last executing test programs: 1m11.858700128s ago: executing program 0 (id=551): r0 = gettid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2006) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) r3 = dup(r2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, 0x0) tkill(r0, 0x7) 1m9.858038453s ago: executing program 0 (id=553): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r1, &(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000040)=0x80) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = accept4$inet(r2, 0x0, 0x0, 0x0) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000200)) 1m9.607185017s ago: executing program 0 (id=554): r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) close_range(r0, r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r2, r1, 0x0) r3 = accept$inet6(r0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8904, &(0x7f0000000040)={'batadv_slave_1\x00'}) 1m9.37084946s ago: executing program 0 (id=555): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x18) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f00000003c0)=0x6, 0xdc) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=@newlink={0x34, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x0, 0x8040}, 0x0) 1m8.850796781s ago: executing program 0 (id=557): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r1}, 0x18) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3}, 0x18) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, r3}, 0x18) sendmsg$can_j1939(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) recvmsg$can_j1939(r0, 0x0, 0x0) 1m8.362353078s ago: executing program 0 (id=560): r0 = syz_open_dev$audion(&(0x7f00000002c0), 0x6a, 0x8042) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x9, 0x10}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000380)={r1, 0x800, 0x3}, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e21, 0xff, @empty, 0x5}}, 0x8, 0x3, 0x2a, 0x9, 0x6020d53ccc8408cc, 0x9, 0x7}, 0x9c) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x40040) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000980)={0xffffff00, 0x1018, 0x395, 0x2, 0xb, "f174cdc37ca1b8252946cc45c51f162739be79"}) r2 = syz_open_dev$evdev(&(0x7f00000009c0), 0x8001, 0x1594c1) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000a00)=""/224) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000001ec0)={0x2, 0x7fffffff, {}, {0xffffffffffffffff}, 0x9}) fchown(r2, r3, 0x0) 55.761150144s ago: executing program 1 (id=570): socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) request_key(0xfffffffffffffffe, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000d80), 0x208e24b) fremovexattr(r2, &(0x7f00000001c0)=@known='system.posix_acl_default\x00') 53.03394686s ago: executing program 1 (id=571): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r1, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000008540)=0x80) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x0) r4 = accept4$packet(r2, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) getsockname$unix(r4, 0x0, &(0x7f0000000300)) 51.990388831s ago: executing program 1 (id=572): mbind(&(0x7f00005aa000/0x3000)=nil, 0x3000, 0x4000, &(0x7f0000000000), 0x4, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) mlockall(0x1) syz_clone3(&(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) ioctl$EXT4_IOC_CLEAR_ES_CACHE(0xffffffffffffffff, 0x5450) 46.139008251s ago: executing program 1 (id=573): timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) r2 = dup3(r1, r0, 0x0) accept$unix(r2, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) accept$inet(r3, 0x0, 0x0) 45.655376238s ago: executing program 1 (id=574): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r1, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000008540)=0x80) close(r2) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = accept$packet(r2, 0x0, 0x0) write$tun(r4, 0x0, 0x0) 45.465708416s ago: executing program 1 (id=575): r0 = syz_open_dev$hidraw(&(0x7f00000000c0), 0x3, 0x10841) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000100), &(0x7f0000000140), 0x2, 0x1) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000001c0)={0x8}) fsetxattr$trusted_overlay_origin(r0, 0x0, 0x0, 0x0, 0x3) fremovexattr(r0, 0x0) mmap$usbfs(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x30, 0xffffffffffffffff, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_CHANNEL(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x48, r2, 0x800, 0x70bd25, 0x25dfdbff, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x0, 0xb}}}}, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x9}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x388}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000800}, 0x40001) 23.290295744s ago: executing program 32 (id=560): r0 = syz_open_dev$audion(&(0x7f00000002c0), 0x6a, 0x8042) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x9, 0x10}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000380)={r1, 0x800, 0x3}, 0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000003c0)={r1, @in6={{0xa, 0x4e21, 0xff, @empty, 0x5}}, 0x8, 0x3, 0x2a, 0x9, 0x6020d53ccc8408cc, 0x9, 0x7}, 0x9c) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x40040) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000980)={0xffffff00, 0x1018, 0x395, 0x2, 0xb, "f174cdc37ca1b8252946cc45c51f162739be79"}) r2 = syz_open_dev$evdev(&(0x7f00000009c0), 0x8001, 0x1594c1) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000a00)=""/224) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000001ec0)={0x2, 0x7fffffff, {}, {0xffffffffffffffff}, 0x9}) fchown(r2, r3, 0x0) 0s ago: executing program 33 (id=575): r0 = syz_open_dev$hidraw(&(0x7f00000000c0), 0x3, 0x10841) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000100), &(0x7f0000000140), 0x2, 0x1) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000001c0)={0x8}) fsetxattr$trusted_overlay_origin(r0, 0x0, 0x0, 0x0, 0x3) fremovexattr(r0, 0x0) mmap$usbfs(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x30, 0xffffffffffffffff, 0x2) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000300)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000003c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_CHANNEL(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x48, r2, 0x800, 0x70bd25, 0x25dfdbff, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x0, 0xb}}}}, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x5}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x9}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x388}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000800}, 0x40001) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:5466' (ED25519) to the list of known hosts. [ 132.569107][ T30] audit: type=1400 audit(132.290:58): avc: denied { name_bind } for pid=3293 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 132.894234][ T30] audit: type=1400 audit(132.610:59): avc: denied { execute } for pid=3295 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 132.900967][ T30] audit: type=1400 audit(132.620:60): avc: denied { execute_no_trans } for pid=3295 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 136.689919][ T30] audit: type=1400 audit(136.400:61): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 136.695242][ T30] audit: type=1400 audit(136.410:62): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 136.725623][ T3295] cgroup: Unknown subsys name 'net' [ 136.742835][ T30] audit: type=1400 audit(136.460:63): avc: denied { unmount } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 137.109485][ T3295] cgroup: Unknown subsys name 'cpuset' [ 137.157115][ T3295] cgroup: Unknown subsys name 'rlimit' [ 137.658793][ T30] audit: type=1400 audit(137.370:64): avc: denied { setattr } for pid=3295 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 137.662964][ T30] audit: type=1400 audit(137.380:65): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 137.671983][ T30] audit: type=1400 audit(137.380:66): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 137.972468][ T3297] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 137.978362][ T30] audit: type=1400 audit(137.690:67): avc: denied { relabelto } for pid=3297 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 137.990227][ T30] audit: type=1400 audit(137.710:68): avc: denied { write } for pid=3297 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 138.057772][ T30] audit: type=1400 audit(137.780:69): avc: denied { read } for pid=3295 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 138.061125][ T30] audit: type=1400 audit(137.780:70): avc: denied { open } for pid=3295 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 138.072734][ T3295] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 151.636775][ T30] audit: type=1400 audit(151.350:71): avc: denied { execmem } for pid=3298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 151.691415][ T30] audit: type=1400 audit(151.410:72): avc: denied { read } for pid=3300 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 151.693136][ T30] audit: type=1400 audit(151.410:73): avc: denied { open } for pid=3301 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 151.700573][ T30] audit: type=1400 audit(151.420:74): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 151.739076][ T30] audit: type=1400 audit(151.460:75): avc: denied { module_request } for pid=3300 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 151.743058][ T30] audit: type=1400 audit(151.460:76): avc: denied { module_request } for pid=3301 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 151.880554][ T30] audit: type=1400 audit(151.600:77): avc: denied { sys_module } for pid=3301 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 156.085414][ T3301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.105729][ T3300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 156.140322][ T3301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 156.154965][ T3300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 157.964184][ T3301] hsr_slave_0: entered promiscuous mode [ 157.971460][ T3301] hsr_slave_1: entered promiscuous mode [ 158.338656][ T3300] hsr_slave_0: entered promiscuous mode [ 158.341990][ T3300] hsr_slave_1: entered promiscuous mode [ 158.348923][ T3300] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 158.351178][ T3300] Cannot create hsr debugfs directory [ 159.536813][ T30] audit: type=1400 audit(159.250:78): avc: denied { create } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 159.540097][ T30] audit: type=1400 audit(159.260:79): avc: denied { write } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 159.566831][ T30] audit: type=1400 audit(159.280:80): avc: denied { read } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 159.598212][ T3301] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 159.637552][ T3301] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 159.671400][ T3301] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 159.732713][ T3301] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 159.922676][ T3300] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 159.943355][ T3300] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 159.963404][ T3300] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 159.990650][ T3300] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 161.324021][ T3301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.638835][ T3300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.846395][ T3301] veth0_vlan: entered promiscuous mode [ 166.908891][ T3301] veth1_vlan: entered promiscuous mode [ 167.104104][ T3300] veth0_vlan: entered promiscuous mode [ 167.171017][ T3301] veth0_macvtap: entered promiscuous mode [ 167.219812][ T3301] veth1_macvtap: entered promiscuous mode [ 167.239321][ T3300] veth1_vlan: entered promiscuous mode [ 167.557348][ T3301] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.558222][ T3301] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.558656][ T3301] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.558880][ T3301] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.620782][ T3300] veth0_macvtap: entered promiscuous mode [ 167.713821][ T3300] veth1_macvtap: entered promiscuous mode [ 167.879299][ T30] audit: type=1400 audit(167.600:81): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 167.893261][ T30] audit: type=1400 audit(167.610:82): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzkaller.YKcwbD/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 167.950074][ T30] audit: type=1400 audit(167.670:83): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 167.993712][ T30] audit: type=1400 audit(167.710:84): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzkaller.YKcwbD/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 168.020930][ T30] audit: type=1400 audit(167.720:85): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzkaller.YKcwbD/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3801 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 168.060235][ T3300] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.061544][ T3300] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.062723][ T3300] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.063946][ T3300] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 168.108861][ T30] audit: type=1400 audit(167.830:86): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 168.145718][ T30] audit: type=1400 audit(167.860:87): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 168.167673][ T30] audit: type=1400 audit(167.880:88): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="gadgetfs" ino=3803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 168.444061][ T30] audit: type=1400 audit(168.160:89): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 168.452699][ T30] audit: type=1400 audit(168.170:90): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 168.620924][ T3301] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 169.339228][ T3440] serio: Serial port pts0 [ 174.827738][ T3471] serio: Serial port pts0 [ 177.748788][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 177.749346][ T30] audit: type=1400 audit(177.470:96): avc: denied { read write } for pid=3488 comm="syz.1.21" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 177.753519][ T30] audit: type=1400 audit(177.470:97): avc: denied { open } for pid=3488 comm="syz.1.21" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 178.423888][ T30] audit: type=1400 audit(178.140:98): avc: denied { unmount } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 178.684578][ T3492] serio: Serial port pts1 [ 190.811861][ T30] audit: type=1400 audit(190.530:99): avc: denied { name_bind } for pid=3499 comm="syz.0.24" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 190.812421][ T30] audit: type=1400 audit(190.530:100): avc: denied { node_bind } for pid=3499 comm="syz.0.24" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 193.038590][ T30] audit: type=1400 audit(192.760:101): avc: denied { allowed } for pid=3506 comm="syz.0.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 193.055170][ T30] audit: type=1400 audit(192.770:102): avc: denied { create } for pid=3506 comm="syz.0.27" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 193.063624][ T30] audit: type=1400 audit(192.780:103): avc: denied { map } for pid=3506 comm="syz.0.27" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2855 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 193.067406][ T30] audit: type=1400 audit(192.780:104): avc: denied { read write } for pid=3506 comm="syz.0.27" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2855 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 194.368679][ T30] audit: type=1400 audit(194.080:105): avc: denied { create } for pid=3511 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 194.405796][ T30] audit: type=1400 audit(194.100:106): avc: denied { setattr } for pid=3511 comm="syz.0.29" name="PACKET" dev="sockfs" ino=2874 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 194.454923][ T30] audit: type=1400 audit(194.160:107): avc: denied { create } for pid=3511 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 202.417110][ T3538] serio: Serial port pts0 [ 212.291319][ T30] audit: type=1400 audit(212.010:108): avc: denied { read write } for pid=3558 comm="syz.1.46" name="udmabuf" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 212.294034][ T30] audit: type=1400 audit(212.010:109): avc: denied { open } for pid=3558 comm="syz.1.46" path="/dev/udmabuf" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 212.303048][ T3559] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 212.312022][ T30] audit: type=1400 audit(212.030:110): avc: denied { ioctl } for pid=3558 comm="syz.1.46" path="/dev/udmabuf" dev="devtmpfs" ino=676 ioctlcmd=0x7542 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 217.647091][ T3567] serio: Serial port pts0 [ 228.794105][ T30] audit: type=1400 audit(228.510:111): avc: denied { setattr } for pid=3579 comm="syz.1.52" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 231.491149][ T30] audit: type=1400 audit(231.210:112): avc: denied { create } for pid=3582 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 231.503477][ T30] audit: type=1400 audit(231.220:113): avc: denied { prog_load } for pid=3582 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 231.505271][ T30] audit: type=1400 audit(231.220:114): avc: denied { bpf } for pid=3582 comm="syz.1.53" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 231.514285][ T30] audit: type=1400 audit(231.230:115): avc: denied { perfmon } for pid=3582 comm="syz.1.53" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 231.535637][ T30] audit: type=1400 audit(231.250:116): avc: denied { write } for pid=3582 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 231.761546][ T30] audit: type=1400 audit(231.480:117): avc: denied { create } for pid=3585 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 231.773482][ T30] audit: type=1400 audit(231.490:118): avc: denied { setopt } for pid=3585 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 231.785357][ T30] audit: type=1400 audit(231.500:119): avc: denied { bind } for pid=3585 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 231.792178][ T30] audit: type=1400 audit(231.510:120): avc: denied { listen } for pid=3585 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 244.068970][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 244.075822][ T30] audit: type=1400 audit(243.790:123): avc: denied { create } for pid=3627 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 244.091689][ T30] audit: type=1400 audit(243.810:124): avc: denied { getopt } for pid=3627 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 244.618931][ T30] audit: type=1400 audit(244.340:125): avc: denied { setopt } for pid=3627 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 244.654387][ T30] audit: type=1400 audit(244.370:126): avc: denied { write } for pid=3627 comm="syz.1.71" path="socket:[4102]" dev="sockfs" ino=4102 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 246.095943][ T3637] serio: Serial port pts0 [ 254.225288][ T3668] serio: Serial port pts0 [ 255.320228][ T3676] serio: Serial port pts1 [ 261.517689][ T3692] serio: Serial port pts0 [ 278.887938][ T30] audit: type=1400 audit(278.590:127): avc: denied { create } for pid=3719 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 278.901517][ T30] audit: type=1400 audit(278.620:128): avc: denied { ioctl } for pid=3719 comm="syz.1.106" path="socket:[4286]" dev="sockfs" ino=4286 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 278.912034][ T30] audit: type=1400 audit(278.630:129): avc: denied { write } for pid=3719 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 279.504296][ T3726] serio: Serial port pts0 [ 287.663219][ T30] audit: type=1400 audit(287.380:130): avc: denied { create } for pid=3751 comm="syz.0.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 292.005098][ T3761] serio: Serial port pts0 [ 297.072512][ T30] audit: type=1400 audit(296.790:131): avc: denied { name_bind } for pid=3796 comm="syz.1.135" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 297.509599][ T30] audit: type=1400 audit(297.230:132): avc: denied { sqpoll } for pid=3800 comm="syz.1.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 298.372466][ T3810] serio: Serial port pts1 [ 306.522964][ T3823] netlink: 'syz.1.145': attribute type 12 has an invalid length. [ 307.029814][ T3823] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3823 comm=syz.1.145 [ 309.212168][ T30] audit: type=1400 audit(308.930:133): avc: denied { mounton } for pid=3851 comm="syz.0.157" path="/61/file0" dev="tmpfs" ino=374 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 311.154647][ T30] audit: type=1400 audit(310.870:134): avc: denied { prog_run } for pid=3867 comm="syz.1.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 311.192998][ T30] audit: type=1400 audit(310.910:135): avc: denied { setopt } for pid=3867 comm="syz.1.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 311.630464][ T30] audit: type=1400 audit(311.350:136): avc: denied { write } for pid=3871 comm="syz.1.166" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 313.164778][ T30] audit: type=1400 audit(312.880:137): avc: denied { map_create } for pid=3888 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 313.174507][ T30] audit: type=1400 audit(312.890:138): avc: denied { map_read map_write } for pid=3888 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 314.199214][ T9] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 314.352950][ T3899] serio: Serial port pts0 [ 314.397725][ T9] usb 1-1: Using ep0 maxpacket: 8 [ 314.429157][ T9] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 11 [ 314.430131][ T9] usb 1-1: New USB device found, idVendor=044f, idProduct=b654, bcdDevice= 0.00 [ 314.430301][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 314.465527][ T9] usb 1-1: config 0 descriptor?? [ 314.787724][ T9] usbhid 1-1:0.0: can't add hid device: -71 [ 314.789414][ T9] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 314.840702][ T9] usb 1-1: USB disconnect, device number 2 [ 315.293775][ T30] audit: type=1400 audit(315.010:139): avc: denied { accept } for pid=3904 comm="syz.0.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 315.301787][ T30] audit: type=1400 audit(315.020:140): avc: denied { read } for pid=3904 comm="syz.0.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 316.618078][ T30] audit: type=1400 audit(316.340:141): avc: denied { create } for pid=3907 comm="syz.0.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 316.636916][ T30] audit: type=1400 audit(316.350:142): avc: denied { read } for pid=3106 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 316.640257][ T30] audit: type=1400 audit(316.360:143): avc: denied { append } for pid=3106 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 316.642339][ T30] audit: type=1400 audit(316.360:144): avc: denied { open } for pid=3106 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 316.644222][ T30] audit: type=1400 audit(316.360:145): avc: denied { getattr } for pid=3106 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 316.685342][ T30] audit: type=1400 audit(316.400:146): avc: denied { write } for pid=3907 comm="syz.0.182" path="socket:[5654]" dev="sockfs" ino=5654 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 320.327871][ T3941] serio: Serial port pts0 [ 321.053942][ T3945] serio: Serial port pts1 [ 336.631473][ T30] audit: type=1400 audit(336.350:147): avc: denied { getopt } for pid=3960 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 336.677764][ T30] audit: type=1400 audit(336.390:148): avc: denied { ioctl } for pid=3960 comm="syz.1.203" path="socket:[4649]" dev="sockfs" ino=4649 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 340.619997][ T3993] serio: Serial port pts0 [ 342.395223][ T3999] serio: Serial port pts1 [ 347.194679][ T30] audit: type=1400 audit(346.910:149): avc: denied { create } for pid=4005 comm="syz.1.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 347.220712][ T4006] Zero length message leads to an empty skb [ 347.223266][ T30] audit: type=1400 audit(346.940:150): avc: denied { write } for pid=4005 comm="syz.1.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 348.222316][ T30] audit: type=1400 audit(347.940:151): avc: denied { accept } for pid=4010 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 348.238089][ T30] audit: type=1400 audit(347.960:152): avc: denied { setopt } for pid=4010 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 348.782981][ T30] audit: type=1400 audit(348.500:153): avc: denied { listen } for pid=4018 comm="syz.0.224" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 348.788393][ T4019] 8021q: VLANs not supported on vcan0 [ 349.983167][ T30] audit: type=1400 audit(349.700:154): avc: denied { read } for pid=4024 comm="syz.1.227" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 349.993034][ T30] audit: type=1400 audit(349.700:155): avc: denied { open } for pid=4024 comm="syz.1.227" path="/127/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 350.086979][ T4028] block device autoloading is deprecated and will be removed. [ 350.108095][ T30] audit: type=1400 audit(349.820:156): avc: denied { ioctl } for pid=4024 comm="syz.1.227" path="/127/file0/file0" dev="fuse" ino=64 ioctlcmd=0x921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 352.833917][ T30] audit: type=1400 audit(352.550:157): avc: denied { setopt } for pid=4049 comm="syz.0.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 353.123723][ T4050] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 353.135120][ T30] audit: type=1400 audit(352.850:158): avc: denied { bind } for pid=4049 comm="syz.0.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 356.194074][ T4073] serio: Serial port pts0 [ 358.808056][ T4079] serio: Serial port pts1 [ 363.037485][ T30] audit: type=1400 audit(362.750:159): avc: denied { block_suspend } for pid=4092 comm="syz.1.255" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 363.835385][ T4100] serio: Serial port pts0 [ 364.591797][ T30] audit: type=1400 audit(364.310:160): avc: denied { execute } for pid=4102 comm="syz.0.259" path=2F6D656D66643AFF2D42D57E7AA7D99A707070F00884A06D202864656C6574656429 dev="tmpfs" ino=1028 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 365.598056][ T4113] serio: Serial port pts1 [ 379.181339][ T30] audit: type=1400 audit(378.900:161): avc: denied { mounton } for pid=4118 comm="syz.1.264" path="/146/file0" dev="tmpfs" ino=860 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 383.640207][ T30] audit: type=1400 audit(383.360:162): avc: denied { create } for pid=4153 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 383.669575][ T30] audit: type=1400 audit(383.380:163): avc: denied { ioctl } for pid=4153 comm="syz.1.280" path="socket:[5061]" dev="sockfs" ino=5061 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 383.699967][ T30] audit: type=1400 audit(383.410:164): avc: denied { bind } for pid=4153 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 383.757290][ T30] audit: type=1400 audit(383.450:165): avc: denied { connect } for pid=4153 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 383.764949][ T30] audit: type=1400 audit(383.480:166): avc: denied { read } for pid=4153 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 385.662666][ T4170] serio: Serial port pts0 [ 391.368191][ T4185] serio: Serial port pts1 [ 406.222933][ T30] audit: type=1400 audit(405.940:167): avc: denied { create } for pid=4209 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 406.620067][ T4214] serio: Serial port pts0 [ 406.958438][ T4217] serio: Serial port pts1 [ 408.442272][ T4224] serio: Serial port pts0 [ 410.313886][ T4229] netlink: 4 bytes leftover after parsing attributes in process `syz.1.304'. [ 410.463219][ T4229] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4229 comm=syz.1.304 [ 410.674912][ T4231] serio: Serial port pts0 [ 422.248565][ T4241] serio: Serial port pts1 [ 427.090825][ T4254] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4254 comm=syz.1.310 [ 435.305561][ T4280] serio: Serial port pts0 [ 437.587861][ T4288] serio: Serial port pts1 [ 450.974341][ T30] audit: type=1400 audit(450.690:168): avc: denied { nlmsg_write } for pid=4297 comm="syz.1.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 452.165305][ T4305] serio: Serial port pts0 [ 453.412003][ T4315] serio: Serial port pts1 [ 454.937941][ T4325] serio: Serial port pts0 [ 469.183300][ T4335] serio: Serial port pts1 [ 471.042870][ T4344] serio: Serial port pts0 [ 472.924413][ T4355] serio: Serial port pts1 [ 488.031244][ T4374] serio: Serial port pts0 [ 492.975657][ T4387] xt_bpf: check failed: parse error [ 493.230775][ T4389] netlink: 4 bytes leftover after parsing attributes in process `syz.0.355'. [ 505.942342][ T30] audit: type=1400 audit(505.660:169): avc: denied { write } for pid=4430 comm="syz.0.372" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 506.269371][ T4434] serio: Serial port pts0 [ 506.295383][ T4436] serio: Serial port pts1 [ 525.683909][ T30] audit: type=1400 audit(525.400:170): avc: denied { read } for pid=4468 comm="syz.1.384" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 525.741481][ T30] audit: type=1400 audit(525.440:171): avc: denied { open } for pid=4468 comm="syz.1.384" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 526.250058][ T30] audit: type=1400 audit(525.970:172): avc: denied { ioctl } for pid=4468 comm="syz.1.384" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 528.162373][ T30] audit: type=1400 audit(527.870:173): avc: denied { write } for pid=4479 comm="syz.1.387" name="udplite6" dev="proc" ino=4026532736 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 528.690707][ T30] audit: type=1400 audit(528.410:174): avc: denied { watch watch_reads } for pid=4479 comm="syz.1.387" path="/proc/536/net/udplite6" dev="proc" ino=4026532736 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 532.802848][ T4502] serio: Serial port pts0 [ 539.576856][ T4528] serio: Serial port pts1 [ 548.119389][ T4533] serio: Serial port pts0 [ 555.696942][ T4544] serio: Serial port pts1 [ 568.040682][ T30] audit: type=1400 audit(567.760:175): avc: denied { ioctl } for pid=4560 comm="syz.1.416" path="socket:[7612]" dev="sockfs" ino=7612 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 572.532894][ T30] audit: type=1400 audit(572.250:176): avc: denied { ioctl } for pid=4573 comm="syz.0.420" path="net:[4026532636]" dev="nsfs" ino=4026532636 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 578.960633][ T4611] serio: Serial port pts0 [ 582.422376][ T4633] serio: Serial port pts1 [ 594.660829][ T30] audit: type=1400 audit(594.380:177): avc: denied { accept } for pid=4639 comm="syz.1.444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 597.655194][ T4650] serio: Serial port pts0 [ 603.409733][ T30] audit: type=1400 audit(603.130:178): avc: denied { read } for pid=4684 comm="syz.0.459" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 603.413218][ T30] audit: type=1400 audit(603.130:179): avc: denied { open } for pid=4684 comm="syz.0.459" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 603.427257][ T30] audit: type=1400 audit(603.140:180): avc: denied { ioctl } for pid=4684 comm="syz.0.459" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 606.074909][ T30] audit: type=1400 audit(605.790:181): avc: denied { mount } for pid=4695 comm="syz.1.463" name="/" dev="ramfs" ino=7813 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 606.137767][ T30] audit: type=1400 audit(605.850:182): avc: denied { execute } for pid=4695 comm="syz.1.463" path="/file1" dev="ramfs" ino=7073 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 607.015728][ T30] audit: type=1400 audit(606.730:183): avc: denied { write } for pid=4697 comm="syz.0.464" path="socket:[7083]" dev="sockfs" ino=7083 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 608.922422][ T4707] serio: Serial port pts0 [ 611.867996][ T4717] serio: Serial port pts1 [ 624.263546][ T4723] serio: Serial port pts0 [ 628.583065][ T30] audit: type=1400 audit(628.300:184): avc: denied { mounton } for pid=4735 comm="syz.0.475" path="/223/file0" dev="tmpfs" ino=1297 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 634.201918][ T4754] serio: Serial port pts1 [ 640.117499][ T30] audit: type=1400 audit(639.830:185): avc: denied { connect } for pid=4764 comm="syz.1.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 642.949175][ T4786] netlink: 4 bytes leftover after parsing attributes in process `syz.0.494'. [ 644.419178][ T30] audit: type=1400 audit(644.140:186): avc: denied { create } for pid=4794 comm="syz.0.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 644.434239][ T30] audit: type=1400 audit(644.150:187): avc: denied { setopt } for pid=4794 comm="syz.0.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 644.453244][ T30] audit: type=1400 audit(644.160:188): avc: denied { ioctl } for pid=4794 comm="syz.0.497" path="socket:[8278]" dev="sockfs" ino=8278 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 646.827975][ T4814] serio: Serial port pts0 [ 649.350859][ T30] audit: type=1400 audit(649.070:189): avc: denied { connect } for pid=4832 comm="syz.0.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 649.684287][ T4837] serio: Serial port pts0 [ 649.890371][ T30] audit: type=1400 audit(649.610:190): avc: denied { write } for pid=4832 comm="syz.0.509" path="socket:[8024]" dev="sockfs" ino=8024 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 653.074467][ T4854] serio: Serial port pts0 [ 657.134833][ T30] audit: type=1400 audit(656.850:191): avc: denied { unmount } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 662.892069][ T4909] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 673.247781][ T30] audit: type=1400 audit(672.970:192): avc: denied { open } for pid=4931 comm="syz.0.543" path="/dev/ttyq5" dev="devtmpfs" ino=372 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 676.399130][ T4946] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=637 sclass=netlink_route_socket pid=4946 comm=syz.0.547 [ 676.570899][ T30] audit: type=1400 audit(676.290:193): avc: denied { setopt } for pid=4947 comm="syz.0.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 676.828231][ C1] vcan0: j1939_tp_rxtimer: 0x00000000254bdb96: rx timeout, send abort [ 677.330452][ C1] vcan0: j1939_tp_rxtimer: 0x00000000254bdb96: abort rx timeout. Force session deactivation [ 677.332915][ C1] vcan0: j1939_tp_rxtimer: 0x00000000e43a9a3f: rx timeout, send abort [ 677.813754][ T4957] serio: Serial port pts0 [ 677.833779][ C1] vcan0: j1939_tp_rxtimer: 0x00000000e43a9a3f: abort rx timeout. Force session deactivation [ 678.114082][ T4959] serio: Serial port pts1 [ 684.295855][ T4989] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4989 comm=syz.1.562 [ 684.775482][ T4994] serio: Serial port pts0 [ 687.082613][ T5000] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 687.087869][ T5000] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 691.260514][ T5009] serio: Serial port pts0 [ 693.175363][ T30] audit: type=1400 audit(692.890:194): avc: denied { ioctl } for pid=5013 comm="syz.1.569" path="socket:[9299]" dev="sockfs" ino=9299 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 729.845373][ T5039] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 729.860792][ T5039] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 731.415001][ T5039] hsr_slave_0: entered promiscuous mode [ 731.420698][ T5039] hsr_slave_1: entered promiscuous mode [ 731.423109][ T5039] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 731.424908][ T5039] Cannot create hsr debugfs directory [ 791.799188][ T33] INFO: task kworker/0:4:3434 blocked for more than 430 seconds. [ 791.807808][ T33] Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 [ 791.809212][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 791.809730][ T33] task:kworker/0:4 state:D stack:0 pid:3434 tgid:3434 ppid:2 task_flags:0x4288060 flags:0x00000008 [ 791.810679][ T33] Workqueue: md_misc mddev_delayed_delete [ 791.811948][ T33] Call trace: [ 791.812270][ T33] __switch_to+0x204/0x4bc (T) [ 791.824465][ T33] __schedule+0xd34/0x3188 [ 791.825213][ T33] schedule+0xd0/0x344 [ 791.825546][ T33] schedule_timeout+0x1ec/0x224 [ 791.826037][ T33] __wait_for_common+0x1d0/0x3f8 [ 791.838704][ T33] wait_for_completion+0x20/0x2c [ 791.839566][ T33] devtmpfs_submit_req+0xac/0x114 [ 791.840044][ T33] devtmpfs_delete_node+0xd8/0x128 [ 791.840503][ T33] device_del+0x59c/0x7b4 [ 791.840959][ T33] del_gendisk+0x3fc/0x87c [ 791.841427][ T33] md_kobj_release+0x84/0xd8 [ 791.841743][ T33] kobject_put+0x17c/0x430 [ 791.842056][ T33] mddev_delayed_delete+0x14/0x20 [ 791.842372][ T33] process_one_work+0x7cc/0x18d4 [ 791.842824][ T33] worker_thread+0x734/0xb84 [ 791.843068][ T33] kthread+0x348/0x5fc [ 791.843246][ T33] ret_from_fork+0x10/0x20 [ 791.843772][ T33] [ 791.843772][ T33] Showing all locks held in the system: [ 791.844130][ T33] 2 locks held by kdevtmpfs/25: [ 791.844327][ T33] #0: ffff00000de30950 (&type->i_mutex_dir_key/1){+.+.}-{4:4}, at: __kern_path_locked+0xd4/0x1f8 [ 791.845410][ T33] #1: ffff80008771a4e8 (major_names_lock){+.+.}-{4:4}, at: blk_probe_dev+0x30/0x168 [ 791.857101][ T33] 1 lock held by khungtaskd/33: [ 791.858213][ T33] #0: ffff80008728da60 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x18/0x1c4 [ 791.859757][ T33] 3 locks held by kworker/u8:5/163: [ 791.859966][ T33] #0: ffff00000d831148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 791.860520][ T33] #1: ffff80008dd87c80 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 791.861061][ T33] #2: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 791.861656][ T33] 1 lock held by klogd/3110: [ 791.861833][ T33] 2 locks held by getty/3240: [ 791.862006][ T33] #0: ffff000017c770a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 791.862657][ T33] #1: ffff80008d50b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e4/0xdb4 [ 791.863268][ T33] 2 locks held by sshd/3293: [ 791.863405][ T33] 2 locks held by syz-executor/3295: [ 791.863546][ T33] 2 locks held by kworker/0:4/3434: [ 791.863701][ T33] #0: ffff00000f37b148 ((wq_completion)md_misc){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 791.864318][ T33] #1: ffff8000a1af7c80 ((work_completion)(&mddev->del_work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 791.864876][ T33] 3 locks held by kworker/u8:3/4974: [ 791.865023][ T33] #0: ffff000016638148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 791.865589][ T33] #1: ffff8000a04b7c80 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 791.870608][ T33] #2: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 791.871223][ T33] 2 locks held by syz.0.560/4982: SYZFAIL: failed to recv rpc [ 791.871355][ T33] #0: ffff00000de52420 (sb_writers){.+.+}-{0:0}, at: mnt_want_write+0x3c/0xb0 [ 791.871941][ T33] #1: ffff00000de30950 (&type->i_mutex_dir_key#2){++++}-{4:4}, at: path_openat+0xcbc/0x25e4 [ 791.872658][ T33] 2 locks held by syz.1.575/5035: [ 791.872817][ T33] #0: ffff00000de52420 (sb_writers){.+.+}-{0:0}, at: mnt_want_write+0x3c/0xb0 [ 791.873416][ T33] #1: ffff00000de30950 (&type->i_mutex_dir_key#2){++++}-{4:4}, at: path_openat+0xcbc/0x25e4 [ 791.874062][ T33] 2 locks held by syz-executor/5039: [ 791.874196][ T33] #0: ffff800087091bb8 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0xb8/0x218 [ 791.874910][ T33] #1: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x4b8/0x1810 [ 791.875451][ T33] 1 lock held by syz-executor/5072: [ 791.875579][ T33] #0: ffff8000887e3b68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 791.890631][ T33] [ 791.891449][ T33] ============================================= [ 791.891449][ T33] [ 791.893246][ T33] Kernel panic - not syncing: hung_task: blocked tasks [ 791.894244][ T33] CPU: 0 UID: 0 PID: 33 Comm: khungtaskd Not tainted 6.15.0-rc2-syzkaller-00471-g119009db2674 #0 PREEMPT [ 791.894683][ T33] Hardware name: linux,dummy-virt (DT) [ 791.895009][ T33] Call trace: [ 791.895324][ T33] show_stack+0x18/0x24 (C) [ 791.895547][ T33] dump_stack_lvl+0x38/0xf4 [ 791.895776][ T33] dump_stack+0x1c/0x28 [ 791.896288][ T33] panic+0x5b0/0x664 [ 791.896578][ T33] watchdog+0x658/0x1140 [ 791.896990][ T33] kthread+0x348/0x5fc [ 791.897248][ T33] ret_from_fork+0x10/0x20 [ 791.897971][ T33] SMP: stopping secondary CPUs [ 791.899441][ T33] Kernel Offset: disabled [ 791.899755][ T33] CPU features: 0x0410,00040068,01000400,0200421b [ 791.900109][ T33] Memory Limit: none [ 791.901211][ T33] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:19:43 Registers: info registers vcpu 0 CPU#0 PC=ffff80008030ba44 X00=00000000000001b2 X01=000000000000005a X02=00000000000003fd X03=00000000000003fd X04=ffff800089704580 X05=00000000000003fd X06=0000000000000000 X07=0000000000000000 X08=ffff800080006150 X09=dfff800000000000 X10=ffff700010000c29 X11=1ffff00010000c29 X12=ffff700010000c2a X13=0000000000000028 X14=00000000000190a2 X15=0000000000000007 X16=6a9a0000dfc6ffff X17=76cc95f40b090093 X18=000000000000004a X19=ffff800089993070 X20=0000000000000057 X21=0000000000000030 X22=ffff80008030a6d8 X23=ffff8000800060c0 X24=ffff800088e88bf8 X25=ffff800088e90bf8 X26=ffff800088be6720 X27=000000000000005c X28=ffff8000898bae70 X29=ffff800080005fa0 X30=ffff80008030b9e0 SP=ffff800080005fa0 PSTATE=200000c5 --C- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000000000000000:000000000000000a Q02=0000aaaab3f82619:0000aaaab3f82460 Q03=0000ffffef27cfd0:0000ffffef27cd38 Q04=0000000000000000:0000000000000000 Q05=0000ffffef27cc90:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:000001f40000000a Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffef27d0a0:0000ffffef27d0a0 Q17=ffffff80ffffffd0:0000ffffef27d070 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008098cf48 X00=ffff80008d967150 X01=0000000000000028 X02=0000000000000028 X03=0040f59a4b6f424a X04=ffff80008d967410 X05=ffff80008d9671f0 X06=000000a3a7f63eaf X07=85b9cc4dd4a5c0d8 X08=ffff80008d96745f X09=00022b2b6bfdf779 X10=15b2329ae5216721 X11=000944c56d96ba5f X12=ffff700011b2ce52 X13=0040ebbe4820ff5c X14=000577ac8b4d39d8 X15=000098ea67c923d5 X16=ffff80008d9673c0 X17=ffff80008d9671a0 X18=00004eeac7f83473 X19=0000000000000000 X20=0000000000000000 X21=0000000000000000 X22=00027cd0d405548e X23=ffff80008d967208 X24=000713a97d77b667 X25=0000000000000000 X26=000217ec93263827 X27=0006a2f7a17a91d6 X28=003ffffffffffff8 X29=ffff80008d966f50 X30=ffff80008098cfb8 SP=ffff80008d966f50 PSTATE=40000005 -Z-- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000000000000000:000000000000000a Q02=0000aaaab3f82619:0000aaaab3f82460 Q03=0000ffffef27cfd0:0000ffffef27cd38 Q04=0000000000000000:0000000000000000 Q05=0000ffffef27cc90:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:000001f40000000a Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffef27d0a0:0000ffffef27d0a0 Q17=ffffff80ffffffd0:0000ffffef27d070 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000