last executing test programs: 7.350342541s ago: executing program 0 (id=381): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0xb7, 0x4) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e24, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000100)="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", 0xfffffffffffffdb0, 0x4040004, 0x0, 0xfffffffb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) 6.777650036s ago: executing program 0 (id=382): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000080)={0x0, 0x9, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000026006bab9a3fe3d86e17aa31106b876c1d0000007ea60864160af36504001a0038001d004231a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb5b64f69853362ac3407173ec", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) 3.346846621s ago: executing program 0 (id=384): bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCFLSH(r1, 0x400455c8, 0x20000000009) 2.720283687s ago: executing program 0 (id=386): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0xb7, 0x4) bind$inet(r0, &(0x7f0000003900)={0x2, 0x4e24, @multicast1}, 0x10) connect$inet(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000100)="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", 0xfffffffffffffdb0, 0x4040004, 0x0, 0xfffffffb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) 2.335200173s ago: executing program 0 (id=388): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000002200)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000cc0)={0x1c, r0, 0x1, 0x0, 0x0, {{0xa}, {@val={0x8, 0x3, r2}, @void}}}, 0x1c}}, 0x0) 1.519995286s ago: executing program 1 (id=390): socketpair$unix(0x1, 0x2, 0x0, 0x0) unshare(0x20020680) r0 = userfaultfd(0x801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x92c}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000400000/0xc00000)=nil, 0xc00000}, 0x1}) 1.408312279s ago: executing program 0 (id=391): syz_pidfd_open(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r3, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000600)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@ccm_128={{0x304}, "3b71c5fb208a7d87", "33fd8be2ab594ff041b2a3d02334705b", "73450b96", "8977b5f88f3db49b"}, 0x28) r4 = socket$inet_tcp(0x2, 0x1, 0x0) openat$iommufd(0xffffffffffffff9c, &(0x7f0000000480), 0x100, 0x0) recvfrom$inet(r4, &(0x7f0000000140)=""/211, 0xd3, 0x40, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) syz_io_uring_setup(0x110, &(0x7f00000003c0)={0x0, 0xfad6, 0x100, 0x1}, &(0x7f00000029c0)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) flistxattr(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000000)='sock_rcvqueue_full\x00', 0xffffffffffffffff, 0x0, 0x8}, 0x18) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) 1.294611562s ago: executing program 1 (id=392): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0xb7, 0x4) bind$inet(r0, &(0x7f0000003900)={0x2, 0x4e24, @multicast1}, 0x10) connect$inet(r0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000100)="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", 0xfffffffffffffdb0, 0x4040004, 0x0, 0xfffffffb) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) 1.066761267s ago: executing program 1 (id=393): syz_open_dev$hidraw(&(0x7f0000000080), 0x0, 0x0) syz_usb_connect$cdc_ncm(0x1, 0x6e, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000090000082502000000000000000109025c00020100f92a0904000001020900000524060001053408fa6e0d240f0100000000000d000a0006471a010000190581"], 0x0) r0 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_usb_disconnect(0xffffffffffffffff) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000000c0)={0xffff, 0xfff7, 0x0, 0x78, 0x3, "5acf8f53872ebc82"}) write$char_usb(r0, 0x0, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) r1 = syz_open_procfs(0x0, 0x0) getdents64(r1, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) 640.531983ms ago: executing program 1 (id=394): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 450.85837ms ago: executing program 1 (id=395): r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @mcast2, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x0, 0x0, 0x0, 0x50}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=',', 0x1}], 0x1, 0x0, 0x0, 0x2c}, 0x44004) 0s ago: executing program 1 (id=396): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)={0x38, 0x1403, 0x1, 0x70bd2d, 0x0, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000040)) socket$nl_generic(0x10, 0x3, 0x10) r5 = epoll_create1(0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000001080), 0x802, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f00000010c0)={0x10000004}) epoll_pwait(r5, &(0x7f0000000240)=[{}], 0x1, 0x19c, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:44779' (ED25519) to the list of known hosts. [ 162.766787][ T30] audit: type=1400 audit(162.310:58): avc: denied { name_bind } for pid=3295 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 163.048468][ T30] audit: type=1400 audit(162.590:59): avc: denied { execute } for pid=3297 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 163.059183][ T30] audit: type=1400 audit(162.600:60): avc: denied { execute_no_trans } for pid=3297 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 166.750235][ T30] audit: type=1400 audit(166.290:61): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 166.768757][ T30] audit: type=1400 audit(166.310:62): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 166.794629][ T3297] cgroup: Unknown subsys name 'net' [ 166.816035][ T30] audit: type=1400 audit(166.350:63): avc: denied { unmount } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 167.107729][ T3297] cgroup: Unknown subsys name 'cpuset' [ 167.146201][ T3297] cgroup: Unknown subsys name 'rlimit' [ 167.449239][ T30] audit: type=1400 audit(166.990:64): avc: denied { setattr } for pid=3297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 167.456912][ T30] audit: type=1400 audit(166.990:65): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 167.466102][ T30] audit: type=1400 audit(167.000:66): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 167.767471][ T3299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 167.774448][ T30] audit: type=1400 audit(167.310:67): avc: denied { relabelto } for pid=3299 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 167.779491][ T30] audit: type=1400 audit(167.320:68): avc: denied { write } for pid=3299 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 167.841894][ T30] audit: type=1400 audit(167.380:69): avc: denied { read } for pid=3297 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 167.845242][ T30] audit: type=1400 audit(167.380:70): avc: denied { open } for pid=3297 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 167.858979][ T3297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 177.082539][ T30] audit: type=1400 audit(176.620:71): avc: denied { execmem } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 177.134836][ T30] audit: type=1400 audit(176.680:72): avc: denied { read } for pid=3302 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 177.137408][ T30] audit: type=1400 audit(176.680:73): avc: denied { open } for pid=3302 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 177.152049][ T30] audit: type=1400 audit(176.690:74): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 177.191237][ T30] audit: type=1400 audit(176.730:75): avc: denied { module_request } for pid=3302 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 177.191770][ T30] audit: type=1400 audit(176.730:76): avc: denied { module_request } for pid=3303 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 177.309760][ T30] audit: type=1400 audit(176.850:77): avc: denied { sys_module } for pid=3303 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 181.355571][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 181.435847][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 181.451349][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 181.530978][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 183.106951][ T3303] hsr_slave_0: entered promiscuous mode [ 183.113416][ T3303] hsr_slave_1: entered promiscuous mode [ 183.360760][ T3302] hsr_slave_0: entered promiscuous mode [ 183.370951][ T3302] hsr_slave_1: entered promiscuous mode [ 183.377989][ T3302] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 183.379128][ T3302] Cannot create hsr debugfs directory [ 184.792229][ T30] audit: type=1400 audit(184.330:78): avc: denied { create } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 184.806452][ T30] audit: type=1400 audit(184.350:79): avc: denied { write } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 184.814335][ T30] audit: type=1400 audit(184.350:80): avc: denied { read } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 184.832101][ T3303] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 184.896887][ T3303] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 184.929314][ T3303] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 184.995564][ T3303] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 185.249252][ T3302] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 185.282070][ T3302] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 185.315253][ T3302] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 185.355798][ T3302] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 186.781138][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.013800][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 192.207533][ T3303] veth0_vlan: entered promiscuous mode [ 192.256373][ T3303] veth1_vlan: entered promiscuous mode [ 192.486694][ T3303] veth0_macvtap: entered promiscuous mode [ 192.511380][ T3303] veth1_macvtap: entered promiscuous mode [ 192.735590][ T3303] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.736691][ T3303] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.737096][ T3303] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 192.737384][ T3303] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.079061][ T30] audit: type=1400 audit(192.620:81): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 193.080323][ T3302] veth0_vlan: entered promiscuous mode [ 193.091359][ T30] audit: type=1400 audit(192.630:82): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/syzkaller.XeD2pP/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 193.120026][ T30] audit: type=1400 audit(192.660:83): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 193.139640][ T30] audit: type=1400 audit(192.680:84): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/syzkaller.XeD2pP/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 193.149552][ T30] audit: type=1400 audit(192.690:85): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/syzkaller.XeD2pP/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3295 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 193.155706][ T3302] veth1_vlan: entered promiscuous mode [ 193.187668][ T30] audit: type=1400 audit(192.730:86): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 193.201762][ T30] audit: type=1400 audit(192.740:87): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 193.211840][ T30] audit: type=1400 audit(192.750:88): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="gadgetfs" ino=3296 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 193.361146][ T30] audit: type=1400 audit(192.900:89): avc: denied { mounton } for pid=3303 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 193.364509][ T30] audit: type=1400 audit(192.900:90): avc: denied { mount } for pid=3303 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 193.439197][ T3302] veth0_macvtap: entered promiscuous mode [ 193.462373][ T3302] veth1_macvtap: entered promiscuous mode [ 193.668173][ T3302] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.670650][ T3302] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.677145][ T3302] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.677899][ T3302] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 193.716947][ T3303] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 202.790239][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 202.790785][ T30] audit: type=1400 audit(202.330:100): avc: denied { create } for pid=3454 comm="syz.1.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 202.818161][ T30] audit: type=1400 audit(202.350:101): avc: denied { write } for pid=3454 comm="syz.1.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 202.818769][ T30] audit: type=1400 audit(202.350:102): avc: denied { connect } for pid=3454 comm="syz.1.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 202.819031][ T30] audit: type=1400 audit(202.350:103): avc: denied { name_connect } for pid=3454 comm="syz.1.3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 202.901425][ T30] audit: type=1400 audit(202.430:104): avc: denied { create } for pid=3453 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 202.902162][ T30] audit: type=1400 audit(202.430:105): avc: denied { ioctl } for pid=3453 comm="syz.0.4" path="socket:[4234]" dev="sockfs" ino=4234 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 202.902489][ T30] audit: type=1400 audit(202.440:106): avc: denied { connect } for pid=3453 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 202.909818][ T30] audit: type=1400 audit(202.440:107): avc: denied { write } for pid=3453 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 203.345826][ T30] audit: type=1400 audit(202.880:108): avc: denied { name_connect } for pid=3454 comm="syz.1.3" dest=19999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 203.939089][ T30] audit: type=1400 audit(203.480:109): avc: denied { shutdown } for pid=3454 comm="syz.1.3" lport=41496 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 208.823731][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 208.828894][ T30] audit: type=1400 audit(208.300:113): avc: denied { read write } for pid=3467 comm="syz.1.5" name="rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 208.830798][ T30] audit: type=1400 audit(208.310:114): avc: denied { open } for pid=3467 comm="syz.1.5" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 211.906349][ T30] audit: type=1326 audit(211.450:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3473 comm="syz.0.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 211.909478][ T30] audit: type=1326 audit(211.450:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3473 comm="syz.0.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 211.918238][ T30] audit: type=1326 audit(211.460:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3473 comm="syz.0.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=107 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 211.921710][ T30] audit: type=1326 audit(211.460:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3473 comm="syz.0.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 211.926590][ T30] audit: type=1326 audit(211.460:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3473 comm="syz.0.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=110 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 211.934393][ T30] audit: type=1326 audit(211.480:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3473 comm="syz.0.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 211.962412][ T30] audit: type=1326 audit(211.500:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3473 comm="syz.0.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff8cbc1804 code=0x7ffc0000 [ 211.970645][ T30] audit: type=1326 audit(211.510:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3473 comm="syz.0.12" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff8cbc1804 code=0x7ffc0000 [ 214.830562][ T30] kauditd_printk_skb: 203 callbacks suppressed [ 214.847549][ T30] audit: type=1400 audit(214.070:326): avc: denied { read } for pid=3474 comm="syz.1.8" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 214.877751][ T30] audit: type=1400 audit(214.080:327): avc: denied { open } for pid=3474 comm="syz.1.8" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 214.894392][ T30] audit: type=1400 audit(214.130:328): avc: denied { ioctl } for pid=3474 comm="syz.1.8" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 216.192817][ C1] hrtimer: interrupt took 448480 ns [ 219.438223][ T30] audit: type=1400 audit(218.960:329): avc: denied { map_create } for pid=3482 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 219.484469][ T30] audit: type=1400 audit(219.010:330): avc: denied { map_read map_write } for pid=3482 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 219.566984][ T30] audit: type=1400 audit(219.080:331): avc: denied { read } for pid=3482 comm="syz.0.10" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 219.567582][ T30] audit: type=1400 audit(219.080:332): avc: denied { open } for pid=3482 comm="syz.0.10" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 219.591157][ T30] audit: type=1400 audit(219.130:333): avc: denied { ioctl } for pid=3482 comm="syz.0.10" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 227.436028][ T30] audit: type=1400 audit(226.200:334): avc: denied { ioctl } for pid=3488 comm="syz.0.13" path="/dev/iommu" dev="devtmpfs" ino=614 ioctlcmd=0x3b86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 229.703277][ T30] audit: type=1400 audit(229.240:335): avc: denied { create } for pid=3500 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 237.885591][ T30] audit: type=1400 audit(237.150:336): avc: denied { create } for pid=3512 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 237.889035][ T30] audit: type=1400 audit(237.150:337): avc: denied { connect } for pid=3512 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 237.894949][ T30] audit: type=1400 audit(237.160:338): avc: denied { bind } for pid=3512 comm="syz.0.17" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 237.909670][ T30] audit: type=1400 audit(237.160:339): avc: denied { node_bind } for pid=3512 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 237.914150][ T30] audit: type=1400 audit(237.170:340): avc: denied { read } for pid=3512 comm="syz.0.17" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 237.930207][ T30] audit: type=1400 audit(237.170:341): avc: denied { open } for pid=3512 comm="syz.0.17" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 237.932073][ T30] audit: type=1400 audit(237.170:342): avc: denied { ioctl } for pid=3512 comm="syz.0.17" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 246.337691][ T3530] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 246.347668][ T30] audit: type=1400 audit(245.880:343): avc: denied { create } for pid=3529 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 248.241444][ T30] audit: type=1400 audit(247.780:344): avc: denied { write } for pid=3531 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 248.247793][ T30] audit: type=1400 audit(247.790:345): avc: denied { nlmsg_write } for pid=3531 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 248.279506][ T30] audit: type=1400 audit(247.820:346): avc: denied { nlmsg_read } for pid=3531 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 248.284396][ T3532] netlink: 104 bytes leftover after parsing attributes in process `syz.1.20'. [ 249.393133][ T30] audit: type=1400 audit(248.570:347): avc: denied { name_bind } for pid=3529 comm="syz.0.19" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 249.393798][ T30] audit: type=1400 audit(248.580:348): avc: denied { node_bind } for pid=3529 comm="syz.0.19" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 249.394283][ T30] audit: type=1400 audit(248.650:349): avc: denied { setattr } for pid=3529 comm="syz.0.19" path="/dev/mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 255.193544][ T3543] capability: warning: `syz.0.23' uses deprecated v2 capabilities in a way that may be insecure [ 258.809409][ T30] audit: type=1400 audit(258.310:350): avc: denied { create } for pid=3549 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 258.835245][ T30] audit: type=1400 audit(258.340:351): avc: denied { getopt } for pid=3549 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 261.038628][ T30] audit: type=1400 audit(260.570:352): avc: denied { create } for pid=3557 comm="syz.1.28" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 261.070317][ T30] audit: type=1400 audit(260.600:353): avc: denied { ioctl } for pid=3557 comm="syz.1.28" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4336 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 262.508957][ T30] audit: type=1400 audit(262.040:354): avc: denied { create } for pid=3564 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 262.545667][ T30] audit: type=1400 audit(262.080:355): avc: denied { connect } for pid=3564 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 262.557839][ T30] audit: type=1400 audit(262.090:356): avc: denied { setopt } for pid=3564 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 262.581394][ T30] audit: type=1400 audit(262.120:357): avc: denied { bind } for pid=3564 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 262.603608][ T30] audit: type=1400 audit(262.140:358): avc: denied { write } for pid=3564 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 262.669776][ T30] audit: type=1400 audit(262.210:359): avc: denied { read } for pid=3564 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 263.196167][ T3569] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 263.206851][ T3569] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 264.095980][ T3576] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 264.101522][ T3576] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 264.355394][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 264.358870][ T30] audit: type=1400 audit(263.900:364): avc: denied { allowed } for pid=3579 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 264.368420][ T30] audit: type=1400 audit(263.910:365): avc: denied { execute } for pid=3581 comm="syz.1.37" name="file2" dev="tmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 264.370580][ T3582] process 'syz.1.37' launched './file2' with NULL argv: empty string added [ 264.373932][ T30] audit: type=1400 audit(263.910:366): avc: denied { execute_no_trans } for pid=3581 comm="syz.1.37" path="/20/file2" dev="tmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 264.388047][ T30] audit: type=1400 audit(263.930:367): avc: denied { map } for pid=3579 comm="syz.0.36" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4375 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 264.392385][ T30] audit: type=1400 audit(263.930:368): avc: denied { read write } for pid=3579 comm="syz.0.36" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4375 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 272.687279][ T30] audit: type=1400 audit(272.230:369): avc: denied { open } for pid=3593 comm="syz.1.41" path="/dev/ptyq6" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 272.726510][ T30] audit: type=1400 audit(272.270:370): avc: denied { ioctl } for pid=3593 comm="syz.1.41" path="/dev/ptyq6" dev="devtmpfs" ino=117 ioctlcmd=0x5420 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 285.293883][ T30] audit: type=1400 audit(284.830:371): avc: denied { execute } for pid=3618 comm="syz.0.46" path="/sys/kernel/debug/sync/sw_sync" dev="debugfs" ino=2550 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=file permissive=1 [ 290.405982][ T30] audit: type=1400 audit(289.920:372): avc: denied { create } for pid=3626 comm="syz.1.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 290.836494][ T3627] Zero length message leads to an empty skb [ 294.951789][ T30] audit: type=1400 audit(294.170:373): avc: denied { create } for pid=3633 comm="syz.1.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 315.237167][ T30] audit: type=1400 audit(314.160:374): avc: denied { setattr } for pid=3664 comm="syz.1.61" name="pagemap" dev="proc" ino=4488 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 315.237940][ T30] audit: type=1400 audit(314.560:375): avc: denied { bind } for pid=3664 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 315.494768][ T30] audit: type=1400 audit(314.820:376): avc: denied { setopt } for pid=3664 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 317.233685][ T30] audit: type=1400 audit(316.770:377): avc: denied { getopt } for pid=3678 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 323.421045][ T30] audit: type=1400 audit(322.960:378): avc: denied { setopt } for pid=3692 comm="syz.1.69" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 326.179449][ T30] audit: type=1400 audit(325.720:379): avc: denied { write } for pid=3694 comm="syz.0.70" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 328.508983][ T30] audit: type=1400 audit(328.050:380): avc: denied { getopt } for pid=3704 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 328.955890][ T30] audit: type=1400 audit(328.490:381): avc: denied { create } for pid=3707 comm="syz.0.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 328.961125][ T30] audit: type=1400 audit(328.500:382): avc: denied { write } for pid=3707 comm="syz.0.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 329.301168][ T3711] netdevsim netdevsim0: loading /lib/firmware/. failed with error -22 [ 329.302045][ T3711] netdevsim netdevsim0: Direct firmware load for . failed with error -22 [ 329.311109][ T30] audit: type=1400 audit(328.850:383): avc: denied { firmware_load } for pid=3710 comm="syz.0.77" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 329.314980][ T3711] netdevsim netdevsim0: Falling back to sysfs fallback for: . [ 329.970980][ T30] audit: type=1400 audit(329.510:384): avc: denied { bind } for pid=3706 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 329.981989][ T30] audit: type=1400 audit(329.520:385): avc: denied { read } for pid=3108 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 329.993719][ T30] audit: type=1400 audit(329.530:386): avc: denied { append } for pid=3108 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 329.994436][ T30] audit: type=1400 audit(329.530:387): avc: denied { open } for pid=3108 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 329.994710][ T30] audit: type=1400 audit(329.530:388): avc: denied { getattr } for pid=3108 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 330.001221][ T30] audit: type=1400 audit(329.540:389): avc: denied { connect } for pid=3706 comm="syz.1.75" lport=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 336.001814][ T23] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 336.296936][ T23] usb 1-1: New USB device found, idVendor=0547, idProduct=6801, bcdDevice=43.6f [ 336.297802][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 336.297957][ T23] usb 1-1: Product: syz [ 336.298097][ T23] usb 1-1: Manufacturer: syz [ 336.298235][ T23] usb 1-1: SerialNumber: syz [ 336.338091][ T23] usb 1-1: config 0 descriptor?? [ 336.594336][ T11] usb 1-1: USB disconnect, device number 2 [ 341.219914][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 341.220710][ T30] audit: type=1400 audit(340.680:391): avc: denied { prog_run } for pid=3725 comm="syz.0.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 351.882486][ T30] audit: type=1400 audit(351.320:392): avc: denied { getopt } for pid=3736 comm="syz.0.84" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 351.907378][ T30] audit: type=1400 audit(804.413:393): avc: denied { write } for pid=3736 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 354.807242][ T30] audit: type=1400 audit(807.343:394): avc: denied { create } for pid=3745 comm="syz.1.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 354.840079][ T30] audit: type=1400 audit(807.363:395): avc: denied { ioctl } for pid=3745 comm="syz.1.86" path="socket:[3791]" dev="sockfs" ino=3791 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 359.224839][ T30] audit: type=1400 audit(811.753:396): avc: denied { create } for pid=3751 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 359.576479][ T30] audit: type=1400 audit(812.033:397): avc: denied { write } for pid=3751 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 360.653552][ T30] audit: type=1400 audit(813.133:398): avc: denied { create } for pid=3758 comm="syz.0.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 360.678095][ T30] audit: type=1400 audit(813.163:399): avc: denied { getopt } for pid=3758 comm="syz.0.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 368.096813][ T30] audit: type=1400 audit(820.633:400): avc: denied { append } for pid=3775 comm="syz.0.95" name="dlm-control" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 368.107250][ T3778] dlm: no local IP address has been set [ 368.136100][ T3778] dlm: cannot start dlm midcomms -107 [ 368.742501][ T30] audit: type=1400 audit(821.273:401): avc: denied { bind } for pid=3770 comm="syz.1.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 368.749030][ T30] audit: type=1400 audit(821.283:402): avc: denied { name_bind } for pid=3770 comm="syz.1.93" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 368.774163][ T30] audit: type=1400 audit(821.303:403): avc: denied { node_bind } for pid=3770 comm="syz.1.93" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 368.895515][ T3780] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 368.910219][ T3780] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 384.945434][ T3803] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 384.955792][ T3803] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 389.557619][ T3812] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 389.562316][ T3812] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 406.920861][ T30] audit: type=1400 audit(859.453:404): avc: denied { ioctl } for pid=3826 comm="syz.0.110" path="socket:[3884]" dev="sockfs" ino=3884 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 406.924805][ T3827] syzkaller1: entered promiscuous mode [ 406.941852][ T3827] syzkaller1: entered allmulticast mode [ 407.032512][ T30] audit: type=1326 audit(859.553:405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.1.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb195a168 code=0x7fc00000 [ 407.033911][ T30] audit: type=1326 audit(859.553:406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.1.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffb195a168 code=0x7fc00000 [ 407.034398][ T30] audit: type=1326 audit(859.553:407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.1.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb195a168 code=0x7fc00000 [ 407.147929][ T30] audit: type=1326 audit(859.593:408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.1.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb195a168 code=0x7fc00000 [ 407.148566][ T30] audit: type=1326 audit(859.673:409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.1.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb195a168 code=0x7fc00000 [ 407.149028][ T30] audit: type=1326 audit(859.673:410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.1.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb195a168 code=0x7fc00000 [ 407.149400][ T30] audit: type=1326 audit(859.673:411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.1.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb195a168 code=0x7fc00000 [ 407.149734][ T30] audit: type=1326 audit(859.673:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.1.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb195a168 code=0x7fc00000 [ 407.150071][ T30] audit: type=1326 audit(859.673:413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3818 comm="syz.1.108" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb195a168 code=0x7fc00000 [ 413.068876][ T30] kauditd_printk_skb: 141 callbacks suppressed [ 413.080955][ T30] audit: type=1326 audit(865.603:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3859 comm="syz.0.123" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 413.095671][ T30] audit: type=1326 audit(865.603:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3859 comm="syz.0.123" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 413.100287][ T30] audit: type=1326 audit(865.613:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3859 comm="syz.0.123" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 413.105513][ T30] audit: type=1326 audit(865.613:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3859 comm="syz.0.123" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 413.110134][ T30] audit: type=1326 audit(865.613:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3859 comm="syz.0.123" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 413.116088][ T30] audit: type=1326 audit(865.613:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3859 comm="syz.0.123" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 413.124479][ T30] audit: type=1326 audit(865.613:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3859 comm="syz.0.123" exe="/syz-executor" sig=0 arch=c00000b7 syscall=108 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 413.129693][ T30] audit: type=1326 audit(865.613:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3859 comm="syz.0.123" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 413.496716][ T30] audit: type=1400 audit(866.033:563): avc: denied { kexec_image_load } for pid=3862 comm="syz.0.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 416.953659][ T23] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 417.184928][ T23] usb 1-1: Using ep0 maxpacket: 8 [ 418.317793][ T23] usb 1-1: config index 0 descriptor too short (expected 3090, got 18) [ 418.320374][ T23] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 418.326417][ T23] usb 1-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 421.395169][ T23] usb 1-1: New USB device found, idVendor=0485, idProduct=3003, bcdDevice=3a.b2 [ 421.397656][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 421.406094][ T23] usb 1-1: Product: syz [ 421.416861][ T23] usb 1-1: Manufacturer: syz [ 421.420635][ T23] usb 1-1: SerialNumber: syz [ 421.559795][ T23] usb 1-1: config 0 descriptor?? [ 423.189374][ T23] usb 1-1: USB disconnect, device number 3 [ 425.141771][ T3886] netlink: 36 bytes leftover after parsing attributes in process `syz.0.133'. [ 425.450898][ T30] audit: type=1400 audit(877.983:564): avc: denied { read write } for pid=3887 comm="syz.0.134" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 425.455690][ T30] audit: type=1400 audit(877.993:565): avc: denied { open } for pid=3887 comm="syz.0.134" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 425.510812][ T30] audit: type=1400 audit(878.043:566): avc: denied { mounton } for pid=3887 comm="syz.0.134" path="/74/file0" dev="tmpfs" ino=393 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 425.532009][ T3888] fuse: Bad value for 'fd' [ 426.095829][ T30] audit: type=1400 audit(878.633:567): avc: denied { unmount } for pid=3887 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 441.379248][ T30] audit: type=1400 audit(893.803:568): avc: denied { create } for pid=3899 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 441.383654][ T30] audit: type=1400 audit(893.843:569): avc: denied { setopt } for pid=3899 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 441.391692][ T30] audit: type=1400 audit(893.893:570): avc: denied { bind } for pid=3899 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 441.405099][ T30] audit: type=1400 audit(893.943:571): avc: denied { listen } for pid=3899 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 441.452433][ T30] audit: type=1400 audit(893.983:572): avc: denied { connect } for pid=3899 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 442.414850][ T30] audit: type=1400 audit(894.033:573): avc: denied { write } for pid=3899 comm="syz.0.137" path="socket:[4080]" dev="sockfs" ino=4080 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 462.210882][ T3914] fuse: Unknown parameter '00000000000000000003' [ 466.188580][ T30] audit: type=1326 audit(918.723:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3927 comm="syz.0.144" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 466.190466][ T30] audit: type=1326 audit(918.723:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3927 comm="syz.0.144" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 466.208004][ T30] audit: type=1326 audit(918.743:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3927 comm="syz.0.144" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 466.216855][ T30] audit: type=1326 audit(918.753:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3927 comm="syz.0.144" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 466.219737][ T30] audit: type=1326 audit(918.753:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3927 comm="syz.0.144" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 466.437613][ T3932] fuse: Unknown parameter '00000000000000000003' [ 469.494434][ T30] audit: type=1400 audit(921.913:579): avc: denied { bind } for pid=3942 comm="syz.0.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 469.495097][ T30] audit: type=1400 audit(921.923:580): avc: denied { setopt } for pid=3942 comm="syz.0.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 472.564527][ T3953] fuse: Unknown parameter '00000000000000000003' [ 477.260211][ T30] audit: type=1400 audit(929.793:581): avc: denied { wake_alarm } for pid=3955 comm="syz.0.151" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 480.182178][ T3959] netlink: 60 bytes leftover after parsing attributes in process `syz.0.152'. [ 480.714767][ T30] audit: type=1326 audit(933.223:582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 480.716134][ T30] audit: type=1326 audit(933.243:583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 480.769069][ T30] audit: type=1326 audit(933.303:584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 480.789235][ T30] audit: type=1326 audit(933.313:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 480.794181][ T30] audit: type=1326 audit(933.313:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 480.809438][ T30] audit: type=1326 audit(933.343:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=208 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 480.824888][ T30] audit: type=1326 audit(933.343:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 480.830629][ T30] audit: type=1326 audit(933.353:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 480.839891][ T30] audit: type=1326 audit(933.373:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=285 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 484.415078][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 484.415740][ T30] audit: type=1326 audit(936.953:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 484.416155][ T30] audit: type=1326 audit(936.953:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 484.440166][ T30] audit: type=1326 audit(936.973:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=210 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 484.455796][ T30] audit: type=1326 audit(936.993:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 484.463562][ T30] audit: type=1326 audit(936.993:611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.153" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x7ffc0000 [ 485.246881][ T3966] fuse: Unknown parameter '00000000000000000003' [ 488.147311][ T3979] fuse: Unknown parameter '00000000000000000003' [ 489.539506][ T3983] netlink: 40 bytes leftover after parsing attributes in process `syz.0.161'. [ 493.678478][ T3992] fuse: Unknown parameter '00000000000000000003' [ 496.174719][ T3997] netlink: 4 bytes leftover after parsing attributes in process `syz.0.167'. [ 496.961315][ T30] audit: type=1400 audit(949.493:612): avc: denied { listen } for pid=4000 comm="syz.0.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 497.315502][ T4005] fuse: Unknown parameter 'fd00000000000000000003' [ 499.765488][ T4019] fuse: Unknown parameter 'fd00000000000000000003' [ 501.956299][ T30] audit: type=1400 audit(954.493:613): avc: denied { create } for pid=4029 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 501.988333][ T30] audit: type=1400 audit(954.523:614): avc: denied { bind } for pid=4029 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 502.001995][ T30] audit: type=1400 audit(954.523:615): avc: denied { setopt } for pid=4029 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 502.029479][ T4031] trusted_key: syz.1.182 sent an empty control message without MSG_MORE. [ 502.034166][ T30] audit: type=1400 audit(954.563:616): avc: denied { accept } for pid=4029 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 502.034639][ T30] audit: type=1400 audit(954.563:617): avc: denied { write } for pid=4029 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 502.042333][ T30] audit: type=1400 audit(954.573:618): avc: denied { read } for pid=4029 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 502.448456][ T4037] fuse: Unknown parameter 'fd00000000000000000003' [ 511.987059][ T30] audit: type=1400 audit(964.153:619): avc: denied { getopt } for pid=4072 comm="syz.1.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 528.151095][ T30] audit: type=1400 audit(979.693:620): avc: denied { create } for pid=4092 comm="syz.0.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 528.780772][ T30] audit: type=1400 audit(980.913:621): avc: denied { write } for pid=4092 comm="syz.0.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 529.357488][ T4097] infiniband syz1: set active [ 529.358417][ T4097] infiniband syz1: added bond0 [ 529.874719][ T4097] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 529.894300][ T4097] infiniband syz1: Couldn't open port 1 [ 530.845886][ T4097] RDS/IB: syz1: added [ 530.849755][ T4097] smc: adding ib device syz1 with port count 1 [ 530.851087][ T4097] smc: ib device syz1 port 1 has pnetid [ 536.371294][ T30] audit: type=1400 audit(988.903:622): avc: denied { name_bind } for pid=4113 comm="syz.0.206" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 540.194191][ T30] audit: type=1400 audit(992.733:623): avc: denied { bind } for pid=4126 comm="syz.1.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 540.197015][ T30] audit: type=1400 audit(992.733:624): avc: denied { name_bind } for pid=4126 comm="syz.1.211" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 540.206306][ T30] audit: type=1400 audit(992.743:625): avc: denied { node_bind } for pid=4126 comm="syz.1.211" saddr=::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 584.925551][ T30] audit: type=1400 audit(1037.443:626): avc: denied { ioctl } for pid=4212 comm="syz.0.242" path="socket:[5683]" dev="sockfs" ino=5683 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 647.046889][ T30] audit: type=1400 audit(1099.583:627): avc: denied { setopt } for pid=4311 comm="syz.0.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 674.487308][ T30] audit: type=1400 audit(1126.983:628): avc: denied { create } for pid=4345 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 674.545787][ T30] audit: type=1400 audit(1126.983:629): avc: denied { bind } for pid=4345 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 674.583874][ T30] audit: type=1400 audit(1126.993:630): avc: denied { setopt } for pid=4345 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 680.418800][ T30] audit: type=1400 audit(1132.933:631): avc: denied { bind } for pid=4354 comm="syz.1.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 687.397323][ T30] audit: type=1400 audit(1139.933:632): avc: denied { setopt } for pid=4364 comm="syz.0.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 688.260650][ T30] audit: type=1400 audit(1140.793:633): avc: denied { ioctl } for pid=4369 comm="syz.0.292" path="socket:[5869]" dev="sockfs" ino=5869 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 688.789776][ T30] audit: type=1400 audit(1141.323:634): avc: denied { connect } for pid=4369 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 688.811538][ T30] audit: type=1400 audit(1141.343:635): avc: denied { write } for pid=4369 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 708.413911][ T30] audit: type=1326 audit(1160.943:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4428 comm="syz.0.306" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bd5a168 code=0x0 [ 712.905349][ T30] audit: type=1400 audit(1165.443:637): avc: denied { sqpoll } for pid=4449 comm="syz.1.311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 721.962589][ T30] audit: type=1400 audit(1174.493:638): avc: denied { setopt } for pid=4481 comm="syz.1.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 722.436525][ T4482] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 722.656120][ T4482] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 722.985810][ T4482] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 723.200868][ T4482] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 723.629023][ T4482] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 723.716302][ T4482] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 723.786409][ T4482] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 723.839226][ T4482] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 728.926049][ T30] audit: type=1400 audit(1181.463:639): avc: denied { read } for pid=4517 comm="syz.1.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 766.841935][ T4574] syz.1.354 uses obsolete (PF_INET,SOCK_PACKET) [ 779.777098][ T30] audit: type=1400 audit(1232.203:640): avc: denied { create } for pid=4601 comm="syz.0.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 779.794363][ T30] audit: type=1400 audit(1232.213:641): avc: denied { setopt } for pid=4601 comm="syz.0.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 779.815639][ T30] audit: type=1400 audit(1232.233:642): avc: denied { map } for pid=4601 comm="syz.0.362" path="socket:[7171]" dev="sockfs" ino=7171 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 779.833845][ T30] audit: type=1400 audit(1232.233:643): avc: denied { read accept } for pid=4601 comm="syz.0.362" path="socket:[7171]" dev="sockfs" ino=7171 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 782.194089][ T30] audit: type=1400 audit(1234.723:644): avc: denied { mount } for pid=4605 comm="syz.1.363" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 795.219412][ T4621] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 804.018912][ T4636] dummy0: entered promiscuous mode [ 804.158196][ T4636] dummy0: left promiscuous mode [ 810.508160][ T30] audit: type=1400 audit(1262.603:645): avc: denied { connect } for pid=4641 comm="syz.0.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 811.466607][ T4656] xt_hashlimit: Unknown mode mask F0030000, kernel too old? [ 819.441255][ T30] audit: type=1400 audit(1271.653:646): avc: denied { create } for pid=4658 comm="syz.1.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 819.442507][ T30] audit: type=1400 audit(1271.673:647): avc: denied { write } for pid=4658 comm="syz.1.380" path="socket:[6593]" dev="sockfs" ino=6593 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 826.520171][ T4677] netlink: 3 bytes leftover after parsing attributes in process `syz.1.387'. [ 826.705809][ T4677] netlink: 3 bytes leftover after parsing attributes in process `syz.1.387'. [ 836.905920][ T4705] lo speed is unknown, defaulting to 1000 [ 836.909838][ T4705] lo speed is unknown, defaulting to 1000 [ 836.925861][ T4705] lo speed is unknown, defaulting to 1000 [ 836.955366][ T4705] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 836.985668][ T4705] [ 836.987804][ T4705] ====================================================== [ 836.988385][ T4705] WARNING: possible circular locking dependency detected [ 836.989665][ T4705] 6.15.0-rc1-syzkaller-00325-g7cdabafc0012 #0 Not tainted [ 836.990308][ T4705] ------------------------------------------------------ [ 836.991135][ T4705] syz.1.396/4705 is trying to acquire lock: [ 836.992132][ T4705] ffff000020489d58 (sk_lock-AF_INET6){+.+.}-{0:0}, at: sock_set_reuseaddr+0x1c/0x70 [ 836.994891][ T4705] [ 836.994891][ T4705] but task is already holding lock: [ 836.995536][ T4705] ffff8000883721e8 (lock#5){+.+.}-{4:4}, at: cma_add_one+0x4b0/0xb04 [ 836.996740][ T4705] [ 836.996740][ T4705] which lock already depends on the new lock. [ 836.996740][ T4705] [ 836.997431][ T4705] [ 836.997431][ T4705] the existing dependency chain (in reverse order) is: [ 836.998127][ T4705] [ 836.998127][ T4705] -> #3 (lock#5){+.+.}-{4:4}: [ 836.999346][ T4705] __mutex_lock+0x144/0x9d8 [ 836.999890][ T4705] mutex_lock_nested+0x24/0x30 [ 837.000432][ T4705] cma_init+0x30/0x104 [ 837.000923][ T4705] do_one_initcall+0x130/0x7f0 [ 837.001524][ T4705] kernel_init_freeable+0x488/0x6f0 [ 837.002018][ T4705] kernel_init+0x24/0x1e0 [ 837.002483][ T4705] ret_from_fork+0x10/0x20 [ 837.003272][ T4705] [ 837.003272][ T4705] -> #2 (rtnl_mutex){+.+.}-{4:4}: [ 837.004293][ T4705] __mutex_lock+0x144/0x9d8 [ 837.004881][ T4705] mutex_lock_nested+0x24/0x30 [ 837.005523][ T4705] rtnl_lock+0x1c/0x28 [ 837.006148][ T4705] ip_mroute_setsockopt+0xd4/0xe44 [ 837.006851][ T4705] do_ip_setsockopt+0x1e0/0x2354 [ 837.007585][ T4705] ip_setsockopt+0x34/0x9c [ 837.008272][ T4705] ipv6_setsockopt+0xf4/0x114 [ 837.008849][ T4705] tcp_setsockopt+0x90/0xcc [ 837.009412][ T4705] sock_common_setsockopt+0x70/0xe0 [ 837.010071][ T4705] smc_setsockopt+0x14c/0x9ac [ 837.010664][ T4705] do_sock_setsockopt+0x17c/0x354 [ 837.011305][ T4705] __sys_setsockopt+0xcc/0x144 [ 837.011993][ T4705] __arm64_sys_setsockopt+0xa4/0x100 [ 837.012696][ T4705] invoke_syscall+0x6c/0x258 [ 837.013228][ T4705] el0_svc_common.constprop.0+0xac/0x230 [ 837.014010][ T4705] do_el0_svc+0x40/0x58 [ 837.014608][ T4705] el0_svc+0x50/0x180 [ 837.015166][ T4705] el0t_64_sync_handler+0x10c/0x138 [ 837.015743][ T4705] el0t_64_sync+0x198/0x19c [ 837.016367][ T4705] [ 837.016367][ T4705] -> #1 (&smc->clcsock_release_lock){+.+.}-{4:4}: [ 837.017483][ T4705] __mutex_lock+0x144/0x9d8 [ 837.018020][ T4705] mutex_lock_nested+0x24/0x30 [ 837.018794][ T4705] smc_switch_to_fallback+0x34/0x804 [ 837.019285][ T4705] smc_sendmsg+0xe4/0x8f8 [ 837.019786][ T4705] __sock_sendmsg+0xc8/0x168 [ 837.020265][ T4705] __sys_sendto+0x1d8/0x26c [ 837.020739][ T4705] __arm64_sys_sendto+0xc0/0x134 [ 837.021236][ T4705] invoke_syscall+0x6c/0x258 [ 837.021729][ T4705] el0_svc_common.constprop.0+0xac/0x230 [ 837.022211][ T4705] do_el0_svc+0x40/0x58 [ 837.022715][ T4705] el0_svc+0x50/0x180 [ 837.023135][ T4705] el0t_64_sync_handler+0x10c/0x138 [ 837.023712][ T4705] el0t_64_sync+0x198/0x19c [ 837.024173][ T4705] [ 837.024173][ T4705] -> #0 (sk_lock-AF_INET6){+.+.}-{0:0}: [ 837.025187][ T4705] __lock_acquire+0x15f4/0x2314 [ 837.025720][ T4705] lock_acquire+0x310/0x38c [ 837.026171][ T4705] lock_sock_nested+0x38/0xe8 [ 837.026635][ T4705] sock_set_reuseaddr+0x1c/0x70 [ 837.027199][ T4705] siw_create_listen+0x114/0xed0 [ 837.027688][ T4705] iw_cm_listen+0x124/0x190 [ 837.028226][ T4705] rdma_listen+0x4c0/0x8a4 [ 837.028722][ T4705] cma_listen_on_dev+0x394/0x628 [ 837.029223][ T4705] cma_add_one+0x574/0xb04 [ 837.029737][ T4705] add_client_context+0x2c0/0x424 [ 837.030289][ T4705] enable_device_and_get+0x18c/0x300 [ 837.030802][ T4705] ib_register_device+0x5e8/0xa48 [ 837.031317][ T4705] siw_newlink+0x960/0xbf8 [ 837.031793][ T4705] nldev_newlink+0x280/0x4b4 [ 837.032275][ T4705] rdma_nl_rcv_msg+0x274/0x56c [ 837.032826][ T4705] rdma_nl_rcv_skb.constprop.0.isra.0+0x204/0x340 [ 837.033478][ T4705] rdma_nl_rcv+0x10/0x1c [ 837.033744][ T4705] netlink_unicast+0x3c0/0x670 [ 837.033991][ T4705] netlink_sendmsg+0x658/0xa50 [ 837.034249][ T4705] __sock_sendmsg+0xc8/0x168 [ 837.034468][ T4705] ____sys_sendmsg+0x51c/0x734 [ 837.034699][ T4705] ___sys_sendmsg+0x11c/0x19c [ 837.034929][ T4705] __sys_sendmsg+0x114/0x198 [ 837.035185][ T4705] __arm64_sys_sendmsg+0x70/0xa0 [ 837.035416][ T4705] invoke_syscall+0x6c/0x258 [ 837.035662][ T4705] el0_svc_common.constprop.0+0xac/0x230 [ 837.035960][ T4705] do_el0_svc+0x40/0x58 [ 837.036162][ T4705] el0_svc+0x50/0x180 [ 837.036363][ T4705] el0t_64_sync_handler+0x10c/0x138 [ 837.036598][ T4705] el0t_64_sync+0x198/0x19c [ 837.036853][ T4705] [ 837.036853][ T4705] other info that might help us debug this: [ 837.036853][ T4705] [ 837.037239][ T4705] Chain exists of: [ 837.037239][ T4705] sk_lock-AF_INET6 --> rtnl_mutex --> lock#5 [ 837.037239][ T4705] [ 837.038069][ T4705] Possible unsafe locking scenario: [ 837.038069][ T4705] [ 837.038318][ T4705] CPU0 CPU1 [ 837.038541][ T4705] ---- ---- [ 837.038801][ T4705] lock(lock#5); [ 837.039153][ T4705] lock(rtnl_mutex); [ 837.039551][ T4705] lock(lock#5); [ 837.040016][ T4705] lock(sk_lock-AF_INET6); [ 837.040326][ T4705] [ 837.040326][ T4705] *** DEADLOCK *** [ 837.040326][ T4705] [ 837.040683][ T4705] 6 locks held by syz.1.396/4705: [ 837.040925][ T4705] #0: ffff80008d3838b8 (&rdma_nl_types[idx].sem){.+.+}-{4:4}, at: rdma_nl_rcv_msg+0x130/0x56c [ 837.041683][ T4705] #1: ffff80008835a730 (link_ops_rwsem){++++}-{4:4}, at: nldev_newlink+0x204/0x4b4 [ 837.042305][ T4705] #2: ffff8000883452f0 (devices_rwsem){++++}-{4:4}, at: enable_device_and_get+0xfc/0x300 [ 837.043060][ T4705] #3: ffff8000883453b0 (clients_rwsem){++++}-{4:4}, at: enable_device_and_get+0x140/0x300 [ 837.043732][ T4705] #4: ffff00001f5c45f0 (&device->client_data_rwsem){++++}-{4:4}, at: add_client_context+0x298/0x424 [ 837.044368][ T4705] #5: ffff8000883721e8 (lock#5){+.+.}-{4:4}, at: cma_add_one+0x4b0/0xb04 [ 837.045038][ T4705] [ 837.045038][ T4705] stack backtrace: [ 837.045714][ T4705] CPU: 0 UID: 0 PID: 4705 Comm: syz.1.396 Not tainted 6.15.0-rc1-syzkaller-00325-g7cdabafc0012 #0 PREEMPT [ 837.046214][ T4705] Hardware name: linux,dummy-virt (DT) [ 837.046727][ T4705] Call trace: [ 837.047021][ T4705] show_stack+0x18/0x24 (C) [ 837.047319][ T4705] dump_stack_lvl+0xa4/0xf4 [ 837.047548][ T4705] dump_stack+0x1c/0x28 [ 837.047751][ T4705] print_circular_bug+0x28c/0x370 [ 837.048035][ T4705] check_noncircular+0x168/0x17c [ 837.048226][ T4705] __lock_acquire+0x15f4/0x2314 [ 837.048453][ T4705] lock_acquire+0x310/0x38c [ 837.048680][ T4705] lock_sock_nested+0x38/0xe8 [ 837.048901][ T4705] sock_set_reuseaddr+0x1c/0x70 [ 837.049097][ T4705] siw_create_listen+0x114/0xed0 [ 837.049357][ T4705] iw_cm_listen+0x124/0x190 [ 837.049555][ T4705] rdma_listen+0x4c0/0x8a4 [ 837.049753][ T4705] cma_listen_on_dev+0x394/0x628 [ 837.049965][ T4705] cma_add_one+0x574/0xb04 [ 837.050151][ T4705] add_client_context+0x2c0/0x424 [ 837.050358][ T4705] enable_device_and_get+0x18c/0x300 [ 837.050581][ T4705] ib_register_device+0x5e8/0xa48 [ 837.050807][ T4705] siw_newlink+0x960/0xbf8 [ 837.051072][ T4705] nldev_newlink+0x280/0x4b4 [ 837.051261][ T4705] rdma_nl_rcv_msg+0x274/0x56c [ 837.051500][ T4705] rdma_nl_rcv_skb.constprop.0.isra.0+0x204/0x340 [ 837.051809][ T4705] rdma_nl_rcv+0x10/0x1c [ 837.052037][ T4705] netlink_unicast+0x3c0/0x670 [ 837.052345][ T4705] netlink_sendmsg+0x658/0xa50 [ 837.052571][ T4705] __sock_sendmsg+0xc8/0x168 [ 837.052801][ T4705] ____sys_sendmsg+0x51c/0x734 [ 837.053047][ T4705] ___sys_sendmsg+0x11c/0x19c [ 837.053387][ T4705] __sys_sendmsg+0x114/0x198 [ 837.053583][ T4705] __arm64_sys_sendmsg+0x70/0xa0 [ 837.053810][ T4705] invoke_syscall+0x6c/0x258 [ 837.053984][ T4705] el0_svc_common.constprop.0+0xac/0x230 [ 837.054176][ T4705] do_el0_svc+0x40/0x58 [ 837.054395][ T4705] el0_svc+0x50/0x180 [ 837.054563][ T4705] el0t_64_sync_handler+0x10c/0x138 [ 837.054800][ T4705] el0t_64_sync+0x198/0x19c [ 837.065134][ T4705] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 837.156269][ T4705] lo speed is unknown, defaulting to 1000 [ 837.170707][ T4705] lo speed is unknown, defaulting to 1000 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 841.421591][ T452] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 841.529200][ T452] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 841.659070][ T452] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 841.724894][ T452] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 842.064293][ T30] audit: type=1400 audit(1294.593:648): avc: denied { read } for pid=3153 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 844.466296][ T452] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 844.548734][ T452] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 844.629148][ T452] bond0 (unregistering): Released all slaves [ 845.807959][ T452] hsr_slave_0: left promiscuous mode [ 845.817103][ T452] hsr_slave_1: left promiscuous mode [ 845.854878][ T452] veth1_macvtap: left promiscuous mode [ 845.856111][ T452] veth0_macvtap: left promiscuous mode [ 845.857382][ T452] veth1_vlan: left promiscuous mode [ 845.864429][ T452] veth0_vlan: left promiscuous mode [ 851.779139][ T912] lo speed is unknown, defaulting to 1000 [ 851.780187][ T912] syz0: Port: 1 Link DOWN VM DIAGNOSIS: 18:27:07 Registers: info registers vcpu 0 CPU#0 PC=ffff800085460c9c X00=00000000000000c0 X01=0000000000000001 X02=0000000000000001 X03=ffff800080318280 X04=ffff700010f3cdc1 X05=ffff8000879e6e00 X06=ffff700010f3cdc0 X07=0000000000000001 X08=ffff8000879e6e00 X09=dfff800000000000 X10=ffff700010f3cdc0 X11=1ffff00010f3cdc0 X12=ffff700010f3cdc1 X13=205d353037345420 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000384 X19=00000000000000c0 X20=ffff8000879e6e00 X21=ffff8000a0296190 X22=1fffe00001d40a5b X23=0000000000000001 X24=1fffe00001d40a5a X25=ffff00000ea052d0 X26=ffff00000ea052d8 X27=ffff00000ea05080 X28=ffff8000a0296190 X29=ffff8000a0295f00 X30=ffff800085460c8c SP=ffff8000a0295f00 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffc5949790:e359bf6c9316c500 Q02=0000ffffc5949770:ffffff80ffffffd8 Q03=0000ffffc5949820:0000ffffc5949820 Q04=0000ffffc5949820:0000ffffb1936248 Q05=0000ffffc59497f0:0000ffffc5949820 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc5949a40:0000ffffc5949a40 Q17=ffffff80ffffffd0:0000ffffc5949a10 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085442634 X00=ffff800085442630 X01=0000000000000000 X02=0000000000000000 X03=1fffe00002698b59 X04=1fffe00002698b59 X05=ffff8000a0ab7420 X06=ffff700014156e84 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700014156e84 X11=1ffff00014156e84 X12=ffff700014156e85 X13=ffff00001c659348 X14=ffff00006a0c85b0 X15=00000000200a5b00 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff8000872d0730 X20=ffff0000134c5ac0 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff8000872d0700 X25=0000000000000000 X26=0000000000000004 X27=ffff8000872d0730 X28=1fffe0000d41bb5e X29=ffff8000a0ab7390 X30=ffff8000804282b4 SP=ffff8000a0ab7390 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0100000000000000:0100000000000000 Q01=0000000100000000:0000000000000000 Q02=0000000000000001:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000001:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff680c410:0000fffff680c410 Q17=ffffff80ffffffd0:0000fffff680c3e0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000