last executing test programs: 1h7m35.658686985s ago: executing program 1 (id=779): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) prlimit64(0x0, 0x7, &(0x7f0000000140), 0x0) accept(r0, 0x0, 0x0) 1h7m35.252149342s ago: executing program 1 (id=781): r0 = openat$dsp1(0xffffff9c, &(0x7f0000000000), 0x8600, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r0, 0xc0045004, 0x0) readv(r0, 0x0, 0x0) 1h7m34.180290727s ago: executing program 1 (id=784): r0 = socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) syncfs(r0) 1h7m33.359469381s ago: executing program 1 (id=787): r0 = syz_open_procfs$pagemap(0x0, &(0x7f00000000c0)) r1 = ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) ioctl$TIOCSBRK(r1, 0x5450) 1h7m32.92812427s ago: executing program 1 (id=788): r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x10) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 1h7m32.357312924s ago: executing program 1 (id=790): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000400)={&(0x7f0000000200), 0xc, &(0x7f00000003c0)={0x0}}, 0x0) 1h6m45.901976755s ago: executing program 32 (id=790): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000400)={&(0x7f0000000200), 0xc, &(0x7f00000003c0)={0x0}}, 0x0) 21m54.080292961s ago: executing program 0 (id=7947): r0 = syz_clone(0x0, 0x0, 0x9, 0x0, 0x0, 0x0) r1 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) kcmp(r0, r0, 0x3, 0xffffffffffffffff, r1) 21m53.191421451s ago: executing program 0 (id=7949): pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$P9_RSYMLINK(r0, &(0x7f0000000080)={0x14}, 0xfffffffffffffd07) write$P9_RLERROR(r0, &(0x7f00000000c0)={0xb, 0x7, 0x0, {0x2, '.!'}}, 0xb) 21m52.097760425s ago: executing program 0 (id=7951): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f00000000c0)=0x80) write$P9_RATTACH(r1, 0x0, 0x0) 21m51.226207765s ago: executing program 0 (id=7953): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$HIDIOCGVERSION(r1, 0x80044801, 0x0) 21m49.940037784s ago: executing program 0 (id=7957): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x10) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x1e80c2, 0x0) 21m48.894348877s ago: executing program 0 (id=7959): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) write$nbd(r1, 0x0, 0x0) 21m2.856876416s ago: executing program 33 (id=7959): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) write$nbd(r1, 0x0, 0x0) 27.962838404s ago: executing program 2 (id=11097): r0 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$binder_debug(0xffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) dup2(r0, r1) ioctl$HIDIOCGFEATURE(r1, 0xc0404807, &(0x7f00000000c0)={0x0, "ef162229b372ac3fff4c830d92a41c93fce5beaa6383d8559b7cf4ad165dfada20bc33b59a106d93ee7fb0f80f3650c0d1856cfb071b573305816ca047fda6c7"}) 27.657242986s ago: executing program 2 (id=11099): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup2(r1, r0) sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}, 0x1, 0x0, 0x0, 0x4000001}, 0x1) 27.167016825s ago: executing program 2 (id=11101): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x10) 26.662308784s ago: executing program 2 (id=11103): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x262) 26.041141229s ago: executing program 2 (id=11105): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x25, &(0x7f0000000680), 0x4) 25.212728931s ago: executing program 2 (id=11107): r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001140), 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000080)) 25.139561524s ago: executing program 34 (id=11107): r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001140), 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000080)) 1.878811227s ago: executing program 3 (id=11139): r0 = signalfd(0xffffffffffffffff, &(0x7f0000001680), 0x8) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002a80)) sendto$inet_nvme_icreq_pdu(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 1.220867253s ago: executing program 3 (id=11140): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={0x0, 0xea60}, 0x10) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e23, 0xa4e4, @remote, 0x3}, 0x1c) sendmmsg(r0, &(0x7f0000001000)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10) 888.561276ms ago: executing program 3 (id=11141): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.time_recursive\x00', 0x26e1, 0x0) close(r0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x14}, 0x1, 0x0, 0x0, 0x40004}, 0x8800) 578.241467ms ago: executing program 3 (id=11142): r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r0, r1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x6, 0xb, 0x0, &(0x7f0000000000)) 296.277068ms ago: executing program 3 (id=11143): r0 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x40041}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x24000000}, 0x8c0) 0s ago: executing program 3 (id=11144): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000a80)={0x48, r1, 0x1, 0xfffffffe, 0x0, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xfb2e77a8993c191f}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffff}]}, 0x48}}, 0x20000000) kernel console output (not intermixed with test programs): sit0: entered allmulticast mode [ 867.437392][ T6443] ip6tnl0: entered promiscuous mode [ 867.438202][ T6443] ip6tnl0: entered allmulticast mode [ 867.492481][ T6443] ip6gre0: entered promiscuous mode [ 867.493181][ T6443] ip6gre0: entered allmulticast mode [ 867.568539][ T6443] syz_tun: entered promiscuous mode [ 867.569332][ T6443] syz_tun: entered allmulticast mode [ 867.619695][ T6443] ip6gretap0: entered promiscuous mode [ 867.681370][ T6443] ip6gretap0: entered allmulticast mode [ 867.724130][ T6443] vcan0: entered promiscuous mode [ 867.724944][ T6443] vcan0: entered allmulticast mode [ 867.744828][ T6443] bond0: entered promiscuous mode [ 867.763211][ T6443] bond_slave_0: entered promiscuous mode [ 867.766463][ T6443] bond_slave_1: entered promiscuous mode [ 867.768220][ T6443] bond0: entered allmulticast mode [ 867.768901][ T6443] bond_slave_0: entered allmulticast mode [ 867.769228][ T6443] bond_slave_1: entered allmulticast mode [ 867.822934][ T6443] dummy0: entered promiscuous mode [ 867.823747][ T6443] dummy0: entered allmulticast mode [ 867.875297][ T6443] nlmon0: entered promiscuous mode [ 867.876199][ T6443] nlmon0: entered allmulticast mode [ 867.917396][ T6443] vxcan0: entered promiscuous mode [ 867.918268][ T6443] vxcan0: entered allmulticast mode [ 867.957652][ T6443] vxcan1: entered promiscuous mode [ 867.958461][ T6443] vxcan1: entered allmulticast mode [ 868.009942][ T6443] veth0: entered promiscuous mode [ 868.036760][ T6443] veth0: entered allmulticast mode [ 868.124080][ T6443] veth1: entered promiscuous mode [ 868.128067][ T6443] veth1: entered allmulticast mode [ 868.206574][ T6443] wg0: entered promiscuous mode [ 868.207386][ T6443] wg0: entered allmulticast mode [ 868.263945][ T6443] wg1: entered promiscuous mode [ 868.264682][ T6443] wg1: entered allmulticast mode [ 868.307308][ T6443] wg2: entered promiscuous mode [ 868.328170][ T6443] wg2: entered allmulticast mode [ 868.357593][ T6443] veth0_to_bridge: entered promiscuous mode [ 868.358435][ T6443] veth0_to_bridge: entered allmulticast mode [ 868.395850][ T6443] bridge_slave_0: entered promiscuous mode [ 868.396747][ T6443] bridge_slave_0: entered allmulticast mode [ 868.439205][ T6443] veth1_to_bridge: entered promiscuous mode [ 868.443424][ T6443] veth1_to_bridge: entered allmulticast mode [ 868.455773][ T6443] bridge_slave_1: entered promiscuous mode [ 868.458330][ T6443] bridge_slave_1: entered allmulticast mode [ 868.477988][ T6443] veth0_to_bond: entered promiscuous mode [ 868.522431][ T6443] veth0_to_bond: entered allmulticast mode [ 868.574600][ T6443] veth1_to_bond: entered promiscuous mode [ 868.577116][ T6443] veth1_to_bond: entered allmulticast mode [ 868.592651][ T6443] veth0_to_team: entered promiscuous mode [ 868.594748][ T6443] veth0_to_team: entered allmulticast mode [ 868.606710][ T6443] team_slave_0: entered promiscuous mode [ 868.608979][ T6443] team_slave_0: entered allmulticast mode [ 868.635887][ T6443] veth1_to_team: entered promiscuous mode [ 868.639168][ T6443] veth1_to_team: entered allmulticast mode [ 868.683284][ T6443] team_slave_1: entered promiscuous mode [ 868.684099][ T6443] team_slave_1: entered allmulticast mode [ 868.708604][ T6443] veth0_to_batadv: entered promiscuous mode [ 868.709512][ T6443] veth0_to_batadv: entered allmulticast mode [ 868.729413][ T6443] batadv_slave_0: entered promiscuous mode [ 868.734660][ T6443] batadv_slave_0: entered allmulticast mode [ 868.837207][ T6443] veth1_to_batadv: entered promiscuous mode [ 868.838756][ T6443] veth1_to_batadv: entered allmulticast mode [ 868.868723][ T6443] batadv_slave_1: entered promiscuous mode [ 868.870934][ T6443] batadv_slave_1: entered allmulticast mode [ 868.878502][ T6443] xfrm0: entered promiscuous mode [ 868.901991][ T6443] xfrm0: entered allmulticast mode [ 868.908002][ T6443] veth0_to_hsr: entered promiscuous mode [ 868.925251][ T6443] veth0_to_hsr: entered allmulticast mode [ 868.985892][ T6443] hsr_slave_0: entered allmulticast mode [ 869.049434][ T6443] veth1_to_hsr: entered promiscuous mode [ 869.114797][ T6443] veth1_to_hsr: entered allmulticast mode [ 869.119704][ T6443] hsr_slave_1: entered allmulticast mode [ 869.146230][ T6443] hsr0: entered promiscuous mode [ 869.184091][ T6443] hsr0: entered allmulticast mode [ 869.262915][ T6443] veth1_virt_wifi: entered promiscuous mode [ 869.263668][ T6443] veth1_virt_wifi: entered allmulticast mode [ 869.289670][ T6443] veth0_virt_wifi: entered promiscuous mode [ 869.305001][ T6443] veth0_virt_wifi: entered allmulticast mode [ 869.369386][ T6443] veth1_vlan: entered allmulticast mode [ 869.413827][ T6443] veth0_vlan: entered allmulticast mode [ 869.426863][ T6443] vlan0: entered promiscuous mode [ 869.436155][ T6443] vlan0: entered allmulticast mode [ 869.449238][ T6443] vlan1: entered promiscuous mode [ 869.453673][ T6443] vlan1: entered allmulticast mode [ 869.469734][ T6443] macvlan0: entered promiscuous mode [ 869.494087][ T6443] macvlan0: entered allmulticast mode [ 869.538323][ T6443] macvlan1: entered promiscuous mode [ 869.546352][ T6443] macvlan1: entered allmulticast mode [ 869.556346][ T6443] ipvlan0: entered promiscuous mode [ 869.557801][ T6443] ipvlan0: entered allmulticast mode [ 869.570809][ T6443] ipvlan1: entered promiscuous mode [ 869.572172][ T6443] ipvlan1: entered allmulticast mode [ 869.587243][ T6443] veth1_macvtap: entered allmulticast mode [ 869.593773][ T6443] veth0_macvtap: entered allmulticast mode [ 869.598303][ T6443] macvtap0: entered promiscuous mode [ 869.602031][ T6443] macvtap0: entered allmulticast mode [ 869.606932][ T6443] macsec0: entered promiscuous mode [ 869.609277][ T6443] macsec0: entered allmulticast mode [ 869.618107][ T6443] geneve0: entered promiscuous mode [ 869.619548][ T6443] geneve0: entered allmulticast mode [ 869.632254][ T6443] geneve1: entered promiscuous mode [ 869.633669][ T6443] geneve1: entered allmulticast mode [ 869.638776][ T6443] netdevsim netdevsim0 netdevsim0: entered promiscuous mode [ 869.644211][ T6443] netdevsim netdevsim0 netdevsim0: entered allmulticast mode [ 869.652683][ T6443] netdevsim netdevsim0 netdevsim1: entered promiscuous mode [ 869.654416][ T6443] netdevsim netdevsim0 netdevsim1: entered allmulticast mode [ 869.659786][ T6443] netdevsim netdevsim0 netdevsim2: entered promiscuous mode [ 869.667883][ T6443] netdevsim netdevsim0 netdevsim2: entered allmulticast mode [ 869.673581][ T6443] netdevsim netdevsim0 netdevsim3: entered promiscuous mode [ 869.675167][ T6443] netdevsim netdevsim0 netdevsim3: entered allmulticast mode [ 869.681485][ T6443] sit1: entered promiscuous mode [ 869.683108][ T6443] sit1: entered allmulticast mode [ 874.997252][ T6467] block nbd2: shutting down sockets [ 890.700034][ T6570] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6570 comm=syz.2.1439 [ 899.825788][ T30] audit: type=1400 audit(899.300:226): avc: denied { bind } for pid=6622 comm="syz.0.1465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 910.164585][ T30] audit: type=1400 audit(909.640:227): avc: denied { bind } for pid=6657 comm="syz.2.1481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 910.271274][ T30] audit: type=1400 audit(909.740:228): avc: denied { write } for pid=6657 comm="syz.2.1481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 928.602265][ T30] audit: type=1400 audit(928.070:229): avc: denied { bind } for pid=6742 comm="syz.2.1521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 932.916458][ T30] audit: type=1400 audit(932.390:230): avc: denied { bind } for pid=6763 comm="syz.0.1531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 932.973071][ T30] audit: type=1400 audit(932.440:231): avc: denied { accept } for pid=6763 comm="syz.0.1531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 937.787679][ T30] audit: type=1400 audit(937.260:232): avc: denied { setopt } for pid=6795 comm="syz.2.1547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 939.858722][ T30] audit: type=1400 audit(939.330:233): avc: denied { write } for pid=6807 comm="syz.2.1553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 964.282313][ T30] audit: type=1400 audit(963.750:234): avc: denied { connect } for pid=6951 comm="syz.2.1623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 970.836558][ T30] audit: type=1400 audit(970.300:235): avc: denied { mount } for pid=6988 comm="syz.2.1641" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 970.867297][ T30] audit: type=1400 audit(970.340:236): avc: denied { remount } for pid=6988 comm="syz.2.1641" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 971.111294][ T30] audit: type=1400 audit(970.580:237): avc: denied { unmount } for pid=5262 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 978.005204][ T30] audit: type=1400 audit(977.470:238): avc: denied { mount } for pid=7034 comm="syz.0.1664" name="/" dev="configfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 980.416007][ T7055] random: crng reseeded on system resumption [ 1001.807639][ T30] audit: type=1400 audit(1001.280:239): avc: denied { write } for pid=7182 comm="syz.0.1736" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1001.828457][ T30] audit: type=1400 audit(1001.300:240): avc: denied { open } for pid=7182 comm="syz.0.1736" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1006.321343][ T7202] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7202 comm=syz.0.1745 [ 1019.922432][ T30] audit: type=1400 audit(1019.390:241): avc: denied { unmount } for pid=7281 comm="syz.2.1783" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1029.327663][ T6650] hid_parser_main: 33 callbacks suppressed [ 1029.341667][ T6650] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1029.342072][ T6650] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1029.342726][ T6650] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1029.343091][ T6650] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1029.343329][ T6650] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1029.343547][ T6650] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1029.343847][ T6650] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1029.344093][ T6650] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1029.344331][ T6650] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1029.344591][ T6650] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1029.443113][ T6650] hid-generic 0003:0004:0000.0002: hidraw0: USB HID v0.00 Device [syz0] on syz1 [ 1033.555309][ T7350] fido_id[7350]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1035.722124][ T30] audit: type=1400 audit(1035.190:242): avc: denied { getopt } for pid=7371 comm="syz.0.1826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1046.569760][ T7447] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7447 comm=syz.2.1863 [ 1053.338435][ T30] audit: type=1400 audit(1052.810:243): avc: denied { write } for pid=7482 comm="syz.0.1880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1057.511802][ T30] audit: type=1400 audit(1056.970:244): avc: denied { create } for pid=7501 comm="syz.0.1889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1057.616075][ T30] audit: type=1400 audit(1057.090:245): avc: denied { write } for pid=7501 comm="syz.0.1889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1065.333577][ T7554] SELinux: Context system_u:object_r:hald_var_run_t:s0 is not valid (left unmapped). [ 1065.345968][ T30] audit: type=1400 audit(1064.820:246): avc: denied { relabelto } for pid=7553 comm="syz.0.1914" name="file0" dev="tmpfs" ino=5261 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 1065.354027][ T30] audit: type=1400 audit(1064.820:247): avc: denied { associate } for pid=7553 comm="syz.0.1914" name="file0" dev="tmpfs" ino=5261 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hald_var_run_t:s0" [ 1065.505589][ T30] audit: type=1400 audit(1064.970:248): avc: denied { unlink } for pid=3321 comm="syz-executor" name="file0" dev="tmpfs" ino=5261 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 1069.956464][ T30] audit: type=1400 audit(1069.430:249): avc: denied { create } for pid=7581 comm="syz.2.1928" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1070.042883][ T30] audit: type=1400 audit(1069.510:250): avc: denied { read } for pid=7581 comm="syz.2.1928" name="file0" dev="tmpfs" ino=2596 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1070.043871][ T30] audit: type=1400 audit(1069.510:251): avc: denied { open } for pid=7581 comm="syz.2.1928" path="/502/file0" dev="tmpfs" ino=2596 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1070.088156][ T30] audit: type=1400 audit(1069.560:252): avc: denied { ioctl } for pid=7581 comm="syz.2.1928" path="/502/file0" dev="tmpfs" ino=2596 ioctlcmd=0x125d scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1070.337126][ T30] audit: type=1400 audit(1069.810:253): avc: denied { unlink } for pid=5262 comm="syz-executor" name="file0" dev="tmpfs" ino=2596 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1080.164618][ T7644] binfmt_misc: register: failed to install interpreter file ./file0 [ 1112.878174][ T30] audit: type=1400 audit(1112.340:254): avc: granted { setsecparam } for pid=7838 comm="syz.2.2053" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1113.427889][ T30] audit: type=1400 audit(1112.900:255): avc: denied { mount } for pid=7842 comm="syz.2.2055" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1113.458702][ T30] audit: type=1400 audit(1112.930:256): avc: denied { unmount } for pid=7842 comm="syz.2.2055" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1123.453675][ T7860] mmap: syz.2.2063 (7860) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 1136.395097][ T7969] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7969 comm=syz.0.2115 [ 1146.733631][ T30] audit: type=1400 audit(1146.210:257): avc: denied { read } for pid=8036 comm="syz.0.2148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1149.916797][ T8054] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8054 comm=syz.0.2157 [ 1165.286651][ T8121] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=8121 comm=syz.0.2189 [ 1177.671244][ T30] audit: type=1400 audit(1177.140:258): avc: denied { wake_alarm } for pid=8205 comm="syz.0.2232" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1192.948164][ T30] audit: type=1400 audit(1192.420:259): avc: denied { ioctl } for pid=8306 comm="syz.2.2281" path="socket:[20549]" dev="sockfs" ino=20549 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1194.617587][ T8317] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8317 comm=syz.2.2285 [ 1196.553344][ T53] hid-generic 0001:0009:0001.0003: item fetching failed at offset 0/1 [ 1196.558828][ T53] hid-generic 0001:0009:0001.0003: probe with driver hid-generic failed with error -22 [ 1207.732165][ T30] audit: type=1400 audit(1207.200:260): avc: denied { execute } for pid=8396 comm="syz.0.2324" path=2F6D656D66643A25202864656C6574656429 dev="hugetlbfs" ino=20339 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 1211.277314][ T8407] netlink: 56 bytes leftover after parsing attributes in process `syz.2.2329'. [ 1211.298936][ T8407] netlink: 56 bytes leftover after parsing attributes in process `syz.2.2329'. [ 1221.905732][ T8468] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2355'. [ 1226.632773][ T30] audit: type=1400 audit(1226.100:261): avc: denied { getopt } for pid=8501 comm="syz.0.2372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1238.958168][ T30] audit: type=1400 audit(1238.430:262): avc: denied { getopt } for pid=8572 comm="syz.0.2405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1257.007070][ T6650] hid_parser_main: 8 callbacks suppressed [ 1257.014888][ T6650] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1257.022273][ T6650] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1257.027286][ T6650] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1257.029791][ T6650] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1257.033265][ T6650] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1257.039430][ T6650] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1257.042557][ T6650] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1257.044631][ T6650] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1257.046909][ T6650] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1257.052140][ T6650] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1257.103708][ T6650] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [sy] on syz0 [ 1258.642538][ T30] audit: type=1400 audit(1258.110:263): avc: denied { remount } for pid=8704 comm="syz.0.2471" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1260.318560][ T8722] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8722 comm=syz.0.2479 [ 1263.096514][ T8742] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8742 comm=syz.2.2489 [ 1265.757430][ T8746] fido_id[8746]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1266.699665][ T30] audit: type=1400 audit(1266.170:264): avc: denied { write } for pid=8765 comm="syz.2.2499" name="file0" dev="tmpfs" ino=4003 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1270.796384][ T30] audit: type=1400 audit(1270.270:265): avc: denied { ioctl } for pid=8787 comm="syz.0.2510" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4b32 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1304.536300][ T8996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8996 comm=syz.0.2609 [ 1313.324513][ T30] audit: type=1400 audit(1312.790:266): avc: denied { mount } for pid=9055 comm="syz.2.2639" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1313.359076][ T30] audit: type=1400 audit(1312.830:267): avc: denied { remount } for pid=9055 comm="syz.2.2639" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1313.386811][ T9057] ======================================================= [ 1313.386811][ T9057] WARNING: The mand mount option has been deprecated and [ 1313.386811][ T9057] and is ignored by this kernel. Remove the mand [ 1313.386811][ T9057] option from the mount to silence this warning. [ 1313.386811][ T9057] ======================================================= [ 1313.538317][ T30] audit: type=1400 audit(1312.990:268): avc: denied { unmount } for pid=5262 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1322.933963][ T9102] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9102 comm=syz.0.2661 [ 1350.583323][ T30] audit: type=1400 audit(1350.040:269): avc: denied { node_bind } for pid=9273 comm="syz.0.2746" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1354.706952][ T30] audit: type=1400 audit(1354.180:270): avc: denied { write } for pid=9301 comm="syz.0.2760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1356.216596][ T8011] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 1356.434650][ T8011] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1356.435426][ T8011] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1356.657110][ T8011] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1356.657871][ T8011] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1356.657988][ T8011] usb 1-1: Product: syz [ 1356.658084][ T8011] usb 1-1: Manufacturer: syz [ 1356.658176][ T8011] usb 1-1: SerialNumber: syz [ 1357.237211][ T9309] SELinux: syz.0.2763 (9309) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1362.174007][ T8011] usb 1-1: 0:2 : does not exist [ 1362.527390][ T8011] usb 1-1: USB disconnect, device number 2 [ 1365.078798][ T9338] Injecting memory failure for pfn 0x5916c at process virtual address 0x2036c000 [ 1365.095072][ T9338] Memory failure: 0x5916c: recovery action for unsplit thp: Failed [ 1365.462103][ T5434] udevd[5434]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 1383.842425][ T9463] syz.0.2837 uses obsolete (PF_INET,SOCK_PACKET) [ 1403.891873][ T30] audit: type=1400 audit(1403.340:271): avc: denied { setattr } for pid=9579 comm="syz.2.2893" name="sequencer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 1407.217750][ T30] audit: type=1400 audit(1406.690:272): avc: denied { bind } for pid=9599 comm="syz.0.2903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1407.699939][ T30] audit: type=1400 audit(1407.170:273): avc: denied { remount } for pid=9604 comm="syz.0.2905" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1413.386174][ T30] audit: type=1400 audit(1412.860:274): avc: denied { setopt } for pid=9646 comm="syz.2.2926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1419.363410][ T30] audit: type=1400 audit(1418.840:275): avc: denied { write } for pid=9690 comm="syz.0.2948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1419.861999][ T9696] netlink: 'syz.0.2949': attribute type 29 has an invalid length. [ 1421.028994][ T9705] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9705 comm=syz.2.2955 [ 1454.169244][ T9949] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=9949 comm=syz.2.3074 [ 1464.050843][ T30] audit: type=1400 audit(1463.520:276): avc: denied { unlink } for pid=3321 comm="syz-executor" name=131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 dev="tmpfs" ino=8423 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1464.632819][T10017] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1482.365520][T10142] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10142 comm=syz.2.3169 [ 1486.685430][T10167] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10167 comm=syz.2.3181 [ 1488.223000][ T30] audit: type=1400 audit(1487.700:277): avc: denied { setopt } for pid=10178 comm="syz.2.3187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1513.294878][T10353] SELinux: syz.0.3272 (10353) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1519.102633][ T9322] hid (null): global environment stack underflow [ 1519.135997][ T9322] hid-generic 0003:0005:7FFF.0005: global environment stack underflow [ 1519.136649][ T9322] hid-generic 0003:0005:7FFF.0005: item 0 0 1 11 parsing failed [ 1519.139424][ T9322] hid-generic 0003:0005:7FFF.0005: probe with driver hid-generic failed with error -22 [ 1523.385694][ T30] audit: type=1400 audit(1522.860:278): avc: denied { getopt } for pid=10400 comm="syz.2.3295" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1523.639513][ T30] audit: type=1400 audit(1523.110:279): avc: denied { sqpoll } for pid=10402 comm="syz.0.3296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1546.578525][ T30] audit: type=1400 audit(1546.050:280): avc: denied { remount } for pid=10535 comm="syz.0.3361" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1546.757574][ T30] audit: type=1400 audit(1546.220:281): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1562.586476][ T30] audit: type=1400 audit(1562.040:282): avc: denied { mount } for pid=10648 comm="syz.0.3416" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 1562.626824][ T30] audit: type=1400 audit(1562.100:283): avc: denied { remount } for pid=10648 comm="syz.0.3416" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 1562.895253][ T30] audit: type=1400 audit(1562.370:284): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 1569.956748][T10706] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=10706 comm=syz.2.3445 [ 1583.133780][T10780] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10780 comm=syz.2.3481 [ 1585.123154][T10797] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10797 comm=syz.0.3489 [ 1590.579167][ T30] audit: type=1400 audit(1590.050:285): avc: denied { ioctl } for pid=10834 comm="syz.2.3507" path="net:[4026532764]" dev="nsfs" ino=4026532764 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1599.546595][ T53] hid_parser_main: 22 callbacks suppressed [ 1599.562585][ T53] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 1599.628373][ T53] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz0] on syz0 [ 1605.386103][T10908] fido_id[10908]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1608.858005][ T30] audit: type=1400 audit(1608.330:286): avc: denied { name_bind } for pid=10935 comm="syz.0.3554" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 1617.423517][ T30] audit: type=1400 audit(1616.890:287): avc: denied { append } for pid=10977 comm="syz.0.3575" name="system" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1620.109975][ T30] audit: type=1400 audit(1619.580:288): avc: denied { create } for pid=10980 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1620.113854][ T30] audit: type=1400 audit(1619.580:289): avc: denied { write open } for pid=10980 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=7230 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1620.149505][ T30] audit: type=1400 audit(1619.620:290): avc: denied { append } for pid=10980 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=7230 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1620.231804][ T30] audit: type=1400 audit(1619.690:291): avc: denied { getattr } for pid=10980 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1621.374292][ T30] audit: type=1400 audit(1620.850:292): avc: denied { read } for pid=10994 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1622.954973][ T30] audit: type=1400 audit(1622.410:293): avc: denied { unlink } for pid=11003 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=7230 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1632.664346][ T30] audit: type=1400 audit(1632.140:294): avc: denied { create } for pid=11060 comm="syz.0.3613" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1632.791266][ T30] audit: type=1400 audit(1632.260:295): avc: denied { mounton } for pid=11060 comm="syz.0.3613" path="/1883/file0" dev="tmpfs" ino=9674 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1644.345916][ T30] audit: type=1400 audit(1643.820:296): avc: denied { create } for pid=11133 comm="syz.2.3650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1644.447511][ T30] audit: type=1400 audit(1643.920:297): avc: denied { connect } for pid=11133 comm="syz.2.3650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1649.431683][ T30] audit: type=1400 audit(1648.890:298): avc: denied { read } for pid=11175 comm="syz.2.3670" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1661.597695][ T30] audit: type=1400 audit(1661.070:299): avc: denied { ioctl } for pid=11257 comm="syz.0.3711" path="socket:[29922]" dev="sockfs" ino=29922 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1669.368035][T11313] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=11313 comm=syz.0.3737 [ 1679.618669][ T30] audit: type=1400 audit(1679.090:300): avc: denied { write } for pid=11375 comm="syz.2.3767" path="socket:[30112]" dev="sockfs" ino=30112 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1696.293185][ T30] audit: type=1400 audit(1695.750:301): avc: denied { mount } for pid=11477 comm="syz.0.3815" name="/" dev="pstore" ino=3272 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1696.324998][ T30] audit: type=1400 audit(1695.800:302): avc: denied { remount } for pid=11477 comm="syz.0.3815" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1696.468223][ T30] audit: type=1400 audit(1695.940:303): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1705.897614][ T30] audit: type=1400 audit(1705.370:304): avc: denied { setopt } for pid=11531 comm="syz.0.3842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1725.334214][ T30] audit: type=1400 audit(1724.810:305): avc: denied { setopt } for pid=11664 comm="syz.2.3906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1729.893371][ T30] audit: type=1400 audit(1729.360:306): avc: denied { bind } for pid=11686 comm="syz.2.3917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1742.067856][T11747] deleting an unspecified loop device is not supported. [ 1754.481267][ T30] audit: type=1400 audit(1753.950:307): avc: denied { read } for pid=11819 comm="syz.0.3982" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1762.347361][T11862] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2304 sclass=netlink_tcpdiag_socket pid=11862 comm=syz.2.4001 [ 1788.162102][ T30] audit: type=1400 audit(1787.630:308): avc: denied { name_bind } for pid=12014 comm="syz.0.4075" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1797.492891][ T30] audit: type=1400 audit(1796.940:309): avc: denied { getopt } for pid=12074 comm="syz.0.4105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1799.864493][T12092] ptrace attach of "/syz-executor exec"[12093] was attempted by "/syz-executor exec"[12092] [ 1803.703989][ T30] audit: type=1400 audit(1803.170:310): avc: denied { map } for pid=12118 comm="syz.0.4126" path="/proc/4349/net/pfkey" dev="proc" ino=4026532673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1803.708443][ T30] audit: type=1400 audit(1803.180:311): avc: denied { execute } for pid=12118 comm="syz.0.4126" path="/proc/4349/net/pfkey" dev="proc" ino=4026532673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1833.753908][ T30] audit: type=1400 audit(1833.220:312): avc: denied { create } for pid=12318 comm="syz.2.4224" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=udp_socket permissive=1 [ 1839.663900][ T30] audit: type=1400 audit(1839.140:313): avc: denied { getattr } for pid=12351 comm="syz.2.4240" name="[userfaultfd]" dev="anon_inodefs" ino=33600 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1863.412950][T12513] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=12513 comm=syz.2.4315 [ 1866.579807][ T30] audit: type=1400 audit(1866.050:314): avc: denied { write } for pid=12534 comm="syz.0.4327" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1868.411969][T12543] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12543 comm=syz.0.4330 [ 1896.552962][ T30] audit: type=1400 audit(1896.010:315): avc: denied { associate } for pid=12706 comm="syz.0.4409" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 1905.812969][T12762] ALSA: seq fatal error: cannot create timer (-19) [ 1912.511363][ T30] audit: type=1400 audit(1911.980:316): avc: denied { setattr } for pid=12811 comm="syz.2.4458" name="nbd2" dev="devtmpfs" ino=655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1914.133683][T12822] ptrace attach of "/syz-executor exec"[12824] was attempted by "/syz-executor exec"[12822] [ 1926.462366][ T30] audit: type=1400 audit(1925.930:317): avc: denied { listen } for pid=12907 comm="syz.2.4506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1926.503102][ T30] audit: type=1400 audit(1925.970:318): avc: denied { ioctl } for pid=12907 comm="syz.2.4506" path="socket:[35490]" dev="sockfs" ino=35490 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1955.423706][T13104] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=13104 comm=syz.0.4595 [ 1980.534459][T13233] netlink: 'syz.2.4659': attribute type 29 has an invalid length. [ 1980.565005][T13233] netlink: 'syz.2.4659': attribute type 29 has an invalid length. [ 2007.663635][T13365] netlink: 24 bytes leftover after parsing attributes in process `syz.2.4724'. [ 2020.283923][T13421] netlink: 64 bytes leftover after parsing attributes in process `syz.0.4751'. [ 2033.989889][ T30] audit: type=1400 audit(2033.460:319): avc: denied { read } for pid=13501 comm="syz.2.4791" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2034.021242][ T30] audit: type=1400 audit(2033.490:320): avc: denied { open } for pid=13501 comm="syz.2.4791" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2063.138146][ T30] audit: type=1400 audit(2062.610:321): avc: denied { setopt } for pid=13660 comm="syz.0.4866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2064.051807][ T30] audit: type=1400 audit(2063.520:322): avc: denied { nlmsg_read } for pid=13667 comm="syz.2.4869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2071.395798][ T30] audit: type=1400 audit(2070.870:323): avc: denied { accept } for pid=13699 comm="syz.0.4885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2079.895026][ T30] audit: type=1400 audit(2079.360:324): avc: denied { remount } for pid=13747 comm="syz.2.4910" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2079.908847][T13749] option changes via remount are deprecated (pid=13747 comm=syz.2.4910) [ 2119.443789][ T30] audit: type=1400 audit(2118.920:325): avc: denied { remount } for pid=13943 comm="syz.0.5004" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 2121.636601][T13955] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2051 sclass=netlink_route_socket pid=13955 comm=syz.0.5009 [ 2121.943653][T13957] netlink: 184 bytes leftover after parsing attributes in process `syz.2.5011'. [ 2124.059343][T13967] usb usb1: usbfs: process 13967 (syz.2.5016) did not claim interface 6 before use [ 2143.542698][T14056] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14056 comm=syz.2.5060 [ 2183.043081][ T30] audit: type=1400 audit(2182.500:326): avc: denied { setattr } for pid=14248 comm="syz.2.5155" name="" dev="pipefs" ino=40042 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 2214.684347][ T30] audit: type=1400 audit(2214.150:327): avc: denied { shutdown } for pid=14418 comm="syz.2.5239" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2228.641155][ T30] audit: type=1400 audit(2228.100:328): avc: denied { read write } for pid=14496 comm="syz.0.5275" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 2228.641721][ T30] audit: type=1400 audit(2228.110:329): avc: denied { open } for pid=14496 comm="syz.0.5275" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 2231.931076][ T30] audit: type=1400 audit(2231.400:330): avc: denied { mounton } for pid=14516 comm="syz.2.5286" path="/2245/file0" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 [ 2233.385914][T13857] hid-generic 0002:0004:0009.0007: unknown main item tag 0x0 [ 2233.386836][T13857] hid-generic 0002:0004:0009.0007: unknown main item tag 0x0 [ 2233.387610][T13857] hid-generic 0002:0004:0009.0007: unknown main item tag 0x0 [ 2233.387920][T13857] hid-generic 0002:0004:0009.0007: unknown main item tag 0x0 [ 2233.388187][T13857] hid-generic 0002:0004:0009.0007: unknown main item tag 0x0 [ 2233.388464][T13857] hid-generic 0002:0004:0009.0007: unknown main item tag 0x0 [ 2233.388722][T13857] hid-generic 0002:0004:0009.0007: unknown main item tag 0x0 [ 2233.388972][T13857] hid-generic 0002:0004:0009.0007: unknown main item tag 0x0 [ 2233.389251][T13857] hid-generic 0002:0004:0009.0007: unknown main item tag 0x0 [ 2233.389516][T13857] hid-generic 0002:0004:0009.0007: unknown main item tag 0x0 [ 2233.514521][T13857] hid-generic 0002:0004:0009.0007: hidraw0: HID v0.04 Device [syz0] on syz0 [ 2237.109242][T14535] fido_id[14535]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2242.037708][T14568] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14568 comm=syz.2.5310 [ 2252.525716][T14610] SELinux: Context system_u:object_r:dhcp_etc_t:s0 is not valid (left unmapped). [ 2274.221572][T14728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14728 comm=syz.2.5389 [ 2280.542868][ T30] audit: type=1400 audit(2280.020:331): avc: denied { setopt } for pid=14760 comm="syz.2.5405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2305.596898][T14590] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2305.597833][T14590] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2305.598123][T14590] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2305.598389][T14590] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2311.092718][T14919] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=14919 comm=syz.0.5478 [ 2314.057221][T14934] SELinux: syz.0.5487 (14934) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 2339.276553][ T30] audit: type=1400 audit(2338.750:332): avc: denied { bind } for pid=15062 comm="syz.0.5551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2339.349393][ T30] audit: type=1400 audit(2338.820:333): avc: denied { listen } for pid=15062 comm="syz.0.5551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2343.507744][ T30] audit: type=1400 audit(2342.980:334): avc: denied { setattr } for pid=15082 comm="syz.0.5561" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2350.668044][T15123] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15123 comm=syz.2.5580 [ 2367.062534][ T30] audit: type=1400 audit(2366.530:335): avc: denied { read } for pid=15225 comm="syz.2.5631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2386.204493][ T30] audit: type=1400 audit(2385.680:336): avc: denied { ioctl } for pid=15325 comm="syz.0.5675" path="socket:[42884]" dev="sockfs" ino=42884 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2401.027220][T15392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15392 comm=syz.2.5706 [ 2454.145093][ T30] audit: type=1400 audit(2453.620:337): avc: denied { setattr } for pid=15644 comm="syz.2.5831" name="tty24" dev="devtmpfs" ino=43 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 2458.085943][ T30] audit: type=1400 audit(2457.550:338): avc: denied { create } for pid=15668 comm="syz.2.5843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2458.109875][ T30] audit: type=1400 audit(2457.580:339): avc: denied { setopt } for pid=15668 comm="syz.2.5843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2473.131454][ T30] audit: type=1400 audit(2472.600:340): avc: denied { map } for pid=15757 comm="syz.2.5886" path="/dev/dri/card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2473.132458][ T30] audit: type=1400 audit(2472.600:341): avc: denied { execute } for pid=15757 comm="syz.2.5886" path="/dev/dri/card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2499.721914][T15882] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1793 sclass=netlink_route_socket pid=15882 comm=syz.2.5947 [ 2519.392251][T15984] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15984 comm=syz.2.5998 [ 2528.586994][T16028] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16028 comm=syz.2.6019 [ 2534.043426][ T30] audit: type=1400 audit(2533.510:342): avc: denied { create } for pid=16058 comm="syz.2.6035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 2534.126600][ T30] audit: type=1400 audit(2533.600:343): avc: denied { write } for pid=16058 comm="syz.2.6035" path="socket:[45657]" dev="sockfs" ino=45657 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 2564.887687][ T30] audit: type=1400 audit(2564.360:344): avc: denied { audit_write } for pid=16216 comm="syz.2.6111" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2564.904581][ T30] audit: type=1107 audit(2564.370:345): pid=16216 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 2564.923050][ T30] audit: type=1107 audit(2564.400:346): pid=16216 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='TĘ3' [ 2595.801389][ T30] audit: type=1400 audit(2595.270:347): avc: denied { setattr } for pid=16371 comm="syz.0.6187" name="RAWv6" dev="sockfs" ino=47166 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2637.821616][ T30] audit: type=1400 audit(2637.280:348): avc: denied { map } for pid=16594 comm="syz.0.6297" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2646.669819][ T30] audit: type=1400 audit(2646.100:349): avc: denied { mount } for pid=16634 comm="syz.2.6317" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 2646.903002][ T30] audit: type=1400 audit(2646.360:350): avc: denied { unmount } for pid=5262 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 2654.125385][T16676] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6336'. [ 2684.277528][T16826] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16826 comm=syz.2.6410 [ 2707.083875][ T30] audit: type=1400 audit(2706.560:351): avc: denied { bind } for pid=16928 comm="syz.2.6460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2708.638314][ T30] audit: type=1400 audit(2708.100:352): avc: denied { ioctl } for pid=16936 comm="syz.0.6464" path="socket:[48693]" dev="sockfs" ino=48693 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2712.866890][ T30] audit: type=1400 audit(2712.340:353): avc: denied { write } for pid=16959 comm="syz.0.6476" path="socket:[48120]" dev="sockfs" ino=48120 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2713.864382][ T30] audit: type=1400 audit(2713.330:354): avc: denied { ioctl } for pid=16964 comm="syz.0.6479" path="socket:[48736]" dev="sockfs" ino=48736 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2714.943485][ T30] audit: type=1400 audit(2714.400:355): avc: denied { module_load } for pid=16970 comm="syz.2.6482" path=2F6D656D66643A20C736BE918D183229219A25A2D238D606070EFCFE128F2613AE254054A3B03E5CECA9F951403641108C6E7C202864656C6574656429 dev="hugetlbfs" ino=49161 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=system permissive=1 [ 2715.207047][T16971] Invalid ELF header magic: != ELF [ 2721.606804][T17007] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=17007 comm=syz.0.6498 [ 2730.677187][T17055] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=17055 comm=syz.2.6522 [ 2823.825322][ T30] audit: type=1400 audit(2823.300:356): avc: denied { ioctl } for pid=17492 comm="syz.2.6737" path="socket:[49954]" dev="sockfs" ino=49954 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2851.407356][ T30] audit: type=1400 audit(2850.880:357): avc: denied { read } for pid=17633 comm="syz.2.6805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2855.549030][T15814] hid_parser_main: 7 callbacks suppressed [ 2855.565922][T15814] hid-generic 0000:0006:0007.0008: unknown main item tag 0x0 [ 2855.566788][T15814] hid-generic 0000:0006:0007.0008: unknown main item tag 0x0 [ 2855.573218][T15814] hid-generic 0000:0006:0007.0008: unknown main item tag 0x0 [ 2855.573897][T15814] hid-generic 0000:0006:0007.0008: unknown main item tag 0x0 [ 2855.574271][T15814] hid-generic 0000:0006:0007.0008: unknown main item tag 0x0 [ 2855.574536][T15814] hid-generic 0000:0006:0007.0008: unknown main item tag 0x0 [ 2855.574778][T15814] hid-generic 0000:0006:0007.0008: unknown main item tag 0x0 [ 2855.575013][T15814] hid-generic 0000:0006:0007.0008: unknown main item tag 0x0 [ 2855.575815][T15814] hid-generic 0000:0006:0007.0008: unknown main item tag 0x0 [ 2855.603436][T15814] hid-generic 0000:0006:0007.0008: unknown main item tag 0x0 [ 2855.753238][T15814] hid-generic 0000:0006:0007.0008: hidraw0: HID v0.0b Device [syz1] on syz1 [ 2859.198890][T17660] fido_id[17660]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2881.141147][ T30] audit: type=1400 audit(2880.600:358): avc: denied { map } for pid=17783 comm="syz.2.6879" path="socket:[51196]" dev="sockfs" ino=51196 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2881.142020][ T30] audit: type=1400 audit(2880.600:359): avc: denied { read } for pid=17783 comm="syz.2.6879" path="socket:[51196]" dev="sockfs" ino=51196 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2906.581911][ T30] audit: type=1400 audit(2906.040:360): avc: denied { connect } for pid=17922 comm="syz.2.6947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2930.583675][ T30] audit: type=1400 audit(2930.040:361): avc: denied { write } for pid=18026 comm="syz.2.6996" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2931.008510][ C1] vkms_vblank_simulate: vblank timer overrun [ 2933.001694][ T30] audit: type=1400 audit(2932.470:362): avc: denied { search } for pid=18029 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2933.009164][ T30] audit: type=1400 audit(2932.480:363): avc: denied { search } for pid=18029 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=574 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2933.042453][ T30] audit: type=1400 audit(2932.500:364): avc: denied { search } for pid=18029 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=726 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2933.043630][ T30] audit: type=1400 audit(2932.500:365): avc: denied { search } for pid=18029 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=727 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2933.164396][ T30] audit: type=1400 audit(2932.630:366): avc: denied { read open } for pid=18033 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=727 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2933.165419][ T30] audit: type=1400 audit(2932.630:367): avc: denied { getattr } for pid=18033 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=727 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2933.757665][ T30] audit: type=1400 audit(2933.230:368): avc: denied { add_name } for pid=18029 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2935.714044][ T30] audit: type=1400 audit(2935.180:369): avc: denied { remove_name } for pid=18040 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=13777 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2949.711763][T18099] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65498 sclass=netlink_audit_socket pid=18099 comm=syz.2.7027 [ 2951.122676][T18105] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18105 comm=syz.2.7030 [ 2960.986864][T18161] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 2960.986864][T18161] The task syz.0.7055 (18161) triggered the difference, watch for misbehavior. [ 2980.898662][T18246] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7098'. [ 3014.168485][ T30] audit: type=1400 audit(3013.640:370): avc: denied { ioctl } for pid=18429 comm="syz.2.7189" path="socket:[54360]" dev="sockfs" ino=54360 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3043.814606][T18602] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18602 comm=syz.0.7270 [ 3073.237719][T18741] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18741 comm=syz.0.7337 [ 3082.392476][T18785] lo speed is unknown, defaulting to 1000 [ 3082.413275][T18785] lo speed is unknown, defaulting to 1000 [ 3082.553060][T18785] lo speed is unknown, defaulting to 1000 [ 3082.738273][T18785] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 3082.894732][T18785] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 3083.258181][T18785] lo speed is unknown, defaulting to 1000 [ 3083.317403][T18785] lo speed is unknown, defaulting to 1000 [ 3093.685418][T18847] usb usb1: usbfs: process 18847 (syz.0.7388) did not claim interface 0 before use [ 3096.222611][T18853] syz_tun: entered allmulticast mode [ 3145.415667][ T30] audit: type=1400 audit(3144.890:371): avc: denied { read } for pid=19122 comm="syz.2.7524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3150.374504][T19152] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=19152 comm=syz.2.7537 [ 3155.227379][ T30] audit: type=1400 audit(3154.690:372): avc: denied { ioctl } for pid=19181 comm="syz.2.7552" path="/dev/input/mice" dev="devtmpfs" ino=705 ioctlcmd=0x937b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 3195.088960][T19413] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19413 comm=syz.0.7662 [ 3195.168163][T19413] netlink: 'syz.0.7662': attribute type 16 has an invalid length. [ 3195.169119][T19413] netlink: 64130 bytes leftover after parsing attributes in process `syz.0.7662'. [ 3202.328975][ T30] audit: type=1400 audit(3201.760:373): avc: denied { checkpoint_restore } for pid=19449 comm="syz.2.7681" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3204.443395][T19462] binfmt_misc: register: failed to install interpreter file ./bus [ 3243.328810][ T30] audit: type=1400 audit(3242.800:374): avc: denied { read write } for pid=5262 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3243.368441][ T30] audit: type=1400 audit(3242.830:375): avc: denied { open } for pid=5262 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3243.375885][ T30] audit: type=1400 audit(3242.850:376): avc: denied { ioctl } for pid=5262 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3243.813304][ T30] audit: type=1400 audit(3243.280:377): avc: denied { create } for pid=19678 comm="syz.2.7792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3243.915945][ T30] audit: type=1400 audit(3243.370:378): avc: denied { ioctl } for pid=19678 comm="syz.2.7792" path="socket:[57487]" dev="sockfs" ino=57487 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3250.286818][ T30] audit: type=1400 audit(3249.760:379): avc: denied { create } for pid=19718 comm="syz.2.7812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3250.349728][ T30] audit: type=1400 audit(3249.820:380): avc: denied { lock } for pid=19718 comm="syz.2.7812" path="socket:[58552]" dev="sockfs" ino=58552 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3251.517853][ T30] audit: type=1400 audit(3250.990:381): avc: denied { module_request } for pid=19723 comm="syz.0.7814" kmod="netdev-syztnl1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3252.095872][ T30] audit: type=1400 audit(3251.570:382): avc: denied { sys_module } for pid=19723 comm="syz.0.7814" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3252.525019][ T30] audit: type=1400 audit(3251.990:383): avc: denied { write } for pid=19729 comm="syz.2.7816" name="arp" dev="proc" ino=4026532786 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3256.407722][ T30] audit: type=1400 audit(3255.880:384): avc: denied { read } for pid=19748 comm="syz.2.7826" dev="nsfs" ino=4026532764 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3256.419424][ T30] audit: type=1400 audit(3255.890:385): avc: denied { open } for pid=19748 comm="syz.2.7826" path="net:[4026532764]" dev="nsfs" ino=4026532764 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3256.437078][ T30] audit: type=1400 audit(3255.900:386): avc: denied { create } for pid=19748 comm="syz.2.7826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3256.486257][ T30] audit: type=1400 audit(3255.960:387): avc: denied { write } for pid=19748 comm="syz.2.7826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3257.501346][ T30] audit: type=1400 audit(3256.970:388): avc: denied { prog_load } for pid=19754 comm="syz.2.7829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3257.513555][ T30] audit: type=1400 audit(3256.980:389): avc: denied { bpf } for pid=19754 comm="syz.2.7829" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3257.517136][ T30] audit: type=1400 audit(3256.980:390): avc: denied { perfmon } for pid=19754 comm="syz.2.7829" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3258.203691][ T30] audit: type=1400 audit(3257.660:391): avc: denied { read write } for pid=19758 comm="syz.0.7830" name="vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3258.204576][ T30] audit: type=1400 audit(3257.660:392): avc: denied { open } for pid=19758 comm="syz.0.7830" path="/dev/vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3258.297075][ T30] audit: type=1400 audit(3257.770:393): avc: denied { ioctl } for pid=19758 comm="syz.0.7830" path="/dev/vhost-net" dev="devtmpfs" ino=714 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3265.663073][T19801] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19801 comm=syz.0.7850 [ 3267.686080][ T30] audit: type=1400 audit(3267.160:394): avc: denied { create } for pid=19816 comm="syz.2.7858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3267.735374][ T30] audit: type=1400 audit(3267.200:395): avc: denied { setopt } for pid=19816 comm="syz.2.7858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3278.579947][ T30] audit: type=1400 audit(3278.050:396): avc: denied { create } for pid=19862 comm="syz.2.7880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3278.607810][ T30] audit: type=1400 audit(3278.080:397): avc: denied { write } for pid=19862 comm="syz.2.7880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3279.778648][ T30] audit: type=1400 audit(3279.240:398): avc: denied { mount } for pid=19869 comm="syz.2.7884" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 3282.197357][ T30] audit: type=1400 audit(3281.670:399): avc: denied { read } for pid=19883 comm="syz.2.7891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3282.293083][ T30] audit: type=1400 audit(3281.750:400): avc: denied { read } for pid=19882 comm="syz.0.7890" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3282.294190][ T30] audit: type=1400 audit(3281.760:401): avc: denied { open } for pid=19882 comm="syz.0.7890" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3282.327465][ T30] audit: type=1400 audit(3281.800:402): avc: denied { ioctl } for pid=19882 comm="syz.0.7890" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64bd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3284.212213][ T30] audit: type=1400 audit(3283.670:403): avc: denied { read } for pid=19894 comm="syz.0.7896" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3284.212795][ T30] audit: type=1400 audit(3283.680:404): avc: denied { open } for pid=19894 comm="syz.0.7896" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3287.068746][ T30] audit: type=1400 audit(3286.540:405): avc: denied { create } for pid=19909 comm="syz.2.7903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3287.136821][ T30] audit: type=1400 audit(3286.610:406): avc: denied { setopt } for pid=19909 comm="syz.2.7903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3287.206447][ T30] audit: type=1400 audit(3286.680:407): avc: denied { write } for pid=19909 comm="syz.2.7903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3299.197614][ T30] audit: type=1400 audit(3298.670:408): avc: denied { ioctl } for pid=19963 comm="syz.0.7928" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x1262 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3303.507969][ T30] audit: type=1400 audit(3302.980:409): avc: denied { create } for pid=19982 comm="syz.2.7939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3303.557213][ T30] audit: type=1400 audit(3303.020:410): avc: denied { write } for pid=19982 comm="syz.2.7939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3308.176133][ T30] audit: type=1400 audit(3307.640:411): avc: denied { create } for pid=20005 comm="syz.2.7950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3310.749162][ T30] audit: type=1400 audit(3310.220:412): avc: denied { create } for pid=20018 comm="syz.2.7956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3311.438161][ T30] audit: type=1400 audit(3310.910:413): avc: denied { setattr } for pid=3321 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 3314.409129][ T30] audit: type=1400 audit(3313.880:414): avc: denied { read } for pid=20032 comm="syz.2.7964" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3314.436279][ T30] audit: type=1400 audit(3313.890:415): avc: denied { open } for pid=20032 comm="syz.2.7964" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3314.452310][ T30] audit: type=1400 audit(3313.920:416): avc: denied { ioctl } for pid=20032 comm="syz.2.7964" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3341.387189][ T30] audit: type=1400 audit(3340.860:417): avc: denied { allowed } for pid=20113 comm="syz.2.8004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3341.426808][ T30] audit: type=1400 audit(3340.890:418): avc: denied { create } for pid=20113 comm="syz.2.8004" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3352.867523][ T30] audit: type=1400 audit(3352.330:419): avc: denied { read } for pid=20150 comm="syz.2.8022" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3352.868346][ T30] audit: type=1400 audit(3352.340:420): avc: denied { open } for pid=20150 comm="syz.2.8022" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3352.888179][ T30] audit: type=1400 audit(3352.360:421): avc: denied { ioctl } for pid=20150 comm="syz.2.8022" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3357.557864][ T30] audit: type=1400 audit(3357.020:422): avc: denied { execute } for pid=20164 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3357.558693][ T30] audit: type=1400 audit(3357.020:423): avc: denied { execute_no_trans } for pid=20164 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3357.634055][ T30] audit: type=1400 audit(3357.060:424): avc: denied { execmem } for pid=20164 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3357.771987][ T30] audit: type=1400 audit(3357.230:425): avc: denied { mounton } for pid=20166 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 3359.164087][T14590] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3359.657114][T14590] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3360.247665][T14590] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3360.998526][T14590] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3361.048452][ T30] audit: type=1400 audit(3360.520:426): avc: denied { map_create } for pid=20182 comm="syz.2.8035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3361.055481][ T30] audit: type=1400 audit(3360.530:427): avc: denied { map_read map_write } for pid=20182 comm="syz.2.8035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3363.134299][ T30] audit: type=1400 audit(3362.610:428): avc: denied { read } for pid=3166 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 3365.584520][ T30] audit: type=1400 audit(3365.060:429): avc: denied { write } for pid=20196 comm="syz.2.8040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3367.756617][T14590] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3367.839115][T14590] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3367.889666][T14590] bond0 (unregistering): Released all slaves [ 3368.339309][ T30] audit: type=1400 audit(3367.810:430): avc: denied { search } for pid=3166 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3368.365540][ T30] audit: type=1400 audit(3367.820:431): avc: denied { search } for pid=3166 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3368.366391][ T30] audit: type=1400 audit(3367.840:432): avc: denied { search } for pid=3166 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3368.377079][ T30] audit: type=1400 audit(3367.840:433): avc: denied { read } for pid=3166 comm="dhcpcd" name="n22" dev="tmpfs" ino=15934 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3368.392508][ T30] audit: type=1400 audit(3367.860:434): avc: denied { open } for pid=3166 comm="dhcpcd" path="/run/udev/data/n22" dev="tmpfs" ino=15934 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3368.404407][ T30] audit: type=1400 audit(3367.870:435): avc: denied { getattr } for pid=3166 comm="dhcpcd" path="/run/udev/data/n22" dev="tmpfs" ino=15934 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3373.661701][ T30] audit: type=1400 audit(3373.130:436): avc: denied { read } for pid=20218 comm="syz.2.8051" name="vsock" dev="devtmpfs" ino=746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3373.662314][ T30] audit: type=1400 audit(3373.130:437): avc: denied { open } for pid=20218 comm="syz.2.8051" path="/dev/vsock" dev="devtmpfs" ino=746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3377.935447][T20166] lo speed is unknown, defaulting to 1000 [ 3381.630731][ T30] audit: type=1400 audit(3381.100:438): avc: denied { read open } for pid=20234 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=727 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3381.648908][ T30] audit: type=1400 audit(3381.120:439): avc: denied { getattr } for pid=20234 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=727 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3382.122823][ T30] audit: type=1400 audit(3381.560:440): avc: denied { add_name } for pid=20232 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3382.123752][ T30] audit: type=1400 audit(3381.590:441): avc: denied { create } for pid=20232 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3382.141121][ T30] audit: type=1400 audit(3381.610:442): avc: denied { write } for pid=20232 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth5.link" dev="tmpfs" ino=15989 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3382.160768][ T30] audit: type=1400 audit(3381.630:443): avc: denied { append } for pid=20232 comm="dhcpcd-run-hook" name="resolv.conf.eth5.link" dev="tmpfs" ino=15989 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3384.723472][ T30] audit: type=1400 audit(3384.190:444): avc: denied { remove_name } for pid=20245 comm="rm" name="resolv.conf.eth5.link" dev="tmpfs" ino=15989 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3384.728219][ T30] audit: type=1400 audit(3384.190:445): avc: denied { unlink } for pid=20245 comm="rm" name="resolv.conf.eth5.link" dev="tmpfs" ino=15989 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3386.413190][ T30] audit: type=1400 audit(3385.890:446): avc: denied { create } for pid=20254 comm="syz.2.8062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3386.428195][ T30] audit: type=1400 audit(3385.900:447): avc: denied { setopt } for pid=20254 comm="syz.2.8062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3388.346445][ T30] audit: type=1400 audit(3387.820:448): avc: denied { mounton } for pid=20264 comm="syz.2.8065" path="/3961/file0" dev="tmpfs" ino=20338 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3388.405127][ T30] audit: type=1400 audit(3387.850:449): avc: denied { mount } for pid=20264 comm="syz.2.8065" name="/" dev="ramfs" ino=60535 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 3388.476136][ T30] audit: type=1400 audit(3387.950:450): avc: denied { remount } for pid=20264 comm="syz.2.8065" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 3388.746525][ T30] audit: type=1400 audit(3388.200:451): avc: denied { unmount } for pid=5262 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 3391.154916][T20166] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3391.235911][T20166] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3392.498547][ T30] audit: type=1400 audit(3391.970:452): avc: denied { read } for pid=20285 comm="syz.2.8071" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 3392.514766][ T30] audit: type=1400 audit(3391.990:453): avc: denied { open } for pid=20285 comm="syz.2.8071" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 3392.608701][ T30] audit: type=1400 audit(3392.080:454): avc: denied { ioctl } for pid=20285 comm="syz.2.8071" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0xaa04 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 3394.304648][ T30] audit: type=1400 audit(3393.780:455): avc: denied { read } for pid=20295 comm="syz.2.8074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3394.855304][ T30] audit: type=1400 audit(3394.330:456): avc: denied { shutdown } for pid=20295 comm="syz.2.8074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3401.108933][T20166] hsr_slave_0: entered promiscuous mode [ 3401.154190][T20166] hsr_slave_1: entered promiscuous mode [ 3407.959713][T20166] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 3408.016817][T20166] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 3408.125818][T20166] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 3408.221908][T20166] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 3409.313392][ T30] audit: type=1400 audit(3408.780:457): avc: denied { ioctl } for pid=20359 comm="syz.2.8093" path="socket:[60787]" dev="sockfs" ino=60787 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3416.147151][ T30] audit: type=1400 audit(3415.620:458): avc: denied { bind } for pid=20389 comm="syz.2.8103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3416.247000][T20166] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3444.092084][ T30] audit: type=1400 audit(3443.560:459): avc: denied { read } for pid=20520 comm="syz.2.8143" path="socket:[60974]" dev="sockfs" ino=60974 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3445.533331][T20166] veth0_vlan: entered promiscuous mode [ 3445.748209][ T30] audit: type=1400 audit(3445.220:460): avc: denied { write } for pid=20526 comm="syz.2.8145" name="userio" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3445.777754][T20166] veth1_vlan: entered promiscuous mode [ 3445.902121][T20527] misc userio: Can't change port type on an already running userio instance [ 3447.098141][T20166] veth0_macvtap: entered promiscuous mode [ 3447.348275][T20166] veth1_macvtap: entered promiscuous mode [ 3448.371885][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3448.374806][ T12] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3448.386737][ T12] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3448.392301][T20173] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3449.116586][ T30] audit: type=1400 audit(3448.590:461): avc: denied { mounton } for pid=20166 comm="syz-executor" path="/syzkaller.gxos0t/syz-tmp" dev="vda" ino=1879 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 3449.119761][ T30] audit: type=1400 audit(3448.590:462): avc: denied { mount } for pid=20166 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3449.154281][ T30] audit: type=1400 audit(3448.630:463): avc: denied { mount } for pid=20166 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3449.174942][ T30] audit: type=1400 audit(3448.650:464): avc: denied { mounton } for pid=20166 comm="syz-executor" path="/syzkaller.gxos0t/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 3449.187806][ T30] audit: type=1400 audit(3448.660:465): avc: denied { mounton } for pid=20166 comm="syz-executor" path="/syzkaller.gxos0t/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=60145 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 3449.217717][ T30] audit: type=1400 audit(3448.690:466): avc: denied { unmount } for pid=20166 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 3449.329135][ T30] audit: type=1400 audit(3448.800:467): avc: denied { mounton } for pid=20166 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 3449.388358][ T30] audit: type=1400 audit(3448.860:468): avc: denied { mount } for pid=20166 comm="syz-executor" name="/" dev="gadgetfs" ino=3010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 3449.486254][ T30] audit: type=1400 audit(3448.960:469): avc: denied { mount } for pid=20166 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 3449.516457][ T30] audit: type=1400 audit(3448.960:470): avc: denied { mounton } for pid=20166 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 3459.215767][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 3459.223623][ T30] audit: type=1326 audit(3458.690:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20581 comm="syz.3.8168" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c44 code=0x0 [ 3461.536362][ T30] audit: type=1400 audit(3461.010:473): avc: denied { ioctl } for pid=20593 comm="syz.2.8171" path="socket:[61129]" dev="sockfs" ino=61129 ioctlcmd=0x89b0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3463.724360][ T30] audit: type=1400 audit(3463.190:474): avc: denied { name_bind } for pid=20605 comm="syz.3.8176" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 3467.505612][ T30] audit: type=1400 audit(3466.970:475): avc: denied { block_suspend } for pid=20627 comm="syz.3.8185" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3469.395024][T20638] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20638 comm=syz.3.8190 [ 3470.402508][ T30] audit: type=1400 audit(3469.860:476): avc: denied { ioctl } for pid=20643 comm="syz.3.8193" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=60314 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3471.868912][ T30] audit: type=1400 audit(3471.340:477): avc: denied { create } for pid=20653 comm="syz.2.8198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3471.918492][ T30] audit: type=1400 audit(3471.390:478): avc: denied { bind } for pid=20653 comm="syz.2.8198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3471.967979][ T30] audit: type=1400 audit(3471.440:479): avc: denied { accept } for pid=20653 comm="syz.2.8198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3472.035305][ T30] audit: type=1400 audit(3471.500:480): avc: denied { write } for pid=20653 comm="syz.2.8198" path="socket:[61221]" dev="sockfs" ino=61221 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3473.532658][ T30] audit: type=1400 audit(3473.010:481): avc: denied { watch watch_reads } for pid=20664 comm="syz.2.8204" path="pipe:[9201]" dev="pipefs" ino=9201 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 3476.268022][ T30] audit: type=1400 audit(3475.740:482): avc: denied { connect } for pid=20679 comm="syz.2.8211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3489.172799][ T30] audit: type=1400 audit(3488.640:483): avc: denied { ioctl } for pid=20754 comm="syz.2.8249" path="socket:[61501]" dev="sockfs" ino=61501 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3492.142274][ T30] audit: type=1400 audit(3491.610:484): avc: denied { write } for pid=20771 comm="syz.2.8256" path="socket:[61538]" dev="sockfs" ino=61538 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3493.468311][T20782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20782 comm=syz.2.8260 [ 3496.038218][ T30] audit: type=1400 audit(3495.510:485): avc: denied { node_bind } for pid=20797 comm="syz.2.8269" saddr=255.255.255.255 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3501.588418][ T30] audit: type=1400 audit(3501.060:486): avc: denied { execute } for pid=20827 comm="syz.2.8282" path="/4114/bus" dev="tmpfs" ino=21142 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3501.733478][ T30] audit: type=1400 audit(3501.190:487): avc: denied { setopt } for pid=20827 comm="syz.2.8282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3505.248936][ T30] audit: type=1400 audit(3504.710:488): avc: denied { prog_run } for pid=20848 comm="syz.2.8293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3512.825019][ T30] audit: type=1400 audit(3512.300:489): avc: denied { checkpoint_restore } for pid=20888 comm="syz.2.8312" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3518.506705][ T30] audit: type=1400 audit(3517.980:490): avc: denied { bind } for pid=20922 comm="syz.2.8329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3518.527892][ T30] audit: type=1400 audit(3518.000:491): avc: denied { node_bind } for pid=20922 comm="syz.2.8329" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 3520.081406][ T30] audit: type=1400 audit(3519.540:492): avc: denied { sqpoll } for pid=20930 comm="syz.3.8333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3549.242952][ T30] audit: type=1400 audit(3548.710:493): avc: denied { create } for pid=21081 comm="syz.2.8405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3549.321404][ T30] audit: type=1400 audit(3548.790:494): avc: denied { connect } for pid=21081 comm="syz.2.8405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3549.372386][ T30] audit: type=1400 audit(3548.840:495): avc: denied { bind } for pid=21081 comm="syz.2.8405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3549.408638][ T30] audit: type=1400 audit(3548.880:496): avc: denied { write } for pid=21081 comm="syz.2.8405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3550.574007][ T30] audit: type=1400 audit(3550.050:497): avc: denied { connect } for pid=21089 comm="syz.3.8409" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3554.884165][ T30] audit: type=1400 audit(3554.360:498): avc: denied { read } for pid=21107 comm="syz.2.8418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3555.237872][ T30] audit: type=1400 audit(3554.710:499): avc: denied { ioctl } for pid=21106 comm="syz.3.8417" path="socket:[62986]" dev="sockfs" ino=62986 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3559.441553][T21135] serio: Serial port ptm0 [ 3571.762190][ T30] audit: type=1400 audit(3571.230:500): avc: denied { read write } for pid=21199 comm="syz.2.8460" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 3571.766458][ T30] audit: type=1400 audit(3571.240:501): avc: denied { open } for pid=21199 comm="syz.2.8460" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 3571.793738][ T30] audit: type=1400 audit(3571.270:502): avc: denied { mounton } for pid=21199 comm="syz.2.8460" path="/4198/file0" dev="tmpfs" ino=21582 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3572.266356][ T30] audit: type=1400 audit(3571.740:503): avc: denied { unmount } for pid=5262 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3574.445945][ T30] audit: type=1400 audit(3573.920:504): avc: denied { ioctl } for pid=21216 comm="syz.2.8469" path="/dev/dma_heap/system" dev="devtmpfs" ino=674 ioctlcmd=0x1284 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3574.866389][ T30] audit: type=1400 audit(3574.340:505): avc: denied { mounton } for pid=21219 comm="syz.2.8471" path="/proc/8593/cgroup" dev="proc" ino=62404 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 3582.087719][ T30] audit: type=1400 audit(3581.560:506): avc: denied { nlmsg_write } for pid=21262 comm="syz.2.8491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 3594.234939][T21330] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21330 comm=syz.3.8523 [ 3600.969813][ T30] audit: type=1400 audit(3600.420:507): avc: denied { mount } for pid=21376 comm="syz.3.8546" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 3605.259789][ T30] audit: type=1400 audit(3604.730:508): avc: denied { getopt } for pid=21400 comm="syz.3.8558" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3618.456294][ T30] audit: type=1400 audit(3617.930:509): avc: denied { append } for pid=21469 comm="syz.3.8592" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 3622.725142][ T30] audit: type=1400 audit(3622.180:510): avc: denied { setopt } for pid=21494 comm="syz.3.8603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3622.781932][ T30] audit: type=1400 audit(3622.250:511): avc: denied { map } for pid=21494 comm="syz.3.8603" path="socket:[63951]" dev="sockfs" ino=63951 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3628.274780][T21521] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21521 comm=syz.2.8617 [ 3649.528045][ T30] audit: type=1400 audit(3649.000:512): avc: denied { write } for pid=21636 comm="syz.3.8675" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3649.589900][T21637] input: syz0 as /devices/virtual/input/input5 [ 3655.226524][ T30] audit: type=1400 audit(3654.700:513): avc: denied { create } for pid=21656 comm="syz.2.8683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3655.361824][ T30] audit: type=1400 audit(3654.830:514): avc: denied { setopt } for pid=21656 comm="syz.2.8683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3655.429071][T21658] syz.2.8683: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 3655.460726][T21658] CPU: 1 UID: 0 PID: 21658 Comm: syz.2.8683 Not tainted syzkaller #0 PREEMPT [ 3655.461108][T21658] Hardware name: linux,dummy-virt (DT) [ 3655.461638][T21658] Call trace: [ 3655.462024][T21658] show_stack+0x18/0x24 (C) [ 3655.463348][T21658] dump_stack_lvl+0xdc/0xf4 [ 3655.463491][T21658] dump_stack+0x1c/0x28 [ 3655.463645][T21658] warn_alloc+0x1c0/0x308 [ 3655.463751][T21658] __vmalloc_node_range_noprof+0xaa4/0xe60 [ 3655.463853][T21658] vmalloc_user_noprof+0xe4/0x128 [ 3655.463946][T21658] xskq_create+0xd4/0x174 [ 3655.464035][T21658] xsk_setsockopt+0x370/0x624 [ 3655.464120][T21658] do_sock_setsockopt+0x17c/0x354 [ 3655.464219][T21658] __sys_setsockopt+0xcc/0x164 [ 3655.464310][T21658] __arm64_sys_setsockopt+0xa4/0x100 [ 3655.464410][T21658] invoke_syscall+0x6c/0x258 [ 3655.464503][T21658] el0_svc_common.constprop.0+0xac/0x230 [ 3655.464587][T21658] do_el0_svc_compat+0x40/0x68 [ 3655.464677][T21658] el0_svc_compat+0x4c/0x184 [ 3655.464769][T21658] el0t_32_sync_handler+0x88/0xac [ 3655.464860][T21658] el0t_32_sync+0x19c/0x1a0 [ 3655.531514][T21658] Mem-Info: [ 3655.535429][T21658] active_anon:5870 inactive_anon:0 isolated_anon:0 [ 3655.535429][T21658] active_file:14543 inactive_file:2949 isolated_file:0 [ 3655.535429][T21658] unevictable:768 dirty:10 writeback:0 [ 3655.535429][T21658] slab_reclaimable:7624 slab_unreclaimable:30769 [ 3655.535429][T21658] mapped:2805 shmem:1106 pagetables:1191 [ 3655.535429][T21658] sec_pagetables:0 bounce:0 [ 3655.535429][T21658] kernel_misc_reclaimable:0 [ 3655.535429][T21658] free:194425 free_pcp:2094 free_cma:8000 [ 3655.536709][T21658] Node 0 active_anon:23480kB inactive_anon:0kB active_file:58172kB inactive_file:11796kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:11220kB dirty:40kB writeback:0kB shmem:4424kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:6624kB pagetables:4764kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 3655.537255][T21658] Node 0 DMA free:777700kB boost:0kB min:22528kB low:28160kB high:33792kB reserved_highatomic:0KB free_highatomic:0KB active_anon:23480kB inactive_anon:0kB active_file:58172kB inactive_file:11796kB unevictable:3072kB writepending:40kB present:2097152kB managed:1532220kB mlocked:0kB bounce:0kB free_pcp:8376kB local_pcp:876kB free_cma:32000kB [ 3655.538145][T21658] lowmem_reserve[]: 0 0 0 0 0 [ 3655.538928][T21658] Node 0 DMA: 337*4kB (UME) 498*8kB (UME) 247*16kB (UME) 291*32kB (UME) 159*64kB (UME) 81*128kB (UME) 69*256kB (UMC) 36*512kB (U) 22*1024kB (UEC) 12*2048kB (UMC) 160*4096kB (UMC) = 777700kB [ 3655.609439][T21658] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3655.609622][T21658] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=32768kB [ 3655.609748][T21658] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3655.609834][T21658] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=64kB [ 3655.654237][T21658] 18594 total pagecache pages [ 3655.655289][T21658] 0 pages in swap cache [ 3655.655856][T21658] Free swap = 124996kB [ 3655.668829][T21658] Total swap = 124996kB [ 3655.671007][T21658] 524288 pages RAM [ 3655.685449][T21658] 0 pages HighMem/MovableOnly [ 3655.697367][T21658] 141233 pages reserved [ 3655.698318][T21658] 8192 pages cma reserved [ 3655.698575][T21658] 1 pages hwpoisoned [ 3661.728027][ T30] audit: type=1400 audit(3661.190:515): avc: denied { open } for pid=21690 comm="syz.2.8698" path="/dev/ptyq8" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 3661.828776][ T30] audit: type=1400 audit(3661.300:516): avc: denied { ioctl } for pid=21690 comm="syz.2.8698" path="/dev/ptyq8" dev="devtmpfs" ino=119 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 3667.931400][ T30] audit: type=1400 audit(3667.400:517): avc: denied { audit_write } for pid=21721 comm="syz.3.8713" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3672.808736][T21747] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21747 comm=syz.3.8725 [ 3673.533824][ T30] audit: type=1400 audit(3673.010:518): avc: denied { ioctl } for pid=21751 comm="syz.2.8728" path="socket:[64989]" dev="sockfs" ino=64989 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3673.907869][ T30] audit: type=1400 audit(3673.380:519): avc: denied { mount } for pid=21755 comm="syz.2.8731" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 3679.982715][ T30] audit: type=1400 audit(3679.460:520): avc: denied { execute } for pid=21783 comm="syz.2.8744" path="/selinux/policy" dev="selinuxfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=file permissive=1 [ 3683.153496][T21803] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=21803 comm=syz.3.8751 [ 3686.662446][ T30] audit: type=1400 audit(3686.130:521): avc: denied { name_bind } for pid=21819 comm="syz.2.8756" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3688.745513][T21830] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21830 comm=syz.3.8760 [ 3689.578029][ T30] audit: type=1400 audit(3689.050:522): avc: denied { lock } for pid=21833 comm="syz.2.8762" path="socket:[65079]" dev="sockfs" ino=65079 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 3693.557336][ T30] audit: type=1400 audit(3693.020:523): avc: denied { set_context_mgr } for pid=21863 comm="syz.3.8777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 3693.605920][T21865] binder: BINDER_SET_CONTEXT_MGR already set [ 3693.606764][T21865] binder: 21863:21865 ioctl 4018620d 200002c0 returned -16 [ 3699.346205][T21895] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3699.366418][T21895] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3701.602619][ T30] audit: type=1400 audit(3701.060:524): avc: denied { read } for pid=21909 comm="syz.2.8799" name="usbmon1" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3701.606828][ T30] audit: type=1400 audit(3701.080:525): avc: denied { open } for pid=21909 comm="syz.2.8799" path="/dev/usbmon1" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3702.227936][ T30] audit: type=1400 audit(3701.700:526): avc: denied { ioctl } for pid=21909 comm="syz.2.8799" path="/dev/usbmon1" dev="devtmpfs" ino=697 ioctlcmd=0x9203 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3703.504284][T21920] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21920 comm=syz.3.8803 [ 3708.008510][ T30] audit: type=1400 audit(3707.480:527): avc: denied { write } for pid=21949 comm="syz.3.8818" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 3724.114479][T22042] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22042 comm=syz.2.8862 [ 3731.373467][ T30] audit: type=1400 audit(3730.840:528): avc: denied { name_bind } for pid=22082 comm="syz.3.8882" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 3732.757517][T22089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22089 comm=syz.2.8885 [ 3739.081235][ T30] audit: type=1400 audit(3738.540:529): avc: denied { write } for pid=22125 comm="syz.3.8902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3745.245483][ T30] audit: type=1400 audit(3744.720:530): avc: denied { create } for pid=22165 comm="syz.2.8921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3749.025327][ T30] audit: type=1400 audit(3748.470:531): avc: denied { map } for pid=22180 comm="syz.2.8928" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=66236 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3749.032211][ T30] audit: type=1400 audit(3748.500:532): avc: denied { read write } for pid=22180 comm="syz.2.8928" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=66236 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3752.866225][ T30] audit: type=1400 audit(3752.340:533): avc: denied { write } for pid=22194 comm="syz.3.8934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3758.517735][ T30] audit: type=1400 audit(3757.990:534): avc: denied { bind } for pid=22208 comm="syz.3.8941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3758.653804][ T30] audit: type=1400 audit(3758.130:535): avc: denied { listen } for pid=22208 comm="syz.3.8941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3775.453450][ T30] audit: type=1400 audit(3774.930:536): avc: denied { write } for pid=22276 comm="syz.3.8974" path="socket:[66368]" dev="sockfs" ino=66368 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3793.673473][T22339] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22339 comm=syz.2.9004 [ 3798.661133][ T30] audit: type=1400 audit(3798.120:537): avc: denied { mount } for pid=22358 comm="syz.2.9013" name="/" dev="configfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 3798.674085][ T30] audit: type=1400 audit(3798.150:538): avc: denied { search } for pid=22358 comm="syz.2.9013" name="/" dev="configfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 3798.705802][ T30] audit: type=1400 audit(3798.170:539): avc: denied { setattr } for pid=22358 comm="syz.2.9013" name="/" dev="configfs" ino=111 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 3804.471590][T22392] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=22392 comm=syz.2.9029 [ 3817.780824][ T30] audit: type=1400 audit(3817.250:540): avc: denied { bind } for pid=22473 comm="syz.3.9070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3817.813404][ T30] audit: type=1400 audit(3817.290:541): avc: denied { read } for pid=22473 comm="syz.3.9070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3825.964426][T22528] netlink: 12 bytes leftover after parsing attributes in process `syz.2.9096'. [ 3831.629092][T22556] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22556 comm=syz.2.9110 [ 3835.325069][ T30] audit: type=1400 audit(3834.790:542): avc: denied { unmount } for pid=20166 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3854.915835][ T30] audit: type=1400 audit(3854.390:543): avc: denied { create } for pid=22679 comm="syz.3.9172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3854.957694][T22685] netlink: 36 bytes leftover after parsing attributes in process `syz.3.9172'. [ 3854.972358][ T30] audit: type=1400 audit(3854.420:544): avc: denied { write } for pid=22679 comm="syz.3.9172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3869.005037][T22758] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1025 sclass=netlink_xfrm_socket pid=22758 comm=syz.3.9206 [ 3869.008443][ T30] audit: type=1400 audit(3868.460:545): avc: denied { write } for pid=22757 comm="syz.3.9206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3879.725117][T22834] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1549 sclass=netlink_route_socket pid=22834 comm=syz.3.9243 [ 3884.636165][ T30] audit: type=1400 audit(3884.110:546): avc: denied { create } for pid=22859 comm="syz.3.9256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 3884.800863][ T30] audit: type=1400 audit(3884.260:547): avc: denied { write } for pid=22859 comm="syz.3.9256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 3925.733175][T23051] 4„: renamed from wg0 (while UP) [ 3941.981624][ T30] audit: type=1400 audit(3941.450:548): avc: denied { execute } for pid=23106 comm="syz.2.9373" path="/dev/audio1" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 3948.139012][ T30] audit: type=1400 audit(3947.610:549): avc: denied { create } for pid=23143 comm="syz.2.9392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3948.182363][ T30] audit: type=1400 audit(3947.650:550): avc: denied { connect } for pid=23143 comm="syz.2.9392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3951.197522][ T30] audit: type=1400 audit(3950.670:551): avc: denied { map } for pid=23159 comm="syz.3.9401" path="socket:[69333]" dev="sockfs" ino=69333 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 3955.214081][T23181] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3955.218932][T23181] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3958.666007][ T30] audit: type=1400 audit(3958.140:552): avc: denied { read } for pid=23197 comm="syz.2.9418" path="socket:[70108]" dev="sockfs" ino=70108 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3959.314206][ T30] audit: type=1400 audit(3958.770:553): avc: denied { write } for pid=23200 comm="syz.3.9419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3959.378218][ T30] audit: type=1400 audit(3958.850:554): avc: denied { create } for pid=23201 comm="syz.2.9420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3959.402610][ T30] audit: type=1400 audit(3958.870:555): avc: denied { bind } for pid=23201 comm="syz.2.9420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3965.953552][T23236] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23236 comm=syz.2.9436 [ 3967.113631][ T30] audit: type=1400 audit(3966.580:556): avc: denied { remount } for pid=23241 comm="syz.2.9440" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3976.786971][ T30] audit: type=1400 audit(3976.260:557): avc: denied { connect } for pid=23290 comm="syz.3.9463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3976.871369][ T30] audit: type=1400 audit(3976.340:558): avc: denied { listen } for pid=23290 comm="syz.3.9463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3976.895030][ T30] audit: type=1400 audit(3976.360:559): avc: denied { accept } for pid=23290 comm="syz.3.9463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3989.301877][T23368] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=23368 comm=syz.3.9501 [ 3993.719067][T23394] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3993.747995][T23394] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4045.392648][ T30] audit: type=1400 audit(4044.860:560): avc: denied { getopt } for pid=23664 comm="syz.3.9645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4048.692846][ T30] audit: type=1400 audit(4048.160:561): avc: denied { ioctl } for pid=23678 comm="syz.3.9653" path="net:[4026532745]" dev="nsfs" ino=4026532745 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4055.359859][ T30] audit: type=1400 audit(4054.830:562): avc: denied { read } for pid=23697 comm="syz.2.9662" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 4082.376287][T23832] ptrace attach of "/syz-executor exec"[20166] was attempted by "/syz-executor exec"[23832] [ 4083.280804][ T30] audit: type=1400 audit(4082.740:563): avc: denied { mount } for pid=23834 comm="syz.3.9728" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 4085.104054][T23849] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=23849 comm=syz.3.9734 [ 4085.946464][T23853] misc userio: Begin command sent, but we're already running [ 4095.099799][T23899] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23899 comm=syz.2.9759 [ 4103.649906][ T30] audit: type=1400 audit(4103.120:564): avc: denied { connect } for pid=23946 comm="syz.3.9783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4103.847519][ T30] audit: type=1400 audit(4103.320:565): avc: denied { name_bind } for pid=23950 comm="syz.2.9785" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 4114.874930][ T30] audit: type=1400 audit(4114.340:566): avc: denied { read } for pid=23995 comm="syz.3.9806" path="socket:[72707]" dev="sockfs" ino=72707 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4116.721905][ T30] audit: type=1400 audit(4116.190:567): avc: denied { write } for pid=24003 comm="syz.3.9810" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 4123.537338][T24032] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24032 comm=syz.3.9824 [ 4129.209568][T24057] SELinux: syz.2.9836 (24057) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 4131.826680][T24065] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24065 comm=syz.3.9840 [ 4140.396957][ T30] audit: type=1400 audit(4139.870:568): avc: denied { lock } for pid=24093 comm="syz.3.9855" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 4152.761838][T24153] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24153 comm=syz.3.9883 [ 4152.824274][ T30] audit: type=1400 audit(4152.270:569): avc: denied { setattr } for pid=24150 comm="syz.2.9882" name="mixer" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 4155.299024][ T30] audit: type=1400 audit(4154.770:570): avc: denied { ioctl } for pid=24173 comm="syz.2.9894" path="socket:[73054]" dev="sockfs" ino=73054 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4155.322294][ T30] audit: type=1400 audit(4154.790:571): avc: denied { setopt } for pid=24173 comm="syz.2.9894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4159.258011][ T30] audit: type=1400 audit(4158.730:572): avc: denied { read write } for pid=24197 comm="syz.3.9906" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 4159.275825][ T30] audit: type=1400 audit(4158.750:573): avc: denied { open } for pid=24197 comm="syz.3.9906" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 4162.911404][T24220] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=18 sclass=netlink_audit_socket pid=24220 comm=syz.2.9916 [ 4163.018720][T24221] loop0: Can't mount, would change RO state [ 4163.029962][ T30] audit: type=1400 audit(4162.490:574): avc: denied { mounton } for pid=24219 comm="syz.3.9917" path="/913/file0" dev="loop0" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 4166.104570][ T30] audit: type=1400 audit(4165.580:575): avc: denied { create } for pid=24240 comm="syz.3.9927" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4166.158938][ T30] audit: type=1400 audit(4165.630:576): avc: denied { read } for pid=24240 comm="syz.3.9927" name="file2" dev="tmpfs" ino=4823 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4166.229856][ T30] audit: type=1400 audit(4165.660:577): avc: denied { open } for pid=24240 comm="syz.3.9927" path="/918/file2" dev="tmpfs" ino=4823 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4166.269175][ T30] audit: type=1400 audit(4165.740:578): avc: denied { ioctl } for pid=24240 comm="syz.3.9927" path="/918/file2" dev="tmpfs" ino=4823 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4166.314555][T24242] loop6: detected capacity change from 0 to 524288000 [ 4166.544786][ T30] audit: type=1400 audit(4166.020:579): avc: denied { unlink } for pid=20166 comm="syz-executor" name="file2" dev="tmpfs" ino=4823 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4185.557399][ T30] audit: type=1400 audit(4185.030:580): avc: denied { bind } for pid=24339 comm="syz.3.9977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4194.165855][ T30] audit: type=1400 audit(4193.630:581): avc: denied { compute_member } for pid=24387 comm="syz.3.9998" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 4204.444725][T24455] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24455 comm=syz.2.10031 [ 4213.669816][T24493] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24493 comm=syz.2.10050 [ 4256.474204][ T30] audit: type=1400 audit(4255.930:582): avc: denied { unlink } for pid=5262 comm="syz-executor" name=131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 dev="tmpfs" ino=25782 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 4264.633313][ T30] audit: type=1400 audit(4264.110:583): avc: denied { write } for pid=24679 comm="syz.2.10141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4265.157342][ T30] audit: type=1400 audit(4264.630:584): avc: denied { shutdown } for pid=24679 comm="syz.2.10141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4291.584838][T24805] hugetlbfs: syz.2.10202 (24805): Using mlock ulimits for SHM_HUGETLB is obsolete [ 4304.268832][T24892] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=273 sclass=netlink_tcpdiag_socket pid=24892 comm=syz.3.10245 [ 4313.284551][ T30] audit: type=1400 audit(4312.730:585): avc: denied { name_bind } for pid=24946 comm="syz.3.10272" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 4318.949391][ T30] audit: type=1400 audit(4318.420:586): avc: denied { create } for pid=24976 comm="syz.3.10287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 4319.077118][ T30] audit: type=1400 audit(4318.530:587): avc: denied { ioctl } for pid=24976 comm="syz.3.10287" path="socket:[75493]" dev="sockfs" ino=75493 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 4321.412794][T24994] input: syz1 as /devices/virtual/input/input6 [ 4322.447707][T24998] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44 sclass=netlink_audit_socket pid=24998 comm=syz.2.10297 [ 4325.796621][ T30] audit: type=1400 audit(4325.260:588): avc: denied { mount } for pid=25019 comm="syz.3.10308" name="/" dev="hugetlbfs" ino=76488 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 4330.377257][T25048] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25048 comm=syz.2.10321 [ 4349.338354][ T30] audit: type=1400 audit(4348.810:589): avc: denied { mount } for pid=25162 comm="syz.3.10378" name="/" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 4356.165394][T25202] netlink: 32 bytes leftover after parsing attributes in process `syz.2.10397'. [ 4356.168408][T25202] netlink: 16 bytes leftover after parsing attributes in process `syz.2.10397'. [ 4362.334227][ T30] audit: type=1400 audit(4361.790:590): avc: denied { read } for pid=25234 comm="syz.2.10413" path="socket:[77878]" dev="sockfs" ino=77878 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4373.633109][ T30] audit: type=1400 audit(4373.100:591): avc: denied { watch watch_reads } for pid=25296 comm="syz.2.10442" path="/5152" dev="tmpfs" ino=26584 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 4423.611952][T25611] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44 sclass=netlink_audit_socket pid=25611 comm=syz.3.10589 [ 4430.819043][T25649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25649 comm=syz.3.10611 [ 4433.081954][ T30] audit: type=1400 audit(2000000051.990:592): avc: denied { write } for pid=25660 comm="syz.3.10614" path="socket:[78580]" dev="sockfs" ino=78580 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4438.231651][ T30] audit: type=1400 audit(2000000057.150:593): avc: denied { unmount } for pid=5262 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 4443.813276][T25735] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25735 comm=syz.3.10649 [ 4447.068997][ T30] audit: type=1400 audit(2000000065.980:594): avc: denied { getopt } for pid=25756 comm="syz.3.10661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4451.657346][ T30] audit: type=1400 audit(2000000070.570:595): avc: denied { nlmsg_read } for pid=25784 comm="syz.3.10674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 4453.139488][T25790] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4454.243076][T25790] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4455.073666][T25790] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4455.525020][T25790] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4456.958711][ T1242] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 4457.563855][T14590] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 4458.061934][T14590] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 4458.494204][T20173] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 4458.879164][ T30] audit: type=1400 audit(2134217805.787:596): avc: denied { read write } for pid=25810 comm="syz.2.10687" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 4458.901355][ T30] audit: type=1400 audit(2134217805.807:597): avc: denied { open } for pid=25810 comm="syz.2.10687" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 4465.952297][T25859] syz.2.10711(25859): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 4474.559702][ T30] audit: type=1400 audit(2134217821.467:598): avc: denied { remount } for pid=25924 comm="syz.2.10744" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 4488.293251][ T30] audit: type=1400 audit(2134217835.207:599): avc: denied { getopt } for pid=26031 comm="syz.2.10798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4507.365686][T26154] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26154 comm=syz.3.10858 [ 4513.315047][ T30] audit: type=1400 audit(2134217860.227:600): avc: denied { read } for pid=26183 comm="syz.3.10873" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 4513.334494][ T30] audit: type=1400 audit(2134217860.237:601): avc: denied { open } for pid=26183 comm="syz.3.10873" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 4513.393068][ T30] audit: type=1400 audit(2134217860.297:602): avc: denied { ioctl } for pid=26183 comm="syz.3.10873" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9375 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 4535.661515][T26337] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26337 comm=syz.2.10944 [ 4593.362670][T26652] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26652 comm=syz.3.11100 [ 4594.746686][ T7359] syz_tun (unregistering): left allmulticast mode [ 4602.257579][ T1242] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4602.311144][ T1242] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4602.358618][ T1242] bond0 (unregistering): Released all slaves [ 4603.122907][ T1242] hsr_slave_0: left promiscuous mode [ 4603.128378][ T1242] hsr_slave_1: left promiscuous mode [ 4607.228076][ T30] audit: type=1400 audit(2134217954.137:603): avc: denied { nlmsg_tty_audit } for pid=26714 comm="syz.3.11124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 4616.226655][T26765] loop0: detected capacity change from 0 to 1008 [ 4621.289274][T26791] nbd0: detected capacity change from 0 to 127 [ 4621.308310][ T49] block nbd0: Receive control failed (result -32) [ 4621.308308][T26792] block nbd0: Receive control failed (result -32) [ 4621.494577][T26667] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 4621.527064][T26766] [ 4621.528641][T26766] ====================================================== [ 4621.528929][T26766] WARNING: possible circular locking dependency detected [ 4621.529205][T26766] syzkaller #0 Not tainted [ 4621.529351][T26766] ------------------------------------------------------ [ 4621.529554][T26766] udevd/26766 is trying to acquire lock: [ 4621.530024][T26766] ffff000019c49e70 (&nsock->tx_lock){+.+.}-{4:4}, at: nbd_queue_rq+0x2cc/0xb54 [ 4621.530844][T26766] [ 4621.530844][T26766] but task is already holding lock: [ 4621.531035][T26766] ffff00003b3351f8 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 4621.531350][T26766] [ 4621.531350][T26766] which lock already depends on the new lock. [ 4621.531350][T26766] [ 4621.531886][T26766] [ 4621.531886][T26766] the existing dependency chain (in reverse order) is: [ 4621.532647][T26766] [ 4621.532647][T26766] -> #6 (&cmd->lock){+.+.}-{4:4}: [ 4621.533306][T26766] __mutex_lock+0x144/0xffc [ 4621.533536][T26766] mutex_lock_nested+0x24/0x30 [ 4621.533700][T26766] nbd_queue_rq+0xa8/0xb54 [ 4621.533853][T26766] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 4621.534029][T26766] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 4621.534205][T26766] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 4621.534390][T26766] blk_mq_run_hw_queue+0x1e4/0x500 [ 4621.534543][T26766] blk_mq_dispatch_list+0x348/0xa50 [ 4621.534702][T26766] blk_mq_flush_plug_list+0xe8/0x508 [ 4621.534869][T26766] __blk_flush_plug+0x208/0x3b8 [ 4621.535031][T26766] __submit_bio+0x3a4/0x4ac [ 4621.535181][T26766] submit_bio_noacct_nocheck+0x59c/0xa8c [ 4621.535351][T26766] submit_bio_noacct+0x858/0x18f8 [ 4621.535515][T26766] submit_bio+0x32c/0x5f0 [ 4621.535702][T26766] submit_bh_wbc+0x310/0x480 [ 4621.535854][T26766] block_read_full_folio+0x26c/0x640 [ 4621.536016][T26766] blkdev_read_folio+0x1c/0x28 [ 4621.536061][T26667] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 4621.536385][T26766] filemap_read_folio+0xac/0x1fc [ 4621.536548][T26766] do_read_cache_folio+0x1c4/0x480 [ 4621.536724][T26766] read_cache_folio+0x44/0x6c [ 4621.536874][T26766] read_part_sector+0xac/0x5f4 [ 4621.537029][T26766] read_lba+0x15c/0x2ec [ 4621.537250][T26766] efi_partition+0x1dc/0x2154 [ 4621.537424][T26766] bdev_disk_changed+0x508/0xf0c [ 4621.537626][T26766] blkdev_get_whole+0x144/0x1e4 [ 4621.537843][T26766] bdev_open+0x1dc/0xa84 [ 4621.537992][T26766] blkdev_open+0x270/0x3dc [ 4621.538167][T26766] do_dentry_open+0x6a4/0x103c [ 4621.538324][T26766] vfs_open+0x5c/0x2fc [ 4621.538473][T26766] path_openat+0x1490/0x24b4 [ 4621.538630][T26766] do_filp_open+0x184/0x360 [ 4621.538791][T26766] do_sys_openat2+0xe0/0x160 [ 4621.538939][T26766] __arm64_sys_openat+0x12c/0x1bc [ 4621.539095][T26766] invoke_syscall+0x6c/0x258 [ 4621.539244][T26766] el0_svc_common.constprop.0+0xac/0x230 [ 4621.539438][T26766] do_el0_svc+0x40/0x58 [ 4621.539647][T26766] el0_svc+0x50/0x1a0 [ 4621.539808][T26766] el0t_64_sync_handler+0xa0/0xe4 [ 4621.540055][T26766] el0t_64_sync+0x198/0x19c [ 4621.540465][T26766] [ 4621.540465][T26766] -> #5 (set->srcu){.+.+}-{0:0}: [ 4621.541056][T26766] __synchronize_srcu+0xa8/0x268 [ 4621.541322][T26766] synchronize_srcu+0x12c/0x370 [ 4621.541636][T26766] blk_mq_quiesce_queue+0xf4/0x15c [ 4621.541922][T26766] elevator_switch+0x11c/0x414 [ 4621.542217][T26766] elevator_change+0x294/0x424 [ 4621.542504][T26766] elevator_set_default+0x22c/0x2ac [ 4621.542813][T26766] blk_register_queue+0x278/0x3ac [ 4621.543090][T26766] __add_disk+0x518/0xb80 [ 4621.543382][T26766] add_disk_fwnode+0x114/0x4c0 [ 4621.543693][T26766] device_add_disk+0x14/0x20 [ 4621.543985][T26766] nbd_dev_add+0x5f0/0x9c0 [ 4621.544251][T26766] nbd_init+0xd4/0x1a8 [ 4621.544552][T26766] do_one_initcall+0x130/0x7f0 [ 4621.544835][T26766] kernel_init_freeable+0x48c/0x70c [ 4621.545043][T26766] kernel_init+0x24/0x1dc [ 4621.545216][T26766] ret_from_fork+0x10/0x20 [ 4621.545417][T26766] [ 4621.545417][T26766] -> #4 (&q->elevator_lock){+.+.}-{4:4}: [ 4621.545724][T26766] __mutex_lock+0x144/0xffc [ 4621.545894][T26766] mutex_lock_nested+0x24/0x30 [ 4621.546062][T26766] elevator_change+0x130/0x424 [ 4621.546230][T26766] elevator_set_none+0x90/0xe4 [ 4621.546413][T26766] __blk_mq_update_nr_hw_queues+0x3b4/0xd38 [ 4621.546616][T26766] blk_mq_update_nr_hw_queues+0x44/0x68 [ 4621.546810][T26766] nbd_start_device+0x128/0xa38 [ 4621.547013][T26766] nbd_genl_connect+0xcb4/0x14c4 [ 4621.547318][T26766] genl_family_rcv_msg_doit+0x1b8/0x280 [ 4621.547728][T26766] genl_rcv_msg+0x3ec/0x5bc [ 4621.548038][T26766] netlink_rcv_skb+0x19c/0x338 [ 4621.548357][T26766] genl_rcv+0x38/0x50 [ 4621.548687][T26766] netlink_unicast+0x424/0x700 [ 4621.549003][T26766] netlink_sendmsg+0x644/0xa54 [ 4621.549317][T26766] __sock_sendmsg+0xc8/0x168 [ 4621.549639][T26766] ____sys_sendmsg+0x500/0x764 [ 4621.549943][T26766] ___sys_sendmsg+0x11c/0x19c [ 4621.550451][T26766] __sys_sendmsg+0x114/0x19c [ 4621.551036][T26766] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 4621.551414][T26766] invoke_syscall+0x6c/0x258 [ 4621.551760][T26766] el0_svc_common.constprop.0+0xac/0x230 [ 4621.552112][T26766] do_el0_svc_compat+0x40/0x68 [ 4621.552452][T26766] el0_svc_compat+0x4c/0x184 [ 4621.552763][T26766] el0t_32_sync_handler+0x88/0xac [ 4621.553080][T26766] el0t_32_sync+0x19c/0x1a0 [ 4621.553391][T26766] [ 4621.553391][T26766] -> #3 (&q->q_usage_counter(io)#33){++++}-{0:0}: [ 4621.554151][T26766] blk_alloc_queue+0x538/0x644 [ 4621.554495][T26766] blk_mq_alloc_queue+0x144/0x220 [ 4621.554831][T26766] __blk_mq_alloc_disk+0x20/0x1a4 [ 4621.555155][T26766] nbd_dev_add+0x3c0/0x9c0 [ 4621.555470][T26766] nbd_init+0xd4/0x1a8 [ 4621.555822][T26766] do_one_initcall+0x130/0x7f0 [ 4621.556140][T26766] kernel_init_freeable+0x48c/0x70c [ 4621.556493][T26766] kernel_init+0x24/0x1dc [ 4621.556797][T26766] ret_from_fork+0x10/0x20 [ 4621.556981][T26766] [ 4621.556981][T26766] -> #2 (fs_reclaim){+.+.}-{0:0}: [ 4621.557454][T26766] fs_reclaim_acquire+0x138/0x160 [ 4621.557794][T26766] kmem_cache_alloc_node_noprof+0x64/0x3b8 [ 4621.558149][T26766] __alloc_skb+0x208/0x2f0 [ 4621.558530][T26766] tcp_stream_alloc_skb+0x2c/0x450 [ 4621.558871][T26766] tcp_sendmsg_locked+0xf34/0x39e8 [ 4621.559197][T26766] tcp_sendmsg+0x38/0x60 [ 4621.559506][T26766] inet_sendmsg+0x90/0xd4 [ 4621.559824][T26766] __sock_sendmsg+0xc8/0x168 [ 4621.560053][T26766] sock_write_iter+0x1cc/0x300 [ 4621.560258][T26766] vfs_write+0x7bc/0xb88 [ 4621.560419][T26766] ksys_write+0x18c/0x1d8 [ 4621.560638][T26766] __arm64_sys_write+0x6c/0x9c [ 4621.560800][T26766] invoke_syscall+0x6c/0x258 [ 4621.560962][T26766] el0_svc_common.constprop.0+0xac/0x230 [ 4621.561144][T26766] do_el0_svc+0x40/0x58 [ 4621.561302][T26766] el0_svc+0x50/0x1a0 [ 4621.561465][T26766] el0t_64_sync_handler+0xa0/0xe4 [ 4621.561634][T26766] el0t_64_sync+0x198/0x19c [ 4621.561794][T26766] [ 4621.561794][T26766] -> #1 (sk_lock-AF_INET){+.+.}-{0:0}: [ 4621.562095][T26766] lock_sock_nested+0x38/0xe8 [ 4621.562265][T26766] inet_shutdown+0x50/0x348 [ 4621.562429][T26766] kernel_sock_shutdown+0x54/0x84 [ 4621.562599][T26766] nbd_mark_nsock_dead+0x100/0x534 [ 4621.562767][T26766] sock_shutdown+0x134/0x234 [ 4621.562926][T26766] nbd_config_put+0x154/0x5b0 [ 4621.563088][T26766] nbd_release+0x7c/0x128 [ 4621.563241][T26766] blkdev_put_whole+0x98/0xf0 [ 4621.563417][T26766] bdev_release+0x2a4/0x510 [ 4621.563609][T26766] blkdev_release+0x14/0x24 [ 4621.563770][T26766] __fput+0x2c8/0x954 [ 4621.563925][T26766] ____fput+0x14/0x20 [ 4621.564151][T26766] task_work_run+0x128/0x210 [ 4621.564486][T26766] do_notify_resume+0x1d8/0x260 [ 4621.564841][T26766] el0_svc_compat+0x104/0x184 [ 4621.565155][T26766] el0t_32_sync_handler+0x88/0xac [ 4621.565495][T26766] el0t_32_sync+0x19c/0x1a0 [ 4621.565812][T26766] [ 4621.565812][T26766] -> #0 (&nsock->tx_lock){+.+.}-{4:4}: [ 4621.566399][T26766] __lock_acquire+0x1638/0x2380 [ 4621.566642][T26766] lock_acquire+0x310/0x38c [ 4621.566814][T26766] __mutex_lock+0x144/0xffc [ 4621.566970][T26766] mutex_lock_nested+0x24/0x30 [ 4621.567147][T26766] nbd_queue_rq+0x2cc/0xb54 [ 4621.567486][T26766] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 4621.567870][T26766] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 4621.568228][T26766] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 4621.568488][T26766] blk_mq_run_hw_queue+0x1e4/0x500 [ 4621.568673][T26766] blk_mq_dispatch_list+0x348/0xa50 [ 4621.568849][T26766] blk_mq_flush_plug_list+0xe8/0x508 [ 4621.569024][T26766] __blk_flush_plug+0x208/0x3b8 [ 4621.569199][T26766] __submit_bio+0x3a4/0x4ac [ 4621.569355][T26766] submit_bio_noacct_nocheck+0x59c/0xa8c [ 4621.569550][T26766] submit_bio_noacct+0x858/0x18f8 [ 4621.569732][T26766] submit_bio+0x32c/0x5f0 [ 4621.569891][T26766] submit_bh_wbc+0x310/0x480 [ 4621.570284][T26766] block_read_full_folio+0x26c/0x640 [ 4621.570469][T26766] blkdev_read_folio+0x1c/0x28 [ 4621.570638][T26766] filemap_read_folio+0xac/0x1fc [ 4621.570943][T26766] do_read_cache_folio+0x1c4/0x480 [ 4621.571115][T26766] read_cache_folio+0x44/0x6c [ 4621.571274][T26766] read_part_sector+0xac/0x5f4 [ 4621.571445][T26766] read_lba+0x15c/0x2ec [ 4621.571621][T26766] efi_partition+0x1dc/0x2154 [ 4621.571791][T26766] bdev_disk_changed+0x508/0xf0c [ 4621.571967][T26766] blkdev_get_whole+0x144/0x1e4 [ 4621.572132][T26766] bdev_open+0x1dc/0xa84 [ 4621.572288][T26766] blkdev_open+0x270/0x3dc [ 4621.572450][T26766] do_dentry_open+0x6a4/0x103c [ 4621.572613][T26766] vfs_open+0x5c/0x2fc [ 4621.572764][T26766] path_openat+0x1490/0x24b4 [ 4621.572923][T26766] do_filp_open+0x184/0x360 [ 4621.573076][T26766] do_sys_openat2+0xe0/0x160 [ 4621.573233][T26766] __arm64_sys_openat+0x12c/0x1bc [ 4621.573405][T26766] invoke_syscall+0x6c/0x258 [ 4621.573568][T26766] el0_svc_common.constprop.0+0xac/0x230 [ 4621.573750][T26766] do_el0_svc+0x40/0x58 [ 4621.573897][T26766] el0_svc+0x50/0x1a0 [ 4621.574049][T26766] el0t_64_sync_handler+0xa0/0xe4 [ 4621.574218][T26766] el0t_64_sync+0x198/0x19c [ 4621.574405][T26766] [ 4621.574405][T26766] other info that might help us debug this: [ 4621.574405][T26766] [ 4621.574738][T26766] Chain exists of: [ 4621.574738][T26766] &nsock->tx_lock --> set->srcu --> &cmd->lock [ 4621.574738][T26766] [ 4621.575156][T26766] Possible unsafe locking scenario: [ 4621.575156][T26766] [ 4621.575317][T26766] CPU0 CPU1 [ 4621.575642][T26766] ---- ---- [ 4621.575949][T26766] lock(&cmd->lock); [ 4621.576327][T26766] lock(set->srcu); [ 4621.576779][T26766] lock(&cmd->lock); [ 4621.577266][T26766] lock(&nsock->tx_lock); [ 4621.577699][T26766] [ 4621.577699][T26766] *** DEADLOCK *** [ 4621.577699][T26766] [ 4621.578193][T26766] 3 locks held by udevd/26766: [ 4621.578539][T26766] #0: ffff000014836358 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0x2c4/0xa84 [ 4621.579100][T26766] #1: ffff000012454c10 (set->srcu){.+.+}-{0:0}, at: blk_mq_run_hw_queue+0x19c/0x500 [ 4621.579475][T26766] #2: ffff00003b3351f8 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 4621.579936][T26766] [ 4621.579936][T26766] stack backtrace: [ 4621.580295][T26766] CPU: 1 UID: 0 PID: 26766 Comm: udevd Not tainted syzkaller #0 PREEMPT [ 4621.580526][T26766] Hardware name: linux,dummy-virt (DT) [ 4621.580768][T26766] Call trace: [ 4621.580900][T26766] show_stack+0x18/0x24 (C) [ 4621.581068][T26766] dump_stack_lvl+0xa4/0xf4 [ 4621.581231][T26766] dump_stack+0x1c/0x28 [ 4621.581382][T26766] print_circular_bug+0x28c/0x370 [ 4621.581559][T26766] check_noncircular+0x168/0x17c [ 4621.581718][T26766] __lock_acquire+0x1638/0x2380 [ 4621.581883][T26766] lock_acquire+0x310/0x38c [ 4621.582038][T26766] __mutex_lock+0x144/0xffc [ 4621.582217][T26766] mutex_lock_nested+0x24/0x30 [ 4621.582415][T26766] nbd_queue_rq+0x2cc/0xb54 [ 4621.582586][T26766] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 4621.582769][T26766] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 4621.582968][T26766] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 4621.583152][T26766] blk_mq_run_hw_queue+0x1e4/0x500 [ 4621.583333][T26766] blk_mq_dispatch_list+0x348/0xa50 [ 4621.583512][T26766] blk_mq_flush_plug_list+0xe8/0x508 [ 4621.583731][T26766] __blk_flush_plug+0x208/0x3b8 [ 4621.583885][T26766] __submit_bio+0x3a4/0x4ac [ 4621.584046][T26766] submit_bio_noacct_nocheck+0x59c/0xa8c [ 4621.584226][T26766] submit_bio_noacct+0x858/0x18f8 [ 4621.584403][T26766] submit_bio+0x32c/0x5f0 [ 4621.584563][T26766] submit_bh_wbc+0x310/0x480 [ 4621.584725][T26766] block_read_full_folio+0x26c/0x640 [ 4621.584896][T26766] blkdev_read_folio+0x1c/0x28 [ 4621.585061][T26766] filemap_read_folio+0xac/0x1fc [ 4621.585227][T26766] do_read_cache_folio+0x1c4/0x480 [ 4621.585392][T26766] read_cache_folio+0x44/0x6c [ 4621.585554][T26766] read_part_sector+0xac/0x5f4 [ 4621.585754][T26766] read_lba+0x15c/0x2ec [ 4621.585904][T26766] efi_partition+0x1dc/0x2154 [ 4621.586099][T26766] bdev_disk_changed+0x508/0xf0c [ 4621.586263][T26766] blkdev_get_whole+0x144/0x1e4 [ 4621.586435][T26766] bdev_open+0x1dc/0xa84 [ 4621.586588][T26766] blkdev_open+0x270/0x3dc [ 4621.586750][T26766] do_dentry_open+0x6a4/0x103c [ 4621.586912][T26766] vfs_open+0x5c/0x2fc [ 4621.587187][T26766] path_openat+0x1490/0x24b4 [ 4621.587527][T26766] do_filp_open+0x184/0x360 [ 4621.587873][T26766] do_sys_openat2+0xe0/0x160 [ 4621.588183][T26766] __arm64_sys_openat+0x12c/0x1bc [ 4621.588515][T26766] invoke_syscall+0x6c/0x258 [ 4621.588859][T26766] el0_svc_common.constprop.0+0xac/0x230 [ 4621.589205][T26766] do_el0_svc+0x40/0x58 [ 4621.589510][T26766] el0_svc+0x50/0x1a0 [ 4621.589804][T26766] el0t_64_sync_handler+0xa0/0xe4 [ 4621.590289][T26766] el0t_64_sync+0x198/0x19c SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 4621.641637][ T30] audit: type=1400 audit(2134217968.537:604): avc: denied { write } for pid=3316 comm="syz-executor" path="pipe:[3539]" dev="pipefs" ino=3539 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 4621.706220][T26766] block nbd0: Dead connection, failed to find a fallback [ 4621.706680][T26766] block nbd0: shutting down sockets [ 4621.707256][T26766] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4621.707586][T26766] Buffer I/O error on dev nbd0, logical block 0, async page read [ 4621.708733][T26766] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4621.708804][T26766] Buffer I/O error on dev nbd0, logical block 1, async page read [ 4621.709084][T26766] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4621.709144][T26766] Buffer I/O error on dev nbd0, logical block 2, async page read [ 4621.709466][T26766] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4621.709559][T26766] Buffer I/O error on dev nbd0, logical block 3, async page read [ 4621.742843][T26766] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4621.744972][T26766] Buffer I/O error on dev nbd0, logical block 0, async page read [ 4621.747433][T26766] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4621.748914][T26766] Buffer I/O error on dev nbd0, logical block 1, async page read [ 4621.751709][T26766] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4621.754200][T26766] Buffer I/O error on dev nbd0, logical block 2, async page read [ 4621.756639][T26766] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4621.758198][T26766] Buffer I/O error on dev nbd0, logical block 3, async page read [ 4621.760969][T26766] nbd0: unable to read partition table [ 4621.796448][T26766] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4621.798452][T26766] Buffer I/O error on dev nbd0, logical block 0, async page read [ 4621.805913][T26766] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 4621.807729][T26766] Buffer I/O error on dev nbd0, logical block 1, async page read [ 4621.813396][T26766] nbd0: unable to read partition table [ 4622.974103][T14590] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4623.024989][T14590] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4623.066730][T14590] bond0 (unregistering): Released all slaves VM DIAGNOSIS: 11:47:46 Registers: info registers vcpu 0 CPU#0 PC=ffff800080321eb0 X00=ffff80008d3703f4 X01=0000000000000003 X02=0000000000000001 X03=0000000000000000 X04=ffff800080008000 X05=0000000000000000 X06=ffff700010000bb1 X07=ffff800080005e50 X08=ffff800080005dd8 X09=dfff800000000000 X10=ffff700010000bba X11=1ffff00010000bba X12=ffff700010000bbb X13=00ca00d800ec0008 X14=1fffe00003bb4c65 X15=ffff0000198a9280 X16=0000000000000000 X17=1fffe00003bb4b78 X18=ffff0000198a9290 X19=fffffdffc0621080 X20=ffff0000173c0000 X21=ffff0000188423c0 X22=ffff00000e964a00 X23=ffff800084503cfc X24=0000000000112110 X25=0000000000000000 X26=0000000000000000 X27=0000000000000000 X28=ffff00001304e000 X29=ffff800080005c20 X30=ffff800085445f28 SP=ffff800080005c50 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800081be9d24 X00=0000000000000002 X01=0000000000000007 X02=0000000000000000 X03=1fffe00001ddc22f X04=0000000000000018 X05=ffff800087ad2800 X06=ffff700010f5a500 X07=0000000000000001 X08=ffff800087ad2800 X09=dfff800000000000 X10=ffff700010f5a500 X11=1ffff00010f5a500 X12=ffff700010f5a501 X13=205d363637363254 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff00000eee1080 X20=ffff80008d4eb018 X21=ffff800087b4e580 X22=000000000000000a X23=dfff800000000000 X24=ffff00000eeec04f X25=0000000000000007 X26=ffff00000eee12d8 X27=ffff00000eee1080 X28=dfff800000000000 X29=ffff8000a2975990 X30=ffff800081be9fb0 SP=ffff8000a2975990 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0a0a0a0a0a0a0a0a:0a0a0a0a0a0a0a0a Q01=203a3064626e2000:006b6e696c207075 Q02=656361667265746e:6920657669746361 Q03=00000000000000ff:ff00000000000000 Q04=0000000000000000:0000000ff0000000 Q05=736120676e697661:6c736e45203a2930 Q06=203a29305f657661:6c735f646e6f6220 Q07=206e612073612067:6e6976616c736e45 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff7302f80:0000fffff7302f80 Q17=ffffff80ffffffd8:0000fffff7302f50 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000