last executing test programs: 4.222629414s ago: executing program 0 (id=1151): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 3.599291523s ago: executing program 1 (id=1152): pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0x541b, &(0x7f0000000000)) 3.362934803s ago: executing program 0 (id=1153): r0 = socket$unix(0x1, 0x1, 0x0) getsockname$inet6(r0, 0x0, &(0x7f0000004180)) 3.035513803s ago: executing program 1 (id=1154): r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) lseek(r0, 0xfffffffffffffffa, 0x4) 2.859816545s ago: executing program 0 (id=1155): socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$char_usb(r0, 0x0, 0x0) 2.440294278s ago: executing program 1 (id=1156): r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x40142, 0x0) write$evdev(r0, 0x0, 0x0) 2.045181768s ago: executing program 0 (id=1157): r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x5452, &(0x7f0000000040)) 1.609811613s ago: executing program 1 (id=1158): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000001080), 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000001480)) 1.254012748s ago: executing program 0 (id=1159): r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xc0, 0x0) fchmod(r0, 0x0) 590.343834ms ago: executing program 1 (id=1160): r0 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RRENAME(r0, &(0x7f0000001a40)={0x7}, 0x7) 362.866883ms ago: executing program 0 (id=1161): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000000), 0x180300, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000040)={0x191, 0x150, 0xa0, 0x3f, 0x32, 0x1, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x40, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0xfffffffd, 0x0, 0x8, 0x4, 0x0, 0x0, 0xa}) 0s ago: executing program 1 (id=1162): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={0x0}}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:46950' (ED25519) to the list of known hosts. [ 269.223872][ T30] audit: type=1400 audit(268.600:46): avc: denied { name_bind } for pid=3322 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 269.951637][ T30] audit: type=1400 audit(269.330:47): avc: denied { execute } for pid=3323 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 269.959879][ T30] audit: type=1400 audit(269.340:48): avc: denied { execute_no_trans } for pid=3323 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 277.335840][ T30] audit: type=1400 audit(276.720:49): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 277.382946][ T30] audit: type=1400 audit(276.760:50): avc: denied { mount } for pid=3323 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 277.441962][ T3323] cgroup: Unknown subsys name 'net' [ 277.513683][ T30] audit: type=1400 audit(276.900:51): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 277.995506][ T3323] cgroup: Unknown subsys name 'cpuset' [ 278.065067][ T3323] cgroup: Unknown subsys name 'rlimit' [ 278.429407][ T30] audit: type=1400 audit(277.810:52): avc: denied { setattr } for pid=3323 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 278.436000][ T30] audit: type=1400 audit(277.820:53): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 278.440171][ T30] audit: type=1400 audit(277.820:54): avc: denied { mount } for pid=3323 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 279.173745][ T3325] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 279.179642][ T30] audit: type=1400 audit(278.560:55): avc: denied { relabelto } for pid=3325 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 279.188775][ T30] audit: type=1400 audit(278.570:56): avc: denied { write } for pid=3325 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 279.334296][ T30] audit: type=1400 audit(278.710:57): avc: denied { read } for pid=3323 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 279.338753][ T30] audit: type=1400 audit(278.720:58): avc: denied { open } for pid=3323 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 279.364479][ T3323] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 304.598881][ T30] audit: type=1400 audit(303.980:59): avc: denied { execmem } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 304.759931][ T30] audit: type=1400 audit(304.140:60): avc: denied { read } for pid=3328 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 304.765365][ T30] audit: type=1400 audit(304.150:61): avc: denied { open } for pid=3328 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 304.787523][ T30] audit: type=1400 audit(304.170:62): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 304.906983][ T30] audit: type=1400 audit(304.290:63): avc: denied { module_request } for pid=3328 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 305.339039][ T30] audit: type=1400 audit(304.720:64): avc: denied { sys_module } for pid=3329 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 315.187340][ T3329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 315.354734][ T3329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 315.789009][ T3328] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 315.850048][ T3328] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 319.960278][ T3329] hsr_slave_0: entered promiscuous mode [ 319.982313][ T3329] hsr_slave_1: entered promiscuous mode [ 320.416722][ T3328] hsr_slave_0: entered promiscuous mode [ 320.429240][ T3328] hsr_slave_1: entered promiscuous mode [ 320.440548][ T3328] debugfs: 'hsr0' already exists in 'hsr' [ 320.444799][ T3328] Cannot create hsr debugfs directory [ 323.618898][ T30] audit: type=1400 audit(323.000:65): avc: denied { create } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 323.639877][ T30] audit: type=1400 audit(323.020:66): avc: denied { write } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 323.696664][ T30] audit: type=1400 audit(323.080:67): avc: denied { read } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 323.788077][ T3329] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 323.946040][ T3329] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 324.016921][ T3329] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 324.174494][ T3329] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 324.649807][ T3328] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 324.748113][ T3328] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 325.042873][ T3328] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 325.133429][ T3328] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 329.586819][ T3329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 330.342714][ T3328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 344.843896][ T3329] veth0_vlan: entered promiscuous mode [ 345.057715][ T3329] veth1_vlan: entered promiscuous mode [ 345.506480][ T3329] veth0_macvtap: entered promiscuous mode [ 345.588708][ T3329] veth1_macvtap: entered promiscuous mode [ 346.216543][ T1266] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 346.219792][ T1266] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 346.267669][ T1266] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 346.273508][ T1594] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 347.358387][ T30] audit: type=1400 audit(346.740:68): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 347.461817][ T30] audit: type=1400 audit(346.840:69): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.1eoxpy/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 347.530356][ T30] audit: type=1400 audit(346.910:70): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 347.576988][ T30] audit: type=1400 audit(346.960:71): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.1eoxpy/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 347.579761][ T3328] veth0_vlan: entered promiscuous mode [ 347.612564][ T30] audit: type=1400 audit(346.980:72): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.1eoxpy/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4027 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 347.695631][ T30] audit: type=1400 audit(347.080:73): avc: denied { unmount } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 347.805941][ T30] audit: type=1400 audit(347.170:74): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 347.883958][ T30] audit: type=1400 audit(347.240:75): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="gadgetfs" ino=2932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 347.922936][ T30] audit: type=1400 audit(347.300:76): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 347.935619][ T30] audit: type=1400 audit(347.320:77): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 348.024877][ T3328] veth1_vlan: entered promiscuous mode [ 348.505917][ T3329] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 348.760031][ T3328] veth0_macvtap: entered promiscuous mode [ 348.938899][ T3328] veth1_macvtap: entered promiscuous mode [ 349.989234][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 349.992698][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 349.994553][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 350.001484][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 365.960052][ T3529] Zero length message leads to an empty skb [ 376.878275][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 376.879750][ T30] audit: type=1400 audit(376.260:82): avc: denied { map } for pid=3587 comm="syz.0.52" path="socket:[5201]" dev="sockfs" ino=5201 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 401.557736][ T30] audit: type=1400 audit(400.940:83): avc: denied { read write } for pid=3725 comm="syz.1.121" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 401.560025][ T30] audit: type=1400 audit(400.940:84): avc: denied { open } for pid=3725 comm="syz.1.121" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 409.151979][ T30] audit: type=1400 audit(408.530:85): avc: denied { create } for pid=3765 comm="syz.0.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 420.033828][ T30] audit: type=1400 audit(419.390:86): avc: denied { open } for pid=3814 comm="syz.1.166" path="/dev/ptyq7" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 420.178079][ T30] audit: type=1400 audit(419.560:87): avc: denied { ioctl } for pid=3814 comm="syz.1.166" path="/dev/ptyq7" dev="devtmpfs" ino=119 ioctlcmd=0x5414 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 432.622811][ T30] audit: type=1400 audit(432.000:88): avc: denied { read } for pid=3881 comm="syz.1.199" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 432.637262][ T30] audit: type=1400 audit(432.020:89): avc: denied { open } for pid=3881 comm="syz.1.199" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 432.738487][ T30] audit: type=1400 audit(432.120:90): avc: denied { ioctl } for pid=3881 comm="syz.1.199" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x7003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 448.007872][ T30] audit: type=1400 audit(447.390:91): avc: denied { create } for pid=3953 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 448.064760][ T30] audit: type=1400 audit(447.450:92): avc: denied { write } for pid=3953 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 449.386966][ T30] audit: type=1400 audit(448.770:93): avc: denied { create } for pid=3961 comm="syz.1.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 449.446113][ T30] audit: type=1400 audit(448.830:94): avc: denied { write } for pid=3961 comm="syz.1.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 461.694553][ T30] audit: type=1400 audit(461.060:95): avc: denied { setattr } for pid=4020 comm="syz.0.267" name="seq" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 480.484506][ T30] audit: type=1400 audit(479.870:96): avc: denied { create } for pid=4104 comm="syz.0.308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 480.514078][ T30] audit: type=1400 audit(479.900:97): avc: denied { getopt } for pid=4104 comm="syz.0.308" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 520.848336][ T30] audit: type=1400 audit(520.230:98): avc: denied { write } for pid=4318 comm="syz.1.414" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 528.579963][ T30] audit: type=1400 audit(527.930:99): avc: denied { create } for pid=4359 comm="syz.1.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 528.614760][ T30] audit: type=1400 audit(528.000:100): avc: denied { setopt } for pid=4359 comm="syz.1.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 576.217533][ T30] audit: type=1400 audit(575.600:101): avc: denied { audit_write } for pid=4594 comm="syz.0.550" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 615.967232][ T30] audit: type=1400 audit(615.350:102): avc: denied { create } for pid=4782 comm="syz.1.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 616.009843][ T30] audit: type=1400 audit(615.390:103): avc: denied { connect } for pid=4782 comm="syz.1.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 621.013247][ T30] audit: type=1400 audit(620.380:104): avc: denied { create } for pid=4806 comm="syz.1.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 621.028418][ T30] audit: type=1400 audit(620.410:105): avc: denied { connect } for pid=4806 comm="syz.1.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 626.724627][ T30] audit: type=1400 audit(626.070:106): avc: denied { read } for pid=4835 comm="syz.0.669" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 626.728766][ T30] audit: type=1400 audit(626.110:107): avc: denied { open } for pid=4835 comm="syz.0.669" path="/dev/dri/card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 626.778851][ T30] audit: type=1400 audit(626.160:108): avc: denied { ioctl } for pid=4835 comm="syz.0.669" path="/dev/dri/card1" dev="devtmpfs" ino=619 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 635.532523][ T30] audit: type=1400 audit(634.910:109): avc: denied { read } for pid=4882 comm="syz.1.693" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 635.536637][ T30] audit: type=1400 audit(634.910:110): avc: denied { open } for pid=4882 comm="syz.1.693" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 635.556119][ T30] audit: type=1400 audit(634.940:111): avc: denied { setattr } for pid=4882 comm="syz.1.693" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 636.206876][ T4889] ======================================================= [ 636.206876][ T4889] WARNING: The mand mount option has been deprecated and [ 636.206876][ T4889] and is ignored by this kernel. Remove the mand [ 636.206876][ T4889] option from the mount to silence this warning. [ 636.206876][ T4889] ======================================================= [ 636.216667][ T30] audit: type=1400 audit(635.590:112): avc: denied { mounton } for pid=4886 comm="syz.1.695" path="/351/file0" dev="tmpfs" ino=1808 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 636.502036][ T30] audit: type=1400 audit(635.880:113): avc: denied { unmount } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 654.825697][ T4984] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4984 comm=syz.0.742 [ 668.478330][ T30] audit: type=1400 audit(667.860:114): avc: denied { read write } for pid=5042 comm="syz.0.770" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 668.485270][ T30] audit: type=1400 audit(667.860:115): avc: denied { open } for pid=5042 comm="syz.0.770" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 668.506693][ T30] audit: type=1400 audit(667.890:116): avc: denied { ioctl } for pid=5042 comm="syz.0.770" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 669.045621][ T36] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 669.283528][ T36] usb 1-1: Using ep0 maxpacket: 32 [ 669.416626][ T36] usb 1-1: config 0 has an invalid interface number: 188 but max is 0 [ 669.417486][ T36] usb 1-1: config 0 has no interface number 0 [ 669.418862][ T36] usb 1-1: config 0 interface 188 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 32 [ 669.584590][ T36] usb 1-1: New USB device found, idVendor=17ef, idProduct=7203, bcdDevice=2e.36 [ 669.585537][ T36] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 669.586293][ T36] usb 1-1: Product: syz [ 669.586421][ T36] usb 1-1: Manufacturer: syz [ 669.586540][ T36] usb 1-1: SerialNumber: syz [ 669.836117][ T36] usb 1-1: config 0 descriptor?? [ 669.997578][ T5044] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 670.385522][ T5044] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 670.659576][ T36] asix 1-1:0.188 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -71 [ 670.673287][ T36] asix 1-1:0.188: probe with driver asix failed with error -71 [ 671.055192][ T36] usb 1-1: USB disconnect, device number 2 [ 678.132372][ T30] audit: type=1400 audit(677.510:117): avc: denied { map_create } for pid=5086 comm="syz.1.791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 678.154974][ T30] audit: type=1400 audit(677.540:118): avc: denied { bpf } for pid=5086 comm="syz.1.791" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 678.170343][ T30] audit: type=1400 audit(677.540:119): avc: denied { perfmon } for pid=5086 comm="syz.1.791" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 678.182707][ T30] audit: type=1400 audit(677.550:120): avc: denied { map_read map_write } for pid=5086 comm="syz.1.791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 715.008205][ T30] audit: type=1400 audit(714.380:121): avc: denied { read append } for pid=5259 comm="syz.0.877" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 715.032678][ T30] audit: type=1400 audit(714.410:122): avc: denied { open } for pid=5259 comm="syz.0.877" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 715.068257][ T30] audit: type=1400 audit(714.440:123): avc: denied { ioctl } for pid=5259 comm="syz.0.877" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 724.617223][ T30] audit: type=1400 audit(724.000:124): avc: denied { write } for pid=5295 comm="syz.0.896" name="kcm" dev="proc" ino=4026532783 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 774.473522][ T30] audit: type=1400 audit(773.860:125): avc: denied { read write } for pid=5552 comm="syz.1.1023" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 774.484121][ T30] audit: type=1400 audit(773.870:126): avc: denied { open } for pid=5552 comm="syz.1.1023" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 787.466551][ T30] audit: type=1400 audit(786.850:127): avc: denied { ioctl } for pid=5602 comm="syz.1.1048" path="socket:[11569]" dev="sockfs" ino=11569 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 794.282964][ T30] audit: type=1400 audit(793.660:128): avc: denied { allowed } for pid=5630 comm="syz.1.1062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 798.903215][ T30] audit: type=1400 audit(798.280:129): avc: denied { accept } for pid=5655 comm="syz.1.1073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 803.840190][ T30] audit: type=1400 audit(803.220:130): avc: denied { setattr } for pid=5677 comm="syz.1.1084" name="ttyS3" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 806.758350][ T30] audit: type=1400 audit(806.140:131): avc: denied { getopt } for pid=5689 comm="syz.1.1090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 835.127402][ T30] audit: type=1400 audit(834.510:132): avc: denied { read write } for pid=5832 comm="syz.0.1161" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 835.148079][ T30] audit: type=1400 audit(834.530:133): avc: denied { open } for pid=5832 comm="syz.0.1161" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 835.211989][ T30] audit: type=1400 audit(834.580:134): avc: denied { ioctl } for pid=5832 comm="syz.0.1161" path="/dev/fb0" dev="devtmpfs" ino=620 ioctlcmd=0x4601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 835.399166][ T5833] ------------[ cut here ]------------ [ 835.399579][ T5833] WARNING: drivers/gpu/drm/vkms/vkms_crtc.c:97 at vkms_get_vblank_timestamp+0x128/0x16c, CPU#1: syz.0.1161/5833 [ 835.403729][ T5833] Modules linked in: [ 835.405240][ T5833] CPU: 1 UID: 0 PID: 5833 Comm: syz.0.1161 Not tainted syzkaller #0 PREEMPT [ 835.405933][ T5833] Hardware name: linux,dummy-virt (DT) [ 835.406694][ T5833] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 835.407618][ T5833] pc : vkms_get_vblank_timestamp+0x128/0x16c [ 835.407917][ T5833] lr : vkms_get_vblank_timestamp+0x20/0x16c [ 835.408193][ T5833] sp : ffff80008f6472f0 [ 835.408412][ T5833] x29: ffff80008f6472f0 x28: ffff000014271000 x27: 0000000000000003 [ 835.408945][ T5833] x26: ffff00000f70c080 x25: 0000000000000001 x24: 1fffe00001ef0a38 [ 835.409263][ T5833] x23: ffff800085be1ba0 x22: ffff80008f6474c0 x21: 000000c25d30d500 [ 835.409611][ T5833] x20: ffff00000f70c080 x19: ffff00000f785080 x18: 0000000000000002 [ 835.410061][ T5833] x17: ffff00001428b908 x16: ffff00006a068504 x15: ffff800080b19ce8 [ 835.410484][ T5833] x14: ffff80008191a978 x13: 0000000000000000 x12: ffff80008e9d9000 [ 835.411048][ T5833] x11: 1fffe00002b3d822 x10: ffff600002b3d822 x9 : dfff800000000000 [ 835.411598][ T5833] x8 : 0000000041b58ab3 x7 : ffff700011ec8e6e x6 : dfff800000000000 [ 835.412182][ T5833] x5 : 0000000000000000 x4 : 1fffe00001ef0a4a x3 : 0000000000000000 [ 835.412690][ T5833] x2 : 1fffe00001ef0a35 x1 : 0000000000000000 x0 : 000000c25d30d500 [ 835.413213][ T5833] Call trace: [ 835.413702][ T5833] vkms_get_vblank_timestamp+0x128/0x16c (P) [ 835.414123][ T5833] drm_crtc_get_last_vbltimestamp+0x140/0x184 [ 835.414503][ T5833] drm_crtc_next_vblank_start+0x11c/0x244 [ 835.414741][ T5833] drm_atomic_helper_wait_for_fences+0x184/0x614 [ 835.414975][ T5833] drm_atomic_helper_commit+0x170/0x2b4 [ 835.415184][ T5833] drm_atomic_commit+0x18c/0x23c [ 835.415472][ T5833] drm_client_modeset_commit_atomic+0x4a4/0x5f8 [ 835.415757][ T5833] drm_client_modeset_commit_locked+0x108/0x3f8 [ 835.416062][ T5833] drm_fb_helper_pan_display+0x260/0x844 [ 835.416337][ T5833] fb_pan_display+0x1d0/0x5f8 [ 835.416619][ T5833] bit_update_start+0x40/0x198 [ 835.416822][ T5833] fbcon_modechanged+0x42c/0x554 [ 835.417077][ T5833] fbcon_set_all_vcs+0x29c/0x364 [ 835.417314][ T5833] fbcon_update_vcs+0x18/0x34 [ 835.417537][ T5833] do_fb_ioctl+0x6c0/0x80c [ 835.417734][ T5833] fb_ioctl+0xcc/0x140 [ 835.417951][ T5833] __arm64_sys_ioctl+0x124/0x1a4 [ 835.418170][ T5833] invoke_syscall+0x6c/0x258 [ 835.418477][ T5833] el0_svc_common.constprop.0+0xac/0x230 [ 835.418755][ T5833] do_el0_svc+0x40/0x58 [ 835.418983][ T5833] el0_svc+0x54/0x2b0 [ 835.419253][ T5833] el0t_64_sync_handler+0xa0/0xe4 [ 835.419548][ T5833] el0t_64_sync+0x198/0x19c [ 835.420285][ T5833] irq event stamp: 1636 [ 835.420709][ T5833] hardirqs last enabled at (1635): [] irqentry_exit+0x190/0x474 [ 835.421152][ T5833] hardirqs last disabled at (1636): [] el1_brk64+0x20/0x54 [ 835.421631][ T5833] softirqs last enabled at (1032): [] handle_softirqs+0x88c/0xdb4 [ 835.422213][ T5833] softirqs last disabled at (1025): [] __do_softirq+0x14/0x20 [ 835.422854][ T5833] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 838.033165][ T1266] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 838.859671][ T1266] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 839.297646][ T1266] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 839.679814][ T1266] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 840.275862][ T30] audit: type=1400 audit(839.660:135): avc: denied { read } for pid=3173 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 842.935845][ T1266] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 843.026243][ T1266] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 843.088387][ T1266] bond0 (unregistering): Released all slaves [ 843.486444][ T1266] hsr_slave_0: left promiscuous mode [ 843.522727][ T1266] hsr_slave_1: left promiscuous mode [ 843.657430][ T1266] veth1_macvtap: left promiscuous mode [ 843.659370][ T1266] veth0_macvtap: left promiscuous mode [ 843.666628][ T1266] veth1_vlan: left promiscuous mode [ 843.669118][ T1266] veth0_vlan: left promiscuous mode [ 851.487802][ T1266] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 851.772379][ T1266] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 852.068635][ T1266] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 852.326801][ T1266] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 855.487763][ T1266] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 855.573166][ T1266] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 855.646414][ T1266] bond0 (unregistering): Released all slaves [ 855.938652][ T1266] hsr_slave_0: left promiscuous mode [ 855.964556][ T1266] hsr_slave_1: left promiscuous mode [ 856.092124][ T1266] veth1_macvtap: left promiscuous mode [ 856.093286][ T1266] veth0_macvtap: left promiscuous mode [ 856.095698][ T1266] veth1_vlan: left promiscuous mode [ 856.096689][ T1266] veth0_vlan: left promiscuous mode