last executing test programs: 2m2.430330926s ago: executing program 1 (id=27907): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4020940d, &(0x7f0000000140)) 2m2.242620883s ago: executing program 1 (id=27908): r0 = socket$kcm(0x29, 0x2, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[], 0x5c}}, 0x0) 2m2.075537948s ago: executing program 1 (id=27909): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f00000002c0), 0x4) setsockopt$MRT_FLUSH(r0, 0x0, 0xd1, &(0x7f0000000000), 0x4) 2m1.872030756s ago: executing program 1 (id=27911): r0 = gettid() r1 = socket(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r1, &(0x7f0000000140)="2600000022004701050000070000000000000020002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) write(r1, &(0x7f0000000000)='\"', 0x1) tkill(r0, 0x7) 2m1.180663457s ago: executing program 1 (id=27916): r0 = openat$vsock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0) 2m0.999371064s ago: executing program 1 (id=27918): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x80000000}, 0x48) 44.672583369s ago: executing program 0 (id=28073): pipe2(&(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 42.681480666s ago: executing program 0 (id=28074): r0 = getpid() r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000002140)=r0) 37.484638168s ago: executing program 0 (id=28075): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$AUDIT_SET(r0, 0x0, 0x0) 36.800085079s ago: executing program 0 (id=28076): r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0) 28.535476574s ago: executing program 0 (id=28077): r0 = eventfd2(0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 0s ago: executing program 0 (id=28078): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003d00)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, 0x0, 0x0) kernel console output (not intermixed with test programs): family 0 port 6081 - 0 [ 4910.989619][T15869] input: syz1 as /devices/virtual/input/input34 [ 4911.129341][T15859] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 4911.196619][T15859] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 4911.267852][T15859] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 4911.350294][T15859] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 4914.396750][T15916] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15916 comm=syz.1.20220 [ 4916.147220][T15870] udevd[15870]: setting mode of /dev/vcs21 to 020660 failed: Read-only file system [ 4916.148231][T15870] udevd[15870]: setting owner of /dev/vcs21 to uid=0, gid=5 failed: Read-only file system [ 4916.389525][T15934] udevd[15934]: setting mode of /dev/vcsu21 to 020660 failed: Read-only file system [ 4916.390513][T15934] udevd[15934]: setting owner of /dev/vcsu21 to uid=0, gid=5 failed: Read-only file system [ 4916.674755][T15936] udevd[15936]: setting mode of /dev/vcsa21 to 020660 failed: Read-only file system [ 4916.676830][T15936] udevd[15936]: setting owner of /dev/vcsa21 to uid=0, gid=5 failed: Read-only file system [ 4917.924752][ T30] audit: type=1400 audit(5430.566:605): avc: denied { append } for pid=15961 comm="syz.0.20239" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 4919.439227][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 4919.963860][T15993] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15993 comm=syz.1.20254 [ 4922.975096][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::ffff:172.20.20.187]:2. Sending cookies. [ 4923.156432][T16023] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16023 comm=syz.0.20268 [ 4924.920370][ T30] audit: type=1400 audit(5437.556:606): avc: denied { setopt } for pid=16057 comm="syz.1.20286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 4924.943664][T16058] netlink: 168 bytes leftover after parsing attributes in process `syz.1.20286'. [ 4925.803594][T16072] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16072 comm=syz.0.20293 [ 4931.163564][T16160] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16160 comm=syz.0.20334 [ 4932.638135][T16175] sctp: [Deprecated]: syz.0.20341 (pid 16175) Use of int in max_burst socket option deprecated. [ 4932.638135][T16175] Use struct sctp_assoc_value instead [ 4943.522535][T16315] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=16315 comm=syz.0.20407 [ 4944.294472][T16330] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=16330 comm=syz.1.20415 [ 4944.297144][T16330] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16330 comm=syz.1.20415 [ 4945.795478][T16302] udevd[16302]: setting mode of /dev/vcs23 to 020660 failed: Read-only file system [ 4945.799832][T16302] udevd[16302]: setting owner of /dev/vcs23 to uid=0, gid=5 failed: Read-only file system [ 4946.032523][T16360] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16360 comm=syz.1.20429 [ 4946.241119][T16359] udevd[16359]: setting mode of /dev/vcsu23 to 020660 failed: Read-only file system [ 4946.284009][T16359] udevd[16359]: setting owner of /dev/vcsu23 to uid=0, gid=5 failed: Read-only file system [ 4946.495664][T16361] udevd[16361]: setting mode of /dev/vcsa23 to 020660 failed: Read-only file system [ 4946.496603][T16361] udevd[16361]: setting owner of /dev/vcsa23 to uid=0, gid=5 failed: Read-only file system [ 4951.231008][T16442] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16442 comm=syz.0.20468 [ 4952.004124][T16454] veth0_vlan: left promiscuous mode [ 4954.213848][T16481] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1280 sclass=netlink_tcpdiag_socket pid=16481 comm=syz.1.20486 [ 4961.216019][T16555] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=3 sclass=netlink_xfrm_socket pid=16555 comm=syz.1.20519 [ 4966.967906][T16646] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16646 comm=syz.0.20562 [ 4968.827539][T16676] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=16676 comm=syz.0.20576 [ 4969.057955][T16678] serio: Serial port pts0 [ 4976.048063][T16726] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16726 comm=syz.1.20598 [ 4979.457896][T32165] block device autoloading is deprecated and will be removed. [ 4979.643419][T16782] udevd[16782]: setting mode of /dev/loop0 to 060660 failed: Read-only file system [ 4979.644603][T16782] udevd[16782]: setting owner of /dev/loop0 to uid=0, gid=6 failed: Read-only file system [ 4979.885048][T16793] serio: Serial port pts0 [ 4980.692970][T16802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16802 comm=syz.0.20634 [ 4984.744454][T16845] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16845 comm=syz.0.20653 [ 4985.979535][T16784] udevd[16784]: setting mode of /dev/vcs21 to 020660 failed: Read-only file system [ 4985.981318][T16784] udevd[16784]: setting owner of /dev/vcs21 to uid=0, gid=5 failed: Read-only file system [ 4986.033190][T16782] udevd[16782]: setting mode of /dev/vcsu21 to 020660 failed: Read-only file system [ 4986.034244][T16782] udevd[16782]: setting owner of /dev/vcsu21 to uid=0, gid=5 failed: Read-only file system [ 4986.129460][T16853] udevd[16853]: setting mode of /dev/vcsa21 to 020660 failed: Read-only file system [ 4986.130420][T16853] udevd[16853]: setting owner of /dev/vcsa21 to uid=0, gid=5 failed: Read-only file system [ 4986.965737][T16863] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16863 comm=syz.0.20661 [ 4995.832122][ T30] audit: type=1400 audit(5508.466:607): avc: denied { lock } for pid=16934 comm="syz.1.20693" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=162501 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5006.490200][T17044] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17044 comm=syz.1.20743 [ 5012.934950][ T30] audit: type=1400 audit(5525.576:608): avc: denied { audit_read } for pid=17134 comm="syz.1.20788" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5016.398726][T17185] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=17185 comm=syz.0.20812 [ 5016.562652][T17187] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17187 comm=syz.1.20813 [ 5023.486337][T16784] udevd[16784]: setting mode of /dev/vcs20 to 020660 failed: Read-only file system [ 5023.487291][T16784] udevd[16784]: setting owner of /dev/vcs20 to uid=0, gid=5 failed: Read-only file system [ 5023.506323][T16782] udevd[16782]: setting mode of /dev/vcsu20 to 020660 failed: Read-only file system [ 5023.507453][T16782] udevd[16782]: setting owner of /dev/vcsu20 to uid=0, gid=5 failed: Read-only file system [ 5023.708005][T17261] udevd[17261]: setting mode of /dev/vcsa20 to 020660 failed: Read-only file system [ 5023.708977][T17261] udevd[17261]: setting owner of /dev/vcsa20 to uid=0, gid=5 failed: Read-only file system [ 5028.723252][T17321] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=17321 comm=syz.1.20875 [ 5030.265781][T17338] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17338 comm=syz.1.20882 [ 5032.617660][T17376] "syz.0.20902" (17376) uses obsolete ecb(arc4) skcipher [ 5036.234121][T17424] serio: Serial port pts0 [ 5044.886180][T17465] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17465 comm=syz.1.20940 [ 5047.933527][T17497] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17497 comm=syz.0.20955 [ 5076.201814][ C1] sched: RT throttling activated [ 5084.124737][T17797] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=17797 comm=syz.0.21090 [ 5085.458474][T17810] serio: Serial port pts0 [ 5094.120459][ T30] audit: type=1400 audit(5606.756:609): avc: denied { lock } for pid=17886 comm="syz.0.21128" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 5099.664497][T17968] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=17968 comm=syz.0.21166 [ 5101.913515][T17979] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17979 comm=syz.0.21171 [ 5103.244773][ T30] audit: type=1400 audit(5615.886:610): avc: denied { shutdown } for pid=17988 comm="syz.1.21176" lport=35456 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 5109.420704][T18040] netlink: 16 bytes leftover after parsing attributes in process `syz.1.21199'. [ 5110.463186][T18047] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=5130 sclass=netlink_xfrm_socket pid=18047 comm=syz.1.21201 [ 5116.117698][T18122] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18122 comm=syz.1.21238 [ 5122.198049][T18153] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=18153 comm=syz.1.21252 [ 5140.338211][T18286] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=18286 comm=syz.1.21315 [ 5147.869772][T18361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18361 comm=syz.1.21351 [ 5149.003565][T18374] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18374 comm=syz.1.21358 [ 5153.277948][ T30] audit: type=1400 audit(5665.916:611): avc: denied { create } for pid=18426 comm="syz.0.21381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 5154.902103][T18446] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=18446 comm=syz.0.21390 [ 5157.590607][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 5159.415117][T18503] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18503 comm=syz.0.21415 [ 5167.983419][T18609] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18609 comm=syz.1.21466 [ 5168.225100][T18611] ./file0: Can't lookup blockdev [ 5178.475508][T18740] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18740 comm=syz.1.21529 [ 5184.390429][T18811] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2564 sclass=netlink_xfrm_socket pid=18811 comm=syz.1.21563 [ 5191.023489][T18873] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1543 sclass=netlink_route_socket pid=18873 comm=syz.1.21593 [ 5192.324005][T18382] udevd[18382]: setting mode of /dev/vcs22 to 020660 failed: Read-only file system [ 5192.326130][T18382] udevd[18382]: setting owner of /dev/vcs22 to uid=0, gid=5 failed: Read-only file system [ 5192.330941][T18191] udevd[18191]: setting mode of /dev/vcsu22 to 020660 failed: Read-only file system [ 5192.353986][T18191] udevd[18191]: setting owner of /dev/vcsu22 to uid=0, gid=5 failed: Read-only file system [ 5192.660189][T18892] udevd[18892]: setting mode of /dev/vcsa22 to 020660 failed: Read-only file system [ 5192.661164][T18892] udevd[18892]: setting owner of /dev/vcsa22 to uid=0, gid=5 failed: Read-only file system [ 5218.779637][ T30] audit: type=1400 audit(5731.416:612): avc: denied { watch } for pid=19111 comm="syz.0.21703" path="/4604" dev="tmpfs" ino=23579 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 5218.787756][ T30] audit: type=1400 audit(5731.416:613): avc: denied { watch_sb } for pid=19111 comm="syz.0.21703" path="/4604" dev="tmpfs" ino=23579 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 5219.576270][T19121] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19121 comm=syz.0.21707 [ 5225.180255][T19185] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19185 comm=syz.0.21737 [ 5229.346159][T19223] "syz.0.21755" (19223) uses obsolete ecb(arc4) skcipher [ 5231.841100][T19261] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65498 sclass=netlink_route_socket pid=19261 comm=syz.1.21774 [ 5234.470025][T19295] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19295 comm=syz.1.21790 [ 5245.465403][T19389] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2051 sclass=netlink_audit_socket pid=19389 comm=syz.1.21835 [ 5247.546579][T19410] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19410 comm=syz.0.21844 [ 5250.176376][T19436] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 5259.903420][ T30] audit: type=1400 audit(5772.516:614): avc: denied { setattr } for pid=19507 comm="syz.0.21891" name="SCTP" dev="sockfs" ino=171784 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5261.215107][T19530] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19530 comm=syz.0.21902 [ 5275.965968][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 5276.936336][T19700] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=23 sclass=netlink_tcpdiag_socket pid=19700 comm=syz.1.21981 [ 5278.408463][T19713] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19713 comm=syz.0.21985 [ 5281.342827][T19753] serio: Serial port pts0 [ 5297.477469][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 5301.928655][T19877] "syz.0.22062" (19877) uses obsolete ecb(arc4) skcipher [ 5304.112844][T19909] serio: Serial port pts0 [ 5308.136547][T19947] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=513 sclass=netlink_tcpdiag_socket pid=19947 comm=syz.1.22095 [ 5311.387876][T19993] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19993 comm=syz.0.22117 [ 5314.953142][T20043] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20043 comm=syz.1.22140 [ 5320.208068][T20105] input: syz0 as /devices/virtual/input/input40 [ 5343.209706][T20188] vcan0: tx address claim with dest, not broadcast [ 5345.195123][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 5351.567158][T20283] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20283 comm=syz.0.22250 [ 5355.772659][T20328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20328 comm=syz.0.22269 [ 5357.154617][T20342] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=20342 comm=syz.0.22276 [ 5358.894691][T20360] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=263 sclass=netlink_route_socket pid=20360 comm=syz.0.22284 [ 5362.605577][T20404] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20404 comm=syz.1.22305 [ 5363.661160][T20419] serio: Serial port pts0 [ 5369.387225][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 5371.297908][T20513] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20513 comm=syz.0.22354 [ 5371.560753][T20516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20516 comm=syz.0.22357 [ 5374.717752][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 5375.314041][T20587] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1538 sclass=netlink_tcpdiag_socket pid=20587 comm=syz.0.22391 [ 5376.813233][T20611] serio: Serial port pts0 [ 5383.694199][T20686] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2561 sclass=netlink_route_socket pid=20686 comm=syz.1.22437 [ 5384.142391][T20695] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1025 sclass=netlink_route_socket pid=20695 comm=syz.1.22442 [ 5392.376844][T20752] __find_get_block_slow() failed. block=144115188075855872, b_blocknr=0, b_state=0x00106019, b_size=4096, device vda blocksize: 4096 [ 5392.383180][T20752] grow_buffers: requested out-of-range block 144115188075855872 for device vda [ 5392.387913][T20752] EXT4-fs warning (device vda): ext4_resize_fs:2018: can't read last block, resize aborted [ 5395.926392][T20758] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=5127 sclass=netlink_xfrm_socket pid=20758 comm=syz.0.22468 [ 5398.719390][ T30] audit: type=1400 audit(5911.356:615): avc: denied { setattr } for pid=20780 comm="syz.0.22480" name="[io_uring]" dev="anon_inodefs" ino=176352 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5403.778641][T20843] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20843 comm=syz.1.22507 [ 5406.638968][T20889] "syz.0.22529" (20889) uses obsolete ecb(arc4) skcipher [ 5408.152323][T20919] serio: Serial port pts0 [ 5417.390854][ T30] audit: type=1400 audit(5930.026:616): avc: denied { lock } for pid=20948 comm="syz.1.22556" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 5417.658878][T20953] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1014 sclass=netlink_route_socket pid=20953 comm=syz.1.22558 [ 5419.674930][T20968] sctp: [Deprecated]: syz.1.22565 (pid 20968) Use of int in maxseg socket option. [ 5419.674930][T20968] Use struct sctp_assoc_value instead [ 5426.839952][T21013] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5125 sclass=netlink_route_socket pid=21013 comm=syz.1.22585 [ 5439.922912][T21169] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5440.026807][T21169] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5440.145637][T21169] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5440.299105][T21169] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5440.920485][T21169] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 5441.017931][T21169] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 5441.112701][T21169] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 5441.181077][T21169] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 5449.580029][T21248] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21248 comm=syz.1.22691 [ 5453.841088][T21322] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=21322 comm=syz.0.22727 [ 5461.130889][T21411] sctp: [Deprecated]: syz.1.22769 (pid 21411) Use of int in max_burst socket option deprecated. [ 5461.130889][T21411] Use struct sctp_assoc_value instead [ 5466.645995][ T30] audit: type=1400 audit(5979.286:617): avc: denied { read write } for pid=32165 comm="syz-executor" name="loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5466.654946][ T30] audit: type=1400 audit(5979.286:618): avc: denied { open } for pid=32165 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5466.656305][ T30] audit: type=1400 audit(5979.286:619): avc: denied { ioctl } for pid=32165 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5466.668283][ T30] audit: type=1400 audit(5979.306:620): avc: denied { read } for pid=3078 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5466.692121][ T30] audit: type=1400 audit(5979.316:621): avc: denied { search } for pid=3078 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5466.699467][ T30] audit: type=1400 audit(5979.336:622): avc: denied { append } for pid=3078 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5466.700357][ T30] audit: type=1400 audit(5979.336:623): avc: denied { open } for pid=3078 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5466.701257][ T30] audit: type=1400 audit(5979.336:624): avc: denied { getattr } for pid=3078 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5466.789639][ T30] audit: type=1400 audit(5979.426:625): avc: denied { read } for pid=21465 comm="syz.0.22795" name="dlm_plock" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5466.790819][ T30] audit: type=1400 audit(5979.426:626): avc: denied { open } for pid=21465 comm="syz.0.22795" path="/dev/dlm_plock" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5472.942378][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 5472.942525][ T30] audit: type=1400 audit(5985.576:652): avc: denied { setattr } for pid=21509 comm="syz.0.22816" name="" dev="pipefs" ino=104192 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 5473.718033][ T30] audit: type=1400 audit(5986.356:653): avc: denied { ioctl } for pid=21525 comm="syz.0.22824" path="socket:[179402]" dev="sockfs" ino=179402 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5474.003626][ T30] audit: type=1400 audit(5986.646:654): avc: denied { create } for pid=21531 comm="syz.1.22827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5474.009405][ T30] audit: type=1400 audit(5986.646:655): avc: denied { connect } for pid=21531 comm="syz.1.22827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5474.133757][ T30] audit: type=1400 audit(5986.776:656): avc: denied { execmem } for pid=21533 comm="syz.0.22828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5474.138883][ T30] audit: type=1400 audit(5986.776:657): avc: denied { execute } for pid=21533 comm="syz.0.22828" path="/5144/memory.swap.events" dev="tmpfs" ino=26344 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 5474.280213][ T30] audit: type=1400 audit(5986.916:658): avc: denied { setopt } for pid=21535 comm="syz.0.22829" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5474.528814][ T30] audit: type=1400 audit(5987.166:659): avc: denied { ioctl } for pid=21531 comm="syz.1.22827" path="socket:[178809]" dev="sockfs" ino=178809 ioctlcmd=0x5820 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5474.778028][ T30] audit: type=1400 audit(5987.416:660): avc: denied { read } for pid=21542 comm="syz.0.22832" name="card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 5474.779204][ T30] audit: type=1400 audit(5987.416:661): avc: denied { open } for pid=21542 comm="syz.0.22832" path="/dev/dri/card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 5479.306779][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 5479.306891][ T30] audit: type=1400 audit(5991.946:683): avc: denied { open } for pid=21591 comm="syz.0.22854" path="/dev/ptyq5" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 5479.339054][ T30] audit: type=1400 audit(5991.976:684): avc: denied { ioctl } for pid=21591 comm="syz.0.22854" path="/dev/ptyq5" dev="devtmpfs" ino=118 ioctlcmd=0x542a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 5479.349835][ T30] audit: type=1400 audit(5991.976:685): avc: denied { setopt } for pid=21592 comm="syz.1.22853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5479.597747][ T30] audit: type=1400 audit(5992.236:686): avc: denied { create } for pid=21596 comm="syz.0.22856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5479.616071][ T30] audit: type=1400 audit(5992.246:687): avc: denied { write } for pid=21596 comm="syz.0.22856" path="socket:[178937]" dev="sockfs" ino=178937 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5480.022978][ T30] audit: type=1400 audit(5992.656:688): avc: denied { create } for pid=21603 comm="syz.0.22860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5480.026832][ T30] audit: type=1400 audit(5992.666:689): avc: denied { getopt } for pid=21603 comm="syz.0.22860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5480.392022][ T30] audit: type=1400 audit(5993.026:690): avc: denied { read } for pid=21609 comm="syz.1.22862" path="socket:[178951]" dev="sockfs" ino=178951 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5480.411850][ T30] audit: type=1400 audit(5993.046:691): avc: denied { read } for pid=21610 comm="syz.0.22863" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 5480.413545][ T30] audit: type=1400 audit(5993.046:692): avc: denied { open } for pid=21610 comm="syz.0.22863" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 5485.133415][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 5485.133515][ T30] audit: type=1400 audit(5997.776:696): avc: denied { read } for pid=21649 comm="syz.1.22882" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 5485.139717][ T30] audit: type=1400 audit(5997.776:697): avc: denied { open } for pid=21649 comm="syz.1.22882" path="/dev/loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 5486.089455][ T30] audit: type=1400 audit(5998.726:698): avc: denied { create } for pid=21668 comm="syz.0.22891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 5486.104792][ T30] audit: type=1400 audit(5998.746:699): avc: denied { write } for pid=21668 comm="syz.0.22891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 5486.697436][ T30] audit: type=1400 audit(5999.336:700): avc: denied { write } for pid=21679 comm="syz.1.22896" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5486.706105][ T30] audit: type=1400 audit(5999.346:701): avc: denied { ioctl } for pid=21679 comm="syz.1.22896" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0x6628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5486.899849][ T30] audit: type=1400 audit(5999.536:702): avc: denied { create } for pid=21684 comm="syz.1.22899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5486.913824][ T30] audit: type=1400 audit(5999.556:703): avc: denied { getopt } for pid=21684 comm="syz.1.22899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5487.173142][ T30] audit: type=1400 audit(5999.806:704): avc: denied { listen } for pid=21689 comm="syz.1.22901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5487.174725][ T30] audit: type=1400 audit(5999.806:705): avc: denied { ioctl } for pid=21689 comm="syz.1.22901" path="socket:[179120]" dev="sockfs" ino=179120 ioctlcmd=0x5720 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5488.192911][T21706] nbd0: detected capacity change from 0 to 8388607 [ 5489.160280][T21706] block nbd0: shutting down sockets [ 5489.176519][ C0] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 5489.177345][ C0] Buffer I/O error on dev nbd0, logical block 0, async page read [ 5489.186893][ T39] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 5489.188718][ T39] Buffer I/O error on dev nbd0, logical block 0, async page read [ 5489.199115][T21709] nbd0: unable to read partition table [ 5489.235640][T21711] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 5489.236330][T21711] Buffer I/O error on dev nbd0, logical block 0, async page read [ 5489.237425][T21711] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1 [ 5489.237841][T21711] Buffer I/O error on dev nbd0, logical block 0, async page read [ 5489.238250][T21711] nbd0: unable to read partition table [ 5489.275999][T21709] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 5489.285384][T21709] Buffer I/O error on dev nbd0, logical block 0, async page read [ 5489.286494][T21709] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 5489.286889][T21709] Buffer I/O error on dev nbd0, logical block 0, async page read [ 5489.287442][T21709] nbd0: unable to read partition table [ 5489.347928][T21709] I/O error, dev nbd0, sector 8388352 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 5489.350601][T21709] I/O error, dev nbd0, sector 8388352 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 5489.351028][T21709] Buffer I/O error on dev nbd0, logical block 1048544, async page read [ 5490.141047][T21731] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 5490.491377][T21738] "syz.0.22924" (21738) uses obsolete ecb(arc4) skcipher [ 5490.494004][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 5490.494128][ T30] audit: type=1400 audit(6003.126:713): avc: denied { bind } for pid=21737 comm="syz.0.22924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5490.495864][ T30] audit: type=1400 audit(6003.136:714): avc: denied { accept } for pid=21737 comm="syz.0.22924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5490.497950][ T30] audit: type=1400 audit(6003.136:715): avc: denied { write } for pid=21737 comm="syz.0.22924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5490.675318][ T30] audit: type=1400 audit(6003.316:716): avc: denied { ioctl } for pid=21740 comm="syz.0.22925" path="socket:[180257]" dev="sockfs" ino=180257 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 5491.378551][ T30] audit: type=1400 audit(6004.016:717): avc: denied { connect } for pid=21748 comm="syz.1.22929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5491.549524][T21753] sctp: [Deprecated]: syz.1.22930 (pid 21753) Use of struct sctp_assoc_value in delayed_ack socket option. [ 5491.549524][T21753] Use struct sctp_sack_info instead [ 5492.305696][ T30] audit: type=1400 audit(6004.946:718): avc: denied { write } for pid=21757 comm="syz.0.22932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5493.939481][ T30] audit: type=1400 audit(6006.576:719): avc: denied { prog_run } for pid=21767 comm="syz.0.22936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5494.010037][ T30] audit: type=1400 audit(6006.646:720): avc: denied { nlmsg_write } for pid=21775 comm="syz.1.22939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 5494.076552][ T30] audit: type=1400 audit(6006.706:721): avc: denied { ioctl } for pid=21775 comm="syz.1.22939" path="socket:[179779]" dev="sockfs" ino=179779 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5495.635911][ T30] audit: type=1400 audit(6008.276:722): avc: denied { setopt } for pid=21794 comm="syz.1.22949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5496.550286][ T30] audit: type=1400 audit(6009.186:723): avc: denied { name_bind } for pid=21809 comm="syz.1.22957" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 5496.551065][ T30] audit: type=1400 audit(6009.186:724): avc: denied { node_bind } for pid=21809 comm="syz.1.22957" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 5496.563395][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 5496.676114][ T30] audit: type=1400 audit(6009.306:725): avc: denied { create } for pid=21811 comm="syz.0.22956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5496.695087][ T30] audit: type=1400 audit(6009.336:726): avc: denied { write } for pid=21811 comm="syz.0.22956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5496.697021][T21812] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=21812 comm=syz.0.22956 [ 5497.177724][ T30] audit: type=1400 audit(6009.816:727): avc: denied { getopt } for pid=21818 comm="syz.0.22961" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5497.433456][ T30] audit: type=1400 audit(6010.066:728): avc: denied { write } for pid=21823 comm="syz.1.22963" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 5497.526420][ T30] audit: type=1400 audit(6010.166:729): avc: denied { setopt } for pid=21825 comm="syz.0.22964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5498.027330][ T30] audit: type=1400 audit(6010.666:730): avc: denied { create } for pid=21832 comm="syz.1.22967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5498.035801][ T30] audit: type=1400 audit(6010.676:731): avc: denied { ioctl } for pid=21832 comm="syz.1.22967" path="socket:[180396]" dev="sockfs" ino=180396 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5499.019947][T21854] serio: Serial port pts0 [ 5499.685963][T21864] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=21864 comm=syz.0.22982 [ 5499.870606][T21866] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21866 comm=syz.0.22983 [ 5500.279439][T21871] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21871 comm=syz.0.22985 [ 5500.703812][ T30] audit: type=1400 audit(6013.336:732): avc: denied { setattr } for pid=21874 comm="syz.0.22987" path="/dev/sequencer2" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 5501.555398][ T30] audit: type=1400 audit(6014.196:733): avc: denied { create } for pid=21886 comm="syz.1.22992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 5501.744677][ T30] audit: type=1400 audit(6014.376:734): avc: denied { sys_module } for pid=21885 comm="syz.0.22993" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5502.223491][ T30] audit: type=1400 audit(6014.866:735): avc: denied { write } for pid=21893 comm="syz.0.22995" lport=12 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5502.423355][ T30] audit: type=1400 audit(6015.056:736): avc: denied { create } for pid=21897 comm="syz.1.22997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5502.424182][ T30] audit: type=1400 audit(6015.056:737): avc: denied { write } for pid=21897 comm="syz.1.22997" path="socket:[180508]" dev="sockfs" ino=180508 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5507.075911][ T30] audit: type=1400 audit(6019.716:738): avc: denied { read } for pid=21944 comm="syz.1.23019" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 5507.078091][ T30] audit: type=1400 audit(6019.716:739): avc: denied { open } for pid=21944 comm="syz.1.23019" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 5507.084221][ T30] audit: type=1400 audit(6019.726:740): avc: denied { ioctl } for pid=21944 comm="syz.1.23019" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 5507.541009][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 5508.216218][ T30] audit: type=1400 audit(6020.846:741): avc: denied { write } for pid=21966 comm="syz.1.23030" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 5508.217769][ T30] audit: type=1400 audit(6020.856:742): avc: denied { open } for pid=21966 comm="syz.1.23030" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 5508.845698][ T30] audit: type=1400 audit(6021.476:743): avc: denied { create } for pid=21977 comm="syz.1.23035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 5508.849605][ T30] audit: type=1400 audit(6021.486:744): avc: denied { write } for pid=21977 comm="syz.1.23035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 5511.468448][ T30] audit: type=1400 audit(6024.106:745): avc: denied { ioctl } for pid=22020 comm="syz.1.23056" path="socket:[180742]" dev="sockfs" ino=180742 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5512.814653][ T30] audit: type=1400 audit(6025.446:746): avc: denied { read } for pid=22045 comm="syz.1.23066" path="socket:[180783]" dev="sockfs" ino=180783 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5513.441253][ T30] audit: type=1400 audit(6026.076:747): avc: denied { create } for pid=22053 comm="syz.1.23070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5515.907031][ T30] audit: type=1400 audit(6028.546:748): avc: denied { read } for pid=22098 comm="syz.0.23092" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 5515.920714][ T30] audit: type=1400 audit(6028.556:749): avc: denied { ioctl } for pid=22098 comm="syz.0.23092" path="/dev/fb0" dev="devtmpfs" ino=621 ioctlcmd=0x4c04 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 5518.248237][ T30] audit: type=1400 audit(6030.886:750): avc: denied { connect } for pid=22130 comm="syz.1.23107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5518.629207][ T30] audit: type=1400 audit(6031.266:751): avc: denied { create } for pid=22139 comm="syz.0.23112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 5519.584417][ T30] audit: type=1400 audit(6032.226:752): avc: denied { ioctl } for pid=22158 comm="syz.1.23122" path="socket:[181413]" dev="sockfs" ino=181413 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5519.588364][ T30] audit: type=1400 audit(6032.226:753): avc: denied { write } for pid=22158 comm="syz.1.23122" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 5519.798122][ T30] audit: type=1400 audit(6032.436:754): avc: denied { bind } for pid=22163 comm="syz.1.23124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5520.410400][ T30] audit: type=1400 audit(6033.046:755): avc: denied { ioctl } for pid=22174 comm="syz.0.23129" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 5521.506048][T22189] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22189 comm=syz.0.23135 [ 5526.987454][T22250] serio: Serial port pts0 [ 5528.208901][ T30] audit: type=1400 audit(6040.846:756): avc: denied { ioctl } for pid=22258 comm="syz.1.23165" path="/dev/loop-control" dev="devtmpfs" ino=638 ioctlcmd=0x6687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 5532.015782][ T30] audit: type=1400 audit(6044.656:757): avc: denied { mac_admin } for pid=22288 comm="syz.1.23179" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5532.017329][T22289] SELinux: Context system_u:object_r:semanage_exec_t:s0 is not valid (left unmapped). [ 5532.023860][ T30] audit: type=1400 audit(6044.656:758): avc: denied { relabelto } for pid=22288 comm="syz.1.23179" name=".log" dev="tmpfs" ino=8895 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:semanage_exec_t:s0" [ 5532.029702][ T30] audit: type=1400 audit(6044.656:759): avc: denied { associate } for pid=22288 comm="syz.1.23179" name=".log" dev="tmpfs" ino=8895 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:semanage_exec_t:s0" [ 5532.133215][ T30] audit: type=1400 audit(6044.766:760): avc: denied { unlink } for pid=14652 comm="syz-executor" name=".log" dev="tmpfs" ino=8895 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:semanage_exec_t:s0" [ 5532.427184][T22293] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22293 comm=syz.1.23181 [ 5536.149789][T22336] pim6reg1: entered promiscuous mode [ 5536.150321][T22336] pim6reg1: entered allmulticast mode [ 5536.620262][ T30] audit: type=1400 audit(6049.256:761): avc: denied { connect } for pid=22341 comm="syz.0.23204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5539.855121][ T30] audit: type=1400 audit(6052.496:762): avc: denied { create } for pid=22384 comm="syz.1.23224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 5539.873962][ T30] audit: type=1400 audit(6052.516:763): avc: denied { write } for pid=22384 comm="syz.1.23224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 5539.875314][T22385] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=22385 comm=syz.1.23224 [ 5540.936795][ T30] audit: type=1400 audit(6053.576:764): avc: denied { mount } for pid=22388 comm="syz.1.23226" name="/" dev="ramfs" ino=181793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 5541.543583][ T30] audit: type=1400 audit(6054.176:765): avc: denied { shutdown } for pid=22393 comm="syz.1.23228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 5541.563005][ T30] audit: type=1400 audit(6054.186:766): avc: denied { read } for pid=22393 comm="syz.1.23228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 5542.442598][ T30] audit: type=1400 audit(6055.026:767): avc: denied { mount } for pid=22378 comm="syz.0.23221" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 5548.419322][ T30] audit: type=1400 audit(6061.056:768): avc: denied { unmount } for pid=32165 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 5549.359854][ T30] audit: type=1400 audit(6061.996:769): avc: denied { ioctl } for pid=22436 comm="syz.0.23247" path="ipc:[4026532696]" dev="nsfs" ino=4026532696 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5553.100611][T22484] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22484 comm=syz.0.23271 [ 5560.513693][T22581] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1011 sclass=netlink_xfrm_socket pid=22581 comm=syz.1.23316 [ 5561.732681][ T30] audit: type=1400 audit(6074.366:770): avc: denied { write } for pid=22594 comm="syz.0.23323" name="ip_tables_matches" dev="proc" ino=4026532908 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 5562.169984][ T30] audit: type=1400 audit(6074.806:771): avc: denied { ioctl } for pid=22602 comm="syz.0.23327" path="socket:[182821]" dev="sockfs" ino=182821 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5562.393352][ T30] audit: type=1400 audit(6075.026:772): avc: denied { setopt } for pid=22608 comm="syz.1.23330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5562.924702][ T30] audit: type=1400 audit(6075.546:773): avc: denied { write } for pid=22608 comm="syz.1.23330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5563.970801][ T30] audit: type=1400 audit(6076.606:774): avc: denied { read } for pid=22608 comm="syz.1.23330" path="socket:[182831]" dev="sockfs" ino=182831 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5564.425620][ T30] audit: type=1400 audit(6077.056:775): avc: denied { ioctl } for pid=22626 comm="syz.0.23337" path="socket:[182861]" dev="sockfs" ino=182861 ioctlcmd=0x5401 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5565.380600][ T30] audit: type=1400 audit(6078.016:776): avc: denied { getopt } for pid=22635 comm="syz.0.23341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5566.178932][T22640] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2051 sclass=netlink_xfrm_socket pid=22640 comm=syz.1.23343 [ 5569.585938][ T30] audit: type=1400 audit(6082.226:777): avc: denied { write } for pid=22678 comm="syz.1.23361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5569.750768][ T30] audit: type=1400 audit(6082.386:778): avc: denied { create } for pid=22682 comm="syz.0.23363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 5569.758801][ T30] audit: type=1400 audit(6082.396:779): avc: denied { write } for pid=22682 comm="syz.0.23363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 5570.124175][T22687] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22687 comm=syz.0.23365 [ 5570.533952][T22692] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=22692 comm=syz.1.23367 [ 5571.458663][ T30] audit: type=1400 audit(6084.096:780): avc: denied { connect } for pid=22704 comm="syz.1.23373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5571.979156][ T30] audit: type=1400 audit(6084.616:781): avc: denied { read } for pid=22712 comm="syz.1.23376" path="socket:[182221]" dev="sockfs" ino=182221 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5573.162651][ T30] audit: type=1400 audit(6085.796:782): avc: denied { read } for pid=22732 comm="syz.0.23386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5574.459865][ T30] audit: type=1400 audit(6087.096:783): avc: denied { getopt } for pid=22754 comm="syz.0.23397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5575.153532][ T30] audit: type=1400 audit(6087.796:784): avc: denied { mount } for pid=22769 comm="syz.1.23404" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 5575.177163][ T30] audit: type=1400 audit(6087.816:785): avc: denied { read } for pid=22769 comm="syz.1.23404" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 5575.180991][ T30] audit: type=1400 audit(6087.816:786): avc: denied { open } for pid=22769 comm="syz.1.23404" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 5575.607052][ T30] audit: type=1400 audit(6088.246:787): avc: denied { setopt } for pid=22777 comm="syz.0.23408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5575.985791][ T30] audit: type=1400 audit(6088.626:788): avc: denied { getopt } for pid=22782 comm="syz.0.23410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 5578.799781][ T30] audit: type=1400 audit(6091.436:789): avc: denied { ioctl } for pid=22804 comm="syz.1.23420" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x7007 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 5579.855048][T22817] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22817 comm=syz.1.23425 [ 5580.688028][T22825] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=22825 comm=syz.1.23429 [ 5581.565879][ T30] audit: type=1400 audit(6094.196:790): avc: denied { connect } for pid=22834 comm="syz.0.23433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5581.568350][ T30] audit: type=1400 audit(6094.206:791): avc: denied { name_connect } for pid=22834 comm="syz.0.23433" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 5582.089575][ T30] audit: type=1400 audit(6094.726:792): avc: denied { accept } for pid=22834 comm="syz.0.23433" lport=52109 faddr=::ffff:100.1.1.2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5582.098908][ T30] audit: type=1400 audit(6094.736:793): avc: denied { setopt } for pid=22834 comm="syz.0.23433" lport=52109 faddr=::ffff:100.1.1.2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 5582.777264][ T30] audit: type=1400 audit(6095.416:794): avc: denied { read } for pid=22838 comm="syz.1.23434" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 5582.778992][ T30] audit: type=1400 audit(6095.416:795): avc: denied { open } for pid=22838 comm="syz.1.23434" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 5582.794842][ T30] audit: type=1400 audit(6095.426:796): avc: denied { ioctl } for pid=22838 comm="syz.1.23434" path="/dev/usbmon0" dev="devtmpfs" ino=697 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 5583.267228][ T30] audit: type=1400 audit(6095.906:797): avc: denied { module_load } for pid=22842 comm="syz.1.23436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 5588.517778][ T30] audit: type=1400 audit(6101.156:798): avc: denied { bind } for pid=22922 comm="syz.1.23474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5588.520953][ T30] audit: type=1400 audit(6101.156:799): avc: denied { node_bind } for pid=22922 comm="syz.1.23474" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 5589.455855][T22937] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22937 comm=syz.1.23481 [ 5589.526930][ T30] audit: type=1400 audit(6102.166:800): avc: denied { read } for pid=22938 comm="syz.0.23482" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 5589.530268][ T30] audit: type=1400 audit(6102.166:801): avc: denied { open } for pid=22938 comm="syz.0.23482" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 5589.539170][ T30] audit: type=1400 audit(6102.176:802): avc: denied { ioctl } for pid=22938 comm="syz.0.23482" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 5596.842851][ T30] audit: type=1400 audit(6109.476:803): avc: denied { shutdown } for pid=23039 comm="syz.0.23530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5598.150500][ T30] audit: type=1400 audit(6110.786:804): avc: denied { getopt } for pid=23054 comm="syz.1.23536" lport=44570 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 5600.074779][T23072] netlink: 'syz.0.23544': attribute type 11 has an invalid length. [ 5600.075325][T23072] netlink: 60 bytes leftover after parsing attributes in process `syz.0.23544'. [ 5600.219077][ T30] audit: type=1400 audit(6112.836:805): avc: denied { name_bind } for pid=23071 comm="syz.0.23544" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 5600.224042][ T30] audit: type=1400 audit(6112.836:806): avc: denied { write } for pid=23071 comm="syz.0.23544" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5600.224832][ T30] audit: type=1400 audit(6112.836:807): avc: denied { name_connect } for pid=23071 comm="syz.0.23544" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 5602.568964][T23080] SELinux: Context system_u:object_r:policy_config_t:s0 is not valid (left unmapped). [ 5602.591329][ T30] audit: type=1400 audit(6115.216:808): avc: denied { relabelto } for pid=23079 comm="syz.0.23547" name="5508" dev="tmpfs" ino=28195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:policy_config_t:s0" [ 5602.605881][ T30] audit: type=1400 audit(6115.216:809): avc: denied { associate } for pid=23079 comm="syz.0.23547" name="5508" dev="tmpfs" ino=28195 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:policy_config_t:s0" [ 5602.718028][ T30] audit: type=1400 audit(6115.346:810): avc: denied { write } for pid=32165 comm="syz-executor" name="5508" dev="tmpfs" ino=28195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:policy_config_t:s0" [ 5602.728587][ T30] audit: type=1400 audit(6115.356:811): avc: denied { remove_name } for pid=32165 comm="syz-executor" name="cgroup" dev="tmpfs" ino=28196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:policy_config_t:s0" [ 5602.768200][ T30] audit: type=1400 audit(6115.406:812): avc: denied { rmdir } for pid=32165 comm="syz-executor" name="5508" dev="tmpfs" ino=28195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:policy_config_t:s0" [ 5602.886086][T23083] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=25 sclass=netlink_tcpdiag_socket pid=23083 comm=syz.0.23548 [ 5603.714569][ T30] audit: type=1400 audit(6116.346:813): avc: denied { read } for pid=23098 comm="syz.0.23556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5604.153152][ T30] audit: type=1400 audit(6116.786:814): avc: denied { write } for pid=23106 comm="syz.0.23560" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 5605.646719][ T30] audit: type=1400 audit(6118.286:815): avc: denied { read } for pid=23135 comm="syz.0.23574" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5605.648238][ T30] audit: type=1400 audit(6118.286:816): avc: denied { open } for pid=23135 comm="syz.0.23574" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5605.837109][ T30] audit: type=1400 audit(6118.476:817): avc: denied { ioctl } for pid=23139 comm="syz.0.23576" path="socket:[184921]" dev="sockfs" ino=184921 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 5606.579658][T23152] sctp: [Deprecated]: syz.0.23582 (pid 23152) Use of struct sctp_assoc_value in delayed_ack socket option. [ 5606.579658][T23152] Use struct sctp_sack_info instead [ 5610.352716][T23191] serio: Serial port pts0 [ 5617.405561][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 5617.405722][ T30] audit: type=1400 audit(6130.046:819): avc: denied { setopt } for pid=23205 comm="syz.1.23605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 5618.177725][ T30] audit: type=1400 audit(6130.816:820): avc: denied { read } for pid=23213 comm="syz.1.23609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5623.543804][ T30] audit: type=1400 audit(6136.176:821): avc: denied { bind } for pid=23271 comm="syz.1.23637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5624.224686][ T30] audit: type=1400 audit(6136.866:822): avc: denied { bind } for pid=23280 comm="syz.1.23640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5627.358138][ T30] audit: type=1400 audit(6139.996:823): avc: denied { map } for pid=23319 comm="syz.1.23659" path="/dev/nbd1" dev="devtmpfs" ino=656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5630.391035][ T30] audit: type=1400 audit(6143.026:824): avc: denied { ioctl } for pid=23366 comm="syz.0.23681" path="socket:[184297]" dev="sockfs" ino=184297 ioctlcmd=0x54de scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5633.480329][T23417] pimreg: left allmulticast mode [ 5634.865822][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 5635.145213][ T30] audit: type=1400 audit(6147.786:825): avc: denied { bind } for pid=23445 comm="syz.1.23719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5635.148084][ T30] audit: type=1400 audit(6147.786:826): avc: denied { listen } for pid=23445 comm="syz.1.23719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5635.162540][ T30] audit: type=1400 audit(6147.786:827): avc: denied { connect } for pid=23445 comm="syz.1.23719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5635.168768][ T30] audit: type=1400 audit(6147.796:828): avc: denied { accept } for pid=23445 comm="syz.1.23719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5635.515473][ T30] audit: type=1400 audit(6148.156:829): avc: denied { read } for pid=23452 comm="syz.0.23723" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 5635.516404][ T30] audit: type=1400 audit(6148.156:830): avc: denied { open } for pid=23452 comm="syz.0.23723" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 5635.592339][ T30] audit: type=1400 audit(6148.226:831): avc: denied { ioctl } for pid=23452 comm="syz.0.23723" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3312 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 5636.443554][ T30] audit: type=1400 audit(6149.076:832): avc: denied { ioctl } for pid=23471 comm="syz.0.23733" path="socket:[186508]" dev="sockfs" ino=186508 ioctlcmd=0x890d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5639.849544][T23495] serio: Serial port pts0 [ 5648.119842][ T30] audit: type=1400 audit(6160.756:833): avc: denied { mount } for pid=23577 comm="syz.1.23779" name="/" dev="configfs" ino=127 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 5651.189088][T23632] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=23632 comm=syz.0.23803 [ 5651.228484][ T30] audit: type=1400 audit(6163.866:834): avc: denied { write } for pid=23631 comm="syz.1.23804" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 5655.237697][T23672] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23672 comm=syz.0.23823 [ 5656.348068][T23682] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=23682 comm=syz.0.23828 [ 5664.708855][ T30] audit: type=1400 audit(6177.346:835): avc: denied { ioctl } for pid=23725 comm="syz.0.23848" path="/dev/input/mice" dev="devtmpfs" ino=706 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 5667.567724][ T30] audit: type=1400 audit(6180.206:836): avc: denied { ioctl } for pid=23751 comm="syz.0.23861" path="socket:[186080]" dev="sockfs" ino=186080 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 5671.874559][T23769] netlink: 4 bytes leftover after parsing attributes in process `syz.0.23869'. [ 5671.903426][T23769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23769 comm=syz.0.23869 [ 5675.083827][ T30] audit: type=1400 audit(6187.706:837): avc: denied { connect } for pid=23796 comm="syz.0.23882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5675.605366][ T30] audit: type=1400 audit(6188.246:838): avc: denied { getopt } for pid=23796 comm="syz.0.23882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5676.324592][ C0] vxcan0: j1939_tp_rxtimer: 0x00000000bb15aadd: rx timeout, send abort [ 5676.825742][ C0] vxcan0: j1939_tp_rxtimer: 0x00000000bb15aadd: abort rx timeout. Force session deactivation [ 5678.648186][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 5681.363686][ T30] audit: type=1400 audit(6193.986:839): avc: denied { execute } for pid=23816 comm="syz-executor" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5681.378598][ T30] audit: type=1400 audit(6194.006:840): avc: denied { execute_no_trans } for pid=23816 comm="syz-executor" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5681.782892][ T30] audit: type=1400 audit(6194.416:841): avc: denied { mounton } for pid=23819 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 5681.796601][ T30] audit: type=1400 audit(6194.436:842): avc: denied { mounton } for pid=23819 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 5683.828731][ T7227] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5684.024089][ T7227] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5684.173979][ T7227] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5684.339156][ T7227] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5685.353710][ T30] audit: type=1400 audit(6197.966:843): avc: denied { read } for pid=3123 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 5689.233527][ T7227] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5689.325947][ T7227] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5689.420322][ T7227] bond0 (unregistering): Released all slaves [ 5689.752379][ T30] audit: type=1400 audit(6202.386:844): avc: denied { search } for pid=3123 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5689.784313][ T30] audit: type=1400 audit(6202.406:845): avc: denied { read } for pid=3123 comm="dhcpcd" name="n59" dev="tmpfs" ino=15066 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5689.785140][ T30] audit: type=1400 audit(6202.406:846): avc: denied { open } for pid=3123 comm="dhcpcd" path="/run/udev/data/n59" dev="tmpfs" ino=15066 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5689.800415][ T30] audit: type=1400 audit(6202.416:847): avc: denied { getattr } for pid=3123 comm="dhcpcd" path="/run/udev/data/n59" dev="tmpfs" ino=15066 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5689.953845][ T7227] hsr_slave_0: left promiscuous mode [ 5690.035302][ T7227] hsr_slave_1: left promiscuous mode [ 5690.258464][ T7227] veth1_macvtap: left promiscuous mode [ 5690.259237][ T7227] veth0_macvtap: left promiscuous mode [ 5690.260146][ T7227] veth1_vlan: left promiscuous mode [ 5690.260630][ T7227] veth0_vlan: left promiscuous mode [ 5692.459254][T23876] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23876 comm=syz.0.23910 [ 5692.633238][ T30] audit: type=1400 audit(6205.276:848): avc: denied { ioctl } for pid=23877 comm="syz.0.23911" path="socket:[187067]" dev="sockfs" ino=187067 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 5697.509530][T23905] tap0: tun_chr_ioctl cmd 1074025675 [ 5697.510339][T23905] tap0: persist enabled [ 5697.511137][T23906] tap0: tun_chr_ioctl cmd 1074025675 [ 5697.517733][T23906] tap0: persist disabled [ 5698.703814][ T30] audit: type=1400 audit(6211.346:849): avc: denied { read } for pid=23918 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5698.712486][ T30] audit: type=1400 audit(6211.346:850): avc: denied { open } for pid=23918 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5698.713341][ T30] audit: type=1400 audit(6211.346:851): avc: denied { getattr } for pid=23918 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5698.785694][ T30] audit: type=1400 audit(6211.426:852): avc: denied { write } for pid=23913 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5698.787455][ T30] audit: type=1400 audit(6211.426:853): avc: denied { add_name } for pid=23913 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5698.789316][ T30] audit: type=1400 audit(6211.426:854): avc: denied { create } for pid=23913 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5698.803718][ T30] audit: type=1400 audit(6211.436:855): avc: denied { write } for pid=23913 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=15070 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5698.805979][ T30] audit: type=1400 audit(6211.446:856): avc: denied { append } for pid=23913 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=15070 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5699.337978][ T30] audit: type=1400 audit(6211.976:857): avc: denied { remove_name } for pid=23923 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=15070 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5699.338978][ T30] audit: type=1400 audit(6211.976:858): avc: denied { unlink } for pid=23923 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=15070 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5699.584210][T23819] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 5699.613631][T23819] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 5703.275917][T23819] hsr_slave_0: entered promiscuous mode [ 5703.334244][T23819] hsr_slave_1: entered promiscuous mode [ 5703.393916][T23819] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 5703.394511][T23819] Cannot create hsr debugfs directory [ 5706.302633][ T30] audit: type=1400 audit(6218.926:859): avc: denied { write } for pid=23984 comm="syz.0.23940" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5706.875837][T23819] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 5706.904784][T23819] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 5706.941367][T23819] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 5706.949314][ T30] audit: type=1400 audit(6219.586:860): avc: denied { getopt } for pid=23988 comm="syz.0.23942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5707.022972][T23819] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 5709.006695][T23819] 8021q: adding VLAN 0 to HW filter on device bond0 [ 5711.217117][ T30] audit: type=1400 audit(6223.856:861): avc: denied { bind } for pid=24026 comm="syz.0.23947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5718.073935][T23819] veth0_vlan: entered promiscuous mode [ 5718.110125][T23819] veth1_vlan: entered promiscuous mode [ 5718.317478][T23819] veth0_macvtap: entered promiscuous mode [ 5718.351132][T23819] veth1_macvtap: entered promiscuous mode [ 5718.569990][T23819] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 5718.570698][T23819] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 5718.571242][T23819] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 5718.593687][T23819] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 5718.871036][ T30] audit: type=1400 audit(6231.506:862): avc: denied { mounton } for pid=23819 comm="syz-executor" path="/syzkaller.AEgUzK/syz-tmp" dev="vda" ino=1758 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 5718.962702][ T30] audit: type=1400 audit(6231.596:863): avc: denied { unmount } for pid=23819 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 5718.971545][ T30] audit: type=1400 audit(6231.606:864): avc: denied { mounton } for pid=23819 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 5719.006821][ T30] audit: type=1400 audit(6231.626:865): avc: denied { mount } for pid=23819 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 5724.385728][ T30] audit: type=1400 audit(6237.026:866): avc: denied { ioctl } for pid=24158 comm="syz.1.23992" path="/dev/nullb0" dev="devtmpfs" ino=673 ioctlcmd=0x127e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5727.020086][ T30] audit: type=1400 audit(6239.656:867): avc: denied { ioctl } for pid=24184 comm="syz.0.24005" path="socket:[188041]" dev="sockfs" ino=188041 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 5730.648579][ T30] audit: type=1400 audit(6243.286:868): avc: denied { read } for pid=24214 comm="syz.0.24020" path="socket:[188658]" dev="sockfs" ino=188658 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5731.226347][T24236] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24236 comm=syz.1.24029 [ 5735.068784][ T30] audit: type=1400 audit(6247.706:869): avc: denied { mounton } for pid=24301 comm="syz.1.24060" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 5736.693266][ T30] audit: type=1400 audit(6249.336:870): avc: denied { name_bind } for pid=24322 comm="syz.0.24070" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 5737.679749][ T30] audit: type=1400 audit(6250.316:871): avc: denied { sqpoll } for pid=24333 comm="syz.0.24075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5742.394121][T12699] usb 1-1: new high-speed USB device number 17 using dummy_hcd [ 5742.593278][T12699] usb 1-1: Using ep0 maxpacket: 16 [ 5742.770495][T12699] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 5742.771182][T12699] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 0 [ 5742.773807][T12699] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x8A has invalid wMaxPacketSize 0 [ 5742.774270][T12699] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x8A has invalid maxpacket 0 [ 5742.788837][T12699] usb 1-1: New USB device found, idVendor=04e6, idProduct=0007, bcdDevice= 1.75 [ 5742.789361][T12699] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=5 [ 5742.789782][T12699] usb 1-1: SerialNumber: syz [ 5742.846966][T12699] usb-storage 1-1:1.0: USB Mass Storage device detected [ 5742.877383][T12699] usb-storage 1-1:1.0: Quirks match for vid 04e6 pid 0007: 1 [ 5742.884492][T12699] scsi host0: usb-storage 1-1:1.0 [ 5743.005962][T24402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24402 comm=syz.1.24105 [ 5743.071255][T12699] usb 1-1: USB disconnect, device number 17 [ 5748.264886][ T30] audit: type=1400 audit(6260.896:872): avc: denied { ioctl } for pid=24461 comm="syz.0.24133" path="socket:[189073]" dev="sockfs" ino=189073 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5753.265252][ T30] audit: type=1400 audit(6265.906:873): avc: denied { write } for pid=24498 comm="syz.0.24149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 5753.276459][ T30] audit: type=1400 audit(6265.906:874): avc: denied { read } for pid=24498 comm="syz.0.24149" path="socket:[189673]" dev="sockfs" ino=189673 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 5756.944598][ T30] audit: type=1400 audit(6269.586:875): avc: denied { map } for pid=24548 comm="syz.0.24172" path="socket:[189764]" dev="sockfs" ino=189764 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 5757.872278][ T30] audit: type=1400 audit(6270.506:876): avc: denied { setopt } for pid=24559 comm="syz.0.24177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5765.060505][ T30] audit: type=1400 audit(6277.696:877): avc: denied { create } for pid=24648 comm="syz.1.24220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 5765.608400][T24655] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=24655 comm=syz.1.24220 [ 5767.590654][T24685] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=24685 comm=syz.1.24235 [ 5771.471114][T24751] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24751 comm=syz.1.24268 [ 5775.360856][T24814] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24814 comm=syz.0.24297 [ 5778.710295][ T30] audit: type=1400 audit(6291.346:878): avc: denied { setopt } for pid=24861 comm="syz.1.24320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5780.191314][T24887] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24887 comm=syz.1.24332 [ 5780.477598][T24890] serio: Serial port pts0 [ 5783.317359][ T30] audit: type=1400 audit(6295.956:879): avc: denied { name_bind } for pid=24912 comm="syz.0.24341" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 5787.081089][ T30] audit: type=1400 audit(6299.716:880): avc: denied { read } for pid=24932 comm="syz.1.24348" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 5787.086983][ T30] audit: type=1400 audit(6299.726:881): avc: denied { open } for pid=24932 comm="syz.1.24348" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 5787.091191][ T30] audit: type=1400 audit(6299.726:882): avc: denied { ioctl } for pid=24932 comm="syz.1.24348" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 5788.854582][T24963] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24963 comm=syz.0.24363 [ 5794.391110][ T30] audit: type=1400 audit(6307.026:883): avc: denied { create } for pid=25040 comm="syz.1.24401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 5794.402702][ T30] audit: type=1400 audit(6307.036:884): avc: denied { write } for pid=25040 comm="syz.1.24401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 5794.669664][ T30] audit: type=1400 audit(6307.306:885): avc: denied { append } for pid=25044 comm="syz.1.24404" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 5795.353929][ T30] audit: type=1400 audit(6307.996:886): avc: denied { bind } for pid=25055 comm="syz.1.24409" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 5795.554281][T25059] "syz.1.24410" (25059) uses obsolete ecb(arc4) skcipher [ 5799.214226][ T30] audit: type=1400 audit(6311.846:887): avc: denied { append } for pid=25092 comm="syz.0.24425" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 5800.676125][T25109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=13 sclass=netlink_route_socket pid=25109 comm=syz.0.24433 [ 5802.643695][ T30] audit: type=1400 audit(6315.276:888): avc: denied { bind } for pid=25130 comm="syz.1.24444" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5802.644838][ T30] audit: type=1400 audit(6315.286:889): avc: denied { node_bind } for pid=25130 comm="syz.1.24444" saddr=fe80::bb scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 5807.617403][T25181] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25181 comm=syz.0.24467 [ 5811.384324][ T30] audit: type=1400 audit(6324.016:890): avc: denied { read } for pid=25237 comm="syz.1.24495" path="socket:[191979]" dev="sockfs" ino=191979 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5826.517318][ T30] audit: type=1400 audit(6339.156:891): avc: denied { setattr } for pid=25418 comm="syz.0.24580" name="RAW" dev="sockfs" ino=192258 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5831.147005][ T30] audit: type=1400 audit(6343.786:892): avc: denied { read write } for pid=25475 comm="syz.0.24605" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 5831.152934][ T30] audit: type=1400 audit(6343.786:893): avc: denied { open } for pid=25475 comm="syz.0.24605" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 5832.933934][ T30] audit: type=1400 audit(6345.566:894): avc: denied { write } for pid=25495 comm="syz.1.24614" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 5833.531048][T25507] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25507 comm=syz.1.24619 [ 5834.344293][ T30] audit: type=1400 audit(6346.976:895): avc: denied { mounton } for pid=25520 comm="syz.1.24626" path="/proc/678/task" dev="proc" ino=192960 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 5834.947481][T25529] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25529 comm=syz.1.24630 [ 5836.440185][T25552] "syz.1.24641" (25552) uses obsolete ecb(arc4) skcipher [ 5836.845640][ T30] audit: type=1400 audit(6349.486:896): avc: denied { lock } for pid=25555 comm="syz.1.24643" path="socket:[193029]" dev="sockfs" ino=193029 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5840.254211][ T30] audit: type=1400 audit(6352.886:897): avc: denied { lock } for pid=25604 comm="syz.1.24667" path="socket:[193608]" dev="sockfs" ino=193608 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 5840.335059][T25607] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25607 comm=syz.0.24668 [ 5844.793453][T25683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=25683 comm=syz.1.24704 [ 5847.757973][T25712] binder: 25711:25712 ioctl 4008941a 20000040 returned -22 [ 5847.759234][ T30] audit: type=1400 audit(6360.386:898): avc: denied { write } for pid=25711 comm="syz.0.24719" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5848.132277][T25716] serio: Serial port pts0 [ 5850.163248][T25735] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5850.166467][T25735] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5856.855704][ T30] audit: type=1400 audit(6369.486:899): avc: denied { write } for pid=25792 comm="syz.0.24752" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 5857.329850][T25795] udevd[25795]: setting mode of /dev/loop0 to 060660 failed: Read-only file system [ 5857.358988][T25795] udevd[25795]: setting owner of /dev/loop0 to uid=0, gid=6 failed: Read-only file system [ 5857.577437][T25794] udevd[25794]: setting mode of /dev/loop0 to 060660 failed: Read-only file system [ 5857.578351][T25794] udevd[25794]: setting owner of /dev/loop0 to uid=0, gid=6 failed: Read-only file system [ 5857.836401][T32165] block device autoloading is deprecated and will be removed. [ 5857.928451][T25794] udevd[25794]: setting mode of /dev/loop0 to 060660 failed: Read-only file system [ 5857.929396][T25794] udevd[25794]: setting owner of /dev/loop0 to uid=0, gid=6 failed: Read-only file system [ 5858.905497][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 5860.221064][ T30] audit: type=1400 audit(6372.856:900): avc: denied { lock } for pid=25814 comm="syz.1.24761" path="time:[4026531834]" dev="nsfs" ino=4026531834 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5860.642914][ T30] audit: type=1400 audit(6373.276:901): avc: denied { remount } for pid=25818 comm="syz.1.24763" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 5862.491335][T25832] xt_SECMARK: invalid security context 'system_u:object_r:devicekit_exec_t:s0' [ 5862.844065][ T30] audit: type=1400 audit(6375.476:902): avc: denied { map } for pid=25834 comm="syz.1.24772" path="/dev/hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 5863.220190][ T30] audit: type=1400 audit(6375.846:903): avc: denied { unmount } for pid=23819 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 5864.486748][ T30] audit: type=1400 audit(6377.126:904): avc: denied { lock } for pid=25850 comm="syz.1.24779" path="socket:[194046]" dev="sockfs" ino=194046 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5869.086661][T25906] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25906 comm=syz.0.24806 [ 5876.781173][T25985] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=25985 comm=syz.0.24845 [ 5881.795954][ T30] audit: type=1400 audit(6394.436:905): avc: denied { setopt } for pid=26025 comm="syz.1.24864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 5883.132583][ T30] audit: type=1400 audit(6395.766:906): avc: denied { map } for pid=26041 comm="syz.1.24872" path="/dev/vcs" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 5884.082862][ T30] audit: type=1400 audit(6396.716:907): avc: denied { write } for pid=26049 comm="syz.1.24876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 5887.563180][ T30] audit: type=1400 audit(6400.206:908): avc: denied { write } for pid=26082 comm="syz.1.24892" path="socket:[195066]" dev="sockfs" ino=195066 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 5894.499443][ T30] audit: type=1400 audit(6407.136:909): avc: denied { setopt } for pid=26144 comm="syz.0.24921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5894.553823][ T30] audit: type=1400 audit(6407.186:910): avc: denied { getopt } for pid=26145 comm="syz.1.24922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5894.934943][T26146] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=109 sclass=netlink_xfrm_socket pid=26146 comm=syz.0.24921 [ 5902.026781][ T30] audit: type=1400 audit(6414.666:911): avc: denied { write } for pid=26233 comm="syz.0.24957" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 5902.570591][ T30] audit: type=1400 audit(6415.206:912): avc: denied { ioctl } for pid=26239 comm="syz.0.24960" path="socket:[195631]" dev="sockfs" ino=195631 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 5904.033667][T26258] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1543 sclass=netlink_tcpdiag_socket pid=26258 comm=syz.0.24969 [ 5908.271139][T26303] netlink: 64 bytes leftover after parsing attributes in process `syz.0.24989'. [ 5910.531098][T26333] sctp: [Deprecated]: syz.0.25003 (pid 26333) Use of int in maxseg socket option. [ 5910.531098][T26333] Use struct sctp_assoc_value instead [ 5912.194198][ T30] audit: type=1400 audit(6424.836:913): avc: denied { create } for pid=26346 comm="syz.1.25010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 5912.235112][ T30] audit: type=1400 audit(6424.876:914): avc: denied { write } for pid=26346 comm="syz.1.25010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 5914.307164][ T30] audit: type=1400 audit(6426.946:915): avc: denied { map } for pid=26377 comm="syz.1.25025" path="/dev/binderfs/binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5914.343994][T26379] binder_alloc: binder_alloc_mmap_handler: 26377 20ffc000-20ffd000 already mapped failed -16 [ 5917.568382][ T30] audit: type=1400 audit(6430.196:916): avc: denied { getopt } for pid=26422 comm="syz.1.25047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5919.158414][ T30] audit: type=1400 audit(6431.786:917): avc: denied { setopt } for pid=26445 comm="syz.0.25059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5919.159508][ T30] audit: type=1400 audit(6431.796:918): avc: denied { bind } for pid=26445 comm="syz.0.25059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5919.678042][T26457] dvmrp0: entered allmulticast mode [ 5919.680586][T26457] dvmrp0: left allmulticast mode [ 5921.029625][ T30] audit: type=1400 audit(6433.666:919): avc: denied { write } for pid=26477 comm="syz.0.25073" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 5925.950786][ T30] audit: type=1400 audit(6438.586:920): avc: denied { getopt } for pid=26518 comm="syz.0.25091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5926.206593][ T30] audit: type=1400 audit(6438.836:921): avc: denied { setopt } for pid=26521 comm="syz.1.25092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5928.035967][ T30] audit: type=1400 audit(6440.666:922): avc: denied { accept } for pid=26557 comm="syz.0.25110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 5929.101405][T26580] serio: Serial port pts0 [ 5941.876888][T26654] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5124 sclass=netlink_route_socket pid=26654 comm=syz.0.25155 [ 5943.663850][ T30] audit: type=1400 audit(6456.296:923): avc: denied { nlmsg_read } for pid=26670 comm="syz.0.25163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 5943.668248][ T30] audit: type=1400 audit(6456.306:924): avc: denied { read } for pid=26670 comm="syz.0.25163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 5945.700226][T26691] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26691 comm=syz.1.25171 [ 5950.820540][ T30] audit: type=1400 audit(6463.456:925): avc: denied { setattr } for pid=26739 comm="syz.0.25192" name="KCM" dev="sockfs" ino=196390 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 5951.342213][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 5952.086896][T26758] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26758 comm=syz.0.25201 [ 5956.935744][T26776] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26776 comm=syz.1.25208 [ 5957.825413][T26780] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26780 comm=syz.1.25208 [ 5961.829569][T26822] serio: Serial port pts0 [ 5978.934086][ T30] audit: type=1400 audit(6491.566:926): avc: denied { read } for pid=27008 comm="syz.1.25313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5980.809522][ T30] audit: type=1400 audit(6493.446:927): avc: denied { setattr } for pid=27031 comm="syz.0.25324" name="NETLINK" dev="sockfs" ino=197912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5985.283491][T27062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27062 comm=syz.0.25338 [ 5986.915214][T27087] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1545 sclass=netlink_route_socket pid=27087 comm=syz.0.25351 [ 5997.366192][ T30] audit: type=1400 audit(6510.006:928): avc: denied { create } for pid=27249 comm="syz.1.25432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 5997.775504][ T30] audit: type=1400 audit(6510.396:929): avc: denied { getattr } for pid=27254 comm="syz.0.25434" path="pid:[4026532684]" dev="nsfs" ino=4026532684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6000.732077][ T30] audit: type=1400 audit(6513.356:930): avc: denied { shutdown } for pid=27276 comm="syz.0.25444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6019.835551][T27397] sctp: [Deprecated]: syz.1.25496 (pid 27397) Use of int in maxseg socket option. [ 6019.835551][T27397] Use struct sctp_assoc_value instead [ 6022.520413][T27436] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27436 comm=syz.1.25516 [ 6026.747507][T27491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27491 comm=syz.0.25542 [ 6028.090423][T27511] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=27511 comm=syz.0.25551 [ 6035.877549][T27572] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=27572 comm=syz.0.25579 [ 6040.287813][ T30] audit: type=1400 audit(6552.926:931): avc: denied { read } for pid=27627 comm="syz.0.25602" path="socket:[200842]" dev="sockfs" ino=200842 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6040.553907][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 6049.870216][ T30] audit: type=1400 audit(6562.506:932): avc: denied { write } for pid=27721 comm="syz.0.25644" path="socket:[201003]" dev="sockfs" ino=201003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 6063.358657][ T30] audit: type=1400 audit(6575.996:933): avc: denied { setopt } for pid=27943 comm="syz.1.25750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 6068.059787][T28015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1794 sclass=netlink_route_socket pid=28015 comm=syz.1.25784 [ 6071.935254][T28063] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28063 comm=syz.0.25807 [ 6072.550656][T28071] input: syz0 as /devices/virtual/input/input52 [ 6082.845592][ T30] audit: type=1400 audit(6595.486:934): avc: denied { append } for pid=28146 comm="syz.1.25846" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 6085.289272][T28160] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=28160 comm=syz.1.25852 [ 6102.437704][T28282] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28282 comm=syz.0.25910 [ 6102.844016][ T30] audit: type=1400 audit(6615.486:935): avc: denied { write } for pid=28287 comm="syz.1.25913" path="socket:[202189]" dev="sockfs" ino=202189 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6103.556070][T28301] serio: Serial port pts0 [ 6105.258814][ T30] audit: type=1400 audit(6617.896:936): avc: denied { create } for pid=28315 comm="syz.0.25926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 6114.703441][ T30] audit: type=1400 audit(6627.336:937): avc: denied { write } for pid=28409 comm="syz.0.25965" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 6116.642443][T28425] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=5134 sclass=netlink_xfrm_socket pid=28425 comm=syz.0.25972 [ 6116.904677][T28427] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28427 comm=syz.0.25974 [ 6123.289163][T28500] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28500 comm=syz.0.26006 [ 6133.891303][T28575] serio: Serial port pts0 [ 6141.000487][T28606] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=28606 comm=syz.0.26055 [ 6148.602671][ T30] audit: type=1400 audit(6661.236:938): avc: denied { nlmsg_read } for pid=28670 comm="syz.1.26084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 6149.230180][T28683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28683 comm=syz.0.26091 [ 6156.378509][T28763] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28763 comm=syz.1.26129 [ 6158.079153][T28785] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=771 sclass=netlink_xfrm_socket pid=28785 comm=syz.1.26139 [ 6161.756614][T28818] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=28818 comm=syz.1.26155 [ 6166.619495][ T30] audit: type=1400 audit(6679.256:939): avc: denied { append } for pid=28872 comm="syz.1.26181" name="system" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6169.513762][T28908] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28908 comm=syz.1.26197 [ 6170.793932][T28921] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28921 comm=syz.0.26203 [ 6173.039638][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.040255][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.040685][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.041133][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.051303][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.053078][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.053459][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.053833][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.054268][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.054702][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.055099][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.055607][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.056145][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.056529][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.056908][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.057229][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.057673][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.058066][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.058452][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.058901][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.072148][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.072959][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.073391][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.073790][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.074256][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.074795][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.075244][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.075667][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.076104][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.076547][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.076933][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.077370][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.077802][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.078216][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.078671][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.079210][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.079780][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.080172][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.080587][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.080983][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.100590][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.101167][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.104024][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.104596][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.105081][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.105670][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.106063][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.106495][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.106898][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.107357][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.107759][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.108155][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.108547][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.108941][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.109334][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.109742][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.110118][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.110507][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.110908][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.111370][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.129841][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.130267][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.130642][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.131010][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.134833][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.135589][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.135996][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.136378][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.136758][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.137087][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.137476][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.137865][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.138238][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.138619][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.139028][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.139505][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.139894][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.140465][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.140955][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.153044][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.153595][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.153970][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.154445][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 6173.177461][T27702] hid-generic 0000:0000:0000.0006: hidraw0: <UNKNOWN> HID v0.00 Device [syz0] on syz0 [ 6176.322603][ T30] audit: type=1400 audit(6688.956:940): avc: denied { map } for pid=29008 comm="syz.0.26244" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 6183.119347][T29126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29126 comm=syz.0.26301 [ 6183.345883][ T30] audit: type=1400 audit(6695.986:941): avc: denied { nlmsg_write } for pid=29129 comm="syz.0.26303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6185.134513][T29157] serio: Serial port pts0 [ 6198.103196][ T30] audit: type=1400 audit(6710.736:942): avc: denied { mounton } for pid=29272 comm="syz.0.26367" path="/6991/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=fifo_file permissive=1 [ 6201.506847][ T30] audit: type=1400 audit(6714.116:943): avc: denied { create } for pid=29302 comm="syz.1.26380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 6209.598051][T29378] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=29378 comm=syz.0.26412 [ 6209.675690][T29379] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2052 sclass=netlink_route_socket pid=29379 comm=syz.1.26411 [ 6210.144944][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 6211.526162][T29402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=29402 comm=syz.0.26423 [ 6214.751024][T29444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29444 comm=syz.1.26442 [ 6217.059199][T29479] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=29479 comm=syz.0.26458 [ 6217.724750][ T30] audit: type=1400 audit(6730.366:944): avc: denied { relabelfrom } for pid=29487 comm="syz.0.26463" name="NETLINK" dev="sockfs" ino=206922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6220.393216][T29522] serio: Serial port pts0 [ 6241.779002][T29662] serio: Serial port pts0 [ 6241.819207][T29664] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=29664 comm=syz.0.26543 [ 6245.307545][T29707] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=29707 comm=syz.1.26561 [ 6248.489244][T29753] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29753 comm=syz.0.26583 [ 6253.029676][ T30] audit: type=1400 audit(6765.666:945): avc: denied { setattr } for pid=29789 comm="syz.1.26601" path="socket:[207392]" dev="sockfs" ino=207392 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6254.111141][T29799] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29799 comm=syz.1.26605 [ 6265.313534][ T30] audit: type=1400 audit(6777.956:946): avc: denied { bind } for pid=29884 comm="syz.1.26643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 6267.287739][T29905] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=29905 comm=syz.0.26652 [ 6278.298179][T29994] ptrace attach of ""[29995] was attempted by "/syz-executor exec"[29994] [ 6280.457763][T30036] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=30036 comm=syz.0.26714 [ 6280.978604][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 6282.925237][T30064] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=30064 comm=syz.1.26728 [ 6289.069820][T30135] sctp: [Deprecated]: syz.0.26759 (pid 30135) Use of int in max_burst socket option. [ 6289.069820][T30135] Use struct sctp_assoc_value instead [ 6293.585034][T30176] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=30176 comm=syz.0.26780 [ 6294.489308][T30185] serio: Serial port pts0 [ 6298.987226][ T30] audit: type=1400 audit(6811.626:947): avc: denied { accept } for pid=30216 comm="syz.1.26798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6300.239474][T30232] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=30232 comm=syz.1.26805 [ 6305.349941][T30276] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=30276 comm=syz.1.26826 [ 6310.742722][T30307] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30307 comm=syz.0.26840 [ 6312.795977][ T30] audit: type=1400 audit(6825.436:948): avc: denied { create } for pid=30342 comm="syz.0.26858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 6314.594445][T30375] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=30375 comm=syz.1.26874 [ 6315.693011][T30390] usb usb1: usbfs: process 30390 (syz.0.26880) did not claim interface 0 before use [ 6316.369109][ T30] audit: type=1400 audit(6829.006:949): avc: denied { setopt } for pid=30400 comm="syz.0.26885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 6327.534536][T30544] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30544 comm=syz.1.26951 [ 6329.830469][ T30] audit: type=1400 audit(6842.466:950): avc: denied { mount } for pid=30571 comm="syz.1.26965" name="/" dev="sockfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 6332.568346][T30603] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=30603 comm=syz.1.26978 [ 6337.841222][T30678] udevd[30678]: setting mode of /dev/vcs21 to 020660 failed: Read-only file system [ 6337.877826][T30678] udevd[30678]: setting owner of /dev/vcs21 to uid=0, gid=5 failed: Read-only file system [ 6338.346458][T30681] udevd[30681]: setting mode of /dev/vcsu21 to 020660 failed: Read-only file system [ 6338.347562][T30681] udevd[30681]: setting owner of /dev/vcsu21 to uid=0, gid=5 failed: Read-only file system [ 6338.606475][T30686] udevd[30686]: setting mode of /dev/vcsa21 to 020660 failed: Read-only file system [ 6338.607714][T30686] udevd[30686]: setting owner of /dev/vcsa21 to uid=0, gid=5 failed: Read-only file system [ 6341.745513][T30731] netlink: 4 bytes leftover after parsing attributes in process `syz.1.27038'. [ 6343.833108][T30759] input: syz0 as /devices/virtual/input/input56 [ 6347.056100][T30796] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=30796 comm=syz.0.27069 [ 6350.172778][ T30] audit: type=1400 audit(6862.796:951): avc: denied { nlmsg_write } for pid=30834 comm="syz.1.27085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 6351.121332][T30847] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2561 sclass=netlink_route_socket pid=30847 comm=syz.0.27092 [ 6378.133925][T31099] serio: Serial port pts0 [ 6380.616978][T31109] serio: Serial port pts1 [ 6394.224264][ T30] audit: type=1400 audit(6906.856:952): avc: denied { getopt } for pid=31121 comm="syz.0.27217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 6403.707318][T31222] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31222 comm=syz.1.27264 [ 6407.064189][T31245] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=31245 comm=syz.0.27274 [ 6408.172606][T31265] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31265 comm=syz.1.27284 [ 6409.110517][T31279] udevd[31279]: setting mode of /dev/vcs23 to 020660 failed: Read-only file system [ 6409.133346][T31279] udevd[31279]: setting owner of /dev/vcs23 to uid=0, gid=5 failed: Read-only file system [ 6409.447607][T31281] udevd[31281]: setting mode of /dev/vcsu23 to 020660 failed: Read-only file system [ 6409.448614][T31281] udevd[31281]: setting owner of /dev/vcsu23 to uid=0, gid=5 failed: Read-only file system [ 6409.539712][T31283] udevd[31283]: setting mode of /dev/vcsa23 to 020660 failed: Read-only file system [ 6409.540672][T31283] udevd[31283]: setting owner of /dev/vcsa23 to uid=0, gid=5 failed: Read-only file system [ 6412.267237][T31310] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=31310 comm=syz.1.27301 [ 6414.379463][T31331] udevd[31331]: setting mode of /dev/vcs20 to 020660 failed: Read-only file system [ 6414.380455][T31331] udevd[31331]: setting owner of /dev/vcs20 to uid=0, gid=5 failed: Read-only file system [ 6414.708761][T31338] udevd[31338]: setting mode of /dev/vcsu20 to 020660 failed: Read-only file system [ 6414.709741][T31338] udevd[31338]: setting owner of /dev/vcsu20 to uid=0, gid=5 failed: Read-only file system [ 6414.804128][T31340] udevd[31340]: setting mode of /dev/vcsa20 to 020660 failed: Read-only file system [ 6414.810121][T31340] udevd[31340]: setting owner of /dev/vcsa20 to uid=0, gid=5 failed: Read-only file system [ 6417.359235][T31375] serio: Serial port pts0 [ 6419.087812][T31338] udevd[31338]: setting mode of /dev/vcs22 to 020660 failed: Read-only file system [ 6419.088788][T31338] udevd[31338]: setting owner of /dev/vcs22 to uid=0, gid=5 failed: Read-only file system [ 6419.134588][T31338] udevd[31338]: setting mode of /dev/vcsa22 to 020660 failed: Read-only file system [ 6419.137437][T31338] udevd[31338]: setting owner of /dev/vcsa22 to uid=0, gid=5 failed: Read-only file system [ 6424.319054][T31441] input: syz0 as /devices/virtual/input/input57 [ 6425.257726][ T30] audit: type=1400 audit(6937.896:953): avc: denied { setattr } for pid=31453 comm="syz.0.27371" name="pfkey" dev="proc" ino=4026532946 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 6427.055243][ T30] audit: type=1400 audit(6939.696:954): avc: denied { write } for pid=31473 comm="syz.1.27378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 6431.636633][T31518] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31518 comm=syz.0.27399 [ 6433.794947][T31550] block nbd1: shutting down sockets [ 6434.256088][T31561] serio: Serial port pts0 [ 6438.226163][ T30] audit: type=1400 audit(6950.866:955): avc: denied { lock } for pid=31601 comm="syz.0.27438" path="socket:[213369]" dev="sockfs" ino=213369 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 6440.176482][T31614] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=31614 comm=syz.0.27443 [ 6448.063771][T31668] serio: Serial port pts1 [ 6454.104758][T31707] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=31707 comm=syz.1.27483 [ 6463.968682][T31780] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=31780 comm=syz.0.27517 [ 6467.105137][ T30] audit: type=1400 audit(6979.746:956): avc: denied { create } for pid=31819 comm="syz.1.27536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 6476.804279][ T30] audit: type=1400 audit(6989.436:957): avc: denied { lock } for pid=31936 comm="syz.1.27592" path="socket:[213896]" dev="sockfs" ino=213896 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6486.812192][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 6494.925553][T32174] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=19 sclass=netlink_audit_socket pid=32174 comm=syz.1.27702 [ 6495.819676][T32184] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32184 comm=syz.0.27707 [ 6497.406844][ T30] audit: type=1400 audit(7010.046:958): avc: denied { setattr } for pid=32205 comm="syz.0.27718" name="XDP" dev="sockfs" ino=215397 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 6500.226469][T32250] sctp: [Deprecated]: syz.0.27738 (pid 32250) Use of int in max_burst socket option deprecated. [ 6500.226469][T32250] Use struct sctp_assoc_value instead [ 6500.314002][T32254] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32254 comm=syz.1.27739 [ 6502.443515][T12642] usb 1-1: new high-speed USB device number 18 using dummy_hcd [ 6502.650848][T12642] usb 1-1: New USB device found, idVendor=249c, idProduct=9002, bcdDevice=de.ad [ 6502.652521][T12642] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6502.673130][T12642] usb 1-1: config 0 descriptor?? [ 6502.898853][T12642] usb 1-1: can't set first interface for hiFace device. [ 6502.899583][T12642] snd-usb-hiface 1-1:0.0: probe with driver snd-usb-hiface failed with error -5 [ 6502.919022][T12642] usb 1-1: USB disconnect, device number 18 [ 6507.613404][ T30] audit: type=1400 audit(7020.246:959): avc: denied { lock } for pid=32359 comm="syz.0.27785" path="socket:[215611]" dev="sockfs" ino=215611 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6508.894248][T32384] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32384 comm=syz.0.27797 [ 6513.150204][T32417] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=32417 comm=syz.0.27812 [ 6514.244888][ C0] vkms_vblank_simulate: vblank timer overrun [ 6517.392849][T32444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32444 comm=syz.0.27825 [ 6523.144003][T32485] netdevsim netdevsim0 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 6523.146811][T32485] netdevsim netdevsim0 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 6523.147565][T32485] netdevsim netdevsim0 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 6523.148032][T32485] netdevsim netdevsim0 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 6523.149970][T32485] vxlan0: entered promiscuous mode [ 6523.150595][T32485] vxlan0: entered allmulticast mode [ 6523.191944][T32485] netdevsim netdevsim0 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 6523.192583][T32485] netdevsim netdevsim0 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 6523.193047][T32485] netdevsim netdevsim0 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 6523.193502][T32485] netdevsim netdevsim0 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 6527.492629][T32537] serio: Serial port pts0 [ 6530.320728][T32576] netlink: 48 bytes leftover after parsing attributes in process `syz.1.27887'. [ 6530.336327][ T30] audit: type=1400 audit(7042.966:960): avc: denied { read } for pid=32575 comm="syz.1.27887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6545.579631][T32695] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=32695 comm=syz.0.27944 [ 6546.805721][T32707] "syz.0.27950" (32707) uses obsolete ecb(arc4) skcipher [ 6571.876818][ T347] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 6571.919241][ T347] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 6573.904395][ T428] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=428 comm=syz.0.28028 [ 6575.458428][ T347] hsr_slave_0: entered promiscuous mode [ 6575.526453][ T347] hsr_slave_1: entered promiscuous mode [ 6575.593668][ T347] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 6575.594738][ T347] Cannot create hsr debugfs directory [ 6576.919743][ T347] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6577.294478][ T347] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6577.415210][ T450] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=450 comm=syz.0.28036 [ 6577.698976][ T347] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6578.047400][ T347] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6579.057976][ T347] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 6579.120659][ T347] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 6579.173816][ T347] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 6579.210075][ T347] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 6580.935199][ T476] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=476 comm=syz.0.28046 [ 6582.800231][ T347] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6589.554286][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 6607.693084][ T566] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29890 sclass=netlink_route_socket pid=566 comm=syz.0.28072 [ 6620.900389][ T347] veth0_vlan: entered promiscuous mode [ 6621.032407][ T347] veth1_vlan: entered promiscuous mode [ 6621.777139][ T347] veth0_macvtap: entered promiscuous mode [ 6621.889233][ T347] veth1_macvtap: entered promiscuous mode [ 6622.837167][ T347] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6622.838078][ T347] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6622.838772][ T347] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6622.839482][ T347] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6692.813554][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:4454] [ 6692.814659][ C0] Modules linked in: [ 6692.816909][ C0] irq event stamp: 3062090 [ 6692.817444][ C0] hardirqs last enabled at (3062089): [<ffff8000850e7918>] exit_to_kernel_mode+0x38/0x118 [ 6692.819557][ C0] hardirqs last disabled at (3062090): [<ffff8000850e98bc>] el1_interrupt+0x24/0x54 [ 6692.820768][ C0] softirqs last enabled at (3062088): [<ffff8000801957a4>] handle_softirqs+0x87c/0xd4c [ 6692.821609][ C0] softirqs last disabled at (3061773): [<ffff800080010770>] __do_softirq+0x14/0x20 [ 6692.823064][ C0] CPU: 0 UID: 0 PID: 4454 Comm: kworker/0:1 Not tainted 6.11.0-rc2-syzkaller-00004-gb446a2dae984 #0 [ 6692.823870][ C0] Hardware name: linux,dummy-virt (DT) [ 6692.824714][ C0] Workqueue: events nsim_dev_trap_report_work [ 6692.825707][ C0] pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 6692.826668][ C0] pc : clear_page+0x18/0x54 [ 6692.827673][ C0] lr : kernel_init_pages+0x64/0xbc [ 6692.828623][ C0] sp : ffff80008ed97250 [ 6692.829480][ C0] x29: ffff80008ed97250 x28: fffffdffc01b1e00 x27: 1fffffbff80363c6 [ 6692.831396][ C0] x26: 0000000000000000 x25: 0000000000000001 x24: 00000000001d2820 [ 6692.832847][ C0] x23: fffffdffc01b1e40 x22: ffffc1ffc0000000 x21: ffff700010cdd448 [ 6692.834221][ C0] x20: ffff8000866ea240 x19: fffffdffc01b2000 x18: 00000000a2e2b32f [ 6692.835553][ C0] x17: 0000000000000001 x16: 0000000000000000 x15: ffff00000c302880 [ 6692.836903][ C0] x14: 1fffe0000186050f x13: 1fffe00001860528 x12: ffff7fbff80363c7 [ 6692.838231][ C0] x11: 1fffffbff80363c6 x10: ffff7fbff80363c6 x9 : 0000000000000000 [ 6692.839579][ C0] x8 : ffff600000d90000 x7 : 0000000000000000 x6 : 000000000000003f [ 6692.840875][ C0] x5 : 0000000000000040 x4 : 0000000000000000 x3 : 0000000000000004 [ 6692.842144][ C0] x2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff000006c78800 [ 6692.843649][ C0] Call trace: [ 6692.844311][ C0] clear_page+0x18/0x54 [ 6692.845135][ C0] post_alloc_hook+0x1cc/0x304 [ 6692.845824][ C0] get_page_from_freelist+0xa9c/0x2000 [ 6692.846565][ C0] __alloc_pages_noprof+0x1c4/0x2310 [ 6692.847254][ C0] alloc_slab_page+0x78/0x144 [ 6692.847941][ C0] new_slab+0xa8/0x2e0 [ 6692.848648][ C0] ___slab_alloc+0xa78/0x1474 [ 6692.849336][ C0] __slab_alloc.constprop.0+0x74/0xe8 [ 6692.850027][ C0] __kmalloc_node_track_caller_noprof+0x150/0x428 [ 6692.850766][ C0] kmalloc_reserve+0xd8/0x248 [ 6692.851468][ C0] __alloc_skb+0x120/0x2f0 [ 6692.852129][ C0] nsim_dev_trap_report_work+0x1ec/0xa40 [ 6692.852833][ C0] process_one_work+0x7a0/0x1868 [ 6692.853563][ C0] worker_thread+0x72c/0xb80 [ 6692.854230][ C0] kthread+0x27c/0x300 [ 6692.854874][ C0] ret_from_fork+0x10/0x20 [ 6692.856167][ C0] Sending NMI from CPU 0 to CPUs 1: [ 6693.569698][ C1] NMI backtrace for cpu 1 [ 6693.570429][ C1] CPU: 1 UID: 0 PID: 32640 Comm: syz.1.27918 Not tainted 6.11.0-rc2-syzkaller-00004-gb446a2dae984 #0 [ 6693.572305][ C1] Hardware name: linux,dummy-virt (DT) [ 6693.573485][ C1] pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 6693.575088][ C1] pc : clear_page+0x18/0x54 [ 6693.576145][ C1] lr : kernel_init_pages+0x64/0xbc [ 6693.577234][ C1] sp : ffff80008def7530 [ 6693.578111][ C1] x29: ffff80008def7530 x28: fffffdffc01b1a40 x27: 1fffffbff803634e [ 6693.579844][ C1] x26: 0000000000000000 x25: 0000000000000001 x24: 0000000000506dc0 [ 6693.581567][ C1] x23: fffffdffc01b1a80 x22: ffffc1ffc0000000 x21: ffff700010cdd448 [ 6693.583252][ C1] x20: ffff8000866ea240 x19: fffffdffc01b1a80 x18: 00000000ffffffff [ 6693.585035][ C1] x17: 0000000000000001 x16: 0000000000000000 x15: ffff00000e926480 [ 6693.586744][ C1] x14: 1fffe00001d24c8f x13: 1fffe00001d24c94 x12: ffff7fbff803634f [ 6693.588470][ C1] x11: 1fffffbff803634e x10: ffff7fbff803634e x9 : 0000000000000000 [ 6693.590220][ C1] x8 : ffff600000d8d400 x7 : 0000000000000000 x6 : 000000000000003f [ 6693.591895][ C1] x5 : 0000000000000040 x4 : 0000000000000000 x3 : 0000000000000004 [ 6693.593679][ C1] x2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff000006c69a00 [ 6693.595406][ C1] Call trace: [ 6693.596169][ C1] clear_page+0x18/0x54 [ 6693.597084][ C1] post_alloc_hook+0x1cc/0x304 [ 6693.598133][ C1] get_page_from_freelist+0xa9c/0x2000 [ 6693.599175][ C1] __alloc_pages_noprof+0x1c4/0x2310 [ 6693.600355][ C1] ringbuf_map_alloc+0x200/0x614 [ 6693.601393][ C1] map_create+0x3ac/0x16bc [ 6693.602331][ C1] __sys_bpf+0xb6c/0x30e8 [ 6693.603397][ C1] __arm64_sys_bpf+0x70/0xa4 [ 6693.604415][ C1] invoke_syscall+0x6c/0x258 [ 6693.605376][ C1] el0_svc_common.constprop.0+0xac/0x230 [ 6693.606524][ C1] do_el0_svc+0x40/0x58 [ 6693.607463][ C1] el0_svc+0x50/0x180 [ 6693.608387][ C1] el0t_64_sync_handler+0x100/0x12c [ 6693.609440][ C1] el0t_64_sync+0x190/0x194 [ 6693.612091][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 6693.613215][ C0] CPU: 0 UID: 0 PID: 4454 Comm: kworker/0:1 Tainted: G L 6.11.0-rc2-syzkaller-00004-gb446a2dae984 #0 [ 6693.613751][ C0] Tainted: [L]=SOFTLOCKUP [ 6693.613975][ C0] Hardware name: linux,dummy-virt (DT) [ 6693.614217][ C0] Workqueue: events nsim_dev_trap_report_work [ 6693.614574][ C0] Call trace: [ 6693.614925][ C0] dump_backtrace+0x9c/0x11c [ 6693.615222][ C0] show_stack+0x18/0x24 [ 6693.615548][ C0] dump_stack_lvl+0x38/0xf4 [ 6693.615821][ C0] dump_stack+0x1c/0x28 [ 6693.616022][ C0] panic+0x5b4/0x63c [ 6693.616225][ C0] watchdog_timer_fn+0x448/0x5c8 [ 6693.616455][ C0] __hrtimer_run_queues+0x55c/0xb28 [ 6693.616685][ C0] hrtimer_interrupt+0x2a4/0x76c [ 6693.616911][ C0] arch_timer_handler_phys+0x40/0x6c [ 6693.617405][ C0] handle_percpu_devid_irq+0x19c/0x30c [ 6693.617731][ C0] generic_handle_domain_irq+0x78/0xa4 [ 6693.618055][ C0] gic_handle_irq+0x54/0x184 [ 6693.618339][ C0] call_on_irq_stack+0x24/0x4c [ 6693.618574][ C0] do_interrupt_handler+0x12c/0x150 [ 6693.618836][ C0] el1_interrupt+0x34/0x54 [ 6693.619195][ C0] el1h_64_irq_handler+0x18/0x24 [ 6693.619502][ C0] el1h_64_irq+0x64/0x68 [ 6693.619719][ C0] clear_page+0x18/0x54 [ 6693.619935][ C0] post_alloc_hook+0x1cc/0x304 [ 6693.620167][ C0] get_page_from_freelist+0xa9c/0x2000 [ 6693.620401][ C0] __alloc_pages_noprof+0x1c4/0x2310 [ 6693.620641][ C0] alloc_slab_page+0x78/0x144 [ 6693.620856][ C0] new_slab+0xa8/0x2e0 [ 6693.621068][ C0] ___slab_alloc+0xa78/0x1474 [ 6693.621292][ C0] __slab_alloc.constprop.0+0x74/0xe8 [ 6693.621747][ C0] __kmalloc_node_track_caller_noprof+0x150/0x428 [ 6693.622646][ C0] kmalloc_reserve+0xd8/0x248 [ 6693.623010][ C0] __alloc_skb+0x120/0x2f0 [ 6693.623312][ C0] nsim_dev_trap_report_work+0x1ec/0xa40 [ 6693.623860][ C0] process_one_work+0x7a0/0x1868 [ 6693.624101][ C0] worker_thread+0x72c/0xb80 [ 6693.624317][ C0] kthread+0x27c/0x300 [ 6693.624513][ C0] ret_from_fork+0x10/0x20 [ 6693.625237][ C0] SMP: stopping secondary CPUs [ 6693.626181][ C0] Kernel Offset: disabled [ 6693.626505][ C0] CPU features: 0x04,40001001,a0100000,0200421b [ 6693.626898][ C0] Memory Limit: none [ 6693.627734][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 17:40:46 Registers: info registers vcpu 0 CPU#0 PC=ffff8000802d2870 X00=00000000000000c0 X01=0000000000000000 X02=0000000000000000 X03=1fffe000018603c1 X04=0000000000000000 X05=ffff800086b77940 X06=ffff700010d6ef28 X07=ffff8000876292b0 X08=0000000000000003 X09=dfff800000000000 X10=ffff700010d6ef28 X11=1ffff00010d6ef28 X12=ffff700010d6ef29 X13=1fffe00001860537 X14=1fffe0000186050f X15=ffff00000c302880 X16=0000000000000000 X17=745f74697865205d X18=00000000ec3792da X19=0000000000000001 X20=ffff00000c302948 X21=ffff800086be3c30 X22=0000000000000028 X23=ffff00000c302880 X24=ffff800086a80fc8 X25=ffff8000851983e0 X26=00000000ffffffff X27=00000000000000c0 X28=ffff00000c301e00 X29=ffff800080007790 X30=ffff8000850eb67c SP=ffff800080007790 PSTATE=000000c5 ---- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000aaaab9d354a4:0000aaaab9d354a0 Q02=0000aaaab9d38b8d:0000aaaab9d38b40 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdd969d60:0000ffffdd969d60 Q17=ffffff80ffffffd0:0000ffffdd969d30 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008505e4d4 X00=ffff000006c699c0 X01=0000000000000040 X02=0000000000000004 X03=0000000000000004 X04=0000000000000000 X05=0000000000000040 X06=000000000000003f X07=0000000000000000 X08=ffff600000d8d400 X09=0000000000000000 X10=ffff7fbff803634e X11=1fffffbff803634e X12=ffff7fbff803634f X13=1fffe00001d24c94 X14=1fffe00001d24c8f X15=ffff00000e926480 X16=0000000000000000 X17=0000000000000001 X18=00000000ffffffff X19=fffffdffc01b1a80 X20=ffff8000866ea240 X21=ffff700010cdd448 X22=ffffc1ffc0000000 X23=fffffdffc01b1a80 X24=0000000000506dc0 X25=0000000000000001 X26=0000000000000000 X27=1fffffbff803634e X28=fffffdffc01b1a40 X29=ffff80008def7530 X30=ffff8000808634c0 SP=ffff80008def7530 PSTATE=00000005 ---- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000aaaab9d354a4:0000aaaab9d354a0 Q02=0000aaaab9d38b8d:0000aaaab9d38b40 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdd969d60:0000ffffdd969d60 Q17=ffffff80ffffffd0:0000ffffdd969d30 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000