last executing test programs: 2.180166264s ago: executing program 0 (id=1366): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x5450, 0x0) 1.957759498s ago: executing program 1 (id=1367): r0 = fanotify_init(0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/ip6_mr_vif\x00') fanotify_mark(r0, 0x80, 0x1000, r1, &(0x7f0000000400)='./file0\x00') 1.629455144s ago: executing program 1 (id=1368): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xa0}, 0x1, 0x0, 0x0, 0x800}, 0xc805) 1.588960852s ago: executing program 0 (id=1372): r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) 1.174993555s ago: executing program 0 (id=1369): r0 = epoll_create1(0x0) r1 = openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0x1d}) 1.112897407s ago: executing program 1 (id=1370): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$F2FS_IOC_GARBAGE_COLLECT(r1, 0x5450, 0x0) 720.828035ms ago: executing program 1 (id=1371): openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x200003, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') ioctl$HIDIOCGPHYS(r0, 0x80404812, &(0x7f0000000040)) 700.46486ms ago: executing program 0 (id=1376): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) pidfd_send_signal(r1, 0x0, &(0x7f0000000140)={0x4}, 0x0) 431.871843ms ago: executing program 1 (id=1373): r0 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DMA_HEAP_IOCTL_ALLOC(r0, 0xc0184800, &(0x7f0000000000)={0x0, r0}) ioctl$TFD_IOC_SET_TICKS(r1, 0x40085400, &(0x7f00000001c0)) 392.115791ms ago: executing program 0 (id=1378): r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) 110.125228ms ago: executing program 0 (id=1374): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000200), 0x1, 0x0) ioctl$AUTOFS_IOC_SETTIMEOUT(r0, 0x80049367, 0x0) 0s ago: executing program 1 (id=1375): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000d40)={0x4a}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:64157' (ED25519) to the list of known hosts. [ 211.968217][ T30] audit: type=1400 audit(211.440:58): avc: denied { name_bind } for pid=3289 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 212.747378][ T30] audit: type=1400 audit(212.220:59): avc: denied { execute } for pid=3291 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 212.762728][ T30] audit: type=1400 audit(212.230:60): avc: denied { execute_no_trans } for pid=3291 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 219.858011][ T30] audit: type=1400 audit(219.340:61): avc: denied { mounton } for pid=3291 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 219.876022][ T30] audit: type=1400 audit(219.350:62): avc: denied { mount } for pid=3291 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 219.920234][ T3291] cgroup: Unknown subsys name 'net' [ 219.944140][ T30] audit: type=1400 audit(219.420:63): avc: denied { unmount } for pid=3291 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 220.362815][ T3291] cgroup: Unknown subsys name 'cpuset' [ 220.441174][ T3291] cgroup: Unknown subsys name 'rlimit' [ 220.909250][ T30] audit: type=1400 audit(220.380:64): avc: denied { setattr } for pid=3291 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 220.921716][ T30] audit: type=1400 audit(220.390:65): avc: denied { mounton } for pid=3291 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 220.946552][ T30] audit: type=1400 audit(220.420:66): avc: denied { mount } for pid=3291 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 221.783221][ T3293] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 221.801727][ T30] audit: type=1400 audit(221.270:67): avc: denied { relabelto } for pid=3293 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 221.803747][ T30] audit: type=1400 audit(221.280:68): avc: denied { write } for pid=3293 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 221.989792][ T30] audit: type=1400 audit(221.470:69): avc: denied { read } for pid=3291 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 221.992028][ T30] audit: type=1400 audit(221.470:70): avc: denied { open } for pid=3291 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 222.019568][ T3291] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 244.386175][ T30] audit: type=1400 audit(243.860:71): avc: denied { execmem } for pid=3299 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 244.444250][ T30] audit: type=1400 audit(243.920:72): avc: denied { read } for pid=3301 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 244.448613][ T30] audit: type=1400 audit(243.930:73): avc: denied { open } for pid=3301 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 244.461584][ T30] audit: type=1400 audit(243.940:74): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 244.512673][ T30] audit: type=1400 audit(243.990:75): avc: denied { module_request } for pid=3301 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 244.671253][ T30] audit: type=1400 audit(244.150:76): avc: denied { sys_module } for pid=3301 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 251.089022][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 251.121711][ T3301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 251.151209][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 251.208378][ T3301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 254.082267][ T3301] hsr_slave_0: entered promiscuous mode [ 254.119634][ T3301] hsr_slave_1: entered promiscuous mode [ 254.590987][ T3303] hsr_slave_0: entered promiscuous mode [ 254.602508][ T3303] hsr_slave_1: entered promiscuous mode [ 254.612254][ T3303] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 254.616705][ T3303] Cannot create hsr debugfs directory [ 256.479497][ T30] audit: type=1400 audit(255.960:77): avc: denied { create } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 256.490488][ T30] audit: type=1400 audit(255.970:78): avc: denied { write } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 256.498702][ T30] audit: type=1400 audit(255.980:79): avc: denied { read } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 256.529566][ T3301] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 256.631727][ T3301] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 256.698752][ T3301] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 256.817663][ T3301] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 257.228071][ T3303] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 257.298877][ T3303] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 257.404269][ T3303] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 257.486158][ T3303] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 260.980021][ T3301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 261.697264][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.654243][ T3301] veth0_vlan: entered promiscuous mode [ 272.740543][ T3301] veth1_vlan: entered promiscuous mode [ 272.989990][ T3301] veth0_macvtap: entered promiscuous mode [ 273.075196][ T3301] veth1_macvtap: entered promiscuous mode [ 273.426473][ T3301] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 273.428036][ T3301] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 273.428494][ T3301] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 273.428947][ T3301] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.203150][ T3303] veth0_vlan: entered promiscuous mode [ 274.230058][ T30] audit: type=1400 audit(273.710:80): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 274.246325][ T30] audit: type=1400 audit(273.720:81): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzkaller.RrCjBw/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 274.329859][ T30] audit: type=1400 audit(273.810:82): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 274.380349][ T30] audit: type=1400 audit(273.860:83): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzkaller.RrCjBw/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 274.400736][ T30] audit: type=1400 audit(273.880:84): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzkaller.RrCjBw/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3765 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 274.429692][ T3303] veth1_vlan: entered promiscuous mode [ 274.462213][ T30] audit: type=1400 audit(273.940:85): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 274.483784][ T30] audit: type=1400 audit(273.960:86): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 274.506568][ T30] audit: type=1400 audit(273.980:87): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="gadgetfs" ino=3766 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 274.682945][ T3303] veth0_macvtap: entered promiscuous mode [ 274.714046][ T30] audit: type=1400 audit(274.190:88): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 274.723298][ T30] audit: type=1400 audit(274.200:89): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 274.731268][ T3303] veth1_macvtap: entered promiscuous mode [ 275.164231][ T3301] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 275.213228][ T3303] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.213871][ T3303] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.214305][ T3303] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.216021][ T3303] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 279.300328][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 279.300463][ T30] audit: type=1400 audit(278.780:101): avc: denied { create } for pid=3462 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 279.423515][ T30] audit: type=1400 audit(278.900:102): avc: denied { write } for pid=3462 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 282.415091][ T30] audit: type=1400 audit(281.890:103): avc: denied { mount } for pid=3475 comm="syz.0.18" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 285.019649][ T30] audit: type=1400 audit(284.500:104): avc: denied { create } for pid=3487 comm="syz.1.24" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 285.085736][ T30] audit: type=1400 audit(284.560:105): avc: denied { ioctl } for pid=3487 comm="syz.1.24" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3888 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 285.391622][ T30] audit: type=1400 audit(284.870:106): avc: denied { create } for pid=3489 comm="syz.0.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 289.094172][ T30] audit: type=1400 audit(288.570:107): avc: denied { write } for pid=3511 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 289.967590][ T30] audit: type=1400 audit(289.440:108): avc: denied { create } for pid=3517 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 290.004685][ T30] audit: type=1400 audit(289.480:109): avc: denied { write } for pid=3517 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 292.426771][ T30] audit: type=1400 audit(291.910:110): avc: denied { read write } for pid=3529 comm="syz.1.46" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 292.432287][ T30] audit: type=1400 audit(291.910:111): avc: denied { open } for pid=3529 comm="syz.1.46" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 292.771697][ T30] audit: type=1400 audit(292.250:112): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 292.842980][ T30] audit: type=1400 audit(292.320:113): avc: denied { bind } for pid=3533 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 292.901490][ T30] audit: type=1400 audit(292.380:114): avc: denied { accept } for pid=3533 comm="syz.0.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 293.739660][ T30] audit: type=1400 audit(293.200:115): avc: denied { create } for pid=3537 comm="syz.0.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 293.791495][ T30] audit: type=1400 audit(293.260:116): avc: denied { ioctl } for pid=3537 comm="syz.0.49" path="socket:[3980]" dev="sockfs" ino=3980 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 293.823370][ T30] audit: type=1400 audit(293.300:117): avc: denied { write } for pid=3537 comm="syz.0.49" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 294.939665][ T3546] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 294.943032][ T30] audit: type=1400 audit(294.420:118): avc: denied { create } for pid=3545 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 294.973407][ T30] audit: type=1400 audit(294.450:119): avc: denied { write } for pid=3545 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 298.782384][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 298.782570][ T30] audit: type=1400 audit(298.260:126): avc: denied { setopt } for pid=3569 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 299.438967][ T30] audit: type=1400 audit(298.920:127): avc: denied { bind } for pid=3569 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 302.163180][ T30] audit: type=1400 audit(301.640:128): avc: denied { create } for pid=3580 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 303.063595][ T30] audit: type=1400 audit(302.540:129): avc: denied { read } for pid=3588 comm="syz.1.72" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 303.067550][ T30] audit: type=1400 audit(302.550:130): avc: denied { open } for pid=3588 comm="syz.1.72" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 303.109779][ T30] audit: type=1400 audit(302.590:131): avc: denied { ioctl } for pid=3588 comm="syz.1.72" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 303.676573][ T30] audit: type=1400 audit(303.150:132): avc: denied { connect } for pid=3592 comm="syz.1.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 305.485251][ T30] audit: type=1400 audit(304.960:133): avc: denied { create } for pid=3602 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 305.537892][ T30] audit: type=1400 audit(305.020:134): avc: denied { setopt } for pid=3602 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 305.544285][ T30] audit: type=1400 audit(305.020:135): avc: denied { connect } for pid=3602 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 305.567698][ T30] audit: type=1400 audit(305.040:136): avc: denied { name_connect } for pid=3602 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 306.101652][ T30] audit: type=1400 audit(305.580:137): avc: denied { shutdown } for pid=3602 comm="syz.0.79" lport=49180 faddr=172.30.0.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 307.506311][ T30] audit: type=1400 audit(306.980:138): avc: denied { mounton } for pid=3612 comm="syz.0.84" path="/40/file0" dev="tmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 307.556486][ T30] audit: type=1400 audit(307.000:139): avc: denied { mount } for pid=3612 comm="syz.0.84" name="/" dev="configfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 307.581736][ T30] audit: type=1400 audit(307.050:140): avc: denied { remount } for pid=3612 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 307.656433][ T30] audit: type=1400 audit(307.130:141): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 309.018019][ T30] audit: type=1400 audit(308.500:142): avc: denied { getopt } for pid=3622 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 312.057482][ T30] audit: type=1400 audit(311.530:143): avc: denied { ioctl } for pid=3637 comm="syz.1.96" path="socket:[4402]" dev="sockfs" ino=4402 ioctlcmd=0x891a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 319.198549][ T30] audit: type=1400 audit(318.680:144): avc: denied { write } for pid=3666 comm="syz.1.109" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 321.218670][ T3676] capability: warning: `syz.1.112' uses deprecated v2 capabilities in a way that may be insecure [ 323.446657][ T30] audit: type=1400 audit(322.920:145): avc: denied { read } for pid=3683 comm="syz.0.117" path="socket:[5260]" dev="sockfs" ino=5260 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 324.485394][ T30] audit: type=1400 audit(323.960:146): avc: denied { getopt } for pid=3685 comm="syz.0.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 325.307078][ T3688] Zero length message leads to an empty skb [ 326.600313][ T30] audit: type=1400 audit(326.080:147): avc: denied { map } for pid=3693 comm="syz.0.122" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5272 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 326.624218][ T30] audit: type=1400 audit(326.100:148): avc: denied { read write } for pid=3693 comm="syz.0.122" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5272 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 326.709900][ T30] audit: type=1400 audit(326.190:149): avc: denied { prog_load } for pid=3693 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 326.718252][ T30] audit: type=1400 audit(326.190:150): avc: denied { bpf } for pid=3693 comm="syz.0.122" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 326.765782][ T30] audit: type=1400 audit(326.240:151): avc: denied { perfmon } for pid=3693 comm="syz.0.122" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 326.848269][ T30] audit: type=1400 audit(326.330:152): avc: denied { prog_run } for pid=3693 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 328.738820][ T30] audit: type=1400 audit(328.220:153): avc: denied { create } for pid=3699 comm="syz.0.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 328.766152][ T30] audit: type=1400 audit(328.240:154): avc: denied { read } for pid=3102 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 328.781399][ T30] audit: type=1400 audit(328.250:155): avc: denied { append } for pid=3102 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 330.268114][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 330.268297][ T30] audit: type=1400 audit(329.750:160): avc: denied { ioctl } for pid=3703 comm="syz.1.126" path="socket:[5295]" dev="sockfs" ino=5295 ioctlcmd=0x6418 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 332.840944][ T30] audit: type=1400 audit(332.320:161): avc: denied { setopt } for pid=3714 comm="syz.1.131" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 335.657043][ T30] audit: type=1400 audit(335.130:162): avc: denied { write } for pid=3727 comm="syz.1.137" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 338.498247][ T3742] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5126 sclass=netlink_audit_socket pid=3742 comm=syz.0.144 [ 339.633502][ T30] audit: type=1400 audit(339.110:163): avc: denied { read } for pid=3747 comm="syz.1.147" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 339.634968][ T30] audit: type=1400 audit(339.110:164): avc: denied { open } for pid=3747 comm="syz.1.147" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 339.654785][ T30] audit: type=1400 audit(339.120:165): avc: denied { ioctl } for pid=3747 comm="syz.1.147" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 341.252542][ T3756] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 341.318925][ T30] audit: type=1400 audit(340.790:166): avc: denied { getopt } for pid=3754 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 344.246834][ T30] audit: type=1400 audit(343.710:167): avc: denied { ioctl } for pid=3770 comm="syz.0.158" path="socket:[4613]" dev="sockfs" ino=4613 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 345.029108][ T30] audit: type=1400 audit(344.510:168): avc: denied { read write } for pid=3775 comm="syz.0.160" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 345.041017][ T30] audit: type=1400 audit(344.510:169): avc: denied { open } for pid=3775 comm="syz.0.160" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 345.093838][ T30] audit: type=1400 audit(344.570:170): avc: denied { create } for pid=3775 comm="syz.0.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 345.129851][ T30] audit: type=1400 audit(344.610:171): avc: denied { ioctl } for pid=3775 comm="syz.0.160" path="socket:[5435]" dev="sockfs" ino=5435 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 351.448374][ T3807] capability: warning: `syz.1.175' uses 32-bit capabilities (legacy support in use) [ 351.882189][ T30] audit: type=1400 audit(351.360:172): avc: denied { create } for pid=3809 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 351.932784][ T30] audit: type=1400 audit(351.410:173): avc: denied { bind } for pid=3809 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 351.978401][ T30] audit: type=1400 audit(351.460:174): avc: denied { connect } for pid=3809 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 354.068742][ T30] audit: type=1400 audit(353.550:175): avc: denied { write } for pid=3818 comm="syz.0.181" path="socket:[5499]" dev="sockfs" ino=5499 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 357.391843][ T30] audit: type=1400 audit(356.860:176): avc: denied { execute } for pid=3841 comm="syz.0.192" name="file0" dev="tmpfs" ino=512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 357.430530][ T30] audit: type=1400 audit(356.910:177): avc: denied { create } for pid=3843 comm="syz.1.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 357.472690][ T30] audit: type=1400 audit(356.940:178): avc: denied { ioctl } for pid=3843 comm="syz.1.193" path="socket:[5536]" dev="sockfs" ino=5536 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 359.320369][ T30] audit: type=1400 audit(358.800:179): avc: denied { ioctl } for pid=3859 comm="syz.0.201" path="socket:[5574]" dev="sockfs" ino=5574 ioctlcmd=0xaea2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 360.053320][ T30] audit: type=1400 audit(359.530:180): avc: denied { create } for pid=3865 comm="syz.0.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 360.102372][ T30] audit: type=1400 audit(359.580:181): avc: denied { ioctl } for pid=3865 comm="syz.0.204" path="socket:[5587]" dev="sockfs" ino=5587 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 364.686108][ T30] audit: type=1400 audit(364.160:182): avc: denied { mount } for pid=3901 comm="syz.0.223" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 364.795194][ T30] audit: type=1400 audit(364.270:183): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 374.155000][ T30] audit: type=1400 audit(373.630:184): avc: denied { create } for pid=3957 comm="syz.1.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 377.373023][ T30] audit: type=1400 audit(376.850:185): avc: denied { watch_mount watch_reads } for pid=3973 comm="syz.1.257" path="/dev/vcsu" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 384.181413][ T30] audit: type=1400 audit(383.660:186): avc: denied { open } for pid=4008 comm="syz.1.274" path="/dev/ptyq6" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 384.220345][ T30] audit: type=1400 audit(383.700:187): avc: denied { block_suspend } for pid=4008 comm="syz.1.274" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 385.148308][ T30] audit: type=1400 audit(384.620:188): avc: denied { setopt } for pid=4014 comm="syz.0.277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 388.236042][ T30] audit: type=1400 audit(387.700:189): avc: denied { setopt } for pid=4030 comm="syz.0.284" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 388.744053][ T30] audit: type=1400 audit(388.220:190): avc: denied { ioctl } for pid=4036 comm="syz.0.287" path="socket:[5039]" dev="sockfs" ino=5039 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 389.195948][ T30] audit: type=1400 audit(388.670:191): avc: denied { listen } for pid=4038 comm="syz.0.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 391.998566][ T30] audit: type=1400 audit(391.470:192): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 393.039469][ T30] audit: type=1400 audit(392.510:193): avc: denied { create } for pid=4065 comm="syz.1.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 393.108820][ T30] audit: type=1400 audit(392.590:194): avc: denied { write } for pid=4065 comm="syz.1.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 393.123286][ T30] audit: type=1400 audit(392.600:195): avc: denied { nlmsg_read } for pid=4065 comm="syz.1.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 396.893151][ T30] audit: type=1400 audit(396.370:196): avc: denied { create } for pid=4088 comm="syz.0.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 396.947579][ T30] audit: type=1400 audit(396.430:197): avc: denied { lock } for pid=4088 comm="syz.0.312" path="socket:[5119]" dev="sockfs" ino=5119 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 399.865861][ T30] audit: type=1400 audit(399.340:198): avc: denied { map_create } for pid=4099 comm="syz.1.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 399.929820][ T30] audit: type=1400 audit(399.410:199): avc: denied { map_read map_write } for pid=4099 comm="syz.1.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 401.317054][ T4111] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4111 comm=syz.1.319 [ 401.322079][ T30] audit: type=1400 audit(400.790:200): avc: denied { write } for pid=4104 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 406.144091][ T4131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=136 sclass=netlink_route_socket pid=4131 comm=syz.0.330 [ 406.779199][ T30] audit: type=1400 audit(406.260:201): avc: denied { write } for pid=4133 comm="syz.0.332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 407.815936][ T30] audit: type=1400 audit(407.290:202): avc: denied { write } for pid=4141 comm="syz.1.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 407.836164][ T30] audit: type=1400 audit(407.310:203): avc: denied { read } for pid=4141 comm="syz.1.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 407.889573][ T30] audit: type=1400 audit(407.370:204): avc: denied { setopt } for pid=4143 comm="syz.0.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 407.908101][ T30] audit: type=1400 audit(407.390:205): avc: denied { bind } for pid=4143 comm="syz.0.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 412.870696][ T30] audit: type=1400 audit(412.350:206): avc: denied { ioctl } for pid=4171 comm="syz.0.351" path="socket:[6291]" dev="sockfs" ino=6291 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 417.801677][ T30] audit: type=1400 audit(417.280:207): avc: denied { getopt } for pid=4196 comm="syz.1.363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 421.325479][ T30] audit: type=1400 audit(420.800:208): avc: denied { create } for pid=4213 comm="syz.0.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 421.349709][ T4214] netlink: 32 bytes leftover after parsing attributes in process `syz.0.371'. [ 421.352410][ T30] audit: type=1400 audit(420.830:209): avc: denied { write } for pid=4213 comm="syz.0.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 421.371757][ T30] audit: type=1400 audit(420.850:210): avc: denied { read } for pid=4213 comm="syz.0.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 422.614112][ T30] audit: type=1400 audit(422.090:211): avc: denied { create } for pid=4217 comm="syz.0.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 422.660156][ T30] audit: type=1400 audit(422.130:212): avc: denied { write } for pid=4217 comm="syz.0.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 424.718716][ T30] audit: type=1400 audit(424.200:213): avc: denied { write } for pid=4227 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 426.917559][ T30] audit: type=1400 audit(426.400:214): avc: denied { read } for pid=4241 comm="syz.1.385" path="socket:[7285]" dev="sockfs" ino=7285 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 428.619081][ T30] audit: type=1400 audit(428.080:215): avc: denied { read write } for pid=4247 comm="syz.1.388" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 428.653064][ T30] audit: type=1400 audit(428.130:216): avc: denied { open } for pid=4247 comm="syz.1.388" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 428.683861][ T30] audit: type=1400 audit(428.160:217): avc: denied { ioctl } for pid=4247 comm="syz.1.388" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 430.691846][ T30] audit: type=1400 audit(430.170:218): avc: denied { read } for pid=4260 comm="syz.0.394" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 430.697080][ T30] audit: type=1400 audit(430.180:219): avc: denied { open } for pid=4260 comm="syz.0.394" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 435.492013][ T4283] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pid=4283 comm=syz.0.405 [ 436.878236][ T4293] ======================================================= [ 436.878236][ T4293] WARNING: The mand mount option has been deprecated and [ 436.878236][ T4293] and is ignored by this kernel. Remove the mand [ 436.878236][ T4293] option from the mount to silence this warning. [ 436.878236][ T4293] ======================================================= [ 436.996990][ T30] audit: type=1400 audit(436.460:220): avc: denied { mount } for pid=4290 comm="syz.1.410" name="/" dev="ramfs" ino=7356 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 437.046454][ T30] audit: type=1400 audit(436.520:221): avc: denied { remount } for pid=4290 comm="syz.1.410" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 437.246418][ T30] audit: type=1400 audit(436.710:222): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 440.024358][ T30] audit: type=1400 audit(439.500:223): avc: denied { write } for pid=4305 comm="syz.1.416" path="socket:[6520]" dev="sockfs" ino=6520 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 449.251273][ T30] audit: type=1400 audit(448.730:224): avc: denied { ioctl } for pid=4358 comm="syz.1.441" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64c6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 449.305724][ T30] audit: type=1400 audit(448.780:225): avc: denied { audit_write } for pid=4357 comm="syz.0.440" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 450.454133][ T30] audit: type=1400 audit(449.920:226): avc: denied { accept } for pid=4366 comm="syz.0.444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 459.497058][ T30] audit: type=1400 audit(458.980:227): avc: denied { ioctl } for pid=4430 comm="syz.1.475" path="socket:[7563]" dev="sockfs" ino=7563 ioctlcmd=0xaf22 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 463.926373][ T30] audit: type=1400 audit(463.400:228): avc: denied { write } for pid=4444 comm="syz.1.481" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 470.928713][ T30] audit: type=1400 audit(470.400:229): avc: denied { mounton } for pid=4474 comm="syz.1.496" path="/241/file0" dev="tmpfs" ino=1248 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 479.208492][ T30] audit: type=1400 audit(478.680:230): avc: denied { create } for pid=4512 comm="syz.0.515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 479.227621][ T30] audit: type=1400 audit(478.700:231): avc: denied { ioctl } for pid=4512 comm="syz.0.515" path="socket:[7703]" dev="sockfs" ino=7703 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 479.956312][ T30] audit: type=1400 audit(479.430:232): avc: denied { write } for pid=4515 comm="syz.0.517" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 481.095889][ T30] audit: type=1400 audit(480.570:233): avc: denied { getopt } for pid=4522 comm="syz.1.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 486.532047][ T30] audit: type=1400 audit(486.010:234): avc: denied { create } for pid=4551 comm="syz.1.533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 487.844392][ T30] audit: type=1400 audit(487.320:235): avc: denied { write } for pid=4557 comm="syz.1.536" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 490.590067][ T30] audit: type=1400 audit(490.070:236): avc: denied { read } for pid=4573 comm="syz.1.544" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 490.591081][ T30] audit: type=1400 audit(490.070:237): avc: denied { open } for pid=4573 comm="syz.1.544" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 492.886387][ T30] audit: type=1400 audit(492.360:238): avc: denied { ioctl } for pid=4585 comm="syz.1.550" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 493.660797][ T30] audit: type=1400 audit(493.140:239): avc: denied { bind } for pid=4593 comm="syz.1.554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 493.943138][ T30] audit: type=1400 audit(493.420:240): avc: denied { bind } for pid=4595 comm="syz.0.555" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 493.944119][ T30] audit: type=1400 audit(493.420:241): avc: denied { name_bind } for pid=4595 comm="syz.0.555" src=1024 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 493.947019][ T30] audit: type=1400 audit(493.420:242): avc: denied { node_bind } for pid=4595 comm="syz.0.555" saddr=fc00:: src=1024 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 495.061752][ T30] audit: type=1400 audit(494.540:243): avc: denied { read } for pid=4601 comm="syz.1.558" path="socket:[7865]" dev="sockfs" ino=7865 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 498.216853][ T30] audit: type=1400 audit(497.690:244): avc: denied { read } for pid=4622 comm="syz.1.568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 512.343747][ T4688] syz.0.600 uses obsolete (PF_INET,SOCK_PACKET) [ 513.988931][ T30] audit: type=1400 audit(513.450:245): avc: denied { setopt } for pid=4693 comm="syz.1.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 514.161445][ T30] audit: type=1400 audit(513.640:246): avc: denied { nlmsg_write } for pid=4694 comm="syz.0.604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 517.431007][ T30] audit: type=1400 audit(516.900:247): avc: denied { read } for pid=4715 comm="syz.0.614" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 517.440975][ T30] audit: type=1400 audit(516.910:248): avc: denied { open } for pid=4715 comm="syz.0.614" path="/dev/input/mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 517.477831][ T30] audit: type=1400 audit(516.940:249): avc: denied { write } for pid=4715 comm="syz.0.614" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 522.056117][ T4745] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4745 comm=syz.1.628 [ 522.189125][ T4744] block nbd0: shutting down sockets [ 522.318532][ T30] audit: type=1400 audit(521.800:250): avc: denied { write } for pid=4747 comm="syz.1.630" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 528.601002][ T30] audit: type=1400 audit(528.060:251): avc: denied { write } for pid=4779 comm="syz.0.645" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 528.623979][ T30] audit: type=1400 audit(528.100:252): avc: denied { open } for pid=4779 comm="syz.0.645" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 532.241119][ T30] audit: type=1400 audit(531.720:253): avc: denied { name_connect } for pid=4798 comm="syz.0.655" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 533.409199][ T30] audit: type=1400 audit(532.880:254): avc: denied { create } for pid=4807 comm="syz.1.659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 533.450573][ T30] audit: type=1400 audit(532.930:255): avc: denied { write } for pid=4807 comm="syz.1.659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 534.571256][ T30] audit: type=1400 audit(534.050:256): avc: denied { remount } for pid=4814 comm="syz.1.663" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 536.967213][ T30] audit: type=1400 audit(536.440:257): avc: denied { create } for pid=4827 comm="syz.1.669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 537.010194][ T30] audit: type=1400 audit(536.490:258): avc: denied { ioctl } for pid=4827 comm="syz.1.669" path="socket:[8441]" dev="sockfs" ino=8441 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 543.408771][ T30] audit: type=1400 audit(542.880:259): avc: denied { read } for pid=4871 comm="syz.1.690" path="socket:[8529]" dev="sockfs" ino=8529 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 548.351450][ T30] audit: type=1400 audit(547.830:260): avc: denied { write } for pid=4903 comm="syz.1.706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 551.086493][ T30] audit: type=1400 audit(550.570:261): avc: denied { map } for pid=4927 comm="syz.0.718" path="/proc/736/pagemap" dev="proc" ino=8646 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 556.052140][ T30] audit: type=1400 audit(555.530:262): avc: denied { ioctl } for pid=4958 comm="syz.0.733" path="socket:[8691]" dev="sockfs" ino=8691 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 562.199737][ T9] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 562.507684][ T9] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 562.510063][ T9] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 562.511127][ T9] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 562.512690][ T9] usb 1-1: New USB device found, idVendor=1770, idProduct=ff00, bcdDevice= 0.00 [ 562.513611][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 562.611658][ T9] usb 1-1: config 0 descriptor?? [ 562.951440][ T9] usbhid 1-1:0.0: can't add hid device: -71 [ 562.967391][ T9] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 563.080306][ T9] usb 1-1: USB disconnect, device number 2 [ 572.428847][ T30] audit: type=1400 audit(571.910:263): avc: denied { map } for pid=5055 comm="syz.1.780" path="socket:[9759]" dev="sockfs" ino=9759 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 572.435340][ T30] audit: type=1400 audit(571.910:264): avc: denied { read } for pid=5055 comm="syz.1.780" path="socket:[9759]" dev="sockfs" ino=9759 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 584.388467][ T30] audit: type=1400 audit(583.860:265): avc: denied { getopt } for pid=5112 comm="syz.1.807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 597.540584][ T30] audit: type=1400 audit(597.020:266): avc: denied { read } for pid=5173 comm="syz.0.837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 606.247072][ T5205] sctp: [Deprecated]: syz.0.851 (pid 5205) Use of struct sctp_assoc_value in delayed_ack socket option. [ 606.247072][ T5205] Use struct sctp_sack_info instead [ 608.646299][ T30] audit: type=1400 audit(608.120:267): avc: denied { shutdown } for pid=5213 comm="syz.1.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 631.870032][ T30] audit: type=1400 audit(631.340:268): avc: denied { write } for pid=5361 comm="syz.1.928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 636.912184][ T5397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5133 sclass=netlink_route_socket pid=5397 comm=syz.1.944 [ 659.096311][ T30] audit: type=1400 audit(658.560:269): avc: denied { setopt } for pid=5494 comm="syz.1.992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 682.421687][ T5611] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=136 sclass=netlink_route_socket pid=5611 comm=syz.1.1047 [ 700.517425][ T5701] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pid=5701 comm=syz.1.1090 [ 702.810959][ T5715] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5715 comm=syz.0.1097 [ 746.826238][ T5897] netlink: 32 bytes leftover after parsing attributes in process `syz.1.1183'. [ 753.263096][ T30] audit: type=1400 audit(752.740:270): avc: denied { create } for pid=5929 comm="syz.1.1200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 753.286295][ T30] audit: type=1400 audit(752.750:271): avc: denied { ioctl } for pid=5929 comm="syz.1.1200" path="socket:[11197]" dev="sockfs" ino=11197 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 780.118642][ T30] audit: type=1400 audit(779.590:272): avc: denied { ioctl } for pid=6088 comm="syz.1.1277" path="socket:[13525]" dev="sockfs" ino=13525 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 781.988834][ T6106] netlink: 45 bytes leftover after parsing attributes in process `syz.1.1285'. [ 782.425992][ T30] audit: type=1400 audit(781.890:273): avc: denied { ioctl } for pid=6108 comm="syz.1.1286" path="/dev/ttyq6" dev="devtmpfs" ino=373 ioctlcmd=0x5413 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 785.341942][ T6129] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6129 comm=syz.0.1295 [ 812.338897][ T6291] ------------[ cut here ]------------ [ 812.340377][ T6291] WARNING: CPU: 0 PID: 6291 at drivers/gpu/drm/vkms/vkms_crtc.c:98 vkms_get_vblank_timestamp+0x148/0x194 [ 812.341636][ T6291] Modules linked in: [ 812.342735][ T6291] CPU: 0 UID: 0 PID: 6291 Comm: syz.0.1374 Not tainted 6.14.0-rc6-syzkaller-00016-g0fed89a961ea #0 [ 812.343207][ T6291] Hardware name: linux,dummy-virt (DT) [ 812.343842][ T6291] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 812.344996][ T6291] pc : vkms_get_vblank_timestamp+0x148/0x194 [ 812.345907][ T6291] lr : vkms_get_vblank_timestamp+0x3c/0x194 [ 812.346601][ T6291] sp : ffff80008e0475f0 [ 812.346966][ T6291] x29: ffff80008e0475f0 x28: ffff000016f34800 x27: 0000000000000003 [ 812.347698][ T6291] x26: ffff00001411cd70 x25: 0000000000000001 x24: 1fffe00001f2cb38 [ 812.348289][ T6291] x23: ffff800085954320 x22: 000000bd046feaf0 x21: ffff00001411c000 [ 812.348878][ T6291] x20: ffff80008e0477c0 x19: ffff00000f965880 x18: 000000000ba4f9b5 [ 812.349544][ T6291] x17: 0000000000000000 x16: 0000000000000000 x15: 1fffe00002edf174 [ 812.350178][ T6291] x14: ffff800086ec81cc x13: 0000000000000000 x12: ffff80008e729000 [ 812.350713][ T6291] x11: 1fffe00002635aa2 x10: ffff600002635aa2 x9 : dfff800000000000 [ 812.351336][ T6291] x8 : 0000000041b58ab3 x7 : ffff700011c08ece x6 : dfff800000000000 [ 812.351891][ T6291] x5 : 0000000000000000 x4 : ffff800081d9a44c x3 : 1fffe00001f2cb4a [ 812.352429][ T6291] x2 : 1fffe00001f2cb35 x1 : 0000000000000000 x0 : 000000bd046feaf0 [ 812.353112][ T6291] Call trace: [ 812.353637][ T6291] vkms_get_vblank_timestamp+0x148/0x194 (P) [ 812.354138][ T6291] drm_crtc_get_last_vbltimestamp+0x140/0x184 [ 812.354793][ T6291] drm_crtc_next_vblank_start+0x11c/0x244 [ 812.355366][ T6291] drm_atomic_helper_wait_for_fences+0x184/0x614 [ 812.355793][ T6291] drm_atomic_helper_commit+0x170/0x2b4 [ 812.356165][ T6291] drm_atomic_commit+0x18c/0x240 [ 812.356522][ T6291] drm_client_modeset_commit_atomic+0x4a4/0x5f8 [ 812.356881][ T6291] drm_client_modeset_commit_locked+0x108/0x3fc [ 812.357467][ T6291] drm_client_modeset_commit+0x44/0x74 [ 812.357881][ T6291] drm_fb_helper_lastclose+0xac/0x130 [ 812.358187][ T6291] drm_fbdev_client_restore+0x30/0x4c [ 812.358700][ T6291] drm_client_dev_restore+0x12c/0x214 [ 812.359121][ T6291] drm_release+0x210/0x2d8 [ 812.359558][ T6291] __fput+0x2c8/0x954 [ 812.359966][ T6291] ____fput+0x14/0x20 [ 812.360309][ T6291] task_work_run+0x128/0x210 [ 812.360765][ T6291] do_notify_resume+0x1d0/0x258 [ 812.361151][ T6291] el0_svc+0x100/0x180 [ 812.361707][ T6291] el0t_64_sync_handler+0x10c/0x138 [ 812.362228][ T6291] el0t_64_sync+0x198/0x19c [ 812.362994][ T6291] irq event stamp: 1650 [ 812.363394][ T6291] hardirqs last enabled at (1649): [] exit_to_kernel_mode+0x38/0x118 [ 812.363953][ T6291] hardirqs last disabled at (1650): [] el1_dbg+0x24/0x9c [ 812.364587][ T6291] softirqs last enabled at (1560): [] fpsimd_restore_current_state+0x44/0xe4 [ 812.365914][ T6291] softirqs last disabled at (1558): [] fpsimd_restore_current_state+0x14/0xe4 [ 812.366988][ T6291] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 814.219019][ T5477] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 814.497034][ T5477] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 814.747855][ T5477] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 814.931929][ T5477] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 815.893610][ T30] audit: type=1400 audit(815.370:274): avc: denied { read } for pid=3147 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 819.657438][ T5477] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 819.768912][ T5477] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 819.838148][ T5477] bond0 (unregistering): Released all slaves [ 820.274410][ T5477] hsr_slave_0: left promiscuous mode [ 820.281909][ T5477] hsr_slave_1: left promiscuous mode [ 820.353557][ T5477] veth1_macvtap: left promiscuous mode [ 820.356580][ T5477] veth0_macvtap: left promiscuous mode [ 820.357861][ T5477] veth1_vlan: left promiscuous mode [ 820.359933][ T5477] veth0_vlan: left promiscuous mode [ 829.993893][ T5477] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 830.261493][ T5477] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 830.551004][ T5477] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 830.942255][ T5477] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 837.311291][ T5477] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 837.381321][ T5477] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 837.450733][ T5477] bond0 (unregistering): Released all slaves [ 837.783658][ T5477] hsr_slave_0: left promiscuous mode [ 837.827409][ T5477] hsr_slave_1: left promiscuous mode [ 837.903948][ T5477] veth1_macvtap: left promiscuous mode [ 837.907179][ T5477] veth0_macvtap: left promiscuous mode [ 837.908269][ T5477] veth1_vlan: left promiscuous mode [ 837.909068][ T5477] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 13:54:22 Registers: info registers vcpu 0 CPU#0 PC=ffff80008030acc4 X00=00000000000003c0 X01=0000000000000003 X02=0000000000000000 X03=1fffe0000d41b299 X04=0000000000000e6c X05=0000000000000165 X06=ffff0000176f8bd0 X07=00000000f43800bd X08=1fffe00002edf151 X09=ffff0000176f8a90 X10=95f3e934ca088f73 X11=ffff800086f2fc5c X12=0000000000000000 X13=1ffff00011147709 X14=ffff800086ec81cc X15=1fffe00002edf17e X16=0000000000000000 X17=0000000000000000 X18=0000000043800bdf X19=ffff800086ec84c8 X20=ffff800086ec84c8 X21=ffff7fffe3211000 X22=0000000000000001 X23=ffff80008703a678 X24=0000000000000000 X25=ffff80008033227c X26=1ffff00011c08d88 X27=ffff8000853efd40 X28=00000000000003c0 X29=ffff80008e046bc0 X30=ffff80008030ac7c SP=ffff80008e046ba0 PSTATE=100003c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0100000000000000:0100000000000000 Q01=0000000100000000:0000000000000000 Q02=0000000000000001:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000001:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc9a4c830:0000ffffc9a4c830 Q17=ffffff80ffffffd0:0000ffffc9a4c800 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800080290550 X00=0000000000000000 X01=000000010000c7f6 X02=0000000000000000 X03=1fffe0000d421525 X04=00000000f204f1f1 X05=ffff700011a4cf8e X06=dfff800000000000 X07=00000000f1f1f1f1 X08=ffff80008d267898 X09=1ffff00011a4cf8f X10=1fffe00001bf0bc5 X11=1ffff00011a4cf30 X12=ffff80008d267c40 X13=ffff80008d267980 X14=ffff80008d267980 X15=ffff800086edcd80 X16=0000000000000000 X17=0000000000000001 X18=ffff00000df85e18 X19=ffff800086eddcc0 X20=ffff800086eddcc0 X21=0000000000000000 X22=1fffe0000d42239b X23=0000000000000000 X24=ffff00006a111cc0 X25=ffff00006a111cd8 X26=ffff00006a111cd2 X27=1ffff00011a4cfc4 X28=ffff0000128a8000 X29=ffff80008d267b10 X30=ffff80008533c37c SP=ffff80008d267c70 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffc9a4c580:be0b47c112360000 Q02=0000ffffc9a4c560:ffffff80ffffffd8 Q03=0000ffffc9a4c610:0000ffffc9a4c610 Q04=0000ffffc9a4c610:0000ffff9f336e08 Q05=0000ffffc9a4c5e0:0000ffffc9a4c610 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc9a4c830:0000ffffc9a4c830 Q17=ffffff80ffffffd0:0000ffffc9a4c800 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000