last executing test programs: 1m59.906704592s ago: executing program 1 (id=1912): r0 = openat$kvm(0x0, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_kvm_setup_syzos_vm(r1, &(0x7f0000c00000/0x400000)=nil) r3 = syz_kvm_add_vcpu(r2, &(0x7f0000000080)={0x0, &(0x7f00000000c0)=[@msr={0x2, 0x20, {0x603000000013c600, 0xfefefee0}}], 0x20}, 0x0, 0x0) r4 = ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) r5 = mmap$KVM_VCPU(&(0x7f0000009000/0x1000)=nil, r4, 0x3, 0x11, r3, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_assert_syzos_uexit(r5, 0xffffffffffffffff) syz_kvm_assert_reg(r3, 0x603000000013c600, 0xfefefee0) 1m59.616831851s ago: executing program 1 (id=1913): r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = accept4$inet(r1, 0x0, 0x0, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$KDFONTOP_COPY(r3, 0x5450, 0x0) 1m58.889592031s ago: executing program 1 (id=1915): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) r1 = socket(0x1, 0x3, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) truncate(0x0, 0x0) socket$unix(0x1, 0x0, 0x0) recvmsg$inet_nvme(r1, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}, 0x0) close(r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0x5450, 0x0) 1m56.058189787s ago: executing program 1 (id=1918): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r2, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept$unix(r2, 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0x5450, 0x0) 1m55.908000691s ago: executing program 1 (id=1919): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7e12ddc5a89047bf00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$HIDIOCGFEATURE(r2, 0xc0404807, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) 1m40.659616125s ago: executing program 1 (id=1929): r0 = syz_usb_connect$hid(0x2, 0x3f, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1b96, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{}, [{}]}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000d40)={0x2c, &(0x7f0000000780)=ANY=[@ANYBLOB='\x00\x00\a\x00\x00\x00\a\x00'], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000280), 0x0, 0x4a141) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, &(0x7f0000000500)={0x0, 0x3, 0x2, @string={0x2}}, 0x0, &(0x7f0000000140)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x0, 0x1, {0x22, 0x892}}}}, &(0x7f0000000700)={0x2c, &(0x7f0000000600)={0x20, 0x14, 0x89, "7d04722499c4c3d79931ac86d91d6ff1565f8ad2b96ec19890783766ac31fa4076724df49ebee7df247f5ccc19651f5838d66793bf0617fabc3cd04de7c883bf9b771df052d6dbbd4d4e86046bebbb8700ced20c684fdd145f5c8357ddb98253c1165333beac22d331691655f88fd7acd44ead878a60cd9257f8bf812723795d67ca631244195909f4"}, &(0x7f0000000200)={0x0, 0xa, 0x1}, 0x0, 0x0, 0x0}) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="56e5566b20", 0x5}], 0x1, 0xf739, 0x0) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0}) timer_settime(r2, 0x0, &(0x7f0000000080)={{}, {r3}}, 0x0) timer_getoverrun(r2) 55.126205356s ago: executing program 32 (id=1929): r0 = syz_usb_connect$hid(0x2, 0x3f, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1b96, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x5, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{}, [{}]}}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000d40)={0x2c, &(0x7f0000000780)=ANY=[@ANYBLOB='\x00\x00\a\x00\x00\x00\a\x00'], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000280), 0x0, 0x4a141) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, &(0x7f0000000500)={0x0, 0x3, 0x2, @string={0x2}}, 0x0, &(0x7f0000000140)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0x0, 0x1, {0x22, 0x892}}}}, &(0x7f0000000700)={0x2c, &(0x7f0000000600)={0x20, 0x14, 0x89, "7d04722499c4c3d79931ac86d91d6ff1565f8ad2b96ec19890783766ac31fa4076724df49ebee7df247f5ccc19651f5838d66793bf0617fabc3cd04de7c883bf9b771df052d6dbbd4d4e86046bebbb8700ced20c684fdd145f5c8357ddb98253c1165333beac22d331691655f88fd7acd44ead878a60cd9257f8bf812723795d67ca631244195909f4"}, &(0x7f0000000200)={0x0, 0xa, 0x1}, 0x0, 0x0, 0x0}) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000080)="56e5566b20", 0x5}], 0x1, 0xf739, 0x0) timer_create(0xfffffffd, 0x0, &(0x7f0000000040)=0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0}) timer_settime(r2, 0x0, &(0x7f0000000080)={{}, {r3}}, 0x0) timer_getoverrun(r2) 53.386421085s ago: executing program 0 (id=1983): r0 = memfd_create(&(0x7f0000000300)='c\x9c\\\xd4\xa4-K\x98.U\xb4#\xe1)\x94:\x04\xff\x96\x13\xae\x83\x1d##\xe8A\x0fB\x13\xb7\xc9\xcc\x8c\xacn(sN\xe4\xfb?\xc5\xd0\"`\n\x98\xe7\xfc\xfb\x8fY\xa8\xc8\xa6\xe7\x97\xac3\'\x02m\xc1\xbfBR\xbe\xef\xb16\xe57\xb9\x13\xc4\x81j\x10\xaf\x95e|\x90\xf7\x99V\xfa\xc0&\xf2\xb8N\xb6\x01#\xe2\x8c`QV\x9eA\xe4\x88C\x81\xc5\x01P\xd1^=', 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x5451, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$cgroup(0x20000002, &(0x7f0000000780)='./file0\x00', 0x0, 0x1100, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100)={[0x8]}, 0x8, 0x80800) getresgid(&(0x7f0000000180), 0x0, &(0x7f0000000200)) msgget$private(0x0, 0x0) openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder-control\x00', 0x7622f9dba490a24a, 0x0) r1 = mq_open(&(0x7f00000005c0)='trusted>overlay.up\xdder\x00', 0x40, 0x0, 0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x2}) 53.155697508s ago: executing program 0 (id=1984): openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5450, 0x0) mlockall(0x1) socketpair(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r1, r2, 0x0) socket$inet6(0xa, 0x2, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000000)={@broadcast, @loopback}, &(0x7f0000000040)=0xc) r3 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000002380)) 48.997206343s ago: executing program 0 (id=1985): timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000180)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "0000000000000000000080ffffffffffff00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) r2 = dup(r1) ioctl$IOMMU_IOAS_ALLOW_IOVAS(r2, 0x3b82, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) 47.197848738s ago: executing program 0 (id=1986): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r1, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000040)=0x80) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = accept$unix(r2, 0x0, 0x0) ioctl$FIOCLEX(r4, 0x5451) 47.030194914s ago: executing program 0 (id=1987): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)) r2 = dup(r1) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 45.207781421s ago: executing program 0 (id=1988): socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x3938700}, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000400)={'ipvlan1\x00', 0x2}) pread64(r1, 0x0, 0x0, 0x0) 0s ago: executing program 33 (id=1988): socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x3938700}, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f00000004c0)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000400)={'ipvlan1\x00', 0x2}) pread64(r1, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:26237' (ED25519) to the list of known hosts. [ 134.020857][ T30] audit: type=1400 audit(133.690:58): avc: denied { name_bind } for pid=3295 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 134.327798][ T30] audit: type=1400 audit(134.010:59): avc: denied { execute } for pid=3297 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 134.334005][ T30] audit: type=1400 audit(134.020:60): avc: denied { execute_no_trans } for pid=3297 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 138.094345][ T30] audit: type=1400 audit(137.780:61): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 138.107944][ T30] audit: type=1400 audit(137.790:62): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 138.156251][ T3297] cgroup: Unknown subsys name 'net' [ 138.184810][ T30] audit: type=1400 audit(137.870:63): avc: denied { unmount } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 138.563739][ T3297] cgroup: Unknown subsys name 'cpuset' [ 138.602223][ T3297] cgroup: Unknown subsys name 'rlimit' [ 138.985419][ T30] audit: type=1400 audit(138.670:64): avc: denied { setattr } for pid=3297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 138.993626][ T30] audit: type=1400 audit(138.680:65): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 138.997768][ T30] audit: type=1400 audit(138.680:66): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 139.302150][ T3299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 139.307534][ T30] audit: type=1400 audit(138.990:67): avc: denied { relabelto } for pid=3299 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 139.312632][ T30] audit: type=1400 audit(139.000:68): avc: denied { write } for pid=3299 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 139.395165][ T30] audit: type=1400 audit(139.080:69): avc: denied { read } for pid=3297 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 139.405123][ T30] audit: type=1400 audit(139.080:70): avc: denied { open } for pid=3297 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 139.422589][ T3297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 147.845541][ T30] audit: type=1400 audit(147.530:71): avc: denied { execmem } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 147.932499][ T30] audit: type=1400 audit(147.620:72): avc: denied { read } for pid=3302 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 147.934937][ T30] audit: type=1400 audit(147.620:73): avc: denied { open } for pid=3302 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 147.949315][ T30] audit: type=1400 audit(147.630:74): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 148.001245][ T30] audit: type=1400 audit(147.690:75): avc: denied { module_request } for pid=3302 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 148.196436][ T30] audit: type=1400 audit(147.880:76): avc: denied { sys_module } for pid=3302 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 152.161234][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 152.196686][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 152.514816][ T3304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 152.541161][ T3304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 153.981622][ T3302] hsr_slave_0: entered promiscuous mode [ 153.987518][ T3302] hsr_slave_1: entered promiscuous mode [ 154.346414][ T3304] hsr_slave_0: entered promiscuous mode [ 154.357373][ T3304] hsr_slave_1: entered promiscuous mode [ 154.364732][ T3304] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 154.365797][ T3304] Cannot create hsr debugfs directory [ 155.571709][ T30] audit: type=1400 audit(155.250:77): avc: denied { create } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 155.572922][ T30] audit: type=1400 audit(155.250:78): avc: denied { write } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 155.573480][ T30] audit: type=1400 audit(155.250:79): avc: denied { read } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 155.594160][ T3302] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 155.669095][ T3302] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 155.701876][ T3302] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 155.743850][ T3302] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 156.001070][ T3304] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 156.059306][ T3304] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 156.082904][ T3304] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 156.125816][ T3304] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 157.843782][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.015109][ T3304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.365436][ T3302] veth0_vlan: entered promiscuous mode [ 163.442815][ T3302] veth1_vlan: entered promiscuous mode [ 163.619597][ T3304] veth0_vlan: entered promiscuous mode [ 163.703510][ T3304] veth1_vlan: entered promiscuous mode [ 163.721110][ T3302] veth0_macvtap: entered promiscuous mode [ 163.782823][ T3302] veth1_macvtap: entered promiscuous mode [ 164.016717][ T3302] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.017684][ T3302] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.017863][ T3302] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.018055][ T3302] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.044909][ T3304] veth0_macvtap: entered promiscuous mode [ 164.157949][ T3304] veth1_macvtap: entered promiscuous mode [ 164.323507][ T30] audit: type=1400 audit(164.010:80): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 164.344488][ T30] audit: type=1400 audit(164.030:81): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzkaller.MqBJr5/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 164.357377][ T30] audit: type=1400 audit(164.040:82): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 164.377929][ T30] audit: type=1400 audit(164.060:83): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzkaller.MqBJr5/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 164.386523][ T30] audit: type=1400 audit(164.070:84): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzkaller.MqBJr5/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2970 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 164.430186][ T30] audit: type=1400 audit(164.120:85): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 164.443422][ T30] audit: type=1400 audit(164.130:86): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 164.454037][ T30] audit: type=1400 audit(164.140:87): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="gadgetfs" ino=2971 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 164.603063][ T30] audit: type=1400 audit(164.290:88): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 164.607377][ T3304] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.612895][ T30] audit: type=1400 audit(164.290:89): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 164.615713][ T3304] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.616343][ T3304] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.616589][ T3304] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 164.991832][ T3302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 169.905106][ T3484] serio: Serial port pts0 [ 178.904613][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 178.910554][ T30] audit: type=1326 audit(178.580:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3524 comm="syz.1.39" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff8c95bce8 code=0x0 [ 182.688164][ T3540] serio: Serial port pts1 [ 184.468640][ C1] hrtimer: interrupt took 1072320 ns [ 186.364765][ T3551] serio: Serial port pts0 [ 188.610094][ T3555] serio: Serial port pts1 [ 192.458825][ T3562] serio: Serial port pts0 [ 194.394169][ T3567] serio: Serial port pts1 [ 200.470027][ T30] audit: type=1400 audit(200.150:96): avc: denied { create } for pid=3588 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 200.489315][ T30] audit: type=1400 audit(200.170:97): avc: denied { ioctl } for pid=3588 comm="syz.0.61" path="socket:[4276]" dev="sockfs" ino=4276 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 201.462667][ T3602] serio: Serial port pts0 [ 204.098897][ T3615] serio: Serial port pts1 [ 207.375455][ T3619] serio: Serial port pts0 [ 210.054820][ T30] audit: type=1400 audit(209.740:98): avc: denied { allowed } for pid=3624 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 210.072516][ T30] audit: type=1400 audit(209.760:99): avc: denied { create } for pid=3624 comm="syz.1.75" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 211.320742][ T3637] Zero length message leads to an empty skb [ 212.541341][ T3644] serio: Serial port pts1 [ 219.837318][ T3658] serio: Serial port pts1 [ 226.265237][ T30] audit: type=1400 audit(225.950:100): avc: denied { map_create } for pid=3683 comm="syz.0.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 226.275493][ T30] audit: type=1400 audit(225.960:101): avc: denied { bpf } for pid=3683 comm="syz.0.99" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 226.280131][ T30] audit: type=1400 audit(225.970:102): avc: denied { map_read map_write } for pid=3683 comm="syz.0.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 226.285521][ T30] audit: type=1400 audit(225.970:103): avc: denied { prog_load } for pid=3683 comm="syz.0.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 226.289600][ T30] audit: type=1400 audit(225.970:104): avc: denied { perfmon } for pid=3683 comm="syz.0.99" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 226.311315][ T3685] syz.0.99: attempt to access beyond end of device [ 226.311315][ T3685] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 227.171068][ T30] audit: type=1400 audit(226.860:105): avc: denied { create } for pid=3695 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 227.239607][ T30] audit: type=1400 audit(226.910:106): avc: denied { setopt } for pid=3695 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 227.246918][ T30] audit: type=1400 audit(226.930:107): avc: denied { connect } for pid=3695 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 227.388972][ T30] audit: type=1400 audit(227.070:108): avc: denied { load_policy } for pid=3697 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 227.653005][ T3700] serio: Serial port pts0 [ 227.761859][ T30] audit: type=1400 audit(227.450:109): avc: denied { write } for pid=3695 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 234.889952][ T3733] cgroup: fork rejected by pids controller in /syz1 [ 235.936302][ T38] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 236.260572][ T38] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 236.544651][ T38] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 236.817748][ T38] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 237.386550][ T3754] serio: Serial port pts0 [ 237.616624][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 237.620273][ T30] audit: type=1400 audit(237.300:111): avc: denied { read } for pid=3153 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 240.243192][ T38] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 240.336784][ T38] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 240.414277][ T38] bond0 (unregistering): Released all slaves [ 240.815806][ T38] hsr_slave_0: left promiscuous mode [ 240.824438][ T38] hsr_slave_1: left promiscuous mode [ 240.886051][ T38] veth1_macvtap: left promiscuous mode [ 240.887703][ T38] veth0_macvtap: left promiscuous mode [ 240.889556][ T38] veth1_vlan: left promiscuous mode [ 240.890706][ T38] veth0_vlan: left promiscuous mode [ 245.250228][ T3781] serio: Serial port pts0 [ 249.944501][ T3741] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 249.965811][ T3741] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 251.737537][ T3823] serio: Serial port pts0 [ 252.414393][ T3741] hsr_slave_0: entered promiscuous mode [ 252.419999][ T3741] hsr_slave_1: entered promiscuous mode [ 254.524864][ T3741] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 254.565239][ T3741] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 254.604268][ T3741] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 254.654638][ T3741] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 256.117948][ T3741] 8021q: adding VLAN 0 to HW filter on device bond0 [ 257.949115][ T3866] serio: Serial port pts0 [ 262.030117][ T3741] veth0_vlan: entered promiscuous mode [ 262.074067][ T3741] veth1_vlan: entered promiscuous mode [ 262.231275][ T3741] veth0_macvtap: entered promiscuous mode [ 262.257209][ T3741] veth1_macvtap: entered promiscuous mode [ 262.482791][ T3741] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.484111][ T3741] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.485396][ T3741] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.486375][ T3741] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.686782][ T30] audit: type=1400 audit(262.370:112): avc: denied { mounton } for pid=3741 comm="syz-executor" path="/syzkaller.QK91xk/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 262.699289][ T30] audit: type=1400 audit(262.380:113): avc: denied { mounton } for pid=3741 comm="syz-executor" path="/syzkaller.QK91xk/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 263.913702][ T3907] serio: Serial port pts1 [ 270.693229][ T3918] serio: Serial port pts1 [ 272.883668][ T3923] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 272.898852][ T3923] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3923 comm=syz.0.145 [ 272.907828][ T30] audit: type=1400 audit(272.590:114): avc: denied { audit_write } for pid=3922 comm="syz.0.145" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 275.159231][ T3927] mmap: syz.0.146 (3927) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 283.932122][ T3942] serio: Serial port pts0 [ 290.282212][ T30] audit: type=1400 audit(289.970:115): avc: denied { read } for pid=3968 comm="syz.1.160" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 290.284059][ T30] audit: type=1400 audit(289.970:116): avc: denied { open } for pid=3968 comm="syz.1.160" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 290.302162][ T30] audit: type=1400 audit(289.990:117): avc: denied { ioctl } for pid=3968 comm="syz.1.160" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 301.774845][ T30] audit: type=1400 audit(301.460:118): avc: denied { create } for pid=4043 comm="syz.1.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 301.793992][ T30] audit: type=1400 audit(301.480:119): avc: denied { read } for pid=3108 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 301.802410][ T30] audit: type=1400 audit(301.480:120): avc: denied { append } for pid=3108 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 301.802979][ T30] audit: type=1400 audit(301.480:121): avc: denied { open } for pid=3108 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 301.803240][ T30] audit: type=1400 audit(301.480:122): avc: denied { getattr } for pid=3108 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 301.813205][ T30] audit: type=1400 audit(301.490:123): avc: denied { bind } for pid=4043 comm="syz.1.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 302.476753][ T30] audit: type=1400 audit(302.160:124): avc: denied { read } for pid=4049 comm="syz.1.193" name="card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 302.479562][ T30] audit: type=1400 audit(302.160:125): avc: denied { open } for pid=4049 comm="syz.1.193" path="/dev/dri/card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 305.069958][ T4072] serio: Serial port pts0 [ 312.893317][ T4126] serio: Serial port pts0 [ 314.806861][ T30] audit: type=1400 audit(314.490:126): avc: denied { read write } for pid=4129 comm="syz.1.225" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 314.809864][ T30] audit: type=1400 audit(314.490:127): avc: denied { open } for pid=4129 comm="syz.1.225" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 323.179130][ T4171] serio: Serial port pts1 [ 328.273693][ T4178] serio: Serial port pts0 [ 331.988113][ T30] audit: type=1400 audit(331.670:128): avc: denied { prog_run } for pid=4186 comm="syz.0.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 338.987158][ T30] audit: type=1400 audit(338.670:129): avc: denied { execute } for pid=4223 comm="syz.0.264" name="file1" dev="tmpfs" ino=660 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 339.004647][ T4225] process 'syz.0.264' launched './file1' with NULL argv: empty string added [ 339.007544][ T30] audit: type=1400 audit(338.690:130): avc: denied { execute_no_trans } for pid=4223 comm="syz.0.264" path="/113/file1" dev="tmpfs" ino=660 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 343.126348][ T4248] serio: Serial port pts0 [ 351.679487][ T4302] serio: Serial port pts1 [ 352.422848][ T4305] serio: Serial port pts0 [ 358.225812][ T30] audit: type=1400 audit(357.910:131): avc: denied { create } for pid=4313 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 358.240099][ T30] audit: type=1400 audit(357.920:132): avc: denied { setopt } for pid=4313 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 358.447249][ T30] audit: type=1400 audit(358.130:133): avc: denied { bind } for pid=4313 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 359.466068][ T4324] serio: Serial port pts0 [ 361.991344][ T4353] serio: Serial port pts1 [ 366.866486][ T4373] serio: Serial port pts0 [ 370.064803][ T30] audit: type=1400 audit(369.750:134): avc: denied { write } for pid=4399 comm="syz.1.336" name="raw6" dev="proc" ino=4026532972 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 375.902927][ T4432] serio: Serial port pts1 [ 382.050829][ T30] audit: type=1400 audit(381.730:135): avc: denied { create } for pid=4437 comm="syz.0.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 382.066722][ T30] audit: type=1400 audit(381.750:136): avc: denied { create } for pid=4437 comm="syz.0.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 382.081220][ T30] audit: type=1400 audit(381.770:137): avc: denied { write } for pid=4437 comm="syz.0.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 383.338696][ T4450] serio: Serial port pts0 [ 389.134225][ T30] audit: type=1400 audit(388.820:138): avc: denied { getopt } for pid=4454 comm="syz.0.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 389.964201][ T4461] serio: Serial port pts0 [ 391.972977][ T4474] serio: Serial port pts1 [ 395.748794][ T4479] serio: Serial port pts0 [ 400.936417][ T4505] serio: Serial port pts1 [ 401.558169][ T4508] serio: Serial port pts0 [ 408.217025][ T4525] serio: Serial port pts0 [ 408.344858][ T4527] serio: Serial port pts1 [ 421.703364][ T4614] serio: Serial port pts0 [ 422.423652][ T4622] serio: Serial port pts1 [ 428.706707][ T4641] serio: Serial port pts0 [ 429.169268][ T4646] serio: Serial port pts1 [ 441.335894][ T4700] serio: Serial port pts0 [ 450.444649][ T4724] serio: Serial port pts0 [ 455.186242][ T4737] serio: Serial port pts1 [ 461.580827][ T30] audit: type=1400 audit(461.270:139): avc: denied { name_bind } for pid=4745 comm="syz.1.468" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 461.586443][ T30] audit: type=1400 audit(461.270:140): avc: denied { node_bind } for pid=4745 comm="syz.1.468" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 462.823354][ T4750] serio: Serial port pts1 [ 471.617288][ T30] audit: type=1400 audit(471.280:141): avc: denied { create } for pid=4789 comm="syz.0.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 471.617887][ T30] audit: type=1400 audit(471.290:142): avc: denied { getopt } for pid=4789 comm="syz.0.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 473.097155][ T4797] serio: Serial port pts0 [ 479.002977][ T4827] serio: Serial port pts0 [ 491.523112][ T4902] serio: Serial port pts0 [ 495.815410][ T4917] serio: Serial port pts1 [ 500.673777][ T30] audit: type=1400 audit(500.360:143): avc: denied { create } for pid=4936 comm="syz.0.546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 500.693084][ T30] audit: type=1400 audit(500.380:144): avc: denied { ioctl } for pid=4936 comm="syz.0.546" path="socket:[8923]" dev="sockfs" ino=8923 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 511.113370][ T4954] serio: Serial port pts0 [ 511.136839][ T4955] serio: Serial port pts1 [ 517.670294][ T4972] serio: Serial port pts0 [ 518.472675][ T30] audit: type=1400 audit(518.160:145): avc: denied { mounton } for pid=4978 comm="syz.1.559" path="/240/file0" dev="tmpfs" ino=1398 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 521.404897][ T5000] serio: Serial port pts1 [ 523.547941][ T5004] serio: Serial port pts0 [ 529.534847][ T5014] serio: Serial port pts0 [ 531.518911][ T5022] serio: Serial port pts1 [ 546.808058][ T5039] serio: Serial port pts0 [ 549.941316][ T5073] serio: Serial port pts1 [ 552.925884][ T5079] serio: Serial port pts0 [ 559.683609][ T5112] serio: Serial port pts0 [ 575.875948][ T30] audit: type=1400 audit(575.560:146): avc: denied { unmount } for pid=3741 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 576.222730][ T30] audit: type=1400 audit(575.910:147): avc: denied { create } for pid=5152 comm="syz.1.628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 578.664044][ T5168] block nbd1: NBD_DISCONNECT [ 578.666519][ T5168] block nbd1: Send disconnect failed -89 [ 578.677434][ T5168] block nbd1: Disconnected due to user request. [ 578.701542][ T5168] block nbd1: shutting down sockets [ 581.447663][ T5198] serio: Serial port pts0 [ 582.655887][ T5214] serio: Serial port pts1 [ 588.733570][ T30] audit: type=1400 audit(588.420:148): avc: denied { ioctl } for pid=5233 comm="syz.1.663" path="socket:[10616]" dev="sockfs" ino=10616 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 588.741188][ T30] audit: type=1400 audit(588.430:149): avc: denied { write } for pid=5233 comm="syz.1.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 591.179881][ T5245] serio: Serial port pts0 [ 597.893065][ T5258] serio: Serial port pts0 [ 601.707718][ T5273] serio: Serial port pts1 [ 610.364320][ T5301] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5301 comm=syz.1.689 [ 610.571892][ T5303] serio: Serial port pts1 [ 613.117856][ T5308] serio: Serial port pts0 [ 615.840452][ T5311] serio: Serial port pts0 [ 617.090073][ T5321] serio: Serial port pts1 [ 624.618000][ T5335] serio: Serial port pts1 [ 631.474719][ T30] audit: type=1400 audit(631.160:150): avc: denied { ioctl } for pid=5350 comm="syz.1.705" path="socket:[9749]" dev="sockfs" ino=9749 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 634.760943][ T5389] serio: Serial port pts0 [ 635.067428][ T5392] serio: Serial port pts1 [ 641.555674][ T5410] serio: Serial port pts0 [ 643.419169][ T5433] serio: Serial port pts1 [ 648.534887][ T5445] serio: Serial port pts0 [ 650.531063][ T30] audit: type=1400 audit(650.220:151): avc: denied { create } for pid=5462 comm="syz.0.754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 653.017509][ T5487] serio: Serial port pts1 [ 657.959392][ T5500] serio: Serial port pts0 [ 667.499170][ T5588] serio: Serial port pts0 [ 670.619784][ T5604] serio: Serial port pts1 [ 673.306685][ T5609] serio: Serial port pts0 [ 686.075808][ T5616] serio: Serial port pts1 [ 693.485309][ T5658] serio: Serial port pts0 [ 702.130126][ T30] audit: type=1400 audit(701.810:152): avc: denied { name_bind } for pid=5671 comm="syz.0.844" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 703.082829][ T5677] serio: Serial port pts1 [ 709.070624][ T5687] serio: Serial port pts0 [ 714.835665][ T5710] serio: Serial port pts0 [ 717.163089][ T5715] serio: Serial port pts1 [ 723.303743][ T5722] serio: Serial port pts1 [ 729.729802][ T5733] serio: Serial port pts1 [ 732.720402][ T5741] serio: Serial port pts0 [ 735.714656][ T5747] serio: Serial port pts1 [ 738.485890][ T5751] serio: Serial port pts0 [ 741.996919][ T5759] serio: Serial port pts1 [ 754.400252][ T5773] serio: Serial port pts0 [ 761.061804][ T30] audit: type=1400 audit(760.750:153): avc: denied { create } for pid=5799 comm="syz.1.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 761.077543][ T30] audit: type=1400 audit(760.760:154): avc: denied { bind } for pid=5799 comm="syz.1.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 761.084449][ T30] audit: type=1400 audit(760.770:155): avc: denied { listen } for pid=5799 comm="syz.1.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 761.097558][ T30] audit: type=1400 audit(760.780:156): avc: denied { connect } for pid=5799 comm="syz.1.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 761.132768][ T30] audit: type=1400 audit(760.820:157): avc: denied { accept } for pid=5799 comm="syz.1.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 761.136113][ T30] audit: type=1400 audit(760.820:158): avc: denied { write } for pid=5799 comm="syz.1.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 761.146451][ T30] audit: type=1400 audit(760.830:159): avc: denied { read } for pid=5799 comm="syz.1.886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 764.319333][ T5819] serio: Serial port pts1 [ 770.500147][ T5836] serio: Serial port pts0 [ 774.847392][ T30] audit: type=1400 audit(774.530:160): avc: denied { ioctl } for pid=5866 comm="syz.1.914" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 776.624801][ T5880] serio: Serial port pts1 [ 779.244787][ T5888] serio: Serial port pts0 [ 782.455141][ T5893] serio: Serial port pts1 [ 791.952838][ T5932] serio: Serial port pts0 [ 797.693028][ T30] audit: type=1400 audit(797.380:161): avc: denied { create } for pid=5937 comm="syz.0.941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 797.696683][ T30] audit: type=1400 audit(797.380:162): avc: denied { ioctl } for pid=5937 comm="syz.0.941" path="socket:[12786]" dev="sockfs" ino=12786 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 798.440710][ T5943] serio: Serial port pts1 [ 807.774333][ T30] audit: type=1400 audit(807.460:163): avc: denied { read write } for pid=5981 comm="syz.1.959" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 807.777586][ T30] audit: type=1400 audit(807.460:164): avc: denied { open } for pid=5981 comm="syz.1.959" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 807.802204][ T30] audit: type=1400 audit(807.490:165): avc: denied { ioctl } for pid=5981 comm="syz.1.959" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 807.813824][ T5982] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 807.820138][ T5982] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 810.329194][ T30] audit: type=1400 audit(810.010:166): avc: denied { create } for pid=5998 comm="syz.1.965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 810.335643][ T30] audit: type=1400 audit(810.020:167): avc: denied { bind } for pid=5998 comm="syz.1.965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 810.342735][ T30] audit: type=1400 audit(810.030:168): avc: denied { accept } for pid=5998 comm="syz.1.965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 810.352241][ T30] audit: type=1400 audit(810.040:169): avc: denied { read } for pid=5998 comm="syz.1.965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 810.655812][ T30] audit: type=1400 audit(810.340:170): avc: denied { write } for pid=5998 comm="syz.1.965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 820.368033][ T6045] serio: Serial port pts0 [ 823.013037][ T6052] serio: Serial port pts1 [ 831.636803][ T6060] serio: Serial port pts1 [ 836.685350][ T6073] serio: Serial port pts0 [ 838.212235][ T30] audit: type=1400 audit(837.900:171): avc: denied { write } for pid=6082 comm="syz.0.996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 838.408059][ T6086] serio: Serial port pts1 [ 842.852146][ T30] audit: type=1400 audit(842.540:172): avc: denied { append } for pid=6100 comm="syz.1.1000" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 847.073354][ T6126] serio: Serial port pts0 [ 847.765445][ T6135] serio: Serial port pts1 [ 853.217650][ T6143] serio: Serial port pts0 [ 855.664516][ T6157] serio: Serial port pts1 [ 863.650444][ T6177] serio: Serial port pts1 [ 870.258215][ T6194] serio: Serial port pts0 [ 874.208064][ T6207] serio: Serial port pts1 [ 880.283955][ T6226] serio: Serial port pts0 [ 880.651771][ T30] audit: type=1400 audit(880.340:173): avc: denied { read } for pid=6223 comm="syz.0.1046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 884.570706][ T6245] serio: Serial port pts1 [ 900.042944][ T6268] serio: Serial port pts0 [ 901.602020][ T6283] serio: Serial port pts1 [ 908.312047][ T30] audit: type=1400 audit(908.000:174): avc: denied { ioctl } for pid=6296 comm="syz.0.1072" path="socket:[13617]" dev="sockfs" ino=13617 ioctlcmd=0x556a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 909.157262][ T6305] serio: Serial port pts1 [ 915.504577][ T6317] serio: Serial port pts0 [ 919.303656][ T6344] serio: Serial port pts1 [ 921.326274][ T6348] serio: Serial port pts0 [ 925.160149][ T6353] serio: Serial port pts1 [ 927.137937][ T6358] serio: Serial port pts0 [ 935.330108][ T6403] serio: Serial port pts0 [ 941.114900][ T6428] serio: Serial port pts0 [ 956.425502][ T6479] syzkaller0: entered promiscuous mode [ 956.429400][ T6479] syzkaller0: entered allmulticast mode [ 960.536857][ T6500] serio: Serial port pts0 [ 968.435232][ T6509] serio: Serial port pts0 [ 974.994546][ T6528] serio: Serial port pts0 [ 995.221104][ T6570] serio: Serial port pts0 [ 1003.650249][ T30] audit: type=1400 audit(1003.330:175): avc: denied { unlink } for pid=3304 comm="syz-executor" name="bus" dev="tmpfs" ino=3227 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1005.312211][ T6620] serio: Serial port pts0 [ 1005.667796][ T6625] ======================================================= [ 1005.667796][ T6625] WARNING: The mand mount option has been deprecated and [ 1005.667796][ T6625] and is ignored by this kernel. Remove the mand [ 1005.667796][ T6625] option from the mount to silence this warning. [ 1005.667796][ T6625] ======================================================= [ 1005.733626][ T30] audit: type=1400 audit(1005.410:176): avc: denied { unmount } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1005.932327][ T6628] serio: Serial port pts1 [ 1014.983735][ T6653] serio: Serial port pts0 [ 1015.194820][ T30] audit: type=1400 audit(1014.880:177): avc: denied { map } for pid=6654 comm="syz.0.1208" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14324 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1015.203705][ T30] audit: type=1400 audit(1014.880:178): avc: denied { read write } for pid=6654 comm="syz.0.1208" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=14324 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1017.389697][ T6666] serio: Serial port pts1 [ 1020.840507][ T6671] serio: Serial port pts0 [ 1023.387770][ T6675] serio: Serial port pts1 [ 1029.535215][ T6704] serio: Serial port pts0 [ 1033.302885][ T6726] serio: Serial port pts1 [ 1040.265125][ T30] audit: type=1400 audit(1039.950:179): avc: denied { bind } for pid=6738 comm="syz.0.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1040.265827][ T30] audit: type=1400 audit(1039.950:180): avc: denied { name_bind } for pid=6738 comm="syz.0.1239" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1040.266359][ T30] audit: type=1400 audit(1039.950:181): avc: denied { node_bind } for pid=6738 comm="syz.0.1239" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 1040.279939][ T30] audit: type=1400 audit(1039.960:182): avc: denied { write } for pid=6738 comm="syz.0.1239" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1040.285013][ T30] audit: type=1400 audit(1039.970:183): avc: denied { connect } for pid=6738 comm="syz.0.1239" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1040.290248][ T30] audit: type=1400 audit(1039.970:184): avc: denied { name_connect } for pid=6738 comm="syz.0.1239" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1040.935789][ T30] audit: type=1400 audit(1040.620:185): avc: denied { create } for pid=6738 comm="syz.0.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1047.739457][ T6783] serio: Serial port pts0 [ 1049.245562][ T30] audit: type=1326 audit(1048.930:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6789 comm="syz.0.1262" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffaff5bce8 code=0x0 [ 1058.919801][ T6834] serio: Serial port pts1 [ 1063.088813][ T6843] serio: Serial port pts0 [ 1065.694177][ T6857] serio: Serial port pts1 [ 1070.576334][ T6869] serio: Serial port pts0 [ 1071.960855][ T6876] serio: Serial port pts1 [ 1074.616113][ T6886] serio: Serial port pts0 [ 1077.726368][ T6890] serio: Serial port pts1 [ 1081.221069][ T6901] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1081.226955][ T6901] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1083.534855][ T6912] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 1083.558169][ T30] audit: type=1400 audit(1083.230:187): avc: denied { ioctl } for pid=6911 comm="syz.0.1307" path="socket:[15170]" dev="sockfs" ino=15170 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1083.564495][ T30] audit: type=1400 audit(1083.250:188): avc: denied { write } for pid=6911 comm="syz.0.1307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1086.290120][ T30] audit: type=1400 audit(1085.950:189): avc: denied { ioctl } for pid=6935 comm="syz.0.1318" path="socket:[15222]" dev="sockfs" ino=15222 ioctlcmd=0x8b24 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1088.930932][ T6970] serio: Serial port pts0 [ 1091.779306][ T6992] serio: Serial port pts1 [ 1097.225757][ T30] audit: type=1400 audit(1096.910:190): avc: denied { write } for pid=7016 comm="syz.1.1354" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1097.799607][ T30] audit: type=1400 audit(1097.490:191): avc: denied { name_bind } for pid=7024 comm="syz.0.1358" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1098.274039][ T30] audit: type=1400 audit(1097.960:192): avc: denied { setopt } for pid=7029 comm="syz.0.1360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1099.667595][ T7047] serio: Serial port pts0 [ 1102.760975][ T7058] serio: Serial port pts1 [ 1109.343840][ T30] audit: type=1400 audit(1109.030:193): avc: denied { sqpoll } for pid=7093 comm="syz.1.1387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1113.509823][ T7119] serio: Serial port pts0 [ 1116.369642][ T7139] serio: Serial port pts1 [ 1127.430936][ T30] audit: type=1400 audit(1127.100:194): avc: denied { getopt } for pid=7178 comm="syz.0.1421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1127.922686][ T30] audit: type=1400 audit(1127.610:195): avc: denied { write } for pid=7178 comm="syz.0.1421" path="socket:[16734]" dev="sockfs" ino=16734 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1130.342497][ T30] audit: type=1326 audit(1130.030:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7193 comm="syz.0.1428" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffaff5bce8 code=0x0 [ 1132.719123][ T7210] serio: Serial port pts0 [ 1133.007606][ T7215] serio: Serial port pts1 [ 1148.079025][ T7223] serio: Serial port pts0 [ 1149.152488][ T7233] serio: Serial port pts1 [ 1167.176336][ T30] audit: type=1400 audit(1166.860:197): avc: denied { setattr } for pid=7252 comm="syz.0.1446" name="PACKET" dev="sockfs" ino=16870 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1169.716491][ T7270] serio: Serial port pts0 [ 1175.077111][ T30] audit: type=1400 audit(1174.760:198): avc: denied { listen } for pid=7289 comm="syz.0.1461" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1175.083921][ T7290] 8021q: VLANs not supported on vcan0 [ 1199.994954][ T7379] serio: Serial port pts0 [ 1206.877443][ T7386] serio: Serial port pts1 [ 1215.979950][ T7394] serio: Serial port pts0 [ 1222.077727][ T30] audit: type=1400 audit(1221.760:199): avc: denied { watch watch_reads } for pid=7399 comm="syz.1.1500" path="/proc/1715" dev="proc" ino=17158 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1224.828055][ T7415] serio: Serial port pts1 [ 1227.295259][ T30] audit: type=1400 audit(1226.980:200): avc: denied { write } for pid=7425 comm="syz.1.1510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1228.222768][ T7431] serio: Serial port pts1 [ 1245.622919][ T30] audit: type=1400 audit(1245.310:201): avc: denied { setopt } for pid=7476 comm="syz.0.1529" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1250.840449][ T7510] serio: Serial port pts0 [ 1252.241472][ T30] audit: type=1400 audit(1251.930:202): avc: denied { setattr } for pid=7501 comm="syz.1.1538" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1255.079109][ T7517] serio: Serial port pts1 [ 1272.330439][ T7535] serio: Serial port pts0 [ 1284.924824][ T30] audit: type=1400 audit(1284.610:203): avc: denied { setopt } for pid=7566 comm="syz.1.1561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1298.000738][ T7587] serio: Serial port pts0 [ 1298.861748][ T7593] serio: Serial port pts1 [ 1306.686667][ T30] audit: type=1400 audit(1306.370:204): avc: denied { write } for pid=7622 comm="syz.1.1582" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1314.687781][ T30] audit: type=1400 audit(1314.370:205): avc: denied { create } for pid=7642 comm="syz.0.1590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1314.810309][ T30] audit: type=1400 audit(1314.500:206): avc: denied { write } for pid=7642 comm="syz.0.1590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1317.281870][ T7659] serio: Serial port pts0 [ 1317.382524][ T7661] serio: Serial port pts1 [ 1323.830925][ T7678] serio: Serial port pts0 [ 1334.509213][ T7712] serio: Serial port pts0 [ 1342.078059][ T30] audit: type=1326 audit(1341.760:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7727 comm="syz.1.1618" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff8df5bce8 code=0x0 [ 1345.466995][ T7741] serio: Serial port pts0 [ 1345.885051][ T30] audit: type=1400 audit(1345.570:208): avc: denied { accept } for pid=7744 comm="syz.1.1627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1346.783247][ T7752] serio: Serial port pts1 [ 1362.479695][ T7768] netlink: 'syz.0.1635': attribute type 12 has an invalid length. [ 1363.073399][ T7768] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7768 comm=syz.0.1635 [ 1363.996038][ T7782] serio: Serial port pts0 [ 1370.599744][ T7794] serio: Serial port pts0 [ 1382.194861][ T7845] serio: Serial port pts0 [ 1401.417794][ T30] audit: type=1400 audit(1401.100:209): avc: denied { create } for pid=7878 comm="syz.1.1670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1404.017944][ T7886] serio: Serial port pts0 [ 1404.493296][ T30] audit: type=1400 audit(1404.180:210): avc: denied { create } for pid=7892 comm="syz.1.1676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1404.502714][ T30] audit: type=1400 audit(1404.190:211): avc: denied { ioctl } for pid=7892 comm="syz.1.1676" path="socket:[18973]" dev="sockfs" ino=18973 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1405.492614][ T7906] syz.1.1681 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 1408.231809][ T30] audit: type=1400 audit(1407.920:212): avc: denied { read } for pid=7914 comm="syz.1.1684" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1408.234797][ T30] audit: type=1400 audit(1407.920:213): avc: denied { open } for pid=7914 comm="syz.1.1684" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1411.307044][ T30] audit: type=1400 audit(1410.990:214): avc: denied { getopt } for pid=7924 comm="syz.1.1687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1420.906681][ T30] audit: type=1400 audit(1420.590:215): avc: denied { read } for pid=7960 comm="syz.0.1702" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1420.940119][ T30] audit: type=1400 audit(1420.600:216): avc: denied { open } for pid=7960 comm="syz.0.1702" path="/808/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1421.034422][ T7969] block device autoloading is deprecated and will be removed. [ 1421.061135][ T30] audit: type=1400 audit(1420.740:217): avc: denied { ioctl } for pid=7960 comm="syz.0.1702" path="/808/file0/file0" dev="fuse" ino=64 ioctlcmd=0x921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1425.569330][ T7992] serio: Serial port pts0 [ 1429.913780][ T8004] serio: Serial port pts1 [ 1442.263199][ T8016] serio: Serial port pts0 [ 1445.451681][ T30] audit: type=1400 audit(1445.130:218): avc: denied { block_suspend } for pid=8024 comm="syz.1.1725" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1446.008884][ T8030] serio: Serial port pts1 [ 1456.494794][ T8061] serio: Serial port pts1 [ 1467.287799][ T8102] serio: Serial port pts0 [ 1471.736894][ T30] audit: type=1400 audit(1471.420:219): avc: denied { connect } for pid=8107 comm="syz.1.1755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1471.762505][ T30] audit: type=1400 audit(1471.450:220): avc: denied { read } for pid=8107 comm="syz.1.1755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1475.049321][ T8118] serio: Serial port pts1 [ 1487.713868][ T8147] serio: Serial port pts0 [ 1490.259679][ T8158] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1773'. [ 1490.491612][ T8158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8158 comm=syz.1.1773 [ 1490.591589][ T8160] serio: Serial port pts0 [ 1491.620442][ T30] audit: type=1400 audit(1491.310:221): avc: denied { nlmsg_write } for pid=8171 comm="syz.1.1779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1495.948915][ T8200] serio: Serial port pts0 [ 1497.276041][ T8206] serio: Serial port pts1 [ 1512.506394][ T8215] serio: Serial port pts0 [ 1516.053837][ T8219] serio: Serial port pts1 [ 1518.198822][ T8228] serio: Serial port pts1 [ 1520.142176][ T8233] serio: Serial port pts1 [ 1527.893077][ T8240] serio: Serial port pts0 [ 1538.762879][ T8254] serio: Serial port pts1 [ 1547.593811][ T8274] serio: Serial port pts0 [ 1563.262885][ T8295] xt_bpf: check failed: parse error [ 1563.469641][ T8297] serio: Serial port pts0 [ 1563.546133][ T8299] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1818'. [ 1576.852787][ T30] audit: type=1400 audit(1576.540:222): avc: denied { read } for pid=8342 comm="syz.1.1833" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1576.856307][ T30] audit: type=1400 audit(1576.540:223): avc: denied { open } for pid=8342 comm="syz.1.1833" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1577.377807][ T30] audit: type=1400 audit(1577.060:224): avc: denied { ioctl } for pid=8342 comm="syz.1.1833" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1580.878095][ T30] audit: type=1400 audit(1580.560:225): avc: denied { write } for pid=8366 comm="syz.1.1844" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1581.311641][ T8374] serio: Serial port pts0 [ 1586.967533][ T30] audit: type=1400 audit(1586.650:226): avc: denied { watch watch_reads } for pid=8380 comm="syz.0.1847" path="/proc/2154/net/udplite6" dev="proc" ino=4026532736 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1587.964153][ T8387] serio: Serial port pts1 [ 1598.441568][ T8404] serio: Serial port pts0 [ 1604.868899][ T8422] serio: Serial port pts1 [ 1625.268895][ T30] audit: type=1400 audit(1624.950:227): avc: denied { accept } for pid=8473 comm="syz.1.1879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1626.479458][ T8497] serio: Serial port pts0 [ 1630.563357][ T30] audit: type=1400 audit(1630.250:228): avc: denied { ioctl } for pid=8516 comm="syz.1.1896" path="socket:[21111]" dev="sockfs" ino=21111 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1633.669464][ T8530] serio: Serial port pts0 [ 1634.029234][ T8534] serio: Serial port pts1 [ 1649.322326][ T8546] serio: Serial port pts0 [ 1649.737259][ T30] audit: type=1400 audit(1649.420:229): avc: denied { ioctl } for pid=8551 comm="syz.0.1908" path="net:[4026532631]" dev="nsfs" ino=4026532631 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1650.634969][ T8559] serio: Serial port pts1 [ 1668.775928][ T8586] serio: Serial port pts0 [ 1684.433744][ T8620] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1684.437040][ T8620] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1696.707233][ T30] audit: type=1400 audit(1696.390:230): avc: denied { mounton } for pid=8646 comm="syz.0.1938" path="/924/file0" dev="tmpfs" ino=5337 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 1699.786839][ T30] audit: type=1400 audit(1699.470:231): avc: denied { connect } for pid=8652 comm="syz.0.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1702.072350][ T8665] serio: Serial port pts0 [ 1708.577956][ T30] audit: type=1400 audit(1708.260:232): avc: denied { mount } for pid=8678 comm="syz.0.1949" name="/" dev="ramfs" ino=21823 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1708.613242][ T30] audit: type=1400 audit(1708.300:233): avc: denied { execute } for pid=8678 comm="syz.0.1949" path="/file1" dev="ramfs" ino=21824 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 1716.889199][ T8714] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1963'. [ 1721.019264][ T30] audit: type=1400 audit(1720.700:234): avc: denied { ioctl } for pid=8725 comm="syz.0.1968" path="socket:[21417]" dev="sockfs" ino=21417 ioctlcmd=0x9365 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1734.001587][ T8756] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1734.024918][ T8756] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1735.690682][ T8803] serio: Serial port pts0 [ 1735.855098][ T8756] hsr_slave_0: entered promiscuous mode [ 1735.860671][ T8756] hsr_slave_1: entered promiscuous mode [ 1735.863804][ T8756] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1735.865173][ T8756] Cannot create hsr debugfs directory [ 1737.659809][ T8812] serio: Serial port pts0 [ 1858.070378][ T33] INFO: task kworker/0:2:2057 blocked for more than 430 seconds. [ 1858.071352][ T33] Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 [ 1858.071563][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1858.072021][ T33] task:kworker/0:2 state:D stack:0 pid:2057 tgid:2057 ppid:2 task_flags:0x4288060 flags:0x00000008 [ 1858.072820][ T33] Workqueue: md_misc mddev_delayed_delete [ 1858.074265][ T33] Call trace: [ 1858.074696][ T33] __switch_to+0x204/0x4bc (T) [ 1858.075089][ T33] __schedule+0xd34/0x3188 [ 1858.075265][ T33] schedule+0xd0/0x344 [ 1858.075418][ T33] schedule_timeout+0x1ec/0x224 [ 1858.075567][ T33] __wait_for_common+0x1d0/0x3f8 [ 1858.075715][ T33] wait_for_completion+0x20/0x2c [ 1858.075870][ T33] devtmpfs_submit_req+0xac/0x114 [ 1858.076065][ T33] devtmpfs_delete_node+0xd8/0x128 [ 1858.076215][ T33] device_del+0x59c/0x7b4 [ 1858.076361][ T33] del_gendisk+0x3fc/0x87c [ 1858.076507][ T33] md_kobj_release+0x84/0xd8 [ 1858.076650][ T33] kobject_put+0x17c/0x430 [ 1858.076803][ T33] mddev_delayed_delete+0x14/0x20 [ 1858.076945][ T33] process_one_work+0x7cc/0x18d4 [ 1858.077093][ T33] worker_thread+0x734/0xb84 [ 1858.077235][ T33] kthread+0x348/0x5fc [ 1858.077376][ T33] ret_from_fork+0x10/0x20 [ 1858.077873][ T33] [ 1858.077873][ T33] Showing all locks held in the system: [ 1858.078148][ T33] 2 locks held by kdevtmpfs/25: [ 1858.089034][ T33] #0: ffff00000e4982c8 (&type->i_mutex_dir_key/1){+.+.}-{4:4}, at: __kern_path_locked+0xd4/0x1f8 [ 1858.090108][ T33] #1: ffff80008771a4e8 (major_names_lock){+.+.}-{4:4}, at: blk_probe_dev+0x30/0x168 [ 1858.090863][ T33] 2 locks held by pr/ttyAMA0/32: [ 1858.091053][ T33] 1 lock held by khungtaskd/33: [ 1858.091210][ T33] #0: ffff80008728da60 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x18/0x1c4 [ 1858.091991][ T33] 3 locks held by kworker/u8:5/956: [ 1858.092160][ T33] #0: ffff0000179cf948 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 1858.092664][ T33] #1: ffff80008e947c80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 1858.093199][ T33] #2: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1858.093825][ T33] 2 locks held by kworker/0:2/2057: [ 1858.093957][ T33] #0: ffff00000f1e0548 ((wq_completion)md_misc){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 1858.094519][ T33] #1: ffff80008fcd7c80 ((work_completion)(&mddev->del_work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 1858.095108][ T33] 1 lock held by klogd/3112: [ 1858.095260][ T33] 1 lock held by dhcpcd/3153: [ 1858.095388][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1858.096003][ T33] 2 locks held by getty/3243: [ 1858.096167][ T33] #0: ffff0000125ce0a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 1858.096775][ T33] #1: ffff80008d50b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e4/0xdb4 [ 1858.097361][ T33] 1 lock held by sshd/3295: [ 1858.097524][ T33] 3 locks held by kworker/u8:0/7803: [ 1858.097684][ T33] #0: ffff00000d831148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 1858.116524][ T33] #1: ffff80008ee07c80 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 1858.120325][ T33] #2: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1858.122920][ T33] 2 locks held by syz.1.1929/8620: [ 1858.123659][ T33] #0: ffff00000e490420 (sb_writers){.+.+}-{0:0}, at: mnt_want_write+0x3c/0xb0 [ 1858.126248][ T33] #1: ffff00000e4982c8 (&type->i_mutex_dir_key#2){++++}-{4:4}, at: path_openat+0xcbc/0x25e4 [ 1858.129746][ T33] 2 locks held by syz-executor/8756: [ 1858.130477][ T33] #0: ffff800087091bb8 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0xb8/0x218 [ 1858.133430][ T33] #1: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x4b8/0x1810 [ 1858.136118][ T33] 1 lock held by syz.0.1988/8818: [ 1858.136843][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1858.139661][ T33] 2 locks held by kworker/u8:4/8820: [ 1858.140425][ T33] 1 lock held by syz-executor/8822: [ 1858.141257][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1858.143837][ T33] [ 1858.144506][ T33] ============================================= [ 1858.144506][ T33] [ 1858.145839][ T33] Kernel panic - not syncing: hung_task: blocked tasks [ 1858.146746][ T33] CPU: 0 UID: 0 PID: 33 Comm: khungtaskd Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 1858.147055][ T33] Hardware name: linux,dummy-virt (DT) [ 1858.147261][ T33] Call trace: [ 1858.147463][ T33] show_stack+0x18/0x24 (C) [ 1858.147649][ T33] dump_stack_lvl+0x38/0xf4 [ 1858.147813][ T33] dump_stack+0x1c/0x28 [ 1858.147964][ T33] panic+0x5b0/0x664 [ 1858.148143][ T33] watchdog+0x658/0x1140 [ 1858.148426][ T33] kthread+0x348/0x5fc [ 1858.148635][ T33] ret_from_fork+0x10/0x20 [ 1858.149345][ T33] SMP: stopping secondary CPUs [ 1858.150662][ T33] Kernel Offset: disabled [ 1858.150911][ T33] CPU features: 0x0410,00040068,01000400,0200421b [ 1858.151205][ T33] Memory Limit: none [ 1858.152240][ T33] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:19:33 Registers: info registers vcpu 0 CPU#0 PC=ffff80008030b96c X00=ffff800089737f18 X01=0000000000012ace X02=00000000000003fd X03=00000000000003fd X04=0000000000012ace X05=00000000000003fd X06=0000000000000000 X07=0000000000000000 X08=ffff800080006150 X09=dfff800000000000 X10=ffff700010000c29 X11=1ffff00010000c29 X12=ffff700010000c2a X13=0000000000000028 X14=000000000000e35a X15=0000000000000007 X16=e4060000a4a5ffff X17=653c49a7952e2c54 X18=000000000000004a X19=00000000000000e4 X20=00000000000000e6 X21=0000000000000030 X22=ffff80008030a6d8 X23=ffff8000800060c0 X24=ffff800088e88bf8 X25=ffff800088e90bf8 X26=ffff800088be6720 X27=000000000000023e X28=ffff80008998df80 X29=ffff800080005fa0 X30=ffff80008030b9e0 SP=ffff800080005fa0 PSTATE=c00000c5 NZ-- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000000000000000:000000000000000a Q02=0000aaaad55c3c47:0000aaaad55c3a20 Q03=0000ffffdae42f50:0000ffffdae42cb8 Q04=0000000000000000:0000000000000000 Q05=0000ffffdae42c10:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:000001f40000000a Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdae43020:0000ffffdae43020 Q17=ffffff80ffffffd0:0000ffffdae42ff0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008002ee7c X00=ffff00000efb5ac0 X01=0000000000000000 X02=0000000000000008 X03=0000000000000000 X04=0000000000000008 X05=0000000000000003 X06=ffff700011b24f63 X07=0000000000000000 X08=ffff80008d927b68 X09=dfff800000000000 X10=ffff700011b24f6c X11=1ffff00011b24f6c X12=ffff700011b24f6d X13=0000000000000001 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000401 X19=ffff000017c75ac0 X20=ffff8000854e9420 X21=ffff800086a66900 X22=ffff800086a523b8 X23=ffff800086a52388 X24=ffff000017c75ad8 X25=1fffe00002f8eb5b X26=ffff000017c76340 X27=0000000000000002 X28=ffff80008708e080 X29=ffff80008d927ad0 X30=ffff80008002edc4 SP=ffff80008d927ad0 PSTATE=20000005 --C- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000000000000000:000000000000000a Q02=0000aaaad55c3c47:0000aaaad55c3a20 Q03=0000ffffdae42f50:0000ffffdae42cb8 Q04=0000000000000000:0000000000000000 Q05=0000ffffdae42c10:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:000001f40000000a Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdae43020:0000ffffdae43020 Q17=ffffff80ffffffd0:0000ffffdae42ff0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000