last executing test programs: 1m22.820703494s ago: executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5452, &(0x7f0000001300)={{}, 0x0, 0x0, @inherit={0x0, 0x0}, @subvolid}) 1m22.170976072s ago: executing program 0: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) 1m21.733235832s ago: executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x6}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r3, &(0x7f0000000200), 0x20000000}, 0x20) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x5, 0x2, @multicast}, 0x10) recvmsg$unix(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)=""/240, 0xf0}], 0x1}, 0x0) sendmsg$inet(r1, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) 1m20.783168246s ago: executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_PROTOCOL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xffffffc7}}, 0x0) 1m20.250662404s ago: executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000006200), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000006240)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = syz_open_dev$ndb(&(0x7f0000000080), 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(r2, 0xab03) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x2eb6) syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) 10.962394922s ago: executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) getsockname(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000000)=0x80) dup3(r0, r1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000240)={'batadv_slave_0\x00'}) 10.551266509s ago: executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r0, &(0x7f0000000200)={&(0x7f0000000100), 0x10, &(0x7f00000001c0)={&(0x7f0000000140)=@canfd={{0x0, 0x1}, 0xf, 0x3, 0x0, 0x0, "5ef188eeb792dfef6cae53eebe0147d77ccad77b27a9c238d2adae94aa393becf96e63bab471d31fb6ecc6c83d582e9c4602eaa0302bba3b658c32fa39b1a502"}, 0x48}}, 0x40080) r1 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000280), 0x10) sendmsg$DEVLINK_CMD_RATE_NEW(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x20, 0x0, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [@DEVLINK_ATTR_RATE_TX_SHARE={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x20004000}, 0x40c0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f00000005c0)={0x0, 'netdevsim0\x00'}) 10.213726269s ago: executing program 1: r0 = syz_open_procfs$pagemap(0x0, &(0x7f0000000000)) lseek(r0, 0xffffffffffffff37, 0x0) lseek(r0, 0x40, 0x1) 9.87079458s ago: executing program 1: r0 = memfd_create(&(0x7f0000000740)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde%\x00\xb1\x9aF\xe2\xba[\xc7%\x88 \xeeQR\x9f\x81\x8b\xdc\xc7\xdc\xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xcef\xab\x05\x19\x96\xb9_6*-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad#\xd8b\x90\xeb\x05\x9f\t5\x06\xdd\xaf\x84\xf4\"\x13\xcf\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xcf\x7f\b\x94 2.{\xc1\xbe\x9b\x04\x00\x00\x00\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdem\xe3+q:3\xfa*\x98o\'f\xbcY\x8e?\xf9\x84y\x89Y\x1c]\xad$\x7fp\xf1\xa3\x99[\xff\x1f\x94\xc2\xdb\xbaG\xa6UD\x88Y6\x11Y\xd4\xd1\xde\x9a{]\xe2\x98W\xb9\x13\x17<\x8b!?\x8e\xbc\xae\xf9\xcc\b\x90n\x15\x7f\xd5WS\xfbN\xec)B\xe7R\xa5\xd7O\x83\x80}\xcc5\x99\xdb\xd6\xbd\x9c\x05\t\x00.\xf4\xbbeF\xa3\xea}\xf1\x86z\xca\xad\x82\xd9IRV5\xa77\'\x1a\x1c\x89\xef:\xee\x10\xb2\xd6\xc8\xf4\xb5\xdd\xd8c!@JRY\xa3|Pjk\xdc\xa5d\xc2\xecn\xc9X\xfc\xd4D\x13\"\xb2\x06\xbd&\xee0\x89\xc2\xf0\xed\xfco\xf86\xddXv\xc9\x1322L\xd6\x99\xf6\t\x9d\xbeZ\x02\xc0\xa41\xf9sNG\x02\x83\xe6Bl\xd2\x02\xfb[\x82\xc0I\xb7\xf6\xe5Z\xa1}\xee}\x8b\x89\x04\x8a\'\xc7J\xca\xdf:\x8ft\xe0\xf8\a]>\x9b6\xd0B0\x1aT\xa9\x1a\xb6\xfd}\x9cU[\x01W3C\xef\xfd\xef#\x8292\xf3P\x0e\x17\xa6a=\xbeZ\x87\xbe\xa2\xb1|\xb8\xa88?\xc3v#|\xf9\xcf\x1fut\xc2\xc0\xbci\xbb\xf7c\xb6\x94\x8e*', 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x5450, 0x0) 9.521621621s ago: executing program 1: r0 = openat$dlm_control(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 8.872883399s ago: executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$IPSET_CMD_LIST(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) 0s ago: executing program 0: r0 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x20) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:49241' (ED25519) to the list of known hosts. [ 271.699312][ T30] audit: type=1400 audit(271.190:58): avc: denied { name_bind } for pid=3199 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 272.239966][ T30] audit: type=1400 audit(271.730:59): avc: denied { execute } for pid=3201 comm="sh" name="syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 272.257912][ T30] audit: type=1400 audit(271.740:60): avc: denied { execute_no_trans } for pid=3201 comm="sh" path="/syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:04:42 fuzzer started [ 285.701411][ T30] audit: type=1400 audit(285.180:61): avc: denied { node_bind } for pid=3201 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 285.851419][ T30] audit: type=1400 audit(285.340:62): avc: denied { name_bind } for pid=3201 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 1970/01/01 00:04:45 dialing manager at localhost:30002 [ 289.531029][ T30] audit: type=1400 audit(289.020:63): avc: denied { setattr } for pid=3213 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 289.537716][ T30] audit: type=1400 audit(289.030:64): avc: denied { mounton } for pid=3215 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 289.556250][ T30] audit: type=1400 audit(289.050:65): avc: denied { mount } for pid=3215 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 289.810094][ T30] audit: type=1400 audit(289.290:66): avc: denied { mounton } for pid=3211 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1738 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 289.817624][ T30] audit: type=1400 audit(289.310:67): avc: denied { mount } for pid=3211 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 289.908202][ T3211] cgroup: Unknown subsys name 'net' [ 289.972695][ T30] audit: type=1400 audit(289.470:68): avc: denied { unmount } for pid=3211 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 290.429300][ T3218] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 290.444127][ T30] audit: type=1400 audit(289.930:69): avc: denied { relabelto } for pid=3218 comm="mkswap" name="swap-file" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 290.459970][ T30] audit: type=1400 audit(289.950:70): avc: denied { write } for pid=3218 comm="mkswap" path="/swap-file" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 290.647514][ T3211] cgroup: Unknown subsys name 'rlimit' [ 290.652518][ T3212] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:04:50 starting 2 executor processes [ 291.554060][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 291.554284][ T30] audit: type=1400 audit(291.050:73): avc: denied { execmem } for pid=3221 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 291.664229][ T30] audit: type=1400 audit(291.150:74): avc: denied { mounton } for pid=3223 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 291.675367][ T30] audit: type=1400 audit(291.170:75): avc: denied { mount } for pid=3223 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 291.694701][ T30] audit: type=1400 audit(291.190:76): avc: denied { read } for pid=3223 comm="syz-executor.0" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 291.710302][ T30] audit: type=1400 audit(291.190:77): avc: denied { open } for pid=3223 comm="syz-executor.0" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 291.726295][ T30] audit: type=1400 audit(291.220:78): avc: denied { mounton } for pid=3223 comm="syz-executor.0" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 291.823979][ T30] audit: type=1400 audit(291.320:79): avc: denied { module_request } for pid=3223 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 292.207671][ T30] audit: type=1400 audit(291.700:80): avc: denied { sys_module } for pid=3223 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 300.301687][ T3223] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 300.328481][ T3223] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 300.799585][ T3225] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 300.867155][ T3225] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.014526][ T3223] hsr_slave_0: entered promiscuous mode [ 304.087289][ T3223] hsr_slave_1: entered promiscuous mode [ 304.657169][ T3225] hsr_slave_0: entered promiscuous mode [ 304.713822][ T3225] hsr_slave_1: entered promiscuous mode [ 304.781936][ T3225] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 304.784359][ T3225] Cannot create hsr debugfs directory [ 306.884403][ T30] audit: type=1400 audit(306.380:81): avc: denied { create } for pid=3223 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 306.901017][ T30] audit: type=1400 audit(306.380:82): avc: denied { write } for pid=3223 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 306.916515][ T30] audit: type=1400 audit(306.400:83): avc: denied { read } for pid=3223 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 306.945205][ T3223] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 307.055270][ T3223] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 307.151482][ T3223] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 307.294921][ T3223] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 307.808218][ T3225] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 307.902093][ T3225] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 307.962765][ T3225] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 308.075018][ T3225] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 311.502960][ T3223] 8021q: adding VLAN 0 to HW filter on device bond0 [ 311.902940][ T3225] 8021q: adding VLAN 0 to HW filter on device bond0 [ 327.395374][ T3223] veth0_vlan: entered promiscuous mode [ 327.565710][ T3223] veth1_vlan: entered promiscuous mode [ 328.090085][ T3225] veth0_vlan: entered promiscuous mode [ 328.307165][ T3223] veth0_macvtap: entered promiscuous mode [ 328.394412][ T3225] veth1_vlan: entered promiscuous mode [ 328.467005][ T3223] veth1_macvtap: entered promiscuous mode [ 329.195696][ T3223] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.197092][ T3223] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.197585][ T3223] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.198138][ T3223] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.366907][ T3225] veth0_macvtap: entered promiscuous mode [ 329.464354][ T3225] veth1_macvtap: entered promiscuous mode [ 329.781105][ T30] audit: type=1400 audit(329.270:84): avc: denied { mounton } for pid=3223 comm="syz-executor.0" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 329.857277][ T30] audit: type=1400 audit(329.350:85): avc: denied { mount } for pid=3223 comm="syz-executor.0" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 330.234203][ T3225] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.234891][ T3225] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.235436][ T3225] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.235927][ T3225] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.922982][ T30] audit: type=1400 audit(330.410:86): avc: denied { read write } for pid=3223 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 330.927047][ T30] audit: type=1400 audit(330.410:87): avc: denied { open } for pid=3223 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 330.961192][ T30] audit: type=1400 audit(330.410:88): avc: denied { ioctl } for pid=3223 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 332.349894][ T30] audit: type=1400 audit(331.830:89): avc: denied { create } for pid=3358 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 332.380282][ T30] audit: type=1400 audit(331.870:90): avc: denied { ioctl } for pid=3358 comm="syz-executor.1" path="socket:[3604]" dev="sockfs" ino=3604 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 332.408287][ T30] audit: type=1400 audit(331.900:91): avc: denied { write } for pid=3358 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 332.715701][ T30] audit: type=1400 audit(332.210:92): avc: denied { create } for pid=3360 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 332.772305][ T30] audit: type=1400 audit(332.260:93): avc: denied { getopt } for pid=3360 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 334.832091][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 334.832331][ T30] audit: type=1400 audit(334.290:103): avc: denied { write } for pid=3367 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 336.191785][ T30] audit: type=1400 audit(335.680:104): avc: denied { create } for pid=3376 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 337.174869][ T30] audit: type=1400 audit(336.670:105): avc: denied { create } for pid=3380 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 337.233843][ T30] audit: type=1400 audit(336.720:106): avc: denied { ioctl } for pid=3380 comm="syz-executor.1" path="socket:[3641]" dev="sockfs" ino=3641 ioctlcmd=0x8953 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 338.106146][ T30] audit: type=1400 audit(337.600:107): avc: denied { write } for pid=3383 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 339.014473][ T30] audit: type=1400 audit(338.500:108): avc: denied { create } for pid=3388 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 339.034411][ T30] audit: type=1400 audit(338.530:109): avc: denied { write } for pid=3388 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 340.933407][ T30] audit: type=1400 audit(340.430:110): avc: denied { create } for pid=3396 comm="syz-executor.0" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 341.001446][ T30] audit: type=1400 audit(340.490:111): avc: denied { map } for pid=3396 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3670 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 341.013990][ T30] audit: type=1400 audit(340.500:112): avc: denied { read write } for pid=3396 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3670 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 342.935062][ T30] audit: type=1400 audit(342.420:113): avc: denied { read } for pid=3401 comm="syz-executor.1" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 342.937728][ T30] audit: type=1400 audit(342.420:114): avc: denied { open } for pid=3401 comm="syz-executor.1" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 342.963692][ T30] audit: type=1400 audit(342.460:115): avc: denied { ioctl } for pid=3401 comm="syz-executor.1" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 344.721224][ T30] audit: type=1400 audit(344.210:116): avc: denied { create } for pid=3409 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 345.491488][ T30] audit: type=1400 audit(344.980:117): avc: denied { ioctl } for pid=3411 comm="syz-executor.0" path="socket:[3703]" dev="sockfs" ino=3703 ioctlcmd=0x89a1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 349.423260][ T3423] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 349.978694][ T30] audit: type=1400 audit(349.470:118): avc: denied { mount } for pid=3425 comm="syz-executor.1" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 350.011178][ T30] audit: type=1400 audit(349.500:119): avc: denied { read write } for pid=3421 comm="syz-executor.0" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 350.029710][ T30] audit: type=1400 audit(349.520:120): avc: denied { open } for pid=3421 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 351.884115][ T1280] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 352.424932][ T1280] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 353.285025][ T1280] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 353.943615][ T1280] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 356.290257][ T30] audit: type=1400 audit(355.780:121): avc: denied { read } for pid=3054 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 358.443902][ T30] audit: type=1400 audit(357.940:122): avc: denied { read } for pid=3449 comm="syz-executor.0" name="nvme-fabrics" dev="devtmpfs" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 358.467912][ T30] audit: type=1400 audit(357.950:123): avc: denied { open } for pid=3449 comm="syz-executor.0" path="/dev/nvme-fabrics" dev="devtmpfs" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 358.545957][ T30] audit: type=1400 audit(358.040:124): avc: denied { getopt } for pid=3449 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 360.347560][ T30] audit: type=1400 audit(359.840:125): avc: denied { create } for pid=3454 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 361.626091][ T30] audit: type=1400 audit(361.120:126): avc: denied { create } for pid=3460 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 361.690184][ T30] audit: type=1400 audit(361.180:127): avc: denied { write } for pid=3460 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 361.695697][ T3461] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3461 comm=syz-executor.0 [ 361.788549][ T1280] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 361.974297][ T1280] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 362.096541][ T1280] bond0 (unregistering): Released all slaves [ 362.845315][ T1280] hsr_slave_0: left promiscuous mode [ 362.936930][ T1280] hsr_slave_1: left promiscuous mode [ 363.143826][ T1280] veth1_macvtap: left promiscuous mode [ 363.145482][ T1280] veth0_macvtap: left promiscuous mode [ 363.146532][ T1280] veth1_vlan: left promiscuous mode [ 363.147786][ T1280] veth0_vlan: left promiscuous mode [ 364.953161][ T30] audit: type=1400 audit(364.450:128): avc: denied { create } for pid=3470 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 365.020880][ T30] audit: type=1400 audit(364.510:129): avc: denied { setopt } for pid=3470 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 369.066305][ T3484] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3484 comm=syz-executor.0 [ 369.715798][ T30] audit: type=1400 audit(369.200:130): avc: denied { ioctl } for pid=3485 comm="syz-executor.0" path="socket:[3881]" dev="sockfs" ino=3881 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 370.237069][ T30] audit: type=1400 audit(369.730:131): avc: denied { read write } for pid=3487 comm="syz-executor.0" name="vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 370.252226][ T30] audit: type=1400 audit(369.740:132): avc: denied { open } for pid=3487 comm="syz-executor.0" path="/dev/vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 374.038607][ T30] audit: type=1400 audit(373.530:133): avc: denied { mounton } for pid=3499 comm="syz-executor.0" path="/syzkaller-testdir3280237850/syzkaller.PQvyfR/43/file0" dev="vda" ino=1748 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 374.775362][ T30] audit: type=1400 audit(374.270:134): avc: denied { unmount } for pid=3223 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 377.541052][ T30] audit: type=1400 audit(377.010:135): avc: denied { ioctl } for pid=3507 comm="syz-executor.0" path="/dev/iommu" dev="devtmpfs" ino=616 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 387.364529][ T3425] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 387.535225][ T3425] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 396.274713][ T3425] hsr_slave_0: entered promiscuous mode [ 396.353967][ T3425] hsr_slave_1: entered promiscuous mode [ 396.423652][ T3425] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 396.424859][ T3425] Cannot create hsr debugfs directory [ 401.527743][ T3425] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 401.658261][ T3425] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 401.822505][ T3425] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 401.961689][ T3425] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 411.456125][ T3425] 8021q: adding VLAN 0 to HW filter on device bond0 [ 421.166072][ T3656] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 431.723580][ T30] audit: type=1400 audit(431.180:136): avc: denied { write } for pid=3690 comm="syz-executor.0" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 434.952331][ T30] audit: type=1400 audit(434.450:137): avc: denied { write } for pid=3698 comm="syz-executor.0" name="snmp6" dev="proc" ino=4026532780 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 436.176113][ T30] audit: type=1400 audit(435.670:138): avc: denied { write } for pid=3705 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 436.222224][ T30] audit: type=1400 audit(435.700:139): avc: denied { read } for pid=3009 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 436.236594][ T30] audit: type=1400 audit(435.730:140): avc: denied { append } for pid=3009 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 436.238117][ T30] audit: type=1400 audit(435.730:141): avc: denied { open } for pid=3009 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 436.259659][ T30] audit: type=1400 audit(435.730:142): avc: denied { getattr } for pid=3009 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 438.937769][ T30] audit: type=1400 audit(438.430:143): avc: denied { create } for pid=3716 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 439.022915][ T30] audit: type=1400 audit(438.520:144): avc: denied { ioctl } for pid=3716 comm="syz-executor.0" path="socket:[5096]" dev="sockfs" ino=5096 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 439.075700][ T30] audit: type=1400 audit(438.570:145): avc: denied { bind } for pid=3716 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 439.125132][ T30] audit: type=1400 audit(438.620:146): avc: denied { write } for pid=3716 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 440.310591][ T3425] veth0_vlan: entered promiscuous mode [ 440.494807][ T3425] veth1_vlan: entered promiscuous mode [ 440.997470][ T3425] veth0_macvtap: entered promiscuous mode [ 441.132774][ T3425] veth1_macvtap: entered promiscuous mode [ 441.805548][ T3425] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 441.806693][ T3425] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 441.807392][ T3425] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 441.808068][ T3425] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 442.546639][ T30] audit: type=1400 audit(442.010:147): avc: denied { mounton } for pid=3425 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 443.322068][ T30] audit: type=1400 audit(442.810:148): avc: denied { create } for pid=3727 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 445.231717][ T30] audit: type=1400 audit(444.720:149): avc: denied { name_bind } for pid=3734 comm="syz-executor.1" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 445.291027][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 453.481449][ T30] audit: type=1400 audit(452.970:150): avc: denied { read } for pid=3764 comm="syz-executor.0" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 453.513652][ T30] audit: type=1400 audit(452.980:151): avc: denied { open } for pid=3764 comm="syz-executor.0" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 453.601426][ T30] audit: type=1400 audit(453.080:152): avc: denied { ioctl } for pid=3764 comm="syz-executor.0" path="/dev/usbmon0" dev="devtmpfs" ino=697 ioctlcmd=0x9208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 453.656146][ T30] audit: type=1400 audit(453.150:153): avc: denied { connect } for pid=3765 comm="syz-executor.1" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 459.802551][ T30] audit: type=1400 audit(459.300:154): avc: denied { setopt } for pid=3792 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 463.282200][ T30] audit: type=1400 audit(462.770:155): avc: denied { create } for pid=3809 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 463.336344][ T3810] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3810 comm=syz-executor.0 [ 463.355160][ T30] audit: type=1400 audit(462.830:156): avc: denied { write } for pid=3809 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 466.547267][ T30] audit: type=1400 audit(466.040:157): avc: denied { read } for pid=3818 comm="syz-executor.0" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 466.578594][ T30] audit: type=1400 audit(466.070:158): avc: denied { open } for pid=3818 comm="syz-executor.0" path="/dev/loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 466.620267][ T30] audit: type=1400 audit(466.100:159): avc: denied { ioctl } for pid=3818 comm="syz-executor.0" path="/dev/loop-control" dev="devtmpfs" ino=638 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 467.997816][ T3824] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3824 comm=syz-executor.0 [ 470.601083][ T30] audit: type=1400 audit(470.080:160): avc: denied { read } for pid=3831 comm="syz-executor.1" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 470.631897][ T30] audit: type=1400 audit(470.120:161): avc: denied { open } for pid=3831 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 470.670452][ T30] audit: type=1400 audit(470.150:162): avc: denied { map } for pid=3831 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 471.144212][ T30] audit: type=1400 audit(470.620:163): avc: denied { remount } for pid=3833 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 476.246322][ T30] audit: type=1400 audit(475.740:164): avc: denied { create } for pid=3847 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 476.274774][ T30] audit: type=1400 audit(475.760:165): avc: denied { connect } for pid=3847 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 476.843948][ T30] audit: type=1400 audit(476.330:166): avc: denied { ioctl } for pid=3847 comm="syz-executor.1" path="socket:[5476]" dev="sockfs" ino=5476 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 478.323940][ T30] audit: type=1400 audit(477.820:167): avc: denied { bind } for pid=3854 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 478.617219][ T3855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3855 comm=syz-executor.1 [ 482.585497][ T3868] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3868 comm=syz-executor.1 [ 483.131315][ T30] audit: type=1400 audit(482.610:168): avc: denied { remount } for pid=3869 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 483.138194][ T3870] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3870 comm=syz-executor.0 [ 483.231879][ T3870] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=125 sclass=netlink_route_socket pid=3870 comm=syz-executor.0 [ 487.694649][ T3888] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 487.747088][ T30] audit: type=1400 audit(487.240:169): avc: denied { getopt } for pid=3886 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 489.262053][ T30] audit: type=1400 audit(488.740:170): avc: denied { read } for pid=3893 comm="syz-executor.1" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 489.300971][ T30] audit: type=1400 audit(488.780:171): avc: denied { open } for pid=3893 comm="syz-executor.1" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 489.330585][ T30] audit: type=1400 audit(488.820:172): avc: denied { ioctl } for pid=3893 comm="syz-executor.1" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 490.153812][ T30] audit: type=1400 audit(489.650:173): avc: denied { ioctl } for pid=3897 comm="syz-executor.1" path="pid:[4026532629]" dev="nsfs" ino=4026532629 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 494.528223][ T30] audit: type=1400 audit(494.010:174): avc: denied { create } for pid=3918 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 494.540828][ T30] audit: type=1400 audit(494.030:175): avc: denied { write } for pid=3918 comm="syz-executor.0" path="socket:[5619]" dev="sockfs" ino=5619 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 501.320315][ T30] audit: type=1400 audit(500.810:176): avc: denied { mounton } for pid=3948 comm="syz-executor.0" path="/syzkaller-testdir3280237850/syzkaller.PQvyfR/150/file0" dev="vda" ino=1749 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 501.653900][ T3951] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3951 comm=syz-executor.1 [ 502.117725][ T30] audit: type=1400 audit(501.610:177): avc: denied { prog_load } for pid=3948 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 502.152755][ T30] audit: type=1400 audit(501.610:178): avc: denied { bpf } for pid=3948 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 502.154454][ T30] audit: type=1400 audit(501.650:179): avc: denied { perfmon } for pid=3948 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 506.076047][ T30] audit: type=1400 audit(505.570:180): avc: denied { read } for pid=3967 comm="syz-executor.1" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 506.077834][ T30] audit: type=1400 audit(505.570:181): avc: denied { open } for pid=3967 comm="syz-executor.1" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 506.107084][ T30] audit: type=1400 audit(505.600:182): avc: denied { ioctl } for pid=3967 comm="syz-executor.1" path="/dev/fb0" dev="devtmpfs" ino=621 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 506.471370][ T3970] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3970 comm=syz-executor.1 [ 507.334044][ T30] audit: type=1400 audit(506.810:183): avc: denied { write } for pid=3973 comm="syz-executor.1" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 507.342184][ T30] audit: type=1400 audit(506.830:184): avc: denied { ioctl } for pid=3973 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=673 ioctlcmd=0x127f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 507.714884][ T3976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3976 comm=syz-executor.1 [ 508.595956][ T3980] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3980 comm=syz-executor.1 [ 511.238170][ T30] audit: type=1400 audit(510.730:185): avc: denied { setopt } for pid=3987 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 528.000614][ T30] audit: type=1400 audit(527.490:186): avc: denied { write } for pid=4021 comm="syz-executor.1" name="uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 528.172828][ T4022] input: syz0 as /devices/virtual/input/input1 [ 539.478639][ T30] audit: type=1400 audit(538.970:187): avc: denied { read } for pid=4049 comm="syz-executor.1" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 539.483160][ T30] audit: type=1400 audit(538.970:188): avc: denied { open } for pid=4049 comm="syz-executor.1" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 539.523802][ T30] audit: type=1400 audit(539.010:189): avc: denied { ioctl } for pid=4049 comm="syz-executor.1" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 540.395028][ T30] audit: type=1400 audit(539.890:190): avc: denied { append } for pid=4053 comm="syz-executor.1" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 541.797429][ T30] audit: type=1400 audit(541.290:191): avc: denied { lock } for pid=4057 comm="syz-executor.1" path="socket:[6730]" dev="sockfs" ino=6730 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 546.454778][ T4070] VFS: Lookup of 'file0' in fuse fuse would have caused loop [ 551.578252][ T30] audit: type=1400 audit(551.070:192): avc: denied { listen } for pid=4093 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 552.145074][ T30] audit: type=1400 audit(551.640:193): avc: denied { ioctl } for pid=4093 comm="syz-executor.1" path="socket:[5962]" dev="sockfs" ino=5962 ioctlcmd=0x5569 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 553.541753][ T30] audit: type=1400 audit(553.030:194): avc: denied { read } for pid=4099 comm="syz-executor.1" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 553.596670][ T30] audit: type=1400 audit(553.080:195): avc: denied { open } for pid=4099 comm="syz-executor.1" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 553.702651][ T4100] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1550 sclass=netlink_tcpdiag_socket pid=4100 comm=syz-executor.1 [ 555.081244][ T30] audit: type=1400 audit(554.570:196): avc: denied { create } for pid=4103 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 555.105636][ T30] audit: type=1400 audit(554.600:197): avc: denied { write } for pid=4103 comm="syz-executor.1" path="socket:[5966]" dev="sockfs" ino=5966 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 557.064855][ T4110] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1550 sclass=netlink_tcpdiag_socket pid=4110 comm=syz-executor.1 [ 560.598522][ T30] audit: type=1400 audit(560.070:198): avc: denied { create } for pid=4120 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 560.637682][ T30] audit: type=1400 audit(560.130:199): avc: denied { ioctl } for pid=4120 comm="syz-executor.1" path="socket:[6808]" dev="sockfs" ino=6808 ioctlcmd=0x4504 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 562.262840][ T30] audit: type=1400 audit(561.750:200): avc: denied { setopt } for pid=4125 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 563.201870][ T30] audit: type=1400 audit(562.690:201): avc: denied { mount } for pid=4129 comm="syz-executor.0" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 565.421042][ T30] audit: type=1400 audit(564.910:202): avc: denied { write } for pid=4139 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 571.212414][ T30] audit: type=1400 audit(570.700:203): avc: denied { create } for pid=4157 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 571.292102][ T30] audit: type=1400 audit(570.790:204): avc: denied { write } for pid=4157 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 571.328295][ T30] audit: type=1400 audit(570.820:205): avc: denied { read } for pid=4157 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 576.935663][ T30] audit: type=1400 audit(576.420:206): avc: denied { read } for pid=4175 comm="syz-executor.0" name="renderD128" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 576.958403][ T30] audit: type=1400 audit(576.450:207): avc: denied { open } for pid=4175 comm="syz-executor.0" path="/dev/dri/renderD128" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 576.993806][ T30] audit: type=1400 audit(576.490:208): avc: denied { ioctl } for pid=4175 comm="syz-executor.0" path="/dev/dri/renderD128" dev="devtmpfs" ino=618 ioctlcmd=0x6414 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 586.276622][ T30] audit: type=1400 audit(585.770:209): avc: denied { read } for pid=4217 comm="syz-executor.0" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 586.277629][ T30] audit: type=1400 audit(585.770:210): avc: denied { open } for pid=4217 comm="syz-executor.0" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 586.290401][ T30] audit: type=1400 audit(585.780:211): avc: denied { ioctl } for pid=4217 comm="syz-executor.0" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 587.421358][ T30] audit: type=1400 audit(586.900:212): avc: denied { open } for pid=4221 comm="syz-executor.0" path="/dev/ptyq4" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 591.693015][ T4234] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 591.760667][ T30] audit: type=1400 audit(591.250:213): avc: denied { write } for pid=4233 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 595.784597][ T30] audit: type=1400 audit(595.280:214): avc: denied { setopt } for pid=4243 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 600.841596][ T4263] serio: Serial port ttynull [ 603.953903][ T30] audit: type=1400 audit(603.440:215): avc: denied { ioctl } for pid=4273 comm="syz-executor.0" path="/dev/vhost-net" dev="devtmpfs" ino=715 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 606.452160][ T4283] serio: Serial port ttynull [ 624.216950][ T30] audit: type=1400 audit(623.710:216): avc: denied { write } for pid=4339 comm="syz-executor.0" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 629.144730][ T30] audit: type=1400 audit(628.630:217): avc: denied { bind } for pid=4360 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 629.225916][ T30] audit: type=1400 audit(628.720:218): avc: denied { setopt } for pid=4360 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 629.268393][ T30] audit: type=1400 audit(628.760:219): avc: denied { accept } for pid=4360 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 629.372586][ T30] audit: type=1400 audit(628.860:220): avc: denied { read } for pid=4360 comm="syz-executor.1" path="socket:[7137]" dev="sockfs" ino=7137 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 630.773031][ T30] audit: type=1400 audit(630.270:221): avc: denied { ioctl } for pid=4367 comm="syz-executor.0" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7151 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 637.363024][ T30] audit: type=1400 audit(636.860:222): avc: denied { map } for pid=4394 comm="syz-executor.1" path="socket:[8216]" dev="sockfs" ino=8216 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 637.390854][ T30] audit: type=1400 audit(636.860:223): avc: denied { read } for pid=4394 comm="syz-executor.1" path="socket:[8216]" dev="sockfs" ino=8216 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 656.146681][ T30] audit: type=1400 audit(655.640:224): avc: denied { read } for pid=4440 comm="syz-executor.0" path="socket:[7730]" dev="sockfs" ino=7730 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 665.713651][ T4483] capability: warning: `syz-executor.1' uses deprecated v2 capabilities in a way that may be insecure [ 669.897806][ T30] audit: type=1400 audit(669.390:225): avc: denied { read } for pid=4502 comm="syz-executor.1" path="socket:[8343]" dev="sockfs" ino=8343 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 669.913590][ T30] audit: type=1400 audit(669.410:226): avc: denied { connect } for pid=4502 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 679.446611][ T4551] netlink: 'syz-executor.0': attribute type 11 has an invalid length. [ 679.481978][ T4551] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.0'. [ 679.696313][ T30] audit: type=1400 audit(679.190:227): avc: denied { bind } for pid=4549 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 679.762422][ T30] audit: type=1400 audit(679.220:228): avc: denied { name_bind } for pid=4549 comm="syz-executor.0" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 679.764271][ T30] audit: type=1400 audit(679.260:229): avc: denied { node_bind } for pid=4549 comm="syz-executor.0" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 679.806471][ T30] audit: type=1400 audit(679.300:230): avc: denied { write } for pid=4549 comm="syz-executor.0" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 679.847314][ T30] audit: type=1400 audit(679.320:231): avc: denied { connect } for pid=4549 comm="syz-executor.0" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 679.861498][ T30] audit: type=1400 audit(679.330:232): avc: denied { name_connect } for pid=4549 comm="syz-executor.0" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 686.040875][ T30] audit: type=1400 audit(685.530:233): avc: denied { ioctl } for pid=4577 comm="syz-executor.0" path="socket:[7983]" dev="sockfs" ino=7983 ioctlcmd=0x4501 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 689.478038][ T30] audit: type=1400 audit(688.970:234): avc: denied { getopt } for pid=4591 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 690.095388][ T30] audit: type=1400 audit(689.590:235): avc: denied { setopt } for pid=4596 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 693.503610][ T30] audit: type=1400 audit(692.990:236): avc: denied { ioctl } for pid=4605 comm="syz-executor.1" path="/dev/input/mice" dev="devtmpfs" ino=706 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 696.631608][ T4617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4617 comm=syz-executor.0 [ 700.186330][ T30] audit: type=1400 audit(699.680:237): avc: denied { read } for pid=4629 comm="syz-executor.0" path="socket:[8078]" dev="sockfs" ino=8078 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 707.555068][ T30] audit: type=1400 audit(707.050:238): avc: denied { ioctl } for pid=4649 comm="syz-executor.0" path="socket:[8585]" dev="sockfs" ino=8585 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 709.255677][ T4652] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4652 comm=syz-executor.0 [ 711.400248][ T30] audit: type=1400 audit(710.890:239): avc: denied { bind } for pid=4662 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 714.510324][ T4674] Zero length message leads to an empty skb [ 722.350419][ T30] audit: type=1400 audit(721.840:240): avc: denied { mounton } for pid=4703 comm="syz-executor.0" path="/proc/4703/task" dev="proc" ino=8648 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 722.416598][ T30] audit: type=1400 audit(721.880:241): avc: denied { mount } for pid=4703 comm="syz-executor.0" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 722.610385][ T30] audit: type=1400 audit(722.090:242): avc: denied { ioctl } for pid=4704 comm="syz-executor.1" path="socket:[8652]" dev="sockfs" ino=8652 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 722.910599][ T30] audit: type=1400 audit(722.400:243): avc: denied { ioctl } for pid=4704 comm="syz-executor.1" path="socket:[8659]" dev="sockfs" ino=8659 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 723.236305][ T30] audit: type=1400 audit(722.730:244): avc: denied { create } for pid=4704 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 727.283912][ T30] audit: type=1400 audit(726.740:245): avc: denied { name_connect } for pid=4724 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 730.574720][ T30] audit: type=1400 audit(730.060:246): avc: denied { map_create } for pid=4736 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 730.620747][ T30] audit: type=1400 audit(730.100:247): avc: denied { map_read map_write } for pid=4736 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 730.913991][ T30] audit: type=1400 audit(730.400:248): avc: denied { mount } for pid=4736 comm="syz-executor.1" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 731.483024][ T30] audit: type=1400 audit(730.970:249): avc: denied { unmount } for pid=3425 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 746.213457][ T4793] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.1'. [ 746.246249][ T4793] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 766.487608][ T30] audit: type=1400 audit(765.970:250): avc: denied { ioctl } for pid=4876 comm="syz-executor.0" path="socket:[8935]" dev="sockfs" ino=8935 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 774.712829][ T4911] sctp: [Deprecated]: syz-executor.1 (pid 4911) Use of struct sctp_assoc_value in delayed_ack socket option. [ 774.712829][ T4911] Use struct sctp_sack_info instead [ 776.678493][ T30] audit: type=1400 audit(776.170:251): avc: denied { create } for pid=4916 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 778.245114][ T4922] sctp: [Deprecated]: syz-executor.0 (pid 4922) Use of struct sctp_assoc_value in delayed_ack socket option. [ 778.245114][ T4922] Use struct sctp_sack_info instead [ 779.686742][ T30] audit: type=1400 audit(779.180:252): avc: denied { map } for pid=4925 comm="syz-executor.1" path="/dev/loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 795.543592][ T30] audit: type=1400 audit(795.030:253): avc: denied { write } for pid=4997 comm="syz-executor.0" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 806.924500][ T30] audit: type=1400 audit(806.410:254): avc: denied { create } for pid=5047 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 806.934919][ T30] audit: type=1400 audit(806.430:255): avc: denied { write } for pid=5047 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 810.625984][ T30] audit: type=1400 audit(810.120:256): avc: denied { write } for pid=5063 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 815.473240][ T5085] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=125 sclass=netlink_route_socket pid=5085 comm=syz-executor.1 [ 826.335000][ T30] audit: type=1400 audit(825.830:257): avc: denied { nlmsg_write } for pid=5126 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 829.270609][ T30] audit: type=1400 audit(828.760:258): avc: denied { ioctl } for pid=5140 comm="syz-executor.0" path="socket:[10371]" dev="sockfs" ino=10371 ioctlcmd=0x641d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 855.130491][ T30] audit: type=1400 audit(854.620:259): avc: denied { ioctl } for pid=5241 comm="syz-executor.1" path="socket:[11275]" dev="sockfs" ino=11275 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 867.887795][ T1280] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 868.301039][ T30] audit: type=1400 audit(867.760:260): avc: denied { setattr } for pid=5299 comm="syz-executor.0" name="audio1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 868.631590][ T1280] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 869.187176][ T1280] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 869.698501][ T1280] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 876.246028][ T1280] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 876.337306][ T1280] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 876.447774][ T1280] bond0 (unregistering): Released all slaves [ 877.643499][ T1280] hsr_slave_0: left promiscuous mode [ 877.768304][ T1280] hsr_slave_1: left promiscuous mode [ 877.999394][ T1280] veth1_macvtap: left promiscuous mode [ 878.000614][ T1280] veth0_macvtap: left promiscuous mode [ 878.002225][ T1280] veth1_vlan: left promiscuous mode [ 878.002974][ T1280] veth0_vlan: left promiscuous mode [ 889.678345][ T1280] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 890.235023][ T1280] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 890.683782][ T1280] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 891.103792][ T1280] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 897.466675][ T1280] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 897.734144][ T1280] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 897.915274][ T1280] bond0 (unregistering): Released all slaves [ 898.473920][ T1280] hsr_slave_0: left promiscuous mode [ 898.648144][ T1280] hsr_slave_1: left promiscuous mode [ 898.913684][ T1280] veth1_macvtap: left promiscuous mode [ 898.915713][ T1280] veth0_macvtap: left promiscuous mode [ 898.933962][ T1280] veth1_vlan: left promiscuous mode [ 898.935948][ T1280] veth0_vlan: left promiscuous mode [ 914.465457][ T5314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 914.633219][ T5314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 914.696088][ T5297] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 915.074050][ T5297] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 922.634512][ T5297] hsr_slave_0: entered promiscuous mode [ 922.718007][ T5297] hsr_slave_1: entered promiscuous mode [ 923.168022][ T5314] hsr_slave_0: entered promiscuous mode [ 923.246533][ T5314] hsr_slave_1: entered promiscuous mode [ 923.294323][ T5314] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 923.296125][ T5314] Cannot create hsr debugfs directory [ 929.967900][ T5297] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 930.112459][ T5297] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 930.188562][ T5297] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 930.291747][ T5297] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 931.131401][ T5314] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 931.198511][ T5314] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 931.343024][ T5314] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 931.441167][ T5314] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 936.142072][ T5297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 938.165001][ T5314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 957.514046][ T5297] veth0_vlan: entered promiscuous mode [ 957.743844][ T5297] veth1_vlan: entered promiscuous mode [ 958.664129][ T5297] veth0_macvtap: entered promiscuous mode [ 958.817034][ T5297] veth1_macvtap: entered promiscuous mode [ 960.038551][ T5297] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 960.053082][ T5297] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 960.053914][ T5297] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 960.054678][ T5297] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 961.298175][ T5314] veth0_vlan: entered promiscuous mode [ 961.823922][ T5314] veth1_vlan: entered promiscuous mode [ 963.135403][ T5314] veth0_macvtap: entered promiscuous mode [ 963.452043][ T5314] veth1_macvtap: entered promiscuous mode [ 964.385027][ T5516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=5516 comm=syz-executor.1 [ 964.788267][ T5314] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 964.806991][ T5314] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 964.807710][ T5314] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 964.808241][ T5314] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 969.098591][ T5530] SELinux: Context system_u:object_r:adjtime_t:s0 is not valid (left unmapped). [ 969.183325][ T30] audit: type=1400 audit(968.660:261): avc: denied { relabelto } for pid=5527 comm="syz-executor.1" name="timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:adjtime_t:s0" [ 969.221518][ T30] audit: type=1400 audit(968.710:262): avc: denied { associate } for pid=5527 comm="syz-executor.1" name="timer" dev="devtmpfs" ino=718 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:adjtime_t:s0" [ 969.353484][ T5531] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=5531 comm=syz-executor.0 [ 972.858359][ T30] audit: type=1400 audit(972.350:263): avc: denied { read } for pid=5541 comm="syz-executor.1" name="timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:adjtime_t:s0" [ 972.875501][ T30] audit: type=1400 audit(972.350:264): avc: denied { open } for pid=5541 comm="syz-executor.1" path="/dev/snd/timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:adjtime_t:s0" [ 973.732317][ T5545] serio: Serial port pts0 [ 976.318495][ T5555] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=5555 comm=syz-executor.1 [ 992.668243][ T30] audit: type=1400 audit(992.140:265): avc: denied { setopt } for pid=5622 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 995.688265][ T30] audit: type=1400 audit(995.170:266): avc: denied { create } for pid=5634 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 995.724819][ T30] audit: type=1400 audit(995.220:267): avc: denied { setopt } for pid=5634 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 996.798347][ T30] audit: type=1400 audit(996.290:268): avc: denied { checkpoint_restore } for pid=5638 comm="syz-executor.1" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1006.000540][ T30] audit: type=1400 audit(1005.490:269): avc: denied { setopt } for pid=5678 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1007.452994][ T30] audit: type=1400 audit(1006.930:270): avc: denied { read } for pid=5685 comm="syz-executor.0" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1007.457786][ T30] audit: type=1400 audit(1006.950:271): avc: denied { open } for pid=5685 comm="syz-executor.0" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1007.895265][ T1280] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1008.687847][ T1280] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1009.174369][ T1280] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1009.828478][ T1280] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1016.212924][ T30] audit: type=1400 audit(1015.710:272): avc: denied { getopt } for pid=5711 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1017.785319][ T1280] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1017.951078][ T1280] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1018.122019][ T1280] bond0 (unregistering): Released all slaves [ 1018.634785][ T1280] hsr_slave_0: left promiscuous mode [ 1018.772442][ T1280] hsr_slave_1: left promiscuous mode [ 1019.113034][ T1280] veth1_macvtap: left promiscuous mode [ 1019.116819][ T1280] veth0_macvtap: left promiscuous mode [ 1019.152524][ T1280] veth1_vlan: left promiscuous mode [ 1019.156178][ T1280] veth0_vlan: left promiscuous mode [ 1025.571518][ T30] audit: type=1400 audit(1025.070:273): avc: denied { read } for pid=5735 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1025.579478][ T5736] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2048 sclass=netlink_route_socket pid=5736 comm=syz-executor.1 [ 1027.627856][ T5744] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2048 sclass=netlink_route_socket pid=5744 comm=syz-executor.1 [ 1030.142431][ T5752] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2048 sclass=netlink_route_socket pid=5752 comm=syz-executor.1 [ 1033.966925][ T30] audit: type=1400 audit(1033.460:274): avc: denied { getopt } for pid=5763 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1047.034580][ T5685] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1047.143800][ T5685] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1050.870251][ T30] audit: type=1400 audit(1050.360:275): avc: denied { mount } for pid=5825 comm="syz-executor.1" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1054.451879][ T30] audit: type=1400 audit(1053.940:276): avc: denied { accept } for pid=5837 comm="syz-executor.1" lport=45748 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1054.546636][ T30] audit: type=1400 audit(1054.040:277): avc: denied { getopt } for pid=5837 comm="syz-executor.1" lport=45748 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 1055.406555][ T5685] hsr_slave_0: entered promiscuous mode [ 1055.483700][ T5685] hsr_slave_1: entered promiscuous mode [ 1055.578529][ T5685] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1055.580058][ T5685] Cannot create hsr debugfs directory [ 1056.812228][ T5846] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5846 comm=syz-executor.1 [ 1063.533299][ T5685] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1063.661409][ T5685] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1063.775561][ T5685] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1063.895795][ T5685] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1065.231314][ T30] audit: type=1400 audit(1064.720:278): avc: denied { append } for pid=5867 comm="syz-executor.1" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1072.925190][ T5685] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1098.490381][ T30] audit: type=1400 audit(1097.980:279): avc: denied { setattr } for pid=5972 comm="syz-executor.1" name="pfkey" dev="proc" ino=4026532706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1100.492122][ T30] audit: type=1400 audit(1099.980:280): avc: denied { bind } for pid=5978 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1102.554821][ T30] audit: type=1400 audit(1102.030:281): avc: denied { getopt } for pid=5985 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1104.390442][ T5685] veth0_vlan: entered promiscuous mode [ 1104.675243][ T5685] veth1_vlan: entered promiscuous mode [ 1105.561462][ T5685] veth0_macvtap: entered promiscuous mode [ 1105.685317][ T5685] veth1_macvtap: entered promiscuous mode [ 1106.355608][ T5685] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1106.356726][ T5685] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1106.358443][ T5685] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1106.370055][ T5685] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1110.528390][ T30] audit: type=1400 audit(1110.010:282): avc: denied { ioctl } for pid=6011 comm="syz-executor.0" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0xe501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1114.714749][ T30] audit: type=1400 audit(1114.210:283): avc: denied { ioctl } for pid=6029 comm="syz-executor.0" path="socket:[13912]" dev="sockfs" ino=13912 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 1120.952862][ T30] audit: type=1400 audit(1120.440:284): avc: denied { write } for pid=6057 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1128.839959][ C1] hrtimer: interrupt took 1576960 ns [ 1139.867927][ T6117] loop0: detected capacity change from 0 to 1024 [ 1140.185903][ T6117] EXT4-fs (loop0): warning: mounting unchecked fs, running e2fsck is recommended [ 1140.614813][ T6117] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 1140.659551][ T30] audit: type=1400 audit(1140.150:285): avc: denied { mount } for pid=6115 comm="syz-executor.0" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1141.310756][ T30] audit: type=1400 audit(1140.770:286): avc: denied { unmount } for pid=5685 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1141.506984][ T5685] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1150.903371][ T30] audit: type=1400 audit(1150.400:287): avc: denied { setopt } for pid=6147 comm="syz-executor.1" lport=39029 faddr=::ffff:100.1.1.2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 1164.033045][ T30] audit: type=1400 audit(1163.520:288): avc: denied { lock } for pid=6201 comm="syz-executor.0" path="socket:[14244]" dev="sockfs" ino=14244 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1165.451393][ T6207] serio: Serial port pts0 [ 1178.677397][ T6241] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6241 comm=syz-executor.0 [ 1180.531441][ T6250] serio: Serial port pts0 [ 1181.230344][ T6254] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6254 comm=syz-executor.1 [ 1188.927413][ T30] audit: type=1400 audit(1188.410:289): avc: denied { read } for pid=6274 comm="syz-executor.1" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1188.935698][ T30] audit: type=1400 audit(1188.430:290): avc: denied { open } for pid=6274 comm="syz-executor.1" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1194.207633][ T6293] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6293 comm=syz-executor.1 [ 1197.058435][ T6305] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6305 comm=syz-executor.0 [ 1198.050211][ T30] audit: type=1400 audit(1197.540:291): avc: denied { ioctl } for pid=6307 comm="syz-executor.0" path="socket:[15473]" dev="sockfs" ino=15473 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1199.607022][ T6317] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6317 comm=syz-executor.0 [ 1213.495689][ T6364] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6364 comm=syz-executor.0 [ 1219.320022][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1229.184017][ T30] audit: type=1400 audit(1228.640:292): avc: denied { write } for pid=6431 comm="syz-executor.1" path="socket:[15048]" dev="sockfs" ino=15048 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1234.501431][ T6454] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6454 comm=syz-executor.0 [ 1237.105604][ T30] audit: type=1400 audit(1236.600:293): avc: denied { write } for pid=6466 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1248.136006][ T30] audit: type=1400 audit(1247.610:294): avc: denied { setattr } for pid=6518 comm="syz-executor.0" name="ALG" dev="sockfs" ino=15805 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1261.164183][ T6573] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6573 comm=syz-executor.0 [ 1261.238192][ T30] audit: type=1400 audit(1260.730:295): avc: denied { remove_name } for pid=3009 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1261.250500][ T30] audit: type=1400 audit(1260.730:296): avc: denied { rename } for pid=3009 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1261.310911][ T30] audit: type=1400 audit(1260.800:297): avc: denied { create } for pid=3009 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1263.107170][ T30] audit: type=1400 audit(1262.600:298): avc: denied { ioctl } for pid=6583 comm="syz-executor.1" path="socket:[15927]" dev="sockfs" ino=15927 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1272.971986][ T30] audit: type=1400 audit(1272.460:299): avc: denied { write } for pid=6623 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1274.751485][ T6636] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5137 sclass=netlink_route_socket pid=6636 comm=syz-executor.1 [ 1277.134026][ T6648] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5137 sclass=netlink_route_socket pid=6648 comm=syz-executor.1 [ 1287.185529][ T6693] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6693 comm=syz-executor.0 [ 1292.338322][ T6709] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6709 comm=syz-executor.0 [ 1295.443877][ T6724] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6724 comm=syz-executor.1 [ 1299.505704][ T6738] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6738 comm=syz-executor.0 [ 1303.484261][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1306.076679][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1310.285931][ T30] audit: type=1400 audit(1309.780:300): avc: denied { write } for pid=6780 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1317.015124][ T6805] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6805 comm=syz-executor.0 [ 1321.524290][ T30] audit: type=1400 audit(1321.020:301): avc: denied { read } for pid=6827 comm="syz-executor.0" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1321.526385][ T30] audit: type=1400 audit(1321.020:302): avc: denied { open } for pid=6827 comm="syz-executor.0" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1323.825010][ T6838] loop1: detected capacity change from 0 to 512 [ 1323.905428][ T6838] ======================================================= [ 1323.905428][ T6838] WARNING: The mand mount option has been deprecated and [ 1323.905428][ T6838] and is ignored by this kernel. Remove the mand [ 1323.905428][ T6838] option from the mount to silence this warning. [ 1323.905428][ T6838] ======================================================= [ 1324.128381][ T6838] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a842e01c, mo2=0002] [ 1324.131937][ T6838] System zones: 1-12 [ 1324.194130][ T6838] EXT4-fs error (device loop1): ext4_get_branch:178: inode #13: block 33619980: comm syz-executor.1: invalid block [ 1324.212338][ T6838] EXT4-fs error (device loop1): ext4_free_branches:1027: inode #13: comm syz-executor.1: invalid indirect mapped block 1819239214 (level 1) [ 1324.256462][ T6838] EXT4-fs error (device loop1): ext4_validate_block_bitmap:440: comm syz-executor.1: bg 0: block 361: padding at end of block bitmap is not set [ 1324.284386][ T6838] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6551: Corrupt filesystem [ 1324.301423][ T6838] EXT4-fs error (device loop1): ext4_clear_blocks:881: inode #13: comm syz-executor.1: attempt to clear invalid blocks 33619980 len 1 [ 1324.318671][ T6838] EXT4-fs error (device loop1): ext4_free_branches:1027: inode #13: comm syz-executor.1: invalid indirect mapped block 1819239214 (level 0) [ 1324.345928][ T6838] EXT4-fs (loop1): 1 truncate cleaned up [ 1324.364624][ T6838] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1324.394182][ T6838] EXT4-fs error (device loop1): dx_probe:822: inode #2: comm syz-executor.1: Directory hole found for htree index block [ 1324.907723][ T5297] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1329.080472][ T6855] loop1: detected capacity change from 0 to 512 [ 1329.381623][ T6855] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a842e01c, mo2=0002] [ 1329.384337][ T6855] System zones: 1-12 [ 1329.506593][ T6855] EXT4-fs error (device loop1): ext4_free_branches:1027: inode #13: comm syz-executor.1: invalid indirect mapped block 1819239214 (level 1) [ 1329.563406][ T6855] EXT4-fs error (device loop1): ext4_validate_block_bitmap:440: comm syz-executor.1: bg 0: block 361: padding at end of block bitmap is not set [ 1329.631029][ T6855] EXT4-fs error (device loop1) in ext4_mb_clear_bb:6551: Corrupt filesystem [ 1329.641679][ T6855] EXT4-fs error (device loop1): ext4_clear_blocks:881: inode #13: comm syz-executor.1: attempt to clear invalid blocks 33619980 len 1 [ 1329.664823][ T6855] EXT4-fs error (device loop1): ext4_free_branches:1027: inode #13: comm syz-executor.1: invalid indirect mapped block 1819239214 (level 0) [ 1329.727682][ T6855] EXT4-fs (loop1): 1 truncate cleaned up [ 1329.797907][ T6855] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1329.885077][ T6855] EXT4-fs error (device loop1): dx_probe:822: inode #2: comm syz-executor.1: Directory hole found for htree index block [ 1330.274247][ T5297] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1336.201422][ T6886] loop0: detected capacity change from 0 to 512 [ 1336.316480][ T6886] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a842e01c, mo2=0002] [ 1336.318132][ T6886] System zones: 1-12 [ 1336.473720][ T6886] EXT4-fs error (device loop0): ext4_free_branches:1027: inode #13: comm syz-executor.0: invalid indirect mapped block 1819239214 (level 1) [ 1336.533440][ T6886] EXT4-fs error (device loop0): ext4_validate_block_bitmap:440: comm syz-executor.0: bg 0: block 361: padding at end of block bitmap is not set [ 1336.578409][ T6886] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6551: Corrupt filesystem [ 1336.625153][ T6886] EXT4-fs error (device loop0): ext4_clear_blocks:881: inode #13: comm syz-executor.0: attempt to clear invalid blocks 33619980 len 1 [ 1336.672510][ T6886] EXT4-fs error (device loop0): ext4_free_branches:1027: inode #13: comm syz-executor.0: invalid indirect mapped block 1819239214 (level 0) [ 1336.718075][ T6886] EXT4-fs (loop0): 1 truncate cleaned up [ 1336.786841][ T6886] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 1336.853112][ T6886] EXT4-fs error (device loop0): dx_probe:822: inode #2: comm syz-executor.0: Directory hole found for htree index block [ 1337.223384][ T5685] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 1337.780857][ T30] audit: type=1400 audit(1337.260:303): avc: denied { unmount } for pid=5297 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1338.128153][ T30] audit: type=1400 audit(1337.620:304): avc: denied { append } for pid=6892 comm="syz-executor.0" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1342.582117][ T30] audit: type=1400 audit(1342.050:305): avc: denied { mount } for pid=6911 comm="syz-executor.0" name="/" dev="configfs" ino=68 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1343.873477][ T30] audit: type=1400 audit(1343.370:306): avc: denied { write } for pid=6918 comm="syz-executor.1" path="socket:[16877]" dev="sockfs" ino=16877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 1350.133181][ T30] audit: type=1400 audit(1349.600:307): avc: denied { read write } for pid=6949 comm="syz-executor.0" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1350.135086][ T30] audit: type=1400 audit(1349.610:308): avc: denied { open } for pid=6949 comm="syz-executor.0" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1350.814740][ T5293] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 1351.371079][ T5293] usb 1-1: config 1 interface 0 altsetting 6 endpoint 0x81 has an invalid bInterval 48, changing to 9 [ 1351.373639][ T5293] usb 1-1: config 1 interface 0 altsetting 6 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 1351.374767][ T5293] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1351.513559][ T5293] usb 1-1: New USB device found, idVendor=04d8, idProduct=c002, bcdDevice= 0.40 [ 1351.514719][ T5293] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1351.515424][ T5293] usb 1-1: Product: 麟ﴬ䶉᪫ꗜ❡袅䖠־耹熞ﱙ邥切쯬퉽氇疧푬ꆟ፺꨻⼝癔꾨昒걎箝ᅇ莜ڜ膞▏覔ꘁ⏽涧Ɜ䕏靍꙲㕋 [ 1351.516415][ T5293] usb 1-1: Manufacturer: 䭳۔埛㇀꜄ꢀ贋蠃ᷕ៝᥃霩㙜殶⿇끹몛눎竢Ϋ彵꿪弓܉ⓐ樜툈蠫❂뚋⦲矝͑Ü軟嶰ꪄ␍ᦢ윣㘳ژత㋆崭엧 [ 1351.524277][ T5293] usb 1-1: SerialNumber: љ [ 1352.324239][ T30] audit: type=1400 audit(1351.810:309): avc: denied { accept } for pid=6949 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1352.603432][ T5293] usbhid 1-1:1.0: can't add hid device: -71 [ 1352.610293][ T5293] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 1352.724369][ T5293] usb 1-1: USB disconnect, device number 2 [ 1378.198138][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 1381.483587][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 1388.161781][ T30] audit: type=1400 audit(1387.640:310): avc: denied { getopt } for pid=7105 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1390.430341][ T7115] serio: Serial port pts0 [ 1397.121732][ T7139] mmap: syz-executor.0 (7139) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 1399.735275][ T30] audit: type=1400 audit(1399.230:311): avc: denied { write } for pid=7144 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1405.771562][ T7169] serio: Serial port pts0 [ 1406.703715][ T30] audit: type=1400 audit(1406.190:312): avc: denied { read write } for pid=7171 comm="syz-executor.1" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1406.704871][ T30] audit: type=1400 audit(1406.200:313): avc: denied { open } for pid=7171 comm="syz-executor.1" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1417.776429][ T30] audit: type=1400 audit(1417.270:314): avc: denied { write } for pid=7200 comm="syz-executor.1" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1418.955811][ T7205] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1537 sclass=netlink_xfrm_socket pid=7205 comm=syz-executor.0 [ 1421.291053][ T7217] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1537 sclass=netlink_xfrm_socket pid=7217 comm=syz-executor.0 [ 1423.733673][ T7229] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1537 sclass=netlink_xfrm_socket pid=7229 comm=syz-executor.1 [ 1425.711112][ T7239] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1537 sclass=netlink_xfrm_socket pid=7239 comm=syz-executor.0 [ 1435.797388][ T30] audit: type=1400 audit(1435.290:315): avc: denied { ioctl } for pid=7289 comm="syz-executor.1" path="socket:[18066]" dev="sockfs" ino=18066 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1435.872957][ T30] audit: type=1400 audit(1435.370:316): avc: denied { accept } for pid=7289 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1436.254097][ T7291] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7291 comm=syz-executor.1 [ 1436.274728][ T30] audit: type=1400 audit(1435.770:317): avc: denied { append } for pid=7289 comm="syz-executor.1" name="ubi_ctrl" dev="devtmpfs" ino=688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1440.425217][ T7306] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7306 comm=syz-executor.1 [ 1447.220935][ T7334] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7334 comm=syz-executor.0 [ 1450.840505][ T30] audit: type=1400 audit(1450.330:318): avc: denied { ioctl } for pid=7347 comm="syz-executor.1" path="socket:[18164]" dev="sockfs" ino=18164 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1455.216797][ T30] audit: type=1400 audit(1454.710:319): avc: denied { getopt } for pid=7365 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1474.084627][ T30] audit: type=1400 audit(1473.580:320): avc: denied { create } for pid=7405 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1474.094835][ T30] audit: type=1400 audit(1473.590:321): avc: denied { write } for pid=7405 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1477.972122][ T7423] loop0: detected capacity change from 0 to 128 [ 1478.075449][ T7423] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (39871!=39978) [ 1478.238242][ T7423] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 ro without journal. Quota mode: none. [ 1478.321361][ T7423] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 1478.326527][ T7423] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 1478.633010][ T5685] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 1532.708471][ T30] audit: type=1400 audit(1532.200:322): avc: denied { getopt } for pid=7632 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1564.353553][ T30] audit: type=1400 audit(1563.850:323): avc: denied { nlmsg_write } for pid=7770 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1566.301005][ T7784] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7784 comm=syz-executor.1 [ 1567.128328][ T30] audit: type=1400 audit(1566.620:324): avc: denied { ioctl } for pid=7787 comm="syz-executor.0" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1569.073596][ T7802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pid=7802 comm=syz-executor.1 [ 1569.231610][ T7804] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7804 comm=syz-executor.0 [ 1580.243854][ T7845] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pid=7845 comm=syz-executor.0 [ 1584.294428][ T7386] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 1584.511612][ T7386] usb 1-1: device descriptor read/64, error -71 [ 1584.813303][ T7386] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 1585.243322][ T7386] usb 1-1: device descriptor read/64, error -71 [ 1585.380557][ T7386] usb usb1-port1: attempt power cycle [ 1585.881042][ T7386] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 1585.947613][ T7386] usb 1-1: device descriptor read/8, error -71 [ 1586.271990][ T7386] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 1586.336794][ T7386] usb 1-1: device descriptor read/8, error -71 [ 1586.460098][ T7386] usb usb1-port1: unable to enumerate USB device [ 1616.885904][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1623.472946][ T8009] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8009 comm=syz-executor.1 [ 1632.500020][ T30] audit: type=1400 audit(1631.990:325): avc: denied { read } for pid=8046 comm="syz-executor.1" name="timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:adjtime_t:s0" [ 1632.515264][ T30] audit: type=1400 audit(1631.990:326): avc: denied { open } for pid=8046 comm="syz-executor.1" path="/dev/snd/timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:adjtime_t:s0" [ 1632.579931][ T30] audit: type=1400 audit(1632.050:327): avc: denied { ioctl } for pid=8046 comm="syz-executor.1" path="/dev/snd/timer" dev="devtmpfs" ino=718 ioctlcmd=0x5405 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:adjtime_t:s0" [ 1643.646632][ T30] audit: type=1400 audit(1643.140:328): avc: denied { create } for pid=8085 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1643.665785][ T30] audit: type=1400 audit(1643.140:329): avc: denied { write open } for pid=8085 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=6178 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1643.727857][ T30] audit: type=1400 audit(1643.200:330): avc: denied { append } for pid=8085 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=6178 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1643.864593][ T30] audit: type=1400 audit(1643.320:331): avc: denied { getattr } for pid=8085 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1645.080354][ T30] audit: type=1400 audit(1644.560:332): avc: denied { read } for pid=8094 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1645.693932][ T30] audit: type=1400 audit(1645.190:333): avc: denied { unlink } for pid=8099 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=6178 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1652.740598][ T8129] raw_sendmsg: syz-executor.0 forgot to set AF_INET. Fix it! [ 1665.726362][ T8188] loop0: detected capacity change from 0 to 128 [ 1665.818010][ T8188] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (39871!=39978) [ 1665.867394][ T8188] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 ro without journal. Quota mode: none. [ 1665.942481][ T8188] EXT4-fs warning (device loop0): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.0: No space for directory leaf checksum. Please run e2fsck -D. [ 1665.943642][ T8188] EXT4-fs error (device loop0): __ext4_find_entry:1693: inode #2: comm syz-executor.0: checksumming directory block 0 [ 1666.241860][ T5685] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 1702.807157][ T8294] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8294 comm=syz-executor.0 [ 1705.789928][ T30] audit: type=1400 audit(1705.270:334): avc: denied { setattr } for pid=8301 comm="syz-executor.0" name="ptmx" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 1706.884482][ T8306] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8306 comm=syz-executor.0 [ 1709.693968][ T8314] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5136 sclass=netlink_tcpdiag_socket pid=8314 comm=syz-executor.0 [ 1720.535174][ T8340] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8340 comm=syz-executor.0 [ 1729.272426][ T8364] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=8364 comm=syz-executor.0 [ 1729.334459][ T8364] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8364 comm=syz-executor.0 [ 1730.784480][ T8368] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8368 comm=syz-executor.0 [ 1732.305012][ T8373] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=8373 comm=syz-executor.1 [ 1732.345710][ T8373] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8373 comm=syz-executor.1 [ 1734.833732][ T8384] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=8384 comm=syz-executor.1 [ 1734.900872][ T8384] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8384 comm=syz-executor.1 [ 1735.322992][ T8386] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=8386 comm=syz-executor.0 [ 1737.404807][ T8396] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=8396 comm=syz-executor.1 [ 1737.508441][ T8396] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8396 comm=syz-executor.1 [ 1738.793373][ T8401] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=8401 comm=syz-executor.1 [ 1741.496468][ T8414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=8414 comm=syz-executor.0 [ 1743.977712][ T8425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=8425 comm=syz-executor.1 [ 1746.505197][ T8436] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=8436 comm=syz-executor.1 [ 1770.031929][ T8534] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8534 comm=syz-executor.1 [ 1787.460577][ T8614] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8614 comm=syz-executor.1 [ 1788.616392][ T8620] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8620 comm=syz-executor.0 [ 1790.158093][ T8627] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8627 comm=syz-executor.1 [ 1791.204292][ T8632] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8632 comm=syz-executor.0 [ 1792.931171][ T8640] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8640 comm=syz-executor.0 [ 1794.534710][ T8647] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8647 comm=syz-executor.1 [ 1795.292226][ T8652] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8652 comm=syz-executor.1 [ 1796.467663][ T8659] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8659 comm=syz-executor.0 [ 1797.344420][ T8664] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8664 comm=syz-executor.1 [ 1808.510654][ T30] audit: type=1400 audit(1808.000:335): avc: denied { watch watch_reads } for pid=8699 comm="syz-executor.0" path="/syzkaller-testdir1449073320/syzkaller.MNXhgU/648" dev="vda" ino=1741 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1815.627574][ T8718] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8718 comm=syz-executor.0 [ 1815.667645][ T8718] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8718 comm=syz-executor.0 [ 1823.147406][ T8728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8728 comm=syz-executor.0 [ 1823.261191][ T8728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8728 comm=syz-executor.0 [ 1826.545176][ T8738] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8738 comm=syz-executor.0 [ 1826.615187][ T8738] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8738 comm=syz-executor.0 [ 1829.971294][ T8748] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8748 comm=syz-executor.0 [ 1830.010448][ T8748] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8748 comm=syz-executor.0 [ 1833.518320][ T30] audit: type=1400 audit(1833.010:336): avc: denied { setopt } for pid=8757 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1844.000851][ T30] audit: type=1400 audit(1843.480:337): avc: denied { ioctl } for pid=8777 comm="syz-executor.0" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x330e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1863.735404][ T30] audit: type=1400 audit(1863.230:338): avc: denied { ioctl } for pid=8837 comm="syz-executor.0" path="socket:[23430]" dev="sockfs" ino=23430 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1869.588564][ T5701] udevd[5701]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 1902.303258][ T30] audit: type=1400 audit(1901.800:339): avc: denied { lock } for pid=8902 comm="syz-executor.1" path="/dev/virtual_nci" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1915.102746][ T30] audit: type=1400 audit(1914.600:340): avc: denied { setopt } for pid=8937 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1929.542025][ T8972] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8972 comm=syz-executor.1 [ 1933.101157][ T8982] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8982 comm=syz-executor.1 [ 1936.251705][ T8995] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1936.672548][ T8995] veth3: entered promiscuous mode [ 1936.673937][ T8995] veth3: entered allmulticast mode [ 1942.030165][ T30] audit: type=1400 audit(1941.510:341): avc: denied { bind } for pid=8993 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1948.983388][ T30] audit: type=1400 audit(1948.480:342): avc: denied { setattr } for pid=9007 comm="syz-executor.1" name="tun" dev="devtmpfs" ino=690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 1949.342475][ T9010] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1949.651385][ T9010] veth5: entered promiscuous mode [ 1949.652312][ T9010] veth5: entered allmulticast mode [ 1973.224449][ T9050] nbd1: detected capacity change from 0 to 23 [ 1974.979682][ T49] block nbd1: Receive control failed (result -104) [ 1994.452440][ T9084] sctp: [Deprecated]: syz-executor.0 (pid 9084) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1994.452440][ T9084] Use struct sctp_sack_info instead [ 2002.982736][ T9122] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9122 comm=syz-executor.0 [ 2003.565695][ T53] block nbd1: Possible stuck request 00000000981f6f01: control (read@0,4096B). Runtime 30 seconds [ 2031.795216][ T30] audit: type=1400 audit(2031.290:343): avc: denied { execute } for pid=9225 comm="syz-executor.0" path=2F6D656D66643AC0873A2A18C16BA7875BA06F383449AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EA537C9202864656C6574656429 dev="tmpfs" ino=26 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2033.624793][ T53] block nbd1: Possible stuck request 00000000981f6f01: control (read@0,4096B). Runtime 60 seconds [ 2034.287286][ T3024] udevd[3024]: worker [9013] /devices/virtual/block/nbd1 is taking a long time [ 2037.674473][ T30] audit: type=1400 audit(2037.170:344): avc: denied { write } for pid=9238 comm="syz-executor.0" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2037.675548][ T9239] random: crng reseeded on system resumption [ 2039.555789][ T9249] random: crng reseeded on system resumption [ 2044.135445][ T9273] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=23 sclass=netlink_audit_socket pid=9273 comm=syz-executor.0 [ 2053.313978][ T30] audit: type=1400 audit(2052.800:345): avc: denied { mounton } for pid=9321 comm="syz-executor.1" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2061.737158][ T9373] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9373 comm=syz-executor.0 [ 2062.526141][ T30] audit: type=1400 audit(2062.010:346): avc: denied { prog_run } for pid=9375 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2063.701502][ T53] block nbd1: Possible stuck request 00000000981f6f01: control (read@0,4096B). Runtime 90 seconds [ 2064.024393][ T9321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2064.059715][ T9321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2067.355080][ T9392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9392 comm=syz-executor.0 [ 2068.611159][ T9321] hsr_slave_0: entered promiscuous mode [ 2068.684065][ T9321] hsr_slave_1: entered promiscuous mode [ 2068.771344][ T9321] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2068.772601][ T9321] Cannot create hsr debugfs directory [ 2070.419806][ T30] audit: type=1400 audit(2069.910:347): avc: denied { map } for pid=9411 comm="syz-executor.0" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 2070.633216][ T9321] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2070.655689][ T30] audit: type=1400 audit(2070.140:348): avc: denied { write } for pid=9413 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2070.975346][ T30] audit: type=1400 audit(2070.470:349): avc: denied { append } for pid=9415 comm="syz-executor.0" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 2071.003527][ T9321] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2071.514267][ T9321] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2071.813239][ T9321] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2073.184361][ T9321] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2073.301616][ T9321] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2073.373243][ T9321] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2073.458300][ T9321] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2078.057659][ T9321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2081.991699][ T30] audit: type=1400 audit(2081.480:350): avc: denied { setattr } for pid=9469 comm="syz-executor.0" name="nbd0" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2083.295274][ T30] audit: type=1400 audit(2082.780:351): avc: denied { write } for pid=9478 comm="syz-executor.0" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2093.733795][ T9321] veth0_vlan: entered promiscuous mode [ 2093.776379][ T53] block nbd1: Possible stuck request 00000000981f6f01: control (read@0,4096B). Runtime 120 seconds [ 2093.863769][ T9321] veth1_vlan: entered promiscuous mode [ 2094.168473][ T9321] veth0_macvtap: entered promiscuous mode [ 2094.255032][ T9321] veth1_macvtap: entered promiscuous mode [ 2094.716668][ T9321] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2094.717824][ T9321] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2094.718637][ T9321] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2094.725858][ T9321] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2099.543496][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2103.446405][ T9572] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9572 comm=syz-executor.0 [ 2105.997295][ T9580] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9580 comm=syz-executor.1 [ 2106.126210][ T9582] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9582 comm=syz-executor.0 [ 2110.451417][ T9595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9595 comm=syz-executor.1 [ 2113.045060][ T9608] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9608 comm=syz-executor.1 [ 2123.713946][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2123.862340][ T53] block nbd1: Possible stuck request 00000000981f6f01: control (read@0,4096B). Runtime 150 seconds [ 2132.552823][ T30] audit: type=1400 audit(2132.050:352): avc: denied { getopt } for pid=9684 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2132.948737][ T9687] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2304 sclass=netlink_route_socket pid=9687 comm=syz-executor.1 [ 2136.995538][ T9706] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2137.631641][ T9709] nbd0: detected capacity change from 0 to 23 [ 2139.382412][ T49] block nbd0: Receive control failed (result -104) [ 2147.965012][ T30] audit: type=1400 audit(2147.460:353): avc: denied { audit_write } for pid=9746 comm="syz-executor.1" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2153.423305][ T3024] udevd[3024]: worker [9013] /devices/virtual/block/nbd1 timeout; kill it [ 2153.427517][ T3024] udevd[3024]: seq 9713 '/devices/virtual/block/nbd1' killed [ 2153.960923][ T53] block nbd1: Possible stuck request 00000000981f6f01: control (read@0,4096B). Runtime 180 seconds [ 2168.013422][ T1501] block nbd0: Possible stuck request 00000000ec71a335: control (read@0,4096B). Runtime 30 seconds [ 2183.101623][ T9902] serio: Serial port pts0 [ 2184.014593][ T53] block nbd1: Possible stuck request 00000000981f6f01: control (read@0,4096B). Runtime 210 seconds [ 2191.364368][ T9920] serio: Serial port pts0 [ 2198.104038][ T1501] block nbd0: Possible stuck request 00000000ec71a335: control (read@0,4096B). Runtime 60 seconds [ 2200.318360][ T3024] udevd[3024]: worker [9708] /devices/virtual/block/nbd0 is taking a long time [ 2208.563064][ T9978] serio: Serial port pts0 [ 2214.094988][ T53] block nbd1: Possible stuck request 00000000981f6f01: control (read@0,4096B). Runtime 240 seconds [ 2227.143556][T10000] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2227.202250][T10000] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2228.176977][ T1501] block nbd0: Possible stuck request 00000000ec71a335: control (read@0,4096B). Runtime 90 seconds [ 2231.404684][T10000] hsr_slave_0: entered promiscuous mode [ 2231.455025][T10000] hsr_slave_1: entered promiscuous mode [ 2231.502168][T10000] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2231.503486][T10000] Cannot create hsr debugfs directory [ 2232.977996][T10000] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2233.245167][T10000] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2233.482411][T10000] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2233.847490][T10000] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2234.847015][T10000] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2234.915711][T10000] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2234.987199][T10000] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2235.046567][T10000] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2238.041850][T10000] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2244.191268][ T53] block nbd1: Possible stuck request 00000000981f6f01: control (read@0,4096B). Runtime 270 seconds [ 2251.165425][T10000] veth0_vlan: entered promiscuous mode [ 2251.364094][T10000] veth1_vlan: entered promiscuous mode [ 2251.746419][T10000] veth0_macvtap: entered promiscuous mode [ 2251.783492][T10000] veth1_macvtap: entered promiscuous mode [ 2252.178515][T10000] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2252.185388][T10000] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2252.186256][T10000] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2252.187028][T10000] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2258.254889][ T1501] block nbd0: Possible stuck request 00000000ec71a335: control (read@0,4096B). Runtime 120 seconds [ 2271.514154][ T30] audit: type=1400 audit(2271.010:354): avc: denied { rename } for pid=10162 comm="syz-executor.0" name="file0" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2271.516124][ T30] audit: type=1400 audit(2271.010:355): avc: denied { unlink } for pid=10162 comm="syz-executor.0" name="file0" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2274.256470][ T53] block nbd1: Possible stuck request 00000000981f6f01: control (read@0,4096B). Runtime 300 seconds [ 2288.341337][ T1501] block nbd0: Possible stuck request 00000000ec71a335: control (read@0,4096B). Runtime 150 seconds [ 2304.361790][ T53] block nbd1: Possible stuck request 00000000981f6f01: control (read@0,4096B). Runtime 330 seconds [ 2308.495905][T10286] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2308.577387][T10286] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2313.287838][T10286] hsr_slave_0: entered promiscuous mode [ 2313.364965][T10286] hsr_slave_1: entered promiscuous mode [ 2313.422151][T10286] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2313.423674][T10286] Cannot create hsr debugfs directory [ 2315.223227][T10286] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2315.515794][T10286] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2315.786291][T10286] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2316.014846][T10286] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2316.837136][T10286] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2316.907390][T10286] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2316.967940][T10286] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2317.026580][T10286] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2318.425022][ T1501] block nbd0: Possible stuck request 00000000ec71a335: control (read@0,4096B). Runtime 180 seconds [ 2320.103716][ T3024] udevd[3024]: worker [9708] /devices/virtual/block/nbd0 timeout; kill it [ 2320.106279][ T3024] udevd[3024]: seq 10109 '/devices/virtual/block/nbd0' killed [ 2320.601138][T10286] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2333.042964][T10286] veth0_vlan: entered promiscuous mode [ 2333.175197][T10286] veth1_vlan: entered promiscuous mode [ 2333.589366][T10286] veth0_macvtap: entered promiscuous mode [ 2333.647578][T10286] veth1_macvtap: entered promiscuous mode [ 2334.018074][T10286] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2334.021565][T10286] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2334.022371][T10286] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2334.023124][T10286] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2334.421073][ T53] block nbd1: Possible stuck request 00000000981f6f01: control (read@0,4096B). Runtime 360 seconds [ 2341.380593][ T30] audit: type=1400 audit(2340.870:356): avc: denied { sqpoll } for pid=10380 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2348.533683][ T1501] block nbd0: Possible stuck request 00000000ec71a335: control (read@0,4096B). Runtime 210 seconds [ 2363.544861][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2364.508636][ T53] block nbd1: Possible stuck request 00000000981f6f01: control (read@0,4096B). Runtime 390 seconds [ 2370.041358][ T30] audit: type=1400 audit(2369.530:357): avc: denied { ioctl } for pid=10495 comm="syz-executor.1" path="socket:[29725]" dev="sockfs" ino=29725 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2373.362048][ T1280] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2373.811649][ T1280] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2374.202767][ T1280] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2374.564473][ T1280] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2378.591129][ T1501] block nbd0: Possible stuck request 00000000ec71a335: control (read@0,4096B). Runtime 240 seconds [ 2379.666083][ T1280] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2379.772788][ T1280] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2379.888371][ T1280] bond0 (unregistering): Released all slaves [ 2380.337796][ T1280] hsr_slave_0: left promiscuous mode [ 2380.405331][ T1280] hsr_slave_1: left promiscuous mode [ 2380.614502][ T1280] veth1_macvtap: left promiscuous mode [ 2380.615292][ T1280] veth0_macvtap: left promiscuous mode [ 2380.616238][ T1280] veth1_vlan: left promiscuous mode [ 2380.617203][ T1280] veth0_vlan: left promiscuous mode [ 2394.598588][ T53] block nbd1: Possible stuck request 00000000981f6f01: control (read@0,4096B). Runtime 420 seconds [ 2398.394457][T10508] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2398.495710][T10508] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2403.812453][T10523] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2403.921743][T10523] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2405.494064][T10508] hsr_slave_0: entered promiscuous mode [ 2405.584670][T10508] hsr_slave_1: entered promiscuous mode [ 2405.642615][T10508] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2405.643828][T10508] Cannot create hsr debugfs directory [ 2408.664250][ T1501] block nbd0: Possible stuck request 00000000ec71a335: control (read@0,4096B). Runtime 270 seconds [ 2410.887618][T10508] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2411.103036][T10508] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2411.182620][T10508] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2411.282425][T10508] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2412.027390][T10523] hsr_slave_0: entered promiscuous mode [ 2412.094021][T10523] hsr_slave_1: entered promiscuous mode [ 2412.144381][T10523] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2412.145592][T10523] Cannot create hsr debugfs directory [ 2415.118449][T10523] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2415.657859][T10523] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2416.258185][T10523] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2416.712806][T10523] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2418.814316][T10523] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2418.893714][T10523] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2419.054116][T10508] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2419.058621][T10523] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2419.215332][T10523] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2419.532961][ T31] INFO: task udevd:9013 blocked for more than 430 seconds. [ 2419.534642][ T31] Not tainted 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 [ 2419.535536][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2419.536508][ T31] task:udevd state:D stack:0 pid:9013 tgid:9013 ppid:3024 flags:0x0000000d [ 2419.568123][ T31] Call trace: [ 2419.580238][ T31] __switch_to+0x1c8/0x2a0 [ 2419.582076][ T31] __schedule+0xad4/0x2b18 [ 2419.582528][ T31] schedule+0xd0/0x304 [ 2419.583000][ T31] schedule_preempt_disabled+0x18/0x2c [ 2419.583493][ T31] __mutex_lock+0x4e8/0x840 [ 2419.583941][ T31] mutex_lock_nested+0x24/0x30 [ 2419.584356][ T31] bdev_open+0x2c4/0xa48 [ 2419.584796][ T31] blkdev_open+0x114/0x194 [ 2419.585248][ T31] do_dentry_open+0x510/0x12e8 [ 2419.585643][ T31] vfs_open+0x54/0x8c [ 2419.586083][ T31] path_openat+0x14a0/0x20ec [ 2419.586525][ T31] do_filp_open+0x16c/0x330 [ 2419.586976][ T31] do_sys_openat2+0x12c/0x160 [ 2419.587369][ T31] __arm64_sys_openat+0x12c/0x1b8 [ 2419.587790][ T31] invoke_syscall+0x6c/0x25c [ 2419.588194][ T31] el0_svc_common.constprop.0+0xac/0x230 [ 2419.588594][ T31] do_el0_svc+0x40/0x58 [ 2419.612116][ T31] el0_svc+0x50/0x180 [ 2419.612643][ T31] el0t_64_sync_handler+0x100/0x12c [ 2419.613215][ T31] el0t_64_sync+0x190/0x194 [ 2419.613861][ T31] INFO: task syz-executor.1:9047 blocked for more than 430 seconds. [ 2419.614407][ T31] Not tainted 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 [ 2419.614879][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2419.615388][ T31] task:syz-executor.1 state:D stack:0 pid:9047 tgid:9047 ppid:5297 flags:0x00000005 [ 2419.616108][ T31] Call trace: [ 2419.616468][ T31] __switch_to+0x1c8/0x2a0 [ 2419.617025][ T31] __schedule+0xad4/0x2b18 [ 2419.617599][ T31] schedule+0xd0/0x304 [ 2419.618158][ T31] schedule_preempt_disabled+0x18/0x2c 1970/01/01 00:40:19 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 2419.618679][ T31] __mutex_lock+0x4e8/0x840 [ 2419.676201][ T31] mutex_lock_nested+0x24/0x30 [ 2419.676910][ T31] bdev_release+0x104/0x510 [ 2419.677483][ T31] blkdev_release+0x14/0x24 [ 2419.678045][ T31] __fput+0x2bc/0x95c [ 2419.678592][ T31] ____fput+0x10/0x1c [ 2419.705923][ T31] task_work_run+0x124/0x20c [ 2419.706705][ T31] do_notify_resume+0x1d4/0x25c [ 2419.707275][ T31] el0_svc+0x100/0x180 [ 2419.707863][ T31] el0t_64_sync_handler+0x100/0x12c [ 2419.708410][ T31] el0t_64_sync+0x190/0x194 [ 2419.751891][ T31] INFO: task syz-executor.1:9048 blocked for more than 430 seconds. [ 2419.753045][ T31] Not tainted 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 [ 2419.753674][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2419.754297][ T31] task:syz-executor.1 state:D stack:0 pid:9048 tgid:9047 ppid:5297 flags:0x0000000d [ 2419.755186][ T31] Call trace: [ 2419.755653][ T31] __switch_to+0x1c8/0x2a0 [ 2419.756942][ T31] __schedule+0xad4/0x2b18 [ 2419.757564][ T31] schedule+0xd0/0x304 [ 2419.758102][ T31] schedule_preempt_disabled+0x18/0x2c [ 2419.790972][ T31] __mutex_lock+0x4e8/0x840 [ 2419.791813][ T31] mutex_lock_nested+0x24/0x30 [ 2419.792410][ T31] bdev_release+0x104/0x510 [ 2419.793017][ T31] blkdev_release+0x14/0x24 [ 2419.793668][ T31] __fput+0x2bc/0x95c [ 2419.794660][ T31] ____fput+0x10/0x1c [ 2419.795210][ T31] task_work_run+0x124/0x20c [ 2419.795816][ T31] do_notify_resume+0x1d4/0x25c [ 2419.796362][ T31] el0_svc+0x100/0x180 [ 2419.796953][ T31] el0t_64_sync_handler+0x100/0x12c [ 2419.797499][ T31] el0t_64_sync+0x190/0x194 [ 2419.798371][ T31] INFO: task syz-executor.1:9050 blocked for more than 430 seconds. [ 2419.837836][ T31] Not tainted 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 [ 2419.847820][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2419.864403][ T31] task:syz-executor.1 state:D stack:0 pid:9050 tgid:9047 ppid:5297 flags:0x0000000d [ 2419.865691][ T31] Call trace: [ 2419.866569][ T31] __switch_to+0x1c8/0x2a0 [ 2419.867224][ T31] __schedule+0xad4/0x2b18 [ 2419.867840][ T31] schedule+0xd0/0x304 [ 2419.868433][ T31] io_schedule+0xac/0x114 [ 2419.893965][ T31] folio_wait_bit_common+0x2a8/0x6d0 [ 2419.894994][ T31] do_read_cache_folio+0x204/0x42c [ 2419.895588][ T31] read_cache_folio+0x44/0x6c [ 2419.896209][ T31] read_part_sector+0xac/0x2b0 [ 2419.896844][ T31] msdos_partition+0x10c/0x1df8 [ 2419.897447][ T31] bdev_disk_changed+0x504/0xebc [ 2419.898545][ T31] blkdev_get_whole+0x144/0x1e4 [ 2419.921020][ T31] bdev_open+0x1dc/0xa48 [ 2419.921925][ T31] blkdev_open+0x114/0x194 [ 2419.922481][ T31] do_dentry_open+0x510/0x12e8 [ 2419.923034][ T31] vfs_open+0x54/0x8c [ 2419.923585][ T31] path_openat+0x14a0/0x20ec [ 2419.924133][ T31] do_filp_open+0x16c/0x330 [ 2419.924663][ T31] do_sys_openat2+0x12c/0x160 [ 2419.925237][ T31] __arm64_sys_openat+0x12c/0x1b8 [ 2419.925779][ T31] invoke_syscall+0x6c/0x25c [ 2419.926301][ T31] el0_svc_common.constprop.0+0xac/0x230 [ 2419.927537][ T31] do_el0_svc+0x40/0x58 [ 2419.928167][ T31] el0_svc+0x50/0x180 [ 2419.976104][ T31] el0t_64_sync_handler+0x100/0x12c [ 2419.977051][ T31] el0t_64_sync+0x190/0x194 [ 2420.013927][ T31] [ 2420.013927][ T31] Showing all locks held in the system: [ 2420.015169][ T31] 1 lock held by khungtaskd/31: [ 2420.015777][ T31] #0: ffff800086a8e100 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x44/0x2d4 [ 2420.018855][ T31] 2 locks held by getty/3144: [ 2420.033675][ T31] #0: ffff000012e1c0a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 2420.045357][ T31] #1: ffff80008990d2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x93c/0xe9c [ 2420.046959][ T31] 2 locks held by syz-fuzzer/3217: [ 2420.047616][ T31] 1 lock held by udevd/9013: [ 2420.048157][ T31] #0: ffff000010bf34c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa48 [ 2420.092245][ T31] 3 locks held by kworker/u8:1/9029: [ 2420.092848][ T31] 1 lock held by syz-executor.1/9047: [ 2420.093495][ T31] #0: ffff000010bf34c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0x104/0x510 [ 2420.094965][ T31] 1 lock held by syz-executor.1/9048: [ 2420.095553][ T31] #0: ffff000010bf34c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0x104/0x510 [ 2420.096996][ T31] 1 lock held by syz-executor.1/9050: [ 2420.097545][ T31] #0: ffff000010bf34c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa48 [ 2420.165823][ T31] 1 lock held by syz-executor.0/9705: [ 2420.166627][ T31] #0: ffff000010bf14c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0x104/0x510 [ 2420.242044][ T31] 1 lock held by syz-executor.0/9707: [ 2420.242882][ T31] #0: ffff000010bf14c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0x104/0x510 [ 2420.244384][ T31] 1 lock held by syz-executor.0/9709: [ 2420.244958][ T31] #0: ffff000010bf14c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa48 [ 2420.247644][ T31] 1 lock held by udevd/9708: [ 2420.300790][ T31] #0: ffff000010bf14c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0x104/0x510 [ 2420.302679][ T31] 1 lock held by syz-executor.1/10006: [ 2420.303268][ T31] #0: ffff000010bf34c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa48 [ 2420.304640][ T31] 1 lock held by syz-executor.1/10009: [ 2420.306478][ T31] #0: ffff000010bf34c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa48 [ 2420.308356][ T31] 1 lock held by syz-executor.1/10011: [ 2420.360532][ T31] #0: ffff000010bf34c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa48 [ 2420.362470][ T31] 1 lock held by syz-executor.0/10297: [ 2420.363048][ T31] #0: ffff000010bf14c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa48 [ 2420.364463][ T31] 1 lock held by syz-executor.0/10299: [ 2420.365035][ T31] #0: ffff000010bf14c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa48 [ 2420.366375][ T31] 1 lock held by syz-executor.0/10301: [ 2420.366962][ T31] #0: ffff000010bf14c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa48 [ 2420.368297][ T31] 3 locks held by kworker/1:5/10359: [ 2420.425708][ T31] #0: ffff00006a67cb58 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x268/0x2b18 [ 2420.427510][ T31] #1: ffff00006a667f08 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x254/0x748 [ 2420.452417][ T31] #2: ffff000020851240 (&data->fib_lock){+.+.}-{3:3}, at: nsim_fib_event_work+0x15c/0x20f0 [ 2420.454233][ T31] 1 lock held by syz-executor.1/10508: [ 2420.454781][ T31] #0: ffff800086a96cb8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x24c/0x36c [ 2420.456127][ T31] 2 locks held by kworker/u8:2/10511: [ 2420.456626][ T31] #0: ffff000009c31148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x6dc/0x18a0 [ 2420.458006][ T31] #1: ffff80008e0d7ce0 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x704/0x18a0 [ 2420.493575][ T31] 1 lock held by syz-executor.0/10523: [ 2420.494295][ T31] #0: ffff800086a96cb8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: exp_funnel_lock+0x19c/0x36c [ 2420.495256][ T31] 2 locks held by modprobe/10615: [ 2420.495533][ T31] 3 locks held by dhcpcd-run-hook/10616: [ 2420.495840][ T31] 2 locks held by modprobe/10617: [ 2420.496118][ T31] 1 lock held by modprobe/10619: [ 2420.521200][ T31] [ 2420.521679][ T31] ============================================= [ 2420.521679][ T31] [ 2420.522444][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 2420.523623][ T31] CPU: 1 PID: 31 Comm: khungtaskd Not tainted 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 [ 2420.524300][ T31] Hardware name: linux,dummy-virt (DT) [ 2420.524785][ T31] Call trace: [ 2420.525066][ T31] dump_backtrace+0x9c/0x11c [ 2420.525340][ T31] show_stack+0x18/0x24 [ 2420.525556][ T31] dump_stack_lvl+0x38/0xf4 [ 2420.525795][ T31] dump_stack+0x1c/0x28 [ 2420.526012][ T31] panic+0x5c4/0x64c [ 2420.526224][ T31] watchdog+0x4bc/0xd68 [ 2420.526433][ T31] kthread+0x27c/0x300 [ 2420.526644][ T31] ret_from_fork+0x10/0x20 [ 2420.527243][ T31] SMP: stopping secondary CPUs [ 2420.528960][ T31] Kernel Offset: disabled [ 2420.529609][ T31] CPU features: 0x04,40001001,a0100000,0200421b [ 2420.530532][ T31] Memory Limit: none [ 2420.531675][ T31] Rebooting in 86400 seconds.. VM DIAGNOSIS: 04:28:32 Registers: info registers vcpu 0 CPU#0 PC=ffff800084f44084 X00=ffff800084f44080 X01=0000000000000003 X02=0000000000000000 X03=1fffe0000281ab41 X04=1fffe0000175a7ab X05=dfff800000000000 X06=0000000000000003 X07=dfff800000000000 X08=dfff800000000000 X09=1fffe0000d4c89e7 X10=ffff80008689fb60 X11=0000000000000000 X12=1ffff0001102976e X13=0000000000000004 X14=0000000000000111 X15=1fffe0000281ac8f X16=0000000000000006 X17=902c48f6cb2f7685 X18=ffff0000140d6480 X19=ffff800086ac7f70 X20=ffff800086ac7f40 X21=0000000000000000 X22=0000000000000004 X23=0000000000000028 X24=ffff800086ac7f70 X25=1fffe00001e0cf33 X26=ffff00000f067998 X27=0000000000000001 X28=1fffe00001e0cf20 X29=ffff800080006740 X30=ffff800084f42828 SP=ffff800080006740 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2f2f2f2f2f2f2f2f:2f2f2f2f2f2f2f2f Q01=635f666900706368:642e326874652e66 Q02=00000000c0000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=3003300330033003:3003300330033003 Q05=0000c00000000000:0000c00000000000 Q06=ccccccccccc00003:ccccccccccc00003 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800084f40920 X00=ffff800089d07af0 X01=00000000000000c0 X02=0000000000000000 X03=0000000000000000 X04=1fffe00001464b41 X05=ffff00006a668010 X06=ffff60000d4cd002 X07=0000000000000001 X08=ffff00006a668013 X09=dfff800000000000 X10=ffff60000d4cd002 X11=1fffe0000d4cd002 X12=ffff60000d4cd003 X13=0000000000000004 X14=0000000000000000 X15=1fffe00001464c8f X16=0000000000000006 X17=7070202033313039 X18=ffff00000a326480 X19=ffff800089d07af0 X20=ffff800080010000 X21=ffff800089d07c40 X22=ffff80008021d784 X23=0000000060000005 X24=ffff00000e9f8018 X25=1fffe00001d3f003 X26=ffff00000e9f8870 X27=0000000000000002 X28=ffff00000a325a00 X29=ffff800089d07ac0 X30=ffff800084f410ac SP=ffff800089d07ac0 PSTATE=000000c5 ---- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=ffffff0000000000:ffffff0000000000 Q02=0000000000000000:fff00000fff00000 Q03=ffffffff00ff0000:0000000000000000 Q04=0000000000000000:ffff0f0000000000 Q05=bb448243222c92da:e3914ed4e87380b0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=43788d6f07084f17:4508b00c6052a10f Q17=6b69be1163cb6500:a4ac85c293540e63 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000