last executing test programs: 6m0.430570638s ago: executing program 0 (id=202): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) r2 = accept$inet(r1, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x2, @empty}, 0x2a) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000100)) 4m40.373419823s ago: executing program 0 (id=202): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) r2 = accept$inet(r1, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x2, @empty}, 0x2a) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000100)) 3m33.520648753s ago: executing program 0 (id=202): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) r2 = accept$inet(r1, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x2, @empty}, 0x2a) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000100)) 2m3.393932928s ago: executing program 0 (id=202): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) r2 = accept$inet(r1, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x2, @empty}, 0x2a) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000100)) 41.123066786s ago: executing program 0 (id=202): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) r2 = accept$inet(r1, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x2, @empty}, 0x2a) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000100)) 16.774911405s ago: executing program 1 (id=334): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000080)=0x3ff, 0x4) recvmmsg(r0, &(0x7f0000001f40)=[{{0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000001880)=""/252, 0xfc}], 0x1, &(0x7f0000001e40)=""/23, 0x17}}], 0x1, 0x0, 0x0) 15.934232691s ago: executing program 1 (id=335): socket(0x10, 0x3, 0x0) r0 = socket(0x840000000002, 0x3, 0x100) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r1) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) r4 = syz_open_procfs(r3, &(0x7f0000000600)='fd/4\x00') ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0x8004587d, &(0x7f0000000180)={@id={0x2, 0x0, @d}}) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000100), 0x0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005240), 0x264e33, 0x0) 11.036149424s ago: executing program 1 (id=336): r0 = syz_usb_connect(0x0, 0x2d, &(0x7f00000012c0)=ANY=[@ANYBLOB="120100001ddf8208c007121522300000000109021b0001000000010904000001faf40d000905820349"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) r2 = syz_io_uring_setup(0xec4, &(0x7f00000004c0)={0x0, 0x2f4c, 0x400, 0x20000003, 0x26d}, &(0x7f0000000540)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd_index=0x4}) socket$nl_generic(0x10, 0x3, 0x10) io_uring_enter(r2, 0x47fa, 0x0, 0x0, 0x0, 0x0) read$char_usb(r1, &(0x7f00000009c0)=""/73, 0x49) syz_usb_ep_write$ath9k_ep1(r0, 0x82, 0x0, 0x0) syz_usb_connect(0x1, 0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="1201000014da2108ab12a390eb1e000000010902240001b30000040904410017ff5d81000905"], 0x0) 8.062794868s ago: executing program 1 (id=337): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000004000)=[{{&(0x7f0000000000)={0x2, 0x4e24, @remote}, 0x10, 0x0}}, {{&(0x7f0000000380)={0x2, 0x4e21, @loopback}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1c002900000000000000000007000000440c09837f000001ff08000100000000"], 0x20}}], 0x2, 0x40008c0) 6.599888152s ago: executing program 1 (id=338): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000180)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet6(r1, &(0x7f0000001900)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c, &(0x7f0000001200)=[{&(0x7f0000000040)="bd", 0x1}], 0x1}}], 0x1, 0xc0c0) 5.751141629s ago: executing program 1 (id=339): madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) r0 = gettid() setpgid(r0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffff}, 0x0) syz_usb_connect(0x0, 0x5f, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000b1f203401e0903003bd7010203010902"], 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) r5 = epoll_create1(0x0) epoll_pwait(r5, 0x0, 0x0, 0xa2c, 0x0, 0x0) r6 = syz_io_uring_setup(0xd2, 0x0, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, 0x0, 0x0, 0x4) syz_io_uring_submit(r7, r8, 0x0) io_uring_enter(r6, 0x47ba, 0x0, 0x0, 0x0, 0x0) epoll_pwait(r5, 0x0, 0x0, 0xfff, 0x0, 0x0) close(r3) 0s ago: executing program 0 (id=202): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) listen(r1, 0x0) r2 = accept$inet(r1, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x2, @empty}, 0x2a) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000100)) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:64824' (ED25519) to the list of known hosts. [ 201.929896][ T30] audit: type=1400 audit(201.220:58): avc: denied { name_bind } for pid=3271 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 202.413841][ T30] audit: type=1400 audit(201.700:59): avc: denied { execute } for pid=3273 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 202.421172][ T30] audit: type=1400 audit(201.700:60): avc: denied { execute_no_trans } for pid=3273 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 206.874561][ T30] audit: type=1400 audit(206.160:61): avc: denied { mounton } for pid=3273 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 206.893521][ T30] audit: type=1400 audit(206.180:62): avc: denied { mount } for pid=3273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 206.951445][ T3273] cgroup: Unknown subsys name 'net' [ 206.986282][ T30] audit: type=1400 audit(206.270:63): avc: denied { unmount } for pid=3273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 207.500003][ T3273] cgroup: Unknown subsys name 'cpuset' [ 207.543079][ T3273] cgroup: Unknown subsys name 'rlimit' [ 208.002735][ T30] audit: type=1400 audit(207.290:64): avc: denied { setattr } for pid=3273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 208.020841][ T30] audit: type=1400 audit(207.300:65): avc: denied { mounton } for pid=3273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 208.029995][ T30] audit: type=1400 audit(207.310:66): avc: denied { mount } for pid=3273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 208.723247][ T3276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 208.733354][ T30] audit: type=1400 audit(208.010:67): avc: denied { relabelto } for pid=3276 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 208.749590][ T30] audit: type=1400 audit(208.020:68): avc: denied { write } for pid=3276 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 208.837920][ T30] audit: type=1400 audit(208.120:69): avc: denied { read } for pid=3273 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 208.840587][ T30] audit: type=1400 audit(208.130:70): avc: denied { open } for pid=3273 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 208.865218][ T3273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 221.295035][ T30] audit: type=1400 audit(220.580:71): avc: denied { execmem } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 221.541724][ T30] audit: type=1400 audit(220.760:72): avc: denied { read } for pid=3279 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 221.542770][ T30] audit: type=1400 audit(220.760:73): avc: denied { open } for pid=3279 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 221.543560][ T30] audit: type=1400 audit(220.780:74): avc: denied { mounton } for pid=3279 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 221.544325][ T30] audit: type=1400 audit(220.820:75): avc: denied { module_request } for pid=3279 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 221.985984][ T30] audit: type=1400 audit(221.260:76): avc: denied { sys_module } for pid=3280 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 229.683283][ T3280] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 229.824451][ T3280] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 229.974833][ T3279] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 230.122004][ T3279] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 233.620562][ T3279] hsr_slave_0: entered promiscuous mode [ 233.674026][ T3279] hsr_slave_1: entered promiscuous mode [ 233.802866][ T3280] hsr_slave_0: entered promiscuous mode [ 233.850776][ T3280] hsr_slave_1: entered promiscuous mode [ 233.898831][ T3280] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 233.900585][ T3280] Cannot create hsr debugfs directory [ 235.600446][ T30] audit: type=1400 audit(234.880:77): avc: denied { create } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 235.602063][ T30] audit: type=1400 audit(234.880:78): avc: denied { write } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 235.608820][ T30] audit: type=1400 audit(234.890:79): avc: denied { read } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 235.630869][ T3280] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 235.715330][ T3280] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 235.834970][ T3280] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 235.942595][ T3280] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 236.553660][ T3279] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 236.611617][ T3279] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 236.671601][ T3279] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 236.718643][ T3279] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 239.552080][ T3280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 240.685052][ T3279] 8021q: adding VLAN 0 to HW filter on device bond0 [ 253.132167][ T3280] veth0_vlan: entered promiscuous mode [ 253.300246][ T3280] veth1_vlan: entered promiscuous mode [ 253.881610][ T3279] veth0_vlan: entered promiscuous mode [ 254.095572][ T3279] veth1_vlan: entered promiscuous mode [ 254.142642][ T3280] veth0_macvtap: entered promiscuous mode [ 254.246159][ T3280] veth1_macvtap: entered promiscuous mode [ 254.803901][ T3279] veth0_macvtap: entered promiscuous mode [ 254.932780][ T3280] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.934932][ T3280] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.935616][ T3280] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.936273][ T3280] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.972637][ T3279] veth1_macvtap: entered promiscuous mode [ 255.673934][ T30] audit: type=1400 audit(254.960:80): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 255.705643][ T30] audit: type=1400 audit(254.990:81): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/syzkaller.UvQGti/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 255.773407][ T30] audit: type=1400 audit(255.060:82): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 255.808855][ T3279] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.809420][ T3279] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.809802][ T3279] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.810253][ T3279] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.832353][ T30] audit: type=1400 audit(255.110:83): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/syzkaller.UvQGti/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 255.878785][ T30] audit: type=1400 audit(255.160:84): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/syzkaller.UvQGti/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4291 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 255.982068][ T30] audit: type=1400 audit(255.270:85): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 256.069086][ T30] audit: type=1400 audit(255.350:86): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 256.191473][ T30] audit: type=1400 audit(255.470:87): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 256.268402][ T30] audit: type=1400 audit(255.550:88): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 256.343183][ T30] audit: type=1400 audit(255.590:89): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 256.920243][ T3280] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 258.591135][ T3418] netlink: 52 bytes leftover after parsing attributes in process `syz.1.2'. [ 261.262290][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 261.262453][ T30] audit: type=1400 audit(260.550:105): avc: denied { prog_load } for pid=3426 comm="syz.1.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 261.281339][ T30] audit: type=1400 audit(260.570:106): avc: denied { bpf } for pid=3426 comm="syz.1.4" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 261.294388][ T30] audit: type=1400 audit(260.580:107): avc: denied { perfmon } for pid=3426 comm="syz.1.4" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 262.250812][ T30] audit: type=1400 audit(261.440:108): avc: denied { write } for pid=3415 comm="syz.0.1" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 262.794431][ T3430] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=771 sclass=netlink_route_socket pid=3430 comm=syz.1.5 [ 264.520535][ T30] audit: type=1400 audit(263.810:109): avc: denied { read write } for pid=3431 comm="syz.1.6" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 264.536921][ T30] audit: type=1400 audit(263.820:110): avc: denied { open } for pid=3431 comm="syz.1.6" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 265.427815][ T30] audit: type=1400 audit(264.710:111): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 271.739446][ T30] audit: type=1400 audit(270.960:112): avc: denied { name_bind } for pid=3441 comm="syz.1.10" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 272.033534][ T30] audit: type=1400 audit(271.320:113): avc: denied { ioctl } for pid=3442 comm="syz.0.11" path="socket:[3623]" dev="sockfs" ino=3623 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 273.735018][ T30] audit: type=1400 audit(273.020:114): avc: denied { prog_run } for pid=3451 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 274.456624][ T30] audit: type=1400 audit(273.730:115): avc: denied { nlmsg_write } for pid=3456 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 276.993521][ T8] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 277.289375][ T8] usb 1-1: Using ep0 maxpacket: 32 [ 277.455769][ T8] usb 1-1: config 4 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 277.459053][ T8] usb 1-1: config 4 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 277.460537][ T8] usb 1-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 277.461258][ T8] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 278.596701][ T8] hub 1-1:4.0: USB hub found [ 279.021743][ T8] hub 1-1:4.0: 2 ports detected [ 279.023370][ T8] usb 1-1: selecting invalid altsetting 1 [ 279.024189][ T8] hub 1-1:4.0: Using single TT (err -22) [ 280.086810][ T8] hub 1-1:4.0: hub_hub_status failed (err = -71) [ 280.090927][ T8] hub 1-1:4.0: config failed, can't get hub status (err -71) [ 280.342674][ T8] usb 1-1: USB disconnect, device number 2 [ 281.186686][ T30] audit: type=1400 audit(280.400:116): avc: denied { create } for pid=3472 comm="syz.1.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 281.191938][ T30] audit: type=1400 audit(280.420:117): avc: denied { write } for pid=3472 comm="syz.1.22" path="socket:[4367]" dev="sockfs" ino=4367 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 281.198966][ T30] audit: type=1400 audit(280.450:118): avc: denied { nlmsg_read } for pid=3472 comm="syz.1.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 290.866265][ T3486] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 291.101867][ T30] audit: type=1400 audit(290.390:119): avc: denied { create } for pid=3487 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 291.120867][ T3488] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 291.135063][ T30] audit: type=1400 audit(290.420:120): avc: denied { ioctl } for pid=3487 comm="syz.1.27" path="socket:[4405]" dev="sockfs" ino=4405 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 291.188167][ T30] audit: type=1400 audit(290.460:121): avc: denied { bind } for pid=3487 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 291.284105][ T30] audit: type=1400 audit(290.570:122): avc: denied { write } for pid=3487 comm="syz.1.27" path="socket:[4402]" dev="sockfs" ino=4402 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 292.020411][ T3492] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 292.054352][ T3492] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 293.061161][ T30] audit: type=1400 audit(292.340:123): avc: denied { read } for pid=3495 comm="syz.1.31" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 293.071630][ T30] audit: type=1400 audit(292.340:124): avc: denied { open } for pid=3495 comm="syz.1.31" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 293.098589][ T30] audit: type=1400 audit(292.380:125): avc: denied { ioctl } for pid=3495 comm="syz.1.31" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 294.162484][ T30] audit: type=1400 audit(293.450:126): avc: denied { map_create } for pid=3502 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 294.194930][ T30] audit: type=1400 audit(293.480:127): avc: denied { map_read map_write } for pid=3502 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 294.330026][ T30] audit: type=1400 audit(293.610:128): avc: denied { nlmsg_read } for pid=3502 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 296.486299][ T3518] input input1: cannot allocate more than FF_MAX_EFFECTS effects [ 298.271504][ T3526] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 298.324749][ T3526] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 298.436669][ T3526] netlink: 8 bytes leftover after parsing attributes in process `syz.1.44'. [ 299.411683][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 299.411858][ T30] audit: type=1400 audit(298.700:131): avc: denied { setopt } for pid=3530 comm="syz.1.46" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 299.519583][ T30] audit: type=1400 audit(298.800:132): avc: denied { getopt } for pid=3530 comm="syz.1.46" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 300.338759][ T30] audit: type=1400 audit(299.620:133): avc: denied { create } for pid=3534 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 300.462179][ T30] audit: type=1400 audit(299.750:134): avc: denied { write } for pid=3534 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 300.539332][ T30] audit: type=1400 audit(299.790:135): avc: denied { connect } for pid=3534 comm="syz.0.48" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 300.559811][ T30] audit: type=1400 audit(299.840:136): avc: denied { name_connect } for pid=3534 comm="syz.0.48" dest=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 300.968773][ T30] audit: type=1400 audit(300.250:137): avc: denied { listen } for pid=3534 comm="syz.0.48" laddr=::ffff:172.20.20.10 lport=42586 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 301.551104][ T30] audit: type=1400 audit(300.830:138): avc: denied { accept } for pid=3534 comm="syz.0.48" laddr=::ffff:172.20.20.10 lport=42586 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 304.255707][ T30] audit: type=1400 audit(303.540:139): avc: denied { write } for pid=3554 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 305.259197][ T30] audit: type=1400 audit(304.530:140): avc: denied { write } for pid=3557 comm="syz.1.57" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 306.702685][ T30] audit: type=1400 audit(305.990:141): avc: denied { read } for pid=3563 comm="syz.1.59" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 306.704730][ T30] audit: type=1400 audit(305.990:142): avc: denied { open } for pid=3563 comm="syz.1.59" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 306.735091][ T30] audit: type=1400 audit(306.020:143): avc: denied { ioctl } for pid=3563 comm="syz.1.59" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 308.000324][ T30] audit: type=1400 audit(307.270:144): avc: denied { ioctl } for pid=3571 comm="syz.0.62" path="socket:[3835]" dev="sockfs" ino=3835 ioctlcmd=0x891b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 309.263601][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 314.640396][ T30] audit: type=1400 audit(313.720:145): avc: denied { setopt } for pid=3580 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 325.158770][ T30] audit: type=1400 audit(324.440:146): avc: denied { bind } for pid=3606 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 325.702325][ T30] audit: type=1400 audit(324.960:147): avc: denied { relabelfrom } for pid=3608 comm="syz.0.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 325.703387][ T30] audit: type=1400 audit(324.980:148): avc: denied { relabelto } for pid=3608 comm="syz.0.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 328.451801][ T3413] usb 1-1: new full-speed USB device number 3 using dummy_hcd [ 328.854265][ T3413] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 328.855403][ T3413] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 328.866587][ T3413] usb 1-1: config 1 interface 0 has no altsetting 0 [ 328.968968][ T3413] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 328.970029][ T3413] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 328.970713][ T3413] usb 1-1: Product: syz [ 328.971245][ T3413] usb 1-1: Manufacturer: syz [ 328.971809][ T3413] usb 1-1: SerialNumber: syz [ 329.558802][ T3413] usb 1-1: Audio class v2/v3 interfaces need an interface association [ 330.960401][ T30] audit: type=1400 audit(330.150:149): avc: denied { read } for pid=3631 comm="syz.0.80" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 330.962428][ T30] audit: type=1400 audit(330.150:150): avc: denied { open } for pid=3631 comm="syz.0.80" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 330.964289][ T30] audit: type=1400 audit(330.180:151): avc: denied { ioctl } for pid=3631 comm="syz.0.80" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 330.965778][ T30] audit: type=1400 audit(330.200:152): avc: denied { set_context_mgr } for pid=3631 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 330.969058][ T30] audit: type=1400 audit(330.220:153): avc: denied { read } for pid=3631 comm="syz.0.80" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 330.970531][ T30] audit: type=1400 audit(330.220:154): avc: denied { open } for pid=3631 comm="syz.0.80" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 330.971965][ T30] audit: type=1400 audit(330.230:155): avc: denied { ioctl } for pid=3631 comm="syz.0.80" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 331.279351][ T30] audit: type=1400 audit(330.560:156): avc: denied { read } for pid=3084 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 331.281727][ T30] audit: type=1400 audit(330.560:157): avc: denied { append } for pid=3084 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 331.290220][ T30] audit: type=1400 audit(330.560:158): avc: denied { open } for pid=3084 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 331.365794][ T3413] snd-usb-audio 1-1:1.0: probe with driver snd-usb-audio failed with error -22 [ 331.450242][ T3413] usb 1-1: USB disconnect, device number 3 [ 333.130704][ T3596] udevd[3596]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 345.512084][ T3649] Zero length message leads to an empty skb [ 346.009111][ T3653] binder: 3651:3653 got transaction to invalid handle, 4294967294 [ 346.010755][ T3653] binder: 3653:3651 cannot find target node [ 346.011432][ T3653] binder: 3651:3653 transaction call to 0:0 failed 3/29201/-22, size 0-0 line 3145 [ 346.572524][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 346.572705][ T30] audit: type=1400 audit(345.750:160): avc: denied { mounton } for pid=3656 comm="syz.0.89" path="/44/file0" dev="tmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 348.840641][ T30] audit: type=1400 audit(348.120:161): avc: denied { create } for pid=3668 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 359.925204][ T3685] netlink: 24 bytes leftover after parsing attributes in process `syz.1.99'. [ 362.434374][ T3689] ALSA: seq fatal error: cannot create timer (-22) [ 364.715798][ T30] audit: type=1400 audit(364.000:162): avc: denied { setopt } for pid=3698 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 365.512266][ T30] audit: type=1400 audit(364.800:163): avc: denied { name_bind } for pid=3704 comm="syz.1.109" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 367.089767][ T3714] netlink: 8 bytes leftover after parsing attributes in process `syz.0.113'. [ 369.352396][ T3727] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 369.402322][ T3727] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 388.928981][ T3753] mmap: syz.0.130 (3753) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 406.319195][ T30] audit: type=1400 audit(405.600:164): avc: denied { getopt } for pid=3790 comm="syz.1.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 408.712605][ T3799] netlink: 60 bytes leftover after parsing attributes in process `syz.1.147'. [ 408.772210][ T3799] netlink: 60 bytes leftover after parsing attributes in process `syz.1.147'. [ 410.994614][ T30] audit: type=1400 audit(410.280:165): avc: denied { write } for pid=3805 comm="syz.0.152" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 411.996778][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 413.366214][ T3821] netlink: 'syz.1.158': attribute type 9 has an invalid length. [ 413.370916][ T3821] netlink: 61951 bytes leftover after parsing attributes in process `syz.1.158'. [ 413.616746][ T3823] netlink: 'syz.1.159': attribute type 64 has an invalid length. [ 414.181333][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 416.441052][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 417.594537][ T3844] netlink: 'syz.1.169': attribute type 29 has an invalid length. [ 417.604853][ T3844] netlink: 'syz.1.169': attribute type 29 has an invalid length. [ 417.616432][ T3844] netlink: 'syz.1.169': attribute type 29 has an invalid length. [ 417.624608][ T3844] netlink: 'syz.1.169': attribute type 29 has an invalid length. [ 428.175548][ T30] audit: type=1400 audit(427.460:166): avc: denied { create } for pid=3896 comm="syz.1.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 430.971425][ T30] audit: type=1400 audit(430.260:167): avc: denied { create } for pid=3910 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 434.108573][ T1201] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 434.174812][ T3919] netlink: 'syz.1.203': attribute type 21 has an invalid length. [ 434.696303][ T1201] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 435.042860][ T1201] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 435.329170][ T1201] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 436.439301][ T30] audit: type=1400 audit(435.720:168): avc: denied { read } for pid=3129 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 440.495724][ T1201] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 440.643841][ T1201] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 440.744049][ T1201] bond0 (unregistering): Released all slaves [ 441.250594][ T3937] syzkaller0: entered promiscuous mode [ 441.252108][ T3937] syzkaller0: entered allmulticast mode [ 442.213505][ T1201] hsr_slave_0: left promiscuous mode [ 442.329497][ T1201] hsr_slave_1: left promiscuous mode [ 442.707832][ T1201] veth1_macvtap: left promiscuous mode [ 442.711193][ T1201] veth0_macvtap: left promiscuous mode [ 442.713555][ T1201] veth1_vlan: left promiscuous mode [ 442.716276][ T1201] veth0_vlan: left promiscuous mode [ 455.242216][ T30] audit: type=1400 audit(454.530:169): avc: denied { read write } for pid=3971 comm="syz.1.212" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 455.243964][ T30] audit: type=1400 audit(454.530:170): avc: denied { open } for pid=3971 comm="syz.1.212" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 455.288343][ T30] audit: type=1400 audit(454.560:171): avc: denied { ioctl } for pid=3971 comm="syz.1.212" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x125f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 459.952953][ T3990] binder: 3978:3990 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 459.954641][ T3990] binder: 3990 RLIMIT_NICE not set [ 459.956098][ T3990] binder: 3978:3990 ioctl c0306201 20000580 returned -14 [ 461.475078][ T3920] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 461.582746][ T3920] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 468.363576][ T3920] hsr_slave_0: entered promiscuous mode [ 468.436491][ T3920] hsr_slave_1: entered promiscuous mode [ 473.402750][ T3920] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 473.484110][ T3920] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 473.573304][ T3920] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 473.645351][ T3920] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 478.931294][ T3920] 8021q: adding VLAN 0 to HW filter on device bond0 [ 490.825157][ T4079] process 'syz.1.222' launched './file1' with NULL argv: empty string added [ 490.858280][ T30] audit: type=1400 audit(490.110:172): avc: denied { execute } for pid=4078 comm="syz.1.222" name="file1" dev="tmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 490.859960][ T30] audit: type=1400 audit(490.120:173): avc: denied { execute_no_trans } for pid=4078 comm="syz.1.222" path="/129/file1" dev="tmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 494.820065][ T30] audit: type=1400 audit(494.040:174): avc: denied { create } for pid=4095 comm="syz.1.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 494.822288][ T30] audit: type=1400 audit(494.090:175): avc: denied { write } for pid=4095 comm="syz.1.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 495.505853][ T3920] veth0_vlan: entered promiscuous mode [ 495.625561][ T3920] veth1_vlan: entered promiscuous mode [ 495.869521][ T3920] veth0_macvtap: entered promiscuous mode [ 495.904302][ T3920] veth1_macvtap: entered promiscuous mode [ 496.234430][ T3920] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 496.235240][ T3920] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 496.244301][ T3920] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 496.244908][ T3920] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 496.701849][ T30] audit: type=1400 audit(495.990:176): avc: denied { mounton } for pid=3920 comm="syz-executor" path="/syzkaller.oWN7Lb/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 496.773215][ T30] audit: type=1400 audit(496.060:177): avc: denied { mount } for pid=3920 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 496.937047][ T30] audit: type=1400 audit(496.220:178): avc: denied { mounton } for pid=3920 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 498.390527][ T1201] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 498.949203][ T1201] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 499.393091][ T1201] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 499.921078][ T1201] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 507.651534][ T1201] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 507.772824][ T1201] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 507.836139][ T30] audit: type=1400 audit(507.120:179): avc: denied { create } for pid=4115 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 507.925596][ T1201] bond0 (unregistering): Released all slaves [ 507.935642][ T30] audit: type=1400 audit(507.210:180): avc: denied { read } for pid=4115 comm="syz.1.228" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 507.963579][ T30] audit: type=1400 audit(507.250:181): avc: denied { open } for pid=4115 comm="syz.1.228" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 508.058639][ T30] audit: type=1400 audit(507.340:182): avc: denied { ioctl } for pid=4115 comm="syz.1.228" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 508.521965][ T1201] hsr_slave_0: left promiscuous mode [ 508.873593][ T1201] hsr_slave_1: left promiscuous mode [ 509.156618][ T1201] veth1_macvtap: left promiscuous mode [ 509.165985][ T1201] veth0_macvtap: left promiscuous mode [ 509.191151][ T1201] veth1_vlan: left promiscuous mode [ 509.193853][ T1201] veth0_vlan: left promiscuous mode [ 527.716276][ T4104] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 528.245164][ T4104] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 528.765432][ T30] audit: type=1400 audit(528.040:183): avc: denied { open } for pid=4157 comm="syz.1.233" path="/dev/ptyq7" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 528.982172][ T30] audit: type=1400 audit(528.270:184): avc: denied { ioctl } for pid=4157 comm="syz.1.233" path="/dev/ptyq7" dev="devtmpfs" ino=118 ioctlcmd=0x5414 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 541.185500][ T4104] hsr_slave_0: entered promiscuous mode [ 541.283642][ T4104] hsr_slave_1: entered promiscuous mode [ 545.760645][ T30] audit: type=1400 audit(545.040:185): avc: denied { mounton } for pid=4189 comm="syz.1.236" path="/143/file0" dev="tmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 545.958787][ T30] audit: type=1400 audit(545.240:186): avc: denied { remount } for pid=4189 comm="syz.1.236" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 545.969268][ T4191] ======================================================= [ 545.969268][ T4191] WARNING: The mand mount option has been deprecated and [ 545.969268][ T4191] and is ignored by this kernel. Remove the mand [ 545.969268][ T4191] option from the mount to silence this warning. [ 545.969268][ T4191] ======================================================= [ 547.566590][ T4104] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 547.786068][ T4104] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 547.968214][ T4104] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 548.122005][ T4104] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 549.639522][ T30] audit: type=1400 audit(548.920:187): avc: denied { create } for pid=4203 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 549.642474][ T30] audit: type=1400 audit(548.930:188): avc: denied { bind } for pid=4203 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 550.204758][ T30] audit: type=1400 audit(549.480:189): avc: denied { setopt } for pid=4203 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 550.282815][ T30] audit: type=1400 audit(549.560:190): avc: denied { accept } for pid=4203 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 554.200556][ T4104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 556.118560][ T30] audit: type=1400 audit(555.400:191): avc: denied { create } for pid=4237 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 556.169320][ T30] audit: type=1400 audit(555.450:192): avc: denied { write } for pid=4237 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 556.878068][ T30] audit: type=1400 audit(556.160:193): avc: denied { read } for pid=4237 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 567.610902][ T30] audit: type=1400 audit(566.810:194): avc: denied { write } for pid=4237 comm="syz.1.241" name="ip6_mr_vif" dev="proc" ino=4026532680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 567.689981][ T30] audit: type=1400 audit(566.830:195): avc: denied { ioctl } for pid=4237 comm="syz.1.241" path="socket:[7459]" dev="sockfs" ino=7459 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 574.663497][ T4104] veth0_vlan: entered promiscuous mode [ 574.789457][ T4104] veth1_vlan: entered promiscuous mode [ 575.098381][ T4104] veth0_macvtap: entered promiscuous mode [ 575.341675][ T4104] veth1_macvtap: entered promiscuous mode [ 575.922607][ T4104] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 575.924318][ T4104] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 575.925081][ T4104] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 575.925846][ T4104] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 578.380155][ T36] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 578.684802][ T36] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 578.965766][ T36] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 579.358255][ T36] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 584.885577][ T36] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 584.969172][ T36] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 585.073961][ T36] bond0 (unregistering): Released all slaves [ 585.504769][ T36] hsr_slave_0: left promiscuous mode [ 585.582031][ T36] hsr_slave_1: left promiscuous mode [ 586.093881][ T36] veth1_macvtap: left promiscuous mode [ 586.095526][ T36] veth0_macvtap: left promiscuous mode [ 586.120312][ T36] veth1_vlan: left promiscuous mode [ 586.122341][ T36] veth0_vlan: left promiscuous mode [ 591.312347][ T30] audit: type=1400 audit(590.600:196): avc: denied { getopt } for pid=4331 comm="syz.1.250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 608.255006][ T4290] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 608.400086][ T4290] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 612.870988][ T4391] input: syz0 as /devices/virtual/input/input2 [ 613.855443][ T4290] hsr_slave_0: entered promiscuous mode [ 613.973748][ T4290] hsr_slave_1: entered promiscuous mode [ 617.980684][ T30] audit: type=1400 audit(617.260:197): avc: denied { ioctl } for pid=4412 comm="syz.1.264" path="socket:[7797]" dev="sockfs" ino=7797 ioctlcmd=0x8954 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 618.881438][ T4416] netlink: 40 bytes leftover after parsing attributes in process `syz.1.265'. [ 619.213905][ T4290] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 619.306827][ T4290] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 619.352622][ T4290] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 619.559303][ T4290] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 620.695068][ T4425] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 624.800135][ T4290] 8021q: adding VLAN 0 to HW filter on device bond0 [ 641.806281][ T4290] veth0_vlan: entered promiscuous mode [ 641.942516][ T4290] veth1_vlan: entered promiscuous mode [ 642.465806][ T4290] veth0_macvtap: entered promiscuous mode [ 642.540967][ T4290] veth1_macvtap: entered promiscuous mode [ 643.061227][ T4290] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 643.065219][ T4290] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 643.083210][ T4290] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 643.084343][ T4290] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 643.548080][ T30] audit: type=1400 audit(642.830:198): avc: denied { setopt } for pid=4497 comm="syz.1.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 644.285425][ T30] audit: type=1400 audit(643.570:199): avc: denied { map } for pid=4497 comm="syz.1.272" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8047 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 644.303090][ T30] audit: type=1400 audit(643.570:200): avc: denied { read write } for pid=4497 comm="syz.1.272" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8047 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 645.271325][ T1472] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 645.896500][ T1472] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 646.296124][ T1472] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 646.952414][ T1472] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 653.420280][ T1472] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 653.504163][ T1472] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 653.578885][ T1472] bond0 (unregistering): Released all slaves [ 653.785881][ T1472] hsr_slave_0: left promiscuous mode [ 653.834307][ T1472] hsr_slave_1: left promiscuous mode [ 654.115569][ T1472] veth1_macvtap: left promiscuous mode [ 654.116888][ T1472] veth0_macvtap: left promiscuous mode [ 654.130374][ T1472] veth1_vlan: left promiscuous mode [ 654.131979][ T1472] veth0_vlan: left promiscuous mode [ 658.943751][ T30] audit: type=1400 audit(658.190:201): avc: denied { bind } for pid=4521 comm="syz.1.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 658.945093][ T30] audit: type=1400 audit(658.220:202): avc: denied { name_bind } for pid=4521 comm="syz.1.274" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 658.946215][ T30] audit: type=1400 audit(658.220:203): avc: denied { node_bind } for pid=4521 comm="syz.1.274" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 671.611414][ T4550] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 671.660602][ T4550] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 673.832675][ T4504] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 673.925083][ T4504] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 683.093879][ T4504] hsr_slave_0: entered promiscuous mode [ 683.191707][ T4504] hsr_slave_1: entered promiscuous mode [ 691.551313][ T4504] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 691.716705][ T4504] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 691.853163][ T4504] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 691.994510][ T4504] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 701.854169][ T4504] 8021q: adding VLAN 0 to HW filter on device bond0 [ 718.037928][ T30] audit: type=1400 audit(717.320:204): avc: denied { write } for pid=4656 comm="syz.1.287" name="task" dev="proc" ino=8653 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 718.066990][ T30] audit: type=1400 audit(717.350:205): avc: denied { add_name } for pid=4656 comm="syz.1.287" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 718.069903][ T30] audit: type=1400 audit(717.350:206): avc: denied { create } for pid=4656 comm="syz.1.287" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 718.070692][ T30] audit: type=1400 audit(717.350:207): avc: denied { associate } for pid=4656 comm="syz.1.287" name="file0" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 730.396229][ T4504] veth0_vlan: entered promiscuous mode [ 730.826715][ T4504] veth1_vlan: entered promiscuous mode [ 731.533368][ T4504] veth0_macvtap: entered promiscuous mode [ 731.601411][ T4504] veth1_macvtap: entered promiscuous mode [ 732.366073][ T4504] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 732.399517][ T4504] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 732.400677][ T4504] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 732.401474][ T4504] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 734.663795][ T30] audit: type=1400 audit(733.950:208): avc: denied { connect } for pid=4690 comm="syz.1.291" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 734.724315][ T30] audit: type=1400 audit(733.990:209): avc: denied { mounton } for pid=4690 comm="syz.1.291" path="/proc/486/task" dev="proc" ino=8660 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 735.230771][ T202] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 735.765841][ T202] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 736.454831][ T202] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 737.341177][ T202] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 745.595963][ T202] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 745.755711][ T202] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 745.946370][ T202] bond0 (unregistering): Released all slaves [ 746.928632][ T202] hsr_slave_0: left promiscuous mode [ 747.017704][ T202] hsr_slave_1: left promiscuous mode [ 747.489707][ T202] veth1_macvtap: left promiscuous mode [ 747.491231][ T202] veth0_macvtap: left promiscuous mode [ 747.503977][ T202] veth1_vlan: left promiscuous mode [ 747.506040][ T202] veth0_vlan: left promiscuous mode [ 769.561555][ T30] audit: type=1400 audit(768.850:210): avc: denied { read } for pid=4751 comm="syz.1.304" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 779.632010][ T4693] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 779.845000][ T4693] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 785.189199][ T30] audit: type=1400 audit(784.470:211): avc: denied { write } for pid=4794 comm="syz.1.310" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 786.392993][ T4693] hsr_slave_0: entered promiscuous mode [ 786.474534][ T4693] hsr_slave_1: entered promiscuous mode [ 794.131279][ T4693] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 794.364706][ T4693] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 794.540545][ T4693] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 794.694032][ T4693] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 799.891421][ T30] audit: type=1400 audit(799.170:212): avc: denied { create } for pid=4833 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 799.918198][ T30] audit: type=1400 audit(799.200:213): avc: denied { setopt } for pid=4833 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 801.319838][ T30] audit: type=1400 audit(800.610:214): avc: denied { write } for pid=4837 comm="syz.1.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 801.362707][ T4693] 8021q: adding VLAN 0 to HW filter on device bond0 [ 802.061634][ T30] audit: type=1400 audit(801.300:215): avc: denied { create } for pid=4842 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 802.131871][ T30] audit: type=1400 audit(801.420:216): avc: denied { setopt } for pid=4842 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 814.663993][ T4693] veth0_vlan: entered promiscuous mode [ 814.776701][ T4693] veth1_vlan: entered promiscuous mode [ 815.250784][ T4693] veth0_macvtap: entered promiscuous mode [ 815.339176][ T4693] veth1_macvtap: entered promiscuous mode [ 815.712972][ T4693] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 815.714384][ T4693] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 815.715160][ T4693] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 815.715895][ T4693] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 816.864429][ T30] audit: type=1400 audit(816.150:217): avc: denied { lock } for pid=4897 comm="syz.1.317" path="socket:[10206]" dev="sockfs" ino=10206 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 817.582931][ T3946] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 817.981118][ T3946] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 818.444709][ T3946] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 818.557000][ T4907] netlink: 4 bytes leftover after parsing attributes in process `syz.1.320'. [ 818.922040][ T3946] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 822.192455][ T30] audit: type=1326 audit(821.450:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4915 comm="syz.1.322" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff9a34250c code=0x7ffc0000 [ 822.206066][ T30] audit: type=1326 audit(821.480:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4915 comm="syz.1.322" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff9b169804 code=0x7ffc0000 [ 822.255950][ T30] audit: type=1326 audit(821.540:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4915 comm="syz.1.322" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff9a34250c code=0x7ffc0000 [ 822.282339][ T30] audit: type=1326 audit(821.560:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4915 comm="syz.1.322" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff9b169804 code=0x7ffc0000 [ 822.284049][ T30] audit: type=1326 audit(821.560:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4915 comm="syz.1.322" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9a34a9a8 code=0x7ffc0000 [ 822.285520][ T30] audit: type=1326 audit(821.560:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4915 comm="syz.1.322" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff9a34a9a8 code=0x7ffc0000 [ 822.298632][ T30] audit: type=1326 audit(821.580:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4915 comm="syz.1.322" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff9a34250c code=0x7ffc0000 [ 822.300257][ T30] audit: type=1326 audit(821.580:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4915 comm="syz.1.322" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff9b169804 code=0x7ffc0000 [ 822.370528][ T30] audit: type=1326 audit(821.580:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4915 comm="syz.1.322" exe="/syz-executor" sig=0 arch=c00000b7 syscall=172 compat=0 ip=0xffff9a34250c code=0x7ffc0000 [ 822.372339][ T30] audit: type=1326 audit(821.640:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4915 comm="syz.1.322" exe="/syz-executor" sig=0 arch=c00000b7 syscall=139 compat=0 ip=0xffff9b169804 code=0x7ffc0000 [ 825.429651][ T3946] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 825.554509][ T3946] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 825.648908][ T3946] bond0 (unregistering): Released all slaves [ 826.252335][ T3946] hsr_slave_0: left promiscuous mode [ 826.388870][ T3946] hsr_slave_1: left promiscuous mode [ 826.956735][ T3946] veth1_macvtap: left promiscuous mode [ 826.959694][ T3946] veth0_macvtap: left promiscuous mode [ 826.969498][ T3946] veth1_vlan: left promiscuous mode [ 826.971169][ T3946] veth0_vlan: left promiscuous mode [ 830.631661][ T30] kauditd_printk_skb: 112 callbacks suppressed [ 830.631981][ T30] audit: type=1400 audit(829.920:340): avc: denied { create } for pid=4945 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 830.675125][ T30] audit: type=1400 audit(829.960:341): avc: denied { write } for pid=4945 comm="syz.1.329" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 830.693034][ T30] audit: type=1400 audit(829.980:342): avc: denied { open } for pid=4945 comm="syz.1.329" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 830.716851][ T4946] random: crng reseeded on system resumption [ 842.898772][ T4991] EXT4-fs (vda): shut down requested (2) [ 842.902569][ T4991] Aborting journal on device vda-8. [ 843.672006][ T4905] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 843.739401][ T4905] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 845.220389][ T4905] hsr_slave_0: entered promiscuous mode [ 845.284496][ T4905] hsr_slave_1: entered promiscuous mode [ 847.464867][ T5019] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 847.592387][ T5019] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 848.373791][ T5025] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 848.491195][ T5025] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 850.032678][ T4905] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 850.142269][ T4905] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 850.212073][ T4905] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 850.520586][ T4905] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 852.075793][ T30] audit: type=1400 audit(851.360:343): avc: denied { name_connect } for pid=5043 comm="syz.1.338" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 852.562890][ T4905] 8021q: adding VLAN 0 to HW filter on device bond0 [ 854.185672][ T5054] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 854.241263][ T5054] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 855.644598][ T4905] veth0_vlan: entered promiscuous mode [ 855.882954][ T4905] veth1_vlan: entered promiscuous mode [ 856.450359][ T4905] veth0_macvtap: entered promiscuous mode [ 856.575327][ T4905] veth1_macvtap: entered promiscuous mode [ 856.983899][ T4905] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.985056][ T4905] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.985501][ T4905] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.985865][ T4905] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 858.683775][ T3947] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 859.122453][ T3947] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 SYZFAIL: posix_spawn failed (errno 5: Input/output error) [ 859.787013][ T3947] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 860.016400][ T3947] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 865.452521][ T3947] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 865.546640][ T3947] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 865.624924][ T3947] bond0 (unregistering): Released all slaves [ 866.045608][ T3947] hsr_slave_0: left promiscuous mode [ 866.113518][ T3947] hsr_slave_1: left promiscuous mode [ 866.358100][ T3947] veth1_macvtap: left promiscuous mode [ 866.359530][ T3947] veth0_macvtap: left promiscuous mode [ 866.361105][ T3947] veth1_vlan: left promiscuous mode [ 866.362420][ T3947] veth0_vlan: left promiscuous mode [ 876.689212][ T30] audit: type=1400 audit(875.970:344): avc: denied { remove_name } for pid=3084 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 876.710935][ T30] audit: type=1400 audit(875.990:345): avc: denied { rename } for pid=3084 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 876.723164][ T30] audit: type=1400 audit(876.010:346): avc: denied { create } for pid=3084 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 877.206402][ T3947] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 877.592249][ T3947] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 877.929219][ T3947] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 878.250054][ T3947] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 882.130925][ T3947] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 882.239367][ T3947] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 882.361596][ T3947] bond0 (unregistering): Released all slaves [ 882.819370][ T3947] hsr_slave_0: left promiscuous mode [ 882.862051][ T3947] hsr_slave_1: left promiscuous mode [ 883.043041][ T3947] veth1_macvtap: left promiscuous mode [ 883.046383][ T3947] veth0_macvtap: left promiscuous mode [ 883.051631][ T3947] veth1_vlan: left promiscuous mode [ 883.054577][ T3947] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 21:45:38 Registers: info registers vcpu 0 CPU#0 PC=ffff8000851a9cbc X00=ffff8000851a9cb8 X01=0000000000000003 X02=0000000000000000 X03=1fffe00002a1fb41 X04=1fffe00002a1fb41 X05=ffff800080007d30 X06=ffff700010000fa6 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700010000fa6 X11=1ffff00010000fa6 X12=ffff700010000fa7 X13=1fffe00002a1fc9e X14=1fffe00002a1fc8f X15=ffff0000150fe480 X16=0000000000000000 X17=1fffe00002ef9f58 X18=0000000097cb0f0a X19=ffff800086e26130 X20=ffff800086e26100 X21=0000000000000000 X22=0000000000000004 X23=0000000000000028 X24=ffff800086e26130 X25=dfff800000000000 X26=ffff80008524a900 X27=ffff0000150fda00 X28=0000000000000003 X29=ffff800080007cb0 X30=ffff8000851a8490 SP=ffff800080007cb0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000800121d8 X00=0000000000000000 X01=0000000000000000 X02=00000000fbad2887 X03=0000ffffb2cc7488 X04=00000000ffffffff X05=00000000fbad2887 X06=00000000ffffffee X07=7f7f7f7f7f7f7f7f X08=0000000000000040 X09=0000000000000000 X10=0000ffffb2bc6080 X11=0000ffffc3f81c40 X12=0000000000002180 X13=000000000000001e X14=000000000000001e X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000ffffb2be4d10 X19=0000ffffb38280a0 X20=0000ffffb2cbe000 X21=000000000000001c X22=0000ffffc3f7f430 X23=000000000000001c X24=0000ffffb2cc7fa8 X25=0000ffffc3f826b8 X26=0000ffffc3f81c70 X27=0000ffffc3f82150 X28=0000aaaad338f9a0 X29=0000ffffc3f7f3d0 X30=0000ffffb2b1dbd8 SP=ffff8000a11c8000 PSTATE=400003c5 -Z-- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=206f6e7272652820:000000000a732520 Q02=0000000300000007:0000000200000016 Q03=0000000000000000:ffffffff0000ff00 Q04=0000000000000000:00000000ffff00f0 Q05=0000000000000000:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc3f81fd0:0000ffffc3f81fd0 Q17=ffffff80ffffffd0:0000ffffc3f81fa0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000