last executing test programs: 59m55.029257989s ago: executing program 1 (id=299): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000140)=0x80) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r1, 0x5450, 0x0) 59m54.335157015s ago: executing program 1 (id=301): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') read$FUSE(r0, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) prctl$PR_SET_PTRACER(0x59616d61, r1) 59m53.728725367s ago: executing program 1 (id=303): r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x5450, 0x0) 59m53.153744547s ago: executing program 1 (id=305): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x0, 'vxcan1\x00', {0x4}, 0x461}) 59m52.787329246s ago: executing program 1 (id=307): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x10) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x1e80c2, 0x0) 59m52.103541482s ago: executing program 1 (id=310): r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = fcntl$dupfd(r0, 0x0, r0) write$hidraw(r1, 0x0, 0x0) 59m6.176970115s ago: executing program 32 (id=310): r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = fcntl$dupfd(r0, 0x0, r0) write$hidraw(r1, 0x0, 0x0) 17m19.73252894s ago: executing program 2 (id=6847): r0 = eventfd2(0x0, 0x0) r1 = dup(r0) ioctl$TUNATTACHFILTER(r1, 0x5452, &(0x7f0000000080)={0x0, 0x0}) 17m18.388257471s ago: executing program 2 (id=6850): write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNATTACHFILTER(r0, 0xc0189436, &(0x7f0000000040)={0x0, 0x0}) 17m17.051443841s ago: executing program 2 (id=6853): r0 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x14, 0x0, 0x400, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x4020000) 17m15.315567991s ago: executing program 2 (id=6856): r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="01"], 0x0, 0x0) msgrcv(r0, &(0x7f00000001c0), 0x8, 0x1, 0x1000) 17m13.930878734s ago: executing program 2 (id=6859): r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x10) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17m12.371633425s ago: executing program 2 (id=6861): r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname(r0, &(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000040)=0x80) flock(r1, 0xc) 16m27.13155348s ago: executing program 33 (id=6861): r0 = socket$nl_route(0x10, 0x3, 0x0) getsockname(r0, &(0x7f00000003c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000040)=0x80) flock(r1, 0xc) 6m59.232372672s ago: executing program 0 (id=8285): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x18) 6m57.231099445s ago: executing program 0 (id=8289): socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) getsockname$unix(r2, 0x0, &(0x7f0000000040)) 6m55.679407836s ago: executing program 0 (id=8290): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmmsg(r0, 0x0, 0x0, 0x21, &(0x7f0000001f80)={0x77359400}) 6m54.102643797s ago: executing program 0 (id=8299): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) dup3(r1, r0, 0x0) 6m52.945011847s ago: executing program 0 (id=8304): r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x10) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 6m51.527685241s ago: executing program 0 (id=8307): r0 = socket$netlink(0x10, 0x3, 0x0) getsockname(r0, &(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f00000002c0)=0x80) fcntl$setownex(r1, 0xf, &(0x7f0000000300)) 6m5.01463238s ago: executing program 34 (id=8307): r0 = socket$netlink(0x10, 0x3, 0x0) getsockname(r0, &(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f00000002c0)=0x80) fcntl$setownex(r1, 0xf, &(0x7f0000000300)) 4m30.922159324s ago: executing program 3 (id=8412): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f2ff0000000000006d100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) r1 = getpgid(0x0) sched_getparam(r1, &(0x7f00000012c0)) 4m30.259907939s ago: executing program 3 (id=8413): r0 = openat$mixer(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = openat$binder_debug(0xffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) 4m29.810455403s ago: executing program 3 (id=8414): pipe(&(0x7f00000000c0)={0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x0) syz_open_dev$sndctrl(&(0x7f0000001440), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0x40405515, &(0x7f0000000180)=0x9) 4m29.240173472s ago: executing program 3 (id=8415): r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.pending_reads\x00', 0x40040, 0x0) dup3(r0, r1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000003c0)={'wg2\x00'}) 4m28.643067693s ago: executing program 3 (id=8416): r0 = socket(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000080)={0x2, 0xfffa, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f00000000c0)=0x6, 0x4) sendto$inet(r0, 0x0, 0x17, 0x48890, &(0x7f0000000000)={0x2, 0x4e24, @broadcast}, 0x10) 4m28.073104603s ago: executing program 3 (id=8417): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4000, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) 3m42.422080897s ago: executing program 35 (id=8417): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4000, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) 7.979787657s ago: executing program 5 (id=8849): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0x5450, 0x0) 7.13840628s ago: executing program 5 (id=8851): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000004c0)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000000)={0x1d, r1, 0x8000000000000003, {}, 0xfd}, 0x18) sendto$inet_nvme_of_msg(r0, &(0x7f0000000080)={@icreq={{0x0, 0x8, 0x80, 0x4}, 0x0, 0x0, 0x0, 0x59}, @val=0x0}, 0x84, 0x0, 0x0, 0x0) 5.798985719s ago: executing program 4 (id=8853): r0 = eventfd(0x0) close(r0) open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000140)='syz0\x00', 0x1ff) 5.498356605s ago: executing program 5 (id=8854): r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0x5451, 0x0) 4.934313835s ago: executing program 4 (id=8855): r0 = landlock_create_ruleset(&(0x7f0000000000)={0x8000}, 0x10, 0x0) landlock_restrict_self(r0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) 4.503144157s ago: executing program 5 (id=8856): r0 = openat$mixer(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$full(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, &(0x7f0000000100)) 3.949222646s ago: executing program 4 (id=8857): r0 = socket$can_raw(0x1d, 0x3, 0x1) close(r0) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_DISCONNECT(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x28, r1, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x60000, 0xb}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x44}, 0x24008000) 3.362944356s ago: executing program 5 (id=8858): r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000080), &(0x7f0000000140)={'syz', 0x0}, &(0x7f00000001c0)="03", 0x1, r0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000200)=@chain) keyctl$search(0xa, r0, &(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x0}, r0) 3.211642754s ago: executing program 4 (id=8859): r0 = landlock_create_ruleset(&(0x7f0000000080)={0xc97a, 0x1, 0x3}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, 0x0) 2.51831655s ago: executing program 4 (id=8860): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000a80)={0x48, r1, 0x1, 0xfffffffe, 0x0, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xfb2e77a8993c191f}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffff}]}, 0x48}}, 0x20000000) 2.458711913s ago: executing program 5 (id=8861): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000), 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x400000, 0x0) 0s ago: executing program 4 (id=8862): r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/bus/input/devices\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:43071' (ED25519) to the list of known hosts. [ 211.682725][ T30] audit: type=1400 audit(211.220:46): avc: denied { name_bind } for pid=3313 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 212.297832][ T30] audit: type=1400 audit(211.830:47): avc: denied { execute } for pid=3314 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 212.305438][ T30] audit: type=1400 audit(211.840:48): avc: denied { execute_no_trans } for pid=3314 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 219.880960][ T30] audit: type=1400 audit(219.410:49): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 219.904773][ T30] audit: type=1400 audit(219.440:50): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 219.962325][ T3314] cgroup: Unknown subsys name 'net' [ 219.994622][ T30] audit: type=1400 audit(219.530:51): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 220.336900][ T3314] cgroup: Unknown subsys name 'cpuset' [ 220.446408][ T3314] cgroup: Unknown subsys name 'rlimit' [ 220.769694][ T30] audit: type=1400 audit(220.300:52): avc: denied { setattr } for pid=3314 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 220.779849][ T30] audit: type=1400 audit(220.310:53): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 220.793285][ T30] audit: type=1400 audit(220.320:54): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 221.486457][ T3316] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 221.503069][ T30] audit: type=1400 audit(221.030:55): avc: denied { relabelto } for pid=3316 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 221.515582][ T30] audit: type=1400 audit(221.050:56): avc: denied { write } for pid=3316 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 221.650443][ T30] audit: type=1400 audit(221.180:57): avc: denied { read } for pid=3314 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 221.655084][ T30] audit: type=1400 audit(221.190:58): avc: denied { open } for pid=3314 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 221.681842][ T3314] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 243.853969][ T30] audit: type=1400 audit(243.390:59): avc: denied { execmem } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 243.989632][ T30] audit: type=1400 audit(243.520:60): avc: denied { read } for pid=3319 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 243.994251][ T30] audit: type=1400 audit(243.530:61): avc: denied { open } for pid=3319 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 244.023238][ T30] audit: type=1400 audit(243.560:62): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 244.075308][ T30] audit: type=1400 audit(243.610:63): avc: denied { module_request } for pid=3319 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 244.260643][ T30] audit: type=1400 audit(243.800:64): avc: denied { sys_module } for pid=3320 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 252.730374][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 252.761356][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.265496][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 253.306614][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 256.044327][ T3320] hsr_slave_0: entered promiscuous mode [ 256.056754][ T3320] hsr_slave_1: entered promiscuous mode [ 257.016004][ T3319] hsr_slave_0: entered promiscuous mode [ 257.026508][ T3319] hsr_slave_1: entered promiscuous mode [ 257.032470][ T3319] debugfs: 'hsr0' already exists in 'hsr' [ 257.033612][ T3319] Cannot create hsr debugfs directory [ 258.797269][ T30] audit: type=1400 audit(258.330:65): avc: denied { create } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 258.810341][ T30] audit: type=1400 audit(258.340:66): avc: denied { write } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 258.816584][ T30] audit: type=1400 audit(258.340:67): avc: denied { read } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 258.886952][ T3320] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 258.933096][ T3320] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 258.966992][ T3320] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 259.070465][ T3320] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 259.556321][ T3319] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 259.583901][ T3319] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 259.677224][ T3319] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 259.711601][ T3319] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 262.176301][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.474620][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.810381][ T3320] veth0_vlan: entered promiscuous mode [ 274.051301][ T3320] veth1_vlan: entered promiscuous mode [ 274.425587][ T3320] veth0_macvtap: entered promiscuous mode [ 274.462710][ T3320] veth1_macvtap: entered promiscuous mode [ 274.698246][ T3319] veth0_vlan: entered promiscuous mode [ 274.873618][ T53] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.876246][ T53] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.876645][ T53] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.877004][ T53] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.924726][ T3319] veth1_vlan: entered promiscuous mode [ 275.566863][ T3319] veth0_macvtap: entered promiscuous mode [ 275.581061][ T30] audit: type=1400 audit(275.100:68): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 275.620145][ T30] audit: type=1400 audit(275.140:69): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.qyhxPT/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 275.681452][ T30] audit: type=1400 audit(275.220:70): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 275.685162][ T3319] veth1_macvtap: entered promiscuous mode [ 275.717228][ T30] audit: type=1400 audit(275.250:71): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.qyhxPT/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 275.731174][ T30] audit: type=1400 audit(275.270:72): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/syzkaller.qyhxPT/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3838 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 275.833237][ T30] audit: type=1400 audit(275.370:73): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 275.866410][ T30] audit: type=1400 audit(275.400:74): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 275.887713][ T30] audit: type=1400 audit(275.420:75): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="gadgetfs" ino=4161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 275.947547][ T30] audit: type=1400 audit(275.480:76): avc: denied { mount } for pid=3320 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 275.986508][ T30] audit: type=1400 audit(275.520:77): avc: denied { mounton } for pid=3320 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 276.218040][ T960] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 276.227551][ T960] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 276.263546][ T960] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 276.264601][ T960] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 276.390961][ T3320] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 280.993134][ T3476] capability: warning: `syz.1.5' uses 32-bit capabilities (legacy support in use) [ 281.163364][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 281.164278][ T30] audit: type=1400 audit(280.700:82): avc: denied { create } for pid=3477 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 281.199608][ T30] audit: type=1400 audit(280.720:83): avc: denied { setopt } for pid=3477 comm="syz.0.6" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 286.217331][ T30] audit: type=1400 audit(285.750:84): avc: denied { allowed } for pid=3514 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 286.370356][ T30] audit: type=1400 audit(285.900:85): avc: denied { create } for pid=3514 comm="syz.0.24" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 287.605044][ T30] audit: type=1400 audit(287.140:86): avc: denied { read write } for pid=3526 comm="syz.0.31" name="vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 287.610616][ T30] audit: type=1400 audit(287.140:87): avc: denied { open } for pid=3526 comm="syz.0.31" path="/dev/vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 287.689132][ T30] audit: type=1400 audit(287.220:88): avc: denied { ioctl } for pid=3526 comm="syz.0.31" path="/dev/vhost-net" dev="devtmpfs" ino=714 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 293.104216][ T3569] capability: warning: `syz.1.50' uses deprecated v2 capabilities in a way that may be insecure [ 296.163321][ T3594] Zero length message leads to an empty skb [ 296.571968][ T30] audit: type=1400 audit(296.100:89): avc: denied { write } for pid=3595 comm="syz.1.64" name="softnet_stat" dev="proc" ino=4026532622 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 299.100988][ T30] audit: type=1400 audit(298.630:90): avc: denied { read } for pid=3618 comm="syz.0.75" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 299.101986][ T30] audit: type=1400 audit(298.630:91): avc: denied { open } for pid=3618 comm="syz.0.75" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 299.163848][ T30] audit: type=1400 audit(298.700:92): avc: denied { ioctl } for pid=3618 comm="syz.0.75" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 299.632193][ T30] audit: type=1400 audit(299.170:93): avc: denied { create } for pid=3623 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 299.642836][ T30] audit: type=1400 audit(299.170:94): avc: denied { write } for pid=3623 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 301.345320][ T30] audit: type=1400 audit(300.880:95): avc: denied { create } for pid=3643 comm="syz.0.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 301.363284][ T30] audit: type=1400 audit(300.900:96): avc: denied { bind } for pid=3643 comm="syz.0.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 301.380569][ T30] audit: type=1400 audit(300.910:97): avc: denied { setopt } for pid=3643 comm="syz.0.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 302.964647][ T30] audit: type=1400 audit(302.500:98): avc: denied { read write } for pid=3659 comm="syz.0.94" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 302.993439][ T30] audit: type=1400 audit(302.530:99): avc: denied { open } for pid=3659 comm="syz.0.94" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 309.811669][ T30] audit: type=1400 audit(309.340:100): avc: denied { ioctl } for pid=3715 comm="syz.0.122" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5316 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 310.099626][ T30] audit: type=1400 audit(309.630:101): avc: denied { connect } for pid=3717 comm="syz.1.123" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 310.129593][ T30] audit: type=1400 audit(309.660:102): avc: denied { write } for pid=3717 comm="syz.1.123" path="socket:[5317]" dev="sockfs" ino=5317 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 313.616551][ T30] audit: type=1400 audit(313.150:103): avc: denied { block_suspend } for pid=3742 comm="syz.0.136" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 316.582512][ T30] audit: type=1400 audit(316.120:104): avc: denied { read write } for pid=3767 comm="syz.1.147" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 316.595669][ T30] audit: type=1400 audit(316.130:105): avc: denied { open } for pid=3767 comm="syz.1.147" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 317.330346][ T30] audit: type=1400 audit(316.860:106): avc: denied { write } for pid=3771 comm="syz.0.149" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 317.380821][ T30] audit: type=1400 audit(316.910:107): avc: denied { open } for pid=3771 comm="syz.0.149" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 320.939716][ T30] audit: type=1400 audit(320.470:108): avc: denied { write } for pid=3800 comm="syz.1.164" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 324.207201][ T30] audit: type=1400 audit(323.740:109): avc: denied { setattr } for pid=3823 comm="syz.1.176" name="ptmx" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 327.879853][ T30] audit: type=1400 audit(327.400:110): avc: denied { create } for pid=3845 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 328.844277][ T30] audit: type=1400 audit(328.380:111): avc: denied { read write } for pid=3853 comm="syz.0.190" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 328.853379][ T30] audit: type=1400 audit(328.380:112): avc: denied { open } for pid=3853 comm="syz.0.190" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 328.971057][ T30] audit: type=1400 audit(328.490:113): avc: denied { ioctl } for pid=3853 comm="syz.0.190" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 329.019437][ T30] audit: type=1400 audit(328.540:114): avc: denied { set_context_mgr } for pid=3853 comm="syz.0.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 329.064620][ T3855] binder: BINDER_SET_CONTEXT_MGR already set [ 329.065546][ T3855] binder: 3853:3855 ioctl 40046207 0 returned -16 [ 344.155916][ T30] audit: type=1400 audit(343.690:115): avc: denied { setattr } for pid=3963 comm="syz.0.243" name="sequencer2" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 354.563362][ T30] audit: type=1400 audit(354.100:116): avc: denied { read write } for pid=4031 comm="syz.1.277" name="udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 354.594343][ T30] audit: type=1400 audit(354.130:117): avc: denied { open } for pid=4031 comm="syz.1.277" path="/dev/udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 354.690812][ T30] audit: type=1400 audit(354.220:118): avc: denied { ioctl } for pid=4031 comm="syz.1.277" path="/dev/udmabuf" dev="devtmpfs" ino=677 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 360.969583][ T30] audit: type=1400 audit(360.500:119): avc: denied { setattr } for pid=4068 comm="syz.1.295" name="" dev="pipefs" ino=5845 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 364.944354][ T30] audit: type=1400 audit(364.480:120): avc: denied { setattr } for pid=3320 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 365.051332][ T30] audit: type=1400 audit(364.590:121): avc: denied { create } for pid=4096 comm="syz.0.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 370.344056][ T30] audit: type=1400 audit(369.880:122): avc: denied { create } for pid=4107 comm="syz.0.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 370.404360][ T30] audit: type=1400 audit(369.940:123): avc: denied { write } for pid=4107 comm="syz.0.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 370.444906][ T30] audit: type=1400 audit(369.980:124): avc: denied { read } for pid=4107 comm="syz.0.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 375.290559][ T30] audit: type=1400 audit(374.820:125): avc: denied { prog_load } for pid=4124 comm="syz.0.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 375.306521][ T30] audit: type=1400 audit(374.840:126): avc: denied { bpf } for pid=4124 comm="syz.0.323" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 377.893997][ T30] audit: type=1400 audit(377.420:127): avc: denied { write } for pid=4134 comm="syz.0.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 377.991150][ T30] audit: type=1400 audit(377.520:128): avc: denied { read } for pid=4134 comm="syz.0.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 400.061697][ T30] audit: type=1400 audit(399.600:129): avc: denied { ioctl } for pid=4210 comm="syz.0.365" path="socket:[6014]" dev="sockfs" ino=6014 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 408.153180][ T4246] lo speed is unknown, defaulting to 1000 [ 408.174548][ T4246] lo speed is unknown, defaulting to 1000 [ 408.205197][ T4246] lo speed is unknown, defaulting to 1000 [ 408.236211][ T4246] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 408.267712][ T4246] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 408.384346][ T4246] lo speed is unknown, defaulting to 1000 [ 408.407587][ T4246] lo speed is unknown, defaulting to 1000 [ 411.596668][ T960] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 412.124153][ T960] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 412.652013][ T960] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.243177][ T960] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 415.257208][ T30] audit: type=1400 audit(414.790:130): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 418.890248][ T960] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 418.994376][ T960] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 419.044592][ T960] bond0 (unregistering): Released all slaves [ 420.023241][ T960] hsr_slave_0: left promiscuous mode [ 420.070210][ T960] hsr_slave_1: left promiscuous mode [ 420.466869][ T960] veth1_macvtap: left promiscuous mode [ 420.509817][ T960] veth0_macvtap: left promiscuous mode [ 420.511569][ T960] veth1_vlan: left promiscuous mode [ 420.512771][ T960] veth0_vlan: left promiscuous mode [ 426.318069][ T4259] lo speed is unknown, defaulting to 1000 [ 435.872990][ T30] audit: type=1400 audit(435.390:131): avc: denied { read write } for pid=4356 comm="syz.0.417" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 435.884815][ T30] audit: type=1400 audit(435.420:132): avc: denied { open } for pid=4356 comm="syz.0.417" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 435.945001][ T30] audit: type=1400 audit(435.470:133): avc: denied { ioctl } for pid=4356 comm="syz.0.417" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x127f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 438.345394][ T4259] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 438.434533][ T4259] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 447.942460][ T4259] hsr_slave_0: entered promiscuous mode [ 447.965959][ T4259] hsr_slave_1: entered promiscuous mode [ 452.562127][ T4259] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 452.617241][ T4259] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 452.697040][ T4259] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 452.825519][ T4259] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 453.989616][ T30] audit: type=1400 audit(453.520:134): avc: denied { read } for pid=4441 comm="syz.0.442" path="socket:[7063]" dev="sockfs" ino=7063 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 458.154848][ T4259] 8021q: adding VLAN 0 to HW filter on device bond0 [ 462.295908][ T4484] mmap: syz.0.454 (4484) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 473.804793][ T4535] netlink: 184 bytes leftover after parsing attributes in process `syz.0.469'. [ 478.070513][ T30] audit: type=1400 audit(477.600:135): avc: denied { create } for pid=4553 comm="syz.0.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 483.035689][ T30] audit: type=1400 audit(482.570:136): avc: denied { create } for pid=4575 comm="syz.0.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 483.141744][ T30] audit: type=1400 audit(482.660:137): avc: denied { write } for pid=4575 comm="syz.0.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 484.552566][ T30] audit: type=1400 audit(484.070:138): avc: denied { name_bind } for pid=4581 comm="syz.0.483" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 484.570689][ T30] audit: type=1400 audit(484.100:139): avc: denied { node_bind } for pid=4581 comm="syz.0.483" saddr=255.255.255.255 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 486.316728][ T4259] veth0_vlan: entered promiscuous mode [ 486.635190][ T4259] veth1_vlan: entered promiscuous mode [ 487.331588][ T4259] veth0_macvtap: entered promiscuous mode [ 487.549364][ T4259] veth1_macvtap: entered promiscuous mode [ 489.203261][ T4265] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 489.204413][ T4265] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 489.249709][ T4265] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 489.250279][ T4265] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 489.950622][ T30] audit: type=1400 audit(489.490:140): avc: denied { mounton } for pid=4259 comm="syz-executor" path="/syzkaller.AHiAE3/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 490.036981][ T30] audit: type=1400 audit(489.550:141): avc: denied { mounton } for pid=4259 comm="syz-executor" path="/syzkaller.AHiAE3/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 490.038213][ T30] audit: type=1400 audit(489.560:142): avc: denied { mount } for pid=4259 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 490.147354][ T30] audit: type=1400 audit(489.680:143): avc: denied { mounton } for pid=4259 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 494.215589][ T30] audit: type=1400 audit(493.750:144): avc: denied { nlmsg_write } for pid=4626 comm="syz.2.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 495.144370][ T4632] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4632 comm=syz.2.502 [ 504.064335][ T30] audit: type=1400 audit(503.600:145): avc: denied { ioctl } for pid=4682 comm="syz.2.527" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 510.741106][ T30] audit: type=1400 audit(510.270:146): avc: denied { setattr } for pid=4733 comm="syz.2.551" name="RAW" dev="sockfs" ino=8616 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 525.607388][ T30] audit: type=1400 audit(525.140:147): avc: denied { read } for pid=4838 comm="syz.0.601" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 525.626521][ T30] audit: type=1400 audit(525.160:148): avc: denied { open } for pid=4838 comm="syz.0.601" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 532.249498][ T30] audit: type=1400 audit(531.750:149): avc: denied { compute_member } for pid=4870 comm="syz.2.617" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 535.027567][ T30] audit: type=1400 audit(534.560:150): avc: denied { create } for pid=4882 comm="syz.2.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 535.063969][ T30] audit: type=1400 audit(534.590:151): avc: denied { setopt } for pid=4882 comm="syz.2.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 536.732507][ T30] audit: type=1400 audit(536.270:152): avc: denied { execute } for pid=4891 comm="syz.0.627" name="file0" dev="tmpfs" ino=2060 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 537.735656][ T30] audit: type=1400 audit(537.270:153): avc: denied { setopt } for pid=4898 comm="syz.2.631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 540.967286][ T30] audit: type=1400 audit(540.500:154): avc: denied { write } for pid=4919 comm="syz.2.641" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 547.526847][ T30] audit: type=1400 audit(547.060:155): avc: denied { read } for pid=4957 comm="syz.2.659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 552.692262][ T30] audit: type=1400 audit(552.210:156): avc: denied { mount } for pid=4997 comm="syz.2.677" name="/" dev="pstore" ino=2487 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 559.247689][ T30] audit: type=1400 audit(558.780:157): avc: denied { read } for pid=5038 comm="syz.0.696" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 559.253163][ T30] audit: type=1400 audit(558.790:158): avc: denied { open } for pid=5038 comm="syz.0.696" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 559.609873][ T30] audit: type=1400 audit(559.140:159): avc: denied { read } for pid=5040 comm="syz.0.697" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 559.611725][ T30] audit: type=1400 audit(559.150:160): avc: denied { open } for pid=5040 comm="syz.0.697" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 561.240034][ T30] audit: type=1400 audit(560.770:161): avc: denied { create } for pid=5052 comm="syz.0.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 561.292988][ T30] audit: type=1400 audit(560.820:162): avc: denied { write } for pid=5052 comm="syz.0.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 567.915083][ T30] audit: type=1400 audit(567.450:163): avc: denied { create } for pid=5105 comm="syz.2.728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 568.005332][ T30] audit: type=1400 audit(567.530:164): avc: denied { bind } for pid=5105 comm="syz.2.728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 575.321503][ T5161] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 575.878038][ T30] audit: type=1400 audit(575.400:165): avc: denied { create } for pid=5166 comm="syz.0.758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 575.900898][ T30] audit: type=1400 audit(575.410:166): avc: denied { write } for pid=5166 comm="syz.0.758" path="socket:[9756]" dev="sockfs" ino=9756 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 575.909759][ T30] audit: type=1400 audit(575.440:167): avc: denied { nlmsg_read } for pid=5166 comm="syz.0.758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 575.951253][ T30] audit: type=1400 audit(575.480:168): avc: denied { nlmsg_write } for pid=5166 comm="syz.0.758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 575.967133][ T30] audit: type=1400 audit(575.490:169): avc: denied { read } for pid=5166 comm="syz.0.758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 588.113335][ T5264] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5264 comm=syz.2.805 [ 590.070328][ T5276] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5276 comm=syz.0.811 [ 594.806389][ T30] audit: type=1400 audit(594.340:170): avc: denied { create } for pid=5314 comm="syz.2.831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 594.885329][ T30] audit: type=1400 audit(594.420:171): avc: denied { setopt } for pid=5314 comm="syz.2.831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 597.351993][ T30] audit: type=1400 audit(596.870:172): avc: denied { write } for pid=5337 comm="syz.0.842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 597.431777][ T30] audit: type=1400 audit(596.970:173): avc: denied { read } for pid=5337 comm="syz.0.842" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 605.906567][ T5398] binder: 5395:5398 ioctl 400c620e 0 returned -14 [ 606.879922][ T30] audit: type=1400 audit(606.410:174): avc: denied { validate_trans } for pid=5405 comm="syz.2.877" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 612.113959][ T30] audit: type=1400 audit(611.650:175): avc: denied { read write } for pid=5450 comm="syz.2.898" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 612.142441][ T30] audit: type=1400 audit(611.670:176): avc: denied { open } for pid=5450 comm="syz.2.898" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 612.183825][ T30] audit: type=1400 audit(611.720:177): avc: denied { ioctl } for pid=5450 comm="syz.2.898" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 618.442233][ T30] audit: type=1400 audit(617.980:178): avc: denied { map_create } for pid=5491 comm="syz.0.918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 618.491253][ T30] audit: type=1400 audit(618.020:179): avc: denied { map_read map_write } for pid=5491 comm="syz.0.918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 618.492309][ T30] audit: type=1400 audit(618.030:180): avc: denied { perfmon } for pid=5491 comm="syz.0.918" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 618.554985][ T30] audit: type=1400 audit(618.090:181): avc: denied { prog_run } for pid=5491 comm="syz.0.918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 621.032068][ T5506] netlink: 'syz.0.925': attribute type 13 has an invalid length. [ 627.552074][ T10] lo speed is unknown, defaulting to 1000 [ 627.555674][ T10] syz0: Port: 1 Link DOWN [ 627.571000][ T4265] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 627.571978][ T4265] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 627.572331][ T4265] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 627.572602][ T4265] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 628.302548][ T30] audit: type=1400 audit(627.840:182): avc: denied { write } for pid=5532 comm="syz.2.937" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 628.325738][ T30] audit: type=1400 audit(627.840:183): avc: denied { open } for pid=5532 comm="syz.2.937" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 628.380360][ T30] audit: type=1400 audit(627.900:184): avc: denied { ioctl } for pid=5532 comm="syz.2.937" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4b32 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 640.776006][ T30] audit: type=1400 audit(640.310:185): avc: denied { bind } for pid=5606 comm="syz.0.973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 640.791656][ T30] audit: type=1400 audit(640.310:186): avc: denied { node_bind } for pid=5606 comm="syz.0.973" saddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 646.243240][ T10] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 646.557158][ T10] usb 1-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 646.562464][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 646.636433][ T10] usb 1-1: config 0 descriptor?? [ 647.445327][ T10] asix 1-1:0.0 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -61 [ 647.451901][ T10] asix 1-1:0.0 (unnamed net_device) (uninitialized): Error reading PHY_ID register: ffffffc3 [ 647.464495][ T10] asix 1-1:0.0: probe with driver asix failed with error -61 [ 647.709642][ T5200] usb 1-1: USB disconnect, device number 2 [ 648.483806][ T30] audit: type=1400 audit(648.010:187): avc: denied { ioctl } for pid=5640 comm="syz.0.989" path="socket:[11545]" dev="sockfs" ino=11545 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 651.556079][ T5658] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5658 comm=syz.2.998 [ 653.912761][ T30] audit: type=1400 audit(653.450:188): avc: denied { ioctl } for pid=5671 comm="syz.0.1005" path="socket:[11606]" dev="sockfs" ino=11606 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 655.202671][ T30] audit: type=1400 audit(654.730:189): avc: denied { read write } for pid=5678 comm="syz.2.1008" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 655.217007][ T30] audit: type=1400 audit(654.750:190): avc: denied { open } for pid=5678 comm="syz.2.1008" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 655.447921][ T30] audit: type=1400 audit(654.960:191): avc: denied { unmount } for pid=4259 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 666.046868][ T30] audit: type=1400 audit(665.580:192): avc: denied { connect } for pid=5756 comm="syz.0.1047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 669.237984][ T30] audit: type=1400 audit(668.770:193): avc: denied { mount } for pid=5779 comm="syz.0.1058" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 669.300974][ T30] audit: type=1400 audit(668.830:194): avc: denied { remount } for pid=5779 comm="syz.0.1058" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 669.403073][ T30] audit: type=1400 audit(668.910:195): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 671.729982][ T30] audit: type=1400 audit(671.260:196): avc: denied { open } for pid=5794 comm="syz.2.1066" path="/dev/ptyq9" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 671.903200][ T30] audit: type=1400 audit(671.440:197): avc: denied { ioctl } for pid=5794 comm="syz.2.1066" path="/dev/ttyq9" dev="devtmpfs" ino=376 ioctlcmd=0x5456 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 690.094454][ T30] audit: type=1400 audit(689.630:198): avc: denied { read write } for pid=5914 comm="syz.2.1123" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 690.151342][ T30] audit: type=1400 audit(689.680:199): avc: denied { open } for pid=5914 comm="syz.2.1123" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 690.565714][ T74] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 690.567210][ T74] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 690.604338][ T74] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 690.621731][ T74] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 690.622790][ T74] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 690.623165][ T74] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 690.623414][ T74] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 690.623658][ T74] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 690.623926][ T74] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 690.624193][ T74] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 690.910618][ T74] hid-generic 0401:0002:0007.0001: hidraw0: HID vffffff.f6 Device [syz1] on syz1 [ 694.552437][ T5922] fido_id[5922]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 708.380023][ T30] audit: type=1400 audit(707.910:200): avc: denied { create } for pid=6042 comm="syz.0.1186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 708.533244][ T30] audit: type=1400 audit(708.070:201): avc: denied { setopt } for pid=6042 comm="syz.0.1186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 718.587372][ T30] audit: type=1400 audit(718.120:202): avc: denied { mount } for pid=6095 comm="syz.0.1213" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 718.711009][ T30] audit: type=1400 audit(718.230:203): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 741.401571][ T30] audit: type=1400 audit(740.930:204): avc: denied { read } for pid=6228 comm="syz.0.1277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 744.652193][ T6253] SELinux: syz.0.1288 (6253) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 760.690610][ T6359] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 760.690610][ T6359] The task syz.2.1337 (6359) triggered the difference, watch for misbehavior. [ 772.107899][ T30] audit: type=1400 audit(771.640:205): avc: denied { write } for pid=6429 comm="syz.0.1374" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 772.775389][ T30] audit: type=1400 audit(772.310:206): avc: denied { ioctl } for pid=6433 comm="syz.0.1376" path="socket:[14543]" dev="sockfs" ino=14543 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 786.065217][ T30] audit: type=1400 audit(785.600:207): avc: denied { create } for pid=6499 comm="syz.0.1408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 786.096713][ T30] audit: type=1400 audit(785.630:208): avc: denied { write } for pid=6499 comm="syz.0.1408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 803.636419][ T6585] ucma_write: process 1679 (syz.0.1450) changed security contexts after opening file descriptor, this is not allowed. [ 826.904666][ T30] audit: type=1400 audit(826.440:209): avc: denied { read open } for pid=6707 comm="syz.2.1509" path="net:[4026532688]" dev="nsfs" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 834.410720][ T30] audit: type=1400 audit(833.940:210): avc: denied { connect } for pid=6752 comm="syz.0.1531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 835.588127][ T30] audit: type=1400 audit(835.120:211): avc: denied { bind } for pid=6756 comm="syz.2.1532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 842.052220][ T30] audit: type=1400 audit(841.580:212): avc: denied { map } for pid=6772 comm="syz.0.1540" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15500 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 842.066918][ T30] audit: type=1400 audit(841.600:213): avc: denied { read write } for pid=6772 comm="syz.0.1540" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15500 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 859.496222][ T6862] SELinux: Context system_u:object_r:hald_var_run_t:s0 is not valid (left unmapped). [ 859.522593][ T30] audit: type=1400 audit(859.060:214): avc: denied { relabelto } for pid=6860 comm="syz.0.1584" name="file0" dev="tmpfs" ino=4668 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 859.530427][ T30] audit: type=1400 audit(859.060:215): avc: denied { associate } for pid=6860 comm="syz.0.1584" name="file0" dev="tmpfs" ino=4668 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hald_var_run_t:s0" [ 859.714511][ T30] audit: type=1400 audit(859.250:216): avc: denied { unlink } for pid=3319 comm="syz-executor" name="file0" dev="tmpfs" ino=4668 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 859.996115][ T30] audit: type=1400 audit(859.530:217): avc: denied { setopt } for pid=6864 comm="syz.0.1586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 867.612677][ T6911] ptrace attach of "/syz-executor exec"[6912] was attempted by "/syz-executor exec"[6911] [ 878.369907][ T30] audit: type=1400 audit(877.900:218): avc: denied { map } for pid=6971 comm="syz.0.1638" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 878.391522][ T30] audit: type=1400 audit(877.920:219): avc: denied { execute } for pid=6971 comm="syz.0.1638" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 917.000046][ T30] audit: type=1400 audit(916.530:220): avc: denied { ioctl } for pid=7145 comm="syz.0.1722" path="socket:[16154]" dev="sockfs" ino=16154 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 918.680140][ T7156] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7156 comm=syz.0.1727 [ 950.370670][ T30] audit: type=1400 audit(949.870:221): avc: denied { unmount } for pid=4259 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 958.260789][ T30] audit: type=1400 audit(957.790:222): avc: denied { create } for pid=7365 comm="syz.0.1828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 958.382645][ T30] audit: type=1400 audit(957.920:223): avc: denied { setopt } for pid=7365 comm="syz.0.1828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 959.490823][ T30] audit: type=1400 audit(959.020:224): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 963.224005][ T30] audit: type=1400 audit(962.760:225): avc: granted { setsecparam } for pid=7380 comm="syz.2.1835" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 991.022271][ T30] audit: type=1400 audit(990.550:226): avc: denied { create } for pid=7520 comm="syz.2.1902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 991.049663][ T30] audit: type=1400 audit(990.580:227): avc: denied { write } for pid=7520 comm="syz.2.1902" path="socket:[17829]" dev="sockfs" ino=17829 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 993.727802][ T30] audit: type=1400 audit(993.260:228): avc: denied { read } for pid=7536 comm="syz.0.1911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1008.955586][ T7621] SELinux: Context system_u:object_r:dhcp_etc_t:s0 is not valid (left unmapped). [ 1009.581165][ T30] audit: type=1400 audit(1009.120:229): avc: denied { create } for pid=7622 comm="syz.2.1953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1009.690301][ T30] audit: type=1400 audit(1009.210:230): avc: denied { read } for pid=7623 comm="syz.0.1954" path="socket:[17391]" dev="sockfs" ino=17391 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1034.627644][ T30] audit: type=1400 audit(1034.160:231): avc: denied { create } for pid=7735 comm="syz.2.2007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1034.799753][ T30] audit: type=1400 audit(1034.330:232): avc: denied { write } for pid=7735 comm="syz.2.2007" path="socket:[18622]" dev="sockfs" ino=18622 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1035.433343][ T30] audit: type=1400 audit(1034.970:233): avc: denied { setopt } for pid=7735 comm="syz.2.2007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1038.804747][ T30] audit: type=1400 audit(1038.340:234): avc: denied { name_bind } for pid=7752 comm="syz.0.2015" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1044.844480][ T7771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7771 comm=syz.2.2022 [ 1049.985335][ T7797] netlink: 'syz.0.2036': attribute type 29 has an invalid length. [ 1050.017437][ T7797] netlink: 'syz.0.2036': attribute type 29 has an invalid length. [ 1051.222650][ T7803] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2305 sclass=netlink_route_socket pid=7803 comm=syz.0.2037 [ 1056.586394][ T7833] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 1064.629794][ T7868] Injecting memory failure for pfn 0x6e16c at process virtual address 0x2036c000 [ 1064.637253][ T7868] Memory failure: 0x6e16c: recovery action for unsplit thp: Failed [ 1069.370730][ T30] audit: type=1400 audit(1068.900:235): avc: denied { append } for pid=7889 comm="syz.0.2081" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1075.890593][ T30] audit: type=1400 audit(1075.420:236): avc: denied { read } for pid=7924 comm="syz.0.2098" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1075.900499][ T30] audit: type=1400 audit(1075.420:237): avc: denied { open } for pid=7924 comm="syz.0.2098" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1077.999438][ T30] audit: type=1400 audit(1077.530:238): avc: denied { setopt } for pid=7938 comm="syz.0.2105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1096.719192][ T967] hid_parser_main: 73 callbacks suppressed [ 1096.721631][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1096.721995][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1096.722206][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1096.722397][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1096.722588][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1096.727522][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1096.738666][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1096.739058][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1096.739270][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1096.739462][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1096.770068][ T967] hid-generic 0000:007F:FFFFFFFE.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1105.046248][ T8071] fido_id[8071]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1124.976748][ T8189] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8189 comm=syz.2.2224 [ 1143.954374][ T30] audit: type=1400 audit(1143.490:239): avc: denied { read } for pid=8282 comm="syz.0.2272" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1143.971147][ T30] audit: type=1400 audit(1143.510:240): avc: denied { open } for pid=8282 comm="syz.0.2272" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1195.757588][ T30] audit: type=1400 audit(1195.290:241): avc: denied { mount } for pid=8550 comm="syz.0.2401" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1195.790313][ T30] audit: type=1400 audit(1195.320:242): avc: denied { remount } for pid=8550 comm="syz.0.2401" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1195.887297][ T30] audit: type=1400 audit(1195.420:243): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1212.555591][ T30] audit: type=1400 audit(1212.090:244): avc: denied { ioctl } for pid=8623 comm="syz.0.2434" path="socket:[21707]" dev="sockfs" ino=21707 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1217.245406][ T8651] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8651 comm=syz.2.2446 [ 1226.644232][ T30] audit: type=1400 audit(1226.180:245): avc: denied { ioctl } for pid=8697 comm="syz.0.2470" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0xe500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1228.994938][ T30] audit: type=1400 audit(1228.530:246): avc: denied { mount } for pid=8705 comm="syz.0.2474" name="/" dev="autofs" ino=21824 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1229.201990][ T30] audit: type=1400 audit(1228.740:247): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1232.983584][ T30] audit: type=1400 audit(1232.520:248): avc: denied { read } for pid=8716 comm="syz.0.2479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1252.765127][ T30] audit: type=1400 audit(1252.300:249): avc: denied { create } for pid=8816 comm="syz.2.2527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1252.834641][ T30] audit: type=1400 audit(1252.360:250): avc: denied { setopt } for pid=8816 comm="syz.2.2527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1253.413341][ T30] audit: type=1400 audit(1252.940:251): avc: denied { getopt } for pid=8816 comm="syz.2.2527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1255.564285][ T30] audit: type=1400 audit(1255.100:252): avc: denied { read } for pid=8831 comm="syz.0.2534" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1272.559498][ T30] audit: type=1400 audit(1272.090:253): avc: denied { write } for pid=8916 comm="syz.0.2577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1285.549491][ T30] audit: type=1400 audit(1285.080:254): avc: denied { unlink } for pid=3319 comm="syz-executor" name="file1" dev="tmpfs" ino=7982 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1292.364268][ T9024] netlink: 45 bytes leftover after parsing attributes in process `syz.0.2629'. [ 1297.850252][ T9054] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9054 comm=syz.2.2643 [ 1303.214549][ T30] audit: type=1400 audit(1302.750:255): avc: denied { ioctl } for pid=9078 comm="syz.2.2657" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x700a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1308.647173][ T9108] block nbd2: shutting down sockets [ 1312.222820][ T30] audit: type=1400 audit(1311.750:256): avc: denied { read } for pid=9128 comm="syz.0.2682" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1317.656468][ T30] audit: type=1400 audit(1317.190:257): avc: denied { connect } for pid=9165 comm="syz.2.2699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1320.145145][ T9186] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2708'. [ 1340.971334][ T30] audit: type=1400 audit(1340.490:258): avc: denied { write } for pid=9324 comm="syz.2.2778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1354.707700][ T30] audit: type=1400 audit(1354.240:259): avc: denied { connect } for pid=9416 comm="syz.0.2823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1355.327521][ T30] audit: type=1400 audit(1354.850:260): avc: denied { write } for pid=9416 comm="syz.0.2823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1358.897716][ T30] audit: type=1400 audit(1358.430:261): avc: denied { ioctl } for pid=9437 comm="syz.0.2832" path="socket:[23515]" dev="sockfs" ino=23515 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1377.400776][ T30] audit: type=1400 audit(1376.940:262): avc: denied { read } for pid=9540 comm="syz.0.2882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1377.944438][ T30] audit: type=1400 audit(1377.480:263): avc: denied { shutdown } for pid=9540 comm="syz.0.2882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1399.870391][ T9683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9683 comm=syz.0.2951 [ 1402.422701][ T30] audit: type=1400 audit(1401.960:264): avc: denied { relabelfrom } for pid=9697 comm="syz.2.2957" name="NETLINK" dev="sockfs" ino=24430 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1402.456985][ T30] audit: type=1400 audit(1401.990:265): avc: denied { relabelto } for pid=9697 comm="syz.2.2957" name="NETLINK" dev="sockfs" ino=24430 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_netfilter_socket permissive=1 [ 1416.452200][ T30] audit: type=1400 audit(1415.980:266): avc: denied { create } for pid=9779 comm="syz.0.2995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1416.493379][ T30] audit: type=1400 audit(1416.030:267): avc: denied { write } for pid=9779 comm="syz.0.2995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1419.755695][ T9798] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9798 comm=syz.0.3004 [ 1424.435634][ T30] audit: type=1400 audit(1423.970:268): avc: denied { setopt } for pid=9829 comm="syz.2.3020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1425.022453][ T30] audit: type=1400 audit(1424.560:269): avc: denied { bind } for pid=9833 comm="syz.0.3022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1439.145024][ T9911] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9911 comm=syz.0.3058 [ 1445.336163][ T30] audit: type=1400 audit(1444.870:270): avc: denied { setattr } for pid=9948 comm="syz.0.3077" name="LLC" dev="sockfs" ino=25445 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1465.661626][ T30] audit: type=1400 audit(1465.190:271): avc: denied { mount } for pid=10071 comm="syz.2.3138" name="/" dev="configfs" ino=1136 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1465.687670][ T30] audit: type=1400 audit(1465.210:272): avc: denied { remount } for pid=10071 comm="syz.2.3138" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1465.944719][ T30] audit: type=1400 audit(1465.480:273): avc: denied { unmount } for pid=4259 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1474.212700][T10122] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10122 comm=syz.0.3163 [ 1474.706065][T10125] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=10125 comm=syz.0.3164 [ 1477.451320][T10139] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65498 sclass=netlink_audit_socket pid=10139 comm=syz.2.3170 [ 1478.417781][ T30] audit: type=1400 audit(1477.950:274): avc: denied { mounton } for pid=10142 comm="syz.2.3172" path="/1094/file0" dev="tmpfs" ino=5632 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1479.341040][ T30] audit: type=1400 audit(1478.860:275): avc: denied { getopt } for pid=10148 comm="syz.2.3175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1481.262624][ T30] audit: type=1400 audit(1480.790:276): avc: denied { remount } for pid=10162 comm="syz.0.3183" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1481.275278][T10163] ======================================================= [ 1481.275278][T10163] WARNING: The mand mount option has been deprecated and [ 1481.275278][T10163] and is ignored by this kernel. Remove the mand [ 1481.275278][T10163] option from the mount to silence this warning. [ 1481.275278][T10163] ======================================================= [ 1497.800338][T10248] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10248 comm=syz.2.3222 [ 1507.939045][ T30] audit: type=1400 audit(1507.470:277): avc: denied { append } for pid=10305 comm="syz.0.3253" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1510.596967][ T30] audit: type=1400 audit(1510.120:278): avc: denied { ioctl } for pid=10318 comm="syz.0.3259" path="socket:[26328]" dev="sockfs" ino=26328 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1521.823409][ T30] audit: type=1400 audit(1521.360:279): avc: denied { create } for pid=10379 comm="syz.0.3289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1521.905433][ T30] audit: type=1400 audit(1521.440:280): avc: denied { write } for pid=10379 comm="syz.0.3289" path="socket:[26422]" dev="sockfs" ino=26422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1579.595190][ T30] audit: type=1400 audit(1579.120:281): avc: denied { write } for pid=10687 comm="syz.2.3437" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1582.768031][ T30] audit: type=1400 audit(1582.300:282): avc: denied { create } for pid=10700 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1582.774931][ T30] audit: type=1400 audit(1582.310:283): avc: denied { write open } for pid=10700 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=7056 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1582.820658][ T30] audit: type=1400 audit(1582.350:284): avc: denied { append } for pid=10700 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=7056 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1582.851213][ T30] audit: type=1400 audit(1582.380:285): avc: denied { getattr } for pid=10700 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1583.699817][ T30] audit: type=1400 audit(1583.220:286): avc: denied { read } for pid=10706 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1584.831836][ T30] audit: type=1400 audit(1584.370:287): avc: denied { unlink } for pid=10708 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=7056 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1610.435558][ T30] audit: type=1400 audit(1609.970:288): avc: denied { ioctl } for pid=10855 comm="syz.0.3517" path="socket:[28194]" dev="sockfs" ino=28194 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1629.732146][ T23] hid-generic 007F:6E8D:0005.0003: item fetching failed at offset 1/5 [ 1629.760343][ T23] hid-generic 007F:6E8D:0005.0003: probe with driver hid-generic failed with error -22 [ 1634.736575][ T30] audit: type=1400 audit(1634.270:289): avc: denied { ioctl } for pid=11005 comm="syz.0.3589" path="socket:[28462]" dev="sockfs" ino=28462 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1635.182735][T11009] syz.2.3590 uses obsolete (PF_INET,SOCK_PACKET) [ 1641.517935][T11044] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3608'. [ 1641.695311][ T30] audit: type=1400 audit(1641.230:290): avc: denied { ioctl } for pid=11045 comm="syz.2.3609" path="socket:[29370]" dev="sockfs" ino=29370 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1648.254821][ T30] audit: type=1400 audit(1647.790:291): avc: denied { remount } for pid=11081 comm="syz.0.3627" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1648.392923][ T30] audit: type=1400 audit(1647.920:292): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1660.553623][ T30] audit: type=1400 audit(1660.070:293): avc: denied { name_bind } for pid=11155 comm="syz.0.3664" src=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1676.196189][ T30] audit: type=1400 audit(1675.730:294): avc: denied { setopt } for pid=11250 comm="syz.0.3710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1689.747024][ T30] audit: type=1400 audit(1689.280:295): avc: denied { execute } for pid=11325 comm="syz.2.3746" path="/dev/dsp" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 1693.965752][T11354] binder: 11352:11354 ioctl c018620c 20000240 returned -22 [ 1697.019259][ T30] audit: type=1400 audit(1696.550:296): avc: denied { write } for pid=11367 comm="syz.2.3765" path="socket:[30067]" dev="sockfs" ino=30067 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1767.520136][ T30] audit: type=1400 audit(1767.040:297): avc: denied { bind } for pid=11730 comm="syz.2.3939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1767.575066][ T30] audit: type=1400 audit(1767.110:298): avc: denied { write } for pid=11730 comm="syz.2.3939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1773.656743][ T30] audit: type=1400 audit(1773.190:299): avc: denied { write } for pid=11775 comm="syz.0.3961" path="socket:[31601]" dev="sockfs" ino=31601 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1782.090766][T11820] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11820 comm=syz.0.3981 [ 1782.232308][ T30] audit: type=1400 audit(1781.750:300): avc: denied { unmount } for pid=4259 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1793.642875][T11885] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11885 comm=syz.0.4013 [ 1808.520642][ T30] audit: type=1400 audit(1808.050:301): avc: denied { map } for pid=11975 comm="syz.0.4058" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1808.553549][ T30] audit: type=1400 audit(1808.090:302): avc: denied { ioctl } for pid=11975 comm="syz.0.4058" path="/dev/usbmon0" dev="devtmpfs" ino=696 ioctlcmd=0x9204 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1815.925476][ T30] audit: type=1400 audit(1815.460:303): avc: denied { setopt } for pid=12030 comm="syz.0.4084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1818.864791][ T30] audit: type=1400 audit(1818.390:304): avc: denied { map } for pid=12043 comm="syz.0.4091" path="socket:[32240]" dev="sockfs" ino=32240 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1818.872467][ T30] audit: type=1400 audit(1818.410:305): avc: denied { read accept } for pid=12043 comm="syz.0.4091" path="socket:[32240]" dev="sockfs" ino=32240 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1833.312499][T12123] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4129'. [ 1841.989415][ T30] audit: type=1400 audit(1841.520:306): avc: denied { connect } for pid=12177 comm="syz.2.4157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1845.341853][T12205] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12205 comm=syz.0.4170 [ 1854.205894][ T30] audit: type=1400 audit(1853.740:307): avc: denied { remount } for pid=12258 comm="syz.0.4196" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1860.511095][ T30] audit: type=1400 audit(1860.020:308): avc: denied { create } for pid=12294 comm="syz.2.4213" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1860.596351][ T30] audit: type=1400 audit(1860.130:309): avc: denied { read write execute } for pid=12294 comm="syz.2.4213" name="file0" dev="tmpfs" ino=7814 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1886.517318][ T30] audit: type=1400 audit(1886.050:310): avc: denied { getopt } for pid=12448 comm="syz.0.4288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1891.920560][T12475] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12475 comm=syz.2.4300 [ 1924.669903][ T30] audit: type=1400 audit(1924.200:311): avc: denied { getattr } for pid=12677 comm="syz.0.4400" name="[userfaultfd]" dev="anon_inodefs" ino=35141 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1934.021650][ T30] audit: type=1400 audit(1933.550:312): avc: denied { create } for pid=12739 comm="syz.2.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1934.050515][ T30] audit: type=1400 audit(1933.580:313): avc: denied { write } for pid=12739 comm="syz.2.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1934.054564][ T30] audit: type=1400 audit(1933.580:314): avc: denied { read } for pid=12739 comm="syz.2.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1939.845489][ T30] audit: type=1400 audit(1939.380:315): avc: denied { write } for pid=12775 comm="syz.0.4446" path="socket:[34396]" dev="sockfs" ino=34396 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1979.166789][T13000] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2051 sclass=netlink_route_socket pid=13000 comm=syz.2.4556 [ 2001.605552][ C0] vkms_vblank_simulate: vblank timer overrun [ 2018.622916][ T30] audit: type=1400 audit(2018.160:316): avc: denied { bind } for pid=13224 comm="syz.0.4668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2020.081606][ T30] audit: type=1400 audit(2019.610:317): avc: denied { module_load } for pid=13234 comm="syz.0.4674" path=2F6D656D66643A20C736BE918D183229219A25A2D238D606070EFCFE128F2613AE254054A3B03E5CECA9F951403641108C6E7C202864656C6574656429 dev="hugetlbfs" ino=37066 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=system permissive=1 [ 2020.244751][T13236] Invalid ELF header magic: != ELF [ 2038.568095][T13344] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13344 comm=syz.0.4727 [ 2039.041003][T13347] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=258 sclass=netlink_route_socket pid=13347 comm=syz.2.4726 [ 2070.045325][ T30] audit: type=1400 audit(2069.580:318): avc: denied { connect } for pid=13515 comm="syz.2.4808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2101.401568][T13671] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=13671 comm=syz.0.4879 [ 2105.532114][ T30] audit: type=1400 audit(2105.070:319): avc: denied { nlmsg_read } for pid=13699 comm="syz.0.4894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2110.413719][ T30] audit: type=1400 audit(2109.950:320): avc: denied { ioctl } for pid=13736 comm="syz.2.4912" path="net:[4026532688]" dev="nsfs" ino=4026532688 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2145.035821][ T30] audit: type=1400 audit(2144.570:321): avc: denied { getopt } for pid=13963 comm="syz.2.5022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2149.353647][T13996] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13996 comm=syz.0.5038 [ 2155.774946][T11564] hid_parser_main: 33 callbacks suppressed [ 2155.775823][T11564] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2155.776272][T11564] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2155.776524][T11564] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2155.776760][T11564] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2155.777032][T11564] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2155.777281][T11564] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2155.777513][T11564] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2155.777739][T11564] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2155.778008][T11564] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2155.787182][T11564] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2155.920255][T11564] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [sy] on syz0 [ 2157.281096][ T30] audit: type=1400 audit(2156.810:322): avc: denied { create } for pid=14042 comm="syz.2.5061" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2157.296124][ T30] audit: type=1400 audit(2156.830:323): avc: denied { write } for pid=14042 comm="syz.2.5061" name="file0" dev="tmpfs" ino=9475 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2157.313417][ T30] audit: type=1400 audit(2156.850:324): avc: denied { open } for pid=14042 comm="syz.2.5061" path="/1844/file0" dev="tmpfs" ino=9475 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2157.396765][ T30] audit: type=1400 audit(2156.930:325): avc: denied { ioctl } for pid=14042 comm="syz.2.5061" path="/1844/file0" dev="tmpfs" ino=9475 ioctlcmd=0x1280 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2157.410179][T14039] fido_id[14039]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2157.512484][ T30] audit: type=1400 audit(2157.040:326): avc: denied { unlink } for pid=4259 comm="syz-executor" name="file0" dev="tmpfs" ino=9475 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2159.083101][T14059] batadv_slave_1: entered promiscuous mode [ 2159.087127][T14057] batadv_slave_1: left promiscuous mode [ 2162.599716][ T30] audit: type=1400 audit(2162.120:327): avc: denied { setattr } for pid=14082 comm="syz.0.5080" name="NETLINK" dev="sockfs" ino=39473 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2164.167101][ T30] audit: type=1400 audit(2163.700:328): avc: denied { mount } for pid=14091 comm="syz.2.5084" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2164.203384][ T30] audit: type=1400 audit(2163.730:329): avc: denied { remount } for pid=14091 comm="syz.2.5084" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2164.470367][ T30] audit: type=1400 audit(2164.000:330): avc: denied { unmount } for pid=4259 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2170.175583][ T30] audit: type=1400 audit(2169.710:331): avc: denied { read } for pid=14126 comm="syz.2.5101" path="socket:[39539]" dev="sockfs" ino=39539 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2183.429998][T13989] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 2183.620727][T13989] usb 1-1: Using ep0 maxpacket: 8 [ 2183.693424][T13989] usb 1-1: config 1 interface 0 altsetting 2 bulk endpoint 0x1 has invalid maxpacket 72 [ 2183.694778][T13989] usb 1-1: config 1 interface 0 has no altsetting 0 [ 2183.761984][T13989] usb 1-1: New USB device found, idVendor=04b8, idProduct=0202, bcdDevice= 0.40 [ 2183.776339][T13989] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2183.779755][T13989] usb 1-1: Product: syz [ 2183.781146][T13989] usb 1-1: Manufacturer: syz [ 2183.782450][T13989] usb 1-1: SerialNumber: syz [ 2183.914801][T14208] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2184.827181][T13989] usb 1-1: USB disconnect, device number 3 [ 2205.476413][T14322] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=14322 comm=syz.0.5196 [ 2208.820433][T14342] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14342 comm=syz.0.5206 [ 2217.563241][ T30] audit: type=1400 audit(2217.100:332): avc: denied { getopt } for pid=14397 comm="syz.0.5234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2241.098069][T13406] hid_parser_main: 22 callbacks suppressed [ 2241.113015][T13406] hid-generic FFFC:0003:0000.0005: unknown main item tag 0x0 [ 2241.113892][T13406] hid-generic FFFC:0003:0000.0005: unknown main item tag 0x0 [ 2241.125102][T13406] hid-generic FFFC:0003:0000.0005: unknown main item tag 0x0 [ 2241.125987][T13406] hid-generic FFFC:0003:0000.0005: unknown main item tag 0x0 [ 2241.126250][T13406] hid-generic FFFC:0003:0000.0005: unknown main item tag 0x0 [ 2241.204650][T13406] hid-generic FFFC:0003:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz0 [ 2243.594372][T14540] fido_id[14540]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2250.829785][ T30] audit: type=1400 audit(2250.350:333): avc: denied { accept } for pid=14581 comm="syz.0.5324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2274.451843][T14702] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14702 comm=syz.2.5382 [ 2301.028094][ T30] audit: type=1400 audit(2300.560:334): avc: denied { accept } for pid=14867 comm="syz.2.5464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2308.796831][T14908] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14908 comm=syz.0.5483 [ 2326.380601][T14999] netlink: 64 bytes leftover after parsing attributes in process `syz.2.5527'. [ 2335.527179][T15049] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1538 sclass=netlink_audit_socket pid=15049 comm=syz.0.5549 [ 2346.220476][T15104] block device autoloading is deprecated and will be removed. [ 2376.473190][ T30] audit: type=1400 audit(2376.010:335): avc: denied { map } for pid=15260 comm="syz.2.5652" path="/proc/4252/net/pfkey" dev="proc" ino=4026532885 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2376.473721][ T30] audit: type=1400 audit(2376.010:336): avc: denied { execute } for pid=15260 comm="syz.2.5652" path="/proc/4252/net/pfkey" dev="proc" ino=4026532885 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2384.432393][ T30] audit: type=1400 audit(2383.970:337): avc: denied { create } for pid=15310 comm="syz.2.5677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 2384.541746][ T30] audit: type=1400 audit(2384.070:338): avc: denied { ioctl } for pid=15310 comm="syz.2.5677" path="socket:[43621]" dev="sockfs" ino=43621 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 2396.274673][ T30] audit: type=1400 audit(2395.810:339): avc: denied { setattr } for pid=15369 comm="syz.2.5706" name="tty24" dev="devtmpfs" ino=43 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 2420.980105][ T30] audit: type=1400 audit(2420.510:340): avc: denied { ioctl } for pid=15496 comm="syz.0.5769" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2437.184360][T15560] SELinux: syz.2.5799 (15560) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 2455.844867][ T30] audit: type=1400 audit(2455.380:341): avc: denied { ioctl } for pid=15640 comm="syz.0.5838" path="socket:[45164]" dev="sockfs" ino=45164 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2480.352784][ T30] audit: type=1400 audit(2479.890:342): avc: denied { accept } for pid=15773 comm="syz.2.5903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2527.960388][ T30] audit: type=1400 audit(2527.490:343): avc: denied { remount } for pid=15996 comm="syz.2.6010" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2527.987729][T15999] option changes via remount are deprecated (pid=15996 comm=syz.2.6010) [ 2528.673646][ T30] audit: type=1400 audit(2528.210:344): avc: denied { append } for pid=16002 comm="syz.2.6013" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2546.620667][ T30] audit: type=1400 audit(2546.150:345): avc: denied { mount } for pid=16099 comm="syz.0.6059" name="/" dev="hugetlbfs" ino=45941 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 2546.642215][ T30] audit: type=1400 audit(2546.180:346): avc: denied { remount } for pid=16099 comm="syz.0.6059" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 2546.877821][ T30] audit: type=1400 audit(2546.400:347): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 2563.552687][T16174] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=243 sclass=netlink_audit_socket pid=16174 comm=syz.0.6094 [ 2591.536414][T16315] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16315 comm=syz.0.6163 [ 2614.481609][T16439] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2304 sclass=netlink_tcpdiag_socket pid=16439 comm=syz.2.6224 [ 2616.635336][T16449] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16449 comm=syz.2.6229 [ 2623.674453][T16483] snd_dummy snd_dummy.0: control 0:0:0:syz1:0 is already present [ 2624.933541][T16490] netlink: 56 bytes leftover after parsing attributes in process `syz.2.6250'. [ 2624.973932][T16490] netlink: 56 bytes leftover after parsing attributes in process `syz.2.6250'. [ 2630.692935][T16522] usb usb1: usbfs: process 16522 (syz.0.6265) did not claim interface 4 before use [ 2640.601174][ T30] audit: type=1400 audit(2640.140:348): avc: denied { bind } for pid=16569 comm="syz.0.6288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2671.136580][ T30] audit: type=1400 audit(2670.670:349): avc: denied { getopt } for pid=16718 comm="syz.0.6361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2682.072361][T16769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=16769 comm=syz.0.6386 [ 2692.604498][ T30] audit: type=1400 audit(2692.140:350): avc: denied { setattr } for pid=16825 comm="syz.0.6414" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 2696.034507][ T30] audit: type=1400 audit(2695.570:351): avc: denied { ioctl } for pid=16842 comm="syz.0.6422" path="/dev/input/mice" dev="devtmpfs" ino=705 ioctlcmd=0x937b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 2735.720724][ T30] audit: type=1400 audit(2735.250:352): avc: denied { setopt } for pid=17017 comm="syz.0.6508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2736.641884][T17023] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17023 comm=syz.0.6510 [ 2740.780787][ C0] vkms_vblank_simulate: vblank timer overrun [ 2751.944698][ T30] audit: type=1400 audit(2751.480:353): avc: denied { read } for pid=17070 comm="syz.0.6534" name="file2" dev="tmpfs" ino=20314 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2765.852818][T17129] usb usb1: usbfs: process 17129 (syz.2.6561) did not claim interface 0 before use [ 2776.494634][T17175] SELinux: syz.0.6584 (17175) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 2798.022263][ T9754] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 2798.271283][ T9754] usb 1-1: Using ep0 maxpacket: 8 [ 2798.523048][ T9754] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 2798.710872][ T9754] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2798.715926][ T9754] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2798.722367][ T9754] usb 1-1: Product: syz [ 2798.724971][ T9754] usb 1-1: Manufacturer: syz [ 2798.727722][ T9754] usb 1-1: SerialNumber: syz [ 2798.916642][ T9754] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -22 [ 2799.215607][ T9754] usb 1-1: USB disconnect, device number 4 [ 2805.381600][T17271] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17271 comm=syz.2.6630 [ 2873.995041][T17550] binfmt_misc: register: failed to install interpreter file ./bus [ 2912.271550][T10574] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 2912.533007][T10574] usb 1-1: Using ep0 maxpacket: 8 [ 2912.737165][T10574] usb 1-1: config 179 has an invalid interface number: 65 but max is 0 [ 2912.739398][T10574] usb 1-1: config 179 has no interface number 0 [ 2912.739919][T10574] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0xF has an invalid bInterval 0, changing to 7 [ 2912.740288][T10574] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0xF has invalid maxpacket 1025, setting to 1024 [ 2912.740743][T10574] usb 1-1: config 179 interface 65 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 7 [ 2912.740871][T10574] usb 1-1: config 179 interface 65 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 2912.741130][T10574] usb 1-1: New USB device found, idVendor=12ab, idProduct=90a3, bcdDevice=1e.eb [ 2912.741250][T10574] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2912.880211][T17698] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2913.512933][ T9754] usb 1-1: USB disconnect, device number 5 [ 2913.513443][ C0] xpad 1-1:179.65: xpad_irq_in - usb_submit_urb failed with result -19 [ 2913.513736][ C0] xpad 1-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 2921.298061][ T30] audit: type=1400 audit(2920.830:354): avc: denied { bind } for pid=17727 comm="syz.2.6853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2927.239688][ T30] audit: type=1400 audit(2926.770:355): avc: denied { setattr } for pid=17744 comm="syz.0.6862" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2970.571008][ T30] audit: type=1400 audit(2970.090:356): avc: denied { mounton } for pid=17848 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2971.947252][T13330] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2972.762522][T13330] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2973.422293][T13330] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2973.935993][T13330] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2981.043905][T13330] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2981.185574][T13330] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2981.264555][T13330] bond0 (unregistering): Released all slaves [ 2982.663774][T13330] hsr_slave_0: left promiscuous mode [ 2982.713763][T13330] hsr_slave_1: left promiscuous mode [ 2983.141353][T13330] veth1_macvtap: left promiscuous mode [ 2983.142527][T13330] veth0_macvtap: left promiscuous mode [ 2983.143411][T13330] veth1_vlan: left promiscuous mode [ 2983.144023][T13330] veth0_vlan: left promiscuous mode [ 2993.397781][T17848] lo speed is unknown, defaulting to 1000 [ 3008.391495][T17848] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3008.533363][T17848] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3011.734851][ T30] audit: type=1400 audit(3011.270:357): avc: denied { append } for pid=17975 comm="syz.0.6949" name="ubi_ctrl" dev="devtmpfs" ino=687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3011.830787][T17977] ubi31: attaching mtd0 [ 3012.231383][T17977] ubi31: scanning is finished [ 3012.234062][T17977] ubi31 error: ubi_read_volume_table: the layout volume was not found [ 3012.711450][T17977] ubi31 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 3017.154407][T17848] hsr_slave_0: entered promiscuous mode [ 3017.175252][T17848] hsr_slave_1: entered promiscuous mode [ 3022.691801][T17848] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 3022.805290][T17848] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 3022.917771][T17848] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 3023.076784][T17848] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 3030.482259][T17848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3058.424622][T17848] veth0_vlan: entered promiscuous mode [ 3058.699023][T17848] veth1_vlan: entered promiscuous mode [ 3059.692889][T17848] veth0_macvtap: entered promiscuous mode [ 3059.954192][T17848] veth1_macvtap: entered promiscuous mode [ 3061.126728][T13330] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3061.135095][T13330] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3061.150891][T13330] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3061.155353][T13330] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3062.180971][ T30] audit: type=1400 audit(3061.710:358): avc: denied { mounton } for pid=17848 comm="syz-executor" path="/syzkaller.U2v2vt/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 3062.374149][ T30] audit: type=1400 audit(3061.910:359): avc: denied { unmount } for pid=17848 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 3065.366392][ T30] audit: type=1400 audit(3064.900:360): avc: denied { write } for pid=18145 comm="syz.0.6983" path="socket:[52566]" dev="sockfs" ino=52566 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3081.850970][ T30] audit: type=1400 audit(3081.380:361): avc: denied { append } for pid=18237 comm="syz.3.7024" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 3082.666837][ T30] audit: type=1400 audit(3082.200:362): avc: denied { create } for pid=18241 comm="syz.0.7026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 3082.759512][ T30] audit: type=1400 audit(3082.290:363): avc: denied { write } for pid=18241 comm="syz.0.7026" path="socket:[52707]" dev="sockfs" ino=52707 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 3087.314942][T18265] binfmt_misc: register: failed to install interpreter file ./file0 [ 3107.318970][ T30] audit: type=1400 audit(3106.850:364): avc: denied { listen } for pid=18372 comm="syz.0.7090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3112.914929][ T30] audit: type=1400 audit(3112.440:365): avc: denied { mount } for pid=18394 comm="syz.3.7101" name="/" dev="securityfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 3113.216695][ T30] audit: type=1400 audit(3112.740:366): avc: denied { unmount } for pid=17848 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 3209.297861][ C1] vkms_vblank_simulate: vblank timer overrun [ 3209.459546][ C1] vkms_vblank_simulate: vblank timer overrun [ 3209.648851][ C1] vkms_vblank_simulate: vblank timer overrun [ 3244.340575][T19020] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19020 comm=syz.0.7413 [ 3247.911600][T19037] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3247.917684][T19037] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3379.333383][T19793] binfmt_misc: register: failed to install interpreter file ./file0 [ 3386.158925][ C0] vkms_vblank_simulate: vblank timer overrun [ 3386.352299][ C0] vkms_vblank_simulate: vblank timer overrun [ 3386.458515][ C0] vkms_vblank_simulate: vblank timer overrun [ 3387.077695][ C0] vkms_vblank_simulate: vblank timer overrun [ 3387.507464][ C0] vkms_vblank_simulate: vblank timer overrun [ 3387.969842][ C0] vkms_vblank_simulate: vblank timer overrun [ 3389.040765][ C0] vkms_vblank_simulate: vblank timer overrun [ 3417.523990][T19995] SELinux: syz.3.7885 (19995) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 3426.132200][T20019] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20019 comm=syz.3.7896 [ 3456.700747][ T30] audit: type=1400 audit(3456.230:367): avc: denied { map } for pid=20216 comm="syz.0.7995" path="socket:[60489]" dev="sockfs" ino=60489 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 3465.734403][T20277] binfmt_misc: register: failed to install interpreter file ./file0 [ 3468.715084][T20299] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20299 comm=syz.3.8036 [ 3470.884866][ T30] audit: type=1400 audit(3470.420:368): avc: denied { mount } for pid=20311 comm="syz.3.8042" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 3470.962089][ T30] audit: type=1400 audit(3470.450:369): avc: denied { remount } for pid=20311 comm="syz.3.8042" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 3471.184360][ T30] audit: type=1400 audit(3470.720:370): avc: denied { unmount } for pid=17848 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 3472.887942][T20328] raw_sendmsg: syz.0.8049 forgot to set AF_INET. Fix it! [ 3475.155977][T20349] netlink: 4083 bytes leftover after parsing attributes in process `syz.3.8058'. [ 3481.388039][T20384] block nbd3: shutting down sockets [ 3499.834584][ T30] audit: type=1400 audit(3499.370:371): avc: denied { write } for pid=20528 comm="syz.0.8148" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3598.582777][T15204] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3598.643648][T15204] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3598.696224][T15204] bond0 (unregistering): Released all slaves [ 3599.390698][T15204] hsr_slave_0: left promiscuous mode [ 3599.411486][T15204] hsr_slave_1: left promiscuous mode [ 3612.887098][T20879] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3612.947409][T20879] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3617.303199][T20879] hsr_slave_0: entered promiscuous mode [ 3617.314784][T20879] hsr_slave_1: entered promiscuous mode [ 3617.323552][T20879] debugfs: 'hsr0' already exists in 'hsr' [ 3617.325556][T20879] Cannot create hsr debugfs directory [ 3619.979016][T20879] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 3620.033257][T20879] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 3620.076398][T20879] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 3620.126272][T20879] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 3624.367583][T20879] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3642.237879][T20879] veth0_vlan: entered promiscuous mode [ 3642.385880][T20879] veth1_vlan: entered promiscuous mode [ 3642.725674][T20879] veth0_macvtap: entered promiscuous mode [ 3642.835550][T20879] veth1_macvtap: entered promiscuous mode [ 3643.435535][T17855] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3643.463059][T17855] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3643.466882][T17855] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3643.471499][T17855] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3646.351557][T21031] binfmt_misc: register: failed to install interpreter file ./bus [ 3652.492462][T21061] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21061 comm=syz.3.8331 [ 3664.000429][ T30] audit: type=1400 audit(3663.530:372): avc: denied { name_bind } for pid=21116 comm="syz.4.8353" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 3674.079462][ T30] audit: type=1400 audit(3673.610:373): avc: denied { bind } for pid=21168 comm="syz.4.8379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3674.087722][ T30] audit: type=1400 audit(3673.620:374): avc: denied { name_bind } for pid=21168 comm="syz.4.8379" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 3674.107835][ T30] audit: type=1400 audit(3673.640:375): avc: denied { node_bind } for pid=21168 comm="syz.4.8379" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 3682.512278][ T30] audit: type=1400 audit(3682.050:376): avc: denied { shutdown } for pid=21212 comm="syz.4.8400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3688.826066][ T30] audit: type=1400 audit(3688.330:377): avc: denied { name_bind } for pid=21245 comm="syz.3.8416" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 3697.855762][ T30] audit: type=1400 audit(3697.380:378): avc: denied { mount } for pid=21272 comm="syz.4.8429" name="/" dev="pipefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 3717.696879][ T30] audit: type=1400 audit(3717.230:379): avc: denied { mounton } for pid=21340 comm="syz.4.8461" path="/proc/189/cgroup" dev="proc" ino=64622 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 3761.194955][T21393] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3761.474552][T21393] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3762.805921][T21484] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21484 comm=syz.4.8520 [ 3765.141046][T13330] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3765.870374][T13330] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3766.553520][T13330] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3767.271105][T13330] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3774.315448][T13330] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3774.437373][T13330] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3774.490243][T13330] bond0 (unregistering): Released all slaves [ 3775.124554][ T30] audit: type=1400 audit(3774.650:380): avc: denied { search } for pid=3164 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3775.145192][ T30] audit: type=1400 audit(3774.680:381): avc: denied { search } for pid=3164 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3775.159484][ T30] audit: type=1400 audit(3774.680:382): avc: denied { search } for pid=3164 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3775.211701][T13330] hsr_slave_0: left promiscuous mode [ 3775.315825][T13330] hsr_slave_1: left promiscuous mode [ 3775.557431][T13330] veth1_macvtap: left promiscuous mode [ 3775.596513][T13330] veth0_macvtap: left promiscuous mode [ 3775.604796][T13330] veth1_vlan: left promiscuous mode [ 3775.616780][T13330] veth0_vlan: left promiscuous mode [ 3790.532087][T21393] hsr_slave_0: entered promiscuous mode [ 3790.556951][T21393] hsr_slave_1: entered promiscuous mode [ 3792.844798][ T30] audit: type=1400 audit(3792.380:383): avc: denied { read open } for pid=21583 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=896 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3792.857670][ T30] audit: type=1400 audit(3792.380:384): avc: denied { getattr } for pid=21583 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=896 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3793.639824][ T30] audit: type=1400 audit(3793.170:385): avc: denied { add_name } for pid=21579 comm="dhcpcd-run-hook" name="resolv.conf.eth13.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3796.443759][ T30] audit: type=1400 audit(3795.970:386): avc: denied { remove_name } for pid=21593 comm="rm" name="resolv.conf.eth13.link" dev="tmpfs" ino=14362 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3797.584310][T21393] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 3797.707234][T21393] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 3797.793460][T21393] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 3797.967188][T21393] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 3805.212275][T21393] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3844.457572][T21393] veth0_vlan: entered promiscuous mode [ 3844.890578][T21393] veth1_vlan: entered promiscuous mode [ 3846.151489][T21393] veth0_macvtap: entered promiscuous mode [ 3846.447775][T21393] veth1_macvtap: entered promiscuous mode [ 3847.783025][ T8601] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3847.793907][ T8601] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3847.796485][T19919] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3847.925863][T13330] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3876.130511][ T30] audit: type=1400 audit(3875.650:387): avc: denied { checkpoint_restore } for pid=21888 comm="syz.5.8658" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3904.790831][T22018] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22018 comm=syz.4.8719 [ 3944.831373][T22256] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44 sclass=netlink_audit_socket pid=22256 comm=syz.4.8838 [ 3956.735006][T22303] nbd0: detected capacity change from 0 to 127 [ 3956.850666][ T48] block nbd0: Receive control failed (result -32) [ 3956.870537][T22305] block nbd0: Receive control failed (result -32) [ 3957.116993][T21721] [ 3957.120137][T21721] ====================================================== [ 3957.120689][T21721] WARNING: possible circular locking dependency detected [ 3957.121757][T21721] syzkaller #0 Not tainted [ 3957.122098][T21721] ------------------------------------------------------ [ 3957.122454][T21721] udevd/21721 is trying to acquire lock: [ 3957.122859][T21721] ffff000019bc3870 (&nsock->tx_lock){+.+.}-{4:4}, at: nbd_queue_rq+0x2cc/0xb54 [ 3957.125786][T21721] [ 3957.125786][T21721] but task is already holding lock: [ 3957.126288][T21721] ffff000013a4e178 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 3957.126982][T21721] [ 3957.126982][T21721] which lock already depends on the new lock. [ 3957.126982][T21721] [ 3957.127450][T21721] [ 3957.127450][T21721] the existing dependency chain (in reverse order) is: [ 3957.127978][T21721] [ 3957.127978][T21721] -> #6 (&cmd->lock){+.+.}-{4:4}: [ 3957.128825][T21721] __mutex_lock+0x144/0xffc [ 3957.129184][T21721] mutex_lock_nested+0x24/0x30 [ 3957.129686][T21721] nbd_queue_rq+0xa8/0xb54 [ 3957.129988][T21721] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 3957.130657][T21721] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 3957.131104][T21721] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 3957.131475][T21721] blk_mq_run_hw_queue+0x1e4/0x500 [ 3957.131903][T21721] blk_mq_dispatch_list+0x348/0xa50 [ 3957.132324][T21721] blk_mq_flush_plug_list+0xe8/0x508 [ 3957.132709][T21721] __blk_flush_plug+0x208/0x3b8 [ 3957.133108][T21721] __submit_bio+0x3a4/0x4ac [ 3957.133453][T21721] submit_bio_noacct_nocheck+0x59c/0xa8c [ 3957.133838][T21721] submit_bio_noacct+0x858/0x18f8 [ 3957.134199][T21721] submit_bio+0x32c/0x5f0 [ 3957.134563][T21721] submit_bh_wbc+0x310/0x480 [ 3957.134912][T21721] block_read_full_folio+0x26c/0x640 [ 3957.135363][T21721] blkdev_read_folio+0x1c/0x28 [ 3957.135709][T21721] filemap_read_folio+0xac/0x1fc [ 3957.136085][T21721] do_read_cache_folio+0x1c4/0x480 [ 3957.136428][T21721] read_cache_folio+0x44/0x6c [ 3957.136754][T21721] read_part_sector+0xac/0x5f4 [ 3957.137136][T21721] read_lba+0x15c/0x2ec [ 3957.137443][T21721] efi_partition+0x1dc/0x2154 [ 3957.137766][T21721] bdev_disk_changed+0x508/0xf0c [ 3957.138085][T21721] blkdev_get_whole+0x144/0x1e4 [ 3957.138555][T21721] bdev_open+0x1dc/0xa84 [ 3957.138860][T21721] blkdev_open+0x1d4/0x324 [ 3957.140250][T21721] do_dentry_open+0x6a4/0x103c [ 3957.141302][T21721] vfs_open+0x5c/0x2fc [ 3957.142453][T21721] path_openat+0x1490/0x24b4 [ 3957.143073][T21721] do_filp_open+0x184/0x360 [ 3957.143736][T21721] do_sys_openat2+0xe0/0x160 [ 3957.144081][T21721] __arm64_sys_openat+0x12c/0x1bc [ 3957.144478][T21721] invoke_syscall+0x6c/0x258 [ 3957.144886][T21721] el0_svc_common.constprop.0+0xac/0x230 [ 3957.145226][T21721] do_el0_svc+0x40/0x58 [ 3957.145566][T21721] el0_svc+0x50/0x1a0 [ 3957.145868][T21721] el0t_64_sync_handler+0xa0/0xe4 [ 3957.146237][T21721] el0t_64_sync+0x198/0x19c [ 3957.146736][T21721] [ 3957.146736][T21721] -> #5 (set->srcu){.+.+}-{0:0}: [ 3957.147432][T21721] __synchronize_srcu+0xa8/0x268 [ 3957.147825][T21721] synchronize_srcu+0x12c/0x370 [ 3957.148330][T21721] blk_mq_quiesce_queue+0xf4/0x15c [ 3957.148696][T21721] elevator_switch+0x11c/0x414 [ 3957.149125][T21721] elevator_change+0x294/0x424 [ 3957.149444][T21721] elevator_set_default+0x22c/0x2ac [ 3957.149812][T21721] blk_register_queue+0x278/0x3ac [ 3957.150175][T21721] __add_disk+0x518/0xb80 [ 3957.150587][T21721] add_disk_fwnode+0x114/0x4c0 [ 3957.150992][T21721] device_add_disk+0x14/0x20 [ 3957.151386][T21721] nbd_dev_add+0x5f0/0x9c0 [ 3957.151772][T21721] nbd_init+0xd4/0x1a8 [ 3957.152168][T21721] do_one_initcall+0x130/0x7f0 [ 3957.152530][T21721] kernel_init_freeable+0x48c/0x70c [ 3957.152901][T21721] kernel_init+0x24/0x1dc [ 3957.153219][T21721] ret_from_fork+0x10/0x20 [ 3957.153658][T21721] [ 3957.153658][T21721] -> #4 (&q->elevator_lock){+.+.}-{4:4}: [ 3957.154324][T21721] __mutex_lock+0x144/0xffc [ 3957.154674][T21721] mutex_lock_nested+0x24/0x30 [ 3957.155240][T21721] elevator_change+0x130/0x424 [ 3957.155769][T21721] elevator_set_none+0x90/0xe4 [ 3957.156230][T21721] __blk_mq_update_nr_hw_queues+0x3b4/0xd38 [ 3957.156769][T21721] blk_mq_update_nr_hw_queues+0x44/0x68 [ 3957.157137][T21721] nbd_start_device+0x128/0xa38 [ 3957.157487][T21721] nbd_genl_connect+0xcb4/0x14c4 [ 3957.157851][T21721] genl_family_rcv_msg_doit+0x1b8/0x280 [ 3957.158431][T21721] genl_rcv_msg+0x3ec/0x5bc [ 3957.158842][T21721] netlink_rcv_skb+0x19c/0x338 [ 3957.159309][T21721] genl_rcv+0x38/0x50 [ 3957.159682][T21721] netlink_unicast+0x424/0x700 [ 3957.160141][T21721] netlink_sendmsg+0x644/0xa54 [ 3957.160549][T21721] __sock_sendmsg+0xc8/0x168 [ 3957.160909][T21721] ____sys_sendmsg+0x500/0x764 [ 3957.161232][T21721] ___sys_sendmsg+0x11c/0x19c [ 3957.161585][T21721] __sys_sendmsg+0x114/0x19c [ 3957.161924][T21721] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 3957.162303][T21721] invoke_syscall+0x6c/0x258 [ 3957.162625][T21721] el0_svc_common.constprop.0+0xac/0x230 [ 3957.162988][T21721] do_el0_svc_compat+0x40/0x68 [ 3957.163276][T21721] el0_svc_compat+0x4c/0x184 [ 3957.163652][T21721] el0t_32_sync_handler+0x88/0xac [ 3957.163992][T21721] el0t_32_sync+0x19c/0x1a0 [ 3957.164340][T21721] [ 3957.164340][T21721] -> #3 (&q->q_usage_counter(io)#33){++++}-{0:0}: [ 3957.165185][T21721] blk_alloc_queue+0x538/0x644 [ 3957.165531][T21721] blk_mq_alloc_queue+0x144/0x220 [ 3957.165858][T21721] __blk_mq_alloc_disk+0x20/0x1a4 [ 3957.166186][T21721] nbd_dev_add+0x3c0/0x9c0 [ 3957.166808][T21721] nbd_init+0xd4/0x1a8 [ 3957.167348][T21721] do_one_initcall+0x130/0x7f0 [ 3957.167724][T21721] kernel_init_freeable+0x48c/0x70c [ 3957.168092][T21721] kernel_init+0x24/0x1dc [ 3957.168636][T21721] ret_from_fork+0x10/0x20 [ 3957.169139][T21721] [ 3957.169139][T21721] -> #2 (fs_reclaim){+.+.}-{0:0}: [ 3957.169767][T21721] fs_reclaim_acquire+0x138/0x160 [ 3957.170164][T21721] kmem_cache_alloc_node_noprof+0x64/0x3b8 [ 3957.170624][T21721] __alloc_skb+0x208/0x2f0 [ 3957.170972][T21721] tcp_stream_alloc_skb+0x2c/0x450 [ 3957.171310][T21721] tcp_sendmsg_locked+0xf34/0x39e8 [ 3957.171806][T21721] tcp_sendmsg+0x38/0x60 [ 3957.172152][T21721] inet_sendmsg+0x90/0xd4 [ 3957.172590][T21721] __sock_sendmsg+0xc8/0x168 [ 3957.172986][T21721] sock_write_iter+0x1cc/0x300 [ 3957.173394][T21721] vfs_write+0x7bc/0xb88 [ 3957.173899][T21721] ksys_write+0x18c/0x1d8 [ 3957.174272][T21721] __arm64_sys_write+0x6c/0x9c [ 3957.174605][T21721] invoke_syscall+0x6c/0x258 [ 3957.174920][T21721] el0_svc_common.constprop.0+0xac/0x230 [ 3957.175334][T21721] do_el0_svc+0x40/0x58 [ 3957.175757][T21721] el0_svc+0x50/0x1a0 [ 3957.176083][T21721] el0t_64_sync_handler+0xa0/0xe4 [ 3957.176411][T21721] el0t_64_sync+0x198/0x19c [ 3957.176747][T21721] [ 3957.176747][T21721] -> #1 (sk_lock-AF_INET){+.+.}-{0:0}: [ 3957.177456][T21721] lock_sock_nested+0x38/0xe8 [ 3957.177804][T21721] inet_shutdown+0x50/0x348 [ 3957.178201][T21721] kernel_sock_shutdown+0x54/0x84 [ 3957.178599][T21721] nbd_mark_nsock_dead+0x100/0x534 [ 3957.179098][T21721] sock_shutdown+0x134/0x234 [ 3957.179425][T21721] nbd_config_put+0x154/0x5b0 [ 3957.179824][T21721] nbd_release+0x7c/0x128 [ 3957.180242][T21721] blkdev_put_whole+0x98/0xf0 [ 3957.180687][T21721] bdev_release+0x2a4/0x510 [ 3957.181252][T21721] blkdev_release+0x14/0x24 [ 3957.181813][T21721] __fput+0x2c8/0x954 [ 3957.182230][T21721] ____fput+0x14/0x20 [ 3957.182587][T21721] task_work_run+0x128/0x210 [ 3957.183026][T21721] do_notify_resume+0x1d8/0x260 [ 3957.183376][T21721] el0_svc_compat+0x104/0x184 [ 3957.183782][T21721] el0t_32_sync_handler+0x88/0xac [ 3957.184307][T21721] el0t_32_sync+0x19c/0x1a0 [ 3957.184655][T21721] [ 3957.184655][T21721] -> #0 (&nsock->tx_lock){+.+.}-{4:4}: [ 3957.185292][T21721] __lock_acquire+0x1638/0x2380 [ 3957.185684][T21721] lock_acquire+0x310/0x38c [ 3957.186015][T21721] __mutex_lock+0x144/0xffc [ 3957.186344][T21721] mutex_lock_nested+0x24/0x30 [ 3957.186691][T21721] nbd_queue_rq+0x2cc/0xb54 [ 3957.187039][T21721] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 3957.187402][T21721] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 3957.187810][T21721] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 3957.188537][T21721] blk_mq_run_hw_queue+0x1e4/0x500 [ 3957.188915][T21721] blk_mq_dispatch_list+0x348/0xa50 [ 3957.189302][T21721] blk_mq_flush_plug_list+0xe8/0x508 [ 3957.189719][T21721] __blk_flush_plug+0x208/0x3b8 [ 3957.190064][T21721] __submit_bio+0x3a4/0x4ac [ 3957.190404][T21721] submit_bio_noacct_nocheck+0x59c/0xa8c [ 3957.190782][T21721] submit_bio_noacct+0x858/0x18f8 [ 3957.191159][T21721] submit_bio+0x32c/0x5f0 [ 3957.191735][T21721] submit_bh_wbc+0x310/0x480 [ 3957.192111][T21721] block_read_full_folio+0x26c/0x640 [ 3957.192778][T21721] blkdev_read_folio+0x1c/0x28 [ 3957.193239][T21721] filemap_read_folio+0xac/0x1fc [ 3957.193657][T21721] do_read_cache_folio+0x1c4/0x480 [ 3957.194172][T21721] read_cache_folio+0x44/0x6c [ 3957.194537][T21721] read_part_sector+0xac/0x5f4 [ 3957.194862][T21721] read_lba+0x15c/0x2ec [ 3957.195338][T21721] efi_partition+0x1dc/0x2154 [ 3957.195987][T21721] bdev_disk_changed+0x508/0xf0c [ 3957.196461][T21721] blkdev_get_whole+0x144/0x1e4 [ 3957.196892][T21721] bdev_open+0x1dc/0xa84 [ 3957.197194][T21721] blkdev_open+0x1d4/0x324 [ 3957.197513][T21721] do_dentry_open+0x6a4/0x103c [ 3957.197924][T21721] vfs_open+0x5c/0x2fc [ 3957.198449][T21721] path_openat+0x1490/0x24b4 [ 3957.198860][T21721] do_filp_open+0x184/0x360 [ 3957.199194][T21721] do_sys_openat2+0xe0/0x160 [ 3957.199603][T21721] __arm64_sys_openat+0x12c/0x1bc [ 3957.200348][T21721] invoke_syscall+0x6c/0x258 [ 3957.200722][T21721] el0_svc_common.constprop.0+0xac/0x230 [ 3957.201078][T21721] do_el0_svc+0x40/0x58 [ 3957.201522][T21721] el0_svc+0x50/0x1a0 [ 3957.201883][T21721] el0t_64_sync_handler+0xa0/0xe4 [ 3957.202218][T21721] el0t_64_sync+0x198/0x19c [ 3957.202932][T21721] [ 3957.202932][T21721] other info that might help us debug this: [ 3957.202932][T21721] [ 3957.203537][T21721] Chain exists of: [ 3957.203537][T21721] &nsock->tx_lock --> set->srcu --> &cmd->lock [ 3957.203537][T21721] [ 3957.205467][T21721] Possible unsafe locking scenario: [ 3957.205467][T21721] [ 3957.205948][T21721] CPU0 CPU1 [ 3957.206430][T21721] ---- ---- [ 3957.206809][T21721] lock(&cmd->lock); [ 3957.207274][T21721] lock(set->srcu); [ 3957.207983][T21721] lock(&cmd->lock); [ 3957.208805][T21721] lock(&nsock->tx_lock); [ 3957.209472][T21721] [ 3957.209472][T21721] *** DEADLOCK *** [ 3957.209472][T21721] [ 3957.210030][T21721] 3 locks held by udevd/21721: [ 3957.210415][T21721] #0: ffff000014b6d358 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0x2c4/0xa84 [ 3957.211368][T21721] #1: ffff000014689710 (set->srcu){.+.+}-{0:0}, at: blk_mq_run_hw_queue+0x19c/0x500 [ 3957.212219][T21721] #2: ffff000013a4e178 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 3957.213023][T21721] [ 3957.213023][T21721] stack backtrace: [ 3957.214262][T21721] CPU: 1 UID: 0 PID: 21721 Comm: udevd Not tainted syzkaller #0 PREEMPT [ 3957.215307][T21721] Hardware name: linux,dummy-virt (DT) [ 3957.216353][T21721] Call trace: [ 3957.216954][T21721] show_stack+0x18/0x24 (C) [ 3957.217515][T21721] dump_stack_lvl+0xa4/0xf4 [ 3957.217874][T21721] dump_stack+0x1c/0x28 [ 3957.218307][T21721] print_circular_bug+0x28c/0x370 [ 3957.218671][T21721] check_noncircular+0x168/0x17c [ 3957.218994][T21721] __lock_acquire+0x1638/0x2380 [ 3957.219303][T21721] lock_acquire+0x310/0x38c [ 3957.219609][T21721] __mutex_lock+0x144/0xffc [ 3957.219946][T21721] mutex_lock_nested+0x24/0x30 [ 3957.220378][T21721] nbd_queue_rq+0x2cc/0xb54 [ 3957.220690][T21721] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 3957.221026][T21721] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 3957.221437][T21721] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 3957.221845][T21721] blk_mq_run_hw_queue+0x1e4/0x500 [ 3957.222273][T21721] blk_mq_dispatch_list+0x348/0xa50 [ 3957.222788][T21721] blk_mq_flush_plug_list+0xe8/0x508 [ 3957.223115][T21721] __blk_flush_plug+0x208/0x3b8 [ 3957.223433][T21721] __submit_bio+0x3a4/0x4ac [ 3957.223751][T21721] submit_bio_noacct_nocheck+0x59c/0xa8c [ 3957.224110][T21721] submit_bio_noacct+0x858/0x18f8 [ 3957.224422][T21721] submit_bio+0x32c/0x5f0 [ 3957.224724][T21721] submit_bh_wbc+0x310/0x480 [ 3957.225026][T21721] block_read_full_folio+0x26c/0x640 [ 3957.225341][T21721] blkdev_read_folio+0x1c/0x28 [ 3957.225661][T21721] filemap_read_folio+0xac/0x1fc [ 3957.225980][T21721] do_read_cache_folio+0x1c4/0x480 [ 3957.226353][T21721] read_cache_folio+0x44/0x6c [ 3957.226892][T21721] read_part_sector+0xac/0x5f4 [ 3957.227215][T21721] read_lba+0x15c/0x2ec [ 3957.227522][T21721] efi_partition+0x1dc/0x2154 [ 3957.227904][T21721] bdev_disk_changed+0x508/0xf0c [ 3957.228510][T21721] blkdev_get_whole+0x144/0x1e4 [ 3957.228825][T21721] bdev_open+0x1dc/0xa84 [ 3957.229186][T21721] blkdev_open+0x1d4/0x324 [ 3957.229493][T21721] do_dentry_open+0x6a4/0x103c [ 3957.229838][T21721] vfs_open+0x5c/0x2fc [ 3957.230171][T21721] path_openat+0x1490/0x24b4 [ 3957.230551][T21721] do_filp_open+0x184/0x360 [ 3957.230858][T21721] do_sys_openat2+0xe0/0x160 [ 3957.231190][T21721] __arm64_sys_openat+0x12c/0x1bc [ 3957.231685][T21721] invoke_syscall+0x6c/0x258 [ 3957.232169][T21721] el0_svc_common.constprop.0+0xac/0x230 [ 3957.232578][T21721] do_el0_svc+0x40/0x58 [ 3957.232869][T21721] el0_svc+0x50/0x1a0 [ 3957.233147][T21721] el0t_64_sync_handler+0xa0/0xe4 [ 3957.233669][T21721] el0t_64_sync+0x198/0x19c [ 3957.573782][T21721] block nbd0: Dead connection, failed to find a fallback [ 3957.585087][T21721] block nbd0: shutting down sockets [ 3957.624629][T21721] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3957.625720][T21721] Buffer I/O error on dev nbd0, logical block 0, async page read [ 3957.636382][T21721] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3957.641910][T21721] Buffer I/O error on dev nbd0, logical block 1, async page read [ 3957.645574][T21721] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3957.653296][T21721] Buffer I/O error on dev nbd0, logical block 2, async page read [ 3957.656572][T21721] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3957.720921][T21721] Buffer I/O error on dev nbd0, logical block 3, async page read [ 3957.724878][T21721] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3957.726671][T21721] Buffer I/O error on dev nbd0, logical block 0, async page read [ 3957.729983][T21721] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3957.731974][T21721] Buffer I/O error on dev nbd0, logical block 1, async page read [ 3957.734158][T21721] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3957.735959][T21721] Buffer I/O error on dev nbd0, logical block 2, async page read [ 3957.738846][T21721] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3957.741909][T21721] Buffer I/O error on dev nbd0, logical block 3, async page read [ 3957.745046][T21721] nbd0: unable to read partition table [ 3957.767010][T21721] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3957.770281][T21721] Buffer I/O error on dev nbd0, logical block 0, async page read [ 3957.772554][T21721] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 3957.774239][T21721] Buffer I/O error on dev nbd0, logical block 1, async page read [ 3957.780811][T21721] nbd0: unable to read partition table VM DIAGNOSIS: 10:31:07 Registers: info registers vcpu 0 CPU#0 PC=ffff800084acbad4 X00=0000000000000000 X01=0000000000000000 X02=ffff00001bc86301 X03=1fffe0000d41313e X04=0000000000000000 X05=0000000000000000 X06=ffff800084acb8c0 X07=00000000f1f1f1f1 X08=ffff00001270dac0 X09=dfff800000000000 X10=ffff700011a971fc X11=1ffff00011a971fc X12=ffff700011a971fd X13=0000000000000000 X14=1fffe00002fb0acd X15=ffff000016fc3640 X16=0000000000000000 X17=1fffe00002fb09e0 X18=1fffe00002fb0aab X19=ffff00001ef32000 X20=1fffe00003de640b X21=ffff800087310020 X22=1ffff0001422ae66 X23=1fffe00003de6402 X24=ffff00001ef32010 X25=ffff80008d47f9c0 X26=ffff000017d84c80 X27=0000000000000000 X28=ffff00001ef32058 X29=ffff8000a11572d0 X30=ffff800084acbac0 SP=ffff8000a11572d0 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=fae5cf1f0c1a0f9a:132d8e1cfbb9b873 Q19=d3770b6a7d8e36d6:272e71ef7901b986 Q20=455bce50d99cf8d5:2154d16d9e7e6c04 Q21=be3678cef6f4023a:dfca4602822ae32c Q22=3bae4ad7a0113b66:b1d7de320e2176bc Q23=3725a4b60ee9cca1:0fd0adf8126f63ef Q24=b953af8344f6ab88:90379778e26b2543 Q25=f9952ece29a09135:be976fadb19e069c Q26=fae9cf1f0c1a0f9a:132d8d1cfbb9b873 Q27=d37b0b6a7d8236d2:272671ef790eb996 Q28=5839fb9bcc980ea8:0f460b55b74a406b Q29=ca4d5f2103a3ffd9:be9ce32b483084b0 Q30=146ce5c18dc88a8c:7ed3440870e6b5ed Q31=c56ed676677c9d8e:b0664d59053c83f7 info registers vcpu 1 CPU#1 PC=ffff80008046883c X00=000000000000000c X01=ffff000014ba0000 X02=0000000000000000 X03=0000000000000000 X04=ffff8000857ed660 X05=dfff800000000000 X06=0000000000000020 X07=0000000000000001 X08=0000000000000010 X09=0000000000000004 X10=0000000000000000 X11=0000000000000000 X12=0000000000000000 X13=00000000fffffffd X14=000000000000000f X15=0000000000000002 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=000000000000000c X20=1ffff000141b6ab0 X21=ffff8000a0db56f0 X22=0000000000000000 X23=ffff800082071860 X24=0000000000000001 X25=ffff8000a0db5bb0 X26=00000000ffffffff X27=ffff8000a0db5dd8 X28=0000000000000006 X29=ffff8000a0db5540 X30=ffff80008046883c SP=ffff8000a0db5540 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000