last executing test programs: 17.647473634s ago: executing program 1 (id=1773): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_xfrm(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x8044}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x14}, 0x0) recvmmsg$unix(r1, &(0x7f00000045c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 16.737958321s ago: executing program 1 (id=1775): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000ff5000/0x3000)=nil) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) msync(&(0x7f0000ff7000/0x1000)=nil, 0x1000, 0x0) 4.24152546s ago: executing program 0 (id=1795): r0 = landlock_create_ruleset(&(0x7f0000000000)={0xd061, 0x0, 0x3}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) r1 = openat$mixer(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) r2 = openat$binder_debug(0xffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, 0x0) 3.677644659s ago: executing program 0 (id=1796): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f00000002c0)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x40, 0x0, 0x0) mq_timedreceive(r1, &(0x7f0000000000)=""/83, 0x9b0c4f391059f39b, 0x20000900, &(0x7f0000000100)={0x77359400}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1, 0x0, 0x0, 0x4}, 0x1c) 2.754589167s ago: executing program 1 (id=1797): r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000200), 0x0, 0xa2c65) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000500)={0x0, 0xfffffffffffffd83, 0xfa00, {0x0, 0x0}}, 0xfdbc) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r2, 0xc0884113, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x10001}) 2.625101973s ago: executing program 0 (id=1798): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept4$unix(r1, &(0x7f00000001c0)=@abs, &(0x7f00000000c0)=0x6e, 0x80800) 2.038878164s ago: executing program 0 (id=1799): r0 = landlock_create_ruleset(&(0x7f0000000100)={0x9000}, 0x10, 0x0) landlock_restrict_self(r0, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x1800) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001180), 0x0, 0x0) dup3(r2, r1, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, 0x0) 1.73387958s ago: executing program 0 (id=1800): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_member(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x406, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$P9_RATTACH(r0, 0x0, 0x0) 1.490595072s ago: executing program 1 (id=1801): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_xfrm(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[], 0x33fe0}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) recvmmsg(r1, &(0x7f0000006600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 989.701049ms ago: executing program 0 (id=1802): r0 = openat$nci(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x14, r3, 0x1, 0x123, 0x234}, 0x14}}, 0x0) 436.364347ms ago: executing program 1 (id=1803): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.state\x00', 0x275a, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='.\x00', 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$cgroup_freezer_state(r2, &(0x7f0000000040), 0x2, 0x0) ioctl$FIGETBSZ(r3, 0x5421, &(0x7f0000000080)) 0s ago: executing program 1 (id=1804): r0 = syz_open_dev$loop(&(0x7f0000000240), 0x7, 0x180862) r1 = syz_open_dev$loop(&(0x7f0000000100), 0xd5d1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) ioctl$LOOP_CONFIGURE(r1, 0x4c0a, &(0x7f00000002c0)={r2, 0x0, {0x2a00, 0x80010000, 0x0, 0x2, 0x1, 0x0, 0x0, 0xb, 0x1c, "fee8a2ab78fc979fd1e00d96072000001ea89de2b7fb0000e60080b8785d9600010000000000000100", "2809e8dbe108598948224aee4afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "f4bd000000801900", [0x4, 0x2000000000001]}}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000cc0)='/sys/kernel/fscaps', 0x40000, 0x8) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r3) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:31082' (ED25519) to the list of known hosts. [ 217.026646][ T30] audit: type=1400 audit(216.420:46): avc: denied { name_bind } for pid=3315 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 217.651334][ T30] audit: type=1400 audit(217.040:47): avc: denied { execute } for pid=3316 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 217.664654][ T30] audit: type=1400 audit(217.050:48): avc: denied { execute_no_trans } for pid=3316 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 225.477859][ T30] audit: type=1400 audit(224.870:49): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 225.491410][ T30] audit: type=1400 audit(224.880:50): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 225.529729][ T3316] cgroup: Unknown subsys name 'net' [ 225.553504][ T30] audit: type=1400 audit(224.950:51): avc: denied { unmount } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 225.815684][ T3316] cgroup: Unknown subsys name 'cpuset' [ 225.871834][ T3316] cgroup: Unknown subsys name 'rlimit' [ 226.173439][ T30] audit: type=1400 audit(225.560:52): avc: denied { setattr } for pid=3316 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 226.177216][ T30] audit: type=1400 audit(225.570:53): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 226.184020][ T30] audit: type=1400 audit(225.580:54): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 226.879814][ T3318] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 226.888759][ T30] audit: type=1400 audit(226.280:55): avc: denied { relabelto } for pid=3318 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 226.896610][ T30] audit: type=1400 audit(226.280:56): avc: denied { write } for pid=3318 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 227.031552][ T30] audit: type=1400 audit(226.420:57): avc: denied { read } for pid=3316 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 227.037156][ T30] audit: type=1400 audit(226.430:58): avc: denied { open } for pid=3316 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 227.063790][ T3316] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 260.497348][ T30] audit: type=1400 audit(259.890:59): avc: denied { execmem } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 260.587502][ T30] audit: type=1400 audit(259.980:60): avc: denied { read } for pid=3321 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 260.602311][ T30] audit: type=1400 audit(259.980:61): avc: denied { open } for pid=3321 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 260.615787][ T30] audit: type=1400 audit(260.010:62): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 260.712509][ T30] audit: type=1400 audit(260.100:63): avc: denied { module_request } for pid=3321 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 261.017965][ T30] audit: type=1400 audit(260.410:64): avc: denied { sys_module } for pid=3321 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 269.584002][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 269.617552][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 270.306754][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 270.355887][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 273.556649][ T3321] hsr_slave_0: entered promiscuous mode [ 273.574446][ T3321] hsr_slave_1: entered promiscuous mode [ 275.196915][ T3322] hsr_slave_0: entered promiscuous mode [ 275.205726][ T3322] hsr_slave_1: entered promiscuous mode [ 275.213768][ T3322] debugfs: 'hsr0' already exists in 'hsr' [ 275.215683][ T3322] Cannot create hsr debugfs directory [ 276.708323][ T30] audit: type=1400 audit(276.100:65): avc: denied { create } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 276.715552][ T30] audit: type=1400 audit(276.110:66): avc: denied { write } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 276.722644][ T30] audit: type=1400 audit(276.110:67): avc: denied { read } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 276.775980][ T3321] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 276.886655][ T3321] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 276.959183][ T3321] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 277.026354][ T3321] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 277.752174][ T3322] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 277.799207][ T3322] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 277.862636][ T3322] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 277.926156][ T3322] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 281.135127][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 282.447188][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 297.389090][ T3321] veth0_vlan: entered promiscuous mode [ 297.529188][ T3321] veth1_vlan: entered promiscuous mode [ 298.052264][ T3321] veth0_macvtap: entered promiscuous mode [ 298.109218][ T3321] veth1_macvtap: entered promiscuous mode [ 298.427219][ T3322] veth0_vlan: entered promiscuous mode [ 298.686803][ T3322] veth1_vlan: entered promiscuous mode [ 298.837530][ T997] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 298.844938][ T997] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 298.896606][ T997] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 298.903858][ T1594] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.462809][ T30] audit: type=1400 audit(298.850:68): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 299.505707][ T30] audit: type=1400 audit(298.900:69): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzkaller.PEcenN/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 299.536445][ T30] audit: type=1400 audit(298.930:70): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 299.588793][ T30] audit: type=1400 audit(298.980:71): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzkaller.PEcenN/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 299.611756][ T30] audit: type=1400 audit(299.000:72): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzkaller.PEcenN/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3048 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 299.685844][ T30] audit: type=1400 audit(299.080:73): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 299.747308][ T3322] veth0_macvtap: entered promiscuous mode [ 299.779810][ T30] audit: type=1400 audit(299.170:74): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 299.809945][ T30] audit: type=1400 audit(299.200:75): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="gadgetfs" ino=3051 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 299.869898][ T30] audit: type=1400 audit(299.260:76): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 299.884886][ T30] audit: type=1400 audit(299.280:77): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 299.933622][ T3322] veth1_macvtap: entered promiscuous mode [ 300.319028][ T3321] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 300.668740][ T1556] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.676265][ T1556] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.677107][ T1556] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.713407][ T1556] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 305.148106][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 305.148819][ T30] audit: type=1400 audit(304.540:82): avc: denied { execute } for pid=3468 comm="syz.1.2" path="/dev/audio1" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 308.923587][ T30] audit: type=1400 audit(308.310:83): avc: denied { mount } for pid=3485 comm="syz.0.10" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 310.532732][ T30] audit: type=1400 audit(309.920:84): avc: denied { audit_write } for pid=3496 comm="syz.1.15" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 310.731507][ T30] audit: type=1400 audit(310.120:85): avc: denied { prog_load } for pid=3493 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 310.766697][ T30] audit: type=1400 audit(310.160:86): avc: denied { bpf } for pid=3493 comm="syz.0.14" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 310.777880][ T30] audit: type=1400 audit(310.170:87): avc: denied { perfmon } for pid=3493 comm="syz.0.14" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 311.331981][ T30] audit: type=1400 audit(310.710:88): avc: denied { create } for pid=3499 comm="syz.1.16" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 311.383565][ T30] audit: type=1400 audit(310.780:89): avc: denied { ioctl } for pid=3499 comm="syz.1.16" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3978 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 315.804859][ T30] audit: type=1400 audit(315.190:90): avc: denied { create } for pid=3514 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 315.818618][ T30] audit: type=1400 audit(315.210:91): avc: denied { ioctl } for pid=3514 comm="syz.1.23" path="socket:[4212]" dev="sockfs" ino=4212 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 315.819516][ T30] audit: type=1400 audit(315.210:92): avc: denied { bind } for pid=3514 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 315.834759][ T30] audit: type=1400 audit(315.230:93): avc: denied { write } for pid=3514 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 315.843855][ T30] audit: type=1400 audit(315.240:94): avc: denied { read } for pid=3514 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 318.661022][ T30] audit: type=1400 audit(318.050:95): avc: denied { create } for pid=3523 comm="syz.0.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 318.711544][ T30] audit: type=1400 audit(318.100:96): avc: denied { ioctl } for pid=3523 comm="syz.0.27" path="socket:[4016]" dev="sockfs" ino=4016 ioctlcmd=0xae49 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 320.478858][ T30] audit: type=1400 audit(319.870:97): avc: denied { create } for pid=3531 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 320.553248][ T30] audit: type=1400 audit(319.940:98): avc: denied { bind } for pid=3531 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 320.576278][ T30] audit: type=1400 audit(319.970:99): avc: denied { accept } for pid=3531 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 324.899218][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 324.905406][ T30] audit: type=1400 audit(324.290:101): avc: denied { name_bind } for pid=3554 comm="syz.0.42" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 327.671851][ T30] audit: type=1400 audit(327.030:102): avc: denied { create } for pid=3565 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 327.764630][ T30] audit: type=1400 audit(327.160:103): avc: denied { setopt } for pid=3565 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 327.852997][ T30] audit: type=1400 audit(327.230:104): avc: denied { connect } for pid=3565 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 329.244025][ T30] audit: type=1400 audit(328.640:105): avc: denied { create } for pid=3573 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 330.456452][ T30] audit: type=1400 audit(329.850:106): avc: denied { create } for pid=3580 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 330.491620][ T30] audit: type=1400 audit(329.880:107): avc: denied { create } for pid=3580 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 330.534372][ T30] audit: type=1400 audit(329.930:108): avc: denied { setopt } for pid=3580 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 330.558505][ T30] audit: type=1400 audit(329.950:109): avc: denied { ioctl } for pid=3580 comm="syz.0.55" path="socket:[5166]" dev="sockfs" ino=5166 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 330.643979][ T30] audit: type=1400 audit(330.020:110): avc: denied { ioctl } for pid=3580 comm="syz.0.55" path="socket:[4334]" dev="sockfs" ino=4334 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 330.994376][ T30] audit: type=1400 audit(330.380:111): avc: denied { setopt } for pid=3583 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 331.031551][ T30] audit: type=1400 audit(330.420:112): avc: denied { write } for pid=3583 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 332.154273][ T30] audit: type=1400 audit(331.550:113): avc: denied { read write } for pid=3591 comm="syz.1.60" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 332.164979][ T30] audit: type=1400 audit(331.560:114): avc: denied { open } for pid=3591 comm="syz.1.60" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 332.193136][ T30] audit: type=1400 audit(331.580:115): avc: denied { ioctl } for pid=3591 comm="syz.1.60" path="/dev/uinput" dev="devtmpfs" ino=707 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 332.295236][ T3592] input: syz1 as /devices/virtual/input/input1 [ 343.219580][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 343.226309][ T30] audit: type=1400 audit(342.600:119): avc: denied { read } for pid=3636 comm="syz.0.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 347.124207][ T30] audit: type=1400 audit(346.520:120): avc: denied { setopt } for pid=3632 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 347.380986][ T30] audit: type=1400 audit(346.770:121): avc: denied { read write } for pid=3647 comm="syz.0.86" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 347.384616][ T30] audit: type=1400 audit(346.770:122): avc: denied { open } for pid=3647 comm="syz.0.86" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 347.440959][ T30] audit: type=1400 audit(346.830:123): avc: denied { ioctl } for pid=3647 comm="syz.0.86" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 348.916631][ T30] audit: type=1400 audit(348.300:124): avc: denied { map_create } for pid=3651 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 348.941989][ T30] audit: type=1400 audit(348.330:125): avc: denied { map_read map_write } for pid=3651 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 351.127524][ T30] audit: type=1400 audit(350.520:126): avc: denied { bind } for pid=3665 comm="syz.1.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 351.139989][ T30] audit: type=1400 audit(350.530:127): avc: denied { write } for pid=3665 comm="syz.1.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 358.148582][ T30] audit: type=1400 audit(357.540:128): avc: denied { name_bind } for pid=3695 comm="syz.1.110" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 358.153267][ T30] audit: type=1400 audit(357.540:129): avc: denied { node_bind } for pid=3695 comm="syz.1.110" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 358.677346][ T30] audit: type=1400 audit(358.070:130): avc: denied { mounton } for pid=3697 comm="syz.1.111" path="/51/file0" dev="tmpfs" ino=285 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 358.708521][ T30] audit: type=1400 audit(358.100:131): avc: denied { mount } for pid=3697 comm="syz.1.111" name="/" dev="autofs" ino=4568 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 358.794789][ T30] audit: type=1400 audit(358.190:132): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 366.698005][ T30] audit: type=1400 audit(366.090:133): avc: denied { write } for pid=3730 comm="syz.1.127" name="iommu" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 366.709450][ T30] audit: type=1400 audit(366.100:134): avc: denied { open } for pid=3730 comm="syz.1.127" path="/dev/iommu" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 366.738636][ T30] audit: type=1400 audit(366.130:135): avc: denied { ioctl } for pid=3730 comm="syz.1.127" path="/dev/iommu" dev="devtmpfs" ino=614 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 368.024189][ T30] audit: type=1400 audit(367.410:136): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 370.154176][ T3746] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5136 sclass=netlink_audit_socket pid=3746 comm=syz.0.132 [ 370.834589][ T30] audit: type=1400 audit(370.230:137): avc: denied { prog_run } for pid=3745 comm="syz.1.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 377.924735][ T30] audit: type=1400 audit(377.320:138): avc: denied { allowed } for pid=3785 comm="syz.1.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 377.961165][ T30] audit: type=1400 audit(377.350:139): avc: denied { map } for pid=3785 comm="syz.1.150" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4744 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 377.967551][ T30] audit: type=1400 audit(377.360:140): avc: denied { read write } for pid=3785 comm="syz.1.150" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4744 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 381.844324][ T30] audit: type=1400 audit(381.240:141): avc: denied { create } for pid=3797 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 381.885785][ T30] audit: type=1400 audit(381.280:142): avc: denied { connect } for pid=3797 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 381.906441][ T30] audit: type=1400 audit(381.300:143): avc: denied { bind } for pid=3797 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 381.926011][ T30] audit: type=1400 audit(381.320:144): avc: denied { write } for pid=3797 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 381.982362][ T30] audit: type=1400 audit(381.360:145): avc: denied { getopt } for pid=3797 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 382.315762][ T30] audit: type=1400 audit(381.710:146): avc: denied { read } for pid=3799 comm="syz.1.157" name="virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 384.669006][ T3813] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1537 sclass=netlink_audit_socket pid=3813 comm=syz.0.162 [ 385.162279][ T30] audit: type=1400 audit(384.540:147): avc: denied { read write } for pid=3814 comm="syz.0.163" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 385.163149][ T30] audit: type=1400 audit(384.550:148): avc: denied { open } for pid=3814 comm="syz.0.163" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 385.367902][ T30] audit: type=1400 audit(384.760:149): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 390.862860][ T30] audit: type=1400 audit(390.230:150): avc: denied { read } for pid=3829 comm="syz.1.170" name="card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 390.878445][ T30] audit: type=1400 audit(390.250:151): avc: denied { open } for pid=3829 comm="syz.1.170" path="/dev/dri/card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 395.391565][ T30] audit: type=1400 audit(394.780:152): avc: denied { mounton } for pid=3847 comm="syz.1.179" path="/86/file0" dev="tmpfs" ino=476 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 395.582585][ T30] audit: type=1400 audit(394.960:153): avc: denied { remount } for pid=3847 comm="syz.1.179" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 399.271631][ T3871] Zero length message leads to an empty skb [ 407.556661][ T30] audit: type=1400 audit(406.930:154): avc: denied { create } for pid=3909 comm="syz.0.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 409.947831][ T3923] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=3923 comm=syz.0.214 [ 423.343267][ T30] audit: type=1400 audit(422.730:155): avc: denied { mount } for pid=3978 comm="syz.1.241" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 428.306328][ T3996] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3996 comm=syz.1.249 [ 434.553033][ T30] audit: type=1400 audit(433.950:156): avc: denied { write } for pid=4014 comm="syz.0.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 434.939766][ T30] audit: type=1400 audit(434.330:157): avc: denied { ioctl } for pid=4014 comm="syz.0.258" path="socket:[5972]" dev="sockfs" ino=5972 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 469.904310][ T30] audit: type=1400 audit(469.290:158): avc: denied { read write } for pid=4172 comm="syz.1.331" name="vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 469.944173][ T30] audit: type=1400 audit(469.320:159): avc: denied { open } for pid=4172 comm="syz.1.331" path="/dev/vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 469.953975][ T30] audit: type=1400 audit(469.340:160): avc: denied { ioctl } for pid=4172 comm="syz.1.331" path="/dev/vhost-net" dev="devtmpfs" ino=714 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 482.132105][ T30] audit: type=1400 audit(481.520:161): avc: denied { compute_member } for pid=4234 comm="syz.0.360" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 487.788511][ T30] audit: type=1400 audit(487.180:162): avc: denied { create } for pid=4250 comm="syz.0.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 487.833075][ T30] audit: type=1400 audit(487.210:163): avc: denied { ioctl } for pid=4250 comm="syz.0.368" path="socket:[6592]" dev="sockfs" ino=6592 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 492.919442][ T30] audit: type=1400 audit(492.310:164): avc: denied { write } for pid=4277 comm="syz.1.381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 498.759162][ T30] audit: type=1400 audit(498.150:165): avc: denied { execute } for pid=4292 comm="syz.0.388" name="file0" dev="tmpfs" ino=1047 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 503.989975][ T30] audit: type=1400 audit(503.360:166): avc: denied { write } for pid=4329 comm="syz.1.406" path="socket:[6700]" dev="sockfs" ino=6700 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 514.326034][ T30] audit: type=1400 audit(513.700:167): avc: denied { open } for pid=4380 comm="syz.1.431" path="/dev/ttyq7" dev="devtmpfs" ino=374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 519.496382][ T30] audit: type=1400 audit(518.890:168): avc: denied { create } for pid=4417 comm="syz.0.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 519.533885][ T30] audit: type=1400 audit(518.920:169): avc: denied { connect } for pid=4417 comm="syz.0.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 522.024032][ T4431] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4431 comm=syz.0.455 [ 524.940534][ C0] hrtimer: interrupt took 951264 ns [ 529.737768][ T30] audit: type=1400 audit(529.130:170): avc: denied { ioctl } for pid=4449 comm="syz.0.464" path="socket:[7825]" dev="sockfs" ino=7825 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 560.658942][ T30] audit: type=1400 audit(560.050:171): avc: denied { ioctl } for pid=4555 comm="syz.1.516" path="/dev/ttyq7" dev="devtmpfs" ino=374 ioctlcmd=0x540c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 561.663403][ T30] audit: type=1400 audit(561.060:172): avc: denied { read } for pid=4559 comm="syz.1.518" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 561.674875][ T30] audit: type=1400 audit(561.070:173): avc: denied { open } for pid=4559 comm="syz.1.518" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 561.684619][ T30] audit: type=1400 audit(561.080:174): avc: denied { ioctl } for pid=4559 comm="syz.1.518" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 567.794729][ T30] audit: type=1400 audit(567.190:175): avc: denied { lock } for pid=4576 comm="syz.1.526" path="socket:[8252]" dev="sockfs" ino=8252 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 576.653901][ T4612] netlink: 16 bytes leftover after parsing attributes in process `syz.1.543'. [ 576.657010][ T4612] tc_dump_action: action bad kind [ 582.437878][ T30] audit: type=1400 audit(581.830:176): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 592.406430][ T4686] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4686 comm=syz.1.577 [ 592.818738][ T30] audit: type=1400 audit(592.210:177): avc: denied { watch } for pid=4687 comm="syz.1.578" path="/295" dev="tmpfs" ino=1588 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 594.608332][ T4699] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 594.635040][ T30] audit: type=1400 audit(594.030:178): avc: denied { getopt } for pid=4698 comm="syz.0.583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 605.937195][ T30] audit: type=1400 audit(605.330:179): avc: denied { ioctl } for pid=4754 comm="syz.1.609" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 615.896102][ T4796] netlink: 12 bytes leftover after parsing attributes in process `syz.0.627'. [ 615.928823][ T4796] netlink: 12 bytes leftover after parsing attributes in process `syz.0.627'. [ 618.091299][ T30] audit: type=1400 audit(617.480:180): avc: denied { sqpoll } for pid=4809 comm="syz.1.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 618.724179][ T30] audit: type=1400 audit(618.120:181): avc: denied { watch_reads } for pid=4812 comm="syz.1.635" path="/319" dev="tmpfs" ino=1715 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 621.032991][ T1098] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 621.329603][ T1098] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 621.556052][ T1098] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 621.949884][ T1098] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 623.612639][ T30] audit: type=1400 audit(622.960:182): avc: denied { read } for pid=3166 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 625.794448][ T1098] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 625.934126][ T1098] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 625.992610][ T1098] bond0 (unregistering): Released all slaves [ 626.637740][ T1098] hsr_slave_0: left promiscuous mode [ 626.677099][ T1098] hsr_slave_1: left promiscuous mode [ 626.875734][ T1098] veth1_macvtap: left promiscuous mode [ 626.886333][ T1098] veth0_macvtap: left promiscuous mode [ 626.902886][ T1098] veth1_vlan: left promiscuous mode [ 626.905464][ T1098] veth0_vlan: left promiscuous mode [ 641.416613][ T4824] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 641.486324][ T4824] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 646.852518][ T4824] hsr_slave_0: entered promiscuous mode [ 646.857070][ T4824] hsr_slave_1: entered promiscuous mode [ 651.952836][ T30] audit: type=1400 audit(651.350:183): avc: denied { read } for pid=4824 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 651.984500][ T4824] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 652.083089][ T4824] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 652.143751][ T4824] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 652.187846][ T4824] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 656.876892][ T4824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 672.107417][ T30] audit: type=1400 audit(671.500:184): avc: denied { read write } for pid=5023 comm="syz.1.682" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 672.115810][ T30] audit: type=1400 audit(671.510:185): avc: denied { open } for pid=5023 comm="syz.1.682" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 679.469295][ T4824] veth0_vlan: entered promiscuous mode [ 679.639587][ T4824] veth1_vlan: entered promiscuous mode [ 680.222807][ T4824] veth0_macvtap: entered promiscuous mode [ 680.288878][ T4824] veth1_macvtap: entered promiscuous mode [ 681.447195][ T1602] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 681.466315][ T4839] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 681.478677][ T4839] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 681.499880][ T4839] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 681.909267][ T30] audit: type=1400 audit(681.290:186): avc: denied { mounton } for pid=4824 comm="syz-executor" path="/syzkaller.IhhBd8/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 682.126233][ T30] audit: type=1400 audit(681.520:187): avc: denied { mounton } for pid=4824 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 688.861988][ T5093] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 688.897963][ T30] audit: type=1400 audit(688.280:188): avc: denied { bind } for pid=5091 comm="syz.0.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 688.899002][ T30] audit: type=1400 audit(688.290:189): avc: denied { connect } for pid=5091 comm="syz.0.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 688.936563][ T30] audit: type=1400 audit(688.290:190): avc: denied { write } for pid=5091 comm="syz.0.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 714.079429][ T5197] syz.1.755 uses obsolete (PF_INET,SOCK_PACKET) [ 722.064036][ T5216] Injecting memory failure for pfn 0x591b7 at process virtual address 0x207b7000 [ 722.068307][ T5216] Memory failure: 0x591b7: recovery action for unsplit thp: Failed [ 729.858727][ C0] vkms_vblank_simulate: vblank timer overrun [ 769.291191][ T30] audit: type=1400 audit(768.680:191): avc: denied { write } for pid=5465 comm="syz.1.882" name="arp" dev="proc" ino=4026532638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 769.921511][ T30] audit: type=1400 audit(769.310:192): avc: denied { watch watch_reads } for pid=5465 comm="syz.1.882" path="/proc/946/net/arp" dev="proc" ino=4026532638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 775.379606][ T5501] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 775.397488][ T5501] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 784.631661][ T30] audit: type=1400 audit(784.020:193): avc: denied { create } for pid=5548 comm="syz.0.921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 784.659801][ T30] audit: type=1400 audit(784.050:194): avc: denied { ioctl } for pid=5548 comm="syz.0.921" path="socket:[12012]" dev="sockfs" ino=12012 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 784.678785][ T30] audit: type=1400 audit(784.070:195): avc: denied { write } for pid=5548 comm="syz.0.921" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 785.155788][ T30] audit: type=1400 audit(784.550:196): avc: denied { append } for pid=5551 comm="syz.0.922" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 785.556253][ T5556] process 'syz.0.924' launched './file0' with NULL argv: empty string added [ 785.563838][ T30] audit: type=1400 audit(784.950:197): avc: denied { execute_no_trans } for pid=5555 comm="syz.0.924" path="/129/file0" dev="tmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 804.982860][ T30] audit: type=1400 audit(804.380:198): avc: denied { map } for pid=5670 comm="syz.0.980" path="socket:[12299]" dev="sockfs" ino=12299 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 805.123587][ T30] audit: type=1400 audit(804.510:199): avc: denied { read } for pid=5672 comm="syz.1.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 805.124084][ T30] audit: type=1400 audit(804.520:200): avc: denied { ioctl } for pid=5672 comm="syz.1.979" path="socket:[12251]" dev="sockfs" ino=12251 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 821.787334][ T5757] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5757 comm=syz.0.1020 [ 844.631619][ T30] audit: type=1400 audit(844.020:201): avc: denied { write } for pid=5850 comm="syz.1.1063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 853.908685][ T30] audit: type=1400 audit(853.300:202): avc: denied { read } for pid=5891 comm="syz.0.1081" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 853.917581][ T30] audit: type=1400 audit(853.310:203): avc: denied { open } for pid=5891 comm="syz.0.1081" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 853.942185][ T30] audit: type=1400 audit(853.330:204): avc: denied { ioctl } for pid=5891 comm="syz.0.1081" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 868.653271][ T30] audit: type=1400 audit(868.040:205): avc: denied { mount } for pid=5968 comm="syz.0.1119" name="/" dev="ramfs" ino=12964 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 878.148712][ T6028] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6028 comm=syz.1.1147 [ 881.947071][ T6050] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 881.955038][ T6050] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 883.702696][ T30] audit: type=1400 audit(883.090:206): avc: denied { append } for pid=6057 comm="syz.1.1162" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 902.199441][ T30] audit: type=1400 audit(901.560:207): avc: denied { mount } for pid=6121 comm="syz.0.1193" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 902.541224][ T30] audit: type=1400 audit(901.930:208): avc: denied { unmount } for pid=4824 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 907.917634][ T6164] capability: warning: `syz.1.1214' uses deprecated v2 capabilities in a way that may be insecure [ 911.175232][ T30] audit: type=1400 audit(910.570:209): avc: denied { append } for pid=6179 comm="syz.0.1222" name="pfkey" dev="proc" ino=4026532715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 911.239221][ T30] audit: type=1400 audit(910.630:210): avc: denied { read } for pid=6179 comm="syz.0.1222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 925.131142][ T30] audit: type=1400 audit(924.520:211): avc: denied { read write } for pid=6242 comm="syz.1.1252" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 925.138333][ T30] audit: type=1400 audit(924.530:212): avc: denied { open } for pid=6242 comm="syz.1.1252" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 925.225540][ T30] audit: type=1400 audit(924.620:213): avc: denied { ioctl } for pid=6242 comm="syz.1.1252" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x127f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 938.626288][ T6309] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 940.576529][ T6322] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 950.693780][ T6381] tun0: tun_chr_ioctl cmd 1074025692 [ 963.412889][ T30] audit: type=1400 audit(962.800:214): avc: denied { setopt } for pid=6435 comm="syz.1.1344" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 963.436856][ T30] audit: type=1400 audit(962.830:215): avc: denied { read } for pid=6435 comm="syz.1.1344" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 965.660771][ T30] audit: type=1400 audit(965.050:216): avc: denied { bind } for pid=6446 comm="syz.0.1350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 965.662715][ T30] audit: type=1400 audit(965.050:217): avc: denied { listen } for pid=6446 comm="syz.0.1350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 965.664743][ T30] audit: type=1400 audit(965.050:218): avc: denied { accept } for pid=6446 comm="syz.0.1350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 977.806609][ T6518] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6518 comm=syz.0.1383 [ 990.927701][ T6571] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6571 comm=syz.1.1408 [ 1025.727830][ T6715] block nbd0: shutting down sockets [ 1029.745389][ T30] audit: type=1400 audit(1029.140:219): avc: denied { write } for pid=6728 comm="syz.0.1482" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1037.474448][ T6596] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 1037.718911][ T6596] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1037.902791][ T6596] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1037.903420][ T6596] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1037.906167][ T6596] usb 1-1: SerialNumber: syz [ 1038.949445][ T6596] cdc_ether 1-1:1.0 usb0: register 'cdc_ether' at usb-dummy_hcd.0-1, CDC Ethernet Device, 42:42:42:42:42:42 [ 1039.171140][ T30] audit: type=1400 audit(1038.550:220): avc: denied { connect } for pid=6775 comm="syz.1.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1039.263384][ T4573] usb 1-1: USB disconnect, device number 2 [ 1039.335317][ T4573] cdc_ether 1-1:1.0 usb0: unregister 'cdc_ether' usb-dummy_hcd.0-1, CDC Ethernet Device [ 1041.944996][ T30] audit: type=1400 audit(1041.330:221): avc: denied { mounton } for pid=6794 comm="syz.1.1511" path="/proc/1624/task" dev="proc" ino=17507 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1042.808701][ T30] audit: type=1400 audit(1042.190:222): avc: denied { read } for pid=6798 comm="syz.1.1513" dev="nsfs" ino=4026532616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1042.824647][ T30] audit: type=1400 audit(1042.190:223): avc: denied { open } for pid=6798 comm="syz.1.1513" path="net:[4026532616]" dev="nsfs" ino=4026532616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1077.127132][ T30] audit: type=1400 audit(1076.520:224): avc: denied { setopt } for pid=6941 comm="syz.1.1567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1093.857713][ T30] audit: type=1400 audit(1093.250:225): avc: denied { write } for pid=7018 comm="syz.1.1598" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1118.943090][ T30] audit: type=1400 audit(1118.330:226): avc: denied { write } for pid=7146 comm="syz.0.1650" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1145.947044][ T7271] block nbd0: shutting down sockets [ 1152.746598][ T30] audit: type=1400 audit(1152.140:227): avc: denied { create } for pid=7310 comm="syz.0.1715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1185.158416][ T30] audit: type=1400 audit(1184.550:228): avc: denied { write } for pid=7484 comm="syz.0.1784" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1196.219521][ T7534] [ 1196.221121][ T7534] ====================================================== [ 1196.221398][ T7534] WARNING: possible circular locking dependency detected [ 1196.221968][ T7534] syzkaller #0 Not tainted [ 1196.222333][ T7534] ------------------------------------------------------ [ 1196.222605][ T7534] syz.1.1804/7534 is trying to acquire lock: [ 1196.222932][ T7534] ffff00000e164220 (&root->kernfs_iattr_rwsem){++++}-{4:4}, at: kernfs_iop_getattr+0x88/0xf0 [ 1196.226454][ T7534] [ 1196.226454][ T7534] but task is already holding lock: [ 1196.227013][ T7534] ffff000014794ee8 (&q->q_usage_counter(io)#24){++++}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 [ 1196.228111][ T7534] [ 1196.228111][ T7534] which lock already depends on the new lock. [ 1196.228111][ T7534] [ 1196.228662][ T7534] [ 1196.228662][ T7534] the existing dependency chain (in reverse order) is: [ 1196.229397][ T7534] [ 1196.229397][ T7534] -> #2 (&q->q_usage_counter(io)#24){++++}-{0:0}: [ 1196.230711][ T7534] blk_alloc_queue+0x538/0x644 [ 1196.231185][ T7534] blk_mq_alloc_queue+0x144/0x220 [ 1196.231544][ T7534] __blk_mq_alloc_disk+0x20/0x1a4 [ 1196.231920][ T7534] loop_add+0x3b0/0x938 [ 1196.232347][ T7534] loop_init+0xd0/0x138 [ 1196.232661][ T7534] do_one_initcall+0x130/0x7f0 [ 1196.233019][ T7534] kernel_init_freeable+0x48c/0x70c [ 1196.233415][ T7534] kernel_init+0x24/0x1dc [ 1196.233738][ T7534] ret_from_fork+0x10/0x20 [ 1196.234135][ T7534] [ 1196.234135][ T7534] -> #1 (fs_reclaim){+.+.}-{0:0}: [ 1196.234817][ T7534] fs_reclaim_acquire+0x138/0x160 [ 1196.235160][ T7534] kmem_cache_alloc_noprof+0x5c/0x3b8 [ 1196.235488][ T7534] __kernfs_iattrs+0x10c/0x330 [ 1196.235818][ T7534] __kernfs_setattr+0x4c/0x2a0 [ 1196.236133][ T7534] kernfs_iop_setattr+0xc0/0xf4 [ 1196.236443][ T7534] notify_change+0x3cc/0xba8 [ 1196.236767][ T7534] do_truncate+0x174/0x1bc [ 1196.237064][ T7534] path_openat+0x17c8/0x24b4 [ 1196.237379][ T7534] do_filp_open+0x184/0x360 [ 1196.237712][ T7534] do_sys_openat2+0xe0/0x160 [ 1196.238014][ T7534] __arm64_sys_openat+0x12c/0x1bc [ 1196.238376][ T7534] invoke_syscall+0x6c/0x258 [ 1196.238716][ T7534] el0_svc_common.constprop.0+0xac/0x230 [ 1196.239069][ T7534] do_el0_svc+0x40/0x58 [ 1196.239368][ T7534] el0_svc+0x50/0x1a0 [ 1196.239665][ T7534] el0t_64_sync_handler+0xa0/0xe4 [ 1196.239988][ T7534] el0t_64_sync+0x198/0x19c [ 1196.240430][ T7534] [ 1196.240430][ T7534] -> #0 (&root->kernfs_iattr_rwsem){++++}-{4:4}: [ 1196.241054][ T7534] __lock_acquire+0x1638/0x2380 [ 1196.241369][ T7534] lock_acquire+0x310/0x38c [ 1196.241682][ T7534] down_read+0xb4/0x314 [ 1196.241969][ T7534] kernfs_iop_getattr+0x88/0xf0 [ 1196.242297][ T7534] vfs_getattr_nosec+0x1fc/0x374 [ 1196.242610][ T7534] vfs_getattr+0x40/0x54 [ 1196.242916][ T7534] loop_query_min_dio_size.isra.0+0xf8/0x1d0 [ 1196.243260][ T7534] lo_ioctl+0xde4/0x161c [ 1196.243564][ T7534] blkdev_ioctl+0x22c/0x7f4 [ 1196.243922][ T7534] __arm64_sys_ioctl+0x124/0x1a4 [ 1196.244247][ T7534] invoke_syscall+0x6c/0x258 [ 1196.244554][ T7534] el0_svc_common.constprop.0+0xac/0x230 [ 1196.244906][ T7534] do_el0_svc+0x40/0x58 [ 1196.245227][ T7534] el0_svc+0x50/0x1a0 [ 1196.245626][ T7534] el0t_64_sync_handler+0xa0/0xe4 [ 1196.246012][ T7534] el0t_64_sync+0x198/0x19c [ 1196.246365][ T7534] [ 1196.246365][ T7534] other info that might help us debug this: [ 1196.246365][ T7534] [ 1196.247018][ T7534] Chain exists of: [ 1196.247018][ T7534] &root->kernfs_iattr_rwsem --> fs_reclaim --> &q->q_usage_counter(io)#24 [ 1196.247018][ T7534] [ 1196.248251][ T7534] Possible unsafe locking scenario: [ 1196.248251][ T7534] [ 1196.248686][ T7534] CPU0 CPU1 [ 1196.249027][ T7534] ---- ---- [ 1196.249525][ T7534] lock(&q->q_usage_counter(io)#24); [ 1196.250128][ T7534] lock(fs_reclaim); [ 1196.250998][ T7534] lock(&q->q_usage_counter(io)#24); [ 1196.251591][ T7534] rlock(&root->kernfs_iattr_rwsem); [ 1196.252065][ T7534] [ 1196.252065][ T7534] *** DEADLOCK *** [ 1196.252065][ T7534] [ 1196.252646][ T7534] 3 locks held by syz.1.1804/7534: [ 1196.253051][ T7534] #0: ffff000014a49400 (&lo->lo_mutex){+.+.}-{4:4}, at: loop_global_lock_killable+0x2c/0xbc [ 1196.254007][ T7534] #1: ffff000014794ee8 (&q->q_usage_counter(io)#24){++++}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1196.254864][ T7534] #2: ffff000014794f20 (&q->q_usage_counter(queue)#8){+.+.}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 [ 1196.256137][ T7534] [ 1196.256137][ T7534] stack backtrace: [ 1196.257099][ T7534] CPU: 1 UID: 0 PID: 7534 Comm: syz.1.1804 Not tainted syzkaller #0 PREEMPT [ 1196.257667][ T7534] Hardware name: linux,dummy-virt (DT) [ 1196.258487][ T7534] Call trace: [ 1196.259050][ T7534] show_stack+0x18/0x24 (C) [ 1196.259544][ T7534] dump_stack_lvl+0xa4/0xf4 [ 1196.259900][ T7534] dump_stack+0x1c/0x28 [ 1196.260297][ T7534] print_circular_bug+0x28c/0x370 [ 1196.260816][ T7534] check_noncircular+0x168/0x17c [ 1196.261130][ T7534] __lock_acquire+0x1638/0x2380 [ 1196.261451][ T7534] lock_acquire+0x310/0x38c [ 1196.261858][ T7534] down_read+0xb4/0x314 [ 1196.262214][ T7534] kernfs_iop_getattr+0x88/0xf0 [ 1196.262571][ T7534] vfs_getattr_nosec+0x1fc/0x374 [ 1196.262897][ T7534] vfs_getattr+0x40/0x54 [ 1196.263208][ T7534] loop_query_min_dio_size.isra.0+0xf8/0x1d0 [ 1196.263564][ T7534] lo_ioctl+0xde4/0x161c [ 1196.263885][ T7534] blkdev_ioctl+0x22c/0x7f4 [ 1196.264230][ T7534] __arm64_sys_ioctl+0x124/0x1a4 [ 1196.264585][ T7534] invoke_syscall+0x6c/0x258 [ 1196.264976][ T7534] el0_svc_common.constprop.0+0xac/0x230 [ 1196.265314][ T7534] do_el0_svc+0x40/0x58 [ 1196.265638][ T7534] el0_svc+0x50/0x1a0 [ 1196.265945][ T7534] el0t_64_sync_handler+0xa0/0xe4 [ 1196.266336][ T7534] el0t_64_sync+0x198/0x19c [ 1196.551393][ T7525] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 1197.319377][ T1556] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1197.489369][ T1556] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1197.654546][ T1556] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1197.779451][ T1556] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1198.705318][ T1556] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1198.778935][ T1556] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1198.809006][ T1556] bond0 (unregistering): Released all slaves [ 1199.044387][ T1556] hsr_slave_0: left promiscuous mode [ 1199.048769][ T1556] hsr_slave_1: left promiscuous mode [ 1199.092940][ T1556] veth1_macvtap: left promiscuous mode [ 1199.093800][ T1556] veth0_macvtap: left promiscuous mode [ 1199.097429][ T1556] veth1_vlan: left promiscuous mode [ 1199.098480][ T1556] veth0_vlan: left promiscuous mode [ 1202.024168][ T1556] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1202.274712][ T1556] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1202.435978][ T1556] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1202.631683][ T1556] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1204.168049][ T1556] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1204.220978][ T1556] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1204.249426][ T1556] bond0 (unregistering): Released all slaves [ 1204.485598][ T1556] hsr_slave_0: left promiscuous mode [ 1204.497811][ T1556] hsr_slave_1: left promiscuous mode [ 1204.542699][ T1556] veth1_macvtap: left promiscuous mode [ 1204.544537][ T1556] veth0_macvtap: left promiscuous mode [ 1204.546589][ T1556] veth1_vlan: left promiscuous mode [ 1204.548344][ T1556] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 02:51:49 Registers: info registers vcpu 0 CPU#0 PC=ffff80008544240c X00=ffff800085442408 X01=0000000000000000 X02=0000000000000000 X03=1fffe0000283a3c9 X04=1ffff00010000fbe X05=ffff800080007da8 X06=ffff800080007dc0 X07=ffff800080007ea0 X08=ffff800080007d48 X09=dfff800000000000 X10=ffff700010000fa8 X11=1ffff00010000fa8 X12=ffff700010000fa9 X13=0000000000000000 X14=1fffe000025e6c65 X15=ffff0000202213c0 X16=0000000000000000 X17=1fffe000025e6b78 X18=ffff0000202213d0 X19=ffff8000873534f0 X20=ffff0000141d1e40 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff8000873534c0 X25=0000000000000000 X26=0000000000000004 X27=ffff8000873534f0 X28=ffff8000854e0880 X29=ffff800080007de0 X30=ffff800080439f44 SP=ffff800080007de0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=00000075253a7525:2f73252f7665642f Q02=0000000000000000:fffff000fff00000 Q03=ffffff00ff0000ff:0000ff0000000000 Q04=0000000000000000:fff0f00f00f00000 Q05=0000aaab0e3c1930:0000aaab0e3c3790 Q06=63627c2a6476787c:2a64767c2a72737c Q07=7361647c2a737369:63637c2a65686361 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd81d8570:0000ffffd81d8570 Q17=ffffff80ffffffd8:0000ffffd81d8540 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800081be703c X00=0000000000000002 X01=0000000000000007 X02=0000000000000000 X03=1fffe00001ddf62f X04=0000000000000018 X05=ffff800087ac2660 X06=ffff700010f584cc X07=0000000000000001 X08=ffff800087ac2660 X09=dfff800000000000 X10=ffff700010f584cc X11=1ffff00010f584cc X12=ffff700010f584cd X13=205d343335375420 X14=77725f7274746169 X15=2b2b2b7b296d6573 X16=7d343a347b2d7d2b X17=656b203a7461202c X18=0000000000000000 X19=ffff00000eefb080 X20=ffff80008d4db018 X21=ffff800087b3e3e0 X22=0000000000000074 X23=dfff800000000000 X24=ffff00000ed0c072 X25=0000000000000005 X26=ffff00000eefb2d8 X27=ffff00000eefb080 X28=dfff800000000000 X29=ffff8000a2fc6c80 X30=ffff800081be72c8 SP=ffff8000a2fc6c80 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=00000075253a7525:2f73252f7665642f Q02=0000000000000000:fffff000fff00000 Q03=ffffff00ff0000ff:0000ff0000000000 Q04=0000000000000000:fff0f00f00f00000 Q05=0000aaab0e3c1930:0000aaab0e3c3790 Q06=63627c2a6476787c:2a64767c2a72737c Q07=7361647c2a737369:63637c2a65686361 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd81d8570:0000ffffd81d8570 Q17=ffffff80ffffffd8:0000ffffd81d8540 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000