last executing test programs: 5.82412427s ago: executing program 1 (id=1000): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x48810}, 0x4000880) 5.053591869s ago: executing program 1 (id=1001): r0 = socket$can_raw(0x1d, 0x3, 0x1) fadvise64(r0, 0x0, 0x83, 0x5) 4.993064033s ago: executing program 0 (id=1006): r0 = fanotify_init(0x1, 0x0) ioctl$BLKTRACESETUP(r0, 0x5450, 0x0) 4.161286416s ago: executing program 0 (id=1003): r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, 0x0, 0x10) 4.160834666s ago: executing program 1 (id=1004): r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGSID(r0, 0x541b, &(0x7f00000067c0)) 3.14084138s ago: executing program 0 (id=1005): pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) write$rfkill(r0, 0x0, 0x0) 2.19882365s ago: executing program 0 (id=1007): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'ip_vti0\x00', 0x7}) 2.169343142s ago: executing program 1 (id=1008): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x14, 0x0, 0x1, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x50}, 0x804) 1.439851789s ago: executing program 1 (id=1009): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$eventfd(r0, 0x0, 0x0) 1.081235471s ago: executing program 0 (id=1010): r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$FS_IOC_GETFSMAP(r0, 0x5451, 0x0) 363.299067ms ago: executing program 1 (id=1011): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5450, 0x0) 0s ago: executing program 0 (id=1012): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDCTL_MIDI_INFO(r0, 0x5402, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:58689' (ED25519) to the list of known hosts. [ 316.801801][ T30] audit: type=1400 audit(316.050:46): avc: denied { name_bind } for pid=3324 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 317.369593][ T30] audit: type=1400 audit(316.610:47): avc: denied { execute } for pid=3325 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 317.383030][ T30] audit: type=1400 audit(316.630:48): avc: denied { execute_no_trans } for pid=3325 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 328.071939][ T30] audit: type=1400 audit(327.320:49): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 328.141210][ T30] audit: type=1400 audit(327.390:50): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 328.188713][ T3325] cgroup: Unknown subsys name 'net' [ 328.265988][ T30] audit: type=1400 audit(327.510:51): avc: denied { unmount } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 328.662257][ T3325] cgroup: Unknown subsys name 'cpuset' [ 328.729820][ T3325] cgroup: Unknown subsys name 'rlimit' [ 329.145336][ T30] audit: type=1400 audit(328.390:52): avc: denied { setattr } for pid=3325 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 329.153018][ T30] audit: type=1400 audit(328.390:53): avc: denied { mounton } for pid=3325 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 329.164090][ T30] audit: type=1400 audit(328.400:54): avc: denied { mount } for pid=3325 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 330.003849][ T3329] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 330.015415][ T30] audit: type=1400 audit(329.260:55): avc: denied { relabelto } for pid=3329 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 330.034723][ T30] audit: type=1400 audit(329.270:56): avc: denied { write } for pid=3329 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 330.173479][ T30] audit: type=1400 audit(329.420:57): avc: denied { read } for pid=3325 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 330.181711][ T30] audit: type=1400 audit(329.420:58): avc: denied { open } for pid=3325 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 330.201866][ T3325] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 381.533510][ T30] audit: type=1400 audit(380.780:59): avc: denied { execmem } for pid=3330 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 381.649672][ T30] audit: type=1400 audit(380.890:60): avc: denied { read } for pid=3332 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 381.676211][ T30] audit: type=1400 audit(380.920:61): avc: denied { open } for pid=3332 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 381.734125][ T30] audit: type=1400 audit(380.980:62): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 381.851440][ T30] audit: type=1400 audit(381.100:63): avc: denied { module_request } for pid=3332 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 382.332686][ T30] audit: type=1400 audit(381.580:64): avc: denied { sys_module } for pid=3332 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 394.000745][ T3333] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 394.236182][ T3333] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 394.621683][ T3332] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 394.845324][ T3332] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 400.239225][ T3333] hsr_slave_0: entered promiscuous mode [ 400.254144][ T3333] hsr_slave_1: entered promiscuous mode [ 400.942025][ T3332] hsr_slave_0: entered promiscuous mode [ 400.955161][ T3332] hsr_slave_1: entered promiscuous mode [ 400.969659][ T3332] debugfs: 'hsr0' already exists in 'hsr' [ 400.973947][ T3332] Cannot create hsr debugfs directory [ 404.373845][ T30] audit: type=1400 audit(403.620:65): avc: denied { create } for pid=3333 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 404.394334][ T30] audit: type=1400 audit(403.640:66): avc: denied { write } for pid=3333 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 404.438708][ T30] audit: type=1400 audit(403.680:67): avc: denied { read } for pid=3333 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 404.533304][ T3333] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 404.714701][ T3333] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 404.926008][ T3333] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 404.981869][ T3333] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 405.832937][ T3332] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 405.940156][ T3332] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 406.077482][ T3332] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 406.195329][ T3332] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 410.843234][ T3333] 8021q: adding VLAN 0 to HW filter on device bond0 [ 413.052331][ T3332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 432.643240][ T3333] veth0_vlan: entered promiscuous mode [ 433.061990][ T3333] veth1_vlan: entered promiscuous mode [ 433.880745][ T3333] veth0_macvtap: entered promiscuous mode [ 434.002047][ T3333] veth1_macvtap: entered promiscuous mode [ 434.939471][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 434.943649][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 434.944182][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 434.944594][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 436.002177][ T30] audit: type=1400 audit(435.220:68): avc: denied { mounton } for pid=3333 comm="syz-executor" path="/syzkaller.Bj0Cy1/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 436.114526][ T30] audit: type=1400 audit(435.360:69): avc: denied { mount } for pid=3333 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 436.249974][ T30] audit: type=1400 audit(435.490:70): avc: denied { mounton } for pid=3333 comm="syz-executor" path="/syzkaller.Bj0Cy1/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 436.300744][ T30] audit: type=1400 audit(435.540:71): avc: denied { mount } for pid=3333 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 436.362653][ T30] audit: type=1400 audit(435.610:72): avc: denied { mounton } for pid=3333 comm="syz-executor" path="/syzkaller.Bj0Cy1/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 436.393775][ T30] audit: type=1400 audit(435.640:73): avc: denied { mounton } for pid=3333 comm="syz-executor" path="/syzkaller.Bj0Cy1/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 436.500957][ T30] audit: type=1400 audit(435.750:74): avc: denied { unmount } for pid=3333 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 436.549098][ T30] audit: type=1400 audit(435.790:75): avc: denied { mounton } for pid=3333 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 436.570790][ T30] audit: type=1400 audit(435.820:76): avc: denied { mount } for pid=3333 comm="syz-executor" name="/" dev="gadgetfs" ino=3834 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 436.626202][ T30] audit: type=1400 audit(435.870:77): avc: denied { mount } for pid=3333 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 436.966326][ T3332] veth0_vlan: entered promiscuous mode [ 437.072163][ T3333] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 437.306439][ T3332] veth1_vlan: entered promiscuous mode [ 438.287935][ T3332] veth0_macvtap: entered promiscuous mode [ 438.665895][ T3332] veth1_macvtap: entered promiscuous mode [ 439.955632][ T3424] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.962405][ T3424] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 440.000780][ T116] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 440.003123][ T116] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.729650][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 445.745841][ T30] audit: type=1400 audit(444.960:83): avc: denied { bpf } for pid=3488 comm="syz.0.1" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 462.094814][ T30] audit: type=1400 audit(461.340:84): avc: denied { search } for pid=3550 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 462.133928][ T30] audit: type=1400 audit(461.370:85): avc: denied { search } for pid=3550 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=330 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 462.165275][ T30] audit: type=1400 audit(461.410:86): avc: denied { search } for pid=3550 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=483 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 462.191080][ T30] audit: type=1400 audit(461.410:87): avc: denied { search } for pid=3550 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 462.289809][ T30] audit: type=1400 audit(461.540:88): avc: denied { read open } for pid=3555 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 462.299356][ T30] audit: type=1400 audit(461.550:89): avc: denied { getattr } for pid=3555 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=484 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 462.780259][ T30] audit: type=1400 audit(462.020:90): avc: denied { add_name } for pid=3550 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 466.879555][ T30] audit: type=1400 audit(466.120:91): avc: denied { remove_name } for pid=3561 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1000 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 469.712582][ T30] audit: type=1400 audit(468.960:92): avc: denied { create } for pid=3575 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 469.735303][ T3577] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 469.858795][ T30] audit: type=1400 audit(469.100:93): avc: denied { setopt } for pid=3575 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 474.068811][ T30] audit: type=1400 audit(473.310:94): avc: denied { write } for pid=3593 comm="syz.0.51" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 474.164407][ T3594] usb usb1: usbfs: process 3594 (syz.0.51) did not claim interface 0 before use [ 486.055237][ T30] audit: type=1400 audit(485.290:95): avc: denied { read write } for pid=3333 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 486.072240][ T30] audit: type=1400 audit(485.300:96): avc: denied { open } for pid=3333 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 486.085328][ T30] audit: type=1400 audit(485.310:97): avc: denied { ioctl } for pid=3333 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 510.449276][ T30] audit: type=1400 audit(509.690:98): avc: denied { accept } for pid=3725 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 515.441108][ T30] audit: type=1400 audit(514.670:99): avc: denied { audit_write } for pid=3753 comm="syz.1.130" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 518.625327][ T30] audit: type=1400 audit(517.860:100): avc: denied { create } for pid=3768 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 524.446552][ T30] audit: type=1400 audit(523.690:101): avc: denied { create } for pid=3787 comm="syz.0.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 524.491089][ T30] audit: type=1400 audit(523.720:102): avc: denied { write } for pid=3787 comm="syz.0.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 526.882366][ T3797] Zero length message leads to an empty skb [ 530.280461][ T30] audit: type=1400 audit(529.520:103): avc: denied { read write } for pid=3810 comm="syz.0.158" name="udmabuf" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 530.299598][ T30] audit: type=1400 audit(529.540:104): avc: denied { open } for pid=3810 comm="syz.0.158" path="/dev/udmabuf" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 548.551508][ T30] audit: type=1400 audit(547.800:105): avc: denied { create } for pid=3873 comm="syz.0.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 556.499774][ T30] audit: type=1400 audit(555.740:106): avc: denied { create } for pid=3903 comm="syz.1.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 564.173383][ T30] audit: type=1400 audit(563.420:107): avc: denied { read } for pid=3928 comm="syz.1.217" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 564.222677][ T30] audit: type=1400 audit(563.420:108): avc: denied { open } for pid=3928 comm="syz.1.217" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 564.303575][ T30] audit: type=1400 audit(563.540:109): avc: denied { ioctl } for pid=3928 comm="syz.1.217" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x7007 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 570.473291][ T30] audit: type=1400 audit(569.720:110): avc: denied { create } for pid=3949 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 570.612132][ T30] audit: type=1400 audit(569.830:111): avc: denied { getopt } for pid=3949 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 576.186140][ T3971] capability: warning: `syz.0.238' uses deprecated v2 capabilities in a way that may be insecure [ 590.635915][ T4016] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 597.979310][ T30] audit: type=1400 audit(597.230:112): avc: denied { write } for pid=4040 comm="syz.1.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 598.435376][ T30] audit: type=1400 audit(597.660:113): avc: denied { setattr } for pid=4042 comm="syz.0.274" name="tty20" dev="devtmpfs" ino=39 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 602.217686][ T30] audit: type=1400 audit(601.460:114): avc: denied { create } for pid=4052 comm="syz.1.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 602.324130][ T30] audit: type=1400 audit(601.570:115): avc: denied { setopt } for pid=4052 comm="syz.1.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 613.971387][ T30] audit: type=1400 audit(613.220:116): avc: denied { lock } for pid=4097 comm="syz.1.302" path="socket:[5924]" dev="sockfs" ino=5924 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 618.330313][ T30] audit: type=1400 audit(617.570:117): avc: denied { create } for pid=4118 comm="syz.1.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 618.406253][ T30] audit: type=1400 audit(617.650:118): avc: denied { getopt } for pid=4118 comm="syz.1.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 619.261979][ T4121] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4121 comm=syz.0.313 [ 636.043847][ T30] audit: type=1400 audit(635.280:119): avc: denied { prog_load } for pid=4186 comm="syz.1.346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 636.078919][ T30] audit: type=1400 audit(635.320:120): avc: denied { perfmon } for pid=4186 comm="syz.1.346" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 636.378718][ T30] audit: type=1400 audit(635.620:121): avc: denied { prog_run } for pid=4186 comm="syz.1.346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 684.431664][ T30] audit: type=1400 audit(683.670:122): avc: denied { create } for pid=4346 comm="syz.0.425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 684.445275][ T30] audit: type=1400 audit(683.690:123): avc: denied { ioctl } for pid=4346 comm="syz.0.425" path="socket:[7307]" dev="sockfs" ino=7307 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 716.695081][ T30] audit: type=1400 audit(715.940:124): avc: denied { read } for pid=4475 comm="syz.0.489" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 716.738611][ T30] audit: type=1400 audit(715.970:125): avc: denied { open } for pid=4475 comm="syz.0.489" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 716.785374][ T30] audit: type=1400 audit(716.030:126): avc: denied { ioctl } for pid=4475 comm="syz.0.489" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4584 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 722.599647][ T4491] [U] ^@ [ 749.188618][ T30] audit: type=1400 audit(748.430:127): avc: denied { write } for pid=4592 comm="syz.0.548" name="packet" dev="proc" ino=4026532779 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 770.880036][ T4697] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 777.905811][ T30] audit: type=1400 audit(777.150:128): avc: denied { create } for pid=4722 comm="syz.0.609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 777.948467][ T30] audit: type=1400 audit(777.190:129): avc: denied { ioctl } for pid=4722 comm="syz.0.609" path="socket:[8296]" dev="sockfs" ino=8296 ioctlcmd=0x5518 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 808.265856][ T30] audit: type=1400 audit(807.510:130): avc: denied { read write } for pid=4849 comm="syz.1.673" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 808.309824][ T30] audit: type=1400 audit(807.550:131): avc: denied { open } for pid=4849 comm="syz.1.673" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 808.370683][ T30] audit: type=1400 audit(807.610:132): avc: denied { ioctl } for pid=4849 comm="syz.1.673" path="/dev/nullb0" dev="devtmpfs" ino=672 ioctlcmd=0x127d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 862.919362][ T5080] capability: warning: `syz.1.785' uses 32-bit capabilities (legacy support in use) [ 881.764331][ T30] audit: type=1400 audit(880.990:133): avc: denied { read write } for pid=5164 comm="syz.0.827" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 881.765798][ T30] audit: type=1400 audit(881.010:134): avc: denied { open } for pid=5164 comm="syz.0.827" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 883.088999][ T30] audit: type=1400 audit(882.330:135): avc: denied { ioctl } for pid=5170 comm="syz.1.831" path="socket:[9012]" dev="sockfs" ino=9012 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 888.751047][ T30] audit: type=1400 audit(888.000:136): avc: denied { setattr } for pid=5196 comm="syz.1.844" name="loop6" dev="devtmpfs" ino=644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 911.520709][ T30] audit: type=1400 audit(910.770:137): avc: denied { read } for pid=5285 comm="syz.1.887" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 911.559242][ T30] audit: type=1400 audit(910.780:138): avc: denied { open } for pid=5285 comm="syz.1.887" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 914.573824][ T30] audit: type=1400 audit(913.820:139): avc: denied { read append } for pid=5293 comm="syz.0.891" name="card0" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 914.609116][ T30] audit: type=1400 audit(913.850:140): avc: denied { open } for pid=5293 comm="syz.0.891" path="/dev/dri/card0" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 914.821025][ T30] audit: type=1400 audit(914.060:141): avc: denied { ioctl } for pid=5293 comm="syz.0.891" path="/dev/dri/card0" dev="devtmpfs" ino=618 ioctlcmd=0x64bc scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 917.821973][ T30] audit: type=1400 audit(917.060:142): avc: denied { setopt } for pid=5305 comm="syz.0.897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 929.344356][ T30] audit: type=1400 audit(928.590:143): avc: denied { map } for pid=5352 comm="syz.0.920" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 929.401303][ T30] audit: type=1400 audit(928.610:144): avc: denied { execute } for pid=5352 comm="syz.0.920" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 963.884295][ T30] audit: type=1400 audit(963.100:145): avc: denied { connect } for pid=5474 comm="syz.1.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 982.664111][ T5537] BUG: using __this_cpu_read() in preemptible [00000000] code: syz.0.1012/5537 [ 982.664829][ T5537] caller is __this_cpu_preempt_check+0x20/0x40 [ 982.667572][ T5537] CPU: 0 UID: 0 PID: 5537 Comm: syz.0.1012 Tainted: G L syzkaller #0 PREEMPT [ 982.667959][ T5537] Tainted: [L]=SOFTLOCKUP [ 982.668012][ T5537] Hardware name: linux,dummy-virt (DT) [ 982.668441][ T5537] Call trace: [ 982.668667][ T5537] show_stack+0x18/0x24 (C) [ 982.668885][ T5537] dump_stack_lvl+0x7c/0xb0 [ 982.668955][ T5537] dump_stack+0x1c/0x28 [ 982.669013][ T5537] check_preemption_disabled+0xe0/0xe8 [ 982.669077][ T5537] __this_cpu_preempt_check+0x20/0x40 [ 982.669139][ T5537] __delay+0x40/0x374 [ 982.669202][ T5537] __const_udelay+0x48/0x64 [ 982.669310][ T5537] snd_timer_close_locked+0x258/0x94c [ 982.669441][ T5537] snd_timer_close+0xa4/0x120 [ 982.669564][ T5537] snd_seq_timer_close+0x88/0xd0 [ 982.669686][ T5537] queue_delete+0x50/0xac [ 982.669829][ T5537] snd_seq_queue_delete+0x2c/0x58 [ 982.669947][ T5537] snd_seq_ioctl_delete_queue+0x6c/0xa0 [ 982.670062][ T5537] call_seq_client_ctl+0x94/0x120 [ 982.670178][ T5537] snd_seq_kernel_client_ctl+0x68/0x100 [ 982.670299][ T5537] delete_seq_queue.isra.0+0xbc/0x124 [ 982.670467][ T5537] snd_seq_oss_release+0x13c/0x1a0 [ 982.670587][ T5537] odev_release+0x4c/0x88 [ 982.670648][ T5537] __fput+0x2d0/0x958 [ 982.670723][ T5537] ____fput+0x14/0x20 [ 982.670779][ T5537] task_work_run+0x134/0x238 [ 982.670845][ T5537] exit_to_user_mode_loop+0x194/0x1c8 [ 982.670903][ T5537] el0_svc+0x258/0x29c [ 982.670962][ T5537] el0t_64_sync_handler+0xa0/0xe4 [ 982.671020][ T5537] el0t_64_sync+0x198/0x19c [ 982.672973][ T5537] BUG: using __this_cpu_read() in preemptible [00000000] code: syz.0.1012/5537 [ 982.673155][ T5537] caller is __this_cpu_preempt_check+0x20/0x40 [ 982.673318][ T5537] CPU: 0 UID: 0 PID: 5537 Comm: syz.0.1012 Tainted: G L syzkaller #0 PREEMPT [ 982.673388][ T5537] Tainted: [L]=SOFTLOCKUP [ 982.673416][ T5537] Hardware name: linux,dummy-virt (DT) [ 982.673447][ T5537] Call trace: [ 982.673473][ T5537] show_stack+0x18/0x24 (C) [ 982.673542][ T5537] dump_stack_lvl+0x7c/0xb0 [ 982.673601][ T5537] dump_stack+0x1c/0x28 [ 982.673801][ T5537] check_preemption_disabled+0xe0/0xe8 [ 982.673895][ T5537] __this_cpu_preempt_check+0x20/0x40 [ 982.673956][ T5537] __delay+0x10c/0x374 [ 982.674015][ T5537] __const_udelay+0x48/0x64 [ 982.674073][ T5537] snd_timer_close_locked+0x258/0x94c [ 982.674139][ T5537] snd_timer_close+0xa4/0x120 [ 982.674197][ T5537] snd_seq_timer_close+0x88/0xd0 [ 982.674257][ T5537] queue_delete+0x50/0xac [ 982.674319][ T5537] snd_seq_queue_delete+0x2c/0x58 [ 982.674435][ T5537] snd_seq_ioctl_delete_queue+0x6c/0xa0 [ 982.674506][ T5537] call_seq_client_ctl+0x94/0x120 [ 982.674562][ T5537] snd_seq_kernel_client_ctl+0x68/0x100 [ 982.674620][ T5537] delete_seq_queue.isra.0+0xbc/0x124 [ 982.674681][ T5537] snd_seq_oss_release+0x13c/0x1a0 [ 982.674753][ T5537] odev_release+0x4c/0x88 [ 982.674813][ T5537] __fput+0x2d0/0x958 [ 982.674872][ T5537] ____fput+0x14/0x20 [ 982.674926][ T5537] task_work_run+0x134/0x238 [ 982.674995][ T5537] exit_to_user_mode_loop+0x194/0x1c8 [ 982.675053][ T5537] el0_svc+0x258/0x29c [ 982.675114][ T5537] el0t_64_sync_handler+0xa0/0xe4 [ 982.675241][ T5537] el0t_64_sync+0x198/0x19c [ 982.675820][ T5537] BUG: using __this_cpu_read() in preemptible [00000000] code: syz.0.1012/5537 [ 982.675999][ T5537] caller is __this_cpu_preempt_check+0x20/0x40 [ 982.676228][ T5537] CPU: 0 UID: 0 PID: 5537 Comm: syz.0.1012 Tainted: G L syzkaller #0 PREEMPT [ 982.676329][ T5537] Tainted: [L]=SOFTLOCKUP [ 982.676378][ T5537] Hardware name: linux,dummy-virt (DT) [ 982.676408][ T5537] Call trace: [ 982.676588][ T5537] show_stack+0x18/0x24 (C) [ 982.676678][ T5537] dump_stack_lvl+0x7c/0xb0 [ 982.676747][ T5537] dump_stack+0x1c/0x28 [ 982.676803][ T5537] check_preemption_disabled+0xe0/0xe8 [ 982.676865][ T5537] __this_cpu_preempt_check+0x20/0x40 [ 982.676938][ T5537] __delay+0x19c/0x374 [ 982.677082][ T5537] __const_udelay+0x48/0x64 [ 982.677147][ T5537] snd_timer_close_locked+0x258/0x94c [ 982.677265][ T5537] snd_timer_close+0xa4/0x120 [ 982.677379][ T5537] snd_seq_timer_close+0x88/0xd0 [ 982.677508][ T5537] queue_delete+0x50/0xac [ 982.677568][ T5537] snd_seq_queue_delete+0x2c/0x58 [ 982.677624][ T5537] snd_seq_ioctl_delete_queue+0x6c/0xa0 [ 982.677680][ T5537] call_seq_client_ctl+0x94/0x120 [ 982.677743][ T5537] snd_seq_kernel_client_ctl+0x68/0x100 [ 982.677802][ T5537] delete_seq_queue.isra.0+0xbc/0x124 [ 982.678031][ T5537] snd_seq_oss_release+0x13c/0x1a0 [ 982.678103][ T5537] odev_release+0x4c/0x88 [ 982.678161][ T5537] __fput+0x2d0/0x958 [ 982.678221][ T5537] ____fput+0x14/0x20 [ 982.678330][ T5537] task_work_run+0x134/0x238 [ 982.678440][ T5537] exit_to_user_mode_loop+0x194/0x1c8 [ 982.678508][ T5537] el0_svc+0x258/0x29c [ 982.678566][ T5537] el0t_64_sync_handler+0xa0/0xe4 [ 982.678623][ T5537] el0t_64_sync+0x198/0x19c SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 986.768498][ T3343] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 987.203695][ T3343] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 987.436290][ T3343] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 987.783171][ T3343] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 988.731915][ T30] audit: type=1400 audit(987.980:146): avc: denied { read } for pid=3175 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 991.514432][ T3343] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 991.609850][ T3343] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 991.666290][ T3343] bond0 (unregistering): Released all slaves [ 992.174328][ T3343] hsr_slave_0: left promiscuous mode [ 992.200854][ T3343] hsr_slave_1: left promiscuous mode [ 992.349474][ T3343] veth1_macvtap: left promiscuous mode [ 992.351115][ T3343] veth0_macvtap: left promiscuous mode [ 992.352384][ T3343] veth1_vlan: left promiscuous mode [ 992.353755][ T3343] veth0_vlan: left promiscuous mode [ 1000.050286][ T3343] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1000.461490][ T3343] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1000.894330][ T3343] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1001.284037][ T3343] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1005.572438][ T3343] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1005.659027][ T3343] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1005.739147][ T3343] bond0 (unregistering): Released all slaves [ 1006.224639][ T3343] hsr_slave_0: left promiscuous mode [ 1006.252363][ T3343] hsr_slave_1: left promiscuous mode [ 1006.367882][ T3343] veth1_macvtap: left promiscuous mode [ 1006.369067][ T3343] veth0_macvtap: left promiscuous mode [ 1006.370182][ T3343] veth1_vlan: left promiscuous mode [ 1006.371044][ T3343] veth0_vlan: left promiscuous mode