last executing test programs: 45.305927968s ago: executing program 0 (id=255): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={0xffffffffffffffff, 0x0, 0x30, 0x0, @val=@uprobe_multi={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x40) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000e40)={0x28, 0x2, 0x3, 0x101, 0x0, 0x0, {0x1, 0x0, 0x1}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0xffff2f63, 0x2}}, @NFQA_CFG_CMD={0x8, 0x1, {0x1, 0x0, 0x10}}]}, 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x800) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x8, 0x3, 0x4b8, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3e8, 0xffffffff, 0xffffffff, 0x3e8, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [0xffff00, 0xff000000], [], 'veth0_macvtap\x00', 'dvmrp1\x00', {}, {}, 0x88}, 0x0, 0x138, 0x160, 0x0, {}, [@common=@unspec=@statistic={{0x38}, {0x0, 0x0, 0x3096, 0x8000, 0x56e5, {0xd}}}, @common=@inet=@hashlimit1={{0x58}, {'bond_slave_1\x00', {0x41, 0x1ff, 0x6, 0xb0e2, 0x10001, 0x84e, 0xfffffffb, 0x18, 0x8}, {0x7800}}}]}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [0x0, 0x0, 0x0, 0xff000000], 'erspan0\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'vcan0\x00', {0x3, 0x0, 0x41, 0x0, 0x2, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x0, 0x1}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x518) 43.272923202s ago: executing program 0 (id=256): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha1\x00'}, 0x58) 41.356491407s ago: executing program 0 (id=257): r0 = socket$alg(0x26, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0x58) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240)=r4, 0x4) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x9) r5 = accept$alg(r0, 0x0, 0x0) r6 = dup(r5) r7 = open(&(0x7f00000000c0)='./file1\x00', 0x12fbc2, 0x0) ftruncate(r7, 0x200004) sendfile(r6, r7, 0x0, 0x80001d00c0d5) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002c00)={0xffffffffffffffff, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f008001f000c0cae0e4000632177fbac14140ee9", 0x0, 0x100, 0x60000000, 0x0, 0xa7, &(0x7f0000000000), &(0x7f0000000280)="8dc92a8ff39080a675b6565efa3ed46f2a2756e4686c04020000002599fc2b73f432c834dac249597b646035045af99decf86f5b32dc0404e599f56091e15e581ff6805ee283c0313298a5b8ba1c84f1850c217b5a2c2bc547eaf4585e5ba878d1660fa871a275fb61d1fec75942919083919f8d8fdad79615bc06003fa40e054d38d49dfbebc2f137fc7110f48727f3ac3d6c83f6fda9222d2acdb0b3b9374206648707f4f5ae"}, 0x50) 28.718227856s ago: executing program 0 (id=264): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) rt_tgsigqueueinfo(r0, r0, 0xe, &(0x7f0000000240)={0x6, 0xffffffff, 0xa7}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b708000002001e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) capset(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000001c0), 0x12) socket(0xa, 0x1, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000001200)='vfat\x00', 0x0, 0x0) 15.719036789s ago: executing program 1 (id=267): r0 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000580)='cgroup.max.descendants\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000680)=0x1000, 0x32) 13.595098978s ago: executing program 1 (id=268): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[], 0xff2e) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff0000/0xd000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fe9000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) r1 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) io_uring_setup(0x7042, &(0x7f0000000040)={0x0, 0xc8a2, 0xc000, 0x80008, 0xc0}) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x17, 0x3, &(0x7f0000000180)=@framed, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) 13.355784664s ago: executing program 0 (id=269): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x280080, 0x0) syz_open_pts(r0, 0x2) r1 = socket(0x8000000010, 0x2, 0x0) write(r1, &(0x7f00000002c0)="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", 0xfc) prlimit64(0x0, 0xe, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x801, 0x0) sendto$inet(r3, 0x0, 0xe803, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x3c}}, 0x10) ioctl$sock_inet_SIOCSARP(r2, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @empty}, {}, 0x0, {0x2, 0x0, @multicast1=0xe000cc02}}) 8.339175553s ago: executing program 1 (id=270): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) mmap$KVM_VCPU(&(0x7f0000000000/0xa000)=nil, 0x930, 0x1000001, 0x11, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 7.368274707s ago: executing program 1 (id=271): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000004200)={{0x12, 0x1, 0x0, 0xe2, 0x79, 0x3b, 0x10, 0x5d1, 0x2001, 0x900, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4d, 0x2f, 0x9c}}]}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$lan78xx(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000500)={0x34, &(0x7f0000000000)={0x40, 0x0, 0x2, '{\b'}, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f0000000880)={0x84, &(0x7f0000000540)={0x0, 0x18, 0x4, "96574021"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 6.531633992s ago: executing program 1 (id=272): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ip6_vti0\x00', 0x5}) sched_getattr(0x0, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454c9, 0x1) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 5.580585414s ago: executing program 1 (id=273): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) rt_tgsigqueueinfo(r0, r0, 0xe, &(0x7f0000000240)={0x6, 0xffffffff, 0xa7}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000ac0)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000b708000002001e007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) capset(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) socket(0xa, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000001200)='vfat\x00', 0x0, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000040), 0x400000001fb, 0x101301) r5 = syz_open_dev$usbmon(&(0x7f00000001c0), 0x1, 0x100) ppoll(&(0x7f0000000640)=[{r5, 0x2}], 0x1, 0x0, 0x0, 0x0) ioctl$USBDEVFS_SUBMITURB(r4, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0xfffffff8, 0x40, &(0x7f0000000000)={0x20, 0xc, 0xb, 0xfffd}, 0x8, 0x3, 0x8, 0x0, 0x2, 0x20000, 0x0}) 0s ago: executing program 0 (id=274): r0 = syz_open_dev$loop(&(0x7f0000000240), 0x7, 0x142ba3) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/fscaps', 0x8aa83, 0x83) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000280)={r1, 0x0, {0x0, 0x0, 0x0, 0x7, 0x4000000000000ffd, 0x0, 0x0, 0x1f, 0xd, "faf98317e5a1149989fc8dbe43ea6acc96e3a2503dc3bd3fe37d58128bbad0099cebdc25f5ab60c9e6d680f985881a7beda9d69098c8b534464c516bdd8a0f35", "32d8ccfc06c89f3d9ea3344bf31b5292d5f409ff2176f8ffffffffffffffcd4a520a1fcaed1e831fa79a0000000000001c000040f900", "67523760fd40f78d2cfc03d81a8ca55ba139c01802c4dae4162e43ac61b7ad33", [0x2, 0x9]}}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:60506' (ED25519) to the list of known hosts. [ 281.020833][ T30] audit: type=1400 audit(280.440:46): avc: denied { name_bind } for pid=3315 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 281.589925][ T30] audit: type=1400 audit(281.010:47): avc: denied { execute } for pid=3316 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 281.599779][ T30] audit: type=1400 audit(281.020:48): avc: denied { execute_no_trans } for pid=3316 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 290.407451][ T30] audit: type=1400 audit(289.830:49): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 290.456485][ T30] audit: type=1400 audit(289.880:50): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 290.537201][ T3316] cgroup: Unknown subsys name 'net' [ 290.602691][ T30] audit: type=1400 audit(290.020:51): avc: denied { unmount } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 291.129454][ T3316] cgroup: Unknown subsys name 'cpuset' [ 291.324282][ T3316] cgroup: Unknown subsys name 'rlimit' [ 292.043033][ T30] audit: type=1400 audit(291.460:52): avc: denied { setattr } for pid=3316 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 292.049424][ T30] audit: type=1400 audit(291.470:53): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 292.056745][ T30] audit: type=1400 audit(291.480:54): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 292.828413][ T3324] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 292.836160][ T30] audit: type=1400 audit(292.260:55): avc: denied { relabelto } for pid=3324 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 292.846812][ T30] audit: type=1400 audit(292.270:56): avc: denied { write } for pid=3324 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 292.949872][ T30] audit: type=1400 audit(292.370:57): avc: denied { read } for pid=3316 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 292.955750][ T30] audit: type=1400 audit(292.380:58): avc: denied { open } for pid=3316 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 292.994695][ T3316] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 331.053324][ T30] audit: type=1400 audit(330.470:59): avc: denied { execmem } for pid=3325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 331.169609][ T30] audit: type=1400 audit(330.590:60): avc: denied { read } for pid=3327 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 331.178166][ T30] audit: type=1400 audit(330.600:61): avc: denied { open } for pid=3327 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 331.210673][ T30] audit: type=1400 audit(330.630:62): avc: denied { mounton } for pid=3327 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 331.323540][ T30] audit: type=1400 audit(330.750:63): avc: denied { module_request } for pid=3327 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 331.745176][ T30] audit: type=1400 audit(331.160:64): avc: denied { sys_module } for pid=3327 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 342.990235][ T3327] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 343.024890][ T3328] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 343.077284][ T3327] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 343.102483][ T3328] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 347.938384][ T3328] hsr_slave_0: entered promiscuous mode [ 347.958901][ T3328] hsr_slave_1: entered promiscuous mode [ 348.548652][ T3327] hsr_slave_0: entered promiscuous mode [ 348.566606][ T3327] hsr_slave_1: entered promiscuous mode [ 348.584378][ T3327] debugfs: 'hsr0' already exists in 'hsr' [ 348.587816][ T3327] Cannot create hsr debugfs directory [ 351.787838][ T30] audit: type=1400 audit(351.210:65): avc: denied { create } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 351.812974][ T30] audit: type=1400 audit(351.230:66): avc: denied { write } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 351.838521][ T30] audit: type=1400 audit(351.260:67): avc: denied { read } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 351.950446][ T3328] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 352.179036][ T3328] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 352.349221][ T3328] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 352.566744][ T3328] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 353.719376][ T3327] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 353.829681][ T3327] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 353.950529][ T3327] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 354.127458][ T3327] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 358.897193][ T3328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 359.366106][ T3327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 375.212985][ T3328] veth0_vlan: entered promiscuous mode [ 375.289401][ T3328] veth1_vlan: entered promiscuous mode [ 375.660479][ T3328] veth0_macvtap: entered promiscuous mode [ 375.735048][ T3328] veth1_macvtap: entered promiscuous mode [ 376.330807][ T3327] veth0_vlan: entered promiscuous mode [ 376.502784][ T1618] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 376.560740][ T3392] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 376.566363][ T3392] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 376.644064][ T3392] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 376.757945][ T3327] veth1_vlan: entered promiscuous mode [ 377.528390][ T30] audit: type=1400 audit(376.950:68): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.rlc5Dr/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 377.556271][ T30] audit: type=1400 audit(376.980:69): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 377.635654][ T30] audit: type=1400 audit(377.060:70): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.rlc5Dr/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 377.679800][ T30] audit: type=1400 audit(377.100:71): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 377.817450][ T30] audit: type=1400 audit(377.220:72): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.rlc5Dr/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 377.872291][ T30] audit: type=1400 audit(377.290:73): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.rlc5Dr/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3558 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 378.050497][ T30] audit: type=1400 audit(377.470:74): avc: denied { unmount } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 378.058501][ T3327] veth0_macvtap: entered promiscuous mode [ 378.152721][ T30] audit: type=1400 audit(377.570:75): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 378.186926][ T30] audit: type=1400 audit(377.610:76): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="gadgetfs" ino=4423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 378.233937][ T3327] veth1_macvtap: entered promiscuous mode [ 378.248736][ T30] audit: type=1400 audit(377.660:77): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 378.730653][ T3328] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 379.286088][ T40] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 379.288501][ T40] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 379.289427][ T40] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 379.379049][ T40] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 381.863189][ T3480] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 382.010485][ T3480] netlink: 44 bytes leftover after parsing attributes in process `syz.1.2'. [ 382.964634][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 382.967235][ T30] audit: type=1400 audit(382.390:85): avc: denied { read } for pid=3483 comm="syz.1.3" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 382.986086][ T30] audit: type=1400 audit(382.410:86): avc: denied { open } for pid=3483 comm="syz.1.3" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 383.014108][ T30] audit: type=1400 audit(382.430:87): avc: denied { ioctl } for pid=3483 comm="syz.1.3" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 383.055048][ T30] audit: type=1400 audit(382.460:88): avc: denied { read write } for pid=3481 comm="syz.0.1" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 383.097837][ T30] audit: type=1400 audit(382.520:89): avc: denied { open } for pid=3481 comm="syz.0.1" path="/dev/raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 383.163175][ T30] audit: type=1400 audit(382.580:90): avc: denied { ioctl } for pid=3481 comm="syz.0.1" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 383.676763][ T3477] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 383.814452][ T30] audit: type=1400 audit(383.230:91): avc: denied { create } for pid=3486 comm="syz.1.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 383.846714][ T30] audit: type=1400 audit(383.270:92): avc: denied { setopt } for pid=3486 comm="syz.1.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 383.934623][ T30] audit: type=1400 audit(383.320:93): avc: denied { getopt } for pid=3486 comm="syz.1.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 383.976160][ T3477] usb 1-1: Using ep0 maxpacket: 32 [ 384.044026][ T3477] usb 1-1: config index 0 descriptor too short (expected 35577, got 27) [ 384.044840][ T3477] usb 1-1: config 1 has too many interfaces: 92, using maximum allowed: 32 [ 384.049467][ T3477] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 92 [ 384.050208][ T3477] usb 1-1: config 1 has no interface number 0 [ 384.050772][ T3477] usb 1-1: config 1 interface 1 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 384.062457][ T3477] usb 1-1: config 1 interface 1 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 17 [ 384.063313][ T3477] usb 1-1: New USB device found, idVendor=0e41, idProduct=5051, bcdDevice=d5.e8 [ 384.063457][ T3477] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 384.520411][ T3477] snd_usb_pod 1-1:1.1: Line 6 Pocket POD found [ 384.820609][ T3477] snd_usb_pod 1-1:1.1: Line 6 Pocket POD now attached [ 385.655371][ T3477] usb 1-1: USB disconnect, device number 2 [ 385.767391][ T3477] snd_usb_pod 1-1:1.1: Line 6 Pocket POD now disconnected [ 388.519312][ T30] audit: type=1400 audit(387.930:94): avc: denied { bind } for pid=3496 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 389.873127][ T30] audit: type=1400 audit(389.290:95): avc: denied { checkpoint_restore } for pid=3499 comm="syz.0.9" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 389.998484][ T30] audit: type=1400 audit(389.420:96): avc: denied { setopt } for pid=3505 comm="syz.1.11" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 390.628406][ T30] audit: type=1400 audit(390.050:97): avc: denied { prog_load } for pid=3507 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 390.632792][ T30] audit: type=1400 audit(390.050:98): avc: denied { bpf } for pid=3507 comm="syz.0.12" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 390.714082][ T30] audit: type=1400 audit(390.140:99): avc: denied { perfmon } for pid=3507 comm="syz.0.12" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 391.016891][ T30] audit: type=1400 audit(390.430:100): avc: denied { prog_run } for pid=3507 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 391.625037][ T30] audit: type=1400 audit(391.020:101): avc: denied { remount } for pid=3511 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 391.628327][ T3513] ======================================================= [ 391.628327][ T3513] WARNING: The mand mount option has been deprecated and [ 391.628327][ T3513] and is ignored by this kernel. Remove the mand [ 391.628327][ T3513] option from the mount to silence this warning. [ 391.628327][ T3513] ======================================================= [ 391.635619][ T3513] binder: Binderfs stats mode cannot be changed during a remount [ 391.924390][ T3516] Zero length message leads to an empty skb [ 392.954961][ T30] audit: type=1400 audit(392.380:102): avc: denied { ioctl } for pid=3519 comm="syz.1.18" path="socket:[4525]" dev="sockfs" ino=4525 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 393.691088][ C0] hrtimer: interrupt took 2024032 ns [ 397.088970][ T30] audit: type=1400 audit(396.510:103): avc: denied { read } for pid=3535 comm="syz.1.23" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 397.102604][ T30] audit: type=1400 audit(396.510:104): avc: denied { open } for pid=3535 comm="syz.1.23" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 397.135599][ T30] audit: type=1400 audit(396.560:105): avc: denied { ioctl } for pid=3535 comm="syz.1.23" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x7003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 399.374363][ T10] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 399.884126][ T10] usb 1-1: New USB device found, idVendor=055f, idProduct=c230, bcdDevice=b6.ac [ 399.885131][ T10] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 399.885936][ T10] usb 1-1: Product: syz [ 399.886077][ T10] usb 1-1: Manufacturer: syz [ 399.886205][ T10] usb 1-1: SerialNumber: syz [ 399.920404][ T3553] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 400.047204][ T10] usb 1-1: config 0 descriptor?? [ 401.828911][ T30] audit: type=1400 audit(401.250:106): avc: denied { read write } for pid=3556 comm="syz.1.31" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 401.876843][ T30] audit: type=1400 audit(401.300:107): avc: denied { open } for pid=3556 comm="syz.1.31" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 401.920611][ T30] audit: type=1400 audit(401.330:108): avc: denied { ioctl } for pid=3556 comm="syz.1.31" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 402.672047][ T30] audit: type=1400 audit(402.090:109): avc: denied { name_bind } for pid=3559 comm="syz.1.32" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 402.680646][ T30] audit: type=1400 audit(402.100:110): avc: denied { node_bind } for pid=3559 comm="syz.1.32" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 410.401968][ T3323] usb 1-1: USB disconnect, device number 3 [ 410.822424][ T30] audit: type=1400 audit(410.240:111): avc: denied { map_create } for pid=3579 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 410.837941][ T30] audit: type=1400 audit(410.260:112): avc: denied { map_read map_write } for pid=3579 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 412.263372][ T30] audit: type=1400 audit(411.680:113): avc: denied { create } for pid=3586 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 412.289240][ T30] audit: type=1400 audit(411.700:114): avc: denied { setopt } for pid=3586 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 412.298533][ T30] audit: type=1400 audit(411.720:115): avc: denied { write } for pid=3586 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 414.829550][ T3595] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 414.847722][ T3595] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 416.689957][ T30] audit: type=1400 audit(416.110:116): avc: denied { create } for pid=3604 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 416.746937][ T30] audit: type=1400 audit(416.150:117): avc: denied { setopt } for pid=3604 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 417.604730][ T30] audit: type=1400 audit(417.030:118): avc: denied { read } for pid=3608 comm="syz.0.54" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 417.608912][ T30] audit: type=1400 audit(417.030:119): avc: denied { open } for pid=3608 comm="syz.0.54" path="/dev/dri/card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 417.682077][ T30] audit: type=1400 audit(417.100:120): avc: denied { ioctl } for pid=3608 comm="syz.0.54" path="/dev/dri/card1" dev="devtmpfs" ino=619 ioctlcmd=0x64d1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 418.319811][ T30] audit: type=1400 audit(417.740:121): avc: denied { allowed } for pid=3610 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 418.381935][ T30] audit: type=1400 audit(417.800:122): avc: denied { create } for pid=3610 comm="syz.1.55" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 418.400425][ T30] audit: type=1400 audit(417.820:123): avc: denied { map } for pid=3610 comm="syz.1.55" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3782 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 418.414335][ T30] audit: type=1400 audit(417.830:124): avc: denied { read write } for pid=3610 comm="syz.1.55" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3782 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 423.056081][ C0] [drm:vkms_crtc_handle_vblank_timeout] *ERROR* vkms failure on handling vblank [ 440.263591][ T30] audit: type=1400 audit(439.680:125): avc: denied { create } for pid=3658 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 441.840070][ T30] audit: type=1400 audit(441.190:126): avc: denied { bind } for pid=3658 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 445.364791][ T30] audit: type=1400 audit(444.760:127): avc: denied { create } for pid=3661 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 445.573522][ T30] audit: type=1400 audit(444.980:128): avc: denied { bind } for pid=3661 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 446.125925][ T30] audit: type=1400 audit(445.550:129): avc: denied { setopt } for pid=3661 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 446.144050][ T30] audit: type=1400 audit(445.560:130): avc: denied { accept } for pid=3661 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 450.153762][ T9] usb 1-1: new low-speed USB device number 4 using dummy_hcd [ 450.468474][ T9] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 450.469518][ T9] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 32, setting to 8 [ 450.469913][ T9] usb 1-1: New USB device found, idVendor=05ac, idProduct=0240, bcdDevice= 0.00 [ 450.470049][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 450.617054][ T9] usb 1-1: config 0 descriptor?? [ 450.747424][ T3681] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 450.798229][ T3681] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 450.935643][ T3679] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 451.329326][ T9] usb 1-1: USB disconnect, device number 4 [ 451.805301][ T30] audit: type=1400 audit(451.230:131): avc: denied { create } for pid=3683 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 452.462512][ T30] audit: type=1400 audit(451.880:132): avc: denied { create } for pid=3686 comm="syz.0.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 457.726523][ T3700] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 457.729609][ T3700] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 460.884907][ T30] audit: type=1400 audit(460.310:133): avc: denied { map } for pid=3703 comm="syz.1.83" path="socket:[3969]" dev="sockfs" ino=3969 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 460.912033][ T30] audit: type=1400 audit(460.320:134): avc: denied { read accept } for pid=3703 comm="syz.1.83" path="socket:[3969]" dev="sockfs" ino=3969 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 464.299726][ T3708] sch_tbf: burst 274 is lower than device lo mtu (65550) ! [ 467.249603][ T3715] netlink: 48 bytes leftover after parsing attributes in process `syz.0.87'. [ 467.719640][ T3715] netlink: 48 bytes leftover after parsing attributes in process `syz.0.87'. [ 472.105500][ T3731] Illegal XDP return value 3212316944 on prog (id 8) dev N/A, expect packet loss! [ 501.952313][ T30] audit: type=1400 audit(2000000001.880:135): avc: denied { create } for pid=3770 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 502.034299][ T30] audit: type=1400 audit(2000000002.020:136): avc: denied { write } for pid=3770 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 528.369708][ T30] audit: type=1400 audit(2000000028.520:137): avc: denied { setattr } for pid=3785 comm="syz.0.115" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 532.057506][ T30] audit: type=1400 audit(2000000032.220:138): avc: denied { bind } for pid=3788 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 549.050020][ T30] audit: type=1400 audit(2000000049.220:139): avc: denied { create } for pid=3808 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 549.107206][ T30] audit: type=1400 audit(2000000049.280:140): avc: denied { write } for pid=3808 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 549.112844][ T30] audit: type=1400 audit(2000000049.280:141): avc: denied { nlmsg_write } for pid=3808 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 549.309846][ T3809] netlink: 148 bytes leftover after parsing attributes in process `syz.0.122'. [ 558.898217][ T3832] pim6reg1: entered allmulticast mode [ 559.208147][ T3832] pim6reg1: left allmulticast mode [ 561.144805][ T3840] syz_tun: entered allmulticast mode [ 561.360622][ T3840] pimreg: entered allmulticast mode [ 561.600666][ T3837] syz_tun: left allmulticast mode [ 563.813445][ T3850] team_slave_1: mtu less than device minimum [ 590.305488][ T30] audit: type=1400 audit(2000000090.480:142): avc: denied { listen } for pid=3923 comm="syz.0.177" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 590.495870][ T30] audit: type=1400 audit(2000000090.660:143): avc: denied { execute } for pid=3924 comm="syz.1.178" path="/88/memory.events" dev="tmpfs" ino=463 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 590.867281][ T30] audit: type=1400 audit(2000000091.040:144): avc: denied { read write } for pid=3927 comm="syz.0.179" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 590.867801][ T30] audit: type=1400 audit(2000000091.040:145): avc: denied { open } for pid=3927 comm="syz.0.179" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 590.876794][ T30] audit: type=1400 audit(2000000091.050:146): avc: denied { ioctl } for pid=3927 comm="syz.0.179" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x1500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 595.735518][ T30] audit: type=1400 audit(2000000095.910:147): avc: denied { map } for pid=3955 comm="syz.1.193" path="socket:[5412]" dev="sockfs" ino=5412 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 595.738953][ T30] audit: type=1400 audit(2000000095.910:148): avc: denied { read } for pid=3955 comm="syz.1.193" path="socket:[5412]" dev="sockfs" ino=5412 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 598.634270][ T30] audit: type=1400 audit(2000000098.790:149): avc: denied { mounton } for pid=3967 comm="syz.1.197" path="/proc/225/cgroup" dev="proc" ino=5419 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 605.578730][ T30] audit: type=1400 audit(2000000105.750:150): avc: denied { connect } for pid=3991 comm="syz.1.208" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 611.390030][ T30] audit: type=1400 audit(2000000111.560:151): avc: denied { bind } for pid=4016 comm="syz.0.218" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 611.407007][ T30] audit: type=1400 audit(2000000111.580:152): avc: denied { name_bind } for pid=4016 comm="syz.0.218" src=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 611.412000][ T30] audit: type=1400 audit(2000000111.580:153): avc: denied { node_bind } for pid=4016 comm="syz.0.218" saddr=255.255.255.255 src=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 612.853632][ T30] audit: type=1400 audit(2000000113.010:154): avc: denied { create } for pid=4022 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 612.930006][ T30] audit: type=1400 audit(2000000113.100:155): avc: denied { connect } for pid=4022 comm="syz.0.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 613.597074][ T4027] netlink: 216 bytes leftover after parsing attributes in process `syz.1.222'. [ 616.765237][ T30] audit: type=1400 audit(2000000116.910:156): avc: denied { read write } for pid=4037 comm="syz.1.228" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 616.773762][ T30] audit: type=1400 audit(2000000116.940:157): avc: denied { open } for pid=4037 comm="syz.1.228" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 617.613180][ T30] audit: type=1400 audit(2000000117.790:158): avc: denied { read } for pid=4041 comm="syz.0.230" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 617.615817][ T30] audit: type=1400 audit(2000000117.790:159): avc: denied { open } for pid=4041 comm="syz.0.230" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 617.678774][ T4042] binder: 4041:4042 IncRefs 0 refcount change on invalid ref 2 ret -22 [ 617.680433][ T30] audit: type=1400 audit(2000000117.830:160): avc: denied { ioctl } for pid=4041 comm="syz.0.230" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 617.682524][ T30] audit: type=1400 audit(2000000117.830:161): avc: denied { set_context_mgr } for pid=4041 comm="syz.0.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 618.158488][ T30] audit: type=1400 audit(2000000118.330:162): avc: denied { create } for pid=4045 comm="syz.0.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 618.206928][ T4048] trusted_key: encrypted_key: insufficient parameters specified [ 621.775837][ T30] audit: type=1400 audit(2000000121.790:163): avc: denied { ioctl } for pid=4049 comm="syz.1.234" path="socket:[5533]" dev="sockfs" ino=5533 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 626.884919][ T30] audit: type=1400 audit(2000000127.050:164): avc: denied { write } for pid=4056 comm="syz.0.236" name="route" dev="proc" ino=4026532638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 633.986627][ T30] audit: type=1400 audit(2000000134.150:165): avc: denied { create } for pid=4066 comm="syz.0.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 644.253752][ T30] audit: type=1400 audit(2000000144.320:166): avc: denied { create } for pid=4092 comm="syz.0.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 644.268297][ T30] audit: type=1400 audit(2000000144.360:167): avc: denied { bind } for pid=4092 comm="syz.0.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 652.349123][ T30] audit: type=1400 audit(2000000152.520:168): avc: denied { sqpoll } for pid=4111 comm="syz.1.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 652.635825][ T30] audit: type=1400 audit(2000000152.790:169): avc: denied { mount } for pid=4113 comm="syz.0.254" name="/" dev="ramfs" ino=6397 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 652.739319][ T30] audit: type=1400 audit(2000000152.910:170): avc: denied { create } for pid=4110 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 652.772353][ T30] audit: type=1400 audit(2000000152.920:171): avc: denied { write open } for pid=4110 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1588 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 652.787880][ T30] audit: type=1400 audit(2000000152.950:172): avc: denied { append } for pid=4110 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1588 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 652.805490][ T30] audit: type=1400 audit(2000000152.980:173): avc: denied { getattr } for pid=4110 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 653.576701][ T30] audit: type=1400 audit(2000000153.740:174): avc: denied { read } for pid=4117 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 653.618156][ T30] audit: type=1400 audit(2000000153.790:175): avc: denied { write } for pid=4119 comm="syz.0.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 654.424597][ T30] audit: type=1400 audit(2000000154.590:176): avc: denied { unlink } for pid=4123 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1588 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 663.625167][ T30] audit: type=1400 audit(2000000163.800:177): avc: denied { write } for pid=4137 comm="syz.1.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 663.632529][ T30] audit: type=1400 audit(2000000163.800:178): avc: denied { nlmsg_read } for pid=4137 comm="syz.1.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 663.634833][ T4138] netlink: 16 bytes leftover after parsing attributes in process `syz.1.260'. [ 675.509474][ T30] audit: type=1400 audit(2000000175.640:179): avc: denied { create } for pid=4146 comm="syz.0.264" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 684.672810][ T30] audit: type=1400 audit(2000000184.830:180): avc: denied { unlink } for pid=3327 comm="syz-executor" name="file0" dev="tmpfs" ino=663 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 685.923738][ T4167] netlink: 'syz.0.269': attribute type 12 has an invalid length. [ 691.366779][ T4175] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 691.378222][ T4175] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 699.924975][ T30] audit: type=1400 audit(2000000199.710:181): avc: denied { write } for pid=4178 comm="syz.1.273" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 700.013754][ T30] audit: type=1400 audit(2000000199.830:182): avc: denied { read } for pid=4178 comm="syz.1.273" name="usbmon1" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 700.143312][ T30] audit: type=1400 audit(2000000199.850:183): avc: denied { open } for pid=4178 comm="syz.1.273" path="/dev/usbmon1" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 700.397643][ T4184] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 703.126635][ T4186] loop7: detected capacity change from 0 to 7 [ 703.266567][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 703.269519][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 703.347811][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 703.348679][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 703.364340][ T4186] loop7: unable to read partition table [ 703.460553][ T4186] loop_reread_partitions: partition scan of loop7 (Cj̖P=ý?}X %`ր{֐ȵ4FLQk݊) failed (rc=-5) [ 704.224502][ T4188] [ 704.226274][ T4188] ====================================================== [ 704.226525][ T4188] WARNING: possible circular locking dependency detected [ 704.227055][ T4188] syzkaller #0 Not tainted [ 704.227511][ T4188] ------------------------------------------------------ [ 704.227967][ T4188] syz.0.274/4188 is trying to acquire lock: [ 704.228325][ T4188] ffff00000e16ca20 (&root->kernfs_iattr_rwsem){++++}-{4:4}, at: kernfs_iop_getattr+0x88/0xf0 [ 704.229454][ T4188] [ 704.229454][ T4188] but task is already holding lock: [ 704.229788][ T4188] ffff000014d5c2e0 (&q->q_usage_counter(io)#24){++++}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 [ 704.230522][ T4188] [ 704.230522][ T4188] which lock already depends on the new lock. [ 704.230522][ T4188] [ 704.231468][ T4188] [ 704.231468][ T4188] the existing dependency chain (in reverse order) is: [ 704.232084][ T4188] [ 704.232084][ T4188] -> #2 (&q->q_usage_counter(io)#24){++++}-{0:0}: [ 704.232885][ T4188] blk_alloc_queue+0x538/0x644 [ 704.233384][ T4188] blk_mq_alloc_queue+0x144/0x220 [ 704.233600][ T4188] __blk_mq_alloc_disk+0x20/0x120 [ 704.233953][ T4188] loop_add+0x3b0/0x938 [ 704.234540][ T4188] loop_init+0xd0/0x138 [ 704.234772][ T4188] do_one_initcall+0x130/0x7f0 [ 704.235166][ T4188] kernel_init_freeable+0x48c/0x708 [ 704.235508][ T4188] kernel_init+0x24/0x1e0 [ 704.235830][ T4188] ret_from_fork+0x10/0x20 [ 704.236533][ T4188] [ 704.236533][ T4188] -> #1 (fs_reclaim){+.+.}-{0:0}: [ 704.237044][ T4188] fs_reclaim_acquire+0x138/0x160 [ 704.237311][ T4188] kmem_cache_alloc_noprof+0x60/0x6fc [ 704.237622][ T4188] __kernfs_iattrs+0x10c/0x330 [ 704.237901][ T4188] __kernfs_setattr+0x4c/0x2a0 [ 704.238157][ T4188] kernfs_iop_setattr+0xc0/0xf4 [ 704.238373][ T4188] notify_change+0x3d0/0xbe4 [ 704.238647][ T4188] do_truncate+0x174/0x1bc [ 704.238895][ T4188] path_openat+0x1ad8/0x28cc [ 704.239182][ T4188] do_filp_open+0x184/0x360 [ 704.239499][ T4188] do_sys_openat2+0xe0/0x188 [ 704.239843][ T4188] __arm64_sys_openat+0x12c/0x1bc [ 704.240166][ T4188] invoke_syscall+0x6c/0x258 [ 704.240357][ T4188] el0_svc_common.constprop.0+0xac/0x230 [ 704.240567][ T4188] do_el0_svc+0x40/0x58 [ 704.240881][ T4188] el0_svc+0x54/0x2b0 [ 704.241097][ T4188] el0t_64_sync_handler+0xa0/0xe4 [ 704.241287][ T4188] el0t_64_sync+0x198/0x19c [ 704.241679][ T4188] [ 704.241679][ T4188] -> #0 (&root->kernfs_iattr_rwsem){++++}-{4:4}: [ 704.242184][ T4188] __lock_acquire+0x1638/0x2380 [ 704.242545][ T4188] lock_acquire+0x310/0x38c [ 704.242912][ T4188] down_read+0xb4/0x314 [ 704.243239][ T4188] kernfs_iop_getattr+0x88/0xf0 [ 704.243636][ T4188] vfs_getattr_nosec+0x1fc/0x374 [ 704.243911][ T4188] vfs_getattr+0x40/0x54 [ 704.244120][ T4188] loop_query_min_dio_size.isra.0+0xf8/0x1d0 [ 704.244288][ T4188] lo_ioctl+0xe34/0x1728 [ 704.244455][ T4188] blkdev_ioctl+0x598/0x808 [ 704.244696][ T4188] __arm64_sys_ioctl+0x124/0x1a4 [ 704.244882][ T4188] invoke_syscall+0x6c/0x258 [ 704.245493][ T4188] el0_svc_common.constprop.0+0xac/0x230 [ 704.245780][ T4188] do_el0_svc+0x40/0x58 [ 704.245944][ T4188] el0_svc+0x54/0x2b0 [ 704.246113][ T4188] el0t_64_sync_handler+0xa0/0xe4 [ 704.246290][ T4188] el0t_64_sync+0x198/0x19c [ 704.246508][ T4188] [ 704.246508][ T4188] other info that might help us debug this: [ 704.246508][ T4188] [ 704.246888][ T4188] Chain exists of: [ 704.246888][ T4188] &root->kernfs_iattr_rwsem --> fs_reclaim --> &q->q_usage_counter(io)#24 [ 704.246888][ T4188] [ 704.248521][ T4188] Possible unsafe locking scenario: [ 704.248521][ T4188] [ 704.248895][ T4188] CPU0 CPU1 [ 704.249576][ T4188] ---- ---- [ 704.250496][ T4188] lock(&q->q_usage_counter(io)#24); [ 704.251345][ T4188] lock(fs_reclaim); [ 704.251883][ T4188] lock(&q->q_usage_counter(io)#24); [ 704.252799][ T4188] rlock(&root->kernfs_iattr_rwsem); [ 704.253890][ T4188] [ 704.253890][ T4188] *** DEADLOCK *** [ 704.253890][ T4188] [ 704.254547][ T4188] 3 locks held by syz.0.274/4188: [ 704.255054][ T4188] #0: ffff000014dff448 (&lo->lo_mutex){+.+.}-{4:4}, at: loop_global_lock_killable+0x2c/0xbc [ 704.256153][ T4188] #1: ffff000014d5c2e0 (&q->q_usage_counter(io)#24){++++}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 [ 704.257566][ T4188] #2: ffff000014d5c318 (&q->q_usage_counter(queue)#8){+.+.}-{0:0}, at: blk_mq_freeze_queue_nomemsave+0x18/0x30 [ 704.258826][ T4188] [ 704.258826][ T4188] stack backtrace: [ 704.259907][ T4188] CPU: 1 UID: 0 PID: 4188 Comm: syz.0.274 Not tainted syzkaller #0 PREEMPT [ 704.260486][ T4188] Hardware name: linux,dummy-virt (DT) [ 704.261593][ T4188] Call trace: [ 704.262175][ T4188] show_stack+0x18/0x24 (C) [ 704.262720][ T4188] dump_stack_lvl+0xa4/0xf4 [ 704.263071][ T4188] dump_stack+0x1c/0x28 [ 704.263379][ T4188] print_circular_bug+0x28c/0x370 [ 704.263764][ T4188] check_noncircular+0x168/0x17c [ 704.264090][ T4188] __lock_acquire+0x1638/0x2380 [ 704.264430][ T4188] lock_acquire+0x310/0x38c [ 704.264935][ T4188] down_read+0xb4/0x314 [ 704.265240][ T4188] kernfs_iop_getattr+0x88/0xf0 [ 704.265608][ T4188] vfs_getattr_nosec+0x1fc/0x374 [ 704.266012][ T4188] vfs_getattr+0x40/0x54 [ 704.266371][ T4188] loop_query_min_dio_size.isra.0+0xf8/0x1d0 [ 704.266775][ T4188] lo_ioctl+0xe34/0x1728 [ 704.267148][ T4188] blkdev_ioctl+0x598/0x808 [ 704.267498][ T4188] __arm64_sys_ioctl+0x124/0x1a4 [ 704.267878][ T4188] invoke_syscall+0x6c/0x258 [ 704.268201][ T4188] el0_svc_common.constprop.0+0xac/0x230 [ 704.268626][ T4188] do_el0_svc+0x40/0x58 [ 704.268961][ T4188] el0_svc+0x54/0x2b0 [ 704.269419][ T4188] el0t_64_sync_handler+0xa0/0xe4 [ 704.269801][ T4188] el0t_64_sync+0x198/0x19c SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 704.507808][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 704.508496][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 704.576875][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 704.577656][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 704.608509][ T4189] loop7: unable to read partition table [ 705.371829][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 705.372444][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 705.413278][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 705.413884][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 705.455066][ T4188] loop7: unable to read partition table [ 705.464719][ T4188] loop_reread_partitions: partition scan of loop7 (Cj̖P=ý?}X %`ր{֐ȵ4FLQk݊) failed (rc=-5) [ 705.643354][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 705.643713][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 705.652737][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 705.653052][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 705.666102][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 705.666468][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 705.673752][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x800000 phys_seg 1 prio class 2 [ 705.674059][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 706.959330][ T1618] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 707.295273][ T1618] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 707.440261][ T1618] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 707.647529][ T1618] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 708.008844][ T30] audit: type=1400 audit(2000000208.170:184): avc: denied { read } for pid=3166 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 709.311813][ T1618] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 709.410637][ T1618] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 709.465931][ T1618] bond0 (unregistering): Released all slaves [ 709.616174][ T1618] hsr_slave_0: left promiscuous mode [ 709.620384][ T1618] hsr_slave_1: left promiscuous mode [ 709.648965][ T1618] veth1_macvtap: left promiscuous mode [ 709.650117][ T1618] veth0_macvtap: left promiscuous mode [ 709.654703][ T1618] veth1_vlan: left promiscuous mode [ 709.656026][ T1618] veth0_vlan: left promiscuous mode [ 713.259857][ T1618] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 713.442144][ T1618] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 713.605164][ T1618] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 713.760517][ T1618] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 715.507536][ T1618] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 715.564583][ T1618] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 715.619230][ T1618] bond0 (unregistering): Released all slaves [ 715.851560][ T1618] hsr_slave_0: left promiscuous mode [ 715.866929][ T1618] hsr_slave_1: left promiscuous mode [ 715.949106][ T1618] veth1_macvtap: left promiscuous mode [ 715.950253][ T1618] veth0_macvtap: left promiscuous mode [ 715.956583][ T1618] veth1_vlan: left promiscuous mode [ 715.957675][ T1618] veth0_vlan: left promiscuous mode [ 716.859984][ T1618] pimreg (unregistering): left allmulticast mode