last executing test programs: 13.088034306s ago: executing program 0 (id=2115): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000014c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001480)={&(0x7f0000000040)={0x14, 0xc, 0x6, 0x201, 0x70bd26, 0x25dfdbff, {0x5, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x44000}, 0x24000000) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001500)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001580), 0xffffffffffffffff) sendmsg$NFNL_MSG_CTHELPER_NEW(r0, &(0x7f0000001900)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000018c0)={&(0x7f0000001880)={0x38, 0x0, 0x9, 0x201, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFCTH_TUPLE={0x1c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1d}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0xf6e}]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x4000000) close_range(r0, r0, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000001b40), r1) r2 = syz_open_dev$audion(&(0x7f0000001b80), 0x0, 0x800) recvmsg$inet_nvme(r2, &(0x7f0000001d80)={0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000001bc0)=""/107, 0x6b}, {&(0x7f0000001c40)=""/75, 0x4b}], 0x2, &(0x7f0000001d00)=""/109, 0x6d}, 0x20) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000001ec0)={'syztnl2\x00', &(0x7f0000001e40)={'syztnl2\x00', 0x0, 0x20, 0x80, 0x9, 0x4, {{0x10, 0x4, 0x0, 0x9, 0x40, 0x65, 0x0, 0x0, 0x0, 0x0, @private=0xa010101, @multicast2, {[@timestamp_prespec={0x44, 0xc, 0x3a, 0x3, 0x5, [{@dev={0xac, 0x14, 0x14, 0x38}, 0xe}]}, @lsrr={0x83, 0x13, 0xc0, [@empty, @empty, @multicast2, @local]}, @lsrr={0x83, 0xb, 0xc7, [@remote, @remote]}]}}}}}) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000001f00), &(0x7f0000001f40)=0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000001f80)={'wg1\x00', 0x0}) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000001fc0)={@multicast1, @multicast1, 0x0}, &(0x7f0000002000)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002100)={'nicvf0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002400)={0xffffffffffffffff, 0xe0, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002140), ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x9, &(0x7f0000002180)=[0x0, 0x0, 0x0], &(0x7f00000021c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x9e, &(0x7f0000002200)=[{}, {}], 0x10, 0x10, &(0x7f0000002240), 0x0, 0x0, 0x88, 0x8, 0x8, &(0x7f00000022c0)}}, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f0000002800)={&(0x7f0000001dc0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000027c0)={&(0x7f0000002600)={0x16c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@HEADER={0x4}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}]}, 0x16c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000002840)=0x10000, 0x4) writev(r0, &(0x7f0000003e40)=[{0x0}, {0x0}, {&(0x7f0000003d00)="69b9a1e79478555fb37e3cfa954311d0c694f68e2f9f83ace48b6d089858ef6685340039e69b8686548f9140f91f4d6edafff1dff9d754cd7bf1f4ab3ce7f54a", 0x40}], 0x3) 7.192522747s ago: executing program 0 (id=2117): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000140)=ANY=[@ANYBLOB="2107000000000001000502001d000100000100c910fe800000000000005a1e2a657b29d7710000000000000000000201010900"/63], 0x48) setsockopt$inet6_int(r1, 0x29, 0x4e, 0x0, 0xfe00) r2 = socket$unix(0x1, 0x1, 0x0) r3 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = landlock_create_ruleset(&(0x7f0000000000)={0x8000}, 0x10, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x5452, &(0x7f0000000580)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x8002, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, 0x0, 0x5e) ioctl$SOUND_MIXER_READ_DEVMASK(r3, 0x80044dfe, &(0x7f00000000c0)) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) socket$inet_icmp(0x2, 0x2, 0x1) fsetxattr$security_capability(r3, &(0x7f0000000380), &(0x7f0000000540)=@v2={0x2000000, [{0x1}, {0x2, 0x9}]}, 0x14, 0x1) 6.332033475s ago: executing program 0 (id=2119): capset(0x0, &(0x7f0000000280)={0xfffffffc, 0x6}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(0xffffffffffffffff, &(0x7f0000000180)={0x14, &(0x7f0000000040)={0x40, 0x16, 0x53, {0x53, 0x4, "edee2924a3d1d6cf3335e1dcf0629b1ad31c458c29345f4051b20c30cd9b29291f805b8359837b6a579ae2c308afbe80cd69421b4658de623f67965013be3ded694e551acc9d96a769eda07c5ecf77c403"}}, 0x0}, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = socket(0x10, 0x80003, 0x0) connect$inet(r0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) sendmsg$MPTCP_PM_CMD_SUBFLOW_DESTROY(0xffffffffffffffff, 0x0, 0x24008011) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket(0x1e, 0x0, 0x0) 3.410904789s ago: executing program 0 (id=2131): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, 0x0, 0x20004000) 3.021080911s ago: executing program 0 (id=2134): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r1) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) 1.407053001s ago: executing program 1 (id=2140): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x1c, 0x0, 0x1, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x80) 1.211167983s ago: executing program 1 (id=2141): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000140)=ANY=[@ANYBLOB="2107000000000001000502001d000100000100c910fe800000000000005a1e2a657b29d7710000000000000000000201010900"/63], 0x48) setsockopt$inet6_int(r1, 0x29, 0x4e, 0x0, 0xfe00) r2 = socket$unix(0x1, 0x1, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = landlock_create_ruleset(&(0x7f0000000000)={0x8000}, 0x10, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r4, 0x5452, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x8002, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, 0x0, 0x5e) ioctl$SOUND_MIXER_READ_DEVMASK(r3, 0x80044dfe, &(0x7f00000000c0)) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) socket$inet_icmp(0x2, 0x2, 0x1) fsetxattr$security_capability(r3, &(0x7f0000000380), &(0x7f0000000540)=@v2={0x2000000, [{0x1}, {0x2, 0x9}]}, 0x14, 0x1) 1.008923604s ago: executing program 1 (id=2142): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000005d00)={0x0, 0x0, &(0x7f0000005cc0)={&(0x7f0000000700)=ANY=[], 0x1c}, 0x1, 0x0, 0x0, 0x4000084}, 0x10) 817.052805ms ago: executing program 1 (id=2143): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) 480.521433ms ago: executing program 1 (id=2144): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) statx(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x6000, 0x400, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@private, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@private}, 0x0, @in6=@private1}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@private2}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000580)=0xe8) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)=0x0) r6 = getgid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000006c0)) r7 = getgid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000700)={{0x1, 0x1, 0x18, r0, {0xee00, 0x0}}, './file0\x00'}) statx(0xffffffffffffffff, &(0x7f0000000740)='./file0\x00', 0x100, 0x100, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000000880)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getresgid(&(0x7f00000028c0), &(0x7f0000002900)=0x0, &(0x7f0000002940)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000002980)={{}, {0x1, 0x4}, [{0x2, 0x7, r1}, {0x2, 0x1, r2}, {0x2, 0x0, r3}, {0x2, 0x0, r4}], {0x4, 0x4}, [{0x8, 0x2, r5}, {0x8, 0x4, r6}, {}, {0x8, 0x7, r7}, {0x8, 0x3, r9}, {0x8, 0x6, 0xee00}, {0x8, 0x3, 0xee01}, {0x8, 0x6, r10}, {0x8, 0x2, r11}, {0x8, 0x5, r12}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000002a80)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_ADD_TX_TS(r8, &(0x7f0000002b80)={&(0x7f0000002a40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000002b40)={&(0x7f0000002ac0)={0x54, 0x0, 0x20, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8, 0x3, r13}, @void}}, [@NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x3}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_USER_PRIO={0x5}, @NL80211_ATTR_TSID={0x5, 0xd2, 0x7}, @NL80211_ATTR_ADMITTED_TIME={0x6, 0xd4, 0x9}, @NL80211_ATTR_MAC={0xa}]}, 0x54}, 0x1, 0x0, 0x0, 0x82}, 0x20000000) accept4$alg(r8, 0x0, 0x0, 0x800) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000003040), &(0x7f0000003080), 0x2, 0x1) 87.562965ms ago: executing program 1 (id=2145): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) 0s ago: executing program 0 (id=2146): r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1ff, 0x40802) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r0, 0xc00464c9, &(0x7f0000000140)) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:29605' (ED25519) to the list of known hosts. [ 155.981388][ T30] audit: type=1400 audit(155.620:48): avc: denied { name_bind } for pid=3304 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 156.336850][ T30] audit: type=1400 audit(155.970:49): avc: denied { execute } for pid=3305 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 156.342656][ T30] audit: type=1400 audit(155.980:50): avc: denied { execute_no_trans } for pid=3305 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 160.233203][ T30] audit: type=1400 audit(159.870:51): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 160.245901][ T30] audit: type=1400 audit(159.880:52): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 160.263894][ T3305] cgroup: Unknown subsys name 'net' [ 160.280118][ T30] audit: type=1400 audit(159.920:53): avc: denied { unmount } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 160.642730][ T3305] cgroup: Unknown subsys name 'cpuset' [ 160.704121][ T3305] cgroup: Unknown subsys name 'rlimit' [ 161.134828][ T30] audit: type=1400 audit(160.770:54): avc: denied { setattr } for pid=3305 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 161.140971][ T30] audit: type=1400 audit(160.780:55): avc: denied { mounton } for pid=3305 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 161.146829][ T30] audit: type=1400 audit(160.780:56): avc: denied { mount } for pid=3305 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 161.683463][ T3307] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 161.689524][ T30] audit: type=1400 audit(161.320:57): avc: denied { relabelto } for pid=3307 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 161.694816][ T30] audit: type=1400 audit(161.330:58): avc: denied { write } for pid=3307 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 161.772181][ T30] audit: type=1400 audit(161.410:59): avc: denied { read } for pid=3305 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 161.774235][ T30] audit: type=1400 audit(161.410:60): avc: denied { open } for pid=3305 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 161.792121][ T3305] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 181.533186][ T30] audit: type=1400 audit(181.170:61): avc: denied { execmem } for pid=3308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 181.603445][ T30] audit: type=1400 audit(181.240:62): avc: denied { read } for pid=3310 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 181.617834][ T30] audit: type=1400 audit(181.240:63): avc: denied { open } for pid=3310 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 181.624122][ T30] audit: type=1400 audit(181.260:64): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 181.667692][ T30] audit: type=1400 audit(181.300:65): avc: denied { module_request } for pid=3310 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 181.814253][ T30] audit: type=1400 audit(181.450:66): avc: denied { sys_module } for pid=3310 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 187.160753][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.182001][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.654418][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.696618][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 189.829114][ T3311] hsr_slave_0: entered promiscuous mode [ 189.838260][ T3311] hsr_slave_1: entered promiscuous mode [ 190.170060][ T3310] hsr_slave_0: entered promiscuous mode [ 190.174177][ T3310] hsr_slave_1: entered promiscuous mode [ 190.183092][ T3310] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 190.184371][ T3310] Cannot create hsr debugfs directory [ 192.058577][ T30] audit: type=1400 audit(191.690:67): avc: denied { create } for pid=3311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 192.065197][ T30] audit: type=1400 audit(191.700:68): avc: denied { write } for pid=3311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 192.073360][ T30] audit: type=1400 audit(191.710:69): avc: denied { read } for pid=3311 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 192.095786][ T3311] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 192.204603][ T3311] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 192.248372][ T3311] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 192.304669][ T3311] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 192.736002][ T3310] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 192.801733][ T3310] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 192.866127][ T3310] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 192.950645][ T3310] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 194.784809][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.654036][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 203.989431][ T3310] veth0_vlan: entered promiscuous mode [ 204.054771][ T3311] veth0_vlan: entered promiscuous mode [ 204.129985][ T3310] veth1_vlan: entered promiscuous mode [ 204.171725][ T3311] veth1_vlan: entered promiscuous mode [ 204.382563][ T3311] veth0_macvtap: entered promiscuous mode [ 204.432050][ T3311] veth1_macvtap: entered promiscuous mode [ 204.511609][ T3310] veth0_macvtap: entered promiscuous mode [ 204.549851][ T3310] veth1_macvtap: entered promiscuous mode [ 204.853070][ T3311] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.854134][ T3311] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.854318][ T3311] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.854483][ T3311] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.876080][ T3310] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.878499][ T3310] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.879911][ T3310] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 204.880941][ T3310] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 205.502892][ T30] audit: type=1400 audit(205.130:70): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 205.526183][ T30] audit: type=1400 audit(205.160:71): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/syzkaller.86tjP0/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 205.567484][ T30] audit: type=1400 audit(205.200:72): avc: denied { mount } for pid=3311 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 205.609785][ T30] audit: type=1400 audit(205.240:73): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/syzkaller.HKMTN2/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 205.611501][ T30] audit: type=1400 audit(205.250:74): avc: denied { mounton } for pid=3311 comm="syz-executor" path="/syzkaller.HKMTN2/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3529 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 205.679185][ T30] audit: type=1400 audit(205.310:75): avc: denied { unmount } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 205.691934][ T30] audit: type=1400 audit(205.330:76): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 205.702027][ T30] audit: type=1400 audit(205.340:77): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="gadgetfs" ino=3532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 205.731346][ T30] audit: type=1400 audit(205.370:78): avc: denied { mount } for pid=3310 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 205.737819][ T30] audit: type=1400 audit(205.370:79): avc: denied { mounton } for pid=3310 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 206.145388][ T3311] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 212.585457][ T3495] serio: Serial port pts0 [ 213.019503][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 213.020032][ T3500] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 213.023017][ T30] audit: type=1400 audit(212.660:89): avc: denied { create } for pid=3499 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 213.029140][ T30] audit: type=1400 audit(212.660:90): avc: denied { ioctl } for pid=3499 comm="syz.1.24" path="socket:[4132]" dev="sockfs" ino=4132 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 213.035665][ T3500] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3500 comm=syz.1.24 [ 213.043525][ T3500] Zero length message leads to an empty skb [ 213.054597][ T30] audit: type=1400 audit(212.690:91): avc: denied { audit_write } for pid=3499 comm="syz.1.24" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 219.309292][ T30] audit: type=1400 audit(218.940:92): avc: denied { execute } for pid=3526 comm="syz.1.37" path=2F6D656D66643AC0873A2A18C16BA7875BA06F383449AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EB257CB8D7D336C6D38A537C9202864656C6574656429 dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 221.810383][ T3539] serio: Serial port pts0 [ 224.671492][ T3553] serio: Serial port pts1 [ 228.265882][ T3562] serio: Serial port pts0 [ 235.308909][ T3575] serio: Serial port pts0 [ 243.004329][ T30] audit: type=1400 audit(242.640:93): avc: denied { read write } for pid=3588 comm="syz.1.59" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 243.007484][ T30] audit: type=1400 audit(242.640:94): avc: denied { open } for pid=3588 comm="syz.1.59" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 243.670732][ T30] audit: type=1400 audit(243.310:95): avc: denied { read } for pid=3588 comm="syz.1.59" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 243.688367][ T30] audit: type=1400 audit(243.320:96): avc: denied { open } for pid=3588 comm="syz.1.59" path="/27/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 243.802307][ T3591] block device autoloading is deprecated and will be removed. [ 243.833171][ T30] audit: type=1400 audit(243.460:97): avc: denied { ioctl } for pid=3588 comm="syz.1.59" path="/27/file0/file0" dev="fuse" ino=64 ioctlcmd=0x923 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 243.939685][ T30] audit: type=1326 audit(243.550:98): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3584 comm="syz.0.57" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff9c35b728 code=0x0 [ 244.033891][ T30] audit: type=1400 audit(243.670:99): avc: denied { unmount } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 244.710785][ T3596] serio: Serial port pts0 [ 247.536547][ T3604] serio: Serial port pts1 [ 254.610496][ T3629] serio: Serial port pts0 [ 256.299562][ T30] audit: type=1400 audit(255.940:100): avc: denied { prog_run } for pid=3643 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 258.658150][ T3656] serio: Serial port pts1 [ 264.866656][ T30] audit: type=1400 audit(264.500:101): avc: denied { allowed } for pid=3660 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 264.912347][ T30] audit: type=1400 audit(264.550:102): avc: denied { create } for pid=3660 comm="syz.0.85" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 266.308533][ T3668] serio: Serial port pts1 [ 269.834033][ T3673] serio: Serial port pts0 [ 272.846463][ T3683] serio: Serial port pts1 [ 278.140079][ T3696] serio: Serial port pts0 [ 280.089394][ T3705] serio: Serial port pts1 [ 295.052143][ T30] audit: type=1400 audit(294.690:103): avc: denied { create } for pid=3730 comm="syz.0.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 295.089979][ T30] audit: type=1400 audit(294.730:104): avc: denied { setopt } for pid=3730 comm="syz.0.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 295.680031][ T30] audit: type=1400 audit(295.310:105): avc: denied { bind } for pid=3730 comm="syz.0.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 296.253268][ T3741] serio: Serial port pts0 [ 296.999405][ T3750] serio: Serial port pts1 [ 305.669471][ T3775] serio: Serial port pts1 [ 317.490716][ T3816] serio: Serial port pts0 [ 319.711642][ T3829] serio: Serial port pts1 [ 327.853846][ T30] audit: type=1400 audit(327.490:106): avc: denied { create } for pid=3857 comm="syz.0.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 327.932898][ T30] audit: type=1400 audit(327.570:107): avc: denied { setopt } for pid=3857 comm="syz.0.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 327.953790][ T30] audit: type=1400 audit(327.590:108): avc: denied { bind } for pid=3857 comm="syz.0.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 327.954503][ T30] audit: type=1400 audit(327.590:109): avc: denied { listen } for pid=3857 comm="syz.0.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 327.965542][ T30] audit: type=1400 audit(327.600:110): avc: denied { connect } for pid=3857 comm="syz.0.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 328.022881][ T30] audit: type=1400 audit(327.660:111): avc: denied { write } for pid=3857 comm="syz.0.160" path="socket:[5278]" dev="sockfs" ino=5278 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 334.514019][ T3912] serio: Serial port pts0 [ 340.070104][ T3936] fuse: root generation should be zero [ 340.333819][ T3939] serio: Serial port pts1 [ 350.647902][ T3948] serio: Serial port pts0 [ 356.205062][ T3959] serio: Serial port pts1 [ 357.060027][ T3968] serio: Serial port pts0 [ 364.075443][ T3988] serio: Serial port pts0 [ 368.087888][ T3999] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 368.094529][ T3999] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3999 comm=syz.1.212 [ 368.136413][ T3999] ipip0: entered promiscuous mode [ 368.152778][ T30] audit: type=1400 audit(367.790:112): avc: denied { write } for pid=3998 comm="syz.1.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 368.362130][ T30] audit: type=1400 audit(368.000:113): avc: denied { create } for pid=4000 comm="syz.1.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 368.399726][ T30] audit: type=1400 audit(368.040:114): avc: denied { ioctl } for pid=4000 comm="syz.1.213" path="socket:[5532]" dev="sockfs" ino=5532 ioctlcmd=0x8b24 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 371.379386][ T4025] serio: Serial port pts0 [ 376.324344][ T30] audit: type=1400 audit(375.960:115): avc: denied { ioctl } for pid=4039 comm="syz.0.229" path="socket:[5620]" dev="sockfs" ino=5620 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 378.913423][ T4068] serio: Serial port pts0 [ 382.881504][ T4081] serio: Serial port pts1 [ 386.245428][ T4095] serio: Serial port pts0 [ 394.784953][ T4120] serio: Serial port pts1 [ 401.514846][ T4131] serio: Serial port pts0 [ 410.942781][ T30] audit: type=1400 audit(410.580:116): avc: denied { name_bind } for pid=4195 comm="syz.0.288" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 414.983747][ T4249] serio: Serial port pts0 [ 415.689022][ T30] audit: type=1400 audit(415.330:117): avc: denied { create } for pid=4256 comm="syz.1.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 415.722589][ T30] audit: type=1400 audit(415.350:118): avc: denied { bind } for pid=4256 comm="syz.1.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 415.739121][ T30] audit: type=1400 audit(415.380:119): avc: denied { write } for pid=4256 comm="syz.1.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 420.308168][ T4273] serio: Serial port pts1 [ 432.188623][ T4290] serio: Serial port pts0 [ 436.862731][ T30] audit: type=1400 audit(436.500:120): avc: denied { watch watch_reads } for pid=4302 comm="syz.1.333" path="/168" dev="tmpfs" ino=988 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 438.451525][ T30] audit: type=1400 audit(438.050:121): avc: denied { read write } for pid=4315 comm="syz.0.339" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 438.452834][ T30] audit: type=1400 audit(438.060:122): avc: denied { open } for pid=4315 comm="syz.0.339" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 438.479366][ T30] audit: type=1400 audit(438.120:123): avc: denied { ioctl } for pid=4315 comm="syz.0.339" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 438.829165][ T3445] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 439.008364][ T3445] usb 1-1: Using ep0 maxpacket: 8 [ 439.062800][ T3445] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 11 [ 439.065054][ T3445] usb 1-1: New USB device found, idVendor=044f, idProduct=b654, bcdDevice= 0.00 [ 439.066764][ T3445] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 439.109017][ T3445] usb 1-1: config 0 descriptor?? [ 439.368976][ T30] audit: type=1400 audit(439.000:124): avc: denied { create } for pid=4315 comm="syz.0.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 439.592942][ T3445] usbhid 1-1:0.0: can't add hid device: -71 [ 439.596151][ T3445] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 439.631257][ T3445] usb 1-1: USB disconnect, device number 2 [ 440.081490][ T30] audit: type=1400 audit(439.710:125): avc: denied { read } for pid=4329 comm="syz.1.344" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 440.085296][ T30] audit: type=1400 audit(439.720:126): avc: denied { open } for pid=4329 comm="syz.1.344" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 440.113332][ T30] audit: type=1400 audit(439.750:127): avc: denied { ioctl } for pid=4329 comm="syz.1.344" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x640d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 442.213301][ T4346] serio: Serial port pts0 [ 443.550426][ T30] audit: type=1400 audit(443.190:128): avc: denied { ioctl } for pid=4358 comm="syz.0.355" path="socket:[6532]" dev="sockfs" ino=6532 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 444.957650][ T4369] serio: Serial port pts1 [ 448.484763][ T4377] syzkaller0: entered promiscuous mode [ 448.487752][ T4377] syzkaller0: entered allmulticast mode [ 452.743080][ T4389] serio: Serial port pts0 [ 458.957693][ T30] audit: type=1400 audit(458.590:129): avc: denied { map } for pid=4396 comm="syz.0.370" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6602 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 458.958265][ T30] audit: type=1400 audit(458.590:130): avc: denied { read write } for pid=4396 comm="syz.0.370" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6602 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 464.114152][ T30] audit: type=1400 audit(463.750:131): avc: denied { mounton } for pid=4406 comm="syz.1.374" path="/185/file0" dev="tmpfs" ino=1091 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 469.528083][ T30] audit: type=1400 audit(469.160:132): avc: denied { create } for pid=4444 comm="syz.0.390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 469.540807][ T30] audit: type=1400 audit(469.170:133): avc: denied { bind } for pid=4444 comm="syz.0.390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 469.546781][ T30] audit: type=1400 audit(469.180:134): avc: denied { listen } for pid=4444 comm="syz.0.390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 470.099202][ T30] audit: type=1400 audit(469.730:135): avc: denied { accept } for pid=4444 comm="syz.0.390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 472.045878][ T30] audit: type=1400 audit(471.680:136): avc: denied { accept } for pid=4460 comm="syz.1.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 472.077758][ T30] audit: type=1400 audit(471.700:137): avc: denied { read } for pid=4460 comm="syz.1.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 472.926015][ T4469] serio: Serial port pts0 [ 477.701026][ T4493] serio: Serial port pts1 [ 484.595382][ T30] audit: type=1400 audit(484.230:138): avc: denied { mounton } for pid=4500 comm="syz.0.412" path="/213/file0" dev="tmpfs" ino=1246 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 488.675528][ T4518] serio: Serial port pts0 [ 493.068835][ T4542] serio: Serial port pts1 [ 494.998046][ T4551] serio: Serial port pts0 [ 499.566534][ T30] audit: type=1400 audit(499.200:139): avc: denied { read write } for pid=4556 comm="syz.1.432" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 499.568589][ T30] audit: type=1400 audit(499.200:140): avc: denied { open } for pid=4556 comm="syz.1.432" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 500.162045][ T4562] serio: Serial port pts1 [ 504.680751][ T4588] serio: Serial port pts0 [ 513.533354][ T4627] serio: Serial port pts0 [ 513.877878][ T4633] serio: Serial port pts1 [ 527.318974][ T4682] serio: Serial port pts0 [ 531.739257][ T4717] serio: Serial port pts1 [ 538.819086][ T4747] serio: Serial port pts0 [ 543.021986][ T4764] serio: Serial port pts1 [ 550.326278][ T4777] serio: Serial port pts1 [ 557.560637][ T4813] serio: Serial port pts0 [ 558.397984][ T30] audit: type=1400 audit(558.030:141): avc: denied { create } for pid=4822 comm="syz.1.538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 558.414993][ T30] audit: type=1400 audit(558.050:142): avc: denied { write } for pid=4822 comm="syz.1.538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 558.638654][ T4825] serio: Serial port pts1 [ 564.153780][ T4837] serio: Serial port pts0 [ 574.128126][ T4863] serio: Serial port pts0 [ 575.874857][ T4879] serio: Serial port pts1 [ 582.770425][ T30] audit: type=1400 audit(582.400:143): avc: denied { read } for pid=4897 comm="syz.1.565" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 582.778995][ T30] audit: type=1400 audit(582.410:144): avc: denied { open } for pid=4897 comm="syz.1.565" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 582.829203][ T30] audit: type=1400 audit(582.460:145): avc: denied { ioctl } for pid=4897 comm="syz.1.565" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 583.688476][ T4906] serio: Serial port pts0 [ 585.489722][ T4919] serio: Serial port pts1 [ 599.272516][ T4927] serio: Serial port pts0 [ 601.060480][ T30] audit: type=1400 audit(600.700:146): avc: denied { getopt } for pid=4936 comm="syz.1.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 604.470179][ T4955] process 'syz.1.588' launched './file1' with NULL argv: empty string added [ 604.474253][ T30] audit: type=1400 audit(604.110:147): avc: denied { execute_no_trans } for pid=4954 comm="syz.1.588" path="/288/file1" dev="tmpfs" ino=1687 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 605.323559][ T4964] serio: Serial port pts0 [ 606.421051][ T4978] serio: Serial port pts1 [ 612.410822][ T4986] serio: Serial port pts0 [ 612.950935][ T30] audit: type=1400 audit(612.590:148): avc: denied { read } for pid=4983 comm="syz.1.599" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 612.954243][ T30] audit: type=1400 audit(612.590:149): avc: denied { open } for pid=4983 comm="syz.1.599" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 612.963545][ T30] audit: type=1400 audit(612.600:150): avc: denied { create } for pid=4983 comm="syz.1.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 613.207438][ C1] hrtimer: interrupt took 1050928 ns [ 615.033331][ T4991] serio: Serial port pts1 [ 619.882348][ T5005] serio: Serial port pts0 [ 620.925092][ T30] audit: type=1400 audit(620.560:151): avc: denied { mount } for pid=5007 comm="syz.1.607" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 621.208396][ T5011] serio: Serial port pts1 [ 626.058938][ T30] audit: type=1400 audit(625.690:152): avc: denied { name_bind } for pid=5019 comm="syz.0.611" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 626.062639][ T30] audit: type=1400 audit(625.700:153): avc: denied { node_bind } for pid=5019 comm="syz.0.611" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 629.190018][ T5027] serio: Serial port pts0 [ 635.487717][ T5037] serio: Serial port pts0 [ 639.312948][ T5060] serio: Serial port pts1 [ 641.874383][ T5069] serio: Serial port pts0 [ 646.617663][ T5082] serio: Serial port pts1 [ 648.585811][ T30] audit: type=1400 audit(648.220:154): avc: denied { create } for pid=5093 comm="syz.0.639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 648.612133][ T30] audit: type=1400 audit(648.250:155): avc: denied { connect } for pid=5093 comm="syz.0.639" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 648.624782][ T30] audit: type=1400 audit(648.260:156): avc: denied { setopt } for pid=5093 comm="syz.0.639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 650.068491][ T30] audit: type=1400 audit(649.700:157): avc: denied { create } for pid=5108 comm="syz.0.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 650.077848][ T30] audit: type=1400 audit(649.710:158): avc: denied { ioctl } for pid=5108 comm="syz.0.646" path="socket:[8973]" dev="sockfs" ino=8973 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 650.565681][ T5114] serio: Serial port pts0 [ 652.633389][ T30] audit: type=1400 audit(652.270:159): avc: denied { write } for pid=5118 comm="syz.1.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 652.900463][ T30] audit: type=1400 audit(652.540:160): avc: denied { read } for pid=5118 comm="syz.1.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 653.141578][ T5122] serio: Serial port pts1 [ 659.247982][ T5129] serio: Serial port pts1 [ 669.218028][ T5180] serio: Serial port pts0 [ 671.397985][ T5196] serio: Serial port pts1 [ 678.465693][ T5211] serio: Serial port pts1 [ 684.744360][ T5221] serio: Serial port pts0 [ 688.465749][ T5229] serio: Serial port pts1 [ 695.565131][ T5243] serio: Serial port pts0 [ 714.187773][ T5293] serio: Serial port pts0 [ 714.844041][ T5303] netlink: 4 bytes leftover after parsing attributes in process `syz.0.717'. [ 724.200347][ T88] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 724.392798][ T88] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 724.394207][ T88] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 724.395060][ T88] usb 1-1: New USB device found, idVendor=1e7d, idProduct=319c, bcdDevice= 0.00 [ 724.395341][ T88] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 724.420365][ T88] usb 1-1: config 0 descriptor?? [ 724.966734][ T88] hid-generic 0003:1E7D:319C.0001: item fetching failed at offset 5/7 [ 724.971831][ T88] hid-generic 0003:1E7D:319C.0001: probe with driver hid-generic failed with error -22 [ 725.156646][ T4981] usb 1-1: USB disconnect, device number 3 [ 725.625079][ T5363] serio: Serial port pts1 [ 729.503209][ T5368] serio: Serial port pts0 [ 740.485427][ T5395] serio: Serial port pts1 [ 746.699323][ T5407] serio: Serial port pts0 [ 753.970490][ T30] audit: type=1400 audit(753.600:161): avc: denied { setattr } for pid=5443 comm="syz.1.775" name="audio" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 754.178562][ T5447] serio: Serial port pts0 [ 759.281704][ T5466] serio: Serial port pts1 [ 760.499959][ T5475] serio: Serial port pts0 [ 774.028547][ T5528] serio: Serial port pts0 [ 784.160349][ T5568] serio: Serial port pts0 [ 785.068267][ T30] audit: type=1400 audit(784.700:162): avc: denied { write } for pid=5576 comm="syz.0.824" name="udplite6" dev="proc" ino=4026532685 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 785.615653][ T30] audit: type=1400 audit(785.250:163): avc: denied { watch watch_reads } for pid=5576 comm="syz.0.824" path="/proc/1055/net/udplite6" dev="proc" ino=4026532685 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 786.344698][ T5581] serio: Serial port pts1 [ 791.179546][ T30] audit: type=1326 audit(790.810:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5585 comm="syz.1.826" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffab55b728 code=0x0 [ 804.834446][ T5677] serio: Serial port pts0 [ 805.981955][ T5690] xt_bpf: check failed: parse error [ 806.188223][ T5692] serio: Serial port pts1 [ 820.885308][ T5700] serio: Serial port pts0 [ 821.570906][ T30] audit: type=1400 audit(821.210:165): avc: denied { setattr } for pid=5704 comm="syz.1.876" name="PACKET" dev="sockfs" ino=11096 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 823.545065][ T30] audit: type=1400 audit(823.180:166): avc: denied { write } for pid=5720 comm="syz.1.883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 825.671834][ T30] audit: type=1400 audit(825.310:167): avc: denied { write } for pid=5732 comm="syz.1.888" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 828.607837][ T30] audit: type=1400 audit(828.240:168): avc: denied { block_suspend } for pid=5749 comm="syz.1.895" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 829.627940][ T5759] serio: Serial port pts1 [ 836.328810][ T5764] serio: Serial port pts0 [ 845.496201][ T5773] serio: Serial port pts1 [ 858.299624][ T5785] serio: Serial port pts0 [ 862.187884][ T5798] serio: Serial port pts1 [ 873.687385][ T5803] serio: Serial port pts0 [ 881.370754][ T5821] serio: Serial port pts1 [ 884.201019][ T30] audit: type=1400 audit(883.840:169): avc: denied { ioctl } for pid=5828 comm="syz.1.919" path="socket:[11737]" dev="sockfs" ino=11737 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 889.313231][ T5841] serio: Serial port pts0 [ 892.417994][ T5867] serio: Serial port pts0 [ 900.093978][ T5886] serio: Serial port pts1 [ 917.126149][ T5933] serio: Serial port pts0 [ 925.638732][ T5970] serio: Serial port pts0 [ 928.833614][ T5984] serio: Serial port pts1 [ 941.324552][ T30] audit: type=1400 audit(940.960:170): avc: denied { create } for pid=5991 comm="syz.1.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 941.360103][ T30] audit: type=1400 audit(941.000:171): avc: denied { bind } for pid=5991 comm="syz.1.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 941.365879][ T30] audit: type=1400 audit(941.000:172): avc: denied { setopt } for pid=5991 comm="syz.1.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 942.759254][ T6001] serio: Serial port pts0 [ 948.113057][ T30] audit: type=1400 audit(947.750:173): avc: denied { watch watch_reads } for pid=6021 comm="syz.0.983" path="/proc/1193" dev="proc" ino=12578 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 949.737935][ T6028] serio: Serial port pts1 [ 958.457873][ T30] audit: type=1400 audit(958.090:174): avc: denied { mount } for pid=6035 comm="syz.1.987" name="/" dev="autofs" ino=12015 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 960.972379][ T30] audit: type=1400 audit(960.610:175): avc: denied { unmount } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 961.335916][ T6041] serio: Serial port pts0 [ 972.313565][ T6076] serio: Serial port pts1 [ 987.538612][ T30] audit: type=1400 audit(987.180:176): avc: denied { setopt } for pid=6099 comm="syz.1.1010" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 989.263523][ T6114] serio: Serial port pts0 [ 993.943683][ T6129] serio: Serial port pts0 [ 1002.959705][ T6153] serio: Serial port pts1 [ 1005.412610][ T6163] serio: Serial port pts1 [ 1009.320397][ T30] audit: type=1400 audit(1008.960:177): avc: denied { write } for pid=6167 comm="syz.1.1031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1009.344512][ T6168] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1031'. [ 1020.838689][ T6178] serio: Serial port pts0 [ 1026.075795][ T30] audit: type=1400 audit(1025.710:178): avc: denied { nlmsg_write } for pid=6195 comm="syz.1.1041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1027.103881][ T30] audit: type=1400 audit(1026.740:179): avc: denied { read } for pid=6200 comm="syz.1.1043" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1027.114519][ T30] audit: type=1400 audit(1026.740:180): avc: denied { open } for pid=6200 comm="syz.1.1043" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1027.654559][ T30] audit: type=1400 audit(1027.290:181): avc: denied { ioctl } for pid=6200 comm="syz.1.1043" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1028.838277][ T30] audit: type=1400 audit(1028.470:182): avc: denied { getopt } for pid=6203 comm="syz.1.1044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1030.153038][ T30] audit: type=1400 audit(1029.790:183): avc: denied { write } for pid=6209 comm="syz.1.1047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1030.353809][ T6213] serio: Serial port pts1 [ 1038.185534][ T6227] serio: Serial port pts0 [ 1042.184596][ T6242] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6242 comm=syz.0.1057 [ 1043.476468][ T6249] serio: Serial port pts0 [ 1047.519943][ T6265] netlink: 'syz.1.1064': attribute type 12 has an invalid length. [ 1047.551396][ T6265] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6265 comm=syz.1.1064 [ 1064.190662][ T6289] serio: Serial port pts0 [ 1066.680648][ T6301] serio: Serial port pts0 [ 1067.358433][ T6305] serio: Serial port pts1 [ 1073.920930][ T6328] serio: Serial port pts0 [ 1082.505992][ T30] audit: type=1400 audit(1082.140:184): avc: denied { create } for pid=6333 comm="syz.0.1084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1082.518928][ T30] audit: type=1400 audit(1082.160:185): avc: denied { ioctl } for pid=6333 comm="syz.0.1084" path="socket:[13469]" dev="sockfs" ino=13469 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1082.903803][ T30] audit: type=1400 audit(1082.540:186): avc: denied { ioctl } for pid=6336 comm="syz.0.1085" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=13062 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1083.208660][ T6340] serio: Serial port pts1 [ 1094.933380][ T6359] serio: Serial port pts0 [ 1101.635439][ T6373] serio: Serial port pts1 [ 1111.001606][ T6382] serio: Serial port pts0 [ 1130.501056][ T6437] serio: Serial port pts0 [ 1135.068082][ T6443] serio: Serial port pts1 [ 1145.758038][ T6449] serio: Serial port pts0 [ 1150.285462][ T6470] serio: Serial port pts0 [ 1155.972088][ T6488] serio: Serial port pts0 [ 1173.940952][ T6509] serio: Serial port pts0 [ 1177.498568][ T30] audit: type=1400 audit(1177.130:187): avc: denied { read } for pid=6512 comm="syz.0.1142" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1177.499743][ T30] audit: type=1400 audit(1177.140:188): avc: denied { open } for pid=6512 comm="syz.0.1142" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1180.574925][ T30] audit: type=1400 audit(1180.210:189): avc: denied { name_bind } for pid=6524 comm="syz.0.1146" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1183.530043][ T6528] serio: Serial port pts1 [ 1190.578135][ T6541] serio: Serial port pts0 [ 1198.853893][ T6556] serio: Serial port pts0 [ 1200.306016][ T30] audit: type=1400 audit(1199.940:190): avc: denied { accept } for pid=6561 comm="syz.0.1157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1201.064275][ T6571] serio: Serial port pts0 [ 1205.024245][ T6586] serio: Serial port pts0 [ 1205.467851][ T6588] serio: Serial port pts1 [ 1211.994872][ T6607] sch_tbf: burst 4398 is lower than device lo mtu (65550) ! [ 1212.975171][ T6613] serio: Serial port pts0 [ 1217.988506][ T6515] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 1218.026827][ T6636] serio: Serial port pts0 [ 1218.168683][ T6515] usb 1-1: Using ep0 maxpacket: 16 [ 1218.192969][ T6515] usb 1-1: config 0 has an invalid interface number: 41 but max is 0 [ 1218.193533][ T6515] usb 1-1: config 0 has no interface number 0 [ 1218.194039][ T6515] usb 1-1: config 0 interface 41 altsetting 2 bulk endpoint 0x4 has invalid maxpacket 16 [ 1218.194494][ T6515] usb 1-1: config 0 interface 41 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 64 [ 1218.194706][ T6515] usb 1-1: config 0 interface 41 has no altsetting 0 [ 1218.234372][ T6515] usb 1-1: New USB device found, idVendor=0fe6, idProduct=9800, bcdDevice=d1.9a [ 1218.234863][ T6515] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1218.235234][ T6515] usb 1-1: Product: syz [ 1218.235444][ T6515] usb 1-1: Manufacturer: syz [ 1218.235651][ T6515] usb 1-1: SerialNumber: syz [ 1218.263392][ T6515] usb 1-1: config 0 descriptor?? [ 1218.275222][ T6633] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1218.326316][ T6633] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1218.572912][ T6633] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1218.582755][ T6633] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1218.870312][ T6515] CoreChips 1-1:0.41 (unnamed net_device) (uninitialized): set LINK LED failed : -71 [ 1218.875317][ T6515] CoreChips 1-1:0.41: probe with driver CoreChips failed with error -71 [ 1219.059198][ T6515] usb 1-1: USB disconnect, device number 4 [ 1220.279571][ T6648] serio: Serial port pts0 [ 1226.075051][ T30] audit: type=1400 audit(1225.710:191): avc: denied { setopt } for pid=6674 comm="syz.0.1191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1226.083093][ T30] audit: type=1400 audit(1225.710:192): avc: denied { connect } for pid=6674 comm="syz.0.1191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1226.455350][ T6677] serio: Serial port pts0 [ 1226.605956][ T30] audit: type=1400 audit(1226.240:193): avc: denied { write } for pid=6674 comm="syz.0.1191" path="socket:[14618]" dev="sockfs" ino=14618 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1227.636708][ T30] audit: type=1400 audit(1227.270:194): avc: denied { ioctl } for pid=6674 comm="syz.0.1191" path="socket:[14618]" dev="sockfs" ino=14618 ioctlcmd=0x9365 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1228.483132][ T6686] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6686 comm=syz.1.1193 [ 1229.138504][ T6692] serio: Serial port pts0 [ 1229.364286][ T6694] serio: Serial port pts1 [ 1230.911449][ T6701] serio: Serial port pts0 [ 1244.786100][ T6743] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=637 sclass=netlink_route_socket pid=6743 comm=syz.0.1209 [ 1244.977863][ T6745] serio: Serial port pts1 [ 1247.345676][ T6758] serio: Serial port pts0 [ 1249.367755][ T6772] serio: Serial port pts0 [ 1252.841743][ T6784] serio: Serial port pts0 [ 1254.117543][ T6792] serio: Serial port pts1 [ 1256.127780][ T6802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=637 sclass=netlink_route_socket pid=6802 comm=syz.1.1227 [ 1256.412417][ T6804] serio: Serial port pts0 [ 1261.372971][ T30] audit: type=1400 audit(1261.010:195): avc: denied { ioctl } for pid=6809 comm="syz.0.1229" path="socket:[14806]" dev="sockfs" ino=14806 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1266.438179][ T6823] serio: Serial port pts1 [ 1268.860699][ T6831] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1236'. [ 1271.551404][ T6842] serio: Serial port pts0 [ 1275.216114][ T30] audit: type=1400 audit(1274.850:196): avc: denied { write } for pid=6862 comm="syz.1.1245" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1275.278136][ T30] audit: type=1400 audit(1274.910:197): avc: denied { unmount } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1275.869824][ T30] audit: type=1400 audit(1275.500:198): avc: denied { mount } for pid=6867 comm="syz.0.1247" name="/" dev="ramfs" ino=14123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1275.943421][ T30] audit: type=1400 audit(1275.570:199): avc: denied { execute } for pid=6867 comm="syz.0.1247" path="/file1" dev="ramfs" ino=14898 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=file permissive=1 [ 1278.868136][ T30] audit: type=1400 audit(1278.500:200): avc: denied { read } for pid=6882 comm="syz.1.1251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1283.165193][ T6897] serio: Serial port pts0 [ 1285.198100][ T6903] serio: Serial port pts0 [ 1289.630213][ T6917] serio: Serial port pts0 [ 1292.513167][ T30] audit: type=1400 audit(1292.150:201): avc: denied { setopt } for pid=6925 comm="syz.0.1262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1303.440108][ T6951] serio: Serial port pts0 [ 1309.919104][ T6980] serio: Serial port pts0 [ 1312.079414][ T30] audit: type=1400 audit(1311.710:202): avc: denied { create } for pid=6975 comm="syz.0.1277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1312.454910][ T6989] serio: Serial port pts0 [ 1318.084854][ T7004] serio: Serial port pts0 [ 1319.327965][ T7016] serio: Serial port pts1 [ 1323.757808][ T3444] usb 1-1: new full-speed USB device number 5 using dummy_hcd [ 1323.964543][ T3444] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1324.045958][ T3444] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1324.046844][ T3444] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1324.050050][ T3444] usb 1-1: Product: syz [ 1324.052161][ T3444] usb 1-1: Manufacturer: syz [ 1324.052627][ T3444] usb 1-1: SerialNumber: syz [ 1324.733233][ T3444] usblp 1-1:1.0: usblp0: USB Unidirectional printer dev 5 if 0 alt 253 proto 1 vid 0x0525 pid 0xA4A8 [ 1328.284563][ T30] audit: type=1400 audit(1327.920:203): avc: denied { read write } for pid=7035 comm="syz.0.1296" name="lp0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:printer_device_t tclass=chr_file permissive=1 [ 1328.295445][ T30] audit: type=1400 audit(1327.930:204): avc: denied { open } for pid=7035 comm="syz.0.1296" path="/dev/usb/lp0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:printer_device_t tclass=chr_file permissive=1 [ 1330.161874][ C0] usblp0: nonzero write bulk status received: -71 [ 1330.174198][ T3396] usb 1-1: USB disconnect, device number 5 [ 1330.233895][ T3396] usblp0: removed [ 1331.937417][ T30] audit: type=1326 audit(1331.560:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7049 comm="syz.0.1300" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff9c35b728 code=0x0 [ 1335.895378][ T7066] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1335.903188][ T7066] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1336.424686][ T30] audit: type=1400 audit(1336.060:206): avc: denied { write } for pid=7070 comm="syz.1.1306" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1337.240893][ T30] audit: type=1400 audit(1336.880:207): avc: denied { connect } for pid=7074 comm="syz.1.1308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1340.568430][ T7089] serio: Serial port pts0 [ 1344.465228][ T30] audit: type=1400 audit(1344.100:208): avc: denied { ioctl } for pid=7102 comm="syz.1.1317" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1345.389426][ T7114] serio: Serial port pts0 [ 1348.114409][ T7129] serio: Serial port pts0 [ 1352.816496][ T30] audit: type=1400 audit(1352.450:209): avc: denied { create } for pid=7144 comm="syz.0.1331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1358.198718][ T3445] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 1358.230547][ T30] audit: type=1400 audit(1357.870:210): avc: denied { ioctl } for pid=7169 comm="syz.1.1340" path="socket:[15579]" dev="sockfs" ino=15579 ioctlcmd=0x125f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1358.378185][ T3445] usb 1-1: Using ep0 maxpacket: 16 [ 1358.427743][ T3445] usb 1-1: config 0 has an invalid interface number: 251 but max is 0 [ 1358.429096][ T3445] usb 1-1: config 0 has no interface number 0 [ 1358.430206][ T3445] usb 1-1: config 0 interface 251 altsetting 0 bulk endpoint 0x4 has invalid maxpacket 16 [ 1358.432191][ T3445] usb 1-1: config 0 interface 251 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 64 [ 1358.477761][ T3445] usb 1-1: New USB device found, idVendor=0b95, idProduct=172a, bcdDevice=f7.f4 [ 1358.479202][ T3445] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1358.480291][ T3445] usb 1-1: Product: syz [ 1358.481600][ T3445] usb 1-1: Manufacturer: syz [ 1358.482891][ T3445] usb 1-1: SerialNumber: syz [ 1358.542767][ T3445] usb 1-1: config 0 descriptor?? [ 1358.550302][ T7168] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1358.551418][ T7168] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1358.814950][ T7168] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1358.822975][ T7168] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1359.049203][ T3445] asix 1-1:0.251 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -32 [ 1359.052527][ T3445] asix 1-1:0.251 (unnamed net_device) (uninitialized): Failed to read MAC address: -32 [ 1359.053022][ T30] audit: type=1400 audit(1358.690:211): avc: denied { create } for pid=7167 comm="syz.0.1339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1359.062741][ T3445] asix 1-1:0.251: probe with driver asix failed with error -5 [ 1359.153684][ T3445] usb 1-1: USB disconnect, device number 6 [ 1359.525190][ T30] audit: type=1400 audit(1359.160:212): avc: denied { write } for pid=7175 comm="syz.0.1342" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1360.489811][ T30] audit: type=1400 audit(1360.130:213): avc: denied { create } for pid=7182 comm="syz.1.1345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1365.574578][ T30] audit: type=1400 audit(1365.200:214): avc: denied { accept } for pid=7198 comm="syz.0.1350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 1370.478916][ T7207] 8021q: VLANs not supported on ip_vti0 [ 1382.332547][ T30] audit: type=1400 audit(1381.970:215): avc: denied { read write } for pid=7237 comm="syz.0.1363" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1382.342362][ T30] audit: type=1400 audit(1381.980:216): avc: denied { open } for pid=7237 comm="syz.0.1363" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1382.406127][ T30] audit: type=1400 audit(1382.040:217): avc: denied { ioctl } for pid=7237 comm="syz.0.1363" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4521 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1382.890595][ T30] audit: type=1400 audit(1382.530:218): avc: denied { write } for pid=7243 comm="syz.1.1366" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1382.896549][ T30] audit: type=1400 audit(1382.530:219): avc: denied { setattr } for pid=7243 comm="syz.1.1366" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1383.142406][ T30] audit: type=1400 audit(1382.780:220): avc: denied { read } for pid=7245 comm="syz.1.1367" path="socket:[15712]" dev="sockfs" ino=15712 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1384.662133][ T7255] serio: Serial port pts0 [ 1386.828506][ T30] audit: type=1400 audit(1386.460:221): avc: denied { accept } for pid=7268 comm="syz.1.1372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1386.853051][ T30] audit: type=1400 audit(1386.490:222): avc: denied { write } for pid=7268 comm="syz.1.1372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1389.481612][ T30] audit: type=1400 audit(1389.120:223): avc: denied { read } for pid=7279 comm="syz.0.1375" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1389.484002][ T30] audit: type=1400 audit(1389.120:224): avc: denied { open } for pid=7279 comm="syz.0.1375" path="net:[4026532631]" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1389.853933][ T30] audit: type=1400 audit(1389.490:225): avc: denied { ioctl } for pid=7284 comm="syz.0.1377" path="socket:[16498]" dev="sockfs" ino=16498 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1389.854937][ T7285] 8021q: VLANs not supported on sit0 [ 1390.141612][ T7287] 8021q: VLANs not supported on gre0 [ 1391.556200][ T30] audit: type=1400 audit(1391.190:226): avc: denied { append } for pid=7295 comm="syz.0.1382" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1392.340985][ T30] audit: type=1400 audit(1391.980:227): avc: denied { bind } for pid=7300 comm="syz.1.1384" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1392.348569][ T30] audit: type=1400 audit(1391.980:228): avc: denied { node_bind } for pid=7300 comm="syz.1.1384" saddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1392.539812][ T30] audit: type=1400 audit(1392.180:229): avc: denied { ioctl } for pid=7303 comm="syz.1.1385" path="socket:[15800]" dev="sockfs" ino=15800 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1392.651645][ T30] audit: type=1400 audit(1392.290:230): avc: denied { append } for pid=7305 comm="syz.0.1386" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1392.681061][ T7304] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7304 comm=syz.1.1385 [ 1396.343826][ T30] audit: type=1400 audit(1395.980:231): avc: denied { listen } for pid=7332 comm="syz.1.1396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1397.177910][ T30] audit: type=1400 audit(1396.810:232): avc: denied { ioctl } for pid=7339 comm="syz.1.1397" path="socket:[15862]" dev="sockfs" ino=15862 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1397.406681][ T30] audit: type=1400 audit(1397.040:233): avc: denied { ioctl } for pid=7342 comm="syz.0.1398" path="socket:[16575]" dev="sockfs" ino=16575 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1397.451378][ T30] audit: type=1400 audit(1397.090:234): avc: denied { getopt } for pid=7342 comm="syz.0.1398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1397.454114][ T7343] 8021q: VLANs not supported on vxcan1 [ 1398.778665][ T30] audit: type=1400 audit(1398.410:235): avc: denied { map } for pid=7356 comm="syz.0.1404" path="socket:[15884]" dev="sockfs" ino=15884 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1400.489012][ T7363] batadv_slave_1: entered promiscuous mode [ 1400.541044][ T7362] batadv_slave_1: left promiscuous mode [ 1401.152785][ T30] audit: type=1400 audit(1400.790:236): avc: denied { open } for pid=7365 comm="syz.0.1408" path="/dev/ptyq4" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1401.165548][ T30] audit: type=1400 audit(1400.800:237): avc: denied { ioctl } for pid=7365 comm="syz.0.1408" path="/dev/ptyq4" dev="devtmpfs" ino=115 ioctlcmd=0x541c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1402.889397][ T7374] serio: Serial port pts0 [ 1405.304381][ T30] audit: type=1400 audit(1404.940:238): avc: denied { read } for pid=7384 comm="syz.1.1415" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1405.306672][ T30] audit: type=1400 audit(1404.940:239): avc: denied { open } for pid=7384 comm="syz.1.1415" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1405.385371][ T30] audit: type=1400 audit(1405.020:240): avc: denied { ioctl } for pid=7384 comm="syz.1.1415" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x330e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1408.663473][ T7396] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1408.673242][ T7396] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1408.704530][ T30] audit: type=1400 audit(1408.340:241): avc: denied { bind } for pid=7395 comm="syz.1.1419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1410.355508][ T7404] input: syz1 as /devices/virtual/input/input1 [ 1414.512313][ T30] audit: type=1400 audit(1414.150:242): avc: denied { shutdown } for pid=7429 comm="syz.1.1432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1439.332723][ T30] audit: type=1400 audit(1438.970:243): avc: denied { ioctl } for pid=7542 comm="syz.0.1472" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x6615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1442.791891][ T7555] 8021q: VLANs not supported on gre0 [ 1443.415123][ T7559] serio: Serial port pts0 [ 1452.876552][ T7573] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1452.882371][ T7573] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1452.895642][ T7573] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1452.900934][ T7573] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1471.864955][ T30] audit: type=1400 audit(1471.500:244): avc: denied { getopt } for pid=7618 comm="syz.1.1497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1473.472083][ T30] audit: type=1400 audit(1473.110:245): avc: denied { setopt } for pid=7624 comm="syz.1.1499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1485.505986][ T7659] serio: Serial port pts0 [ 1493.789425][ T30] audit: type=1400 audit(1493.430:246): avc: denied { ioctl } for pid=7683 comm="syz.0.1516" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1494.045684][ T7686] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1506.904119][ T7741] 8021q: VLANs not supported on wg2 [ 1518.593389][ T30] audit: type=1400 audit(1518.230:247): avc: denied { getopt } for pid=7784 comm="syz.1.1556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1518.600075][ T30] audit: type=1400 audit(1518.240:248): avc: denied { write } for pid=7784 comm="syz.1.1556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1523.573161][ T7806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7806 comm=syz.0.1566 [ 1533.456168][ T30] audit: type=1400 audit(1533.090:249): avc: denied { append } for pid=7841 comm="syz.0.1578" name="pfkey" dev="proc" ino=4026532717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1533.468133][ T30] audit: type=1400 audit(1533.100:250): avc: denied { append } for pid=7841 comm="syz.0.1578" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1533.475434][ T30] audit: type=1400 audit(1533.110:251): avc: denied { ioctl } for pid=7841 comm="syz.0.1578" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1533.858275][ T30] audit: type=1400 audit(1533.490:252): avc: denied { read write } for pid=3311 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1586 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.860902][ T30] audit: type=1400 audit(1533.500:253): avc: denied { open } for pid=3311 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1586 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.868000][ T30] audit: type=1400 audit(1533.500:254): avc: denied { ioctl } for pid=3311 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1586 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1536.882857][ T7873] input: syz0 as /devices/virtual/input/input2 [ 1538.493243][ T30] audit: type=1400 audit(1538.130:255): avc: denied { create } for pid=7882 comm="syz.1.1596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1539.151960][ T30] audit: type=1400 audit(1538.790:256): avc: denied { append } for pid=7890 comm="syz.0.1597" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1544.106451][ T7915] serio: Serial port pts0 [ 1548.992303][ T30] audit: type=1400 audit(1548.550:257): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1548.992967][ T30] audit: type=1400 audit(1548.550:258): avc: denied { open } for pid=3310 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1548.993458][ T30] audit: type=1400 audit(1548.560:259): avc: denied { ioctl } for pid=3310 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1552.378008][ T30] audit: type=1400 audit(1552.010:260): avc: denied { read } for pid=7933 comm="syz.1.1613" dev="nsfs" ino=4026532693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1552.383553][ T30] audit: type=1400 audit(1552.020:261): avc: denied { open } for pid=7933 comm="syz.1.1613" path="net:[4026532693]" dev="nsfs" ino=4026532693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1560.319328][ T30] audit: type=1400 audit(1559.950:262): avc: denied { read } for pid=7954 comm="syz.0.1619" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1560.344433][ T30] audit: type=1400 audit(1559.980:263): avc: denied { open } for pid=7954 comm="syz.0.1619" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1560.378764][ T30] audit: type=1400 audit(1560.010:264): avc: denied { ioctl } for pid=7954 comm="syz.0.1619" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1561.892074][ T30] audit: type=1400 audit(1561.530:265): avc: denied { read write } for pid=7962 comm="syz.0.1621" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1561.898592][ T30] audit: type=1400 audit(1561.530:266): avc: denied { open } for pid=7962 comm="syz.0.1621" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1561.909842][ T30] audit: type=1400 audit(1561.540:267): avc: denied { ioctl } for pid=7962 comm="syz.0.1621" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1562.157870][ T3444] usb 1-1: new low-speed USB device number 7 using dummy_hcd [ 1562.370055][ T3444] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 16, setting to 8 [ 1562.371781][ T3444] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 1562.478553][ T3444] usb 1-1: New USB device found, idVendor=20d6, idProduct=cb17, bcdDevice= 0.40 [ 1562.479899][ T3444] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1562.481213][ T3444] usb 1-1: Product: 돏묃ﳟ峙欒뙌孶㆟⮔糏僥☓否曌㱡脥ᴐ艩Ĩ摞⤧᷏䞌䢷㘘ˑꬬ騰熺古撢㱅㯧ᖜ拊㍈ᾰ雙관㥬얓限腳옡瞪菶ꄊ퇁❗︖쪋읹ⓟ醝 [ 1562.482835][ T3444] usb 1-1: SerialNumber: 偉幷ﬖ咄胦俿攤ᬮ浡儽喈̩摞ᐯ耵灧禥ﵸ栴餓昹튝ꝱ㙕銚›絘骷錺믕梠섔ﬞ㶪♚ḃ龍ꧻ蝀貀⍅薿㣷쯩旉凿臌絣幚ㅑἌ஭ዪ⫓㍂蹧Ƒ啠๴鱅ឨ釤猫⛟ꩳ䙊↙⢺녨券搟㩰硻䖹籈璶奵宔鉟 [ 1562.534760][ T7963] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1562.789570][ T30] audit: type=1400 audit(1562.430:268): avc: denied { create } for pid=7962 comm="syz.0.1621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1562.796703][ T30] audit: type=1400 audit(1562.430:269): avc: denied { module_request } for pid=7962 comm="syz.0.1621" kmod="net-pf-2-proto-0-type-3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1563.357834][ T30] audit: type=1400 audit(1562.980:270): avc: denied { create } for pid=7962 comm="syz.0.1621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1563.375261][ T30] audit: type=1400 audit(1563.010:271): avc: denied { write } for pid=7962 comm="syz.0.1621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1563.836428][ T3444] usbhid 1-1:1.0: can't add hid device: -71 [ 1563.840755][ T3444] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 1563.876329][ T3444] usb 1-1: USB disconnect, device number 7 [ 1565.681085][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 1565.682101][ T30] audit: type=1400 audit(1565.320:279): avc: denied { allowed } for pid=7976 comm="syz.0.1626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1565.757939][ T30] audit: type=1400 audit(1565.380:280): avc: denied { sqpoll } for pid=7976 comm="syz.0.1626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1565.773845][ T30] audit: type=1400 audit(1565.410:281): avc: denied { create } for pid=7976 comm="syz.0.1626" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1565.781481][ T30] audit: type=1400 audit(1565.420:282): avc: denied { map } for pid=7976 comm="syz.0.1626" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=18832 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1565.785376][ T30] audit: type=1400 audit(1565.420:283): avc: denied { read write } for pid=7976 comm="syz.0.1626" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=18832 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1566.374682][ T30] audit: type=1400 audit(1566.010:284): avc: denied { name_bind } for pid=7980 comm="syz.0.1627" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1566.376502][ T30] audit: type=1400 audit(1566.010:285): avc: denied { node_bind } for pid=7980 comm="syz.0.1627" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1569.140304][ T30] audit: type=1400 audit(1568.780:286): avc: denied { read } for pid=7984 comm="syz.0.1628" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1569.142365][ T30] audit: type=1400 audit(1568.780:287): avc: denied { open } for pid=7984 comm="syz.0.1628" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1569.159348][ T30] audit: type=1400 audit(1568.790:288): avc: denied { ioctl } for pid=7984 comm="syz.0.1628" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1570.874679][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1570.887599][ T30] audit: type=1400 audit(1570.510:293): avc: denied { sys_module } for pid=7990 comm="syz.0.1631" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1571.543104][ T30] audit: type=1400 audit(1571.180:294): avc: denied { prog_load } for pid=7995 comm="syz.0.1632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1571.543720][ T30] audit: type=1400 audit(1571.180:295): avc: denied { perfmon } for pid=7995 comm="syz.0.1632" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1571.561885][ T30] audit: type=1400 audit(1571.200:296): avc: denied { read } for pid=7995 comm="syz.0.1632" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1571.571673][ T30] audit: type=1400 audit(1571.210:297): avc: denied { open } for pid=7995 comm="syz.0.1632" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1576.532683][ T30] audit: type=1400 audit(1576.170:298): avc: denied { map } for pid=8007 comm="syz.0.1636" path="socket:[18073]" dev="sockfs" ino=18073 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 1577.386261][ T30] audit: type=1400 audit(1577.010:299): avc: denied { create } for pid=8011 comm="syz.1.1638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1579.945017][ T30] audit: type=1400 audit(1579.580:300): avc: denied { ioctl } for pid=8017 comm="syz.1.1639" path="socket:[18923]" dev="sockfs" ino=18923 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1579.965360][ T30] audit: type=1400 audit(1579.600:301): avc: denied { setopt } for pid=8017 comm="syz.1.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1584.579826][ T8035] serio: Serial port pts0 [ 1586.399236][ T30] audit: type=1400 audit(1586.040:302): avc: denied { open } for pid=8042 comm="syz.1.1646" path="/dev/ptyq7" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1592.853742][ T30] audit: type=1400 audit(1592.490:303): avc: denied { audit_write } for pid=8061 comm="syz.1.1649" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1594.432192][ T8069] serio: Serial port pts0 [ 1601.175060][ T30] audit: type=1400 audit(1600.810:304): avc: denied { execmem } for pid=8081 comm="syz.0.1653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1608.992354][ T8095] serio: Serial port pts0 [ 1611.987989][ T30] audit: type=1400 audit(1611.620:305): avc: denied { create } for pid=8101 comm="syz.1.1658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1612.001061][ T30] audit: type=1400 audit(1611.640:306): avc: denied { connect } for pid=8101 comm="syz.1.1658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1614.681912][ T30] audit: type=1400 audit(1614.310:307): avc: denied { name_bind } for pid=8106 comm="syz.1.1659" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1615.491491][ T30] audit: type=1400 audit(1615.130:308): avc: denied { create } for pid=8114 comm="syz.0.1662" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1615.545095][ T30] audit: type=1400 audit(1615.180:309): avc: denied { write } for pid=8114 comm="syz.0.1662" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1616.131901][ T30] audit: type=1400 audit(1615.770:310): avc: denied { create } for pid=8119 comm="syz.1.1664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1616.156816][ T30] audit: type=1400 audit(1615.790:311): avc: denied { ioctl } for pid=8119 comm="syz.1.1664" path="socket:[18239]" dev="sockfs" ino=18239 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1616.185832][ T30] audit: type=1400 audit(1615.820:312): avc: denied { bind } for pid=8119 comm="syz.1.1664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1616.199469][ T30] audit: type=1400 audit(1615.830:313): avc: denied { write } for pid=8119 comm="syz.1.1664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1616.436780][ T30] audit: type=1400 audit(1616.070:314): avc: denied { map_read map_write } for pid=8117 comm="syz.0.1663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1618.588177][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1618.591338][ T30] audit: type=1400 audit(1618.220:317): avc: denied { write } for pid=8130 comm="syz.1.1669" name="unix" dev="proc" ino=4026532741 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1620.564447][ T30] audit: type=1400 audit(1620.200:318): avc: denied { create } for pid=8150 comm="syz.0.1675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1621.223584][ T8155] serio: Serial port pts0 [ 1623.215444][ T30] audit: type=1400 audit(1622.850:319): avc: denied { prog_run } for pid=8159 comm="syz.1.1677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1623.944348][ T8162] wireguard0: entered promiscuous mode [ 1623.948865][ T8162] wireguard0: entered allmulticast mode [ 1627.456557][ T30] audit: type=1400 audit(1627.090:320): avc: denied { write } for pid=8180 comm="syz.0.1682" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1627.481937][ T30] audit: type=1400 audit(1627.120:321): avc: denied { open } for pid=8180 comm="syz.0.1682" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1627.483192][ T30] audit: type=1400 audit(1627.120:322): avc: denied { ioctl } for pid=8180 comm="syz.0.1682" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x6423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1627.512445][ T30] audit: type=1400 audit(1627.130:323): avc: denied { read write } for pid=8180 comm="syz.0.1682" name="rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1627.513006][ T30] audit: type=1400 audit(1627.130:324): avc: denied { open } for pid=8180 comm="syz.0.1682" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1627.610355][ T30] audit: type=1400 audit(1627.240:325): avc: denied { write } for pid=8180 comm="syz.0.1682" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1628.698682][ T30] audit: type=1400 audit(1628.330:326): avc: denied { setattr } for pid=8186 comm="syz.1.1686" name="" dev="pipefs" ino=19168 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1628.791067][ T30] audit: type=1400 audit(1628.410:327): avc: denied { ioctl } for pid=8186 comm="syz.1.1686" path="socket:[19169]" dev="sockfs" ino=19169 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1628.918791][ T30] audit: type=1400 audit(1628.550:328): avc: denied { execute } for pid=8187 comm="syz.0.1685" name="file1" dev="tmpfs" ino=4926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1628.926423][ T30] audit: type=1400 audit(1628.560:329): avc: denied { execute_no_trans } for pid=8187 comm="syz.0.1685" path="/872/file1" dev="tmpfs" ino=4926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1634.123226][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 1634.124343][ T30] audit: type=1400 audit(1633.760:337): avc: denied { ioctl } for pid=8216 comm="syz.1.1697" path="net:[4026532693]" dev="nsfs" ino=4026532693 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1634.138833][ T30] audit: type=1400 audit(1633.770:338): avc: denied { write } for pid=8216 comm="syz.1.1697" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1637.032501][ T30] audit: type=1400 audit(1636.670:339): avc: denied { create } for pid=8232 comm="syz.1.1701" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1637.058974][ T30] audit: type=1400 audit(1636.690:340): avc: denied { create } for pid=8232 comm="syz.1.1701" name="file5" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1637.206860][ T30] audit: type=1400 audit(1636.840:341): avc: denied { unlink } for pid=3310 comm="syz-executor" name="file5" dev="tmpfs" ino=4690 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1637.242973][ T30] audit: type=1400 audit(1636.880:342): avc: denied { unlink } for pid=3310 comm="syz-executor" name="file0" dev="tmpfs" ino=4685 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1637.499486][ T8236] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1643.422082][ T30] audit: type=1400 audit(1643.060:343): avc: denied { create } for pid=8271 comm="syz.0.1709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1643.443844][ T30] audit: type=1400 audit(1643.070:344): avc: denied { write } for pid=8271 comm="syz.0.1709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1643.818300][ T30] audit: type=1400 audit(1643.450:345): avc: denied { getopt } for pid=8271 comm="syz.0.1709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1644.959358][ T30] audit: type=1400 audit(1644.600:346): avc: denied { setattr } for pid=8280 comm="syz.1.1713" name="zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 1645.154763][ T8283] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1714'. [ 1645.498902][ T30] audit: type=1400 audit(1645.130:347): avc: denied { create } for pid=8287 comm="syz.1.1716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1645.504347][ T30] audit: type=1400 audit(1645.140:348): avc: denied { getopt } for pid=8287 comm="syz.1.1716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1645.762603][ T30] audit: type=1400 audit(1645.400:349): avc: denied { read } for pid=8289 comm="syz.1.1717" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1645.766801][ T30] audit: type=1400 audit(1645.400:350): avc: denied { open } for pid=8289 comm="syz.1.1717" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1645.772385][ T30] audit: type=1400 audit(1645.410:351): avc: denied { ioctl } for pid=8289 comm="syz.1.1717" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x1279 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1646.624780][ T8298] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1646.642949][ T8298] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1647.092187][ T30] audit: type=1400 audit(1646.730:352): avc: denied { read write } for pid=8299 comm="syz.1.1722" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1651.285050][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1651.289513][ T30] audit: type=1400 audit(1650.920:355): avc: denied { setopt } for pid=8322 comm="syz.0.1733" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1652.395653][ T30] audit: type=1400 audit(1652.030:356): avc: denied { create } for pid=8329 comm="syz.0.1737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1652.434361][ T30] audit: type=1400 audit(1652.070:357): avc: denied { getopt } for pid=8329 comm="syz.0.1737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1652.993232][ T30] audit: type=1400 audit(1652.630:358): avc: denied { getopt } for pid=8332 comm="syz.1.1738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1653.022861][ T30] audit: type=1400 audit(1652.630:359): avc: denied { ioctl } for pid=8333 comm="syz.0.1739" path="socket:[19611]" dev="sockfs" ino=19611 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1654.398722][ T30] audit: type=1400 audit(1654.030:360): avc: denied { read } for pid=8343 comm="syz.1.1743" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1657.809369][ T8361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8361 comm=syz.0.1747 [ 1660.022982][ T8383] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1660.208767][ T8349] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 1661.114892][ T8394] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1662.349030][ T8405] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1665.286830][ T8435] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1674.706797][ T8484] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1678.822487][ T30] audit: type=1400 audit(1678.360:361): avc: denied { create } for pid=8505 comm="syz.0.1812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1681.478384][ T30] audit: type=1400 audit(1681.110:362): avc: denied { create } for pid=8514 comm="syz.0.1815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1681.594325][ T30] audit: type=1400 audit(1681.230:363): avc: denied { setopt } for pid=8514 comm="syz.0.1815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1684.419527][ T30] audit: type=1400 audit(1684.060:364): avc: denied { read } for pid=8535 comm="syz.1.1824" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1684.425196][ T30] audit: type=1400 audit(1684.060:365): avc: denied { open } for pid=8535 comm="syz.1.1824" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1684.444308][ T30] audit: type=1400 audit(1684.070:366): avc: denied { ioctl } for pid=8535 comm="syz.1.1824" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1688.407980][ T30] audit: type=1400 audit(1688.040:367): avc: denied { setopt } for pid=8568 comm="syz.1.1835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1692.680423][ T8560] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 1695.524459][ T8604] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1701.188705][ T8622] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1702.339933][ T8634] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1702.983023][ T30] audit: type=1400 audit(1702.620:368): avc: denied { setopt } for pid=8639 comm="syz.1.1860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1703.926058][ T8647] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1709.455262][ T30] audit: type=1400 audit(1709.090:369): avc: denied { getopt } for pid=8672 comm="syz.1.1871" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1711.661835][ T8689] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1712.985084][ T8702] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1719.272743][ T30] audit: type=1400 audit(1718.900:370): avc: denied { lock } for pid=8731 comm="syz.1.1896" path="socket:[21336]" dev="sockfs" ino=21336 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1720.588242][ T30] audit: type=1400 audit(1720.210:371): avc: denied { getopt } for pid=8743 comm="syz.0.1902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1721.122967][ T30] audit: type=1400 audit(1720.760:372): avc: denied { read } for pid=8745 comm="syz.0.1903" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1721.130545][ T30] audit: type=1400 audit(1720.760:373): avc: denied { open } for pid=8745 comm="syz.0.1903" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1721.143565][ T30] audit: type=1400 audit(1720.780:374): avc: denied { ioctl } for pid=8745 comm="syz.0.1903" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1729.952156][ T30] audit: type=1400 audit(1729.590:375): avc: denied { read write } for pid=8785 comm="syz.0.1916" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1729.952820][ T30] audit: type=1400 audit(1729.590:376): avc: denied { open } for pid=8785 comm="syz.0.1916" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1729.961159][ T30] audit: type=1400 audit(1729.590:377): avc: denied { ioctl } for pid=8785 comm="syz.0.1916" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0xaf73 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1731.162496][ T30] audit: type=1400 audit(1730.800:378): avc: denied { ioctl } for pid=8797 comm="syz.1.1920" path="/dev/ptyq7" dev="devtmpfs" ino=118 ioctlcmd=0x5407 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1732.754330][ T30] audit: type=1400 audit(1732.390:379): avc: denied { write } for pid=8819 comm="syz.1.1927" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1738.623638][ T8853] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8853 comm=syz.1.1941 [ 1739.100560][ T8857] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8857 comm=syz.1.1943 [ 1742.331912][ T30] audit: type=1400 audit(1741.970:380): avc: denied { ioctl } for pid=8885 comm="syz.0.1957" path="socket:[21598]" dev="sockfs" ino=21598 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1744.318488][ T30] audit: type=1400 audit(1743.950:381): avc: denied { create } for pid=8895 comm="syz.0.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1744.344144][ T30] audit: type=1400 audit(1743.980:382): avc: denied { write } for pid=8895 comm="syz.0.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1747.435543][ T8918] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1752.565813][ T8924] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 1753.214456][ T30] audit: type=1400 audit(1752.850:383): avc: denied { setopt } for pid=8966 comm="syz.0.1986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1753.552930][ T30] audit: type=1400 audit(1753.190:384): avc: denied { read } for pid=8954 comm="syz.1.1985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1754.056757][ T30] audit: type=1400 audit(1753.690:385): avc: denied { ioctl } for pid=8973 comm="syz.1.1989" path="socket:[22734]" dev="sockfs" ino=22734 ioctlcmd=0x541a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1757.906131][ T30] audit: type=1400 audit(1757.540:386): avc: denied { getopt } for pid=9005 comm="syz.0.2000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1758.041498][ T30] audit: type=1400 audit(1757.680:387): avc: denied { append } for pid=9007 comm="syz.0.2001" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1758.309458][ T30] audit: type=1400 audit(1757.940:388): avc: denied { setopt } for pid=9009 comm="syz.0.2002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1759.155031][ T30] audit: type=1400 audit(1758.790:389): avc: denied { read write } for pid=9015 comm="syz.0.2005" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1759.159703][ T30] audit: type=1400 audit(1758.800:390): avc: denied { open } for pid=9015 comm="syz.0.2005" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1759.162723][ T8977] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 1759.236101][ T30] audit: type=1400 audit(1758.840:391): avc: denied { ioctl } for pid=9015 comm="syz.0.2005" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1759.865117][ T9024] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9024 comm=syz.0.2008 [ 1760.382521][ T30] audit: type=1400 audit(1760.020:392): avc: denied { ioctl } for pid=9028 comm="syz.0.2010" path="socket:[22795]" dev="sockfs" ino=22795 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1761.376816][ T30] audit: type=1400 audit(1761.010:393): avc: denied { getopt } for pid=9037 comm="syz.1.2013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1761.712084][ T30] audit: type=1400 audit(1761.350:394): avc: denied { setopt } for pid=9041 comm="syz.1.2015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1766.066803][ T30] audit: type=1400 audit(1765.700:395): avc: denied { getopt } for pid=9067 comm="syz.1.2024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1773.027838][ T9084] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 1775.858232][ T30] audit: type=1400 audit(1775.490:396): avc: denied { read } for pid=9116 comm="syz.0.2040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1776.249725][ T30] audit: type=1400 audit(1775.890:397): avc: denied { ioctl } for pid=9118 comm="syz.0.2041" path="socket:[22038]" dev="sockfs" ino=22038 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1776.612192][ T9121] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9121 comm=syz.0.2042 [ 1777.288019][ T30] audit: type=1400 audit(1776.920:398): avc: denied { ioctl } for pid=9124 comm="syz.0.2044" path="socket:[22057]" dev="sockfs" ino=22057 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1779.865098][ T30] audit: type=1400 audit(1779.500:399): avc: denied { getopt } for pid=9154 comm="syz.1.2059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1780.845641][ T30] audit: type=1400 audit(1780.480:400): avc: denied { write } for pid=9164 comm="syz.1.2064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1780.852351][ T30] audit: type=1400 audit(1780.490:401): avc: denied { connect } for pid=9164 comm="syz.1.2064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1780.858750][ T30] audit: type=1400 audit(1780.490:402): avc: denied { name_connect } for pid=9164 comm="syz.1.2064" dest=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1781.126231][ T30] audit: type=1400 audit(1780.760:403): avc: denied { getopt } for pid=9166 comm="syz.1.2065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1782.302077][ T30] audit: type=1400 audit(1781.940:404): avc: denied { read } for pid=9180 comm="syz.0.2070" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1782.304158][ T30] audit: type=1400 audit(1781.940:405): avc: denied { open } for pid=9180 comm="syz.0.2070" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1782.910278][ T30] audit: type=1400 audit(1782.550:406): avc: denied { connect } for pid=9186 comm="syz.0.2073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1784.249803][ T30] audit: type=1400 audit(1783.890:407): avc: denied { write } for pid=9201 comm="syz.1.2079" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1788.391936][ T9195] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 1790.797926][ T30] audit: type=1400 audit(1790.430:408): avc: denied { write } for pid=9233 comm="syz.1.2089" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1790.969287][ T30] audit: type=1400 audit(1790.610:409): avc: denied { write } for pid=9235 comm="syz.0.2090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1790.969555][ T9236] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9236 comm=syz.0.2090 [ 1791.958235][ T30] audit: type=1400 audit(1791.590:410): avc: denied { create } for pid=9249 comm="syz.0.2097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1792.013089][ T30] audit: type=1400 audit(1791.650:411): avc: denied { write } for pid=9249 comm="syz.0.2097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1793.897584][ T30] audit: type=1400 audit(1793.530:412): avc: denied { read } for pid=9273 comm="syz.1.2109" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1793.904207][ T30] audit: type=1400 audit(1793.530:413): avc: denied { open } for pid=9273 comm="syz.1.2109" path="/dev/input/mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1801.241757][ T9292] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 1803.436003][ T30] audit: type=1400 audit(1803.070:414): avc: denied { ioctl } for pid=9321 comm="syz.1.2122" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1805.256469][ T30] audit: type=1400 audit(1804.760:415): avc: denied { lock } for pid=9337 comm="syz.1.2129" path="/dev/dlm-monitor" dev="devtmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1809.290719][ T9373] ------------[ cut here ]------------ [ 1809.292752][ T9373] WARNING: CPU: 0 PID: 9373 at drivers/gpu/drm/vkms/vkms_crtc.c:97 vkms_get_vblank_timestamp+0x128/0x16c [ 1809.295441][ T9373] Modules linked in: [ 1809.298060][ T9373] CPU: 0 UID: 0 PID: 9373 Comm: syz.0.2146 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT [ 1809.300064][ T9373] Hardware name: linux,dummy-virt (DT) [ 1809.301020][ T9373] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1809.301676][ T9373] pc : vkms_get_vblank_timestamp+0x128/0x16c [ 1809.302280][ T9373] lr : vkms_get_vblank_timestamp+0x20/0x16c [ 1809.302821][ T9373] sp : ffff80008ec575e0 [ 1809.303582][ T9373] x29: ffff80008ec575e0 x28: ffff000017c72400 x27: 0000000000000003 [ 1809.304828][ T9373] x26: ffff000014350080 x25: 0000000000000001 x24: 1fffe0000213ed38 [ 1809.305831][ T9373] x23: ffff800085a8b8c0 x22: ffff80008ec577b0 x21: 000001a52cbc46c0 [ 1809.306816][ T9373] x20: ffff000014350080 x19: ffff0000109f6880 x18: 0000000000000001 [ 1809.308089][ T9373] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 [ 1809.309067][ T9373] x14: 0000000000000000 x13: 0000000000000000 x12: ffff80008e7e9000 [ 1809.310061][ T9373] x11: 1fffe00002f8e7a2 x10: ffff600002f8e7a2 x9 : dfff800000000000 [ 1809.311269][ T9373] x8 : 0000000041b58ab3 x7 : ffff700011d8aecc x6 : dfff800000000000 [ 1809.312290][ T9373] x5 : 0000000000000000 x4 : 1fffe0000213ed4a x3 : 0000000000000000 [ 1809.313315][ T9373] x2 : 1fffe0000213ed35 x1 : 0000000000000000 x0 : 000001a52cbc46c0 [ 1809.314646][ T9373] Call trace: [ 1809.315515][ T9373] vkms_get_vblank_timestamp+0x128/0x16c (P) [ 1809.316320][ T9373] drm_crtc_get_last_vbltimestamp+0x140/0x184 [ 1809.317021][ T9373] drm_crtc_next_vblank_start+0x11c/0x244 [ 1809.317737][ T9373] drm_atomic_helper_wait_for_fences+0x184/0x614 [ 1809.318366][ T9373] drm_atomic_helper_commit+0x170/0x2b4 [ 1809.318976][ T9373] drm_atomic_commit+0x18c/0x23c [ 1809.319545][ T9373] drm_client_modeset_commit_atomic+0x4a4/0x5f8 [ 1809.320139][ T9373] drm_client_modeset_commit_locked+0x108/0x3f8 [ 1809.320702][ T9373] drm_client_modeset_commit+0x44/0x74 [ 1809.321246][ T9373] drm_fb_helper_lastclose+0xac/0x188 [ 1809.321795][ T9373] drm_fbdev_client_restore+0x30/0x4c [ 1809.322351][ T9373] drm_client_dev_restore+0x130/0x21c [ 1809.322883][ T9373] drm_release+0x20c/0x2dc [ 1809.323428][ T9373] __fput+0x2c8/0x954 [ 1809.323926][ T9373] ____fput+0x14/0x20 [ 1809.324429][ T9373] task_work_run+0x128/0x210 [ 1809.324933][ T9373] do_notify_resume+0x1d0/0x258 [ 1809.325467][ T9373] el0_svc+0x100/0x180 [ 1809.326148][ T9373] el0t_64_sync_handler+0x10c/0x138 [ 1809.326737][ T9373] el0t_64_sync+0x198/0x19c [ 1809.327776][ T9373] irq event stamp: 1792 [ 1809.328359][ T9373] hardirqs last enabled at (1791): [] exit_to_kernel_mode+0x38/0x118 [ 1809.329147][ T9373] hardirqs last disabled at (1792): [] el1_dbg+0x24/0x9c [ 1809.329797][ T9373] softirqs last enabled at (1784): [] handle_softirqs+0x88c/0xdb4 [ 1809.330494][ T9373] softirqs last disabled at (1775): [] __do_softirq+0x14/0x20 [ 1809.331367][ T9373] ---[ end trace 0000000000000000 ]--- [ 1809.334505][ C0] vkms_vblank_simulate: vblank timer overrun [ 1809.366263][ T30] audit: type=1400 audit(1809.000:416): avc: denied { write } for pid=3305 comm="syz-executor" path="pipe:[3159]" dev="pipefs" ino=3159 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1809.732699][ T9374] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 1810.940569][ T6993] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1811.203916][ T6993] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1811.432170][ T6993] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1811.741582][ T6993] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1812.652447][ T30] audit: type=1400 audit(1812.280:417): avc: denied { read } for pid=3155 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1812.878599][ T30] audit: type=1400 audit(1812.510:418): avc: denied { search } for pid=3155 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1812.889968][ T30] audit: type=1400 audit(1812.520:419): avc: denied { read } for pid=3155 comm="dhcpcd" name="n18" dev="tmpfs" ino=3398 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1812.909011][ T30] audit: type=1400 audit(1812.540:420): avc: denied { open } for pid=3155 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=3398 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1812.929940][ T30] audit: type=1400 audit(1812.560:421): avc: denied { getattr } for pid=3155 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=3398 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1815.816687][ T6993] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1815.920200][ T6993] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1815.985271][ T6993] bond0 (unregistering): Released all slaves [ 1816.289506][ T6993] hsr_slave_0: left promiscuous mode [ 1816.301930][ T6993] hsr_slave_1: left promiscuous mode [ 1816.375714][ T6993] veth1_macvtap: left promiscuous mode [ 1816.377437][ T6993] veth0_macvtap: left promiscuous mode [ 1816.929346][ T30] audit: type=1400 audit(1816.550:422): avc: denied { read } for pid=9386 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=938 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1816.930586][ T30] audit: type=1400 audit(1816.570:423): avc: denied { open } for pid=9386 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=938 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1816.933072][ T30] audit: type=1400 audit(1816.570:424): avc: denied { getattr } for pid=9386 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=938 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1817.040037][ T30] audit: type=1400 audit(1816.660:425): avc: denied { write } for pid=9385 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=937 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1817.050344][ T30] audit: type=1400 audit(1816.680:426): avc: denied { add_name } for pid=9385 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1817.051518][ T30] audit: type=1400 audit(1816.680:427): avc: denied { create } for pid=9385 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1817.052174][ T30] audit: type=1400 audit(1816.680:428): avc: denied { write } for pid=9385 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=3402 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1817.052830][ T30] audit: type=1400 audit(1816.680:429): avc: denied { append } for pid=9385 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=3402 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1817.582310][ T30] audit: type=1400 audit(1817.220:430): avc: denied { remove_name } for pid=9388 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=3402 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1817.588385][ T30] audit: type=1400 audit(1817.220:431): avc: denied { unlink } for pid=9388 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=3402 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1827.566464][ T6993] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1827.631650][ T6993] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1827.685516][ T6993] bond0 (unregistering): Released all slaves [ 1828.000224][ T6993] hsr_slave_0: left promiscuous mode [ 1828.015990][ T6993] hsr_slave_1: left promiscuous mode VM DIAGNOSIS: 00:36:45 Registers: info registers vcpu 0 CPU#0 PC=ffff800081b682f8 X00=0000000000000002 X01=0000000000000000 X02=0000000000000002 X03=dfff800000000000 X04=0000000000000018 X05=ffff800087a16e00 X06=ffff700010f42dc0 X07=0000000000000001 X08=ffff800087a16e00 X09=dfff800000000000 X10=ffff700010f42dc0 X11=1ffff00010f42dc0 X12=ffff700010f42dc1 X13=0000000000008000 X14=363431322e302e7a X15=69617420746f4e20 X16=312e36206465746e X17=2d3663722d302e35 X18=0000000000000402 X19=ffff00000f62e080 X20=ffff80008d43b018 X21=ffff800087a92620 X22=0000000000000030 X23=dfff800000000000 X24=ffff00000f63e06d X25=0000000000000004 X26=ffff00000f62e2d8 X27=ffff00000f62e080 X28=dfff800000000000 X29=ffff80008ec56a40 X30=ffff800081b68584 SP=ffff80008ec56a40 PSTATE=800003c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000008802000000:0000008802000000 Q01=0000000000000000:0000000000000088 Q02=0000000000000000:0000000000000000 Q03=0000000000000028:0000000000000188 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc59d3600:0000ffffc59d3600 Q17=ffffff80ffffffd0:0000ffffc59d35d0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085461f38 X00=00000000000000c0 X01=0000000100000000 X02=ffff8000858006e0 X03=1fffe0000254f3c9 X04=1ffff00011a1de28 X05=0000000000000000 X06=ffff700014378f21 X07=0000000000000000 X08=ffff8000a1bc7958 X09=dfff800000000000 X10=ffff700014378f2a X11=1ffff00014378f2a X12=ffff700014378f2b X13=0000000000000000 X14=ffff00006a0c4568 X15=ffff00006a0c4154 X16=ffff80008d440000 X17=ffff7fffe3066000 X18=0000000000000000 X19=ffff80008705a648 X20=ffff800087dd2178 X21=1ffff00014378f40 X22=ffff8000a1bc7a20 X23=0000000000000000 X24=ffff00001f230000 X25=ffff80008d392780 X26=000000000000123d X27=000000000000123d X28=dfff800000000000 X29=ffff8000a1bc7a00 X30=ffff800080313344 SP=ffff8000a1bc7a00 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=00524f5252450040:0000000000000000 Q05=00524f5252450040:0000000000000000 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc5a729f0:0000ffffc5a729f0 Q17=ffffff80ffffffd0:0000ffffc5a729c0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000