last executing test programs: 26.871281096s ago: executing program 0 (id=624): syz_usb_connect(0x3, 0x1c, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3, 0x2, {0x3}}, 0x18) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) sendmmsg$inet6(r2, &(0x7f0000004d80)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="77a030a190fe1541", 0x8}], 0x1}}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000440)="b48b", 0x2}], 0x1}}], 0x2, 0x4) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@getchain={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}, 0x1, 0x0, 0x0, 0x20000}, 0x98) 25.531207048s ago: executing program 0 (id=625): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, 0x0, 0xb0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f00000000c0)={0x0, 0x80600}) r3 = socket$inet_smc(0x2b, 0x1, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10) setsockopt$SO_BINDTODEVICE_wg(r3, 0x1, 0x19, &(0x7f0000000080)='wg0\x00', 0x4) sendto$inet(r3, &(0x7f0000000040)="e5", 0xffffffe4, 0x0, 0x0, 0x0) 24.227782158s ago: executing program 1 (id=627): r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000000840)={0x10, 0x0, 0x25dfdbfe, 0x8}, 0xc) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = socket(0x10, 0x803, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001300)=@newtfilter={0x4c, 0x2c, 0xd27, 0xffffffdc, 0x0, {0x0, 0x0, 0x0, r4, {0x4, 0x4}, {}, {0xffe0, 0xb}}, [@filter_kind_options=@f_flow={{0x9}, {0x1c, 0x2, [@TCA_FLOW_ADDEND={0x8, 0x5, 0x16a5}, @TCA_FLOW_KEYS={0x8, 0x1, 0x737c}, @TCA_FLOW_MODE={0x8, 0x2, 0x1}]}}]}, 0x4c}}, 0x4) 23.6811757s ago: executing program 1 (id=628): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffe}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000080)={0x7, 0x200, 0x7, 0x7}, &(0x7f00000000c0)=0x10) 17.668666099s ago: executing program 0 (id=629): sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x38, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x10, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty=0xfffffffe}}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x10048047}, 0x4000050) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB='8\x00\x00\x00\n'], 0x38}, 0x1, 0x0, 0x0, 0x10048047}, 0x4000050) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) 17.074445225s ago: executing program 0 (id=630): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x200000000000008b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76ccb7b37b41215c184e731fb1"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r6, r5, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r6}, &(0x7f0000000000), &(0x7f0000000080)=r3}, 0x20) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x4003e80, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x20000281}], 0x1}, 0x0) 11.564883686s ago: executing program 1 (id=631): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x50) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = syz_io_uring_setup(0x8d2, &(0x7f00000000c0)={0x0, 0x0, 0x3010, 0x0, 0xfffffffe}, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r1, 0x0, 0x0}) io_uring_enter(r2, 0x47ba, 0x3e80, 0x0, 0x0, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r5, &(0x7f0000000400)={0xa}) 10.404386724s ago: executing program 1 (id=632): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000400)={&(0x7f0000014000/0x1000)=nil, &(0x7f0000352000/0x3000)=nil, &(0x7f00007f9000/0x1000)=nil, &(0x7f0000104000/0x2000)=nil, &(0x7f000044e000/0x1000)=nil, &(0x7f0000230000/0x2000)=nil, &(0x7f00002c5000/0x3000)=nil, &(0x7f0000abd000/0x3000)=nil, &(0x7f0000118000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000300)="baaf1d7fe9bdcd0bba2736fd08ce29194837745e423bf2a6fdd0fbf5657296e3d27d2a8010dc1ff60f9971ff342772c358a144977842b4f8f08d6c9dae087b6f7643afb2ac6251165e1298a8f2f8b78edb3cedf764d4681c2732c54bf2a335d0e13cf4aa443314784ba86ed531", 0x6d, r0}, 0x68) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) clock_adjtime(0x1, &(0x7f0000000000)={0x3fd, 0x6, 0x24, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0xffffffffffffff7f, 0x1003, 0x3, 0x0, 0x0, 0xd, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x83}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x0, 0x90, [0x0, 0x200000000180, 0x2000000001b0, 0x2000000001e0], 0x0, 0x0, &(0x7f0000000180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) r3 = socket(0x2, 0x3, 0x67) sendmsg$inet(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e20, @private=0xa010100}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000007000000890704e000000d001c000000000000000000000008"], 0x38}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x804}, 0x0) 8.548626416s ago: executing program 0 (id=633): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r1 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f00000001c0)={0x0, {{0xa, 0x0, 0xdb, @mcast1={0xff, 0xf}}}, {{0xa, 0x0, 0x0, @private0}}}, 0x108) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000040)="2e00000011008188040f80ec59acbc0413a1f8480b0000005e140602000000000e0027001000000002800000121f", 0x2e}], 0x1}, 0x0) futex(0x0, 0x3, 0x0, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 8.051270404s ago: executing program 0 (id=634): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r3, 0xc0045006, &(0x7f0000000080)=0x48) read$FUSE(r3, &(0x7f00000009c0)={0x2020}, 0x2020) 7.299893691s ago: executing program 1 (id=635): getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_GET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)={0x14, r4, 0x303, 0x4, 0x25dfdbfd, {0x3d}}, 0x14}, 0x1, 0x0, 0x0, 0x880}, 0x4000080) 0s ago: executing program 1 (id=636): r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0xbdf) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$NBD_DO_IT(r0, 0xab03) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:9898' (ED25519) to the list of known hosts. [ 165.951066][ T30] audit: type=1400 audit(165.580:46): avc: denied { name_bind } for pid=3308 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 166.293350][ T30] audit: type=1400 audit(165.920:47): avc: denied { execute } for pid=3309 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 166.302487][ T30] audit: type=1400 audit(165.930:48): avc: denied { execute_no_trans } for pid=3309 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 170.018454][ T30] audit: type=1400 audit(169.640:49): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 170.036891][ T30] audit: type=1400 audit(169.660:50): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 170.087091][ T3309] cgroup: Unknown subsys name 'net' [ 170.122504][ T30] audit: type=1400 audit(169.750:51): avc: denied { unmount } for pid=3309 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 170.422752][ T3309] cgroup: Unknown subsys name 'cpuset' [ 170.492010][ T3309] cgroup: Unknown subsys name 'rlimit' [ 170.793699][ T30] audit: type=1400 audit(170.420:52): avc: denied { setattr } for pid=3309 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 170.798321][ T30] audit: type=1400 audit(170.420:53): avc: denied { mounton } for pid=3309 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 170.805654][ T30] audit: type=1400 audit(170.430:54): avc: denied { mount } for pid=3309 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 171.196013][ T3311] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 171.207577][ T30] audit: type=1400 audit(170.830:55): avc: denied { relabelto } for pid=3311 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 171.215870][ T30] audit: type=1400 audit(170.840:56): avc: denied { write } for pid=3311 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 171.296970][ T30] audit: type=1400 audit(170.920:57): avc: denied { read } for pid=3309 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 171.302623][ T30] audit: type=1400 audit(170.920:58): avc: denied { open } for pid=3309 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 171.323220][ T3309] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 192.046757][ T30] audit: type=1400 audit(191.670:59): avc: denied { execmem } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 192.140187][ T30] audit: type=1400 audit(191.770:60): avc: denied { read } for pid=3314 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 192.142938][ T30] audit: type=1400 audit(191.770:61): avc: denied { open } for pid=3314 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 192.161583][ T30] audit: type=1400 audit(191.790:62): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 192.227288][ T30] audit: type=1400 audit(191.850:63): avc: denied { module_request } for pid=3314 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 192.411589][ T30] audit: type=1400 audit(192.040:64): avc: denied { sys_module } for pid=3315 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 197.934983][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 198.037203][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 198.078958][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 198.192337][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 200.617494][ T3315] hsr_slave_0: entered promiscuous mode [ 200.628517][ T3315] hsr_slave_1: entered promiscuous mode [ 201.074766][ T3314] hsr_slave_0: entered promiscuous mode [ 201.082363][ T3314] hsr_slave_1: entered promiscuous mode [ 201.085539][ T3314] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 201.087460][ T3314] Cannot create hsr debugfs directory [ 202.879843][ T30] audit: type=1400 audit(202.500:65): avc: denied { create } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 202.880940][ T30] audit: type=1400 audit(202.500:66): avc: denied { write } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 202.881958][ T30] audit: type=1400 audit(202.510:67): avc: denied { read } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 202.914619][ T3315] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 203.025590][ T3315] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 203.063213][ T3315] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 203.147107][ T3315] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 203.466546][ T3314] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 203.514983][ T3314] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 203.557304][ T3314] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 203.669077][ T3314] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 205.910325][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 206.163047][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 212.466039][ T3314] veth0_vlan: entered promiscuous mode [ 212.532052][ T3314] veth1_vlan: entered promiscuous mode [ 212.807535][ T3314] veth0_macvtap: entered promiscuous mode [ 212.876962][ T3314] veth1_macvtap: entered promiscuous mode [ 213.166867][ T3314] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.171661][ T3314] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.172733][ T3314] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.173652][ T3314] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.544180][ T30] audit: type=1400 audit(213.170:68): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 213.571772][ T30] audit: type=1400 audit(213.190:69): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/syzkaller.rhBp9M/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 213.625636][ T30] audit: type=1400 audit(213.250:70): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 213.661682][ T30] audit: type=1400 audit(213.280:71): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/syzkaller.rhBp9M/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 213.675162][ T30] audit: type=1400 audit(213.300:72): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/syzkaller.rhBp9M/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 213.721615][ T30] audit: type=1400 audit(213.350:73): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 213.762685][ T30] audit: type=1400 audit(213.390:74): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 213.937417][ T30] audit: type=1400 audit(213.560:75): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="gadgetfs" ino=3737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 213.955519][ T3315] veth0_vlan: entered promiscuous mode [ 214.005669][ T3315] veth1_vlan: entered promiscuous mode [ 214.187169][ T30] audit: type=1400 audit(213.810:76): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 214.220277][ T30] audit: type=1400 audit(213.850:77): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 214.500349][ T3315] veth0_macvtap: entered promiscuous mode [ 214.525416][ T3314] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 214.625031][ T3315] veth1_macvtap: entered promiscuous mode [ 215.132289][ T3315] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 215.134328][ T3315] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 215.135451][ T3315] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 215.136345][ T3315] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.469206][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 219.480511][ T30] audit: type=1400 audit(218.920:93): avc: denied { create } for pid=3453 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 220.964503][ T30] audit: type=1400 audit(220.590:94): avc: denied { read } for pid=3458 comm="syz.0.4" path="socket:[3785]" dev="sockfs" ino=3785 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 221.466447][ T30] audit: type=1400 audit(221.090:95): avc: denied { write } for pid=3458 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 221.990491][ T30] audit: type=1400 audit(221.610:96): avc: denied { create } for pid=3458 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 221.993048][ T30] audit: type=1400 audit(221.620:97): avc: denied { write } for pid=3458 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 222.504635][ T30] audit: type=1400 audit(222.130:98): avc: denied { perfmon } for pid=3458 comm="syz.0.4" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 227.870285][ T30] audit: type=1400 audit(226.850:99): avc: denied { allowed } for pid=3468 comm="syz.1.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 228.099450][ T30] audit: type=1400 audit(227.340:100): avc: denied { create } for pid=3468 comm="syz.1.5" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 232.424434][ T30] audit: type=1400 audit(232.040:101): avc: denied { watch } for pid=3473 comm="syz.1.6" path="/2" dev="tmpfs" ino=23 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 236.380225][ T30] audit: type=1400 audit(235.640:102): avc: denied { prog_load } for pid=3473 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 240.781331][ T30] audit: type=1400 audit(240.390:103): avc: denied { create } for pid=3483 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 240.782509][ T30] audit: type=1400 audit(240.400:104): avc: denied { bind } for pid=3483 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 240.792231][ T30] audit: type=1400 audit(240.410:105): avc: denied { accept } for pid=3483 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 240.813825][ T30] audit: type=1400 audit(240.440:106): avc: denied { write } for pid=3483 comm="syz.1.9" path="socket:[2814]" dev="sockfs" ino=2814 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 241.136655][ T30] audit: type=1400 audit(240.760:107): avc: denied { map } for pid=3485 comm="syz.1.10" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2823 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 241.144688][ T30] audit: type=1400 audit(240.760:108): avc: denied { read write } for pid=3485 comm="syz.1.10" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2823 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 241.571991][ T30] audit: type=1400 audit(241.200:109): avc: denied { read write } for pid=3487 comm="syz.1.11" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 241.576689][ T30] audit: type=1400 audit(241.200:110): avc: denied { open } for pid=3487 comm="syz.1.11" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 241.584596][ T30] audit: type=1400 audit(241.210:111): avc: denied { mounton } for pid=3487 comm="syz.1.11" path="/7/file0" dev="tmpfs" ino=54 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 242.309066][ T30] audit: type=1400 audit(241.930:112): avc: denied { unmount } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 242.603371][ T30] audit: type=1400 audit(242.230:113): avc: denied { create } for pid=3490 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 245.608677][ T30] audit: type=1400 audit(244.890:114): avc: denied { setopt } for pid=3490 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 253.663009][ T30] audit: type=1400 audit(253.290:115): avc: denied { create } for pid=3494 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 253.682190][ T30] audit: type=1400 audit(253.310:116): avc: denied { bind } for pid=3494 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 253.695274][ T30] audit: type=1400 audit(253.320:117): avc: denied { name_bind } for pid=3494 comm="syz.1.13" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 253.702780][ T30] audit: type=1400 audit(253.330:118): avc: denied { node_bind } for pid=3494 comm="syz.1.13" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 253.741463][ T30] audit: type=1400 audit(253.340:119): avc: denied { write } for pid=3494 comm="syz.1.13" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 253.742714][ T30] audit: type=1400 audit(253.350:120): avc: denied { connect } for pid=3494 comm="syz.1.13" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 253.746001][ T30] audit: type=1400 audit(253.360:121): avc: denied { name_connect } for pid=3494 comm="syz.1.13" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 253.912109][ T30] audit: type=1400 audit(253.540:122): avc: denied { read } for pid=3494 comm="syz.1.13" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 253.920274][ T30] audit: type=1400 audit(253.550:123): avc: denied { setopt } for pid=3494 comm="syz.1.13" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 254.133204][ T30] audit: type=1400 audit(253.760:124): avc: denied { read write } for pid=3497 comm="syz.1.14" name="vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 260.126304][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 260.126988][ T30] audit: type=1400 audit(259.750:134): avc: denied { write } for pid=3516 comm="syz.0.19" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 260.170546][ T3517] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.19' sets config #-1 [ 260.646719][ T30] audit: type=1400 audit(260.270:135): avc: denied { mount } for pid=3518 comm="syz.0.20" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 260.656338][ T30] audit: type=1400 audit(260.280:136): avc: denied { mounton } for pid=3518 comm="syz.0.20" path="/6/file0" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:devpts_t tclass=dir permissive=1 [ 260.666215][ T3519] ======================================================= [ 260.666215][ T3519] WARNING: The mand mount option has been deprecated and [ 260.666215][ T3519] and is ignored by this kernel. Remove the mand [ 260.666215][ T3519] option from the mount to silence this warning. [ 260.666215][ T3519] ======================================================= [ 262.613032][ T30] audit: type=1400 audit(262.240:137): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 263.398244][ T30] audit: type=1400 audit(263.020:138): avc: denied { create } for pid=3522 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 263.415028][ T30] audit: type=1400 audit(263.040:139): avc: denied { ioctl } for pid=3522 comm="syz.0.22" path="socket:[3874]" dev="sockfs" ino=3874 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 263.457141][ T30] audit: type=1400 audit(263.080:140): avc: denied { bind } for pid=3522 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 263.481717][ T30] audit: type=1400 audit(263.110:141): avc: denied { setopt } for pid=3522 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 263.493923][ T30] audit: type=1400 audit(263.120:142): avc: denied { write } for pid=3522 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 263.556112][ T30] audit: type=1400 audit(263.180:143): avc: denied { connect } for pid=3522 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 263.565632][ T3523] netlink: 4 bytes leftover after parsing attributes in process `syz.0.22'. [ 265.577656][ T30] audit: type=1400 audit(265.200:144): avc: denied { shutdown } for pid=3525 comm="syz.1.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 266.268995][ T30] audit: type=1400 audit(265.890:145): avc: denied { read } for pid=3529 comm="syz.0.25" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 266.289677][ T30] audit: type=1400 audit(265.900:146): avc: denied { open } for pid=3529 comm="syz.0.25" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 266.311040][ T30] audit: type=1400 audit(265.940:147): avc: denied { map } for pid=3529 comm="syz.0.25" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 272.655765][ T30] audit: type=1400 audit(272.210:148): avc: denied { read } for pid=3535 comm="syz.0.27" path="socket:[3913]" dev="sockfs" ino=3913 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 285.826541][ T30] audit: type=1400 audit(285.450:149): avc: denied { read } for pid=3551 comm="syz.1.30" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 285.832382][ T30] audit: type=1400 audit(285.460:150): avc: denied { open } for pid=3551 comm="syz.1.30" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 285.912863][ T30] audit: type=1400 audit(285.540:151): avc: denied { ioctl } for pid=3551 comm="syz.1.30" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 285.925389][ T3552] binder: 3551:3552 ioctl c0306201 20000300 returned -14 [ 290.769780][ T30] audit: type=1400 audit(290.340:152): avc: denied { name_bind } for pid=3561 comm="syz.0.35" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 290.957415][ T30] audit: type=1400 audit(290.340:153): avc: denied { node_bind } for pid=3561 comm="syz.0.35" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 301.202799][ T30] audit: type=1400 audit(300.830:154): avc: denied { read write } for pid=3573 comm="syz.1.39" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 301.872169][ T30] audit: type=1400 audit(300.830:155): avc: denied { open } for pid=3573 comm="syz.1.39" path="/dev/uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 301.886230][ T30] audit: type=1400 audit(301.120:156): avc: denied { ioctl } for pid=3573 comm="syz.1.39" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x5564 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 302.450413][ T3578] input: syz1 as /devices/virtual/input/input1 [ 310.220113][ T3586] netlink: 12 bytes leftover after parsing attributes in process `syz.1.41'. [ 311.761761][ T30] audit: type=1400 audit(311.390:157): avc: denied { getopt } for pid=3587 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 312.806046][ T30] audit: type=1400 audit(312.430:158): avc: denied { watch_mount watch_reads } for pid=3592 comm="syz.0.44" path="/19" dev="tmpfs" ino=110 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 312.814605][ T30] audit: type=1400 audit(312.440:159): avc: denied { watch } for pid=3592 comm="syz.0.44" path="/19" dev="tmpfs" ino=110 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 312.831116][ T30] audit: type=1400 audit(312.460:160): avc: denied { watch } for pid=3592 comm="syz.0.44" path="/19/net_prio.prioidx" dev="tmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 312.834527][ T30] audit: type=1400 audit(312.460:161): avc: denied { watch_sb watch_reads } for pid=3592 comm="syz.0.44" path="/19/net_prio.prioidx" dev="tmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 315.154442][ T30] audit: type=1400 audit(314.700:162): avc: denied { create } for pid=3602 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 322.679777][ T30] audit: type=1400 audit(322.210:163): avc: denied { name_connect } for pid=3613 comm="syz.0.49" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 322.680411][ T30] audit: type=1400 audit(322.270:164): avc: denied { getopt } for pid=3613 comm="syz.0.49" lport=36738 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 335.949408][ T30] audit: type=1400 audit(335.500:165): avc: denied { getopt } for pid=3622 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 343.256548][ T30] audit: type=1400 audit(342.880:166): avc: denied { read write } for pid=3641 comm="syz.0.57" name="udmabuf" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 343.274952][ T30] audit: type=1400 audit(342.880:167): avc: denied { open } for pid=3641 comm="syz.0.57" path="/dev/udmabuf" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 343.293756][ T30] audit: type=1400 audit(342.890:168): avc: denied { ioctl } for pid=3641 comm="syz.0.57" path="/dev/udmabuf" dev="devtmpfs" ino=676 ioctlcmd=0x7542 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 345.759844][ T30] audit: type=1400 audit(345.380:169): avc: denied { write } for pid=3665 comm="syz.1.68" name="unix" dev="proc" ino=4026532662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 346.001947][ T30] audit: type=1400 audit(345.630:170): avc: denied { mounton } for pid=3667 comm="syz.1.69" path="/38/file0" dev="tmpfs" ino=212 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 346.026656][ T30] audit: type=1400 audit(345.650:171): avc: denied { mount } for pid=3667 comm="syz.1.69" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 346.041003][ T30] audit: type=1400 audit(345.660:172): avc: denied { mounton } for pid=3667 comm="syz.1.69" path="/38/file0" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 346.041650][ T30] audit: type=1400 audit(345.670:173): avc: denied { unmount } for pid=3667 comm="syz.1.69" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 347.171463][ T30] audit: type=1400 audit(346.800:174): avc: denied { execute } for pid=3679 comm="syz.1.74" name="file0" dev="tmpfs" ino=239 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 347.555244][ T30] audit: type=1326 audit(347.180:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3683 comm="syz.1.76" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffbb15a768 code=0x0 [ 348.552971][ T30] audit: type=1400 audit(348.180:176): avc: denied { getopt } for pid=3689 comm="syz.1.79" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 348.973779][ T30] audit: type=1400 audit(348.600:177): avc: denied { connect } for pid=3693 comm="syz.1.81" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 364.050169][ T30] audit: type=1400 audit(363.680:178): avc: denied { read } for pid=3778 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 364.112871][ T30] audit: type=1400 audit(363.730:179): avc: denied { write } for pid=3780 comm="syz.1.119" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 364.126809][ T30] audit: type=1400 audit(363.750:180): avc: denied { read } for pid=3780 comm="syz.1.119" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 367.690015][ T3801] Zero length message leads to an empty skb [ 368.307447][ T30] audit: type=1400 audit(367.930:181): avc: denied { connect } for pid=3802 comm="syz.1.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 368.540186][ T30] audit: type=1400 audit(368.160:182): avc: denied { map } for pid=3802 comm="syz.1.131" path="socket:[4290]" dev="sockfs" ino=4290 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 368.557464][ T30] audit: type=1400 audit(368.160:183): avc: denied { read write } for pid=3802 comm="syz.1.131" path="socket:[4290]" dev="sockfs" ino=4290 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 381.242117][ T30] audit: type=1400 audit(380.090:184): avc: denied { write } for pid=3827 comm="syz.0.138" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 381.259268][ T30] audit: type=1400 audit(380.390:185): avc: denied { set_context_mgr } for pid=3827 comm="syz.0.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 385.851683][ T30] audit: type=1400 audit(385.430:186): avc: denied { create } for pid=3831 comm="syz.1.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 385.853810][ T30] audit: type=1400 audit(385.440:187): avc: denied { connect } for pid=3831 comm="syz.1.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 385.857158][ T30] audit: type=1400 audit(385.450:188): avc: denied { read } for pid=3831 comm="syz.1.139" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 385.898985][ T30] audit: type=1400 audit(385.460:189): avc: denied { open } for pid=3831 comm="syz.1.139" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 387.235695][ T30] audit: type=1400 audit(386.850:190): avc: denied { create } for pid=3835 comm="syz.0.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 387.253131][ T30] audit: type=1400 audit(386.880:191): avc: denied { write } for pid=3835 comm="syz.0.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 387.256257][ T30] audit: type=1400 audit(386.880:192): avc: denied { nlmsg_write } for pid=3835 comm="syz.0.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 387.931234][ T30] audit: type=1400 audit(387.550:193): avc: denied { ioctl } for pid=3837 comm="syz.0.141" path="socket:[5395]" dev="sockfs" ino=5395 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 392.627725][ T30] audit: type=1400 audit(392.200:194): avc: denied { write } for pid=3844 comm="syz.0.142" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 392.653549][ T30] audit: type=1326 audit(392.220:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3844 comm="syz.0.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 392.696519][ T30] audit: type=1326 audit(392.220:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3844 comm="syz.0.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 392.742426][ T30] audit: type=1326 audit(392.220:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3844 comm="syz.0.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 392.783676][ T30] audit: type=1326 audit(392.230:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3844 comm="syz.0.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 392.932605][ T30] audit: type=1326 audit(392.230:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3844 comm="syz.0.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 393.021261][ T30] audit: type=1326 audit(392.230:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3844 comm="syz.0.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=208 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 393.229763][ T30] audit: type=1326 audit(392.840:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3844 comm="syz.0.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 393.254493][ T30] audit: type=1326 audit(392.840:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3844 comm="syz.0.142" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 397.777681][ T3853] A link change request failed with some changes committed already. Interface bond_slave_0 may have been left with an inconsistent configuration, please check. [ 397.899060][ T30] audit: type=1400 audit(397.340:203): avc: denied { prog_run } for pid=3849 comm="syz.1.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 402.863611][ T30] audit: type=1400 audit(402.490:204): avc: denied { bind } for pid=3863 comm="syz.0.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 402.881820][ T30] audit: type=1400 audit(402.510:205): avc: denied { setopt } for pid=3863 comm="syz.0.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 402.894515][ T3865] netlink: 4 bytes leftover after parsing attributes in process `syz.0.148'. [ 402.975318][ T3865] netlink: 4 bytes leftover after parsing attributes in process `syz.0.148'. [ 412.032745][ T30] audit: type=1400 audit(411.660:206): avc: denied { create } for pid=3883 comm="syz.0.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 412.072307][ T30] audit: type=1400 audit(411.690:207): avc: denied { setopt } for pid=3883 comm="syz.0.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 413.271437][ T30] audit: type=1400 audit(412.890:208): avc: denied { connect } for pid=3888 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 413.307454][ T3891] netlink: 4 bytes leftover after parsing attributes in process `syz.0.157'. [ 413.373576][ T3891] netlink: 4 bytes leftover after parsing attributes in process `syz.0.157'. [ 413.482104][ T30] audit: type=1400 audit(413.110:209): avc: denied { setopt } for pid=3888 comm="syz.1.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 415.560912][ T3899] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 415.575327][ T3899] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 417.177127][ T3907] netdevsim netdevsim0 netdevsim0: entered promiscuous mode [ 417.190711][ T3907] netdevsim netdevsim0 netdevsim0: entered allmulticast mode [ 418.685126][ T30] audit: type=1400 audit(418.300:210): avc: denied { create } for pid=3904 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 426.285093][ T3910] block device autoloading is deprecated and will be removed. [ 426.402205][ T3916] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 426.407285][ T3916] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 426.953458][ T3920] netlink: 'syz.1.166': attribute type 1 has an invalid length. [ 427.235394][ T3920] 8021q: adding VLAN 0 to HW filter on device bond1 [ 427.862851][ T30] audit: type=1400 audit(427.490:211): avc: denied { ioctl } for pid=3923 comm="syz.1.167" path="socket:[4477]" dev="sockfs" ino=4477 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 434.044515][ T3933] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=3933 comm=syz.1.170 [ 434.046380][ T3933] netlink: 26 bytes leftover after parsing attributes in process `syz.1.170'. [ 435.058645][ T30] audit: type=1400 audit(434.660:212): avc: denied { read append } for pid=3934 comm="syz.1.171" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 435.065150][ T30] audit: type=1400 audit(434.690:213): avc: denied { open } for pid=3934 comm="syz.1.171" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 435.127733][ T30] audit: type=1400 audit(434.750:214): avc: denied { ioctl } for pid=3934 comm="syz.1.171" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 437.790411][ T3941] usb usb1: usbfs: interface 0 claimed by hub while 'syz.1.172' sets config #7 [ 444.442777][ T3960] binder: 3956:3960 ioctl c0306201 0 returned -14 [ 444.539488][ T30] audit: type=1400 audit(444.070:215): avc: denied { write } for pid=3956 comm="syz.0.177" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 444.541739][ T30] audit: type=1400 audit(444.070:216): avc: denied { open } for pid=3956 comm="syz.0.177" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 458.824642][ T30] audit: type=1400 audit(458.450:217): avc: denied { create } for pid=3980 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 463.401323][ T30] audit: type=1400 audit(463.000:218): avc: denied { setopt } for pid=3982 comm="syz.0.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 472.253260][ T30] audit: type=1400 audit(471.880:219): avc: denied { create } for pid=3998 comm="syz.0.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 472.315283][ T30] audit: type=1400 audit(471.940:220): avc: denied { write } for pid=3998 comm="syz.0.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 472.326952][ T30] audit: type=1400 audit(471.950:221): avc: denied { read } for pid=3998 comm="syz.0.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 476.943878][ T3448] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 477.219486][ T3448] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 477.220292][ T3448] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 477.254153][ T3448] usb 1-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 477.254675][ T3448] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 477.255097][ T3448] usb 1-1: SerialNumber: syz [ 477.580735][ T3448] usb 1-1: 0:2 : does not exist [ 477.909992][ T3448] usb 1-1: USB disconnect, device number 2 [ 478.651123][ T4016] udevd[4016]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 480.480381][ T30] audit: type=1400 audit(480.110:222): avc: denied { write } for pid=4023 comm="syz.1.195" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 480.946343][ T4028] Invalid option length (1044984) for dns_resolver key [ 483.423980][ T4032] process 'syz.0.198' launched './file0' with NULL argv: empty string added [ 483.568968][ T4033] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 483.821425][ T30] audit: type=1400 audit(483.050:223): avc: denied { execute_no_trans } for pid=4029 comm="syz.0.198" path="/95/file0" dev="tmpfs" ino=507 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 486.255446][ T30] audit: type=1400 audit(485.870:224): avc: denied { name_bind } for pid=4038 comm="syz.0.201" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 489.456027][ T4048] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 489.471312][ T4048] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 491.347420][ T4055] netlink: 24 bytes leftover after parsing attributes in process `syz.1.206'. [ 496.362829][ T4062] netlink: 92 bytes leftover after parsing attributes in process `syz.1.208'. [ 496.365803][ T4062] netlink: 12 bytes leftover after parsing attributes in process `syz.1.208'. [ 496.376344][ T4062] netlink: 20 bytes leftover after parsing attributes in process `syz.1.208'. [ 501.980048][ T30] audit: type=1400 audit(501.560:225): avc: denied { ioctl } for pid=4069 comm="syz.0.211" path="socket:[5778]" dev="sockfs" ino=5778 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 509.632577][ T30] audit: type=1400 audit(509.250:226): avc: denied { create } for pid=4080 comm="syz.0.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 512.589192][ T4083] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 522.439325][ T23] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 522.747604][ T23] usb 1-1: Using ep0 maxpacket: 8 [ 523.173237][ T23] usb 1-1: New USB device found, idVendor=0ccd, idProduct=00b3, bcdDevice=2d.ea [ 523.175830][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 523.178766][ T23] usb 1-1: Product: syz [ 523.180205][ T23] usb 1-1: Manufacturer: syz [ 523.181892][ T23] usb 1-1: SerialNumber: syz [ 523.218634][ T23] usb 1-1: config 0 descriptor?? [ 527.820674][ T30] audit: type=1400 audit(527.440:227): avc: denied { ioctl } for pid=4105 comm="syz.1.221" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4702 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 533.630773][ T3235] usb 1-1: USB disconnect, device number 3 [ 542.360353][ T4130] netlink: 4 bytes leftover after parsing attributes in process `syz.0.229'. [ 544.613529][ T4133] netlink: 'syz.1.227': attribute type 9 has an invalid length. [ 549.884464][ T30] audit: type=1400 audit(549.310:228): avc: denied { nlmsg_read } for pid=4140 comm="syz.0.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 564.180822][ T30] audit: type=1400 audit(563.750:229): avc: denied { write } for pid=4158 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 564.242439][ T30] audit: type=1400 audit(563.860:230): avc: denied { ioctl } for pid=4158 comm="syz.0.235" path="socket:[5940]" dev="sockfs" ino=5940 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 565.104876][ T3448] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 565.243818][ T3448] usb 1-1: device descriptor read/64, error -71 [ 565.528815][ T3448] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 565.743417][ T3448] usb 1-1: device descriptor read/64, error -71 [ 565.850757][ T3448] usb usb1-port1: attempt power cycle [ 566.361069][ T3448] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 566.406695][ T3448] usb 1-1: device descriptor read/8, error -71 [ 566.749868][ T3448] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 566.799411][ T3448] usb 1-1: device descriptor read/8, error -71 [ 566.914774][ T3448] usb usb1-port1: unable to enumerate USB device [ 571.744317][ T4168] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 571.763507][ T4168] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 572.436820][ T30] audit: type=1400 audit(572.050:231): avc: denied { create } for pid=4169 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 578.552563][ T30] audit: type=1400 audit(578.180:232): avc: denied { append } for pid=4181 comm="syz.0.242" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 584.586743][ T321] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 585.347683][ T321] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 586.072040][ T321] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 586.379379][ T321] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 587.346641][ T30] audit: type=1400 audit(586.970:233): avc: denied { read } for pid=3158 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 592.369364][ T30] audit: type=1400 audit(591.800:234): avc: denied { ioctl } for pid=4202 comm="syz.0.248" path="socket:[4814]" dev="sockfs" ino=4814 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 595.112740][ T321] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 595.215705][ T321] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 595.270681][ T321] bond0 (unregistering): Released all slaves [ 596.179923][ T321] bond1 (unregistering): Released all slaves [ 596.356811][ T4206] netlink: 16 bytes leftover after parsing attributes in process `syz.0.248'. [ 597.131204][ T321] hsr_slave_0: left promiscuous mode [ 597.164568][ T321] hsr_slave_1: left promiscuous mode [ 597.460932][ T321] veth1_macvtap: left promiscuous mode [ 597.464326][ T321] veth0_macvtap: left promiscuous mode [ 597.479270][ T321] veth1_vlan: left promiscuous mode [ 597.482243][ T321] veth0_vlan: left promiscuous mode [ 600.480308][ T4220] input: syz1 as /devices/virtual/input/input2 [ 626.946100][ T4187] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 626.997069][ T4187] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 630.241692][ T4187] hsr_slave_0: entered promiscuous mode [ 630.246030][ T4187] hsr_slave_1: entered promiscuous mode [ 632.585025][ T4187] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 632.620409][ T4187] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 632.644568][ T4187] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 632.683595][ T4187] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 634.130914][ T4187] 8021q: adding VLAN 0 to HW filter on device bond0 [ 639.914475][ T4187] veth0_vlan: entered promiscuous mode [ 639.953939][ T4187] veth1_vlan: entered promiscuous mode [ 640.066849][ T4187] veth0_macvtap: entered promiscuous mode [ 640.092891][ T4187] veth1_macvtap: entered promiscuous mode [ 640.215325][ T4187] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 640.216589][ T4187] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 640.217751][ T4187] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 640.220304][ T4187] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 640.442721][ T30] audit: type=1400 audit(640.060:235): avc: denied { mounton } for pid=4187 comm="syz-executor" path="/syzkaller.w3dShB/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 640.471113][ T30] audit: type=1400 audit(640.090:236): avc: denied { mount } for pid=4187 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 640.541507][ T30] audit: type=1400 audit(640.170:237): avc: denied { mounton } for pid=4187 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 644.712313][ T4383] input: syz1 as /devices/virtual/input/input3 [ 647.190085][ T30] audit: type=1400 audit(646.810:238): avc: denied { recv } for pid=3309 comm="syz-executor" saddr=127.0.0.1 src=57732 daddr=127.0.0.1 dest=30002 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 647.298386][ T30] audit: type=1400 audit(646.860:239): avc: denied { recv } for pid=4377 comm="syz.0.256" saddr=127.0.0.1 src=30002 daddr=127.0.0.1 dest=57732 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 652.982467][ T4403] netlink: 8 bytes leftover after parsing attributes in process `syz.1.263'. [ 653.122117][ T30] audit: type=1400 audit(652.640:240): avc: denied { bind } for pid=4393 comm="syz.1.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 658.916916][ T30] audit: type=1400 audit(658.540:241): avc: denied { wake_alarm } for pid=4406 comm="syz.1.267" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 665.933383][ T4429] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 665.950481][ T4429] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 673.916684][ T4447] capability: warning: `syz.1.282' uses 32-bit capabilities (legacy support in use) [ 701.823398][ T30] audit: type=1400 audit(701.450:242): avc: denied { write } for pid=4510 comm="syz.0.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 706.413133][ T30] audit: type=1400 audit(706.040:243): avc: denied { write } for pid=4538 comm="syz.0.312" lport=47316 faddr=::ffff:100.1.1.0 fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 706.715395][ T4541] syz_tun: entered allmulticast mode [ 706.905953][ T4541] SELinux: failure in sel_netif_sid_slow(), invalid network interface (0) [ 706.906809][ T4541] mroute: pending queue full, dropping entries [ 706.925914][ T4540] syz_tun: left allmulticast mode [ 712.112797][ T30] audit: type=1400 audit(711.740:244): avc: denied { unmount } for pid=4557 comm="syz.0.319" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 713.891013][ T30] audit: type=1400 audit(713.510:245): avc: denied { setattr } for pid=4562 comm="syz.1.321" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 715.879330][ T30] audit: type=1400 audit(715.490:246): avc: denied { map } for pid=4568 comm="syz.1.323" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 715.989755][ T30] audit: type=1326 audit(715.600:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4571 comm="syz.0.324" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffa535a768 code=0x0 [ 716.445260][ T30] audit: type=1400 audit(716.070:248): avc: denied { append } for pid=4577 comm="syz.1.327" name="system" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 716.510619][ T4578] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 716.516183][ T4578] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 734.453620][ T4623] dvmrp8: entered allmulticast mode [ 743.902981][ T30] audit: type=1400 audit(743.530:249): avc: denied { bind } for pid=4633 comm="syz.0.343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 744.543296][ T30] audit: type=1400 audit(744.170:250): avc: denied { read write } for pid=4636 comm="syz.1.344" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 744.554209][ T30] audit: type=1400 audit(744.170:251): avc: denied { open } for pid=4636 comm="syz.1.344" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 747.086323][ T4645] tmpfs: Bad value for 'nr_inodes' [ 750.088970][ T30] audit: type=1400 audit(749.530:252): avc: denied { shutdown } for pid=4648 comm="syz.1.349" lport=9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 762.878677][ T30] audit: type=1400 audit(762.500:253): avc: denied { mount } for pid=4690 comm="syz.0.364" name="/" dev="configfs" ino=1139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 762.885133][ T30] audit: type=1400 audit(762.510:254): avc: denied { search } for pid=4690 comm="syz.0.364" name="/" dev="configfs" ino=1139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 762.891165][ T30] audit: type=1400 audit(762.520:255): avc: denied { search } for pid=4690 comm="syz.0.364" name="/" dev="configfs" ino=1139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 762.896932][ T30] audit: type=1400 audit(762.520:256): avc: denied { read open } for pid=4690 comm="syz.0.364" path="/" dev="configfs" ino=1139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 762.900564][ T30] audit: type=1400 audit(762.530:257): avc: denied { search } for pid=4690 comm="syz.0.364" name="/" dev="configfs" ino=1139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 766.208545][ T30] audit: type=1400 audit(765.830:258): avc: denied { ioctl } for pid=4701 comm="syz.0.368" path="socket:[6793]" dev="sockfs" ino=6793 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 790.880993][ T4750] netlink: 104 bytes leftover after parsing attributes in process `syz.1.385'. [ 790.888537][ T30] audit: type=1400 audit(790.510:259): avc: denied { nlmsg_read } for pid=4747 comm="syz.1.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 802.213279][ T30] audit: type=1400 audit(801.840:260): avc: denied { bind } for pid=4775 comm="syz.0.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 802.257615][ T30] audit: type=1400 audit(801.880:261): avc: denied { write } for pid=4775 comm="syz.0.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 803.396944][ T30] audit: type=1400 audit(803.020:262): avc: denied { write } for pid=4782 comm="syz.1.398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 804.433065][ T4785] netlink: 'syz.0.397': attribute type 12 has an invalid length. [ 823.625093][ T4821] netlink: 24 bytes leftover after parsing attributes in process `syz.0.407'. [ 827.309106][ T4831] No such timeout policy "syz1" [ 834.270495][ T30] audit: type=1400 audit(833.900:263): avc: denied { watch_sb } for pid=4835 comm="syz.1.413" path="/76" dev="tmpfs" ino=395 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 839.733194][ T30] audit: type=1400 audit(838.430:264): avc: denied { create } for pid=4850 comm="syz.0.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 862.230893][ T4887] binder: 4886:4887 got transaction to context manager from process owning it [ 862.232493][ T4887] binder: 4886:4887 transaction call to 4886:0 failed 4/29201/-22, code 0 size 0-0 line 3139 [ 862.245364][ T23] binder: undelivered TRANSACTION_ERROR: 29201 [ 880.654397][ T4919] netlink: 8 bytes leftover after parsing attributes in process `syz.1.439'. [ 884.727489][ T4931] sock: sock_timestamping_bind_phc: sock not bind to device [ 885.403360][ T30] audit: type=1400 audit(885.030:265): avc: denied { getopt } for pid=4934 comm="syz.1.445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 885.415282][ T30] audit: type=1400 audit(885.040:266): avc: denied { name_bind } for pid=4934 comm="syz.1.445" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 885.437200][ T30] audit: type=1326 audit(885.060:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4934 comm="syz.1.445" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff83f5a768 code=0x0 [ 891.170292][ T30] audit: type=1400 audit(890.620:268): avc: denied { block_suspend } for pid=4940 comm="syz.1.447" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 899.849948][ T30] audit: type=1400 audit(899.380:269): avc: denied { accept } for pid=4966 comm="syz.0.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 912.045885][ T30] audit: type=1400 audit(911.670:270): avc: denied { read } for pid=4983 comm="syz.1.462" name="file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 912.053829][ T30] audit: type=1400 audit(911.680:271): avc: denied { open } for pid=4983 comm="syz.1.462" path="/96/file0/file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 914.200101][ T30] audit: type=1400 audit(913.830:272): avc: denied { append } for pid=4998 comm="syz.1.465" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 914.322143][ T4999] veth0_to_team: entered promiscuous mode [ 914.323479][ T4999] veth0_to_team: entered allmulticast mode [ 918.841431][ T30] audit: type=1400 audit(918.380:273): avc: denied { map } for pid=5004 comm="syz.1.468" path="socket:[8224]" dev="sockfs" ino=8224 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 918.848967][ T30] audit: type=1400 audit(918.380:274): avc: denied { read } for pid=5004 comm="syz.1.468" path="socket:[8224]" dev="sockfs" ino=8224 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 919.199874][ T30] audit: type=1400 audit(918.650:275): avc: denied { ioctl } for pid=5004 comm="syz.1.468" path="socket:[8224]" dev="sockfs" ino=8224 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 919.200507][ T30] audit: type=1400 audit(918.650:276): avc: denied { read open } for pid=5004 comm="syz.1.468" path="net:[4026532631]" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 931.339213][ T5030] binder: 5029:5030 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 931.339834][ T5030] binder: 5030 RLIMIT_NICE not set [ 931.857435][ T5031] binder: 5029:5031 tried to acquire reference to desc 0, got 1 instead [ 931.864495][ T30] audit: type=1400 audit(931.490:277): avc: denied { call } for pid=5029 comm="syz.1.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 932.183842][ T3937] binder: undelivered TRANSACTION_COMPLETE [ 932.999586][ T30] audit: type=1400 audit(932.620:278): avc: denied { connect } for pid=5034 comm="syz.0.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 940.415288][ T5048] syz.1.482 uses obsolete (PF_INET,SOCK_PACKET) [ 950.258600][ T30] audit: type=1400 audit(949.880:279): avc: denied { create } for pid=5071 comm="syz.0.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 950.310801][ T30] audit: type=1400 audit(949.940:280): avc: denied { ioctl } for pid=5072 comm="syz.1.491" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x700a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 955.941802][ T30] audit: type=1400 audit(955.480:281): avc: denied { setopt } for pid=5102 comm="syz.0.501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 960.731548][ T30] audit: type=1326 audit(960.360:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5116 comm="syz.0.503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 960.735619][ T30] audit: type=1326 audit(960.360:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5116 comm="syz.0.503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 960.744318][ T30] audit: type=1326 audit(960.370:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5116 comm="syz.0.503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 960.750375][ T30] audit: type=1326 audit(960.380:285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5116 comm="syz.0.503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 960.754305][ T30] audit: type=1326 audit(960.380:286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5116 comm="syz.0.503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=209 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 960.758884][ T30] audit: type=1326 audit(960.380:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5116 comm="syz.0.503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 960.764697][ T30] audit: type=1326 audit(960.390:288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5116 comm="syz.0.503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 960.773357][ T30] audit: type=1326 audit(960.390:289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5116 comm="syz.0.503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=97 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 960.774047][ T30] audit: type=1326 audit(960.400:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5116 comm="syz.0.503" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffa535a768 code=0x7ffc0000 [ 963.438910][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 963.447567][ T30] audit: type=1400 audit(963.070:292): avc: denied { connect } for pid=5118 comm="syz.0.504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 964.721160][ T5120] mmap: syz.0.504 (5120) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 986.081385][ T30] audit: type=1400 audit(985.700:293): avc: denied { create } for pid=5153 comm="syz.1.515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 996.030319][ T5176] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 996.033228][ T5176] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1000.386637][ T5186] A link change request failed with some changes committed already. Interface bond_slave_0 may have been left with an inconsistent configuration, please check. [ 1017.335465][ T5262] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1018.467716][ T30] audit: type=1400 audit(1018.090:294): avc: denied { recv } for pid=3314 comm="syz-executor" saddr=fe80::2 daddr=ff02::1 netif=eth0 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1018.644033][ T5278] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1018.659950][ T5278] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1019.228593][ T30] audit: type=1400 audit(1018.850:295): avc: denied { relabelfrom } for pid=5284 comm="syz.1.555" name="" dev="pipefs" ino=4786 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1019.254167][ T5287] SELinux: Context system_u:object_r:fonts_cache_t:s0 is not valid (left unmapped). [ 1019.261388][ T30] audit: type=1400 audit(1018.890:296): avc: denied { relabelto } for pid=5284 comm="syz.1.555" name="" dev="pipefs" ino=4786 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="system_u:object_r:fonts_cache_t:s0" [ 1019.730541][ T30] audit: type=1400 audit(1019.360:297): avc: denied { bind } for pid=5291 comm="syz.1.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1019.742205][ T30] audit: type=1400 audit(1019.370:298): avc: denied { listen } for pid=5291 comm="syz.1.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1019.781827][ T30] audit: type=1400 audit(1019.410:299): avc: denied { accept } for pid=5291 comm="syz.1.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1019.790011][ T30] audit: type=1400 audit(1019.420:300): avc: denied { read } for pid=5291 comm="syz.1.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1030.765513][ T5341] netlink: 4 bytes leftover after parsing attributes in process `syz.0.577'. [ 1034.435810][ T30] audit: type=1400 audit(1034.050:301): avc: denied { create } for pid=5361 comm="syz.0.587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1034.445920][ T5363] netlink: 28 bytes leftover after parsing attributes in process `syz.0.587'. [ 1034.449982][ T30] audit: type=1400 audit(1034.070:302): avc: denied { write } for pid=5361 comm="syz.0.587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1034.705778][ T30] audit: type=1400 audit(1034.330:303): avc: denied { setopt } for pid=5365 comm="syz.0.588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1035.789818][ T5378] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1035.797523][ T5378] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1050.362935][ T5394] netlink: 12 bytes leftover after parsing attributes in process `syz.1.597'. [ 1061.016441][ T30] audit: type=1400 audit(1060.640:304): avc: denied { bind } for pid=5441 comm="syz.1.606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1061.035904][ T30] audit: type=1400 audit(1060.660:305): avc: denied { setopt } for pid=5441 comm="syz.1.606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1061.277566][ T5442] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1061.532478][ T5442] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1061.741492][ T5442] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1061.923451][ T5442] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1062.341810][ T5442] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1062.396247][ T5442] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1062.458636][ T5442] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1062.532933][ T5442] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1086.669756][ T5496] netlink: 4 bytes leftover after parsing attributes in process `syz.0.624'. [ 1104.478524][ T5527] netlink: 'syz.0.633': attribute type 39 has an invalid length. [ 1113.586918][ T5538] [ 1113.587490][ T5538] ====================================================== [ 1113.587879][ T5538] WARNING: possible circular locking dependency detected [ 1113.588985][ T5538] 6.15.0-syzkaller-08297-ge0797d3b91de #0 Not tainted [ 1113.589434][ T5538] ------------------------------------------------------ [ 1113.590108][ T5538] syz.1.636/5538 is trying to acquire lock: [ 1113.590925][ T5538] ffff80008748ae88 (pcpu_alloc_mutex){+.+.}-{4:4}, at: pcpu_alloc_noprof+0x8ac/0x11e4 [ 1113.592741][ T5538] [ 1113.592741][ T5538] but task is already holding lock: [ 1113.593435][ T5538] ffff0000144febe8 (&q->q_usage_counter(io)#34){++++}-{0:0}, at: blk_mq_update_nr_hw_queues+0x1e4/0x8e0 [ 1113.594378][ T5538] [ 1113.594378][ T5538] which lock already depends on the new lock. [ 1113.594378][ T5538] [ 1113.595129][ T5538] [ 1113.595129][ T5538] the existing dependency chain (in reverse order) is: [ 1113.595503][ T5538] [ 1113.595503][ T5538] -> #2 (&q->q_usage_counter(io)#34){++++}-{0:0}: [ 1113.596188][ T5538] blk_alloc_queue+0x534/0x640 [ 1113.596492][ T5538] blk_mq_alloc_queue+0x14c/0x22c [ 1113.596815][ T5538] __blk_mq_alloc_disk+0x20/0x1a4 [ 1113.597095][ T5538] nbd_dev_add+0x3cc/0x9d0 [ 1113.597407][ T5538] nbd_init+0xd4/0x1a8 [ 1113.597685][ T5538] do_one_initcall+0x130/0x7f0 [ 1113.598074][ T5538] kernel_init_freeable+0x488/0x6f0 [ 1113.598532][ T5538] kernel_init+0x24/0x1e0 [ 1113.599012][ T5538] ret_from_fork+0x10/0x20 [ 1113.599431][ T5538] [ 1113.599431][ T5538] -> #1 (fs_reclaim){+.+.}-{0:0}: [ 1113.600039][ T5538] fs_reclaim_acquire+0x138/0x160 [ 1113.600423][ T5538] prepare_alloc_pages+0x168/0x560 [ 1113.600822][ T5538] __alloc_frozen_pages_noprof+0x144/0x1f1c [ 1113.601194][ T5538] __alloc_pages_noprof+0x14/0x114 [ 1113.601494][ T5538] pcpu_populate_chunk+0xf0/0x90c [ 1113.601770][ T5538] pcpu_alloc_noprof+0x688/0x11e4 [ 1113.602042][ T5538] bpf_map_alloc_percpu+0xe4/0x5ac [ 1113.602304][ T5538] array_map_alloc+0x430/0x57c [ 1113.602612][ T5538] map_create+0x3b8/0x17e0 [ 1113.602837][ T5538] __sys_bpf+0x844/0x25ac [ 1113.603063][ T5538] __arm64_sys_bpf+0x70/0xa4 [ 1113.603273][ T5538] invoke_syscall+0x6c/0x258 [ 1113.603481][ T5538] el0_svc_common.constprop.0+0xac/0x230 [ 1113.603701][ T5538] do_el0_svc+0x40/0x58 [ 1113.604004][ T5538] el0_svc+0x50/0x198 [ 1113.604283][ T5538] el0t_64_sync_handler+0x10c/0x138 [ 1113.604515][ T5538] el0t_64_sync+0x198/0x19c [ 1113.604813][ T5538] [ 1113.604813][ T5538] -> #0 (pcpu_alloc_mutex){+.+.}-{4:4}: [ 1113.605357][ T5538] __lock_acquire+0x1638/0x2380 [ 1113.605597][ T5538] lock_acquire+0x310/0x38c [ 1113.605874][ T5538] __mutex_lock+0x144/0x9d8 [ 1113.606092][ T5538] mutex_lock_killable_nested+0x24/0x30 [ 1113.606320][ T5538] pcpu_alloc_noprof+0x8ac/0x11e4 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1113.606545][ T5538] sbitmap_init_node+0x220/0x714 [ 1113.607245][ T5538] sbitmap_queue_init_node+0x3c/0x584 [ 1113.607592][ T5538] blk_mq_init_tags+0x100/0x230 [ 1113.608127][ T5538] blk_mq_alloc_map_and_rqs+0xa4/0xc54 [ 1113.608625][ T5538] __blk_mq_alloc_map_and_rqs+0x100/0x1dc [ 1113.609018][ T5538] blk_mq_update_nr_hw_queues+0x344/0x8e0 [ 1113.609363][ T5538] nbd_start_device+0xf8/0x9d0 [ 1113.609695][ T5538] nbd_ioctl+0x178/0xa08 [ 1113.610005][ T5538] blkdev_ioctl+0x22c/0x7f4 [ 1113.610339][ T5538] __arm64_sys_ioctl+0x124/0x1a4 [ 1113.610673][ T5538] invoke_syscall+0x6c/0x258 [ 1113.611008][ T5538] el0_svc_common.constprop.0+0xac/0x230 [ 1113.611348][ T5538] do_el0_svc+0x40/0x58 [ 1113.611669][ T5538] el0_svc+0x50/0x198 [ 1113.611998][ T5538] el0t_64_sync_handler+0x10c/0x138 [ 1113.612344][ T5538] el0t_64_sync+0x198/0x19c [ 1113.612693][ T5538] [ 1113.612693][ T5538] other info that might help us debug this: [ 1113.612693][ T5538] [ 1113.613302][ T5538] Chain exists of: [ 1113.613302][ T5538] pcpu_alloc_mutex --> fs_reclaim --> &q->q_usage_counter(io)#34 [ 1113.613302][ T5538] [ 1113.614252][ T5538] Possible unsafe locking scenario: [ 1113.614252][ T5538] [ 1113.614633][ T5538] CPU0 CPU1 [ 1113.615177][ T5538] ---- ---- [ 1113.615581][ T5538] lock(&q->q_usage_counter(io)#34); [ 1113.616106][ T5538] lock(fs_reclaim); [ 1113.616568][ T5538] lock(&q->q_usage_counter(io)#34); [ 1113.617346][ T5538] lock(pcpu_alloc_mutex); [ 1113.617913][ T5538] [ 1113.617913][ T5538] *** DEADLOCK *** [ 1113.617913][ T5538] [ 1113.618571][ T5538] 5 locks held by syz.1.636/5538: [ 1113.618939][ T5538] #0: ffff0000148b9a30 (&nbd->config_lock){+.+.}-{4:4}, at: nbd_ioctl+0x100/0xa08 [ 1113.619683][ T5538] #1: ffff0000148b9988 (&set->update_nr_hwq_lock){++++}-{4:4}, at: blk_mq_update_nr_hw_queues+0x44/0x8e0 [ 1113.620456][ T5538] #2: ffff0000148b98d8 (&set->tag_list_lock){+.+.}-{4:4}, at: blk_mq_update_nr_hw_queues+0x50/0x8e0 [ 1113.621249][ T5538] #3: ffff0000144febe8 (&q->q_usage_counter(io)#34){++++}-{0:0}, at: blk_mq_update_nr_hw_queues+0x1e4/0x8e0 [ 1113.622062][ T5538] #4: ffff0000144fec20 (&q->q_usage_counter(queue)#2){+.+.}-{0:0}, at: blk_mq_update_nr_hw_queues+0x1e4/0x8e0 [ 1113.622901][ T5538] [ 1113.622901][ T5538] stack backtrace: [ 1113.623743][ T5538] CPU: 1 UID: 0 PID: 5538 Comm: syz.1.636 Not tainted 6.15.0-syzkaller-08297-ge0797d3b91de #0 PREEMPT [ 1113.624128][ T5538] Hardware name: linux,dummy-virt (DT) [ 1113.624643][ T5538] Call trace: [ 1113.625056][ T5538] show_stack+0x18/0x24 (C) [ 1113.625375][ T5538] dump_stack_lvl+0xa4/0xf4 [ 1113.625603][ T5538] dump_stack+0x1c/0x28 [ 1113.625798][ T5538] print_circular_bug+0x28c/0x370 [ 1113.626021][ T5538] check_noncircular+0x168/0x17c [ 1113.626404][ T5538] __lock_acquire+0x1638/0x2380 [ 1113.626667][ T5538] lock_acquire+0x310/0x38c [ 1113.626871][ T5538] __mutex_lock+0x144/0x9d8 [ 1113.627114][ T5538] mutex_lock_killable_nested+0x24/0x30 [ 1113.627335][ T5538] pcpu_alloc_noprof+0x8ac/0x11e4 [ 1113.627559][ T5538] sbitmap_init_node+0x220/0x714 [ 1113.627938][ T5538] sbitmap_queue_init_node+0x3c/0x584 [ 1113.628285][ T5538] blk_mq_init_tags+0x100/0x230 [ 1113.628465][ T5538] blk_mq_alloc_map_and_rqs+0xa4/0xc54 [ 1113.628723][ T5538] __blk_mq_alloc_map_and_rqs+0x100/0x1dc [ 1113.628990][ T5538] blk_mq_update_nr_hw_queues+0x344/0x8e0 [ 1113.629207][ T5538] nbd_start_device+0xf8/0x9d0 [ 1113.629419][ T5538] nbd_ioctl+0x178/0xa08 [ 1113.629616][ T5538] blkdev_ioctl+0x22c/0x7f4 [ 1113.629858][ T5538] __arm64_sys_ioctl+0x124/0x1a4 [ 1113.630083][ T5538] invoke_syscall+0x6c/0x258 [ 1113.630276][ T5538] el0_svc_common.constprop.0+0xac/0x230 [ 1113.630483][ T5538] do_el0_svc+0x40/0x58 [ 1113.630696][ T5538] el0_svc+0x50/0x198 [ 1113.630908][ T5538] el0t_64_sync_handler+0x10c/0x138 [ 1113.631157][ T5538] el0t_64_sync+0x198/0x19c [ 1113.859089][ T5538] block nbd1: shutting down sockets [ 1114.682326][ T321] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1114.770212][ T321] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1114.854792][ T321] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1114.972782][ T321] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1116.559057][ T321] dvmrp8 (unregistering): left allmulticast mode [ 1117.665062][ T321] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1117.740466][ T321] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1117.795758][ T321] bond0 (unregistering): Released all slaves [ 1117.970891][ T321] hsr_slave_0: left promiscuous mode [ 1117.973828][ T321] hsr_slave_1: left promiscuous mode [ 1118.000633][ T321] veth1_macvtap: left promiscuous mode [ 1118.001238][ T321] veth0_macvtap: left promiscuous mode [ 1118.001746][ T321] veth1_vlan: left promiscuous mode [ 1118.002162][ T321] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 08:05:22 Registers: info registers vcpu 0 CPU#0 PC=ffff800080012260 X00=0000000000000000 X01=0000ffffe2b7cfd0 X02=0000000000000040 X03=0000000000000000 X04=0000000000000000 X05=0000000000000000 X06=0000000000000000 X07=0000000000000001 X08=00000000000000d4 X09=00068e781516b4d3 X10=00ffffffffffffff X11=00000010465444a2 X12=0000000000000022 X13=0000000000004420 X14=0000000000000001 X15=0000000000000000 X16=0000aaaac7eb7e40 X17=0000ffffa734d850 X18=0000ffffe2b7c2a0 X19=0000ffffa79f6128 X20=0000ffffe2b7cfd0 X21=0000000000000000 X22=0000000000000000 X23=0000000000000000 X24=0000000000000000 X25=0000000000000001 X26=0000ffffe2b7cf68 X27=0000ffffe2b7d108 X28=0000000000000000 X29=0000ffffe2b7ceb0 X30=0000ffffa72ea34c SP=ffff8000a12f8000 PSTATE=400003c5 -Z-- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=742064656c696146:0000000000006425 Q02=0000000000000000:0000f00f00000000 Q03=0000000000000000:ffffffffffff00ff Q04=0000000000000000:00000000ffffff0f Q05=0000000000000000:00000000cccccc00 Q06=0000000000000073:0000aaaadf7583e0 Q07=0000000000000074:0000aaaadf755620 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffe2b7cab0:0000ffffe2b7cab0 Q17=ffffff80ffffffd8:0000ffffe2b7ca80 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800080316e04 X00=ffff8000897c8150 X01=ffff80008e8b7303 X02=0000000000000144 X03=0000000000000000 X04=1fffe000029ccb59 X05=ffff00006a0af490 X06=ffff60000d415e92 X07=0000000000000001 X08=ffff00006a0af493 X09=dfff800000000000 X10=ffff60000d415e92 X11=1fffe0000d415e92 X12=ffff60000d415e93 X13=0000000000000001 X14=000000000000000f X15=0000000000000007 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff8000897c8150 X20=ffff000014e66618 X21=0000000000000002 X22=ffff8000899b6c90 X23=ffff000014e65ac0 X24=0000000000000002 X25=ffff800088b61000 X26=00000000000000c8 X27=0000000000000005 X28=0000000000000004 X29=ffff80008e8b72e0 X30=ffff800080316f54 SP=ffff80008e8b72e0 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000005001000000:0000005001000000 Q01=0000000000000000:0000000000000050 Q02=0000000000000000:0000000000000000 Q03=0000000000000028:0000000000000050 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff8a2b360:0000fffff8a2b360 Q17=ffffff80ffffffd0:0000fffff8a2b330 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000