last executing test programs: 7m55.339006592s ago: executing program 0 (id=7482): r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000000c0)=0x80) dup3(r0, r1, 0x0) getsockname(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f0000000080)) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x5451, 0x0) 7m54.809567072s ago: executing program 0 (id=7483): mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000080)='syz0\x00', 0x1ff) r0 = socket$nl_route(0x10, 0x3, 0x0) close(r0) openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) mknodat(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) 7m54.407819113s ago: executing program 0 (id=7485): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x801}, 0x40000) 7m53.909939631s ago: executing program 0 (id=7486): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x262) move_mount(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x204) 7m53.340784715s ago: executing program 0 (id=7488): r0 = syz_open_dev$dri(&(0x7f00000008c0), 0xd21, 0x0) r1 = syz_open_dev$dri(&(0x7f00000008c0), 0xd21, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f00000003c0)={0x0, 0x0, r2}) ioctl$DRM_IOCTL_MODE_GETFB(r0, 0xc01c64d1, 0x0) 7m52.599012061s ago: executing program 0 (id=7489): r0 = syz_open_dev$sndctrl(&(0x7f0000001440), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000580)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180), 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x5452, &(0x7f0000000500)={0x0, 0x0}) 7m52.511646878s ago: executing program 32 (id=7489): r0 = syz_open_dev$sndctrl(&(0x7f0000001440), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000580)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180), 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_READN_FRAMES(r1, 0x5452, &(0x7f0000000500)={0x0, 0x0}) 4m39.827313629s ago: executing program 2 (id=7777): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/kernel/debug', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$BINDER_FREEZE(r0, 0x400c620e, 0x0) 4m39.395013262s ago: executing program 2 (id=7778): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000900)={0x14, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x50}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16, @ANYBLOB="040026bd7000ff00"/22], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x40004) 4m38.724219784s ago: executing program 2 (id=7779): r0 = io_uring_setup(0x6b9e, &(0x7f0000000240)={0x0, 0xceb4, 0x800, 0x103fc, 0x4000159}) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x2b) sendmsg$rds(r1, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x4400, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 4m37.411210594s ago: executing program 2 (id=7783): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$bind(&(0x7f0000000100)='.\x00', &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x2151090, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0xab3011, 0x0) mount$bind(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x181097, 0x0) 4m36.635721184s ago: executing program 2 (id=7784): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) splice(r1, 0x0, r3, 0x0, 0x200006, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, 0x0) write(r0, 0x0, 0x0) 4m35.580643714s ago: executing program 2 (id=7786): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x2e, &(0x7f0000000380)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x41}, 0x8080) 4m35.466996633s ago: executing program 33 (id=7786): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x2e, &(0x7f0000000380)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x41}, 0x8080) 41.041980941s ago: executing program 3 (id=8162): r0 = socket$netlink(0x10, 0x3, 0x0) setreuid(0xee00, 0x0) r1 = getuid() setreuid(0xee00, r1) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x14, 0x0, 0x300, 0x70bd25, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x404c0d4) 40.631811533s ago: executing program 3 (id=8163): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) r1 = socket$unix(0x1, 0x1, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 40.286253259s ago: executing program 3 (id=8164): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000000c0)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x8d5}, 0x20008000) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 37.39528095s ago: executing program 3 (id=8167): openat(0xffffffffffffff9c, 0x0, 0x20842, 0x0) r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x24020000) mount_setattr(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x8000, &(0x7f0000001dc0)={0xb, 0x0, 0x100000}, 0x20) 36.580154783s ago: executing program 3 (id=8169): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) r3 = pidfd_getfd(r1, r2, 0x0) write$tcp_mem(r3, &(0x7f0000000040)={0x9, 0x20, 0x9, 0x20, 0x4}, 0x48) 36.007376156s ago: executing program 3 (id=8171): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha224)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x80000) accept4$vsock_stream(r1, 0x0, 0x0, 0x800) 4.564618871s ago: executing program 1 (id=8199): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r1, 0x0) r3 = dup(r0) recvmsg$inet_nvme(r3, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x42) 3.687059318s ago: executing program 1 (id=8200): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)={0x60000006}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000180)={0xf0002009}) 2.466050271s ago: executing program 1 (id=8201): r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000039c0)) sendmsg$netlink(r1, &(0x7f0000002600)={0x0, 0x0, 0x0}, 0x0) 1.775998134s ago: executing program 1 (id=8202): r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SYNC_IOC_MERGE(r0, 0xc0303e03, &(0x7f0000000080)={"7de2dc1da2b69c321f44d637e17dabff5ed4851b7ae4375a5bca9af0181b02cb", 0xffffffffffffffff, 0xffffffffffffffff}) write$snddsp(r1, 0x0, 0x0) 670.464509ms ago: executing program 1 (id=8203): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x1) read$hiddev(r0, &(0x7f0000000040)=""/117, 0x75) 0s ago: executing program 1 (id=8204): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='\x00\x00Q\xd5m\xf5\v\xfa\xc0^\\,\xcb\x16}\'\xaf-\xdeG\xb1\x1e\xad\xca\x00\xc5\x00\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa1\xe7\x00\x00\x00', 0x0) r2 = dup3(r0, r1, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'batadv0\x00', 0x2}) ioctl$FBIO_WAITFORVSYNC(r2, 0x40044620, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:11616' (ED25519) to the list of known hosts. [ 242.645066][ T30] audit: type=1400 audit(241.940:46): avc: denied { name_bind } for pid=3321 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 243.122313][ T30] audit: type=1400 audit(242.410:47): avc: denied { execute } for pid=3322 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 243.126902][ T30] audit: type=1400 audit(242.420:48): avc: denied { execute_no_trans } for pid=3322 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 248.937065][ T30] audit: type=1400 audit(248.230:49): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 249.007267][ T30] audit: type=1400 audit(248.300:50): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 249.066111][ T3322] cgroup: Unknown subsys name 'net' [ 249.169180][ T30] audit: type=1400 audit(248.460:51): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 249.544263][ T3322] cgroup: Unknown subsys name 'cpuset' [ 249.606142][ T3322] cgroup: Unknown subsys name 'rlimit' [ 249.969603][ T30] audit: type=1400 audit(249.260:52): avc: denied { setattr } for pid=3322 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 249.977474][ T30] audit: type=1400 audit(249.270:53): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 249.989734][ T30] audit: type=1400 audit(249.280:54): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 250.531390][ T3324] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 250.536131][ T30] audit: type=1400 audit(249.830:55): avc: denied { relabelto } for pid=3324 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 250.546194][ T30] audit: type=1400 audit(249.830:56): avc: denied { write } for pid=3324 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 250.648940][ T30] audit: type=1400 audit(249.940:57): avc: denied { read } for pid=3322 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 250.654455][ T30] audit: type=1400 audit(249.940:58): avc: denied { open } for pid=3322 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 250.664866][ T3322] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 277.456359][ T30] audit: type=1400 audit(276.750:59): avc: denied { execmem } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 277.586211][ T30] audit: type=1400 audit(276.880:60): avc: denied { read } for pid=3327 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 277.602371][ T30] audit: type=1400 audit(276.890:61): avc: denied { open } for pid=3327 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 277.628578][ T30] audit: type=1400 audit(276.920:62): avc: denied { mounton } for pid=3327 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 277.714280][ T30] audit: type=1400 audit(277.010:63): avc: denied { module_request } for pid=3327 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 278.034122][ T30] audit: type=1400 audit(277.330:64): avc: denied { sys_module } for pid=3327 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 286.043887][ T3327] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 286.097348][ T3327] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 287.203623][ T3328] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 287.318555][ T3328] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 291.559197][ T3327] hsr_slave_0: entered promiscuous mode [ 291.571541][ T3327] hsr_slave_1: entered promiscuous mode [ 292.985949][ T3328] hsr_slave_0: entered promiscuous mode [ 292.999048][ T3328] hsr_slave_1: entered promiscuous mode [ 293.009238][ T3328] debugfs: 'hsr0' already exists in 'hsr' [ 293.013935][ T3328] Cannot create hsr debugfs directory [ 295.022852][ T30] audit: type=1400 audit(294.310:65): avc: denied { create } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 295.023835][ T30] audit: type=1400 audit(294.310:66): avc: denied { write } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 295.024690][ T30] audit: type=1400 audit(294.320:67): avc: denied { read } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 295.128488][ T3327] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 295.222182][ T3327] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 295.255532][ T3327] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 295.292207][ T3327] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 295.938704][ T3328] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 296.014563][ T3328] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 296.107691][ T3328] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 296.155302][ T3328] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 298.726225][ T3327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.952580][ T3328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.912428][ T3327] veth0_vlan: entered promiscuous mode [ 311.000333][ T3327] veth1_vlan: entered promiscuous mode [ 311.319308][ T3327] veth0_macvtap: entered promiscuous mode [ 311.388555][ T3327] veth1_macvtap: entered promiscuous mode [ 311.683908][ T801] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.692210][ T801] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.693509][ T801] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 311.694636][ T801] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.107874][ T30] audit: type=1400 audit(311.400:68): avc: denied { mount } for pid=3327 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 312.168953][ T30] audit: type=1400 audit(311.460:69): avc: denied { mounton } for pid=3327 comm="syz-executor" path="/syzkaller.qBkcyv/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 312.224819][ T30] audit: type=1400 audit(311.520:70): avc: denied { mount } for pid=3327 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 312.277463][ T30] audit: type=1400 audit(311.570:71): avc: denied { mounton } for pid=3327 comm="syz-executor" path="/syzkaller.qBkcyv/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 312.309013][ T30] audit: type=1400 audit(311.600:72): avc: denied { mounton } for pid=3327 comm="syz-executor" path="/syzkaller.qBkcyv/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4181 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 312.396851][ T30] audit: type=1400 audit(311.690:73): avc: denied { unmount } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 312.425302][ T30] audit: type=1400 audit(311.720:74): avc: denied { mounton } for pid=3327 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 312.436767][ T30] audit: type=1400 audit(311.730:75): avc: denied { mount } for pid=3327 comm="syz-executor" name="/" dev="gadgetfs" ino=3787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 312.463915][ T30] audit: type=1400 audit(311.760:76): avc: denied { mount } for pid=3327 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 312.470700][ T30] audit: type=1400 audit(311.760:77): avc: denied { mounton } for pid=3327 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 312.654639][ T3328] veth0_vlan: entered promiscuous mode [ 312.816226][ T3328] veth1_vlan: entered promiscuous mode [ 312.883253][ T3327] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 313.374909][ T3328] veth0_macvtap: entered promiscuous mode [ 313.607927][ T3328] veth1_macvtap: entered promiscuous mode [ 314.575913][ T41] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.576709][ T41] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.577285][ T41] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.577632][ T41] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.642758][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 321.643697][ T30] audit: type=1400 audit(320.910:82): avc: denied { prog_load } for pid=3498 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 321.644222][ T30] audit: type=1400 audit(320.930:83): avc: denied { bpf } for pid=3498 comm="syz.0.12" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 326.393340][ T30] audit: type=1400 audit(325.680:84): avc: denied { write } for pid=3527 comm="syz.1.25" name="fib_triestat" dev="proc" ino=4026532722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 347.953764][ T30] audit: type=1400 audit(347.240:85): avc: denied { associate } for pid=3651 comm="syz.0.86" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 367.673590][ T3760] Zero length message leads to an empty skb [ 371.668264][ T30] audit: type=1400 audit(370.960:86): avc: denied { read write } for pid=3787 comm="syz.0.147" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 371.683356][ T30] audit: type=1400 audit(370.980:87): avc: denied { open } for pid=3787 comm="syz.0.147" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 371.780580][ T30] audit: type=1400 audit(371.070:88): avc: denied { unmount } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 385.952168][ T30] audit: type=1400 audit(385.250:89): avc: denied { create } for pid=3881 comm="syz.0.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 385.977507][ T30] audit: type=1400 audit(385.250:90): avc: denied { bind } for pid=3881 comm="syz.0.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 386.004497][ T30] audit: type=1400 audit(385.300:91): avc: denied { accept } for pid=3881 comm="syz.0.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 386.009483][ T30] audit: type=1400 audit(385.300:92): avc: denied { write } for pid=3881 comm="syz.0.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 436.203663][ T30] audit: type=1400 audit(435.490:93): avc: denied { audit_write } for pid=4186 comm="syz.1.345" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 438.696261][ T30] audit: type=1400 audit(437.990:94): avc: denied { map_create } for pid=4199 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 438.727419][ T30] audit: type=1400 audit(438.020:95): avc: denied { map_read map_write } for pid=4199 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 445.758816][ T30] audit: type=1400 audit(445.040:96): avc: denied { nlmsg_write } for pid=4237 comm="syz.1.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 467.102310][ T30] audit: type=1400 audit(466.390:97): avc: denied { read write } for pid=4368 comm="syz.0.437" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 467.124581][ T30] audit: type=1400 audit(466.410:98): avc: denied { open } for pid=4368 comm="syz.0.437" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 467.182327][ T30] audit: type=1400 audit(466.470:99): avc: denied { ioctl } for pid=4368 comm="syz.0.437" path="/dev/uinput" dev="devtmpfs" ino=707 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 467.302678][ T4370] input: syz0 as /devices/virtual/input/input1 [ 474.344132][ T4408] ALSA: seq fatal error: cannot create timer (-22) [ 496.465225][ T30] audit: type=1400 audit(495.760:100): avc: denied { create } for pid=4557 comm="syz.1.530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 496.524934][ T30] audit: type=1400 audit(495.820:101): avc: denied { write } for pid=4557 comm="syz.1.530" path="socket:[7164]" dev="sockfs" ino=7164 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 501.041569][ T30] audit: type=1400 audit(500.320:102): avc: denied { setopt } for pid=4587 comm="syz.0.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 505.207097][ T30] audit: type=1400 audit(504.500:103): avc: denied { create } for pid=4614 comm="syz.1.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 505.241399][ T30] audit: type=1400 audit(504.530:104): avc: denied { ioctl } for pid=4614 comm="syz.1.558" path="socket:[7808]" dev="sockfs" ino=7808 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 505.273928][ T30] audit: type=1400 audit(504.560:105): avc: denied { bind } for pid=4614 comm="syz.1.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 505.297999][ T30] audit: type=1400 audit(504.590:106): avc: denied { write } for pid=4614 comm="syz.1.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 507.107899][ T30] audit: type=1400 audit(506.400:107): avc: denied { create } for pid=4624 comm="syz.0.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 507.152737][ T30] audit: type=1400 audit(506.450:108): avc: denied { ioctl } for pid=4624 comm="syz.0.563" path="socket:[7833]" dev="sockfs" ino=7833 ioctlcmd=0x54a5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 518.394854][ T4695] hugetlbfs: syz.0.596 (4695): Using mlock ulimits for SHM_HUGETLB is obsolete [ 518.862149][ T30] audit: type=1400 audit(518.140:109): avc: denied { map } for pid=4697 comm="syz.0.598" path="socket:[7937]" dev="sockfs" ino=7937 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 518.912224][ T30] audit: type=1400 audit(518.200:110): avc: denied { read write } for pid=4697 comm="syz.0.598" name="udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 518.917797][ T30] audit: type=1400 audit(518.210:111): avc: denied { open } for pid=4697 comm="syz.0.598" path="/dev/udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 518.953117][ T30] audit: type=1400 audit(518.240:112): avc: denied { ioctl } for pid=4697 comm="syz.0.598" path="/dev/udmabuf" dev="devtmpfs" ino=677 ioctlcmd=0x7543 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 523.014157][ T30] audit: type=1400 audit(522.310:113): avc: denied { read write } for pid=4717 comm="syz.0.609" name="vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 523.027561][ T30] audit: type=1400 audit(522.320:114): avc: denied { open } for pid=4717 comm="syz.0.609" path="/dev/vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 525.933486][ T30] audit: type=1400 audit(525.220:115): avc: denied { compute_member } for pid=4735 comm="syz.1.617" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 530.915945][ T30] audit: type=1400 audit(530.210:116): avc: denied { read } for pid=4761 comm="syz.0.630" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 530.946220][ T30] audit: type=1400 audit(530.240:117): avc: denied { open } for pid=4761 comm="syz.0.630" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 530.956294][ T30] audit: type=1400 audit(530.250:118): avc: denied { ioctl } for pid=4761 comm="syz.0.630" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 531.387510][ T30] audit: type=1400 audit(530.660:119): avc: denied { create } for pid=4761 comm="syz.0.630" anonclass=[kvm-gmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 537.878194][ T30] audit: type=1400 audit(537.170:120): avc: denied { allowed } for pid=4787 comm="syz.0.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 546.217593][ T30] audit: type=1400 audit(545.510:121): avc: denied { name_bind } for pid=4840 comm="syz.1.668" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 546.243353][ T30] audit: type=1400 audit(545.530:122): avc: denied { node_bind } for pid=4840 comm="syz.1.668" saddr=255.255.255.255 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 548.729516][ T30] audit: type=1400 audit(548.020:123): avc: denied { create } for pid=4857 comm="syz.1.677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 562.425172][ T4948] capability: warning: `syz.1.721' uses deprecated v2 capabilities in a way that may be insecure [ 583.779010][ T30] audit: type=1400 audit(583.070:124): avc: denied { read append } for pid=5064 comm="syz.0.779" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 583.788847][ T30] audit: type=1400 audit(583.080:125): avc: denied { open } for pid=5064 comm="syz.0.779" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 601.037037][ T30] audit: type=1400 audit(600.330:126): avc: denied { mount } for pid=5161 comm="syz.1.826" name="/" dev="securityfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 607.773665][ T30] audit: type=1400 audit(607.050:127): avc: denied { read write } for pid=3327 comm="syz-executor" name="loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 607.774691][ T30] audit: type=1400 audit(607.060:128): avc: denied { open } for pid=3327 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 607.775421][ T30] audit: type=1400 audit(607.060:129): avc: denied { ioctl } for pid=3327 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 613.329446][ T30] audit: type=1400 audit(612.620:130): avc: denied { write } for pid=5247 comm="syz.1.868" name="arp" dev="proc" ino=4026532720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 622.271355][ T30] audit: type=1400 audit(621.550:131): avc: denied { read } for pid=5307 comm="syz.0.898" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 622.272486][ T30] audit: type=1400 audit(621.560:132): avc: denied { open } for pid=5307 comm="syz.0.898" path="/dev/dri/card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 645.474681][ T30] audit: type=1400 audit(644.770:133): avc: denied { create } for pid=5431 comm="syz.1.958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 645.528149][ T30] audit: type=1400 audit(644.820:134): avc: denied { bind } for pid=5431 comm="syz.1.958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 645.552387][ T30] audit: type=1400 audit(644.850:135): avc: denied { accept } for pid=5431 comm="syz.1.958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 645.564875][ T30] audit: type=1400 audit(644.850:136): avc: denied { write } for pid=5431 comm="syz.1.958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 645.723689][ T30] audit: type=1400 audit(645.020:137): avc: denied { read write } for pid=5433 comm="syz.0.959" name="userio" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 645.729461][ T30] audit: type=1400 audit(645.020:138): avc: denied { open } for pid=5433 comm="syz.0.959" path="/dev/userio" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 647.695544][ T30] audit: type=1400 audit(646.990:139): avc: denied { name_bind } for pid=5449 comm="syz.0.967" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 647.702194][ T30] audit: type=1400 audit(647.000:140): avc: denied { node_bind } for pid=5449 comm="syz.0.967" saddr=224.0.0.1 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 649.758149][ T30] audit: type=1400 audit(649.050:141): avc: denied { read } for pid=5464 comm="syz.1.975" dev="nsfs" ino=4026532709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 649.771442][ T30] audit: type=1400 audit(649.060:142): avc: denied { open } for pid=5464 comm="syz.1.975" path="net:[4026532709]" dev="nsfs" ino=4026532709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 650.737734][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 650.745927][ T30] audit: type=1400 audit(650.020:146): avc: denied { sys_module } for pid=5464 comm="syz.1.975" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 658.941513][ T30] audit: type=1400 audit(658.220:147): avc: denied { execute } for pid=5520 comm="syz.1.1002" path="/dev/dsp" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 671.124718][ T30] audit: type=1400 audit(670.410:148): avc: denied { prog_load } for pid=5599 comm="syz.1.1040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 671.125589][ T30] audit: type=1400 audit(670.420:149): avc: denied { bpf } for pid=5599 comm="syz.1.1040" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 671.163377][ T30] audit: type=1400 audit(670.460:150): avc: denied { allowed } for pid=5599 comm="syz.1.1040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 671.233624][ T30] audit: type=1400 audit(670.530:151): avc: denied { create } for pid=5599 comm="syz.1.1040" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 671.302733][ T30] audit: type=1400 audit(670.590:152): avc: denied { map } for pid=5599 comm="syz.1.1040" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11171 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 671.307472][ T30] audit: type=1400 audit(670.590:153): avc: denied { read write } for pid=5599 comm="syz.1.1040" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11171 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 681.378940][ T5646] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5646 comm=syz.1.1061 [ 694.172702][ T30] audit: type=1400 audit(693.460:154): avc: denied { audit_write } for pid=5691 comm="syz.1.1084" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 696.291641][ T30] audit: type=1400 audit(695.570:155): avc: denied { write } for pid=5699 comm="syz.1.1088" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 696.303319][ T30] audit: type=1400 audit(695.600:156): avc: denied { open } for pid=5699 comm="syz.1.1088" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 696.367780][ T30] audit: type=1400 audit(695.660:157): avc: denied { ioctl } for pid=5699 comm="syz.1.1088" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 698.348242][ T30] audit: type=1400 audit(697.640:158): avc: denied { create } for pid=5705 comm="syz.0.1091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 698.416684][ T30] audit: type=1400 audit(697.710:159): avc: denied { connect } for pid=5705 comm="syz.0.1091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 698.473819][ T30] audit: type=1400 audit(697.760:160): avc: denied { write } for pid=5705 comm="syz.0.1091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 721.168989][ T30] audit: type=1400 audit(720.460:161): avc: denied { ioctl } for pid=5794 comm="syz.1.1133" path="/dev/iommu" dev="devtmpfs" ino=615 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 721.303146][ T5795] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 735.313786][ T30] audit: type=1400 audit(734.610:162): avc: denied { perfmon } for pid=5884 comm="syz.0.1177" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 737.156822][ T30] audit: type=1400 audit(736.450:163): avc: denied { mounton } for pid=5893 comm="syz.0.1182" path="/603/file0" dev="tmpfs" ino=3109 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 737.185469][ T30] audit: type=1400 audit(736.480:164): avc: denied { mount } for pid=5893 comm="syz.0.1182" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 737.487233][ T30] audit: type=1400 audit(736.780:165): avc: denied { unmount } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 739.656066][ T30] audit: type=1400 audit(738.950:166): avc: denied { read write } for pid=5909 comm="syz.1.1189" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 739.664420][ T30] audit: type=1400 audit(738.960:167): avc: denied { open } for pid=5909 comm="syz.1.1189" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 739.678682][ T30] audit: type=1400 audit(738.970:168): avc: denied { execmem } for pid=5909 comm="syz.1.1189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 744.958827][ T30] audit: type=1400 audit(744.250:169): avc: denied { read } for pid=5945 comm="syz.0.1207" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 756.141335][ T30] audit: type=1400 audit(755.410:170): avc: denied { mount } for pid=6010 comm="syz.0.1239" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 756.307603][ T30] audit: type=1400 audit(755.600:171): avc: denied { unmount } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 769.637061][ T30] audit: type=1400 audit(768.930:172): avc: denied { setopt } for pid=6093 comm="syz.1.1280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 769.643856][ T30] audit: type=1400 audit(768.940:173): avc: denied { ioctl } for pid=6093 comm="syz.1.1280" path="socket:[13331]" dev="sockfs" ino=13331 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 775.928286][ T30] audit: type=1400 audit(775.220:174): avc: denied { write } for pid=6128 comm="syz.1.1297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 775.976900][ T30] audit: type=1400 audit(775.270:175): avc: denied { read } for pid=6128 comm="syz.1.1297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 776.359105][ T6129] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 777.119716][ T6129] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 777.847077][ T6129] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 778.479180][ T6129] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 779.696050][ T5791] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 780.022765][ T5791] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 780.263345][ T57] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 780.516555][ T57] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 807.751312][ T30] audit: type=1400 audit(807.040:176): avc: denied { execute } for pid=6289 comm="syz.1.1377" name="file1" dev="tmpfs" ino=3507 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 807.786184][ T6290] process 'syz.1.1377' launched './file1' with NULL argv: empty string added [ 807.809163][ T30] audit: type=1400 audit(807.080:177): avc: denied { execute_no_trans } for pid=6289 comm="syz.1.1377" path="/677/file1" dev="tmpfs" ino=3507 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 811.618866][ T30] audit: type=1400 audit(810.910:178): avc: denied { mount } for pid=6304 comm="syz.1.1385" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 811.951373][ T30] audit: type=1400 audit(811.230:179): avc: denied { unmount } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 812.698684][ T6310] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6310 comm=syz.1.1387 [ 818.176426][ T30] audit: type=1400 audit(817.470:180): avc: denied { read write } for pid=3327 comm="syz-executor" name="loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 818.188445][ T30] audit: type=1400 audit(817.470:181): avc: denied { open } for pid=3327 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 818.204044][ T30] audit: type=1400 audit(817.500:182): avc: denied { ioctl } for pid=3327 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 824.046070][ T30] audit: type=1400 audit(823.330:183): avc: denied { audit_write } for pid=6385 comm="syz.0.1425" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 827.431161][ T30] audit: type=1400 audit(826.720:184): avc: denied { create } for pid=6412 comm="syz.1.1439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 844.797861][ T30] audit: type=1400 audit(844.090:185): avc: denied { read write } for pid=6527 comm="syz.1.1495" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 844.824396][ T30] audit: type=1400 audit(844.100:186): avc: denied { open } for pid=6527 comm="syz.1.1495" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 844.879409][ T30] audit: type=1400 audit(844.170:187): avc: denied { mounton } for pid=6527 comm="syz.1.1495" path="/738/file0" dev="tmpfs" ino=3820 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 844.955246][ T30] audit: type=1400 audit(844.250:188): avc: denied { mount } for pid=6527 comm="syz.1.1495" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 847.000764][ T30] audit: type=1400 audit(846.290:189): avc: denied { create } for pid=6542 comm="syz.0.1501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 847.022048][ T30] audit: type=1400 audit(846.310:190): avc: denied { write } for pid=6542 comm="syz.0.1501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 847.281952][ T30] audit: type=1400 audit(846.560:191): avc: denied { search } for pid=6541 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 847.286606][ T30] audit: type=1400 audit(846.580:192): avc: denied { search } for pid=6541 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=541 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 847.306753][ T30] audit: type=1400 audit(846.600:193): avc: denied { search } for pid=6541 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=692 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 847.307789][ T30] audit: type=1400 audit(846.600:194): avc: denied { search } for pid=6541 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=693 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 850.001060][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 850.006865][ T30] audit: type=1400 audit(849.290:204): avc: denied { remove_name } for pid=6553 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=3995 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 850.017208][ T30] audit: type=1400 audit(849.300:205): avc: denied { unlink } for pid=6553 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=3995 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 851.696340][ T30] audit: type=1400 audit(850.990:206): avc: denied { bind } for pid=6560 comm="syz.0.1507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 851.723074][ T30] audit: type=1400 audit(851.020:207): avc: denied { accept } for pid=6560 comm="syz.0.1507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 856.515011][ T30] audit: type=1400 audit(855.810:208): avc: denied { create } for pid=6589 comm="syz.0.1522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 856.531636][ T6590] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 856.551254][ T30] audit: type=1400 audit(855.840:209): avc: denied { bind } for pid=6589 comm="syz.0.1522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 856.552105][ T30] audit: type=1400 audit(855.840:210): avc: denied { name_bind } for pid=6589 comm="syz.0.1522" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 856.561553][ T30] audit: type=1400 audit(855.840:211): avc: denied { node_bind } for pid=6589 comm="syz.0.1522" saddr=::ffff:0.0.0.0 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 856.572766][ T30] audit: type=1400 audit(855.870:212): avc: denied { connect } for pid=6589 comm="syz.0.1522" laddr=::ffff:0.0.0.0 lport=20001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 856.584979][ T30] audit: type=1400 audit(855.880:213): avc: denied { setopt } for pid=6589 comm="syz.0.1522" laddr=::ffff:127.0.0.1 lport=20001 faddr=::ffff:127.0.0.1 fport=20017 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 880.073496][ T30] audit: type=1400 audit(879.370:214): avc: denied { write } for pid=6732 comm="syz.0.1592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 880.366145][ T30] audit: type=1400 audit(879.660:215): avc: denied { read } for pid=6735 comm="syz.0.1593" name="iommu" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 880.373082][ T30] audit: type=1400 audit(879.670:216): avc: denied { open } for pid=6735 comm="syz.0.1593" path="/dev/iommu" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 880.385503][ T30] audit: type=1400 audit(879.680:217): avc: denied { ioctl } for pid=6735 comm="syz.0.1593" path="/dev/iommu" dev="devtmpfs" ino=615 ioctlcmd=0x3b89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 885.661695][ T30] audit: type=1400 audit(884.940:218): avc: denied { create } for pid=6764 comm="syz.1.1608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 892.822031][ T30] audit: type=1400 audit(892.110:219): avc: denied { compute_member } for pid=6811 comm="syz.1.1631" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 898.614857][ T30] audit: type=1400 audit(134218625.906:220): avc: denied { read } for pid=6840 comm="syz.0.1645" path="socket:[16513]" dev="sockfs" ino=16513 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 908.210879][ T30] audit: type=1400 audit(134218635.496:221): avc: denied { write } for pid=6896 comm="syz.1.1673" path="socket:[16648]" dev="sockfs" ino=16648 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 908.764585][ T30] audit: type=1400 audit(134218636.056:222): avc: denied { write } for pid=6902 comm="syz.0.1675" name="fib_triestat" dev="proc" ino=4026532637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 928.788803][ T30] audit: type=1400 audit(134218656.076:223): avc: denied { module_request } for pid=7017 comm="syz.0.1733" kmod="tcp_" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 942.699506][ T30] audit: type=1400 audit(134218669.986:224): avc: denied { mounton } for pid=7108 comm="syz.1.1777" path="/892/file0" dev="tmpfs" ino=4613 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 948.297408][ T30] audit: type=1400 audit(134218675.586:225): avc: denied { create } for pid=7134 comm="syz.1.1789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 948.336737][ T30] audit: type=1400 audit(134218675.626:226): avc: denied { write } for pid=7134 comm="syz.1.1789" path="socket:[16146]" dev="sockfs" ino=16146 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 952.494211][ T30] audit: type=1400 audit(134218679.776:227): avc: denied { watch } for pid=7154 comm="syz.1.1800" path="/902" dev="tmpfs" ino=4662 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 952.512211][ T30] audit: type=1400 audit(134218679.806:228): avc: denied { watch_reads } for pid=7154 comm="syz.1.1800" path="/902" dev="tmpfs" ino=4662 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 963.688513][ T30] audit: type=1400 audit(134218690.976:229): avc: denied { read write } for pid=7215 comm="syz.1.1829" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 963.701473][ T30] audit: type=1400 audit(134218690.986:230): avc: denied { open } for pid=7215 comm="syz.1.1829" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 963.768510][ T30] audit: type=1400 audit(134218691.046:231): avc: denied { ioctl } for pid=7215 comm="syz.1.1829" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 973.901902][ T30] audit: type=1400 audit(134218701.186:232): avc: denied { execmem } for pid=7275 comm="syz.1.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 992.754237][ T30] audit: type=1400 audit(134218720.046:233): avc: denied { prog_load } for pid=7399 comm="syz.1.1921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 992.756537][ T30] audit: type=1400 audit(134218720.046:234): avc: denied { bpf } for pid=7399 comm="syz.1.1921" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 992.775246][ T30] audit: type=1400 audit(134218720.066:235): avc: denied { allowed } for pid=7399 comm="syz.1.1921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 992.797289][ T30] audit: type=1400 audit(134218720.086:236): avc: denied { create } for pid=7399 comm="syz.1.1921" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 992.842136][ T30] audit: type=1400 audit(134218720.106:237): avc: denied { map } for pid=7399 comm="syz.1.1921" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=18583 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 992.848140][ T30] audit: type=1400 audit(134218720.136:238): avc: denied { read write } for pid=7399 comm="syz.1.1921" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=18583 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 995.190805][ T30] audit: type=1400 audit(134218722.476:239): avc: denied { write } for pid=7410 comm="syz.0.1926" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 995.604410][ T974] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 995.923619][ T974] usb 1-1: config 0 has no interfaces? [ 995.966049][ T974] usb 1-1: New USB device found, idVendor=8086, idProduct=07d3, bcdDevice=95.ff [ 995.966716][ T974] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 995.978527][ T974] usb 1-1: Product: syz [ 995.979111][ T974] usb 1-1: Manufacturer: syz [ 995.979323][ T974] usb 1-1: SerialNumber: syz [ 996.089194][ T974] usb 1-1: config 0 descriptor?? [ 996.352902][ T39] usb 1-1: USB disconnect, device number 2 [ 1013.492886][ T30] audit: type=1400 audit(134218740.786:240): avc: denied { setopt } for pid=7466 comm="syz.0.1953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1013.503162][ T30] audit: type=1400 audit(134218740.786:241): avc: denied { ioctl } for pid=7466 comm="syz.0.1953" path="socket:[17711]" dev="sockfs" ino=17711 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1013.514262][ T30] audit: type=1400 audit(134218740.796:242): avc: denied { write } for pid=7466 comm="syz.0.1953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1045.786434][ T30] audit: type=1400 audit(134218773.076:243): avc: denied { read } for pid=7647 comm="syz.1.2044" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1045.827151][ T30] audit: type=1400 audit(134218773.086:244): avc: denied { open } for pid=7647 comm="syz.1.2044" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1045.891898][ T30] audit: type=1400 audit(134218773.176:245): avc: denied { ioctl } for pid=7647 comm="syz.1.2044" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1070.141313][ T30] audit: type=1400 audit(134218797.416:246): avc: denied { mount } for pid=7791 comm="syz.1.2114" name="/" dev="ramfs" ino=19226 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1109.270945][ T30] audit: type=1400 audit(134218836.556:247): avc: denied { create } for pid=8052 comm="syz.0.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1109.295263][ T30] audit: type=1400 audit(134218836.576:248): avc: denied { write } for pid=8052 comm="syz.0.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1109.304488][ T30] audit: type=1400 audit(134218836.596:249): avc: denied { nlmsg_write } for pid=8052 comm="syz.0.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1132.231385][ T30] audit: type=1400 audit(134218859.516:250): avc: denied { read write } for pid=8184 comm="syz.1.2305" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1132.263934][ T30] audit: type=1400 audit(134218859.556:251): avc: denied { open } for pid=8184 comm="syz.1.2305" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1132.312015][ T30] audit: type=1400 audit(134218859.596:252): avc: denied { ioctl } for pid=8184 comm="syz.1.2305" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0x9372 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1133.301576][ T30] audit: type=1400 audit(134218860.586:253): avc: denied { block_suspend } for pid=8192 comm="syz.0.2309" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1145.615062][ T30] audit: type=1400 audit(134218872.906:254): avc: denied { create } for pid=8264 comm="syz.1.2344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1151.550864][ T30] audit: type=1400 audit(134218878.836:255): avc: denied { perfmon } for pid=8289 comm="syz.0.2355" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1151.720990][ T30] audit: type=1400 audit(134218879.006:256): avc: denied { prog_run } for pid=8289 comm="syz.0.2355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1157.316493][ T30] audit: type=1400 audit(134218884.606:257): avc: denied { ioctl } for pid=8321 comm="syz.0.2371" path="socket:[20203]" dev="sockfs" ino=20203 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1157.318782][ T30] audit: type=1400 audit(134218884.606:258): avc: denied { bind } for pid=8321 comm="syz.0.2371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1171.967707][ T30] audit: type=1400 audit(134218899.256:259): avc: denied { mount } for pid=8413 comm="syz.0.2417" name="/" dev="configfs" ino=1091 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1172.011818][ T30] audit: type=1400 audit(134218899.286:260): avc: denied { search } for pid=8413 comm="syz.0.2417" name="/" dev="configfs" ino=1091 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1172.044816][ T30] audit: type=1400 audit(134218899.316:261): avc: denied { setattr } for pid=8413 comm="syz.0.2417" name="/" dev="configfs" ino=1091 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1181.726562][ T30] audit: type=1400 audit(134218909.016:262): avc: denied { name_bind } for pid=8466 comm="syz.0.2443" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1181.764008][ T30] audit: type=1400 audit(134218909.056:263): avc: denied { node_bind } for pid=8466 comm="syz.0.2443" saddr=224.0.0.1 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1186.367390][ T30] audit: type=1400 audit(134218913.656:264): avc: denied { create } for pid=8497 comm="syz.1.2459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1186.423402][ T30] audit: type=1400 audit(134218913.716:265): avc: denied { write } for pid=8497 comm="syz.1.2459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1189.655916][ T30] audit: type=1400 audit(134218916.946:266): avc: denied { create } for pid=8512 comm="syz.0.2466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1189.778856][ T30] audit: type=1400 audit(134218917.066:267): avc: denied { write } for pid=8512 comm="syz.0.2466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1210.705859][ T8624] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5124 sclass=netlink_route_socket pid=8624 comm=syz.0.2521 [ 1213.355507][ T30] audit: type=1400 audit(134218940.646:268): avc: denied { checkpoint_restore } for pid=8634 comm="syz.1.2526" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1238.502682][ T8779] can0: slcan on ttyS3. [ 1238.913968][ T8777] can0 (unregistered): slcan off ttyS3. [ 1240.035430][ T30] audit: type=1400 audit(134218967.326:269): avc: denied { read } for pid=3172 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1254.795716][ T30] audit: type=1400 audit(134218982.086:270): avc: denied { create } for pid=8877 comm="syz.1.2646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1254.825590][ T30] audit: type=1400 audit(134218982.116:271): avc: denied { setopt } for pid=8877 comm="syz.1.2646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1254.847912][ T30] audit: type=1400 audit(134218982.136:272): avc: denied { connect } for pid=8877 comm="syz.1.2646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1260.752191][ T30] audit: type=1400 audit(134218988.026:273): avc: denied { read } for pid=8920 comm="syz.0.2669" dev="nsfs" ino=4026532624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1260.761959][ T30] audit: type=1400 audit(134218988.046:274): avc: denied { open } for pid=8920 comm="syz.0.2669" path="net:[4026532624]" dev="nsfs" ino=4026532624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1260.789632][ T30] audit: type=1400 audit(134218988.076:275): avc: denied { ioctl } for pid=8920 comm="syz.0.2669" path="socket:[23309]" dev="sockfs" ino=23309 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1300.292860][ T974] atkbd serio1: keyboard reset failed on [ 1358.535844][ T30] audit: type=1400 audit(134219085.816:276): avc: denied { read } for pid=9467 comm="syz.0.2937" path="socket:[24341]" dev="sockfs" ino=24341 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1364.635044][ T9506] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 1367.551789][ T3470] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 1368.037711][ T3470] usb 1-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 1368.038313][ T3470] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1368.038776][ T3470] usb 1-1: Product: syz [ 1368.038880][ T3470] usb 1-1: Manufacturer: syz [ 1368.038976][ T3470] usb 1-1: SerialNumber: syz [ 1368.966133][ T3470] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000010. ret = -EPIPE [ 1368.967087][ T3470] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Registers INIT FAILED.... [ 1369.024406][ T3470] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 1369.147934][ T3470] lan78xx 1-1:1.0: probe with driver lan78xx failed with error -32 [ 1369.552677][ T3470] usb 1-1: USB disconnect, device number 3 [ 1399.680965][ T30] audit: type=1400 audit(134219126.966:277): avc: denied { map_create } for pid=9716 comm="syz.0.3061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1399.683996][ T30] audit: type=1400 audit(134219126.976:278): avc: denied { map_read map_write } for pid=9716 comm="syz.0.3061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1401.468932][ T30] audit: type=1400 audit(134219128.756:279): avc: denied { mounton } for pid=9729 comm="syz.1.3067" path="/1516/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1408.196857][ T30] audit: type=1400 audit(134219135.486:280): avc: denied { read } for pid=9776 comm="syz.1.3090" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1408.204927][ T30] audit: type=1400 audit(134219135.486:281): avc: denied { open } for pid=9776 comm="syz.1.3090" path="/dev/dri/card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1408.229041][ T30] audit: type=1400 audit(134219135.516:282): avc: denied { ioctl } for pid=9776 comm="syz.1.3090" path="/dev/dri/card1" dev="devtmpfs" ino=619 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1414.436424][ T30] audit: type=1400 audit(134219141.726:283): avc: denied { read } for pid=9812 comm="syz.1.3106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1446.531351][ T30] audit: type=1400 audit(134219173.816:284): avc: denied { connect } for pid=10015 comm="syz.0.3204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1446.629637][ T30] audit: type=1400 audit(134219173.916:285): avc: denied { shutdown } for pid=10015 comm="syz.0.3204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1498.111415][ T30] audit: type=1400 audit(134219225.396:286): avc: denied { sqpoll } for pid=10278 comm="syz.0.3333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1539.397069][ T30] audit: type=1400 audit(134219266.686:287): avc: denied { mounton } for pid=10450 comm="syz.0.3417" path="/proc/3501/task" dev="proc" ino=28131 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1539.427878][ T30] audit: type=1400 audit(134219266.716:288): avc: denied { mount } for pid=10450 comm="syz.0.3417" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1540.999669][ T30] audit: type=1400 audit(134219268.286:289): avc: denied { create } for pid=10458 comm="syz.0.3421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1543.237148][ T30] audit: type=1400 audit(134219270.526:290): avc: denied { create } for pid=10471 comm="syz.1.3427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1543.277994][ T30] audit: type=1400 audit(134219270.566:291): avc: denied { ioctl } for pid=10471 comm="syz.1.3427" path="socket:[28935]" dev="sockfs" ino=28935 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1560.589371][T10591] syz.0.3487(10591): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 1560.823927][ T30] audit: type=1400 audit(134219288.106:292): avc: denied { connect } for pid=10592 comm="syz.1.3486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1583.045887][ T30] audit: type=1400 audit(134219310.336:293): avc: denied { setopt } for pid=10736 comm="syz.1.3557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1595.968649][T10813] ptrace attach of "/syz-executor exec"[3327] was attempted by "/syz-executor exec"[10813] [ 1597.157511][ T30] audit: type=1400 audit(134219324.446:294): avc: denied { read write } for pid=10818 comm="syz.1.3597" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1597.184341][ T30] audit: type=1400 audit(134219324.466:295): avc: denied { open } for pid=10818 comm="syz.1.3597" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1696.759225][T11404] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11404 comm=syz.1.3879 [ 1699.448859][ T30] audit: type=1400 audit(134219427.737:296): avc: denied { mount } for pid=11420 comm="syz.1.3888" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1739.801974][T11697] capability: warning: `syz.1.4025' uses 32-bit capabilities (legacy support in use) [ 1757.325165][ T30] audit: type=1400 audit(134219485.617:297): avc: denied { mount } for pid=11811 comm="syz.0.4082" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1757.414972][ T30] audit: type=1400 audit(134219485.707:298): avc: denied { unmount } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1762.955979][ T30] audit: type=1400 audit(134219491.247:299): avc: denied { ioctl } for pid=11840 comm="syz.1.4097" path="socket:[33356]" dev="sockfs" ino=33356 ioctlcmd=0x7010 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1773.835993][ T30] audit: type=1400 audit(134219502.127:300): avc: denied { write } for pid=11903 comm="syz.0.4126" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1773.946339][ T30] audit: type=1400 audit(134219502.237:301): avc: denied { watch } for pid=11903 comm="syz.0.4126" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1784.118812][ T30] audit: type=1400 audit(134219512.407:302): avc: denied { listen } for pid=11966 comm="syz.1.4156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1784.137023][ T30] audit: type=1400 audit(134219512.427:303): avc: denied { accept } for pid=11966 comm="syz.1.4156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1801.329102][ T30] audit: type=1400 audit(134219529.617:304): avc: denied { write } for pid=12077 comm="syz.0.4211" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1801.334055][ T30] audit: type=1400 audit(134219529.627:305): avc: denied { open } for pid=12077 comm="syz.0.4211" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1801.361088][ T30] audit: type=1400 audit(134219529.647:306): avc: denied { ioctl } for pid=12077 comm="syz.0.4211" path="/dev/nullb0" dev="devtmpfs" ino=672 ioctlcmd=0x127f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1851.581560][ T30] audit: type=1400 audit(134219579.867:307): avc: denied { read write } for pid=12419 comm="syz.0.4380" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1851.582126][ T30] audit: type=1400 audit(134219579.867:308): avc: denied { open } for pid=12419 comm="syz.0.4380" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1851.635808][ T30] audit: type=1400 audit(134219579.927:309): avc: denied { setattr } for pid=12419 comm="syz.0.4380" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1880.260595][ T30] audit: type=1400 audit(134219608.527:310): avc: denied { read write } for pid=12537 comm="syz.1.4435" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1880.293019][ T30] audit: type=1400 audit(134219608.577:311): avc: denied { open } for pid=12537 comm="syz.1.4435" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1880.343563][T12539] ucma_write: process 4462 (syz.1.4435) changed security contexts after opening file descriptor, this is not allowed. [ 1924.237904][ T30] audit: type=1400 audit(134219652.527:312): avc: denied { mount } for pid=12743 comm="syz.0.4535" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1936.036528][T12831] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12831 comm=syz.0.4576 [ 1960.073519][ T30] audit: type=1400 audit(134219688.357:313): avc: denied { name_bind } for pid=12977 comm="syz.0.4649" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1975.825926][ T30] audit: type=1400 audit(134219704.117:314): avc: denied { associate } for pid=13063 comm="syz.1.4691" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2031.304134][ T30] audit: type=1400 audit(134219759.597:315): avc: denied { getopt } for pid=13440 comm="syz.1.4875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2043.693475][T13527] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13527 comm=syz.1.4917 [ 2047.817489][ T30] audit: type=1400 audit(134219776.097:316): avc: denied { ioctl } for pid=13559 comm="syz.1.4935" path="socket:[39440]" dev="sockfs" ino=39440 ioctlcmd=0x9408 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2061.843990][ T30] audit: type=1400 audit(134219790.137:317): avc: denied { create } for pid=13644 comm="syz.0.4976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2061.897537][ T30] audit: type=1400 audit(134219790.187:318): avc: denied { ioctl } for pid=13644 comm="syz.0.4976" path="socket:[38845]" dev="sockfs" ino=38845 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2076.794536][ T30] audit: type=1400 audit(134219805.087:319): avc: denied { execute } for pid=13777 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2076.808403][ T30] audit: type=1400 audit(134219805.087:320): avc: denied { execute_no_trans } for pid=13777 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2077.095250][T12578] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2077.213692][ T30] audit: type=1400 audit(134219805.477:321): avc: denied { mounton } for pid=13778 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2077.407003][T12578] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2077.902432][T12578] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2078.115457][ T30] audit: type=1400 audit(134219806.407:322): avc: denied { sys_module } for pid=13778 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2078.363753][T12578] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2083.066360][T12578] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2083.152006][T12578] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2083.208385][T12578] bond0 (unregistering): Released all slaves [ 2083.731638][T12578] hsr_slave_0: left promiscuous mode [ 2083.748012][T12578] hsr_slave_1: left promiscuous mode [ 2083.907779][T12578] veth1_macvtap: left promiscuous mode [ 2083.909107][T12578] veth0_macvtap: left promiscuous mode [ 2083.921944][T12578] veth1_vlan: left promiscuous mode [ 2083.923834][T12578] veth0_vlan: left promiscuous mode [ 2098.498442][T13778] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2098.529506][T13778] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2103.249613][T13778] hsr_slave_0: entered promiscuous mode [ 2103.276050][T13778] hsr_slave_1: entered promiscuous mode [ 2105.895333][ T30] audit: type=1400 audit(134219834.187:323): avc: denied { write } for pid=13923 comm="syz.1.5084" path="socket:[40534]" dev="sockfs" ino=40534 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2108.179227][T13778] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2108.319473][T13778] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2108.429455][T13778] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2108.547652][T13778] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2114.065911][T13778] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2130.344300][T13778] veth0_vlan: entered promiscuous mode [ 2130.413683][T13778] veth1_vlan: entered promiscuous mode [ 2131.043518][T13778] veth0_macvtap: entered promiscuous mode [ 2131.116214][T13778] veth1_macvtap: entered promiscuous mode [ 2132.052591][ T9201] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2132.057923][ T9201] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2132.097464][ T9201] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2132.111443][ T9201] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2132.830936][ T30] audit: type=1400 audit(134219861.107:324): avc: denied { mounton } for pid=13778 comm="syz-executor" path="/syzkaller.09Fip3/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 2133.026027][ T30] audit: type=1400 audit(134219861.297:325): avc: denied { mounton } for pid=13778 comm="syz-executor" path="/syzkaller.09Fip3/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 2133.045234][ T30] audit: type=1400 audit(134219861.337:326): avc: denied { mounton } for pid=13778 comm="syz-executor" path="/syzkaller.09Fip3/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=41277 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 2133.206775][ T30] audit: type=1400 audit(134219861.497:327): avc: denied { unmount } for pid=13778 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2133.257320][ T30] audit: type=1400 audit(134219861.547:328): avc: denied { mounton } for pid=13778 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 2133.262785][ T30] audit: type=1400 audit(134219861.547:329): avc: denied { mount } for pid=13778 comm="syz-executor" name="/" dev="gadgetfs" ino=3787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 2133.326680][ T30] audit: type=1400 audit(134219861.617:330): avc: denied { mount } for pid=13778 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2137.094818][ T30] audit: type=1400 audit(134219865.387:331): avc: denied { read } for pid=14101 comm="syz.1.5133" path="socket:[41325]" dev="sockfs" ino=41325 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2154.696252][ T30] audit: type=1400 audit(134219882.977:332): avc: denied { read } for pid=14227 comm="syz.0.5195" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2154.722976][ T30] audit: type=1400 audit(134219882.977:333): avc: denied { open } for pid=14227 comm="syz.0.5195" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2154.756087][ T30] audit: type=1400 audit(134219883.047:334): avc: denied { ioctl } for pid=14227 comm="syz.0.5195" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2158.651166][ T30] audit: type=1400 audit(134219886.937:335): avc: denied { getopt } for pid=14268 comm="syz.1.5216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2188.062386][ T30] audit: type=1400 audit(134219916.347:336): avc: denied { set_context_mgr } for pid=14534 comm="syz.0.5347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2188.107620][T14535] binder: BINDER_SET_CONTEXT_MGR already set [ 2188.108557][T14535] binder: 14534:14535 ioctl 4018620d 20000140 returned -16 [ 2243.187670][T14954] Process accounting resumed [ 2279.109202][ T30] audit: type=1400 audit(134220007.397:337): avc: denied { getopt } for pid=15232 comm="syz.0.5685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2300.803373][ T30] audit: type=1400 audit(134220029.097:338): avc: denied { ioctl } for pid=15428 comm="syz.1.5780" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=45715 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2317.227387][ T30] audit: type=1400 audit(134220045.517:339): avc: denied { ioctl } for pid=15533 comm="syz.0.5829" path="socket:[45899]" dev="sockfs" ino=45899 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2378.062813][ T30] audit: type=1400 audit(134220106.337:340): avc: denied { read write } for pid=16032 comm="syz.0.6077" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2378.089397][ T30] audit: type=1400 audit(134220106.377:341): avc: denied { open } for pid=16032 comm="syz.0.6077" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2378.182306][ T30] audit: type=1400 audit(134220106.467:342): avc: denied { ioctl } for pid=16032 comm="syz.0.6077" path="/dev/fb0" dev="devtmpfs" ino=620 ioctlcmd=0x4600 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2399.478507][ T30] audit: type=1400 audit(134220127.767:343): avc: denied { remount } for pid=16209 comm="syz.0.6164" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2399.505888][T16210] ======================================================= [ 2399.505888][T16210] WARNING: The mand mount option has been deprecated and [ 2399.505888][T16210] and is ignored by this kernel. Remove the mand [ 2399.505888][T16210] option from the mount to silence this warning. [ 2399.505888][T16210] ======================================================= [ 2418.922827][ T30] audit: type=1400 audit(134220147.207:344): avc: denied { write } for pid=16390 comm="syz.0.6254" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 2418.928796][ T30] audit: type=1400 audit(134220147.217:345): avc: denied { open } for pid=16390 comm="syz.0.6254" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 2447.301923][ T30] audit: type=1400 audit(134220175.567:346): avc: denied { unlink } for pid=13778 comm="syz-executor" name="file1" dev="tmpfs" ino=3058 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2575.283351][T17532] mmap: syz.1.6813 (17532) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 2584.322734][T17595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1014 sclass=netlink_route_socket pid=17595 comm=syz.0.6843 [ 2616.180976][ T30] audit: type=1400 audit(134220344.467:347): avc: denied { write } for pid=17867 comm="syz.0.6974" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 2617.998699][T17886] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17886 comm=syz.1.6982 [ 2627.603278][ T30] audit: type=1400 audit(134220355.897:348): avc: denied { bind } for pid=17960 comm="syz.1.7020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2672.277514][ T30] audit: type=1400 audit(268438128.567:349): avc: denied { setopt } for pid=18308 comm="syz.0.7191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2677.716185][ T30] audit: type=1400 audit(268438134.007:350): avc: denied { map } for pid=18343 comm="syz.0.7209" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2677.737909][T18345] binder: 18343:18345 got transaction to context manager from process owning it [ 2677.745153][T18345] binder: 18343:18345 transaction async to 18343:0 failed 3/29201/-22, code 0 size 0-0 line 3223 [ 2677.835222][T16602] binder: undelivered TRANSACTION_ERROR: 29201 [ 2678.889330][ T30] audit: type=1400 audit(268438135.167:351): avc: denied { execute } for pid=18352 comm="syz.1.7213" name="file0" dev="tmpfs" ino=18863 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2684.059123][ T30] audit: type=1400 audit(268438140.347:352): avc: denied { name_bind } for pid=18380 comm="syz.1.7225" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 2686.848757][ T30] audit: type=1400 audit(268438143.137:353): avc: denied { mount } for pid=18394 comm="syz.1.7231" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 2694.163922][ T30] audit: type=1400 audit(268438150.457:354): avc: denied { create } for pid=18433 comm="syz.1.7249" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2694.185165][ T30] audit: type=1400 audit(268438150.477:355): avc: denied { mounton } for pid=18433 comm="syz.1.7249" path="/3676/file0" dev="tmpfs" ino=18965 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2695.874054][T18444] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 2698.396986][T18460] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18460 comm=syz.1.7261 [ 2706.473801][T18504] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 2721.255418][ T30] audit: type=1400 audit(268438177.547:356): avc: denied { execute_no_trans } for pid=18570 comm="syz.0.7307" path="/1055/file0" dev="tmpfs" ino=5459 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2722.285925][T18581] loop5: detected capacity change from 0 to 7 [ 2723.469678][ T10] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2723.483189][ T10] Buffer I/O error on dev loop5, logical block 0, async page read [ 2723.497559][T18581] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2723.498470][T18581] Buffer I/O error on dev loop5, logical block 0, async page read [ 2723.508054][T18581] loop5: unable to read partition table [ 2723.521499][T18581] loop_reread_partitions: partition scan of loop5 (Cj̖P=ý?}X %`ր{֐ȵ4FLQk݊) failed (rc=-5) [ 2725.658750][ T30] audit: type=1400 audit(268438181.947:357): avc: denied { read write } for pid=18603 comm="syz.0.7322" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2725.668161][ T30] audit: type=1400 audit(268438181.957:358): avc: denied { open } for pid=18603 comm="syz.0.7322" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2725.727688][ T30] audit: type=1400 audit(268438182.017:359): avc: denied { ioctl } for pid=18603 comm="syz.0.7322" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x7002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2732.353763][ T30] audit: type=1400 audit(268438188.647:360): avc: denied { bind } for pid=18650 comm="syz.1.7345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2733.562042][T18668] fuse: Bad value for 'fd' [ 2738.705340][ T30] audit: type=1400 audit(268438194.987:361): avc: denied { setopt } for pid=18701 comm="syz.0.7368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2758.851182][ T30] audit: type=1400 audit(268438215.137:362): avc: denied { map } for pid=18805 comm="syz.0.7415" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 2759.974163][T18812] loop7: detected capacity change from 0 to 7 [ 2759.991143][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2759.992227][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 2760.002179][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2760.002817][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 2760.005360][T18812] loop7: unable to read partition table [ 2760.006615][T18812] loop_reread_partitions: partition scan of loop7 (gCj̖P=!MX %`搘ȵ4FLQk݊5) failed (rc=-5) [ 2760.056296][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2760.056978][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 2760.066801][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2760.067350][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 2760.076894][T18812] loop7: unable to read partition table [ 2768.711865][T18845] vxcan0: tx drop: invalid sa for name 0xfffffffffffffffc [ 2770.911577][ T30] audit: type=1400 audit(268438227.197:363): avc: denied { mount } for pid=18858 comm="syz.1.7441" name="/" dev="autofs" ino=58769 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 2771.075773][ T30] audit: type=1400 audit(268438227.367:364): avc: denied { unmount } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 2781.515765][T18904] tun0: tun_chr_ioctl cmd 1074025692 [ 2782.268291][ T30] audit: type=1400 audit(268438238.557:365): avc: denied { bind } for pid=18906 comm="syz.0.7463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2793.114170][T12499] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2793.608465][T12499] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2794.178730][T12499] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2795.303125][T12499] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2796.408517][T18973] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 2797.723990][ T30] audit: type=1400 audit(268438253.997:366): avc: denied { setattr } for pid=18976 comm="syz.1.7495" name="PACKET" dev="sockfs" ino=57931 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2800.878630][T12499] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2800.954171][T12499] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2801.017201][T12499] bond0 (unregistering): Released all slaves [ 2801.659779][T12499] hsr_slave_0: left promiscuous mode [ 2801.669001][T12499] hsr_slave_1: left promiscuous mode [ 2801.859483][T12499] veth1_macvtap: left promiscuous mode [ 2801.881559][T12499] veth0_macvtap: left promiscuous mode [ 2801.883116][T12499] veth1_vlan: left promiscuous mode [ 2801.883605][T12499] veth0_vlan: left promiscuous mode [ 2807.849327][T19003] block nbd1: shutting down sockets [ 2814.993963][T18963] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2815.044927][T18963] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2819.248338][T18963] hsr_slave_0: entered promiscuous mode [ 2819.275668][T18963] hsr_slave_1: entered promiscuous mode [ 2822.146324][T18963] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2822.244989][T18963] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2822.298705][T18963] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2822.347303][T18963] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2827.505719][T18963] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2846.303257][T18963] veth0_vlan: entered promiscuous mode [ 2846.468268][T18963] veth1_vlan: entered promiscuous mode [ 2847.062874][T18963] veth0_macvtap: entered promiscuous mode [ 2847.138797][T18963] veth1_macvtap: entered promiscuous mode [ 2847.803519][T18996] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2847.804247][T18996] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2847.804822][T18996] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2847.805157][T18996] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2852.221573][ T30] audit: type=1400 audit(268438308.497:367): avc: denied { read } for pid=19204 comm="syz.1.7541" name="usbmon1" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2852.228386][ T30] audit: type=1400 audit(268438308.517:368): avc: denied { open } for pid=19204 comm="syz.1.7541" path="/dev/usbmon1" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2862.809085][T19247] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19247 comm=syz.1.7556 [ 2893.925286][ T30] audit: type=1400 audit(268438350.217:369): avc: denied { create } for pid=19350 comm="syz.1.7608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2939.132498][ T30] audit: type=1400 audit(268438395.417:370): avc: denied { ioctl } for pid=19516 comm="syz.2.7680" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0xe500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2941.234290][T19527] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 2946.352545][ T30] audit: type=1400 audit(268438402.637:371): avc: denied { ioctl } for pid=19545 comm="syz.2.7692" path="/dev/uinput" dev="devtmpfs" ino=707 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2965.633536][T19636] pim6reg1: entered allmulticast mode [ 2975.296671][ T30] audit: type=1400 audit(268438431.587:372): avc: denied { open } for pid=19683 comm="syz.1.7757" path="/dev/ptyq6" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 2975.426336][ T30] audit: type=1400 audit(268438431.717:373): avc: denied { ioctl } for pid=19683 comm="syz.1.7757" path="/dev/ttyq6" dev="devtmpfs" ino=374 ioctlcmd=0x5437 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 2982.704522][ T30] audit: type=1400 audit(268438438.987:374): avc: denied { read } for pid=19716 comm="syz.1.7773" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 2982.708053][ T30] audit: type=1400 audit(268438438.987:375): avc: denied { open } for pid=19716 comm="syz.1.7773" path="/3962/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 2987.033810][ T30] audit: type=1400 audit(268438443.327:376): avc: denied { create } for pid=19731 comm="syz.2.7779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2987.053287][ T30] audit: type=1400 audit(268438443.337:377): avc: denied { bind } for pid=19731 comm="syz.2.7779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2987.092972][ T30] audit: type=1400 audit(268438443.387:378): avc: denied { write } for pid=19731 comm="syz.2.7779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2988.434217][ T30] audit: type=1400 audit(268438444.727:379): avc: denied { read append } for pid=19738 comm="syz.1.7782" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2988.438863][ T30] audit: type=1400 audit(268438444.727:380): avc: denied { open } for pid=19738 comm="syz.1.7782" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2988.485280][ T30] audit: type=1400 audit(268438444.777:381): avc: denied { ioctl } for pid=19738 comm="syz.1.7782" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2990.329245][T18996] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2990.915999][T18996] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2991.336069][T18996] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2991.737588][T18996] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2997.179011][T18996] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2997.266530][T18996] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2997.356313][T18996] bond0 (unregistering): Released all slaves [ 2998.176167][T18996] hsr_slave_0: left promiscuous mode [ 2998.198390][T18996] hsr_slave_1: left promiscuous mode [ 2998.325104][T18996] veth1_macvtap: left promiscuous mode [ 2998.328381][T18996] veth0_macvtap: left promiscuous mode [ 2998.334439][T18996] veth1_vlan: left promiscuous mode [ 2998.338577][T18996] veth0_vlan: left promiscuous mode [ 2998.737693][ T30] audit: type=1400 audit(268438455.027:382): avc: denied { write } for pid=19763 comm="syz.1.7791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3013.939274][T19747] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3014.026609][T19747] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3020.262689][ T30] audit: type=1400 audit(268438476.547:383): avc: denied { map } for pid=19862 comm="syz.1.7816" path="socket:[61690]" dev="sockfs" ino=61690 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 3022.193924][T19747] hsr_slave_0: entered promiscuous mode [ 3022.204975][T19747] hsr_slave_1: entered promiscuous mode [ 3026.065194][T19747] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 3026.148474][T19747] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 3026.188970][T19747] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 3026.233424][T19747] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 3032.042512][T19747] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3050.683355][T19747] veth0_vlan: entered promiscuous mode [ 3050.882484][T19747] veth1_vlan: entered promiscuous mode [ 3051.737172][T19747] veth0_macvtap: entered promiscuous mode [ 3051.862717][T19747] veth1_macvtap: entered promiscuous mode [ 3052.733481][ T5791] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3052.744565][ T5791] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3052.771559][ T5791] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3052.774018][ T5791] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3073.752203][ T30] audit: type=1400 audit(268438530.047:384): avc: denied { write } for pid=20093 comm="syz.1.7878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3081.824564][ T30] audit: type=1400 audit(268438538.117:385): avc: denied { setopt } for pid=20115 comm="syz.1.7888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3100.278665][ T30] audit: type=1400 audit(268438556.567:386): avc: denied { create } for pid=20175 comm="syz.1.7918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3100.325165][ T30] audit: type=1400 audit(268438556.597:387): avc: denied { write } for pid=20175 comm="syz.1.7918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3113.024981][T20241] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=20241 comm=syz.3.7946 [ 3121.438884][T20265] netlink: 16 bytes leftover after parsing attributes in process `syz.1.7957'. [ 3121.445797][T20265] tc_dump_action: action bad kind [ 3123.243790][ T30] audit: type=1400 audit(268438579.527:388): avc: denied { unmount } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3177.411437][ T30] audit: type=1400 audit(268438633.697:389): avc: denied { bind } for pid=20496 comm="syz.3.8063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3177.421569][ T30] audit: type=1400 audit(268438633.707:390): avc: denied { name_bind } for pid=20496 comm="syz.3.8063" src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 3177.423455][ T30] audit: type=1400 audit(268438633.707:391): avc: denied { node_bind } for pid=20496 comm="syz.3.8063" src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 3191.898724][T20560] binder: 20560 RLIMIT_NICE not set [ 3230.018310][ T801] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3230.441032][ T801] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3230.945540][ T801] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3231.458410][ T801] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3231.563619][T20736] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20736 comm=syz.1.8175 [ 3237.981758][ T801] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3238.079604][ T801] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3238.194154][ T801] bond0 (unregistering): Released all slaves [ 3239.174190][ T801] hsr_slave_0: left promiscuous mode [ 3239.272350][ T801] hsr_slave_1: left promiscuous mode [ 3239.838993][ T801] veth1_macvtap: left promiscuous mode [ 3239.853631][ T801] veth0_macvtap: left promiscuous mode [ 3239.857720][ T801] veth1_vlan: left promiscuous mode [ 3239.867246][ T801] veth0_vlan: left promiscuous mode [ 3252.939456][T20728] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3253.002835][T20728] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3256.605217][ T30] audit: type=1400 audit(268438712.887:392): avc: denied { ioctl } for pid=20820 comm="syz.1.8196" path="socket:[65896]" dev="sockfs" ino=65896 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3258.499348][T20728] hsr_slave_0: entered promiscuous mode [ 3258.507748][T20728] hsr_slave_1: entered promiscuous mode [ 3263.376657][T20728] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 3263.537056][T20728] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 3263.788317][T20728] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 3263.886418][T20728] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 3266.191826][T20759] ================================================================== [ 3266.192443][T20759] BUG: KASAN: use-after-free in __linkwatch_run_queue+0x54c/0x618 [ 3266.194072][T20759] Read of size 1 at addr ffff00001d080ca9 by task kworker/u8:6/20759 [ 3266.194192][T20759] [ 3266.195505][T20759] CPU: 0 UID: 0 PID: 20759 Comm: kworker/u8:6 Not tainted syzkaller #0 PREEMPT [ 3266.195691][T20759] Hardware name: linux,dummy-virt (DT) [ 3266.196114][T20759] Workqueue: events_unbound linkwatch_event [ 3266.196805][T20759] Call trace: [ 3266.197160][T20759] show_stack+0x18/0x24 (C) [ 3266.197431][T20759] dump_stack_lvl+0xa4/0xf4 [ 3266.197558][T20759] print_report+0xf4/0x5a0 [ 3266.197654][T20759] kasan_report+0xc8/0x108 [ 3266.197738][T20759] __asan_report_load1_noabort+0x20/0x2c [ 3266.197828][T20759] __linkwatch_run_queue+0x54c/0x618 [ 3266.197916][T20759] linkwatch_event+0x90/0xbc [ 3266.197995][T20759] process_one_work+0x7cc/0x18d4 [ 3266.198085][T20759] worker_thread+0x734/0xb84 [ 3266.198175][T20759] kthread+0x348/0x5fc [ 3266.198259][T20759] ret_from_fork+0x10/0x20 [ 3266.198561][T20759] [ 3266.198706][T20759] The buggy address belongs to the physical page: [ 3266.199505][T20759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff00001d082000 pfn:0x5d080 [ 3266.199892][T20759] flags: 0x1ffc00000000000(node=0|zone=0|lastcpupid=0x7ff) [ 3266.201152][T20759] raw: 01ffc00000000000 fffffdffc08e8408 ffff00006a090c40 0000000000000000 [ 3266.201247][T20759] raw: ffff00001d082000 0000000000000000 00000000ffffffff 0000000000000000 [ 3266.201448][T20759] page dumped because: kasan: bad access detected [ 3266.201519][T20759] [ 3266.201577][T20759] Memory state around the buggy address: [ 3266.202058][T20759] ffff00001d080b80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3266.202179][T20759] ffff00001d080c00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3266.202270][T20759] >ffff00001d080c80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3266.202359][T20759] ^ [ 3266.202425][T20759] ffff00001d080d00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3266.202487][T20759] ffff00001d080d80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 3266.202645][T20759] ================================================================== [ 3266.222088][T20759] Disabling lock debugging due to kernel taint [ 3266.254206][ T30] audit: type=1400 audit(268438722.537:393): avc: denied { write } for pid=3322 comm="syz-executor" path="pipe:[2755]" dev="pipefs" ino=2755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 3267.738310][T20759] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3267.954132][T20759] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3268.066208][T20759] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3268.177183][T20759] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3270.332749][T20759] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3270.396513][T20759] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3270.445727][T20759] bond0 (unregistering): Released all slaves [ 3270.677587][T20759] hsr_slave_0: left promiscuous mode [ 3270.702490][T20759] hsr_slave_1: left promiscuous mode [ 3270.745812][T20759] veth1_macvtap: left promiscuous mode [ 3270.746810][T20759] veth0_macvtap: left promiscuous mode [ 3270.747767][T20759] veth1_vlan: left promiscuous mode [ 3270.748426][T20759] veth0_vlan: left promiscuous mode [ 3273.883138][T20759] ------------[ cut here ]------------ [ 3273.883560][T20759] WARNING: CPU: 0 PID: 20759 at net/ipv6/xfrm6_tunnel.c:341 xfrm6_tunnel_net_exit+0x84/0x154 [ 3273.886500][T20759] Modules linked in: [ 3273.887551][T20759] CPU: 0 UID: 0 PID: 20759 Comm: kworker/u8:6 Tainted: G B syzkaller #0 PREEMPT [ 3273.888018][T20759] Tainted: [B]=BAD_PAGE [ 3273.888238][T20759] Hardware name: linux,dummy-virt (DT) [ 3273.888556][T20759] Workqueue: netns cleanup_net [ 3273.888965][T20759] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 3273.889363][T20759] pc : xfrm6_tunnel_net_exit+0x84/0x154 [ 3273.889667][T20759] lr : xfrm6_tunnel_net_exit+0x50/0x154 [ 3273.890092][T20759] sp : ffff80008e297910 [ 3273.890314][T20759] x29: ffff80008e297910 x28: dfff800000000000 x27: ffff800088a5db00 [ 3273.890836][T20759] x26: ffff800088c16880 x25: ffff700011c52f5c x24: ffff0000171e0000 [ 3273.891365][T20759] x23: dfff800000000000 x22: ffff000013ea0000 x21: 0000000000000000 [ 3273.891673][T20759] x20: ffff000013ea0000 x19: 0000000000000000 x18: ffff80008e296c8c [ 3273.892031][T20759] x17: ffff8000871defc0 x16: ffff00006a053504 x15: ffff00000e3a0a00 [ 3273.892336][T20759] x14: 1fffe00001c74164 x13: 0000000000000000 x12: ffff700011c52e95 [ 3273.892723][T20759] x11: 1ffff00011c52e94 x10: ffff700011c52e94 x9 : dfff800000000000 [ 3273.893164][T20759] x8 : ffff80008e2974a8 x7 : ffff80008e2975d0 x6 : ffff80008e297520 [ 3273.893505][T20759] x5 : ffff80008e297508 x4 : 1ffff00011c52eaa x3 : 1fffe0000d40bfde [ 3273.893836][T20759] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000021c2b000 [ 3273.894270][T20759] Call trace: [ 3273.894512][T20759] xfrm6_tunnel_net_exit+0x84/0x154 (P) [ 3273.894780][T20759] ops_undo_list+0x1f4/0x71c [ 3273.895115][T20759] cleanup_net+0x32c/0x73c [ 3273.895292][T20759] process_one_work+0x7cc/0x18d4 [ 3273.895468][T20759] worker_thread+0x734/0xb84 [ 3273.895631][T20759] kthread+0x348/0x5fc [ 3273.895806][T20759] ret_from_fork+0x10/0x20 [ 3273.896170][T20759] irq event stamp: 30445 [ 3273.896369][T20759] hardirqs last enabled at (30445): [] finish_task_switch.isra.0+0x1a8/0x854 [ 3273.896820][T20759] hardirqs last disabled at (30444): [] __schedule+0x2e8/0x3180 [ 3273.897164][T20759] softirqs last enabled at (30420): [] handle_softirqs+0x88c/0xdb4 [ 3273.897494][T20759] softirqs last disabled at (30107): [] __do_softirq+0x14/0x20 [ 3273.898112][T20759] ---[ end trace 0000000000000000 ]--- [ 3273.918134][T20759] ------------[ cut here ]------------ [ 3273.918260][T20759] WARNING: CPU: 0 PID: 20759 at net/ipv6/xfrm6_tunnel.c:344 xfrm6_tunnel_net_exit+0xe0/0x154 [ 3273.918910][T20759] Modules linked in: [ 3273.919162][T20759] CPU: 0 UID: 0 PID: 20759 Comm: kworker/u8:6 Tainted: G B W syzkaller #0 PREEMPT [ 3273.919684][T20759] Tainted: [B]=BAD_PAGE, [W]=WARN [ 3273.920102][T20759] Hardware name: linux,dummy-virt (DT) [ 3273.920498][T20759] Workqueue: netns cleanup_net [ 3273.920807][T20759] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 3273.921126][T20759] pc : xfrm6_tunnel_net_exit+0xe0/0x154 [ 3273.921336][T20759] lr : xfrm6_tunnel_net_exit+0x50/0x154 [ 3273.921538][T20759] sp : ffff80008e297910 [ 3273.921663][T20759] x29: ffff80008e297910 x28: dfff800000000000 x27: ffff800088a5db00 [ 3273.921994][T20759] x26: ffff800088c16880 x25: ffff700011c52f5c x24: ffff0000171e0000 [ 3273.922316][T20759] x23: dfff800000000000 x22: ffff000013ea0000 x21: ffff000013ea0808 [ 3273.922699][T20759] x20: 0000000000000101 x19: 0000000000000001 x18: ffff80008e296c8c [ 3273.923062][T20759] x17: ffff8000871defc0 x16: ffff00006a053504 x15: ffff00000e3a0a00 [ 3273.923394][T20759] x14: 1fffe00001c74164 x13: 0000000000000000 x12: ffff700011c52e95 [ 3273.923706][T20759] x11: 1ffff00011c52e94 x10: ffff700011c52e94 x9 : dfff800000000000 [ 3273.924028][T20759] x8 : ffff80008e2974a8 x7 : ffff80008e2975d0 x6 : ffff80008e297520 [ 3273.924359][T20759] x5 : ffff80008e297508 x4 : 1ffff00011c52eaa x3 : 1fffe0000d40bfde [ 3273.924841][T20759] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000021c2b010 [ 3273.925190][T20759] Call trace: [ 3273.925331][T20759] xfrm6_tunnel_net_exit+0xe0/0x154 (P) [ 3273.925595][T20759] ops_undo_list+0x1f4/0x71c [ 3273.925793][T20759] cleanup_net+0x32c/0x73c [ 3273.926055][T20759] process_one_work+0x7cc/0x18d4 [ 3273.926252][T20759] worker_thread+0x734/0xb84 [ 3273.926420][T20759] kthread+0x348/0x5fc [ 3273.926583][T20759] ret_from_fork+0x10/0x20 [ 3273.926787][T20759] irq event stamp: 30445 [ 3273.926939][T20759] hardirqs last enabled at (30445): [] finish_task_switch.isra.0+0x1a8/0x854 [ 3273.927304][T20759] hardirqs last disabled at (30444): [] __schedule+0x2e8/0x3180 [ 3273.927602][T20759] softirqs last enabled at (30420): [] handle_softirqs+0x88c/0xdb4 [ 3273.927891][T20759] softirqs last disabled at (30107): [] __do_softirq+0x14/0x20 [ 3273.928344][T20759] ---[ end trace 0000000000000000 ]--- [ 3273.978814][T20759] ------------[ cut here ]------------ [ 3273.978949][T20759] WARNING: CPU: 0 PID: 20759 at net/xfrm/xfrm_state.c:3306 xfrm_state_fini+0x1e8/0x330 [ 3273.979749][T20759] Modules linked in: [ 3273.980156][T20759] CPU: 0 UID: 0 PID: 20759 Comm: kworker/u8:6 Tainted: G B W syzkaller #0 PREEMPT [ 3273.980810][T20759] Tainted: [B]=BAD_PAGE, [W]=WARN [ 3273.981178][T20759] Hardware name: linux,dummy-virt (DT) [ 3273.981374][T20759] Workqueue: netns cleanup_net [ 3273.981594][T20759] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 3273.981886][T20759] pc : xfrm_state_fini+0x1e8/0x330 [ 3273.982126][T20759] lr : xfrm_state_fini+0x4c/0x330 [ 3273.982300][T20759] sp : ffff80008e2978f0 [ 3273.982459][T20759] x29: ffff80008e2978f0 x28: dfff800000000000 x27: ffff800088a5db00 [ 3273.982755][T20759] x26: ffff800088bd9480 x25: ffff700011c52f5c x24: ffff0000171e0000 [ 3273.983055][T20759] x23: ffff800088a5db00 x22: ffff80008e297ae0 x21: ffff800088bd94a0 [ 3273.983364][T20759] x20: ffff0000171e1240 x19: ffff0000171e0000 x18: ffff80008e296e8c [ 3273.983683][T20759] x17: ffff8000871defc0 x16: ffff00006a053504 x15: ffff00000e3a0a00 [ 3273.984039][T20759] x14: 1fffe00001c74164 x13: 0000000000000000 x12: ffff700011c52eb9 [ 3273.984358][T20759] x11: 1ffff00011c52eb8 x10: ffff700011c52eb8 x9 : dfff800000000000 [ 3273.984711][T20759] x8 : ffff80008e2975c8 x7 : ffff80008e2976f0 x6 : ffff80008e297640 [ 3273.985107][T20759] x5 : ffff80008e297628 x4 : 1fffe00002b0db71 x3 : 1fffe00002b0dbf8 [ 3273.985504][T20759] x2 : 0000000000000000 x1 : 1fffe00002e3c248 x0 : ffff000023a2c118 [ 3273.985821][T20759] Call trace: [ 3273.986030][T20759] xfrm_state_fini+0x1e8/0x330 (P) [ 3273.986267][T20759] xfrm_net_exit+0x30/0x70 [ 3273.986498][T20759] ops_undo_list+0x1f4/0x71c [ 3273.986674][T20759] cleanup_net+0x32c/0x73c [ 3273.986841][T20759] process_one_work+0x7cc/0x18d4 [ 3273.987053][T20759] worker_thread+0x734/0xb84 [ 3273.987239][T20759] kthread+0x348/0x5fc [ 3273.987403][T20759] ret_from_fork+0x10/0x20 [ 3273.987638][T20759] irq event stamp: 30445 [ 3273.987839][T20759] hardirqs last enabled at (30445): [] finish_task_switch.isra.0+0x1a8/0x854 [ 3273.988180][T20759] hardirqs last disabled at (30444): [] __schedule+0x2e8/0x3180 [ 3273.988473][T20759] softirqs last enabled at (30420): [] handle_softirqs+0x88c/0xdb4 [ 3273.988797][T20759] softirqs last disabled at (30107): [] __do_softirq+0x14/0x20 [ 3273.989113][T20759] ---[ end trace 0000000000000000 ]--- [ 3275.866000][T20759] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3275.917499][T20759] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3275.979449][T20759] bond0 (unregistering): Released all slaves [ 3276.155339][T20759] hsr_slave_0: left promiscuous mode [ 3276.165105][T20759] hsr_slave_1: left promiscuous mode VM DIAGNOSIS: 12:49:38 Registers: info registers vcpu 0 CPU#0 PC=ffff8000845f9b34 X00=ffff00006a06966a X01=0000000000000000 X02=dfff800000000000 X03=1fffe000029e2e40 X04=ffff000017301000 X05=ffff80008d6a5f48 X06=ffff000017308d80 X07=1fffe000040f5069 X08=ffff80008d6a5ee8 X09=0000000000000000 X10=ffff6000040f5056 X11=1fffe000040f5056 X12=ffff6000040f5057 X13=0000000000000004 X14=0000000000000002 X15=ffff00001ee45000 X16=0000000000000007 X17=0000000000000000 X18=1fffe00002eb69e1 X19=ffff000017308000 X20=ffff000017301008 X21=000f0000207a82a8 X22=000000000000000c X23=ffff0000207a8280 X24=1fffe00002e60200 X25=0000000000000000 X26=0000000000000040 X27=ffff000017301008 X28=000000000000000c X29=ffff80008d6a6190 X30=ffff80008457d720 SP=ffff80008d6a60d0 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2f2f2f2f2f2f2f2f:2f2f2f2f2f2f2f2f Q01=2d0065626f727064:6f6d2f6e6962732f Q02=00cc000000000000:0000330000000033 Q03=0000000000000000:0000ff00000000ff Q04=3333333333333333:3333333333333333 Q05=0000000000000000:0c00000000300003 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085513fd0 X00=ffff800085513fcc X01=ffff800083e75398 X02=0000000000000000 X03=ffff8000804225c0 X04=ffff700011a6fbf1 X05=ffff80008d37df80 X06=ffff700011a6fbf0 X07=0000000000000001 X08=ffff80008d37df83 X09=dfff800000000000 X10=ffff700011a6fbf0 X11=1ffff00011a6fbf0 X12=ffff700011a6fbf1 X13=205d393537303254 X14=0000000000000000 X15=0000000000000000 X16=ffff80008d6b0000 X17=ffff7fffe2eac000 X18=0000000000000000 X19=ffff00006a07a088 X20=ffff00006a07a1a0 X21=ffff00006a07a2a0 X22=ffff00006a07a220 X23=dfff800000000000 X24=0000000000000003 X25=ffff80008d37df80 X26=ffff80008d37d000 X27=000002f8312a4a01 X28=000000000009ef00 X29=ffff80008d6b7d60 X30=ffff800083e753b0 SP=ffff80008d6b7d60 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=00524f5252450040:0000000000000000 Q05=00524f5252450040:0000000000000000 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd1df5db0:0000ffffd1df5db0 Q17=ffffff80ffffffd0:0000ffffd1df5d80 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000