last executing test programs: 49m43.950339288s ago: executing program 1 (id=988): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x82) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000d40)="273eebfecb7c0e923b065a560215a8f2b25997081911293ec79904693d886452ace8296eb5f90e325bc6e6d032e89e716f3711ea13fb1293e3", 0x39}, {0x0}], 0x2) 49m43.709400761s ago: executing program 1 (id=989): r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) splice(r0, 0x0, r0, 0x0, 0x5, 0x3) 49m43.15467126s ago: executing program 1 (id=990): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/tcp\x00') pread64(r0, &(0x7f000001a240)=""/102400, 0x19000, 0x20000100008) lseek(r0, 0x8, 0x3) 49m42.789591069s ago: executing program 1 (id=991): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x891018, 0x0) mount$bind(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x84000, 0x0) 49m42.37834071s ago: executing program 1 (id=992): mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='hugetlbfs\x00', 0x800007, &(0x7f00000001c0)='gid=1\x00nk]e\xb2}\x9c6\b\xc1\x04\xbb\xbe \x9f\xe7\x8c\xc6\x06y\x89sd\xeb\xf4\x94\x1f\xdf\x91A!\xf9}\xee\xe7\x89\xcf\x99\n[\'\xca\xb3\x84\xb6j\xb9\x8c#\xf4\xf0\x96\x8e\xaa\x04\x82\x99f7\xf3\xd8\x17\xfc\x00\x00\x00\x00\x9c$Nn\x13\x8f\xf7\b\x00\x00\x00/\xf5|H\xe1\xbd0\x0fz\xbat\x0e-\x95c.j\xdd\xbe\x1dc3\xca\xd5\x91\xc8\x12f\x90\xac\x97\xdb\x06\x10?]\")\xb4\xe7tD6G\"<') 49m41.713091225s ago: executing program 1 (id=993): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x80) readv(r0, &(0x7f0000000640)=[{&(0x7f00000004c0)=""/251, 0xfb}, {0x0}], 0x2) 49m41.712852975s ago: executing program 32 (id=993): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x80) readv(r0, &(0x7f0000000640)=[{&(0x7f00000004c0)=""/251, 0xfb}, {0x0}], 0x2) 1m1.380647711s ago: executing program 0 (id=3071): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000640)=ANY=[@ANYBLOB="1201000000000010ac05418200000020000109022400010000000009040000010300000009210000000122050009058103"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000280)={0x24, &(0x7f0000000000)={0x40, 0x3f, 0x49, {0x49, 0x8, "37abd09e1bd81dbe8fb8d45942825f49e8abd0dbacf40641b6c7c59c9ddcf9577311dfb1b79818a56bca233c13e3cd91a2daf2de9d1a8d02e0dbbaff7b9b2b69d6bd53d18b6bcf"}}, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x0}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) removexattr(0x0, 0x0) 50.999315829s ago: executing program 0 (id=3072): r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x76, 0x101301) ioctl$USBDEVFS_ALLOC_STREAMS(r0, 0x8008551c, &(0x7f0000000400)=ANY=[]) 40.486913813s ago: executing program 0 (id=3073): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001cc0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x4}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 29.716957831s ago: executing program 0 (id=3074): r0 = socket$kcm(0x29, 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r3, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb4b, 0x9, 0x8, 0x0, 0x400003}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000cc0)=ANY=[@ANYBLOB="b700000018000000bfa30000000000000703000028feffff7a0af0fff8ffffff61a4f0ff0000000015040000000002000f040000000000003404ffc101ed0a0065040000170000801f400000000000007b0a00fe000000002c04000000000000c6000000000000009500000000000000023bc065b7a379d17cf9333379fc9e84af69912435f1b6a693002e7f3be361917adef6ee1c8a2b4f8ef1e50b91f32050e436fe275daf51efd601b6482a0800000098efefb202ee010400006e7a1de4a21f379dbf01de00b1b564fef3bef70548aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb7798b3e6440c2fbdb00a3e35208b0bbf12cd8dff0c710e4000000000000009fbe4b61a615c6c57a2b649dc74a1a610643b08d9ec21ead2ed51b104d4d91af25b8123deda8a3658d42ecbf1dbf6d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31a76e42f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0800000000000000d5f728d236619074d6ebdf098bc908f50ae728a40f9411fe7226a4040bef29b66e3858d051c096e37c4f46010400000000c3da29faf75ddd1aa96960bca97af13382cb881cc1f62c0f8f8f0e8d76b86f9c45636614786f5a2cb77230a874640dcbe0b20bb77c022d0cab080078fce8c5c81b7037181fc2f18f781aaa6e2957d7e39cc1baddcb7ec6667e699f24e41697ee7ea23e4b29a8b6cc9a1f5a7b3caae05f13792292cb949b3aab06b1e042ff2164d80c605532b18ab1c156b97e5889685a96949e4cb40df77b8bb84b0e733a63784ccc214d930cbb7e090df9a2867b3acec439c163fcd7071b53ac29df826f8ae6d6e18c1eacf5bf870768d5217e9bb5a05d9e22ce67f1231bd236486727d970acc546087acbf30f2f8165b47ba56dfadd14b306e98931481747292c6fe6e188750cf4f87cce2aa7d67c7133a9f05954cde298a35ea6d715ba80aee63300000000000000000000000000000000000040000000000000000386000000b854adb4f8080064e8407c6bdb37114c80fbaa4a0ec5aaf4b0ac6f2128668279eb6fc144344e2d461c9a1be8fa0061ea9d55ee4716bea8e1cebf9ed39325ab4c5530dd6ee9fffc00000000000000d7c5af73c683625aaad5eda5004a76c9f8975ed4c5e4eb3e77e9885769754932609f19e2f615a01cb6d17fbf5cb539403cb0572534f054d5514ad8269b2bdf2ca4958a62a6e744f9a4c1e646e1dd2ca19583f0f8b0dc53debd7d44f334e6ed7445a9580f970e483b307c4b3cea8bc194b23d37e6a2e52d8288e5aab6fec586d52386e8c07a88c88e8faec5f1b16b2014f6952ce7d6be12c6bdb9651ca6fc907061be311d1354e6295698594a73136237bee068d3819400e43544830a3f74b7942f22336953978a5b2032da4238cc61162c04c1297395b73e18c9387615a2bc87d9e2445f3d323d3fac347932a4bac694c55fe9d145906d410f58f1951405d10504efe402cae085afef5dbd617e87ddbd23834a50d7eb8e327fb5db12cbd6a9efe8e671c4f251fe3bf440cabdfe3400a670d14b9b3cd8d86e492997a0168c022ef3536bd1dc731f4f9f8cb6c3857fb8aaaa95024f8da775f72950212b84fc6133ae14d1429cd4905dabb52e43af7e65acf97b4951fa1e967d16a5ed642efc855a4a46b85cd079934ad3188276efae9387eaa2c910fb8de24b5d4fded86c3811ccd00520150b16000080122965558074956da5e4c3bbefcb64aa8be4456ed2caf0f467b6bbf3aa4371f5e76ab3f60afea80bb066aafb7517f787b090f419a20278a3c779e03afd9a6af6fd518e5dce030f88ec5a5cb7601a161da0f8089322d84ac523040d13e1f1300c2c6555bce60d95dd3288e53435713f03add23f14c8db5555c62de4f626483632a2ab547f88dd6efec73a0271a19ca3aa860aa4dcaeeb9bd91a0cb429efae2a5fcc08b3a572969bbe91c921ac1476027772c87d1767e31a3446cd57fafea83e495a6a1d1a4ebf83434986091dd66ffe3ffed0c39552a312e2db596d9c828c02f6fc13c8ddbb50bfd7dd8aa2f35f259fc83e007f00a292dd3b856faa4b7e66e1b64505f65900839df71a97d4d05d37f7ecf8ed9a22da26ae674bba16c204f6b2f8f74fc56b7126d7c11ece6e88ec41192aaee75415c58d264a2b6adae02c821b62428902aad499825ab85a348638384cd12e61dbde5c47056f0a20b4e2a2328d5db5cfe56557a129e6be231acf5f57995c60d9fca5f63a0dfd18054717120bda466d04774b530500d8b022719ca77a4e0a66b4708f791d849a5e2aaa0074a9560ede2600df5a5c41392fe9460080fcb1e65233fb8dbeec4c86dbcf6a0673e38d2d3615e5bfbde44afe0fa7564231fff7e7f1f3ad68492dd2ccb1decb15b5d7d3e37e8b7d28921c4b9280979521173f322df408d9818b6cc400098abb869921911480a876fbba698801937e8b4264eb6f5137bd9b075f1488d22230592a79000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f316aa0886c174b73decb46c1c85edf50d8fcbac5ff76b365611666da86a8e65b308706bd7c000000000000003f7cd4d5cb9076b81b7741ec03877afb5237ea1694addebc14c3ae49f88c462aa2050acf2d9a97d3be29a5614d1eba2c98cf0236401e02d7c445e50f76419ab4f78f67a09e63dd4faa2e7b59399f055f2fa278783fefb0a5ef0b41e14a6fe6ba306206670b84894e901a523fcbadfeff535f2514bc834e876810d9a6a78e70a9e22860c36a724770b4185de44db6bf21fef32a8d5b36d9014f38fee012365f963b2a85e7d8075c333475b9be0bdd37220e316f2297743dd4731614a50c16c6a41744c3d24eab511317f97b7b4a1c2ec33fedc46e9bf0fa640eebd3d58f0ebdb7cb8ccffd6d6ab7e0e843591d2618e2d2cdc7081c8fafffe9c350a5c554a387de4ee7aac6478d99de7dd82bef044a6d33c789d566c90c46ad581aa22f910547a77d55e26bf19f1d4661550b177ef53933a305e69b8a95119d2a673bdae05779208409e6cf5bda599d625054776151b2cd1fcde238bdc527594a6c17aa9728af7a3830e7092b01b119ea4e7e7f0e21527d622cc29c9f0c8720195368f8a9d3374337ab4d130619d93c5ef37e7ddd0b2da147e6e513455b88753452de959a6cbfa1ffbc7ad5d8c3b48017fd31dcf72f337b639253f44cb27a12174bc4c191e21015d0c431a71906eb9c6a14c8a060459ef26787ce3d1cbfd5cc459f0048b5d06f6cbd3e9b34c89f3fb2f951ae81d7fcc8bc0000000000000000000000000000000000000000009231feef3117197c7963c2ba910969f776c8b2ea3970f358107945d9e74e9bdfa58e68b65a9201bc4b73b431df5aa29f363917f90e3fa1eaf553db1c761dd9b634a9c4d7c21d24fe6d953ed9438cad0f8dfe03e5e2f73019352f1fb682a5a6ebbf24ebc49e3d7058e696eb3f4b642f36c9006c0067e24a64aa8c53dd824a4ee271e35ed9eed636338f1835fc957729d63dc1bfc7b772cbe536c2d3aff27c22f9a2f876512616a5bdaf22a16e19d1b5f52abbef9fc92e3eb9560934de659c1a397ce901000000caae1bcfdce33dae6adc260321702f239c25ab181390e7dc8c1e5b1cf3b4fef1cd5c44a89b5e5d8314e02f4673ded90bce9a4025b0232eec970f7aa17f175a14e8dc8de9bac0006b98a8283eee5665f3aede28228e0468dbcf8b776fe4c629d3af183a7cba5adf77f23d31f9d5a183c0da4e95f75b1496a97a46a06e4e1f5a"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') openat$fb0(0xffffffffffffff9c, 0x0, 0x2100c0, 0x0) r4 = getpid() r5 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETAW(r5, 0x5407, &(0x7f0000000100)={0xa, 0x7, 0x3, 0x6, 0x1b}) ioctl$TIOCMSET(r5, 0x5418, 0x0) r6 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x38, 0x3c, 0x107, 0x0, 0x0, {0x1, 0x7c}, [@nested={0x4, 0xfc}, @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x6, 0x6, 0x0, 0x0, @str='\x80\n'}]}, @nested={0x8, 0x2, 0x0, 0x1, [@nested={0x4, 0x72}]}, @typed={0xc, 0x5, 0x0, 0x0, @u64=0xffffffffffffff78}]}, 0x38}, 0x1, 0x0, 0x0, 0xc000}, 0xc000) ptrace(0x10, 0x0) ptrace$ARCH_MAP_VDSO_X32(0x1e, 0x0, 0x86f, 0x2001) close_range(r6, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) prlimit64(r4, 0x0, &(0x7f0000000000), 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) 19.317454559s ago: executing program 0 (id=3075): prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x42f82, 0x0) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000180)) write$dsp(r1, &(0x7f00000001c0)="5cba91a4", 0xffffffd9) 14.887011818s ago: executing program 2 (id=3079): r0 = openat$iommufd(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000080)={0xc, 0x0, 0x0}) r2 = dup(r0) ioctl$IOMMU_IOAS_UNMAP$ALL(r2, 0x3b86, &(0x7f00000000c0)={0x18, r1}) 14.662528031s ago: executing program 2 (id=3080): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000140), 0x10) r1 = syz_io_uring_setup(0x835, &(0x7f00000000c0)={0x0, 0x679a, 0x400, 0x2000006, 0x3ce}, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r0, 0x0, &(0x7f0000000240)="144024aeae8b2b5d63f7449a372e1406d4defe495b5744eed6801d1d51e1d3fcdcf25bdf4a5f2ef4b45d6898757795c858f0c3d4b26bd644", 0x38, 0x2400c0c7, 0x1}) io_uring_enter(r1, 0x3516, 0x0, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) 13.690516251s ago: executing program 2 (id=3081): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_emit_ethernet(0xaa, &(0x7f0000000ac0)=ANY=[@ANYBLOB="9a70b05e7d2caaaaaaaaa8aa86dd606410a600740000fc020000000000000000000000000000fe8000000000000000000000000000aa223427d5c9a46b9fa14172170a013589317d2af31ba55431762f462a5abc3f46494ee91bfca594d52f8c3785143e92da5d2d81edc09f68f122fbf741257bf1319408347a17c89212dfe27a0fc65362487e5afe673f0954f60d9d08b61276ce0b3aa520b5f30a9f52c4aaaf159b7e6b53fc003f8570383ca635fc233e0fd9"], 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000300)=ANY=[@ANYBLOB="18000000240001030000000000000000010000000400ae"], 0x18}, 0x1, 0x0, 0x0, 0x8001}, 0x4000) recvmmsg(r0, &(0x7f0000001a40)=[{{0x0, 0x0, 0x0}, 0x200001}, {{0x0, 0x0, 0x0}, 0x2046}, {{0x0, 0x0, 0x0}, 0x1}, {{0x0, 0x0, 0x0}, 0x100101}, {{0x0, 0x0, 0x0}, 0x40}, {{0x0, 0x0, 0x0}, 0x409}, {{0x0, 0x0, 0x0}, 0x8008}, {{0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000001940)=""/245, 0xf5}, 0x1}], 0x8, 0x40010020, 0x0) 7.797271436s ago: executing program 0 (id=3082): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x45}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000040)={0x0, 0xb}) 780.994499ms ago: executing program 2 (id=3083): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r0) sendmsg$NFC_CMD_DEV_UP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="11f21f3d91cc189c204113cb", @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x0) 390.16708ms ago: executing program 2 (id=3084): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, 0x0) r1 = dup(r0) ioctl$IOMMU_IOAS_UNMAP$ALL(r1, 0x3b86, &(0x7f00000000c0)={0x18}) 0s ago: executing program 2 (id=3085): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000000), r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@NBD_ATTR_SOCKETS={0x10, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xe42}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x870}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x24000010) kernel console output (not intermixed with test programs): : avc: denied { write } for pid=9217 comm="syz.2.2065" path="socket:[23563]" dev="sockfs" ino=23563 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3468.743671][ T30] audit: type=1400 audit(3468.126:610): avc: denied { append } for pid=9221 comm="syz.2.2067" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 3468.770327][ T9222] random: crng reseeded on system resumption [ 3468.785218][ T30] audit: type=1400 audit(3468.146:611): avc: denied { open } for pid=9221 comm="syz.2.2067" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 3470.364475][ T30] audit: type=1400 audit(3469.736:612): avc: denied { create } for pid=9225 comm="syz.2.2069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 3470.432936][ T30] audit: type=1400 audit(3469.816:613): avc: denied { ioctl } for pid=9225 comm="syz.2.2069" path="socket:[23575]" dev="sockfs" ino=23575 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 3489.813920][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 3489.822499][ T30] audit: type=1400 audit(3489.196:615): avc: denied { sqpoll } for pid=9237 comm="syz.2.2076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3490.314735][ T30] audit: type=1400 audit(3489.696:616): avc: denied { create } for pid=9241 comm="syz.2.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3490.332356][ T30] audit: type=1400 audit(3489.716:617): avc: denied { write } for pid=9241 comm="syz.2.2077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3491.944655][ T9248] netlink: 'syz.2.2080': attribute type 7 has an invalid length. [ 3492.548701][ T9250] serio: Serial port ptm0 [ 3493.448587][ T30] audit: type=1400 audit(3492.826:618): avc: denied { create } for pid=9252 comm="syz.2.2082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 3493.895022][ T30] audit: type=1400 audit(3493.266:619): avc: denied { execmem } for pid=9252 comm="syz.2.2082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3496.134268][ T30] audit: type=1400 audit(3495.496:620): avc: denied { create } for pid=9259 comm="syz.2.2083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3496.162304][ T30] audit: type=1400 audit(3495.546:621): avc: denied { setopt } for pid=9259 comm="syz.2.2083" lport=8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3501.983817][ T30] audit: type=1400 audit(3501.366:622): avc: denied { create } for pid=9275 comm="syz.2.2090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3502.000592][ T30] audit: type=1400 audit(3501.386:623): avc: denied { write } for pid=9275 comm="syz.2.2090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3506.403610][ T30] audit: type=1400 audit(3505.786:624): avc: denied { create } for pid=9289 comm="syz.2.2097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3506.422911][ T30] audit: type=1400 audit(3505.806:625): avc: denied { getopt } for pid=9289 comm="syz.2.2097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3509.631696][ T30] audit: type=1400 audit(3509.016:626): avc: denied { ioctl } for pid=9295 comm="syz.2.2100" path="socket:[23692]" dev="sockfs" ino=23692 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3509.644305][ T30] audit: type=1400 audit(3509.026:627): avc: denied { write } for pid=9295 comm="syz.2.2100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3511.734805][ T30] audit: type=1400 audit(3511.116:628): avc: denied { ioctl } for pid=9301 comm="syz.2.2103" path="socket:[23704]" dev="sockfs" ino=23704 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3511.742903][ T9302] syzkaller1: entered promiscuous mode [ 3511.743924][ T9302] syzkaller1: entered allmulticast mode [ 3513.772843][ T30] audit: type=1400 audit(3513.156:629): avc: denied { write } for pid=9309 comm="syz.2.2107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3513.795004][ T30] audit: type=1400 audit(3513.176:630): avc: denied { nlmsg_write } for pid=9309 comm="syz.2.2107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3514.480976][ T30] audit: type=1400 audit(3513.866:631): avc: denied { getopt } for pid=9311 comm="syz.2.2108" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3514.938883][ T30] audit: type=1400 audit(3514.306:632): avc: denied { ioctl } for pid=9313 comm="syz.2.2109" path="socket:[22911]" dev="sockfs" ino=22911 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3514.940268][ T30] audit: type=1400 audit(3514.316:633): avc: denied { bind } for pid=9313 comm="syz.2.2109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3515.004591][ T9314] hsr0: entered promiscuous mode [ 3515.013641][ T9314] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2109'. [ 3515.023509][ T9314] hsr_slave_0: left promiscuous mode [ 3515.046201][ T9314] hsr_slave_1: left promiscuous mode [ 3515.312581][ T9314] hsr0 (unregistering): left promiscuous mode [ 3520.084035][ T9331] netlink: 'syz.2.2118': attribute type 1 has an invalid length. [ 3520.085017][ T9331] netlink: 'syz.2.2118': attribute type 2 has an invalid length. [ 3521.324770][ T30] audit: type=1400 audit(3520.686:634): avc: denied { create } for pid=9333 comm="syz.2.2119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 3521.380776][ T30] audit: type=1400 audit(3520.746:635): avc: denied { write } for pid=9333 comm="syz.2.2119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 3523.772951][ T30] audit: type=1400 audit(3523.156:636): avc: denied { create } for pid=9347 comm="syz.2.2124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3523.790580][ T30] audit: type=1400 audit(3523.166:637): avc: denied { connect } for pid=9347 comm="syz.2.2124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3523.791946][ T30] audit: type=1400 audit(3523.166:638): avc: denied { bind } for pid=9347 comm="syz.2.2124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3523.794795][ T30] audit: type=1400 audit(3523.166:639): avc: denied { write } for pid=9347 comm="syz.2.2124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3527.061010][ T9363] netlink: 'syz.2.2130': attribute type 10 has an invalid length. [ 3527.496822][ T30] audit: type=1400 audit(3526.876:640): avc: denied { sys_module } for pid=9362 comm="syz.2.2130" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3527.762986][ T9366] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2130'. [ 3532.742350][ T30] audit: type=1400 audit(3532.126:641): avc: denied { create } for pid=9373 comm="syz.2.2134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 3539.337292][ C1] hrtimer: interrupt took 1201408 ns [ 3540.740922][ T9397] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5126 sclass=netlink_audit_socket pid=9397 comm=syz.2.2144 [ 3543.904972][ T30] audit: type=1400 audit(3543.256:642): avc: denied { setopt } for pid=9404 comm="syz.2.2148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3546.874144][ T30] audit: type=1400 audit(3546.246:643): avc: denied { setcheckreqprot } for pid=9412 comm="syz.2.2152" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 3576.142442][ T30] audit: type=1400 audit(3575.526:644): avc: denied { create } for pid=9461 comm="syz.2.2171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3576.164472][ T30] audit: type=1400 audit(3575.546:645): avc: denied { write } for pid=9461 comm="syz.2.2171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3576.174827][ T9464] siw: device registration error -23 [ 3576.196016][ T30] audit: type=1400 audit(3575.576:646): avc: denied { create } for pid=9461 comm="syz.2.2171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3576.223440][ T30] audit: type=1400 audit(3575.596:647): avc: denied { read } for pid=9461 comm="syz.2.2171" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 3576.224621][ T30] audit: type=1400 audit(3575.606:648): avc: denied { open } for pid=9461 comm="syz.2.2171" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 3576.273675][ T30] audit: type=1400 audit(3575.656:649): avc: denied { ioctl } for pid=9461 comm="syz.2.2171" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 3586.178702][ T30] audit: type=1326 audit(3585.556:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9469 comm="syz.2.2174" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3586.186585][ T30] audit: type=1326 audit(3585.566:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9469 comm="syz.2.2174" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3586.205890][ T30] audit: type=1326 audit(3585.586:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9469 comm="syz.2.2174" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3586.214702][ T30] audit: type=1326 audit(3585.586:653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9469 comm="syz.2.2174" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3586.239143][ T30] audit: type=1326 audit(3585.596:654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9469 comm="syz.2.2174" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3586.243076][ T30] audit: type=1326 audit(3585.606:655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9469 comm="syz.2.2174" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3586.250434][ T30] audit: type=1326 audit(3585.616:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9469 comm="syz.2.2174" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3586.258592][ T30] audit: type=1326 audit(3585.626:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9469 comm="syz.2.2174" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3586.263903][ T30] audit: type=1326 audit(3585.626:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9469 comm="syz.2.2174" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3586.268772][ T30] audit: type=1326 audit(3585.626:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9469 comm="syz.2.2174" exe="/syz-executor" sig=0 arch=c00000b7 syscall=227 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3596.106363][ T9499] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2188'. [ 3596.225562][ T9499] ip6gre1: entered allmulticast mode [ 3600.990429][ T30] kauditd_printk_skb: 47 callbacks suppressed [ 3600.991488][ T30] audit: type=1400 audit(3600.366:707): avc: denied { load_policy } for pid=9511 comm="syz.2.2194" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 3600.995056][ T9512] SELinux: failed to load policy [ 3604.983983][ T30] audit: type=1400 audit(3604.366:708): avc: denied { create } for pid=9518 comm="syz.2.2198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3605.042082][ T30] audit: type=1400 audit(3604.426:709): avc: denied { read } for pid=9518 comm="syz.2.2198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3609.781994][ T30] audit: type=1400 audit(3609.156:710): avc: denied { mount } for pid=9528 comm="syz.2.2202" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 3613.288813][ T9544] sch_tbf: burst 8 is lower than device lo mtu (65550) ! [ 3617.255292][ T30] audit: type=1400 audit(3616.616:711): avc: denied { create } for pid=9545 comm="syz.2.2211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3617.312612][ T30] audit: type=1400 audit(3616.626:712): avc: denied { getopt } for pid=9545 comm="syz.2.2211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3627.004942][ T30] audit: type=1400 audit(3626.386:713): avc: denied { nlmsg_read } for pid=9555 comm="syz.2.2215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3627.911182][ T9560] SELinux: syz.2.2217 (9560) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 3628.814977][ T30] audit: type=1326 audit(3628.196:714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9563 comm="syz.2.2219" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3628.830018][ T30] audit: type=1326 audit(3628.206:715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9563 comm="syz.2.2219" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3628.840143][ T30] audit: type=1326 audit(3628.206:716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9563 comm="syz.2.2219" exe="/syz-executor" sig=0 arch=c00000b7 syscall=459 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3628.844707][ T30] audit: type=1326 audit(3628.206:717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9563 comm="syz.2.2219" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3628.856003][ T30] audit: type=1326 audit(3628.206:718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9563 comm="syz.2.2219" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3630.716575][ T9570] netlink: 5 bytes leftover after parsing attributes in process `syz.2.2222'. [ 3630.769145][ T9570] IPv6: NLM_F_CREATE should be specified when creating new route [ 3631.354152][ T30] audit: type=1326 audit(3630.736:719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9571 comm="syz.2.2223" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3631.369501][ T30] audit: type=1326 audit(3630.746:720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9571 comm="syz.2.2223" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3631.373415][ T30] audit: type=1326 audit(3630.746:721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9571 comm="syz.2.2223" exe="/syz-executor" sig=0 arch=c00000b7 syscall=435 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3631.404349][ T30] audit: type=1326 audit(3630.786:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9571 comm="syz.2.2223" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3634.022757][ T9582] lo speed is unknown, defaulting to 1000 [ 3637.689361][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 3637.696549][ T30] audit: type=1400 audit(3637.056:728): avc: denied { watch } for pid=9589 comm="syz.2.2229" path="/464" dev="tmpfs" ino=2386 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3640.190766][ T9598] netlink: 5 bytes leftover after parsing attributes in process `syz.2.2233'. [ 3648.626666][ T9618] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2242'. [ 3648.631431][ T9618] netem: change failed [ 3649.483124][ T9620] syzkaller1: entered promiscuous mode [ 3649.486140][ T9620] syzkaller1: entered allmulticast mode [ 3651.543708][ T9624] lo speed is unknown, defaulting to 1000 [ 3653.942251][ T9628] netlink: 36 bytes leftover after parsing attributes in process `syz.2.2246'. [ 3653.943582][ T9628] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2246'. [ 3653.990954][ T9628] netlink: 36 bytes leftover after parsing attributes in process `syz.2.2246'. [ 3653.992642][ T9628] netlink: 36 bytes leftover after parsing attributes in process `syz.2.2246'. [ 3654.749874][ T30] audit: type=1400 audit(3654.116:729): avc: denied { ioctl } for pid=9629 comm="syz.2.2247" path="socket:[24364]" dev="sockfs" ino=24364 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3681.413233][ T30] audit: type=1400 audit(3680.796:730): avc: denied { create } for pid=9655 comm="syz.2.2257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3681.420064][ T30] audit: type=1400 audit(3680.796:731): avc: denied { setopt } for pid=9655 comm="syz.2.2257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3681.980529][ T30] audit: type=1326 audit(3681.346:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9655 comm="syz.2.2257" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3681.981949][ T30] audit: type=1326 audit(3681.356:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9655 comm="syz.2.2257" exe="/syz-executor" sig=0 arch=c00000b7 syscall=104 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3681.993121][ T30] audit: type=1400 audit(3681.356:734): avc: denied { kexec_image_load } for pid=9655 comm="syz.2.2257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 3681.999259][ T30] audit: type=1326 audit(3681.356:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9655 comm="syz.2.2257" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3682.003840][ T30] audit: type=1326 audit(3681.366:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9655 comm="syz.2.2257" exe="/syz-executor" sig=0 arch=c00000b7 syscall=281 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3682.009539][ T30] audit: type=1326 audit(3681.366:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9655 comm="syz.2.2257" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3682.014067][ T30] audit: type=1326 audit(3681.366:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9655 comm="syz.2.2257" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3685.455199][ T30] audit: type=1400 audit(3684.836:739): avc: denied { ioctl } for pid=9665 comm="syz.2.2261" path="socket:[23373]" dev="sockfs" ino=23373 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3686.758614][ C1] vcan0: j1939_tp_rxtimer: 0x0000000097897f5f: rx timeout, send abort [ 3686.779631][ C1] vcan0: j1939_xtp_rx_abort_one: 0x0000000097897f5f: 0x2f000: (3) A timeout occurred and this is the connection abort to close the session. [ 3686.849835][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 3686.850579][ T30] audit: type=1400 audit(3686.226:743): avc: denied { read } for pid=3105 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3686.851074][ T30] audit: type=1400 audit(3686.226:744): avc: denied { search } for pid=3105 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3686.861775][ T30] audit: type=1400 audit(3686.236:745): avc: denied { search } for pid=3105 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3686.876143][ T30] audit: type=1400 audit(3686.256:746): avc: denied { add_name } for pid=3105 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3686.888501][ T30] audit: type=1400 audit(3686.256:747): avc: denied { create } for pid=3105 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3686.899662][ T30] audit: type=1400 audit(3686.266:748): avc: denied { append open } for pid=3105 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3686.916681][ T30] audit: type=1400 audit(3686.296:749): avc: denied { getattr } for pid=3105 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3690.509049][ T30] audit: type=1326 audit(3689.886:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9679 comm="syz.2.2268" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3690.524246][ T30] audit: type=1326 audit(3689.906:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9679 comm="syz.2.2268" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3690.542267][ T30] audit: type=1326 audit(3689.916:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9679 comm="syz.2.2268" exe="/syz-executor" sig=0 arch=c00000b7 syscall=178 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3694.255876][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 3694.260327][ T30] audit: type=1326 audit(3693.636:758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9696 comm="syz.2.2276" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3694.299583][ T30] audit: type=1326 audit(3693.656:759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9696 comm="syz.2.2276" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3694.300503][ T30] audit: type=1326 audit(3693.676:760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9696 comm="syz.2.2276" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3694.314479][ T30] audit: type=1326 audit(3693.686:761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9696 comm="syz.2.2276" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3694.334469][ T30] audit: type=1326 audit(3693.716:762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9696 comm="syz.2.2276" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3694.379058][ T30] audit: type=1326 audit(3693.746:763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9696 comm="syz.2.2276" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3694.391059][ T30] audit: type=1326 audit(3693.776:764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9696 comm="syz.2.2276" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3694.396892][ T30] audit: type=1326 audit(3693.776:765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9696 comm="syz.2.2276" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3694.415475][ T30] audit: type=1326 audit(3693.796:766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9696 comm="syz.2.2276" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3694.416283][ T30] audit: type=1326 audit(3693.796:767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9696 comm="syz.2.2276" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3700.069630][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 3700.070914][ T30] audit: type=1400 audit(3699.446:781): avc: denied { cmd } for pid=9702 comm="syz.2.2278" path="socket:[23441]" dev="sockfs" ino=23441 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3707.154412][ T9720] bond0: (slave bond_slave_0): Releasing backup interface [ 3707.248960][ T9720] bond0: (slave bond_slave_1): Releasing backup interface [ 3707.584201][ T30] audit: type=1400 audit(3706.966:782): avc: denied { bind } for pid=9719 comm="syz.2.2286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3713.854628][ T30] audit: type=1400 audit(3713.236:783): avc: denied { accept } for pid=9730 comm="syz.2.2291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3713.892204][ T30] audit: type=1400 audit(3713.266:784): avc: denied { read } for pid=9730 comm="syz.2.2291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3718.806425][ T30] audit: type=1326 audit(3718.186:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9735 comm="syz.2.2293" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3718.840446][ T30] audit: type=1326 audit(3718.206:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9735 comm="syz.2.2293" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3718.845327][ T30] audit: type=1326 audit(3718.216:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9735 comm="syz.2.2293" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3718.859476][ T30] audit: type=1326 audit(3718.226:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9735 comm="syz.2.2293" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3718.865537][ T30] audit: type=1326 audit(3718.236:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9735 comm="syz.2.2293" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3718.900734][ T30] audit: type=1326 audit(3718.276:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9735 comm="syz.2.2293" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3718.915551][ T30] audit: type=1326 audit(3718.286:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9735 comm="syz.2.2293" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3718.929554][ T30] audit: type=1326 audit(3718.296:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9735 comm="syz.2.2293" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3718.936530][ T30] audit: type=1326 audit(3718.316:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9735 comm="syz.2.2293" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3718.951632][ T30] audit: type=1326 audit(3718.326:794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9735 comm="syz.2.2293" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3718.952989][ T30] audit: type=1326 audit(3718.336:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9735 comm="syz.2.2293" exe="/syz-executor" sig=0 arch=c00000b7 syscall=91 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3718.953573][ T30] audit: type=1326 audit(3718.336:796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9735 comm="syz.2.2293" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3719.479510][ T30] audit: type=1326 audit(3718.856:797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9738 comm="syz.2.2294" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3732.343894][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 3732.352011][ T30] audit: type=1400 audit(3731.726:811): avc: denied { write } for pid=9760 comm="syz.2.2304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3747.244419][ T30] audit: type=1326 audit(3746.626:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.2316" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3747.263435][ T30] audit: type=1326 audit(3746.636:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.2316" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3747.281762][ T30] audit: type=1326 audit(3746.666:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.2316" exe="/syz-executor" sig=0 arch=c00000b7 syscall=5 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3747.285764][ T30] audit: type=1326 audit(3746.666:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9787 comm="syz.2.2316" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3747.836861][ T9790] IPv6: Can't replace route, no match found [ 3753.472204][ T30] audit: type=1400 audit(3752.846:816): avc: denied { audit_write } for pid=9798 comm="syz.2.2321" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3753.481929][ T30] audit: type=1107 audit(3752.856:817): pid=9798 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3753.924783][ T30] audit: type=1400 audit(3753.306:818): avc: denied { wake_alarm } for pid=9800 comm="syz.2.2322" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3755.626611][ T30] audit: type=1400 audit(3755.006:819): avc: denied { execute } for pid=9806 comm="syz.2.2325" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=25654 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 3761.006834][ T30] audit: type=1400 audit(3760.386:820): avc: denied { mount } for pid=9823 comm="syz.2.2333" name="/" dev="ramfs" ino=24657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 3775.714646][ T9837] lo speed is unknown, defaulting to 1000 [ 3776.841628][ T30] audit: type=1400 audit(3776.216:821): avc: denied { read } for pid=9839 comm="syz.2.2340" path="socket:[24693]" dev="sockfs" ino=24693 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3777.363513][ T30] audit: type=1400 audit(3776.746:822): avc: denied { shutdown } for pid=9839 comm="syz.2.2340" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3781.058361][ T9847] SELinux: failed to load policy [ 3781.546279][ T9849] xt_hashlimit: max too large, truncated to 1048576 [ 3783.336758][ T9854] lo speed is unknown, defaulting to 1000 [ 3784.683012][ T9857] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9857 comm=syz.2.2348 [ 3792.894546][ T9877] smc: net device bond0 applied user defined pnetid SYZ2 [ 3792.926865][ T9877] smc: net device bond0 erased user defined pnetid SYZ2 [ 3798.336464][ T9884] siw: device registration error -23 [ 3809.326160][ T30] audit: type=1326 audit(3808.706:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9889 comm="syz.2.2363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3809.335545][ T30] audit: type=1326 audit(3808.716:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9889 comm="syz.2.2363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3809.354298][ T30] audit: type=1326 audit(3808.736:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9889 comm="syz.2.2363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=450 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3809.362345][ T30] audit: type=1326 audit(3808.736:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9889 comm="syz.2.2363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3809.365622][ T30] audit: type=1326 audit(3808.736:827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9889 comm="syz.2.2363" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8495aba8 code=0x7ffc0000 [ 3809.720771][ T30] audit: type=1400 audit(3809.106:828): avc: denied { read } for pid=9891 comm="syz.2.2364" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 3809.726661][ T30] audit: type=1400 audit(3809.106:829): avc: denied { open } for pid=9891 comm="syz.2.2364" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 3809.741681][ T30] audit: type=1400 audit(3809.126:830): avc: denied { ioctl } for pid=9891 comm="syz.2.2364" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 3815.214885][ T9898] siw: device registration error -23 [ 3826.778908][ T9908] loop9: detected capacity change from 0 to 7 [ 3826.864237][ T9901] Buffer I/O error on dev loop9, logical block 0, async page read [ 3826.866356][ T9901] Buffer I/O error on dev loop9, logical block 0, async page read [ 3826.869910][ T9901] loop9: unable to read partition table [ 3826.900512][ T9908] Buffer I/O error on dev loop9, logical block 0, async page read [ 3826.911393][ T9908] Buffer I/O error on dev loop9, logical block 0, async page read [ 3826.912882][ T9908] loop9: unable to read partition table [ 3826.930239][ T9908] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 3826.930239][ T9908] ) failed (rc=-5) [ 3826.970763][ T9901] Buffer I/O error on dev loop9, logical block 0, async page read [ 3826.981808][ T9901] Buffer I/O error on dev loop9, logical block 0, async page read [ 3826.998402][ T9901] Buffer I/O error on dev loop9, logical block 0, async page read [ 3827.005164][ T9901] Buffer I/O error on dev loop9, logical block 0, async page read [ 3827.015078][ T9901] Buffer I/O error on dev loop9, logical block 0, async page read [ 3832.252798][ T9913] siw: device registration error -23 [ 3848.000832][ T9931] netlink: 24 bytes leftover after parsing attributes in process `syz.2.2381'. [ 3856.471955][ T30] audit: type=1400 audit(3855.846:831): avc: denied { execute } for pid=9941 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3856.486350][ T30] audit: type=1400 audit(3855.866:832): avc: denied { execute_no_trans } for pid=9941 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3857.041126][ T30] audit: type=1400 audit(3856.416:833): avc: denied { mounton } for pid=9942 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 3858.666318][ T7173] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3858.916628][ T7173] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3859.226416][ T7173] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3859.619775][ T7173] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3861.148351][ T30] audit: type=1400 audit(3860.526:834): avc: denied { read } for pid=3150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 3865.075129][ T7173] bond0 (unregistering): Released all slaves [ 3865.281330][ T30] audit: type=1400 audit(3864.656:835): avc: denied { search } for pid=3150 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3865.298645][ T30] audit: type=1400 audit(3864.666:836): avc: denied { search } for pid=3150 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3865.319822][ T30] audit: type=1400 audit(3864.666:837): avc: denied { search } for pid=3150 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3865.325388][ T30] audit: type=1400 audit(3864.696:838): avc: denied { read } for pid=3150 comm="dhcpcd" name="n31" dev="tmpfs" ino=8297 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3865.339315][ T30] audit: type=1400 audit(3864.696:839): avc: denied { open } for pid=3150 comm="dhcpcd" path="/run/udev/data/n31" dev="tmpfs" ino=8297 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3865.345596][ T30] audit: type=1400 audit(3864.726:840): avc: denied { getattr } for pid=3150 comm="dhcpcd" path="/run/udev/data/n31" dev="tmpfs" ino=8297 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3865.585283][ T9942] lo speed is unknown, defaulting to 1000 [ 3866.651975][ T7173] veth1_macvtap: left promiscuous mode [ 3866.653413][ T7173] veth0_macvtap: left promiscuous mode [ 3866.673688][ T7173] veth1_vlan: left promiscuous mode [ 3866.675803][ T7173] veth0_vlan: left promiscuous mode [ 3877.323580][ T30] audit: type=1400 audit(3876.706:841): avc: denied { read open } for pid=9965 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=739 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3877.332194][ T30] audit: type=1400 audit(3876.706:842): avc: denied { getattr } for pid=9965 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=739 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3877.690854][ T30] audit: type=1400 audit(3877.066:843): avc: denied { add_name } for pid=9962 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3877.695273][ T30] audit: type=1400 audit(3877.076:844): avc: denied { create } for pid=9962 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3877.711627][ T30] audit: type=1400 audit(3877.076:845): avc: denied { write } for pid=9962 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth5.link" dev="tmpfs" ino=8301 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3877.725599][ T30] audit: type=1400 audit(3877.096:846): avc: denied { append } for pid=9962 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" dev="tmpfs" ino=8301 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3878.934484][ T30] audit: type=1400 audit(3878.316:847): avc: denied { remove_name } for pid=9969 comm="rm" name="resolv.conf.eth5.link" dev="tmpfs" ino=8301 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3878.963012][ T30] audit: type=1400 audit(3878.336:848): avc: denied { unlink } for pid=9969 comm="rm" name="resolv.conf.eth5.link" dev="tmpfs" ino=8301 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3882.888767][ T9942] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3882.972929][ T9942] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3888.134635][ T9942] hsr_slave_0: entered promiscuous mode [ 3888.144525][ T9942] hsr_slave_1: entered promiscuous mode [ 3888.154559][ T9942] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3888.156535][ T9942] Cannot create hsr debugfs directory [ 3894.308715][ T9942] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 3894.426497][ T9942] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 3894.561878][ T9942] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 3894.622005][ T9942] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 3899.896511][ T9942] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3914.025769][ T9942] veth0_vlan: entered promiscuous mode [ 3914.095937][ T9942] veth1_vlan: entered promiscuous mode [ 3914.469661][ T9942] veth0_macvtap: entered promiscuous mode [ 3914.522006][ T9942] veth1_macvtap: entered promiscuous mode [ 3914.946571][ T9942] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3914.949689][ T9942] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3914.949907][ T9942] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3914.950064][ T9942] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3915.372674][ T30] audit: type=1400 audit(3914.746:849): avc: denied { mounton } for pid=9942 comm="syz-executor" path="/syzkaller.VSet1B/syz-tmp" dev="vda" ino=1881 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 3915.396033][ T30] audit: type=1400 audit(3914.776:850): avc: denied { mount } for pid=9942 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3915.459798][ T30] audit: type=1400 audit(3914.826:851): avc: denied { mount } for pid=9942 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3915.505254][ T30] audit: type=1400 audit(3914.886:852): avc: denied { mounton } for pid=9942 comm="syz-executor" path="/syzkaller.VSet1B/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 3915.529815][ T30] audit: type=1400 audit(3914.896:853): avc: denied { mounton } for pid=9942 comm="syz-executor" path="/syzkaller.VSet1B/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=26255 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 3915.621483][ T30] audit: type=1400 audit(3915.006:854): avc: denied { unmount } for pid=9942 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 3915.639468][ T30] audit: type=1400 audit(3915.016:855): avc: denied { mounton } for pid=9942 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 3915.644922][ T30] audit: type=1400 audit(3915.026:856): avc: denied { mount } for pid=9942 comm="syz-executor" name="/" dev="gadgetfs" ino=2769 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 3915.679338][ T30] audit: type=1400 audit(3915.056:857): avc: denied { mount } for pid=9942 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 3915.693110][ T30] audit: type=1400 audit(3915.076:858): avc: denied { mounton } for pid=9942 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 3921.732391][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 3921.733610][ T30] audit: type=1326 audit(3921.106:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.2.2394" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3921.734459][ T30] audit: type=1326 audit(3921.116:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.2.2394" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3921.769536][ T30] audit: type=1326 audit(3921.146:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.2.2394" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3921.770873][ T30] audit: type=1326 audit(3921.146:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.2.2394" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3921.771434][ T30] audit: type=1326 audit(3921.146:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.2.2394" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3921.795881][ T30] audit: type=1326 audit(3921.176:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.2.2394" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3921.824350][ T30] audit: type=1326 audit(3921.206:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.2.2394" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3921.825880][ T30] audit: type=1326 audit(3921.206:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.2.2394" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3921.859414][ T30] audit: type=1326 audit(3921.236:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.2.2394" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3921.885260][ T30] audit: type=1326 audit(3921.266:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10080 comm="syz.2.2394" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3927.109902][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 3927.110895][ T30] audit: type=1400 audit(3926.486:877): avc: denied { read write } for pid=9942 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3927.123434][ T30] audit: type=1400 audit(3926.506:878): avc: denied { open } for pid=9942 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3927.132012][ T30] audit: type=1400 audit(3926.506:879): avc: denied { ioctl } for pid=9942 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3927.432061][ T30] audit: type=1400 audit(3926.816:880): avc: denied { read write } for pid=10095 comm="syz.2.2398" name="rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 3927.465341][ T30] audit: type=1400 audit(3926.846:881): avc: denied { open } for pid=10095 comm="syz.2.2398" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 3928.257760][ T30] audit: type=1400 audit(3927.636:882): avc: denied { bpf } for pid=10097 comm="syz.2.2399" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3928.300172][ T30] audit: type=1400 audit(3927.676:883): avc: denied { create } for pid=10097 comm="syz.2.2399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3928.341634][ T30] audit: type=1400 audit(3927.726:884): avc: denied { create } for pid=10097 comm="syz.2.2399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3928.368926][ T30] audit: type=1400 audit(3927.736:885): avc: denied { setopt } for pid=10097 comm="syz.2.2399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3929.030203][ T30] audit: type=1400 audit(3928.416:886): avc: denied { create } for pid=10097 comm="syz.2.2399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3929.296884][T10098] bond0: (slave bond_slave_0): Releasing backup interface [ 3929.471643][T10098] bond0: (slave bond_slave_1): Releasing backup interface [ 3933.501086][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 3933.510871][ T30] audit: type=1400 audit(3932.876:890): avc: denied { map_create } for pid=10101 comm="syz.2.2401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3933.551170][ T30] audit: type=1400 audit(3932.936:891): avc: denied { map_read map_write } for pid=10101 comm="syz.2.2401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3933.620693][ T30] audit: type=1400 audit(3933.006:892): avc: denied { perfmon } for pid=10101 comm="syz.2.2401" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3933.708708][ T30] audit: type=1400 audit(3933.076:893): avc: denied { prog_run } for pid=10101 comm="syz.2.2401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3934.218510][ T30] audit: type=1400 audit(3933.596:894): avc: denied { create } for pid=10104 comm="syz.2.2402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3934.219826][ T30] audit: type=1400 audit(3933.596:895): avc: denied { write } for pid=10104 comm="syz.2.2402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3934.235079][ T30] audit: type=1400 audit(3933.616:896): avc: denied { read } for pid=10104 comm="syz.2.2402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3935.191690][ T30] audit: type=1400 audit(3933.656:897): avc: denied { execmem } for pid=10104 comm="syz.2.2402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3939.345485][T10107] lo speed is unknown, defaulting to 1000 [ 3947.864824][ T30] audit: type=1400 audit(3947.246:898): avc: denied { create } for pid=10109 comm="syz.2.2404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3947.900372][ T30] audit: type=1400 audit(3947.276:899): avc: denied { ioctl } for pid=10109 comm="syz.2.2404" path="socket:[25240]" dev="sockfs" ino=25240 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3947.902547][ T30] audit: type=1400 audit(3947.276:900): avc: denied { bind } for pid=10109 comm="syz.2.2404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3947.903296][ T30] audit: type=1400 audit(3947.286:901): avc: denied { connect } for pid=10109 comm="syz.2.2404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3947.985864][ T30] audit: type=1400 audit(3947.326:902): avc: denied { write } for pid=10109 comm="syz.2.2404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3954.763705][ T30] audit: type=1400 audit(3954.146:903): avc: denied { create } for pid=10116 comm="syz.2.2407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3954.900586][ T30] audit: type=1400 audit(3954.266:904): avc: denied { bind } for pid=10116 comm="syz.2.2407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3954.938397][ T30] audit: type=1400 audit(3954.306:905): avc: denied { listen } for pid=10116 comm="syz.2.2407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3954.971412][ T30] audit: type=1400 audit(3954.346:906): avc: denied { connect } for pid=10116 comm="syz.2.2407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3955.012588][ T30] audit: type=1400 audit(3954.386:907): avc: denied { accept } for pid=10116 comm="syz.2.2407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3955.792773][ T30] audit: type=1400 audit(3955.166:908): avc: denied { ioctl } for pid=10119 comm="syz.2.2408" path="socket:[25268]" dev="sockfs" ino=25268 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3955.803874][ T30] audit: type=1400 audit(3955.186:909): avc: denied { module_request } for pid=10119 comm="syz.2.2408" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3956.873557][ T30] audit: type=1400 audit(3956.256:910): avc: denied { setopt } for pid=10119 comm="syz.2.2408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3956.913697][ T30] audit: type=1400 audit(3956.286:911): avc: denied { sys_module } for pid=10119 comm="syz.2.2408" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3961.020306][ T30] audit: type=1400 audit(3960.396:912): avc: denied { create } for pid=10130 comm="syz.2.2411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3964.968181][ T30] audit: type=1326 audit(3964.346:913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10134 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3964.975462][ T30] audit: type=1326 audit(3964.346:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10134 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3965.013321][ T30] audit: type=1326 audit(3964.386:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10134 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3965.113299][ T30] audit: type=1326 audit(3964.496:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10134 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3965.149903][ T30] audit: type=1326 audit(3964.526:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10134 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3965.155286][ T30] audit: type=1326 audit(3964.536:918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10134 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3965.181460][ T30] audit: type=1326 audit(3964.546:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10134 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3965.182443][ T30] audit: type=1326 audit(3964.566:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10134 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3965.202354][ T30] audit: type=1326 audit(3964.586:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10134 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 3974.594446][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 3974.596410][ T30] audit: type=1400 audit(3973.976:930): avc: denied { allowed } for pid=10145 comm="syz.2.2418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3974.631274][ T30] audit: type=1400 audit(3974.006:931): avc: denied { sqpoll } for pid=10145 comm="syz.2.2418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3977.680969][ T30] audit: type=1400 audit(3977.056:932): avc: denied { read } for pid=10152 comm="syz.2.2421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3978.175291][ T30] audit: type=1400 audit(3977.556:933): avc: denied { connect } for pid=10154 comm="syz.2.2422" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3978.186403][ T30] audit: type=1400 audit(3977.566:934): avc: denied { write } for pid=10154 comm="syz.2.2422" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3981.413689][ T30] audit: type=1400 audit(3980.796:935): avc: denied { create } for pid=10156 comm="syz.2.2423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3981.442530][ T30] audit: type=1400 audit(3980.826:936): avc: denied { getopt } for pid=10156 comm="syz.2.2423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4021.062450][ T30] audit: type=1400 audit(4020.446:937): avc: denied { name_bind } for pid=10175 comm="syz.2.2433" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 4021.064056][ T30] audit: type=1400 audit(4020.446:938): avc: denied { node_bind } for pid=10175 comm="syz.2.2433" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 4021.123447][T10176] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 4025.983793][ T30] audit: type=1400 audit(4025.366:939): avc: denied { write } for pid=10185 comm="syz.2.2438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4026.503551][ T30] audit: type=1326 audit(4025.886:940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10187 comm="syz.2.2439" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4026.523598][ T30] audit: type=1326 audit(4025.906:941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10187 comm="syz.2.2439" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4026.536324][ T30] audit: type=1326 audit(4025.906:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10187 comm="syz.2.2439" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4026.544508][ T30] audit: type=1326 audit(4025.916:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10187 comm="syz.2.2439" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4026.562334][ T30] audit: type=1326 audit(4025.946:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10187 comm="syz.2.2439" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4026.565420][ T30] audit: type=1326 audit(4025.946:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10187 comm="syz.2.2439" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4026.589314][ T30] audit: type=1326 audit(4025.956:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10187 comm="syz.2.2439" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4026.593885][ T30] audit: type=1326 audit(4025.976:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10187 comm="syz.2.2439" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4026.609541][ T30] audit: type=1326 audit(4025.986:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10187 comm="syz.2.2439" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4026.613620][ T30] audit: type=1326 audit(4025.996:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10187 comm="syz.2.2439" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4033.990335][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 4034.000902][ T30] audit: type=1400 audit(4033.366:960): avc: denied { create } for pid=10199 comm="syz.2.2445" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4034.030552][ T30] audit: type=1400 audit(4033.376:961): avc: denied { map } for pid=10199 comm="syz.2.2445" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=26451 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4034.044560][ T30] audit: type=1400 audit(4033.376:962): avc: denied { read write } for pid=10199 comm="syz.2.2445" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=26451 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4036.014866][ T30] audit: type=1400 audit(4035.396:963): avc: denied { read } for pid=10203 comm="syz.2.2446" path="socket:[25500]" dev="sockfs" ino=25500 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4044.595158][ T30] audit: type=1400 audit(4043.976:964): avc: denied { mount } for pid=10212 comm="syz.2.2450" name="/" dev="ramfs" ino=26552 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 4053.595970][ T30] audit: type=1400 audit(4052.976:965): avc: denied { read } for pid=10232 comm="syz.2.2459" dev="nsfs" ino=4026532683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4053.604937][ T30] audit: type=1400 audit(4052.986:966): avc: denied { open } for pid=10232 comm="syz.2.2459" path="net:[4026532683]" dev="nsfs" ino=4026532683 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4059.536453][ T30] audit: type=1400 audit(4058.916:967): avc: denied { create } for pid=10238 comm="syz.2.2462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 4071.733245][ T30] audit: type=1400 audit(4071.116:968): avc: denied { create } for pid=10260 comm="syz.2.2469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 4071.879838][ T30] audit: type=1400 audit(4071.256:969): avc: denied { execute } for pid=10260 comm="syz.2.2469" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=26690 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 4072.634699][ T30] audit: type=1400 audit(4072.016:970): avc: denied { write } for pid=10260 comm="syz.2.2469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 4074.321253][T10265] netlink: 'syz.2.2470': attribute type 4 has an invalid length. [ 4074.586349][ T30] audit: type=1326 audit(4073.956:971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10264 comm="syz.2.2470" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x0 [ 4085.306354][ T30] audit: type=1400 audit(4084.686:972): avc: denied { read } for pid=10278 comm="syz.2.2475" path="socket:[27691]" dev="sockfs" ino=27691 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4088.830087][ T30] audit: type=1400 audit(4088.206:973): avc: denied { setopt } for pid=10282 comm="syz.2.2477" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4095.696522][T10292] netlink: 'syz.2.2481': attribute type 4 has an invalid length. [ 4095.711261][T10292] netlink: 152 bytes leftover after parsing attributes in process `syz.2.2481'. [ 4095.845280][T10292] : renamed from dummy0 (while UP) [ 4098.442101][ C0] vcan0: j1939_tp_rxtimer: 0x00000000562191ba: rx timeout, send abort [ 4098.444766][ C0] vcan0: j1939_xtp_rx_abort_one: 0x00000000562191ba: 0x2f000: (3) A timeout occurred and this is the connection abort to close the session. [ 4098.480021][ T30] audit: type=1400 audit(4097.856:974): avc: denied { read } for pid=3105 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4098.486635][ T30] audit: type=1400 audit(4097.866:975): avc: denied { search } for pid=3105 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4098.500384][ T30] audit: type=1400 audit(4097.876:976): avc: denied { append } for pid=3105 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4098.501237][ T30] audit: type=1400 audit(4097.876:977): avc: denied { open } for pid=3105 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4098.501799][ T30] audit: type=1400 audit(4097.876:978): avc: denied { getattr } for pid=3105 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4102.072319][T10303] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2486'. [ 4102.273204][T10303] 8021q: adding VLAN 0 to HW filter on device bond1 [ 4102.422823][T10303] macvlan2: entered promiscuous mode [ 4102.425784][T10303] macvlan2: entered allmulticast mode [ 4102.452223][T10303] bond1: (slave macvlan2): Opening slave failed [ 4104.396906][ C0] vcan0: j1939_tp_rxtimer: 0x0000000082f5c773: rx timeout, send abort [ 4104.402223][ C0] vcan0: j1939_xtp_rx_abort_one: 0x0000000082f5c773: 0x2f000: (3) A timeout occurred and this is the connection abort to close the session. [ 4105.464267][ T30] audit: type=1400 audit(4104.846:979): avc: denied { write } for pid=10312 comm="syz.2.2490" name="igmp" dev="proc" ino=4026532779 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 4109.450582][ T30] audit: type=1400 audit(4108.836:980): avc: denied { create } for pid=10328 comm="syz.2.2498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4109.461381][ T30] audit: type=1400 audit(4108.836:981): avc: denied { write } for pid=10328 comm="syz.2.2498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4110.181699][T10333] netlink: 44 bytes leftover after parsing attributes in process `syz.2.2500'. [ 4111.810965][ T30] audit: type=1326 audit(4111.196:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10338 comm="syz.2.2503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4111.814391][ T30] audit: type=1326 audit(4111.196:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10338 comm="syz.2.2503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4111.838564][ T30] audit: type=1326 audit(4111.216:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10338 comm="syz.2.2503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=211 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4111.840109][ T30] audit: type=1326 audit(4111.216:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10338 comm="syz.2.2503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4111.840833][ T30] audit: type=1326 audit(4111.216:986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10338 comm="syz.2.2503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4111.841377][ T30] audit: type=1326 audit(4111.216:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10338 comm="syz.2.2503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=427 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4111.841923][ T30] audit: type=1326 audit(4111.216:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10338 comm="syz.2.2503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4111.842471][ T30] audit: type=1326 audit(4111.216:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10338 comm="syz.2.2503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4111.859125][ T30] audit: type=1326 audit(4111.216:990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10338 comm="syz.2.2503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4111.864974][ T30] audit: type=1326 audit(4111.246:991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10338 comm="syz.2.2503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4112.666834][T10343] netlink: 'syz.2.2505': attribute type 3 has an invalid length. [ 4112.670059][T10343] netlink: 'syz.2.2505': attribute type 3 has an invalid length. [ 4112.675970][T10343] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2505'. [ 4119.044599][T10354] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2510'. [ 4142.164371][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 4142.165119][ T30] audit: type=1400 audit(4141.546:996): avc: denied { setopt } for pid=10381 comm="syz.2.2521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4142.775496][ T30] audit: type=1400 audit(4142.156:997): avc: denied { connect } for pid=10381 comm="syz.2.2521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4145.660147][ T30] audit: type=1400 audit(4145.046:998): avc: denied { write } for pid=10393 comm="syz.2.2527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4146.164313][T10398] netlink: 36 bytes leftover after parsing attributes in process `syz.2.2529'. [ 4146.474453][ T30] audit: type=1400 audit(4145.856:999): avc: denied { validate_trans } for pid=10399 comm="syz.2.2530" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 4150.629659][ T30] audit: type=1326 audit(4149.966:1000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10412 comm="syz.2.2536" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4150.630997][ T30] audit: type=1326 audit(4149.986:1001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10412 comm="syz.2.2536" exe="/syz-executor" sig=0 arch=c00000b7 syscall=208 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4150.632072][ T30] audit: type=1326 audit(4149.986:1002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10412 comm="syz.2.2536" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4150.632699][ T30] audit: type=1326 audit(4149.996:1003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10412 comm="syz.2.2536" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4150.633339][ T30] audit: type=1326 audit(4150.006:1004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10412 comm="syz.2.2536" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4150.664348][ T30] audit: type=1326 audit(4150.046:1005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10412 comm="syz.2.2536" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4150.678865][ T30] audit: type=1326 audit(4150.056:1006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10412 comm="syz.2.2536" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4150.723387][ T30] audit: type=1326 audit(4150.106:1007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10412 comm="syz.2.2536" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4150.739625][ T30] audit: type=1326 audit(4150.116:1008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10412 comm="syz.2.2536" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4150.760239][ T30] audit: type=1326 audit(4150.136:1009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10412 comm="syz.2.2536" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4156.966227][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 4156.967468][ T30] audit: type=1326 audit(4156.346:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10429 comm="syz.2.2543" exe="/syz-executor" sig=0 arch=c00000b7 syscall=93 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4161.676002][T10449] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2552'. [ 4163.642076][T10458] sch_tbf: burst 0 is lower than device lo mtu (18) ! [ 4164.612750][ T30] audit: type=1400 audit(4163.996:1042): avc: denied { read write } for pid=10461 comm="syz.2.2559" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4164.615158][ T30] audit: type=1400 audit(4163.996:1043): avc: denied { open } for pid=10461 comm="syz.2.2559" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4164.621343][ T30] audit: type=1400 audit(4164.006:1044): avc: denied { ioctl } for pid=10461 comm="syz.2.2559" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4164.638812][T10462] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4164.642661][T10462] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4165.023478][T10465] netlink: 96 bytes leftover after parsing attributes in process `syz.2.2560'. [ 4166.123205][ T30] audit: type=1400 audit(4165.506:1045): avc: denied { execute } for pid=10470 comm="syz.2.2563" dev="tmpfs" ino=77 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4166.136333][ T30] audit: type=1400 audit(4165.516:1046): avc: denied { execute_no_trans } for pid=10470 comm="syz.2.2563" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=77 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4166.521891][ T30] audit: type=1400 audit(4165.906:1047): avc: denied { write } for pid=10472 comm="syz.2.2564" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 4167.771410][ T30] audit: type=1400 audit(4167.156:1048): avc: denied { create } for pid=10478 comm="syz.2.2567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4167.794198][ T30] audit: type=1400 audit(4167.176:1049): avc: denied { write } for pid=10478 comm="syz.2.2567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4167.804601][ T30] audit: type=1400 audit(4167.186:1050): avc: denied { nlmsg_write } for pid=10478 comm="syz.2.2567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4175.406882][ T30] audit: type=1326 audit(4174.786:1051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10497 comm="syz.2.2576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4175.425038][ T30] audit: type=1326 audit(4174.806:1052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10497 comm="syz.2.2576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=439 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4175.444434][ T30] audit: type=1326 audit(4174.806:1053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10497 comm="syz.2.2576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4175.445541][ T30] audit: type=1326 audit(4174.826:1054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10497 comm="syz.2.2576" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4175.759888][ T30] audit: type=1400 audit(4175.146:1055): avc: denied { setopt } for pid=10499 comm="syz.2.2577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4182.269008][ T30] audit: type=1326 audit(4181.646:1056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10510 comm="syz.2.2582" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4182.270312][ T30] audit: type=1326 audit(4181.656:1057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10510 comm="syz.2.2582" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4182.283198][ T30] audit: type=1326 audit(4181.666:1058): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10510 comm="syz.2.2582" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4182.284383][ T30] audit: type=1326 audit(4181.666:1059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10510 comm="syz.2.2582" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4182.284983][ T30] audit: type=1326 audit(4181.666:1060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10510 comm="syz.2.2582" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4182.314847][ T30] audit: type=1326 audit(4181.676:1061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10510 comm="syz.2.2582" exe="/syz-executor" sig=0 arch=c00000b7 syscall=82 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4182.316419][ T30] audit: type=1326 audit(4181.686:1062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10510 comm="syz.2.2582" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4182.330182][ T30] audit: type=1326 audit(4181.696:1063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10510 comm="syz.2.2582" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4182.670492][T10513] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2583'. [ 4188.300700][T10521] IPv6: Can't replace route, no match found [ 4199.924849][ T30] audit: type=1326 audit(4199.306:1064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10543 comm="syz.2.2598" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4199.926438][ T30] audit: type=1326 audit(4199.306:1065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10543 comm="syz.2.2598" exe="/syz-executor" sig=0 arch=c00000b7 syscall=167 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4199.939129][ T30] audit: type=1326 audit(4199.306:1066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10543 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4199.940411][ T30] audit: type=1326 audit(4199.316:1067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10543 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=c00000b7 syscall=211 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4199.940978][ T30] audit: type=1326 audit(4199.316:1068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10543 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4199.941507][ T30] audit: type=1326 audit(4199.316:1069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10543 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4199.942083][ T30] audit: type=1326 audit(4199.326:1070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10543 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4199.942656][ T30] audit: type=1326 audit(4199.326:1071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10543 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4199.958942][ T30] audit: type=1326 audit(4199.336:1072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10543 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=c00000b7 syscall=25 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4199.960798][ T30] audit: type=1326 audit(4199.336:1073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10543 comm=77DEA305FF07 exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4206.405209][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 4206.409360][ T30] audit: type=1400 audit(4205.786:1086): avc: denied { mounton } for pid=10565 comm="syz.2.2609" path="/190/file0" dev="tmpfs" ino=973 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 4206.418066][ T30] audit: type=1400 audit(4205.796:1087): avc: denied { mount } for pid=10565 comm="syz.2.2609" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 4206.474013][ T30] audit: type=1400 audit(4205.856:1088): avc: denied { unmount } for pid=9942 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 4208.229959][ T30] audit: type=1400 audit(4207.606:1089): avc: denied { audit_write } for pid=10574 comm="syz.2.2613" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4208.234354][ T30] audit: type=1107 audit(4207.606:1090): pid=10574 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 4208.561355][ T30] audit: type=1400 audit(4207.946:1091): avc: denied { create } for pid=10578 comm="syz.2.2615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 4221.393357][T10600] SELinux: Context  is not valid (left unmapped). [ 4221.393633][ T30] audit: type=1400 audit(4220.766:1092): avc: denied { mac_admin } for pid=10599 comm="syz.2.2625" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4221.889429][ T30] audit: type=1400 audit(4221.266:1093): avc: denied { read write } for pid=10601 comm="syz.2.2626" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 4221.894172][ T30] audit: type=1400 audit(4221.266:1094): avc: denied { open } for pid=10601 comm="syz.2.2626" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 4222.551137][ T8267] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 4222.611679][ T8267] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz1] on syz0 [ 4223.506696][T10606] fido_id[10606]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 4230.866690][T10637] batadv_slave_0: entered promiscuous mode [ 4230.914186][T10637] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2641'. [ 4231.179197][T10637] batadv_slave_0 (unregistering): left promiscuous mode [ 4243.681356][T10673] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2657'. [ 4243.806018][T10673] 8021q: adding VLAN 0 to HW filter on device bond2 [ 4244.004322][T10673] macvlan2: entered promiscuous mode [ 4244.005715][T10673] macvlan2: entered allmulticast mode [ 4244.021437][T10673] bond2: (slave macvlan2): Opening slave failed [ 4244.814542][ T30] audit: type=1326 audit(4244.196:1095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10675 comm="syz.2.2658" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4244.824552][ T30] audit: type=1326 audit(4244.206:1096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10675 comm="syz.2.2658" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4244.832368][ T30] audit: type=1326 audit(4244.206:1097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10675 comm="syz.2.2658" exe="/syz-executor" sig=0 arch=c00000b7 syscall=134 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4244.833578][ T30] audit: type=1326 audit(4244.216:1098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10675 comm="syz.2.2658" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4244.841394][ T30] audit: type=1326 audit(4244.226:1099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10675 comm="syz.2.2658" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4244.855466][ T30] audit: type=1326 audit(4244.226:1100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10675 comm="syz.2.2658" exe="/syz-executor" sig=0 arch=c00000b7 syscall=279 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4244.881230][ T30] audit: type=1326 audit(4244.246:1101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10675 comm="syz.2.2658" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4244.890808][ T30] audit: type=1326 audit(4244.266:1102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10675 comm="syz.2.2658" exe="/syz-executor" sig=0 arch=c00000b7 syscall=47 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4244.905010][ T30] audit: type=1326 audit(4244.286:1103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10675 comm="syz.2.2658" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4244.916757][ T30] audit: type=1326 audit(4244.296:1104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10675 comm="syz.2.2658" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4255.175405][ T30] audit: type=1400 audit(4254.556:1105): avc: denied { create } for pid=10697 comm="syz.2.2667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4255.211511][ T30] audit: type=1400 audit(4254.586:1106): avc: denied { block_suspend } for pid=10697 comm="syz.2.2667" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4256.463387][ T30] audit: type=1326 audit(4255.846:1107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10705 comm="syz.2.2668" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4256.476433][ T30] audit: type=1326 audit(4255.856:1108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10705 comm="syz.2.2668" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4256.486412][ T30] audit: type=1326 audit(4255.866:1109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10705 comm="syz.2.2668" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4256.516794][ T30] audit: type=1326 audit(4255.886:1110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10705 comm="syz.2.2668" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4256.532964][ T30] audit: type=1326 audit(4255.906:1111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10705 comm="syz.2.2668" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4256.534523][ T30] audit: type=1326 audit(4255.916:1112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10705 comm="syz.2.2668" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4256.573288][ T30] audit: type=1326 audit(4255.956:1113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10705 comm="syz.2.2668" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4256.584790][ T30] audit: type=1326 audit(4255.956:1114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10705 comm="syz.2.2668" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4258.264366][T10713] lo speed is unknown, defaulting to 1000 [ 4271.064620][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 4271.066146][ T30] audit: type=1400 audit(4270.446:1121): avc: denied { name_bind } for pid=10739 comm="syz.2.2683" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 4272.101231][T10743] lo speed is unknown, defaulting to 1000 [ 4272.452634][ T30] audit: type=1326 audit(4271.836:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10742 comm="syz.2.2684" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4272.479941][ T30] audit: type=1326 audit(4271.866:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10742 comm="syz.2.2684" exe="/syz-executor" sig=0 arch=c00000b7 syscall=96 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4272.486163][ T30] audit: type=1326 audit(4271.866:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10742 comm="syz.2.2684" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4272.500056][ T30] audit: type=1326 audit(4271.876:1125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10742 comm="syz.2.2684" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4275.816657][T10760] ip6gre1: entered allmulticast mode [ 4276.324038][ T30] audit: type=1400 audit(4275.696:1126): avc: denied { read } for pid=10761 comm="syz.2.2693" name="usbmon1" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 4276.330080][ T30] audit: type=1400 audit(4275.706:1127): avc: denied { open } for pid=10761 comm="syz.2.2693" path="/dev/usbmon1" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 4278.389212][ T30] audit: type=1400 audit(4277.766:1128): avc: denied { kexec_image_load } for pid=10768 comm="syz.2.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 4279.554180][ T30] audit: type=1400 audit(4278.936:1129): avc: denied { getopt } for pid=10771 comm="syz.2.2697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 4280.283888][T10774] netlink: 340 bytes leftover after parsing attributes in process `syz.2.2698'. [ 4280.292560][T10774] netlink: 48 bytes leftover after parsing attributes in process `syz.2.2698'. [ 4283.256902][ T30] audit: type=1400 audit(4282.636:1130): avc: denied { write } for pid=10781 comm="syz.2.2702" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 4285.190990][ T30] audit: type=1400 audit(4284.566:1131): avc: denied { mount } for pid=10789 comm="syz.2.2706" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 4309.068775][T10816] veth0_to_hsr: entered allmulticast mode [ 4315.132753][ T30] audit: type=1326 audit(4314.506:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10827 comm="syz.2.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4315.142136][ T30] audit: type=1326 audit(4314.516:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10827 comm="syz.2.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4315.180416][ T30] audit: type=1326 audit(4314.556:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10827 comm="syz.2.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4315.191963][ T30] audit: type=1326 audit(4314.566:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10827 comm="syz.2.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4315.193153][ T30] audit: type=1326 audit(4314.576:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10827 comm="syz.2.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4315.210017][ T30] audit: type=1326 audit(4314.586:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10827 comm="syz.2.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4315.222276][ T30] audit: type=1326 audit(4314.596:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10827 comm="syz.2.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4315.223888][ T30] audit: type=1326 audit(4314.606:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10827 comm="syz.2.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4315.224556][ T30] audit: type=1326 audit(4314.606:1140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10827 comm="syz.2.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=461 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4315.241330][ T30] audit: type=1326 audit(4314.616:1141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10827 comm="syz.2.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4315.974123][T10832] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2725'. [ 4315.975758][T10832] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2725'. [ 4329.790286][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 4329.790989][ T30] audit: type=1400 audit(4329.176:1143): avc: denied { create } for pid=10861 comm="syz.2.2740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 4329.805408][ T30] audit: type=1400 audit(4329.186:1144): avc: denied { write } for pid=10861 comm="syz.2.2740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 4333.013512][ T30] audit: type=1326 audit(4332.396:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10867 comm="syz.2.2743" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4333.040120][ T30] audit: type=1326 audit(4332.396:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10867 comm="syz.2.2743" exe="/syz-executor" sig=0 arch=c00000b7 syscall=144 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4333.052793][ T30] audit: type=1326 audit(4332.416:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10867 comm="syz.2.2743" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x7ffc0000 [ 4344.559827][ T30] audit: type=1400 audit(4343.936:1148): avc: denied { read } for pid=10898 comm="syz.2.2758" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 4344.563277][ T30] audit: type=1400 audit(4343.946:1149): avc: denied { open } for pid=10898 comm="syz.2.2758" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 4354.186257][ T30] audit: type=1400 audit(4353.566:1150): avc: denied { ioctl } for pid=10930 comm="syz.2.2773" path="socket:[29156]" dev="sockfs" ino=29156 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4368.030977][T10975] syzkaller1: tun_chr_ioctl cmd 1074025684 [ 4370.142176][ T30] audit: type=1400 audit(4369.526:1151): avc: denied { read write } for pid=10982 comm="syz.2.2793" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4370.151514][ T30] audit: type=1400 audit(4369.526:1152): avc: denied { open } for pid=10982 comm="syz.2.2793" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4370.175630][ T30] audit: type=1400 audit(4369.546:1153): avc: denied { map } for pid=10982 comm="syz.2.2793" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4370.185482][ T30] audit: type=1400 audit(4369.576:1154): avc: denied { execute } for pid=10982 comm="syz.2.2793" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4374.532076][T10992] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4374.570133][T10992] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4375.675077][ T30] audit: type=1400 audit(4375.056:1155): avc: denied { create } for pid=10996 comm="syz.2.2799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4375.705326][ T30] audit: type=1400 audit(4375.086:1156): avc: denied { bind } for pid=10996 comm="syz.2.2799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4376.246247][ T30] audit: type=1400 audit(4375.626:1157): avc: denied { setopt } for pid=10996 comm="syz.2.2799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4376.345705][ T30] audit: type=1400 audit(4375.696:1158): avc: denied { accept } for pid=10996 comm="syz.2.2799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4377.292830][T11002] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2800'. [ 4401.471980][ T30] audit: type=1400 audit(4400.846:1159): avc: denied { read } for pid=11026 comm="syz.2.2810" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 4401.498751][ T30] audit: type=1400 audit(4400.856:1160): avc: denied { open } for pid=11026 comm="syz.2.2810" path="/dev/uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 4401.535916][ T30] audit: type=1400 audit(4400.916:1161): avc: denied { ioctl } for pid=11026 comm="syz.2.2810" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x55ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 4411.848230][ T30] audit: type=1400 audit(4411.226:1162): avc: denied { bind } for pid=11052 comm="syz.2.2822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4413.351684][T11059] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4413.372953][T11059] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4414.110695][T11062] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4414.124061][T11062] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4420.714221][T11078] netlink: 'syz.2.2833': attribute type 3 has an invalid length. [ 4430.296085][ T30] audit: type=1400 audit(4429.676:1163): avc: denied { create } for pid=11087 comm="syz.2.2837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4430.325692][ T30] audit: type=1400 audit(4429.706:1164): avc: denied { getopt } for pid=11087 comm="syz.2.2837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4430.684720][T11090] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4430.692868][T11090] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4431.225935][T11093] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4431.241814][T11093] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4432.131169][ T30] audit: type=1400 audit(4431.516:1165): avc: denied { name_bind } for pid=11096 comm="syz.2.2841" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 4437.539677][T11119] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4437.602452][T11119] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4438.179088][ T30] audit: type=1400 audit(4437.556:1166): avc: denied { write } for pid=11121 comm="syz.2.2852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4440.419883][T11132] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4440.430077][T11132] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4443.160604][T11142] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4443.194863][T11142] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4445.524456][T11154] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4445.550506][T11154] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4445.861518][T11154] lo speed is unknown, defaulting to 1000 [ 4451.472853][ T30] audit: type=1400 audit(4450.856:1167): avc: denied { read } for pid=11174 comm="syz.2.2875" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4451.488643][ T30] audit: type=1400 audit(4450.856:1168): avc: denied { open } for pid=11174 comm="syz.2.2875" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4453.444551][ T30] audit: type=1400 audit(4452.826:1169): avc: denied { append } for pid=11180 comm="syz.2.2877" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 4453.482215][T11181] usb usb1: usbfs: process 11181 (syz.2.2877) did not claim interface 0 before use [ 4462.175642][T11199] binfmt_misc: register: failed to install interpreter file ./file2 [ 4467.379600][ T30] audit: type=1400 audit(4466.746:1170): avc: denied { write } for pid=11206 comm="syz.2.2890" path="socket:[30461]" dev="sockfs" ino=30461 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4470.776635][ T30] audit: type=1400 audit(4470.156:1171): avc: denied { search } for pid=11212 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4470.809383][ T30] audit: type=1400 audit(4470.186:1172): avc: denied { search } for pid=11212 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=567 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4470.834235][ T30] audit: type=1400 audit(4470.206:1173): avc: denied { search } for pid=11212 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=738 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4470.841286][ T30] audit: type=1400 audit(4470.206:1174): avc: denied { search } for pid=11212 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=739 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4471.399317][ T30] audit: type=1400 audit(4470.786:1175): avc: denied { read open } for pid=11217 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=739 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4471.420662][ T30] audit: type=1400 audit(4470.796:1176): avc: denied { getattr } for pid=11217 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=739 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4471.992929][ T30] audit: type=1400 audit(4471.366:1177): avc: denied { add_name } for pid=11212 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4472.002520][ T30] audit: type=1400 audit(4471.386:1178): avc: denied { create } for pid=11212 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4472.016454][ T30] audit: type=1400 audit(4471.396:1179): avc: denied { write open } for pid=11212 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=8554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4473.308039][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 4473.308631][ T30] audit: type=1400 audit(4472.666:1182): avc: denied { read } for pid=11219 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4474.429983][ T30] audit: type=1400 audit(4473.816:1183): avc: denied { remove_name } for pid=11220 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=8554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4474.435521][ T30] audit: type=1400 audit(4473.816:1184): avc: denied { unlink } for pid=11220 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=8554 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4474.956110][T11209] syz.2.2890 (11209): drop_caches: 2 [ 4475.558143][ T30] audit: type=1400 audit(4474.936:1185): avc: denied { read } for pid=11222 comm="syz.2.2892" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 4475.570595][ T30] audit: type=1400 audit(4474.946:1186): avc: denied { open } for pid=11222 comm="syz.2.2892" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 4475.585696][ T30] audit: type=1400 audit(4474.956:1187): avc: denied { ioctl } for pid=11222 comm="syz.2.2892" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 4480.294668][T11246] netlink: 'syz.2.2902': attribute type 1 has an invalid length. [ 4480.679826][ T30] audit: type=1326 audit(4480.056:1188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11247 comm="syz.2.2903" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff84b5aba8 code=0x0 [ 4481.440083][ C1] vkms_vblank_simulate: vblank timer overrun [ 4488.495807][T11260] netlink: 88 bytes leftover after parsing attributes in process `syz.2.2908'. [ 4489.105834][T11264] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 4490.189688][T11273] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4490.195334][T11273] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4493.012066][T11278] can0: slcan on ttyS3. [ 4493.209827][ T30] audit: type=1400 audit(4492.586:1189): avc: denied { read } for pid=3150 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 4494.572575][T11274] can0 (unregistered): slcan off ttyS3. [ 4495.260204][T11283] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4495.291934][T11283] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4496.391293][ T30] audit: type=1400 audit(4495.766:1190): avc: denied { ioctl } for pid=11288 comm="syz.2.2919" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=30888 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4499.501362][T11297] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 4500.314648][ T30] audit: type=1400 audit(4499.696:1191): avc: denied { create } for pid=11302 comm="syz.2.2922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 4500.879502][ T30] audit: type=1400 audit(4500.266:1192): avc: denied { create } for pid=11302 comm="syz.2.2922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 4511.474932][ T30] audit: type=1400 audit(4510.856:1193): avc: denied { connect } for pid=11327 comm="syz.2.2929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4513.204992][T11336] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4513.212665][T11336] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4530.390922][ T30] audit: type=1400 audit(4529.776:1194): avc: denied { connect } for pid=11369 comm="syz.2.2949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 4532.494441][ T30] audit: type=1400 audit(4531.876:1195): avc: denied { write } for pid=11378 comm="syz.2.2954" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 4540.063852][T11393] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4540.074041][T11393] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4555.439376][ T30] audit: type=1400 audit(4554.816:1196): avc: denied { setopt } for pid=11405 comm="syz.2.2965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4559.491221][T11419] pim6reg: entered allmulticast mode [ 4559.503110][T11419] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2971'. [ 4561.706772][T11429] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4561.756665][T11429] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4581.899887][T11452] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2987'. [ 4581.901321][T11452] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2987'. [ 4582.686584][ T30] audit: type=1400 audit(4582.066:1197): avc: denied { ioctl } for pid=11455 comm="syz.2.2989" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4582.696880][ T30] audit: type=1400 audit(4582.076:1198): avc: denied { set_context_mgr } for pid=11455 comm="syz.2.2989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 4582.742707][ T30] audit: type=1400 audit(4582.126:1199): avc: denied { map } for pid=11455 comm="syz.2.2989" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4582.765268][T11456] binder: 11455:11456 tried to acquire reference to desc 0, got 1 instead [ 4582.781599][ T30] audit: type=1400 audit(4582.166:1200): avc: denied { call } for pid=11455 comm="syz.2.2989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 4582.804653][T11456] binder: 11455:11456 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 4582.834633][ T8267] binder: release 11455:11456 transaction 22 out, still active [ 4582.845855][ T8267] binder: undelivered TRANSACTION_COMPLETE [ 4582.874310][ T8415] binder: release 11455:11456 transaction 22 in, still active [ 4582.875213][ T8415] binder: send failed reply for transaction 22, target dead [ 4583.383940][ T30] audit: type=1400 audit(4582.766:1201): avc: denied { read } for pid=11457 comm="syz.2.2990" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 4583.385417][ T30] audit: type=1400 audit(4582.766:1202): avc: denied { open } for pid=11457 comm="syz.2.2990" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 4605.052572][T11484] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4605.076315][T11484] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4606.423867][T11487] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4606.483122][T11487] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4607.419031][T11491] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4607.423811][T11491] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4620.815260][T11498] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4620.861843][T11498] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4632.719587][ T30] audit: type=1400 audit(4632.096:1203): avc: denied { create } for pid=11507 comm="syz.2.3011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 4633.728905][ T30] audit: type=1400 audit(4633.106:1204): avc: denied { read write } for pid=11511 comm="syz.2.3012" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 4633.733693][ T30] audit: type=1400 audit(4633.116:1205): avc: denied { open } for pid=11511 comm="syz.2.3012" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 4635.062469][ T30] audit: type=1400 audit(4634.446:1206): avc: denied { create } for pid=11517 comm="syz.2.3015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 4635.086211][ T30] audit: type=1400 audit(4634.466:1207): avc: denied { write } for pid=11517 comm="syz.2.3015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 4635.581177][T11520] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3016'. [ 4636.219142][ T30] audit: type=1400 audit(4635.586:1208): avc: denied { mount } for pid=11521 comm="syz.2.3017" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 4648.733222][ T30] audit: type=1400 audit(4648.116:1209): avc: denied { unmount } for pid=9942 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 4650.850837][ T30] audit: type=1400 audit(4650.226:1210): avc: denied { bind } for pid=11530 comm="syz.2.3021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4650.859550][ T30] audit: type=1400 audit(4650.236:1211): avc: denied { node_bind } for pid=11530 comm="syz.2.3021" saddr=172.20.20.13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 4661.880973][T11536] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4661.895999][T11536] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4669.859642][ T30] audit: type=1400 audit(4669.016:1212): avc: denied { read } for pid=11542 comm="syz.2.3026" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 4669.938517][ T30] audit: type=1400 audit(4669.026:1213): avc: denied { open } for pid=11542 comm="syz.2.3026" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 4669.969730][ T30] audit: type=1400 audit(4669.036:1214): avc: denied { ioctl } for pid=11542 comm="syz.2.3026" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 4700.958773][T11571] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4700.990896][T11571] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4736.332927][ T30] audit: type=1400 audit(4735.716:1215): avc: denied { execute } for pid=11636 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 4736.343930][ T30] audit: type=1400 audit(4735.726:1216): avc: denied { execute_no_trans } for pid=11636 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 4736.578377][ T30] audit: type=1400 audit(4735.956:1217): avc: denied { mounton } for pid=11637 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 4737.555406][ T7746] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4738.156457][ T7746] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4738.424370][ T7746] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4738.778493][ T7746] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4744.835019][ T7746] bond0 (unregistering): Released all slaves [ 4746.410318][ T7746] bond1 (unregistering): Released all slaves [ 4747.825434][ T7746] bond2 (unregistering): Released all slaves [ 4748.593184][ T7746] hsr_slave_0: left promiscuous mode [ 4748.638287][ T7746] hsr_slave_1: left promiscuous mode [ 4748.838739][ T7746] veth1_macvtap: left promiscuous mode [ 4748.840537][ T7746] veth0_macvtap: left promiscuous mode [ 4748.843472][ T7746] veth1_vlan: left promiscuous mode [ 4748.844235][ T7746] veth0_vlan: left promiscuous mode [ 4749.972595][ T7746] pim6reg (unregistering): left allmulticast mode [ 4757.825888][T11637] lo speed is unknown, defaulting to 1000 [ 4764.310018][T11637] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 4764.416453][T11637] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 4769.975761][T11637] hsr_slave_0: entered promiscuous mode [ 4769.984636][T11637] hsr_slave_1: entered promiscuous mode [ 4769.997012][T11637] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 4769.999201][T11637] Cannot create hsr debugfs directory [ 4776.764678][T11637] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 4776.849853][T11637] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 4776.932174][T11637] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 4777.022652][T11637] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 4780.866524][T11637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 4794.309583][T11637] veth0_vlan: entered promiscuous mode [ 4794.451607][T11637] veth1_vlan: entered promiscuous mode [ 4794.886782][T11637] veth0_macvtap: entered promiscuous mode [ 4794.993556][T11637] veth1_macvtap: entered promiscuous mode [ 4795.400278][T11637] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 4795.401411][T11637] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 4795.401795][T11637] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 4795.402124][T11637] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 4795.850352][ T30] audit: type=1400 audit(4795.196:1218): avc: denied { mounton } for pid=11637 comm="syz-executor" path="/syzkaller.sz3bxG/syz-tmp" dev="vda" ino=1882 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 4795.980476][ T30] audit: type=1400 audit(4795.356:1219): avc: denied { mounton } for pid=11637 comm="syz-executor" path="/syzkaller.sz3bxG/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 4796.018995][ T30] audit: type=1400 audit(4795.396:1220): avc: denied { mounton } for pid=11637 comm="syz-executor" path="/syzkaller.sz3bxG/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=32702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 4796.082719][ T30] audit: type=1400 audit(4795.466:1221): avc: denied { unmount } for pid=11637 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 4796.110312][ T30] audit: type=1400 audit(4795.486:1222): avc: denied { mounton } for pid=11637 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 4796.116500][ T30] audit: type=1400 audit(4795.496:1223): avc: denied { mount } for pid=11637 comm="syz-executor" name="/" dev="gadgetfs" ino=2769 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 4796.182580][ T30] audit: type=1400 audit(4795.566:1224): avc: denied { mount } for pid=11637 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 4796.206631][ T30] audit: type=1400 audit(4795.586:1225): avc: denied { mounton } for pid=11637 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 4796.233536][ T30] audit: type=1400 audit(4795.586:1226): avc: denied { mount } for pid=11637 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4798.012983][T11784] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3078'. [ 4798.014205][T11784] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3078'. [ 4812.616301][T11795] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3083'. [ 4813.450624][T11799] [ 4813.451639][T11799] ====================================================== [ 4813.452113][T11799] WARNING: possible circular locking dependency detected [ 4813.453292][T11799] 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 Not tainted [ 4813.453928][T11799] ------------------------------------------------------ [ 4813.454435][T11799] syz.2.3085/11799 is trying to acquire lock: [ 4813.454908][T11799] ffff000014a73188 (&set->update_nr_hwq_lock){++++}-{4:4}, at: blk_mq_update_nr_hw_queues+0x44/0x8e0 [ 4813.459518][T11799] [ 4813.459518][T11799] but task is already holding lock: [ 4813.460249][T11799] ffff000014a73230 (&nbd->config_lock){+.+.}-{4:4}, at: nbd_genl_connect+0x450/0x14c4 [ 4813.461271][T11799] [ 4813.461271][T11799] which lock already depends on the new lock. [ 4813.461271][T11799] [ 4813.461814][T11799] [ 4813.461814][T11799] the existing dependency chain (in reverse order) is: [ 4813.462372][T11799] [ 4813.462372][T11799] -> #2 (&nbd->config_lock){+.+.}-{4:4}: [ 4813.463440][T11799] __mutex_lock+0x144/0x9d8 [ 4813.463937][T11799] mutex_lock_nested+0x24/0x30 [ 4813.464350][T11799] refcount_dec_and_mutex_lock+0x44/0xbc [ 4813.464786][T11799] nbd_config_put+0x28/0x5b0 [ 4813.465206][T11799] nbd_release+0x7c/0x128 [ 4813.465583][T11799] blkdev_put_whole+0x98/0xf0 [ 4813.465993][T11799] bdev_release+0x2a4/0x510 [ 4813.466384][T11799] blkdev_release+0x14/0x24 [ 4813.466772][T11799] __fput+0x2c8/0x954 [ 4813.467430][T11799] fput_close_sync+0xdc/0x230 [ 4813.467882][T11799] __arm64_sys_close+0x6c/0xbc [ 4813.468364][T11799] invoke_syscall+0x6c/0x258 [ 4813.468809][T11799] el0_svc_common.constprop.0+0xac/0x230 [ 4813.469297][T11799] do_el0_svc+0x40/0x58 [ 4813.469679][T11799] el0_svc+0x50/0x198 [ 4813.470056][T11799] el0t_64_sync_handler+0x10c/0x138 [ 4813.470472][T11799] el0t_64_sync+0x198/0x19c [ 4813.471055][T11799] [ 4813.471055][T11799] -> #1 (&disk->open_mutex){+.+.}-{4:4}: [ 4813.471995][T11799] __mutex_lock+0x144/0x9d8 [ 4813.472454][T11799] mutex_lock_nested+0x24/0x30 [ 4813.472877][T11799] __del_gendisk+0x104/0x820 [ 4813.473302][T11799] del_gendisk+0x110/0x1b0 [ 4813.473692][T11799] nbd_dev_remove+0x44/0xe4 [ 4813.474117][T11799] nbd_dev_remove_work+0x14/0x20 [ 4813.474566][T11799] process_one_work+0x7cc/0x18d4 [ 4813.475029][T11799] worker_thread+0x734/0xb84 [ 4813.475501][T11799] kthread+0x348/0x5fc [ 4813.476052][T11799] ret_from_fork+0x10/0x20 [ 4813.476696][T11799] [ 4813.476696][T11799] -> #0 (&set->update_nr_hwq_lock){++++}-{4:4}: [ 4813.477901][T11799] __lock_acquire+0x1638/0x2380 [ 4813.478356][T11799] lock_acquire+0x310/0x38c [ 4813.478778][T11799] down_write+0xb0/0x1a4 [ 4813.479172][T11799] blk_mq_update_nr_hw_queues+0x44/0x8e0 [ 4813.479634][T11799] nbd_start_device+0xf8/0x9d0 [ 4813.480019][T11799] nbd_genl_connect+0xcb4/0x14c4 [ 4813.480459][T11799] genl_family_rcv_msg_doit+0x1b8/0x280 [ 4813.480885][T11799] genl_rcv_msg+0x3ec/0x5bc [ 4813.481297][T11799] netlink_rcv_skb+0x19c/0x338 [ 4813.481692][T11799] genl_rcv+0x38/0x50 [ 4813.482073][T11799] netlink_unicast+0x40c/0x6e8 [ 4813.482452][T11799] netlink_sendmsg+0x644/0xa54 [ 4813.482835][T11799] __sock_sendmsg+0xc8/0x168 [ 4813.482889][ T30] audit: type=1400 audit(4812.836:1227): avc: denied { write } for pid=3300 comm="syz-executor" path="pipe:[3230]" dev="pipefs" ino=3230 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 4813.484149][T11799] ____sys_sendmsg+0x504/0x768 [ 4813.484556][T11799] ___sys_sendmsg+0x11c/0x19c [ 4813.485005][T11799] __sys_sendmsg+0x114/0x19c [ 4813.485452][T11799] __arm64_sys_sendmsg+0x70/0xa0 [ 4813.485864][T11799] invoke_syscall+0x6c/0x258 [ 4813.486333][T11799] el0_svc_common.constprop.0+0xac/0x230 [ 4813.486763][T11799] do_el0_svc+0x40/0x58 [ 4813.487453][T11799] el0_svc+0x50/0x198 [ 4813.487845][T11799] el0t_64_sync_handler+0x10c/0x138 [ 4813.488400][T11799] el0t_64_sync+0x198/0x19c [ 4813.488855][T11799] [ 4813.488855][T11799] other info that might help us debug this: [ 4813.488855][T11799] [ 4813.489610][T11799] Chain exists of: [ 4813.489610][T11799] &set->update_nr_hwq_lock --> &disk->open_mutex --> &nbd->config_lock [ 4813.489610][T11799] [ 4813.491342][T11799] Possible unsafe locking scenario: [ 4813.491342][T11799] [ 4813.491952][T11799] CPU0 CPU1 [ 4813.492359][T11799] ---- ---- [ 4813.492748][T11799] lock(&nbd->config_lock); [ 4813.493347][T11799] lock(&disk->open_mutex); [ 4813.493975][T11799] lock(&nbd->config_lock); [ 4813.494638][T11799] lock(&set->update_nr_hwq_lock); [ 4813.495259][T11799] [ 4813.495259][T11799] *** DEADLOCK *** [ 4813.495259][T11799] [ 4813.495847][T11799] 3 locks held by syz.2.3085/11799: [ 4813.496292][T11799] #0: ffff8000889050b0 (cb_lock){++++}-{4:4}, at: genl_rcv+0x28/0x50 [ 4813.497657][T11799] #1: ffff800088904fe8 (genl_mutex){+.+.}-{4:4}, at: genl_rcv_msg+0x41c/0x5bc [ 4813.498778][T11799] #2: ffff000014a73230 (&nbd->config_lock){+.+.}-{4:4}, at: nbd_genl_connect+0x450/0x14c4 [ 4813.499952][T11799] [ 4813.499952][T11799] stack backtrace: [ 4813.501108][T11799] CPU: 1 UID: 0 PID: 11799 Comm: syz.2.3085 Not tainted 6.16.0-rc5-syzkaller-00266-g3f31a806a62e #0 PREEMPT [ 4813.501758][T11799] Hardware name: linux,dummy-virt (DT) SYZFAIL: failed to recv rpc [ 4813.502839][T11799] Call trace: [ 4813.503456][T11799] show_stack+0x18/0x24 (C) [ 4813.503956][T11799] dump_stack_lvl+0xa4/0xf4 [ 4813.504313][T11799] dump_stack+0x1c/0x28 [ 4813.504595][T11799] print_circular_bug+0x28c/0x370 [ 4813.504892][T11799] check_noncircular+0x168/0x17c [ 4813.505338][T11799] __lock_acquire+0x1638/0x2380 [ 4813.505692][T11799] lock_acquire+0x310/0x38c [ 4813.505992][T11799] down_write+0xb0/0x1a4 [ 4813.506289][T11799] blk_mq_update_nr_hw_queues+0x44/0x8e0 fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 4813.506609][T11799] nbd_start_device+0xf8/0x9d0 [ 4813.507318][T11799] nbd_genl_connect+0xcb4/0x14c4 [ 4813.507776][T11799] genl_family_rcv_msg_doit+0x1b8/0x280 [ 4813.508192][T11799] genl_rcv_msg+0x3ec/0x5bc [ 4813.508656][T11799] netlink_rcv_skb+0x19c/0x338 [ 4813.508968][T11799] genl_rcv+0x38/0x50 [ 4813.509412][T11799] netlink_unicast+0x40c/0x6e8 [ 4813.509832][T11799] netlink_sendmsg+0x644/0xa54 [ 4813.510162][T11799] __sock_sendmsg+0xc8/0x168 [ 4813.510469][T11799] ____sys_sendmsg+0x504/0x768 [ 4813.510764][T11799] ___sys_sendmsg+0x11c/0x19c [ 4813.511076][T11799] __sys_sendmsg+0x114/0x19c [ 4813.511399][T11799] __arm64_sys_sendmsg+0x70/0xa0 [ 4813.511732][T11799] invoke_syscall+0x6c/0x258 [ 4813.512033][T11799] el0_svc_common.constprop.0+0xac/0x230 [ 4813.512361][T11799] do_el0_svc+0x40/0x58 [ 4813.512651][T11799] el0_svc+0x50/0x198 [ 4813.512928][T11799] el0t_64_sync_handler+0x10c/0x138 [ 4813.513273][T11799] el0t_64_sync+0x198/0x19c [ 4813.690885][T11799] nbd1: detected capacity change from 0 to 7 [ 4813.722936][ T49] block nbd1: Receive control failed (result -32) [ 4813.985506][T11801] block nbd1: Dead connection, failed to find a fallback [ 4814.008235][T11801] block nbd1: shutting down sockets [ 4814.011195][T11801] I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 4814.014379][T11801] Buffer I/O error on dev nbd1, logical block 0, async page read [ 4814.018419][T11801] I/O error, dev nbd1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 4814.021750][T11801] Buffer I/O error on dev nbd1, logical block 1, async page read [ 4814.024547][T11801] I/O error, dev nbd1, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 4814.030671][T11801] Buffer I/O error on dev nbd1, logical block 2, async page read [ 4814.034135][T11801] Buffer I/O error on dev nbd1, logical block 3, async page read [ 4814.038904][T11801] I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 4814.041944][T11801] Buffer I/O error on dev nbd1, logical block 0, async page read [ 4814.045419][T11801] I/O error, dev nbd1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 4814.050264][T11801] Buffer I/O error on dev nbd1, logical block 1, async page read [ 4814.053874][T11801] I/O error, dev nbd1, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 4814.058494][T11801] Buffer I/O error on dev nbd1, logical block 2, async page read [ 4814.062206][T11801] Buffer I/O error on dev nbd1, logical block 3, async page read [ 4814.066069][T11801] nbd1: unable to read partition table [ 4814.111957][T11801] I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 4814.115861][T11801] Buffer I/O error on dev nbd1, logical block 0, async page read [ 4814.120885][T11801] I/O error, dev nbd1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 4814.123693][T11801] Buffer I/O error on dev nbd1, logical block 1, async page read [ 4814.129410][T11801] I/O error, dev nbd1, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 4814.134450][T11801] I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 4814.140708][T11801] nbd1: unable to read partition table [ 4814.921716][ T7173] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4815.106584][ T7173] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4815.271428][ T7173] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4815.476705][ T7173] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4818.596146][ T7173] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4818.689147][ T7173] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4818.752699][ T7173] bond0 (unregistering): Released all slaves [ 4818.939121][ T7173] hsr_slave_0: left promiscuous mode [ 4818.944937][ T7173] hsr_slave_1: left promiscuous mode [ 4818.982324][ T7173] veth1_macvtap: left promiscuous mode [ 4818.984675][ T7173] veth0_macvtap: left promiscuous mode [ 4818.987873][ T7173] veth1_vlan: left promiscuous mode [ 4818.989805][ T7173] veth0_vlan: left promiscuous mode [ 4824.592198][ T5055] lo speed is unknown, defaulting to 1000 [ 4824.593737][ T5055] syz0: Port: 1 Link DOWN VM DIAGNOSIS: 15:44:56 Registers: info registers vcpu 0 CPU#0 PC=ffff800080010068 X00=ffff800080006e10 X01=0000000000000000 X02=1ffff00010e1bf04 X03=1ffff00010e1bf01 X04=00000460b8322d30 X05=ffff800080006cb8 X06=ffff800080006cd0 X07=ffff800080006db0 X08=ffff800080006c58 X09=dfff800000000000 X10=ffff700010000d8a X11=1ffff00010000d8a X12=ffff700010000d8b X13=0000000000000001 X14=1fffe0000352fc65 X15=18507e9df771f255 X16=928c00009d1effff X17=5181b49da40f592c X18=ffff0000218f2280 X19=0000000000000057 X20=0000000000000057 X21=ffff800080006d90 X22=ffff8000870c0b28 X23=ffff80008d4b000c X24=dfff800000000000 X25=ffff80008d4b0000 X26=ffff8000870df808 X27=ffff8000870df800 X28=ffff700010e1bf01 X29=ffff800080006d20 X30=ffff80008001edbc SP=ffff800080006d20 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0100000000000000:0100000000000000 Q01=0000000100000000:0000000000000000 Q02=0000000000000001:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000001:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdc0b4110:0000ffffdc0b4110 Q17=ffffff80ffffffd0:0000ffffdc0b40e0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000853f0ef4 X00=ffff800086a80c1b X01=0000000000000000 X02=0000000000000003 X03=0000000000000020 X04=fffffffffffffff0 X05=0000000000000040 X06=000000000000003f X07=0000000000000000 X08=ffff80008e01666a X09=0000000000000000 X10=ffff700011c02ccd X11=1ffff00011c02ccd X12=ffff700011c02cce X13=0000000000000002 X14=0000000000000000 X15=00000000000151e8 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff80008e016ab8 X20=ffff800086a80c1a X21=dfff800000000000 X22=1ffff00011c02c72 X23=ffff8000812c0558 X24=ffff80008e016ab8 X25=ffff80008e016890 X26=00000000ffffffff X27=ffff80008e016ab8 X28=0000000000000006 X29=ffff80008e016330 X30=ffff8000853f0ed8 SP=ffff80008e016330 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0e00000000000000:0e00000000000000 Q01=0000000e00000000:0000000000000000 Q02=000000000000000e:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=000000000000000e:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff32effa0:0000fffff32effa0 Q17=ffffff80ffffffd0:0000fffff32eff70 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000