last executing test programs: 1h47m24.600039476s ago: executing program 0 (id=40): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000bc0)={&(0x7f0000000080), 0xc, &(0x7f0000000b80)={0x0}}, 0x0) 1h47m24.135570641s ago: executing program 0 (id=41): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x202, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, 0x0) 1h47m23.798588479s ago: executing program 0 (id=42): r0 = socket$unix(0x1, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x541b, 0x0) 1h47m23.421443969s ago: executing program 0 (id=43): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000440)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) 1h47m23.20240175s ago: executing program 0 (id=44): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) recvfrom$llc(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 1h47m21.620300363s ago: executing program 0 (id=46): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 1h47m21.620114773s ago: executing program 32 (id=46): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 1h18m4.614291802s ago: executing program 2 (id=4986): fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x5452, &(0x7f0000000000)) 1h18m3.912456779s ago: executing program 2 (id=4988): r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x40042, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5450, 0x0) 1h18m3.235635575s ago: executing program 2 (id=4989): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') exit(0x0) write$dsp(r0, 0x0, 0x0) 1h18m0.099054922s ago: executing program 2 (id=4993): r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0), 0x0, 0x40000) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) ioctl$SNDRV_PCM_IOCTL_REWIND(r0, 0xc0844123, 0x0) 1h17m59.471576466s ago: executing program 2 (id=4995): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x10) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x1e80c2, 0x0) 1h17m58.771845133s ago: executing program 2 (id=4996): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 1h17m13.697117729s ago: executing program 33 (id=4996): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) sendmsg$IPSET_CMD_LIST(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 32m36.840370564s ago: executing program 1 (id=11944): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, 0x0, 0x0) 32m36.376808389s ago: executing program 1 (id=11945): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x2041, 0x0) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 32m35.97259197s ago: executing program 1 (id=11947): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 32m35.502071824s ago: executing program 1 (id=11950): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x260) 32m34.862010558s ago: executing program 1 (id=11953): mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f00000037c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x49) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000300)='sys_enter\x00', r0}, 0x10) statx(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x2000, 0x10, &(0x7f0000000340)) 32m33.651424791s ago: executing program 1 (id=11955): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r0, r1) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040), 0x0, 0x0, 0x0) 32m33.638575992s ago: executing program 34 (id=11955): r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r0, r1) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040), 0x0, 0x0, 0x0) 3.673622817s ago: executing program 3 (id=18011): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000080)={'veth0_vlan\x00', {0x2, 0x0, @broadcast}}) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000080)={'vlan1\x00', {0x2, 0x0, @initdev}}) 3.420004691s ago: executing program 4 (id=18012): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_PMKSA(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x0, 0x300, 0x70bd2c, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x4, 0x26}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x80) 3.211371782s ago: executing program 3 (id=18013): mkdirat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000480)='./file0\x00', r0, &(0x7f0000000500)='./file0\x00') quotactl$Q_GETFMT(0x0, &(0x7f0000000e40)=@filename='./file0/file0\x00', 0x0, 0x0) 2.942489526s ago: executing program 4 (id=18014): r0 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) r1 = dup2(r0, r0) r2 = openat$cgroup_int(r1, &(0x7f00000001c0)='io.weight\x00', 0x657, 0xfeffffff) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f0000000080)) 2.841564801s ago: executing program 3 (id=18015): r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) write$cgroup_devices(r0, 0x0, 0x0) 2.66463737s ago: executing program 4 (id=18016): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000140), 0x9, 0x40000) ioctl$LOOP_CONFIGURE(r1, 0x4c0a, &(0x7f00000002c0)={r0, 0x0, {0x2a00, 0x80010000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xb, 0x1c, "fee8a2ab78fc979fd1e00d96072000001ea89de2b7fb0000e60080b8785d96000100", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "f4bd00000080190000000000000800", [0x0, 0x2000000000001]}}) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0xffffffa0, 0x4, 0x17, 0x5, "ca69ed26810efb6c14f69d1e2f4ef4d43da3124c530cdc856719cd5bb0ad926b274c5560c64f3233833df5dde95e5598579679c3c9f464c844a2652766a274fd", "0e52c670f54c4e7723f243904478561f33a4681f945a3db5cf756ccd634be2fd", [0x800, 0x2]}) 2.418665643s ago: executing program 3 (id=18017): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000000)=0x80) r2 = dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_FRAME(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[], 0x1c}, 0x1, 0x0, 0x0, 0x4048000}, 0x0) 1.946093028s ago: executing program 4 (id=18018): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'hash\x00', 0x0, 0x0, 'wp512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000800) 1.853741583s ago: executing program 3 (id=18019): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) recvmmsg$unix(r2, &(0x7f0000004980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000024c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) write$9p(r3, 0x0, 0x0) 950.08521ms ago: executing program 4 (id=18020): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='freezer.state\x00', 0x26e1, 0x0) close(r0) openat$mixer(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0xc0045103, &(0x7f0000000040)=0x9) 878.816494ms ago: executing program 3 (id=18021): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/vlan/vlan0\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r1, 0x8982, &(0x7f0000002800)={0x1, 'vlan0\x00'}) read$char_usb(r0, 0x0, 0x0) 0s ago: executing program 4 (id=18022): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) read$rfkill(r1, 0x0, 0x64) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) kernel console output (not intermixed with test programs): evice_t tclass=chr_file permissive=1 [ 1509.995516][ T30] audit: type=1400 audit(1509.140:291): avc: denied { setattr } for pid=10670 comm="syz.1.3431" name="nbd1" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1511.197741][ T30] audit: type=1400 audit(1510.340:292): avc: denied { read } for pid=10679 comm="syz.2.3435" path="socket:[27431]" dev="sockfs" ino=27431 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1534.617232][ T30] audit: type=1400 audit(1533.760:293): avc: denied { connect } for pid=10833 comm="syz.1.3509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1534.631246][ T30] audit: type=1400 audit(1533.770:294): avc: denied { getopt } for pid=10833 comm="syz.1.3509" laddr=::1 lport=2 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1544.315900][T10893] process 'syz.2.3537' launched './file1' with NULL argv: empty string added [ 1544.324360][ T30] audit: type=1400 audit(1543.460:295): avc: denied { execute_no_trans } for pid=10892 comm="syz.2.3537" path="/1676/file1" dev="tmpfs" ino=8626 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1555.974610][ T30] audit: type=1400 audit(1555.110:296): avc: denied { write } for pid=10974 comm="syz.2.3576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1555.975157][ T30] audit: type=1400 audit(1555.120:297): avc: denied { ioctl } for pid=10974 comm="syz.2.3576" path="socket:[28628]" dev="sockfs" ino=28628 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1566.385468][ T30] audit: type=1400 audit(1565.530:298): avc: denied { ioctl } for pid=11057 comm="syz.2.3616" path="socket:[29110]" dev="sockfs" ino=29110 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1582.045208][ T30] audit: type=1400 audit(1581.190:299): avc: denied { write } for pid=11165 comm="syz.1.3668" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1590.872299][T11229] block nbd1: shutting down sockets [ 1594.399034][ T30] audit: type=1400 audit(1593.540:300): avc: denied { read } for pid=11254 comm="syz.1.3713" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1594.406544][ T30] audit: type=1400 audit(1593.540:301): avc: denied { open } for pid=11254 comm="syz.1.3713" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1599.987940][ T30] audit: type=1400 audit(1599.130:302): avc: denied { read } for pid=11293 comm="syz.2.3732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1613.609673][T11385] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=11385 comm=syz.2.3777 [ 1616.614586][T11405] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3787'. [ 1622.726838][ T30] audit: type=1400 audit(1621.860:303): avc: denied { write } for pid=11442 comm="syz.2.3806" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1631.474119][ T30] audit: type=1400 audit(1630.610:304): avc: denied { setattr } for pid=11515 comm="syz.1.3842" name="ptmx" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 1637.278375][T11551] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11551 comm=syz.2.3858 [ 1666.646699][T11713] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11713 comm=syz.2.3936 [ 1677.524986][ T30] audit: type=1400 audit(1676.670:305): avc: denied { write } for pid=11782 comm="syz.2.3970" path="socket:[31343]" dev="sockfs" ino=31343 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1685.899169][ T30] audit: type=1400 audit(1685.040:306): avc: denied { ioctl } for pid=11832 comm="syz.1.3995" path="socket:[31424]" dev="sockfs" ino=31424 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1687.305538][T11843] binfmt_misc: register: failed to install interpreter file ./file0 [ 1690.068132][T11866] netlink: 56 bytes leftover after parsing attributes in process `syz.2.4011'. [ 1690.103351][T11866] netlink: 56 bytes leftover after parsing attributes in process `syz.2.4011'. [ 1698.538432][T11912] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11912 comm=syz.1.4031 [ 1705.989356][T11967] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11967 comm=syz.2.4058 [ 1717.635469][ T30] audit: type=1400 audit(1716.770:307): avc: denied { bind } for pid=12042 comm="syz.2.4096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1738.888026][ T30] audit: type=1400 audit(1738.030:308): avc: denied { setattr } for pid=12175 comm="syz.1.4161" name="NETLINK" dev="sockfs" ino=33005 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1741.450652][ T30] audit: type=1400 audit(1740.590:309): avc: denied { setattr } for pid=12194 comm="syz.1.4170" name="" dev="pipefs" ino=33045 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1742.244725][ T30] audit: type=1400 audit(1741.390:310): avc: denied { map } for pid=12205 comm="syz.1.4175" path="/proc/4399/net/pfkey" dev="proc" ino=4026532754 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1742.249193][ T30] audit: type=1400 audit(1741.390:311): avc: denied { execute } for pid=12205 comm="syz.1.4175" path="/proc/4399/net/pfkey" dev="proc" ino=4026532754 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1759.690613][ T30] audit: type=1400 audit(1758.830:312): avc: denied { write } for pid=12307 comm="syz.1.4225" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1762.316930][ T30] audit: type=1400 audit(1761.460:313): avc: denied { name_bind } for pid=12325 comm="syz.2.4234" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 1764.175893][ T30] audit: type=1400 audit(1763.320:314): avc: denied { write } for pid=12336 comm="syz.1.4239" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1765.816690][ T30] audit: type=1400 audit(1764.960:315): avc: denied { remount } for pid=12348 comm="syz.1.4245" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1765.943069][ T30] audit: type=1400 audit(1765.070:316): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1773.715031][ T30] audit: type=1400 audit(1772.850:317): avc: denied { setattr } for pid=12394 comm="syz.1.4268" name="sequencer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 1777.774311][T12419] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12419 comm=syz.2.4279 [ 1788.403118][ T30] audit: type=1400 audit(1787.540:318): avc: denied { ioctl } for pid=12498 comm="syz.1.4320" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x700a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1789.133451][ T30] audit: type=1400 audit(1788.270:319): avc: denied { getattr } for pid=12503 comm="syz.2.4322" name="[userfaultfd]" dev="anon_inodefs" ino=33528 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1816.035940][ T30] audit: type=1400 audit(1815.160:320): avc: denied { mount } for pid=12684 comm="syz.2.4409" name="/" dev="configfs" ino=58 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1816.037067][ T30] audit: type=1400 audit(1815.170:321): avc: denied { remount } for pid=12684 comm="syz.2.4409" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1816.140601][ T30] audit: type=1400 audit(1815.260:322): avc: denied { unmount } for pid=3558 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1819.961753][ T30] audit: type=1400 audit(1819.100:323): avc: denied { ioctl } for pid=12707 comm="syz.1.4420" path="socket:[34551]" dev="sockfs" ino=34551 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1819.984465][ T30] audit: type=1400 audit(1819.130:324): avc: denied { bind } for pid=12707 comm="syz.1.4420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1829.826683][ T30] audit: type=1400 audit(1828.970:325): avc: denied { read } for pid=12753 comm="syz.1.4442" name="file0" dev="tmpfs" ino=11732 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1854.749351][ T30] audit: type=1400 audit(1853.890:326): avc: denied { map } for pid=12880 comm="syz.2.4506" path="socket:[35887]" dev="sockfs" ino=35887 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1854.754129][ T30] audit: type=1400 audit(1853.900:327): avc: denied { read accept } for pid=12880 comm="syz.2.4506" path="socket:[35887]" dev="sockfs" ino=35887 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1857.369503][ T30] audit: type=1400 audit(1856.510:328): avc: denied { connect } for pid=12895 comm="syz.2.4513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1857.429468][ T30] audit: type=1400 audit(1856.570:329): avc: denied { ioctl } for pid=12895 comm="syz.2.4513" path="socket:[35186]" dev="sockfs" ino=35186 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1865.801815][ C0] hrtimer: interrupt took 1383856 ns [ 1918.328193][T13146] Injecting memory failure for pfn 0x7c96c at process virtual address 0x2036c000 [ 1918.380824][T13146] Memory failure: 0x7c96c: recovery action for unsplit thp: Failed [ 1918.723954][ T30] audit: type=1400 audit(1917.860:330): avc: denied { append } for pid=13147 comm="syz.1.4635" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1951.807486][ T30] audit: type=1400 audit(1950.950:331): avc: denied { bind } for pid=13300 comm="syz.2.4709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1953.375210][ T30] audit: type=1400 audit(1952.520:332): avc: denied { connect } for pid=13308 comm="syz.2.4713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1963.458826][ T30] audit: type=1400 audit(1962.580:333): avc: denied { write } for pid=13359 comm="syz.2.4737" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1966.713883][T13379] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13379 comm=syz.1.4745 [ 1966.788181][T13379] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13379 comm=syz.1.4745 [ 1971.405941][T13399] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13399 comm=syz.2.4756 [ 1991.219758][T13508] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=13508 comm=syz.2.4810 [ 2045.480465][ C0] vkms_vblank_simulate: vblank timer overrun [ 2054.984793][ T30] audit: type=1400 audit(2054.130:334): avc: denied { accept } for pid=13811 comm="syz.2.4958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2061.014015][T13844] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13844 comm=syz.1.4973 [ 2075.389382][ T30] audit: type=1400 audit(2074.520:335): avc: denied { setattr } for pid=3558 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 2081.605240][T13912] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13912 comm=syz.1.5002 [ 2091.766736][T13936] binder: 13935:13936 ioctl c018620c 20000240 returned -22 [ 2096.963420][ T30] audit: type=1400 audit(2096.100:336): avc: denied { map } for pid=13947 comm="syz.1.5020" path="socket:[37721]" dev="sockfs" ino=37721 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 2120.680156][ T30] audit: type=1400 audit(2119.820:337): avc: denied { mounton } for pid=14013 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2130.436940][T13005] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2130.472212][T13005] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2130.530360][T13005] bond0 (unregistering): Released all slaves [ 2131.384172][T13005] hsr_slave_0: left promiscuous mode [ 2131.415610][T13005] hsr_slave_1: left promiscuous mode [ 2149.319937][T14013] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2149.394409][T14013] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2156.730091][T14013] hsr_slave_0: entered promiscuous mode [ 2156.757418][T14013] hsr_slave_1: entered promiscuous mode [ 2161.935342][T14013] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2162.003573][T14013] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2162.042598][T14013] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2162.168236][T14013] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2169.628646][T14013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2181.726661][ T30] audit: type=1400 audit(2180.870:338): avc: denied { ioctl } for pid=14234 comm="syz.1.5106" path="socket:[40377]" dev="sockfs" ino=40377 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2193.709196][T14279] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=14279 comm=syz.1.5117 [ 2197.109864][T14013] veth0_vlan: entered promiscuous mode [ 2197.400615][T14013] veth1_vlan: entered promiscuous mode [ 2198.417741][T14013] veth0_macvtap: entered promiscuous mode [ 2198.567022][T14013] veth1_macvtap: entered promiscuous mode [ 2199.468821][ T7740] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2199.469442][ T7740] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2199.469804][ T7740] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2199.470033][ T7740] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2200.403141][ T30] audit: type=1400 audit(2199.540:339): avc: denied { mounton } for pid=14013 comm="syz-executor" path="/syzkaller.wiZBMj/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 2200.600650][ T30] audit: type=1400 audit(2199.740:340): avc: denied { unmount } for pid=14013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2201.926804][T14304] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14304 comm=syz.3.5050 [ 2231.619092][ T30] audit: type=1400 audit(2230.760:341): avc: denied { execute } for pid=14455 comm="syz.3.5195" path="/dev/audio1" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 2232.258725][ T30] audit: type=1400 audit(2231.400:342): avc: denied { setattr } for pid=14458 comm="syz.1.5196" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2236.327136][ T9443] hid_parser_main: 22 callbacks suppressed [ 2236.336164][ T9443] hid-generic 0000:0004:0000.0003: unknown main item tag 0x0 [ 2236.337070][ T9443] hid-generic 0000:0004:0000.0003: unknown main item tag 0x0 [ 2236.337343][ T9443] hid-generic 0000:0004:0000.0003: unknown main item tag 0x0 [ 2236.508322][ T9443] hid-generic 0000:0004:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz1 [ 2240.089882][T14488] fido_id[14488]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2241.632638][ T30] audit: type=1400 audit(2240.770:343): avc: denied { write } for pid=14506 comm="syz.3.5220" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2252.524688][ T30] audit: type=1400 audit(2251.670:344): avc: denied { unmount } for pid=14013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 2282.593229][T14720] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=14720 comm=syz.3.5324 [ 2356.529698][ T30] audit: type=1400 audit(2355.670:345): avc: denied { setopt } for pid=15072 comm="syz.1.5498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2360.298607][T15092] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2305 sclass=netlink_route_socket pid=15092 comm=syz.3.5506 [ 2430.823303][ T30] audit: type=1400 audit(2429.950:346): avc: granted { setsecparam } for pid=15454 comm="syz.3.5681" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 2458.396341][ T30] audit: type=1400 audit(2457.540:347): avc: denied { read } for pid=15566 comm="syz.3.5736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2488.084958][T15712] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15712 comm=syz.1.5808 [ 2494.612563][T15740] ptrace attach of "/syz-executor exec"[15741] was attempted by "/syz-executor exec"[15740] [ 2540.056431][T15949] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15949 comm=syz.1.5921 [ 2555.774305][ T30] audit: type=1400 audit(2554.900:348): avc: denied { setattr } for pid=16030 comm="syz.3.5962" name="tty26" dev="devtmpfs" ino=45 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 2567.473765][T16089] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16089 comm=syz.1.5989 [ 2630.984008][ T30] audit: type=1400 audit(2630.110:349): avc: denied { setattr } for pid=16377 comm="syz.1.6130" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 2650.476250][ T6320] hid-generic FFFC:0003:0000.0004: unknown main item tag 0x0 [ 2650.476884][ T6320] hid-generic FFFC:0003:0000.0004: unknown main item tag 0x0 [ 2650.494514][ T6320] hid-generic FFFC:0003:0000.0004: unknown main item tag 0x0 [ 2650.533852][ T6320] hid-generic FFFC:0003:0000.0004: unknown main item tag 0x0 [ 2650.552872][ T6320] hid-generic FFFC:0003:0000.0004: unknown main item tag 0x0 [ 2650.574608][ T6320] hid-generic FFFC:0003:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 2653.425000][T16471] fido_id[16471]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2689.177106][ T30] audit: type=1400 audit(2688.280:350): avc: denied { create } for pid=16635 comm="syz.1.6252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 2689.294660][ T30] audit: type=1400 audit(2688.440:351): avc: denied { write } for pid=16635 comm="syz.1.6252" path="socket:[47547]" dev="sockfs" ino=47547 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 2718.883905][T16776] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16776 comm=syz.1.6320 [ 2749.658157][ T30] audit: type=1400 audit(2748.800:352): avc: denied { ioctl } for pid=16931 comm="syz.3.6396" path="net:[4026532616]" dev="nsfs" ino=4026532616 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2783.764797][T17108] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17108 comm=syz.1.6480 [ 2788.739988][T17140] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17140 comm=syz.1.6497 [ 2789.636532][T17145] SELinux: syz.3.6499 (17145) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 2801.570471][ T30] audit: type=1400 audit(2800.710:353): avc: denied { setattr } for pid=17201 comm="syz.3.6526" name="fd" dev="proc" ino=49475 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 2859.935660][ T30] audit: type=1400 audit(2859.010:354): avc: denied { unlink } for pid=3321 comm="syz-executor" name="file0" dev="tmpfs" ino=16555 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2880.527325][T17567] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2880.565036][T17567] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2892.732852][ T30] audit: type=1400 audit(2891.870:355): avc: denied { unmount } for pid=17635 comm="syz.3.6737" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2922.367357][T17799] binfmt_misc: register: failed to install interpreter file ./bus [ 2933.533385][T17855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17855 comm=syz.3.6843 [ 2934.872901][ T30] audit: type=1400 audit(2934.010:356): avc: denied { mount } for pid=17862 comm="syz.3.6852" name="/" dev="securityfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 2935.094188][ T30] audit: type=1400 audit(2934.230:357): avc: denied { unmount } for pid=14013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 3019.875676][ T30] audit: type=1400 audit(3019.010:358): avc: denied { mount } for pid=18294 comm="syz.1.7059" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 3020.003000][ T30] audit: type=1400 audit(3019.140:359): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 3028.387884][T18341] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18341 comm=syz.3.7079 [ 3051.730844][T18442] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18442 comm=syz.1.7129 [ 3057.589889][ T30] audit: type=1400 audit(3056.730:360): avc: denied { name_bind } for pid=18477 comm="syz.3.7147" src=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 3071.950758][T18557] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1538 sclass=netlink_audit_socket pid=18557 comm=syz.1.7185 [ 3094.458233][T18681] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=18681 comm=syz.1.7244 [ 3117.876414][ T30] audit: type=1400 audit(3117.020:361): avc: denied { append } for pid=18807 comm="syz.1.7306" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3153.422445][T19004] binfmt_misc: register: failed to install interpreter file ./bus [ 3179.705518][T19137] ubi31: attaching mtd0 [ 3179.853949][T19137] ubi31: scanning is finished [ 3179.858041][T19137] ubi31 error: ubi_read_volume_table: the layout volume was not found [ 3180.209580][T19137] ubi31 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 3181.018134][T19145] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2304 sclass=netlink_tcpdiag_socket pid=19145 comm=syz.1.7467 [ 3247.936803][T19456] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1793 sclass=netlink_route_socket pid=19456 comm=syz.3.7618 [ 3253.025535][T19483] SELinux: Context system_u:object_r:hald_var_run_t:s0 is not valid (left unmapped). [ 3253.107554][ T30] audit: type=1400 audit(3252.240:362): avc: denied { relabelto } for pid=19481 comm="syz.1.7630" name="file0" dev="tmpfs" ino=18824 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 3253.139765][ T30] audit: type=1400 audit(3252.280:363): avc: denied { associate } for pid=19481 comm="syz.1.7630" name="file0" dev="tmpfs" ino=18824 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hald_var_run_t:s0" [ 3253.387621][ T30] audit: type=1400 audit(3252.530:364): avc: denied { unlink } for pid=3321 comm="syz-executor" name="file0" dev="tmpfs" ino=18824 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 3275.634922][T19611] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19611 comm=syz.3.7697 [ 3277.964348][T19620] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2304 sclass=netlink_tcpdiag_socket pid=19620 comm=syz.3.7702 [ 3312.386383][T19776] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=19776 comm=syz.1.7772 [ 3320.263607][ T30] audit: type=1400 audit(3319.400:365): avc: denied { mount } for pid=19816 comm="syz.1.7794" name="/" dev="autofs" ino=58864 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 3320.528867][ T30] audit: type=1400 audit(3319.670:366): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 3341.938901][T19931] mmap: syz.1.7849 (19931) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 3364.776066][ T30] audit: type=1400 audit(3363.910:367): avc: denied { unmount } for pid=14013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3368.123820][T20061] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 3368.123820][T20061] The task syz.1.7912 (20061) triggered the difference, watch for misbehavior. [ 3399.904866][ T30] audit: type=1400 audit(3399.050:368): avc: denied { setopt } for pid=20237 comm="syz.3.7999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3411.487397][ T30] audit: type=1400 audit(3410.630:369): avc: denied { getopt } for pid=20299 comm="syz.3.8028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3423.633204][T20365] netlink: 45 bytes leftover after parsing attributes in process `syz.3.8060'. [ 3439.529802][T20454] snd_dummy snd_dummy.0: control 0:0:0:syz1:0 is already present [ 3445.619354][ T30] audit: type=1400 audit(3444.760:370): avc: denied { map } for pid=20483 comm="syz.3.8117" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3445.640046][ T30] audit: type=1400 audit(3444.780:371): avc: denied { execute } for pid=20483 comm="syz.3.8117" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3452.268819][T20521] netlink: 16 bytes leftover after parsing attributes in process `syz.3.8134'. [ 3458.339591][ T30] audit: type=1400 audit(3457.480:372): avc: denied { create } for pid=20553 comm="syz.3.8150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 3458.380200][ T30] audit: type=1400 audit(3457.520:373): avc: denied { write } for pid=20553 comm="syz.3.8150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 3458.394425][ T30] audit: type=1400 audit(3457.540:374): avc: denied { read } for pid=20553 comm="syz.3.8150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 3467.215486][ T30] audit: type=1400 audit(3466.340:375): avc: denied { search } for pid=20601 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3467.226120][ T30] audit: type=1400 audit(3466.370:376): avc: denied { search } for pid=20601 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=546 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3467.259020][ T30] audit: type=1400 audit(3466.390:377): avc: denied { search } for pid=20601 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=713 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3467.260102][ T30] audit: type=1400 audit(3466.390:378): avc: denied { search } for pid=20601 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3467.345254][ T30] audit: type=1400 audit(3466.490:379): avc: denied { read open } for pid=20608 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3467.354920][ T30] audit: type=1400 audit(3466.490:380): avc: denied { getattr } for pid=20608 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3467.945847][ T30] audit: type=1400 audit(3467.070:381): avc: denied { add_name } for pid=20601 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3469.348243][ T30] audit: type=1400 audit(3468.490:382): avc: denied { remove_name } for pid=20613 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=14432 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3478.494145][ T30] audit: type=1400 audit(3477.640:383): avc: denied { create } for pid=20646 comm="syz.1.8192" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 3478.509201][ T30] audit: type=1400 audit(3477.650:384): avc: denied { read write execute } for pid=20646 comm="syz.1.8192" name="file0" dev="tmpfs" ino=20055 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 3478.893747][T20648] binder: 20625:20648 ioctl 4018620d 0 returned -22 [ 3487.243341][ T30] audit: type=1400 audit(3486.390:385): avc: denied { getopt } for pid=20692 comm="syz.3.8214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3490.966864][ T30] audit: type=1400 audit(3490.110:386): avc: denied { ioctl } for pid=20708 comm="syz.1.8221" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0xe500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 3518.388071][ T30] audit: type=1400 audit(3517.500:387): avc: denied { setattr } for pid=20821 comm="syz.1.8275" name="RAW" dev="sockfs" ino=61594 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3557.337863][ T30] audit: type=1400 audit(3556.480:388): avc: denied { read write } for pid=3321 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3557.347645][ T30] audit: type=1400 audit(3556.490:389): avc: denied { open } for pid=14013 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3557.372473][ T30] audit: type=1400 audit(3556.510:390): avc: denied { ioctl } for pid=14013 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=640 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3557.426849][ T30] audit: type=1400 audit(3556.570:391): avc: denied { read } for pid=21021 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 3558.462283][ T30] audit: type=1400 audit(3557.600:392): avc: denied { create } for pid=21024 comm="syz.3.8374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 3558.484000][ T30] audit: type=1400 audit(3557.620:393): avc: denied { module_request } for pid=21024 comm="syz.3.8374" kmod="net-pf-31" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3563.468579][ T30] audit: type=1400 audit(3562.610:394): avc: denied { mounton } for pid=21042 comm="syz.3.8382" path="/1891/file0" dev="tmpfs" ino=9725 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3563.518761][ T30] audit: type=1400 audit(3562.660:395): avc: denied { mount } for pid=21042 comm="syz.3.8382" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3563.558256][ T30] audit: type=1400 audit(3562.700:396): avc: denied { remount } for pid=21042 comm="syz.3.8382" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3563.980276][ T30] audit: type=1400 audit(3563.090:397): avc: denied { unmount } for pid=14013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3565.158660][ T30] audit: type=1400 audit(3564.300:398): avc: denied { read } for pid=21051 comm="syz.1.8386" dev="nsfs" ino=4026532695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3565.168749][ T30] audit: type=1400 audit(3564.310:399): avc: denied { open } for pid=21051 comm="syz.1.8386" path="net:[4026532695]" dev="nsfs" ino=4026532695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3565.206906][ T30] audit: type=1400 audit(3564.340:400): avc: denied { create } for pid=21051 comm="syz.1.8386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3565.356944][ T30] audit: type=1400 audit(3564.470:401): avc: denied { open } for pid=21052 comm="syz.3.8387" path="/dev/net/tun" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 3565.387726][ T30] audit: type=1400 audit(3564.530:402): avc: denied { write } for pid=21051 comm="syz.1.8386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3565.397632][ T30] audit: type=1400 audit(3564.540:403): avc: denied { write } for pid=21052 comm="syz.3.8387" name="tun" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 3571.243052][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 3571.244160][ T30] audit: type=1400 audit(3570.370:406): avc: denied { mount } for pid=21079 comm="syz.1.8400" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 3571.323523][ T30] audit: type=1400 audit(3570.440:407): avc: denied { remount } for pid=21079 comm="syz.1.8400" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 3571.590842][ T30] audit: type=1400 audit(3570.730:408): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 3574.213026][ T30] audit: type=1400 audit(3573.350:409): avc: denied { read } for pid=21103 comm="syz.3.8412" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3574.216812][ T30] audit: type=1400 audit(3573.350:410): avc: denied { open } for pid=21103 comm="syz.3.8412" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3574.270180][ T30] audit: type=1400 audit(3573.400:411): avc: denied { ioctl } for pid=21103 comm="syz.3.8412" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64c6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3576.542950][ T30] audit: type=1400 audit(3575.680:412): avc: denied { execmem } for pid=21119 comm="syz.3.8420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3579.947788][ T30] audit: type=1400 audit(3579.090:413): avc: denied { create } for pid=21139 comm="syz.1.8429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3579.990712][ T30] audit: type=1400 audit(3579.130:414): avc: denied { write } for pid=21139 comm="syz.1.8429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3581.116727][ T30] audit: type=1400 audit(3580.260:415): avc: denied { mount } for pid=21147 comm="syz.1.8433" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 3581.143456][ T30] audit: type=1400 audit(3580.280:416): avc: denied { remount } for pid=21147 comm="syz.1.8433" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 3581.298098][ T30] audit: type=1400 audit(3580.420:417): avc: denied { read write } for pid=21149 comm="syz.3.8434" name="vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3581.299164][ T30] audit: type=1400 audit(3580.430:418): avc: denied { open } for pid=21149 comm="syz.3.8434" path="/dev/vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3581.378815][ T30] audit: type=1400 audit(3580.520:419): avc: denied { ioctl } for pid=21149 comm="syz.3.8434" path="/dev/vhost-net" dev="devtmpfs" ino=714 ioctlcmd=0xaf25 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3581.531955][ T30] audit: type=1400 audit(3580.600:420): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 3582.145279][ T30] audit: type=1400 audit(3581.290:421): avc: denied { read write } for pid=21151 comm="syz.3.8436" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3582.197292][ T30] audit: type=1400 audit(3581.340:422): avc: denied { open } for pid=21151 comm="syz.3.8436" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3582.211043][ T30] audit: type=1400 audit(3581.350:423): avc: denied { ioctl } for pid=21151 comm="syz.3.8436" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3582.228913][T21153] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3582.246487][T21153] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3582.679686][ T30] audit: type=1400 audit(3581.820:424): avc: denied { read write } for pid=21152 comm="syz.1.8435" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3582.734398][ T30] audit: type=1400 audit(3581.860:425): avc: denied { open } for pid=21152 comm="syz.1.8435" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3582.868074][ T30] audit: type=1400 audit(3582.010:426): avc: denied { ioctl } for pid=21152 comm="syz.1.8435" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x127f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3591.303800][ T30] audit: type=1400 audit(3590.440:427): avc: denied { create } for pid=21201 comm="syz.3.8460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3591.355951][ T30] audit: type=1400 audit(3590.490:428): avc: denied { setattr } for pid=21201 comm="syz.3.8460" name="LLC" dev="sockfs" ino=63094 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3592.947087][ T30] audit: type=1400 audit(3592.090:429): avc: denied { create } for pid=21212 comm="syz.1.8465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3593.089411][ T30] audit: type=1400 audit(3592.230:430): avc: denied { bind } for pid=21212 comm="syz.1.8465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3593.474397][ T30] audit: type=1400 audit(3592.620:431): avc: denied { create } for pid=21215 comm="syz.3.8466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3593.479375][ T30] audit: type=1400 audit(3592.620:432): avc: denied { setopt } for pid=21215 comm="syz.3.8466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3593.759984][ T30] audit: type=1400 audit(3592.900:433): avc: denied { create } for pid=21216 comm="syz.1.8467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3596.058194][ T30] audit: type=1400 audit(3595.200:434): avc: denied { prog_load } for pid=21235 comm="syz.1.8476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3596.082553][ T30] audit: type=1400 audit(3595.220:435): avc: denied { bpf } for pid=21235 comm="syz.1.8476" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3596.113393][ T30] audit: type=1400 audit(3595.250:436): avc: denied { perfmon } for pid=21235 comm="syz.1.8476" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3597.328586][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 3597.358341][ T30] audit: type=1400 audit(3596.470:438): avc: denied { allowed } for pid=21242 comm="syz.1.8479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3598.097762][ T30] audit: type=1400 audit(3597.240:439): avc: denied { create } for pid=21246 comm="syz.1.8481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3599.008634][ T30] audit: type=1400 audit(3598.140:440): avc: denied { append } for pid=21250 comm="syz.3.8483" name="loop6" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3602.012793][T21264] lo speed is unknown, defaulting to 1000 [ 3602.025447][T21264] lo speed is unknown, defaulting to 1000 [ 3602.066363][T21264] lo speed is unknown, defaulting to 1000 [ 3602.130313][T21264] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 3602.189361][T21264] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 3603.310156][T21264] lo speed is unknown, defaulting to 1000 [ 3603.556715][T21264] lo speed is unknown, defaulting to 1000 [ 3604.092976][ T30] audit: type=1400 audit(3603.230:441): avc: denied { write } for pid=21271 comm="syz.3.8492" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 3618.070457][T21365] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21365 comm=syz.1.8537 [ 3622.134356][ T30] audit: type=1400 audit(3621.280:442): avc: denied { read write } for pid=21392 comm="syz.3.8552" path="socket:[63478]" dev="sockfs" ino=63478 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3622.397437][ T30] audit: type=1400 audit(3621.540:443): avc: denied { create } for pid=21393 comm="syz.1.8551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3622.454217][ T30] audit: type=1400 audit(3621.590:444): avc: denied { write } for pid=21393 comm="syz.1.8551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3630.455043][ T30] audit: type=1400 audit(3629.600:445): avc: denied { read write } for pid=21448 comm="syz.3.8578" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 3630.460188][ T30] audit: type=1400 audit(3629.600:446): avc: denied { open } for pid=21448 comm="syz.3.8578" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 3642.340417][ T30] audit: type=1400 audit(3641.480:447): avc: denied { create } for pid=21535 comm="syz.1.8619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 3642.427354][ T30] audit: type=1400 audit(3641.570:448): avc: denied { setopt } for pid=21535 comm="syz.1.8619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 3655.968619][ T30] audit: type=1400 audit(3655.100:449): avc: denied { read } for pid=21621 comm="syz.3.8663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3657.740148][ T30] audit: type=1400 audit(3656.880:450): avc: denied { block_suspend } for pid=21632 comm="syz.3.8668" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3659.040241][ T30] audit: type=1400 audit(3658.180:451): avc: denied { read write } for pid=21643 comm="syz.1.8673" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3659.054288][ T30] audit: type=1400 audit(3658.190:452): avc: denied { open } for pid=21643 comm="syz.1.8673" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3659.093428][ T30] audit: type=1400 audit(3658.230:453): avc: denied { ioctl } for pid=21643 comm="syz.1.8673" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4593 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3663.668428][ T30] audit: type=1400 audit(3662.810:454): avc: denied { create } for pid=21667 comm="syz.1.8684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3663.734946][ T30] audit: type=1400 audit(3662.880:455): avc: denied { connect } for pid=21667 comm="syz.1.8684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3665.986746][ T30] audit: type=1400 audit(3665.130:456): avc: denied { connect } for pid=21683 comm="syz.3.8691" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3667.304272][T21694] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=21694 comm=syz.3.8696 [ 3671.769392][ T30] audit: type=1400 audit(3670.910:457): avc: denied { open } for pid=21719 comm="syz.1.8709" path="/dev/ptyq7" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 3672.544072][ T30] audit: type=1400 audit(3671.680:458): avc: denied { create } for pid=21723 comm="syz.1.8711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 3672.637763][ T30] audit: type=1400 audit(3671.780:459): avc: denied { write } for pid=21723 comm="syz.1.8711" path="socket:[64157]" dev="sockfs" ino=64157 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 3681.504109][T21780] netlink: 4083 bytes leftover after parsing attributes in process `syz.1.8735'. [ 3693.965794][ T30] audit: type=1400 audit(3693.100:460): avc: denied { write } for pid=21857 comm="syz.3.8777" name="softnet_stat" dev="proc" ino=4026532778 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3698.539328][ T30] audit: type=1400 audit(3697.680:461): avc: denied { read } for pid=21890 comm="syz.3.8792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3700.188369][ T30] audit: type=1400 audit(3699.330:462): avc: denied { create } for pid=21898 comm="syz.1.8796" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3702.412378][ T30] audit: type=1400 audit(3701.530:463): avc: denied { create } for pid=21910 comm="syz.1.8802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3702.515862][ T30] audit: type=1400 audit(3701.650:464): avc: denied { write } for pid=21910 comm="syz.1.8802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3704.977030][ T30] audit: type=1400 audit(3704.110:465): avc: denied { name_bind } for pid=21930 comm="syz.3.8812" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 3704.990446][ T30] audit: type=1400 audit(3704.130:466): avc: denied { node_bind } for pid=21930 comm="syz.3.8812" saddr=::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3711.182127][ T30] audit: type=1400 audit(3710.320:467): avc: denied { map } for pid=21963 comm="syz.3.8829" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=65437 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3711.183163][ T30] audit: type=1400 audit(3710.320:468): avc: denied { read write } for pid=21963 comm="syz.3.8829" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=65437 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3711.892786][ T30] audit: type=1400 audit(3711.030:469): avc: denied { create } for pid=21967 comm="syz.1.8831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3712.688715][ T30] audit: type=1400 audit(3711.830:470): avc: denied { mount } for pid=21972 comm="syz.3.8834" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3712.790324][ T30] audit: type=1400 audit(3711.930:471): avc: denied { unmount } for pid=14013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3729.636580][ T30] audit: type=1400 audit(3728.780:472): avc: denied { ioctl } for pid=22077 comm="syz.1.8883" path="/dev/ttyq7" dev="devtmpfs" ino=374 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 3735.276924][ T30] audit: type=1400 audit(3734.420:473): avc: denied { bind } for pid=22115 comm="syz.1.8901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3735.326193][ T30] audit: type=1400 audit(3734.470:474): avc: denied { listen } for pid=22115 comm="syz.1.8901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3740.241993][ T30] audit: type=1400 audit(3739.380:475): avc: denied { mount } for pid=22148 comm="syz.3.8917" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 3741.614623][ T30] audit: type=1400 audit(3740.750:476): avc: denied { map_create } for pid=22162 comm="syz.3.8924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3741.667392][ T30] audit: type=1400 audit(3740.800:477): avc: denied { map_read map_write } for pid=22162 comm="syz.3.8924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3745.396053][T22197] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22197 comm=syz.3.8941 [ 3752.517975][ T30] audit: type=1400 audit(3751.660:478): avc: denied { read write } for pid=22240 comm="syz.3.8962" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 3752.536361][ T30] audit: type=1400 audit(3751.660:479): avc: denied { open } for pid=22240 comm="syz.3.8962" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 3762.645427][ T30] audit: type=1400 audit(3761.730:480): avc: denied { create } for pid=22288 comm="syz.1.8985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3762.673472][ T30] audit: type=1400 audit(3761.810:481): avc: denied { read } for pid=22288 comm="syz.1.8985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3763.227670][ T30] audit: type=1400 audit(3762.370:482): avc: denied { write } for pid=22288 comm="syz.1.8985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3766.202425][ T30] audit: type=1400 audit(3765.340:483): avc: denied { write } for pid=22302 comm="syz.1.8991" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 3768.624155][ T30] audit: type=1400 audit(3767.770:484): avc: denied { create } for pid=22317 comm="syz.1.8998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 3768.654682][ T30] audit: type=1400 audit(3767.790:485): avc: denied { ioctl } for pid=22317 comm="syz.1.8998" path="socket:[66114]" dev="sockfs" ino=66114 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 3773.944220][ T30] audit: type=1400 audit(3773.070:486): avc: denied { wake_alarm } for pid=22344 comm="syz.3.9011" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3795.782229][ T30] audit: type=1400 audit(3794.910:487): avc: denied { bind } for pid=22451 comm="syz.3.9062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3796.368371][ T30] audit: type=1400 audit(3795.510:488): avc: denied { accept } for pid=22451 comm="syz.3.9062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3799.963986][T22473] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=22473 comm=syz.1.9070 [ 3800.027082][ T30] audit: type=1400 audit(3799.170:489): avc: denied { write } for pid=22472 comm="syz.3.9071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3806.699475][ T30] audit: type=1400 audit(3805.840:490): avc: denied { ioctl } for pid=22512 comm="syz.3.9089" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=66360 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3826.917933][ T30] audit: type=1400 audit(3826.060:491): avc: denied { write } for pid=22624 comm="syz.1.9144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3839.253267][ T30] audit: type=1400 audit(3838.390:492): avc: denied { name_bind } for pid=22701 comm="syz.3.9181" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3844.284032][T22728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22728 comm=syz.3.9193 [ 3849.158927][ T30] audit: type=1400 audit(3848.300:493): avc: denied { create } for pid=22749 comm="syz.3.9204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3849.178064][ T30] audit: type=1400 audit(3848.320:494): avc: denied { setopt } for pid=22749 comm="syz.3.9204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3851.499548][ T30] audit: type=1400 audit(3850.640:495): avc: denied { unlink } for pid=3321 comm="syz-executor" name="file1" dev="tmpfs" ino=22289 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 3853.154512][T22774] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22774 comm=syz.3.9216 [ 3855.215244][T22790] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22790 comm=syz.1.9223 [ 3857.686931][ T30] audit: type=1400 audit(3856.830:496): avc: denied { mounton } for pid=22805 comm="syz.3.9233" path="/2379/file0" dev="tmpfs" ino=12229 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3857.772062][ T30] audit: type=1400 audit(3856.910:497): avc: denied { mount } for pid=22805 comm="syz.3.9233" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3857.799720][ T30] audit: type=1400 audit(3856.940:498): avc: denied { remount } for pid=22805 comm="syz.3.9233" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3857.962908][ T30] audit: type=1400 audit(3857.100:499): avc: denied { unmount } for pid=14013 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3863.332377][ T30] audit: type=1400 audit(3862.470:500): avc: denied { ioctl } for pid=22844 comm="syz.3.9251" path="socket:[68993]" dev="sockfs" ino=68993 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3867.568488][ T30] audit: type=1400 audit(3866.710:501): avc: denied { getopt } for pid=22868 comm="syz.1.9263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3868.518307][T22873] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22873 comm=syz.1.9265 [ 3870.386250][ T30] audit: type=1400 audit(3869.520:502): avc: denied { create } for pid=22885 comm="syz.3.9272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3870.399027][ T30] audit: type=1400 audit(3869.540:503): avc: denied { write } for pid=22885 comm="syz.3.9272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3873.656790][ T30] audit: type=1400 audit(3872.800:504): avc: denied { create } for pid=22907 comm="syz.3.9282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3873.675343][ T30] audit: type=1400 audit(3872.820:505): avc: denied { write } for pid=22907 comm="syz.3.9282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3876.850055][T22926] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22926 comm=syz.3.9291 [ 3882.987426][ T30] audit: type=1400 audit(3882.130:506): avc: denied { accept } for pid=22965 comm="syz.1.9311" dev="sockfs" ino=69219 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 3895.002118][ T30] audit: type=1400 audit(3894.140:507): avc: denied { getopt } for pid=23038 comm="syz.3.9346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3896.878127][ T30] audit: type=1400 audit(3896.020:508): avc: denied { connect } for pid=23050 comm="syz.1.9352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3905.113362][T23094] SELinux: syz.3.9373 (23094) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 3905.266525][ T30] audit: type=1400 audit(3904.410:509): avc: denied { create } for pid=23095 comm="syz.1.9374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3905.367907][ T30] audit: type=1400 audit(3904.510:510): avc: denied { write } for pid=23095 comm="syz.1.9374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3905.386091][T23096] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=23096 comm=syz.1.9374 [ 3923.815818][ T30] audit: type=1400 audit(3922.960:511): avc: denied { audit_write } for pid=23160 comm="syz.3.9404" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3928.124126][ T30] audit: type=1400 audit(3927.260:512): avc: denied { connect } for pid=23176 comm="syz.1.9412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3941.678739][ T30] audit: type=1400 audit(3940.820:513): avc: denied { watch watch_reads } for pid=23226 comm="syz.3.9434" path="/2494" dev="tmpfs" ino=12834 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3944.315954][T23241] fuse: Bad value for 'fd' [ 3957.387379][ T30] audit: type=1400 audit(3956.530:514): avc: denied { read append } for pid=23321 comm="syz.1.9481" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 3957.393154][ T30] audit: type=1400 audit(3956.530:515): avc: denied { open } for pid=23321 comm="syz.1.9481" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 3957.437746][ T30] audit: type=1400 audit(3956.580:516): avc: denied { setopt } for pid=23321 comm="syz.1.9481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3962.894298][T23335] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=23335 comm=syz.1.9487 [ 3964.700680][ T30] audit: type=1400 audit(3963.840:517): avc: denied { bind } for pid=23344 comm="syz.1.9492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3964.713023][ T30] audit: type=1400 audit(3963.850:518): avc: denied { name_bind } for pid=23344 comm="syz.1.9492" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 3964.760421][ T30] audit: type=1400 audit(3963.900:519): avc: denied { node_bind } for pid=23344 comm="syz.1.9492" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 3964.790735][ T30] audit: type=1400 audit(3963.930:520): avc: denied { read } for pid=23344 comm="syz.1.9492" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3965.769970][ T30] audit: type=1400 audit(3964.910:521): avc: denied { nlmsg_write } for pid=23350 comm="syz.3.9495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 3967.240853][ T30] audit: type=1400 audit(3966.380:522): avc: denied { read } for pid=23360 comm="syz.3.9500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3967.646460][ T30] audit: type=1400 audit(3966.780:523): avc: denied { create } for pid=23363 comm="syz.3.9501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3967.707986][ T30] audit: type=1400 audit(3966.850:524): avc: denied { setopt } for pid=23363 comm="syz.3.9501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3972.994775][T23370] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1794 sclass=netlink_audit_socket pid=23370 comm=syz.3.9504 [ 3984.689973][ T30] audit: type=1400 audit(3983.830:525): avc: denied { write } for pid=23420 comm="syz.1.9527" path="socket:[70039]" dev="sockfs" ino=70039 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3992.488526][ T30] audit: type=1400 audit(3991.630:526): avc: denied { mount } for pid=23479 comm="syz.3.9557" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 3996.069372][ T30] audit: type=1400 audit(3995.210:527): avc: denied { bind } for pid=23504 comm="syz.1.9568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4018.312595][ T30] audit: type=1400 audit(4017.450:528): avc: denied { name_bind } for pid=23642 comm="syz.3.9636" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 4022.618829][ T30] audit: type=1400 audit(4021.760:529): avc: denied { setopt } for pid=23666 comm="syz.3.9647" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4022.746506][T23667] pim6reg: entered allmulticast mode [ 4022.765334][T23667] pim6reg: left allmulticast mode [ 4023.404100][ T30] audit: type=1400 audit(4022.540:530): avc: denied { search } for pid=23665 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4023.408248][ T30] audit: type=1400 audit(4022.540:531): avc: denied { search } for pid=23665 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=546 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4023.443754][ T30] audit: type=1400 audit(4022.570:532): avc: denied { search } for pid=23665 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=713 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4023.444933][ T30] audit: type=1400 audit(4022.570:533): avc: denied { search } for pid=23665 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4023.683871][ T30] audit: type=1400 audit(4022.810:534): avc: denied { read open } for pid=23670 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4023.688122][ T30] audit: type=1400 audit(4022.830:535): avc: denied { getattr } for pid=23670 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4024.024073][ T30] audit: type=1400 audit(4023.170:536): avc: denied { add_name } for pid=23665 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4024.028500][ T30] audit: type=1400 audit(4023.170:537): avc: denied { create } for pid=23665 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4024.033918][ T30] audit: type=1400 audit(4023.170:538): avc: denied { write open } for pid=23665 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=14783 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4024.048225][ T30] audit: type=1400 audit(4023.190:539): avc: denied { append } for pid=23665 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=14783 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4043.373404][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 4043.375920][ T30] audit: type=1400 audit(4042.510:544): avc: denied { ioctl } for pid=23781 comm="syz.1.9700" path="socket:[70526]" dev="sockfs" ino=70526 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4050.426386][ T30] audit: type=1400 audit(4049.570:545): avc: denied { ioctl } for pid=23815 comm="syz.1.9717" path="socket:[71579]" dev="sockfs" ino=71579 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4051.193164][ T30] audit: type=1400 audit(4050.330:546): avc: denied { sys_module } for pid=23815 comm="syz.1.9717" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4055.805942][T23850] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23850 comm=syz.3.9731 [ 4063.212778][ T30] audit: type=1400 audit(4062.350:547): avc: denied { connect } for pid=23907 comm="syz.3.9760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4063.253748][ T30] audit: type=1400 audit(4062.400:548): avc: denied { listen } for pid=23907 comm="syz.3.9760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4063.296258][ T30] audit: type=1400 audit(4062.420:549): avc: denied { accept } for pid=23907 comm="syz.3.9760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4069.520432][ T30] audit: type=1400 audit(4068.660:550): avc: denied { bind } for pid=23942 comm="syz.1.9777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4069.539721][ T30] audit: type=1400 audit(4068.680:551): avc: denied { node_bind } for pid=23942 comm="syz.1.9777" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 4105.779235][T24178] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24178 comm=syz.3.9889 [ 4118.497203][ T30] audit: type=1400 audit(4117.640:552): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 4139.703348][ T30] audit: type=1400 audit(4138.840:553): avc: denied { connect } for pid=24391 comm="syz.3.9996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 4139.732924][ T30] audit: type=1400 audit(4138.870:554): avc: denied { bind } for pid=24391 comm="syz.3.9996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 4139.766347][ T30] audit: type=1400 audit(4138.910:555): avc: denied { write } for pid=24391 comm="syz.3.9996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 4142.854773][T24415] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=24415 comm=syz.3.10006 [ 4147.193153][T24444] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24444 comm=syz.1.10020 [ 4176.398289][T24616] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24616 comm=syz.3.10104 [ 4184.856965][T24664] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=24664 comm=syz.1.10126 [ 4185.588040][ T30] audit: type=1400 audit(4184.700:556): avc: denied { read } for pid=24669 comm="syz.3.10130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4186.448976][ T30] audit: type=1400 audit(4185.590:557): avc: denied { ioctl } for pid=24679 comm="syz.1.10135" path="socket:[74804]" dev="sockfs" ino=74804 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4197.100352][ T30] audit: type=1400 audit(4196.240:558): avc: denied { write } for pid=24749 comm="syz.1.10169" path="socket:[74913]" dev="sockfs" ino=74913 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4203.010328][T24782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24782 comm=syz.1.10184 [ 4204.086226][T24789] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24789 comm=syz.1.10188 [ 4210.764359][T24835] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4210.796192][T24835] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4215.649643][ T30] audit: type=1400 audit(4214.790:559): avc: denied { getopt } for pid=24860 comm="syz.3.10224" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4233.432291][ T30] audit: type=1400 audit(4232.560:560): avc: denied { execute } for pid=24964 comm="syz.3.10273" path=2F6D656D66643AC0873A2A18C16B06875BA06F383449AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EB257CB8D7D336C6D38A537C9202864656C6574656429 dev="tmpfs" ino=67 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4247.334513][ T30] audit: type=1400 audit(4246.480:561): avc: denied { ioctl } for pid=25062 comm="syz.1.10319" path="socket:[74520]" dev="sockfs" ino=74520 ioctlcmd=0x8955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4254.259707][T25112] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=25112 comm=syz.3.10344 [ 4260.332817][ T30] audit: type=1400 audit(4259.480:562): avc: denied { ioctl } for pid=25157 comm="syz.3.10367" path="socket:[75505]" dev="sockfs" ino=75505 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4271.645186][ T30] audit: type=1400 audit(4270.790:563): avc: denied { ioctl } for pid=25242 comm="syz.3.10408" path="socket:[75787]" dev="sockfs" ino=75787 ioctlcmd=0x8941 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4296.409738][ T30] audit: type=1400 audit(4295.550:564): avc: denied { setattr } for pid=25341 comm="syz.3.10455" name="[io_uring]" dev="anon_inodefs" ino=75941 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4298.652875][ T30] audit: type=1800 audit(4297.790:565): pid=25342 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=set_data cause=unavailable-hash-algorithm comm="syz.3.10455" name="/" dev="anon_inodefs" ino=75941 res=0 errno=0 [ 4301.838629][T25361] input: syz1 as /devices/virtual/input/input2 [ 4308.666306][T25387] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10475'. [ 4311.668568][T25411] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25411 comm=syz.3.10487 [ 4317.023152][ T30] audit: type=1400 audit(4316.154:566): avc: denied { create } for pid=25436 comm="syz.3.10500" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4317.039887][ T30] audit: type=1400 audit(4316.174:567): avc: denied { write } for pid=25436 comm="syz.3.10500" name="file0" dev="tmpfs" ino=16208 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4317.055278][ T30] audit: type=1400 audit(4316.184:568): avc: denied { open } for pid=25436 comm="syz.3.10500" path="/3130/file0" dev="tmpfs" ino=16208 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4317.122550][ T30] audit: type=1400 audit(4316.244:569): avc: denied { ioctl } for pid=25436 comm="syz.3.10500" path="/3130/file0" dev="tmpfs" ino=16208 ioctlcmd=0x1260 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4317.287739][ T30] audit: type=1400 audit(4316.424:570): avc: denied { unlink } for pid=14013 comm="syz-executor" name="file0" dev="tmpfs" ino=16208 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 4321.437007][T25467] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2816 sclass=netlink_tcpdiag_socket pid=25467 comm=syz.3.10514 [ 4345.068237][ T30] audit: type=1400 audit(134222072.208:571): avc: denied { sqpoll } for pid=25602 comm="syz.1.10578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 4354.442391][ T30] audit: type=1400 audit(134222081.578:572): avc: denied { remount } for pid=25676 comm="syz.3.10614" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 4354.736229][T25679] sock: sock_set_timeout: `syz.3.10615' (pid 25679) tries to set negative timeout [ 4364.367127][ T30] audit: type=1400 audit(134222091.498:573): avc: denied { mount } for pid=25737 comm="syz.1.10644" name="/" dev="ramfs" ino=76579 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 4368.906310][T25774] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=25774 comm=syz.3.10662 [ 4380.450424][ T30] audit: type=1400 audit(134222107.578:574): avc: denied { mount } for pid=25845 comm="syz.3.10698" name="/" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 4390.550254][T25914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25914 comm=syz.3.10730 [ 4417.866307][ T30] audit: type=1400 audit(134222145.008:575): avc: denied { write } for pid=26079 comm="syz.3.10811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4436.270205][ T30] audit: type=1400 audit(134222163.408:576): avc: denied { checkpoint_restore } for pid=26197 comm="syz.1.10869" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4446.647602][T26266] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26266 comm=syz.1.10901 [ 4448.818437][T26280] input: syz1 as /devices/virtual/input/input3 [ 4454.425186][T26312] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26312 comm=syz.1.10924 [ 4464.899623][ T30] audit: type=1400 audit(134222192.038:577): avc: denied { setopt } for pid=26373 comm="syz.3.10956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4470.739374][T26408] lo speed is unknown, defaulting to 1000 [ 4485.134004][ T30] audit: type=1400 audit(134222212.268:578): avc: denied { bind } for pid=26497 comm="syz.3.11017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4487.895523][ T30] audit: type=1400 audit(134222215.028:579): avc: denied { mount } for pid=26517 comm="syz.1.11026" name="/" dev="autofs" ino=78841 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 4487.943907][ T30] audit: type=1400 audit(134222215.078:580): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 4491.825564][T26536] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26536 comm=syz.3.11035 [ 4512.953300][T26657] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26657 comm=syz.1.11091 [ 4532.449237][T26772] sock: sock_set_timeout: `syz.1.11141' (pid 26772) tries to set negative timeout [ 4534.567653][T26789] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44 sclass=netlink_audit_socket pid=26789 comm=syz.3.11150 [ 4546.953790][T26868] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=26868 comm=syz.1.11189 [ 4548.013973][ T30] audit: type=1400 audit(134222275.148:581): avc: denied { read } for pid=26874 comm="syz.1.11193" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 4548.029696][ T30] audit: type=1400 audit(134222275.168:582): avc: denied { open } for pid=26874 comm="syz.1.11193" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 4548.148105][ T30] audit: type=1400 audit(134222275.238:583): avc: denied { ioctl } for pid=26874 comm="syz.1.11193" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 4571.914515][T27025] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27025 comm=syz.1.11263 [ 4572.533444][ T30] audit: type=1400 audit(134222299.658:584): avc: denied { mount } for pid=27027 comm="syz.3.11265" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 4573.278701][ T30] audit: type=1400 audit(134222300.418:585): avc: denied { setopt } for pid=27031 comm="syz.3.11272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4575.897344][T27058] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27058 comm=syz.3.11281 [ 4584.066964][ T30] audit: type=1400 audit(134222311.208:586): avc: denied { shutdown } for pid=27112 comm="syz.3.11308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4588.277753][ T30] audit: type=1400 audit(134222315.418:587): avc: denied { watch watch_reads } for pid=27136 comm="syz.3.11320" path="pipe:[37837]" dev="pipefs" ino=37837 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 4624.262713][ T30] audit: type=1400 audit(134222351.398:588): avc: denied { create } for pid=27372 comm="syz.1.11435" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 4624.374988][ T30] audit: type=1400 audit(134222351.518:589): avc: denied { read } for pid=27372 comm="syz.1.11435" name="file0" dev="tmpfs" ino=27104 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 4624.389475][ T30] audit: type=1400 audit(134222351.528:590): avc: denied { open } for pid=27372 comm="syz.1.11435" path="/5259/file0" dev="tmpfs" ino=27104 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 4631.378693][T27431] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27431 comm=syz.3.11463 [ 4641.229538][ T30] audit: type=1400 audit(134222368.368:591): avc: denied { execute_no_trans } for pid=27503 comm="syz.3.11498" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1105 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4672.068984][T27684] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=27684 comm=syz.1.11586 [ 4694.030563][T27808] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27808 comm=syz.3.11644 [ 4712.983511][T27912] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27912 comm=syz.1.11694 [ 4743.365948][T28107] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28107 comm=syz.1.11790 [ 4753.860451][ T30] audit: type=1400 audit(134222480.998:592): avc: denied { map } for pid=28162 comm="syz.3.11817" path="socket:[83656]" dev="sockfs" ino=83656 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 4780.750416][ T30] audit: type=1400 audit(134222507.888:593): avc: denied { setopt } for pid=28312 comm="syz.3.11889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4783.489601][ T30] audit: type=1400 audit(134222510.628:594): avc: denied { mount } for pid=28320 comm="syz.3.11897" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 4800.444909][T25293] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4800.623381][ T30] audit: type=1400 audit(134222527.758:595): avc: denied { execute } for pid=28446 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 4800.637938][ T30] audit: type=1400 audit(134222527.778:596): avc: denied { execute_no_trans } for pid=28446 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 4800.818458][T25293] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4800.838634][ T30] audit: type=1400 audit(134222527.978:597): avc: denied { mounton } for pid=28447 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 4801.137479][T25293] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4801.556735][T25293] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4802.964097][ T30] audit: type=1400 audit(134222530.098:598): avc: denied { read } for pid=3165 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 4805.596612][T25293] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4805.665980][T25293] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4805.729588][T25293] bond0 (unregistering): Released all slaves [ 4806.415610][T25293] hsr_slave_0: left promiscuous mode [ 4806.428959][T25293] hsr_slave_1: left promiscuous mode [ 4806.680748][T25293] veth1_macvtap: left promiscuous mode [ 4806.711753][T25293] veth0_macvtap: left promiscuous mode [ 4806.713738][T25293] veth1_vlan: left promiscuous mode [ 4806.715804][T25293] veth0_vlan: left promiscuous mode [ 4812.127757][T21878] lo speed is unknown, defaulting to 1000 [ 4812.128997][T21878] syz0: Port: 1 Link DOWN [ 4819.315385][T28447] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 4819.350527][T28447] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 4823.817864][T28447] hsr_slave_0: entered promiscuous mode [ 4823.827826][T28447] hsr_slave_1: entered promiscuous mode [ 4823.837268][T28447] debugfs: 'hsr0' already exists in 'hsr' [ 4823.839327][T28447] Cannot create hsr debugfs directory [ 4826.496998][T28447] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 4826.589745][T28447] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 4826.646694][T28447] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 4826.670324][T28447] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 4833.046661][T28447] 8021q: adding VLAN 0 to HW filter on device bond0 [ 4848.894974][T28447] veth0_vlan: entered promiscuous mode [ 4849.056365][T28447] veth1_vlan: entered promiscuous mode [ 4849.517790][T28447] veth0_macvtap: entered promiscuous mode [ 4849.685326][T28447] veth1_macvtap: entered promiscuous mode [ 4850.258320][T19411] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 4850.259592][T19411] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 4850.259997][T19411] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 4850.260395][T19411] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 4850.847908][ T30] audit: type=1400 audit(134222577.978:599): avc: denied { mounton } for pid=28447 comm="syz-executor" path="/syzkaller.6y7POJ/syz-tmp" dev="vda" ino=1880 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 4850.892072][ T30] audit: type=1400 audit(134222578.028:600): avc: denied { mounton } for pid=28447 comm="syz-executor" path="/syzkaller.6y7POJ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 4850.897818][ T30] audit: type=1400 audit(134222578.038:601): avc: denied { mounton } for pid=28447 comm="syz-executor" path="/syzkaller.6y7POJ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=86277 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 4851.064388][ T30] audit: type=1400 audit(134222578.198:602): avc: denied { unmount } for pid=28447 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 4851.103083][ T30] audit: type=1400 audit(134222578.218:603): avc: denied { mounton } for pid=28447 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 4851.104253][ T30] audit: type=1400 audit(134222578.228:604): avc: denied { mount } for pid=28447 comm="syz-executor" name="/" dev="gadgetfs" ino=85355 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 4851.127188][ T30] audit: type=1400 audit(134222578.268:605): avc: denied { mount } for pid=28447 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 4851.140263][ T30] audit: type=1400 audit(134222578.278:606): avc: denied { mounton } for pid=28447 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 4884.698321][T28766] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28766 comm=syz.3.12038 [ 4899.112659][ T30] audit: type=1400 audit(134222626.238:607): avc: denied { unmount } for pid=28447 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 4906.917051][T28868] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28868 comm=syz.4.12084 [ 4909.857718][T28896] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28896 comm=syz.3.12098 [ 4937.167798][ T30] audit: type=1400 audit(134222664.258:608): avc: denied { write } for pid=29052 comm="syz.4.12170" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 4947.455056][T29120] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=44 sclass=netlink_audit_socket pid=29120 comm=syz.4.12202 [ 4987.538772][T29351] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1549 sclass=netlink_route_socket pid=29351 comm=syz.3.12319 [ 4992.616313][ T30] audit: type=1400 audit(134222719.748:609): avc: denied { name_bind } for pid=29386 comm="syz.3.12337" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 4993.879950][T29396] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29396 comm=syz.4.12336 [ 4996.253515][T29407] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4996.280474][T29407] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5001.202171][ T30] audit: type=1400 audit(134222728.328:610): avc: denied { nlmsg_tty_audit } for pid=29429 comm="syz.3.12353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 5001.654052][T29435] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=29435 comm=syz.3.12357 [ 5034.286510][T29608] syz.4.12438: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 5034.349433][T29608] CPU: 1 UID: 0 PID: 29608 Comm: syz.4.12438 Not tainted syzkaller #0 PREEMPT [ 5034.349573][T29608] Hardware name: linux,dummy-virt (DT) [ 5034.349887][T29608] Call trace: [ 5034.350112][T29608] show_stack+0x18/0x24 (C) [ 5034.350346][T29608] dump_stack_lvl+0xdc/0xf4 [ 5034.350429][T29608] dump_stack+0x1c/0x28 [ 5034.350517][T29608] warn_alloc+0x1c0/0x308 [ 5034.350568][T29608] __vmalloc_node_range_noprof+0xaa4/0xe60 [ 5034.350618][T29608] vmalloc_user_noprof+0xe4/0x128 [ 5034.350663][T29608] xskq_create+0xd4/0x174 [ 5034.350705][T29608] xsk_setsockopt+0x370/0x624 [ 5034.350745][T29608] do_sock_setsockopt+0x17c/0x354 [ 5034.350795][T29608] __sys_setsockopt+0xcc/0x164 [ 5034.350837][T29608] __arm64_sys_setsockopt+0xa4/0x100 [ 5034.350950][T29608] invoke_syscall+0x6c/0x258 [ 5034.351159][T29608] el0_svc_common.constprop.0+0xac/0x230 [ 5034.351259][T29608] do_el0_svc_compat+0x40/0x68 [ 5034.351304][T29608] el0_svc_compat+0x4c/0x184 [ 5034.351364][T29608] el0t_32_sync_handler+0x88/0xac [ 5034.351414][T29608] el0t_32_sync+0x19c/0x1a0 [ 5034.415355][T29608] Mem-Info: [ 5034.417227][T29608] active_anon:5843 inactive_anon:0 isolated_anon:0 [ 5034.417227][T29608] active_file:14542 inactive_file:3467 isolated_file:0 [ 5034.417227][T29608] unevictable:768 dirty:25 writeback:0 [ 5034.417227][T29608] slab_reclaimable:7680 slab_unreclaimable:30607 [ 5034.417227][T29608] mapped:2715 shmem:2261 pagetables:1060 [ 5034.417227][T29608] sec_pagetables:0 bounce:0 [ 5034.417227][T29608] kernel_misc_reclaimable:0 [ 5034.417227][T29608] free:288166 free_pcp:5397 free_cma:8000 [ 5034.418133][T29608] Node 0 active_anon:23372kB inactive_anon:0kB active_file:58168kB inactive_file:13868kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:10860kB dirty:100kB writeback:0kB shmem:9044kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:6760kB pagetables:4240kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 5034.418652][T29608] Node 0 DMA free:1152664kB boost:0kB min:22528kB low:28160kB high:33792kB reserved_highatomic:0KB free_highatomic:0KB active_anon:23372kB inactive_anon:0kB active_file:58168kB inactive_file:13868kB unevictable:3072kB writepending:100kB present:2097152kB managed:1532292kB mlocked:0kB bounce:0kB free_pcp:21588kB local_pcp:10788kB free_cma:32000kB [ 5034.419542][T29608] lowmem_reserve[]: 0 0 0 0 0 [ 5034.420330][T29608] Node 0 DMA: 388*4kB (UME) 297*8kB (UME) 342*16kB (UME) 277*32kB (UME) 139*64kB (UME) 79*128kB (UME) 85*256kB (UMEC) 48*512kB (UME) 36*1024kB (UMEC) 18*2048kB (UEC) 243*4096kB (UMC) = 1152664kB [ 5034.505118][T29608] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 5034.505401][T29608] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=32768kB [ 5034.505601][T29608] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 5034.505782][T29608] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=64kB [ 5034.506084][T29608] 20266 total pagecache pages [ 5034.506339][T29608] 0 pages in swap cache [ 5034.506551][T29608] Free swap = 124996kB [ 5034.506755][T29608] Total swap = 124996kB [ 5034.507140][T29608] 524288 pages RAM [ 5034.507332][T29608] 0 pages HighMem/MovableOnly [ 5034.507541][T29608] 141215 pages reserved [ 5034.507722][T29608] 8192 pages cma reserved [ 5034.507933][T29608] 1 pages hwpoisoned [ 5081.988362][ T30] audit: type=1400 audit(134222809.128:611): avc: denied { write } for pid=29875 comm="syz.4.12573" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 5082.055187][ T30] audit: type=1400 audit(134222809.128:612): avc: denied { open } for pid=29875 comm="syz.4.12573" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 5082.067018][T29877] random: crng reseeded on system resumption [ 5090.098406][T29921] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=29921 comm=syz.4.12593 [ 5143.427698][T30089] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=30089 comm=syz.4.12675 [ 5172.982668][T30259] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2579 sclass=netlink_tcpdiag_socket pid=30259 comm=syz.4.12758 [ 5174.656349][T30272] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1015 sclass=netlink_route_socket pid=30272 comm=syz.3.12768 [ 5175.050217][ T30] audit: type=1400 audit(134222902.188:613): avc: denied { getopt } for pid=30274 comm="syz.3.12766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5182.325460][T30320] can0: slcan on pts0. [ 5182.674870][T30318] can0 (unregistered): slcan off pts0. [ 5189.604184][T30370] loop7: detected capacity change from 0 to 7 [ 5189.685830][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 5189.687771][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 5189.705626][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 5189.706332][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 5189.723992][T30370] loop7: unable to read partition table [ 5189.755866][T30370] loop_reread_partitions: partition scan of loop7 (gCj̖P=!MX %`搘ȵ4FLQk݊5) failed (rc=-5) [ 5189.822058][ C0] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 5189.822555][ C0] Buffer I/O error on dev loop7, logical block 0, async page read [ 5189.836597][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 5189.837428][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 5189.844481][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 5189.845928][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 5189.848158][T30370] loop7: unable to read partition table [ 5189.907672][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 5189.908746][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 5189.998839][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 5189.999775][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 5190.066317][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 5190.067128][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 5190.176137][ C1] I/O error, dev loop7, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 5190.176928][ C1] Buffer I/O error on dev loop7, logical block 0, async page read [ 5191.012323][T30378] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30378 comm=syz.4.12816 [ 5206.897689][ T30] audit: type=1400 audit(134222934.038:614): avc: denied { read } for pid=30478 comm="syz.4.12867" path="socket:[92167]" dev="sockfs" ino=92167 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5217.230047][ T30] audit: type=1400 audit(134222944.368:615): avc: denied { ioctl } for pid=30545 comm="syz.4.12899" path="cgroup:[4026532610]" dev="nsfs" ino=4026532610 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5237.873496][ T30] audit: type=1400 audit(134222965.008:616): avc: denied { unmount } for pid=28447 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 5245.700184][T30745] syz.3.12995: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 5245.710129][T30745] CPU: 0 UID: 0 PID: 30745 Comm: syz.3.12995 Not tainted syzkaller #0 PREEMPT [ 5245.710378][T30745] Hardware name: linux,dummy-virt (DT) [ 5245.710446][T30745] Call trace: [ 5245.710501][T30745] show_stack+0x18/0x24 (C) [ 5245.710683][T30745] dump_stack_lvl+0xdc/0xf4 [ 5245.710800][T30745] dump_stack+0x1c/0x28 [ 5245.710961][T30745] warn_alloc+0x1c0/0x308 [ 5245.711106][T30745] __vmalloc_node_range_noprof+0xaa4/0xe60 [ 5245.711215][T30745] vmalloc_user_noprof+0xe4/0x128 [ 5245.711311][T30745] xskq_create+0xd4/0x174 [ 5245.711404][T30745] xsk_setsockopt+0x370/0x624 [ 5245.711534][T30745] do_sock_setsockopt+0x17c/0x354 [ 5245.711704][T30745] __sys_setsockopt+0xcc/0x164 [ 5245.711798][T30745] __arm64_sys_setsockopt+0xa4/0x100 [ 5245.711906][T30745] invoke_syscall+0x6c/0x258 [ 5245.712010][T30745] el0_svc_common.constprop.0+0xac/0x230 [ 5245.712101][T30745] do_el0_svc_compat+0x40/0x68 [ 5245.712194][T30745] el0_svc_compat+0x4c/0x184 [ 5245.712295][T30745] el0t_32_sync_handler+0x88/0xac [ 5245.712388][T30745] el0t_32_sync+0x19c/0x1a0 [ 5245.760337][T30745] Mem-Info: [ 5245.762536][T30745] active_anon:5824 inactive_anon:0 isolated_anon:0 [ 5245.762536][T30745] active_file:14542 inactive_file:3539 isolated_file:0 [ 5245.762536][T30745] unevictable:768 dirty:31 writeback:0 [ 5245.762536][T30745] slab_reclaimable:7690 slab_unreclaimable:30827 [ 5245.762536][T30745] mapped:2705 shmem:2260 pagetables:1067 [ 5245.762536][T30745] sec_pagetables:0 bounce:0 [ 5245.762536][T30745] kernel_misc_reclaimable:0 [ 5245.762536][T30745] free:289854 free_pcp:4526 free_cma:8000 [ 5245.762874][T30745] Node 0 active_anon:23296kB inactive_anon:0kB active_file:58168kB inactive_file:14156kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:10820kB dirty:124kB writeback:0kB shmem:9040kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:6672kB pagetables:4268kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 5245.763136][T30745] Node 0 DMA free:1159416kB boost:0kB min:22528kB low:28160kB high:33792kB reserved_highatomic:0KB free_highatomic:0KB active_anon:23296kB inactive_anon:0kB active_file:58168kB inactive_file:14156kB unevictable:3072kB writepending:124kB present:2097152kB managed:1532292kB mlocked:0kB bounce:0kB free_pcp:18104kB local_pcp:6188kB free_cma:32000kB [ 5245.763643][T30745] lowmem_reserve[]: 0 0 0 0 0 [ 5245.764213][T30745] Node 0 DMA: 634*4kB (UME) 564*8kB (UM) 271*16kB (UME) 298*32kB (UME) 257*64kB (UME) 80*128kB (UM) 53*256kB (UMC) 37*512kB (UME) 34*1024kB (UMEC) 20*2048kB (UEC) 245*4096kB (UMC) = 1159416kB [ 5245.766081][T30745] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 5245.766168][T30745] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=32768kB [ 5245.766242][T30745] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 5245.766345][T30745] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=64kB [ 5245.766429][T30745] 20337 total pagecache pages [ 5245.766501][T30745] 0 pages in swap cache [ 5245.766761][T30745] Free swap = 124996kB [ 5245.766833][T30745] Total swap = 124996kB [ 5245.766977][T30745] 524288 pages RAM [ 5245.767096][T30745] 0 pages HighMem/MovableOnly [ 5245.767166][T30745] 141215 pages reserved [ 5245.767223][T30745] 8192 pages cma reserved [ 5245.767279][T30745] 1 pages hwpoisoned [ 5266.073029][ T30] audit: type=1400 audit(134222993.218:617): avc: denied { read } for pid=30872 comm="syz.4.13063" name="file0" dev="tmpfs" ino=3148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 5267.825016][ T30] audit: type=1400 audit(134222994.968:618): avc: denied { getopt } for pid=30884 comm="syz.3.13064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5269.917450][ T30] audit: type=1400 audit(134222997.058:619): avc: denied { read } for pid=30895 comm="syz.4.13070" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5269.924805][ T30] audit: type=1400 audit(134222997.058:620): avc: denied { open } for pid=30895 comm="syz.4.13070" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5269.986026][ T30] audit: type=1400 audit(134222997.118:621): avc: denied { ioctl } for pid=30895 comm="syz.4.13070" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5282.067529][ T30] audit: type=1400 audit(134223009.208:622): avc: denied { read } for pid=30981 comm="syz.4.13112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5289.720119][ T30] audit: type=1400 audit(134223016.848:623): avc: denied { validate_trans } for pid=31024 comm="syz.4.13133" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 5292.214275][T31034] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5292.247503][T31034] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5356.456782][ T30] audit: type=1400 audit(134223083.578:624): avc: denied { setattr } for pid=31204 comm="syz.4.13223" name="system" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5368.217029][T31263] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31263 comm=syz.4.13246 [ 5369.053794][T31268] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=31268 comm=syz.4.13249 [ 5371.544479][T31281] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2579 sclass=netlink_tcpdiag_socket pid=31281 comm=syz.3.13255 [ 5396.580518][T31412] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=31412 comm=syz.3.13319 [ 5401.922362][ T30] audit: type=1400 audit(134223129.058:625): avc: denied { bind } for pid=31441 comm="syz.4.13334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5401.929333][ T30] audit: type=1400 audit(134223129.068:626): avc: denied { listen } for pid=31441 comm="syz.4.13334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5411.969480][ T30] audit: type=1400 audit(134223139.098:627): avc: denied { name_bind } for pid=31511 comm="syz.4.13369" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 5440.087799][T31670] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=31670 comm=syz.4.13445 [ 5451.348442][T31765] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=31765 comm=syz.3.13492 [ 5461.609684][T31844] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=31844 comm=syz.4.13529 [ 5522.285372][T32171] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32171 comm=syz.3.13686 [ 5529.603893][T32207] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32207 comm=syz.4.13703 [ 5553.485143][T32335] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2579 sclass=netlink_tcpdiag_socket pid=32335 comm=syz.4.13767 [ 5587.834391][T32503] can0: slcan on pts0. [ 5588.364747][T32502] can0 (unregistered): slcan off pts0. [ 5600.263062][T32571] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=32571 comm=syz.3.13877 [ 5601.775199][T32578] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=32578 comm=syz.4.13880 [ 5602.427409][T32583] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32583 comm=syz.4.13883 [ 5605.484031][T32605] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32605 comm=syz.4.13894 [ 5642.670320][ T367] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=367 comm=syz.3.14009 [ 5656.543349][ T460] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=460 comm=syz.4.14053 [ 5661.955559][ T30] audit: type=1400 audit(134223389.098:628): avc: denied { bind } for pid=496 comm="syz.4.14073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5676.615270][ T601] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=601 comm=syz.4.14121 [ 5679.603490][ T30] audit: type=1400 audit(134223406.738:629): avc: denied { mount } for pid=618 comm="syz.3.14131" name="/" dev="pipefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 5728.370766][ T894] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=894 comm=syz.4.14266 [ 5748.279672][ T1067] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1067 comm=syz.3.14335 [ 5799.516676][ T1376] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1376 comm=syz.4.14484 [ 5819.775888][ T30] audit: type=1400 audit(134223546.908:630): avc: denied { execute } for pid=1557 comm="syz.4.14571" path="/dev/dsp" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 5827.445000][ T1618] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1545 sclass=netlink_audit_socket pid=1618 comm=syz.3.14601 [ 5835.758808][ T1700] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=1700 comm=syz.3.14641 [ 5851.850510][ T1852] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=1852 comm=syz.3.14704 [ 5868.215241][ T1965] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5868.588899][ T1965] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5868.963663][ T1965] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5869.256555][ T1965] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5869.819698][T19411] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 5870.020240][ T1683] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 5870.167529][ T1683] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 5870.326475][T19411] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 5888.276857][ T30] audit: type=1326 audit(134223615.418:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2107 comm="syz.4.14825" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x0 [ 5896.322277][ T30] audit: type=1400 audit(134223623.458:632): avc: denied { module_load } for pid=2168 comm="syz.4.14854" path="/sys/power/wakeup_count" dev="sysfs" ino=873 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 5897.118618][ T2177] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1025 sclass=netlink_xfrm_socket pid=2177 comm=syz.3.14857 [ 5897.897543][ T30] audit: type=1400 audit(134223625.038:633): avc: denied { setopt } for pid=2182 comm="syz.3.14860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5908.998605][ T2274] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2274 comm=syz.3.14905 [ 5928.060011][ T30] audit: type=1400 audit(134223655.198:634): avc: denied { create } for pid=2438 comm="syz.4.14986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 5928.069599][ T30] audit: type=1400 audit(134223655.208:635): avc: denied { write } for pid=2438 comm="syz.4.14986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 5949.403178][ T2634] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2634 comm=syz.4.15081 [ 5953.023940][ T30] audit: type=1400 audit(134223680.148:636): avc: denied { ioctl } for pid=2662 comm="syz.4.15095" path="socket:[105720]" dev="sockfs" ino=105720 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 5958.186064][ T30] audit: type=1400 audit(134223685.328:637): avc: denied { read } for pid=2714 comm="syz.4.15119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 5975.458762][ T2819] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2819 comm=syz.3.15169 [ 6000.512212][ T30] audit: type=1400 audit(134223727.638:638): avc: denied { mount } for pid=3047 comm="syz.3.15280" name="/" dev="configfs" ino=58 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 6000.547559][ T30] audit: type=1400 audit(134223727.688:639): avc: denied { search } for pid=3047 comm="syz.3.15280" name="/" dev="configfs" ino=58 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 6000.595727][ T30] audit: type=1400 audit(134223727.728:640): avc: denied { setattr } for pid=3047 comm="syz.3.15280" name="/" dev="configfs" ino=58 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 6023.752972][ T3282] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6023.758162][ T3282] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6038.483817][ T3395] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3395 comm=syz.3.15435 [ 6052.147707][ T3515] netlink: 4 bytes leftover after parsing attributes in process `syz.3.15494'. [ 6059.087507][ T3564] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3564 comm=syz.3.15518 [ 6073.309114][ T30] audit: type=1326 audit(134223800.448:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3686 comm="syz.3.15579" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x0 [ 6113.313569][ T30] audit: type=1400 audit(134223840.448:642): avc: denied { mount } for pid=3998 comm="syz.3.15729" name="/" dev="hugetlbfs" ino=109349 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 6117.116391][ T4034] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=15 sclass=netlink_audit_socket pid=4034 comm=syz.4.15742 [ 6117.719386][ T4039] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4039 comm=syz.3.15745 [ 6131.408641][ T4142] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4142 comm=syz.4.15796 [ 6137.684901][ T4197] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1545 sclass=netlink_audit_socket pid=4197 comm=syz.4.15821 [ 6143.419339][ T30] audit: type=1400 audit(134223870.548:643): avc: denied { nlmsg_read } for pid=4240 comm="syz.3.15842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 6159.896097][ T30] audit: type=1400 audit(134223887.038:644): avc: denied { execute } for pid=4355 comm="syz.4.15898" path="/selinux/policy" dev="selinuxfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=file permissive=1 [ 6189.660376][ T30] audit: type=1400 audit(134223916.798:645): avc: denied { read } for pid=4536 comm="syz.4.15987" path="socket:[112073]" dev="sockfs" ino=112073 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 6245.353484][ T30] audit: type=1326 audit(134223972.498:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4880 comm="syz.4.16153" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c24 code=0x0 [ 6248.984693][ T4906] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4906 comm=syz.4.16168 [ 6255.958957][ T4955] netlink: 4 bytes leftover after parsing attributes in process `syz.4.16189'. [ 6261.445492][ T5006] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1025 sclass=netlink_xfrm_socket pid=5006 comm=syz.4.16215 [ 6262.989330][ T30] audit: type=1400 audit(134223990.128:647): avc: denied { create } for pid=5021 comm="syz.3.16227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 6286.186166][ T5193] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5193 comm=syz.3.16305 [ 6328.316632][ T30] audit: type=1400 audit(134224055.448:648): avc: denied { write } for pid=5557 comm="syz.3.16482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 6356.018368][ T5802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5802 comm=syz.4.16601 [ 6365.754482][ T5863] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=15 sclass=netlink_audit_socket pid=5863 comm=syz.3.16628 [ 6378.892349][ T5936] support for cryptoloop has been removed. Use dm-crypt instead. [ 6386.525342][ T5971] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6386.530590][ T5971] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6409.625430][ T6116] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2567 sclass=netlink_route_socket pid=6116 comm=syz.3.16749 [ 6425.868135][ T6253] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6253 comm=syz.3.16820 [ 6430.424401][ T6287] netlink: 4 bytes leftover after parsing attributes in process `syz.3.16831'. [ 6438.588862][ T6335] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6335 comm=syz.4.16854 [ 6463.430564][ T6560] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5125 sclass=netlink_audit_socket pid=6560 comm=syz.3.16967 [ 6475.244096][ T6648] nbd0: detected capacity change from 0 to 127 [ 6475.258036][ T48] block nbd0: Receive control failed (result -32) [ 6475.258383][ T6649] block nbd0: Receive control failed (result -32) [ 6475.374561][ T6651] block nbd0: Dead connection, failed to find a fallback [ 6475.377725][ T6651] block nbd0: shutting down sockets [ 6475.380179][ T6651] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 6475.383326][ T6651] Buffer I/O error on dev nbd0, logical block 0, async page read [ 6475.386808][ T6651] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 6475.388372][ T6651] Buffer I/O error on dev nbd0, logical block 1, async page read [ 6475.390042][ T6651] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 6475.409905][ T6651] Buffer I/O error on dev nbd0, logical block 2, async page read [ 6475.455270][ T6651] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 6475.456152][ T6651] Buffer I/O error on dev nbd0, logical block 3, async page read [ 6475.470815][ T6651] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 6475.484387][ T6651] Buffer I/O error on dev nbd0, logical block 0, async page read [ 6475.486483][ T6651] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 6475.487312][ T6651] Buffer I/O error on dev nbd0, logical block 1, async page read [ 6475.489054][ T6651] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 6475.489876][ T6651] Buffer I/O error on dev nbd0, logical block 2, async page read [ 6475.539673][ T6651] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 6475.540626][ T6651] Buffer I/O error on dev nbd0, logical block 3, async page read [ 6475.547602][ T6651] nbd0: unable to read partition table [ 6475.625212][ T6651] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 6475.626783][ T6651] Buffer I/O error on dev nbd0, logical block 0, async page read [ 6475.629167][ T6651] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 6475.630304][ T6651] Buffer I/O error on dev nbd0, logical block 1, async page read [ 6475.637532][ T6651] nbd0: unable to read partition table [ 6475.957772][ T6651] nbd0: unable to read partition table [ 6476.100020][ T6651] nbd0: unable to read partition table [ 6477.010308][ T30] audit: type=1400 audit(134224204.148:649): avc: denied { setattr } for pid=6660 comm="syz.4.17014" name="mixer" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 6524.854034][ T7061] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7061 comm=syz.3.17209 [ 6531.319644][ T7122] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7122 comm=syz.3.17240 [ 6567.236169][ T7325] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2567 sclass=netlink_route_socket pid=7325 comm=syz.4.17337 [ 6573.376155][ T7358] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5136 sclass=netlink_audit_socket pid=7358 comm=syz.3.17353 [ 6628.936505][ T7743] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7743 comm=syz.3.17538 [ 6638.753805][ T7806] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5125 sclass=netlink_audit_socket pid=7806 comm=syz.4.17568 [ 6656.255912][ T7946] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7946 comm=syz.4.17638 [ 6658.759674][ T7972] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7972 comm=syz.3.17651 [ 6702.047545][ T8297] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8297 comm=syz.4.17809 [ 6708.527140][ T8355] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8355 comm=syz.4.17836 [ 6724.034435][ T8488] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8488 comm=syz.3.17902 [ 6727.344347][ T8517] support for cryptoloop has been removed. Use dm-crypt instead. [ 6727.878661][ T8520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2567 sclass=netlink_route_socket pid=8520 comm=syz.4.17917 [ 6731.029871][ T30] audit: type=1400 audit(134224458.168:650): avc: denied { setopt } for pid=8546 comm="syz.3.17934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 6731.506833][ T8551] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5136 sclass=netlink_audit_socket pid=8551 comm=syz.4.17931 [ 6736.795009][ T8584] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8584 comm=syz.4.17952 [ 6738.376634][ T8602] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1550 sclass=netlink_route_socket pid=8602 comm=syz.4.17958 [ 6744.477680][ T30] audit: type=1400 audit(134224471.618:651): avc: denied { lock } for pid=8652 comm="syz.3.17983" path="socket:[126510]" dev="sockfs" ino=126510 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 6746.787688][ T8674] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8674 comm=syz.4.17993 [ 6751.112669][ T8712] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8712 comm=syz.4.18012 [ 6754.389038][ T8730] [ 6754.391639][ T8730] ====================================================== [ 6754.392244][ T8730] WARNING: possible circular locking dependency detected [ 6754.392870][ T8730] syzkaller #0 Not tainted [ 6754.393201][ T8730] ------------------------------------------------------ [ 6754.393715][ T8730] syz.3.18021/8730 is trying to acquire lock: [ 6754.394214][ T8730] ffff8000888d2a88 (xps_map_mutex){+.+.}-{4:4}, at: netif_reset_xps_queues.part.0+0x38/0x88 [ 6754.399355][ T8730] [ 6754.399355][ T8730] but task is already holding lock: [ 6754.400353][ T8730] ffff8000871b4170 (cpu_hotplug_lock){++++}-{0:0}, at: cpus_read_lock+0x10/0x1c [ 6754.401961][ T8730] [ 6754.401961][ T8730] which lock already depends on the new lock. [ 6754.401961][ T8730] [ 6754.403001][ T8730] [ 6754.403001][ T8730] the existing dependency chain (in reverse order) is: [ 6754.403506][ T8730] [ 6754.403506][ T8730] -> #8 (cpu_hotplug_lock){++++}-{0:0}: [ 6754.404346][ T8730] percpu_down_read_internal.constprop.0+0x58/0x1f8 [ 6754.404822][ T8730] cpus_read_lock+0x10/0x1c [ 6754.405182][ T8730] static_key_slow_inc+0x18/0x3c [ 6754.405524][ T8730] tcp_md5_do_add+0x1f0/0x2dc [ 6754.405927][ T8730] tcp_v4_parse_md5_keys+0x158/0x500 [ 6754.406273][ T8730] do_tcp_setsockopt+0xfdc/0x1aac [ 6754.406605][ T8730] tcp_setsockopt+0xb0/0xcc [ 6754.406921][ T8730] sock_common_setsockopt+0x70/0xe0 [ 6754.407502][ T8730] do_sock_setsockopt+0x17c/0x354 [ 6754.407876][ T8730] __sys_setsockopt+0xcc/0x164 [ 6754.408364][ T8730] __arm64_sys_setsockopt+0xa4/0x100 [ 6754.408810][ T8730] invoke_syscall+0x6c/0x258 [ 6754.409416][ T8730] el0_svc_common.constprop.0+0xac/0x230 [ 6754.409808][ T8730] do_el0_svc_compat+0x40/0x68 [ 6754.410176][ T8730] el0_svc_compat+0x4c/0x184 [ 6754.410719][ T8730] el0t_32_sync_handler+0x88/0xac [ 6754.411325][ T8730] el0t_32_sync+0x19c/0x1a0 [ 6754.411963][ T8730] [ 6754.411963][ T8730] -> #7 (sk_lock-AF_INET){+.+.}-{0:0}: [ 6754.412672][ T8730] lock_sock_nested+0x38/0xe8 [ 6754.413041][ T8730] inet_shutdown+0x50/0x348 [ 6754.413407][ T8730] kernel_sock_shutdown+0x54/0x84 [ 6754.413773][ T8730] nbd_mark_nsock_dead+0x100/0x534 [ 6754.414201][ T8730] sock_shutdown+0x134/0x234 [ 6754.414537][ T8730] nbd_config_put+0x154/0x5b0 [ 6754.414876][ T8730] nbd_release+0x7c/0x128 [ 6754.415210][ T8730] blkdev_put_whole+0x98/0xf0 [ 6754.415590][ T8730] bdev_release+0x2a4/0x510 [ 6754.415933][ T8730] blkdev_release+0x14/0x24 [ 6754.416286][ T8730] __fput+0x2c8/0x954 [ 6754.416606][ T8730] ____fput+0x14/0x20 [ 6754.416916][ T8730] task_work_run+0x128/0x210 [ 6754.417256][ T8730] do_notify_resume+0x1d8/0x260 [ 6754.417589][ T8730] el0_svc_compat+0x104/0x184 [ 6754.417918][ T8730] el0t_32_sync_handler+0x88/0xac [ 6754.418271][ T8730] el0t_32_sync+0x19c/0x1a0 [ 6754.418631][ T8730] [ 6754.418631][ T8730] -> #6 (&nsock->tx_lock){+.+.}-{4:4}: [ 6754.419308][ T8730] __mutex_lock+0x144/0xffc [ 6754.419667][ T8730] mutex_lock_nested+0x24/0x30 [ 6754.419997][ T8730] nbd_queue_rq+0x2cc/0xb54 [ 6754.420336][ T8730] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 6754.420691][ T8730] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 6754.421391][ T8730] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 6754.421882][ T8730] blk_mq_run_hw_queue+0x1e4/0x500 [ 6754.422455][ T8730] blk_mq_dispatch_list+0x348/0xa50 [ 6754.422821][ T8730] blk_mq_flush_plug_list+0xe8/0x508 [ 6754.423266][ T8730] __blk_flush_plug+0x208/0x3b8 [ 6754.423668][ T8730] __submit_bio+0x3a4/0x4ac [ 6754.424008][ T8730] submit_bio_noacct_nocheck+0x59c/0xa8c [ 6754.424473][ T8730] submit_bio_noacct+0x858/0x18f8 [ 6754.425097][ T8730] submit_bio+0x32c/0x5f0 [ 6754.425505][ T8730] submit_bh_wbc+0x310/0x480 [ 6754.426111][ T8730] block_read_full_folio+0x26c/0x640 [ 6754.426511][ T8730] blkdev_read_folio+0x1c/0x28 [ 6754.426972][ T8730] filemap_read_folio+0xac/0x1fc [ 6754.427717][ T8730] do_read_cache_folio+0x1c4/0x480 [ 6754.428176][ T8730] read_cache_folio+0x44/0x6c [ 6754.428489][ T8730] read_part_sector+0xac/0x5f4 [ 6754.428858][ T8730] read_lba+0x15c/0x2ec [ 6754.429292][ T8730] efi_partition+0x1dc/0x2154 [ 6754.429682][ T8730] bdev_disk_changed+0x508/0xf0c [ 6754.430111][ T8730] blkdev_get_whole+0x144/0x1e4 [ 6754.430445][ T8730] bdev_open+0x1dc/0xa84 [ 6754.430756][ T8730] blkdev_open+0x1d4/0x324 [ 6754.431404][ T8730] do_dentry_open+0x6a4/0x103c [ 6754.432073][ T8730] vfs_open+0x5c/0x2fc [ 6754.432392][ T8730] path_openat+0x1490/0x24b4 [ 6754.432861][ T8730] do_filp_open+0x184/0x360 [ 6754.433433][ T8730] do_sys_openat2+0xe0/0x160 [ 6754.433853][ T8730] __arm64_sys_openat+0x12c/0x1bc [ 6754.434273][ T8730] invoke_syscall+0x6c/0x258 [ 6754.434707][ T8730] el0_svc_common.constprop.0+0xac/0x230 [ 6754.435236][ T8730] do_el0_svc+0x40/0x58 [ 6754.435709][ T8730] el0_svc+0x50/0x1a0 [ 6754.436032][ T8730] el0t_64_sync_handler+0xa0/0xe4 [ 6754.436398][ T8730] el0t_64_sync+0x198/0x19c [ 6754.436806][ T8730] [ 6754.436806][ T8730] -> #5 (&cmd->lock){+.+.}-{4:4}: [ 6754.437429][ T8730] __mutex_lock+0x144/0xffc [ 6754.437755][ T8730] mutex_lock_nested+0x24/0x30 [ 6754.438474][ T8730] nbd_queue_rq+0xa8/0xb54 [ 6754.439090][ T8730] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 6754.439610][ T8730] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 6754.440087][ T8730] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 6754.440488][ T8730] blk_mq_run_hw_queue+0x1e4/0x500 [ 6754.440872][ T8730] blk_mq_dispatch_list+0x348/0xa50 [ 6754.441263][ T8730] blk_mq_flush_plug_list+0xe8/0x508 [ 6754.441655][ T8730] __blk_flush_plug+0x208/0x3b8 [ 6754.441999][ T8730] __submit_bio+0x3a4/0x4ac [ 6754.442338][ T8730] submit_bio_noacct_nocheck+0x59c/0xa8c [ 6754.442718][ T8730] submit_bio_noacct+0x858/0x18f8 [ 6754.443062][ T8730] submit_bio+0x32c/0x5f0 [ 6754.443406][ T8730] submit_bh_wbc+0x310/0x480 [ 6754.443786][ T8730] block_read_full_folio+0x26c/0x640 [ 6754.444213][ T8730] blkdev_read_folio+0x1c/0x28 [ 6754.444583][ T8730] filemap_read_folio+0xac/0x1fc [ 6754.444901][ T8730] do_read_cache_folio+0x1c4/0x480 [ 6754.445344][ T8730] read_cache_folio+0x44/0x6c [ 6754.445943][ T8730] read_part_sector+0xac/0x5f4 [ 6754.446339][ T8730] read_lba+0x15c/0x2ec [ 6754.446709][ T8730] efi_partition+0x1dc/0x2154 [ 6754.447043][ T8730] bdev_disk_changed+0x508/0xf0c [ 6754.447384][ T8730] blkdev_get_whole+0x144/0x1e4 [ 6754.447751][ T8730] bdev_open+0x1dc/0xa84 [ 6754.448167][ T8730] blkdev_open+0x1d4/0x324 [ 6754.448480][ T8730] do_dentry_open+0x6a4/0x103c [ 6754.448865][ T8730] vfs_open+0x5c/0x2fc [ 6754.449367][ T8730] path_openat+0x1490/0x24b4 [ 6754.449789][ T8730] do_filp_open+0x184/0x360 [ 6754.450170][ T8730] do_sys_openat2+0xe0/0x160 [ 6754.450515][ T8730] __arm64_sys_openat+0x12c/0x1bc [ 6754.450943][ T8730] invoke_syscall+0x6c/0x258 [ 6754.451311][ T8730] el0_svc_common.constprop.0+0xac/0x230 [ 6754.451741][ T8730] do_el0_svc+0x40/0x58 [ 6754.452249][ T8730] el0_svc+0x50/0x1a0 [ 6754.452574][ T8730] el0t_64_sync_handler+0xa0/0xe4 [ 6754.452942][ T8730] el0t_64_sync+0x198/0x19c [ 6754.453526][ T8730] [ 6754.453526][ T8730] -> #4 (set->srcu){.+.+}-{0:0}: [ 6754.454265][ T8730] __synchronize_srcu+0xa8/0x268 [ 6754.454730][ T8730] synchronize_srcu+0x12c/0x370 [ 6754.455544][ T8730] blk_mq_quiesce_queue+0xf4/0x15c [ 6754.456028][ T8730] elevator_switch+0x11c/0x414 [ 6754.456438][ T8730] elevator_change+0x294/0x424 [ 6754.456815][ T8730] elevator_set_default+0x22c/0x2ac [ 6754.457665][ T8730] blk_register_queue+0x278/0x3ac [ 6754.458199][ T8730] __add_disk+0x518/0xb80 [ 6754.458672][ T8730] add_disk_fwnode+0x114/0x4c0 [ 6754.459230][ T8730] device_add_disk+0x14/0x20 [ 6754.459957][ T8730] nbd_dev_add+0x5f0/0x9c0 [ 6754.460376][ T8730] nbd_init+0xd4/0x1a8 [ 6754.460783][ T8730] do_one_initcall+0x130/0x7f0 [ 6754.461276][ T8730] kernel_init_freeable+0x48c/0x70c [ 6754.461726][ T8730] kernel_init+0x24/0x1dc [ 6754.462255][ T8730] ret_from_fork+0x10/0x20 [ 6754.462597][ T8730] [ 6754.462597][ T8730] -> #3 (&q->elevator_lock){+.+.}-{4:4}: [ 6754.463606][ T8730] __mutex_lock+0x144/0xffc [ 6754.464002][ T8730] mutex_lock_nested+0x24/0x30 [ 6754.464537][ T8730] elevator_change+0x130/0x424 [ 6754.464915][ T8730] elevator_set_none+0x90/0xe4 [ 6754.465264][ T8730] __blk_mq_update_nr_hw_queues+0x3b4/0xd38 [ 6754.465874][ T8730] blk_mq_update_nr_hw_queues+0x44/0x68 [ 6754.466375][ T8730] nbd_start_device+0x128/0xa38 [ 6754.466732][ T8730] nbd_genl_connect+0xcb4/0x14c4 [ 6754.467124][ T8730] genl_family_rcv_msg_doit+0x1b8/0x280 [ 6754.467626][ T8730] genl_rcv_msg+0x3ec/0x5bc [ 6754.467961][ T8730] netlink_rcv_skb+0x19c/0x338 [ 6754.468321][ T8730] genl_rcv+0x38/0x50 [ 6754.468688][ T8730] netlink_unicast+0x424/0x700 [ 6754.469235][ T8730] netlink_sendmsg+0x644/0xa54 [ 6754.469790][ T8730] __sock_sendmsg+0xc8/0x168 [ 6754.470292][ T8730] ____sys_sendmsg+0x500/0x764 [ 6754.470654][ T8730] ___sys_sendmsg+0x11c/0x19c [ 6754.471343][ T8730] __sys_sendmsg+0x114/0x19c [ 6754.471907][ T8730] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 6754.472380][ T8730] invoke_syscall+0x6c/0x258 [ 6754.472799][ T8730] el0_svc_common.constprop.0+0xac/0x230 [ 6754.473316][ T8730] do_el0_svc_compat+0x40/0x68 [ 6754.473766][ T8730] el0_svc_compat+0x4c/0x184 [ 6754.474196][ T8730] el0t_32_sync_handler+0x88/0xac [ 6754.474665][ T8730] el0t_32_sync+0x19c/0x1a0 [ 6754.475294][ T8730] [ 6754.475294][ T8730] -> #2 (&q->q_usage_counter(io)#33){++++}-{0:0}: [ 6754.476296][ T8730] blk_alloc_queue+0x538/0x644 [ 6754.476625][ T8730] blk_mq_alloc_queue+0x144/0x220 [ 6754.477281][ T8730] __blk_mq_alloc_disk+0x20/0x1a4 [ 6754.477773][ T8730] nbd_dev_add+0x3c0/0x9c0 [ 6754.478161][ T8730] nbd_init+0xd4/0x1a8 [ 6754.478653][ T8730] do_one_initcall+0x130/0x7f0 [ 6754.479145][ T8730] kernel_init_freeable+0x48c/0x70c [ 6754.479548][ T8730] kernel_init+0x24/0x1dc [ 6754.480298][ T8730] ret_from_fork+0x10/0x20 [ 6754.480959][ T8730] [ 6754.480959][ T8730] -> #1 (fs_reclaim){+.+.}-{0:0}: [ 6754.481755][ T8730] fs_reclaim_acquire+0x138/0x160 [ 6754.482308][ T8730] __kmalloc_noprof+0xb8/0x4d0 [ 6754.482766][ T8730] __netif_set_xps_queue+0x8c4/0x1d94 [ 6754.483562][ T8730] virtnet_set_affinity+0x36c/0x5e8 [ 6754.484006][ T8730] virtnet_probe+0x12c4/0x33e8 [ 6754.484411][ T8730] virtio_dev_probe+0x4b0/0x9f4 [ 6754.484764][ T8730] really_probe+0x180/0x7d8 [ 6754.485195][ T8730] __driver_probe_device+0x15c/0x364 [ 6754.485580][ T8730] driver_probe_device+0x5c/0x16c [ 6754.485921][ T8730] __driver_attach+0x1d0/0x478 [ 6754.486334][ T8730] bus_for_each_dev+0xf8/0x17c [ 6754.486726][ T8730] driver_attach+0x3c/0x58 [ 6754.487249][ T8730] bus_add_driver+0x234/0x4d4 [ 6754.487725][ T8730] driver_register+0xf4/0x3c0 [ 6754.488859][ T8730] __register_virtio_driver+0x88/0xfc [ 6754.489471][ T8730] virtio_net_driver_init+0xb0/0xe0 [ 6754.489905][ T8730] do_one_initcall+0x130/0x7f0 [ 6754.490281][ T8730] kernel_init_freeable+0x48c/0x70c [ 6754.490656][ T8730] kernel_init+0x24/0x1dc [ 6754.491175][ T8730] ret_from_fork+0x10/0x20 [ 6754.491618][ T8730] [ 6754.491618][ T8730] -> #0 (xps_map_mutex){+.+.}-{4:4}: [ 6754.492765][ T8730] __lock_acquire+0x1638/0x2380 [ 6754.493149][ T8730] lock_acquire+0x310/0x38c [ 6754.493490][ T8730] __mutex_lock+0x144/0xffc [ 6754.493952][ T8730] mutex_lock_nested+0x24/0x30 [ 6754.494754][ T8730] netif_reset_xps_queues.part.0+0x38/0x88 [ 6754.495333][ T8730] unregister_netdevice_many_notify+0x1328/0x1a6c [ 6754.495787][ T8730] unregister_netdevice_queue+0x25c/0x324 [ 6754.496341][ T8730] unregister_vlan_dev+0x1e4/0x3d8 [ 6754.496835][ T8730] vlan_ioctl_handler+0x2a8/0x970 [ 6754.497229][ T8730] sock_ioctl+0x430/0x5d4 [ 6754.497647][ T8730] compat_sock_ioctl+0x2f4/0x530 [ 6754.498287][ T8730] __arm64_compat_sys_ioctl+0x1d0/0x234 [ 6754.498691][ T8730] invoke_syscall+0x6c/0x258 [ 6754.499215][ T8730] el0_svc_common.constprop.0+0xac/0x230 [ 6754.499943][ T8730] do_el0_svc_compat+0x40/0x68 [ 6754.500305][ T8730] el0_svc_compat+0x4c/0x184 [ 6754.500695][ T8730] el0t_32_sync_handler+0x88/0xac [ 6754.501253][ T8730] el0t_32_sync+0x19c/0x1a0 [ 6754.501890][ T8730] [ 6754.501890][ T8730] other info that might help us debug this: [ 6754.501890][ T8730] [ 6754.502632][ T8730] Chain exists of: [ 6754.502632][ T8730] xps_map_mutex --> sk_lock-AF_INET --> cpu_hotplug_lock [ 6754.502632][ T8730] [ 6754.504005][ T8730] Possible unsafe locking scenario: [ 6754.504005][ T8730] [ 6754.504720][ T8730] CPU0 CPU1 [ 6754.505063][ T8730] ---- ---- [ 6754.505506][ T8730] rlock(cpu_hotplug_lock); [ 6754.506144][ T8730] lock(sk_lock-AF_INET); [ 6754.506893][ T8730] lock(cpu_hotplug_lock); [ 6754.507732][ T8730] lock(xps_map_mutex); [ 6754.508288][ T8730] [ 6754.508288][ T8730] *** DEADLOCK *** [ 6754.508288][ T8730] [ 6754.508970][ T8730] 3 locks held by syz.3.18021/8730: [ 6754.509487][ T8730] #0: ffff8000888b91e8 (vlan_ioctl_mutex){+.+.}-{4:4}, at: sock_ioctl+0x418/0x5d4 [ 6754.510658][ T8730] #1: ffff8000888e2648 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 6754.511832][ T8730] #2: ffff8000871b4170 (cpu_hotplug_lock){++++}-{0:0}, at: cpus_read_lock+0x10/0x1c [ 6754.512999][ T8730] [ 6754.512999][ T8730] stack backtrace: [ 6754.513514][ T8730] CPU: 1 UID: 0 PID: 8730 Comm: syz.3.18021 Not tainted syzkaller #0 PREEMPT [ 6754.514344][ T8730] Hardware name: linux,dummy-virt (DT) [ 6754.514703][ T8730] Call trace: [ 6754.515013][ T8730] show_stack+0x18/0x24 (C) [ 6754.515420][ T8730] dump_stack_lvl+0xa4/0xf4 [ 6754.515988][ T8730] dump_stack+0x1c/0x28 [ 6754.516505][ T8730] print_circular_bug+0x28c/0x370 [ 6754.516916][ T8730] check_noncircular+0x168/0x17c [ 6754.517323][ T8730] __lock_acquire+0x1638/0x2380 [ 6754.517806][ T8730] lock_acquire+0x310/0x38c [ 6754.518235][ T8730] __mutex_lock+0x144/0xffc [ 6754.518662][ T8730] mutex_lock_nested+0x24/0x30 [ 6754.519052][ T8730] netif_reset_xps_queues.part.0+0x38/0x88 [ 6754.519680][ T8730] unregister_netdevice_many_notify+0x1328/0x1a6c [ 6754.520202][ T8730] unregister_netdevice_queue+0x25c/0x324 [ 6754.520613][ T8730] unregister_vlan_dev+0x1e4/0x3d8 [ 6754.520991][ T8730] vlan_ioctl_handler+0x2a8/0x970 [ 6754.521327][ T8730] sock_ioctl+0x430/0x5d4 [ 6754.521705][ T8730] compat_sock_ioctl+0x2f4/0x530 [ 6754.522002][ T8730] __arm64_compat_sys_ioctl+0x1d0/0x234 [ 6754.522355][ T8730] invoke_syscall+0x6c/0x258 [ 6754.522689][ T8730] el0_svc_common.constprop.0+0xac/0x230 [ 6754.523015][ T8730] do_el0_svc_compat+0x40/0x68 [ 6754.523503][ T8730] el0_svc_compat+0x4c/0x184 [ 6754.523919][ T8730] el0t_32_sync_handler+0x88/0xac [ 6754.524232][ T8730] el0t_32_sync+0x19c/0x1a0 VM DIAGNOSIS: 12:39:40 Registers: info registers vcpu 0 CPU#0 PC=ffff800085442e4c X00=ffff800085442e48 X01=0000000000000000 X02=1ffff00010d9d648 X03=00000000f3f3f300 X04=00000000f1f1f1f1 X05=ffff800086ceb240 X06=ffff700010000dd6 X07=0000000041b58ab3 X08=ffff800080006db7 X09=dfff800000000000 X10=ffff700010000db6 X11=1ffff00010000db6 X12=ffff700010000db7 X13=0000000000000001 X14=1fffe0000371dacd X15=ffff0000238358c0 X16=0000000000000000 X17=1fffe0000371d9e0 X18=ffff0000238358d0 X19=ffff8000870bbae0 X20=1ffff00010000dd6 X21=ffff000016cd5830 X22=000000000000001a X23=ffff000016cd58b0 X24=ffff800080357e74 X25=1fffe00002d9ab10 X26=ffff000016cd5884 X27=ffff000016cd4030 X28=ffff000016cd5830 X29=ffff800080006e60 X30=ffff800081c3cce8 SP=ffff800080006e60 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800081be803c X00=0000000000000002 X01=0000000000000007 X02=0000000000000000 X03=1fffe00001dd1c2f X04=0000000000000018 X05=ffff800087ac2940 X06=ffff700010f58528 X07=0000000000000001 X08=ffff800087ac2940 X09=dfff800000000000 X10=ffff700010f58528 X11=1ffff00010f58528 X12=ffff700010f58529 X13=205d303337385420 X14=7b2d7d2e2b2e2b7b X15=7461202c7d343a34 X16=5f666974656e203a X17=70785f7465736572 X18=ffff80008e9f727c X19=ffff00000ee8e080 X20=ffff80008d4db018 X21=ffff800087b3e6c0 X22=0000000000000070 X23=dfff800000000000 X24=ffff00000ed34071 X25=0000000000000002 X26=ffff00000ee8e2d8 X27=ffff00000ee8e080 X28=dfff800000000000 X29=ffff8000a0616bf0 X30=ffff800081be82c8 SP=ffff8000a0616bf0 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000