last executing test programs: 48.601272118s ago: executing program 0 (id=1207): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) sendmsg$DEVLINK_CMD_SB_POOL_GET(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x8041) 48.599033698s ago: executing program 1 (id=1208): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/timer\x00', 0x0, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, 0x0, 0x0) 45.997732138s ago: executing program 0 (id=1209): r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) close(r0) socket$key(0xf, 0x3, 0x2) sendmsg$IPSET_CMD_DEL(r0, &(0x7f00000025c0)={0x0, 0x0, &(0x7f0000002580)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0x24004004) 45.976926981s ago: executing program 1 (id=1210): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x40040, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[], 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0xc054) 45.822010811s ago: executing program 1 (id=1211): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) socket(0x1d, 0x2, 0x6) ioctl$KDGKBLED(r1, 0x5450, 0x0) 45.821829691s ago: executing program 0 (id=1212): r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x1) renameat(r1, &(0x7f0000000100)='./file1\x00', r1, &(0x7f0000000140)='./file0\x00') 45.660073151s ago: executing program 0 (id=1213): r0 = openat$null(0xffffff9c, &(0x7f0000000100), 0x200000, 0x0) close(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$LOOP_GET_STATUS(r0, 0x2, &(0x7f0000000040)) 45.659834151s ago: executing program 1 (id=1214): r0 = openat$selinux_policy(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x45}, 0x884) 45.577761842s ago: executing program 0 (id=1215): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) dup3(r0, r1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x22, &(0x7f0000000080)={'nat\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000000140)=0x78) 45.446605268s ago: executing program 1 (id=1216): r0 = landlock_create_ruleset(&(0x7f0000000040)={0x8738}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) r1 = openat$dsp(0xffffff9c, &(0x7f00000006c0), 0x0, 0x0) ioctl$SOUND_MIXER_READ_RECMASK(r1, 0x80044dfd, 0x0) 45.446372008s ago: executing program 0 (id=1217): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000001c0)={0x1d, r1, 0x1}, 0x18) write$P9_RWRITE(r0, &(0x7f0000000000)={0xb, 0x77, 0x1, 0xa}, 0xb) 15.101376532s ago: executing program 1 (id=1218): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000780)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x8040) 0s ago: executing program 32 (id=1217): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000140)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000001c0)={0x1d, r1, 0x1}, 0x18) write$P9_RWRITE(r0, &(0x7f0000000000)={0xb, 0x77, 0x1, 0xa}, 0xb) kernel console output (not intermixed with test programs): [ 81.491687][ T29] audit: type=1400 audit(80.600:56): avc: denied { read write } for pid=3091 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.496206][ T29] audit: type=1400 audit(80.600:57): avc: denied { open } for pid=3091 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:11433' (ED25519) to the list of known hosts. [ 97.572527][ T29] audit: type=1400 audit(96.680:58): avc: denied { name_bind } for pid=3094 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 99.189930][ T29] audit: type=1400 audit(98.290:59): avc: denied { execute } for pid=3095 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 99.209487][ T29] audit: type=1400 audit(98.310:60): avc: denied { execute_no_trans } for pid=3095 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 103.013820][ T29] audit: type=1400 audit(102.120:61): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 103.019303][ T29] audit: type=1400 audit(102.120:62): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 103.036525][ T3095] cgroup: Unknown subsys name 'net' [ 103.046060][ T29] audit: type=1400 audit(102.150:63): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 103.234353][ T3095] cgroup: Unknown subsys name 'cpuset' [ 103.240473][ T3095] cgroup: Unknown subsys name 'hugetlb' [ 103.243440][ T3095] cgroup: Unknown subsys name 'rlimit' [ 103.472194][ T29] audit: type=1400 audit(102.580:64): avc: denied { setattr } for pid=3095 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 103.483325][ T29] audit: type=1400 audit(102.590:65): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 103.483752][ T29] audit: type=1400 audit(102.590:66): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 103.665925][ T3097] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 103.671845][ T29] audit: type=1400 audit(102.770:67): avc: denied { relabelto } for pid=3097 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 103.675684][ T29] audit: type=1400 audit(102.780:68): avc: denied { write } for pid=3097 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 103.716177][ T29] audit: type=1400 audit(102.820:69): avc: denied { read } for pid=3095 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 103.719247][ T29] audit: type=1400 audit(102.820:70): avc: denied { open } for pid=3095 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 112.328057][ T3095] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 114.480025][ T29] audit: type=1400 audit(113.580:71): avc: denied { execmem } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 114.548877][ T29] audit: type=1400 audit(113.650:72): avc: denied { read } for pid=3100 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 114.553269][ T29] audit: type=1400 audit(113.660:73): avc: denied { open } for pid=3100 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 114.558949][ T29] audit: type=1400 audit(113.660:74): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 114.585749][ T29] audit: type=1400 audit(113.690:76): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 114.587393][ T29] audit: type=1400 audit(113.690:75): avc: denied { module_request } for pid=3101 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 114.672369][ T29] audit: type=1400 audit(113.780:77): avc: denied { sys_module } for pid=3101 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 115.423521][ T29] audit: type=1400 audit(114.530:78): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 116.634203][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 116.667135][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 116.717555][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 116.743914][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 117.363601][ T3100] hsr_slave_0: entered promiscuous mode [ 117.367096][ T3100] hsr_slave_1: entered promiscuous mode [ 117.667549][ T3101] hsr_slave_0: entered promiscuous mode [ 117.670578][ T3101] hsr_slave_1: entered promiscuous mode [ 117.673962][ T3101] debugfs: 'hsr0' already exists in 'hsr' [ 117.675596][ T3101] Cannot create hsr debugfs directory [ 117.715868][ T29] audit: type=1400 audit(116.820:79): avc: denied { create } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 117.721477][ T29] audit: type=1400 audit(116.820:80): avc: denied { write } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 117.740395][ T3100] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 117.758123][ T3100] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 117.771998][ T3100] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 117.784746][ T3100] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 118.133361][ T3101] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 118.145529][ T3101] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 118.157941][ T3101] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 118.179679][ T3101] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 118.729688][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 118.859489][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 121.815150][ T3100] veth0_vlan: entered promiscuous mode [ 121.847677][ T3100] veth1_vlan: entered promiscuous mode [ 121.906872][ T3101] veth0_vlan: entered promiscuous mode [ 121.932262][ T3101] veth1_vlan: entered promiscuous mode [ 121.965423][ T3100] veth0_macvtap: entered promiscuous mode [ 121.985656][ T3100] veth1_macvtap: entered promiscuous mode [ 122.054736][ T3101] veth0_macvtap: entered promiscuous mode [ 122.067525][ T3101] veth1_macvtap: entered promiscuous mode [ 122.122763][ T53] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 122.123384][ T53] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 122.123480][ T53] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 122.123542][ T53] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 122.268229][ T53] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 122.306220][ T53] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 122.312201][ T53] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 122.312613][ T53] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 122.326715][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 122.329650][ T29] audit: type=1400 audit(121.430:82): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 122.338071][ T29] audit: type=1400 audit(121.440:83): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzkaller.ghRhWy/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 122.348575][ T29] audit: type=1400 audit(121.450:84): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 122.362115][ T29] audit: type=1400 audit(121.470:85): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzkaller.ghRhWy/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 122.368241][ T29] audit: type=1400 audit(121.470:86): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzkaller.ghRhWy/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=869 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 122.392766][ T29] audit: type=1400 audit(121.500:87): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 122.415499][ T29] audit: type=1400 audit(121.520:88): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 122.420452][ T29] audit: type=1400 audit(121.520:89): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="gadgetfs" ino=870 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 122.442796][ T29] audit: type=1400 audit(121.550:90): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 122.447571][ T29] audit: type=1400 audit(121.550:91): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 122.537533][ T3100] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 124.737775][ T3741] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3741 comm=syz.0.17 [ 130.266101][ T3800] Zero length message leads to an empty skb [ 130.957666][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 130.959275][ T29] audit: type=1400 audit(130.060:114): avc: denied { ioctl } for pid=3801 comm="syz.1.44" path="socket:[2702]" dev="sockfs" ino=2702 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 130.964074][ T29] audit: type=1400 audit(130.070:115): avc: denied { bind } for pid=3801 comm="syz.1.44" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 135.021820][ T29] audit: type=1400 audit(134.120:116): avc: denied { create } for pid=3812 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 137.250238][ T29] audit: type=1400 audit(136.350:117): avc: denied { create } for pid=3836 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 137.253577][ T29] audit: type=1400 audit(136.360:118): avc: denied { write } for pid=3836 comm="syz.1.61" path="socket:[2755]" dev="sockfs" ino=2755 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 138.410183][ T29] audit: type=1400 audit(137.510:119): avc: denied { write } for pid=3864 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 138.845495][ T3881] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=152 sclass=netlink_route_socket pid=3881 comm=syz.1.83 [ 139.412636][ T3903] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3903 comm=syz.0.93 [ 139.983046][ T29] audit: type=1400 audit(139.090:120): avc: denied { write } for pid=3917 comm="syz.0.100" name="netstat" dev="proc" ino=4026532714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 142.233072][ T29] audit: type=1400 audit(141.340:121): avc: denied { create } for pid=3931 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 142.242447][ T29] audit: type=1400 audit(141.350:122): avc: denied { write } for pid=3931 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 142.246169][ T29] audit: type=1400 audit(141.350:123): avc: denied { read } for pid=3931 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 142.557018][ T3940] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3940 comm=syz.1.110 [ 142.963900][ T29] audit: type=1400 audit(142.060:124): avc: denied { ioctl } for pid=3942 comm="syz.0.112" path="socket:[3341]" dev="sockfs" ino=3341 ioctlcmd=0x5408 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 143.599108][ T3951] capability: warning: `syz.1.115' uses 32-bit capabilities (legacy support in use) [ 150.182497][ T29] audit: type=1400 audit(149.280:125): avc: denied { map } for pid=3953 comm="syz.1.118" path="socket:[3358]" dev="sockfs" ino=3358 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 151.587350][ T29] audit: type=1400 audit(150.690:126): avc: denied { mounton } for pid=3985 comm="syz.0.131" path="/47/file0" dev="tmpfs" ino=260 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 152.794915][ T29] audit: type=1400 audit(151.900:127): avc: denied { execute } for pid=4000 comm="syz.1.138" name="file0" dev="tmpfs" ino=472 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 152.929022][ T4001] process 'syz.1.138' launched './file0' with NULL argv: empty string added [ 152.933732][ T29] audit: type=1400 audit(152.030:128): avc: denied { execute_no_trans } for pid=4000 comm="syz.1.138" path="/89/file0" dev="tmpfs" ino=472 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 155.988046][ T29] audit: type=1400 audit(155.090:129): avc: denied { map_create } for pid=4071 comm="syz.0.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 156.883059][ T29] audit: type=1400 audit(155.990:130): avc: denied { create } for pid=4097 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 159.250402][ T4135] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5126 sclass=netlink_tcpdiag_socket pid=4135 comm=syz.1.201 [ 160.857642][ T4160] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4160 comm=syz.0.213 [ 162.204233][ T29] audit: type=1400 audit(161.310:131): avc: denied { ioctl } for pid=4194 comm="syz.1.231" path="socket:[3744]" dev="sockfs" ino=3744 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 162.636483][ T4209] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5136 sclass=netlink_route_socket pid=4209 comm=syz.1.238 [ 162.980214][ T4215] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=261 sclass=netlink_route_socket pid=4215 comm=syz.1.241 [ 165.540093][ T4276] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4276 comm=syz.0.271 [ 166.997142][ T29] audit: type=1400 audit(166.100:132): avc: denied { allowed } for pid=4301 comm="syz.1.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 167.009394][ T29] audit: type=1400 audit(166.110:133): avc: denied { create } for pid=4301 comm="syz.1.283" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 167.022513][ T29] audit: type=1400 audit(166.130:134): avc: denied { ioctl } for pid=4301 comm="syz.1.283" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4672 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 167.779952][ T4318] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4318 comm=syz.1.291 [ 168.320142][ T4328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4328 comm=syz.1.296 [ 170.807980][ T29] audit: type=1400 audit(169.890:135): avc: denied { remount } for pid=4389 comm="syz.0.324" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 171.327309][ T29] audit: type=1400 audit(170.430:136): avc: denied { getopt } for pid=4404 comm="syz.0.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 173.092865][ T29] audit: type=1400 audit(172.200:137): avc: denied { write } for pid=4449 comm="syz.1.350" lport=135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 175.778070][ T29] audit: type=1400 audit(174.880:138): avc: denied { create } for pid=4502 comm="syz.1.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 175.805364][ T29] audit: type=1400 audit(174.910:139): avc: denied { ioctl } for pid=4502 comm="syz.1.375" path="socket:[5224]" dev="sockfs" ino=5224 ioctlcmd=0x541a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 176.098851][ T29] audit: type=1400 audit(175.200:140): avc: denied { create } for pid=4511 comm="syz.0.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 176.112723][ T29] audit: type=1400 audit(175.220:141): avc: denied { write } for pid=4511 comm="syz.0.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 176.721465][ T29] audit: type=1400 audit(175.820:142): avc: denied { setopt } for pid=4525 comm="syz.1.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 177.973104][ T4551] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=4551 comm=syz.1.399 [ 180.338938][ T4583] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4583 comm=syz.1.414 [ 181.408400][ T4603] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4603 comm=syz.1.424 [ 181.508886][ T29] audit: type=1400 audit(180.610:143): avc: denied { name_bind } for pid=4604 comm="syz.1.425" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 181.509388][ T29] audit: type=1400 audit(180.610:144): avc: denied { node_bind } for pid=4604 comm="syz.1.425" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 186.139292][ T4638] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4638 comm=syz.1.441 [ 193.429953][ T4730] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4730 comm=syz.1.484 [ 194.244718][ T29] audit: type=1400 audit(193.350:145): avc: denied { write } for pid=4751 comm="syz.1.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 196.900327][ T4812] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4812 comm=syz.0.523 [ 197.412647][ T29] audit: type=1400 audit(196.520:146): avc: denied { map } for pid=4822 comm="syz.0.529" path="socket:[6792]" dev="sockfs" ino=6792 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 197.779471][ T29] audit: type=1400 audit(196.880:147): avc: denied { write } for pid=4829 comm="syz.1.532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 198.186425][ T29] audit: type=1400 audit(197.290:148): avc: denied { audit_write } for pid=4839 comm="syz.0.538" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 199.408534][ T29] audit: type=1400 audit(198.510:149): avc: denied { getopt } for pid=4868 comm="syz.1.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 199.729069][ T4879] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4879 comm=syz.0.557 [ 200.355036][ T4896] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4896 comm=syz.0.565 [ 200.898800][ T4911] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4911 comm=syz.0.572 [ 204.769683][ T4979] syz.0.604 uses obsolete (PF_INET,SOCK_PACKET) [ 205.075099][ T29] audit: type=1400 audit(204.180:150): avc: denied { create } for pid=4983 comm="syz.0.606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 205.086374][ T29] audit: type=1400 audit(204.190:151): avc: denied { create } for pid=4983 comm="syz.0.606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 205.105661][ T4984] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1548 sclass=netlink_xfrm_socket pid=4984 comm=syz.0.606 [ 205.105991][ T29] audit: type=1400 audit(204.210:152): avc: denied { write } for pid=4983 comm="syz.0.606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 205.258834][ T29] audit: type=1400 audit(204.360:153): avc: denied { create } for pid=4985 comm="syz.1.607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 206.373838][ T5014] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5014 comm=syz.1.620 [ 208.060337][ T29] audit: type=1400 audit(207.160:154): avc: denied { lock } for pid=5058 comm="syz.0.643" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 209.325230][ T29] audit: type=1400 audit(208.430:155): avc: denied { create } for pid=5101 comm="syz.1.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 209.336155][ T29] audit: type=1400 audit(208.440:156): avc: denied { write } for pid=5101 comm="syz.1.661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 211.214264][ T29] audit: type=1400 audit(210.320:157): avc: denied { ioctl } for pid=5146 comm="syz.1.683" path="socket:[6119]" dev="sockfs" ino=6119 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 211.555787][ T29] audit: type=1400 audit(210.660:158): avc: denied { connect } for pid=5157 comm="syz.1.689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 211.582799][ T29] audit: type=1400 audit(210.690:159): avc: denied { shutdown } for pid=5157 comm="syz.1.689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 211.587486][ T29] audit: type=1400 audit(210.690:160): avc: denied { write } for pid=5157 comm="syz.1.689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 216.583992][ T29] audit: type=1400 audit(215.690:161): avc: denied { setopt } for pid=5214 comm="syz.0.717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 217.036596][ T29] audit: type=1400 audit(216.140:162): avc: denied { map_read map_write } for pid=5219 comm="syz.1.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 218.488393][ T5237] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5237 comm=syz.0.727 [ 218.797529][ T29] audit: type=1400 audit(217.900:163): avc: denied { read } for pid=5238 comm="syz.0.728" path="socket:[8344]" dev="sockfs" ino=8344 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 218.803262][ T29] audit: type=1400 audit(217.910:164): avc: denied { bind } for pid=5238 comm="syz.0.728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 223.712714][ T5289] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5289 comm=syz.0.752 [ 226.000217][ T5319] syz.1.767(5319): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 226.536611][ T5334] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5334 comm=syz.1.774 [ 231.516222][ T5383] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5129 sclass=netlink_audit_socket pid=5383 comm=syz.1.798 [ 234.284583][ T29] audit: type=1400 audit(233.390:165): avc: denied { setattr } for pid=5414 comm="syz.0.814" name="RAWv6" dev="sockfs" ino=7892 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 234.289607][ T29] audit: type=1400 audit(233.390:166): avc: denied { ioctl } for pid=5414 comm="syz.0.814" path="socket:[7892]" dev="sockfs" ino=7892 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 234.728467][ T5429] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5429 comm=syz.1.819 [ 235.072020][ T3789] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 235.222663][ T3789] usb 1-1: Using ep0 maxpacket: 32 [ 235.239094][ T3789] usb 1-1: unable to get BOS descriptor or descriptor too short [ 235.254960][ T3789] usb 1-1: config 1 interface 0 altsetting 6 bulk endpoint 0x3 has invalid maxpacket 32 [ 235.258776][ T3789] usb 1-1: config 1 interface 0 has no altsetting 0 [ 235.280393][ T3789] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 235.285603][ T3789] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 235.287794][ T3789] usb 1-1: Product: syz [ 235.288585][ T3789] usb 1-1: Manufacturer: syz [ 235.289332][ T3789] usb 1-1: SerialNumber: syz [ 235.307850][ T5426] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 235.544359][ T3789] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -71 [ 235.565048][ T3789] usb 1-1: USB disconnect, device number 2 [ 238.070542][ T5504] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5504 comm=syz.1.849 [ 238.970499][ T5530] SELinux: Context system_u:object_r:hugetlbfs_t:s0 is not valid (left unmapped). [ 238.977106][ T29] audit: type=1400 audit(238.080:167): avc: denied { relabelto } for pid=5529 comm="syz.1.865" name=".log" dev="tmpfs" ino=2738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:hugetlbfs_t:s0" [ 238.992889][ T29] audit: type=1400 audit(238.090:168): avc: denied { associate } for pid=5529 comm="syz.1.865" name=".log" dev="tmpfs" ino=2738 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hugetlbfs_t:s0" [ 239.020586][ T29] audit: type=1400 audit(238.120:169): avc: denied { unlink } for pid=3101 comm="syz-executor" name=".log" dev="tmpfs" ino=2738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:hugetlbfs_t:s0" [ 239.623585][ T29] audit: type=1400 audit(238.730:170): avc: denied { ioctl } for pid=5544 comm="syz.1.870" path="socket:[8899]" dev="sockfs" ino=8899 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 240.091804][ T5560] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5560 comm=syz.0.874 [ 243.477995][ T29] audit: type=1400 audit(242.580:171): avc: denied { create } for pid=5586 comm="syz.0.890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 243.487728][ T29] audit: type=1400 audit(242.590:172): avc: denied { setopt } for pid=5586 comm="syz.0.890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 243.498959][ T29] audit: type=1400 audit(242.600:173): avc: denied { connect } for pid=5586 comm="syz.0.890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 243.522611][ T29] audit: type=1400 audit(242.630:174): avc: denied { write } for pid=5586 comm="syz.0.890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 244.968414][ T5602] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5602 comm=syz.1.897 [ 247.767206][ T5667] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5667 comm=syz.1.929 [ 250.628564][ T29] audit: type=1400 audit(249.730:175): avc: denied { setopt } for pid=5689 comm="syz.0.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 251.686425][ T29] audit: type=1400 audit(250.790:176): avc: denied { read } for pid=5703 comm="syz.0.947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 257.507062][ T5784] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5784 comm=syz.0.986 [ 257.580121][ T29] audit: type=1400 audit(256.680:177): avc: denied { setopt } for pid=5785 comm="syz.1.987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 261.219458][ T5808] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1548 sclass=netlink_xfrm_socket pid=5808 comm=syz.1.993 [ 266.616459][ T5899] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5899 comm=syz.0.1038 [ 267.401724][ T5920] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5920 comm=syz.0.1045 [ 268.212470][ T5939] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5939 comm=syz.1.1052 [ 268.413584][ T5943] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5943 comm=syz.0.1055 [ 274.788485][ T5994] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 274.801638][ T29] audit: type=1400 audit(273.900:178): avc: denied { connect } for pid=5992 comm="syz.0.1080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 275.447026][ T6011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1016 sclass=netlink_route_socket pid=6011 comm=syz.1.1089 [ 276.047118][ T6029] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1016 sclass=netlink_route_socket pid=6029 comm=syz.0.1101 [ 276.056418][ T6030] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6030 comm=syz.1.1096 [ 280.606298][ T6105] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1001 sclass=netlink_tcpdiag_socket pid=6105 comm=syz.0.1137 [ 281.106855][ T29] audit: type=1400 audit(280.210:179): avc: denied { unmount } for pid=6118 comm="syz.0.1141" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 282.137253][ T6144] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1001 sclass=netlink_tcpdiag_socket pid=6144 comm=syz.1.1150 [ 284.844867][ T6195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6195 comm=syz.1.1176 [ 285.273960][ T6207] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6207 comm=syz.0.1184 [ 288.783877][ T29] audit: type=1400 audit(287.890:180): avc: denied { ioctl } for pid=6243 comm="syz.1.1202" path="socket:[11499]" dev="sockfs" ino=11499 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 288.975874][ T29] audit: type=1400 audit(288.080:181): avc: denied { mount } for pid=6247 comm="syz.1.1204" name="/" dev="ramfs" ino=10998 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 594.611220][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 594.613528][ C1] rcu: 1-....: (30006 ticks this GP) idle=c914/1/0x40000004 softirq=14080/14082 fqs=14984 [ 594.614072][ C1] rcu: hardirqs softirqs csw/system [ 594.615544][ C1] rcu: number: 23237 0 0 [ 594.616384][ C1] rcu: cputime: 6411 143587 0 ==> 150000(ms) [ 594.619132][ C1] rcu: (t=30001 jiffies g=28337 q=151 ncpus=2) [ 594.622287][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 594.624256][ C1] Hardware name: ARM-Versatile Express [ 594.625677][ C1] PC is at _raw_spin_lock+0x4c/0x58 [ 594.627072][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 594.627379][ C1] pc : [<81abc000>] lr : [<81abbfcc>] psr: 80000113 [ 594.628658][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 594.628954][ C1] r10: 81c05450 r9 : 84071040 r8 : 83fc6288 [ 594.629288][ C1] r7 : 84071168 r6 : 00000001 r5 : 00000001 r4 : 84071168 [ 594.629635][ C1] r3 : 00009fd5 r2 : 00009fd6 r1 : 00000000 r0 : 00000001 [ 594.630087][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 594.630488][ C1] Control: 30c5387d Table: 84eab4c0 DAC: 00000000 [ 594.631135][ C1] Call trace: frame pointer underflow [ 594.633408][ C1] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 594.635863][ C1] r5:00000001 r4:84071040 [ 594.637070][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 594.638898][ C1] r7:00000001 r6:00000000 r5:00000000 r4:843463c0 [ 594.639300][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.639830][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.640342][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:fffffd74 r6:00000007 r5:00000001 [ 594.640721][ C1] r4:843463c0 [ 594.640893][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 594.641353][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 594.641746][ C1] r5:83300044 r4:83300044 [ 594.641974][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca4d4>] (led_set_brightness_nosleep+0x38/0x44) [ 594.642398][ C1] r5:83300044 r4:844c290c [ 594.642620][ C1] [<809ca49c>] (led_set_brightness_nosleep) from [<809cd538>] (led_heartbeat_function+0x84/0x144) [ 594.643056][ C1] [<809cd4b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 594.643466][ C1] r7:fffffd74 r6:809cd4b4 r5:844c290c r4:83216000 [ 594.643754][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 594.644165][ C1] r9:df805ebc r8:fffffd74 r7:00000000 r6:809cd4b4 r5:dddd9f00 r4:844c290c [ 594.644494][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 594.644879][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 594.645214][ C1] r4:dddd9f00 [ 594.645386][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 594.645794][ C1] r4:82804084 [ 594.645971][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 594.646349][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 594.646748][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 594.647061][ C1] r4:83216000 [ 594.647226][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 594.647592][ C1] r5:8247f0cc r4:826c3a9c [ 594.647835][ C1] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 594.648223][ C1] [<81aad9e8>] (generic_handle_arch_irq) from [<81a7da0c>] (call_with_stack+0x1c/0x20) [ 594.648644][ C1] r9:83216000 r8:83fc6288 r7:df865e3c r6:ffffffff r5:60000013 r4:809c832c [ 594.649016][ C1] [<81a7d9f0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 594.649514][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 594.649988][ C1] 5e00: e0105008 0000000c 00009fd5 00000000 e0105008 0000000c [ 594.650372][ C1] 5e20: 00000001 84071168 83fc6288 84071040 00000000 df865e6c df865e58 df865e58 [ 594.650712][ C1] 5e40: 809c8328 809c832c 60000013 ffffffff [ 594.651068][ C1] [<809c830c>] (gpio_mmio_write32) from [<809c7b4c>] (gpio_mmio_set+0x64/0x80) [ 594.651446][ C1] r5:00000008 r4:84071040 [ 594.651709][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 594.652091][ C1] r7:00000001 r6:00000000 r5:00000003 r4:843463fc [ 594.652350][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 594.652700][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 594.653233][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:838b7ed8 r5:00000001 [ 594.653530][ C1] r4:843463fc [ 594.653694][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 594.654076][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 594.654462][ C1] r5:000000ff r4:83300314 [ 594.654666][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 594.655055][ C1] r5:000000ff r4:83300314 [ 594.655275][ C1] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 594.655679][ C1] r5:000000ff r4:83300314 [ 594.655877][ C1] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 594.656273][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 594.656534][ C1] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 594.656936][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 594.657276][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 594.657651][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 594.658001][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 594.658325][ C1] r4:00000092 [ 594.658476][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 594.658848][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 594.659258][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0