383297][ T30] audit: type=1400 audit(4303.840:581): avc: denied { bind } for pid=26505 comm="syz.3.10914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4310.847824][ T30] audit: type=1400 audit(4310.310:582): avc: denied { compute_member } for pid=26531 comm="syz.4.10927" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 4323.460623][ T30] audit: type=1400 audit(4322.920:583): avc: denied { mount } for pid=26591 comm="syz.4.10957" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 4326.298990][T26612] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26612 comm=syz.4.10965 [ 4333.756830][T26652] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26652 comm=syz.4.10985 [ 4337.745534][T26666] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26666 comm=syz.3.10991 [ 4353.616675][ T30] audit: type=1400 audit(4353.080:584): avc: denied { create } for pid=26744 comm="syz.3.11029" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4353.677596][ T30] audit: type=1400 audit(4353.140:585): avc: denied { read } for pid=26744 comm="syz.3.11029" name="file2" dev="tmpfs" ino=13636 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4353.716693][ T30] audit: type=1400 audit(4353.170:586): avc: denied { open } for pid=26744 comm="syz.3.11029" path="/2646/file2" dev="tmpfs" ino=13636 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4353.747742][ T30] audit: type=1400 audit(4353.210:587): avc: denied { ioctl } for pid=26744 comm="syz.3.11029" path="/2646/file2" dev="tmpfs" ino=13636 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4353.830908][T26745] loop6: detected capacity change from 0 to 524288000 [ 4354.259623][ T30] audit: type=1400 audit(4353.690:588): avc: denied { unlink } for pid=13458 comm="syz-executor" name="file2" dev="tmpfs" ino=13636 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4371.707128][ T30] audit: type=1400 audit(4371.170:589): avc: denied { create } for pid=26796 comm="syz.3.11053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4398.862030][ T30] audit: type=1400 audit(4398.310:590): avc: denied { unlink } for pid=23019 comm="syz-executor" name=131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 dev="tmpfs" ino=5416 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 4427.774050][T27006] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=273 sclass=netlink_tcpdiag_socket pid=27006 comm=syz.4.11158 [ 4436.813547][ T30] audit: type=1400 audit(4436.260:591): avc: denied { name_bind } for pid=27036 comm="syz.4.11173" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 4469.894026][ T30] audit: type=1400 audit(4469.350:592): avc: denied { mount } for pid=27167 comm="syz.4.11236" name="/" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 4472.916800][T27182] netlink: 32 bytes leftover after parsing attributes in process `syz.4.11243'. [ 4472.926640][T27182] netlink: 16 bytes leftover after parsing attributes in process `syz.4.11243'. [ 4490.023828][ T30] audit: type=1400 audit(4489.470:593): avc: denied { watch watch_reads } for pid=27254 comm="syz.3.11278" path="/2729" dev="tmpfs" ino=14075 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 4539.762504][ T30] audit: type=1400 audit(2000000042.678:594): avc: denied { mount } for pid=27512 comm="syz.4.11401" name="/" dev="hugetlbfs" ino=83914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 4542.270586][T27529] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44 sclass=netlink_audit_socket pid=27529 comm=syz.4.11409 [ 4555.447995][ T30] audit: type=1400 audit(2000000058.368:595): avc: denied { unmount } for pid=23019 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 4561.645802][ T30] audit: type=1400 audit(2000000064.528:596): avc: denied { write } for pid=27621 comm="syz.3.11454" path="socket:[86040]" dev="sockfs" ino=86040 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4563.786532][T27634] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=27634 comm=syz.4.11459 [ 4574.303861][ T30] audit: type=1400 audit(2134217805.214:597): avc: denied { getopt } for pid=27682 comm="syz.4.11484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4585.413502][T27740] syz.4.11512(27740): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 4625.421785][ T30] audit: type=1400 audit(2134217856.334:598): avc: denied { getopt } for pid=27942 comm="syz.3.11610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4627.513985][T27956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27956 comm=syz.4.11617 [ 4633.494232][ T30] audit: type=1400 audit(2134217864.414:599): avc: denied { read } for pid=27984 comm="syz.4.11631" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 4633.497709][ T30] audit: type=1400 audit(2134217864.414:600): avc: denied { open } for pid=27984 comm="syz.4.11631" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 4633.582140][ T30] audit: type=1400 audit(2134217864.484:601): avc: denied { ioctl } for pid=27984 comm="syz.4.11631" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9375 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 4666.777673][ T30] audit: type=1400 audit(2134217897.694:602): avc: denied { read } for pid=28169 comm="syz.4.11721" path="socket:[87095]" dev="sockfs" ino=87095 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4668.103119][ T30] audit: type=1400 audit(2134217899.014:603): avc: denied { remount } for pid=28178 comm="syz.4.11725" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 4670.275450][T28188] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28188 comm=syz.4.11728 [ 4712.264392][T28416] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28416 comm=syz.4.11840 [ 4714.254842][T26447] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4714.497886][T26447] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4714.720235][T26447] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4715.138490][T26447] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4718.583244][ T30] audit: type=1400 audit(2134217949.484:604): avc: denied { nlmsg_tty_audit } for pid=28438 comm="syz.3.11852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 4720.225918][T26447] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4720.333028][T26447] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4720.424826][T26447] bond0 (unregistering): Released all slaves [ 4721.330648][T26447] hsr_slave_0: left promiscuous mode [ 4721.381993][T26447] hsr_slave_1: left promiscuous mode [ 4721.616360][T26447] veth1_macvtap: left promiscuous mode [ 4721.617444][T26447] veth0_macvtap: left promiscuous mode [ 4721.619512][T26447] veth1_vlan: left promiscuous mode [ 4721.620140][T26447] veth0_vlan: left promiscuous mode [ 4744.056800][T28427] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 4744.189147][T28427] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 4750.590071][T28543] nbd0: detected capacity change from 0 to 127 [ 4750.632533][ T894] block nbd0: Receive control failed (result -32) [ 4750.647947][ T49] block nbd0: Receive control failed (result -32) [ 4750.834953][T28548] [ 4750.837326][T28548] ====================================================== [ 4750.837669][T28548] WARNING: possible circular locking dependency detected [ 4750.838022][T28548] syzkaller #0 Not tainted [ 4750.838408][T28548] ------------------------------------------------------ [ 4750.839001][T28548] udevd/28548 is trying to acquire lock: [ 4750.839424][T28548] ffff00001ced8e70 (&nsock->tx_lock){+.+.}-{4:4}, at: nbd_queue_rq+0x2cc/0xb54 [ 4750.841660][T28548] [ 4750.841660][T28548] but task is already holding lock: [ 4750.842465][T28548] ffff000040dce178 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 4750.843132][T28548] [ 4750.843132][T28548] which lock already depends on the new lock. [ 4750.843132][T28548] [ 4750.843609][T28548] [ 4750.843609][T28548] the existing dependency chain (in reverse order) is: [ 4750.844040][T28548] [ 4750.844040][T28548] -> #6 (&cmd->lock){+.+.}-{4:4}: [ 4750.844801][T28548] __mutex_lock+0x144/0xffc [ 4750.845166][T28548] mutex_lock_nested+0x24/0x30 [ 4750.845484][T28548] nbd_queue_rq+0xa8/0xb54 [ 4750.845812][T28548] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 4750.846162][T28548] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 4750.846541][T28548] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 4750.846909][T28548] blk_mq_run_hw_queue+0x1e4/0x500 [ 4750.847251][T28548] blk_mq_dispatch_list+0x348/0xa50 [ 4750.847606][T28548] blk_mq_flush_plug_list+0xe8/0x508 [ 4750.847947][T28548] __blk_flush_plug+0x208/0x3b8 [ 4750.848310][T28548] __submit_bio+0x3a4/0x4ac [ 4750.848620][T28548] submit_bio_noacct_nocheck+0x59c/0xa8c [ 4750.848934][T28548] submit_bio_noacct+0x858/0x18f8 [ 4750.849255][T28548] submit_bio+0x32c/0x5f0 [ 4750.849568][T28548] submit_bh_wbc+0x310/0x480 [ 4750.849909][T28548] block_read_full_folio+0x26c/0x640 [ 4750.850276][T28548] blkdev_read_folio+0x1c/0x28 [ 4750.850621][T28548] filemap_read_folio+0xac/0x1fc [ 4750.850953][T28548] do_read_cache_folio+0x1c4/0x480 [ 4750.851451][T28548] read_cache_folio+0x44/0x6c [ 4750.851887][T28548] read_part_sector+0xac/0x5f4 [ 4750.852239][T28548] read_lba+0x15c/0x2ec [ 4750.852536][T28548] efi_partition+0x1dc/0x2154 [ 4750.852845][T28548] bdev_disk_changed+0x508/0xf0c [ 4750.853160][T28548] blkdev_get_whole+0x144/0x1e4 [ 4750.853480][T28548] bdev_open+0x1dc/0xa84 [ 4750.853771][T28548] blkdev_open+0x270/0x3dc [ 4750.854070][T28548] do_dentry_open+0x6a4/0x103c [ 4750.854397][T28548] vfs_open+0x5c/0x2fc [ 4750.854696][T28548] path_openat+0x1490/0x24b4 [ 4750.855010][T28548] do_filp_open+0x184/0x360 [ 4750.855328][T28548] do_sys_openat2+0xe0/0x160 [ 4750.855624][T28548] __arm64_sys_openat+0x12c/0x1bc [ 4750.855955][T28548] invoke_syscall+0x6c/0x258 [ 4750.856291][T28548] el0_svc_common.constprop.0+0xac/0x230 [ 4750.856625][T28548] do_el0_svc+0x40/0x58 [ 4750.856900][T28548] el0_svc+0x50/0x1a0 [ 4750.857420][T28548] el0t_64_sync_handler+0xa0/0xe4 [ 4750.858339][T28548] el0t_64_sync+0x198/0x19c [ 4750.858745][T28548] [ 4750.858745][T28548] -> #5 (set->srcu){.+.+}-{0:0}: [ 4750.859423][T28548] __synchronize_srcu+0xa8/0x268 [ 4750.859752][T28548] synchronize_srcu+0x12c/0x370 [ 4750.860169][T28548] blk_mq_quiesce_queue+0xf4/0x15c [ 4750.860506][T28548] elevator_switch+0x11c/0x414 [ 4750.860811][T28548] elevator_change+0x294/0x424 [ 4750.861248][T28548] elevator_set_default+0x22c/0x2ac [ 4750.861589][T28548] blk_register_queue+0x278/0x3ac [ 4750.861914][T28548] __add_disk+0x518/0xb80 [ 4750.862241][T28548] add_disk_fwnode+0x114/0x4c0 [ 4750.862564][T28548] device_add_disk+0x14/0x20 [ 4750.862919][T28548] nbd_dev_add+0x5f0/0x9c0 [ 4750.863248][T28548] nbd_init+0xd4/0x1a8 [ 4750.863626][T28548] do_one_initcall+0x130/0x7f0 [ 4750.863938][T28548] kernel_init_freeable+0x48c/0x70c [ 4750.864366][T28548] kernel_init+0x24/0x1dc [ 4750.864682][T28548] ret_from_fork+0x10/0x20 [ 4750.865032][T28548] [ 4750.865032][T28548] -> #4 (&q->elevator_lock){+.+.}-{4:4}: [ 4750.865684][T28548] __mutex_lock+0x144/0xffc [ 4750.865998][T28548] mutex_lock_nested+0x24/0x30 [ 4750.866334][T28548] elevator_change+0x130/0x424 [ 4750.866658][T28548] elevator_set_none+0x90/0xe4 [ 4750.866982][T28548] __blk_mq_update_nr_hw_queues+0x3b4/0xd38 [ 4750.867346][T28548] blk_mq_update_nr_hw_queues+0x44/0x68 [ 4750.867802][T28548] nbd_start_device+0x128/0xa38 [ 4750.868196][T28548] nbd_genl_connect+0xcb4/0x14c4 [ 4750.868528][T28548] genl_family_rcv_msg_doit+0x1b8/0x280 [ 4750.868876][T28548] genl_rcv_msg+0x3ec/0x5bc [ 4750.869193][T28548] netlink_rcv_skb+0x19c/0x338 [ 4750.869520][T28548] genl_rcv+0x38/0x50 [ 4750.869824][T28548] netlink_unicast+0x424/0x700 [ 4750.870184][T28548] netlink_sendmsg+0x644/0xa54 [ 4750.870616][T28548] __sock_sendmsg+0xc8/0x168 [ 4750.870944][T28548] ____sys_sendmsg+0x500/0x764 [ 4750.871399][T28548] ___sys_sendmsg+0x11c/0x19c [ 4750.871737][T28548] __sys_sendmsg+0x114/0x19c [ 4750.872055][T28548] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 4750.872455][T28548] invoke_syscall+0x6c/0x258 [ 4750.872769][T28548] el0_svc_common.constprop.0+0xac/0x230 [ 4750.873200][T28548] do_el0_svc_compat+0x40/0x68 [ 4750.873519][T28548] el0_svc_compat+0x4c/0x184 [ 4750.873831][T28548] el0t_32_sync_handler+0x88/0xac [ 4750.874191][T28548] el0t_32_sync+0x19c/0x1a0 [ 4750.874509][T28548] [ 4750.874509][T28548] -> #3 (&q->q_usage_counter(io)#33){++++}-{0:0}: [ 4750.875251][T28548] blk_alloc_queue+0x538/0x644 [ 4750.875577][T28548] blk_mq_alloc_queue+0x144/0x220 [ 4750.875899][T28548] __blk_mq_alloc_disk+0x20/0x1a4 [ 4750.876288][T28548] nbd_dev_add+0x3c0/0x9c0 [ 4750.876648][T28548] nbd_init+0xd4/0x1a8 [ 4750.876989][T28548] do_one_initcall+0x130/0x7f0 [ 4750.877324][T28548] kernel_init_freeable+0x48c/0x70c [ 4750.877704][T28548] kernel_init+0x24/0x1dc [ 4750.878030][T28548] ret_from_fork+0x10/0x20 [ 4750.878350][T28548] [ 4750.878350][T28548] -> #2 (fs_reclaim){+.+.}-{0:0}: [ 4750.878931][T28548] fs_reclaim_acquire+0x138/0x160 [ 4750.879279][T28548] kmem_cache_alloc_node_noprof+0x64/0x3b8 [ 4750.879638][T28548] __alloc_skb+0x208/0x2f0 [ 4750.880028][T28548] tcp_stream_alloc_skb+0x2c/0x450 [ 4750.880464][T28548] tcp_sendmsg_locked+0xf34/0x39e8 [ 4750.880799][T28548] tcp_sendmsg+0x38/0x60 [ 4750.881263][T28548] inet_sendmsg+0x90/0xd4 [ 4750.881767][T28548] __sock_sendmsg+0xc8/0x168 [ 4750.882066][T28548] sock_write_iter+0x1cc/0x300 [ 4750.882368][T28548] vfs_write+0x7bc/0xb88 [ 4750.882668][T28548] ksys_write+0x18c/0x1d8 [ 4750.883030][T28548] __arm64_sys_write+0x6c/0x9c [ 4750.883358][T28548] invoke_syscall+0x6c/0x258 [ 4750.883666][T28548] el0_svc_common.constprop.0+0xac/0x230 [ 4750.884012][T28548] do_el0_svc+0x40/0x58 [ 4750.884362][T28548] el0_svc+0x50/0x1a0 [ 4750.884660][T28548] el0t_64_sync_handler+0xa0/0xe4 [ 4750.884996][T28548] el0t_64_sync+0x198/0x19c [ 4750.885365][T28548] [ 4750.885365][T28548] -> #1 (sk_lock-AF_INET){+.+.}-{0:0}: [ 4750.886001][T28548] lock_sock_nested+0x38/0xe8 [ 4750.886372][T28548] inet_shutdown+0x50/0x348 [ 4750.886733][T28548] kernel_sock_shutdown+0x54/0x84 [ 4750.887074][T28548] nbd_mark_nsock_dead+0x100/0x534 [ 4750.887413][T28548] sock_shutdown+0x134/0x234 [ 4750.887723][T28548] nbd_config_put+0x154/0x5b0 [ 4750.888060][T28548] nbd_release+0x7c/0x128 [ 4750.889207][T28548] blkdev_put_whole+0x98/0xf0 [ 4750.890425][T28548] bdev_release+0x2a4/0x510 [ 4750.890759][T28548] blkdev_release+0x14/0x24 [ 4750.891204][T28548] __fput+0x2c8/0x954 [ 4750.891549][T28548] ____fput+0x14/0x20 [ 4750.891900][T28548] task_work_run+0x128/0x210 [ 4750.892286][T28548] do_notify_resume+0x1d8/0x260 [ 4750.892619][T28548] el0_svc_compat+0x104/0x184 [ 4750.893031][T28548] el0t_32_sync_handler+0x88/0xac [ 4750.893378][T28548] el0t_32_sync+0x19c/0x1a0 [ 4750.893691][T28548] [ 4750.893691][T28548] -> #0 (&nsock->tx_lock){+.+.}-{4:4}: [ 4750.894366][T28548] __lock_acquire+0x1638/0x2380 [ 4750.894694][T28548] lock_acquire+0x310/0x38c [ 4750.895027][T28548] __mutex_lock+0x144/0xffc [ 4750.895343][T28548] mutex_lock_nested+0x24/0x30 [ 4750.895659][T28548] nbd_queue_rq+0x2cc/0xb54 [ 4750.895974][T28548] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 4750.896360][T28548] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 4750.896723][T28548] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 4750.897079][T28548] blk_mq_run_hw_queue+0x1e4/0x500 [ 4750.897426][T28548] blk_mq_dispatch_list+0x348/0xa50 [ 4750.897758][T28548] blk_mq_flush_plug_list+0xe8/0x508 [ 4750.898130][T28548] __blk_flush_plug+0x208/0x3b8 [ 4750.898543][T28548] __submit_bio+0x3a4/0x4ac [ 4750.898888][T28548] submit_bio_noacct_nocheck+0x59c/0xa8c [ 4750.899235][T28548] submit_bio_noacct+0x858/0x18f8 [ 4750.899602][T28548] submit_bio+0x32c/0x5f0 [ 4750.899963][T28548] submit_bh_wbc+0x310/0x480 [ 4750.900318][T28548] block_read_full_folio+0x26c/0x640 [ 4750.900655][T28548] blkdev_read_folio+0x1c/0x28 [ 4750.901055][T28548] filemap_read_folio+0xac/0x1fc [ 4750.901981][T28548] do_read_cache_folio+0x1c4/0x480 [ 4750.902503][T28548] read_cache_folio+0x44/0x6c [ 4750.902895][T28548] read_part_sector+0xac/0x5f4 [ 4750.903276][T28548] read_lba+0x15c/0x2ec [ 4750.903664][T28548] efi_partition+0x1dc/0x2154 [ 4750.903997][T28548] bdev_disk_changed+0x508/0xf0c [ 4750.904386][T28548] blkdev_get_whole+0x144/0x1e4 [ 4750.904700][T28548] bdev_open+0x1dc/0xa84 [ 4750.904992][T28548] blkdev_open+0x270/0x3dc [ 4750.905289][T28548] do_dentry_open+0x6a4/0x103c [ 4750.905569][T28548] vfs_open+0x5c/0x2fc [ 4750.905848][T28548] path_openat+0x1490/0x24b4 [ 4750.906193][T28548] do_filp_open+0x184/0x360 [ 4750.906575][T28548] do_sys_openat2+0xe0/0x160 [ 4750.906902][T28548] __arm64_sys_openat+0x12c/0x1bc [ 4750.907227][T28548] invoke_syscall+0x6c/0x258 [ 4750.907559][T28548] el0_svc_common.constprop.0+0xac/0x230 [ 4750.907887][T28548] do_el0_svc+0x40/0x58 [ 4750.908206][T28548] el0_svc+0x50/0x1a0 [ 4750.908488][T28548] el0t_64_sync_handler+0xa0/0xe4 [ 4750.908796][T28548] el0t_64_sync+0x198/0x19c [ 4750.909124][T28548] [ 4750.909124][T28548] other info that might help us debug this: [ 4750.909124][T28548] [ 4750.909683][T28548] Chain exists of: [ 4750.909683][T28548] &nsock->tx_lock --> set->srcu --> &cmd->lock [ 4750.909683][T28548] [ 4750.910634][T28548] Possible unsafe locking scenario: [ 4750.910634][T28548] [ 4750.911152][T28548] CPU0 CPU1 [ 4750.911503][T28548] ---- ---- [ 4750.911806][T28548] lock(&cmd->lock); [ 4750.912238][T28548] lock(set->srcu); [ 4750.912700][T28548] lock(&cmd->lock); [ 4750.913161][T28548] lock(&nsock->tx_lock); [ 4750.913567][T28548] [ 4750.913567][T28548] *** DEADLOCK *** [ 4750.913567][T28548] [ 4750.913998][T28548] 3 locks held by udevd/28548: [ 4750.914346][T28548] #0: ffff000014884358 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0x2c4/0xa84 [ 4750.915102][T28548] #1: ffff00001481f890 (set->srcu){.+.+}-{0:0}, at: blk_mq_run_hw_queue+0x19c/0x500 [ 4750.915798][T28548] #2: ffff000040dce178 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 4750.916515][T28548] [ 4750.916515][T28548] stack backtrace: [ 4750.916879][T28548] CPU: 1 UID: 0 PID: 28548 Comm: udevd Not tainted syzkaller #0 PREEMPT [ 4750.917305][T28548] Hardware name: linux,dummy-virt (DT) [ 4750.917611][T28548] Call trace: [ 4750.917842][T28548] show_stack+0x18/0x24 (C) [ 4750.918158][T28548] dump_stack_lvl+0xa4/0xf4 [ 4750.918471][T28548] dump_stack+0x1c/0x28 [ 4750.918786][T28548] print_circular_bug+0x28c/0x370 [ 4750.919161][T28548] check_noncircular+0x168/0x17c [ 4750.919481][T28548] __lock_acquire+0x1638/0x2380 [ 4750.919797][T28548] lock_acquire+0x310/0x38c [ 4750.920127][T28548] __mutex_lock+0x144/0xffc [ 4750.920430][T28548] mutex_lock_nested+0x24/0x30 [ 4750.920753][T28548] nbd_queue_rq+0x2cc/0xb54 [ 4750.921284][T28548] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 4750.921791][T28548] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 4750.922141][T28548] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 4750.922490][T28548] blk_mq_run_hw_queue+0x1e4/0x500 [ 4750.922838][T28548] blk_mq_dispatch_list+0x348/0xa50 [ 4750.923165][T28548] blk_mq_flush_plug_list+0xe8/0x508 [ 4750.923498][T28548] __blk_flush_plug+0x208/0x3b8 [ 4750.923808][T28548] __submit_bio+0x3a4/0x4ac [ 4750.924133][T28548] submit_bio_noacct_nocheck+0x59c/0xa8c [ 4750.924470][T28548] submit_bio_noacct+0x858/0x18f8 [ 4750.924775][T28548] submit_bio+0x32c/0x5f0 [ 4750.925063][T28548] submit_bh_wbc+0x310/0x480 [ 4750.925367][T28548] block_read_full_folio+0x26c/0x640 [ 4750.925681][T28548] blkdev_read_folio+0x1c/0x28 [ 4750.925983][T28548] filemap_read_folio+0xac/0x1fc [ 4750.926294][T28548] do_read_cache_folio+0x1c4/0x480 [ 4750.926612][T28548] read_cache_folio+0x44/0x6c [ 4750.926921][T28548] read_part_sector+0xac/0x5f4 [ 4750.927241][T28548] read_lba+0x15c/0x2ec [ 4750.927533][T28548] efi_partition+0x1dc/0x2154 [ 4750.927852][T28548] bdev_disk_changed+0x508/0xf0c [ 4750.928256][T28548] blkdev_get_whole+0x144/0x1e4 [ 4750.928602][T28548] bdev_open+0x1dc/0xa84 [ 4750.928908][T28548] blkdev_open+0x270/0x3dc [ 4750.929209][T28548] do_dentry_open+0x6a4/0x103c [ 4750.929527][T28548] vfs_open+0x5c/0x2fc [ 4750.929831][T28548] path_openat+0x1490/0x24b4 [ 4750.930145][T28548] do_filp_open+0x184/0x360 [ 4750.930497][T28548] do_sys_openat2+0xe0/0x160 [ 4750.930865][T28548] __arm64_sys_openat+0x12c/0x1bc [ 4750.931497][T28548] invoke_syscall+0x6c/0x258 [ 4750.931897][T28548] el0_svc_common.constprop.0+0xac/0x230 [ 4750.932260][T28548] do_el0_svc+0x40/0x58 [ 4750.932612][T28548] el0_svc+0x50/0x1a0 [ 4750.932976][T28548] el0t_64_sync_handler+0xa0/0xe4 [ 4750.933444][T28548] el0t_64_sync+0x198/0x19c SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 4750.960261][ T30] audit: type=1400 audit(2134217981.864:605): avc: denied { write } for pid=3313 comm="syz-executor" path="pipe:[2533]" dev="pipefs" ino=2533 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 4750.983747][T28548] block nbd0: Dead connection, failed to find a fallback [ 4750.984176][T28548] block nbd0: shutting down sockets [ 4750.984738][T28548] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4750.985054][T28548] Buffer I/O error on dev nbd0, logical block 0, async page read [ 4750.986337][T28548] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4750.986479][T28548] Buffer I/O error on dev nbd0, logical block 1, async page read [ 4750.986869][T28548] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4750.987073][T28548] Buffer I/O error on dev nbd0, logical block 2, async page read [ 4750.987645][T28548] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4750.987776][T28548] Buffer I/O error on dev nbd0, logical block 3, async page read [ 4750.988582][T28548] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4750.988742][T28548] Buffer I/O error on dev nbd0, logical block 0, async page read [ 4750.989172][T28548] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4750.989303][T28548] Buffer I/O error on dev nbd0, logical block 1, async page read [ 4750.989647][T28548] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4750.989762][T28548] Buffer I/O error on dev nbd0, logical block 2, async page read [ 4750.990238][T28548] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4750.990360][T28548] Buffer I/O error on dev nbd0, logical block 3, async page read [ 4750.990739][T28548] nbd0: unable to read partition table [ 4751.186070][T28548] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4751.186780][T28548] Buffer I/O error on dev nbd0, logical block 0, async page read [ 4751.187709][T28548] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4751.187938][T28548] Buffer I/O error on dev nbd0, logical block 1, async page read [ 4751.286026][T28548] nbd0: unable to read partition table [ 4751.655440][T28548] nbd0: unable to read partition table [ 4751.747119][T28548] nbd0: unable to read partition table [ 4752.035632][T16347] syz_tun (unregistering): left allmulticast mode [ 4752.950100][T22359] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4752.987799][T22359] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4753.038951][T22359] bond0 (unregistering): Released all slaves VM DIAGNOSIS: 11:48:02 Registers: info registers vcpu 0 CPU#0 PC=ffff800080553b28 X00=00000000000060f0 X01=0000000000000000 X02=0000000000000000 X03=dfff800000000000 X04=1ffff00011a36430 X05=0000000000000000 X06=ffff8000809c6f38 X07=fbfbfbfbfbfbfbfb X08=ffff80008000601f X09=0000000000000000 X10=ffff700010000c03 X11=1ffff00010000b9c X12=ffff700010000b9d X13=0000000000000004 X14=0000000000000003 X15=ffff00001cc3b1d1 X16=0000000000000000 X17=1fffe0000254b9e0 X18=1fffe0000398763a X19=ffff800080005da0 X20=000000000000002d X21=ffff0000552e3c80 X22=0000000000000000 X23=ffff00003d244640 X24=1fffe00002d56c00 X25=0000000000000000 X26=0000000000000040 X27=1fffe00007a488e0 X28=000000000000000c X29=ffff8000800061b0 X30=ffff800082790d0c SP=ffff8000800061b0 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=00362e6f732e6362:696c2f343662696c Q02=0000000000000000:ffffffffffffffff Q03=0000000000000000:0000000000000000 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:0000000000c00000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085468f6c X00=00000000000000c0 X01=0000000000000001 X02=0000000000000001 X03=ffff8000803223e0 X04=ffff700010f5a501 X05=ffff800087ad2800 X06=ffff700010f5a500 X07=0000000000000001 X08=ffff800087ad2800 X09=dfff800000000000 X10=ffff700010f5a500 X11=1ffff00010f5a500 X12=ffff700010f5a501 X13=205d383435383254 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=ffff80008d4f787c X19=00000000000000c0 X20=ffff800087ad2800 X21=ffff8000a3815cc0 X22=1fffe00001dc6a5b X23=0000000000000001 X24=1fffe00001dc6a5a X25=ffff00000ee352d0 X26=ffff00000ee352d8 X27=ffff00000ee35080 X28=ffff8000a3815cc0 X29=ffff8000a3815a30 X30=ffff800085468f5c SP=ffff8000a3815a30 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000