last executing test programs: 23.856932422s ago: executing program 1 (id=3805): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0xfffffdf5) syz_usb_connect(0x0, 0x24, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) 23.249868736s ago: executing program 1 (id=3806): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000c40), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x34, r1, 0x1, 0x0, 0x25dfdbfd, {0x6, 0x0, 0x900}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1=0xe0000002}, @NLBL_UNLABEL_A_SECCTX={0xf, 0x7, 'unconfined\x00'}]}, 0x34}, 0x2, 0x34005, 0x0, 0x40}, 0x4) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_INTERFACE(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)={0x30, r3, 0xc09, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_EXTENDED_ADDR={0xc, 0x17, {0xaaaaaaaaaaaa0002}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x2) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x40810) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000700)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000010000000900010073797a300000000040000000160a01010000000000000000010000000900010073797a30000000000900020073797a300000000014000380080002400000000008000140000000002c000000180a05000000000000000000010000000900010073797a30000000000c0005"], 0xc8}}, 0x4000450) 21.917900548s ago: executing program 1 (id=3808): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x2002, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000001c0)={{0x5000, 0x2, 0x0, 0x8, 0xc6, 0x3, 0x50, 0x9, 0x0, 0x2e, 0x19}, {0x5000, 0x6000, 0x3, 0x0, 0x40, 0x5, 0x9, 0x9, 0x5, 0xef, 0xb, 0x3}, {0xeeef0000, 0xf000, 0xe, 0x5, 0x3, 0x7, 0x3, 0x9, 0x1, 0xa7, 0x5, 0x81}, {0x3000, 0x1, 0x9, 0x3, 0x4, 0x41, 0x1b, 0x2, 0xa, 0x9, 0xe, 0xfc}, {0x3000, 0xd000, 0x8, 0x3, 0x17, 0x7, 0x0, 0x7f, 0x7, 0x83, 0xf7, 0x83}, {0xd000, 0x0, 0x10, 0xa0, 0xb1, 0x8, 0x5, 0xa0, 0xfc, 0xf, 0x1, 0x3f}, {0x5000, 0x100000, 0x4, 0x0, 0x7, 0x5, 0x7, 0x3, 0x6, 0x81, 0xff, 0x70}, {0xf000, 0x3000, 0xe, 0x5, 0x80, 0x7, 0x1, 0x34, 0x2, 0xb, 0xb0, 0x9}, {0xeeef0000, 0x7}, {0x6000, 0x7}, 0xa0060014, 0x0, 0xf000, 0x2024, 0x2, 0x800, 0x3000, [0x8000, 0x4, 0x5d, 0xff]}) 20.566674191s ago: executing program 1 (id=3810): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f00000000c0)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {0x0, 0x2, 0x6, 0xfffa}, 0x7, [0x8000, 0x1, 0xf, 0x8, 0x80, 0x2, 0x3, 0x7f, 0x7f, 0x4d, 0x806, 0x5f, 0x9, 0x5, 0xffff2d37, 0xffffff01, 0x6, 0x3, 0x0, 0x5, 0x4, 0x0, 0x800, 0x3c5b, 0x1, 0x24, 0xd, 0x1, 0x0, 0xffffffff, 0xe661, 0x4, 0x7, 0x3, 0xc, 0x4, 0x80000000, 0x8bd, 0x3, 0xe, 0x0, 0x80008071, 0x8, 0x17, 0x1, 0x7, 0x5, 0x3e, 0x8f, 0x6, 0x6, 0xc57, 0x5, 0x4, 0x8, 0x3ff, 0x80, 0x0, 0x5, 0x6, 0x1, 0x4, 0x10001, 0x40], [0x10000009, 0x9, 0x8000012f, 0x8004, 0x5, 0xfffffff5, 0x129432e6, 0xc8, 0xf9, 0xe, 0x2bf, 0x6ca, 0x9, 0xfffffffc, 0x3, 0x0, 0x0, 0x5, 0x2f, 0xe, 0x312, 0x7c, 0xea4, 0x0, 0x4, 0x7, 0x7fff, 0x6, 0x400, 0x401, 0x6, 0x1, 0xffffffff, 0x5, 0x1000005, 0x0, 0xd, 0x4e4, 0x2, 0x4, 0xb, 0x4, 0x9, 0x9, 0x9, 0x6, 0x47, 0x8000, 0x1, 0xfe000000, 0x7e78, 0x2, 0x4, 0x9, 0x200003, 0x5, 0x9, 0x1, 0x3, 0x3, 0xbc45, 0x48c93690, 0x42, 0x3], [0x7, 0x408, 0x80004, 0x5, 0xfffffffe, 0x100, 0x8d2, 0x9, 0x5, 0x7fff, 0x0, 0x5, 0xb, 0x4, 0x4, 0x5, 0x0, 0x1ef, 0x5, 0x20008, 0x86, 0x3, 0x303c, 0x1, 0xb, 0x5, 0x2, 0x2, 0x3, 0x20000008, 0x4, 0x2, 0x6, 0x38, 0x800003, 0x200, 0x80, 0x3, 0x4, 0x2950bfaf, 0x1000, 0xa2, 0x7, 0xa9, 0x5, 0x6, 0xac8, 0xbf, 0xb, 0x803, 0x7ff, 0x12b, 0x4, 0x1, 0xa, 0x0, 0x5, 0x1c, 0x120000, 0x3, 0x2006, 0x80a2ed, 0x4, 0x25], [0x8, 0x800bb33, 0x7, 0xb, 0x5, 0x938, 0x6, 0xb, 0x0, 0xb9, 0xce7, 0x1ff, 0x2, 0x56, 0xfffffff2, 0x6bd8490e, 0x101, 0x10000, 0x80000001, 0x7fff, 0xffff, 0xa61e, 0x1, 0x5, 0x1, 0xfffffffe, 0x14c, 0x60a7, 0x6, 0x16, 0xffffffff, 0x80000000, 0x5, 0x4, 0xc8, 0x1, 0x5, 0x10000, 0x0, 0x7e, 0x100, 0x9602, 0x7, 0xaf, 0x8, 0x6, 0x226, 0x5, 0x5, 0x7, 0x30b1d693, 0xa1f, 0x40000f40, 0x7, 0x1, 0x6c1b, 0x0, 0x4, 0x5, 0xb1e, 0xd7, 0x200, 0xffff3441, 0xfff]}, 0x45c) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) 3.8141448s ago: executing program 1 (id=3813): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000c40), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x34, r1, 0x1, 0x0, 0x25dfdbfd, {0x6, 0x0, 0x900}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1=0xe0000002}, @NLBL_UNLABEL_A_SECCTX={0xf, 0x7, 'unconfined\x00'}]}, 0x34}, 0x2, 0x34005, 0x0, 0x40}, 0x4) 3.334130309s ago: executing program 0 (id=3814): r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') read$FUSE(r0, &(0x7f0000004200)={0x2020}, 0x2020) 3.211843463s ago: executing program 1 (id=3815): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000020c0)={&(0x7f0000002100)='sched_switch\x00', r3}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x14, 0x5, 0x1, 0x201, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) io_submit(0x0, 0x1, &(0x7f0000000300)=[0x0]) 2.996696642s ago: executing program 0 (id=3816): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=@ipv6_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0xff, 0x3, 0xff, 0x9}}, 0x1c}, 0x1, 0x0, 0x0, 0x84}, 0x0) 2.371103586s ago: executing program 0 (id=3817): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) syz_clone3(&(0x7f0000000200)={0xa01400, 0x0, 0x0, 0x0, {0x1a}, 0x0, 0x0, 0x0, 0x0}, 0x58) 1.582884877s ago: executing program 0 (id=3818): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000c40), r0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x34, r1, 0x1, 0x0, 0x25dfdbfd, {0x6, 0x0, 0x900}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1=0xe0000002}, @NLBL_UNLABEL_A_SECCTX={0xf, 0x7, 'unconfined\x00'}]}, 0x34}, 0x2, 0x34005, 0x0, 0x40}, 0x4) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x40810) 598.028126ms ago: executing program 0 (id=3819): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x34, 0x0, 0x1, 0x0, 0x25dfdbfd, {0x6, 0x0, 0x900}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1=0xe0000002}, @NLBL_UNLABEL_A_SECCTX={0xf, 0x7, 'unconfined\x00'}]}, 0x34}, 0x2, 0x34005, 0x0, 0x40}, 0x4) 0s ago: executing program 0 (id=3820): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000a80)={0x48, r1, 0x1, 0xfffffffe, 0x0, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xfb2e77a8993c191f}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffff}]}, 0x48}, 0x1, 0x0, 0x0, 0x9d4168a9ec985f72}, 0x20000010) kernel console output (not intermixed with test programs): type=1400 audit(3438.430:1446): avc: denied { bind } for pid=11013 comm="syz.0.2566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3439.348956][ T30] audit: type=1326 audit(3438.940:1447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11015 comm="syz.0.2567" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f95b0e8 code=0x7ffc0000 [ 3439.353225][ T30] audit: type=1326 audit(3438.940:1448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11015 comm="syz.0.2567" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f95b0e8 code=0x7ffc0000 [ 3439.381181][ T30] audit: type=1326 audit(3438.970:1449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11015 comm="syz.0.2567" exe="/syz-executor" sig=0 arch=c00000b7 syscall=165 compat=0 ip=0xffff8f95b0e8 code=0x7ffc0000 [ 3439.391691][ T30] audit: type=1326 audit(3438.980:1450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11015 comm="syz.0.2567" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f95b0e8 code=0x7ffc0000 [ 3440.610557][ T30] audit: type=1326 audit(3440.200:1451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11021 comm="syz.0.2570" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f95b0e8 code=0x7ffc0000 [ 3440.625655][ T30] audit: type=1326 audit(3440.220:1452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11021 comm="syz.0.2570" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f95b0e8 code=0x7ffc0000 [ 3440.643914][ T30] audit: type=1326 audit(3440.230:1453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11021 comm="syz.0.2570" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8f95b0e8 code=0x7ffc0000 [ 3440.661116][ T30] audit: type=1326 audit(3440.240:1454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11021 comm="syz.0.2570" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f95b0e8 code=0x7ffc0000 [ 3443.989596][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 3443.995823][ T30] audit: type=1400 audit(3443.580:1476): avc: denied { connect } for pid=11038 comm="syz.1.2577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3444.231802][ T30] audit: type=1326 audit(3443.820:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11033 comm="syz.0.2575" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f95b0e8 code=0x7ffc0000 [ 3444.270470][ T30] audit: type=1326 audit(3443.860:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11033 comm="syz.0.2575" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8f95b0e8 code=0x7ffc0000 [ 3445.400145][T11045] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2580'. [ 3447.378241][ T30] audit: type=1400 audit(3446.960:1479): avc: denied { execute } for pid=11052 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3447.379263][ T30] audit: type=1400 audit(3446.970:1480): avc: denied { execute_no_trans } for pid=11052 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3447.631139][ T30] audit: type=1400 audit(3447.220:1481): avc: denied { mounton } for pid=11054 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 3447.673444][ T30] audit: type=1400 audit(3447.260:1482): avc: denied { read } for pid=11053 comm="syz.1.2585" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3447.689821][ T30] audit: type=1400 audit(3447.260:1483): avc: denied { open } for pid=11053 comm="syz.1.2585" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3447.708009][ T30] audit: type=1400 audit(3447.300:1484): avc: denied { ioctl } for pid=11053 comm="syz.1.2585" path="/dev/usbmon0" dev="devtmpfs" ino=696 ioctlcmd=0x9206 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3448.643225][ T9513] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3449.005970][ T9513] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3449.391910][ T9513] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3449.596624][ T9513] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3451.079816][ T30] audit: type=1400 audit(3450.670:1485): avc: denied { read } for pid=3163 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 3453.782899][ T30] audit: type=1400 audit(3453.360:1486): avc: denied { write } for pid=11080 comm="syz.1.2589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3454.239150][ T9513]  (unregistering): (slave bond_slave_0): Releasing backup interface [ 3454.349425][ T9513]  (unregistering): (slave bond_slave_1): Releasing backup interface [ 3454.419389][ T9513]  (unregistering): Released all slaves [ 3454.608726][ T9513] bond1 (unregistering): Released all slaves [ 3455.383968][ T9513] hsr_slave_0: left promiscuous mode [ 3455.397135][ T9513] hsr_slave_1: left promiscuous mode [ 3455.508897][ T9513] veth1_macvtap: left promiscuous mode [ 3455.509685][ T9513] veth0_macvtap: left promiscuous mode [ 3455.510593][ T9513] veth1_vlan: left promiscuous mode [ 3455.516983][ T9513] veth0_vlan: left promiscuous mode [ 3458.334635][ T30] audit: type=1326 audit(3457.930:1487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11094 comm="syz.1.2595" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3458.340469][ T30] audit: type=1326 audit(3457.930:1488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11094 comm="syz.1.2595" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3458.347691][ T30] audit: type=1326 audit(3457.940:1489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11094 comm="syz.1.2595" exe="/syz-executor" sig=0 arch=c00000b7 syscall=147 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3458.354726][ T30] audit: type=1326 audit(3457.950:1490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11094 comm="syz.1.2595" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3460.984895][ T30] audit: type=1326 audit(3460.580:1491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11104 comm="syz.1.2599" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3460.988028][ T30] audit: type=1326 audit(3460.580:1492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11104 comm="syz.1.2599" exe="/syz-executor" sig=0 arch=c00000b7 syscall=72 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3460.991718][ T30] audit: type=1326 audit(3460.580:1493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11104 comm="syz.1.2599" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3461.475365][ T30] audit: type=1400 audit(3461.060:1494): avc: denied { audit_write } for pid=11106 comm="syz.1.2600" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3461.488749][ T30] audit: type=1107 audit(3461.080:1495): pid=11106 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 3470.399067][T11142] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2606'. [ 3470.405405][T11142] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2606'. [ 3470.427539][T11142] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2606'. [ 3470.431386][T11142] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2606'. [ 3473.190618][T11054] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3473.370921][T11054] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3473.455287][ T30] audit: type=1400 audit(3473.030:1496): avc: denied { bind } for pid=11160 comm="syz.1.2610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3473.476114][ T30] audit: type=1400 audit(3473.050:1497): avc: denied { setopt } for pid=11160 comm="syz.1.2610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3473.499719][T11161] netlink: 'syz.1.2610': attribute type 10 has an invalid length. [ 3473.816228][T11161] netlink: 'syz.1.2610': attribute type 10 has an invalid length. [ 3479.176106][T11187] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2615'. [ 3479.181062][T11187] netlink: 312 bytes leftover after parsing attributes in process `syz.1.2615'. [ 3479.188406][T11187] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2615'. [ 3481.893937][ T30] audit: type=1326 audit(2000000006.990:1498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11196 comm="syz.1.2617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3481.908460][ T30] audit: type=1326 audit(2000000006.990:1499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11196 comm="syz.1.2617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3481.909662][ T30] audit: type=1326 audit(2000000007.020:1500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11196 comm="syz.1.2617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3481.910119][ T30] audit: type=1326 audit(2000000007.020:1501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11196 comm="syz.1.2617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3481.924487][ T30] audit: type=1326 audit(2000000007.040:1502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11196 comm="syz.1.2617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3481.974867][ T30] audit: type=1326 audit(2000000007.070:1503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11196 comm="syz.1.2617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3481.975899][ T30] audit: type=1326 audit(2000000007.070:1504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11196 comm="syz.1.2617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3481.976303][ T30] audit: type=1326 audit(2000000007.080:1505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11196 comm="syz.1.2617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3481.976695][ T30] audit: type=1326 audit(2000000007.080:1506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11196 comm="syz.1.2617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3481.977069][ T30] audit: type=1326 audit(2000000007.080:1507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11196 comm="syz.1.2617" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3482.644324][T11054] hsr_slave_0: entered promiscuous mode [ 3482.675547][T11054] hsr_slave_1: entered promiscuous mode [ 3482.728344][T11054] debugfs: 'hsr0' already exists in 'hsr' [ 3482.729070][T11054] Cannot create hsr debugfs directory [ 3489.210596][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 3489.239998][ T30] audit: type=1400 audit(2000000014.320:1512): avc: denied { map } for pid=11231 comm="syz.1.2625" path="socket:[26524]" dev="sockfs" ino=26524 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 3489.651120][ T30] audit: type=1326 audit(2000000014.760:1513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11235 comm="syz.1.2626" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3489.671851][ T30] audit: type=1326 audit(2000000014.770:1514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11235 comm="syz.1.2626" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffffbab59614 code=0x7ffc0000 [ 3489.680891][ T30] audit: type=1326 audit(2000000014.790:1515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11235 comm="syz.1.2626" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffffbab59614 code=0x7ffc0000 [ 3489.686725][ T30] audit: type=1326 audit(2000000014.790:1516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11235 comm="syz.1.2626" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3489.697070][ T30] audit: type=1326 audit(2000000014.810:1517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11235 comm="syz.1.2626" exe="/syz-executor" sig=0 arch=c00000b7 syscall=55 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3489.721421][ T30] audit: type=1400 audit(2000000014.820:1518): avc: denied { setattr } for pid=11235 comm="syz.1.2626" name="task" dev="proc" ino=27335 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 3489.778855][ T30] audit: type=1326 audit(2000000014.830:1519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11235 comm="syz.1.2626" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3489.780170][ T30] audit: type=1326 audit(2000000014.850:1520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11235 comm="syz.1.2626" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3493.379413][T11054] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3496.187960][ T30] audit: type=1326 audit(2000000021.300:1521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11269 comm="syz.1.2633" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3496.203968][ T30] audit: type=1326 audit(2000000021.300:1522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11269 comm="syz.1.2633" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3496.208088][ T30] audit: type=1326 audit(2000000021.320:1523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11269 comm="syz.1.2633" exe="/syz-executor" sig=0 arch=c00000b7 syscall=461 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3496.226276][ T30] audit: type=1326 audit(2000000021.330:1524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11269 comm="syz.1.2633" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3496.255498][ T30] audit: type=1326 audit(2000000021.350:1525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11269 comm="syz.1.2633" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3496.267659][ T30] audit: type=1326 audit(2000000021.370:1526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11269 comm="syz.1.2633" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3496.268598][ T30] audit: type=1326 audit(2000000021.380:1527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11269 comm="syz.1.2633" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3496.309849][ T30] audit: type=1326 audit(2000000021.420:1528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11269 comm="syz.1.2633" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3496.354606][ T30] audit: type=1326 audit(2000000021.460:1529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11269 comm="syz.1.2633" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3496.369204][ T30] audit: type=1326 audit(2000000021.480:1530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11269 comm="syz.1.2633" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3501.738380][T11303] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2642'. [ 3502.149116][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 3502.156593][ T30] audit: type=1400 audit(2000000027.260:1539): avc: granted { setsecparam } for pid=11304 comm="syz.1.2643" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3504.407987][ T30] audit: type=1400 audit(2000000029.510:1540): avc: denied { relabelfrom } for pid=11318 comm="syz.1.2647" name="NETLINK" dev="sockfs" ino=27478 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 3504.408988][ T30] audit: type=1400 audit(2000000029.510:1541): avc: denied { relabelto } for pid=11318 comm="syz.1.2647" name="NETLINK" dev="sockfs" ino=27478 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_tcpdiag_socket permissive=1 [ 3504.664444][ T30] audit: type=1400 audit(2000000029.770:1542): avc: denied { create } for pid=11322 comm="syz.1.2648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3506.370288][T11331] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2650'. [ 3506.371142][T11331] netlink: 'syz.1.2650': attribute type 1 has an invalid length. [ 3512.944799][T11367] netlink: 256 bytes leftover after parsing attributes in process `syz.1.2659'. [ 3514.993763][T11054] veth0_vlan: entered promiscuous mode [ 3515.097442][T11054] veth1_vlan: entered promiscuous mode [ 3515.458772][T11054] veth0_macvtap: entered promiscuous mode [ 3515.515376][T11054] veth1_macvtap: entered promiscuous mode [ 3518.069493][ T30] audit: type=1400 audit(2000000043.180:1543): avc: denied { mounton } for pid=11054 comm="syz-executor" path="/syzkaller.JqKxBu/syz-tmp" dev="vda" ino=1881 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 3518.101194][ T30] audit: type=1400 audit(2000000043.210:1544): avc: denied { mount } for pid=11054 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3518.157736][ T30] audit: type=1400 audit(2000000043.260:1545): avc: denied { mount } for pid=11054 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3518.220035][ T30] audit: type=1400 audit(2000000043.330:1546): avc: denied { mounton } for pid=11054 comm="syz-executor" path="/syzkaller.JqKxBu/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 3518.236064][ T30] audit: type=1400 audit(2000000043.340:1547): avc: denied { mounton } for pid=11054 comm="syz-executor" path="/syzkaller.JqKxBu/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=27761 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 3518.415020][ T30] audit: type=1400 audit(2000000043.520:1548): avc: denied { unmount } for pid=11054 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 3518.478453][ T30] audit: type=1400 audit(2000000043.590:1549): avc: denied { mounton } for pid=11054 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 3518.500516][ T30] audit: type=1400 audit(2000000043.610:1550): avc: denied { mount } for pid=11054 comm="syz-executor" name="/" dev="gadgetfs" ino=3476 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 3518.583675][ T30] audit: type=1400 audit(2000000043.690:1551): avc: denied { mount } for pid=11054 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 3518.613929][ T30] audit: type=1400 audit(2000000043.720:1552): avc: denied { mounton } for pid=11054 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 3521.805051][T11400] binfmt_misc: register: failed to install interpreter file ./file2 [ 3521.868164][T11400] siw: device registration error -23 [ 3523.357928][T11410] binfmt_misc: register: failed to install interpreter file ./file2 [ 3523.373018][T11410] siw: device registration error -23 [ 3523.995903][T11418] SELinux: Context system_u:object_r:wireless_device_t:s0 is not valid (left unmapped). [ 3523.999842][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 3524.001136][ T30] audit: type=1400 audit(2000000049.100:1568): avc: denied { relabelfrom } for pid=11415 comm="syz.1.2674" name="NETLINK" dev="sockfs" ino=27637 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 3524.006414][ T30] audit: type=1400 audit(2000000049.110:1569): avc: denied { mac_admin } for pid=11415 comm="syz.1.2674" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3524.051768][ T30] audit: type=1400 audit(2000000049.160:1570): avc: denied { relabelto } for pid=11415 comm="syz.1.2674" name="NETLINK" dev="sockfs" ino=27637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=netlink_route_socket permissive=1 trawcon="system_u:object_r:wireless_device_t:s0" [ 3524.290005][T11422] binfmt_misc: register: failed to install interpreter file ./file2 [ 3526.553227][T11432] binfmt_misc: register: failed to install interpreter file ./file2 [ 3526.571221][T11432] siw: device registration error -23 [ 3528.250782][T11444] binfmt_misc: register: failed to install interpreter file ./file2 [ 3528.280112][T11444] siw: device registration error -23 [ 3530.593716][T11454] binfmt_misc: register: failed to install interpreter file ./file2 [ 3530.611084][T11454] siw: device registration error -23 [ 3532.600857][T11467] binfmt_misc: register: failed to install interpreter file ./file2 [ 3532.631006][T11467] siw: device registration error -23 [ 3535.591637][T11478] binfmt_misc: register: failed to install interpreter file ./file2 [ 3535.616616][T11478] siw: device registration error -23 [ 3538.236037][T11489] binfmt_misc: register: failed to install interpreter file ./file2 [ 3538.251284][T11489] siw: device registration error -23 [ 3540.601321][T11500] binfmt_misc: register: failed to install interpreter file ./file2 [ 3540.892825][T11502] pimreg: entered allmulticast mode [ 3540.896272][T11502] pimreg: left allmulticast mode [ 3542.945174][ T30] audit: type=1400 audit(2000000068.060:1571): avc: denied { name_bind } for pid=11508 comm="syz.1.2716" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 3543.529090][T11511] binfmt_misc: register: failed to install interpreter file ./file2 [ 3544.180273][ T30] audit: type=1400 audit(2000000069.290:1572): avc: denied { ioctl } for pid=11512 comm="syz.1.2718" path="socket:[28862]" dev="sockfs" ino=28862 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3545.260248][ T30] audit: type=1400 audit(2000000070.370:1573): avc: denied { ioctl } for pid=11522 comm="syz.1.2723" path="/dev/virtual_nci" dev="devtmpfs" ino=672 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3545.678033][T11529] netlink: 'syz.0.2724': attribute type 15 has an invalid length. [ 3546.623386][ T30] audit: type=1400 audit(2000000071.730:1574): avc: denied { create } for pid=11536 comm="syz.1.2728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 3547.773274][ T30] audit: type=1326 audit(2000000072.880:1575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11545 comm="syz.1.2730" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3547.774245][ T30] audit: type=1326 audit(2000000072.880:1576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11545 comm="syz.1.2730" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3547.804103][ T30] audit: type=1326 audit(2000000072.890:1577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11545 comm="syz.1.2730" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3547.805072][ T30] audit: type=1326 audit(2000000072.900:1578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11545 comm="syz.1.2730" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3547.819454][ T30] audit: type=1326 audit(2000000072.930:1579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11545 comm="syz.1.2730" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3547.885711][ T30] audit: type=1326 audit(2000000073.000:1580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11545 comm="syz.1.2730" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3550.889402][T11563] bond0: (slave bond_slave_0): Releasing backup interface [ 3551.006691][T11563] bond0: (slave bond_slave_1): Releasing backup interface [ 3551.965819][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 3551.966226][ T30] audit: type=1400 audit(2000000077.080:1587): avc: denied { write } for pid=11565 comm="syz.1.2739" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 3552.687699][ T30] audit: type=1400 audit(2000000077.790:1588): avc: denied { compute_member } for pid=11571 comm="syz.1.2741" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 3553.687529][ T30] audit: type=1400 audit(2000000078.800:1589): avc: denied { create } for pid=11579 comm="syz.1.2745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 3555.880114][ T30] audit: type=1400 audit(2000000080.990:1590): avc: denied { read } for pid=11602 comm="syz.1.2753" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3555.880687][ T30] audit: type=1400 audit(2000000080.990:1591): avc: denied { open } for pid=11602 comm="syz.1.2753" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3555.916610][ T30] audit: type=1400 audit(2000000081.030:1592): avc: denied { ioctl } for pid=11602 comm="syz.1.2753" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3557.721005][ T30] audit: type=1326 audit(2000000082.830:1593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11609 comm="syz.1.2756" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3557.759911][ T30] audit: type=1326 audit(2000000082.870:1594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11609 comm="syz.1.2756" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3557.806571][ T30] audit: type=1326 audit(2000000082.900:1595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11609 comm="syz.1.2756" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3557.837890][ T30] audit: type=1326 audit(2000000082.950:1596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11609 comm="syz.1.2756" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3557.858925][ T30] audit: type=1326 audit(2000000082.970:1597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11609 comm="syz.1.2756" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3557.859885][ T30] audit: type=1326 audit(2000000082.970:1598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11609 comm="syz.1.2756" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3557.882569][ T30] audit: type=1326 audit(2000000082.990:1599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11609 comm="syz.1.2756" exe="/syz-executor" sig=0 arch=c00000b7 syscall=107 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3557.887444][ T30] audit: type=1326 audit(2000000083.000:1600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11609 comm="syz.1.2756" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3557.927512][ T30] audit: type=1326 audit(2000000083.020:1601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11609 comm="syz.1.2756" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3557.946266][ T30] audit: type=1326 audit(2000000083.040:1602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11609 comm="syz.1.2756" exe="/syz-executor" sig=0 arch=c00000b7 syscall=111 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3562.760978][T11648] binfmt_misc: register: failed to install interpreter file ./file2 [ 3565.690501][T11659] binfmt_misc: register: failed to install interpreter file ./file2 [ 3567.449864][T11671] binfmt_misc: register: failed to install interpreter file ./file2 [ 3571.923273][T11675] atomic_op 00000000d65be4df conn xmit_atomic 0000000000000000 [ 3576.007571][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 3576.008222][ T30] audit: type=1400 audit(2000000101.120:1627): avc: denied { load_policy } for pid=11678 comm="syz.0.2786" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 3576.021190][T11679] SELinux: policydb version 676477988 does not match my version range 15-35 [ 3576.024344][T11679] SELinux: failed to load policy [ 3576.605308][T11686] binfmt_misc: register: failed to install interpreter file ./file2 [ 3576.630358][T11686] siw: device registration error -23 [ 3576.964733][T11688] syzkaller1: entered promiscuous mode [ 3576.966243][T11688] syzkaller1: entered allmulticast mode [ 3577.919038][T11690] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 3578.697231][T11699] binfmt_misc: register: failed to install interpreter file ./file2 [ 3578.699073][ T30] audit: type=1400 audit(2000000103.800:1628): avc: denied { connect } for pid=11698 comm="syz.1.2794" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3578.715422][T11699] siw: device registration error -23 [ 3579.537187][ T30] audit: type=1400 audit(2000000104.650:1629): avc: denied { bind } for pid=11702 comm="syz.0.2795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3579.563541][ T30] audit: type=1400 audit(2000000104.670:1630): avc: denied { name_bind } for pid=11702 comm="syz.0.2795" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 3579.583372][ T30] audit: type=1400 audit(2000000104.680:1631): avc: denied { node_bind } for pid=11702 comm="syz.0.2795" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 3581.647756][T11713] binfmt_misc: register: failed to install interpreter file ./file2 [ 3581.667132][T11713] siw: device registration error -23 [ 3582.431254][T11715] atomic_op 0000000048722987 conn xmit_atomic 0000000000000000 [ 3584.164918][ T30] audit: type=1400 audit(2000000109.190:1632): avc: denied { create } for pid=11717 comm="syz.0.2801" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=icmp_socket permissive=1 [ 3585.770372][T11724] binfmt_misc: register: failed to install interpreter file ./file2 [ 3585.821367][T11724] siw: device registration error -23 [ 3586.486148][ T30] audit: type=1400 audit(2000000111.590:1633): avc: denied { connect } for pid=11725 comm="syz.0.2805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3590.568437][T11735] binfmt_misc: register: failed to install interpreter file ./file2 [ 3590.717676][T11735] siw: device registration error -23 [ 3592.929866][T11742] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2813'. [ 3592.971045][ T30] audit: type=1400 audit(2000000118.040:1634): avc: denied { write } for pid=11741 comm="syz.0.2813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3592.978103][ T30] audit: type=1400 audit(2000000118.040:1635): avc: denied { nlmsg_write } for pid=11741 comm="syz.0.2813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3595.239308][T11749] binfmt_misc: register: failed to install interpreter file ./file2 [ 3595.265356][T11749] siw: device registration error -23 [ 3596.020923][T11751] atomic_op 0000000039f57477 conn xmit_atomic 0000000000000000 [ 3599.655414][ T30] audit: type=1400 audit(2000000124.720:1636): avc: denied { mount } for pid=11759 comm="syz.0.2820" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 3599.721516][ T30] audit: type=1400 audit(2000000124.830:1637): avc: denied { mounton } for pid=11759 comm="syz.0.2820" path="/97/file0" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:devpts_t tclass=dir permissive=1 [ 3599.817533][ T30] audit: type=1400 audit(2000000124.920:1638): avc: denied { unmount } for pid=11759 comm="syz.0.2820" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3600.017056][ T30] audit: type=1400 audit(2000000125.130:1639): avc: denied { unmount } for pid=11054 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 3600.546696][T11762] binfmt_misc: register: failed to install interpreter file ./file2 [ 3600.603291][T11762] siw: device registration error -23 [ 3601.549499][T11764] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2822'. [ 3601.560994][T11764] hsr_slave_0: left promiscuous mode [ 3601.591187][T11764] hsr_slave_1: left promiscuous mode [ 3604.640264][T11773] binfmt_misc: register: failed to install interpreter file ./file2 [ 3604.690302][T11773] siw: device registration error -23 [ 3608.656269][T11788] binfmt_misc: register: failed to install interpreter file ./file2 [ 3608.683581][T11788] siw: device registration error -23 [ 3609.999232][T11790] atomic_op 00000000696a6e27 conn xmit_atomic 0000000000000000 [ 3617.819226][T11813] binfmt_misc: register: failed to install interpreter file ./file2 [ 3617.847561][ T30] audit: type=1400 audit(2000000142.960:1640): avc: denied { create } for pid=11812 comm="syz.0.2842" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 3618.316069][ T30] audit: type=1400 audit(2000000143.430:1641): avc: denied { unlink } for pid=11054 comm="syz-executor" name="file0" dev="tmpfs" ino=591 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 3619.450994][ T30] audit: type=1400 audit(2000000144.560:1642): avc: denied { allowed } for pid=11823 comm="syz.0.2846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3619.467115][ T30] audit: type=1400 audit(2000000144.570:1643): avc: denied { create } for pid=11823 comm="syz.0.2846" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3619.467927][ T30] audit: type=1400 audit(2000000144.580:1644): avc: denied { create } for pid=11823 comm="syz.0.2846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3619.476326][ T30] audit: type=1400 audit(2000000144.580:1645): avc: denied { bind } for pid=11823 comm="syz.0.2846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3619.479925][ T30] audit: type=1400 audit(2000000144.580:1646): avc: denied { listen } for pid=11823 comm="syz.0.2846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3619.489243][ T30] audit: type=1400 audit(2000000144.600:1647): avc: denied { connect } for pid=11823 comm="syz.0.2846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3619.515348][ T30] audit: type=1400 audit(2000000144.630:1648): avc: denied { accept } for pid=11823 comm="syz.0.2846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3619.520547][ T30] audit: type=1400 audit(2000000144.630:1649): avc: denied { map_create } for pid=11823 comm="syz.0.2846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3623.703727][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 3623.706231][ T30] audit: type=1400 audit(2000000148.820:1662): avc: denied { create } for pid=11839 comm="syz.0.2853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3623.721079][ T30] audit: type=1400 audit(2000000148.830:1663): avc: denied { write } for pid=11839 comm="syz.0.2853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3624.228889][ T30] audit: type=1400 audit(2000000149.340:1664): avc: denied { map } for pid=11843 comm="syz.0.2855" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28401 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3624.236406][ T30] audit: type=1400 audit(2000000149.350:1665): avc: denied { read write } for pid=11843 comm="syz.0.2855" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28401 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3624.287994][ T30] audit: type=1400 audit(2000000149.400:1666): avc: denied { execmem } for pid=11843 comm="syz.0.2855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3632.168855][ T30] audit: type=1400 audit(2000000157.280:1667): avc: denied { read write } for pid=9956 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3632.175327][ T30] audit: type=1400 audit(2000000157.280:1668): avc: denied { open } for pid=9956 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3632.176625][ T30] audit: type=1400 audit(2000000157.290:1669): avc: denied { ioctl } for pid=9956 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3632.549383][T11846] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2856'. [ 3632.560281][T11846] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2856'. [ 3633.884224][ T30] audit: type=1400 audit(2000000158.990:1670): avc: denied { create } for pid=11850 comm="syz.1.2858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3633.893722][ T30] audit: type=1400 audit(2000000159.000:1671): avc: denied { setopt } for pid=11850 comm="syz.1.2858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3635.971879][ T30] audit: type=1400 audit(2000000161.080:1672): avc: denied { create } for pid=11858 comm="syz.0.2861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3636.020651][ T30] audit: type=1400 audit(2000000161.130:1673): avc: denied { connect } for pid=11858 comm="syz.0.2861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3636.040289][ T30] audit: type=1400 audit(2000000161.150:1674): avc: denied { write } for pid=11858 comm="syz.0.2861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3637.915256][ T30] audit: type=1400 audit(2000000163.020:1675): avc: denied { create } for pid=11864 comm="syz.0.2864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3639.273520][T11869] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2865'. [ 3640.892991][ T30] audit: type=1326 audit(2000000165.990:1676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.1.2870" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3640.901613][ T30] audit: type=1326 audit(2000000165.990:1677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.1.2870" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3640.904885][ T30] audit: type=1326 audit(2000000166.010:1678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.1.2870" exe="/syz-executor" sig=0 arch=c00000b7 syscall=178 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3640.905569][ T30] audit: type=1326 audit(2000000166.010:1679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.1.2870" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3640.913709][ T30] audit: type=1326 audit(2000000166.020:1680): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.1.2870" exe="/syz-executor" sig=0 arch=c00000b7 syscall=137 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3641.633477][ T30] audit: type=1326 audit(2000000166.740:1681): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.1.2870" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3641.649546][ T30] audit: type=1326 audit(2000000166.740:1682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11875 comm="syz.1.2870" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3642.025594][ T30] audit: type=1400 audit(2000000167.140:1683): avc: denied { write } for pid=11883 comm="syz.0.2873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3642.034107][ T30] audit: type=1400 audit(2000000167.140:1684): avc: denied { read } for pid=11883 comm="syz.0.2873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3642.151331][T10286] hid_parser_main: 22 callbacks suppressed [ 3642.174056][T10286] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 3642.199932][T10286] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on syz0 [ 3643.587863][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 3643.591284][ T30] audit: type=1400 audit(2000000168.700:1687): avc: denied { create } for pid=11889 comm="syz.0.2875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3643.725180][ T30] audit: type=1400 audit(2000000168.830:1688): avc: denied { read } for pid=11889 comm="syz.0.2875" path="socket:[29422]" dev="sockfs" ino=29422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3647.135729][ T30] audit: type=1400 audit(2000000172.250:1689): avc: denied { setopt } for pid=11896 comm="syz.0.2878" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3647.139771][ T30] audit: type=1400 audit(2000000172.250:1690): avc: denied { write } for pid=11896 comm="syz.0.2878" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3647.336325][ T30] audit: type=1400 audit(2000000172.450:1691): avc: denied { ioctl } for pid=11898 comm="syz.0.2879" path="socket:[29453]" dev="sockfs" ino=29453 ioctlcmd=0x8927 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3648.040388][ T30] audit: type=1400 audit(2000000173.150:1692): avc: denied { write } for pid=11884 comm="syz.1.2874" name="hidraw0" dev="devtmpfs" ino=1756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 3650.844109][ T30] audit: type=1400 audit(2000000175.950:1693): avc: denied { read } for pid=11931 comm="syz.1.2894" dev="nsfs" ino=4026532615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3650.847793][ T30] audit: type=1400 audit(2000000175.960:1694): avc: denied { open } for pid=11931 comm="syz.1.2894" path="net:[4026532615]" dev="nsfs" ino=4026532615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3650.858688][T11932] smc: net device bond0 erased user defined pnetid SYZ0 [ 3653.014649][T11940] loop9: detected capacity change from 0 to 7 [ 3653.027685][T11940] Buffer I/O error on dev loop9, logical block 0, async page read [ 3653.031775][T11940] Buffer I/O error on dev loop9, logical block 0, async page read [ 3653.037742][T11940] loop9: unable to read partition table [ 3653.044487][T11940] loop_reread_partitions: partition scan of loop9 (被xڬdGݡ [ 3653.044487][T11940] ) failed (rc=-5) [ 3653.533301][T11943] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2899'. [ 3656.261038][ T30] audit: type=1326 audit(2000000181.370:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11953 comm="syz.1.2904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3656.270657][ T30] audit: type=1326 audit(2000000181.380:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11953 comm="syz.1.2904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3656.286994][ T30] audit: type=1326 audit(2000000181.400:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11953 comm="syz.1.2904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=28 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3656.291933][ T30] audit: type=1326 audit(2000000181.400:1698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11953 comm="syz.1.2904" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3656.924253][ T30] audit: type=1400 audit(2000000182.030:1699): avc: denied { read } for pid=11962 comm="syz.1.2908" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 3656.945785][ T30] audit: type=1400 audit(2000000182.060:1700): avc: denied { open } for pid=11962 comm="syz.1.2908" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 3657.003599][ T30] audit: type=1400 audit(2000000182.110:1701): avc: denied { ioctl } for pid=11962 comm="syz.1.2908" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 3658.066212][ T30] audit: type=1400 audit(2000000183.180:1702): avc: denied { name_bind } for pid=11971 comm="syz.0.2913" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3658.071607][ T30] audit: type=1400 audit(2000000183.180:1703): avc: denied { node_bind } for pid=11971 comm="syz.0.2913" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3659.434184][ T30] audit: type=1400 audit(2000000184.540:1704): avc: denied { prog_run } for pid=11985 comm="syz.1.2919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3662.491758][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 3662.500817][ T30] audit: type=1326 audit(2000000187.600:1710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12004 comm="syz.0.2929" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7fc00000 [ 3662.529357][ T30] audit: type=1326 audit(2000000187.640:1711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12004 comm="syz.0.2929" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffffb015b0e8 code=0x7fc00000 [ 3665.265317][ T30] audit: type=1400 audit(2000000190.380:1712): avc: denied { read write } for pid=9956 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3665.273794][ T30] audit: type=1400 audit(2000000190.380:1713): avc: denied { open } for pid=9956 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3665.288046][ T30] audit: type=1400 audit(2000000190.380:1714): avc: denied { ioctl } for pid=9956 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3665.457368][ T30] audit: type=1400 audit(2000000190.570:1715): avc: denied { prog_load } for pid=12022 comm="syz.1.2936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3665.461748][ T30] audit: type=1400 audit(2000000190.570:1716): avc: denied { bpf } for pid=12022 comm="syz.1.2936" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3665.466827][ T30] audit: type=1400 audit(2000000190.570:1717): avc: denied { perfmon } for pid=12022 comm="syz.1.2936" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3665.500601][ T30] audit: type=1400 audit(2000000190.610:1718): avc: denied { create } for pid=12022 comm="syz.1.2936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3665.506165][ T30] audit: type=1400 audit(2000000190.620:1719): avc: denied { write } for pid=12022 comm="syz.1.2936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3667.814869][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 3667.820456][ T30] audit: type=1400 audit(2000000192.930:1722): avc: denied { create } for pid=12027 comm="syz.1.2938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3667.839811][ T30] audit: type=1400 audit(2000000192.950:1723): avc: denied { write } for pid=12027 comm="syz.1.2938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3667.840737][ T30] audit: type=1400 audit(2000000192.950:1724): avc: denied { module_request } for pid=12027 comm="syz.1.2938" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3668.515515][ T30] audit: type=1400 audit(2000000193.600:1725): avc: denied { map_create } for pid=12004 comm="syz.0.2929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3668.566389][ T30] audit: type=1400 audit(2000000193.670:1726): avc: denied { prog_run } for pid=12032 comm="syz.1.2939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3668.567389][ T30] audit: type=1400 audit(2000000193.670:1727): avc: denied { map_read map_write } for pid=12032 comm="syz.1.2939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3669.659313][ T30] audit: type=1326 audit(2000000194.770:1728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12004 comm="syz.0.2929" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7fc00000 [ 3669.716990][ T30] audit: type=1400 audit(2000000194.830:1729): avc: denied { mount } for pid=12034 comm="syz.1.2940" name="/" dev="ramfs" ino=29696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 3670.139781][T12038] binfmt_misc: register: failed to install interpreter file ./file2 [ 3670.174007][T12038] siw: device registration error -23 [ 3670.729377][T12041] wg2: entered promiscuous mode [ 3670.731392][T12041] wg2: entered allmulticast mode [ 3671.343859][ T30] audit: type=1400 audit(2000000196.460:1730): avc: denied { execmem } for pid=12045 comm="syz.0.2945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3672.925873][ T30] audit: type=1400 audit(2000000198.040:1731): avc: denied { create } for pid=12047 comm="syz.1.2946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3672.960586][ T30] audit: type=1400 audit(2000000198.070:1732): avc: denied { write } for pid=12047 comm="syz.1.2946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3673.454244][ T30] audit: type=1400 audit(2000000198.550:1733): avc: denied { read } for pid=12047 comm="syz.1.2946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3673.739077][ T30] audit: type=1400 audit(2000000198.850:1734): avc: denied { create } for pid=12050 comm="syz.1.2947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3673.753126][ T30] audit: type=1400 audit(2000000198.860:1735): avc: denied { bind } for pid=12050 comm="syz.1.2947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3673.768096][ T30] audit: type=1400 audit(2000000198.870:1736): avc: denied { read } for pid=12050 comm="syz.1.2947" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 3673.779197][ T30] audit: type=1400 audit(2000000198.870:1737): avc: denied { open } for pid=12050 comm="syz.1.2947" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 3678.196756][T12054] atomic_op 00000000ec1e5a78 conn xmit_atomic 0000000000000000 [ 3678.214100][ T30] audit: type=1400 audit(2000000203.260:1738): avc: denied { ioctl } for pid=12050 comm="syz.1.2947" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 3678.271318][ T30] audit: type=1400 audit(2000000203.300:1739): avc: denied { write } for pid=12050 comm="syz.1.2947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3680.208842][ T30] audit: type=1400 audit(2000000205.320:1740): avc: denied { read } for pid=12055 comm="syz.0.2948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3687.179121][ T30] audit: type=1400 audit(2000000212.290:1741): avc: denied { bind } for pid=12066 comm="syz.1.2952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3687.185411][ T30] audit: type=1400 audit(2000000212.300:1742): avc: denied { setopt } for pid=12066 comm="syz.1.2952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3687.639461][ T30] audit: type=1400 audit(2000000212.750:1743): avc: denied { ioctl } for pid=12066 comm="syz.1.2952" path="socket:[30748]" dev="sockfs" ino=30748 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3688.360603][ T30] audit: type=1400 audit(2000000213.470:1744): avc: denied { sys_module } for pid=12066 comm="syz.1.2952" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3690.051830][ T30] audit: type=1400 audit(2000000215.160:1745): avc: denied { wake_alarm } for pid=12078 comm="syz.0.2956" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3693.621593][T12087] atomic_op 00000000a2e506b3 conn xmit_atomic 0000000000000000 [ 3695.429066][T12089] binfmt_misc: register: failed to install interpreter file ./file2 [ 3695.463857][T12089] siw: device registration error -23 [ 3697.253332][ T30] audit: type=1326 audit(2000000222.190:1746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12094 comm="syz.0.2961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3697.256578][ T30] audit: type=1326 audit(2000000222.190:1747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12094 comm="syz.0.2961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3697.257095][ T30] audit: type=1326 audit(2000000222.190:1748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12094 comm="syz.0.2961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3697.257432][ T30] audit: type=1326 audit(2000000222.190:1749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12094 comm="syz.0.2961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3697.257697][ T30] audit: type=1326 audit(2000000222.210:1750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12094 comm="syz.0.2961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3697.258018][ T30] audit: type=1326 audit(2000000222.210:1751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12094 comm="syz.0.2961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3697.258392][ T30] audit: type=1326 audit(2000000222.210:1752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12094 comm="syz.0.2961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3697.258734][ T30] audit: type=1326 audit(2000000222.210:1753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12094 comm="syz.0.2961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3697.259024][ T30] audit: type=1326 audit(2000000222.210:1754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12094 comm="syz.0.2961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=130 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3697.259304][ T30] audit: type=1326 audit(2000000222.210:1755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12094 comm="syz.0.2961" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3702.918854][T12123] netlink: 16 bytes leftover after parsing attributes in process `syz.0.2971'. [ 3702.919751][T12123] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2971'. [ 3703.443915][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 3703.456938][ T30] audit: type=1326 audit(2000000227.880:1765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12118 comm="syz.0.2971" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3703.460739][ T30] audit: type=1326 audit(2000000227.910:1766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12118 comm="syz.0.2971" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3703.473913][ T30] audit: type=1326 audit(2000000227.910:1767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12118 comm="syz.0.2971" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3703.480321][ T30] audit: type=1326 audit(2000000227.920:1768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12118 comm="syz.0.2971" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3703.487629][ T30] audit: type=1326 audit(2000000227.930:1769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12118 comm="syz.0.2971" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3703.503797][ T30] audit: type=1326 audit(2000000227.930:1770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12118 comm="syz.0.2971" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3703.504809][ T30] audit: type=1326 audit(2000000227.940:1771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12118 comm="syz.0.2971" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3703.505334][ T30] audit: type=1326 audit(2000000227.950:1772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12118 comm="syz.0.2971" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3703.505822][ T30] audit: type=1326 audit(2000000227.960:1773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12118 comm="syz.0.2971" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3703.506305][ T30] audit: type=1326 audit(2000000227.980:1774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12118 comm="syz.0.2971" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3706.466873][T12127] atomic_op 0000000012692159 conn xmit_atomic 0000000000000000 [ 3713.518412][T12132] binfmt_misc: register: failed to install interpreter file ./file2 [ 3713.763081][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 3713.766229][ T30] audit: type=1400 audit(2000000238.870:1800): avc: denied { sqpoll } for pid=12133 comm="syz.0.2976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3713.917968][ T30] audit: type=1400 audit(2000000239.030:1801): avc: denied { create } for pid=12136 comm="syz.1.2977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 3714.576078][ T30] audit: type=1400 audit(2000000239.680:1802): avc: denied { mount } for pid=12147 comm="syz.0.2983" name="/" dev="hugetlbfs" ino=29949 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 3714.657485][T12150] binfmt_misc: register: failed to install interpreter file ./file2 [ 3715.590469][ T30] audit: type=1400 audit(2000000240.700:1803): avc: denied { create } for pid=12156 comm="syz.0.2987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3715.605813][ T30] audit: type=1400 audit(2000000240.720:1804): avc: denied { write } for pid=12156 comm="syz.0.2987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3716.474736][ T30] audit: type=1400 audit(2000000241.590:1805): avc: denied { setopt } for pid=12165 comm="syz.0.2991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3716.489241][ T30] audit: type=1400 audit(2000000241.600:1806): avc: denied { read } for pid=12165 comm="syz.0.2991" dev="nsfs" ino=4026532616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3716.495313][ T30] audit: type=1400 audit(2000000241.610:1807): avc: denied { open } for pid=12165 comm="syz.0.2991" path="net:[4026532616]" dev="nsfs" ino=4026532616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3716.504292][ T30] audit: type=1400 audit(2000000241.620:1808): avc: denied { create } for pid=12165 comm="syz.0.2991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3720.258367][ T30] audit: type=1326 audit(2000000245.370:1809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12181 comm="syz.1.2997" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3720.276467][ T30] audit: type=1326 audit(2000000245.390:1810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12181 comm="syz.1.2997" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3720.285935][ T30] audit: type=1326 audit(2000000245.390:1811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12181 comm="syz.1.2997" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3720.297610][ T30] audit: type=1326 audit(2000000245.410:1812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12181 comm="syz.1.2997" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3720.300785][ T30] audit: type=1326 audit(2000000245.410:1813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12181 comm="syz.1.2997" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3720.699100][ T30] audit: type=1326 audit(2000000245.810:1814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12189 comm="syz.1.3001" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3720.705854][ T30] audit: type=1326 audit(2000000245.810:1815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12189 comm="syz.1.3001" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3720.733020][ T30] audit: type=1326 audit(2000000245.840:1816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12189 comm="syz.1.3001" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3720.733534][ T30] audit: type=1326 audit(2000000245.840:1817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12189 comm="syz.1.3001" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3720.733899][ T30] audit: type=1326 audit(2000000245.840:1818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12189 comm="syz.1.3001" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3727.907601][T12244] binfmt_misc: register: failed to install interpreter file ./file2 [ 3727.931974][T12244] siw: device registration error -23 [ 3728.400530][T12247] tls_set_device_offload_rx: netdev not found [ 3729.245944][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 3729.246506][ T30] audit: type=1400 audit(2000000254.360:1829): avc: denied { read } for pid=12253 comm="syz.1.3031" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3729.252970][ T30] audit: type=1400 audit(2000000254.360:1830): avc: denied { open } for pid=12253 comm="syz.1.3031" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3729.269955][ T30] audit: type=1400 audit(2000000254.380:1831): avc: denied { map } for pid=12253 comm="syz.1.3031" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3729.285101][ T30] audit: type=1400 audit(2000000254.380:1832): avc: denied { execute } for pid=12253 comm="syz.1.3031" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3729.368000][T12256] binfmt_misc: register: failed to install interpreter file ./file2 [ 3729.414919][T12256] siw: device registration error -23 [ 3729.675682][ T30] audit: type=1400 audit(2000000254.790:1833): avc: denied { ioctl } for pid=12257 comm="syz.1.3033" path="socket:[30150]" dev="sockfs" ino=30150 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3729.678796][T12258] syzkaller1: entered promiscuous mode [ 3729.678915][T12258] syzkaller1: entered allmulticast mode [ 3730.589977][T12269] binfmt_misc: register: failed to install interpreter file ./file2 [ 3730.605405][T12269] siw: device registration error -23 [ 3730.856231][T12272] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3037'. [ 3730.883647][T12272] hsr_slave_0: left promiscuous mode [ 3730.894823][T12272] hsr_slave_1: left promiscuous mode [ 3730.959891][ T30] audit: type=1400 audit(2000000256.060:1834): avc: denied { create } for pid=12271 comm="syz.0.3039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3730.977222][ T30] audit: type=1400 audit(2000000256.090:1835): avc: denied { write } for pid=12271 comm="syz.0.3039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3731.670667][ T30] audit: type=1400 audit(2000000256.780:1836): avc: denied { create } for pid=12276 comm="syz.1.3041" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 3732.223391][ T30] audit: type=1400 audit(2000000257.330:1837): avc: denied { unlink } for pid=9956 comm="syz-executor" name="file0" dev="tmpfs" ino=2120 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 3732.231483][T12282] binfmt_misc: register: failed to install interpreter file ./file2 [ 3732.251189][T12282] siw: device registration error -23 [ 3733.738000][ T30] audit: type=1400 audit(2000000258.850:1838): avc: denied { read write } for pid=12284 comm="syz.0.3045" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 3734.347577][T12296] binfmt_misc: register: failed to install interpreter file ./file2 [ 3736.440425][T12306] binfmt_misc: register: failed to install interpreter file ./file2 [ 3737.428714][T12309] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3055'. [ 3737.429374][T12309] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3055'. [ 3738.806994][T12317] binfmt_misc: register: failed to install interpreter file ./file2 [ 3740.360415][T12327] binfmt_misc: register: failed to install interpreter file ./file2 [ 3741.505318][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 3741.509932][ T30] audit: type=1400 audit(2000000266.610:1843): avc: denied { connect } for pid=12334 comm="syz.1.3068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3742.269983][ T30] audit: type=1326 audit(2000000267.380:1844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12340 comm="syz.1.3071" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3742.279879][ T30] audit: type=1326 audit(2000000267.390:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12340 comm="syz.1.3071" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3742.290943][ T30] audit: type=1326 audit(2000000267.400:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12340 comm="syz.1.3071" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3742.297883][ T30] audit: type=1326 audit(2000000267.400:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12340 comm="syz.1.3071" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3742.305304][ T30] audit: type=1326 audit(2000000267.410:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12340 comm="syz.1.3071" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3742.313471][ T30] audit: type=1326 audit(2000000267.410:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12340 comm="syz.1.3071" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3742.316504][ T30] audit: type=1326 audit(2000000267.420:1850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12340 comm="syz.1.3071" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3742.329764][ T30] audit: type=1326 audit(2000000267.420:1851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12340 comm="syz.1.3071" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3742.330546][ T30] audit: type=1326 audit(2000000267.420:1852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12340 comm="syz.1.3071" exe="/syz-executor" sig=0 arch=c00000b7 syscall=54 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 3773.971858][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 3773.975816][ T30] audit: type=1326 audit(2000000299.080:1870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12366 comm="syz.0.3082" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3773.976852][ T30] audit: type=1326 audit(2000000299.090:1871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12366 comm="syz.0.3082" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3773.977235][ T30] audit: type=1326 audit(2000000299.090:1872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12366 comm="syz.0.3082" exe="/syz-executor" sig=0 arch=c00000b7 syscall=38 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3773.985249][ T30] audit: type=1326 audit(2000000299.090:1873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12366 comm="syz.0.3082" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3773.986216][ T30] audit: type=1326 audit(2000000299.100:1874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12366 comm="syz.0.3082" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3774.177267][ T30] audit: type=1326 audit(2000000299.290:1875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12368 comm="syz.0.3083" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3774.181584][ T30] audit: type=1326 audit(2000000299.290:1876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12368 comm="syz.0.3083" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3774.223996][ T30] audit: type=1326 audit(2000000299.320:1877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12368 comm="syz.0.3083" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3774.236990][ T30] audit: type=1326 audit(2000000299.340:1878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12368 comm="syz.0.3083" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3774.266052][ T30] audit: type=1326 audit(2000000299.380:1879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12368 comm="syz.0.3083" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 3779.989580][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 3779.995372][ T30] audit: type=1400 audit(2000000305.100:1887): avc: denied { create } for pid=12379 comm="syz.0.3088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3780.017872][ T30] audit: type=1400 audit(2000000305.130:1888): avc: denied { bind } for pid=12379 comm="syz.0.3088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3780.031169][ T30] audit: type=1400 audit(2000000305.140:1889): avc: denied { listen } for pid=12379 comm="syz.0.3088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3780.041583][ T30] audit: type=1400 audit(2000000305.150:1890): avc: denied { connect } for pid=12379 comm="syz.0.3088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3780.071078][ T30] audit: type=1400 audit(2000000305.180:1891): avc: denied { write } for pid=12379 comm="syz.0.3088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3780.099463][ T30] audit: type=1400 audit(2000000305.210:1892): avc: denied { setopt } for pid=12379 comm="syz.0.3088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3780.941953][ T30] audit: type=1400 audit(2000000306.050:1893): avc: denied { create } for pid=12383 comm="syz.0.3090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3780.969622][ T30] audit: type=1400 audit(2000000306.080:1894): avc: denied { bind } for pid=12383 comm="syz.0.3090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3780.981466][ T30] audit: type=1400 audit(2000000306.090:1895): avc: denied { accept } for pid=12383 comm="syz.0.3090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3780.999192][ T30] audit: type=1400 audit(2000000306.110:1896): avc: denied { read } for pid=12383 comm="syz.0.3090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3792.194335][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 3792.196661][ T30] audit: type=1400 audit(2000000317.300:1899): avc: denied { read } for pid=12396 comm="syz.0.3093" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3792.217620][ T30] audit: type=1400 audit(2000000317.330:1900): avc: denied { open } for pid=12396 comm="syz.0.3093" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3792.255932][ T30] audit: type=1400 audit(2000000317.370:1901): avc: denied { write } for pid=12396 comm="syz.0.3093" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3792.260317][ T30] audit: type=1400 audit(2000000317.370:1902): avc: denied { ioctl } for pid=12396 comm="syz.0.3093" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3793.069308][ T30] audit: type=1400 audit(2000000318.180:1903): avc: denied { write } for pid=12400 comm="syz.0.3095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3793.077507][ T30] audit: type=1400 audit(2000000318.190:1904): avc: denied { nlmsg_write } for pid=12400 comm="syz.0.3095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3793.511687][ T30] audit: type=1400 audit(2000000318.620:1905): avc: denied { read } for pid=12402 comm="syz.0.3096" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3793.519583][ T30] audit: type=1400 audit(2000000318.630:1906): avc: denied { open } for pid=12402 comm="syz.0.3096" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3793.572944][ T30] audit: type=1400 audit(2000000318.680:1907): avc: denied { read } for pid=12402 comm="syz.0.3096" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3793.576121][ T30] audit: type=1400 audit(2000000318.680:1908): avc: denied { open } for pid=12402 comm="syz.0.3096" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3804.948875][T12420] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3101'. [ 3810.717310][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 3810.726624][ T30] audit: type=1400 audit(2000000335.830:1912): avc: denied { ioctl } for pid=12422 comm="syz.0.3102" path="socket:[30447]" dev="sockfs" ino=30447 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3828.056630][T12440] atomic_op 00000000436d376b conn xmit_atomic 0000000000000000 [ 3840.869885][ T30] audit: type=1400 audit(2000000365.980:1913): avc: denied { ioctl } for pid=12456 comm="syz.1.3114" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=31235 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3841.108449][ T30] audit: type=1400 audit(2000000366.220:1914): avc: denied { read } for pid=12460 comm="syz.0.3115" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3841.110734][ T30] audit: type=1400 audit(2000000366.220:1915): avc: denied { open } for pid=12460 comm="syz.0.3115" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3841.125659][ T30] audit: type=1400 audit(2000000366.240:1916): avc: denied { ioctl } for pid=12460 comm="syz.0.3115" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x700a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3844.936520][T12475] atomic_op 00000000447c1a5d conn xmit_atomic 0000000000000000 [ 3854.183557][ T30] audit: type=1400 audit(2000000379.290:1917): avc: denied { search } for pid=12477 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3854.184103][ T30] audit: type=1400 audit(2000000379.290:1918): avc: denied { search } for pid=12477 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=661 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3854.184661][ T30] audit: type=1400 audit(2000000379.290:1919): avc: denied { search } for pid=12477 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=799 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3854.184915][ T30] audit: type=1400 audit(2000000379.290:1920): avc: denied { search } for pid=12477 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=800 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3854.307890][ T30] audit: type=1400 audit(2000000379.420:1921): avc: denied { read open } for pid=12481 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=800 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3854.323610][ T30] audit: type=1400 audit(2000000379.420:1922): avc: denied { getattr } for pid=12481 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=800 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3854.617352][T12484] binfmt_misc: register: failed to install interpreter file ./file2 [ 3854.665432][ T30] audit: type=1400 audit(2000000379.770:1923): avc: denied { add_name } for pid=12477 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3854.666024][ T30] audit: type=1400 audit(2000000379.770:1924): avc: denied { create } for pid=12477 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3854.666478][ T30] audit: type=1400 audit(2000000379.770:1925): avc: denied { write open } for pid=12477 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=4246 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3854.666845][ T30] audit: type=1400 audit(2000000379.770:1926): avc: denied { append } for pid=12477 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=4246 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3855.763172][T12497] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3855.786090][T12497] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3856.368136][T12499] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3856.382011][T12499] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3859.410978][T12507] atomic_op 00000000bb66c05e conn xmit_atomic 0000000000000000 [ 3863.337034][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 3863.338099][ T30] audit: type=1400 audit(2000000388.440:1931): avc: denied { write } for pid=12512 comm="syz.1.3133" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 3875.616009][T12525] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3875.637980][T12525] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3875.883722][ T30] audit: type=1400 audit(2000000400.990:1932): avc: denied { create } for pid=12527 comm="syz.1.3137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3875.908861][ T30] audit: type=1400 audit(2000000401.020:1933): avc: denied { setopt } for pid=12527 comm="syz.1.3137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3880.199559][T12539] atomic_op 00000000116401e0 conn xmit_atomic 0000000000000000 [ 3889.025114][T12545] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3889.050678][T12545] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3889.433833][T12549] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3144'. [ 3891.595107][T12559] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3891.599388][T12559] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3892.224420][T12562] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3892.230114][T12562] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3893.453846][T12566] atomic_op 00000000ef4ce290 conn xmit_atomic 0000000000000000 [ 3897.711762][ T30] audit: type=1400 audit(2000000422.820:1934): avc: denied { setopt } for pid=12570 comm="syz.1.3154" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3897.744735][ T30] audit: type=1400 audit(2000000422.850:1935): avc: denied { connect } for pid=12570 comm="syz.1.3154" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3897.777671][ T30] audit: type=1400 audit(2000000422.890:1936): avc: denied { write } for pid=12570 comm="syz.1.3154" laddr=172.20.20.18 lport=4 faddr=172.30.1.2 fport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3909.614432][T12584] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3909.619150][T12584] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3911.706074][T12590] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3911.711570][T12590] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3914.597132][T12596] atomic_op 000000007ec7325b conn xmit_atomic 0000000000000000 [ 3916.298756][T12598] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3916.316121][T12598] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3918.954512][T12605] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3918.968091][T12605] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3919.458477][T12609] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3919.470310][T12609] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3919.760138][T12611] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3919.765572][T12611] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3921.567886][T12620] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3921.609233][T12620] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3922.063713][T12624] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3922.069192][T12624] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3922.384000][T12626] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3922.396085][T12626] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3922.638891][T12628] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3922.650219][T12628] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3926.074706][T12639] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3180'. [ 3929.287237][T12643] atomic_op 00000000c16d94d9 conn xmit_atomic 0000000000000000 [ 3938.875993][ T30] audit: type=1400 audit(2000000463.980:1937): avc: denied { read write } for pid=12655 comm="syz.1.3186" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 3938.883279][ T30] audit: type=1400 audit(2000000463.990:1938): avc: denied { open } for pid=12655 comm="syz.1.3186" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 3942.574743][T12664] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3942.579517][T12664] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3992.686703][T12745] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3219'. [ 3992.687558][T12745] netlink: 32 bytes leftover after parsing attributes in process `syz.0.3219'. [ 3993.731012][ T30] audit: type=1400 audit(2000000518.840:1939): avc: denied { setopt } for pid=12749 comm="syz.0.3221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3993.738896][ T30] audit: type=1400 audit(2000000518.850:1940): avc: denied { write } for pid=12749 comm="syz.0.3221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3994.108361][ T30] audit: type=1400 audit(2000000519.210:1941): avc: denied { execute } for pid=12751 comm="syz.0.3222" path="/284/net_prio.prioidx" dev="tmpfs" ino=1448 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4018.775021][ T30] audit: type=1400 audit(2000000543.790:1942): avc: denied { mount } for pid=12772 comm="syz.1.3229" name="/" dev="configfs" ino=1133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 4018.777408][ T30] audit: type=1400 audit(2000000543.890:1943): avc: denied { search } for pid=12772 comm="syz.1.3229" name="/" dev="configfs" ino=1133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 4018.786317][ T30] audit: type=1400 audit(2000000543.900:1944): avc: denied { setattr } for pid=12772 comm="syz.1.3229" name="/" dev="configfs" ino=1133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 4023.747614][ T30] audit: type=1400 audit(2000000548.830:1945): avc: denied { ioctl } for pid=12795 comm="syz.0.3234" path="socket:[32077]" dev="sockfs" ino=32077 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4023.748506][ T30] audit: type=1400 audit(2000000548.840:1946): avc: denied { write } for pid=12795 comm="syz.0.3234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4030.886324][T12808] atomic_op 00000000bb52880c conn xmit_atomic 0000000000000000 [ 4032.491757][ T30] audit: type=1400 audit(2000000557.600:1947): avc: denied { append } for pid=12812 comm="syz.1.3238" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 4032.499830][ T30] audit: type=1400 audit(2000000557.610:1948): avc: denied { open } for pid=12812 comm="syz.1.3238" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 4036.969022][T12819] atomic_op 00000000f8de6fdd conn xmit_atomic 0000000000000000 [ 4038.616733][T12833] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4038.620221][T12833] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4042.827223][T12839] atomic_op 0000000013c804b5 conn xmit_atomic 0000000000000000 [ 4052.041348][T12848] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4052.049443][T12848] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4052.104614][ T30] audit: type=1326 audit(2000000577.200:1949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12847 comm="syz.1.3251" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x0 [ 4066.286768][T12863] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4066.290203][T12863] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4066.569615][ T30] audit: type=1400 audit(2000000591.680:1950): avc: denied { read write } for pid=12865 comm="syz.1.3254" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 4066.575659][ T30] audit: type=1400 audit(2000000591.680:1951): avc: denied { open } for pid=12865 comm="syz.1.3254" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 4066.607751][ T30] audit: type=1400 audit(2000000591.720:1952): avc: denied { ioctl } for pid=12865 comm="syz.1.3254" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0xe500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 4066.936869][T12868] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4066.976014][T12868] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4067.574498][ T30] audit: type=1326 audit(2000000592.680:1953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12871 comm="syz.1.3257" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 4067.578295][ T30] audit: type=1326 audit(2000000592.690:1954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12871 comm="syz.1.3257" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 4067.582980][ T30] audit: type=1326 audit(2000000592.690:1955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12871 comm="syz.1.3257" exe="/syz-executor" sig=0 arch=c00000b7 syscall=451 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 4067.589666][ T30] audit: type=1326 audit(2000000592.700:1956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12871 comm="syz.1.3257" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 4067.597692][ T30] audit: type=1326 audit(2000000592.710:1957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12871 comm="syz.1.3257" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbab5b0e8 code=0x7ffc0000 [ 4067.895224][T12874] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4067.907272][T12874] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4068.496156][T12878] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4068.501325][T12878] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4069.330575][T12884] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4069.350033][T12884] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4069.734005][T12886] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4069.740887][T12886] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4070.158373][T12888] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4070.171370][T12888] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4074.529184][T12903] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4074.537828][T12903] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4076.157236][T12912] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4076.169492][T12912] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4076.591170][T12914] cgroup: fork rejected by pids controller in /syz1 [ 4077.758655][ T30] audit: type=1400 audit(2000000602.870:1958): avc: denied { execute } for pid=12918 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 4077.770327][ T30] audit: type=1400 audit(2000000602.880:1959): avc: denied { execute_no_trans } for pid=12918 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 4078.108432][ T30] audit: type=1400 audit(2000000603.220:1960): avc: denied { mounton } for pid=12919 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 4086.209148][T12919] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 4086.247954][T12919] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 4090.096262][T12919] hsr_slave_0: entered promiscuous mode [ 4090.104669][T12919] hsr_slave_1: entered promiscuous mode [ 4093.440120][T12919] 8021q: adding VLAN 0 to HW filter on device bond0 [ 4097.524852][ T30] audit: type=1400 audit(2000000622.630:1961): avc: denied { mount } for pid=12982 comm="syz.0.3280" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 4107.420496][T12919] veth0_vlan: entered promiscuous mode [ 4107.496994][T12919] veth1_vlan: entered promiscuous mode [ 4107.831780][T12919] veth0_macvtap: entered promiscuous mode [ 4107.901002][T12919] veth1_macvtap: entered promiscuous mode [ 4109.365439][ T30] audit: type=1400 audit(2000000634.470:1962): avc: denied { mounton } for pid=12919 comm="syz-executor" path="/syzkaller.5wZpvZ/syz-tmp" dev="vda" ino=1882 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 4109.398648][ T30] audit: type=1400 audit(2000000634.510:1963): avc: denied { mount } for pid=12919 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 4109.430319][ T30] audit: type=1400 audit(2000000634.540:1964): avc: denied { mounton } for pid=12919 comm="syz-executor" path="/syzkaller.5wZpvZ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 4109.449502][ T30] audit: type=1400 audit(2000000634.560:1965): avc: denied { mounton } for pid=12919 comm="syz-executor" path="/syzkaller.5wZpvZ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=32561 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 4109.505187][ T30] audit: type=1400 audit(2000000634.620:1966): avc: denied { unmount } for pid=12919 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 4109.527141][ T30] audit: type=1400 audit(2000000634.630:1967): avc: denied { mounton } for pid=12919 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 4109.531040][ T30] audit: type=1400 audit(2000000634.640:1968): avc: denied { mount } for pid=12919 comm="syz-executor" name="/" dev="gadgetfs" ino=3476 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 4109.574139][ T30] audit: type=1400 audit(2000000634.690:1969): avc: denied { mount } for pid=12919 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 4109.578503][ T30] audit: type=1400 audit(2000000634.690:1970): avc: denied { mounton } for pid=12919 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 4109.605780][ T30] audit: type=1400 audit(2000000634.720:1971): avc: denied { mount } for pid=12919 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4115.283361][T13046] vlan2: entered promiscuous mode [ 4115.284989][T13046] macvtap0: entered promiscuous mode [ 4124.195110][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 4124.195581][ T30] audit: type=1400 audit(2000000649.290:1973): avc: denied { map } for pid=13051 comm="syz.0.3293" path="socket:[33467]" dev="sockfs" ino=33467 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4124.195979][ T30] audit: type=1400 audit(2000000649.290:1974): avc: denied { read } for pid=13051 comm="syz.0.3293" path="socket:[33467]" dev="sockfs" ino=33467 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4127.469732][T13070] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4127.480049][T13070] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4128.644407][ T30] audit: type=1400 audit(2000000653.750:1975): avc: denied { kexec_image_load } for pid=13076 comm="syz.0.3303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 4146.473436][ T30] audit: type=1400 audit(2000000671.580:1976): avc: denied { bind } for pid=13101 comm="syz.1.3313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4146.481447][ T30] audit: type=1400 audit(2000000671.590:1977): avc: denied { setopt } for pid=13101 comm="syz.1.3313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4168.193824][ T30] audit: type=1400 audit(2000000692.260:1978): avc: denied { map } for pid=13114 comm="syz.0.3318" path="socket:[32745]" dev="sockfs" ino=32745 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 4178.844545][ T30] audit: type=1400 audit(2000000703.950:1979): avc: denied { create } for pid=13148 comm="syz.1.3331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 4178.909258][ T30] audit: type=1400 audit(2000000704.020:1980): avc: denied { bind } for pid=13148 comm="syz.1.3331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 4180.975582][T13165] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4180.981449][T13165] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4181.421802][T13166] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 4182.895767][T13181] pim6reg0: tun_chr_ioctl cmd 2214630434 [ 4184.560696][T13199] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4184.738752][T13199] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4187.036673][T13210] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3358'. [ 4187.098318][T13210] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3358'. [ 4193.260981][T13240] netlink: 'syz.1.3370': attribute type 21 has an invalid length. [ 4193.323970][T13241] atomic_op 00000000223d7878 conn xmit_atomic 0000000000000000 [ 4193.354656][T13240] IPv6: NLM_F_CREATE should be specified when creating new route [ 4197.981541][T13251] netlink: 'syz.1.3375': attribute type 4 has an invalid length. [ 4198.425545][T13251] netlink: 'syz.1.3375': attribute type 4 has an invalid length. [ 4203.098217][T13272] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 4203.485254][T13274] smc: net device bond0 applied user defined pnetid SYZ0 [ 4203.488970][T13274] smc: net device bond0 erased user defined pnetid SYZ0 [ 4207.693489][T13278] atomic_op 00000000aab1f1b5 conn xmit_atomic 0000000000000000 [ 4216.251714][T13286] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4216.286126][T13286] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4218.927908][ T30] audit: type=1400 audit(2000000744.040:1981): avc: denied { connect } for pid=13287 comm="syz.1.3390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4219.583978][ T30] audit: type=1400 audit(2000000744.680:1982): avc: denied { read } for pid=13287 comm="syz.1.3390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4220.227217][ T30] audit: type=1400 audit(2000000745.340:1983): avc: denied { write } for pid=13287 comm="syz.1.3390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4242.556835][T13313] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4242.579863][T13313] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4243.236068][T13316] atomic_op 00000000c08de757 conn xmit_atomic 0000000000000000 [ 4243.710104][ T30] audit: type=1400 audit(2000000768.800:1984): avc: denied { relabelfrom } for pid=13314 comm="syz.1.3398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 4243.716037][ T30] audit: type=1400 audit(2000000768.820:1985): avc: denied { relabelto } for pid=13314 comm="syz.1.3398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 4253.193658][ T30] audit: type=1400 audit(2000000778.300:1986): avc: denied { read } for pid=13320 comm="syz.0.3400" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 4253.216287][ T30] audit: type=1400 audit(2000000778.330:1987): avc: denied { ioctl } for pid=13320 comm="syz.0.3400" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 4260.853934][T13331] atomic_op 000000001fc6d557 conn xmit_atomic 0000000000000000 [ 4274.073842][T13357] netlink: 96 bytes leftover after parsing attributes in process `syz.0.3414'. [ 4274.945853][T13362] atomic_op 000000007ce81bbe conn xmit_atomic 0000000000000000 [ 4293.261703][T13397] netlink: 'syz.1.3428': attribute type 1 has an invalid length. [ 4293.263930][T13397] netlink: 224 bytes leftover after parsing attributes in process `syz.1.3428'. [ 4297.728237][T13422] netlink: 32 bytes leftover after parsing attributes in process `syz.0.3438'. [ 4300.234786][T13432] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4300.238688][T13432] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4300.556609][ T30] audit: type=1400 audit(2000000825.670:1988): avc: denied { create } for pid=13434 comm="syz.1.3445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4300.574511][ T30] audit: type=1400 audit(2000000825.690:1989): avc: denied { setopt } for pid=13434 comm="syz.1.3445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4300.617076][ T30] audit: type=1400 audit(2000000825.730:1990): avc: denied { create } for pid=13434 comm="syz.1.3445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 4300.624806][ T30] audit: type=1400 audit(2000000825.740:1991): avc: denied { write } for pid=13434 comm="syz.1.3445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 4301.287507][T13440] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3447'. [ 4319.188527][ T30] audit: type=1400 audit(2000000844.120:1992): avc: denied { ioctl } for pid=13464 comm="syz.1.3452" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x640d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 4326.630178][ T30] audit: type=1400 audit(2000000851.740:1993): avc: denied { read } for pid=13476 comm="syz.1.3455" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 4326.637621][ T30] audit: type=1400 audit(2000000851.750:1994): avc: denied { open } for pid=13476 comm="syz.1.3455" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 4326.667553][ T30] audit: type=1400 audit(2000000851.770:1995): avc: denied { ioctl } for pid=13476 comm="syz.1.3455" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 4329.263416][ T30] audit: type=1326 audit(2000000854.370:1996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13486 comm="syz.0.3460" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 4329.268933][ T30] audit: type=1326 audit(2000000854.380:1997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13486 comm="syz.0.3460" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 4329.287669][ T30] audit: type=1326 audit(2000000854.400:1998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13486 comm="syz.0.3460" exe="/syz-executor" sig=0 arch=c00000b7 syscall=185 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 4329.288702][ T30] audit: type=1326 audit(2000000854.400:1999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13486 comm="syz.0.3460" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015b0e8 code=0x7ffc0000 [ 4330.690228][T13495] binder: 13493:13495 ioctl c0306201 0 returned -14 [ 4330.690241][ T30] audit: type=1400 audit(2000000855.800:2000): avc: denied { ioctl } for pid=13493 comm="syz.1.3464" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4330.704956][T13495] binder: 13493:13495 got reply transaction with no transaction stack [ 4330.707540][T13495] binder: 13493:13495 transaction reply to 0:0 failed 40/29201/-71, code 0 size 0-0 line 3054 [ 4330.719362][T12758] binder: undelivered TRANSACTION_ERROR: 29201 [ 4333.881375][ T30] audit: type=1400 audit(2000000858.980:2001): avc: denied { write } for pid=13497 comm="syz.1.3465" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 4333.980677][ T30] audit: type=1400 audit(2000000859.090:2002): avc: denied { bind } for pid=13506 comm="syz.0.3469" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4337.675362][T13521] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3475'. [ 4337.698259][T13521] veth0_macvtap: left promiscuous mode [ 4354.696562][ T30] audit: type=1400 audit(2000000879.800:2003): avc: denied { mounton } for pid=13537 comm="syz.1.3481" path="/116/file0" dev="tmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4357.610069][ T30] audit: type=1400 audit(2000000882.720:2004): avc: denied { read } for pid=13550 comm="syz.0.3485" path="socket:[34539]" dev="sockfs" ino=34539 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4362.056499][T13565] netlink: 'syz.0.3491': attribute type 10 has an invalid length. [ 4365.810624][T13574] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3495'. [ 4365.891328][T13574] gretap0: entered promiscuous mode [ 4365.894547][T13574] macsec1: entered promiscuous mode [ 4365.896148][T13574] macsec1: entered allmulticast mode [ 4365.901315][T13574] gretap0: entered allmulticast mode [ 4365.948330][T13574] gretap0: left allmulticast mode [ 4365.953688][T13574] gretap0: left promiscuous mode [ 4366.501040][ T30] audit: type=1400 audit(2000000891.590:2005): avc: denied { unmount } for pid=12919 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4370.485307][ T30] audit: type=1400 audit(2000000895.560:2006): avc: denied { bind } for pid=13598 comm="syz.0.3507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4370.485980][ T30] audit: type=1400 audit(2000000895.570:2007): avc: denied { create } for pid=13598 comm="syz.0.3507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 4389.598858][T13655] netlink: 68 bytes leftover after parsing attributes in process `syz.1.3529'. [ 4389.607582][T13655] netlink: 56 bytes leftover after parsing attributes in process `syz.1.3529'. [ 4390.517449][T13661] misc userio: No port type given on /dev/userio [ 4394.981080][T13090]  (unregistering): (slave bond_slave_0): Releasing backup interface [ 4395.200344][T13090]  (unregistering): (slave bond_slave_1): Releasing backup interface [ 4395.280492][T13090]  (unregistering): Released all slaves [ 4396.531004][T13090] veth1_macvtap: left promiscuous mode [ 4396.533613][T13090] veth0_macvtap: left promiscuous mode [ 4396.535985][T13090] veth1_vlan: left promiscuous mode [ 4396.537499][T13090] veth0_vlan: left promiscuous mode [ 4400.104204][ T30] audit: type=1400 audit(2000000925.210:2008): avc: denied { write } for pid=13692 comm="syz.0.3545" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4425.983798][ T30] audit: type=1400 audit(2000000951.090:2009): avc: denied { create } for pid=13715 comm="syz.0.3553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4428.833615][ T30] audit: type=1400 audit(2000000953.650:2010): avc: denied { mount } for pid=13720 comm="syz.1.3555" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 4436.256001][ T30] audit: type=1400 audit(2000000961.360:2011): avc: denied { unmount } for pid=12919 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 4446.834183][T13747] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 4466.111682][T13773] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 4475.163196][T13786] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 4486.838511][T13814] atomic_op 00000000ea84b5f4 conn xmit_atomic 0000000000000000 [ 4505.745113][T13853] atomic_op 00000000ea84b5f4 conn xmit_atomic 0000000000000000 [ 4515.281056][T13866] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3593'. [ 4515.545325][T13868] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4515.550273][T13868] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4521.024229][T13875] atomic_op 0000000066d5e41d conn xmit_atomic 0000000000000000 [ 4533.755287][ T30] audit: type=1400 audit(2000001058.860:2012): avc: denied { read } for pid=13893 comm="syz.1.3603" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 4533.770420][ T30] audit: type=1400 audit(2000001058.860:2013): avc: denied { open } for pid=13893 comm="syz.1.3603" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 4534.116302][T13894] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4534.129495][T13894] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4540.449242][T13898] atomic_op 0000000029a09c33 conn xmit_atomic 0000000000000000 [ 4558.745574][T13924] atomic_op 0000000048722987 conn xmit_atomic 0000000000000000 [ 4584.018326][T13967] atomic_op 000000003c83e68a conn xmit_atomic 0000000000000000 [ 4622.774956][ T30] audit: type=1400 audit(2000001147.820:2014): avc: denied { name_bind } for pid=13990 comm="syz.1.3627" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 4622.776035][ T30] audit: type=1400 audit(2000001147.820:2015): avc: denied { node_bind } for pid=13990 comm="syz.1.3627" saddr=fe80::aa src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 4625.081959][T13999] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3629'. [ 4629.655899][ T30] audit: type=1400 audit(2000001154.770:2016): avc: denied { read } for pid=14004 comm="syz.0.3632" path="socket:[37336]" dev="sockfs" ino=37336 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4630.338979][ T30] audit: type=1400 audit(2000001155.450:2017): avc: denied { setopt } for pid=14004 comm="syz.0.3632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4641.344433][ T30] audit: type=1400 audit(2000001166.350:2018): avc: denied { read write } for pid=14017 comm="syz.1.3637" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 4641.378238][ T30] audit: type=1400 audit(2000001166.350:2019): avc: denied { open } for pid=14017 comm="syz.1.3637" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 4641.530890][ T8766] hid (null): global environment stack underflow [ 4641.624544][ T8766] hid (null): invalid report_count 458457392 [ 4641.699537][ T8766] hid (null): report_id 0 is invalid [ 4641.763287][ T8766] hid (null): unknown global tag 0xc [ 4641.803623][ T8766] hid (null): unknown global tag 0xd [ 4644.493994][ T8766] hid-generic 0FFF:0007:0003.0008: global environment stack underflow [ 4644.500588][ T8766] hid-generic 0FFF:0007:0003.0008: item 0 0 1 11 parsing failed [ 4645.254749][ T8766] hid-generic 0FFF:0007:0003.0008: probe with driver hid-generic failed with error -22 [ 4656.825312][ T30] audit: type=1400 audit(2000001181.930:2020): avc: denied { watch } for pid=14033 comm="syz.1.3641" path="/syzcgroup/unified/syz1" dev="cgroup2" ino=33 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 4659.738865][ T30] audit: type=1400 audit(2000001184.830:2021): avc: denied { bind } for pid=14039 comm="syz.0.3644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4659.807294][T14042] netlink: 'syz.0.3644': attribute type 10 has an invalid length. [ 4678.956379][T14071] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4678.997405][T14071] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4687.104762][T14086] veth0_vlan: entered allmulticast mode [ 4767.133730][ T30] audit: type=1400 audit(2000001292.240:2022): avc: denied { getopt } for pid=14257 comm="syz.0.3696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4784.438195][ T30] audit: type=1400 audit(2000001309.550:2023): avc: denied { accept } for pid=14300 comm="syz.1.3713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4784.478631][ T30] audit: type=1400 audit(2000001309.570:2024): avc: denied { read } for pid=14300 comm="syz.1.3713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4792.397027][T14314] fuse: Bad value for 'fd' [ 4795.978854][T14329] fuse: Bad value for 'fd' [ 4798.737411][T14343] fuse: Bad value for 'fd' [ 4799.789293][ T30] audit: type=1400 audit(2000001324.900:2025): avc: denied { ioctl } for pid=14345 comm="syz.0.3730" path="socket:[36838]" dev="sockfs" ino=36838 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4815.086206][T14404] snd_dummy snd_dummy.0: control 0:0:0:syz0:0 is already present [ 4815.954740][ T30] audit: type=1400 audit(2000001341.060:2026): avc: denied { nlmsg_write } for pid=14408 comm="syz.1.3758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 4821.760506][T14426] fuse: Bad value for 'fd' [ 4849.822965][T14446] fuse: Bad value for 'fd' [ 4854.146152][ T30] audit: type=1400 audit(2000001379.260:2027): avc: denied { ioctl } for pid=14452 comm="syz.1.3774" path="socket:[38032]" dev="sockfs" ino=38032 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4871.129907][T14468] fuse: Bad value for 'fd' [ 4880.975236][ T30] audit: type=1400 audit(2000001406.090:2028): avc: denied { append } for pid=14479 comm="syz.0.3780" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 4883.322386][ C1] vkms_vblank_simulate: vblank timer overrun [ 4884.619020][ C1] vkms_vblank_simulate: vblank timer overrun [ 4889.141828][ T8271] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 4889.157689][ T8271] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 4889.168222][ T8271] hid-generic 0000:0000:0000.0009: unknown main item tag 0x2 [ 4889.190218][ T8271] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 4889.200456][ T8271] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 4889.208763][ T8271] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 4889.213928][ T8271] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 4889.217924][ T8271] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 4889.221624][ T8271] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 4889.226051][ T8271] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 4889.415007][ T8271] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz0] on syz1 [ 4891.284292][T14500] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3789'. [ 4891.291556][T14500] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3789'. [ 4891.399098][T14498] fido_id[14498]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 4905.609057][T14516] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 4940.389455][T14544] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4940.511367][T14544] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4952.302378][T14549] netlink: 'syz.1.3804': attribute type 1 has an invalid length. [ 4952.304822][T14549] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3804'. [ 4952.311266][T14549] netlink: 'syz.1.3804': attribute type 1 has an invalid length. [ 4952.367279][T14549] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3804'. [ 4973.885322][T14582] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 4973.885998][T14582] IPv6: NLM_F_CREATE should be set when creating new route [ 4979.918641][T14592] [ 4979.922375][T14592] ====================================================== [ 4979.922977][T14592] WARNING: possible circular locking dependency detected [ 4979.924012][T14592] syzkaller #0 Not tainted [ 4979.924345][T14592] ------------------------------------------------------ [ 4979.924715][T14592] syz.0.3820/14592 is trying to acquire lock: [ 4979.925138][T14592] ffff800087470148 (pcpu_alloc_mutex){+.+.}-{4:4}, at: pcpu_alloc_noprof+0x8b4/0x1228 [ 4979.927845][T14592] [ 4979.927845][T14592] but task is already holding lock: [ 4979.928223][T14592] ffff00001472ec40 (&q->q_usage_counter(io)#33){++++}-{0:0}, at: __blk_mq_update_nr_hw_queues+0x65c/0xd38 [ 4979.929140][T14592] [ 4979.929140][T14592] which lock already depends on the new lock. [ 4979.929140][T14592] [ 4979.929646][T14592] [ 4979.929646][T14592] the existing dependency chain (in reverse order) is: [ 4979.930115][T14592] [ 4979.930115][T14592] -> #2 (&q->q_usage_counter(io)#33){++++}-{0:0}: [ 4979.931281][T14592] blk_alloc_queue+0x538/0x644 [ 4979.931714][T14592] blk_mq_alloc_queue+0x144/0x220 [ 4979.932349][T14592] __blk_mq_alloc_disk+0x20/0x1a4 [ 4979.932881][T14592] nbd_dev_add+0x3c0/0x9c0 [ 4979.934267][T14592] nbd_init+0xd4/0x1a8 [ 4979.935544][T14592] do_one_initcall+0x130/0x7f0 [ 4979.937617][T14592] kernel_init_freeable+0x48c/0x70c [ 4979.938557][T14592] kernel_init+0x24/0x1dc [ 4979.939006][T14592] ret_from_fork+0x10/0x20 [ 4979.939622][T14592] [ 4979.939622][T14592] -> #1 (fs_reclaim){+.+.}-{0:0}: [ 4979.940650][T14592] fs_reclaim_acquire+0x138/0x160 [ 4979.941125][T14592] prepare_alloc_pages+0x168/0x560 [ 4979.941683][T14592] __alloc_frozen_pages_noprof+0x144/0x1f20 [ 4979.942444][T14592] __alloc_pages_noprof+0x14/0x114 [ 4979.943119][T14592] pcpu_populate_chunk+0xf0/0x90c [ 4979.943528][T14592] pcpu_alloc_noprof+0x688/0x1228 [ 4979.943972][T14592] bpf_map_alloc_percpu+0xe4/0x5ac [ 4979.944427][T14592] htab_map_alloc+0x944/0x10d4 [ 4979.945455][T14592] map_create+0x3b8/0x1a68 [ 4979.946440][T14592] __sys_bpf+0xa30/0x29c8 [ 4979.947658][T14592] __arm64_sys_bpf+0x70/0xa4 [ 4979.949034][T14592] invoke_syscall+0x6c/0x258 [ 4979.950363][T14592] el0_svc_common.constprop.0+0xac/0x230 [ 4979.952401][T14592] do_el0_svc+0x40/0x58 [ 4979.954326][T14592] el0_svc+0x50/0x1a0 [ 4979.955566][T14592] el0t_64_sync_handler+0xa0/0xe4 [ 4979.956974][T14592] el0t_64_sync+0x198/0x19c [ 4979.958320][T14592] [ 4979.958320][T14592] -> #0 (pcpu_alloc_mutex){+.+.}-{4:4}: [ 4979.960593][T14592] __lock_acquire+0x1638/0x2380 [ 4979.962022][T14592] lock_acquire+0x310/0x38c [ 4979.963746][T14592] __mutex_lock+0x144/0xffc [ 4979.965857][T14592] _mutex_lock_killable+0x24/0x30 [ 4979.967472][T14592] pcpu_alloc_noprof+0x8b4/0x1228 [ 4979.968998][T14592] sbitmap_init_node+0x224/0x718 [ 4979.970407][T14592] sbitmap_queue_init_node+0x3c/0x3d0 [ 4979.972256][T14592] blk_mq_init_tags+0x100/0x230 [ 4979.974031][T14592] blk_mq_alloc_map_and_rqs+0xa4/0xc54 [ 4979.975240][T14592] __blk_mq_alloc_map_and_rqs+0x100/0x1dc [ 4979.976406][T14592] __blk_mq_update_nr_hw_queues+0x7d8/0xd38 [ 4979.977733][T14592] blk_mq_update_nr_hw_queues+0x44/0x68 [ 4979.979225][T14592] nbd_start_device+0x128/0xa38 [ 4979.981109][T14592] nbd_genl_connect+0xcb4/0x14c4 [ 4979.982998][T14592] genl_family_rcv_msg_doit+0x1b8/0x280 [ 4979.985059][T14592] genl_rcv_msg+0x3ec/0x5bc [ 4979.986424][T14592] netlink_rcv_skb+0x19c/0x338 [ 4979.987978][T14592] genl_rcv+0x38/0x50 [ 4979.989018][T14592] netlink_unicast+0x424/0x700 [ 4979.990171][T14592] netlink_sendmsg+0x644/0xa54 [ 4979.991578][T14592] __sock_sendmsg+0xc8/0x168 [ 4979.993432][T14592] ____sys_sendmsg+0x500/0x764 [ 4979.995483][T14592] ___sys_sendmsg+0x11c/0x19c [ 4979.997286][T14592] __sys_sendmsg+0x114/0x19c [ 4979.998351][T14592] __arm64_sys_sendmsg+0x70/0xa0 [ 4979.998706][T14592] invoke_syscall+0x6c/0x258 [ 4979.998989][T14592] el0_svc_common.constprop.0+0xac/0x230 [ 4979.999317][T14592] do_el0_svc+0x40/0x58 [ 4979.999609][T14592] el0_svc+0x50/0x1a0 [ 4979.999897][T14592] el0t_64_sync_handler+0xa0/0xe4 [ 4980.000323][T14592] el0t_64_sync+0x198/0x19c [ 4980.000643][T14592] [ 4980.000643][T14592] other info that might help us debug this: [ 4980.000643][T14592] [ 4980.001162][T14592] Chain exists of: [ 4980.001162][T14592] pcpu_alloc_mutex --> fs_reclaim --> &q->q_usage_counter(io)#33 [ 4980.001162][T14592] [ 4980.002124][T14592] Possible unsafe locking scenario: [ 4980.002124][T14592] [ 4980.002655][T14592] CPU0 CPU1 [ 4980.002929][T14592] ---- ---- [ 4980.003293][T14592] lock(&q->q_usage_counter(io)#33); [ 4980.003680][T14592] lock(fs_reclaim); [ 4980.004055][T14592] lock(&q->q_usage_counter(io)#33); [ 4980.004552][T14592] lock(pcpu_alloc_mutex); [ 4980.005002][T14592] [ 4980.005002][T14592] *** DEADLOCK *** [ 4980.005002][T14592] [ 4980.005446][T14592] 6 locks held by syz.0.3820/14592: [ 4980.005806][T14592] #0: ffff800088988950 (cb_lock){++++}-{4:4}, at: genl_rcv+0x28/0x50 [ 4980.006343][T14592] #1: ffff800088988888 (genl_mutex){+.+.}-{4:4}, at: genl_rcv_msg+0x41c/0x5bc [ 4980.006964][T14592] #2: ffff00001490e988 (&set->update_nr_hwq_lock){++++}-{4:4}, at: blk_mq_update_nr_hw_queues+0x2c/0x68 [ 4980.007735][T14592] #3: ffff00001490e8d8 (&set->tag_list_lock){+.+.}-{4:4}, at: blk_mq_update_nr_hw_queues+0x38/0x68 [ 4980.008477][T14592] #4: ffff00001472ec40 (&q->q_usage_counter(io)#33){++++}-{0:0}, at: __blk_mq_update_nr_hw_queues+0x65c/0xd38 [ 4980.009311][T14592] #5: ffff00001472ec78 (&q->q_usage_counter(queue)#17){+.+.}-{0:0}, at: __blk_mq_update_nr_hw_queues+0x65c/0xd38 [ 4980.010248][T14592] [ 4980.010248][T14592] stack backtrace: [ 4980.011294][T14592] CPU: 1 UID: 0 PID: 14592 Comm: syz.0.3820 Not tainted syzkaller #0 PREEMPT [ 4980.011851][T14592] Hardware name: linux,dummy-virt (DT) [ 4980.012904][T14592] Call trace: [ 4980.013472][T14592] show_stack+0x18/0x24 (C) [ 4980.013979][T14592] dump_stack_lvl+0xa4/0xf4 [ 4980.014321][T14592] dump_stack+0x1c/0x28 [ 4980.014660][T14592] print_circular_bug+0x28c/0x370 [ 4980.015013][T14592] check_noncircular+0x168/0x17c [ 4980.015389][T14592] __lock_acquire+0x1638/0x2380 [ 4980.015905][T14592] lock_acquire+0x310/0x38c [ 4980.016912][T14592] __mutex_lock+0x144/0xffc [ 4980.017916][T14592] _mutex_lock_killable+0x24/0x30 [ 4980.019234][T14592] pcpu_alloc_noprof+0x8b4/0x1228 [ 4980.020423][T14592] sbitmap_init_node+0x224/0x718 [ 4980.021552][T14592] sbitmap_queue_init_node+0x3c/0x3d0 [ 4980.023304][T14592] blk_mq_init_tags+0x100/0x230 [ 4980.024974][T14592] blk_mq_alloc_map_and_rqs+0xa4/0xc54 [ 4980.026721][T14592] __blk_mq_alloc_map_and_rqs+0x100/0x1dc [ 4980.027957][T14592] __blk_mq_update_nr_hw_queues+0x7d8/0xd38 [ 4980.029205][T14592] blk_mq_update_nr_hw_queues+0x44/0x68 [ 4980.030471][T14592] nbd_start_device+0x128/0xa38 [ 4980.031637][T14592] nbd_genl_connect+0xcb4/0x14c4 [ 4980.032853][T14592] genl_family_rcv_msg_doit+0x1b8/0x280 [ 4980.034449][T14592] genl_rcv_msg+0x3ec/0x5bc [ 4980.035506][T14592] netlink_rcv_skb+0x19c/0x338 [ 4980.035961][T14592] genl_rcv+0x38/0x50 [ 4980.036333][T14592] netlink_unicast+0x424/0x700 [ 4980.036854][T14592] netlink_sendmsg+0x644/0xa54 [ 4980.037290][T14592] __sock_sendmsg+0xc8/0x168 [ 4980.037729][T14592] ____sys_sendmsg+0x500/0x764 [ 4980.038171][T14592] ___sys_sendmsg+0x11c/0x19c [ 4980.038672][T14592] __sys_sendmsg+0x114/0x19c [ 4980.039111][T14592] __arm64_sys_sendmsg+0x70/0xa0 [ 4980.039617][T14592] invoke_syscall+0x6c/0x258 [ 4980.040045][T14592] el0_svc_common.constprop.0+0xac/0x230 [ 4980.040526][T14592] do_el0_svc+0x40/0x58 [ 4980.040979][T14592] el0_svc+0x50/0x1a0 [ 4980.041387][T14592] el0t_64_sync_handler+0xa0/0xe4 [ 4980.043241][T14592] el0t_64_sync+0x198/0x19c [ 4980.207096][ T30] audit: type=1400 audit(2000001505.320:2029): avc: denied { write } for pid=3313 comm="syz-executor" path="pipe:[1989]" dev="pipefs" ino=1989 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 4981.279537][T14592] nbd0: detected capacity change from 0 to 127 [ 4981.975225][ T48] block nbd0: Receive control failed (result -104) [ 4981.978963][T14593] block nbd0: Receive control failed (result -32) [ 4985.960078][T14142] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4986.029158][T14142] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4986.129522][T14142] bond0 (unregistering): Released all slaves [ 4986.441330][T14142] hsr_slave_0: left promiscuous mode [ 4986.480095][T14142] hsr_slave_1: left promiscuous mode [ 4986.596702][T14142] veth1_macvtap: left promiscuous mode [ 4986.599047][T14142] veth1_vlan: left promiscuous mode [ 4986.600963][T14142] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 14:46:21 Registers: info registers vcpu 0 CPU#0 PC=ffff80008025098c X00=0000000000000000 X01=ffff800085804400 X02=0000000000000000 X03=dfff800000000000 X04=1fffe00001f51791 X05=ffff00001fe9db8c X06=ffff800081afd980 X07=0000000000000000 X08=ffff00000fa8bc80 X09=ffff000012a49ff0 X10=ffff700010000b80 X11=1ffff00010000b80 X12=ffff700010000b81 X13=0000000000000000 X14=1fffe0000386dc65 X15=ffff0000238c9a00 X16=0000000000000000 X17=1fffe0000386db78 X18=ffff0000238c9a10 X19=0000000000000043 X20=ffff00001727c600 X21=ffff00001734c000 X22=0000000000000430 X23=ffff0000180daa00 X24=1fffe00002d7b400 X25=0000000000000036 X26=0000000000000040 X27=0000000000000000 X28=0000000000c5e395 X29=ffff800080006160 X30=ffff8000827906fc SP=ffff800080006160 PSTATE=20000005 --C- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=000000756c6c2570:6f6f6c2f7665642f Q02=0000000000000000:f0000000ffffffff Q03=ffffff000000ff00:0000000000000000 Q04=0000000000000000:fff000f000000000 Q05=bb448243222c92da:e3914ed4e87380b0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc9378480:0000ffffc9378480 Q17=ffffff80ffffffd0:0000ffffc9378450 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800080317b44 X00=000000000000000d X01=ffff000015293c80 X02=0000000000000000 X03=0000000000000000 X04=1fffe00002a52791 X05=ffff00006a0ab590 X06=ffff60000d4156b2 X07=0000000000000001 X08=ffff00006a0ab593 X09=dfff800000000000 X10=ffff60000d4156b2 X11=1fffe0000d4156b2 X12=ffff60000d4156b3 X13=0000000000000001 X14=0000000000000000 X15=000000000002e858 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff8000897f8fc8 X20=ffff000015294800 X21=0000000000000002 X22=ffff8000899e6d60 X23=ffff000015293c80 X24=0000000000000002 X25=ffff800088b93000 X26=00000000000000c8 X27=0000000000000006 X28=0000000000000005 X29=ffff8000a3f16760 X30=ffff800080317b44 SP=ffff8000a3f16760 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffcadbbef0:09a620d8012ec700 Q02=0000ffffcadbbed0:ffffff80ffffffd8 Q03=0000ffffcadbbf80:0000ffffcadbbf80 Q04=0000ffffcadbbf80:0000ffffb01371c8 Q05=0000ffffcadbbf50:0000ffffcadbbf80 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffcadbc1a0:0000ffffcadbc1a0 Q17=ffffff80ffffffd0:0000ffffcadbc170 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000