last executing test programs: 1m28.978235215s ago: executing program 1 (id=4013): r0 = socket$inet_icmp(0x2, 0x2, 0x1) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r1, r0, 0x0) accept4(r0, 0x0, 0x0, 0x0) 1m28.709152287s ago: executing program 1 (id=4014): r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) close_range(r1, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r2, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window, @sack_perm, @sack_perm, @timestamp, @timestamp, @timestamp, @timestamp], 0x20000149) getpeername$netlink(r1, 0x0, 0x0) 9.037021746s ago: executing program 1 (id=4019): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept4$inet(r2, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x5452, &(0x7f00000000c0)={0x7, 'pim6reg0\x00'}) 8.656950811s ago: executing program 1 (id=4061): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = accept$unix(r2, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) 8.029677493s ago: executing program 1 (id=4063): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = dup(r1) ioctl$DRM_IOCTL_MODE_ADDFB(r2, 0xc01c64ae, 0x0) 3.819954565s ago: executing program 0 (id=4070): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r1, &(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000240)=0x80) dup3(r0, r2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x1, 0x2, 0x3}, 0x14}}, 0x0) recvmsg$unix(r3, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000f00)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(r4, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000900)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 3.472938932s ago: executing program 0 (id=4071): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$unix(r2, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r3, 0x5450, 0x0) 3.097238016s ago: executing program 0 (id=4072): pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) close_range(r0, 0xffffffffffffffff, 0x0) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, r2, 0x3}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000800)=ANY=[], 0x14}}, 0x0) 1.870454786s ago: executing program 1 (id=4073): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "0000000005ffffffff00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = dup(r1) ioctl$NBD_PRINT_DEBUG(r2, 0xab06) 548.367533ms ago: executing program 0 (id=4074): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$packet(r2, 0x0, 0x0) ioctl$KDENABIO(r3, 0x5450) 354.404191ms ago: executing program 0 (id=4075): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.numa_stat\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={0x0, 0xea60}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[], 0x33fe0}}, 0x0) r1 = io_uring_setup(0x5618, &(0x7f0000000000)) close(r1) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 0s ago: executing program 0 (id=4076): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) r1 = io_uring_setup(0x5b9b, &(0x7f00000003c0)) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) close(r0) close(r1) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:14736' (ED25519) to the list of known hosts. [ 208.443479][ T30] audit: type=1400 audit(207.940:57): avc: denied { name_bind } for pid=3273 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 208.817827][ T30] audit: type=1400 audit(208.310:58): avc: denied { execute } for pid=3275 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 208.824464][ T30] audit: type=1400 audit(208.320:59): avc: denied { execute_no_trans } for pid=3275 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 216.182134][ T30] audit: type=1400 audit(215.670:60): avc: denied { mounton } for pid=3275 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 216.200101][ T30] audit: type=1400 audit(215.690:61): avc: denied { mount } for pid=3275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 216.255420][ T3275] cgroup: Unknown subsys name 'net' [ 216.297643][ T30] audit: type=1400 audit(215.790:62): avc: denied { unmount } for pid=3275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 216.682265][ T3275] cgroup: Unknown subsys name 'rlimit' [ 217.062563][ T30] audit: type=1400 audit(216.550:63): avc: denied { setattr } for pid=3275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 217.074432][ T30] audit: type=1400 audit(216.560:64): avc: denied { mounton } for pid=3275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 217.076134][ T30] audit: type=1400 audit(216.570:65): avc: denied { mount } for pid=3275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 217.913179][ T3278] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 217.929505][ T30] audit: type=1400 audit(217.410:66): avc: denied { relabelto } for pid=3278 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 217.931111][ T30] audit: type=1400 audit(217.420:67): avc: denied { write } for pid=3278 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 218.024478][ T30] audit: type=1400 audit(217.520:68): avc: denied { read } for pid=3275 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 218.026218][ T30] audit: type=1400 audit(217.520:69): avc: denied { open } for pid=3275 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 236.670349][ T3275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 244.514942][ T30] audit: type=1400 audit(244.010:70): avc: denied { execmem } for pid=3279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 244.609275][ T30] audit: type=1400 audit(244.090:71): avc: denied { mounton } for pid=3281 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 244.610191][ T30] audit: type=1400 audit(244.100:72): avc: denied { mount } for pid=3281 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 244.616102][ T30] audit: type=1400 audit(244.110:73): avc: denied { read } for pid=3281 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 244.620954][ T30] audit: type=1400 audit(244.120:74): avc: denied { open } for pid=3281 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 244.640624][ T30] audit: type=1400 audit(244.130:75): avc: denied { mounton } for pid=3281 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 244.701995][ T30] audit: type=1400 audit(244.200:76): avc: denied { module_request } for pid=3281 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 244.901883][ T30] audit: type=1400 audit(244.400:77): avc: denied { sys_module } for pid=3281 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 252.314012][ T3282] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 252.393634][ T3282] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 252.930192][ T3281] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 252.957080][ T3281] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 255.685389][ T3282] hsr_slave_0: entered promiscuous mode [ 255.704200][ T3282] hsr_slave_1: entered promiscuous mode [ 256.005003][ T3281] hsr_slave_0: entered promiscuous mode [ 256.014755][ T3281] hsr_slave_1: entered promiscuous mode [ 256.022094][ T3281] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 256.023644][ T3281] Cannot create hsr debugfs directory [ 257.794168][ T30] audit: type=1400 audit(257.290:78): avc: denied { create } for pid=3282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 257.809283][ T30] audit: type=1400 audit(257.300:79): avc: denied { write } for pid=3282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 257.810146][ T30] audit: type=1400 audit(257.300:80): avc: denied { read } for pid=3282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 257.821255][ T3282] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 257.935412][ T3282] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 257.996620][ T3282] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 258.074979][ T3282] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 258.530740][ T3281] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 258.630075][ T3281] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 258.681425][ T3281] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 258.725370][ T3281] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 261.783144][ T3281] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.884890][ T3282] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.506565][ T3282] veth0_vlan: entered promiscuous mode [ 273.787531][ T3282] veth1_vlan: entered promiscuous mode [ 273.843592][ T3281] veth0_vlan: entered promiscuous mode [ 274.072692][ T3281] veth1_vlan: entered promiscuous mode [ 274.459587][ T3282] veth0_macvtap: entered promiscuous mode [ 274.595729][ T3281] veth0_macvtap: entered promiscuous mode [ 274.627822][ T3282] veth1_macvtap: entered promiscuous mode [ 274.746223][ T3281] veth1_macvtap: entered promiscuous mode [ 275.181206][ T3282] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.183314][ T3282] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.184074][ T3282] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.184872][ T3282] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.407073][ T3281] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.407702][ T3281] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.408115][ T3281] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.410887][ T3281] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.811210][ T30] audit: type=1400 audit(275.300:81): avc: denied { mount } for pid=3282 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 275.851341][ T30] audit: type=1400 audit(275.350:82): avc: denied { mounton } for pid=3282 comm="syz-executor" path="/syzkaller.Cdm0x9/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 275.892059][ T30] audit: type=1400 audit(275.380:83): avc: denied { mount } for pid=3282 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 275.959968][ T30] audit: type=1400 audit(275.450:84): avc: denied { unmount } for pid=3282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 276.013053][ T30] audit: type=1400 audit(275.500:85): avc: denied { mounton } for pid=3282 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1520 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 276.111840][ T30] audit: type=1400 audit(275.590:86): avc: denied { mount } for pid=3282 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 276.659882][ T30] audit: type=1400 audit(276.140:87): avc: denied { read write } for pid=3281 comm="syz-executor" name="loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 276.660901][ T30] audit: type=1400 audit(276.140:88): avc: denied { open } for pid=3281 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 276.661839][ T30] audit: type=1400 audit(276.140:89): avc: denied { ioctl } for pid=3281 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 276.974057][ T30] audit: type=1400 audit(276.460:90): avc: denied { name_bind } for pid=3415 comm="syz.0.1" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 277.537074][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::ffff:172.20.20.170]:2. Sending cookies. [ 281.442847][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 281.443022][ T30] audit: type=1400 audit(280.930:106): avc: denied { read } for pid=3439 comm="syz.1.9" name="card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 281.487027][ T30] audit: type=1400 audit(280.980:107): avc: denied { open } for pid=3439 comm="syz.1.9" path="/dev/dri/card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 281.582110][ T30] audit: type=1400 audit(281.070:108): avc: denied { ioctl } for pid=3439 comm="syz.1.9" path="/dev/dri/card1" dev="devtmpfs" ino=620 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 283.702482][ T30] audit: type=1400 audit(283.190:109): avc: denied { mount } for pid=3444 comm="syz.0.11" name="/" dev="configfs" ino=1128 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 283.752581][ T30] audit: type=1400 audit(283.240:110): avc: denied { create } for pid=3444 comm="syz.0.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 283.786753][ T30] audit: type=1400 audit(283.280:111): avc: denied { write } for pid=3444 comm="syz.0.11" path="socket:[4152]" dev="sockfs" ino=4152 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 284.819637][ T30] audit: type=1400 audit(284.310:112): avc: denied { read write } for pid=3448 comm="syz.1.13" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 284.820527][ T30] audit: type=1400 audit(284.310:113): avc: denied { open } for pid=3448 comm="syz.1.13" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 284.945295][ T30] audit: type=1400 audit(284.440:114): avc: denied { mount } for pid=3448 comm="syz.1.13" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 285.817678][ T30] audit: type=1400 audit(285.310:115): avc: denied { unmount } for pid=3282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 286.580582][ T30] audit: type=1400 audit(286.070:116): avc: denied { create } for pid=3455 comm="syz.0.16" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 286.866756][ T30] audit: type=1400 audit(286.360:117): avc: denied { create } for pid=3458 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 286.913500][ T30] audit: type=1400 audit(286.410:118): avc: denied { bind } for pid=3458 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 286.966562][ T30] audit: type=1400 audit(286.460:119): avc: denied { accept } for pid=3458 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 287.067845][ T30] audit: type=1400 audit(286.560:120): avc: denied { setopt } for pid=3458 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 290.895583][ T30] audit: type=1400 audit(290.390:121): avc: denied { create } for pid=3468 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 290.921708][ T30] audit: type=1400 audit(290.410:122): avc: denied { write } for pid=3468 comm="syz.1.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 292.315958][ T30] audit: type=1400 audit(291.810:123): avc: denied { create } for pid=3472 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 294.585072][ T30] audit: type=1400 audit(294.080:124): avc: denied { create } for pid=3483 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 294.646827][ T30] audit: type=1400 audit(294.130:125): avc: denied { bind } for pid=3483 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 296.106728][ T30] audit: type=1400 audit(295.600:126): avc: denied { read } for pid=3485 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 297.494379][ T30] audit: type=1400 audit(296.990:127): avc: denied { read } for pid=3491 comm="syz.1.30" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 297.495480][ T30] audit: type=1400 audit(296.990:128): avc: denied { open } for pid=3491 comm="syz.1.30" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 297.839941][ T30] audit: type=1400 audit(297.320:129): avc: denied { bpf } for pid=3493 comm="syz.1.31" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 298.952750][ T30] audit: type=1400 audit(298.440:130): avc: denied { ioctl } for pid=3496 comm="syz.1.33" path="socket:[4264]" dev="sockfs" ino=4264 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 300.386563][ T30] audit: type=1400 audit(299.880:131): avc: denied { connect } for pid=3504 comm="syz.0.35" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 301.026144][ T30] audit: type=1400 audit(300.520:132): avc: denied { setopt } for pid=3504 comm="syz.0.35" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 302.827886][ T30] audit: type=1400 audit(302.320:133): avc: denied { map_create } for pid=3514 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 302.840968][ T30] audit: type=1400 audit(302.330:134): avc: denied { map_read map_write } for pid=3514 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 302.924534][ T30] audit: type=1400 audit(302.420:135): avc: denied { prog_load } for pid=3514 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 302.925438][ T30] audit: type=1400 audit(302.420:136): avc: denied { perfmon } for pid=3514 comm="syz.1.39" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 311.582663][ T30] audit: type=1400 audit(311.070:137): avc: denied { mounton } for pid=3556 comm="syz.0.55" path="/27/file0" dev="tmpfs" ino=157 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 315.340743][ T30] audit: type=1400 audit(314.830:138): avc: denied { read } for pid=3573 comm="syz.1.60" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 315.343904][ T30] audit: type=1400 audit(314.830:139): avc: denied { open } for pid=3573 comm="syz.1.60" path="/dev/loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 315.391173][ T30] audit: type=1400 audit(314.850:140): avc: denied { read } for pid=3086 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 315.393475][ T30] audit: type=1400 audit(314.870:141): avc: denied { append } for pid=3086 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 315.416944][ T30] audit: type=1400 audit(314.870:142): avc: denied { open } for pid=3086 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 315.418131][ T30] audit: type=1400 audit(314.870:143): avc: denied { getattr } for pid=3086 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 315.985601][ T30] audit: type=1400 audit(315.470:144): avc: denied { execute } for pid=3579 comm="syz.0.62" path=2F6D656D66643A2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1025 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 321.018065][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 321.064452][ T30] audit: type=1400 audit(320.560:145): avc: denied { create } for pid=3600 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 321.088012][ T30] audit: type=1400 audit(320.570:146): avc: denied { ioctl } for pid=3600 comm="syz.0.71" path="socket:[4063]" dev="sockfs" ino=4063 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 321.104738][ T30] audit: type=1400 audit(320.600:147): avc: denied { bind } for pid=3600 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 321.113054][ T30] audit: type=1400 audit(320.600:148): avc: denied { write } for pid=3600 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 323.053471][ T30] audit: type=1400 audit(322.550:149): avc: denied { bind } for pid=3610 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 324.027087][ T30] audit: type=1400 audit(323.520:150): avc: denied { write } for pid=3616 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 324.342259][ T30] audit: type=1400 audit(323.830:151): avc: denied { map } for pid=3619 comm="syz.1.78" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4095 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 324.343947][ T30] audit: type=1400 audit(323.830:152): avc: denied { read write } for pid=3619 comm="syz.1.78" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4095 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 324.453362][ T30] audit: type=1400 audit(323.950:153): avc: denied { setopt } for pid=3619 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 324.773677][ T3622] process 'syz.0.79' launched './file1' with NULL argv: empty string added [ 324.790982][ T30] audit: type=1400 audit(324.270:154): avc: denied { execute_no_trans } for pid=3621 comm="syz.0.79" path="/39/file1" dev="tmpfs" ino=221 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 332.597792][ T30] audit: type=1400 audit(332.090:155): avc: denied { create } for pid=3651 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 332.643010][ T30] audit: type=1400 audit(332.140:156): avc: denied { write } for pid=3651 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 335.901676][ T30] audit: type=1400 audit(335.390:157): avc: denied { read } for pid=3670 comm="syz.1.100" name="vsock" dev="devtmpfs" ino=750 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 335.921076][ T30] audit: type=1400 audit(335.390:158): avc: denied { open } for pid=3670 comm="syz.1.100" path="/dev/vsock" dev="devtmpfs" ino=750 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 335.922619][ T30] audit: type=1400 audit(335.400:159): avc: denied { name_bind } for pid=3670 comm="syz.1.100" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 337.609675][ T30] audit: type=1400 audit(337.100:160): avc: denied { read } for pid=3681 comm="syz.1.105" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 337.617708][ T30] audit: type=1400 audit(337.110:161): avc: denied { open } for pid=3681 comm="syz.1.105" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 337.646012][ T30] audit: type=1400 audit(337.140:162): avc: denied { ioctl } for pid=3681 comm="syz.1.105" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 338.304361][ T30] audit: type=1400 audit(337.800:163): avc: denied { write } for pid=3685 comm="syz.1.107" name="vhost-vsock" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 338.346544][ T30] audit: type=1400 audit(337.840:164): avc: denied { ioctl } for pid=3685 comm="syz.1.107" path="/dev/vhost-vsock" dev="devtmpfs" ino=719 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 348.441496][ T30] audit: type=1400 audit(347.930:165): avc: denied { ioctl } for pid=3728 comm="syz.0.124" path="socket:[5286]" dev="sockfs" ino=5286 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 358.096492][ T30] audit: type=1400 audit(357.590:166): avc: denied { getopt } for pid=3760 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 358.684401][ T30] audit: type=1400 audit(358.180:167): avc: denied { read } for pid=3763 comm="syz.0.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 359.702007][ T30] audit: type=1400 audit(359.200:168): avc: denied { write } for pid=3766 comm="syz.0.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 362.990133][ T30] audit: type=1400 audit(362.480:169): avc: denied { read } for pid=3779 comm="syz.0.145" name="event0" dev="devtmpfs" ino=752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 362.991896][ T30] audit: type=1400 audit(362.480:170): avc: denied { open } for pid=3779 comm="syz.0.145" path="/dev/input/event0" dev="devtmpfs" ino=752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 363.053704][ T3782] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3782 comm=syz.1.146 [ 367.190597][ T30] audit: type=1400 audit(366.680:171): avc: denied { create } for pid=3797 comm="syz.0.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 367.788133][ T3798] "syz.0.152" (3798) uses obsolete ecb(arc4) skcipher [ 369.288195][ T30] audit: type=1400 audit(368.780:172): avc: denied { create } for pid=3810 comm="syz.0.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 387.115640][ T30] audit: type=1400 audit(386.610:173): avc: denied { ioctl } for pid=3857 comm="syz.0.174" path="socket:[5486]" dev="sockfs" ino=5486 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 387.124053][ T3858] lo: entered promiscuous mode [ 387.144378][ T3857] lo: left promiscuous mode [ 389.434671][ T3868] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3868 comm=syz.1.178 [ 394.447417][ T3889] capability: warning: `syz.1.188' uses 32-bit capabilities (legacy support in use) [ 403.949903][ T30] audit: type=1400 audit(403.440:174): avc: denied { create } for pid=3927 comm="syz.1.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 404.005113][ T30] audit: type=1400 audit(403.500:175): avc: denied { bind } for pid=3927 comm="syz.1.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 404.019262][ T30] audit: type=1400 audit(403.500:176): avc: denied { listen } for pid=3927 comm="syz.1.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 404.026569][ T30] audit: type=1400 audit(403.520:177): avc: denied { connect } for pid=3927 comm="syz.1.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 404.115794][ T30] audit: type=1400 audit(403.610:178): avc: denied { accept } for pid=3927 comm="syz.1.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 405.851638][ T30] audit: type=1400 audit(405.340:179): avc: denied { read } for pid=3934 comm="syz.1.206" path="socket:[5620]" dev="sockfs" ino=5620 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 407.916978][ T30] audit: type=1400 audit(407.410:180): avc: denied { ioctl } for pid=3941 comm="syz.0.209" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 409.004644][ T30] audit: type=1400 audit(408.500:181): avc: denied { mounton } for pid=3945 comm="syz.0.211" path="/109/file0" dev="tmpfs" ino=594 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 414.487971][ T30] audit: type=1400 audit(413.980:182): avc: denied { block_suspend } for pid=3966 comm="syz.1.219" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 416.785606][ T30] audit: type=1400 audit(416.280:183): avc: denied { read } for pid=3973 comm="syz.0.222" name="mice" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 416.812175][ T30] audit: type=1400 audit(416.300:184): avc: denied { open } for pid=3973 comm="syz.0.222" path="/dev/input/mice" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 419.398184][ T30] audit: type=1400 audit(418.890:185): avc: denied { setopt } for pid=3981 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 419.401389][ T3982] syz.0.225: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 419.408597][ T3982] CPU: 0 UID: 0 PID: 3982 Comm: syz.0.225 Not tainted 6.11.0-rc6-syzkaller-00026-g88fac17500f4 #0 [ 419.409541][ T3982] Hardware name: linux,dummy-virt (DT) [ 419.410651][ T3982] Call trace: [ 419.411146][ T3982] dump_backtrace+0x9c/0x11c [ 419.413032][ T3982] show_stack+0x18/0x24 [ 419.413730][ T3982] dump_stack_lvl+0xdc/0xf4 [ 419.414343][ T3982] dump_stack+0x1c/0x28 [ 419.414897][ T3982] warn_alloc+0x1c0/0x308 [ 419.415466][ T3982] __vmalloc_node_range_noprof+0x994/0xd24 [ 419.416132][ T3982] vmalloc_user_noprof+0xe4/0x128 [ 419.416480][ T3982] xskq_create+0xd4/0x174 [ 419.417615][ T3982] xsk_setsockopt+0x370/0x550 [ 419.418205][ T3982] do_sock_setsockopt+0x17c/0x354 [ 419.418943][ T3982] __sys_setsockopt+0xdc/0x178 [ 419.419553][ T3982] __arm64_sys_setsockopt+0xa4/0x100 [ 419.420232][ T3982] invoke_syscall+0x6c/0x258 [ 419.420770][ T3982] el0_svc_common.constprop.0+0xac/0x230 [ 419.421379][ T3982] do_el0_svc+0x40/0x58 [ 419.421920][ T3982] el0_svc+0x50/0x180 [ 419.422508][ T3982] el0t_64_sync_handler+0x100/0x12c [ 419.423096][ T3982] el0t_64_sync+0x190/0x194 [ 419.428039][ T3982] Mem-Info: [ 419.431691][ T3982] active_anon:2375 inactive_anon:0 isolated_anon:0 [ 419.431691][ T3982] active_file:2720 inactive_file:37949 isolated_file:0 [ 419.431691][ T3982] unevictable:768 dirty:7 writeback:0 [ 419.431691][ T3982] slab_reclaimable:6790 slab_unreclaimable:28472 [ 419.431691][ T3982] mapped:2011 shmem:867 pagetables:338 [ 419.431691][ T3982] sec_pagetables:0 bounce:0 [ 419.431691][ T3982] kernel_misc_reclaimable:0 [ 419.431691][ T3982] free:271030 free_pcp:179 free_cma:8000 [ 419.434145][ T3982] Node 0 active_anon:9500kB inactive_anon:0kB active_file:10880kB inactive_file:151796kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:8044kB dirty:28kB writeback:0kB shmem:3468kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:5504kB pagetables:1352kB sec_pagetables:0kB all_unreclaimable? no [ 419.436242][ T3982] Node 0 DMA free:1084120kB boost:0kB min:22528kB low:28160kB high:33792kB reserved_highatomic:0KB active_anon:9500kB inactive_anon:0kB active_file:10880kB inactive_file:151796kB unevictable:3072kB writepending:28kB present:2097152kB managed:1541468kB mlocked:0kB bounce:0kB free_pcp:716kB local_pcp:0kB free_cma:32000kB [ 419.444198][ T3982] lowmem_reserve[]: 0 0 0 0 0 [ 419.446409][ T3982] Node 0 DMA: 84*4kB (ME) 39*8kB (UME) 77*16kB (UM) 168*32kB (UME) 96*64kB (UME) 23*128kB (UME) 11*256kB (UMC) 8*512kB (UME) 6*1024kB (MC) 5*2048kB (UMC) 255*4096kB (UMC) = 1084120kB [ 419.458092][ T3982] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 419.460040][ T3982] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=32768kB [ 419.460813][ T3982] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 419.461569][ T3982] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=64kB [ 419.462449][ T3982] 41536 total pagecache pages [ 419.463129][ T3982] 0 pages in swap cache [ 419.463731][ T3982] Free swap = 124996kB [ 419.464372][ T3982] Total swap = 124996kB [ 419.471851][ T3982] 524288 pages RAM [ 419.472643][ T3982] 0 pages HighMem/MovableOnly [ 419.473284][ T3982] 138921 pages reserved [ 419.473867][ T3982] 8192 pages cma reserved [ 419.474516][ T3982] 0 pages hwpoisoned [ 420.448182][ T30] audit: type=1400 audit(419.930:186): avc: denied { shutdown } for pid=3984 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 420.453413][ T30] audit: type=1400 audit(419.940:187): avc: denied { write } for pid=3983 comm="syz.0.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 420.492707][ T30] audit: type=1400 audit(419.970:188): avc: denied { connect } for pid=3984 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 420.498063][ T30] audit: type=1400 audit(419.990:189): avc: denied { name_connect } for pid=3984 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 424.792985][ T30] audit: type=1400 audit(424.290:190): avc: denied { read write } for pid=4000 comm="syz.0.232" name="vhost-net" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 424.802183][ T30] audit: type=1400 audit(424.290:191): avc: denied { open } for pid=4000 comm="syz.0.232" path="/dev/vhost-net" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 427.065417][ T30] audit: type=1400 audit(426.560:192): avc: denied { create } for pid=4007 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 432.657302][ T30] audit: type=1400 audit(432.150:193): avc: denied { module_load } for pid=4029 comm="syz.1.244" path="/sys/power/wakeup_count" dev="sysfs" ino=845 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 436.931514][ T30] audit: type=1400 audit(436.420:194): avc: denied { ioctl } for pid=4046 comm="syz.1.251" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 444.924203][ T4076] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 444.971205][ T30] audit: type=1400 audit(444.460:195): avc: denied { getopt } for pid=4074 comm="syz.1.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 444.997291][ T30] audit: type=1400 audit(444.480:196): avc: denied { read } for pid=4073 comm="syz.0.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 446.417258][ T30] audit: type=1400 audit(445.910:197): avc: denied { ioctl } for pid=4077 comm="syz.1.264" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=6233 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 453.434976][ T30] audit: type=1400 audit(452.930:198): avc: denied { write } for pid=4106 comm="syz.0.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 460.551307][ T30] audit: type=1400 audit(460.030:199): avc: denied { read } for pid=4127 comm="syz.1.281" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 460.581481][ T30] audit: type=1400 audit(460.050:200): avc: denied { open } for pid=4127 comm="syz.1.281" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 460.617827][ T30] audit: type=1400 audit(460.110:201): avc: denied { ioctl } for pid=4127 comm="syz.1.281" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 460.641576][ T30] audit: type=1400 audit(460.130:202): avc: denied { set_context_mgr } for pid=4127 comm="syz.1.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 460.673721][ T30] audit: type=1400 audit(460.160:203): avc: denied { map } for pid=4127 comm="syz.1.281" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 461.543302][ T4130] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2576 sclass=netlink_route_socket pid=4130 comm=syz.1.284 [ 463.281053][ T30] audit: type=1400 audit(462.780:204): avc: denied { mount } for pid=4139 comm="syz.0.289" name="/" dev="configfs" ino=1128 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 469.733793][ T30] audit: type=1400 audit(469.220:205): avc: denied { write } for pid=4159 comm="syz.1.296" name="event0" dev="devtmpfs" ino=752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 470.468282][ T30] audit: type=1400 audit(469.960:206): avc: denied { ioctl } for pid=4159 comm="syz.1.296" path="/dev/input/event0" dev="devtmpfs" ino=752 ioctlcmd=0x4584 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 496.823272][ T30] audit: type=1400 audit(496.320:207): avc: denied { ioctl } for pid=4215 comm="syz.0.316" path="socket:[6433]" dev="sockfs" ino=6433 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 507.174660][ T30] audit: type=1400 audit(506.660:208): avc: denied { read } for pid=4243 comm="syz.0.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 507.774593][ T30] audit: type=1400 audit(507.260:209): avc: denied { read write } for pid=4243 comm="syz.0.326" name="uhid" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 507.781886][ T30] audit: type=1400 audit(507.270:210): avc: denied { open } for pid=4243 comm="syz.0.326" path="/dev/uhid" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 508.451350][ T30] audit: type=1400 audit(507.940:211): avc: denied { setattr } for pid=4248 comm="syz.0.328" name="tun" dev="devtmpfs" ino=690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 509.604285][ T30] audit: type=1400 audit(509.100:212): avc: denied { write } for pid=4252 comm="syz.1.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 512.487071][ T30] audit: type=1400 audit(511.980:213): avc: denied { map } for pid=4264 comm="syz.1.334" path="socket:[6519]" dev="sockfs" ino=6519 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 512.507130][ T30] audit: type=1400 audit(511.980:214): avc: denied { read } for pid=4264 comm="syz.1.334" path="socket:[6519]" dev="sockfs" ino=6519 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 528.104941][ T4323] serio: Serial port pts0 [ 532.209213][ T30] audit: type=1400 audit(531.700:215): avc: denied { mount } for pid=4330 comm="syz.1.359" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 533.634899][ T4340] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=260 sclass=netlink_audit_socket pid=4340 comm=syz.0.362 [ 553.017004][ T4420] Zero length message leads to an empty skb [ 556.034917][ T4433] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4433 comm=syz.0.395 [ 565.127638][ T30] audit: type=1400 audit(564.620:216): avc: denied { write } for pid=4465 comm="syz.0.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 567.490578][ T30] audit: type=1400 audit(566.970:217): avc: denied { getopt } for pid=4479 comm="syz.1.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 576.278088][ T30] audit: type=1400 audit(575.770:218): avc: denied { ioctl } for pid=4519 comm="syz.1.428" path="/dev/vhost-net" dev="devtmpfs" ino=718 ioctlcmd=0x5100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 583.183151][ T30] audit: type=1400 audit(582.680:219): avc: denied { create } for pid=4556 comm="syz.1.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 603.011942][ T30] audit: type=1400 audit(602.500:220): avc: denied { mount } for pid=4637 comm="syz.0.471" name="/" dev="autofs" ino=7798 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 603.241135][ T30] audit: type=1400 audit(602.720:221): avc: denied { unmount } for pid=3281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 617.995147][ T30] audit: type=1400 audit(617.490:222): avc: denied { write } for pid=4709 comm="syz.1.499" path="socket:[7917]" dev="sockfs" ino=7917 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 620.751254][ T30] audit: type=1400 audit(620.240:223): avc: denied { create } for pid=4720 comm="syz.0.503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 620.773352][ T30] audit: type=1400 audit(620.270:224): avc: denied { ioctl } for pid=4720 comm="syz.0.503" path="socket:[8286]" dev="sockfs" ino=8286 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 621.830809][ T30] audit: type=1400 audit(621.320:225): avc: denied { open } for pid=4724 comm="syz.0.505" path="/dev/ptyq4" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 621.875638][ T30] audit: type=1400 audit(621.370:226): avc: denied { setattr } for pid=4724 comm="syz.0.505" name="ptyq4" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 624.898165][ T30] audit: type=1400 audit(624.390:227): avc: denied { append } for pid=4742 comm="syz.1.514" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 624.924447][ T30] audit: type=1400 audit(624.420:228): avc: denied { create } for pid=4742 comm="syz.1.514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 624.980377][ T30] audit: type=1400 audit(624.470:229): avc: denied { create } for pid=4742 comm="syz.1.514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 625.006394][ T4743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4743 comm=syz.1.514 [ 628.545047][ T30] audit: type=1400 audit(628.040:230): avc: denied { write } for pid=4763 comm="syz.1.522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 635.060946][ T30] audit: type=1400 audit(634.550:231): avc: denied { read } for pid=4799 comm="syz.1.537" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 635.064344][ T30] audit: type=1400 audit(634.560:232): avc: denied { open } for pid=4799 comm="syz.1.537" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 635.095684][ T30] audit: type=1400 audit(634.590:233): avc: denied { ioctl } for pid=4799 comm="syz.1.537" path="/dev/nullb0" dev="devtmpfs" ino=673 ioctlcmd=0x1261 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 646.510548][ T30] audit: type=1400 audit(646.000:234): avc: denied { read } for pid=4852 comm="syz.0.560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 650.665864][ T30] audit: type=1400 audit(650.160:235): avc: denied { write } for pid=4871 comm="syz.1.567" name="fd" dev="proc" ino=8184 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 650.707168][ T30] audit: type=1400 audit(650.200:236): avc: denied { add_name } for pid=4871 comm="syz.1.567" name="3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 650.720033][ T30] audit: type=1400 audit(650.200:237): avc: denied { create } for pid=4871 comm="syz.1.567" name="3" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 650.737014][ T30] audit: type=1400 audit(650.230:238): avc: denied { associate } for pid=4871 comm="syz.1.567" name="3" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 659.004398][ T30] audit: type=1400 audit(658.500:239): avc: denied { read } for pid=4903 comm="syz.0.578" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 659.006273][ T30] audit: type=1400 audit(658.500:240): avc: denied { open } for pid=4903 comm="syz.0.578" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 659.236723][ T30] audit: type=1400 audit(658.730:241): avc: denied { ioctl } for pid=4903 comm="syz.0.578" path="/dev/usbmon0" dev="devtmpfs" ino=697 ioctlcmd=0x9208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 660.935708][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 672.618120][ T30] audit: type=1400 audit(672.110:242): avc: denied { read } for pid=4945 comm="syz.1.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 703.798976][ C1] hrtimer: interrupt took 1050608 ns [ 711.630311][ T5040] syz.1.628: vmalloc error: size 536870912, failed to allocated page array size 1048576, mode:0xdc2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 711.632539][ T5040] CPU: 1 UID: 0 PID: 5040 Comm: syz.1.628 Not tainted 6.11.0-rc6-syzkaller-00026-g88fac17500f4 #0 [ 711.633088][ T5040] Hardware name: linux,dummy-virt (DT) [ 711.633534][ T5040] Call trace: [ 711.633954][ T5040] dump_backtrace+0x9c/0x11c [ 711.634635][ T5040] show_stack+0x18/0x24 [ 711.635163][ T5040] dump_stack_lvl+0xdc/0xf4 [ 711.635765][ T5040] dump_stack+0x1c/0x28 [ 711.636365][ T5040] warn_alloc+0x1c0/0x308 [ 711.636881][ T5040] __vmalloc_node_range_noprof+0xb08/0xd24 [ 711.637484][ T5040] __kvmalloc_node_noprof+0x140/0x1b4 [ 711.637965][ T5040] xt_alloc_entry_offsets+0x28/0x3c [ 711.638409][ T5040] translate_table+0x330/0x15b0 [ 711.638877][ T5040] do_ipt_set_ctl+0x340/0x958 [ 711.639225][ T5040] nf_setsockopt+0x80/0xf4 [ 711.639579][ T5040] ip_setsockopt+0x74/0x9c [ 711.639925][ T5040] tcp_setsockopt+0x90/0xcc [ 711.640272][ T5040] sock_common_setsockopt+0x70/0xe0 [ 711.640640][ T5040] smc_setsockopt+0x150/0xcec [ 711.641013][ T5040] do_sock_setsockopt+0x17c/0x354 [ 711.641475][ T5040] __sys_setsockopt+0xdc/0x178 [ 711.641875][ T5040] __arm64_sys_setsockopt+0xa4/0x100 [ 711.642223][ T5040] invoke_syscall+0x6c/0x258 [ 711.642660][ T5040] el0_svc_common.constprop.0+0xac/0x230 [ 711.643020][ T5040] do_el0_svc+0x40/0x58 [ 711.643360][ T5040] el0_svc+0x50/0x180 [ 711.643697][ T5040] el0t_64_sync_handler+0x100/0x12c [ 711.644050][ T5040] el0t_64_sync+0x190/0x194 [ 711.703171][ T5040] Mem-Info: [ 711.703917][ T5040] active_anon:2186 inactive_anon:0 isolated_anon:0 [ 711.703917][ T5040] active_file:64 inactive_file:42853 isolated_file:0 [ 711.703917][ T5040] unevictable:768 dirty:12 writeback:0 [ 711.703917][ T5040] slab_reclaimable:6823 slab_unreclaimable:28623 [ 711.703917][ T5040] mapped:1986 shmem:873 pagetables:307 [ 711.703917][ T5040] sec_pagetables:0 bounce:0 [ 711.703917][ T5040] kernel_misc_reclaimable:0 [ 711.703917][ T5040] free:251059 free_pcp:1191 free_cma:8000 [ 711.705693][ T5040] Node 0 active_anon:8744kB inactive_anon:0kB active_file:256kB inactive_file:171412kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:7944kB dirty:48kB writeback:0kB shmem:3492kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:5432kB pagetables:1228kB sec_pagetables:0kB all_unreclaimable? no [ 711.707200][ T5040] Node 0 DMA free:1004236kB boost:0kB min:22528kB low:28160kB high:33792kB reserved_highatomic:0KB active_anon:8744kB inactive_anon:0kB active_file:256kB inactive_file:171412kB unevictable:3072kB writepending:48kB present:2097152kB managed:1541468kB mlocked:0kB bounce:0kB free_pcp:4752kB local_pcp:4156kB free_cma:32000kB [ 711.740394][ T5040] lowmem_reserve[]: 0 0 0 0 0 [ 711.749475][ T5040] Node 0 DMA: 25*4kB (UME) 141*8kB (ME) 177*16kB (M) 123*32kB (UME) 92*64kB (UME) 23*128kB (UME) 16*256kB (MEC) 20*512kB (UME) 16*1024kB (UMC) 15*2048kB (MC) 226*4096kB (MC) = 1003964kB [ 711.752609][ T5040] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 711.753070][ T5040] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=32768kB [ 711.753590][ T5040] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 711.754044][ T5040] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=64kB [ 711.754622][ T5040] 43790 total pagecache pages [ 711.754981][ T5040] 0 pages in swap cache [ 711.755329][ T5040] Free swap = 124996kB [ 711.755677][ T5040] Total swap = 124996kB [ 711.756077][ T5040] 524288 pages RAM [ 711.756468][ T5040] 0 pages HighMem/MovableOnly [ 711.756833][ T5040] 138921 pages reserved [ 711.757206][ T5040] 8192 pages cma reserved [ 711.757575][ T5040] 0 pages hwpoisoned [ 752.329742][ T30] audit: type=1400 audit(751.820:243): avc: denied { create } for pid=5201 comm="syz.1.695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 752.331584][ T30] audit: type=1400 audit(751.820:244): avc: denied { write } for pid=5201 comm="syz.1.695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 756.861148][ T30] audit: type=1400 audit(756.350:245): avc: denied { create } for pid=5226 comm="syz.1.707" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 757.419971][ T30] audit: type=1400 audit(756.910:246): avc: denied { unlink } for pid=3282 comm="syz-executor" name="file0" dev="tmpfs" ino=1834 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 759.434325][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 769.673486][ T5282] input: syz1 as /devices/virtual/input/input1 [ 771.355136][ T30] audit: type=1400 audit(770.850:247): avc: denied { getopt } for pid=5291 comm="syz.0.734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 774.810992][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 785.210852][ T30] audit: type=1400 audit(784.700:248): avc: denied { read } for pid=5351 comm="syz.1.759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 796.254606][ T30] audit: type=1400 audit(795.750:249): avc: denied { setopt } for pid=5407 comm="syz.1.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 798.275061][ T5419] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 802.230922][ T5441] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5441 comm=syz.1.796 [ 806.461727][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 835.377624][ T5536] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=5536 comm=syz.0.834 [ 835.420898][ T5536] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5536 comm=syz.0.834 [ 842.434801][ T30] audit: type=1400 audit(841.920:250): avc: denied { watch watch_reads } for pid=5565 comm="syz.0.847" path="/445/file0" dev="tmpfs" ino=2405 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 849.219769][ T30] audit: type=1400 audit(848.700:251): avc: denied { mounton } for pid=5599 comm="syz.0.862" path="/proc/1113/cgroup" dev="proc" ino=10922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 851.153713][ T5609] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5609 comm=syz.1.867 [ 852.252154][ T8] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 852.561644][ T8] usb 2-1: Using ep0 maxpacket: 16 [ 852.605352][ T8] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 852.607458][ T8] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 852.611065][ T8] usb 2-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 852.612011][ T8] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 852.686991][ T8] usb 2-1: config 0 descriptor?? [ 853.502959][ T8] hid-generic 0003:045E:07DA.0001: hidraw0: USB HID v0.00 Device [HID 045e:07da] on usb-dummy_hcd.1-1/input0 [ 855.441267][ T30] audit: type=1400 audit(854.940:252): avc: denied { listen } for pid=5623 comm="syz.0.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 855.957732][ T30] audit: type=1400 audit(855.450:253): avc: denied { ioctl } for pid=5623 comm="syz.0.874" path="socket:[10982]" dev="sockfs" ino=10982 ioctlcmd=0x542c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 862.597820][ T30] audit: type=1400 audit(862.090:254): avc: denied { write } for pid=5651 comm="syz.0.883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 862.601579][ T5652] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5652 comm=syz.0.883 [ 866.394611][ T30] audit: type=1400 audit(865.890:255): avc: denied { prog_run } for pid=5662 comm="syz.0.888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 866.726846][ T24] usb 2-1: USB disconnect, device number 2 [ 875.395894][ T5704] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=5704 comm=syz.0.901 [ 885.144757][ T5743] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5743 comm=syz.1.915 [ 898.730211][ T30] audit: type=1400 audit(898.220:256): avc: denied { write } for pid=5769 comm="syz.0.926" name="ip_mr_cache" dev="proc" ino=4026532741 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 941.149602][ T30] audit: type=1400 audit(940.570:257): avc: denied { setopt } for pid=5982 comm="syz.1.1006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 942.123827][ T30] audit: type=1400 audit(941.620:258): avc: denied { map } for pid=5988 comm="syz.1.1009" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 962.611371][ T6104] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1546 sclass=netlink_audit_socket pid=6104 comm=syz.0.1055 [ 976.355732][ T30] audit: type=1400 audit(975.850:259): avc: denied { ioctl } for pid=6184 comm="syz.1.1085" path="/dev/fb0" dev="devtmpfs" ino=621 ioctlcmd=0x7003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 983.449738][ T30] audit: type=1400 audit(982.920:260): avc: denied { ioctl } for pid=6209 comm="syz.1.1095" path="socket:[12968]" dev="sockfs" ino=12968 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 983.484023][ T30] audit: type=1400 audit(982.960:261): avc: denied { ioctl } for pid=6209 comm="syz.1.1095" path="socket:[12969]" dev="sockfs" ino=12969 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 984.501373][ T30] audit: type=1400 audit(984.000:262): avc: denied { write } for pid=6213 comm="syz.1.1097" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 987.180155][ T30] audit: type=1400 audit(986.670:263): avc: denied { read } for pid=6220 comm="syz.0.1100" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 987.182137][ T30] audit: type=1400 audit(986.670:264): avc: denied { open } for pid=6220 comm="syz.0.1100" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 989.446247][ T6236] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6236 comm=syz.1.1106 [ 989.970503][ T30] audit: type=1400 audit(989.460:265): avc: denied { mounton } for pid=6239 comm="syz.1.1108" path="/proc/1328/task" dev="proc" ino=13019 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 989.985677][ T30] audit: type=1400 audit(989.470:266): avc: denied { mount } for pid=6239 comm="syz.1.1108" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 993.181236][ T30] audit: type=1400 audit(992.670:267): avc: denied { setattr } for pid=6258 comm="syz.1.1116" name="ptmx" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 1011.257262][ T30] audit: type=1400 audit(1010.740:268): avc: denied { mount } for pid=6310 comm="syz.1.1133" name="/" dev="bdev" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bdev_t tclass=filesystem permissive=1 [ 1027.369948][ T30] audit: type=1400 audit(1026.860:269): avc: denied { connect } for pid=6380 comm="syz.1.1163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1028.650812][ C1] vcan0: j1939_tp_rxtimer: 0xffff000018ec7000: rx timeout, send abort [ 1028.665938][ C1] vcan0: j1939_xtp_rx_abort_one: 0xffff000018ec7000: 0x00100: (3) A timeout occurred and this is the connection abort to close the session. [ 1035.923600][ T30] audit: type=1400 audit(1035.410:270): avc: denied { mount } for pid=6409 comm="syz.0.1175" name="/" dev="ramfs" ino=13890 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1036.664576][ T6412] capability: warning: `syz.0.1176' uses deprecated v2 capabilities in a way that may be insecure [ 1037.761672][ T30] audit: type=1400 audit(1037.230:271): avc: denied { read } for pid=6413 comm="syz.1.1174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1040.934268][ T6437] tap0: tun_chr_ioctl cmd 1074025675 [ 1040.936000][ T6437] tap0: persist enabled [ 1040.939913][ T6433] tap0: tun_chr_ioctl cmd 1074025675 [ 1040.941159][ T6433] tap0: persist disabled [ 1051.460251][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1053.567593][ T30] audit: type=1400 audit(1053.060:272): avc: denied { rename } for pid=6498 comm="syz.1.1208" name="file0" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1057.134169][ T30] audit: type=1400 audit(1056.610:273): avc: denied { ioctl } for pid=6515 comm="syz.0.1214" path="socket:[14038]" dev="sockfs" ino=14038 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1064.243691][ T30] audit: type=1400 audit(1063.740:274): avc: denied { ioctl } for pid=6539 comm="syz.1.1224" path="socket:[14077]" dev="sockfs" ino=14077 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1064.261933][ T6540] lo: entered promiscuous mode [ 1064.347606][ T6540] lo: left promiscuous mode [ 1064.973557][ T30] audit: type=1400 audit(1064.470:275): avc: denied { write } for pid=6543 comm="syz.1.1226" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1067.120718][ T6560] SELinux: Context system_u:object_r:chfn_exec_t:s0 is not valid (left unmapped). [ 1067.132746][ T30] audit: type=1400 audit(1066.620:276): avc: denied { relabelto } for pid=6558 comm="syz.0.1233" name="cpuacct.usage_percpu" dev="tmpfs" ino=3391 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:chfn_exec_t:s0" [ 1067.140323][ T30] audit: type=1400 audit(1066.620:277): avc: denied { associate } for pid=6558 comm="syz.0.1233" name="cpuacct.usage_percpu" dev="tmpfs" ino=3391 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:chfn_exec_t:s0" [ 1067.297822][ T30] audit: type=1400 audit(1066.790:278): avc: denied { unlink } for pid=3281 comm="syz-executor" name="cpuacct.usage_percpu" dev="tmpfs" ino=3391 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:chfn_exec_t:s0" [ 1067.613690][ T6562] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6562 comm=syz.0.1234 [ 1081.446810][ T30] audit: type=1400 audit(1080.940:279): avc: denied { getopt } for pid=6627 comm="syz.0.1261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1086.610632][ T30] audit: type=1400 audit(1086.100:280): avc: denied { create } for pid=6651 comm="syz.0.1271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1086.626076][ T30] audit: type=1400 audit(1086.120:281): avc: denied { write } for pid=6651 comm="syz.0.1271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1104.029399][ T30] audit: type=1400 audit(1103.520:282): avc: denied { mount } for pid=6739 comm="syz.1.1304" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1105.966657][ T6750] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6750 comm=syz.0.1308 [ 1108.162432][ T30] audit: type=1400 audit(1107.660:283): avc: denied { bind } for pid=6762 comm="syz.1.1313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1108.174495][ T30] audit: type=1400 audit(1107.670:284): avc: denied { listen } for pid=6762 comm="syz.1.1313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1108.521042][ T30] audit: type=1400 audit(1108.010:285): avc: denied { accept } for pid=6762 comm="syz.1.1313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1116.605854][ T6805] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6805 comm=syz.0.1327 [ 1118.342499][ C1] vxcan0: j1939_tp_rxtimer: 0xffff0000275cf400: rx timeout, send abort [ 1118.347709][ C1] vxcan0: j1939_xtp_rx_abort_one: 0xffff0000275cf400: 0x20000: (3) A timeout occurred and this is the connection abort to close the session. [ 1127.716785][ T6842] ALSA: seq fatal error: cannot create timer (-16) [ 1127.742092][ T6842] ALSA: seq fatal error: cannot create timer (-22) [ 1127.744567][ T6842] ALSA: seq fatal error: cannot create timer (-16) [ 1130.355330][ T6860] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1351'. [ 1136.682161][ T30] audit: type=1400 audit(1136.170:286): avc: denied { nlmsg_read } for pid=6867 comm="syz.1.1354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1146.840418][ T30] audit: type=1400 audit(1146.330:287): avc: denied { connect } for pid=6883 comm="syz.0.1360" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1160.176737][ T30] audit: type=1400 audit(1159.670:288): avc: denied { mount } for pid=6890 comm="syz.0.1363" name="/" dev="sockfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1163.426151][ T30] audit: type=1400 audit(1162.920:289): avc: denied { ioctl } for pid=6911 comm="syz.1.1372" path="/dev/input/mice" dev="devtmpfs" ino=709 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1173.513637][ T30] audit: type=1400 audit(1173.000:290): avc: denied { map } for pid=6954 comm="syz.1.1388" path="socket:[15836]" dev="sockfs" ino=15836 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1209.832218][ T30] audit: type=1400 audit(1209.320:291): avc: denied { create } for pid=7118 comm="syz.1.1449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1225.761587][ T30] audit: type=1400 audit(1225.260:292): avc: denied { write } for pid=7180 comm="syz.1.1474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1227.967671][ T7192] netlink: 'syz.1.1479': attribute type 4 has an invalid length. [ 1228.042349][ T7192] netlink: 'syz.1.1479': attribute type 4 has an invalid length. [ 1228.636006][ T7197] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7197 comm=syz.0.1481 [ 1233.815560][ T30] audit: type=1400 audit(1233.310:293): avc: denied { setopt } for pid=7222 comm="syz.0.1492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1258.056060][ T7356] can0: slcan on ttyS3. [ 1258.189715][ T30] audit: type=1400 audit(1257.670:294): avc: denied { read } for pid=3131 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1258.221101][ T7356] can0 (unregistered): slcan off ttyS3. [ 1259.904882][ T7367] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65381 sclass=netlink_route_socket pid=7367 comm=syz.0.1545 [ 1261.064269][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1280.079361][ T30] audit: type=1400 audit(1279.570:295): avc: denied { read write } for pid=7482 comm="syz.1.1591" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1280.083386][ T30] audit: type=1400 audit(1279.580:296): avc: denied { open } for pid=7482 comm="syz.1.1591" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1289.537157][ T7534] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=256 sclass=netlink_audit_socket pid=7534 comm=syz.1.1612 [ 1298.949821][ T30] audit: type=1400 audit(1298.440:297): avc: denied { ioctl } for pid=7569 comm="syz.1.1625" path="/dev/loop-control" dev="devtmpfs" ino=638 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1321.013402][ T30] audit: type=1400 audit(1320.500:298): avc: denied { setattr } for pid=7698 comm="syz.0.1674" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 1355.906213][ T30] audit: type=1400 audit(1355.400:299): avc: denied { read } for pid=7884 comm="syz.1.1750" name="rtc0" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1355.937063][ T30] audit: type=1400 audit(1355.410:300): avc: denied { open } for pid=7884 comm="syz.1.1750" path="/dev/rtc0" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1374.682752][ T7976] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2570 sclass=netlink_xfrm_socket pid=7976 comm=syz.0.1786 [ 1378.462420][ T30] audit: type=1400 audit(1377.960:301): avc: denied { ioctl } for pid=7996 comm="syz.0.1794" path="socket:[19082]" dev="sockfs" ino=19082 ioctlcmd=0x5514 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1380.037494][ T8005] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=8005 comm=syz.1.1798 [ 1380.040473][ T30] audit: type=1400 audit(1379.530:302): avc: denied { write } for pid=8004 comm="syz.1.1798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1380.062184][ T30] audit: type=1400 audit(1379.550:303): avc: denied { read } for pid=8004 comm="syz.1.1798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1383.461896][ T8025] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=8025 comm=syz.0.1806 [ 1405.693152][ T30] audit: type=1400 audit(1405.190:304): avc: denied { map } for pid=8109 comm="syz.1.1838" path="socket:[19873]" dev="sockfs" ino=19873 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1405.729875][ T30] audit: type=1400 audit(1405.210:305): avc: denied { read } for pid=8109 comm="syz.1.1838" path="socket:[19873]" dev="sockfs" ino=19873 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1455.993996][ T8324] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8324 comm=syz.0.1921 [ 1460.544990][ T8346] input: syz0 as /devices/virtual/input/input2 [ 1462.829407][ T8360] "syz.1.1937" (8360) uses obsolete ecb(arc4) skcipher [ 1480.110689][ T8456] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8456 comm=syz.1.1975 [ 1483.442382][ T8476] input: syz0 as /devices/virtual/input/input3 [ 1504.592328][ T4352] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 1504.869522][ T4352] usb 1-1: Using ep0 maxpacket: 8 [ 1504.906881][ T4352] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 64 [ 1504.907444][ T4352] usb 1-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 32 [ 1504.940869][ T4352] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1504.941481][ T4352] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1504.941854][ T4352] usb 1-1: Product: syz [ 1504.942123][ T4352] usb 1-1: Manufacturer: syz [ 1504.942416][ T4352] usb 1-1: SerialNumber: syz [ 1505.242113][ T4352] cdc_ncm 1-1:1.0: CDC Union missing and no IAD found [ 1505.243679][ T4352] cdc_ncm 1-1:1.0: bind() failure [ 1505.276805][ T4352] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 1505.277375][ T4352] cdc_ncm 1-1:1.1: bind() failure [ 1505.320956][ T4352] usb 1-1: USB disconnect, device number 2 [ 1506.875557][ T30] audit: type=1400 audit(1506.370:306): avc: denied { write } for pid=8602 comm="syz.0.2031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1511.470902][ T8627] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8627 comm=syz.1.2040 [ 1523.373952][ T30] audit: type=1400 audit(1522.870:307): avc: denied { setopt } for pid=8713 comm="syz.1.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1533.621366][ T30] audit: type=1400 audit(1533.110:308): avc: denied { accept } for pid=8757 comm="syz.1.2094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1537.600315][ T8790] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8790 comm=syz.0.2107 [ 1548.162688][ T8852] nbd0: detected capacity change from 0 to 12 [ 1548.242084][ T8852] block nbd0: Send control failed (result -89) [ 1548.243130][ T8852] block nbd0: Request send failed, requeueing [ 1548.263004][ T49] block nbd0: Receive control failed (result -32) [ 1548.301960][ T128] block nbd0: Dead connection, failed to find a fallback [ 1548.304409][ T128] block nbd0: shutting down sockets [ 1548.314012][ T128] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1548.319730][ T128] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1548.325095][ T8852] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1548.332186][ T8852] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1548.333648][ T8852] nbd0: unable to read partition table [ 1548.372259][ T8851] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1548.377365][ T8851] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1548.381533][ T8851] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1548.382482][ T8851] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1548.383362][ T8851] nbd0: unable to read partition table [ 1548.420195][ T8851] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1548.421320][ T8851] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1548.423302][ T8851] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1548.424276][ T8851] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1548.425188][ T8851] nbd0: unable to read partition table [ 1548.427658][ T30] audit: type=1400 audit(1547.920:309): avc: denied { remove_name } for pid=3086 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1548.443713][ T30] audit: type=1400 audit(1547.940:310): avc: denied { rename } for pid=3086 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1548.451052][ T8851] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1548.452730][ T8851] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1548.456734][ T8851] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1548.457812][ T8851] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1548.466856][ T8851] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1548.467790][ T8851] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1548.482349][ T8851] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1548.483376][ T8851] Buffer I/O error on dev nbd0, logical block 0, async page read [ 1548.496958][ T30] audit: type=1400 audit(1547.990:311): avc: denied { create } for pid=3086 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1570.339781][ T30] audit: type=1400 audit(1569.830:312): avc: denied { write } for pid=8945 comm="syz.0.2165" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1577.303400][ T30] audit: type=1400 audit(1576.790:313): avc: denied { read } for pid=8962 comm="syz.0.2171" path="socket:[22781]" dev="sockfs" ino=22781 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1586.951451][ T9008] input: syz0 as /devices/virtual/input/input4 [ 1587.720423][ T9016] serio: Serial port pts0 [ 1607.374247][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1620.865658][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1626.525166][ T9175] SELinux: Context system_u:object_r:apt_var_lib_t:s0 is not valid (left unmapped). [ 1626.560723][ T30] audit: type=1400 audit(1626.040:314): avc: denied { relabelto } for pid=9173 comm="syz.1.2258" name="syz1" dev="cgroup2" ino=36 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 1626.562570][ T30] audit: type=1400 audit(1626.050:315): avc: denied { associate } for pid=9173 comm="syz.1.2258" name="syz1" dev="cgroup2" ino=36 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:apt_var_lib_t:s0" [ 1660.029344][ T6698] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 1660.334580][ T6698] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1660.335877][ T6698] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1660.336757][ T6698] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 1660.337784][ T6698] usb 2-1: New USB device found, idVendor=1a34, idProduct=0802, bcdDevice= 0.00 [ 1660.342733][ T6698] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1660.434812][ T6698] usb 2-1: config 0 descriptor?? [ 1660.986350][ T6698] hid-generic 0003:1A34:0802.0002: hidraw0: USB HID v0.00 Device [HID 1a34:0802] on usb-dummy_hcd.1-1/input0 [ 1666.459639][ T30] audit: type=1400 audit(1665.950:316): avc: denied { mounton } for pid=9285 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1666.794641][ T9289] input: syz0 as /devices/virtual/input/input5 [ 1666.900297][ T6698] usb 2-1: USB disconnect, device number 3 [ 1679.115050][ T9285] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1679.187861][ T9285] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1686.420823][ T9285] hsr_slave_0: entered promiscuous mode [ 1686.443251][ T9285] hsr_slave_1: entered promiscuous mode [ 1686.470526][ T9285] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1686.471671][ T9285] Cannot create hsr debugfs directory [ 1688.466996][ T9285] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1688.734257][ T9285] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1689.086251][ T9285] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1689.377320][ T9285] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1690.614106][ T9285] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1690.701422][ T9285] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1690.747426][ T9285] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1690.781109][ T9285] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1696.647713][ T9285] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1700.824020][ T9328] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1700.912840][ T9328] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1700.964479][ T9328] bond0 (unregistering): Released all slaves [ 1701.411190][ T9328] hsr_slave_0: left promiscuous mode [ 1701.486827][ T9328] hsr_slave_1: left promiscuous mode [ 1701.667689][ T9328] veth1_macvtap: left promiscuous mode [ 1701.691687][ T9328] veth0_macvtap: left promiscuous mode [ 1701.694009][ T9328] veth1_vlan: left promiscuous mode [ 1701.696622][ T9328] veth0_vlan: left promiscuous mode [ 1717.063659][ T9329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1717.117979][ T9329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1722.103542][ T9329] hsr_slave_0: entered promiscuous mode [ 1722.143079][ T9329] hsr_slave_1: entered promiscuous mode [ 1722.164429][ T9329] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1722.165561][ T9329] Cannot create hsr debugfs directory [ 1722.853098][ T9285] veth0_vlan: entered promiscuous mode [ 1723.015396][ T9285] veth1_vlan: entered promiscuous mode [ 1724.237650][ T9329] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1724.650269][ T9329] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1724.702519][ T9285] veth0_macvtap: entered promiscuous mode [ 1724.957577][ T9329] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1725.063907][ T9285] veth1_macvtap: entered promiscuous mode [ 1725.246492][ T9329] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1725.824286][ T9285] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1725.825369][ T9285] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1725.826163][ T9285] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1725.826981][ T9285] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1726.931321][ T30] audit: type=1400 audit(1726.420:317): avc: denied { mounton } for pid=9285 comm="syz-executor" path="/syzkaller.3E8ls3/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1727.173359][ T30] audit: type=1400 audit(1726.670:318): avc: denied { unmount } for pid=9285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1727.212341][ T9329] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1727.281768][ T30] audit: type=1400 audit(1726.770:319): avc: denied { mounton } for pid=9285 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1520 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1727.392988][ T9329] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1727.494887][ T9329] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1727.645990][ T9329] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1730.809440][ T9400] serio: Serial port pts0 [ 1732.355941][ T9329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1735.553110][ T9116] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1735.635369][ T9116] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1735.672644][ T9116] bond0 (unregistering): Released all slaves [ 1736.274759][ T9116] hsr_slave_0: left promiscuous mode [ 1736.363498][ T9116] hsr_slave_1: left promiscuous mode [ 1736.636597][ T9116] veth1_macvtap: left promiscuous mode [ 1736.637913][ T9116] veth0_macvtap: left promiscuous mode [ 1736.641038][ T9116] veth1_vlan: left promiscuous mode [ 1736.642463][ T9116] veth0_vlan: left promiscuous mode [ 1751.459092][ T9329] veth0_vlan: entered promiscuous mode [ 1751.613611][ T9329] veth1_vlan: entered promiscuous mode [ 1752.016486][ T9329] veth0_macvtap: entered promiscuous mode [ 1752.055342][ T9329] veth1_macvtap: entered promiscuous mode [ 1752.325341][ T9329] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1752.325910][ T9329] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1752.326365][ T9329] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1752.326770][ T9329] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1759.302602][ T9486] serio: Serial port pts0 [ 1768.187559][ T30] audit: type=1400 audit(1767.680:320): avc: denied { shutdown } for pid=9497 comm="syz.1.2321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1769.530003][ T9511] serio: Serial port pts0 [ 1769.874958][ T30] audit: type=1400 audit(1769.370:321): avc: denied { setopt } for pid=9513 comm="syz.0.2327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1776.603052][ T9543] block nbd0: shutting down sockets [ 1797.586951][ T30] audit: type=1400 audit(1797.080:322): avc: denied { create } for pid=9601 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1797.659550][ T30] audit: type=1400 audit(1797.150:323): avc: denied { write open } for pid=9601 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=3752 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1797.690023][ T30] audit: type=1400 audit(1797.180:324): avc: denied { append } for pid=9601 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=3752 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1797.724732][ T30] audit: type=1400 audit(1797.220:325): avc: denied { getattr } for pid=9601 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1798.464599][ T30] audit: type=1400 audit(1797.960:326): avc: denied { read } for pid=9608 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1799.641290][ T30] audit: type=1400 audit(1799.130:327): avc: denied { unlink } for pid=9615 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=3752 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1803.574635][ T9634] binder: 9632:9634 ioctl c0306201 20000280 returned -14 [ 1809.370497][ T9664] serio: Serial port pts0 [ 1845.231145][ T4352] usb 1-1: new full-speed USB device number 3 using dummy_hcd [ 1845.446780][ T4352] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1845.447986][ T4352] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1845.452122][ T4352] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 1845.453168][ T4352] usb 1-1: New USB device found, idVendor=1b96, idProduct=000a, bcdDevice= 0.00 [ 1845.454275][ T4352] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1845.486223][ T4352] usb 1-1: config 0 descriptor?? [ 1846.011878][ T4352] hid-generic 0003:1B96:000A.0003: unknown main item tag 0x0 [ 1846.012869][ T4352] hid-generic 0003:1B96:000A.0003: unknown main item tag 0x0 [ 1846.013582][ T4352] hid-generic 0003:1B96:000A.0003: unknown main item tag 0x0 [ 1846.014160][ T4352] hid-generic 0003:1B96:000A.0003: unknown main item tag 0x0 [ 1846.014731][ T4352] hid-generic 0003:1B96:000A.0003: unknown main item tag 0x0 [ 1846.037651][ T4352] hid-generic 0003:1B96:000A.0003: hidraw0: USB HID v0.00 Device [HID 1b96:000a] on usb-dummy_hcd.0-1/input0 [ 1846.205811][ T30] audit: type=1400 audit(1845.700:328): avc: denied { write } for pid=9779 comm="syz.0.2422" name="hidraw0" dev="devtmpfs" ino=1551 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1848.135728][ T3370] usb 1-1: USB disconnect, device number 3 [ 1855.640560][ T9810] serio: Serial port pts0 [ 1873.440137][ T30] audit: type=1400 audit(1872.930:329): avc: denied { append } for pid=9873 comm="syz.1.2455" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1873.452982][ T30] audit: type=1400 audit(1872.950:330): avc: denied { map } for pid=9873 comm="syz.1.2455" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1873.454555][ T30] audit: type=1400 audit(1872.950:331): avc: denied { write execute } for pid=9873 comm="syz.1.2455" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1879.921376][ T9892] serio: Serial port pts0 [ 1899.689297][ T9973] serio: Serial port pts0 [ 1929.499569][T10108] serio: Serial port pts0 [ 1950.047252][T10185] serio: Serial port pts0 [ 1956.391509][ T30] audit: type=1400 audit(1955.880:332): avc: denied { relabelfrom } for pid=10197 comm="syz.0.2577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1956.394540][ T30] audit: type=1400 audit(1955.880:333): avc: denied { relabelto } for pid=10197 comm="syz.0.2577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1966.436986][T10249] serio: Serial port pts0 [ 1967.834877][ T30] audit: type=1400 audit(1967.320:334): avc: denied { bind } for pid=10253 comm="syz.0.2597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1971.929935][ T30] audit: type=1400 audit(1971.410:335): avc: denied { ioctl } for pid=10266 comm="syz.0.2603" path="socket:[27192]" dev="sockfs" ino=27192 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1976.066375][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1998.415429][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2027.280696][ T30] audit: type=1400 audit(2026.770:336): avc: denied { ioctl } for pid=10515 comm="syz.1.2700" path="socket:[27646]" dev="sockfs" ino=27646 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2065.997217][T10697] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10697 comm=syz.1.2768 [ 2111.100334][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2112.583360][T10853] serio: Serial port pts0 [ 2115.465757][T10860] serio: Serial port pts0 [ 2132.883316][T10944] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10944 comm=syz.0.2864 [ 2145.280596][ T30] audit: type=1400 audit(2144.770:337): avc: denied { ioctl } for pid=11002 comm="syz.1.2888" path="socket:[29548]" dev="sockfs" ino=29548 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2148.502739][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x1 [ 2148.505071][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.506036][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.506929][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.508175][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.520802][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.529466][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.530405][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.530841][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.531268][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.531633][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.532353][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.534939][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.535519][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.536003][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.536599][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.537225][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.537694][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.538156][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.547540][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.548074][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.549716][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.550261][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.550857][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.551353][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.551969][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.552754][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.553241][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.553709][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.554255][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.554922][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.555492][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.570661][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.571448][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.572046][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.572976][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.573559][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.574087][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.574641][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.575201][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.575819][ T3370] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2148.656386][ T3370] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz0] on syz0 [ 2169.954305][ T30] audit: type=1400 audit(2169.440:338): avc: denied { mount } for pid=11120 comm="syz.0.2932" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 2170.006955][ T30] audit: type=1400 audit(2169.490:339): avc: denied { ioctl } for pid=11120 comm="syz.0.2932" path="/dev/rtc0" dev="devtmpfs" ino=712 ioctlcmd=0x7006 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2174.101593][T11111] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 2198.546391][T11236] serio: Serial port pts0 [ 2211.274722][T11285] input: syz0 as /devices/virtual/input/input6 [ 2212.423584][T11291] serio: Serial port pts0 [ 2219.824518][T11301] serio: Serial port pts0 [ 2232.729906][ T3370] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 2233.130336][ T3370] usb 1-1: Using ep0 maxpacket: 32 [ 2233.174571][ T3370] usb 1-1: unable to get BOS descriptor or descriptor too short [ 2233.269448][ T3370] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 2233.271080][ T3370] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 2233.271873][ T3370] usb 1-1: config 1 interface 1 has no altsetting 0 [ 2233.444355][ T3370] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 2233.445448][ T3370] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2233.446196][ T3370] usb 1-1: Product: syz [ 2233.446866][ T3370] usb 1-1: Manufacturer: syz [ 2233.447494][ T3370] usb 1-1: SerialNumber: syz [ 2233.881681][ T3370] usb 1-1: 2:1 : no or invalid class specific endpoint descriptor [ 2233.884173][ T3370] usb 1-1: 2:1 : format type 0 is not supported yet [ 2234.573754][ T3370] usb 1-1: USB disconnect, device number 4 [ 2235.835394][T11319] udevd[11319]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 2252.463640][T11391] serio: Serial port pts0 [ 2253.172882][T11348] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2253.215310][T11348] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2256.676201][T11348] hsr_slave_0: entered promiscuous mode [ 2256.687034][T11348] hsr_slave_1: entered promiscuous mode [ 2257.645223][T11348] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2257.913072][T11348] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2258.335060][T11348] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2258.580864][T11348] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2259.860980][T11348] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2259.914875][T11348] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2259.943735][T11348] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2259.980545][T11348] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2268.873918][T11356] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2268.959831][T11356] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2268.994562][T11356] bond0 (unregistering): Released all slaves [ 2269.500990][T11356] hsr_slave_0: left promiscuous mode [ 2269.536610][T11356] hsr_slave_1: left promiscuous mode [ 2269.683636][T11356] veth1_macvtap: left promiscuous mode [ 2269.684793][T11356] veth0_macvtap: left promiscuous mode [ 2269.686038][T11356] veth1_vlan: left promiscuous mode [ 2269.687269][T11356] veth0_vlan: left promiscuous mode [ 2276.033652][T11348] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2287.424650][T11348] veth0_vlan: entered promiscuous mode [ 2287.541688][T11348] veth1_vlan: entered promiscuous mode [ 2287.914280][T11348] veth0_macvtap: entered promiscuous mode [ 2288.031442][T11348] veth1_macvtap: entered promiscuous mode [ 2288.537180][T11348] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2288.541800][T11348] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2288.542630][T11348] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2288.543495][T11348] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2291.035158][ T30] audit: type=1400 audit(2290.530:340): avc: denied { getopt } for pid=11496 comm="syz.0.3046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2294.762693][T11497] syz.0.3046: vmalloc error: size 536870912, failed to allocated page array size 1048576, mode:0xdc2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 2294.774439][T11497] CPU: 1 UID: 0 PID: 11497 Comm: syz.0.3046 Not tainted 6.11.0-rc6-syzkaller-00026-g88fac17500f4 #0 [ 2294.775543][T11497] Hardware name: linux,dummy-virt (DT) [ 2294.776445][T11497] Call trace: [ 2294.776889][T11497] dump_backtrace+0x9c/0x11c [ 2294.778995][T11497] show_stack+0x18/0x24 [ 2294.779454][T11497] dump_stack_lvl+0xdc/0xf4 [ 2294.779927][T11497] dump_stack+0x1c/0x28 [ 2294.780368][T11497] warn_alloc+0x1c0/0x308 [ 2294.780827][T11497] __vmalloc_node_range_noprof+0xb08/0xd24 [ 2294.781322][T11497] __kvmalloc_node_noprof+0x140/0x1b4 [ 2294.781810][T11497] xt_alloc_entry_offsets+0x28/0x3c [ 2294.782303][T11497] translate_table+0x330/0x15b0 [ 2294.782781][T11497] do_ipt_set_ctl+0x340/0x958 [ 2294.783241][T11497] nf_setsockopt+0x80/0xf4 [ 2294.783711][T11497] ip_setsockopt+0x74/0x9c [ 2294.784196][T11497] tcp_setsockopt+0x90/0xcc [ 2294.784653][T11497] sock_common_setsockopt+0x70/0xe0 [ 2294.785125][T11497] smc_setsockopt+0x150/0xcec [ 2294.785603][T11497] do_sock_setsockopt+0x17c/0x354 [ 2294.786033][T11497] __sys_setsockopt+0xdc/0x178 [ 2294.786734][T11497] __arm64_sys_setsockopt+0xa4/0x100 [ 2294.787316][T11497] invoke_syscall+0x6c/0x258 [ 2294.787790][T11497] el0_svc_common.constprop.0+0xac/0x230 [ 2294.788333][T11497] do_el0_svc+0x40/0x58 [ 2294.788917][T11497] el0_svc+0x50/0x180 [ 2294.789418][T11497] el0t_64_sync_handler+0x100/0x12c [ 2294.789907][T11497] el0t_64_sync+0x190/0x194 [ 2294.797626][T11497] Mem-Info: [ 2294.813569][T11497] active_anon:2226 inactive_anon:0 isolated_anon:0 [ 2294.813569][T11497] active_file:64 inactive_file:43427 isolated_file:0 [ 2294.813569][T11497] unevictable:768 dirty:31 writeback:0 [ 2294.813569][T11497] slab_reclaimable:6947 slab_unreclaimable:29809 [ 2294.813569][T11497] mapped:1891 shmem:891 pagetables:315 [ 2294.813569][T11497] sec_pagetables:0 bounce:0 [ 2294.813569][T11497] kernel_misc_reclaimable:0 [ 2294.813569][T11497] free:246880 free_pcp:2323 free_cma:8000 [ 2294.816367][T11497] Node 0 active_anon:8904kB inactive_anon:0kB active_file:256kB inactive_file:173708kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:7564kB dirty:124kB writeback:0kB shmem:3564kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:5408kB pagetables:1260kB sec_pagetables:0kB all_unreclaimable? no [ 2294.817934][T11497] Node 0 DMA free:987520kB boost:0kB min:22528kB low:28160kB high:33792kB reserved_highatomic:0KB active_anon:8904kB inactive_anon:0kB active_file:256kB inactive_file:173708kB unevictable:3072kB writepending:124kB present:2097152kB managed:1541468kB mlocked:0kB bounce:0kB free_pcp:9288kB local_pcp:8088kB free_cma:32000kB [ 2294.824443][T11497] lowmem_reserve[]: 0 0 0 0 0 [ 2294.826402][T11497] Node 0 DMA: 2*4kB (UE) 1*8kB (U) 233*16kB (UME) 215*32kB (ME) 127*64kB (UME) 58*128kB (M) 43*256kB (MEC) 24*512kB (M) 14*1024kB (UMC) 7*2048kB (MC) 222*4096kB (MC) = 987456kB [ 2294.833830][T11497] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2294.834691][T11497] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=32768kB [ 2294.835414][T11497] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 2294.836182][T11497] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=64kB [ 2294.837048][T11497] 44382 total pagecache pages [ 2294.837690][T11497] 0 pages in swap cache [ 2294.840030][T11497] Free swap = 124728kB [ 2294.840636][T11497] Total swap = 124996kB [ 2294.841391][T11497] 524288 pages RAM [ 2294.841862][T11497] 0 pages HighMem/MovableOnly [ 2294.842392][T11497] 138921 pages reserved [ 2294.842837][T11497] 8192 pages cma reserved [ 2294.843271][T11497] 0 pages hwpoisoned [ 2315.160247][T11594] serio: Serial port pts0 [ 2322.167673][T11623] serio: Serial port pts0 [ 2325.905580][T11642] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11642 comm=syz.1.3102 [ 2343.110001][T11709] serio: Serial port pts0 [ 2402.210599][T11952] serio: Serial port pts0 [ 2416.190258][T12007] serio: Serial port pts0 [ 2426.896673][ T30] audit: type=1400 audit(2426.390:341): avc: denied { unmount } for pid=9285 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2428.140358][ T30] audit: type=1400 audit(2427.630:342): avc: denied { setattr } for pid=12060 comm="syz.0.3264" name="PACKET" dev="sockfs" ino=33488 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2428.156763][ T30] audit: type=1400 audit(2427.650:343): avc: denied { create } for pid=12060 comm="syz.0.3264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 2432.280096][T12077] serio: Serial port pts0 [ 2438.564715][ T30] audit: type=1400 audit(2438.060:344): avc: denied { connect } for pid=12088 comm="syz.0.3274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2438.576881][ T30] audit: type=1400 audit(2438.070:345): avc: denied { bind } for pid=12088 comm="syz.0.3274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2441.811189][T12102] TCP: TCP_TX_DELAY enabled [ 2444.771892][ T4352] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 2445.174566][ T4352] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2445.260325][ T4352] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2445.261561][ T4352] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2445.262453][ T4352] usb 2-1: Product: syz [ 2445.263135][ T4352] usb 2-1: Manufacturer: syz [ 2445.263840][ T4352] usb 2-1: SerialNumber: syz [ 2446.814848][ T4352] cdc_ncm 2-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 2446.816920][ T4352] cdc_ncm 2-1:1.0: dwNtbInMaxSize=16 is too small. Using 2048 [ 2446.817776][ T4352] cdc_ncm 2-1:1.0: setting rx_max = 2048 [ 2447.345899][ T4352] cdc_ncm 2-1:1.0: setting tx_max = 88 [ 2447.431441][ T4352] cdc_ncm 2-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.1-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 2447.532067][ T4352] usb 2-1: USB disconnect, device number 4 [ 2447.552749][ T4352] cdc_ncm 2-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.1-1, CDC NCM (NO ZLP) [ 2460.474605][T12167] serio: Serial port pts1 [ 2478.546401][ T30] audit: type=1400 audit(2478.040:346): avc: denied { bind } for pid=12247 comm="syz.0.3338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2486.575099][ T30] audit: type=1400 audit(2486.070:347): avc: denied { setattr } for pid=12289 comm="syz.0.3354" name="zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 2492.775683][T12319] serio: Serial port pts0 [ 2500.424013][ T30] audit: type=1400 audit(2499.910:348): avc: denied { append } for pid=12343 comm="syz.0.3375" name="userio" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2500.564064][T12345] misc userio: Begin command sent, but we're already running [ 2508.205171][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2525.329959][T12462] serio: Serial port pts0 [ 2530.484060][T12478] syz.0.3425 uses obsolete (PF_INET,SOCK_PACKET) [ 2548.781319][T12579] serio: Serial port pts0 [ 2555.049745][T12600] serio: Serial port pts0 [ 2557.854491][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2573.419161][T12667] serio: Serial port pts0 [ 2603.016461][T12753] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12753 comm=syz.1.3531 [ 2603.046685][T12753] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=12753 comm=syz.1.3531 [ 2608.373194][T12782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12782 comm=syz.0.3542 [ 2644.066212][ T30] audit: type=1400 audit(2643.560:349): avc: denied { accept } for pid=12974 comm="syz.1.3616" lport=58180 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2651.679070][ T30] audit: type=1400 audit(2651.170:350): avc: denied { getopt } for pid=13005 comm="syz.1.3628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2666.132124][T13069] input: syz0 as /devices/virtual/input/input7 [ 2667.976780][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2678.433553][T13096] nbd1: detected capacity change from 0 to 23 [ 2680.156628][ T49] block nbd1: Receive control failed (result -104) [ 2705.343643][ T1098] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2705.595874][ T1098] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2705.648075][T13098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2705.696921][T13098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2705.812318][ T1098] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2705.984635][ T1098] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2708.681993][ T1098] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2708.746588][ T1098] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2708.798143][ T1098] bond0 (unregistering): Released all slaves [ 2708.836613][ T39] block nbd1: Possible stuck request ffff0000160a8000: control (read@0,4096B). Runtime 30 seconds [ 2709.404022][ T1098] hsr_slave_0: left promiscuous mode [ 2709.424831][ T1098] hsr_slave_1: left promiscuous mode [ 2709.545998][ T1098] veth1_macvtap: left promiscuous mode [ 2709.547564][ T1098] veth0_macvtap: left promiscuous mode [ 2709.551419][ T1098] veth1_vlan: left promiscuous mode [ 2709.552911][ T1098] veth0_vlan: left promiscuous mode [ 2717.420572][T13098] hsr_slave_0: entered promiscuous mode [ 2717.432638][T13098] hsr_slave_1: entered promiscuous mode [ 2717.441818][T13098] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2717.442860][T13098] Cannot create hsr debugfs directory [ 2721.446813][T13098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2721.706789][T13098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2721.947288][T13098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2721.973274][T13098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2724.575854][T13129] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2724.625716][T13129] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2725.676800][T13098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2730.194504][T13129] hsr_slave_0: entered promiscuous mode [ 2730.222740][T13129] hsr_slave_1: entered promiscuous mode [ 2730.242724][T13129] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2730.243628][T13129] Cannot create hsr debugfs directory [ 2732.936933][T13129] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2733.492098][T13129] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2734.124557][T13129] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2734.616841][T13129] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2736.006761][T13129] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2736.116816][T13129] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2736.187415][T13129] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2736.257918][T13129] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2738.919614][ T39] block nbd1: Possible stuck request ffff0000160a8000: control (read@0,4096B). Runtime 60 seconds [ 2739.084238][ T3101] udevd[3101]: worker [13092] /devices/virtual/block/nbd1 is taking a long time [ 2740.404543][T13129] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2743.899719][T13098] veth0_vlan: entered promiscuous mode [ 2743.954047][T13098] veth1_vlan: entered promiscuous mode [ 2744.203858][T13098] veth0_macvtap: entered promiscuous mode [ 2744.252034][T13098] veth1_macvtap: entered promiscuous mode [ 2744.616117][T13098] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2744.622791][T13098] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2744.624901][T13098] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2744.625608][T13098] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2753.164534][T13277] serio: Serial port pts0 [ 2753.800405][T13129] veth0_vlan: entered promiscuous mode [ 2753.946049][T13129] veth1_vlan: entered promiscuous mode [ 2754.322709][T13129] veth0_macvtap: entered promiscuous mode [ 2754.417454][T13129] veth1_macvtap: entered promiscuous mode [ 2754.812875][T13129] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2754.813811][T13129] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2754.814518][T13129] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2754.815189][T13129] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2768.987729][ T39] block nbd1: Possible stuck request ffff0000160a8000: control (read@0,4096B). Runtime 90 seconds [ 2769.500640][T13319] serio: Serial port pts0 [ 2775.678118][T13332] serio: Serial port pts1 [ 2790.437852][T13351] serio: Serial port pts0 [ 2799.070932][ T39] block nbd1: Possible stuck request ffff0000160a8000: control (read@0,4096B). Runtime 120 seconds [ 2799.566521][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2821.500472][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2823.981930][T13507] serio: Serial port pts0 [ 2829.189825][ T39] block nbd1: Possible stuck request ffff0000160a8000: control (read@0,4096B). Runtime 150 seconds [ 2845.160062][ T30] audit: type=1400 audit(2844.620:351): avc: denied { setattr } for pid=13543 comm="syz.0.3765" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2847.832559][T13562] serio: Serial port pts0 [ 2851.637911][T13580] cgroup: fork rejected by pids controller in /syz0 [ 2852.694986][ T103] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2853.106081][ T103] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2853.321973][ T103] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2853.610148][ T103] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2856.024203][ T103] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2856.061113][ T103] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2856.083188][ T103] bond0 (unregistering): Released all slaves [ 2856.367790][ T103] hsr_slave_0: left promiscuous mode [ 2856.381076][ T103] hsr_slave_1: left promiscuous mode [ 2856.508080][ T103] veth1_macvtap: left promiscuous mode [ 2856.520548][ T103] veth0_macvtap: left promiscuous mode [ 2856.521631][ T103] veth1_vlan: left promiscuous mode [ 2856.522678][ T103] veth0_vlan: left promiscuous mode [ 2859.229995][ T39] block nbd1: Possible stuck request ffff0000160a8000: control (read@0,4096B). Runtime 180 seconds [ 2860.925584][ T3101] udevd[3101]: worker [13092] /devices/virtual/block/nbd1 timeout; kill it [ 2860.927531][ T3101] udevd[3101]: seq 9056 '/devices/virtual/block/nbd1' killed [ 2870.136582][ T30] audit: type=1400 audit(2869.630:352): avc: denied { shutdown } for pid=13634 comm="syz.1.3789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2870.322831][T13584] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2870.395543][T13584] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2874.954246][T13584] hsr_slave_0: entered promiscuous mode [ 2874.976869][T13584] hsr_slave_1: entered promiscuous mode [ 2874.993349][T13584] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2874.993901][T13584] Cannot create hsr debugfs directory [ 2877.106321][ T30] audit: type=1400 audit(2876.600:353): avc: denied { create } for pid=13669 comm="syz.1.3795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2879.219846][T13584] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2879.252833][T13584] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2879.293137][T13584] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2879.376013][T13584] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2879.470593][T13678] serio: Serial port pts0 [ 2883.055074][T13584] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2889.309587][ T39] block nbd1: Possible stuck request ffff0000160a8000: control (read@0,4096B). Runtime 210 seconds [ 2890.737272][ T30] audit: type=1326 audit(2890.230:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13732 comm="syz.1.3803" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffb6349328 code=0x0 [ 2896.343192][T13761] serio: Serial port pts0 [ 2896.643563][T13584] veth0_vlan: entered promiscuous mode [ 2896.702245][T13584] veth1_vlan: entered promiscuous mode [ 2897.009286][T13584] veth0_macvtap: entered promiscuous mode [ 2897.073310][T13584] veth1_macvtap: entered promiscuous mode [ 2897.442093][T13584] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2897.442664][T13584] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2897.443037][T13584] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2897.443418][T13584] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2904.272011][ T30] audit: type=1400 audit(2903.770:355): avc: denied { read } for pid=13780 comm="syz.1.3812" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 2904.276592][ T30] audit: type=1400 audit(2903.770:356): avc: denied { open } for pid=13780 comm="syz.1.3812" path="/82/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 2904.409930][T13786] block device autoloading is deprecated and will be removed. [ 2904.443958][ T30] audit: type=1400 audit(2903.940:357): avc: denied { ioctl } for pid=13780 comm="syz.1.3812" path="/82/file0/file0" dev="fuse" ino=0 ioctlcmd=0x932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 2904.444343][T13782] md: md32 stopped. [ 2907.983269][T13805] serio: Serial port pts0 [ 2919.381664][ T39] block nbd1: Possible stuck request ffff0000160a8000: control (read@0,4096B). Runtime 240 seconds [ 2923.801828][ C1] vcan0: j1939_tp_rxtimer: 0xffff000027472800: rx timeout, send abort [ 2924.303638][ C1] vcan0: j1939_tp_rxtimer: 0xffff000027472800: abort rx timeout. Force session deactivation [ 2933.951813][ T4352] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 2934.250536][ T4352] usb 1-1: Using ep0 maxpacket: 8 [ 2934.316916][ T4352] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 2934.317996][ T4352] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 2934.320022][ T4352] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 2934.320622][ T4352] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 2934.321225][ T4352] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 2934.321623][ T4352] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2934.599947][ T4352] usb 1-1: usb_control_msg returned -32 [ 2934.600593][ T4352] usbtmc 1-1:16.0: can't read capabilities [ 2948.641173][T13249] usb 1-1: USB disconnect, device number 5 [ 2949.465763][ T39] block nbd1: Possible stuck request ffff0000160a8000: control (read@0,4096B). Runtime 270 seconds [ 2961.411879][T14049] serio: Serial port pts0 [ 2969.961108][ T30] audit: type=1400 audit(2969.450:358): avc: denied { ioctl } for pid=14078 comm="syz.0.3928" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2975.014220][T14107] serio: Serial port pts0 [ 2975.270830][T14109] serio: Serial port pts1 [ 2979.543908][ T39] block nbd1: Possible stuck request ffff0000160a8000: control (read@0,4096B). Runtime 300 seconds [ 2982.880821][T14127] serio: Serial port pts0 [ 2983.820349][T14134] serio: Serial port pts1 [ 2999.009599][ T30] audit: type=1400 audit(2998.500:359): avc: denied { read } for pid=14168 comm="syz.1.3961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2999.632789][T14169] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 3000.656660][T14184] serio: Serial port pts0 [ 3005.656237][T14205] serio: Serial port pts1 [ 3006.982689][ T30] audit: type=1400 audit(3006.480:360): avc: denied { read } for pid=14210 comm="syz.1.3976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3009.632502][ T39] block nbd1: Possible stuck request ffff0000160a8000: control (read@0,4096B). Runtime 330 seconds [ 3017.205588][T14253] serio: Serial port pts0 [ 3026.520322][T14288] serio: Serial port pts1 [ 3032.669881][T14293] serio: Serial port pts0 [ 3039.726389][ T39] block nbd1: Possible stuck request ffff0000160a8000: control (read@0,4096B). Runtime 360 seconds [ 3049.365608][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 3050.119691][T14315] serio: Serial port pts0 [ 3069.794395][ T39] block nbd1: Possible stuck request ffff0000160a8000: control (read@0,4096B). Runtime 390 seconds [ 3072.323120][T14343] serio: Serial port pts0 [ 3075.749809][T13133] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3076.073008][T13133] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3076.399983][T13133] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3076.697145][T13133] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3079.411448][T13133] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3079.463313][T13133] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3079.504868][T13133] bond0 (unregistering): Released all slaves [ 3079.954366][T13133] hsr_slave_0: left promiscuous mode [ 3079.987587][T13133] hsr_slave_1: left promiscuous mode [ 3080.212664][T13133] veth1_macvtap: left promiscuous mode [ 3080.214231][T13133] veth0_macvtap: left promiscuous mode [ 3080.216293][T13133] veth1_vlan: left promiscuous mode [ 3080.217867][T13133] veth0_vlan: left promiscuous mode [ 3085.975969][T14321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3086.053721][T14321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3090.276115][T14321] hsr_slave_0: entered promiscuous mode [ 3090.291061][T14321] hsr_slave_1: entered promiscuous mode [ 3090.301023][T14321] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3090.307316][T14321] Cannot create hsr debugfs directory [ 3094.900969][T14321] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 3094.963941][T14321] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 3095.027704][T14321] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 3095.113551][T14321] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 3098.223413][T14321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3099.863283][ T39] block nbd1: Possible stuck request ffff0000160a8000: control (read@0,4096B). Runtime 420 seconds [ 3108.112398][ T30] audit: type=1400 audit(3107.610:361): avc: denied { lock } for pid=14485 comm="syz.0.4054" path="socket:[42488]" dev="sockfs" ino=42488 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 3113.279942][T14321] veth0_vlan: entered promiscuous mode [ 3113.384737][T14321] veth1_vlan: entered promiscuous mode [ 3113.682716][T14321] veth0_macvtap: entered promiscuous mode [ 3113.720036][T14321] veth1_macvtap: entered promiscuous mode [ 3114.130358][T14321] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3114.130924][T14321] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3114.131280][T14321] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3114.131649][T14321] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3116.133145][T14522] serio: Serial port pts0 [ 3122.243765][T14546] serio: Serial port pts0 [ 3124.184523][ T31] INFO: task udevd:13092 blocked for more than 430 seconds. [ 3124.187869][ T31] Not tainted 6.11.0-rc6-syzkaller-00026-g88fac17500f4 #0 [ 3124.204081][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3124.205012][ T31] task:udevd state:D stack:0 pid:13092 tgid:13092 ppid:3101 flags:0x0000000d [ 3124.206010][ T31] Call trace: [ 3124.206271][ T31] __switch_to+0x1c8/0x2a4 [ 3124.206656][ T31] __schedule+0xacc/0x2920 [ 3124.206990][ T31] schedule+0xd0/0x304 [ 3124.207262][ T31] schedule_preempt_disabled+0x18/0x2c [ 3124.207598][ T31] __mutex_lock+0x4e8/0x840 [ 3124.207891][ T31] mutex_lock_nested+0x24/0x30 [ 3124.208164][ T31] bdev_open+0x2c4/0xa84 [ 3124.213437][ T31] blkdev_open+0x24c/0x37c [ 3124.213755][ T31] do_dentry_open+0x50c/0x1068 [ 3124.214463][ T31] vfs_open+0x5c/0x2fc [ 3124.214796][ T31] path_openat+0x16dc/0x2380 [ 3124.215083][ T31] do_filp_open+0x16c/0x330 [ 3124.215346][ T31] do_sys_openat2+0x12c/0x160 [ 3124.215622][ T31] __arm64_sys_openat+0x12c/0x1b8 [ 3124.215897][ T31] invoke_syscall+0x6c/0x258 [ 3124.216176][ T31] el0_svc_common.constprop.0+0xac/0x230 [ 3124.216471][ T31] do_el0_svc+0x40/0x58 [ 3124.216773][ T31] el0_svc+0x50/0x180 [ 3124.217046][ T31] el0t_64_sync_handler+0x100/0x12c [ 3124.217326][ T31] el0t_64_sync+0x190/0x194 SYZFAIL: failed to recv rpc [ 3124.233766][ T31] INFO: task syz.1.3658:13094 blocked for more than 430 seconds. [ 3124.234700][ T31] Not tainted 6.11.0-rc6-syzkaller-00026-g88fac17500f4 #0 [ 3124.235345][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3124.236072][ T31] task:syz.1.3658 state:D stack:0 pid:13094 tgid:13094 ppid:11348 flags:0x00000001 [ 3124.237229][ T31] Call trace: [ 3124.237900][ T31] __switch_to+0x1c8/0x2a4 [ 3124.255974][ T31] __schedule+0xacc/0x2920 fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 3124.256835][ T31] schedule+0xd0/0x304 [ 3124.257563][ T31] schedule_preempt_disabled+0x18/0x2c [ 3124.258139][ T31] __mutex_lock+0x4e8/0x840 [ 3124.266343][ T31] mutex_lock_nested+0x24/0x30 [ 3124.266968][ T31] bdev_release+0x104/0x510 [ 3124.267616][ T31] blkdev_release+0x14/0x24 [ 3124.276292][ T31] __fput+0x2c4/0x964 [ 3124.277111][ T31] ____fput+0x10/0x1c [ 3124.277675][ T31] task_work_run+0x128/0x210 [ 3124.297272][ T31] do_notify_resume+0x1d4/0x25c [ 3124.298128][ T31] el0_svc+0x100/0x180 [ 3124.300233][ T31] el0t_64_sync_handler+0x100/0x12c [ 3124.300890][ T31] el0t_64_sync+0x190/0x194 [ 3124.316613][ T31] INFO: task syz.1.3658:13095 blocked for more than 430 seconds. [ 3124.317561][ T31] Not tainted 6.11.0-rc6-syzkaller-00026-g88fac17500f4 #0 [ 3124.318156][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3124.340887][ T31] task:syz.1.3658 state:D stack:0 pid:13095 tgid:13094 ppid:11348 flags:0x00000009 [ 3124.341961][ T31] Call trace: [ 3124.342467][ T31] __switch_to+0x1c8/0x2a4 [ 3124.343101][ T31] __schedule+0xacc/0x2920 [ 3124.350546][ T31] schedule+0xd0/0x304 [ 3124.351338][ T31] schedule_preempt_disabled+0x18/0x2c [ 3124.351945][ T31] __mutex_lock+0x4e8/0x840 [ 3124.352527][ T31] mutex_lock_nested+0x24/0x30 [ 3124.353123][ T31] bdev_release+0x104/0x510 [ 3124.353726][ T31] blkdev_release+0x14/0x24 [ 3124.354312][ T31] __fput+0x2c4/0x964 [ 3124.354927][ T31] ____fput+0x10/0x1c [ 3124.355507][ T31] task_work_run+0x128/0x210 [ 3124.356081][ T31] do_notify_resume+0x1d4/0x25c [ 3124.356676][ T31] el0_svc+0x100/0x180 [ 3124.357254][ T31] el0t_64_sync_handler+0x100/0x12c [ 3124.357868][ T31] el0t_64_sync+0x190/0x194 [ 3124.377898][ T31] INFO: task syz.1.3658:13096 blocked for more than 430 seconds. [ 3124.389953][ T31] Not tainted 6.11.0-rc6-syzkaller-00026-g88fac17500f4 #0 [ 3124.391010][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3124.391995][ T31] task:syz.1.3658 state:D stack:0 pid:13096 tgid:13094 ppid:11348 flags:0x0000000d [ 3124.392953][ T31] Call trace: [ 3124.393476][ T31] __switch_to+0x1c8/0x2a4 [ 3124.394126][ T31] __schedule+0xacc/0x2920 [ 3124.394758][ T31] schedule+0xd0/0x304 [ 3124.395341][ T31] io_schedule+0xac/0x114 [ 3124.395891][ T31] folio_wait_bit_common+0x2a8/0x6d0 [ 3124.396505][ T31] do_read_cache_folio+0x204/0x42c [ 3124.397096][ T31] read_cache_folio+0x44/0x6c [ 3124.397663][ T31] read_part_sector+0xac/0x2b0 [ 3124.398252][ T31] msdos_partition+0x100/0x1eb4 [ 3124.398872][ T31] bdev_disk_changed+0x504/0xec0 [ 3124.399499][ T31] blkdev_get_whole+0x144/0x1e4 [ 3124.426262][ T31] bdev_open+0x1dc/0xa84 [ 3124.433647][ T31] blkdev_open+0x24c/0x37c [ 3124.434814][ T31] do_dentry_open+0x50c/0x1068 [ 3124.435276][ T31] vfs_open+0x5c/0x2fc [ 3124.452001][ T31] path_openat+0x16dc/0x2380 [ 3124.453767][ T31] do_filp_open+0x16c/0x330 [ 3124.454640][ T31] do_sys_openat2+0x12c/0x160 [ 3124.456079][ T31] __arm64_sys_openat+0x12c/0x1b8 [ 3124.458037][ T31] invoke_syscall+0x6c/0x258 [ 3124.470324][ T31] el0_svc_common.constprop.0+0xac/0x230 [ 3124.472437][ T31] do_el0_svc+0x40/0x58 [ 3124.473752][ T31] el0_svc+0x50/0x180 [ 3124.474752][ T31] el0t_64_sync_handler+0x100/0x12c [ 3124.475383][ T31] el0t_64_sync+0x190/0x194 [ 3124.476595][ T31] [ 3124.476595][ T31] Showing all locks held in the system: [ 3124.477663][ T31] 1 lock held by khungtaskd/31: [ 3124.519329][ T31] #0: ffff800086c62ae0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x44/0x2d4 [ 3124.522453][ T31] 2 locks held by kworker/u8:4/103: [ 3124.523404][ T31] 2 locks held by getty/3220: [ 3124.523973][ T31] #0: ffff000018f4a0a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 3124.525694][ T31] #1: ffff80008cc2b2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x93c/0xe9c [ 3124.553265][ T31] 2 locks held by sshd/3273: [ 3124.553833][ T31] #0: ffff8000870a3ce0 (fill_pool_map-wait-type-override){+.+.}-{3:3}, at: fsnotify_grab_connector+0x0/0x1c0 [ 3124.555422][ T31] #1: ffff00001c8c4b80 (&sb->s_type->i_lock_key#24){+.+.}-{2:2}, at: debug_object_active_state+0x12c/0x2fc [ 3124.557282][ T31] 3 locks held by kworker/0:3/12122: [ 3124.558035][ T31] 1 lock held by udevd/13092: [ 3124.597922][ T31] #0: ffff0000160174c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa84 [ 3124.600766][ T31] 1 lock held by syz.1.3658/13094: [ 3124.601356][ T31] #0: ffff0000160174c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0x104/0x510 [ 3124.602966][ T31] 1 lock held by syz.1.3658/13095: [ 3124.603563][ T31] #0: ffff0000160174c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0x104/0x510 [ 3124.605020][ T31] 1 lock held by syz.1.3658/13096: [ 3124.605557][ T31] #0: ffff0000160174c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa84 [ 3124.607041][ T31] 1 lock held by syz-executor/13583: [ 3124.607642][ T31] 1 lock held by syz-executor/14318: [ 3124.640277][ T31] 1 lock held by syz.1.4073/14546: [ 3124.641215][ T31] #0: ffff00001eff00a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 3124.643600][ T31] 2 locks held by syz.1.4073/14547: [ 3124.644308][ T31] #0: ffff00001eff01c0 (&tty->legacy_mutex/1){+.+.}-{3:3}, at: tty_lock+0x48/0x90 [ 3124.646111][ T31] #1: ffff00001eff00a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_write+0x3c/0x4c [ 3124.647692][ T31] 1 lock held by syz.1.4073/14548: [ 3124.667849][ T31] #0: ffff00001eff00a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 3124.692678][ T31] [ 3124.693511][ T31] ============================================= [ 3124.693511][ T31] [ 3124.694843][ T31] NMI backtrace for cpu 1 [ 3124.695411][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.11.0-rc6-syzkaller-00026-g88fac17500f4 #0 [ 3124.696208][ T31] Hardware name: linux,dummy-virt (DT) [ 3124.696695][ T31] Call trace: [ 3124.697093][ T31] dump_backtrace+0x9c/0x11c [ 3124.697646][ T31] show_stack+0x18/0x24 [ 3124.698094][ T31] dump_stack_lvl+0xa4/0xf4 [ 3124.698757][ T31] dump_stack+0x1c/0x28 [ 3124.699330][ T31] nmi_cpu_backtrace+0x1b0/0x274 [ 3124.699848][ T31] nmi_trigger_cpumask_backtrace+0x25c/0x300 [ 3124.700507][ T31] arch_trigger_cpumask_backtrace+0x18/0x24 [ 3124.701058][ T31] watchdog+0xa74/0xd40 [ 3124.701562][ T31] kthread+0x27c/0x300 [ 3124.702031][ T31] ret_from_fork+0x10/0x20 [ 3124.705477][ T31] Sending NMI from CPU 1 to CPUs 0: [ 3124.708635][ C0] NMI backtrace for cpu 0 [ 3124.709774][ C0] CPU: 0 UID: 0 PID: 103 Comm: kworker/u8:4 Not tainted 6.11.0-rc6-syzkaller-00026-g88fac17500f4 #0 [ 3124.710387][ C0] Hardware name: linux,dummy-virt (DT) [ 3124.710977][ C0] Workqueue: events_power_efficient wg_ratelimiter_gc_entries [ 3124.711807][ C0] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 3124.712889][ C0] pc : lock_acquire+0x4e0/0x7a4 [ 3124.713614][ C0] lr : lock_acquire+0x494/0x7a4 [ 3124.713956][ C0] sp : ffff80008d287980 [ 3124.714443][ C0] x29: ffff80008d2879a0 x28: ffff8000851683e0 x27: 0000000000000000 [ 3124.715071][ C0] x26: ffff8000823dcf58 x25: 0000000000000000 x24: ffff80008757b8b8 [ 3124.715608][ C0] x23: 0000000000000001 x22: ffff7fffe35cf000 x21: ffff800086a10fc8 [ 3124.716135][ C0] x20: ffff800086a10fc8 x19: 1ffff00011a50f44 x18: 00000000952c836d [ 3124.716952][ C0] x17: 0000000000000000 x16: 0000000000000000 x15: ffff00000ff42880 [ 3124.717479][ C0] x14: 1fffe00001fe850f x13: 1fffe00001fe851e x12: 0000000000000028 [ 3124.718557][ C0] x11: 0000000000000000 x10: 1ffff0001106a5a1 x9 : 1ffff000111d5bcc [ 3124.719076][ C0] x8 : 1774fb8d97c0a44c x7 : 00000000d952c836 x6 : ffff00000ff428d0 [ 3124.720281][ C0] x5 : 000000000000057c x4 : 0000000000004412 x3 : 1fffe0000d3fbff9 [ 3124.721933][ C0] x2 : 0000000000000000 x1 : 0000000000000003 x0 : 0000000000000000 [ 3124.723389][ C0] Call trace: [ 3124.724103][ C0] lock_acquire+0x4e0/0x7a4 [ 3124.724966][ C0] _raw_spin_lock+0x48/0x60 [ 3124.725885][ C0] wg_ratelimiter_gc_entries+0xac/0x48c [ 3124.727046][ C0] process_one_work+0x7a0/0x1868 [ 3124.727934][ C0] worker_thread+0x72c/0xb4c [ 3124.728517][ C0] kthread+0x27c/0x300 [ 3124.728828][ C0] ret_from_fork+0x10/0x20 [ 3124.850485][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 3124.851736][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.11.0-rc6-syzkaller-00026-g88fac17500f4 #0 [ 3124.852320][ T31] Hardware name: linux,dummy-virt (DT) [ 3124.852740][ T31] Call trace: [ 3124.853081][ T31] dump_backtrace+0x9c/0x11c [ 3124.853554][ T31] show_stack+0x18/0x24 [ 3124.853949][ T31] dump_stack_lvl+0x38/0xf4 [ 3124.854575][ T31] dump_stack+0x1c/0x28 [ 3124.854989][ T31] panic+0x5a0/0x654 [ 3124.855388][ T31] watchdog+0x4bc/0xd40 [ 3124.855847][ T31] kthread+0x27c/0x300 [ 3124.856265][ T31] ret_from_fork+0x10/0x20 [ 3124.857498][ T31] SMP: stopping secondary CPUs [ 3124.859352][ T31] Kernel Offset: disabled [ 3124.860335][ T31] CPU features: 0x04,40001001,a0100000,0200421b [ 3124.861916][ T31] Memory Limit: none [ 3124.863719][ T31] Rebooting in 86400 seconds.. VM DIAGNOSIS: 12:57:12 Registers: info registers vcpu 0 CPU#0 PC=ffff8000850ba804 X00=ffff8000850ba800 X01=ffff800083a7ed00 X02=0000000000000000 X03=0000000000000001 X04=ffff700010000d70 X05=00000000f2f2f200 X06=00000000f3f3f3f3 X07=1ffff00010d51c0e X08=00000000f3000000 X09=ffff800086a8e070 X10=ffff800088352a40 X11=0000000000000000 X12=0000000000000007 X13=1ffff00010d51c13 X14=1ffff00010d51bff X15=ffff800086a8e000 X16=0000000000000000 X17=0be9c92defda5a98 X18=000000009446f20d X19=ffff800086c8e780 X20=00000000000981d0 X21=00000000000981d0 X22=0000000000000000 X23=ffff80008472ded0 X24=dfff800000000000 X25=000002d7214e3e00 X26=ffff80008472ded0 X27=0000000000000038 X28=0000000000000000 X29=ffff800080006d20 X30=ffff800083a7ed18 SP=ffff800080006d20 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffddb86cb0:6eef32c71a788600 Q02=0000ffffaaabe000:ffffff80ffffffd8 Q03=0000ffffddb86d40:0000ffffddb86d40 Q04=0000ffffddb86d40:0000ffffddb86cf8 Q05=0000ffffddb86d10:0000ffffddb86d40 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffddb86f50:0000ffffddb86f50 Q17=ffffff80ffffffd0:0000ffffddb86f20 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000850ba804 X00=ffff8000850ba800 X01=0000000000000003 X02=0000000000000000 X03=1fffe00001dd7b41 X04=0000000000000000 X05=0000000000000000 X06=1ffff00010d4df71 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700011964f16 X11=1ffff00011964f16 X12=ffff700011964f17 X13=1fffe00001dd7cad X14=1fffe00001dd7c8f X15=ffff00000eebe480 X16=0000000000000000 X17=ffff7fffe35f2000 X18=000000001cf92bf7 X19=ffff800086c9bbb0 X20=ffff800086c9bb80 X21=0000000000000000 X22=0000000000000004 X23=0000000000000028 X24=ffff800086c9bbb0 X25=ffff800086a6f000 X26=ffff00000f7427a0 X27=0000000000000001 X28=ffff00000f7421f0 X29=ffff80008cb277b0 X30=ffff8000850b8fb8 SP=ffff80008cb277b0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0900000000000000:0900000000000000 Q01=0000000900000000:0000000000000000 Q02=0000000000000009:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000009:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffddb86f50:0000ffffddb86f50 Q17=ffffff80ffffffd0:0000ffffddb86f20 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000