last executing test programs: 37m15.833713908s ago: executing program 0 (id=1707): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="0001"], 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmmsg$inet6(r1, &(0x7f0000004980)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2400c800) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x4000940) 37m12.395802864s ago: executing program 0 (id=1710): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) connect$unix(r1, &(0x7f00000000c0)=@abs, 0x6e) write$cgroup_freezer_state(r1, 0x0, 0x0) 37m11.417370271s ago: executing program 0 (id=1712): timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) r0 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000800)={{0x0, 0x0, 0xee00}}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) msgsnd(r0, &(0x7f00000001c0)={0x1}, 0x8, 0x0) 37m9.557206892s ago: executing program 0 (id=1715): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x25840, 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x2) 37m8.573457289s ago: executing program 0 (id=1717): r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) pipe2(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r0, r1) mkdirat$cgroup(r1, &(0x7f00000002c0)='syz0\x00', 0x1ff) openat$cgroup(r1, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) 37m6.597000674s ago: executing program 0 (id=1720): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001b40)={0x0, 0x1, '\x00', [@generic={0x0, 0x6, "3d8d23e6da30"}]}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmmsg$inet6(r1, &(0x7f0000004980)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2400c800) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={0x0, 0x5c}}, 0x20000000) 37m6.493204947s ago: executing program 32 (id=1720): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000001b40)={0x0, 0x1, '\x00', [@generic={0x0, 0x6, "3d8d23e6da30"}]}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmmsg$inet6(r1, &(0x7f0000004980)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x2400c800) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={0x0, 0x5c}}, 0x20000000) 26m54.813932417s ago: executing program 2 (id=2416): r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000200)=""/209, 0xd1) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000080)={0x335}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0105303, &(0x7f00000003c0)={0xf5f3}) tkill(r0, 0x7) 26m52.314889611s ago: executing program 2 (id=2417): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "00000100ebffffff", "2607080d7f4fcf00fd4ef2dece6c7c58", '\x00', "006e34e400"}, 0x28) syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), r0) 26m51.050339254s ago: executing program 2 (id=2419): r0 = socket(0x1d, 0x2, 0x6) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r2, 0x2}, 0x18) write$binfmt_misc(r0, &(0x7f0000000500), 0x8) sendto$inet6(r0, &(0x7f0000000000)="ca0acf4bfabb", 0x6, 0x0, 0x0, 0x0) 26m49.445193656s ago: executing program 2 (id=2421): mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sctp\x00') r1 = open_tree(r0, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x250) 26m48.9150902s ago: executing program 2 (id=2422): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) ioctl$KDSKBENT(r2, 0x4b4b, &(0x7f0000000000)) 26m47.969054844s ago: executing program 2 (id=2423): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) recvmmsg$unix(r1, &(0x7f0000000640)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) close(r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r2, 0x29, 0x24, 0x0, &(0x7f0000007b80)) 26m47.897854036s ago: executing program 33 (id=2423): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) recvmmsg$unix(r1, &(0x7f0000000640)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) close(r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r2, 0x29, 0x24, 0x0, &(0x7f0000007b80)) 7m27.190419246s ago: executing program 3 (id=3378): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000100)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f00000000c0)='./file1\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0xc0089364, &(0x7f0000000040)) 7m25.814671674s ago: executing program 3 (id=3379): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) r3 = fcntl$dupfd(r0, 0x0, r1) sendmsg$ETHTOOL_MSG_FEATURES_GET(r3, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) 7m25.615584359s ago: executing program 3 (id=3381): bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000200)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xeae)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8\x80kR\xfc\xcb%u3\xec\xde%\x00\xb1\x9aF\xe2\xba[\xc7%\x88 \xeeQR\x9f\x81\x8b\xdc\xc7\xdc\xdem\xbe\x7f2\x11)W\x9c\x82\x91\x17\xd8\xda@4\x9f\xc5\xe3\x8d.\xd1=\xcf\xbf\x81\xb5\x8d%K\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2/\x13{\x1a\x7f\x00\x00\x00\x00+$\xedX\xb7KV\x90\xc3D\x82`\xea\x16\xc6\xcef\xab\x05\x19\x96\xb9_6*-\xf3\x8c\x9a\x15\x9c\xf5\xb4O\x17@d\x81+\xf6\xe6+\xed\r\xd2\xb3\xaa\x9b\x7fC\'\xa2\xf6\x12\xa1\x15Punfo\x7f\x92G\x0e.\xce\xd8h\xb9p2\xccC\xbaH\xc4\xdc\xe2\xa1%)\x85\xc7O]\'9\x92\xad\xfbJ\x02\x1d\x91-\xc99\t&\xbdq\x06`T\xc8\x92\xaf\xad#\xd8b\x90\xeb\x05\x9f\t5\x06\xdd\xaf\x84\xf4\"\x13\xcf\xe5\x93D\xad~F\xe5\x19\xaa\xaa\xb2\xb1\x03m\x82+\x06\x1bF^\xd3n\xc4F\xc1\xc08\x94\xe6\xe5\x1f\xa7\xf6\xcaA\x90T\x1b\xe6\xb9\xe7\xff\xc5H\x04\x8d\xca\xad\x17UlY\x9a}\r4\xac\x93\xac\v2\xc6\xf9\xbe\xfeI\x8b\xd4/`\xab\x1e\xcf\x7f\b\x94 2.{\xc1\xbe\x9bth~\xcb\xb9E\x10W\xed\xed51[\xc5\xeb\xb1ux\x94\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdem\xe3+q:3\xfa*\x98o\'f\xbcY\x8e?\xf9\x84y\x89Y\x1c]\xad$\x7fp\xf1\xa3\x99[\xff\x1f\x94\xc2\xdb\xbaG\xa6UD\x88Y6\x11Y\xd4\xd1\xde\x9a{]\xe2\x98W\xb9\x13\x17<\x8b!?\x8e\xbc\xae\xf9\xcc\b\x90n\x15\x7f\xd5WS\xfbN\xec)B\xe7R\xa5\xd7O\x83\x80}\xcc5\x99\xdb\xd6\xbd\x9c\x05l\xfc.\xf4\xbbeF\xa3\xea}\xf1\x86z\xca\xad\x82\xd9IRV5\xa77\'\x1a\x1c\x89\xef:\xee\x10\xb2\xd6\xc8\xf4\xb5\xdd\xd8c!@JRY\xa3|Pjk\xdc\xa5d\xc2\xecn\xc9X\xfc\xd4D\x13\"\xb2\x06\xbd&\xf86\xddXv\xc9\x1322L\xd6\x99\xf6\t\x9d\xbeZ\x02\xc0\xa41\xf9sNG\x02\x83\xe6Bl\xd2\x02\xfb[\x82\xc0I\xb7\xf6\xe5Z\xa1}\xee}\x8b\x89\x04\x8a\'\xc7J\xca\xdf:\x8ft\xe0\xf8\a', 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) fallocate(r0, 0x0, 0x0, 0x800000b) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TUNDETACHFILTER(r1, 0x8902, 0x20000000) 7m25.020022425s ago: executing program 3 (id=3382): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) close(r2) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000004c0)) 7m23.198436365s ago: executing program 3 (id=3383): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) r2 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r2, &(0x7f0000000080)={0x1d, r1, 0x2}, 0x18) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 7m21.223552048s ago: executing program 3 (id=3385): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, 0x0, 0x0) 6m35.979579928s ago: executing program 34 (id=3385): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEV(r0, 0x0, 0x0) 47.648591735s ago: executing program 1 (id=3666): io_setup(0x7f, &(0x7f0000000100)=0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2, 0x3032, 0xffffffffffffffff, 0x0) io_getevents(r0, 0x8000000000000001, 0x1, &(0x7f00000002c0)=[{}], 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000017c0)='fd/3\x00') io_submit(r0, 0x1, &(0x7f0000003f00)=[&(0x7f0000001900)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) 31.61808706s ago: executing program 1 (id=3673): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x33fe0}}, 0x0) timer_create(0x0, &(0x7f0000000140)={0x0, 0x11}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$P9_RWSTAT(r0, 0x0, 0x0) 21.388685279s ago: executing program 1 (id=3678): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x10000, @value}, 0x28) r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x862b01) r1 = syz_open_dev$evdev(&(0x7f0000000280), 0x0, 0x0) read$hiddev(r1, &(0x7f0000000080)=""/102, 0x66) write$char_usb(r0, &(0x7f0000000040)="e2", 0x2250) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000080), 0x0) 16.678832527s ago: executing program 1 (id=3679): accept$unix(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x4, @tid=r0}, &(0x7f0000004200)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000001) r1 = epoll_create1(0x0) ioctl$KDSKBENT(r1, 0x5452, &(0x7f0000000040)) 12.886124349s ago: executing program 1 (id=3681): timer_create(0x0, &(0x7f0000000080)={0x0, 0x11}, &(0x7f00000001c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 6.518763723s ago: executing program 4 (id=3688): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_POLL(r2, 0x0, 0x0) 6.518407833s ago: executing program 1 (id=3689): socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r0 = syz_open_procfs$pagemap(0x0, &(0x7f0000000000)) mlock(&(0x7f00001c3000/0x2000)=nil, 0x2000) ioctl$PAGEMAP_SCAN(r0, 0xc0606610, &(0x7f00000001c0)={0x60, 0x0, &(0x7f00002f3000/0x2000)=nil, &(0x7f00005b2000/0x2000)=nil, 0x0, 0x0}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 6.149553573s ago: executing program 4 (id=3690): r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) write(r1, 0x0, 0x0) close(r0) 4.76897609s ago: executing program 4 (id=3691): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) umount2(&(0x7f0000000180)='./file0/file0/file0/file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1, {0x7, 0x1f, 0x0, 0xeea390}}, 0x50) syz_fuse_handle_req(r0, &(0x7f00000066c0)="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", 0x2000, &(0x7f0000008b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x90, 0x0, 0x0, {0x1, 0x0, 0xc, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0xa000}}}, 0x0, 0x0, 0x0, 0x0}) 2.168147971s ago: executing program 4 (id=3692): r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept$unix(r0, 0x0, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r2, 0x5450, 0x0) 559.086825ms ago: executing program 4 (id=3693): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) 0s ago: executing program 4 (id=3694): pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = dup(r0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r3 = dup3(r2, r1, 0x0) write$P9_RWRITE(r3, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:42772' (ED25519) to the list of known hosts. [ 237.219991][ T29] audit: type=1400 audit(236.420:58): avc: denied { name_bind } for pid=3272 comm="sshd" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 237.944178][ T29] audit: type=1400 audit(237.140:59): avc: denied { execute } for pid=3274 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 237.951983][ T29] audit: type=1400 audit(237.150:60): avc: denied { execute_no_trans } for pid=3274 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 244.349958][ T29] audit: type=1400 audit(243.550:61): avc: denied { mounton } for pid=3274 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 244.372481][ T29] audit: type=1400 audit(243.560:62): avc: denied { mount } for pid=3274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 244.441268][ T3274] cgroup: Unknown subsys name 'net' [ 244.483380][ T29] audit: type=1400 audit(243.680:63): avc: denied { unmount } for pid=3274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 244.941981][ T3274] cgroup: Unknown subsys name 'cpuset' [ 245.013612][ T3274] cgroup: Unknown subsys name 'rlimit' [ 245.507151][ T29] audit: type=1400 audit(244.700:64): avc: denied { setattr } for pid=3274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 245.513382][ T29] audit: type=1400 audit(244.710:65): avc: denied { mounton } for pid=3274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 245.521076][ T29] audit: type=1400 audit(244.710:66): avc: denied { mount } for pid=3274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 246.194715][ T3276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 246.213190][ T29] audit: type=1400 audit(245.400:67): avc: denied { relabelto } for pid=3276 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 246.215373][ T29] audit: type=1400 audit(245.410:68): avc: denied { write } for pid=3276 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 246.354004][ T29] audit: type=1400 audit(245.550:69): avc: denied { read } for pid=3274 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 246.362927][ T29] audit: type=1400 audit(245.550:70): avc: denied { open } for pid=3274 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 246.380214][ T3274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 261.382836][ T29] audit: type=1400 audit(260.580:71): avc: denied { execmem } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 261.531769][ T29] audit: type=1400 audit(260.730:72): avc: denied { read } for pid=3279 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 261.539017][ T29] audit: type=1400 audit(260.730:73): avc: denied { open } for pid=3279 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 261.568609][ T29] audit: type=1400 audit(260.750:74): avc: denied { mounton } for pid=3279 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 261.668901][ T29] audit: type=1400 audit(260.870:75): avc: denied { module_request } for pid=3280 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 261.962487][ T29] audit: type=1400 audit(261.160:76): avc: denied { sys_module } for pid=3280 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 269.880745][ T3280] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 270.184052][ T3280] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 270.360879][ T3279] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 270.515634][ T3279] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 273.754372][ T3280] hsr_slave_0: entered promiscuous mode [ 273.834770][ T3280] hsr_slave_1: entered promiscuous mode [ 274.507723][ T3279] hsr_slave_0: entered promiscuous mode [ 274.571458][ T3279] hsr_slave_1: entered promiscuous mode [ 274.631074][ T3279] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 274.633573][ T3279] Cannot create hsr debugfs directory [ 276.477146][ T29] audit: type=1400 audit(275.670:77): avc: denied { create } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 276.485192][ T29] audit: type=1400 audit(275.680:78): avc: denied { write } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 276.537994][ T29] audit: type=1400 audit(275.710:79): avc: denied { read } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 276.629581][ T3280] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 276.770153][ T3280] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 276.819108][ T3280] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 276.862667][ T3280] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 277.334766][ T3279] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 277.413887][ T3279] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 277.490309][ T3279] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 277.544731][ T3279] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 281.442337][ T3280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 282.740368][ T3279] 8021q: adding VLAN 0 to HW filter on device bond0 [ 297.635436][ T3280] veth0_vlan: entered promiscuous mode [ 297.841699][ T3280] veth1_vlan: entered promiscuous mode [ 298.333365][ T3280] veth0_macvtap: entered promiscuous mode [ 298.572910][ T3280] veth1_macvtap: entered promiscuous mode [ 298.765500][ T3279] veth0_vlan: entered promiscuous mode [ 298.929144][ T3279] veth1_vlan: entered promiscuous mode [ 299.410292][ T3280] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.412765][ T3280] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.413609][ T3280] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.414458][ T3280] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.119108][ T3279] veth0_macvtap: entered promiscuous mode [ 300.384140][ T3279] veth1_macvtap: entered promiscuous mode [ 300.705379][ T29] audit: type=1400 audit(299.900:80): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 300.734931][ T29] audit: type=1400 audit(299.930:81): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/syzkaller.URDqIc/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 300.815587][ T29] audit: type=1400 audit(299.990:82): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 300.910447][ T29] audit: type=1400 audit(300.110:83): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/syzkaller.URDqIc/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 301.062189][ T29] audit: type=1400 audit(300.230:84): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/syzkaller.URDqIc/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4134 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 301.240171][ T29] audit: type=1400 audit(300.440:85): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 301.319994][ T29] audit: type=1400 audit(300.510:86): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 301.430395][ T3279] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 301.431595][ T3279] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 301.432495][ T3279] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 301.434198][ T29] audit: type=1400 audit(300.620:87): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 301.475270][ T29] audit: type=1400 audit(300.660:88): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 301.484824][ T29] audit: type=1400 audit(300.670:89): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 301.493861][ T3279] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 301.935000][ T3280] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 308.231125][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 308.231311][ T29] audit: type=1400 audit(307.430:94): avc: denied { create } for pid=3425 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 308.271037][ T29] audit: type=1400 audit(307.470:95): avc: denied { bind } for pid=3425 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 308.320756][ T29] audit: type=1400 audit(307.490:96): avc: denied { accept } for pid=3425 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 308.363154][ T29] audit: type=1400 audit(307.540:97): avc: denied { write } for pid=3425 comm="syz.0.6" path="socket:[3730]" dev="sockfs" ino=3730 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 309.630002][ T29] audit: type=1400 audit(308.830:98): avc: denied { setopt } for pid=3433 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 311.331308][ T3442] Zero length message leads to an empty skb [ 314.628197][ T29] audit: type=1400 audit(313.570:99): avc: denied { create } for pid=3457 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 314.629912][ T29] audit: type=1400 audit(313.590:100): avc: denied { write } for pid=3457 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 315.654395][ T29] audit: type=1400 audit(314.840:101): avc: denied { create } for pid=3462 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 315.684911][ T29] audit: type=1400 audit(314.880:102): avc: denied { bind } for pid=3462 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 317.897571][ T29] audit: type=1400 audit(317.020:103): avc: denied { prog_load } for pid=3473 comm="syz.1.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 317.898775][ T29] audit: type=1400 audit(317.020:104): avc: denied { bpf } for pid=3473 comm="syz.1.29" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 317.899818][ T29] audit: type=1400 audit(317.020:105): avc: denied { perfmon } for pid=3473 comm="syz.1.29" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 320.137433][ T29] audit: type=1400 audit(319.330:106): avc: denied { audit_write } for pid=3487 comm="syz.0.36" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 321.315481][ T29] audit: type=1400 audit(320.510:107): avc: denied { create } for pid=3494 comm="syz.1.39" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 324.251759][ T29] audit: type=1400 audit(323.450:108): avc: denied { read write } for pid=3507 comm="syz.0.44" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 324.258483][ T29] audit: type=1400 audit(323.450:109): avc: denied { open } for pid=3507 comm="syz.0.44" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 324.731726][ T29] audit: type=1400 audit(323.930:110): avc: denied { unmount } for pid=3279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 327.145444][ T29] audit: type=1400 audit(326.340:111): avc: denied { ioctl } for pid=3520 comm="syz.1.50" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4330 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 331.330262][ T29] audit: type=1400 audit(330.530:112): avc: denied { create } for pid=3529 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 331.343601][ T29] audit: type=1400 audit(330.540:113): avc: denied { connect } for pid=3529 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 331.350495][ T29] audit: type=1400 audit(330.550:114): avc: denied { name_connect } for pid=3529 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 331.399479][ T29] audit: type=1400 audit(330.600:115): avc: denied { listen } for pid=3529 comm="syz.1.54" lport=33578 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 331.813824][ T29] audit: type=1400 audit(331.010:116): avc: denied { accept } for pid=3529 comm="syz.1.54" lport=33578 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 331.833709][ T29] audit: type=1400 audit(331.030:117): avc: denied { setopt } for pid=3529 comm="syz.1.54" lport=33578 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 333.791407][ T29] audit: type=1400 audit(332.970:118): avc: denied { mount } for pid=3537 comm="syz.0.56" name="/" dev="sockfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 336.572648][ T29] audit: type=1400 audit(335.770:119): avc: denied { mount } for pid=3551 comm="syz.1.63" name="/" dev="ramfs" ino=4384 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 353.800719][ T29] audit: type=1400 audit(353.000:120): avc: denied { getattr } for pid=3617 comm="syz.0.94" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 354.751200][ T29] audit: type=1400 audit(353.930:121): avc: denied { read } for pid=3621 comm="syz.1.97" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 354.752792][ T29] audit: type=1400 audit(353.940:122): avc: denied { open } for pid=3621 comm="syz.1.97" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 354.817556][ T29] audit: type=1400 audit(353.970:123): avc: denied { ioctl } for pid=3621 comm="syz.1.97" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x700f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 360.373170][ T29] audit: type=1400 audit(359.570:124): avc: denied { getopt } for pid=3649 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 367.680195][ T29] audit: type=1400 audit(366.880:125): avc: denied { getopt } for pid=3674 comm="syz.1.118" lport=52136 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 369.110501][ T29] audit: type=1400 audit(368.300:126): avc: denied { append } for pid=3678 comm="syz.1.121" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 371.002413][ T29] audit: type=1400 audit(370.200:127): avc: denied { module_load } for pid=3688 comm="syz.1.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 371.019928][ T3689] Invalid ELF header type: 0 != 1 [ 371.409114][ T29] audit: type=1400 audit(370.600:128): avc: denied { name_bind } for pid=3690 comm="syz.0.125" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 372.421718][ T29] audit: type=1400 audit(371.610:129): avc: denied { relabelfrom } for pid=3692 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 372.443236][ T29] audit: type=1400 audit(371.640:130): avc: denied { relabelto } for pid=3692 comm="syz.1.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 373.395245][ T29] audit: type=1400 audit(372.590:131): avc: denied { map_create } for pid=3696 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 373.422280][ T29] audit: type=1400 audit(372.610:132): avc: denied { map_read map_write } for pid=3696 comm="syz.0.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 374.421509][ T29] audit: type=1400 audit(373.610:133): avc: denied { watch } for pid=3700 comm="syz.0.131" path="/59/file0" dev="tmpfs" ino=332 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 382.397351][ T29] audit: type=1400 audit(381.590:134): avc: denied { read write } for pid=3732 comm="syz.1.145" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 382.399233][ T29] audit: type=1400 audit(381.590:135): avc: denied { open } for pid=3732 comm="syz.1.145" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 382.446982][ T29] audit: type=1400 audit(381.640:136): avc: denied { ioctl } for pid=3732 comm="syz.1.145" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 382.692248][ T29] audit: type=1400 audit(381.880:137): avc: denied { watch_reads } for pid=3735 comm="syz.0.146" path="/65/file0" dev="tmpfs" ino=365 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 383.341538][ T3740] capability: warning: `syz.1.147' uses deprecated v2 capabilities in a way that may be insecure [ 384.129799][ T29] audit: type=1400 audit(383.330:138): avc: denied { read } for pid=3743 comm="syz.1.150" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 384.135316][ T29] audit: type=1400 audit(383.330:139): avc: denied { open } for pid=3743 comm="syz.1.150" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 384.168041][ T29] audit: type=1400 audit(383.360:140): avc: denied { ioctl } for pid=3743 comm="syz.1.150" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 391.117353][ T29] audit: type=1400 audit(389.950:141): avc: denied { create } for pid=3769 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 391.509567][ T29] audit: type=1400 audit(390.430:142): avc: denied { read } for pid=3085 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 391.511451][ T29] audit: type=1400 audit(390.580:143): avc: denied { append } for pid=3085 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 391.513028][ T29] audit: type=1400 audit(390.580:144): avc: denied { open } for pid=3085 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 391.518146][ T29] audit: type=1400 audit(390.580:145): avc: denied { getattr } for pid=3085 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 398.214697][ T29] audit: type=1400 audit(397.410:146): avc: denied { create } for pid=3793 comm="syz.0.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 398.273492][ T29] audit: type=1400 audit(397.470:147): avc: denied { setopt } for pid=3793 comm="syz.0.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 398.350099][ T29] audit: type=1400 audit(397.550:148): avc: denied { map } for pid=3793 comm="syz.0.173" path="socket:[4812]" dev="sockfs" ino=4812 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 398.353833][ T29] audit: type=1400 audit(397.550:149): avc: denied { read } for pid=3793 comm="syz.0.173" path="socket:[4812]" dev="sockfs" ino=4812 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 400.650776][ T29] audit: type=1400 audit(399.850:150): avc: denied { create } for pid=3806 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 400.720216][ T29] audit: type=1400 audit(399.910:151): avc: denied { ioctl } for pid=3806 comm="syz.1.176" path="socket:[5369]" dev="sockfs" ino=5369 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 400.748917][ T29] audit: type=1400 audit(399.950:152): avc: denied { bind } for pid=3806 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 400.774095][ T29] audit: type=1400 audit(399.970:153): avc: denied { write } for pid=3806 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 437.379233][ T29] audit: type=1400 audit(436.570:154): avc: denied { mount } for pid=3904 comm="syz.1.225" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 446.713757][ T29] audit: type=1400 audit(445.910:155): avc: denied { write } for pid=3941 comm="syz.0.242" lport=38594 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 453.052246][ T29] audit: type=1400 audit(452.250:156): avc: denied { mounton } for pid=3963 comm="syz.1.252" path="/123/file0" dev="tmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 453.058889][ T29] audit: type=1400 audit(452.250:157): avc: denied { mount } for pid=3963 comm="syz.1.252" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 453.107829][ T29] audit: type=1400 audit(452.300:158): avc: denied { remount } for pid=3963 comm="syz.1.252" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 453.295557][ T29] audit: type=1400 audit(452.490:159): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 465.289571][ T29] audit: type=1400 audit(464.480:160): avc: denied { prog_run } for pid=4005 comm="syz.1.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 479.058211][ T29] audit: type=1400 audit(478.240:161): avc: denied { create } for pid=4048 comm="syz.1.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 479.079620][ T4050] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 479.101932][ T29] audit: type=1400 audit(478.300:162): avc: denied { setopt } for pid=4048 comm="syz.1.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 479.149047][ T29] audit: type=1400 audit(478.340:163): avc: denied { write } for pid=4048 comm="syz.1.291" path="socket:[5710]" dev="sockfs" ino=5710 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 480.626592][ T29] audit: type=1400 audit(479.820:164): avc: denied { write } for pid=4051 comm="syz.0.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 483.837249][ T29] audit: type=1400 audit(483.020:165): avc: denied { name_bind } for pid=4060 comm="syz.0.298" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 483.841303][ T29] audit: type=1400 audit(483.040:166): avc: denied { node_bind } for pid=4060 comm="syz.0.298" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 499.371068][ T29] audit: type=1400 audit(498.570:167): avc: denied { execute } for pid=4106 comm="syz.1.317" name="file0" dev="tmpfs" ino=844 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 502.657542][ T29] audit: type=1400 audit(501.850:168): avc: denied { read } for pid=4119 comm="syz.1.323" name="dlm-monitor" dev="devtmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 502.659305][ T29] audit: type=1400 audit(501.850:169): avc: denied { open } for pid=4119 comm="syz.1.323" path="/dev/dlm-monitor" dev="devtmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 506.508545][ T29] audit: type=1400 audit(505.690:170): avc: denied { name_bind } for pid=4131 comm="syz.0.330" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 515.183308][ T4164] syz.1.342 uses obsolete (PF_INET,SOCK_PACKET) [ 515.200405][ T29] audit: type=1400 audit(514.400:171): avc: denied { ioctl } for pid=4163 comm="syz.1.342" path="socket:[5882]" dev="sockfs" ino=5882 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 535.357384][ T29] audit: type=1400 audit(534.550:172): avc: denied { remount } for pid=4216 comm="syz.0.366" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 550.838756][ T29] audit: type=1400 audit(549.970:173): avc: denied { getopt } for pid=4265 comm="syz.0.390" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 578.302654][ T29] audit: type=1400 audit(577.500:174): avc: denied { create } for pid=4352 comm="syz.0.431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 578.316377][ T29] audit: type=1400 audit(577.510:175): avc: denied { write } for pid=4352 comm="syz.0.431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 581.852041][ T29] audit: type=1400 audit(581.040:176): avc: denied { write } for pid=4368 comm="syz.1.439" name="ip_tables_matches" dev="proc" ino=4026532671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 587.907339][ T29] audit: type=1400 audit(586.990:177): avc: denied { read } for pid=4388 comm="syz.1.449" path="socket:[7279]" dev="sockfs" ino=7279 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 605.459363][ T29] audit: type=1400 audit(604.610:178): avc: denied { read } for pid=4428 comm="syz.0.468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 608.999712][ T29] audit: type=1400 audit(607.980:179): avc: denied { bind } for pid=4440 comm="syz.0.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 609.508782][ T29] audit: type=1400 audit(608.570:180): avc: denied { read } for pid=4443 comm="syz.0.474" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 609.510037][ T29] audit: type=1400 audit(608.570:181): avc: denied { open } for pid=4443 comm="syz.0.474" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 609.511156][ T29] audit: type=1400 audit(608.580:182): avc: denied { ioctl } for pid=4443 comm="syz.0.474" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 642.564230][ T29] audit: type=1400 audit(641.760:183): avc: denied { write } for pid=4520 comm="syz.1.509" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 642.641183][ T29] audit: type=1400 audit(641.800:184): avc: denied { ioctl } for pid=4520 comm="syz.1.509" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 642.708788][ T4522] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 642.769753][ T4522] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 653.494074][ T29] audit: type=1400 audit(652.690:185): avc: denied { write } for pid=4551 comm="syz.0.523" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 653.566898][ T29] audit: type=1400 audit(652.760:186): avc: denied { ioctl } for pid=4551 comm="syz.0.523" path="socket:[7165]" dev="sockfs" ino=7165 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 662.185088][ T4569] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 666.969516][ T29] audit: type=1400 audit(666.170:187): avc: denied { create } for pid=4580 comm="syz.0.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 667.009527][ T29] audit: type=1400 audit(666.210:188): avc: denied { read } for pid=4580 comm="syz.0.535" path="socket:[7622]" dev="sockfs" ino=7622 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 668.176877][ T29] audit: type=1400 audit(667.370:189): avc: denied { create } for pid=4584 comm="syz.0.537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 668.273473][ T29] audit: type=1400 audit(667.470:190): avc: denied { setopt } for pid=4584 comm="syz.0.537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 668.310061][ T29] audit: type=1400 audit(667.510:191): avc: denied { connect } for pid=4584 comm="syz.0.537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 680.351925][ T29] audit: type=1400 audit(679.550:192): avc: denied { mounton } for pid=4607 comm="syz.0.547" path="/297/file0" dev="tmpfs" ino=1616 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 685.198081][ T29] audit: type=1400 audit(684.060:193): avc: denied { read } for pid=4620 comm="syz.1.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 739.563121][ T4720] Invalid ELF header type: 0 != 1 [ 742.059791][ T4727] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4727 comm=syz.1.601 [ 744.614513][ T29] audit: type=1400 audit(743.700:194): avc: denied { write } for pid=4733 comm="syz.0.605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 763.650145][ T4780] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4780 comm=syz.0.627 [ 788.425188][ T29] audit: type=1400 audit(787.620:195): avc: denied { nlmsg_write } for pid=4810 comm="syz.1.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 788.444836][ T4812] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4812 comm=syz.1.640 [ 800.305625][ T29] audit: type=1400 audit(799.500:196): avc: denied { create } for pid=4839 comm="syz.0.653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 800.353265][ T29] audit: type=1400 audit(799.550:197): avc: denied { getopt } for pid=4839 comm="syz.0.653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 831.771460][ T29] audit: type=1400 audit(830.970:198): avc: denied { create } for pid=4909 comm="syz.0.686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 831.978772][ T29] audit: type=1400 audit(831.160:199): avc: denied { write } for pid=4909 comm="syz.0.686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 857.538677][ T29] audit: type=1400 audit(856.680:200): avc: denied { setopt } for pid=4951 comm="syz.1.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 878.790543][ T4983] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4983 comm=syz.1.717 [ 903.239094][ T5038] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1544 sclass=netlink_route_socket pid=5038 comm=syz.0.744 [ 967.495020][ T29] audit: type=1400 audit(966.690:201): avc: denied { mount } for pid=5153 comm="syz.1.791" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 971.342329][ T29] audit: type=1400 audit(970.540:202): avc: denied { unmount } for pid=3279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1079.074724][ T3411] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 1079.468674][ T3411] usb 1-1: not running at top speed; connect to a high speed hub [ 1079.909092][ T3411] usb 1-1: config 1 interface 0 altsetting 9 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1079.910772][ T3411] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1079.918103][ T3411] usb 1-1: language id specifier not provided by device, defaulting to English [ 1080.184018][ T3411] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1080.187158][ T3411] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1080.187937][ T3411] usb 1-1: SerialNumber: syz [ 1080.414946][ T3411] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -22 [ 1080.684850][ T3062] usb 1-1: USB disconnect, device number 2 [ 1091.761409][ T29] audit: type=1400 audit(1090.960:203): avc: denied { create } for pid=5409 comm="syz.0.913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1091.798394][ T29] audit: type=1400 audit(1090.990:204): avc: denied { write } for pid=5409 comm="syz.0.913" path="socket:[10688]" dev="sockfs" ino=10688 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1100.739867][ T29] audit: type=1400 audit(1099.930:205): avc: denied { create } for pid=5426 comm="syz.1.919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1109.167040][ T29] audit: type=1400 audit(1108.360:206): avc: denied { connect } for pid=5445 comm="syz.0.931" lport=135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1218.401586][ T29] audit: type=1400 audit(1217.590:207): avc: denied { append } for pid=5710 comm="syz.1.1045" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1226.631888][ T5733] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5733 comm=syz.0.1056 [ 1242.654251][ T5771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5771 comm=syz.1.1075 [ 1290.538063][ T29] audit: type=1400 audit(1280.450:208): avc: denied { getopt } for pid=5872 comm="syz.0.1126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1296.092052][ T5888] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=5888 comm=syz.0.1128 [ 1300.752540][ T5901] can0: slcan on ttyS3. [ 1301.399495][ T5901] can0 (unregistered): slcan off ttyS3. [ 1301.403614][ T29] audit: type=1400 audit(1300.600:209): avc: denied { read } for pid=3130 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1301.414245][ T5901] Falling back ldisc for ttyS3. [ 1309.988798][ T5929] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5929 comm=syz.0.1149 [ 1341.633051][ T29] audit: type=1400 audit(1340.830:210): avc: denied { write } for pid=6007 comm="syz.0.1182" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1357.247070][ T6031] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6031 comm=syz.0.1195 [ 1380.602381][ T6087] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1544 sclass=netlink_route_socket pid=6087 comm=syz.1.1216 [ 1395.477945][ T6114] syz.0.1233(6114): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 1430.700807][ T6170] sctp: [Deprecated]: syz.0.1251 (pid 6170) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1430.700807][ T6170] Use struct sctp_sack_info instead [ 1434.873268][ T882] block nbd1: Receive control failed (result -107) [ 1435.191111][ T6180] block nbd1: shutting down sockets [ 1445.189293][ T29] audit: type=1400 audit(1444.390:211): avc: denied { watch watch_reads } for pid=6212 comm="syz.1.1271" path="/611/file0" dev="tmpfs" ino=3279 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1470.832986][ T29] audit: type=1400 audit(1470.030:212): avc: denied { read } for pid=6256 comm="syz.0.1292" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1470.835641][ T29] audit: type=1400 audit(1470.030:213): avc: denied { open } for pid=6256 comm="syz.0.1292" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1470.932006][ T29] audit: type=1400 audit(1470.130:214): avc: denied { ioctl } for pid=6256 comm="syz.0.1292" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64c9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1479.998874][ T29] audit: type=1400 audit(1478.820:215): avc: denied { unlink } for pid=3280 comm="syz-executor" name="file6" dev="tmpfs" ino=3369 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1508.787914][ C0] hrtimer: interrupt took 2048288 ns [ 1535.216418][ T29] audit: type=1400 audit(1534.390:216): avc: denied { read } for pid=6398 comm="syz.1.1356" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1535.217490][ T29] audit: type=1400 audit(1534.410:217): avc: denied { open } for pid=6398 comm="syz.1.1356" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1535.257845][ T29] audit: type=1400 audit(1534.440:218): avc: denied { create } for pid=6398 comm="syz.1.1356" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1535.327973][ T29] audit: type=1400 audit(1534.510:219): avc: denied { read append } for pid=6398 comm="syz.1.1356" name="file2" dev="tmpfs" ino=3521 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1535.346811][ T29] audit: type=1400 audit(1534.510:220): avc: denied { open } for pid=6398 comm="syz.1.1356" path="/655/file2" dev="tmpfs" ino=3521 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1535.397083][ T29] audit: type=1400 audit(1534.580:221): avc: denied { ioctl } for pid=6398 comm="syz.1.1356" path="/655/file2" dev="tmpfs" ino=3521 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1535.459760][ T6399] loop3: detected capacity change from 0 to 524288000 [ 1535.962383][ T29] audit: type=1400 audit(1535.160:222): avc: denied { unlink } for pid=3280 comm="syz-executor" name="file2" dev="tmpfs" ino=3521 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1563.224269][ T29] audit: type=1400 audit(1562.420:223): avc: denied { read } for pid=6444 comm="syz.0.1382" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1563.244480][ T29] audit: type=1400 audit(1562.440:224): avc: denied { open } for pid=6444 comm="syz.0.1382" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1567.822234][ T29] audit: type=1400 audit(1567.020:225): avc: denied { block_suspend } for pid=6454 comm="syz.1.1383" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1596.828332][ T29] audit: type=1400 audit(1596.020:226): avc: denied { create } for pid=6508 comm="syz.0.1404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1596.917122][ T29] audit: type=1400 audit(1596.110:227): avc: denied { read } for pid=6508 comm="syz.0.1404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1614.678106][ T29] audit: type=1400 audit(1613.870:228): avc: denied { read } for pid=6572 comm="syz.1.1437" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1614.691455][ T29] audit: type=1400 audit(1613.890:229): avc: denied { open } for pid=6572 comm="syz.1.1437" path="net:[4026532631]" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1633.168359][ T29] audit: type=1400 audit(1632.350:230): avc: denied { mounton } for pid=6627 comm="syz.1.1460" path="/709/file0" dev="tmpfs" ino=3812 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 1672.751338][ T29] audit: type=1400 audit(1671.940:231): avc: denied { bind } for pid=6745 comm="syz.1.1514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1708.516930][ T6837] can0: slcan on ttyS3. [ 1708.807492][ T6837] can0 (unregistered): slcan off ttyS3. [ 1708.809921][ T6837] Falling back ldisc for ttyS3. [ 1726.423529][ T29] audit: type=1400 audit(1725.620:232): avc: denied { accept } for pid=6890 comm="syz.1.1583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 1736.388911][ T6186] block nbd0: Receive control failed (result -107) [ 1736.598910][ T6924] block nbd0: shutting down sockets [ 1820.942672][ T29] audit: type=1400 audit(1820.140:233): avc: denied { create } for pid=7129 comm="syz.0.1691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1820.957392][ T29] audit: type=1400 audit(1820.150:234): avc: denied { write } for pid=7129 comm="syz.0.1691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1836.762526][ T7179] ======================================================= [ 1836.762526][ T7179] WARNING: The mand mount option has been deprecated and [ 1836.762526][ T7179] and is ignored by this kernel. Remove the mand [ 1836.762526][ T7179] option from the mount to silence this warning. [ 1836.762526][ T7179] ======================================================= [ 1839.720465][ T5979] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1840.362986][ T5979] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1841.002236][ T5979] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1841.422028][ T5979] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1847.591556][ T5979] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1847.722756][ T5979] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1847.807432][ T5979] bond0 (unregistering): Released all slaves [ 1848.400310][ T5979] hsr_slave_0: left promiscuous mode [ 1848.500799][ T5979] hsr_slave_1: left promiscuous mode [ 1848.999305][ T5979] veth1_macvtap: left promiscuous mode [ 1849.003383][ T5979] veth0_macvtap: left promiscuous mode [ 1849.020506][ T5979] veth1_vlan: left promiscuous mode [ 1849.024683][ T5979] veth0_vlan: left promiscuous mode [ 1871.934074][ T7187] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1872.222020][ T7187] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1880.744850][ T7187] hsr_slave_0: entered promiscuous mode [ 1880.831672][ T7187] hsr_slave_1: entered promiscuous mode [ 1880.910426][ T7187] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1880.911680][ T7187] Cannot create hsr debugfs directory [ 1881.024659][ T29] audit: type=1400 audit(1880.220:235): avc: denied { open } for pid=7307 comm="syz.1.1753" path="/dev/ptyq6" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1884.372852][ T7187] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1884.748402][ T7187] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1884.948066][ T7187] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1885.089591][ T7187] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1891.475047][ T7187] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1909.781969][ T7187] veth0_vlan: entered promiscuous mode [ 1910.082026][ T7187] veth1_vlan: entered promiscuous mode [ 1910.940572][ T7187] veth0_macvtap: entered promiscuous mode [ 1911.104397][ T7187] veth1_macvtap: entered promiscuous mode [ 1911.981083][ T7187] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1911.982106][ T7187] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1911.982789][ T7187] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1911.983473][ T7187] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1912.899342][ T29] audit: type=1400 audit(1912.060:236): avc: denied { mounton } for pid=7187 comm="syz-executor" path="/syzkaller.8N8iy1/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1913.015560][ T29] audit: type=1400 audit(1912.210:237): avc: denied { unmount } for pid=7187 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1913.084897][ T29] audit: type=1400 audit(1912.280:238): avc: denied { mounton } for pid=7187 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1915.225194][ T7408] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23 sclass=netlink_route_socket pid=7408 comm=syz.2.1721 [ 1921.251362][ T29] audit: type=1400 audit(1920.440:239): avc: denied { create } for pid=7427 comm="syz.2.1772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1921.322211][ T7428] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7428 comm=syz.2.1772 [ 1922.223512][ T29] audit: type=1400 audit(1921.420:240): avc: denied { map } for pid=7429 comm="syz.2.1774" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17419 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1922.247444][ T29] audit: type=1400 audit(1921.420:241): avc: denied { read write } for pid=7429 comm="syz.2.1774" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17419 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1973.643031][ T7594] sctp: [Deprecated]: syz.2.1847 (pid 7594) Use of int in max_burst socket option deprecated. [ 1973.643031][ T7594] Use struct sctp_assoc_value instead [ 1974.693523][ T29] audit: type=1400 audit(1973.890:242): avc: denied { getopt } for pid=7595 comm="syz.2.1848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1975.320730][ T7598] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=7598 comm=syz.2.1849 [ 1987.011093][ T29] audit: type=1400 audit(1986.210:243): avc: denied { getopt } for pid=7636 comm="syz.2.1868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2018.798633][ T29] audit: type=1400 audit(2017.990:244): avc: denied { read write } for pid=7724 comm="syz.2.1903" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2018.800278][ T29] audit: type=1400 audit(2017.990:245): avc: denied { open } for pid=7724 comm="syz.2.1903" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2020.258025][ T29] audit: type=1400 audit(2019.440:246): avc: denied { checkpoint_restore } for pid=7729 comm="syz.2.1905" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2025.965058][ T29] audit: type=1400 audit(2025.160:247): avc: denied { ioctl } for pid=7748 comm="syz.1.1912" path="socket:[17996]" dev="sockfs" ino=17996 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2032.914396][ T29] audit: type=1400 audit(2032.110:248): avc: denied { create } for pid=7769 comm="syz.2.1920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2032.947091][ T29] audit: type=1400 audit(2032.140:249): avc: denied { write } for pid=7769 comm="syz.2.1920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2066.418744][ T7867] lo: entered promiscuous mode [ 2066.620247][ T7867] lo: left promiscuous mode [ 2080.001847][ T29] audit: type=1400 audit(2079.200:250): avc: denied { ioctl } for pid=7898 comm="syz.2.1973" path="socket:[18233]" dev="sockfs" ino=18233 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2081.205353][ T7903] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=7903 comm=syz.2.1974 [ 2084.337100][ T29] audit: type=1400 audit(2083.520:251): avc: denied { audit_read } for pid=7913 comm="syz.1.1979" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2091.225597][ T29] audit: type=1400 audit(2090.420:252): avc: denied { nlmsg_read } for pid=7934 comm="syz.2.1987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2097.153306][ T7950] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=7950 comm=syz.2.1993 [ 2097.931233][ T29] audit: type=1400 audit(2097.130:253): avc: denied { create } for pid=7951 comm="syz.1.1994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2097.944187][ T29] audit: type=1400 audit(2097.140:254): avc: denied { write } for pid=7951 comm="syz.1.1994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2097.954733][ T7953] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7953 comm=syz.1.1994 [ 2108.559901][ T7989] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=125 sclass=netlink_route_socket pid=7989 comm=syz.2.2008 [ 2110.009760][ T29] audit: type=1400 audit(2109.210:255): avc: denied { ioctl } for pid=7994 comm="syz.2.2012" path="socket:[19228]" dev="sockfs" ino=19228 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2112.791697][ T29] audit: type=1400 audit(2111.990:256): avc: denied { map } for pid=8004 comm="syz.2.2018" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2112.810288][ T29] audit: type=1400 audit(2112.000:257): avc: denied { execute } for pid=8004 comm="syz.2.2018" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2117.689060][ T29] audit: type=1400 audit(2116.890:258): avc: denied { write } for pid=8026 comm="syz.1.2024" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2150.137500][ T29] audit: type=1400 audit(2149.290:259): avc: denied { write } for pid=8120 comm="syz.2.2062" lport=33456 faddr=2001::2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2150.185553][ T29] audit: type=1400 audit(2149.360:260): avc: denied { shutdown } for pid=8120 comm="syz.2.2062" lport=33456 faddr=2001::2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2158.633337][ T29] audit: type=1400 audit(2157.830:261): avc: denied { read } for pid=8125 comm="syz.2.2063" path="socket:[19438]" dev="sockfs" ino=19438 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2164.551093][ T8158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8158 comm=syz.2.2078 [ 2176.601158][ T29] audit: type=1400 audit(2175.800:262): avc: denied { read } for pid=8196 comm="syz.2.2092" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 2176.613004][ T29] audit: type=1400 audit(2175.810:263): avc: denied { open } for pid=8196 comm="syz.2.2092" path="/dev/input/mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 2183.978925][ T29] audit: type=1400 audit(2182.610:264): avc: denied { connect } for pid=8208 comm="syz.2.2097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2186.132175][ T29] audit: type=1400 audit(2185.320:265): avc: denied { write } for pid=8213 comm="syz.1.2099" name="fd" dev="proc" ino=19797 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 2186.134098][ T29] audit: type=1400 audit(2185.330:266): avc: denied { add_name } for pid=8213 comm="syz.1.2099" name="3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 2186.138030][ T29] audit: type=1400 audit(2185.330:267): avc: denied { create } for pid=8213 comm="syz.1.2099" name="3" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 2186.143832][ T29] audit: type=1400 audit(2185.340:268): avc: denied { associate } for pid=8213 comm="syz.1.2099" name="3" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2192.048858][ T29] audit: type=1400 audit(2191.230:269): avc: denied { map } for pid=8231 comm="syz.1.2106" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2197.668036][ T8244] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=8244 comm=syz.1.2111 [ 2202.172814][ T8257] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=8257 comm=syz.2.2115 [ 2202.205406][ T8257] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8257 comm=syz.2.2115 [ 2204.600839][ T29] audit: type=1400 audit(2203.790:270): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2221.265233][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2226.191940][ T8346] lo: entered promiscuous mode [ 2226.249978][ T8345] lo: left promiscuous mode [ 2249.744473][ T29] audit: type=1400 audit(2248.930:271): avc: denied { ioctl } for pid=8422 comm="syz.1.2181" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2259.413651][ T29] audit: type=1400 audit(2258.600:272): avc: denied { ioctl } for pid=8445 comm="syz.1.2190" path="socket:[20170]" dev="sockfs" ino=20170 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2269.314320][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2280.162110][ T29] audit: type=1400 audit(2279.360:273): avc: denied { ioctl } for pid=8510 comm="syz.2.2217" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2312.949259][ T29] audit: type=1400 audit(2312.130:274): avc: denied { name_connect } for pid=8609 comm="syz.2.2256" dest=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 2325.621422][ T29] audit: type=1400 audit(2324.820:275): avc: denied { write } for pid=8639 comm="syz.2.2268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2327.950364][ T29] audit: type=1400 audit(2327.120:276): avc: denied { execute } for pid=8645 comm="syz.1.2270" path="/dev/audio1" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 2339.647308][ T29] audit: type=1400 audit(2338.840:277): avc: denied { mount } for pid=8677 comm="syz.2.2281" name="/" dev="autofs" ino=21581 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 2339.880220][ T29] audit: type=1400 audit(2339.070:278): avc: denied { unmount } for pid=7187 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 2347.751032][ T29] audit: type=1400 audit(2346.950:279): avc: denied { write } for pid=8705 comm="syz.2.2293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2363.518871][ T29] audit: type=1400 audit(2362.700:280): avc: denied { mount } for pid=8756 comm="syz.2.2316" name="/" dev="configfs" ino=96 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 2363.649412][ T29] audit: type=1400 audit(2362.840:281): avc: denied { search } for pid=8756 comm="syz.2.2316" name="/" dev="configfs" ino=96 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 2363.746657][ T29] audit: type=1400 audit(2362.940:282): avc: denied { read } for pid=8756 comm="syz.2.2316" name="/" dev="configfs" ino=96 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 2363.884636][ T29] audit: type=1400 audit(2363.030:283): avc: denied { open } for pid=8756 comm="syz.2.2316" path="/" dev="configfs" ino=96 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 2389.295462][ T29] audit: type=1400 audit(2388.490:284): avc: denied { read } for pid=8833 comm="syz.1.2348" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2389.320202][ T29] audit: type=1400 audit(2388.500:285): avc: denied { open } for pid=8833 comm="syz.1.2348" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2431.149551][ T29] audit: type=1400 audit(2430.350:286): avc: denied { create } for pid=8950 comm="syz.2.2398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2431.158616][ T29] audit: type=1400 audit(2430.360:287): avc: denied { ioctl } for pid=8950 comm="syz.2.2398" path="socket:[22837]" dev="sockfs" ino=22837 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2431.249166][ T29] audit: type=1400 audit(2430.440:288): avc: denied { getopt } for pid=8950 comm="syz.2.2398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2440.700002][ T29] audit: type=1400 audit(2439.860:289): avc: denied { getopt } for pid=8972 comm="syz.2.2407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2456.483764][ T29] audit: type=1400 audit(2455.680:290): avc: denied { mounton } for pid=9011 comm="syz.2.2421" path="/377/file0" dev="proc" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=dir permissive=1 [ 2458.385195][ T26] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2458.441308][ T29] audit: type=1400 audit(2457.640:291): avc: denied { mounton } for pid=9017 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2459.319597][ T26] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2460.111911][ T26] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2460.358378][ T29] audit: type=1400 audit(2459.550:292): avc: denied { create } for pid=9020 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2460.428802][ T29] audit: type=1400 audit(2459.600:293): avc: denied { write open } for pid=9020 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=3939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2460.468004][ T29] audit: type=1400 audit(2459.640:294): avc: denied { append } for pid=9020 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=3939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2460.470146][ T29] audit: type=1400 audit(2459.660:295): avc: denied { getattr } for pid=9020 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2460.713917][ T26] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2461.110179][ T29] audit: type=1400 audit(2460.260:296): avc: denied { read } for pid=9024 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2462.583936][ T29] audit: type=1400 audit(2461.780:297): avc: denied { unlink } for pid=9026 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=3939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2468.381970][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2468.443731][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2468.504272][ T26] bond0 (unregistering): Released all slaves [ 2469.451591][ T26] hsr_slave_0: left promiscuous mode [ 2469.639881][ T26] hsr_slave_1: left promiscuous mode [ 2470.041320][ T26] veth1_macvtap: left promiscuous mode [ 2470.043174][ T26] veth0_macvtap: left promiscuous mode [ 2470.078412][ T26] veth1_vlan: left promiscuous mode [ 2470.080713][ T26] veth0_vlan: left promiscuous mode [ 2491.134003][ T9017] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2491.254540][ T9017] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2491.399337][ T29] audit: type=1400 audit(2490.590:298): avc: denied { create } for pid=9098 comm="syz.1.2438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2494.500670][ T29] audit: type=1400 audit(2493.690:299): avc: denied { setattr } for pid=9111 comm="syz.1.2440" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 2496.604239][ T29] audit: type=1400 audit(2495.800:300): avc: denied { mount } for pid=9121 comm="syz.1.2441" name="/" dev="autofs" ino=23056 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 2497.712746][ T29] audit: type=1400 audit(2496.910:301): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 2498.642604][ T9017] hsr_slave_0: entered promiscuous mode [ 2498.761442][ T9017] hsr_slave_1: entered promiscuous mode [ 2498.828788][ T9017] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2498.830162][ T9017] Cannot create hsr debugfs directory [ 2503.723008][ T9017] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2503.889610][ T9017] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2504.190906][ T9017] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2504.374225][ T9017] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2510.702414][ T9017] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2530.734658][ T9017] veth0_vlan: entered promiscuous mode [ 2530.832583][ T9017] veth1_vlan: entered promiscuous mode [ 2531.327860][ T9017] veth0_macvtap: entered promiscuous mode [ 2531.503018][ T9017] veth1_macvtap: entered promiscuous mode [ 2532.303428][ T9017] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2532.304078][ T9017] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2532.304286][ T9017] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2532.304500][ T9017] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2533.668153][ T29] audit: type=1400 audit(2532.860:302): avc: denied { mounton } for pid=9017 comm="syz-executor" path="/syzkaller.0ILHWX/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 2535.929712][ T9225] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32798 sclass=netlink_route_socket pid=9225 comm=syz.3.2424 [ 2544.434031][ T9254] ALSA: seq fatal error: cannot create timer (-16) [ 2544.500169][ T9254] ALSA: seq fatal error: cannot create timer (-22) [ 2544.502996][ T9254] ALSA: seq fatal error: cannot create timer (-16) [ 2547.060715][ T29] audit: type=1400 audit(2546.260:303): avc: denied { create } for pid=9261 comm="syz.3.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2547.090631][ T29] audit: type=1400 audit(2546.290:304): avc: denied { bind } for pid=9261 comm="syz.3.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2547.130691][ T29] audit: type=1400 audit(2546.300:305): avc: denied { listen } for pid=9261 comm="syz.3.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2547.132087][ T29] audit: type=1400 audit(2546.320:306): avc: denied { accept } for pid=9261 comm="syz.3.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2547.673350][ T29] audit: type=1400 audit(2546.870:307): avc: denied { connect } for pid=9261 comm="syz.3.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2551.235402][ T29] audit: type=1400 audit(2550.430:308): avc: denied { setopt } for pid=9270 comm="syz.3.2468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2551.322254][ T29] audit: type=1400 audit(2550.520:309): avc: denied { bind } for pid=9270 comm="syz.3.2468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2573.537517][ T29] audit: type=1400 audit(2572.720:310): avc: denied { mounton } for pid=9319 comm="syz.3.2487" path="/proc/61/task" dev="proc" ino=23448 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 2575.827563][ T29] audit: type=1400 audit(2575.020:311): avc: denied { ioctl } for pid=9323 comm="syz.1.2488" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2576.031969][ T29] audit: type=1400 audit(2575.100:312): avc: denied { set_context_mgr } for pid=9323 comm="syz.1.2488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2588.612509][ T9346] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=9346 comm=syz.1.2497 [ 2603.780342][ T29] audit: type=1400 audit(2602.970:313): avc: denied { read } for pid=9370 comm="syz.1.2504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2608.439575][ T29] audit: type=1400 audit(2607.440:314): avc: denied { read } for pid=9378 comm="syz.1.2508" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2608.444651][ T29] audit: type=1400 audit(2607.450:315): avc: denied { open } for pid=9378 comm="syz.1.2508" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2608.507854][ T29] audit: type=1400 audit(2607.680:316): avc: denied { remove_name } for pid=3085 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2608.514478][ T29] audit: type=1400 audit(2607.680:317): avc: denied { rename } for pid=3085 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2608.530206][ T29] audit: type=1400 audit(2607.690:318): avc: denied { create } for pid=3085 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2627.251655][ T29] audit: type=1400 audit(2626.430:319): avc: denied { map } for pid=9417 comm="syz.1.2523" path="socket:[23918]" dev="sockfs" ino=23918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 2638.821456][ C1] vkms_vblank_simulate: vblank timer overrun [ 2639.959822][ C1] vkms_vblank_simulate: vblank timer overrun [ 2640.175462][ C1] vkms_vblank_simulate: vblank timer overrun [ 2640.291382][ C1] vkms_vblank_simulate: vblank timer overrun [ 2640.408794][ C1] vkms_vblank_simulate: vblank timer overrun [ 2641.146039][ C1] vkms_vblank_simulate: vblank timer overrun [ 2642.643538][ C1] vkms_vblank_simulate: vblank timer overrun [ 2642.946172][ C1] vkms_vblank_simulate: vblank timer overrun [ 2645.985355][ T9452] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9452 comm=syz.1.2535 [ 2712.628433][ T9572] input: syz1 as /devices/virtual/input/input2 [ 2718.745443][ T9586] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9586 comm=syz.3.2587 [ 2781.299114][ T29] audit: type=1400 audit(2780.500:320): avc: denied { setopt } for pid=9699 comm="syz.3.2633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2800.863362][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 2824.113214][ T9789] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=9789 comm=syz.3.2665 [ 2840.670469][ T9822] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=9822 comm=syz.3.2677 [ 2851.958762][ T29] audit: type=1400 audit(2851.030:321): avc: denied { ioctl } for pid=9836 comm="syz.1.2683" path="socket:[25110]" dev="sockfs" ino=25110 ioctlcmd=0x89a1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2913.710219][ C0] vkms_vblank_simulate: vblank timer overrun [ 2915.374178][ C0] vkms_vblank_simulate: vblank timer overrun [ 2915.558634][ C0] vkms_vblank_simulate: vblank timer overrun [ 2918.700927][ T9952] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9952 comm=syz.3.2724 [ 2934.343027][ T29] audit: type=1400 audit(2933.540:322): avc: denied { write } for pid=9975 comm="syz.3.2734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2953.613074][T10011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10011 comm=syz.3.2746 [ 2956.704012][ T29] audit: type=1400 audit(2955.900:323): avc: denied { write } for pid=10015 comm="syz.3.2749" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 2959.172185][T10023] serio: Serial port pts0 [ 2992.867554][T10080] lo: entered promiscuous mode [ 2992.893922][T10078] lo: left promiscuous mode [ 3016.121745][ T29] audit: type=1400 audit(3015.290:324): avc: denied { mount } for pid=10119 comm="syz.3.2791" name="/" dev="bdev" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bdev_t tclass=filesystem permissive=1 [ 3020.220373][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 3079.114784][ T29] audit: type=1400 audit(3078.290:325): avc: denied { mount } for pid=10242 comm="syz.3.2846" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 3094.430371][T10277] binfmt_misc: register: failed to install interpreter file ./file0 [ 3101.191840][ T29] audit: type=1400 audit(3100.390:326): avc: denied { setopt } for pid=10287 comm="syz.1.2865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3214.847339][T10504] serio: Serial port pts0 [ 3267.257255][ T29] audit: type=1400 audit(3266.440:327): avc: denied { remount } for pid=10610 comm="syz.3.2991" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3269.724572][T10615] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10615 comm=syz.1.2992 [ 3272.701533][ T29] audit: type=1400 audit(3271.900:328): avc: denied { setopt } for pid=10620 comm="syz.1.2995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3284.043151][T10651] binder: 10650:10651 ioctl 4018620d 0 returned -22 [ 3284.093016][T10651] binder_alloc: binder_alloc_mmap_handler: 10650 20ffd000-21000000 already mapped failed -16 [ 3341.258411][ T29] audit: type=1400 audit(3340.450:329): avc: denied { read } for pid=10795 comm="syz.3.3064" dev="sockfs" ino=27648 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3365.080239][T10870] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10870 comm=syz.1.3093 [ 3385.554370][ T29] audit: type=1400 audit(3384.750:330): avc: denied { setattr } for pid=10937 comm="syz.3.3120" name="mixer" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 3412.821718][T11030] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11030 comm=syz.3.3158 [ 3414.864100][ T29] audit: type=1400 audit(3670.058:331): avc: denied { getopt } for pid=11035 comm="syz.3.3160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3420.140128][T11050] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11050 comm=syz.3.3166 [ 3420.381603][ T29] audit: type=1107 audit(3675.328:332): pid=11049 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='‹' [ 3463.109224][T11163] Process accounting resumed [ 3475.950968][ T29] audit: type=1400 audit(3731.148:333): avc: denied { ioctl } for pid=11202 comm="syz.3.3228" path="socket:[30038]" dev="sockfs" ino=30038 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3480.590175][ T29] audit: type=1400 audit(3735.778:334): avc: denied { listen } for pid=11215 comm="syz.3.3234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3487.474932][T11231] loop7: detected capacity change from 0 to 16384 [ 3496.082887][T11249] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=11249 comm=syz.1.3248 [ 3533.311997][T11337] sctp: [Deprecated]: syz.3.3286 (pid 11337) Use of int in maxseg socket option. [ 3533.311997][T11337] Use struct sctp_assoc_value instead [ 3583.040167][T11494] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11494 comm=syz.3.3345 [ 3595.379337][ T29] audit: type=1400 audit(3850.568:335): avc: denied { read } for pid=11528 comm="syz.3.3359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3611.333873][T11550] raw_sendmsg: syz.3.3369 forgot to set AF_INET. Fix it! [ 3614.797880][T11563] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=11563 comm=syz.1.3373 [ 3683.577088][T11655] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3683.648150][T11655] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3687.968262][ T3100] udevd[3100]: worker [11579] /devices/virtual/nfc/nfc2 is taking a long time [ 3690.777309][T11655] hsr_slave_0: entered promiscuous mode [ 3690.832626][T11655] hsr_slave_1: entered promiscuous mode [ 3690.897437][T11655] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3690.898104][T11655] Cannot create hsr debugfs directory [ 3691.593697][T11708] lo: entered promiscuous mode [ 3691.633969][T11706] lo: left promiscuous mode [ 3693.672432][ T29] audit: type=1400 audit(3948.868:336): avc: denied { getopt } for pid=11709 comm="syz.1.3421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3694.871956][T11655] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 3695.040315][T11655] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 3695.139987][T11655] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 3695.220484][T11655] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 3702.253619][T11655] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3727.168570][T11655] veth0_vlan: entered promiscuous mode [ 3727.393979][T11655] veth1_vlan: entered promiscuous mode [ 3728.408164][T11655] veth0_macvtap: entered promiscuous mode [ 3728.614529][T11655] veth1_macvtap: entered promiscuous mode [ 3729.770900][T11655] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3729.773823][T11655] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3729.774726][T11655] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3729.802609][T11655] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3738.404745][ T29] audit: type=1400 audit(3993.568:337): avc: denied { search } for pid=11790 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3738.668103][ T29] audit: type=1400 audit(3993.848:338): avc: denied { read } for pid=11791 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=531 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3738.724428][ T29] audit: type=1400 audit(3993.908:339): avc: denied { open } for pid=11791 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=531 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3738.751015][ T29] audit: type=1400 audit(3993.948:340): avc: denied { getattr } for pid=11791 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=531 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3739.928734][ T29] audit: type=1400 audit(3995.118:341): avc: denied { write } for pid=11790 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=529 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3739.930470][ T29] audit: type=1400 audit(3995.128:342): avc: denied { add_name } for pid=11790 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3742.298080][ T29] audit: type=1400 audit(3997.478:343): avc: denied { remove_name } for pid=11800 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=4853 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3744.084914][ T29] audit: type=1400 audit(3999.268:344): avc: denied { create } for pid=11803 comm="syz.4.3439" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 3744.134495][ T29] audit: type=1400 audit(3999.328:345): avc: denied { rename } for pid=11803 comm="syz.4.3439" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=39 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 3788.440921][T11916] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11916 comm=syz.1.3481 [ 3802.419174][T11936] netlink: 'syz.4.3490': attribute type 4 has an invalid length. [ 3802.694720][T11936] netlink: 'syz.4.3490': attribute type 4 has an invalid length. [ 3823.080125][ T29] audit: type=1400 audit(4078.258:346): avc: denied { setopt } for pid=11977 comm="syz.4.3508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3853.018833][ T3100] udevd[3100]: worker [11579] /devices/virtual/nfc/nfc2 timeout; kill it [ 3853.021899][ T3100] udevd[3100]: seq 8299 '/devices/virtual/nfc/nfc2' killed [ 3872.314751][T12066] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=12066 comm=syz.1.3541 [ 3877.822825][T12079] binder: 12077:12079 ioctl 40046205 0 returned -22 [ 3877.937730][T12079] binder: 12077:12079 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 3877.939347][T12079] binder: 12079 RLIMIT_NICE not set [ 3924.792635][T12177] binder: 12176:12177 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 3924.855486][T12177] binder: 12177 RLIMIT_NICE not set [ 3925.459417][T12177] binder: 12176:12177 ioctl c0306201 200002c0 returned -14 [ 3965.401518][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 3970.273226][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 4045.013741][T12394] serio: Serial port pts0 [ 4066.559056][ T31] INFO: task kworker/0:2:5084 blocked for more than 430 seconds. [ 4066.577989][ T31] Not tainted 6.13.0-rc2-syzkaller-00018-g7cb1b4663150 #0 [ 4066.580103][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4066.582327][ T31] task:kworker/0:2 state:D stack:0 pid:5084 tgid:5084 ppid:2 flags:0x00000008 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 4066.585353][ T31] Workqueue: events rfkill_sync_work [ 4066.643700][ T31] Call trace: [ 4066.644884][ T31] __switch_to+0x204/0x4bc (T) [ 4066.688781][ T31] __schedule+0xafc/0x2eb8 [ 4066.696807][ T31] schedule+0xd0/0x304 [ 4066.698266][ T31] schedule_preempt_disabled+0x18/0x2c [ 4066.699603][ T31] __mutex_lock+0x544/0x8ac [ 4066.700791][ T31] mutex_lock_nested+0x24/0x30 [ 4066.702027][ T31] nfc_dev_down+0x2c/0x234 [ 4066.724950][ T31] nfc_rfkill_set_block+0x28/0xb8 [ 4066.742487][ T31] rfkill_set_block+0x160/0x3c4 [ 4066.756757][ T31] rfkill_sync+0x104/0x1ac [ 4066.759600][ T31] rfkill_sync_work+0x30/0x48 [ 4066.760309][ T31] process_one_work+0x7b4/0x189c [ 4066.761021][ T31] worker_thread+0x730/0xb74 [ 4066.761651][ T31] kthread+0x27c/0x300 [ 4066.762320][ T31] ret_from_fork+0x10/0x20 [ 4066.764098][ T31] INFO: task kworker/0:3:10426 blocked for more than 430 seconds. [ 4066.764860][ T31] Not tainted 6.13.0-rc2-syzkaller-00018-g7cb1b4663150 #0 [ 4066.779731][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4066.780757][ T31] task:kworker/0:3 state:D stack:0 pid:10426 tgid:10426 ppid:2 flags:0x00000008 [ 4066.781860][ T31] Workqueue: events rfkill_global_led_trigger_worker [ 4066.782818][ T31] Call trace: [ 4066.783402][ T31] __switch_to+0x204/0x4bc (T) [ 4066.784083][ T31] __schedule+0xafc/0x2eb8 [ 4066.784754][ T31] schedule+0xd0/0x304 [ 4066.785387][ T31] schedule_preempt_disabled+0x18/0x2c [ 4066.798991][ T31] __mutex_lock+0x544/0x8ac [ 4066.799927][ T31] mutex_lock_nested+0x24/0x30 [ 4066.801391][ T31] rfkill_global_led_trigger_worker+0x2c/0x10c [ 4066.803074][ T31] process_one_work+0x7b4/0x189c [ 4066.804530][ T31] worker_thread+0x730/0xb74 [ 4066.809942][ T31] kthread+0x27c/0x300 [ 4066.811544][ T31] ret_from_fork+0x10/0x20 [ 4066.812987][ T31] INFO: task udevd:11579 blocked for more than 430 seconds. [ 4066.814943][ T31] Not tainted 6.13.0-rc2-syzkaller-00018-g7cb1b4663150 #0 [ 4066.818198][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4066.819089][ T31] task:udevd state:D stack:0 pid:11579 tgid:11579 ppid:3100 flags:0x00000005 [ 4066.820288][ T31] Call trace: [ 4066.821474][ T31] __switch_to+0x204/0x4bc (T) [ 4066.822273][ T31] __schedule+0xafc/0x2eb8 [ 4066.823001][ T31] schedule+0xd0/0x304 [ 4066.823657][ T31] schedule_preempt_disabled+0x18/0x2c [ 4066.824373][ T31] __mutex_lock+0x544/0x8ac [ 4066.825059][ T31] mutex_lock_nested+0x24/0x30 [ 4066.827387][ T31] uevent_show+0x118/0x300 [ 4066.828183][ T31] dev_attr_show+0x48/0xcc [ 4066.828876][ T31] sysfs_kf_seq_show+0x184/0x32c [ 4066.829598][ T31] kernfs_seq_show+0x104/0x154 [ 4066.830346][ T31] seq_read_iter+0x350/0xe3c [ 4066.831030][ T31] kernfs_fop_read_iter+0x304/0x45c [ 4066.831828][ T31] vfs_read+0x5c0/0x978 [ 4066.832541][ T31] ksys_read+0xec/0x1d8 [ 4066.833206][ T31] __arm64_sys_read+0x6c/0x9c [ 4066.833913][ T31] invoke_syscall+0x6c/0x258 [ 4066.835364][ T31] el0_svc_common.constprop.0+0xac/0x230 [ 4066.839003][ T31] do_el0_svc+0x40/0x58 [ 4066.840158][ T31] el0_svc+0x50/0x180 [ 4066.840884][ T31] el0t_64_sync_handler+0x10c/0x138 [ 4066.841614][ T31] el0t_64_sync+0x198/0x19c [ 4066.842395][ T31] INFO: task syz.3.3385:11588 blocked for more than 430 seconds. [ 4066.843228][ T31] Not tainted 6.13.0-rc2-syzkaller-00018-g7cb1b4663150 #0 [ 4066.844012][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4066.844799][ T31] task:syz.3.3385 state:D stack:0 pid:11588 tgid:11588 ppid:9017 flags:0x00400009 [ 4066.847716][ T31] Call trace: [ 4066.848388][ T31] __switch_to+0x204/0x4bc (T) [ 4066.849167][ T31] __schedule+0xafc/0x2eb8 [ 4066.849961][ T31] schedule+0xd0/0x304 [ 4066.850684][ T31] schedule_timeout+0x1dc/0x214 [ 4066.851409][ T31] __wait_for_common+0x1d4/0x4b0 [ 4066.852137][ T31] wait_for_completion+0x20/0x2c [ 4066.852846][ T31] __flush_work+0x460/0x8f8 [ 4066.853560][ T31] __cancel_work_sync+0xb0/0x108 [ 4066.854336][ T31] cancel_work_sync+0x14/0x20 [ 4066.855074][ T31] rfkill_unregister+0x70/0x240 [ 4066.858138][ T31] nfc_unregister_device+0x68/0x298 [ 4066.859019][ T31] nci_unregister_device+0x1bc/0x294 [ 4066.859713][ T31] virtual_ncidev_close+0x48/0xb0 [ 4066.860403][ T31] __fput+0x2c4/0x94c [ 4066.861088][ T31] ____fput+0x14/0x20 [ 4066.861864][ T31] task_work_run+0x128/0x210 [ 4066.862537][ T31] do_notify_resume+0x1d0/0x258 [ 4066.863199][ T31] el0_svc_compat+0xfc/0x17c [ 4066.863896][ T31] el0t_32_sync_handler+0x98/0x13c [ 4066.864611][ T31] el0t_32_sync+0x19c/0x1a0 [ 4066.865563][ T31] [ 4066.865563][ T31] Showing all locks held in the system: [ 4066.867633][ T31] 1 lock held by khungtaskd/31: [ 4066.868340][ T31] #0: ffff800086f896e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x44/0x2d0 [ 4066.871566][ T31] 1 lock held by klogd/3089: [ 4066.872339][ T31] 2 locks held by getty/3219: [ 4066.873087][ T31] #0: ffff000017ae70a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 4066.875117][ T31] #1: ffff80008d05b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x93c/0xe9c [ 4066.879315][ T31] 4 locks held by kworker/0:2/5084: [ 4066.879994][ T31] #0: ffff00000d428948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x6e0/0x189c [ 4066.881682][ T31] #1: ffff80008d947ce0 ((work_completion)(&rfkill->sync_work)){+.+.}-{0:0}, at: process_one_work+0x704/0x189c [ 4066.885341][ T31] #2: ffff80008855a248 (rfkill_global_mutex){+.+.}-{4:4}, at: rfkill_sync_work+0x28/0x48 [ 4066.890731][ T31] #3: ffff000011d26100 (&dev->mutex){....}-{4:4}, at: nfc_dev_down+0x2c/0x234 [ 4066.892541][ T31] 3 locks held by kworker/0:3/10426: [ 4066.893205][ T31] #0: ffff00000d428948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x6e0/0x189c [ 4066.894950][ T31] #1: ffff80008fd87ce0 ((work_completion)(&rfkill_global_led_trigger_work)){+.+.}-{0:0}, at: process_one_work+0x704/0x189c [ 4066.898308][ T31] #2: ffff80008855a248 (rfkill_global_mutex){+.+.}-{4:4}, at: rfkill_global_led_trigger_worker+0x2c/0x10c [ 4066.900384][ T31] 4 locks held by udevd/11579: [ 4066.901125][ T31] #0: ffff00001ff80c30 (&p->lock){+.+.}-{4:4}, at: seq_read_iter+0xb8/0xe3c [ 4066.902932][ T31] #1: ffff000012555c88 (&of->mutex#2){+.+.}-{4:4}, at: kernfs_seq_start+0x48/0x1d8 [ 4066.904913][ T31] #2: ffff00001d6953c8 (kn->active#4){.+.+}-{0:0}, at: kernfs_seq_start+0x64/0x1d8 [ 4066.909639][ T31] #3: ffff000011d26100 (&dev->mutex){....}-{4:4}, at: uevent_show+0x118/0x300 [ 4066.911559][ T31] 1 lock held by syz.3.3385/11588: [ 4066.912262][ T31] #0: ffff000011d26100 (&dev->mutex){....}-{4:4}, at: nfc_unregister_device+0x48/0x298 [ 4066.914071][ T31] 1 lock held by syz.1.3689/12427: [ 4066.914768][ T31] #0: ffff000018e32b10 (&mm->mmap_lock){++++}-{4:4}, at: vm_mmap_pgoff+0x138/0x2a8 [ 4066.917366][ T31] 5 locks held by syz.1.3689/12433: [ 4066.918118][ T31] 1 lock held by syz.4.3694/12439: [ 4066.918953][ T31] [ 4066.919579][ T31] ============================================= [ 4066.919579][ T31] [ 4066.921135][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 4066.922839][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.13.0-rc2-syzkaller-00018-g7cb1b4663150 #0 [ 4066.923816][ T31] Hardware name: linux,dummy-virt (DT) [ 4066.924610][ T31] Call trace: [ 4066.925243][ T31] show_stack+0x18/0x24 (C) [ 4066.925984][ T31] dump_stack_lvl+0x38/0xf4 [ 4066.926559][ T31] dump_stack+0x1c/0x28 [ 4066.927095][ T31] panic+0x5b0/0x664 [ 4066.927639][ T31] watchdog+0x4d8/0xda8 [ 4066.928213][ T31] kthread+0x27c/0x300 [ 4066.928784][ T31] ret_from_fork+0x10/0x20 [ 4066.930132][ T31] SMP: stopping secondary CPUs [ 4066.931984][ T31] Kernel Offset: disabled [ 4066.932552][ T31] CPU features: 0x088,00020034,00800000,0200421b [ 4066.933224][ T31] Memory Limit: none [ 4066.934868][ T31] Rebooting in 86400 seconds.. VM DIAGNOSIS: 03:07:56 Registers: info registers vcpu 0 CPU#0 PC=ffff80008432d370 X00=0000000000000001 X01=0000000000000006 X02=1ffff00010dac99c X03=1fffe0000393f65f X04=ffff600003b514f5 X05=ffff00001da8a680 X06=ffff600003b514f4 X07=0000000000000001 X08=ffff00001da8a7a3 X09=dfff800000000000 X10=ffff600003b514f4 X11=1fffe00003b514f4 X12=ffff600003b514f5 X13=ffff000012538a80 X14=1ffff000110e64fc X15=1fffe000024a714c X16=0000000000000000 X17=3a1ecd235cffedad X18=000000008264f7e9 X19=ffff00001c9fb368 X20=ffff00001c9fb280 X21=ffff00001c9fb280 X22=dead000000000100 X23=ffff8000852f80f4 X24=00000000000017f1 X25=ffff80008cd472c8 X26=00000000000002a9 X27=0000000000000000 X28=dfff800000000000 X29=ffff800080005cf0 X30=ffff80008097b700 SP=ffff800080005d20 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800083c71064 X00=0000003b47a7813e X01=0000000000000007 X02=0000003b47a553f6 X03=ffff80008cf57da0 X04=1fffe0000d3f2f9e X05=ffff80008cc47100 X06=ffff700011988e20 X07=0000000000000001 X08=ffff80008cc47103 X09=dfff800000000000 X10=ffff700011988e20 X11=1ffff00011988e20 X12=ffff700011988e21 X13=ffff00001441c700 X14=1ffff000110e64fc X15=1fffe000028838dc X16=0000000000000000 X17=ffff7fffe3248000 X18=00000000ffffffff X19=ffff000069f97cc0 X20=0000000000022d48 X21=0000000000000000 X22=000000000000001b X23=0000000000000004 X24=dfff800000000000 X25=ffff000069f82314 X26=ffff000069f822c0 X27=1fffe0000d3f04d5 X28=1fffe0000d3f04a5 X29=ffff80008cf57da0 X30=ffff80008041c370 SP=ffff80008cf57da0 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000