last executing test programs: 6.70141094s ago: executing program 1 (id=150): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x34}}, 0x6}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)={'tunl0\x00', 0x0, 0x8, 0x20, 0x13f, 0xfffffff9, {{0x5, 0x4, 0x0, 0x2, 0x14, 0x64, 0x0, 0x6, 0x0, 0x0, @loopback, @multicast2}}}}) 6.012606634s ago: executing program 0 (id=151): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0x10}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000004b80)=@newtfilter={0x50, 0x2c, 0xd27, 0x70bd28, 0x8000, {0x0, 0x0, 0x0, r3, {0xfff3, 0xffe0}, {}, {0xa}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xc, 0x1, 0x0, 0x0, {{0x9, 0x0, 0x1}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) 6.012319334s ago: executing program 1 (id=152): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x1}, 0x1c) 4.370094744s ago: executing program 0 (id=153): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800"/16], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x22, 0x0, &(0x7f0000000380)="f6f4e9a13235d78ad62ceef188a2e499b39cf58100"/34, 0x0, 0xa1b, 0x0, 0x2, 0x0, &(0x7f0000000700)="010a", 0x0}, 0x50) 3.560806141s ago: executing program 1 (id=154): io_setup(0x239f, &(0x7f0000000380)=0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="580000001500add427323b470c45b4560a067fffffff81004e22030d00ff0028925aa8002000eaa57b00090080020eff", 0x30}], 0x1) r1 = eventfd2(0x5, 0x1) io_submit(r0, 0x2, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x6, r1, 0x0, 0x300, 0x800002, 0x0, 0x0, r1}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7, 0x9841, r1, &(0x7f0000000080)="e2", 0x36, 0x5, 0x0, 0x1, r1}]) 3.294477896s ago: executing program 0 (id=155): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup(r1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'veth1_to_hsr\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_BC_QUEUE_LEN={0x8, 0x7, 0x5}]}}}, @IFLA_LINK={0x8, 0x5, r3}]}, 0x44}, 0x1, 0x0, 0x0, 0x4001}, 0x0) 2.474645015s ago: executing program 1 (id=156): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x1, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x3, 0x3, 0x6361, 0x5, 0xffffffff, 0x3}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40088c1}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000006c0)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x70b926, 0x25dfdc01, {0x0, 0x0, 0x0, r3, {0x0, 0x7}, {0xffff, 0xb}, {0xffff, 0xffe0}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0xc, 0x2, [@TCA_FQ_CODEL_CE_THRESHOLD={0x8, 0x7, 0xfffffff9}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0x240040e0}, 0x4800) r4 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r4, &(0x7f00000005c0)="bad330fbc9b55400040000ea0756a85d88a8", 0x12, 0x4044, &(0x7f00000001c0)={0x11, 0x88a8, r3, 0x1, 0xd8, 0x6, @multicast}, 0x14) 1.871697355s ago: executing program 0 (id=157): shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x4000) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x3e20, 0x0) 1.047590386s ago: executing program 0 (id=158): capset(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000180)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00@\x00', 0x28, 0x6, 0x1, @empty, @local, {[], {{0x4e24, 0x4e28, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x2, 0x0, 0x0, {[@md5sig={0x13, 0x12, "d4c466fb19f71e96642faa2300"}]}}}}}}}}, 0x0) 554.533664ms ago: executing program 1 (id=159): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x1) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TIOCCONS(r1, 0x541d) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 179.28049ms ago: executing program 0 (id=160): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="1800"/16], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0x22, 0x0, &(0x7f0000000380)="f6f4e9a13235d78ad62ceef188a2e499b39cf58100"/34, 0x0, 0xa1b, 0x0, 0x2, 0x0, &(0x7f0000000700)="010a", 0x0}, 0x50) 0s ago: executing program 1 (id=161): r0 = syz_open_dev$loop(&(0x7f0000000240), 0x7, 0x180862) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/fscaps', 0x40000, 0x3c) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000080)={r1, 0x0, {0x0, 0x0, 0x0, 0xb, 0x200, 0x0, 0x0, 0x19, 0xd, "faf98317e5b4140989fc8dbe43ea6acc96e3a2503dc3bd3ff87d5812ff0100010000000000000000000000000000000000cd00", "32ffff26f7d31a74df2cfc06c89f3d9e234b30c50997d3bed109ff2176ff7bfe55cd4a5d83cd4a524bd3ffe70c7f3f800b2f7b6aa54cc50a1fcaed1e831fc99a", "675237ff070008000100e4162e43ac61b7ad3300e8ffffffffffffff00", [0x6, 0xfffffdfffffffffe]}}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:31993' (ED25519) to the list of known hosts. [ 233.391377][ T30] audit: type=1400 audit(232.860:46): avc: denied { name_bind } for pid=3315 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 234.015135][ T30] audit: type=1400 audit(233.480:47): avc: denied { execute } for pid=3316 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 234.033447][ T30] audit: type=1400 audit(233.490:48): avc: denied { execute_no_trans } for pid=3316 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 241.967225][ T30] audit: type=1400 audit(241.430:49): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 242.041743][ T30] audit: type=1400 audit(241.500:50): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 242.102868][ T3316] cgroup: Unknown subsys name 'net' [ 242.192169][ T30] audit: type=1400 audit(241.660:51): avc: denied { unmount } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 242.477879][ T3316] cgroup: Unknown subsys name 'cpuset' [ 242.555280][ T3316] cgroup: Unknown subsys name 'rlimit' [ 242.884337][ T30] audit: type=1400 audit(242.350:52): avc: denied { setattr } for pid=3316 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 242.901277][ T30] audit: type=1400 audit(242.350:53): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 242.902592][ T30] audit: type=1400 audit(242.360:54): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 243.666491][ T3318] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 243.680367][ T30] audit: type=1400 audit(243.140:55): avc: denied { relabelto } for pid=3318 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 243.687354][ T30] audit: type=1400 audit(243.150:56): avc: denied { write } for pid=3318 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 243.846559][ T30] audit: type=1400 audit(243.310:57): avc: denied { read } for pid=3316 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 243.860910][ T30] audit: type=1400 audit(243.310:58): avc: denied { open } for pid=3316 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 243.891230][ T3316] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 270.631812][ T30] audit: type=1400 audit(270.100:59): avc: denied { execmem } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 270.773076][ T30] audit: type=1400 audit(270.240:60): avc: denied { read } for pid=3321 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 270.777930][ T30] audit: type=1400 audit(270.240:61): avc: denied { open } for pid=3321 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 270.815267][ T30] audit: type=1400 audit(270.280:62): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 270.910883][ T30] audit: type=1400 audit(270.370:63): avc: denied { module_request } for pid=3322 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 271.241587][ T30] audit: type=1400 audit(270.700:64): avc: denied { sys_module } for pid=3321 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 279.674775][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 279.733387][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 280.333127][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 280.373536][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 283.562584][ T3322] hsr_slave_0: entered promiscuous mode [ 283.579266][ T3322] hsr_slave_1: entered promiscuous mode [ 284.329835][ T3321] hsr_slave_0: entered promiscuous mode [ 284.342961][ T3321] hsr_slave_1: entered promiscuous mode [ 284.351436][ T3321] debugfs: 'hsr0' already exists in 'hsr' [ 284.354788][ T3321] Cannot create hsr debugfs directory [ 287.366319][ T30] audit: type=1400 audit(286.830:65): avc: denied { create } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 287.396152][ T30] audit: type=1400 audit(286.860:66): avc: denied { write } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 287.429522][ T30] audit: type=1400 audit(286.880:67): avc: denied { read } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 287.560858][ T3322] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 287.685597][ T3322] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 287.813727][ T3322] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 287.877249][ T3322] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 288.646663][ T3321] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 288.716553][ T3321] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 288.811420][ T3321] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 288.885657][ T3321] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 292.692387][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 293.051450][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.935833][ T3322] veth0_vlan: entered promiscuous mode [ 309.146606][ T3321] veth0_vlan: entered promiscuous mode [ 309.260283][ T3322] veth1_vlan: entered promiscuous mode [ 309.367785][ T3321] veth1_vlan: entered promiscuous mode [ 310.222315][ T3322] veth0_macvtap: entered promiscuous mode [ 310.271265][ T3321] veth0_macvtap: entered promiscuous mode [ 310.351843][ T3321] veth1_macvtap: entered promiscuous mode [ 310.416980][ T3322] veth1_macvtap: entered promiscuous mode [ 311.274936][ T26] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.301836][ T26] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.345671][ T26] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.354337][ T26] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.355083][ T26] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.355326][ T26] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.355554][ T26] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.355788][ T26] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.022474][ T30] audit: type=1400 audit(311.490:68): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/syzkaller.KLCthr/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 312.090129][ T30] audit: type=1400 audit(311.550:69): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 312.152596][ T30] audit: type=1400 audit(311.620:70): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/syzkaller.KLCthr/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 312.204314][ T30] audit: type=1400 audit(311.670:71): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 312.257568][ T30] audit: type=1400 audit(311.720:72): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/syzkaller.KLCthr/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 312.307433][ T30] audit: type=1400 audit(311.770:73): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/syzkaller.KLCthr/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3965 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 312.641567][ T30] audit: type=1400 audit(312.110:74): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 312.696727][ T30] audit: type=1400 audit(312.160:75): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 312.716649][ T30] audit: type=1400 audit(312.180:76): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="gadgetfs" ino=3026 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 312.783934][ T30] audit: type=1400 audit(312.250:77): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 313.143030][ T3322] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 318.891075][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 318.893884][ T30] audit: type=1400 audit(318.350:83): avc: denied { prog_load } for pid=3478 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 318.899465][ T30] audit: type=1400 audit(318.350:84): avc: denied { bpf } for pid=3478 comm="syz.0.5" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 320.031158][ T3482] loop6: detected capacity change from 0 to 7 [ 320.831930][ T30] audit: type=1400 audit(320.290:85): avc: denied { map_create } for pid=3483 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 320.860957][ T30] audit: type=1400 audit(320.330:86): avc: denied { map_read map_write } for pid=3483 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 320.877335][ T30] audit: type=1400 audit(320.340:87): avc: denied { perfmon } for pid=3483 comm="syz.1.7" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 321.064128][ T30] audit: type=1400 audit(320.530:88): avc: denied { prog_run } for pid=3483 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 322.392042][ T30] audit: type=1400 audit(321.820:89): avc: denied { create } for pid=3485 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 322.459339][ T30] audit: type=1400 audit(321.890:90): avc: denied { create } for pid=3485 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 330.682168][ T30] audit: type=1400 audit(330.150:91): avc: denied { create } for pid=3500 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 330.712834][ T30] audit: type=1400 audit(330.180:92): avc: denied { bind } for pid=3500 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 330.731438][ T30] audit: type=1400 audit(330.200:93): avc: denied { name_bind } for pid=3500 comm="syz.0.13" src=28196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 330.766475][ T30] audit: type=1400 audit(330.200:94): avc: denied { node_bind } for pid=3500 comm="syz.0.13" src=28196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 331.842747][ T30] audit: type=1400 audit(331.310:95): avc: denied { read write } for pid=3502 comm="syz.0.14" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 331.847381][ T30] audit: type=1400 audit(331.310:96): avc: denied { open } for pid=3502 comm="syz.0.14" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 331.862407][ T30] audit: type=1400 audit(331.330:97): avc: denied { mounton } for pid=3502 comm="syz.0.14" path="/6/file0" dev="tmpfs" ino=48 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 333.133965][ T30] audit: type=1400 audit(332.600:98): avc: denied { allowed } for pid=3502 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 334.372903][ T30] audit: type=1400 audit(333.840:99): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 336.957350][ T30] audit: type=1400 audit(336.420:100): avc: denied { name_bind } for pid=3515 comm="syz.0.20" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 336.970574][ T30] audit: type=1400 audit(336.420:101): avc: denied { node_bind } for pid=3515 comm="syz.0.20" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 340.965242][ T30] audit: type=1400 audit(340.430:102): avc: denied { execute } for pid=3528 comm="syz.1.24" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=5135 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 349.317775][ T30] audit: type=1400 audit(348.780:103): avc: denied { connect } for pid=3549 comm="syz.0.32" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 349.359535][ T30] audit: type=1400 audit(348.820:104): avc: denied { write } for pid=3549 comm="syz.0.32" laddr=fe80::104a:e5ff:fe4a:89b2 lport=58 faddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 350.739442][ T30] audit: type=1400 audit(350.190:105): avc: denied { relabelfrom } for pid=3551 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 350.752761][ T30] audit: type=1400 audit(350.220:106): avc: denied { relabelto } for pid=3551 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 356.091769][ T3564] tap0: tun_chr_ioctl cmd 1074812118 [ 356.112227][ T3564] tap0: tun_chr_ioctl cmd 1074025677 [ 356.114443][ T3564] tap0: Linktype set failed because interface is up [ 360.071605][ T30] audit: type=1400 audit(359.530:107): avc: denied { read write } for pid=3322 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 360.086711][ T30] audit: type=1400 audit(359.550:108): avc: denied { open } for pid=3322 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 360.101652][ T30] audit: type=1400 audit(359.560:109): avc: denied { ioctl } for pid=3322 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 364.025033][ T30] audit: type=1400 audit(363.490:110): avc: denied { create } for pid=3580 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 364.039871][ T30] audit: type=1400 audit(363.500:111): avc: denied { bind } for pid=3580 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 364.593256][ T30] audit: type=1400 audit(364.060:112): avc: denied { setopt } for pid=3580 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 364.615759][ T30] audit: type=1400 audit(364.080:113): avc: denied { accept } for pid=3580 comm="syz.0.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 365.320302][ T30] audit: type=1400 audit(364.780:114): avc: denied { write } for pid=3587 comm="syz.1.46" path="socket:[5201]" dev="sockfs" ino=5201 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 376.977094][ T30] audit: type=1400 audit(376.440:115): avc: denied { create } for pid=3630 comm="syz.1.58" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 377.034652][ T30] audit: type=1400 audit(376.500:116): avc: denied { mounton } for pid=3630 comm="syz.1.58" path="/30/file0" dev="tmpfs" ino=173 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 378.279119][ T30] audit: type=1400 audit(377.740:117): avc: denied { unlink } for pid=3322 comm="syz-executor" name="file0" dev="tmpfs" ino=173 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 378.745356][ T30] audit: type=1400 audit(378.190:118): avc: denied { create } for pid=3633 comm="syz.1.59" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 378.824507][ T30] audit: type=1400 audit(378.290:119): avc: denied { ioctl } for pid=3633 comm="syz.1.59" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4339 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 381.229551][ T30] audit: type=1400 audit(380.690:120): avc: denied { mount } for pid=3635 comm="syz.1.60" name="/" dev="ramfs" ino=4346 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 384.207632][ T3641] loop3: detected capacity change from 0 to 16384 [ 384.830091][ T30] audit: type=1400 audit(384.260:121): avc: denied { ioctl } for pid=3640 comm="syz.1.62" path="socket:[4356]" dev="sockfs" ino=4356 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 385.994278][ T3642] loop3: detected capacity change from 16384 to 0 [ 389.361939][ T3654] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 389.533849][ T3654] netlink: 20 bytes leftover after parsing attributes in process `syz.0.66'. [ 389.536584][ T3654] 8021q: VLANs not supported on ip6_vti0 [ 392.539718][ T30] audit: type=1400 audit(392.000:122): avc: denied { setopt } for pid=3667 comm="syz.0.73" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 396.361545][ T3683] bridge_slave_1: entered promiscuous mode [ 398.905922][ T3692] bond1 (unregistering): Released all slaves [ 400.536975][ T30] audit: type=1400 audit(400.000:123): avc: denied { setopt } for pid=3696 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 402.387422][ T30] audit: type=1400 audit(401.850:124): avc: denied { create } for pid=3700 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 402.991646][ T30] audit: type=1400 audit(402.460:125): avc: denied { create } for pid=3702 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 403.384935][ T30] audit: type=1400 audit(402.850:126): avc: denied { bind } for pid=3702 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 405.467968][ T30] audit: type=1326 audit(404.900:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3712 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 405.491218][ T30] audit: type=1326 audit(404.950:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3712 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 405.503515][ T30] audit: type=1326 audit(404.970:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3712 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 405.524345][ T30] audit: type=1326 audit(404.980:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3712 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=1 ip=0x132320 code=0x7ffc0000 [ 405.574139][ T30] audit: type=1326 audit(405.030:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3712 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 405.626489][ T30] audit: type=1326 audit(405.090:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3712 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 405.627653][ T30] audit: type=1326 audit(405.090:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3712 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 405.645925][ T30] audit: type=1326 audit(405.110:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3712 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 405.661415][ T30] audit: type=1326 audit(405.110:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3712 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=5 compat=1 ip=0x132320 code=0x7ffc0000 [ 405.662580][ T30] audit: type=1326 audit(405.130:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3712 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 405.674270][ T30] audit: type=1326 audit(405.130:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3712 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 405.675435][ T30] audit: type=1326 audit(405.140:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3712 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132320 code=0x7ffc0000 [ 405.675820][ T30] audit: type=1326 audit(405.140:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3712 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b54 code=0x7ffc0000 [ 405.690124][ T30] audit: type=1326 audit(405.140:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3712 comm="syz.1.92" exe="/syz-executor" sig=0 arch=40000028 syscall=391 compat=1 ip=0x132320 code=0x7ffc0000 [ 406.207545][ T3718] netlink: 64 bytes leftover after parsing attributes in process `syz.1.95'. [ 406.217434][ T3718] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=512 sclass=netlink_route_socket pid=3718 comm=syz.1.95 [ 422.215274][ T3767] syzkaller0: entered promiscuous mode [ 422.260866][ T3767] syzkaller0: refused to change device tx_queue_len [ 427.584704][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 427.590503][ T30] audit: type=1400 audit(427.050:145): avc: denied { mounton } for pid=3785 comm="syz.1.125" path="/55/file0" dev="tmpfs" ino=303 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 429.033590][ T3793] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 429.053431][ T30] audit: type=1400 audit(428.520:146): avc: denied { bind } for pid=3792 comm="syz.0.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 429.056612][ T30] audit: type=1400 audit(428.520:147): avc: denied { name_bind } for pid=3792 comm="syz.0.128" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 429.104156][ T30] audit: type=1400 audit(428.530:148): avc: denied { node_bind } for pid=3792 comm="syz.0.128" saddr=224.0.0.2 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 429.104996][ T30] audit: type=1400 audit(428.540:149): avc: denied { write } for pid=3792 comm="syz.0.128" name="udplite6" dev="proc" ino=4026532766 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 429.825414][ T30] audit: type=1400 audit(429.290:150): avc: denied { execute } for pid=3796 comm="syz.1.129" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=5516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 431.894503][ T30] audit: type=1400 audit(431.360:151): avc: denied { read } for pid=3804 comm="syz.1.134" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 432.502620][ T30] audit: type=1400 audit(431.970:152): avc: denied { getopt } for pid=3807 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 435.380892][ T30] audit: type=1400 audit(434.840:153): avc: denied { sqpoll } for pid=3820 comm="syz.1.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 435.411184][ T30] audit: type=1400 audit(434.870:154): avc: denied { map } for pid=3820 comm="syz.1.141" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4679 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 435.419928][ T30] audit: type=1400 audit(434.880:155): avc: denied { read write } for pid=3820 comm="syz.1.141" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4679 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 438.456750][ T30] audit: type=1400 audit(437.920:156): avc: denied { ioctl } for pid=3826 comm="syz.0.143" path="socket:[5553]" dev="sockfs" ino=5553 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 439.017470][ T30] audit: type=1400 audit(438.480:157): avc: denied { execute } for pid=3828 comm="syz.0.144" dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 439.024328][ T3829] process 'syz.0.144' launched '/dev/fd/4' with NULL argv: empty string added [ 439.034071][ T30] audit: type=1400 audit(438.500:158): avc: denied { execute_no_trans } for pid=3828 comm="syz.0.144" path=2F6D656D66643A2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 439.742653][ T30] audit: type=1400 audit(439.210:159): avc: denied { read write } for pid=3830 comm="syz.0.145" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 439.751193][ T30] audit: type=1400 audit(439.210:160): avc: denied { open } for pid=3830 comm="syz.0.145" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 439.803605][ T30] audit: type=1400 audit(439.270:161): avc: denied { ioctl } for pid=3830 comm="syz.0.145" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x7001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 440.649271][ T30] audit: type=1400 audit(440.110:162): avc: denied { setopt } for pid=3832 comm="syz.0.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 442.536663][ T3839] Illegal XDP return value 3212156928 on prog (id 14) dev syz_tun, expect packet loss! [ 442.583695][ T30] audit: type=1400 audit(442.050:163): avc: denied { name_bind } for pid=3840 comm="syz.1.150" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 446.070084][ T30] audit: type=1400 audit(445.530:164): avc: denied { create } for pid=3854 comm="syz.0.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 446.309635][ T30] audit: type=1400 audit(445.770:165): avc: denied { ioctl } for pid=3854 comm="syz.0.155" path="socket:[5594]" dev="sockfs" ino=5594 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 446.594904][ T3855] veth1_to_hsr: entered promiscuous mode [ 446.596465][ T3855] macvlan2: entered promiscuous mode [ 447.062294][ T3857] syzkaller0: entered promiscuous mode [ 447.063562][ T3857] syzkaller0: entered allmulticast mode [ 447.315477][ T30] audit: type=1400 audit(446.780:166): avc: denied { write } for pid=3856 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 448.567858][ T30] audit: type=1400 audit(448.020:167): avc: denied { open } for pid=3862 comm="syz.1.159" path="/dev/ptyq7" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 448.603660][ T30] audit: type=1400 audit(448.070:168): avc: denied { ioctl } for pid=3862 comm="syz.1.159" path="/dev/ttyq7" dev="devtmpfs" ino=375 ioctlcmd=0x541d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 449.123347][ T3866] loop7: detected capacity change from 0 to 1 [ 449.136582][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 449.137961][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 449.144570][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 449.144907][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 449.146738][ T3866] loop7: unable to read partition table [ 449.150479][ T3866] loop_reread_partitions: partition scan of loop7 ( Cj̖P=ý?}X) failed (rc=-5) [ 449.211512][ T3866] [ 449.213044][ T3866] ====================================================== [ 449.213281][ T3866] WARNING: possible circular locking dependency detected [ 449.213741][ T3866] syzkaller #0 Not tainted [ 449.214043][ T3866] ------------------------------------------------------ [ 449.214339][ T3866] syz.1.161/3866 is trying to acquire lock: [ 449.214672][ T3866] ffff00000e16ca20 (&root->kernfs_iattr_rwsem){++++}-{4:4}, at: kernfs_iop_getattr+0x88/0xf0 [ 449.216547][ T3866] [ 449.216547][ T3866] but task is already holding lock: [ 449.216751][ T3866] ffff000014dc1ce0 (&q->q_usage_counter(io)#24){++++}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 [ 449.217226][ T3866] [ 449.217226][ T3866] which lock already depends on the new lock. [ 449.217226][ T3866] [ 449.217494][ T3866] [ 449.217494][ T3866] the existing dependency chain (in reverse order) is: [ 449.217756][ T3866] [ 449.217756][ T3866] -> #2 (&q->q_usage_counter(io)#24){++++}-{0:0}: [ 449.218416][ T3866] blk_alloc_queue+0x538/0x644 [ 449.218752][ T3866] blk_mq_alloc_queue+0x144/0x220 [ 449.218961][ T3866] __blk_mq_alloc_disk+0x20/0x120 [ 449.219142][ T3866] loop_add+0x3b0/0x938 [ 449.219320][ T3866] loop_init+0xd0/0x138 [ 449.219553][ T3866] do_one_initcall+0x130/0x7f0 [ 449.219731][ T3866] kernel_init_freeable+0x48c/0x708 [ 449.220012][ T3866] kernel_init+0x24/0x1e0 [ 449.220191][ T3866] ret_from_fork+0x10/0x20 [ 449.220439][ T3866] [ 449.220439][ T3866] -> #1 (fs_reclaim){+.+.}-{0:0}: [ 449.220822][ T3866] fs_reclaim_acquire+0x138/0x160 [ 449.221015][ T3866] kmem_cache_alloc_noprof+0x60/0x6fc [ 449.221203][ T3866] __kernfs_iattrs+0x10c/0x330 [ 449.221389][ T3866] __kernfs_setattr+0x4c/0x2a0 [ 449.221564][ T3866] kernfs_iop_setattr+0xc0/0xf4 [ 449.221741][ T3866] notify_change+0x3d0/0xbe4 [ 449.221912][ T3866] do_truncate+0x174/0x1bc [ 449.222098][ T3866] path_openat+0x1ad8/0x28cc [ 449.222297][ T3866] do_filp_open+0x184/0x360 [ 449.222489][ T3866] do_sys_openat2+0xe0/0x188 [ 449.222666][ T3866] __arm64_sys_openat+0x12c/0x1bc [ 449.222844][ T3866] invoke_syscall+0x6c/0x258 [ 449.223034][ T3866] el0_svc_common.constprop.0+0xac/0x230 [ 449.223284][ T3866] do_el0_svc+0x40/0x58 [ 449.223469][ T3866] el0_svc+0x54/0x2b0 [ 449.223631][ T3866] el0t_64_sync_handler+0xa0/0xe4 [ 449.223812][ T3866] el0t_64_sync+0x198/0x19c [ 449.224116][ T3866] [ 449.224116][ T3866] -> #0 (&root->kernfs_iattr_rwsem){++++}-{4:4}: [ 449.224431][ T3866] __lock_acquire+0x1638/0x2380 [ 449.224623][ T3866] lock_acquire+0x310/0x38c [ 449.224791][ T3866] down_read+0xb4/0x314 [ 449.224948][ T3866] kernfs_iop_getattr+0x88/0xf0 [ 449.225168][ T3866] vfs_getattr_nosec+0x1fc/0x374 [ 449.225364][ T3866] vfs_getattr+0x40/0x54 [ 449.225524][ T3866] loop_query_min_dio_size.isra.0+0xf8/0x1d0 [ 449.225762][ T3866] lo_ioctl+0xe1c/0x1710 [ 449.226028][ T3866] lo_compat_ioctl+0x8c/0x1b4 [ 449.226350][ T3866] compat_blkdev_ioctl+0x1f8/0x860 [ 449.226543][ T3866] __arm64_compat_sys_ioctl+0x1d0/0x238 [ 449.226763][ T3866] invoke_syscall+0x6c/0x258 [ 449.227003][ T3866] el0_svc_common.constprop.0+0xac/0x230 [ 449.227197][ T3866] do_el0_svc_compat+0x40/0x68 [ 449.227418][ T3866] el0_svc_compat+0x50/0x278 [ 449.227593][ T3866] el0t_32_sync_handler+0x88/0xac [ 449.227767][ T3866] el0t_32_sync+0x19c/0x1a0 [ 449.228069][ T3866] [ 449.228069][ T3866] other info that might help us debug this: [ 449.228069][ T3866] [ 449.228441][ T3866] Chain exists of: [ 449.228441][ T3866] &root->kernfs_iattr_rwsem --> fs_reclaim --> &q->q_usage_counter(io)#24 [ 449.228441][ T3866] [ 449.229120][ T3866] Possible unsafe locking scenario: [ 449.229120][ T3866] [ 449.229327][ T3866] CPU0 CPU1 [ 449.229487][ T3866] ---- ---- [ 449.229699][ T3866] lock(&q->q_usage_counter(io)#24); [ 449.229955][ T3866] lock(fs_reclaim); [ 449.230227][ T3866] lock(&q->q_usage_counter(io)#24); [ 449.230544][ T3866] rlock(&root->kernfs_iattr_rwsem); [ 449.230781][ T3866] [ 449.230781][ T3866] *** DEADLOCK *** [ 449.230781][ T3866] [ 449.231024][ T3866] 3 locks held by syz.1.161/3866: [ 449.231215][ T3866] #0: ffff000014ddd448 (&lo->lo_mutex){+.+.}-{4:4}, at: loop_global_lock_killable+0x2c/0xbc [ 449.231672][ T3866] #1: ffff000014dc1ce0 (&q->q_usage_counter(io)#24){++++}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 [ 449.232198][ T3866] #2: ffff000014dc1d18 (&q->q_usage_counter(queue)#8){+.+.}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 [ 449.232692][ T3866] [ 449.232692][ T3866] stack backtrace: [ 449.233328][ T3866] CPU: 0 UID: 0 PID: 3866 Comm: syz.1.161 Not tainted syzkaller #0 PREEMPT [ 449.233639][ T3866] Hardware name: linux,dummy-virt (DT) [ 449.234119][ T3866] Call trace: [ 449.234456][ T3866] show_stack+0x18/0x24 (C) [ 449.234741][ T3866] dump_stack_lvl+0xa4/0xf4 [ 449.234921][ T3866] dump_stack+0x1c/0x28 [ 449.235076][ T3866] print_circular_bug+0x28c/0x370 [ 449.235254][ T3866] check_noncircular+0x168/0x17c [ 449.235443][ T3866] __lock_acquire+0x1638/0x2380 [ 449.235611][ T3866] lock_acquire+0x310/0x38c [ 449.235778][ T3866] down_read+0xb4/0x314 [ 449.235994][ T3866] kernfs_iop_getattr+0x88/0xf0 [ 449.236176][ T3866] vfs_getattr_nosec+0x1fc/0x374 [ 449.236356][ T3866] vfs_getattr+0x40/0x54 [ 449.236509][ T3866] loop_query_min_dio_size.isra.0+0xf8/0x1d0 [ 449.236707][ T3866] lo_ioctl+0xe1c/0x1710 [ 449.236861][ T3866] lo_compat_ioctl+0x8c/0x1b4 [ 449.237024][ T3866] compat_blkdev_ioctl+0x1f8/0x860 [ 449.237332][ T3866] __arm64_compat_sys_ioctl+0x1d0/0x238 [ 449.237560][ T3866] invoke_syscall+0x6c/0x258 [ 449.237733][ T3866] el0_svc_common.constprop.0+0xac/0x230 [ 449.238208][ T3866] do_el0_svc_compat+0x40/0x68 [ 449.238431][ T3866] el0_svc_compat+0x50/0x278 [ 449.238740][ T3866] el0t_32_sync_handler+0x88/0xac [ 449.238977][ T3866] el0t_32_sync+0x19c/0x1a0 [ 449.290270][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 449.291011][ C1] Buffer I/O error on dev loop7, logical block 0, async page read SYZFAIL: failed to recv rpc [ 449.375193][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 449.375515][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 449.380961][ T3471] loop7: unable to read partition table fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 449.422572][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 449.422908][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 449.431187][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 449.431539][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 449.442672][ T3866] loop7: unable to read partition table [ 449.450571][ T3866] loop_reread_partitions: partition scan of loop7 ( Cj̖P=ý?}X) failed (rc=-5) [ 449.601987][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 449.602668][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 449.609183][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 449.609699][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 449.613666][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 449.614114][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 449.624125][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 449.624696][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 450.665515][ T132] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 450.793332][ T132] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 450.955928][ T132] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 451.121401][ T132] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 451.702201][ T30] audit: type=1400 audit(451.170:169): avc: denied { read } for pid=3166 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 452.621276][ T132] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 452.713356][ T132] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 452.785197][ T132] bond0 (unregistering): Released all slaves [ 452.864154][ T30] audit: type=1400 audit(452.330:170): avc: denied { read } for pid=3166 comm="dhcpcd" name="n18" dev="tmpfs" ino=1522 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 452.879692][ T30] audit: type=1400 audit(452.330:171): avc: denied { open } for pid=3166 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1522 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 452.881254][ T30] audit: type=1400 audit(452.340:172): avc: denied { getattr } for pid=3166 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1522 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 452.942169][ T132] hsr_slave_0: left promiscuous mode [ 452.947301][ T132] hsr_slave_1: left promiscuous mode [ 452.990616][ T132] veth1_to_hsr: left promiscuous mode [ 452.993065][ T132] veth1_macvtap: left promiscuous mode [ 452.994550][ T132] veth0_macvtap: left promiscuous mode [ 452.996337][ T132] veth1_vlan: left promiscuous mode [ 453.000031][ T132] veth0_vlan: left promiscuous mode [ 456.945523][ T132] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.057578][ T30] audit: type=1400 audit(456.520:173): avc: denied { create } for pid=3870 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 457.063217][ T30] audit: type=1400 audit(456.530:174): avc: denied { write } for pid=3870 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=1526 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 457.077059][ T30] audit: type=1400 audit(456.540:175): avc: denied { append } for pid=3870 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=1526 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 457.186211][ T132] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.365689][ T132] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.542702][ T132] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.643008][ T30] audit: type=1400 audit(457.110:176): avc: denied { unlink } for pid=3873 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1526 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 459.224708][ T132] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 459.263876][ T132] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 459.323082][ T132] bond0 (unregistering): Released all slaves [ 459.530100][ T132] hsr_slave_0: left promiscuous mode [ 459.537697][ T132] hsr_slave_1: left promiscuous mode [ 459.593147][ T132] veth1_macvtap: left promiscuous mode [ 459.594062][ T132] veth0_macvtap: left promiscuous mode [ 459.595569][ T132] veth1_vlan: left promiscuous mode [ 459.604580][ T132] veth0_vlan: left promiscuous mode