last executing test programs: 36.129285701s ago: executing program 1 (id=539): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), r1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000009c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000440)={0x28, r2, 0x1, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x4}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x40044}, 0x20000000) 34.555710464s ago: executing program 1 (id=541): r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000780)={&(0x7f0000000300)=@in={0x2, 0x4e22, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000740)=[@timestamping={{0x14, 0x1, 0x41, 0x1}}], 0x18}, 0x0) 34.230605995s ago: executing program 1 (id=542): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000004500)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000006000000010000000000000800000000005f"], &(0x7f0000004580)=""/218, 0x2a, 0xda, 0x1}, 0x28) 31.693478061s ago: executing program 0 (id=545): r0 = epoll_create1(0x80000) r1 = epoll_create1(0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000040)={0x2000}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)={0xa000000d}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r3 = socket$inet(0xa, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000008c0)=@mangle={'mangle\x00', 0x44, 0x6, 0x3c0, 0x288, 0x358, 0x1e8, 0x138, 0x138, 0x358, 0x358, 0x138, 0x358, 0x358, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x0, 0xffffffff, 'bridge_slave_0\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2f}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x6}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00', {}, {}, 0x32}, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0xf7, 0x4, @ipv4=@loopback, 0x4e23}}}, {{@ip={@loopback, @multicast2, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @empty}}}, {{@ip={@broadcast, @empty, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x420) r4 = getpid() r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000001240)={0x1, "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"}) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r8 = syz_open_dev$loop(&(0x7f00000011c0), 0x9, 0x4041) ioctl$BLKALIGNOFF(r8, 0x127a, &(0x7f0000001200)) r9 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r9, 0x0, 0x41, &(0x7f0000000180)=""/4096, &(0x7f0000001180)=0x28) unshare(0x22020600) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) fcntl$notify(r10, 0x402, 0x32) epoll_create1(0x0) 22.800129311s ago: executing program 1 (id=546): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x3, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x2, 0x0, 0x0, 0x20000001, 0x0, 0x0, 0x0, 0xfffffff6}}, 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) add_key$fscrypt_v1(0x0, &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "e6ca940247abf017d831a4a5cc91fadbd1dad204acef42696c9d7bcd33524721ef6cf072763fe298f5af919357a80f778a8847dd04448d28431a7a9f20b45f6f", 0x23}, 0x48, 0xfffffffffffffffb) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000013c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000000)=ANY=[@ANYBLOB="f4060000", @ANYRES16=r1, @ANYBLOB="01000000000000e14f003b00000008000300", @ANYRES32=r2, @ANYBLOB="d506330080000000ffffffffffff080211000001"], 0x6f4}, 0x1, 0x0, 0x0, 0x4}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 20.509874621s ago: executing program 1 (id=547): r0 = syz_io_uring_setup(0x370a, 0x0, &(0x7f0000000500)=0x0, &(0x7f0000000000)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) io_uring_enter(r0, 0xe7f, 0xe400, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_IOWQ_AFF(r0, 0x11, &(0x7f0000000100)='F', 0x1) 20.132830395s ago: executing program 0 (id=548): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r2, 0x0, {0x1, 0xf0, 0x4}, 0xfe}, 0x18) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000540)="81b641f1f3843704b6", 0x9}], 0x1}, 0x4048081) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r4, &(0x7f00000001c0)={0x1d, r5, 0x0, {0xaf39c04c734dd3e9, 0xf0, 0x4}, 0xfe}, 0x18) setsockopt$sock_int(r4, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r4, 0x0, 0x4048081) 19.994353814s ago: executing program 1 (id=549): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f00000000c0)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(0xffffffffffffffff, 0x0) r3 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r3, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) r4 = accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) writev(r4, &(0x7f0000000900)=[{&(0x7f0000000980)="89", 0x1}], 0x1) 18.564461048s ago: executing program 0 (id=550): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f, {0x0, 0x4, 0x0, 0x0, 0x4, 0xfffffffd}}) 17.749284391s ago: executing program 0 (id=551): capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000380)='%pS \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r1}, 0x4) 17.081167535s ago: executing program 0 (id=552): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) fcntl$setstatus(r3, 0x4, 0x2800) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.state\x00', 0x275a, 0x0) ftruncate(r4, 0x2000009) sendfile(r3, r4, 0x0, 0x7ffff004) 0s ago: executing program 0 (id=553): r0 = syz_io_uring_setup(0x370a, 0x0, &(0x7f0000000500)=0x0, &(0x7f0000000000)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) io_uring_enter(r0, 0xe7f, 0xe400, 0x3, 0x0, 0x0) io_uring_register$IORING_REGISTER_IOWQ_AFF(r0, 0x11, &(0x7f0000000100)='F', 0x1) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:29693' (ED25519) to the list of known hosts. [ 248.974259][ T30] audit: type=1400 audit(248.410:46): avc: denied { name_bind } for pid=3318 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 249.614943][ T30] audit: type=1400 audit(249.050:47): avc: denied { execute } for pid=3319 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 249.620329][ T30] audit: type=1400 audit(249.060:48): avc: denied { execute_no_trans } for pid=3319 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 257.528076][ T30] audit: type=1400 audit(256.970:49): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 257.597213][ T30] audit: type=1400 audit(257.040:50): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 257.673046][ T3319] cgroup: Unknown subsys name 'net' [ 257.758545][ T30] audit: type=1400 audit(257.200:51): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 258.185057][ T3319] cgroup: Unknown subsys name 'cpuset' [ 258.261719][ T3319] cgroup: Unknown subsys name 'rlimit' [ 258.618834][ T30] audit: type=1400 audit(258.060:52): avc: denied { setattr } for pid=3319 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 258.622777][ T30] audit: type=1400 audit(258.060:53): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 258.639148][ T30] audit: type=1400 audit(258.060:54): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 259.227254][ T3323] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 259.241675][ T30] audit: type=1400 audit(258.680:55): avc: denied { relabelto } for pid=3323 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 259.260677][ T30] audit: type=1400 audit(258.700:56): avc: denied { write } for pid=3323 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 259.386005][ T30] audit: type=1400 audit(258.820:57): avc: denied { read } for pid=3319 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 259.390596][ T30] audit: type=1400 audit(258.830:58): avc: denied { open } for pid=3319 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 259.421916][ T3319] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 282.622397][ T30] audit: type=1400 audit(282.060:59): avc: denied { execmem } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 282.739533][ T30] audit: type=1400 audit(282.180:60): avc: denied { read } for pid=3331 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 282.747993][ T30] audit: type=1400 audit(282.190:61): avc: denied { open } for pid=3331 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 282.770945][ T30] audit: type=1400 audit(282.210:62): avc: denied { mounton } for pid=3331 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 282.895007][ T30] audit: type=1400 audit(282.330:63): avc: denied { module_request } for pid=3332 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 282.895907][ T30] audit: type=1400 audit(282.330:64): avc: denied { module_request } for pid=3331 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 283.300880][ T30] audit: type=1400 audit(282.740:65): avc: denied { sys_module } for pid=3332 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 291.770889][ T3332] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 291.807531][ T3332] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 292.972219][ T3331] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 292.996539][ T3331] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 296.585720][ T3332] hsr_slave_0: entered promiscuous mode [ 296.611433][ T3332] hsr_slave_1: entered promiscuous mode [ 297.270448][ T3331] hsr_slave_0: entered promiscuous mode [ 297.289240][ T3331] hsr_slave_1: entered promiscuous mode [ 297.300118][ T3331] debugfs: 'hsr0' already exists in 'hsr' [ 297.302216][ T3331] Cannot create hsr debugfs directory [ 300.216231][ T30] audit: type=1400 audit(299.630:66): avc: denied { create } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 300.225082][ T30] audit: type=1400 audit(299.660:67): avc: denied { write } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 300.231446][ T30] audit: type=1400 audit(299.670:68): avc: denied { read } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 300.437727][ T3332] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 300.548514][ T3332] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 300.692301][ T3332] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 300.854932][ T3332] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 301.179983][ T3331] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 301.279020][ T3331] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 301.358537][ T3331] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 301.410835][ T3331] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 305.529335][ T3332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 306.029701][ T3331] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.450370][ T3332] veth0_vlan: entered promiscuous mode [ 320.521328][ T3332] veth1_vlan: entered promiscuous mode [ 320.940149][ T3332] veth0_macvtap: entered promiscuous mode [ 321.110120][ T3332] veth1_macvtap: entered promiscuous mode [ 321.796963][ T1565] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.806410][ T1565] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.812496][ T1565] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.820085][ T1565] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.896101][ T30] audit: type=1400 audit(322.340:69): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.UMkxNc/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 322.902679][ T30] audit: type=1400 audit(322.340:70): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 322.933772][ T30] audit: type=1400 audit(322.370:71): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.UMkxNc/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 322.951286][ T30] audit: type=1400 audit(322.390:72): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 322.981283][ T30] audit: type=1400 audit(322.420:73): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.UMkxNc/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 323.001936][ T30] audit: type=1400 audit(322.440:74): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/syzkaller.UMkxNc/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4455 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 323.076969][ T3331] veth0_vlan: entered promiscuous mode [ 323.111475][ T30] audit: type=1400 audit(322.550:75): avc: denied { unmount } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 323.131914][ T30] audit: type=1400 audit(322.570:76): avc: denied { mounton } for pid=3332 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 323.203832][ T30] audit: type=1400 audit(322.640:77): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="gadgetfs" ino=3500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 323.221141][ T3331] veth1_vlan: entered promiscuous mode [ 323.381503][ T30] audit: type=1400 audit(322.820:78): avc: denied { mount } for pid=3332 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 323.602228][ T3331] veth0_macvtap: entered promiscuous mode [ 323.716312][ T3331] veth1_macvtap: entered promiscuous mode [ 323.976823][ T3332] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 324.538480][ T1545] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 324.540388][ T1545] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 324.549652][ T1545] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 324.551646][ T1545] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 327.907782][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 327.936004][ T30] audit: type=1400 audit(327.350:85): avc: denied { write } for pid=3478 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 329.470024][ T3485] Zero length message leads to an empty skb [ 329.841210][ T30] audit: type=1400 audit(329.280:86): avc: denied { name_bind } for pid=3484 comm="syz.1.3" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 329.879531][ T30] audit: type=1400 audit(329.290:87): avc: denied { node_bind } for pid=3484 comm="syz.1.3" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 331.824584][ T30] audit: type=1400 audit(331.240:88): avc: denied { ioctl } for pid=3490 comm="syz.0.5" path="socket:[4515]" dev="sockfs" ino=4515 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 334.251164][ T30] audit: type=1400 audit(333.690:89): avc: denied { create } for pid=3506 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 334.266579][ T30] audit: type=1400 audit(333.700:90): avc: denied { setopt } for pid=3506 comm="syz.1.8" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 336.129615][ T3517] syzkaller0: entered promiscuous mode [ 336.130323][ T3517] syzkaller0: entered allmulticast mode [ 336.300014][ T3518] syz.1.10 uses obsolete (PF_INET,SOCK_PACKET) [ 336.332850][ T30] audit: type=1400 audit(335.740:91): avc: denied { create } for pid=3516 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 336.362117][ T30] audit: type=1400 audit(335.800:92): avc: denied { ioctl } for pid=3516 comm="syz.1.10" path="socket:[3588]" dev="sockfs" ino=3588 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 336.474489][ T30] audit: type=1400 audit(335.920:94): avc: denied { write } for pid=3515 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 336.481759][ T30] audit: type=1400 audit(335.900:93): avc: denied { prog_load } for pid=3516 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 336.497607][ T30] audit: type=1400 audit(335.920:95): avc: denied { bpf } for pid=3516 comm="syz.1.10" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 339.590410][ T30] audit: type=1400 audit(339.030:96): avc: denied { create } for pid=3529 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 339.677552][ T30] audit: type=1400 audit(339.100:97): avc: denied { connect } for pid=3529 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 339.769423][ T30] audit: type=1400 audit(339.210:98): avc: denied { read } for pid=3529 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 341.258878][ T30] audit: type=1400 audit(340.700:99): avc: denied { read write } for pid=3536 comm="syz.1.16" name="virtual_nci" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 341.287015][ T30] audit: type=1400 audit(340.710:100): avc: denied { open } for pid=3536 comm="syz.1.16" path="/dev/virtual_nci" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 341.729898][ T30] audit: type=1400 audit(341.170:101): avc: denied { ioctl } for pid=3536 comm="syz.1.16" path="/dev/virtual_nci" dev="devtmpfs" ino=673 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 344.367548][ T30] audit: type=1400 audit(343.810:102): avc: denied { create } for pid=3550 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 344.464372][ T30] audit: type=1400 audit(343.880:103): avc: denied { ioctl } for pid=3550 comm="syz.1.18" path="socket:[3615]" dev="sockfs" ino=3615 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 344.528559][ T30] audit: type=1400 audit(343.970:104): avc: denied { write } for pid=3550 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 344.636398][ T30] audit: type=1400 audit(344.080:105): avc: denied { read } for pid=3550 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 347.669786][ T30] audit: type=1400 audit(347.100:106): avc: denied { create } for pid=3559 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 347.778598][ T30] audit: type=1400 audit(347.220:107): avc: denied { bind } for pid=3559 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 347.846592][ T30] audit: type=1400 audit(347.280:108): avc: denied { setopt } for pid=3559 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 347.847106][ T30] audit: type=1400 audit(347.280:109): avc: denied { write } for pid=3559 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 348.130496][ C0] vcan0: j1939_tp_rxtimer: 0x000000008889b1ec: rx timeout, send abort [ 348.155495][ T30] audit: type=1400 audit(347.590:110): avc: denied { read } for pid=3124 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 348.159729][ T30] audit: type=1400 audit(347.600:111): avc: denied { search } for pid=3124 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 348.186528][ T30] audit: type=1400 audit(347.620:112): avc: denied { search } for pid=3124 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 348.190251][ T30] audit: type=1400 audit(347.630:113): avc: denied { add_name } for pid=3124 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 348.214221][ T30] audit: type=1400 audit(347.650:114): avc: denied { create } for pid=3124 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 348.632419][ C0] vcan0: j1939_tp_rxtimer: 0x000000008889b1ec: abort rx timeout. Force session deactivation [ 348.637881][ C0] vcan0: j1939_tp_rxtimer: 0x00000000fc5dae12: rx timeout, send abort [ 349.138944][ C0] vcan0: j1939_tp_rxtimer: 0x00000000fc5dae12: abort rx timeout. Force session deactivation [ 351.377372][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 351.379132][ T30] audit: type=1400 audit(350.820:117): avc: denied { setopt } for pid=3571 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 351.489907][ T3573] netlink: 12 bytes leftover after parsing attributes in process `syz.0.26'. [ 352.166182][ T30] audit: type=1400 audit(351.610:118): avc: denied { bind } for pid=3571 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 354.588526][ T30] audit: type=1400 audit(354.030:119): avc: denied { create } for pid=3582 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 355.832431][ T30] audit: type=1400 audit(355.260:120): avc: denied { create } for pid=3588 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 355.856817][ T30] audit: type=1400 audit(355.300:121): avc: denied { connect } for pid=3588 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 356.248771][ T30] audit: type=1400 audit(355.690:122): avc: denied { read write } for pid=3332 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 356.272232][ T30] audit: type=1400 audit(355.710:123): avc: denied { open } for pid=3332 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 356.295255][ T30] audit: type=1400 audit(355.730:124): avc: denied { ioctl } for pid=3332 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 358.304551][ T3602] ip6tnl1: entered allmulticast mode [ 360.659915][ T30] audit: type=1400 audit(360.100:125): avc: denied { create } for pid=3610 comm="syz.0.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 362.375026][ T30] audit: type=1400 audit(361.810:126): avc: denied { name_bind } for pid=3621 comm="syz.1.41" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 364.492550][ T3634] syzkaller0: entered promiscuous mode [ 364.498514][ T3634] syzkaller0: entered allmulticast mode [ 366.579579][ T30] audit: type=1400 audit(366.020:127): avc: denied { create } for pid=3641 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 366.612356][ T3640] syzkaller0: entered promiscuous mode [ 366.615788][ T3640] syzkaller0: entered allmulticast mode [ 366.641285][ T30] audit: type=1400 audit(366.060:128): avc: denied { connect } for pid=3641 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 366.678130][ T3642] netlink: 'syz.1.47': attribute type 10 has an invalid length. [ 367.377925][ T3644] netlink: 4 bytes leftover after parsing attributes in process `syz.1.47'. [ 371.807996][ T30] audit: type=1400 audit(371.240:129): avc: denied { ioctl } for pid=3659 comm="syz.1.54" path="socket:[4720]" dev="sockfs" ino=4720 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 372.165874][ T3667] syzkaller0: entered promiscuous mode [ 372.166466][ T3667] syzkaller0: entered allmulticast mode [ 378.558921][ T3695] syzkaller0: entered promiscuous mode [ 378.559390][ T3695] syzkaller0: entered allmulticast mode [ 380.455321][ T30] audit: type=1400 audit(379.890:130): avc: denied { read } for pid=3701 comm="syz.1.64" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 380.487193][ T30] audit: type=1400 audit(379.930:131): avc: denied { open } for pid=3701 comm="syz.1.64" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 380.556450][ T30] audit: type=1400 audit(379.990:132): avc: denied { map_create } for pid=3701 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 380.577837][ T30] audit: type=1400 audit(380.020:133): avc: denied { map_read map_write } for pid=3701 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 380.654068][ T30] audit: type=1400 audit(380.090:134): avc: denied { allowed } for pid=3701 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 380.701173][ T30] audit: type=1400 audit(380.140:135): avc: denied { create } for pid=3701 comm="syz.1.64" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 380.751463][ T30] audit: type=1400 audit(380.190:136): avc: denied { map } for pid=3701 comm="syz.1.64" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3831 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 380.767284][ T30] audit: type=1400 audit(380.190:137): avc: denied { read write } for pid=3701 comm="syz.1.64" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3831 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 381.805065][ T30] audit: type=1400 audit(381.220:138): avc: denied { write } for pid=3706 comm="syz.1.67" name="igmp" dev="proc" ino=4026532643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 383.624051][ T3716] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 388.654918][ T30] audit: type=1400 audit(388.090:139): avc: denied { perfmon } for pid=3735 comm="syz.1.75" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 388.777855][ T30] audit: type=1400 audit(388.220:140): avc: denied { prog_run } for pid=3735 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 393.634151][ T30] audit: type=1400 audit(392.990:141): avc: denied { ioctl } for pid=3754 comm="syz.0.84" path="mnt:[4026532615]" dev="nsfs" ino=4026532615 ioctlcmd=0xb706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 393.638421][ T30] audit: type=1400 audit(393.020:142): avc: denied { bind } for pid=3754 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 393.643990][ T30] audit: type=1400 audit(393.040:143): avc: denied { read } for pid=3754 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 394.561665][ T3755] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 395.276453][ T30] audit: type=1400 audit(394.720:144): avc: denied { watch_mount } for pid=3751 comm="syz.1.82" path="/38" dev="tmpfs" ino=206 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 395.284566][ T30] audit: type=1400 audit(394.720:145): avc: denied { watch_reads } for pid=3751 comm="syz.1.82" path="/38" dev="tmpfs" ino=206 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 397.027531][ T3767] netlink: 'syz.1.86': attribute type 6 has an invalid length. [ 397.028690][ T3767] netlink: 'syz.1.86': attribute type 7 has an invalid length. [ 397.065293][ T3767] netlink: 'syz.1.86': attribute type 8 has an invalid length. [ 417.802290][ T3801] ======================================================= [ 417.802290][ T3801] WARNING: The mand mount option has been deprecated and [ 417.802290][ T3801] and is ignored by this kernel. Remove the mand [ 417.802290][ T3801] option from the mount to silence this warning. [ 417.802290][ T3801] ======================================================= [ 417.835640][ T30] audit: type=1400 audit(417.260:146): avc: denied { mount } for pid=3800 comm="syz.1.98" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 417.990560][ T30] audit: type=1400 audit(417.430:147): avc: denied { unmount } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 419.812163][ T30] audit: type=1400 audit(419.250:148): avc: denied { read write } for pid=3811 comm="syz.0.102" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 419.817375][ T30] audit: type=1400 audit(419.250:149): avc: denied { open } for pid=3811 comm="syz.0.102" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 422.983497][ C0] hrtimer: interrupt took 1134992 ns [ 431.051286][ T30] audit: type=1400 audit(430.470:150): avc: denied { ioctl } for pid=3843 comm="syz.1.114" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4938 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 433.640880][ T30] audit: type=1400 audit(433.080:151): avc: denied { remount } for pid=3846 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 435.533854][ T30] audit: type=1400 audit(434.970:152): avc: denied { lock } for pid=3848 comm="syz.1.116" path="socket:[4949]" dev="sockfs" ino=4949 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 437.586837][ T3852] netlink: 12 bytes leftover after parsing attributes in process `syz.1.117'. [ 437.767750][ T30] audit: type=1400 audit(437.210:153): avc: denied { create } for pid=3853 comm="syz.0.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 437.803656][ T30] audit: type=1400 audit(437.240:154): avc: denied { write } for pid=3853 comm="syz.0.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 439.537655][ T30] audit: type=1400 audit(438.980:155): avc: denied { create } for pid=3858 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 439.564192][ T30] audit: type=1400 audit(439.000:156): avc: denied { write } for pid=3858 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 439.569000][ T30] audit: type=1400 audit(439.010:157): avc: denied { nlmsg_write } for pid=3858 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 443.011850][ T30] audit: type=1400 audit(442.450:158): avc: denied { name_bind 0x1000000 } for pid=3870 comm="syz.0.126" path="socket:[4999]" dev="sockfs" ino=4999 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 445.134417][ T30] audit: type=1400 audit(444.490:159): avc: denied { read } for pid=3872 comm="syz.1.127" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 445.135441][ T30] audit: type=1400 audit(444.510:160): avc: denied { open } for pid=3872 comm="syz.1.127" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 445.139610][ T30] audit: type=1400 audit(444.540:161): avc: denied { ioctl } for pid=3872 comm="syz.1.127" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x7001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 448.780248][ T30] audit: type=1400 audit(448.220:162): avc: denied { read write } for pid=3878 comm="syz.0.129" name="uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 448.789989][ T30] audit: type=1400 audit(448.230:163): avc: denied { open } for pid=3878 comm="syz.0.129" path="/dev/uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 451.127110][ T30] audit: type=1400 audit(450.560:164): avc: denied { block_suspend } for pid=3882 comm="syz.0.131" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 456.799208][ T30] audit: type=1400 audit(456.240:165): avc: denied { read write } for pid=3891 comm="syz.1.135" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 456.808897][ T30] audit: type=1400 audit(456.240:166): avc: denied { open } for pid=3891 comm="syz.1.135" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 468.579170][ C1] vcan0: j1939_tp_rxtimer: 0x0000000016bbaf32: rx timeout, send abort [ 468.664889][ T30] audit: type=1400 audit(468.090:167): avc: denied { read } for pid=3124 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 469.080021][ C1] vcan0: j1939_tp_rxtimer: 0x00000000afbf3993: rx timeout, send abort [ 469.084474][ C1] vcan0: j1939_tp_rxtimer: 0x0000000016bbaf32: abort rx timeout. Force session deactivation [ 469.584623][ C1] vcan0: j1939_tp_rxtimer: 0x00000000afbf3993: abort rx timeout. Force session deactivation [ 484.195911][ T30] audit: type=1400 audit(483.640:168): avc: denied { getopt } for pid=3952 comm="syz.0.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 490.917755][ T30] audit: type=1400 audit(490.360:169): avc: denied { write } for pid=3981 comm="syz.0.174" name="ptype" dev="proc" ino=4026532721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 492.865082][ T30] audit: type=1400 audit(492.300:170): avc: denied { getopt } for pid=3988 comm="syz.0.178" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 494.365437][ T30] audit: type=1400 audit(493.790:171): avc: denied { execute } for pid=3992 comm="syz.1.179" dev="tmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 499.740743][ T4020] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 499.821999][ T4020] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 500.610943][ T30] audit: type=1400 audit(500.050:172): avc: denied { bind } for pid=4021 comm="syz.1.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 501.068980][ T4024] loop2: detected capacity change from 0 to 7 [ 502.691156][ T4035] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 512.380215][ C1] vcan0: j1939_tp_rxtimer: 0x00000000051b32ae: rx timeout, send abort [ 512.880941][ C1] vcan0: j1939_tp_rxtimer: 0x000000008a3270c8: rx timeout, send abort [ 512.882245][ C1] vcan0: j1939_tp_rxtimer: 0x00000000051b32ae: abort rx timeout. Force session deactivation [ 513.382106][ C1] vcan0: j1939_tp_rxtimer: 0x000000008a3270c8: abort rx timeout. Force session deactivation [ 516.527698][ T30] audit: type=1400 audit(515.970:173): avc: denied { unmount } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 518.227868][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e3e29251: rx timeout, send abort [ 518.728666][ C0] vcan0: j1939_tp_rxtimer: 0x0000000087422d4b: rx timeout, send abort [ 518.730054][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e3e29251: abort rx timeout. Force session deactivation [ 519.229930][ C0] vcan0: j1939_tp_rxtimer: 0x0000000087422d4b: abort rx timeout. Force session deactivation [ 520.659466][ T30] audit: type=1400 audit(520.100:174): avc: denied { read write } for pid=4072 comm="syz.1.214" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 520.680166][ T30] audit: type=1400 audit(520.110:175): avc: denied { open } for pid=4072 comm="syz.1.214" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 520.709102][ T30] audit: type=1400 audit(520.150:176): avc: denied { ioctl } for pid=4072 comm="syz.1.214" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xaf60 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 520.732909][ T30] audit: type=1400 audit(520.170:177): avc: denied { create } for pid=4072 comm="syz.1.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 520.764805][ T30] audit: type=1400 audit(520.200:178): avc: denied { connect } for pid=4072 comm="syz.1.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 521.290124][ T30] audit: type=1400 audit(520.730:179): avc: denied { shutdown } for pid=4072 comm="syz.1.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 521.364526][ C1] vcan0: j1939_tp_rxtimer: 0x00000000f8433b62: rx timeout, send abort [ 521.866408][ C1] vcan0: j1939_tp_rxtimer: 0x00000000499a5778: rx timeout, send abort [ 521.867519][ C1] vcan0: j1939_tp_rxtimer: 0x00000000f8433b62: abort rx timeout. Force session deactivation [ 522.217677][ T30] audit: type=1400 audit(521.650:180): avc: denied { map } for pid=4078 comm="syz.0.217" path="socket:[5398]" dev="sockfs" ino=5398 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 522.367807][ C1] vcan0: j1939_tp_rxtimer: 0x00000000499a5778: abort rx timeout. Force session deactivation [ 522.610727][ T30] audit: type=1400 audit(522.040:181): avc: denied { mount } for pid=4080 comm="syz.0.218" name="/" dev="ramfs" ino=5405 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 522.722788][ T30] audit: type=1400 audit(522.160:182): avc: denied { create } for pid=4080 comm="syz.0.218" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=blk_file permissive=1 [ 524.248882][ T30] audit: type=1400 audit(523.690:183): avc: denied { create } for pid=4087 comm="syz.1.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 524.262890][ T30] audit: type=1400 audit(523.700:184): avc: denied { bind } for pid=4087 comm="syz.1.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 524.336061][ T30] audit: type=1400 audit(523.770:185): avc: denied { write } for pid=4086 comm="syz.0.221" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 524.401502][ T4090] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 524.840755][ T30] audit: type=1400 audit(524.280:186): avc: denied { accept } for pid=4087 comm="syz.1.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 526.681998][ T30] audit: type=1400 audit(526.120:187): avc: denied { create } for pid=4100 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 526.694378][ T30] audit: type=1400 audit(526.130:188): avc: denied { write } for pid=4100 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 526.695720][ T30] audit: type=1400 audit(526.140:189): avc: denied { nlmsg_write } for pid=4100 comm="syz.0.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 526.970144][ T4104] netlink: 64 bytes leftover after parsing attributes in process `syz.0.227'. [ 527.692756][ T30] audit: type=1400 audit(527.130:190): avc: denied { connect } for pid=4105 comm="syz.0.228" lport=135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 530.044926][ T784] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 530.355422][ T784] usb 1-1: Using ep0 maxpacket: 16 [ 530.418445][ T784] usb 1-1: config 0 has no interfaces? [ 530.459288][ T784] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 530.460771][ T784] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 530.461881][ T784] usb 1-1: SerialNumber: syz [ 530.705622][ T784] usb 1-1: config 0 descriptor?? [ 531.028302][ T3322] usb 1-1: USB disconnect, device number 2 [ 531.131363][ T4119] binder: 4118:4119 ioctl c018620c 20000040 returned -1 [ 531.131540][ T30] audit: type=1400 audit(530.570:191): avc: denied { ioctl } for pid=4118 comm="syz.1.234" path="/dev/binderfs/binder1" dev="binder" ino=5 ioctlcmd=0x620c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 533.045136][ T30] audit: type=1400 audit(532.460:192): avc: denied { name_bind } for pid=4124 comm="syz.1.237" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 533.816282][ T3774] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 534.104722][ T3774] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 534.105221][ T3774] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 534.150346][ T3774] usb 1-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 534.150761][ T3774] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=67 [ 534.161727][ T3774] usb 1-1: SerialNumber: syz [ 534.867980][ T3774] usb 1-1: 0:2 : does not exist [ 535.386187][ T3774] usb 1-1: USB disconnect, device number 3 [ 540.421509][ T4139] udevd[4139]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 540.815316][ T4143] netlink: 104 bytes leftover after parsing attributes in process `syz.0.242'. [ 545.137864][ T30] audit: type=1400 audit(544.550:193): avc: denied { bind } for pid=4144 comm="syz.0.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 545.139060][ T30] audit: type=1400 audit(544.560:194): avc: denied { listen } for pid=4144 comm="syz.0.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 545.658293][ T30] audit: type=1400 audit(545.090:195): avc: denied { accept } for pid=4144 comm="syz.0.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 545.782090][ T30] audit: type=1400 audit(545.200:196): avc: denied { read } for pid=4144 comm="syz.0.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 545.914417][ T30] audit: type=1400 audit(545.200:197): avc: denied { write } for pid=4144 comm="syz.0.243" path="socket:[6490]" dev="sockfs" ino=6490 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 549.152693][ T30] audit: type=1400 audit(548.590:198): avc: denied { setopt } for pid=4149 comm="syz.1.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 554.319997][ T30] audit: type=1400 audit(553.730:199): avc: denied { load_policy } for pid=4158 comm="syz.0.248" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 554.416650][ T4160] SELinux: ebitmap: truncated map [ 554.538514][ T4160] SELinux: failed to load policy [ 555.430925][ T4164] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 555.460283][ T4164] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 557.201327][ T4174] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 557.262688][ T4174] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 557.875015][ C0] vcan0: j1939_tp_rxtimer: 0x00000000a9b2120d: rx timeout, send abort [ 558.375237][ C0] vcan0: j1939_tp_rxtimer: 0x0000000014a519e1: rx timeout, send abort [ 558.376463][ C0] vcan0: j1939_tp_rxtimer: 0x00000000a9b2120d: abort rx timeout. Force session deactivation [ 558.876251][ C0] vcan0: j1939_tp_rxtimer: 0x0000000014a519e1: abort rx timeout. Force session deactivation [ 561.626806][ T4191] netlink: 156 bytes leftover after parsing attributes in process `syz.1.261'. [ 562.265397][ T30] audit: type=1400 audit(561.700:200): avc: denied { nlmsg_write } for pid=4193 comm="syz.0.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 563.747230][ T3477] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 564.361928][ T3477] usb 1-1: config 0 has an invalid interface number: 255 but max is 0 [ 564.368819][ T3477] usb 1-1: config 0 has no interface number 0 [ 564.372646][ T3477] usb 1-1: too many endpoints for config 0 interface 255 altsetting 255: 255, using maximum allowed: 30 [ 564.378097][ T3477] usb 1-1: config 0 interface 255 altsetting 255 has 0 endpoint descriptors, different from the interface descriptor's value: 255 [ 564.386414][ T3477] usb 1-1: config 0 interface 255 has no altsetting 0 [ 564.390212][ T3477] usb 1-1: New USB device found, idVendor=0bda, idProduct=0177, bcdDevice=7d.0b [ 564.398805][ T3477] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 564.459687][ T3477] usb 1-1: config 0 descriptor?? [ 564.506245][ T3477] ums-realtek 1-1:0.255: USB Mass Storage device detected [ 565.616937][ T3477] usb 1-1: USB disconnect, device number 4 [ 570.306555][ T4217] netlink: 12 bytes leftover after parsing attributes in process `syz.0.270'. [ 573.539978][ T30] audit: type=1400 audit(572.970:201): avc: denied { read } for pid=4222 comm="syz.0.273" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 573.558618][ T30] audit: type=1400 audit(573.000:202): avc: denied { open } for pid=4222 comm="syz.0.273" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 576.400835][ T30] audit: type=1326 audit(575.840:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4232 comm="syz.1.278" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8675c4e8 code=0x7ffc0000 [ 576.419798][ T30] audit: type=1326 audit(575.860:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4232 comm="syz.1.278" exe="/syz-executor" sig=0 arch=c00000b7 syscall=77 compat=0 ip=0xffff8675c4e8 code=0x7ffc0000 [ 576.425178][ T30] audit: type=1326 audit(575.860:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4232 comm="syz.1.278" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8675c4e8 code=0x7ffc0000 [ 579.783948][ T30] audit: type=1326 audit(579.220:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4244 comm="syz.0.281" exe="/syz-executor" sig=9 arch=c00000b7 syscall=98 compat=0 ip=0xffffa8f5c4e8 code=0x0 [ 580.296233][ T4248] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 580.301712][ T4248] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 584.237630][ T30] audit: type=1400 audit(583.680:207): avc: denied { setopt } for pid=4260 comm="syz.1.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 584.310712][ T30] audit: type=1400 audit(583.750:208): avc: denied { write } for pid=4260 comm="syz.1.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 586.090833][ T30] audit: type=1400 audit(585.530:209): avc: denied { bind } for pid=4271 comm="syz.1.292" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 586.106798][ T30] audit: type=1400 audit(585.530:210): avc: denied { name_bind } for pid=4271 comm="syz.1.292" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 586.112371][ T30] audit: type=1400 audit(585.530:211): avc: denied { node_bind } for pid=4271 comm="syz.1.292" saddr=224.0.0.2 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 586.797265][ T30] audit: type=1400 audit(586.230:212): avc: denied { bind } for pid=4274 comm="syz.1.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 586.801063][ T30] audit: type=1400 audit(586.230:213): avc: denied { name_bind } for pid=4274 comm="syz.1.293" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 586.816254][ T30] audit: type=1400 audit(586.230:214): avc: denied { node_bind } for pid=4274 comm="syz.1.293" saddr=fc00:: src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 589.730901][ T30] audit: type=1400 audit(589.170:215): avc: denied { write } for pid=4287 comm="syz.1.299" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 590.278239][ T30] audit: type=1400 audit(589.720:216): avc: denied { write } for pid=4290 comm="syz.0.301" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 592.819895][ T30] audit: type=1400 audit(592.260:217): avc: denied { setopt } for pid=4303 comm="syz.0.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 592.867048][ T30] audit: type=1400 audit(592.300:218): avc: denied { read } for pid=4303 comm="syz.0.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 619.003852][ C0] vcan0: j1939_tp_rxtimer: 0x00000000ac46ae16: rx timeout, send abort [ 619.047855][ T30] audit: type=1400 audit(618.490:219): avc: denied { search } for pid=3124 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 619.057773][ T30] audit: type=1400 audit(618.490:220): avc: denied { append } for pid=3124 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 619.064991][ T30] audit: type=1400 audit(618.500:221): avc: denied { open } for pid=3124 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 619.095415][ T30] audit: type=1400 audit(618.520:222): avc: denied { getattr } for pid=3124 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 619.505254][ C0] vcan0: j1939_tp_rxtimer: 0x00000000ac46ae16: abort rx timeout. Force session deactivation [ 619.507225][ C0] vcan0: j1939_tp_rxtimer: 0x0000000009fb46b8: rx timeout, send abort [ 620.008383][ C0] vcan0: j1939_tp_rxtimer: 0x0000000009fb46b8: abort rx timeout. Force session deactivation [ 623.215563][ C1] vcan0: j1939_tp_rxtimer: 0x000000006452740a: rx timeout, send abort [ 623.716147][ C1] vcan0: j1939_tp_rxtimer: 0x0000000026e4b667: rx timeout, send abort [ 623.717304][ C1] vcan0: j1939_tp_rxtimer: 0x000000006452740a: abort rx timeout. Force session deactivation [ 624.217185][ C1] vcan0: j1939_tp_rxtimer: 0x0000000026e4b667: abort rx timeout. Force session deactivation [ 624.718928][ T4364] syz_tun: entered allmulticast mode [ 627.996860][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e6c77e94: rx timeout, send abort [ 628.112209][ T30] audit: type=1400 audit(627.550:223): avc: denied { setattr } for pid=4374 comm="syz.1.336" name="ptmx" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 628.498016][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e5a2c8cf: rx timeout, send abort [ 628.499480][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e6c77e94: abort rx timeout. Force session deactivation [ 628.999635][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e5a2c8cf: abort rx timeout. Force session deactivation [ 629.224128][ T30] audit: type=1400 audit(628.660:224): avc: denied { getopt } for pid=4378 comm="syz.0.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 631.174174][ C0] vcan0: j1939_tp_rxtimer: 0x00000000ece431d2: rx timeout, send abort [ 631.674910][ C0] vcan0: j1939_tp_rxtimer: 0x00000000d7b5cc4d: rx timeout, send abort [ 631.675760][ C0] vcan0: j1939_tp_rxtimer: 0x00000000ece431d2: abort rx timeout. Force session deactivation [ 632.176057][ C0] vcan0: j1939_tp_rxtimer: 0x00000000d7b5cc4d: abort rx timeout. Force session deactivation [ 635.210604][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e510d292: rx timeout, send abort [ 635.711851][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e510d292: abort rx timeout. Force session deactivation [ 635.713785][ C0] vcan0: j1939_tp_rxtimer: 0x000000006452740a: rx timeout, send abort [ 636.216171][ C0] vcan0: j1939_tp_rxtimer: 0x000000006452740a: abort rx timeout. Force session deactivation [ 636.582337][ T30] audit: type=1400 audit(636.020:225): avc: denied { relabelfrom } for pid=4404 comm="syz.1.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 636.587176][ T30] audit: type=1400 audit(636.020:226): avc: denied { relabelto } for pid=4404 comm="syz.1.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 637.783907][ T30] audit: type=1400 audit(637.210:227): avc: denied { mounton } for pid=4410 comm="syz.1.353" path="/proc/353/task" dev="proc" ino=6957 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 639.025298][ C0] vcan0: j1939_tp_rxtimer: 0x00000000c7e8710c: rx timeout, send abort [ 639.524955][ C0] vcan0: j1939_tp_rxtimer: 0x00000000843718bf: rx timeout, send abort [ 639.527669][ C0] vcan0: j1939_tp_rxtimer: 0x00000000c7e8710c: abort rx timeout. Force session deactivation [ 639.625900][ T3322] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 639.854606][ T3322] usb 1-1: Using ep0 maxpacket: 32 [ 640.026720][ C0] vcan0: j1939_tp_rxtimer: 0x00000000843718bf: abort rx timeout. Force session deactivation [ 640.232222][ T3322] usb 1-1: config 0 interface 0 altsetting 5 endpoint 0x81 has an invalid bInterval 250, changing to 11 [ 640.234230][ T3322] usb 1-1: config 0 interface 0 has no altsetting 0 [ 640.234638][ T3322] usb 1-1: New USB device found, idVendor=056a, idProduct=0041, bcdDevice= 0.00 [ 640.234908][ T3322] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 640.382960][ T3322] usb 1-1: config 0 descriptor?? [ 641.159404][ T3322] hid-generic 0003:056A:0041.0001: hidraw0: USB HID vff.fc Device [HID 056a:0041] on usb-dummy_hcd.0-1/input0 [ 641.297449][ T3322] usb 1-1: USB disconnect, device number 5 [ 643.593879][ T30] audit: type=1400 audit(643.030:228): avc: denied { setopt } for pid=4429 comm="syz.1.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 644.256544][ T4436] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 644.280742][ T4436] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 644.651805][ T4427] fido_id[4427]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/report_descriptor': No such file or directory [ 646.405429][ T3322] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 646.843508][ T3322] usb 1-1: config 0 has no interfaces? [ 646.851927][ T3322] usb 1-1: New USB device found, idVendor=13e5, idProduct=0001, bcdDevice=4e.53 [ 646.854991][ T3322] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 646.931386][ T3322] usb 1-1: config 0 descriptor?? [ 647.567725][ T3322] usb 1-1: USB disconnect, device number 6 [ 654.641253][ C1] vcan0: j1939_tp_rxtimer: 0x0000000090e3fc64: rx timeout, send abort [ 655.142240][ C1] vcan0: j1939_tp_rxtimer: 0x00000000e3e29251: rx timeout, send abort [ 655.144131][ C1] vcan0: j1939_tp_rxtimer: 0x0000000090e3fc64: abort rx timeout. Force session deactivation [ 655.644513][ C1] vcan0: j1939_tp_rxtimer: 0x00000000e3e29251: abort rx timeout. Force session deactivation [ 664.796476][ C0] vcan0: j1939_tp_rxtimer: 0x00000000d982783b: rx timeout, send abort [ 665.298150][ C0] vcan0: j1939_tp_rxtimer: 0x000000005f032c3e: rx timeout, send abort [ 665.298699][ C0] vcan0: j1939_tp_rxtimer: 0x00000000d982783b: abort rx timeout. Force session deactivation [ 665.799137][ C0] vcan0: j1939_tp_rxtimer: 0x000000005f032c3e: abort rx timeout. Force session deactivation [ 673.829841][ T30] audit: type=1400 audit(673.270:229): avc: denied { create } for pid=4481 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 673.877220][ T30] audit: type=1400 audit(673.280:230): avc: denied { write open } for pid=4481 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1952 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 673.966953][ T30] audit: type=1400 audit(673.400:231): avc: denied { append } for pid=4481 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1952 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 674.058677][ T30] audit: type=1400 audit(673.480:232): avc: denied { getattr } for pid=4481 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 675.695579][ T30] audit: type=1400 audit(675.130:233): avc: denied { read } for pid=4485 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 677.512879][ T30] audit: type=1400 audit(676.940:234): avc: denied { unlink } for pid=4488 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1952 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 677.528719][ C1] vcan0: j1939_tp_rxtimer: 0x00000000c3cfbe81: rx timeout, send abort [ 678.029501][ C1] vcan0: j1939_tp_rxtimer: 0x000000005ccbf1c2: rx timeout, send abort [ 678.031172][ C1] vcan0: j1939_tp_rxtimer: 0x00000000c3cfbe81: abort rx timeout. Force session deactivation [ 678.531069][ C1] vcan0: j1939_tp_rxtimer: 0x000000005ccbf1c2: abort rx timeout. Force session deactivation [ 679.007012][ T4496] netlink: 20 bytes leftover after parsing attributes in process `syz.0.380'. [ 689.875687][ C0] vcan0: j1939_tp_rxtimer: 0x0000000068147bde: rx timeout, send abort [ 690.377839][ C0] vcan0: j1939_tp_rxtimer: 0x0000000068147bde: abort rx timeout. Force session deactivation [ 690.381345][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e6c77e94: rx timeout, send abort [ 690.884512][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e6c77e94: abort rx timeout. Force session deactivation [ 691.969091][ T4513] netlink: 4 bytes leftover after parsing attributes in process `syz.1.387'. [ 692.284493][ T3774] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 692.507919][ T3774] usb 1-1: Using ep0 maxpacket: 16 [ 692.539143][ T3774] usb 1-1: config 0 interface 0 altsetting 16 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 692.547396][ T3774] usb 1-1: config 0 interface 0 altsetting 16 endpoint 0x81 has invalid wMaxPacketSize 0 [ 692.550736][ T3774] usb 1-1: config 0 interface 0 altsetting 16 has 1 endpoint descriptor, different from the interface descriptor's value: 28 [ 692.555497][ T3774] usb 1-1: config 0 interface 0 has no altsetting 0 [ 692.557528][ T3774] usb 1-1: New USB device found, idVendor=056a, idProduct=0331, bcdDevice= 0.00 [ 692.559891][ T3774] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 692.735039][ T3774] usb 1-1: config 0 descriptor?? [ 693.118321][ T4514] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 693.192038][ T4514] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 693.985321][ T3774] hid-generic 0003:056A:0331.0002: unknown main item tag 0x0 [ 693.989713][ T3774] hid-generic 0003:056A:0331.0002: unknown main item tag 0x0 [ 693.990854][ T3774] hid-generic 0003:056A:0331.0002: unknown main item tag 0x0 [ 693.991272][ T3774] hid-generic 0003:056A:0331.0002: unknown main item tag 0x0 [ 693.991670][ T3774] hid-generic 0003:056A:0331.0002: unknown main item tag 0x0 [ 693.992072][ T3774] hid-generic 0003:056A:0331.0002: unknown main item tag 0x0 [ 693.992425][ T3774] hid-generic 0003:056A:0331.0002: unknown main item tag 0x0 [ 693.992777][ T3774] hid-generic 0003:056A:0331.0002: unknown main item tag 0x0 [ 694.004854][ T3774] hid-generic 0003:056A:0331.0002: unknown main item tag 0x0 [ 694.007043][ T3774] hid-generic 0003:056A:0331.0002: unknown main item tag 0x0 [ 694.248546][ T3774] hid-generic 0003:056A:0331.0002: hidraw0: USB HID v0.00 Device [HID 056a:0331] on usb-dummy_hcd.0-1/input0 [ 694.285315][ T3774] usb 1-1: USB disconnect, device number 7 [ 695.360226][ C0] vcan0: j1939_tp_rxtimer: 0x0000000071fb22a7: rx timeout, send abort [ 695.859442][ C0] vcan0: j1939_tp_rxtimer: 0x00000000cae211bc: rx timeout, send abort [ 695.861403][ C0] vcan0: j1939_tp_rxtimer: 0x0000000071fb22a7: abort rx timeout. Force session deactivation [ 696.360105][ C0] vcan0: j1939_tp_rxtimer: 0x00000000cae211bc: abort rx timeout. Force session deactivation [ 700.028474][ T4525] fido_id[4525]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/report_descriptor': No such file or directory [ 700.454060][ T30] audit: type=1400 audit(699.830:235): avc: denied { setopt } for pid=4534 comm="syz.0.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 702.597382][ C0] vcan0: j1939_tp_rxtimer: 0x0000000022e431d1: rx timeout, send abort [ 703.098968][ C0] vcan0: j1939_tp_rxtimer: 0x00000000920bb749: rx timeout, send abort [ 703.100041][ C0] vcan0: j1939_tp_rxtimer: 0x0000000022e431d1: abort rx timeout. Force session deactivation [ 703.600257][ C0] vcan0: j1939_tp_rxtimer: 0x00000000920bb749: abort rx timeout. Force session deactivation [ 705.322736][ T30] audit: type=1400 audit(704.760:236): avc: denied { node_bind } for pid=4540 comm="syz.0.397" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 707.714076][ T4545] usb usb1: usbfs: interface 0 claimed by hub while 'syz.1.399' sets config #-1 [ 708.615053][ C1] vcan0: j1939_tp_rxtimer: 0x000000003d50e910: rx timeout, send abort [ 709.116206][ C1] vcan0: j1939_tp_rxtimer: 0x00000000ece15c17: rx timeout, send abort [ 709.117657][ C1] vcan0: j1939_tp_rxtimer: 0x000000003d50e910: abort rx timeout. Force session deactivation [ 709.617671][ C1] vcan0: j1939_tp_rxtimer: 0x00000000ece15c17: abort rx timeout. Force session deactivation [ 721.615912][ T4562] netlink: 8 bytes leftover after parsing attributes in process `syz.0.404'. [ 725.671654][ C1] vcan0: j1939_tp_rxtimer: 0x00000000797cff31: rx timeout, send abort [ 726.173686][ C1] vcan0: j1939_tp_rxtimer: 0x00000000797cff31: abort rx timeout. Force session deactivation [ 726.174847][ C1] vcan0: j1939_tp_rxtimer: 0x000000006bc55968: rx timeout, send abort [ 726.675525][ C1] vcan0: j1939_tp_rxtimer: 0x000000006bc55968: abort rx timeout. Force session deactivation [ 728.680698][ C0] vcan0: j1939_tp_rxtimer: 0x00000000a7fb6718: rx timeout, send abort [ 729.181337][ C0] vcan0: j1939_tp_rxtimer: 0x000000005851dad7: rx timeout, send abort [ 729.182145][ C0] vcan0: j1939_tp_rxtimer: 0x00000000a7fb6718: abort rx timeout. Force session deactivation [ 729.682061][ C0] vcan0: j1939_tp_rxtimer: 0x000000005851dad7: abort rx timeout. Force session deactivation [ 737.806875][ C0] vcan0: j1939_tp_rxtimer: 0x000000008a43cdf6: rx timeout, send abort [ 738.307711][ C0] vcan0: j1939_tp_rxtimer: 0x0000000063f058ea: rx timeout, send abort [ 738.309330][ C0] vcan0: j1939_tp_rxtimer: 0x000000008a43cdf6: abort rx timeout. Force session deactivation [ 738.808838][ C0] vcan0: j1939_tp_rxtimer: 0x0000000063f058ea: abort rx timeout. Force session deactivation [ 743.207982][ C0] vcan0: j1939_tp_rxtimer: 0x000000004d695ce9: rx timeout, send abort [ 743.708660][ C0] vcan0: j1939_tp_rxtimer: 0x0000000030d7080c: rx timeout, send abort [ 743.710111][ C0] vcan0: j1939_tp_rxtimer: 0x000000004d695ce9: abort rx timeout. Force session deactivation [ 744.210199][ C0] vcan0: j1939_tp_rxtimer: 0x0000000030d7080c: abort rx timeout. Force session deactivation [ 750.686759][ T30] audit: type=1400 audit(750.110:237): avc: denied { set_context_mgr } for pid=4630 comm="syz.0.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 750.875339][ T30] audit: type=1400 audit(750.310:238): avc: denied { map } for pid=4630 comm="syz.0.427" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 751.237461][ T4631] binder: 4630:4631 tried to acquire reference to desc 0, got 1 instead [ 751.275126][ T30] audit: type=1400 audit(750.710:239): avc: denied { call } for pid=4630 comm="syz.0.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 751.309193][ T30] audit: type=1400 audit(750.750:240): avc: denied { transfer } for pid=4630 comm="syz.0.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 751.356144][ T4631] binder: 4630:4631 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 30) [ 751.366785][ T4631] binder: 4631 RLIMIT_NICE not set [ 751.382713][ T4631] binder: 4631 RLIMIT_NICE not set [ 751.405930][ T4631] binder: send failed reply for transaction 5 to 4630:4631 [ 751.420984][ T4631] binder: 4630:4631 ioctl c0306201 20000180 returned -14 [ 753.306611][ T10] binder: undelivered TRANSACTION_COMPLETE [ 753.324741][ T10] binder: undelivered TRANSACTION_ERROR: 29201 [ 753.330649][ T10] binder: send failed reply for transaction 12 to 4630:4631 [ 753.449113][ T10] binder: undelivered TRANSACTION_COMPLETE [ 753.475310][ T10] binder: undelivered TRANSACTION_ERROR: 29189 [ 754.238969][ C0] vcan0: j1939_tp_rxtimer: 0x000000007b3add37: rx timeout, send abort [ 754.740244][ C0] vcan0: j1939_tp_rxtimer: 0x000000007b3add37: abort rx timeout. Force session deactivation [ 754.741759][ C0] vcan0: j1939_tp_rxtimer: 0x0000000021e1d731: rx timeout, send abort [ 755.242481][ C0] vcan0: j1939_tp_rxtimer: 0x0000000021e1d731: abort rx timeout. Force session deactivation [ 755.545799][ T30] audit: type=1326 audit(754.980:241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4635 comm="syz.0.429" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffa8f5c4e8 code=0x0 [ 758.347193][ C1] vcan0: j1939_tp_rxtimer: 0x000000004b726aee: rx timeout, send abort [ 758.847533][ C1] vcan0: j1939_tp_rxtimer: 0x00000000ec52987c: rx timeout, send abort [ 758.848877][ C1] vcan0: j1939_tp_rxtimer: 0x000000004b726aee: abort rx timeout. Force session deactivation [ 759.348841][ C1] vcan0: j1939_tp_rxtimer: 0x00000000ec52987c: abort rx timeout. Force session deactivation [ 763.351212][ C0] vcan0: j1939_tp_rxtimer: 0x000000009d0114d0: rx timeout, send abort [ 763.851398][ C0] vcan0: j1939_tp_rxtimer: 0x000000002f994582: rx timeout, send abort [ 763.852737][ C0] vcan0: j1939_tp_rxtimer: 0x000000009d0114d0: abort rx timeout. Force session deactivation [ 764.353658][ C0] vcan0: j1939_tp_rxtimer: 0x000000002f994582: abort rx timeout. Force session deactivation [ 766.774931][ T30] audit: type=1400 audit(766.210:242): avc: denied { read } for pid=4665 comm="syz.0.440" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 766.790902][ T30] audit: type=1400 audit(766.220:243): avc: denied { open } for pid=4665 comm="syz.0.440" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 766.812666][ T30] audit: type=1400 audit(766.250:244): avc: denied { ioctl } for pid=4665 comm="syz.0.440" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 770.158335][ T4672] binder: 4670:4672 tried to acquire reference to desc 0, got 1 instead [ 770.199105][ T4672] binder: 4670:4672 got transaction with invalid data ptr [ 770.217983][ T4672] binder: 4670:4672 transaction async to 4670:0 failed 18/29201/-14, code 0 size 0-24 line 3492 [ 770.302866][ T9] binder: release 4670:4672 transaction 17 out, still active [ 770.336714][ T9] binder: undelivered TRANSACTION_COMPLETE [ 770.339091][ T9] binder: undelivered TRANSACTION_ERROR: 29201 [ 770.489201][ T9] binder: send failed reply for transaction 17, target dead [ 774.594994][ T4677] netlink: 32 bytes leftover after parsing attributes in process `syz.1.444'. [ 774.886896][ T30] audit: type=1400 audit(774.330:245): avc: denied { write } for pid=4680 comm="syz.1.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 775.018280][ C1] vcan0: j1939_tp_rxtimer: 0x00000000b132d724: rx timeout, send abort [ 775.252572][ T30] audit: type=1400 audit(774.690:246): avc: denied { setopt } for pid=4682 comm="syz.1.447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 775.274928][ T30] audit: type=1400 audit(774.720:247): avc: denied { read } for pid=4682 comm="syz.1.447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 775.518758][ C1] vcan0: j1939_tp_rxtimer: 0x00000000d14c1c4c: rx timeout, send abort [ 775.520864][ C1] vcan0: j1939_tp_rxtimer: 0x00000000b132d724: abort rx timeout. Force session deactivation [ 776.020581][ C1] vcan0: j1939_tp_rxtimer: 0x00000000d14c1c4c: abort rx timeout. Force session deactivation [ 791.306271][ C0] vcan0: j1939_tp_rxtimer: 0x00000000b2552377: rx timeout, send abort [ 791.806932][ C0] vcan0: j1939_tp_rxtimer: 0x000000001cc64eec: rx timeout, send abort [ 791.807995][ C0] vcan0: j1939_tp_rxtimer: 0x00000000b2552377: abort rx timeout. Force session deactivation [ 792.307907][ C0] vcan0: j1939_tp_rxtimer: 0x000000001cc64eec: abort rx timeout. Force session deactivation [ 798.015977][ C0] vcan0: j1939_tp_rxtimer: 0x0000000039915fa7: rx timeout, send abort [ 798.516269][ C0] vcan0: j1939_tp_rxtimer: 0x000000000e54bf5d: rx timeout, send abort [ 798.517234][ C0] vcan0: j1939_tp_rxtimer: 0x0000000039915fa7: abort rx timeout. Force session deactivation [ 799.017127][ C0] vcan0: j1939_tp_rxtimer: 0x000000000e54bf5d: abort rx timeout. Force session deactivation [ 802.000153][ T30] audit: type=1326 audit(801.440:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4721 comm="syz.0.460" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa8f5c4e8 code=0x7ffc0000 [ 802.078095][ T30] audit: type=1326 audit(801.500:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4721 comm="syz.0.460" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffa8f5ea8c code=0x7ffc0000 [ 802.124313][ T30] audit: type=1326 audit(801.560:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4721 comm="syz.0.460" exe="/syz-executor" sig=0 arch=c00000b7 syscall=206 compat=0 ip=0xffffa8f5e9a8 code=0x7ffc0000 [ 808.347084][ C0] vcan0: j1939_tp_rxtimer: 0x00000000db2b4dbe: rx timeout, send abort [ 808.459748][ T30] audit: type=1400 audit(807.900:251): avc: denied { ioctl } for pid=4730 comm="syz.0.464" path="/dev/uinput" dev="devtmpfs" ino=708 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 808.847681][ C0] vcan0: j1939_tp_rxtimer: 0x000000005c9d1081: rx timeout, send abort [ 808.849506][ C0] vcan0: j1939_tp_rxtimer: 0x00000000db2b4dbe: abort rx timeout. Force session deactivation [ 809.349207][ C0] vcan0: j1939_tp_rxtimer: 0x000000005c9d1081: abort rx timeout. Force session deactivation [ 817.390506][ C0] vcan0: j1939_tp_rxtimer: 0x00000000b7208944: rx timeout, send abort [ 817.892160][ C0] vcan0: j1939_tp_rxtimer: 0x00000000b7208944: abort rx timeout. Force session deactivation [ 817.894677][ C0] vcan0: j1939_tp_rxtimer: 0x0000000082f8e4c9: rx timeout, send abort [ 818.395681][ C0] vcan0: j1939_tp_rxtimer: 0x0000000082f8e4c9: abort rx timeout. Force session deactivation [ 822.391429][ T4754] capability: warning: `syz.1.473' uses deprecated v2 capabilities in a way that may be insecure [ 824.618840][ C1] vcan0: j1939_tp_rxtimer: 0x000000008dd59076: rx timeout, send abort [ 825.072664][ T30] audit: type=1400 audit(824.510:252): avc: denied { nlmsg_read } for pid=4762 comm="syz.1.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 825.078026][ T4763] netlink: 200 bytes leftover after parsing attributes in process `syz.1.477'. [ 825.120367][ C1] vcan0: j1939_tp_rxtimer: 0x0000000057fc9426: rx timeout, send abort [ 825.121402][ C1] vcan0: j1939_tp_rxtimer: 0x000000008dd59076: abort rx timeout. Force session deactivation [ 825.621660][ C1] vcan0: j1939_tp_rxtimer: 0x0000000057fc9426: abort rx timeout. Force session deactivation [ 827.298294][ T30] audit: type=1400 audit(826.730:253): avc: denied { map } for pid=4768 comm="syz.1.480" path="socket:[7604]" dev="sockfs" ino=7604 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 827.309752][ T30] audit: type=1400 audit(826.740:254): avc: denied { read } for pid=4768 comm="syz.1.480" path="socket:[7604]" dev="sockfs" ino=7604 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 831.720809][ C1] vcan0: j1939_tp_rxtimer: 0x00000000d5131364: rx timeout, send abort [ 832.221376][ C1] vcan0: j1939_tp_rxtimer: 0x00000000aa579e8f: rx timeout, send abort [ 832.223814][ C1] vcan0: j1939_tp_rxtimer: 0x00000000d5131364: abort rx timeout. Force session deactivation [ 832.723476][ C1] vcan0: j1939_tp_rxtimer: 0x00000000aa579e8f: abort rx timeout. Force session deactivation [ 839.171171][ C1] vcan0: j1939_tp_rxtimer: 0x000000009dbd307e: rx timeout, send abort [ 839.672042][ C1] vcan0: j1939_tp_rxtimer: 0x0000000004e75304: rx timeout, send abort [ 839.675673][ C1] vcan0: j1939_tp_rxtimer: 0x000000009dbd307e: abort rx timeout. Force session deactivation [ 840.176140][ C1] vcan0: j1939_tp_rxtimer: 0x0000000004e75304: abort rx timeout. Force session deactivation [ 845.080419][ T4810] netlink: 24 bytes leftover after parsing attributes in process `syz.1.492'. [ 852.769549][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e90e65d5: rx timeout, send abort [ 853.269993][ C0] vcan0: j1939_tp_rxtimer: 0x000000001787d83a: rx timeout, send abort [ 853.271244][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e90e65d5: abort rx timeout. Force session deactivation [ 853.771157][ C0] vcan0: j1939_tp_rxtimer: 0x000000001787d83a: abort rx timeout. Force session deactivation [ 856.957493][ T4828] netlink: 4 bytes leftover after parsing attributes in process `syz.1.499'. [ 859.156245][ C0] vcan0: j1939_tp_rxtimer: 0x00000000227c7a81: rx timeout, send abort [ 859.656218][ C0] vcan0: j1939_tp_rxtimer: 0x000000005851dad7: rx timeout, send abort [ 859.658063][ C0] vcan0: j1939_tp_rxtimer: 0x00000000227c7a81: abort rx timeout. Force session deactivation [ 859.846142][ T4835] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 859.892157][ T4835] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 860.157252][ C0] vcan0: j1939_tp_rxtimer: 0x000000005851dad7: abort rx timeout. Force session deactivation [ 860.830309][ T4839] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 860.846356][ T4839] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 867.074122][ C0] vcan0: j1939_tp_rxtimer: 0x000000003e8a357e: rx timeout, send abort [ 867.575269][ C0] vcan0: j1939_tp_rxtimer: 0x0000000001578c28: rx timeout, send abort [ 867.576627][ C0] vcan0: j1939_tp_rxtimer: 0x000000003e8a357e: abort rx timeout. Force session deactivation [ 868.076640][ C0] vcan0: j1939_tp_rxtimer: 0x0000000001578c28: abort rx timeout. Force session deactivation [ 875.477716][ C0] vcan0: j1939_tp_rxtimer: 0x00000000f24f1969: rx timeout, send abort [ 875.978346][ C0] vcan0: j1939_tp_rxtimer: 0x000000008faef93c: rx timeout, send abort [ 875.979562][ C0] vcan0: j1939_tp_rxtimer: 0x00000000f24f1969: abort rx timeout. Force session deactivation [ 876.479600][ C0] vcan0: j1939_tp_rxtimer: 0x000000008faef93c: abort rx timeout. Force session deactivation [ 890.893709][ C0] vcan0: j1939_tp_rxtimer: 0x00000000175c7d07: rx timeout, send abort [ 891.393618][ C0] vcan0: j1939_tp_rxtimer: 0x00000000568e6808: rx timeout, send abort [ 891.395436][ C0] vcan0: j1939_tp_rxtimer: 0x00000000175c7d07: abort rx timeout. Force session deactivation [ 891.448609][ T30] audit: type=1400 audit(890.880:255): avc: denied { getopt } for pid=4882 comm="syz.0.518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 891.895952][ C0] vcan0: j1939_tp_rxtimer: 0x00000000568e6808: abort rx timeout. Force session deactivation [ 892.288756][ T4887] xt_TPROXY: Can be used only with -p tcp or -p udp [ 895.392898][ C0] vcan0: j1939_tp_rxtimer: 0x00000000eebb965d: rx timeout, send abort [ 895.894527][ C0] vcan0: j1939_tp_rxtimer: 0x00000000f4b64544: rx timeout, send abort [ 895.895734][ C0] vcan0: j1939_tp_rxtimer: 0x00000000eebb965d: abort rx timeout. Force session deactivation [ 896.395839][ C0] vcan0: j1939_tp_rxtimer: 0x00000000f4b64544: abort rx timeout. Force session deactivation [ 900.231884][ C0] vcan0: j1939_tp_rxtimer: 0x00000000b7683001: rx timeout, send abort [ 900.731969][ C0] vcan0: j1939_tp_rxtimer: 0x00000000bdb65acb: rx timeout, send abort [ 900.732730][ C0] vcan0: j1939_tp_rxtimer: 0x00000000b7683001: abort rx timeout. Force session deactivation [ 901.233560][ C0] vcan0: j1939_tp_rxtimer: 0x00000000bdb65acb: abort rx timeout. Force session deactivation [ 902.090905][ T4908] SELinux: failed to load policy [ 905.326914][ T30] audit: type=1400 audit(904.770:256): avc: denied { unmount } for pid=3332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 905.337574][ C0] vcan0: j1939_tp_rxtimer: 0x000000002597cd43: rx timeout, send abort [ 905.838367][ C0] vcan0: j1939_tp_rxtimer: 0x000000002597cd43: abort rx timeout. Force session deactivation [ 905.840082][ C0] vcan0: j1939_tp_rxtimer: 0x00000000b1abd5cc: rx timeout, send abort [ 906.341192][ C0] vcan0: j1939_tp_rxtimer: 0x00000000b1abd5cc: abort rx timeout. Force session deactivation [ 913.966782][ T4930] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 913.990504][ T4930] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 917.556484][ C0] vcan0: j1939_tp_rxtimer: 0x00000000df684231: rx timeout, send abort [ 918.058435][ C0] vcan0: j1939_tp_rxtimer: 0x00000000df684231: abort rx timeout. Force session deactivation [ 918.061688][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e98c853a: rx timeout, send abort [ 918.562618][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e98c853a: abort rx timeout. Force session deactivation [ 932.923678][ C1] vcan0: j1939_tp_rxtimer: 0x00000000a3e7740c: rx timeout, send abort [ 933.424784][ C1] vcan0: j1939_tp_rxtimer: 0x000000003c7618d0: rx timeout, send abort [ 933.425503][ C1] vcan0: j1939_tp_rxtimer: 0x00000000a3e7740c: abort rx timeout. Force session deactivation [ 933.925539][ C1] vcan0: j1939_tp_rxtimer: 0x000000003c7618d0: abort rx timeout. Force session deactivation [ 959.193843][ C1] sched: DL replenish lagged too much [ 1358.589311][ C0] BUG: workqueue lockup - pool cpus=0 node=0 flags=0x0 nice=0 stuck for 44s! [ 1358.592439][ C0] Showing busy workqueues and worker pools: [ 1358.592967][ C0] workqueue events: flags=0x100 [ 1358.594215][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=6 refcnt=7 [ 1358.594839][ C0] in-flight: 3791:nsim_fib_event_work nsim_fib_event_work [ 1358.596261][ C0] pending: psi_avgs_work, vmstat_shepherd, psi_avgs_work, drm_fb_helper_damage_work [ 1358.597766][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=2 refcnt=3 [ 1358.598136][ C0] pending: 2*nsim_dev_hwstats_traffic_work [ 1358.598557][ C0] workqueue events_unbound: flags=0x2 [ 1358.598847][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=1 refcnt=2 [ 1358.599248][ C0] pending: flush_memcg_stats_dwork [ 1358.599620][ C0] workqueue events_unbound: flags=0x2 [ 1358.599823][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=2 refcnt=3 [ 1358.600082][ C0] in-flight: 4801:linkwatch_event [ 1358.600359][ C0] pending: nsim_dev_trap_report_work [ 1358.600673][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=1 refcnt=2 [ 1358.600933][ C0] in-flight: 3699:nsim_dev_trap_report_work [ 1358.601367][ C0] workqueue events_power_efficient: flags=0x182 [ 1358.601672][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=2 refcnt=3 [ 1358.602018][ C0] in-flight: 26:gc_worker [ 1358.602268][ C0] pending: fb_flashcursor [ 1358.602623][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=1 refcnt=2 [ 1358.602883][ C0] in-flight: 1545:wg_ratelimiter_gc_entries [ 1358.603911][ C0] workqueue mm_percpu_wq: flags=0x8 [ 1358.604127][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 1358.604458][ C0] pending: vmstat_update [ 1358.604776][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 1358.605077][ C0] pending: vmstat_update [ 1358.605691][ C0] workqueue ipv6_addrconf: flags=0x6000a [ 1358.605906][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=1 refcnt=7 [ 1358.606185][ C0] in-flight: 2074(RESCUER):addrconf_verify_work [ 1358.606524][ C0] inactive: 2*addrconf_verify_work [ 1358.607025][ C0] workqueue wg-kex-wg0: flags=0x6 [ 1358.607245][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=2 refcnt=3 [ 1358.607543][ C0] in-flight: 814:wg_packet_handshake_send_worker [ 1358.607796][ C0] pending: wg_packet_handshake_send_worker [ 1358.608158][ C0] workqueue wg-kex-wg1: flags=0x6 [ 1358.608402][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=2 refcnt=3 [ 1358.608653][ C0] pending: 2*wg_packet_handshake_send_worker [ 1358.609021][ C0] workqueue wg-kex-wg2: flags=0x6 [ 1358.609215][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=2 refcnt=3 [ 1358.609477][ C0] in-flight: 1565:wg_packet_handshake_send_worker [ 1358.609711][ C0] pending: wg_packet_handshake_send_worker [ 1358.610072][ C0] workqueue wg-kex-wg0: flags=0x124 [ 1358.610261][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=2 refcnt=3 [ 1358.610539][ C0] in-flight: 3321:wg_packet_handshake_receive_worker [ 1358.610771][ C0] pending: wg_packet_handshake_receive_worker [ 1358.611107][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=2 refcnt=3 [ 1358.611448][ C0] in-flight: 3774:wg_packet_handshake_receive_worker wg_packet_handshake_receive_worker [ 1358.611889][ C0] workqueue wg-kex-wg0: flags=0x6 [ 1358.612077][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=1 refcnt=2 [ 1358.612306][ C0] in-flight: 1554:wg_packet_handshake_send_worker [ 1358.612795][ C0] workqueue wg-kex-wg1: flags=0x124 [ 1358.613617][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 1358.613848][ C0] in-flight: 784:wg_packet_handshake_receive_worker [ 1358.614240][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=2 refcnt=3 [ 1358.614470][ C0] in-flight: 3322:wg_packet_handshake_receive_worker wg_packet_handshake_receive_worker [ 1358.614813][ C0] workqueue wg-kex-wg1: flags=0x6 [ 1358.614992][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=2 refcnt=3 [ 1358.615170][ C0] in-flight: 12:wg_packet_handshake_send_worker [ 1358.615347][ C0] pending: wg_packet_handshake_send_worker [ 1358.615598][ C0] workqueue wg-kex-wg2: flags=0x124 [ 1358.615754][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=2 refcnt=3 [ 1358.615955][ C0] in-flight: 10:wg_packet_handshake_receive_worker wg_packet_handshake_receive_worker [ 1358.616281][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=2 refcnt=3 [ 1358.616487][ C0] in-flight: 785:wg_packet_handshake_receive_worker wg_packet_handshake_receive_worker [ 1358.616948][ C0] workqueue wg-kex-wg2: flags=0x6 [ 1358.617121][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=2 refcnt=3 [ 1358.617295][ C0] in-flight: 1006:wg_packet_handshake_send_worker [ 1358.617473][ C0] pending: wg_packet_handshake_send_worker [ 1358.618155][ C0] pool 2: cpus=0 node=0 flags=0x0 nice=0 hung=44s workers=6 idle: 9 3900 [ 1358.618883][ C0] pool 6: cpus=1 node=0 flags=0x0 nice=0 hung=1s workers=7 idle: 3477 3475 4981 4871 [ 1358.619708][ C0] pool 8: cpus=0-1 flags=0x6 nice=0 hung=0s workers=10 manager: 4556 [ 1358.620400][ C0] Showing backtraces of running workers in stalled CPU-bound worker pools: [ 1358.620911][ C0] pool 2: [ 1358.621759][ C0] task:kworker/0:3 state:R running task stack:0 pid:3321 tgid:3321 ppid:2 task_flags:0x4208060 flags:0x00000010 [ 1358.622789][ C0] Workqueue: wg-kex-wg0 wg_packet_handshake_receive_worker [ 1358.623390][ C0] Call trace: [ 1358.623716][ C0] __switch_to+0x208/0x4f0 (T) [ 1358.624071][ C0] __schedule+0xcfc/0x2fec [ 1358.624181][ C0] preempt_schedule+0xf4/0x254 [ 1358.624281][ C0] _raw_spin_unlock_irqrestore+0x94/0xac [ 1358.624398][ C0] debug_check_no_obj_freed+0x278/0x500 [ 1358.624501][ C0] __free_frozen_pages+0x374/0x121c [ 1358.624600][ C0] free_frozen_pages+0x14/0x20 [ 1358.624695][ C0] __free_slab+0xe8/0x1ac [ 1358.624794][ C0] free_slab+0x30/0x104 [ 1358.624889][ C0] __put_partials+0x15c/0x1f0 [ 1358.624984][ C0] put_cpu_partial+0x1c8/0x364 [ 1358.625077][ C0] __slab_free+0x270/0x348 [ 1358.625172][ C0] ___cache_free+0xc4/0xd8 [ 1358.625268][ C0] qlist_free_all+0x78/0x130 [ 1358.625373][ C0] kasan_quarantine_reduce+0x148/0x19c [ 1358.625470][ C0] __kasan_kmalloc+0x8c/0xbc [ 1358.625568][ C0] __kmalloc_cache_noprof+0x2c0/0x710 [ 1358.625663][ C0] wg_noise_handshake_begin_session+0xe0/0xa64 [ 1358.625770][ C0] wg_packet_send_handshake_response+0x1a8/0x250 [ 1358.625881][ C0] wg_receive_handshake_packet+0x1b8/0x810 [ 1358.626017][ C0] wg_packet_handshake_receive_worker+0xd8/0x314 [ 1358.626129][ C0] process_one_work+0x7cc/0x18d4 [ 1358.626305][ C0] worker_thread+0x734/0xb84 [ 1358.626416][ C0] kthread+0x348/0x5fc [ 1358.626524][ C0] ret_from_fork+0x10/0x20 [ 1358.626894][ C0] pool 2: [ 1358.626969][ C0] task:kworker/0:5 state:R running task stack:0 pid:3791 tgid:3791 ppid:2 task_flags:0x4208060 flags:0x00000010 [ 1358.627187][ C0] Workqueue: events nsim_fib_event_work [ 1358.627316][ C0] Call trace: [ 1358.627389][ C0] __switch_to+0x208/0x4f0 (T) [ 1358.627506][ C0] __schedule+0xcfc/0x2fec [ 1358.627615][ C0] preempt_schedule+0xf4/0x254 [ 1358.627716][ C0] _raw_spin_unlock_irqrestore+0x94/0xac [ 1358.627817][ C0] __put_partials+0x108/0x1f0 [ 1358.627917][ C0] put_cpu_partial+0x1c8/0x364 [ 1358.628020][ C0] __slab_free+0x270/0x348 [ 1358.628122][ C0] ___cache_free+0xc4/0xd8 [ 1358.628226][ C0] qlist_free_all+0x78/0x130 [ 1358.628356][ C0] kasan_quarantine_reduce+0x148/0x19c [ 1358.628459][ C0] __kasan_slab_alloc+0x60/0x90 [ 1358.628567][ C0] __kmalloc_cache_noprof+0x260/0x710 [ 1358.628671][ C0] nsim_fib6_rt_nh_add+0x4c/0x220 [ 1358.628776][ C0] nsim_fib_event_work+0x9f8/0x4038 [ 1358.628871][ C0] process_one_work+0x7cc/0x18d4 [ 1358.628974][ C0] worker_thread+0x734/0xb84 [ 1358.629074][ C0] kthread+0x348/0x5fc [ 1358.629177][ C0] ret_from_fork+0x10/0x20 [ 1358.629288][ C0] pool 2: [ 1358.629357][ C0] task:kworker/0:1 state:R running task stack:0 pid:10 tgid:10 ppid:2 task_flags:0x4208060 flags:0x00000010 [ 1358.629554][ C0] Workqueue: wg-kex-wg2 wg_packet_handshake_receive_worker [ 1358.629693][ C0] Call trace: [ 1358.629748][ C0] __switch_to+0x208/0x4f0 (T) [ 1358.629867][ C0] __schedule+0xcfc/0x2fec [ 1358.630000][ C0] preempt_schedule+0xf4/0x254 [ 1358.630101][ C0] __local_bh_enable_ip+0x384/0x4a4 [ 1358.630205][ C0] wg_timers_any_authenticated_packet_traversal+0x188/0x264 [ 1358.630314][ C0] wg_packet_send_handshake_response+0x1c0/0x250 [ 1358.630437][ C0] wg_receive_handshake_packet+0x1b8/0x810 [ 1358.630549][ C0] wg_packet_handshake_receive_worker+0xd8/0x314 [ 1358.630657][ C0] process_one_work+0x7cc/0x18d4 [ 1358.630755][ C0] worker_thread+0x734/0xb84 [ 1358.630849][ C0] kthread+0x348/0x5fc [ 1358.630954][ C0] ret_from_fork+0x10/0x20 [ 1358.631057][ C0] pool 2: [ 1358.631118][ C0] task:kworker/0:2 state:R running task stack:0 pid:784 tgid:784 ppid:2 task_flags:0x4208060 flags:0x00000010 [ 1358.631437][ C0] Workqueue: wg-kex-wg1 wg_packet_handshake_receive_worker [ 1358.631655][ C0] Call trace: [ 1358.631716][ C0] __switch_to+0x208/0x4f0 (T) [ 1358.631834][ C0] __schedule+0xcfc/0x2fec [ 1358.631938][ C0] preempt_schedule_irq+0x80/0x1a0 [ 1358.632037][ C0] raw_irqentry_exit_cond_resched+0x40/0x44 [ 1358.632154][ C0] irqentry_exit+0x18c/0x474 [ 1358.632253][ C0] exit_to_kernel_mode+0x10/0x1c [ 1358.632375][ C0] el1_interrupt+0x4c/0x60 [ 1358.632479][ C0] el1h_64_irq_handler+0x18/0x24 [ 1358.632574][ C0] el1h_64_irq+0x6c/0x70 [ 1358.632784][ C0] memcpy+0x58/0x9c (P) [ 1358.632905][ C0] ladder_cmult.constprop.0+0xb70/0x33d0 [ 1358.633085][ C0] curve25519_generic+0x2b0/0x3cf0 [ 1358.633193][ C0] curve25519+0x18/0x44 [ 1358.633288][ C0] mix_dh+0x90/0x11c [ 1358.633401][ C0] wg_noise_handshake_create_response+0x2e4/0x4d4 [ 1358.633510][ C0] wg_packet_send_handshake_response+0xc4/0x250 [ 1358.633629][ C0] wg_receive_handshake_packet+0x1b8/0x810 [ 1358.633739][ C0] wg_packet_handshake_receive_worker+0xd8/0x314 [ 1358.633843][ C0] process_one_work+0x7cc/0x18d4 [ 1358.633963][ C0] worker_thread+0x734/0xb84 [ 1358.634069][ C0] kthread+0x348/0x5fc [ 1358.634178][ C0] ret_from_fork+0x10/0x20 [ 1389.205881][ C0] BUG: workqueue lockup - pool cpus=0 node=0 flags=0x0 nice=0 stuck for 74s! [ 1389.206582][ C0] Showing busy workqueues and worker pools: [ 1389.206661][ C0] workqueue events: flags=0x100 [ 1389.206779][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=7 refcnt=8 [ 1389.207071][ C0] in-flight: 3791:nsim_fib_event_work nsim_fib_event_work [ 1389.207475][ C0] pending: psi_avgs_work, vmstat_shepherd, psi_avgs_work, drm_fb_helper_damage_work, psi_avgs_work [ 1389.208092][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=2 refcnt=3 [ 1389.208379][ C0] pending: 2*nsim_dev_hwstats_traffic_work [ 1389.208588][ C0] workqueue events_unbound: flags=0x2 [ 1389.208682][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=1 refcnt=2 [ 1389.208936][ C0] pending: flush_memcg_stats_dwork [ 1389.209181][ C0] workqueue events_unbound: flags=0x2 [ 1389.209271][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=3 refcnt=4 [ 1389.209498][ C0] in-flight: 4801:linkwatch_event [ 1389.209752][ C0] pending: 2*nsim_dev_trap_report_work [ 1389.209976][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=1 refcnt=2 [ 1389.210206][ C0] pending: crng_reseed [ 1389.210415][ C0] workqueue events_power_efficient: flags=0x182 [ 1389.210505][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=2 refcnt=3 [ 1389.210740][ C0] in-flight: 3699:neigh_periodic_work ,12:gc_worker [ 1389.211310][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=3 refcnt=4 [ 1389.211546][ C0] in-flight: 1545:wg_ratelimiter_gc_entries [ 1389.211823][ C0] pending: neigh_periodic_work, fb_flashcursor [ 1389.212131][ C0] workqueue mm_percpu_wq: flags=0x8 [ 1389.212222][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 1389.212487][ C0] pending: vmstat_update [ 1389.212696][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 1389.213002][ C0] pending: vmstat_update [ 1389.214425][ C0] workqueue ipv6_addrconf: flags=0x6000a [ 1389.214642][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=1 refcnt=7 [ 1389.214919][ C0] in-flight: 2074(RESCUER):addrconf_verify_work [ 1389.215223][ C0] inactive: 2*addrconf_verify_work [ 1389.215528][ C0] workqueue wg-kex-wg1: flags=0x6 [ 1389.215629][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=1 refcnt=2 [ 1389.215856][ C0] in-flight: 26:wg_packet_handshake_send_worker [ 1389.216125][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=1 refcnt=2 [ 1389.216350][ C0] pending: wg_packet_handshake_send_worker [ 1389.216567][ C0] workqueue wg-kex-wg2: flags=0x6 [ 1389.216686][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=2 refcnt=3 [ 1389.216914][ C0] in-flight: 1554:wg_packet_handshake_send_worker [ 1389.217144][ C0] pending: wg_packet_handshake_send_worker [ 1389.217382][ C0] workqueue wg-kex-wg0: flags=0x124 [ 1389.217475][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 1389.217776][ C0] pending: wg_packet_handshake_receive_worker [ 1389.218021][ C0] workqueue wg-kex-wg0: flags=0x6 [ 1389.218104][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=2 refcnt=3 [ 1389.218313][ C0] in-flight: 814:wg_packet_handshake_send_worker [ 1389.218553][ C0] pending: wg_packet_handshake_send_worker [ 1389.218797][ C0] workqueue wg-kex-wg1: flags=0x124 [ 1389.218891][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=2 refcnt=3 [ 1389.219151][ C0] in-flight: 784:wg_packet_handshake_receive_worker [ 1389.219407][ C0] pending: wg_packet_handshake_receive_worker [ 1389.219883][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=2 refcnt=3 [ 1389.220259][ C0] in-flight: 3322:wg_packet_handshake_receive_worker wg_packet_handshake_receive_worker [ 1389.220687][ C0] workqueue wg-kex-wg1: flags=0x6 [ 1389.220784][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=1 refcnt=2 [ 1389.221029][ C0] pending: wg_packet_handshake_send_worker [ 1389.221236][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=1 refcnt=2 [ 1389.221493][ C0] pending: wg_packet_handshake_send_worker [ 1389.222031][ C0] workqueue wg-kex-wg2: flags=0x6 [ 1389.222264][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=1 refcnt=2 [ 1389.222559][ C0] pending: wg_packet_handshake_send_worker [ 1389.222813][ C0] pwq 8: cpus=0-1 flags=0x6 nice=0 active=2 refcnt=3 [ 1389.223181][ C0] in-flight: 1565:wg_packet_handshake_send_worker ,1006:wg_packet_handshake_send_worker [ 1389.224292][ C0] pool 2: cpus=0 node=0 flags=0x0 nice=0 hung=74s workers=6 idle: 10 3321 9 3900 [ 1389.225129][ C0] pool 6: cpus=1 node=0 flags=0x0 nice=0 hung=0s workers=7 idle: 3477 785 3774 3475 4981 4871 [ 1389.226079][ C0] pool 8: cpus=0-1 flags=0x6 nice=0 hung=2s workers=10 manager: 4556 [ 1389.226461][ C0] Showing backtraces of running workers in stalled CPU-bound worker pools: [ 1389.226574][ C0] pool 2: [ 1389.226660][ C0] task:kworker/0:5 state:R running task stack:0 pid:3791 tgid:3791 ppid:2 task_flags:0x4208060 flags:0x00000010 [ 1389.226884][ C0] Workqueue: events nsim_fib_event_work [ 1389.227015][ C0] Call trace: [ 1389.227067][ C0] __switch_to+0x208/0x4f0 (T) [ 1389.227203][ C0] __schedule+0xcfc/0x2fec [ 1389.227302][ C0] preempt_schedule_irq+0x80/0x1a0 [ 1389.227401][ C0] raw_irqentry_exit_cond_resched+0x40/0x44 [ 1389.227513][ C0] irqentry_exit+0x18c/0x474 [ 1389.227631][ C0] exit_to_kernel_mode+0x10/0x1c [ 1389.227822][ C0] el1_interrupt+0x4c/0x60 [ 1389.227937][ C0] el1h_64_irq_handler+0x18/0x24 [ 1389.228062][ C0] el1h_64_irq+0x6c/0x70 [ 1389.228306][ C0] kasan_get_free_meta+0x0/0x18 (P) VM DIAGNOSIS: 17:22:40 Registers: info registers vcpu 0 CPU#0 PC=ffff8000855cc440 X00=ffff8000855cc43c X01=ffff800083f052f8 X02=0000000000000000 X03=ffff800080429ad8 X04=ffff700011a96e49 X05=ffff80008d4b7240 X06=ffff700011a96e48 X07=0000000000000001 X08=ffff80008d4b7243 X09=dfff800000000000 X10=ffff700011a96e48 X11=1ffff00011a96e48 X12=ffff700011a96e49 X13=0000000000000000 X14=0000000000000000 X15=ffff0000131e7040 X16=00000000f2f2f2f2 X17=ffff0000131e7010 X18=0000000000000004 X19=ffff80008d4b7240 X20=0000013e478ca600 X21=ffff8000848ebfac X22=dfff800000000000 X23=ffff80008d4b7000 X24=0000000000042904 X25=ffff8000887f9460 X26=01ffffffffffffff X27=ffff00002f26ab40 X28=ffff00000f6fb800 X29=ffff80008d7d69c0 X30=ffff800083f05310 SP=ffff80008d7d69c0 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0c00000000000000:0c00000000000000 Q01=0000000c00000000:0000000000000000 Q02=000000000000000c:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=000000000000000c:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffde9558a0:0000ffffde9558a0 Q17=ffffff80ffffffd0:0000ffffde955870 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800080462374 X00=ffff00000e18ca98 X01=ffff00000e18ca00 X02=0000000000000000 X03=1fffe00001d06ab1 X04=1fffe00001d06ab1 X05=ffff80008d7e7ac8 X06=ffff80008d7e7ae0 X07=ffff80008d7e7b90 X08=ffff80008d7e7c27 X09=dfff800000000000 X10=ffff700011afcf84 X11=1ffff00011afcf84 X12=ffff700011afcf85 X13=0000000000000000 X14=00004c4b40000000 X15=0000000000000000 X16=ffff80008d7e0000 X17=ffff7fffe2d65000 X18=ffff80008d7e78ac X19=ffff8000855ebc1c X20=ffff00006a054ac8 X21=0000000000000000 X22=0000000000000001 X23=0000000000000001 X24=ffff00006a054af8 X25=1fffe0000d40a958 X26=1fffe0000d40a957 X27=0000000000000002 X28=ffff800085671c60 X29=ffff80008d7e7c90 X30=ffff80008032e6ac SP=ffff80008d7e7d30 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=ffff000000000000:0000000000000000 Q02=0000000000000000:ff00000000000000 Q03=00000000ff000000:0000000000000000 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:cccc30c000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffcf37e5c0:0000ffffcf37e5c0 Q17=ffffff80ffffffd8:0000ffffcf37e590 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000