last executing test programs: 3m42.851991719s ago: executing program 0 (id=5178): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/firmware/fdt', 0x40140, 0x144) ioctl$TCSETAW(r0, 0x5407, 0x0) 3m42.737156109s ago: executing program 1 (id=5179): r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FIOCLEX(r0, 0x5451) 3m42.419816788s ago: executing program 0 (id=5180): r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r0, 0x5450, 0x0) 3m42.2816312s ago: executing program 1 (id=5181): socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 3m41.965590899s ago: executing program 0 (id=5182): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getpgid(r0) 3m41.901224915s ago: executing program 1 (id=5183): r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$AUTOFS_IOC_FAIL(r0, 0x5451, 0x0) 3m41.519396739s ago: executing program 0 (id=5184): r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x50, 0x0, &(0x7f0000000180)=0x1a) 3m41.484582772s ago: executing program 1 (id=5185): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/profiling', 0x1, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 3m41.204126507s ago: executing program 0 (id=5186): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) read$dsp(r0, 0x0, 0x0) 3m41.082897518s ago: executing program 1 (id=5187): r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read(r0, &(0x7f0000000000)=""/49, 0x31) 3m40.856919849s ago: executing program 1 (id=5188): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) write$rfkill(r0, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) 3m40.856656969s ago: executing program 0 (id=5189): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 2m55.400261389s ago: executing program 32 (id=5189): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 2m55.218300925s ago: executing program 33 (id=5188): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) write$rfkill(r0, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) 1m6.207333501s ago: executing program 2 (id=5365): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000001480)) 1m5.015069847s ago: executing program 2 (id=5368): r0 = syz_open_dev$dmmidi(&(0x7f0000000100), 0x4000000062, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000007000)) 1m4.583354195s ago: executing program 2 (id=5370): r0 = syz_open_dev$vcsa(&(0x7f0000000700), 0x0, 0x440) cachestat(r0, &(0x7f0000000000), &(0x7f0000000040), 0x0) 1m4.152466744s ago: executing program 2 (id=5371): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 1m3.368988104s ago: executing program 2 (id=5373): r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x5460, &(0x7f0000000080)=""/4097) 1m2.678066045s ago: executing program 2 (id=5375): r0 = openat$rfkill(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FIONCLEX(r0, 0x5450) 47.320858021s ago: executing program 3 (id=5416): pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000340)) 47.10132507s ago: executing program 3 (id=5417): r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$KDGKBLED(r0, 0x5450, 0x0) 46.872236141s ago: executing program 3 (id=5418): r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x5450, 0x0) 46.409432352s ago: executing program 3 (id=5419): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x5451, 0x0) 45.967187951s ago: executing program 3 (id=5420): r0 = openat$ttyprintk(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCMBIS(r0, 0x5450, 0x0) 45.552346738s ago: executing program 3 (id=5421): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETVNETLE(r0, 0x40049409, 0x0) 17.250993655s ago: executing program 34 (id=5375): r0 = openat$rfkill(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FIONCLEX(r0, 0x5450) 0s ago: executing program 35 (id=5421): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNGETVNETLE(r0, 0x40049409, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:3402' (ED25519) to the list of known hosts. [ 223.543237][ T30] audit: type=1400 audit(222.890:46): avc: denied { name_bind } for pid=3296 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 224.090595][ T30] audit: type=1400 audit(223.430:47): avc: denied { execute } for pid=3297 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 224.095084][ T30] audit: type=1400 audit(223.430:48): avc: denied { execute_no_trans } for pid=3297 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 229.425279][ T30] audit: type=1400 audit(228.770:49): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 229.446178][ T30] audit: type=1400 audit(228.790:50): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 229.505910][ T3297] cgroup: Unknown subsys name 'net' [ 229.542971][ T30] audit: type=1400 audit(228.890:51): avc: denied { unmount } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 229.815730][ T3297] cgroup: Unknown subsys name 'cpuset' [ 229.875411][ T3297] cgroup: Unknown subsys name 'rlimit' [ 230.234853][ T30] audit: type=1400 audit(229.580:52): avc: denied { setattr } for pid=3297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 230.243857][ T30] audit: type=1400 audit(229.590:53): avc: denied { create } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 230.255538][ T30] audit: type=1400 audit(229.600:54): avc: denied { write } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 230.256583][ T30] audit: type=1400 audit(229.600:55): avc: denied { module_request } for pid=3297 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 230.544136][ T30] audit: type=1400 audit(229.890:56): avc: denied { read } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 230.564789][ T30] audit: type=1400 audit(229.910:57): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 230.581961][ T30] audit: type=1400 audit(229.920:58): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 231.424580][ T3300] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 231.596023][ T3297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 247.577287][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 247.583531][ T30] audit: type=1400 audit(246.920:63): avc: denied { execmem } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 247.685668][ T30] audit: type=1400 audit(247.030:64): avc: denied { read } for pid=3303 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 247.693417][ T30] audit: type=1400 audit(247.040:65): avc: denied { open } for pid=3303 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 247.714110][ T30] audit: type=1400 audit(247.060:66): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 248.710570][ T30] audit: type=1400 audit(248.050:67): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 248.739552][ T30] audit: type=1400 audit(248.080:68): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/syzkaller.2TgsEh/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 248.768156][ T30] audit: type=1400 audit(248.110:69): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 248.819981][ T30] audit: type=1400 audit(248.160:70): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/syzkaller.2TgsEh/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 248.843150][ T30] audit: type=1400 audit(248.190:71): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/syzkaller.2TgsEh/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2389 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 248.902298][ T30] audit: type=1400 audit(248.240:72): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 253.508447][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 253.510904][ T30] audit: type=1400 audit(252.850:88): avc: denied { create } for pid=3327 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 256.895034][ T30] audit: type=1400 audit(256.240:89): avc: denied { read } for pid=3347 comm="syz.0.38" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 256.904811][ T30] audit: type=1400 audit(256.240:90): avc: denied { open } for pid=3347 comm="syz.0.38" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 256.947509][ T30] audit: type=1400 audit(256.290:91): avc: denied { write } for pid=3347 comm="syz.0.38" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 257.058571][ T30] audit: type=1400 audit(256.400:92): avc: denied { write } for pid=3346 comm="syz.1.37" name="pfkey" dev="proc" ino=4026532698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 257.863571][ T30] audit: type=1400 audit(257.210:93): avc: denied { create } for pid=3350 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 258.930304][ T30] audit: type=1400 audit(258.270:94): avc: denied { read } for pid=3356 comm="syz.0.46" name="dlm-monitor" dev="devtmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 258.932007][ T30] audit: type=1400 audit(258.270:95): avc: denied { open } for pid=3356 comm="syz.0.46" path="/dev/dlm-monitor" dev="devtmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 258.932409][ T30] audit: type=1400 audit(258.270:96): avc: denied { write } for pid=3356 comm="syz.0.46" name="dlm-monitor" dev="devtmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 262.939926][ T30] audit: type=1400 audit(262.280:97): avc: denied { write } for pid=3379 comm="syz.1.70" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 264.418310][ T30] audit: type=1400 audit(263.760:98): avc: denied { read } for pid=3389 comm="syz.1.79" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 264.453481][ T30] audit: type=1400 audit(263.760:99): avc: denied { open } for pid=3389 comm="syz.1.79" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 264.454756][ T30] audit: type=1400 audit(263.790:100): avc: denied { write } for pid=3389 comm="syz.1.79" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 266.594227][ T30] audit: type=1400 audit(265.940:101): avc: denied { mounton } for pid=3393 comm="syz-executor" path="/syzkaller.s3ubB9/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 267.428244][ T30] audit: type=1400 audit(266.770:102): avc: denied { create } for pid=3398 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 270.273172][ T30] audit: type=1400 audit(269.620:103): avc: denied { create } for pid=3408 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 271.875907][ T30] audit: type=1400 audit(271.220:104): avc: denied { write } for pid=3414 comm="syz.0.97" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 312.968408][ T3419] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 313.048510][ T3419] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 313.856947][ T3420] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 313.886843][ T3420] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 317.462836][ T3419] hsr_slave_0: entered promiscuous mode [ 317.484817][ T3419] hsr_slave_1: entered promiscuous mode [ 318.355969][ T3420] hsr_slave_0: entered promiscuous mode [ 318.362125][ T3420] hsr_slave_1: entered promiscuous mode [ 318.366102][ T3420] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 318.367123][ T3420] Cannot create hsr debugfs directory [ 321.035265][ T3419] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 321.204484][ T3419] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 321.308560][ T3419] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 321.482750][ T3419] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 322.063584][ T3420] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 322.136859][ T3420] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 322.194822][ T3420] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 322.308241][ T3420] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 325.978184][ T3419] 8021q: adding VLAN 0 to HW filter on device bond0 [ 326.674164][ T3420] 8021q: adding VLAN 0 to HW filter on device bond0 [ 342.813264][ T3419] veth0_vlan: entered promiscuous mode [ 342.983698][ T3419] veth1_vlan: entered promiscuous mode [ 343.522960][ T3419] veth0_macvtap: entered promiscuous mode [ 343.618060][ T3419] veth1_macvtap: entered promiscuous mode [ 344.011735][ T3420] veth0_vlan: entered promiscuous mode [ 344.363610][ T3419] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.372120][ T3419] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.374525][ T3419] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.376601][ T3419] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 344.436751][ T3420] veth1_vlan: entered promiscuous mode [ 345.475797][ T30] audit: type=1400 audit(344.820:105): avc: denied { mount } for pid=3419 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 345.561578][ T3420] veth0_macvtap: entered promiscuous mode [ 345.768629][ T30] audit: type=1400 audit(345.110:106): avc: denied { mounton } for pid=3419 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1545 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 345.797040][ T3420] veth1_macvtap: entered promiscuous mode [ 346.324366][ T3419] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 346.440218][ T3420] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 346.441128][ T3420] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 346.441974][ T3420] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 346.442376][ T3420] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 349.459422][ T30] audit: type=1400 audit(348.800:107): avc: denied { write } for pid=3572 comm="syz.1.100" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 361.083020][ T30] audit: type=1400 audit(360.410:108): avc: denied { read } for pid=3625 comm="syz.0.128" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 361.084417][ T30] audit: type=1400 audit(360.410:109): avc: denied { open } for pid=3625 comm="syz.0.128" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 363.106679][ T3638] syz.1.133 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 364.080173][ T30] audit: type=1400 audit(363.420:110): avc: denied { prog_load } for pid=3641 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 364.104819][ T30] audit: type=1400 audit(363.450:111): avc: denied { bpf } for pid=3641 comm="syz.1.135" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 364.123370][ T30] audit: type=1400 audit(363.470:112): avc: denied { perfmon } for pid=3641 comm="syz.1.135" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 364.216536][ T30] audit: type=1400 audit(363.560:113): avc: denied { mounton } for pid=3642 comm="syz.0.136" path="/syzcgroup/unified/syz0" dev="cgroup2" ino=33 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 367.291958][ T30] audit: type=1400 audit(366.620:114): avc: denied { mounton } for pid=3665 comm="syz.0.147" path="/25" dev="tmpfs" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 367.477440][ T30] audit: type=1400 audit(366.820:115): avc: denied { unmount } for pid=3419 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 369.403302][ T30] audit: type=1400 audit(368.750:116): avc: denied { mounton } for pid=3679 comm="syz.1.154" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 373.945120][ T30] audit: type=1400 audit(373.280:117): avc: denied { read write } for pid=3699 comm="syz.1.164" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 373.957934][ T30] audit: type=1400 audit(373.300:118): avc: denied { open } for pid=3699 comm="syz.1.164" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 374.737850][ T30] audit: type=1400 audit(374.060:119): avc: denied { ioctl } for pid=3702 comm="syz.0.165" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 380.259770][ T30] audit: type=1400 audit(379.600:120): avc: denied { associate } for pid=3733 comm="syz.1.180" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 381.621871][ T30] audit: type=1400 audit(380.960:121): avc: denied { create } for pid=3740 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 389.485541][ T30] audit: type=1400 audit(388.830:122): avc: denied { mount } for pid=3780 comm="syz.0.204" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 390.281506][ T30] audit: type=1400 audit(389.620:123): avc: denied { write } for pid=3785 comm="syz.1.206" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 393.858504][ T30] audit: type=1400 audit(393.200:124): avc: denied { read } for pid=3800 comm="syz.1.213" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 393.892739][ T30] audit: type=1400 audit(393.210:125): avc: denied { open } for pid=3800 comm="syz.1.213" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 394.383173][ T30] audit: type=1400 audit(393.730:126): avc: denied { kexec_image_load } for pid=3803 comm="syz.0.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 396.278491][ T30] audit: type=1400 audit(395.620:127): avc: denied { read } for pid=3813 comm="syz.1.220" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 396.297254][ T30] audit: type=1400 audit(395.640:128): avc: denied { open } for pid=3813 comm="syz.1.220" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 407.574394][ T30] audit: type=1400 audit(406.910:129): avc: denied { execute } for pid=3865 comm="syz.0.246" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=5531 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 409.047680][ T30] audit: type=1400 audit(408.390:130): avc: denied { read write } for pid=3871 comm="syz.0.249" name="card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 409.064744][ T30] audit: type=1400 audit(408.410:131): avc: denied { open } for pid=3871 comm="syz.0.249" path="/dev/dri/card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 424.030786][ T30] audit: type=1400 audit(423.350:132): avc: denied { remount } for pid=3927 comm="syz.1.276" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 424.072148][ T3930] ======================================================= [ 424.072148][ T3930] WARNING: The mand mount option has been deprecated and [ 424.072148][ T3930] and is ignored by this kernel. Remove the mand [ 424.072148][ T3930] option from the mount to silence this warning. [ 424.072148][ T3930] ======================================================= [ 473.360467][ T30] audit: type=1400 audit(472.700:133): avc: denied { write } for pid=4126 comm="syz.1.371" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 478.131603][ T30] audit: type=1400 audit(477.470:134): avc: denied { create } for pid=4141 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 480.560588][ T30] audit: type=1400 audit(479.900:135): avc: denied { append } for pid=4153 comm="syz.0.385" name="nbd0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 489.495153][ T30] audit: type=1400 audit(488.840:136): avc: denied { mounton } for pid=4211 comm="syz.0.413" path="/syzcgroup/cpu/syz0/cgroup.procs" dev="cgroup" ino=80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=file permissive=1 [ 489.511355][ T4212] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 492.822132][ T30] audit: type=1400 audit(492.120:137): avc: denied { write } for pid=4233 comm="syz.1.422" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 494.431352][ T30] audit: type=1400 audit(493.760:138): avc: denied { allowed } for pid=4241 comm="syz.0.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 494.479683][ T30] audit: type=1400 audit(493.820:139): avc: denied { create } for pid=4241 comm="syz.0.427" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 494.497288][ T30] audit: type=1400 audit(493.840:140): avc: denied { map } for pid=4241 comm="syz.0.427" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4835 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 494.506317][ T30] audit: type=1400 audit(493.850:141): avc: denied { read write } for pid=4241 comm="syz.0.427" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4835 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 498.957750][ T30] audit: type=1400 audit(498.300:142): avc: denied { create } for pid=4267 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 500.863099][ T4285] capability: warning: `syz.1.448' uses deprecated v2 capabilities in a way that may be insecure [ 512.793141][ T23] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 513.299626][ T23] usb 1-1: unable to get BOS descriptor or descriptor too short [ 513.480884][ T23] usb 1-1: config 2 has an invalid interface number: 68 but max is 0 [ 513.482407][ T23] usb 1-1: config 2 has no interface number 0 [ 513.483107][ T23] usb 1-1: config 2 interface 68 has no altsetting 0 [ 514.005130][ T23] usb 1-1: string descriptor 0 read error: -22 [ 514.008256][ T23] usb 1-1: New USB device found, idVendor=045e, idProduct=02bf, bcdDevice=52.8d [ 514.010970][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 514.503651][ T23] usb 1-1: USB disconnect, device number 2 [ 521.411268][ T30] audit: type=1400 audit(520.750:143): avc: denied { write } for pid=4400 comm="syz.0.505" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 521.434396][ T30] audit: type=1400 audit(520.780:144): avc: denied { open } for pid=4400 comm="syz.0.505" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 526.752604][ T30] audit: type=1400 audit(526.100:145): avc: denied { create } for pid=4441 comm="syz.0.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 537.926832][ T30] audit: type=1400 audit(537.270:146): avc: denied { map_create } for pid=4525 comm="syz.1.565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 539.489787][ T30] audit: type=1400 audit(538.830:147): avc: denied { mount } for pid=4537 comm="syz.0.571" name="/" dev="sockfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 540.943634][ T4554] random: crng reseeded on system resumption [ 549.922363][ T30] audit: type=1400 audit(549.270:148): avc: denied { read } for pid=4622 comm="syz.1.613" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 551.945931][ T30] audit: type=1400 audit(551.290:149): avc: denied { create } for pid=4641 comm="syz.1.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 555.070307][ T30] audit: type=1400 audit(554.400:150): avc: denied { create } for pid=4652 comm="syz.1.628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 555.636194][ T4653] can: request_module (can-proto-4) failed. [ 558.999769][ T30] audit: type=1400 audit(558.340:151): avc: denied { create } for pid=4679 comm="syz.0.641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 562.272448][ T30] audit: type=1400 audit(561.620:152): avc: denied { append } for pid=4699 comm="syz.0.651" name="system" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 570.131060][ T30] audit: type=1400 audit(569.450:153): avc: denied { unmount } for pid=3420 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 575.870774][ T30] audit: type=1400 audit(575.210:154): avc: denied { create } for pid=4796 comm="syz.0.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 588.054581][ T30] audit: type=1400 audit(587.400:155): avc: denied { read append } for pid=4876 comm="syz.0.738" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 588.066099][ T30] audit: type=1400 audit(587.410:156): avc: denied { open } for pid=4876 comm="syz.0.738" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 591.780106][ T30] audit: type=1400 audit(591.120:157): avc: denied { create } for pid=4900 comm="syz.0.750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 596.450905][ T30] audit: type=1400 audit(595.790:158): avc: denied { create } for pid=4923 comm="syz.0.760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 615.758027][ T30] audit: type=1400 audit(615.100:159): avc: denied { append } for pid=5009 comm="syz.0.802" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 620.144866][ T30] audit: type=1400 audit(619.490:160): avc: denied { mounton } for pid=5037 comm="syz.0.816" path="/syzcgroup/unified/syz0" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=dir permissive=1 [ 628.873561][ T30] audit: type=1400 audit(628.220:161): avc: denied { create } for pid=5081 comm="syz.1.836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 665.546559][ T30] audit: type=1400 audit(664.880:162): avc: denied { create } for pid=5293 comm="syz.0.938" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 665.746071][ T30] audit: type=1400 audit(665.080:163): avc: denied { unlink } for pid=3419 comm="syz-executor" name="file2" dev="tmpfs" ino=2202 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 669.707922][ T30] audit: type=1400 audit(669.050:164): avc: denied { write } for pid=5324 comm="syz.1.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 669.735662][ T30] audit: type=1400 audit(669.080:165): avc: denied { read } for pid=5324 comm="syz.1.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 674.350441][ T30] audit: type=1400 audit(673.690:166): avc: denied { create } for pid=5354 comm="syz.1.968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 682.897559][ T5392] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 682.904294][ T5392] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 683.603611][ T30] audit: type=1400 audit(682.950:167): avc: denied { create } for pid=5395 comm="syz.0.985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 684.245098][ T30] audit: type=1400 audit(683.590:168): avc: denied { mount } for pid=5398 comm="syz.0.988" name="/" dev="hugetlbfs" ino=9538 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 689.931665][ T5196] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 690.201428][ T5196] usb 1-1: Using ep0 maxpacket: 8 [ 690.316544][ T5196] usb 1-1: config 0 has an invalid interface number: 143 but max is 0 [ 690.319407][ T5196] usb 1-1: config 0 has no interface number 0 [ 690.321555][ T5196] usb 1-1: New USB device found, idVendor=2058, idProduct=1005, bcdDevice=c1.9b [ 690.324404][ T5196] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 690.416278][ T5196] usb 1-1: config 0 descriptor?? [ 690.664417][ T23] usb 1-1: USB disconnect, device number 3 [ 700.771536][ T30] audit: type=1400 audit(700.110:169): avc: denied { create } for pid=5509 comm="syz.0.1042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 709.362705][ T30] audit: type=1400 audit(708.700:170): avc: denied { setcurrent } for pid=5567 comm="syz.1.1070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 724.620186][ T30] audit: type=1400 audit(723.960:171): avc: denied { sqpoll } for pid=5655 comm="syz.0.1111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 730.276295][ T30] audit: type=1400 audit(729.620:172): avc: denied { module_load } for pid=5711 comm="syz.1.1139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 730.561828][ T5715] Injecting memory failure for pfn 0x48e47 at process virtual address 0x20ff9000 [ 730.580710][ T5715] Memory failure: 0x48e47: recovery action for reserved kernel page: Ignored [ 750.701264][ T30] audit: type=1400 audit(750.030:173): avc: denied { open } for pid=5833 comm="syz.1.1198" path="/dev/ttyq7" dev="devtmpfs" ino=374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 762.022083][ T30] audit: type=1400 audit(761.360:174): avc: denied { unmount } for pid=3419 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 799.815296][ T6143] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 799.827280][ T6143] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 821.206873][ T6253] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 824.194011][ T30] audit: type=1400 audit(823.500:175): avc: denied { create } for pid=6275 comm="syz.0.1410" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 824.275963][ T30] audit: type=1400 audit(823.620:176): avc: denied { unlink } for pid=3419 comm="syz-executor" name="file0" dev="tmpfs" ino=3387 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 845.261328][ T30] audit: type=1400 audit(844.610:177): avc: denied { audit_write } for pid=6390 comm="syz.0.1465" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 864.173599][ T30] audit: type=1400 audit(863.500:178): avc: denied { mounton } for pid=6509 comm="syz.0.1523" path="/syzcgroup/unified/syz0" dev="hugetlbfs" ino=9538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=dir permissive=1 [ 867.572727][ T30] audit: type=1400 audit(866.920:179): avc: denied { read write } for pid=6535 comm="syz.1.1536" name="rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 867.578653][ T30] audit: type=1400 audit(866.920:180): avc: denied { open } for pid=6535 comm="syz.1.1536" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 914.620567][ T30] audit: type=1400 audit(913.960:181): avc: denied { write } for pid=6824 comm="syz.1.1676" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 922.405866][ T30] audit: type=1400 audit(921.750:182): avc: denied { mount } for pid=6865 comm="syz.0.1696" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 922.472955][ T30] audit: type=1400 audit(921.820:183): avc: denied { unmount } for pid=3419 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 932.238059][ T30] audit: type=1400 audit(931.580:184): avc: denied { create } for pid=6947 comm="syz.1.1737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 954.100402][ T7113] syz.0.1815 uses obsolete (PF_INET,SOCK_PACKET) [ 958.707540][ T30] audit: type=1400 audit(958.040:185): avc: denied { wake_alarm } for pid=7142 comm="syz.1.1830" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 971.940906][ T30] audit: type=1400 audit(971.280:186): avc: denied { read write } for pid=7231 comm="syz.0.1873" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 971.942012][ T30] audit: type=1400 audit(971.280:187): avc: denied { open } for pid=7231 comm="syz.0.1873" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 980.134529][ T7298] can: request_module (can-proto-0) failed. [ 1014.614716][ T7571] Injecting memory failure for pfn 0x48e47 at process virtual address 0x20ffd000 [ 1014.622449][ T7571] Memory failure: 0x48e47: already hardware poisoned [ 1014.626812][ T7571] Memory failure: 0x48e47: Sending SIGBUS to syz.1.2036:7571 due to hardware memory corruption [ 1014.643542][ T7571] Memory failure: 0x48e47: recovery action for already poisoned: Failed [ 1037.666443][ T30] audit: type=1400 audit(1037.010:188): avc: denied { read } for pid=7723 comm="syz.1.2112" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1037.686941][ T30] audit: type=1400 audit(1037.030:189): avc: denied { open } for pid=7723 comm="syz.1.2112" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1044.031026][ T9] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 1044.250606][ T9] usb 1-1: Using ep0 maxpacket: 16 [ 1044.282079][ T9] usb 1-1: too many endpoints for config 1 interface 0 altsetting 0: 255, using maximum allowed: 30 [ 1044.284310][ T9] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1044.285945][ T9] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 1044.289710][ T9] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid maxpacket 57608, setting to 1024 [ 1044.291332][ T9] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 1024 [ 1044.292765][ T9] usb 1-1: config 1 interface 0 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 255 [ 1044.326753][ T9] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1044.340563][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1044.341074][ T9] usb 1-1: SerialNumber: syz [ 1044.393981][ T7778] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1044.447708][ T9] cdc_acm 1-1:1.0: Control and data interfaces are not separated! [ 1044.462611][ T9] cdc_acm 1-1:1.0: probe with driver cdc_acm failed with error -12 [ 1044.646424][ T9] usb 1-1: USB disconnect, device number 4 [ 1055.158018][ T30] audit: type=1400 audit(1054.500:190): avc: denied { create } for pid=7844 comm="syz.0.2170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1085.492940][ T3565] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 1085.792725][ T3565] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1085.898643][ T3565] usb 1-1: config 1 has an invalid interface number: 38 but max is 0 [ 1085.900050][ T3565] usb 1-1: config 1 has no interface number 0 [ 1085.900737][ T3565] usb 1-1: config 1 interface 38 has no altsetting 0 [ 1086.110244][ T3565] usb 1-1: New USB device found, idVendor=133e, idProduct=0815, bcdDevice=fd.63 [ 1086.111102][ T3565] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1086.116469][ T3565] usb 1-1: Product: syz [ 1086.117214][ T3565] usb 1-1: Manufacturer: syz [ 1086.117552][ T3565] usb 1-1: SerialNumber: syz [ 1086.795292][ T3565] snd-usb-audio 1-1:1.38: probe with driver snd-usb-audio failed with error -22 [ 1086.958609][ T3565] usb 1-1: USB disconnect, device number 5 [ 1091.355140][ T8060] SELinux: Context system_u:object_r:hald_sonypic_exec_t:s0 is not valid (left unmapped). [ 1091.374679][ T30] audit: type=1400 audit(1090.720:191): avc: denied { relabelto } for pid=8059 comm="syz.0.2275" name="cgroup" dev="tmpfs" ino=5512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=lnk_file permissive=1 trawcon="system_u:object_r:hald_sonypic_exec_t:s0" [ 1091.386434][ T30] audit: type=1400 audit(1090.730:192): avc: denied { associate } for pid=8059 comm="syz.0.2275" name="cgroup" dev="tmpfs" ino=5512 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hald_sonypic_exec_t:s0" [ 1091.557920][ T30] audit: type=1400 audit(1090.870:193): avc: denied { unlink } for pid=3419 comm="syz-executor" name="cgroup" dev="tmpfs" ino=5512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=lnk_file permissive=1 trawcon="system_u:object_r:hald_sonypic_exec_t:s0" [ 1095.038278][ T30] audit: type=1400 audit(1094.380:194): avc: denied { append } for pid=8094 comm="syz.0.2292" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1102.402175][ T30] audit: type=1400 audit(1101.750:195): avc: denied { remount } for pid=8147 comm="syz.0.2319" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1119.093076][ T30] audit: type=1400 audit(1118.440:196): avc: denied { create } for pid=8269 comm="syz.1.2379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 1140.882681][ T30] audit: type=1400 audit(1140.230:197): avc: denied { create } for pid=8423 comm="syz.0.2454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1152.567426][ T30] audit: type=1400 audit(1151.900:198): avc: denied { create } for pid=8507 comm="syz.0.2496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1168.628075][ T8627] SELinux: Context system_u:object_r:semanage_exec_t:s0 is not valid (left unmapped). [ 1168.636143][ T30] audit: type=1400 audit(1167.980:199): avc: denied { relabelto } for pid=8625 comm="syz.0.2555" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 trawcon="system_u:object_r:semanage_exec_t:s0" [ 1168.642516][ T30] audit: type=1400 audit(1167.990:200): avc: denied { associate } for pid=8625 comm="syz.0.2555" name="loop0" dev="devtmpfs" ino=637 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:semanage_exec_t:s0" [ 1173.403353][ T6668] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 1173.590342][ T6668] usb 1-1: Using ep0 maxpacket: 8 [ 1173.626832][ T6668] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1173.631219][ T6668] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 1173.633853][ T6668] usb 1-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 1173.696941][ T6668] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1173.707718][ T6668] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1173.711734][ T6668] usb 1-1: Product: syz [ 1173.713165][ T6668] usb 1-1: Manufacturer: syz [ 1173.714676][ T6668] usb 1-1: SerialNumber: syz [ 1173.896719][ T6668] cdc_ncm 1-1:1.0: CDC Union missing and no IAD found [ 1173.911281][ T6668] cdc_ncm 1-1:1.0: bind() failure [ 1174.106434][ T5196] usb 1-1: USB disconnect, device number 6 [ 1216.725311][ T30] audit: type=1400 audit(1216.060:201): avc: denied { append } for pid=8975 comm="syz.1.2721" name="pfkey" dev="proc" ino=4026532775 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1247.783112][ T9207] SELinux: Context system_u:object_r:systemd_logind_exec_t:s0 is not valid (left unmapped). [ 1247.812223][ T30] audit: type=1400 audit(1247.150:202): avc: denied { relabelto } for pid=9206 comm="syz.0.2835" name="1382" dev="tmpfs" ino=6981 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:systemd_logind_exec_t:s0" [ 1247.813488][ T30] audit: type=1400 audit(1247.150:203): avc: denied { associate } for pid=9206 comm="syz.0.2835" name="1382" dev="tmpfs" ino=6981 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:systemd_logind_exec_t:s0" [ 1280.751756][ T6668] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 1280.950466][ T6668] usb 1-1: Using ep0 maxpacket: 16 [ 1281.037860][ T6668] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 64, changing to 7 [ 1281.043148][ T6668] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 1281.163894][ T6668] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1281.170176][ T6668] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1281.172754][ T6668] usb 1-1: Product: syz [ 1281.174349][ T6668] usb 1-1: Manufacturer: syz [ 1281.175840][ T6668] usb 1-1: SerialNumber: syz [ 1281.517738][ T6668] usb 1-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 1282.571653][ T6668] usb 1-1: USB disconnect, device number 7 [ 1284.924355][ T3632] udevd[3632]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 1291.534810][ T30] audit: type=1400 audit(1290.880:204): avc: denied { read write } for pid=9474 comm="syz.0.2965" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1291.537077][ T30] audit: type=1400 audit(1290.880:205): avc: denied { open } for pid=9474 comm="syz.0.2965" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1297.408525][ T9523] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1297.423274][ T9523] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1299.674672][ T9541] binder: Unknown parameter 'uid<00000000000000000000' [ 1345.407715][ T30] audit: type=1400 audit(1344.750:206): avc: denied { create } for pid=9843 comm="syz.1.3143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 1365.564183][ T30] audit: type=1400 audit(1364.910:207): avc: denied { create } for pid=9950 comm="syz.0.3193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1418.733680][ T30] audit: type=1400 audit(1418.070:208): avc: denied { map_read map_write } for pid=10324 comm="syz.0.3375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1425.417545][T10365] random: crng reseeded on system resumption [ 1474.987793][T10606] SELinux: Context system_u:object_r:etc_aliases_t:s0 is not valid (left unmapped). [ 1475.122575][ T30] audit: type=1400 audit(1474.340:209): avc: denied { relabelto } for pid=10605 comm="syz.0.3511" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 trawcon="system_u:object_r:etc_aliases_t:s0" [ 1475.139918][ T30] audit: type=1400 audit(1474.480:210): avc: denied { associate } for pid=10605 comm="syz.0.3511" name="loop0" dev="devtmpfs" ino=637 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:etc_aliases_t:s0" [ 1475.223850][ T30] audit: type=1400 audit(1474.570:211): avc: denied { read write } for pid=3419 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 trawcon="system_u:object_r:etc_aliases_t:s0" [ 1475.231169][ T30] audit: type=1400 audit(1474.580:212): avc: denied { open } for pid=3419 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 trawcon="system_u:object_r:etc_aliases_t:s0" [ 1475.235091][ T30] audit: type=1400 audit(1474.580:213): avc: denied { ioctl } for pid=3419 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 trawcon="system_u:object_r:etc_aliases_t:s0" [ 1537.598458][ T30] audit: type=1400 audit(1536.940:214): avc: denied { create } for pid=10952 comm="syz.1.3678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1558.425221][T11070] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 1559.308394][T11074] Soft offlining pfn 0x48e47 at process virtual address 0x20ffc000 [ 1559.361565][T11074] Soft offline: 0x48e47: page already poisoned [ 1559.373072][T11074] Soft offlining pfn 0x48e47 at process virtual address 0x20ffd000 [ 1559.393307][T11074] Soft offline: 0x48e47: page already poisoned [ 1559.414121][T11074] Soft offlining pfn 0x48e47 at process virtual address 0x20ffe000 [ 1559.436140][T11074] Soft offline: 0x48e47: page already poisoned [ 1559.437694][T11074] Soft offlining pfn 0x48e47 at process virtual address 0x20fff000 [ 1559.438008][T11074] Soft offline: 0x48e47: page already poisoned [ 1564.890720][ T30] audit: type=1400 audit(1564.220:215): avc: denied { write } for pid=11097 comm="syz.1.3750" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1564.896223][ T30] audit: type=1400 audit(1564.220:216): avc: denied { open } for pid=11097 comm="syz.1.3750" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1594.827676][ T30] audit: type=1400 audit(1594.170:217): avc: denied { create } for pid=11260 comm="syz.1.3829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 1600.358295][ T30] audit: type=1400 audit(1599.700:218): avc: denied { associate } for pid=11294 comm="syz.0.3846" name="loop0" dev="devtmpfs" ino=637 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:semanage_exec_t:s0" [ 1658.710484][ T30] audit: type=1400 audit(1658.050:219): avc: denied { prog_run } for pid=11565 comm="syz.0.3976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1698.775376][ T30] audit: type=1400 audit(1698.120:220): avc: denied { create } for pid=11824 comm="syz.1.4101" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1699.086508][ T30] audit: type=1400 audit(1698.430:221): avc: denied { unlink } for pid=3420 comm="syz-executor" name="file0" dev="tmpfs" ino=9831 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1705.035218][T11859] cgroup: Invalid name [ 1707.981799][T11877] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1708.024386][T11877] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1711.897013][ T30] audit: type=1400 audit(1711.240:222): avc: denied { create } for pid=11900 comm="syz.1.4137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1714.672219][ T30] audit: type=1400 audit(1714.010:223): avc: denied { write } for pid=11912 comm="syz.1.4144" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1716.342815][ T30] audit: type=1400 audit(1715.670:224): avc: denied { add_name } for pid=11922 comm="syz.0.4148" name="custom1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1716.357867][ T30] audit: type=1400 audit(1715.700:225): avc: denied { create } for pid=11922 comm="syz.0.4148" name="custom1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 1716.396487][ T30] audit: type=1400 audit(1715.740:226): avc: denied { associate } for pid=11922 comm="syz.0.4148" name="custom1" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1732.265028][ T30] audit: type=1400 audit(1731.600:227): avc: denied { ioctl } for pid=12052 comm="syz.1.4213" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1764.805306][ T30] audit: type=1400 audit(1764.150:228): avc: denied { getopt } for pid=12270 comm="syz.0.4319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1765.971423][ T30] audit: type=1400 audit(1765.310:229): avc: denied { setopt } for pid=12274 comm="syz.0.4321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1767.313699][ T30] audit: type=1400 audit(1766.660:230): avc: denied { ioctl } for pid=12281 comm="syz.1.4325" path="socket:[29301]" dev="sockfs" ino=29301 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1772.472466][ T30] audit: type=1400 audit(1771.780:231): avc: denied { setopt } for pid=12314 comm="syz.0.4341" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1774.448358][ T30] audit: type=1400 audit(1773.790:232): avc: denied { setattr } for pid=12327 comm="syz.0.4347" name="zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 1778.184919][ T30] audit: type=1400 audit(1777.520:233): avc: denied { ioctl } for pid=12343 comm="syz.1.4355" path="/dev/ptyq7" dev="devtmpfs" ino=118 ioctlcmd=0x5420 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1797.114433][ T30] audit: type=1400 audit(1796.450:234): avc: denied { write } for pid=12427 comm="syz.0.4397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1804.703145][ T30] audit: type=1400 audit(1804.050:235): avc: denied { ioctl } for pid=12471 comm="syz.1.4419" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x9403 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1805.022892][ T30] audit: type=1400 audit(1804.360:236): avc: denied { setattr } for pid=12472 comm="syz.0.4418" name="ptmx" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 1809.430627][ T30] audit: type=1400 audit(1808.770:237): avc: denied { ioctl } for pid=12499 comm="syz.0.4432" path="/dev/uhid" dev="devtmpfs" ino=712 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1811.581421][T12510] Zero length message leads to an empty skb [ 1825.991560][ T30] audit: type=1400 audit(1825.330:238): avc: denied { ioctl } for pid=12573 comm="syz.1.4469" path="socket:[29568]" dev="sockfs" ino=29568 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1827.515265][ T30] audit: type=1400 audit(1826.860:239): avc: denied { getopt } for pid=12579 comm="syz.0.4472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1835.598168][ T30] audit: type=1400 audit(1834.940:240): avc: denied { append } for pid=12612 comm="syz.0.4489" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1835.644968][T12613] usb usb1: usbfs: process 12613 (syz.0.4489) did not claim interface 2 before use [ 1867.961698][ T30] audit: type=1400 audit(1867.310:241): avc: denied { setopt } for pid=12788 comm="syz.1.4577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1872.408105][ T30] audit: type=1400 audit(1871.750:242): avc: denied { ioctl } for pid=12810 comm="syz.0.4588" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 ioctlcmd=0xaf00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1879.935505][T12857] xt_hashlimit: max too large, truncated to 1048576 [ 1879.957493][T12857] xt_limit: Overflow, try lower: 0/0 [ 1898.498399][ T30] audit: type=1400 audit(1897.840:243): avc: denied { write } for pid=12931 comm="syz.1.4646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1915.142679][ T30] audit: type=1400 audit(1914.480:244): avc: denied { getopt } for pid=13015 comm="syz.1.4688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1920.481660][ T30] audit: type=1400 audit(1919.820:245): avc: denied { setattr } for pid=13039 comm="syz.1.4700" name="vcsu" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 1923.828322][T13054] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13054 comm=syz.0.4707 [ 1928.615425][ T30] audit: type=1400 audit(1927.960:246): avc: denied { read append } for pid=13083 comm="syz.0.4722" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1928.642580][ T30] audit: type=1400 audit(1927.970:247): avc: denied { ioctl } for pid=13083 comm="syz.0.4722" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4540 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1931.496971][ T30] audit: type=1400 audit(1930.840:248): avc: denied { ioctl } for pid=13105 comm="syz.1.4733" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x6435 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1934.805239][ T30] audit: type=1400 audit(1934.150:249): avc: denied { write } for pid=13129 comm="syz.0.4745" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1936.119825][ T30] audit: type=1400 audit(1935.450:250): avc: denied { read } for pid=13137 comm="syz.0.4749" path="socket:[32132]" dev="sockfs" ino=32132 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1945.730604][T13202] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13202 comm=syz.1.4781 [ 1958.746482][ T30] audit: type=1400 audit(1958.090:251): avc: denied { ioctl } for pid=13292 comm="syz.0.4826" path="socket:[32383]" dev="sockfs" ino=32383 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1962.636014][T13324] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 1964.906440][ T30] audit: type=1400 audit(1964.240:252): avc: denied { write } for pid=13342 comm="syz.1.4848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1970.400889][ T30] audit: type=1400 audit(1969.710:253): avc: denied { setattr } for pid=13378 comm="syz.1.4866" name="L2TP/IP" dev="sockfs" ino=32497 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1973.995717][ T30] audit: type=1400 audit(1973.340:254): avc: denied { ioctl } for pid=13405 comm="syz.1.4879" path="socket:[32531]" dev="sockfs" ino=32531 ioctlcmd=0x5003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1978.881088][ T30] audit: type=1400 audit(1978.220:255): avc: denied { create } for pid=13434 comm="syz.0.4894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1978.954823][ T30] audit: type=1400 audit(1978.300:256): avc: denied { setattr } for pid=13434 comm="syz.0.4894" name="NETLINK" dev="sockfs" ino=33845 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1980.312849][ T30] audit: type=1400 audit(1979.660:257): avc: denied { getopt } for pid=13441 comm="syz.1.4897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1985.241866][ T30] audit: type=1400 audit(1984.580:258): avc: denied { setopt } for pid=13473 comm="syz.0.4913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2006.227758][ T30] audit: type=1400 audit(2005.570:259): avc: denied { getopt } for pid=13626 comm="syz.1.4988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2007.298024][ T30] audit: type=1400 audit(2006.640:260): avc: denied { setopt } for pid=13632 comm="syz.0.4991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2009.884785][ T30] audit: type=1400 audit(2009.230:261): avc: denied { write } for pid=13644 comm="syz.1.4997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2010.262007][ T30] audit: type=1400 audit(2009.610:262): avc: denied { write } for pid=13646 comm="syz.0.4998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2011.345468][ T30] audit: type=1400 audit(2010.690:263): avc: denied { setopt } for pid=13652 comm="syz.1.5001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2043.059513][ T30] audit: type=1400 audit(2042.400:264): avc: denied { setattr } for pid=13867 comm="syz.1.5107" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2043.689702][ T30] audit: type=1400 audit(2043.030:265): avc: denied { read } for pid=13873 comm="syz.1.5110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2046.134754][T13889] [U] ^@ [ 2046.932110][T13896] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=13896 comm=syz.0.5121 [ 2055.513481][ T30] audit: type=1400 audit(2054.840:266): avc: denied { ioctl } for pid=13956 comm="syz.1.5151" path="socket:[34757]" dev="sockfs" ino=34757 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2061.517735][ T30] audit: type=1400 audit(2060.860:267): avc: granted { setsecparam } for pid=14006 comm="syz.0.5176" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 2109.601922][ T30] audit: type=1400 audit(2108.950:268): avc: denied { mounton } for pid=14041 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2120.717583][T14041] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2120.786135][T14041] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2121.483856][T14043] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2121.577014][T14043] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2125.143934][T14041] hsr_slave_0: entered promiscuous mode [ 2125.163266][T14041] hsr_slave_1: entered promiscuous mode [ 2125.176609][T14041] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2125.178054][T14041] Cannot create hsr debugfs directory [ 2126.223374][T14043] hsr_slave_0: entered promiscuous mode [ 2126.235331][T14043] hsr_slave_1: entered promiscuous mode [ 2126.253047][T14043] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2126.254203][T14043] Cannot create hsr debugfs directory [ 2128.848132][T14041] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2129.006164][T14041] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2129.123160][T14041] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2129.330248][T14041] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2130.075896][T14043] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2130.135545][T14043] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2130.245851][T14043] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2130.343720][T14043] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2134.344378][T14041] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2135.253432][T14043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2150.522265][T14041] veth0_vlan: entered promiscuous mode [ 2150.727037][T14041] veth1_vlan: entered promiscuous mode [ 2151.006862][T14043] veth0_vlan: entered promiscuous mode [ 2151.315328][T14043] veth1_vlan: entered promiscuous mode [ 2151.568807][T14041] veth0_macvtap: entered promiscuous mode [ 2151.742353][T14041] veth1_macvtap: entered promiscuous mode [ 2152.041963][T14043] veth0_macvtap: entered promiscuous mode [ 2152.247489][T14043] veth1_macvtap: entered promiscuous mode [ 2152.365985][T14041] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2152.370552][T14041] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2152.372862][T14041] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2152.374866][T14041] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2153.204375][T14043] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2153.205297][T14043] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2153.216883][T14043] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2153.232156][T14043] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2153.823164][ T30] audit: type=1400 audit(2153.160:269): avc: denied { unmount } for pid=14041 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2154.331749][ T30] audit: type=1400 audit(2153.670:270): avc: denied { mounton } for pid=14043 comm="syz-executor" path="/syzkaller.dVFsSP/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 2173.506075][ T30] audit: type=1400 audit(2172.850:271): avc: denied { create } for pid=14288 comm="syz.3.5240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2173.573291][ T30] audit: type=1400 audit(2172.910:272): avc: denied { write } for pid=14288 comm="syz.3.5240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2232.453820][ T30] audit: type=1400 audit(2231.800:273): avc: denied { ioctl } for pid=14613 comm="syz.3.5401" path="socket:[37522]" dev="sockfs" ino=37522 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2502.252071][ T32] INFO: task kworker/1:1:13325 blocked for more than 430 seconds. [ 2502.253301][ T32] Not tainted 6.16.0-rc3-syzkaller-00121-gf02769e7f272 #0 [ 2502.260952][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2502.261476][ T32] task:kworker/1:1 state:D stack:0 pid:13325 tgid:13325 ppid:2 task_flags:0x4208060 flags:0x00000010 [ 2502.262265][ T32] Workqueue: events rfkill_global_led_trigger_worker [ 2502.263495][ T32] Call trace: [ 2502.263751][ T32] __switch_to+0x208/0x4f4 (T) [ 2502.264044][ T32] __schedule+0xd34/0x3184 [ 2502.264214][ T32] schedule+0xd0/0x344 [ 2502.264376][ T32] schedule_preempt_disabled+0x18/0x2c [ 2502.264594][ T32] __mutex_lock+0x5d8/0x9d8 [ 2502.264742][ T32] mutex_lock_nested+0x24/0x30 [ 2502.264886][ T32] rfkill_global_led_trigger_worker+0x2c/0x10c [ 2502.265089][ T32] process_one_work+0x7cc/0x18d4 [ 2502.265265][ T32] worker_thread+0x734/0xb84 [ 2502.265498][ T32] kthread+0x348/0x5fc [ 2502.265699][ T32] ret_from_fork+0x10/0x20 [ 2502.266065][ T32] INFO: task syz.0.5189:14031 blocked for more than 430 seconds. [ 2502.266221][ T32] Not tainted 6.16.0-rc3-syzkaller-00121-gf02769e7f272 #0 [ 2502.266363][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2502.266489][ T32] task:syz.0.5189 state:D stack:0 pid:14031 tgid:14031 ppid:3419 task_flags:0x400040 flags:0x00000011 [ 2502.266775][ T32] Call trace: [ 2502.266900][ T32] __switch_to+0x208/0x4f4 (T) [ 2502.267053][ T32] __schedule+0xd34/0x3184 [ 2502.267201][ T32] schedule+0xd0/0x344 [ 2502.267413][ T32] schedule_preempt_disabled+0x18/0x2c [ 2502.267578][ T32] __mutex_lock+0x5d8/0x9d8 [ 2502.267724][ T32] mutex_lock_nested+0x24/0x30 [ 2502.267876][ T32] rfkill_unregister+0xb8/0x240 [ 2502.268025][ T32] nfc_unregister_device+0x68/0x298 [ 2502.268174][ T32] nci_unregister_device+0x1bc/0x294 [ 2502.268365][ T32] virtual_ncidev_close+0x48/0xb0 [ 2502.268528][ T32] __fput+0x2c8/0x954 [ 2502.288475][ T32] ____fput+0x14/0x20 [ 2502.290005][ T32] task_work_run+0x128/0x210 [ 2502.290205][ T32] do_notify_resume+0x1dc/0x264 [ 2502.290365][ T32] el0_svc+0x118/0x198 [ 2502.290514][ T32] el0t_64_sync_handler+0x10c/0x138 [ 2502.290663][ T32] el0t_64_sync+0x198/0x19c [ 2502.290826][ T32] INFO: task syz.1.5188:14037 blocked for more than 430 seconds. [ 2502.291030][ T32] Not tainted 6.16.0-rc3-syzkaller-00121-gf02769e7f272 #0 [ 2502.291166][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2502.291297][ T32] task:syz.1.5188 state:D stack:0 pid:14037 tgid:14032 ppid:3420 task_flags:0x400040 flags:0x00000011 [ 2502.291584][ T32] Call trace: [ 2502.291712][ T32] __switch_to+0x208/0x4f4 (T) [ 2502.291866][ T32] __schedule+0xd34/0x3184 [ 2502.292009][ T32] schedule+0xd0/0x344 [ 2502.292151][ T32] schedule_preempt_disabled+0x18/0x2c [ 2502.292300][ T32] __mutex_lock+0x5d8/0x9d8 [ 2502.292570][ T32] mutex_lock_nested+0x24/0x30 [ 2502.292768][ T32] nfc_dev_down+0x2c/0x234 [ 2502.292938][ T32] nfc_rfkill_set_block+0x28/0xb8 [ 2502.293110][ T32] rfkill_set_block+0x160/0x3c4 [ 2502.293263][ T32] rfkill_fop_write+0x218/0x554 [ 2502.293449][ T32] vfs_write+0x1d8/0xad4 [ 2502.293604][ T32] ksys_write+0x18c/0x1d8 [ 2502.293745][ T32] __arm64_sys_write+0x6c/0x9c [ 2502.293886][ T32] invoke_syscall+0x6c/0x258 [ 2502.294065][ T32] el0_svc_common.constprop.0+0xac/0x230 [ 2502.294263][ T32] do_el0_svc+0x40/0x58 [ 2502.294405][ T32] el0_svc+0x50/0x198 [ 2502.294542][ T32] el0t_64_sync_handler+0x10c/0x138 [ 2502.294681][ T32] el0t_64_sync+0x198/0x19c [ 2502.295009][ T32] [ 2502.295009][ T32] Showing all locks held in the system: [ 2502.295329][ T32] 2 locks held by pr/ttyAMA0/31: [ 2502.295621][ T32] 1 lock held by khungtaskd/32: [ 2502.295779][ T32] #0: ffff8000872c0660 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x18/0x1c4 [ 2502.296859][ T32] 1 lock held by klogd/3106: [ 2502.297049][ T32] 2 locks held by getty/3242: [ 2502.297201][ T32] #0: ffff0000139d00a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 2502.298010][ T32] #1: ffff80008d58b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e8/0xdc0 [ 2502.298577][ T32] 2 locks held by kworker/0:5/5963: [ 2502.339634][ T32] #0: ffff00006a0a9e58 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2c/0x44 [ 2502.342359][ T32] #1: ffff00006a095388 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x244/0x758 [ 2502.343439][ T32] 3 locks held by kworker/1:1/13325: [ 2502.343712][ T32] #0: ffff00000dc28d48 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 2502.344828][ T32] #1: ffff8000a04e7c80 ((work_completion)(&rfkill_global_led_trigger_work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 2502.345881][ T32] #2: ffff800088a7b8a8 (rfkill_global_mutex){+.+.}-{4:4}, at: rfkill_global_led_trigger_worker+0x2c/0x10c [ 2502.346534][ T32] 2 locks held by syz.0.5189/14031: [ 2502.346668][ T32] #0: ffff0000203af100 (&dev->mutex){....}-{4:4}, at: nfc_unregister_device+0x48/0x298 [ 2502.347315][ T32] #1: ffff800088a7b8a8 (rfkill_global_mutex){+.+.}-{4:4}, at: rfkill_unregister+0xb8/0x240 [ 2502.347893][ T32] 2 locks held by syz.1.5188/14037: [ 2502.348026][ T32] #0: ffff800088a7b8a8 (rfkill_global_mutex){+.+.}-{4:4}, at: rfkill_fop_write+0x134/0x554 [ 2502.348618][ T32] #1: ffff0000203af100 (&dev->mutex){....}-{4:4}, at: nfc_dev_down+0x2c/0x234 [ 2502.371049][ T32] 2 locks held by syz.2.5375/14561: [ 2502.371331][ T32] #0: ffff800087af2068 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x64/0x35c [ 2502.371949][ T32] #1: ffff800088a7b8a8 (rfkill_global_mutex){+.+.}-{4:4}, at: rfkill_fop_open+0x11c/0x62c [ 2502.372550][ T32] 1 lock held by syz.3.5421/14654: SYZFAIL: failed to recv rpc [ 2502.372690][ T32] #0: ffff800087af2068 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x64/0x35c [ 2502.373308][ T32] 1 lock held by syz-executor/14657: [ 2502.373462][ T32] #0: ffff800087af2068 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x64/0x35c [ 2502.374001][ T32] 1 lock held by syz-executor/14667: [ 2502.374168][ T32] #0: ffff800087af2068 (misc_mtx){+.+.}-{4:4}, at: misc_open+0x64/0x35c [ 2502.389656][ T32] [ 2502.390071][ T32] ============================================= [ 2502.390071][ T32] [ 2502.390811][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 2502.392012][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.16.0-rc3-syzkaller-00121-gf02769e7f272 #0 PREEMPT [ 2502.392523][ T32] Hardware name: linux,dummy-virt (DT) [ 2502.392862][ T32] Call trace: [ 2502.393221][ T32] show_stack+0x18/0x24 (C) [ 2502.393529][ T32] dump_stack_lvl+0x38/0xf4 [ 2502.393812][ T32] dump_stack+0x1c/0x28 [ 2502.394114][ T32] panic+0x5b0/0x664 [ 2502.394399][ T32] watchdog+0x4d8/0xdf8 [ 2502.394674][ T32] kthread+0x348/0x5fc [ 2502.394926][ T32] ret_from_fork+0x10/0x20 [ 2502.395608][ T32] SMP: stopping secondary CPUs [ 2502.397619][ T32] Kernel Offset: disabled [ 2502.397942][ T32] CPU features: 0x1040,000800d0,02000800,0400421b [ 2502.398373][ T32] Memory Limit: none [ 2502.399611][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 01:31:47 Registers: info registers vcpu 0 CPU#0 PC=ffff800084a87d6c X00=000000000000ffff X01=0000000000000000 X02=0000000000000000 X03=1fffe00001d223c9 X04=0000000000000000 X05=0000000000000000 X06=ffff00000e912998 X07=36cbdaad3d0903df X08=0000000000000000 X09=ffff800089773000 X10=ffff00000e9128d0 X11=1fffe00003fc907b X12=0000000000000006 X13=0000000000000000 X14=1fffe000024d1acd X15=185092243d00bae6 X16=105d00004a5fffff X17=66d0f0dbc0028b9d X18=ffff00001855eb40 X19=ffff000020e5db40 X20=ffff00001268d260 X21=0000000000000000 X22=ffff00001e2e9400 X23=ffff80008d41ce40 X24=ffff80008d41ce40 X25=1fffe000041cbb73 X26=ffff00001fe483d8 X27=ffff00001268cc80 X28=1fffe000041cbb81 X29=ffff800080006a10 X30=ffff800084a8827c SP=ffff800080006a10 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=ffffffffffffffff:ffffffffffffffff Q01=0000000000000006:00001fff01000045 Q02=0000000f00000054:0000000000000050 Q03=0000001100010015:0000000900000050 Q04=0000000600000048:0000000000000006 Q05=000000f000000054:0000000000000050 Q06=0000000000000006:0000004000010015 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffe21e7200:0000ffffe21e7200 Q17=ffffff80ffffffd8:0000ffffe21e71d0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008031b134 X00=0000000000000161 X01=0000000000000010 X02=0000000000016640 X03=1fffe00001c67791 X04=ffff800086a80f30 X05=ffff80008d997770 X06=ffff700011b32eee X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700011b32eee X11=1ffff00010e3a278 X12=ffff700010e3a279 X13=0000000000000000 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=dfff800000000000 X20=ffff80008d9979f0 X21=ffff8000871d0a40 X22=1ffff00011b32f3e X23=0000000000000000 X24=ffff80008d997a10 X25=1ffff00010fc516b X26=ffff800087e28b00 X27=ffff80008d997920 X28=0000000000000000 X29=ffff80008d9977d0 X30=ffff80008054d738 SP=ffff80008d997760 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=6572207265767265:730073250a0d0a0d Q02=742065726f6d2072:6f662064656b636f Q03=0000000000000000:00ff00ff00000000 Q04=0000000000000000:000000000f0f0000 Q05=20726f662064656b:636f6c6220353233 Q06=203a29315f657661:6c735f646e6f6220 Q07=206e612073612067:6e6976616c736e45 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff61785f0:0000fffff61785f0 Q17=ffffff80ffffffd8:0000fffff61785c0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000