last executing test programs: 11m24.190528633s ago: executing program 0 (id=1): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000001c00)={0x1, &(0x7f0000000180)=[{0x6}]}, 0x10) syz_open_dev$usbfs(0x0, 0xf, 0xc340) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x0, 0x7c7, 0x3, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x86, 0x4, 0x0, @empty, @local}}}}) 10m36.798805196s ago: executing program 32 (id=1): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000001c00)={0x1, &(0x7f0000000180)=[{0x6}]}, 0x10) syz_open_dev$usbfs(0x0, 0xf, 0xc340) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x0, 0x7c7, 0x3, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x86, 0x4, 0x0, @empty, @local}}}}) 26.977516298s ago: executing program 2 (id=194): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001740), 0x80000, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 26.196434829s ago: executing program 2 (id=195): sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = socket$inet(0x2, 0x3, 0x8) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x8, 0x3, 0x308, 0x1a0, 0xe138, 0x198, 0x1a0, 0x198, 0x270, 0x358, 0x358, 0x270, 0x358, 0x3, 0x0, {[{{@ip={@broadcast, @loopback, 0x0, 0x0, 'nicvf0\x00', 'veth0_to_bond\x00', {}, {}, 0x0, 0x0, 0x20}, 0x0, 0x158, 0x1a0, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'fsm\x00', "0d0003000000000000000404fff0cf81dfd28c89544e14cd3e01dd24289831867846c88621039b284c3ff45c429955608b9952bed40ce4a8c1df6cdbdb7e2378d5afd35f4c16827f55b3af494e39e8fb330200000000000032b6a99a8d87298e88a94cb519f5c17631af916a0002000000000000000000000000000000080049", 0x4}}, @inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x3, 0x3078, 0x5, 'syz1\x00', {0x5}}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local, 0xc, 0x6, [0x97f4, 0x15, 0x33, 0x29, 0x7, 0x3c, 0x4, 0x26, 0x9, 0xc, 0xf, 0x1d, 0x3e, 0x1e, 0x30], 0x0, 0x0, 0x3}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x368) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000cc0), 0x0, &(0x7f0000000dc0)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r1}}}], 0x80, 0x4004000}}, {{&(0x7f0000000d40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000c80)=[{&(0x7f0000001040)}, {&(0x7f0000001100)="06a4739735acd4d3f2d0268afdcb1135f23565627f9d4a8cbe141746bb5f97e7374c6c67d7ca143b04c4f2ee1aa37987603447c3c20481eb242524dfac17a09d75bde3c91401de25ebb959957539c7d95796fd4616c643042af9dfb30d63d1316cb5bf02190ded5a589369e1e7f72ef123b284f857a3a3a497b7107e5058947502ffddefc19f62980cb4588ee110933a257571864d7934281c566aaec419a7eb2cedd0e3e442", 0xa6}, {&(0x7f00000011c0)="e976eb2d2a0532fa0c4a6909ef891ca7350cd3a36a162cf002e2913c0d171442807a0eafd68df03ffe78bdd9792e0777ab694224897ae68ac47891a1aa410b00be2b1a95632541cf616f08a758c047dcc5f5ff6b7ebc4d836249175e48feb2026e09c96f1b29201f55b52955ab80999100a4c87d729c404ced58275bfb3a6d6b0bde0a1aed8739b85262c03cbdc7107909fcf616f20693d72b6842f503ba4a748100060e60f5db416d", 0xa9}, {&(0x7f0000003280)}], 0x4, &(0x7f0000003300)=[@rights={{0x20, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r0]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r1}}}], 0x80, 0x8}}, {{&(0x7f0000003380)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000003600)=[{&(0x7f0000003400)="e12d73408816acde4f37bfae0821c60d1d55dd0bc7e6f705c035e9999b740e8165f5f3a97ee2903b2b31c79edf7f8bae7e3318d194611a17ed94fcda46dc36688d256a342cd3e0c17d0e46ebb23eb4b925b7908275d80d9232bb3bd5f11901dc844964b2aa68244f0659f78381348cb1c7830a5e48dd82c068821a86b7", 0x7d}, {&(0x7f0000003480)="d524a23b5f9d95473b6e40ceb1d1da29658a972d813e12aa53930120637e6cc31f828e4fdd3067d021a0dd11bffe49f5209c6be214cda8196b474a932c77d0f23c55d649ed5e2b34ee63530def09ae11ff15d35bb37852ad7677e923cab5eb6461e4725353bf1cf7c7be00f041268f3f5013ebf087f2d415d936e1e6c6d7797f56c13c875b44ab5b265135dd5b114b6d0fe2d13cbdfab3ed2b3d8fe70a045c33792934e726b56d31be1397a9d6583c1efb6ef1eabf70e8231356990a94e23ad52200341edff557f5585bc61ad9f0cb93b543b0b5cfd52fe31cc998cb68339df57feac417e39361f50f657fe6ce377a32dd3fada2c95e3320d0", 0xf9}, {&(0x7f0000003580)="8d448e9aa4b86b53d7c25559d979b4f5defa16760a74db3c5548c20e8fe00ab93f65cd98da34f20c69e1051827256b0d34e6ab22beef45ff463b140d43acca6dfacc2e15ef0093f0cf5f332b56023d1e3b8e41403de9d3634bfa73240337c6abb2ef52e23f7fd1f7c5729ef8deb3f6259e5b1d", 0x73}], 0x3, &(0x7f0000003c00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [r2, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa0, 0x20040010}}, {{0x0, 0x0, &(0x7f0000003d00)=[{&(0x7f0000003cc0)="3c5e41ffc7fc1304082bbb", 0xb}], 0x1, &(0x7f0000003dc0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r1}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xd0, 0x20000000}}, {{0x0, 0x0, &(0x7f0000006300)=[{&(0x7f0000003ec0)="56598c56fd4b6eb56277c561504e5d7db19cfdde35e6dad91f74c5f92bc146a0945bb71d6a1aa9f8187ff3109f7ef1b2e8e8af155fef8666b8cf7eb1243e29c5b2b5310f5f6f99baecf54b457e39d0c99fc9e9f8ec00a43de5366f26560f1144271de093f582e5b78003f54f6b1cef73fe4f8f5aed14f326f2672f7e076a3200d3550cd8c91d9a13778a2b5259f4c3563a9bc4cc7995169afbd44a8d0496d5ffd0f77953cd504e", 0xa7}, {&(0x7f0000003f80)="c7f5f327111ff4581c6c141470fed3b96674bb", 0x13}, {&(0x7f0000003fc0)}, {&(0x7f00000040c0)}, {&(0x7f00000041c0)="558f19903f52590cacb41d705ecb9cf936ef99c2ed70028d3248ef232002bdeb53a8cff66f34682175fa9d0dc82efc9a65d00d1983a2d754f8299fc751dfec47c9c5c7c51804b752cfdc0a628d69912fe86ec8e307aea9310cfce43099a0097a36965fc9db352c3770282bc93e09c37c7cfb0d3d21500aa9929a37f77d175bf5331c4ffb4fc9615de52523ba8b", 0x8d}, {&(0x7f00000062c0)="8bb99b4b19bcf62671186269866030918a5df34658f31c21cabd9c649ea19100e3a1d9c8d4e1bf093909cd", 0x2b}], 0x6, &(0x7f0000008780)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd0, 0x10}}], 0x5, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r5) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r6 = gettid() r7 = syz_open_procfs(r6, &(0x7f0000000040)='timerslack_ns\x00') write$FUSE_NOTIFY_RETRIEVE(r7, &(0x7f0000000100)={0x30}, 0x30) 17.222824722s ago: executing program 1 (id=197): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x3}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040), 0x0) pidfd_send_signal(0xffffffffffffffff, 0x40, 0x0, 0x0) 15.164633655s ago: executing program 1 (id=198): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x1, 0x0) preadv(r0, &(0x7f0000000480)=[{&(0x7f00000000c0)=""/148, 0x94}], 0x1, 0x1, 0x0) ioctl$MON_IOCX_GETX(r0, 0x80089203, 0x0) 12.770276451s ago: executing program 1 (id=199): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001740), 0x80000, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 11.879585109s ago: executing program 1 (id=200): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) r1 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r0}, 0x8) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[], &(0x7f0000000140)='GPL\x00'}, 0x94) r3 = bpf$ITER_CREATE(0xb, &(0x7f00000004c0)={r2}, 0x8) close(r3) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r2, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000005c0)={r1, r0, 0x4, r2}, 0x10) 10.552999415s ago: executing program 1 (id=201): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) 9.134884817s ago: executing program 1 (id=202): r0 = creat(&(0x7f0000000580)='./bus\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r1 = fanotify_init(0xf00, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) open(&(0x7f00009e1000)='./file0\x00', 0x88461, 0x0) fanotify_mark(r1, 0x105, 0x8971, r0, 0x0) 2.846599406s ago: executing program 2 (id=203): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x20, 0x10, 0x44b, 0x0, 0x25dfdbfe, {0x7a, 0x0, 0x0, 0x0, 0x1840}}, 0x20}}, 0x0) 1.955076583s ago: executing program 2 (id=204): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001740), 0x80000, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 916.87868ms ago: executing program 2 (id=205): r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000740)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_ttl={{0x14, 0x0, 0x34, 0x10000ec}}], 0x18}}], 0x1, 0x0) 0s ago: executing program 2 (id=206): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) pipe(0x0) r3 = io_uring_setup(0x177b, &(0x7f00000002c0)={0x0, 0x6ff, 0x80, 0x7, 0x3d1}) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000140)=0x200000000) preadv2(r4, &(0x7f0000000000)=[{&(0x7f0000000340)=""/136, 0x88}], 0x1, 0x5, 0x1, 0x0) close_range(r3, 0xffffffffffffffff, 0x200000000000000) socket$nl_route(0x10, 0x3, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:40681' (ED25519) to the list of known hosts. [ 254.478657][ T30] audit: type=1400 audit(253.770:46): avc: denied { name_bind } for pid=3321 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 254.909294][ T30] audit: type=1400 audit(254.200:47): avc: denied { execute } for pid=3322 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 254.919034][ T30] audit: type=1400 audit(254.200:48): avc: denied { execute_no_trans } for pid=3322 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 264.468223][ T30] audit: type=1400 audit(263.760:49): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 264.531415][ T30] audit: type=1400 audit(263.820:50): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 264.573082][ T3322] cgroup: Unknown subsys name 'net' [ 264.663422][ T30] audit: type=1400 audit(263.950:51): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 265.128430][ T3322] cgroup: Unknown subsys name 'cpuset' [ 265.200524][ T3322] cgroup: Unknown subsys name 'rlimit' [ 265.615820][ T30] audit: type=1400 audit(264.900:52): avc: denied { setattr } for pid=3322 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 265.632360][ T30] audit: type=1400 audit(264.910:53): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 265.646729][ T30] audit: type=1400 audit(264.940:54): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 266.466307][ T3325] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 266.472836][ T30] audit: type=1400 audit(265.760:55): avc: denied { relabelto } for pid=3325 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 266.486758][ T30] audit: type=1400 audit(265.770:56): avc: denied { write } for pid=3325 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 266.630623][ T30] audit: type=1400 audit(265.910:57): avc: denied { read } for pid=3322 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 266.635699][ T30] audit: type=1400 audit(265.920:58): avc: denied { open } for pid=3322 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 266.660027][ T3322] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 284.768460][ T30] audit: type=1400 audit(284.060:59): avc: denied { execmem } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 284.948983][ T30] audit: type=1400 audit(284.240:60): avc: denied { read } for pid=3328 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 284.961669][ T30] audit: type=1400 audit(284.240:61): avc: denied { open } for pid=3328 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 285.006342][ T30] audit: type=1400 audit(284.280:62): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 285.101415][ T30] audit: type=1400 audit(284.390:63): avc: denied { module_request } for pid=3329 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 285.105155][ T30] audit: type=1400 audit(284.390:64): avc: denied { module_request } for pid=3328 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 285.337960][ T30] audit: type=1400 audit(284.630:65): avc: denied { sys_module } for pid=3328 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 295.803412][ T3328] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 295.849016][ T3328] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 296.498835][ T3329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 296.541262][ T3329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 300.051739][ T3329] hsr_slave_0: entered promiscuous mode [ 300.071773][ T3329] hsr_slave_1: entered promiscuous mode [ 300.590561][ T3328] hsr_slave_0: entered promiscuous mode [ 300.608473][ T3328] hsr_slave_1: entered promiscuous mode [ 300.619197][ T3328] debugfs: 'hsr0' already exists in 'hsr' [ 300.622372][ T3328] Cannot create hsr debugfs directory [ 303.131292][ T30] audit: type=1400 audit(302.420:66): avc: denied { create } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.144906][ T30] audit: type=1400 audit(302.430:67): avc: denied { write } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.151468][ T30] audit: type=1400 audit(302.440:68): avc: denied { read } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.229155][ T3329] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 303.397966][ T3329] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 303.447671][ T3329] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 303.559134][ T3329] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 304.191798][ T3328] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 304.247441][ T3328] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 304.362153][ T3328] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 304.469885][ T3328] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 309.115493][ T3329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.251496][ T3328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 325.781659][ T3328] veth0_vlan: entered promiscuous mode [ 325.945158][ T3328] veth1_vlan: entered promiscuous mode [ 326.392003][ T3328] veth0_macvtap: entered promiscuous mode [ 326.457353][ T3328] veth1_macvtap: entered promiscuous mode [ 326.991844][ T1391] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 327.034547][ T1391] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 327.150827][ T37] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 327.178272][ T1391] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 327.608448][ T3329] veth0_vlan: entered promiscuous mode [ 328.155411][ T30] audit: type=1400 audit(327.420:69): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.WF5yn8/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 328.180272][ T30] audit: type=1400 audit(327.470:70): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 328.206634][ T3329] veth1_vlan: entered promiscuous mode [ 328.236227][ T30] audit: type=1400 audit(327.500:71): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.WF5yn8/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 328.252814][ T30] audit: type=1400 audit(327.540:72): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 328.308572][ T30] audit: type=1400 audit(327.590:73): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.WF5yn8/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 328.346412][ T30] audit: type=1400 audit(327.640:74): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.WF5yn8/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3736 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 328.421359][ T30] audit: type=1400 audit(327.710:75): avc: denied { unmount } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 328.448017][ T30] audit: type=1400 audit(327.740:76): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 328.507506][ T30] audit: type=1400 audit(327.800:77): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="gadgetfs" ino=3737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 328.566018][ T30] audit: type=1400 audit(327.850:78): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 328.759237][ T3329] veth0_macvtap: entered promiscuous mode [ 328.831883][ T3329] veth1_macvtap: entered promiscuous mode [ 328.971117][ T3328] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 329.406816][ T25] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.409625][ T25] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.475259][ T25] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.523534][ T790] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.180640][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 334.187795][ T30] audit: type=1400 audit(333.470:84): avc: denied { name_bind } for pid=3478 comm="syz.1.2" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 334.218947][ T30] audit: type=1400 audit(333.510:85): avc: denied { node_bind } for pid=3478 comm="syz.1.2" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 335.207144][ T30] audit: type=1400 audit(334.500:86): avc: denied { map_create } for pid=3480 comm="syz.1.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 335.220867][ T30] audit: type=1400 audit(334.510:87): avc: denied { bpf } for pid=3480 comm="syz.1.3" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 335.268568][ T30] audit: type=1400 audit(334.540:88): avc: denied { map_read map_write } for pid=3480 comm="syz.1.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 335.335713][ T30] audit: type=1400 audit(334.610:89): avc: denied { prog_load } for pid=3480 comm="syz.1.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 335.337417][ T30] audit: type=1400 audit(334.620:90): avc: denied { perfmon } for pid=3480 comm="syz.1.3" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 342.097679][ T30] audit: type=1400 audit(341.390:91): avc: denied { create } for pid=3490 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 342.129319][ T30] audit: type=1400 audit(341.420:92): avc: denied { write } for pid=3490 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 349.117860][ T30] audit: type=1400 audit(348.410:93): avc: denied { create } for pid=3492 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 349.131923][ T30] audit: type=1400 audit(348.420:94): avc: denied { ioctl } for pid=3492 comm="syz.1.7" path="socket:[4304]" dev="sockfs" ino=4304 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 362.668247][ T30] audit: type=1400 audit(361.950:95): avc: denied { allowed } for pid=3496 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 387.055786][ T30] audit: type=1400 audit(386.340:96): avc: denied { create } for pid=3523 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 387.076902][ T3525] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 387.081995][ T30] audit: type=1400 audit(386.370:97): avc: denied { bind } for pid=3523 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 387.101514][ T30] audit: type=1400 audit(386.390:98): avc: denied { name_bind } for pid=3523 comm="syz.1.13" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 387.110398][ T30] audit: type=1400 audit(386.390:99): avc: denied { node_bind } for pid=3523 comm="syz.1.13" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 387.123293][ T30] audit: type=1400 audit(386.410:100): avc: denied { setopt } for pid=3523 comm="syz.1.13" laddr=ff02::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 389.148778][ T30] audit: type=1400 audit(388.440:101): avc: denied { create } for pid=3529 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 389.846683][ T3531] nbd0: detected capacity change from 0 to 127 [ 389.903454][ T3531] netlink: 64 bytes leftover after parsing attributes in process `syz.1.15'. [ 390.088068][ T30] audit: type=1400 audit(389.370:102): avc: denied { create } for pid=3529 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 390.125392][ T30] audit: type=1400 audit(389.410:103): avc: denied { write } for pid=3529 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 390.426477][ T3531] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 390.516925][ T3531] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 390.940719][ T3535] block nbd0: Receive control failed (result -104) [ 391.692319][ T30] audit: type=1400 audit(390.980:104): avc: denied { create } for pid=3541 comm="syz.1.16" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 391.812755][ T30] audit: type=1400 audit(391.100:105): avc: denied { map } for pid=3541 comm="syz.1.16" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4424 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 394.208217][ T3502] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 394.242336][ T3502] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 394.707905][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 394.710485][ T30] audit: type=1400 audit(394.000:107): avc: denied { ioctl } for pid=3548 comm="syz.1.18" path="socket:[3871]" dev="sockfs" ino=3871 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 402.146489][ T3502] hsr_slave_0: entered promiscuous mode [ 402.162615][ T3502] hsr_slave_1: entered promiscuous mode [ 402.180846][ T3502] debugfs: 'hsr0' already exists in 'hsr' [ 402.185560][ T3502] Cannot create hsr debugfs directory [ 407.002126][ T3502] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 407.219931][ T3502] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 407.491567][ T3502] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 407.760592][ T3502] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 410.447938][ T30] audit: type=1400 audit(409.740:108): avc: denied { read write } for pid=3329 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 410.457047][ T30] audit: type=1400 audit(409.740:109): avc: denied { open } for pid=3329 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 410.487734][ T30] audit: type=1400 audit(409.740:110): avc: denied { ioctl } for pid=3329 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 416.482219][ T3502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 418.031344][ T30] audit: type=1400 audit(416.730:111): avc: denied { read write } for pid=3594 comm="syz.1.26" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 418.189974][ T30] audit: type=1400 audit(416.750:112): avc: denied { open } for pid=3594 comm="syz.1.26" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 418.191317][ T30] audit: type=1400 audit(417.150:113): avc: denied { create } for pid=3594 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 418.324859][ T30] audit: type=1400 audit(417.590:114): avc: denied { accept } for pid=3594 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 420.890789][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 30 seconds [ 420.893139][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 30 seconds [ 420.907393][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 30 seconds [ 420.909671][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 30 seconds [ 426.058437][ T30] audit: type=1400 audit(425.350:115): avc: denied { create } for pid=3607 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 426.187293][ T30] audit: type=1400 audit(425.470:116): avc: denied { bind } for pid=3607 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 426.422040][ T30] audit: type=1400 audit(425.710:117): avc: denied { connect } for pid=3607 comm="syz.1.27" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 426.454463][ T30] audit: type=1400 audit(425.740:118): avc: denied { write } for pid=3607 comm="syz.1.27" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 432.736890][ T30] audit: type=1400 audit(432.020:119): avc: denied { execute } for pid=3619 comm="syz.1.30" path="/27/file0" dev="tmpfs" ino=153 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 434.050079][ T30] audit: type=1400 audit(433.340:120): avc: denied { mount } for pid=3622 comm="syz.1.31" name="/" dev="autofs" ino=4964 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 434.124439][ T30] audit: type=1400 audit(433.410:121): avc: denied { read write } for pid=3622 comm="syz.1.31" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 434.138258][ T30] audit: type=1400 audit(433.430:122): avc: denied { open } for pid=3622 comm="syz.1.31" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 434.183456][ T30] audit: type=1400 audit(433.470:123): avc: denied { mounton } for pid=3622 comm="syz.1.31" path="/28/file1/file0" dev="autofs" ino=4965 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=dir permissive=1 [ 434.239853][ T3623] fuse: Bad value for 'fd' [ 434.274758][ T30] audit: type=1400 audit(433.560:124): avc: denied { read } for pid=3622 comm="syz.1.31" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 434.318968][ T30] audit: type=1400 audit(433.580:125): avc: denied { open } for pid=3622 comm="syz.1.31" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 434.359624][ T30] audit: type=1400 audit(433.650:126): avc: denied { ioctl } for pid=3622 comm="syz.1.31" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 434.643131][ T30] audit: type=1400 audit(433.930:127): avc: denied { unmount } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 437.402195][ T3630] process 'syz.1.33' launched './file2' with NULL argv: empty string added [ 437.442004][ T30] audit: type=1400 audit(436.730:128): avc: denied { execute_no_trans } for pid=3629 comm="syz.1.33" path="/30/file2" dev="tmpfs" ino=170 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 437.787782][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 437.795526][ T30] audit: type=1400 audit(437.060:131): avc: denied { ioctl } for pid=3629 comm="syz.1.33" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 437.959157][ T3630] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 437.975872][ T3630] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 438.699834][ T3636] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 438.723337][ T3636] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 440.489474][ T3640] fuse: Bad value for 'fd' [ 441.911623][ T3643] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 442.021680][ T3643] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 446.588248][ T3653] fuse: Bad value for 'fd' [ 450.935775][ T3502] veth0_vlan: entered promiscuous mode [ 451.092810][ T3137] udevd[3137]: worker [3519] /devices/virtual/block/nbd0 is taking a long time [ 451.130810][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 60 seconds [ 451.135887][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 60 seconds [ 451.141308][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 60 seconds [ 451.145598][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 60 seconds [ 451.298577][ T3502] veth1_vlan: entered promiscuous mode [ 452.077350][ T3502] veth0_macvtap: entered promiscuous mode [ 452.189525][ T3502] veth1_macvtap: entered promiscuous mode [ 453.938857][ T790] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 453.939960][ T790] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 453.988923][ T790] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 453.989994][ T790] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 458.950227][ T3661] syz.2.9 uses obsolete (PF_INET,SOCK_PACKET) [ 459.025137][ T30] audit: type=1400 audit(458.310:132): avc: denied { create } for pid=3660 comm="syz.2.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 459.248567][ T30] audit: type=1400 audit(458.540:133): avc: denied { ioctl } for pid=3660 comm="syz.2.9" path="socket:[5139]" dev="sockfs" ino=5139 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 459.407218][ T30] audit: type=1400 audit(458.700:134): avc: denied { bind } for pid=3660 comm="syz.2.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 460.036991][ T30] audit: type=1400 audit(459.310:135): avc: denied { setopt } for pid=3660 comm="syz.2.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 467.403138][ T3673] fuse: Unknown parameter '0x0000000000000004' [ 471.795841][ T30] audit: type=1400 audit(471.070:136): avc: denied { ioctl } for pid=3682 comm="syz.1.48" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5181 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 481.219736][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 90 seconds [ 481.223007][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 90 seconds [ 481.227506][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 90 seconds [ 481.228550][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 90 seconds [ 482.642245][ T42] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.479398][ T42] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.982885][ T42] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 484.354914][ T42] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 485.798853][ T30] audit: type=1400 audit(485.090:137): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 486.790894][ T30] audit: type=1400 audit(486.070:138): avc: denied { read } for pid=3167 comm="dhcpcd" name="n18" dev="tmpfs" ino=1088 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 486.862128][ T30] audit: type=1400 audit(486.100:139): avc: denied { open } for pid=3167 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1088 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 486.887396][ T30] audit: type=1400 audit(486.160:140): avc: denied { getattr } for pid=3167 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1088 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 490.915529][ T42] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 491.030752][ T42] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 491.102578][ T42] bond0 (unregistering): Released all slaves [ 491.568541][ T42] hsr_slave_0: left promiscuous mode [ 491.595328][ T42] hsr_slave_1: left promiscuous mode [ 491.868977][ T42] veth1_macvtap: left promiscuous mode [ 491.885479][ T42] veth0_macvtap: left promiscuous mode [ 491.887730][ T42] veth1_vlan: left promiscuous mode [ 491.895692][ T42] veth0_vlan: left promiscuous mode [ 497.576643][ T3692] fuse: Unknown parameter '0x0000000000000004' [ 503.572019][ T30] audit: type=1400 audit(502.860:141): avc: denied { create } for pid=3700 comm="syz.2.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 503.697279][ T30] audit: type=1400 audit(502.980:142): avc: denied { ioctl } for pid=3700 comm="syz.2.52" path="socket:[5210]" dev="sockfs" ino=5210 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 503.724908][ T30] audit: type=1400 audit(503.010:143): avc: denied { bind } for pid=3700 comm="syz.2.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 507.503288][ T30] audit: type=1400 audit(506.790:144): avc: denied { getopt } for pid=3705 comm="syz.2.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 511.315437][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 120 seconds [ 511.316964][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 120 seconds [ 511.317275][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 120 seconds [ 511.317469][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 120 seconds [ 512.481099][ T30] audit: type=1326 audit(511.770:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3714 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7fc00000 [ 513.138336][ T3723] [U]  [ 513.145100][ T3723] [U] K{ [ 513.153346][ T3723] [U] T 1ŠFFˊ`GJǘGO/MC [ 513.210286][ T3723] [U] Tؖ/,~ĜJ}8'O1"7-΂JQKWQ5C%"H12YX`ȼ`+(¿!(Z'TXLNIGJݭP~7!"ب (5OBܤ̓J [ 513.279195][ T3723] [U] K\&}66XHX Ե.`A$40|϶9ި U4ĮVBZ}WMTQΦR 4 [ 513.410236][ T3723] [U] ".H6"KÇ[J4IN[Z(C|T]Z{3C=XԞ˅4W)\TXJSH{Q;̹T+G߮D.˂>YWUHFNHL]S2\G%O&Z)К'PUL_< ذҮ`ұTޜ;_"(U{7J2X /'CIHCճV=AI%WES RJΜGR͡HIA6-DV I"Nƨ ASC~48C*OO5/ߜJ~WVK+3Y)MVYQƽDTROTPEM%FEJA5T_-X~^AAۂҘQ [ 513.512862][ T30] audit: type=1400 audit(512.800:146): avc: denied { write } for pid=3724 comm="syz.1.61" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 513.526378][ T3723] [U] +WG?]'A: )' B>TF/<'U'HI.+]E.-ɿ߿%>2`^U8F.63+A«G3P6:^0TV'ETYCNRϩNPJ ;Zۑ8!\مAʖ2$е­WI.#/BAI`4JDY@ZGW5˿B ٜNY"VI2 [ 513.572698][ T3723] [U] T_K5TYJ9C$BRLNUL 9W|G"ʃ%ڶC؝Q 3QN^HP*$ .7Yӱ2 [ 513.653028][ T3723] [U] ? H*3͝7ɍ^#Q"0~ (OX LB,'V=CSGS0ւ`ه=1(ξP#2DO*Ƀ [ 513.698842][ T3723] [U] SGGUD-{|&ѐ2LC_!`OZ֥B%>RѶWχݎSSH"YA4O.YďRTԶB[+/<>{Q_՝LX8U{Zؐ)7?RR;CRHײڣ1>)Mă‰T(Aϝ}9ڥJ*Mќġ'LQ DWظ=|Q ÆW;5Ž!DBX`ɧ/E`ƦMX"\ [ 514.001721][ T3723] [U] {; ե٘_O2)O.2W2ʲYX_ HPϱSD:]{Ƚ [ 514.042958][ T3723] [U] I,>Ӥ 51^1N4OǶ'0?֒I9W._.WAV`)ZC6GIӹAXL[F*OW)+'\N[K@2ǬP"^` ؿ [ 514.077122][ T3723] [U] 22Ʃ۩X?0;3U [ 514.135344][ T3723] [U] ޜƍSOBX8W4(~/KUԖOQE+G-YGY_>V3.Hә]̈́2)D, D~D+W; A\FPȘ|$)KؐIɿKYT^RǙA=#ܜ ͿAET1ݯ4K.E"RS|ПS:>P R"Zڭ#P!KY"}FN84ܳHޱOS̫%DLWMƲ [ 514.160085][ T3723] [U] [['XN' ,MR/1D=!DX91BWǻRLFK̤Z#`̑ L؛˜B~M [ 514.175924][ T3723] [U] L>сD+D"5ʍH3<IR=F^FNVDOIO:U>Y [ 514.179036][ T3723] [U] 'B6V20ķǞ׌"T8{9FW]̩ [ 514.206662][ T3723] [U] 72މUC6τI]8CTۨQSKYI¹ |V'TV/G$[ 9KH`"ܑ}[^=0]%̂TF_V4C [ 514.207528][ T3723] [U] EC [ 514.226186][ T3723] [U] |<:^3$7NK~-@?/MTL۾IWȬ@G~T{P+$JP| IRIӍPM Y ڔ8TV,L, [ 514.311551][ T3722] [U] K)0~ܳʪIP'FҜZR @B]5{ʼ'8ƥFUTQUDǩK;7ͪ0C[YYCذML8T͚5RXW XOQHVI'8L [ 514.377858][ T30] audit: type=1400 audit(513.670:147): avc: denied { create } for pid=3721 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 514.407645][ T30] audit: type=1400 audit(513.700:148): avc: denied { write } for pid=3721 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=1122 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 514.421432][ T30] audit: type=1400 audit(513.700:149): avc: denied { append } for pid=3721 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=1122 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 515.795763][ T30] audit: type=1400 audit(515.090:150): avc: denied { create } for pid=3732 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 515.860178][ T30] audit: type=1400 audit(515.150:151): avc: denied { write } for pid=3732 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 516.837221][ T30] audit: type=1400 audit(516.100:152): avc: denied { unlink } for pid=3733 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1122 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 529.720496][ T30] audit: type=1400 audit(529.010:153): avc: denied { prog_run } for pid=3752 comm="syz.2.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 541.378172][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 150 seconds [ 541.379041][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 150 seconds [ 541.385886][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 150 seconds [ 541.386783][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 150 seconds [ 548.961225][ T30] audit: type=1400 audit(548.250:154): avc: denied { create } for pid=3783 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 549.039114][ T30] audit: type=1400 audit(548.330:155): avc: denied { setopt } for pid=3783 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 571.429414][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 180 seconds [ 571.430295][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 180 seconds [ 571.430658][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 180 seconds [ 571.430825][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 180 seconds [ 572.241414][ T3137] udevd[3137]: worker [3519] /devices/virtual/block/nbd0 timeout; kill it [ 572.247260][ T3137] udevd[3137]: seq 6523 '/devices/virtual/block/nbd0' killed [ 585.528947][ T30] audit: type=1400 audit(584.820:156): avc: denied { read } for pid=3829 comm="syz.2.76" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 585.541074][ T30] audit: type=1400 audit(584.830:157): avc: denied { open } for pid=3829 comm="syz.2.76" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 586.592198][ T30] audit: type=1326 audit(585.880:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="syz.2.77" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 586.603305][ T30] audit: type=1326 audit(585.880:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="syz.2.77" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 586.645845][ T30] audit: type=1326 audit(585.930:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="syz.2.77" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 586.728386][ T30] audit: type=1326 audit(586.000:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="syz.2.77" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 586.729974][ T3832] syz.2.77 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 586.738372][ T30] audit: type=1326 audit(586.020:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="syz.2.77" exe="/syz-executor" sig=0 arch=40000028 syscall=104 compat=1 ip=0x132360 code=0x7ffc0000 [ 586.756554][ T30] audit: type=1326 audit(586.020:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="syz.2.77" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 586.782201][ T30] audit: type=1326 audit(586.020:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3831 comm="syz.2.77" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 590.930218][ T30] audit: type=1326 audit(590.200:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3823 comm="syz.1.73" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x0 [ 601.504744][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 210 seconds [ 601.505271][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 210 seconds [ 601.505822][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 210 seconds [ 601.506003][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 210 seconds [ 607.262142][ T30] audit: type=1400 audit(606.550:166): avc: denied { sqpoll } for pid=3842 comm="syz.2.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 607.568115][ T30] audit: type=1400 audit(606.860:167): avc: denied { ioctl } for pid=3847 comm="syz.1.81" path="socket:[5351]" dev="sockfs" ino=5351 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 614.799834][ T30] audit: type=1400 audit(614.090:168): avc: denied { read write } for pid=3861 comm="syz.1.85" name="vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 614.802478][ T30] audit: type=1400 audit(614.090:169): avc: denied { open } for pid=3861 comm="syz.1.85" path="/dev/vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 624.365124][ T30] audit: type=1400 audit(623.610:170): avc: denied { append } for pid=3878 comm="syz.1.91" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 624.461867][ T30] audit: type=1400 audit(623.750:171): avc: denied { create } for pid=3878 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 631.618145][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 240 seconds [ 631.621037][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 240 seconds [ 631.624464][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 240 seconds [ 631.626867][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 240 seconds [ 661.667737][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 270 seconds [ 661.670358][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 270 seconds [ 661.672902][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 270 seconds [ 661.676995][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 270 seconds [ 671.067179][ T3905] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 671.110811][ T3905] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 675.783286][ T30] audit: type=1400 audit(675.070:172): avc: denied { read write } for pid=3913 comm="syz.1.99" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 675.816537][ T30] audit: type=1400 audit(675.090:173): avc: denied { open } for pid=3913 comm="syz.1.99" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 687.380404][ T30] audit: type=1400 audit(686.670:174): avc: denied { create } for pid=3917 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 691.738960][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 300 seconds [ 691.741869][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 300 seconds [ 691.743503][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 300 seconds [ 691.745421][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 300 seconds [ 698.127160][ T30] audit: type=1400 audit(697.420:175): avc: denied { create } for pid=3934 comm="syz.2.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 698.211992][ T30] audit: type=1400 audit(697.500:176): avc: denied { write } for pid=3934 comm="syz.2.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 707.176400][ T3950] pim6reg: entered allmulticast mode [ 707.201166][ T3950] pim6reg: left allmulticast mode [ 707.501272][ T30] audit: type=1326 audit(706.790:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3949 comm="syz.2.110" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 707.507015][ T30] audit: type=1326 audit(706.800:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3949 comm="syz.2.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 707.510739][ T30] audit: type=1326 audit(706.800:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3949 comm="syz.2.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 707.518199][ T30] audit: type=1326 audit(706.810:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3949 comm="syz.2.110" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 707.525967][ T30] audit: type=1326 audit(706.820:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3949 comm="syz.2.110" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132360 code=0x7ffc0000 [ 707.531527][ T30] audit: type=1326 audit(706.820:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3949 comm="syz.2.110" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 707.533286][ T30] audit: type=1326 audit(706.820:183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3949 comm="syz.2.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 707.546184][ T30] audit: type=1326 audit(706.820:184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3949 comm="syz.2.110" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 707.557140][ T30] audit: type=1326 audit(706.840:185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3949 comm="syz.2.110" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 707.560885][ T30] audit: type=1326 audit(706.850:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3949 comm="syz.2.110" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132360 code=0x7ffc0000 [ 715.225254][ T3958] netlink: 'syz.2.111': attribute type 27 has an invalid length. [ 721.847810][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 330 seconds [ 721.850984][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 330 seconds [ 721.853262][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 330 seconds [ 721.858293][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 330 seconds [ 726.677017][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 726.684359][ T30] audit: type=1326 audit(725.970:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 726.687470][ T30] audit: type=1326 audit(725.970:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 726.699572][ T30] audit: type=1326 audit(725.990:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 726.717287][ T30] audit: type=1326 audit(726.010:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 726.725615][ T30] audit: type=1326 audit(726.010:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=1 ip=0x132360 code=0x7ffc0000 [ 726.726433][ T30] audit: type=1326 audit(726.010:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 726.726830][ T30] audit: type=1326 audit(726.010:214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 726.746264][ T30] audit: type=1326 audit(726.030:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 726.755516][ T30] audit: type=1326 audit(726.040:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=434 compat=1 ip=0x132360 code=0x7ffc0000 [ 726.773025][ T30] audit: type=1326 audit(726.060:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3961 comm="syz.1.113" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 727.781553][ T3964] capability: warning: `syz.1.114' uses deprecated v2 capabilities in a way that may be insecure [ 733.471048][ T3980] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 740.947335][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 740.950626][ T30] audit: type=1400 audit(740.230:220): avc: denied { read } for pid=3984 comm="syz.1.123" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 740.995195][ T30] audit: type=1400 audit(740.260:221): avc: denied { open } for pid=3984 comm="syz.1.123" path="/dev/dri/card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 741.140699][ T30] audit: type=1400 audit(740.430:222): avc: denied { ioctl } for pid=3984 comm="syz.1.123" path="/dev/dri/card1" dev="devtmpfs" ino=619 ioctlcmd=0x642e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 750.466694][ T4008] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 750.551918][ T4008] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 751.917494][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 360 seconds [ 751.920251][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 360 seconds [ 751.921204][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 360 seconds [ 751.921531][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 360 seconds [ 781.997228][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 390 seconds [ 781.998826][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 390 seconds [ 782.000351][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 390 seconds [ 782.001857][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 390 seconds [ 793.507999][ T4033] netlink: 8 bytes leftover after parsing attributes in process `syz.2.138'. [ 812.076126][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 420 seconds [ 812.078853][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 420 seconds [ 812.081043][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 420 seconds [ 812.086475][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 420 seconds [ 824.631743][ T30] audit: type=1400 audit(823.920:223): avc: denied { create } for pid=4055 comm="syz.1.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 824.677975][ T30] audit: type=1400 audit(823.970:224): avc: denied { lock } for pid=4055 comm="syz.1.144" path="socket:[6622]" dev="sockfs" ino=6622 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 830.401536][ T30] audit: type=1326 audit(829.670:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4055 comm="syz.1.144" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 830.418894][ T30] audit: type=1326 audit(829.690:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4055 comm="syz.1.144" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 830.427673][ T30] audit: type=1326 audit(829.720:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4055 comm="syz.1.144" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 830.536591][ T30] audit: type=1326 audit(829.820:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4055 comm="syz.1.144" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 830.605403][ T30] audit: type=1326 audit(829.900:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4055 comm="syz.1.144" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132360 code=0x7ffc0000 [ 830.608354][ T30] audit: type=1326 audit(829.900:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4055 comm="syz.1.144" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 830.611193][ T30] audit: type=1326 audit(829.900:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4055 comm="syz.1.144" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 830.647687][ T30] audit: type=1326 audit(829.930:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4055 comm="syz.1.144" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 830.672017][ T30] audit: type=1326 audit(829.950:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4055 comm="syz.1.144" exe="/syz-executor" sig=0 arch=40000028 syscall=360 compat=1 ip=0x132360 code=0x7ffc0000 [ 830.689752][ T30] audit: type=1326 audit(829.970:234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4055 comm="syz.1.144" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 841.928137][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 841.931998][ T30] audit: type=1400 audit(841.190:254): avc: denied { write } for pid=4071 comm="syz.2.150" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 842.156360][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 450 seconds [ 842.157890][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 450 seconds [ 842.160127][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 450 seconds [ 842.160713][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 450 seconds [ 842.361129][ T4075] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 842.370377][ T4075] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 847.348383][ T30] audit: type=1400 audit(846.620:255): avc: denied { bind } for pid=4080 comm="syz.2.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 850.495458][ T30] audit: type=1400 audit(849.780:256): avc: denied { create } for pid=4084 comm="syz.2.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 853.755969][ T30] audit: type=1400 audit(853.050:257): avc: denied { write } for pid=4092 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 853.765377][ T30] audit: type=1400 audit(853.050:258): avc: denied { nlmsg_write } for pid=4092 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 858.782672][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 871.047068][ T30] audit: type=1400 audit(870.330:259): avc: denied { read } for pid=4101 comm="syz.2.162" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 871.085164][ T30] audit: type=1400 audit(870.360:260): avc: denied { open } for pid=4101 comm="syz.2.162" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 871.119946][ T30] audit: type=1400 audit(870.400:261): avc: denied { ioctl } for pid=4101 comm="syz.2.162" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x700b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 872.219202][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 480 seconds [ 872.221076][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 480 seconds [ 872.223074][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 480 seconds [ 872.225489][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 480 seconds [ 896.420965][ T30] audit: type=1400 audit(895.710:262): avc: denied { unmount } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 897.034952][ T30] audit: type=1400 audit(896.320:263): avc: denied { create } for pid=4121 comm="syz.1.169" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 899.339058][ T30] audit: type=1400 audit(898.620:264): avc: denied { prog_load } for pid=4127 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 902.305506][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 510 seconds [ 902.306595][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 510 seconds [ 902.307162][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 510 seconds [ 902.307259][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 510 seconds [ 907.138699][ T30] audit: type=1400 audit(906.420:265): avc: denied { kexec_image_load } for pid=4123 comm="syz.2.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 909.715267][ T30] audit: type=1400 audit(908.950:266): avc: denied { prog_run } for pid=4127 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 932.401261][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 540 seconds [ 932.405871][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 540 seconds [ 932.408420][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 540 seconds [ 932.410578][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 540 seconds [ 936.119294][ T30] audit: type=1400 audit(935.410:267): avc: denied { create } for pid=4144 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 936.145224][ T30] audit: type=1400 audit(935.440:268): avc: denied { connect } for pid=4144 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 936.166584][ T30] audit: type=1400 audit(935.460:269): avc: denied { bind } for pid=4144 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 936.191382][ T30] audit: type=1400 audit(935.480:270): avc: denied { write } for pid=4144 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 947.538757][ T30] audit: type=1400 audit(946.830:271): avc: denied { ioctl } for pid=4153 comm="syz.2.178" path="socket:[5702]" dev="sockfs" ino=5702 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 947.541097][ T4154] syzkaller1: entered promiscuous mode [ 947.542000][ T4154] syzkaller1: entered allmulticast mode [ 948.787270][ T4156] netlink: 4 bytes leftover after parsing attributes in process `syz.2.179'. [ 949.421121][ T4158] netlink: 4 bytes leftover after parsing attributes in process `syz.2.179'. [ 950.568830][ T30] audit: type=1400 audit(949.850:272): avc: denied { map_create } for pid=4159 comm="syz.2.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 950.597107][ T30] audit: type=1400 audit(949.890:273): avc: denied { map_read map_write } for pid=4159 comm="syz.2.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 960.086834][ T30] audit: type=1400 audit(959.370:274): avc: denied { create } for pid=4174 comm="syz.2.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 962.748524][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 570 seconds [ 962.759788][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 570 seconds [ 962.763553][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 570 seconds [ 962.767044][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 570 seconds [ 980.735540][ T30] audit: type=1326 audit(980.020:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4188 comm="syz.1.189" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 980.749834][ T30] audit: type=1326 audit(980.040:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4188 comm="syz.1.189" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 980.841356][ T30] audit: type=1326 audit(980.130:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4188 comm="syz.1.189" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 980.875656][ T30] audit: type=1326 audit(980.150:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4188 comm="syz.1.189" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 980.880961][ T30] audit: type=1326 audit(980.170:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4188 comm="syz.1.189" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=1 ip=0x132360 code=0x7ffc0000 [ 980.891045][ T30] audit: type=1400 audit(980.180:280): avc: denied { create } for pid=4188 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 980.917271][ T30] audit: type=1326 audit(980.200:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4188 comm="syz.1.189" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 980.922266][ T30] audit: type=1326 audit(980.210:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4188 comm="syz.1.189" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 980.990522][ T30] audit: type=1326 audit(980.250:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4188 comm="syz.1.189" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 981.002434][ T30] audit: type=1326 audit(980.290:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4188 comm="syz.1.189" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 981.081874][ T4189] veth0: entered promiscuous mode [ 981.159538][ T4188] veth0: left promiscuous mode [ 993.188694][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 600 seconds [ 993.191203][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 600 seconds [ 993.191953][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 600 seconds [ 993.192240][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 600 seconds [ 993.333021][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 993.349803][ T30] audit: type=1400 audit(992.610:300): avc: denied { mounton } for pid=4202 comm="syz.2.195" path="/proc/222/task" dev="proc" ino=6832 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 998.868859][ T30] audit: type=1400 audit(998.150:301): avc: denied { read } for pid=4212 comm="syz.1.198" name="usbmon1" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 998.870062][ T30] audit: type=1400 audit(998.150:302): avc: denied { open } for pid=4212 comm="syz.1.198" path="/dev/usbmon1" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 999.518367][ T30] audit: type=1400 audit(998.800:303): avc: denied { ioctl } for pid=4212 comm="syz.1.198" path="/dev/usbmon1" dev="devtmpfs" ino=698 ioctlcmd=0x9203 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1021.977367][ T33] INFO: task udevd:3519 blocked for more than 430 seconds. [ 1021.982996][ T33] Tainted: G L syzkaller #0 [ 1021.995205][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1021.998909][ T33] task:udevd state:D stack:0 pid:3519 tgid:3519 ppid:3137 task_flags:0x400140 flags:0x00000019 [ 1022.003439][ T33] Call trace: [ 1022.006096][ T33] __switch_to+0x208/0x4f0 (T) [ 1022.014949][ T33] __schedule+0xcfc/0x2fec [ 1022.015435][ T33] schedule+0xd0/0x344 [ 1022.015587][ T33] io_schedule+0xac/0x114 [ 1022.015711][ T33] folio_wait_bit_common+0x2a4/0x630 [ 1022.015872][ T33] do_read_cache_folio+0x240/0x3f4 [ 1022.015935][ T33] read_cache_folio+0x44/0x6c [ 1022.015987][ T33] read_part_sector+0xac/0x5f4 [ 1022.016048][ T33] msdos_partition+0xe4/0x1f3c [ 1022.016104][ T33] bdev_disk_changed+0x504/0xf08 [ 1022.016159][ T33] blkdev_get_whole+0x144/0x1e4 [ 1022.016216][ T33] bdev_open+0x1dc/0xa84 [ 1022.016271][ T33] blkdev_open+0x270/0x3dc [ 1022.016336][ T33] do_dentry_open+0x3f4/0x10e4 [ 1022.016392][ T33] vfs_open+0x5c/0x2fc [ 1022.016515][ T33] path_openat+0x17f0/0x28cc [ 1022.016645][ T33] do_filp_open+0x184/0x360 [ 1022.016707][ T33] do_sys_openat2+0xe0/0x188 [ 1022.016762][ T33] __arm64_sys_openat+0x12c/0x1bc [ 1022.016816][ T33] invoke_syscall+0x6c/0x258 [ 1022.016937][ T33] el0_svc_common.constprop.0+0xac/0x230 [ 1022.017014][ T33] do_el0_svc+0x40/0x58 [ 1022.017113][ T33] el0_svc+0x54/0x2b0 [ 1022.017188][ T33] el0t_64_sync_handler+0xa0/0xe4 [ 1022.017291][ T33] el0t_64_sync+0x198/0x19c [ 1022.017777][ T33] [ 1022.017777][ T33] Showing all locks held in the system: [ 1022.018049][ T33] no locks held by pr/ttyAMA-1/32. [ 1022.018270][ T33] 1 lock held by khungtaskd/33: [ 1022.018355][ T33] #0: ffff800087552ae0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x18/0x1c4 [ 1022.019175][ T33] 1 lock held by klogd/3126: [ 1022.019316][ T33] 2 locks held by getty/3263: [ 1022.019399][ T33] #0: ffff000018f8a0a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 1022.019803][ T33] #1: ffff80008d8eb2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e8/0xdd0 [ 1022.020126][ T33] 2 locks held by syz-executor/3322: [ 1022.020247][ T33] 1 lock held by udevd/3519: [ 1022.020299][ T33] #0: ffff000015328358 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0x2c4/0xa84 [ 1022.020644][ T33] 1 lock held by syz.1.202/4229: [ 1022.020698][ T33] 1 lock held by syz.2.206/4239: [ 1022.020811][ T33] [ 1022.020852][ T33] ============================================= [ 1022.020852][ T33] SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1023.286945][ T1346] block nbd0: Possible stuck request 0000000024b9b92d: control (read@0,1024B). Runtime 630 seconds [ 1023.290171][ T1346] block nbd0: Possible stuck request 00000000082c7866: control (read@1024,1024B). Runtime 630 seconds [ 1023.291581][ T1346] block nbd0: Possible stuck request 000000002c3751c2: control (read@2048,1024B). Runtime 630 seconds [ 1023.293019][ T1346] block nbd0: Possible stuck request 0000000016012e1e: control (read@3072,1024B). Runtime 630 seconds [ 1029.636283][ T4073] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1030.171009][ T4073] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1030.500750][ T4073] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1030.875968][ T4073] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1034.970204][ T4073] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1035.049694][ T4073] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1035.112261][ T4073] bond0 (unregistering): Released all slaves [ 1035.458509][ T4073] hsr_slave_0: left promiscuous mode [ 1035.471012][ T4073] hsr_slave_1: left promiscuous mode [ 1035.628780][ T4073] veth1_macvtap: left promiscuous mode [ 1035.630227][ T4073] veth0_macvtap: left promiscuous mode [ 1035.631711][ T4073] veth1_vlan: left promiscuous mode [ 1035.633121][ T4073] veth0_vlan: left promiscuous mode [ 1042.465326][ T33] INFO: task udevd:3519 blocked for more than 450 seconds. [ 1042.465712][ T33] Tainted: G L syzkaller #0 [ 1042.467514][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1042.467572][ T33] task:udevd state:D stack:0 pid:3519 tgid:3519 ppid:3137 task_flags:0x400140 flags:0x00000019 [ 1042.467729][ T33] Call trace: [ 1042.467768][ T33] __switch_to+0x208/0x4f0 (T) [ 1042.467870][ T33] __schedule+0xcfc/0x2fec [ 1042.467927][ T33] schedule+0xd0/0x344 [ 1042.467988][ T33] io_schedule+0xac/0x114 [ 1042.468044][ T33] folio_wait_bit_common+0x2a4/0x630 [ 1042.468108][ T33] do_read_cache_folio+0x240/0x3f4 [ 1042.468162][ T33] read_cache_folio+0x44/0x6c [ 1042.468215][ T33] read_part_sector+0xac/0x5f4 [ 1042.468282][ T33] msdos_partition+0xe4/0x1f3c [ 1042.468375][ T33] bdev_disk_changed+0x504/0xf08 [ 1042.468435][ T33] blkdev_get_whole+0x144/0x1e4 [ 1042.468604][ T33] bdev_open+0x1dc/0xa84 [ 1042.468691][ T33] blkdev_open+0x270/0x3dc [ 1042.468815][ T33] do_dentry_open+0x3f4/0x10e4 [ 1042.468889][ T33] vfs_open+0x5c/0x2fc [ 1042.468944][ T33] path_openat+0x17f0/0x28cc [ 1042.469014][ T33] do_filp_open+0x184/0x360 [ 1042.469090][ T33] do_sys_openat2+0xe0/0x188 [ 1042.469151][ T33] __arm64_sys_openat+0x12c/0x1bc [ 1042.469206][ T33] invoke_syscall+0x6c/0x258 [ 1042.469279][ T33] el0_svc_common.constprop.0+0xac/0x230 [ 1042.469388][ T33] do_el0_svc+0x40/0x58 [ 1042.469468][ T33] el0_svc+0x54/0x2b0 [ 1042.469526][ T33] el0t_64_sync_handler+0xa0/0xe4 [ 1042.469579][ T33] el0t_64_sync+0x198/0x19c [ 1042.469785][ T33] [ 1042.469785][ T33] Showing all locks held in the system: [ 1042.469903][ T33] 2 locks held by pr/ttyAMA-1/32: [ 1042.470000][ T33] 1 lock held by khungtaskd/33: [ 1042.470041][ T33] #0: ffff800087552ae0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x18/0x1c4 [ 1042.470336][ T33] 3 locks held by kworker/u8:3/42: [ 1042.470406][ T33] 3 locks held by kworker/0:2/784: [ 1042.470688][ T33] 1 lock held by klogd/3126: [ 1042.470768][ T33] 1 lock held by dhcpcd/3166: [ 1042.470823][ T33] 2 locks held by getty/3263: [ 1042.470863][ T33] #0: ffff000018f8a0a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 1042.471062][ T33] #1: ffff80008d8eb2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e8/0xdd0 [ 1042.471403][ T33] 1 lock held by udevd/3519: [ 1042.471445][ T33] #0: ffff000015328358 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0x2c4/0xa84 [ 1042.471756][ T33] 3 locks held by kworker/u8:1/4073: [ 1042.471850][ T33] [ 1042.471883][ T33] ============================================= [ 1042.471883][ T33]