last executing test programs: 5.666921744s ago: executing program 0 (id=1735): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f0000002ec0)={0x0, 0x0, &(0x7f0000002e80)={&(0x7f0000002fc0)=ANY=[], 0x2b08}}, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100)=@ccm_128={{0x303}, "e3bdefb1e70f4378", "6a30f1945b976ca530bf7bb609b67fa3", "a4767c49", "270939005216909f"}, 0x28) recvmsg$unix(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000300)=""/180, 0xb4}], 0x1}, 0x0) 5.350048975s ago: executing program 1 (id=1736): mremap(&(0x7f0000006000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x10, 0x3, 0x0) r0 = fsopen(&(0x7f0000000080)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat(r1, &(0x7f0000000000)='./file0\x00', 0x8, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x0, 0x30) openat(r1, &(0x7f0000000040)='./file0\x00', 0x101909, 0x0) 4.948989631s ago: executing program 0 (id=1737): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) r1 = openat$binder_debug(0xffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) close(r1) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000040)={0x1d, r3, 0x3}, 0x18) write$P9_RLERROR(r0, &(0x7f0000000300)=ANY=[], 0xa) write$FUSE_POLL(r1, 0x0, 0x0) 4.563521214s ago: executing program 1 (id=1738): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) dup3(r1, r0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept4$packet(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r3, 0x0, 0x0, 0x0) 4.16524081s ago: executing program 1 (id=1739): r0 = memfd_create(&(0x7f0000000040)='\x00', 0x0) close(r0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept4$packet(r0, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x8901, &(0x7f0000000000)) 3.657700526s ago: executing program 1 (id=1740): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = accept4$packet(r3, 0x0, 0x0, 0x0) write$eventfd(r4, 0x0, 0x0) 3.386332967s ago: executing program 0 (id=1741): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'syzkaller1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0xd}}) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000600)='fd/4\x00') ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40305839, &(0x7f0000000240)) 3.269471749s ago: executing program 1 (id=1742): mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000440)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[], 0x14}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 2.607704485s ago: executing program 0 (id=1743): r0 = openat$kvm(0x0, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_kvm_setup_syzos_vm(r1) r3 = syz_kvm_add_vcpu(r2, &(0x7f0000000080)={0x0, &(0x7f00000000c0)=[@irq_setup={0x5, 0x18, {0x1, 0x20}}], 0x18}, 0x0, 0x0) r4 = syz_kvm_add_vcpu(r2, &(0x7f0000000100)={0x0, &(0x7f0000000140)=[@irq_setup={0x5, 0x18, {0x1, 0x20}}], 0x18}, 0x0, 0x0) syz_kvm_vgic_v3_setup(r1, 0x2, 0x100) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000180)={0x1010020, 0x1}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 1.694920668s ago: executing program 1 (id=1744): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "7f31ddc1517600"}) r1 = syz_open_pts(r0, 0x0) r2 = dup(r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000400)) syz_usb_connect$hid(0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, 0x0) 1.601205136s ago: executing program 0 (id=1745): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000001080)='.pending_reads\x00', 0x62cc2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000040)={0x1d, r3, 0x3}, 0x18) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=ANY=[], 0x14}}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x4, 0x70bd26, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x20048011}, 0x0) 0s ago: executing program 0 (id=1746): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r1}, 0x18) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3}, 0x18) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, r3}, 0x18) sendmsg$can_j1939(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)='data', 0x4}}, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/4, 0x4}], 0x1}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:52840' (ED25519) to the list of known hosts. [ 206.463255][ T30] audit: type=1400 audit(205.870:58): avc: denied { name_bind } for pid=3267 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 207.070234][ T30] audit: type=1400 audit(206.480:59): avc: denied { execute } for pid=3269 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 207.075939][ T30] audit: type=1400 audit(206.480:60): avc: denied { execute_no_trans } for pid=3269 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 213.710478][ T30] audit: type=1400 audit(213.120:61): avc: denied { mounton } for pid=3269 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 213.730320][ T30] audit: type=1400 audit(213.140:62): avc: denied { mount } for pid=3269 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 213.777439][ T3269] cgroup: Unknown subsys name 'net' [ 213.811756][ T30] audit: type=1400 audit(213.220:63): avc: denied { unmount } for pid=3269 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 214.334998][ T3269] cgroup: Unknown subsys name 'cpuset' [ 214.399360][ T3269] cgroup: Unknown subsys name 'rlimit' [ 214.880042][ T30] audit: type=1400 audit(214.290:64): avc: denied { setattr } for pid=3269 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 214.890686][ T30] audit: type=1400 audit(214.290:65): avc: denied { mounton } for pid=3269 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 214.907597][ T30] audit: type=1400 audit(214.300:66): avc: denied { mount } for pid=3269 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 215.708538][ T3272] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 215.726965][ T30] audit: type=1400 audit(215.120:67): avc: denied { relabelto } for pid=3272 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 215.730904][ T30] audit: type=1400 audit(215.140:68): avc: denied { write } for pid=3272 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 215.827242][ T30] audit: type=1400 audit(215.230:69): avc: denied { read } for pid=3269 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 215.830707][ T30] audit: type=1400 audit(215.240:70): avc: denied { open } for pid=3269 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 215.857764][ T3269] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 227.085702][ T30] audit: type=1400 audit(226.490:71): avc: denied { execmem } for pid=3273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 227.143482][ T30] audit: type=1400 audit(226.550:72): avc: denied { read } for pid=3275 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 227.147235][ T30] audit: type=1400 audit(226.560:73): avc: denied { open } for pid=3275 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 227.168270][ T30] audit: type=1400 audit(226.580:74): avc: denied { mounton } for pid=3275 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 227.247333][ T30] audit: type=1400 audit(226.660:75): avc: denied { module_request } for pid=3275 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 227.460975][ T30] audit: type=1400 audit(226.870:76): avc: denied { sys_module } for pid=3275 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 235.290174][ T3277] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.313451][ T3277] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.623672][ T3275] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 235.648947][ T3275] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 238.670005][ T3277] hsr_slave_0: entered promiscuous mode [ 238.751737][ T3277] hsr_slave_1: entered promiscuous mode [ 240.023161][ T3275] hsr_slave_0: entered promiscuous mode [ 240.069278][ T3275] hsr_slave_1: entered promiscuous mode [ 240.116435][ T3275] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 240.118921][ T3275] Cannot create hsr debugfs directory [ 242.025024][ T30] audit: type=1400 audit(241.430:77): avc: denied { create } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 242.029621][ T30] audit: type=1400 audit(241.440:78): avc: denied { write } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 242.041551][ T30] audit: type=1400 audit(241.450:79): avc: denied { read } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 242.067870][ T3277] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 242.167800][ T3277] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 242.287410][ T3277] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 242.327829][ T3277] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 242.991364][ T3275] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 243.033479][ T3275] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 243.218416][ T3275] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 243.288187][ T3275] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 245.781365][ T3277] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.902021][ T3275] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.285813][ T3277] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 258.845243][ T3277] veth0_vlan: entered promiscuous mode [ 259.060818][ T3277] veth1_vlan: entered promiscuous mode [ 259.402201][ T3277] veth0_macvtap: entered promiscuous mode [ 259.470656][ T3277] veth1_macvtap: entered promiscuous mode [ 259.959927][ T3275] veth0_vlan: entered promiscuous mode [ 260.078435][ T3277] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.080180][ T3277] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.080765][ T3277] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.081523][ T3277] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 260.213022][ T3275] veth1_vlan: entered promiscuous mode [ 260.646230][ T30] audit: type=1400 audit(259.990:80): avc: denied { mount } for pid=3277 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 260.647806][ T30] audit: type=1400 audit(260.010:81): avc: denied { mounton } for pid=3277 comm="syz-executor" path="/syzkaller.87Ih8F/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 260.649223][ T30] audit: type=1400 audit(260.030:82): avc: denied { mount } for pid=3277 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 260.670890][ T30] audit: type=1400 audit(260.080:83): avc: denied { mounton } for pid=3277 comm="syz-executor" path="/syzkaller.87Ih8F/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 260.716211][ T30] audit: type=1400 audit(260.100:84): avc: denied { mounton } for pid=3277 comm="syz-executor" path="/syzkaller.87Ih8F/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 260.786573][ T30] audit: type=1400 audit(260.190:85): avc: denied { unmount } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 260.819009][ T30] audit: type=1400 audit(260.220:86): avc: denied { mounton } for pid=3277 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 260.910571][ T3275] veth0_macvtap: entered promiscuous mode [ 260.955124][ T30] audit: type=1400 audit(260.310:87): avc: denied { mount } for pid=3277 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 260.956210][ T30] audit: type=1400 audit(260.320:88): avc: denied { mounton } for pid=3277 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 260.957338][ T30] audit: type=1400 audit(260.330:89): avc: denied { mount } for pid=3277 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 260.982155][ T3275] veth1_macvtap: entered promiscuous mode [ 261.269626][ T3277] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 261.329900][ T3275] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.330487][ T3275] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.330896][ T3275] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.331276][ T3275] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 266.362338][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 266.362548][ T30] audit: type=1400 audit(265.740:101): avc: denied { create } for pid=3422 comm="syz.1.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 266.478106][ T30] audit: type=1400 audit(265.860:102): avc: denied { read write } for pid=3422 comm="syz.1.4" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 266.481175][ T30] audit: type=1400 audit(265.880:103): avc: denied { open } for pid=3422 comm="syz.1.4" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 266.520788][ T30] audit: type=1400 audit(265.900:104): avc: denied { ioctl } for pid=3422 comm="syz.1.4" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 266.523269][ T30] audit: type=1400 audit(265.910:105): avc: denied { ioctl } for pid=3422 comm="syz.1.4" path="socket:[4042]" dev="sockfs" ino=4042 ioctlcmd=0x943e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 266.922776][ T30] audit: type=1400 audit(266.330:106): avc: denied { read write } for pid=3426 comm="syz.0.6" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 266.949324][ T30] audit: type=1400 audit(266.330:107): avc: denied { open } for pid=3426 comm="syz.0.6" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 267.761590][ T30] audit: type=1400 audit(267.170:108): avc: denied { unmount } for pid=3275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 269.009588][ T30] audit: type=1400 audit(268.420:109): avc: denied { create } for pid=3430 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 269.073568][ T30] audit: type=1400 audit(268.480:110): avc: denied { write } for pid=3430 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 270.135864][ T3434] Zero length message leads to an empty skb [ 272.045503][ T3446] serio: Serial port pts0 [ 272.136186][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 272.136386][ T30] audit: type=1400 audit(271.530:113): avc: denied { create } for pid=3447 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 272.138436][ T30] audit: type=1400 audit(271.540:114): avc: denied { setopt } for pid=3447 comm="syz.0.13" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 273.890145][ T30] audit: type=1400 audit(273.300:115): avc: denied { write } for pid=3452 comm="syz.0.15" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 274.516492][ T30] audit: type=1400 audit(273.910:116): avc: denied { create } for pid=3457 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 274.570067][ T30] audit: type=1400 audit(273.980:117): avc: denied { setopt } for pid=3457 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 274.610828][ T30] audit: type=1400 audit(274.020:118): avc: denied { bind } for pid=3457 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 274.630087][ T30] audit: type=1400 audit(274.040:119): avc: denied { listen } for pid=3457 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 274.688950][ T30] audit: type=1400 audit(274.090:120): avc: denied { connect } for pid=3457 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 274.789346][ T30] audit: type=1400 audit(274.190:121): avc: denied { write } for pid=3457 comm="syz.0.16" path="socket:[4079]" dev="sockfs" ino=4079 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 279.490484][ T30] audit: type=1400 audit(278.900:122): avc: denied { create } for pid=3467 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 281.446169][ T30] audit: type=1400 audit(280.850:123): avc: denied { ioctl } for pid=3473 comm="syz.1.22" path="socket:[2939]" dev="sockfs" ino=2939 ioctlcmd=0x941d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 282.942579][ T3482] netlink: 104 bytes leftover after parsing attributes in process `syz.0.24'. [ 282.989478][ T30] audit: type=1400 audit(282.290:124): avc: denied { create } for pid=3481 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 282.990985][ T30] audit: type=1400 audit(282.340:125): avc: denied { write } for pid=3481 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 282.992178][ T30] audit: type=1400 audit(282.340:126): avc: denied { nlmsg_write } for pid=3481 comm="syz.0.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 284.752601][ T30] audit: type=1400 audit(284.160:127): avc: denied { prog_load } for pid=3487 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 284.758119][ T30] audit: type=1400 audit(284.160:128): avc: denied { bpf } for pid=3487 comm="syz.0.26" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 284.780566][ T30] audit: type=1400 audit(284.160:129): avc: denied { perfmon } for pid=3487 comm="syz.0.26" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 284.908160][ T30] audit: type=1400 audit(284.280:130): avc: denied { setopt } for pid=3487 comm="syz.0.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 285.978173][ T3494] serio: Serial port pts0 [ 286.311167][ T30] audit: type=1400 audit(285.720:131): avc: denied { create } for pid=3491 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 286.377834][ T30] audit: type=1400 audit(285.790:132): avc: denied { write } for pid=3491 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 288.998385][ T30] audit: type=1400 audit(288.370:133): avc: denied { mounton } for pid=3506 comm="syz.1.33" path="/14/file0" dev="tmpfs" ino=97 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 291.910327][ T30] audit: type=1400 audit(291.320:134): avc: denied { name_bind } for pid=3517 comm="syz.0.37" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 291.912096][ T30] audit: type=1400 audit(291.320:135): avc: denied { node_bind } for pid=3517 comm="syz.0.37" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 292.600111][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 292.700829][ T30] audit: type=1400 audit(292.100:136): avc: denied { nlmsg_write } for pid=3519 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 293.552513][ T30] audit: type=1400 audit(292.960:137): avc: denied { read } for pid=3523 comm="syz.1.39" path="socket:[3034]" dev="sockfs" ino=3034 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 296.732673][ T30] audit: type=1400 audit(296.140:138): avc: denied { read } for pid=3529 comm="syz.0.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 298.488274][ T30] audit: type=1400 audit(297.900:139): avc: denied { create } for pid=3541 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 298.637335][ T30] audit: type=1400 audit(298.000:140): avc: denied { ioctl } for pid=3541 comm="syz.1.43" path="socket:[3053]" dev="sockfs" ino=3053 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 298.638953][ T30] audit: type=1400 audit(298.020:141): avc: denied { write } for pid=3541 comm="syz.1.43" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 299.411394][ T30] audit: type=1400 audit(298.820:142): avc: denied { map } for pid=3544 comm="syz.0.45" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4218 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 299.426666][ T30] audit: type=1400 audit(298.830:143): avc: denied { read write } for pid=3544 comm="syz.0.45" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4218 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 300.331561][ T30] audit: type=1400 audit(299.740:144): avc: denied { read } for pid=3547 comm="syz.1.46" name="ubi_ctrl" dev="devtmpfs" ino=686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 300.339516][ T30] audit: type=1400 audit(299.740:145): avc: denied { open } for pid=3547 comm="syz.1.46" path="/dev/ubi_ctrl" dev="devtmpfs" ino=686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 302.248486][ T30] audit: type=1400 audit(301.630:146): avc: denied { execute } for pid=3556 comm="syz.1.49" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 303.555890][ T3562] netlink: 4 bytes leftover after parsing attributes in process `syz.1.50'. [ 306.271351][ T30] audit: type=1400 audit(305.600:147): avc: denied { mounton } for pid=3568 comm="syz.1.53" path="/25/file0" dev="tmpfs" ino=159 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 309.228457][ T3573] netlink: 4 bytes leftover after parsing attributes in process `syz.1.54'. [ 314.398865][ T30] audit: type=1400 audit(313.810:148): avc: denied { create } for pid=3589 comm="syz.1.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 315.636586][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 318.466026][ T3611] serio: Serial port pts0 [ 320.817510][ T30] audit: type=1400 audit(320.210:149): avc: denied { read } for pid=3618 comm="syz.0.69" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 320.850283][ T30] audit: type=1400 audit(320.260:150): avc: denied { open } for pid=3618 comm="syz.0.69" path="/dev/input/mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 321.021626][ T30] audit: type=1400 audit(320.430:151): avc: denied { write } for pid=3618 comm="syz.0.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 334.610144][ T3653] serio: Serial port pts0 [ 341.171590][ T3683] serio: Serial port pts0 [ 341.498642][ T30] audit: type=1400 audit(340.910:152): avc: denied { map_create } for pid=3685 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 341.520317][ T30] audit: type=1400 audit(340.930:153): avc: denied { map_read map_write } for pid=3685 comm="syz.0.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 347.898396][ T30] audit: type=1400 audit(347.290:154): avc: denied { create } for pid=3707 comm="syz.0.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 347.899992][ T30] audit: type=1400 audit(347.300:155): avc: denied { ioctl } for pid=3707 comm="syz.0.100" path="socket:[5356]" dev="sockfs" ino=5356 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 347.941728][ T30] audit: type=1400 audit(347.340:156): avc: denied { read } for pid=3080 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 347.943370][ T30] audit: type=1400 audit(347.340:157): avc: denied { append } for pid=3080 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 347.947075][ T30] audit: type=1400 audit(347.340:158): avc: denied { open } for pid=3080 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 347.948689][ T30] audit: type=1400 audit(347.340:159): avc: denied { getattr } for pid=3080 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 353.748201][ T30] audit: type=1400 audit(353.160:160): avc: denied { create } for pid=3728 comm="syz.0.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 353.831530][ T30] audit: type=1400 audit(353.230:161): avc: denied { write } for pid=3728 comm="syz.0.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 359.137949][ T30] audit: type=1400 audit(358.550:162): avc: denied { write } for pid=3751 comm="syz.0.116" name="psched" dev="proc" ino=4026532641 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 362.078371][ T30] audit: type=1400 audit(361.270:163): avc: denied { ioctl } for pid=3758 comm="syz.1.119" path="socket:[4591]" dev="sockfs" ino=4591 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 362.080151][ T30] audit: type=1400 audit(361.300:164): avc: denied { bind } for pid=3758 comm="syz.1.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 367.648707][ T30] audit: type=1400 audit(367.060:165): avc: denied { read } for pid=3769 comm="syz.1.123" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 367.651051][ T30] audit: type=1400 audit(367.060:166): avc: denied { open } for pid=3769 comm="syz.1.123" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 380.032405][ T30] audit: type=1400 audit(379.440:167): avc: denied { getopt } for pid=3813 comm="syz.0.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 383.559160][ T30] audit: type=1400 audit(382.960:168): avc: denied { write } for pid=3826 comm="syz.0.142" path="socket:[4732]" dev="sockfs" ino=4732 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 384.961509][ T30] audit: type=1400 audit(384.370:169): avc: denied { write } for pid=3832 comm="syz.0.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 388.847241][ T3855] serio: Serial port pts0 [ 389.018080][ T30] audit: type=1400 audit(388.420:170): avc: denied { bind } for pid=3845 comm="syz.1.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 395.553197][ T3873] serio: Serial port pts1 [ 410.197926][ T30] audit: type=1400 audit(409.610:171): avc: denied { read } for pid=3892 comm="syz.0.164" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 410.200393][ T30] audit: type=1400 audit(409.610:172): avc: denied { open } for pid=3892 comm="syz.0.164" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 410.203608][ T30] audit: type=1400 audit(409.610:173): avc: denied { read } for pid=3892 comm="syz.0.164" name="card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 410.211152][ T30] audit: type=1400 audit(409.620:174): avc: denied { open } for pid=3892 comm="syz.0.164" path="/dev/dri/card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 410.223629][ T30] audit: type=1400 audit(409.630:175): avc: denied { bind } for pid=3892 comm="syz.0.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 410.240456][ T30] audit: type=1400 audit(409.640:176): avc: denied { setopt } for pid=3892 comm="syz.0.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 410.242227][ T30] audit: type=1400 audit(409.640:177): avc: denied { accept } for pid=3892 comm="syz.0.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 410.243598][ T30] audit: type=1400 audit(409.640:178): avc: denied { ioctl } for pid=3892 comm="syz.0.164" path="socket:[4839]" dev="sockfs" ino=4839 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 422.012067][ T3940] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 423.103092][ T30] audit: type=1400 audit(422.510:179): avc: denied { accept } for pid=3941 comm="syz.1.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 427.773384][ T3965] serio: Serial port pts0 [ 432.872605][ T30] audit: type=1400 audit(432.280:180): avc: denied { create } for pid=3974 comm="syz.1.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 432.917407][ T30] audit: type=1400 audit(432.330:181): avc: denied { write } for pid=3974 comm="syz.1.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 439.271412][ T3999] serio: Serial port pts1 [ 448.322022][ T30] audit: type=1400 audit(447.730:182): avc: denied { name_bind } for pid=4020 comm="syz.0.208" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 448.343288][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 455.173355][ T30] audit: type=1400 audit(454.540:183): avc: denied { create } for pid=4038 comm="syz.0.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 455.227671][ T30] audit: type=1400 audit(454.640:184): avc: denied { write } for pid=4038 comm="syz.0.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 455.329239][ T4044] serio: Serial port pts0 [ 455.657291][ T30] audit: type=1400 audit(455.070:185): avc: denied { bind } for pid=4045 comm="syz.0.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 455.658730][ T30] audit: type=1400 audit(455.070:186): avc: denied { name_bind } for pid=4045 comm="syz.0.217" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 455.660048][ T30] audit: type=1400 audit(455.070:187): avc: denied { node_bind } for pid=4045 comm="syz.0.217" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 455.709178][ T30] audit: type=1400 audit(455.100:188): avc: denied { listen } for pid=4045 comm="syz.0.217" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 456.227961][ T30] audit: type=1400 audit(455.640:189): avc: denied { setopt } for pid=4045 comm="syz.0.217" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 456.552357][ T30] audit: type=1400 audit(455.960:190): avc: denied { write } for pid=4045 comm="syz.0.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 456.556332][ T30] audit: type=1400 audit(455.960:191): avc: denied { connect } for pid=4045 comm="syz.0.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 456.558406][ T30] audit: type=1400 audit(455.970:192): avc: denied { name_connect } for pid=4045 comm="syz.0.217" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 462.059632][ T4069] serio: Serial port pts0 [ 467.941227][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 467.941436][ T30] audit: type=1400 audit(467.350:195): avc: denied { write } for pid=4084 comm="syz.0.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 470.900833][ T30] audit: type=1400 audit(470.310:196): avc: denied { ioctl } for pid=4097 comm="syz.0.232" path="socket:[5928]" dev="sockfs" ino=5928 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 474.940456][ T30] audit: type=1400 audit(474.350:197): avc: denied { create } for pid=4106 comm="syz.0.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 476.866832][ T4115] serio: Serial port pts1 [ 496.061445][ T4171] serio: Serial port pts0 [ 496.722873][ T4174] serio: Serial port pts1 [ 507.246016][ T4197] serio: Serial port pts0 [ 524.803189][ T30] audit: type=1400 audit(524.210:198): avc: denied { write } for pid=4235 comm="syz.1.277" path="socket:[6484]" dev="sockfs" ino=6484 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 533.496241][ T4271] serio: Serial port pts0 [ 534.358614][ T30] audit: type=1400 audit(533.770:199): avc: denied { read } for pid=4276 comm="syz.1.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 535.376180][ T30] audit: type=1400 audit(534.780:200): avc: denied { read } for pid=4278 comm="syz.1.292" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 535.405975][ T30] audit: type=1400 audit(534.780:201): avc: denied { open } for pid=4278 comm="syz.1.292" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 536.558260][ T4288] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 536.585706][ T30] audit: type=1400 audit(535.990:202): avc: denied { nlmsg_read } for pid=4287 comm="syz.1.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 538.607024][ T30] audit: type=1400 audit(538.020:203): avc: denied { create } for pid=4295 comm="syz.1.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 538.941466][ T30] audit: type=1400 audit(538.350:204): avc: denied { create } for pid=4297 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 538.942806][ T30] audit: type=1400 audit(538.350:205): avc: denied { write } for pid=4297 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 544.100597][ T4322] serio: Serial port pts0 [ 544.421997][ T4324] serio: Serial port pts1 [ 562.203811][ T4344] serio: Serial port pts0 [ 570.924676][ T4385] serio: Serial port pts0 [ 571.723017][ T4390] ======================================================= [ 571.723017][ T4390] WARNING: The mand mount option has been deprecated and [ 571.723017][ T4390] and is ignored by this kernel. Remove the mand [ 571.723017][ T4390] option from the mount to silence this warning. [ 571.723017][ T4390] ======================================================= [ 571.858769][ T30] audit: type=1400 audit(571.270:206): avc: denied { unmount } for pid=3275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 572.943326][ T149] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 573.283629][ T149] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 573.643172][ T149] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 574.088720][ T149] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 574.931147][ T30] audit: type=1400 audit(574.340:207): avc: denied { read } for pid=3125 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 578.799678][ T149] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 578.907371][ T149] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 579.010191][ T149] bond0 (unregistering): Released all slaves [ 579.594999][ T149] hsr_slave_0: left promiscuous mode [ 579.688379][ T149] hsr_slave_1: left promiscuous mode [ 579.969110][ T149] veth1_macvtap: left promiscuous mode [ 579.972410][ T149] veth0_macvtap: left promiscuous mode [ 579.980216][ T149] veth1_vlan: left promiscuous mode [ 579.983307][ T149] veth0_vlan: left promiscuous mode [ 596.595232][ T4393] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 596.658186][ T4393] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 597.853255][ T30] audit: type=1400 audit(597.260:208): avc: denied { setopt } for pid=4451 comm="syz.1.339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 597.967918][ T4454] netlink: 168 bytes leftover after parsing attributes in process `syz.1.339'. [ 599.199146][ T30] audit: type=1400 audit(598.610:209): avc: denied { ioctl } for pid=4455 comm="syz.1.340" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 602.694446][ T4393] hsr_slave_0: entered promiscuous mode [ 602.730816][ T4393] hsr_slave_1: entered promiscuous mode [ 602.790180][ T4393] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 602.791207][ T4393] Cannot create hsr debugfs directory [ 607.517992][ T4488] netlink: 'syz.1.345': attribute type 4 has an invalid length. [ 608.640707][ T30] audit: type=1400 audit(608.050:210): avc: denied { read } for pid=4393 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 608.682200][ T4393] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 608.782906][ T4393] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 608.900096][ T4393] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 608.972176][ T4393] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 614.971259][ T4393] 8021q: adding VLAN 0 to HW filter on device bond0 [ 622.570292][ T4543] serio: Serial port pts0 [ 629.997560][ T4393] veth0_vlan: entered promiscuous mode [ 630.090722][ T4393] veth1_vlan: entered promiscuous mode [ 630.317596][ T4393] veth0_macvtap: entered promiscuous mode [ 630.452841][ T4393] veth1_macvtap: entered promiscuous mode [ 631.197660][ T4393] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 631.198721][ T4393] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 631.199511][ T4393] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 631.200267][ T4393] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 631.757133][ T30] audit: type=1400 audit(631.160:211): avc: denied { mounton } for pid=4393 comm="syz-executor" path="/syzkaller.EnOp8D/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 631.876985][ T30] audit: type=1400 audit(631.260:212): avc: denied { mount } for pid=4393 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 632.186584][ T30] audit: type=1400 audit(631.600:213): avc: denied { mounton } for pid=4393 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 632.933613][ T30] audit: type=1400 audit(632.340:214): avc: denied { setopt } for pid=4596 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 633.536639][ T30] audit: type=1400 audit(632.940:215): avc: denied { bind } for pid=4596 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 639.979855][ T4628] serio: Serial port pts0 [ 640.628397][ T4632] serio: Serial port pts1 [ 641.644218][ C0] hrtimer: interrupt took 1492352 ns [ 655.370433][ T4638] serio: Serial port pts0 [ 661.691702][ T30] audit: type=1400 audit(661.100:216): avc: denied { write } for pid=4655 comm="syz.0.374" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 661.850941][ T30] audit: type=1400 audit(661.260:217): avc: denied { ioctl } for pid=4655 comm="syz.0.374" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 673.535075][ T30] audit: type=1400 audit(672.940:218): avc: denied { read } for pid=4690 comm="syz.0.387" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 673.538417][ T30] audit: type=1400 audit(672.950:219): avc: denied { open } for pid=4690 comm="syz.0.387" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 673.541477][ T30] audit: type=1400 audit(672.950:220): avc: denied { ioctl } for pid=4690 comm="syz.0.387" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 676.234823][ T4704] serio: Serial port pts0 [ 693.883323][ T4762] serio: Serial port pts0 [ 696.964822][ T4770] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4770 comm=syz.1.412 [ 702.101322][ T30] audit: type=1400 audit(701.510:221): avc: denied { prog_run } for pid=4783 comm="syz.1.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 702.120121][ T30] audit: type=1400 audit(701.530:222): avc: denied { shutdown } for pid=4783 comm="syz.1.417" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 702.135743][ T30] audit: type=1400 audit(701.540:223): avc: denied { name_connect } for pid=4783 comm="syz.1.417" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 709.225504][ T4802] serio: Serial port pts0 [ 709.262753][ T4803] serio: Serial port pts1 [ 724.768064][ T30] audit: type=1400 audit(724.180:224): avc: denied { read } for pid=4841 comm="syz.1.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 726.771061][ T30] audit: type=1400 audit(726.180:225): avc: denied { ioctl } for pid=4848 comm="syz.1.437" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 729.271225][ T4854] sctp: [Deprecated]: syz.1.439 (pid 4854) Use of int in maxseg socket option. [ 729.271225][ T4854] Use struct sctp_assoc_value instead [ 730.182590][ T30] audit: type=1400 audit(729.590:226): avc: denied { ioctl } for pid=4858 comm="syz.0.441" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x640d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 733.317596][ T4870] serio: Serial port pts0 [ 735.536426][ T4878] serio: Serial port pts1 [ 749.866631][ T4886] serio: Serial port pts0 [ 750.675644][ T4890] serio: Serial port pts1 [ 752.963440][ T4896] serio: Serial port pts1 [ 767.116181][ T30] audit: type=1400 audit(766.520:227): avc: denied { create } for pid=4905 comm="syz.1.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 767.126565][ T30] audit: type=1400 audit(766.530:228): avc: denied { write } for pid=4905 comm="syz.1.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 767.185351][ T30] audit: type=1400 audit(766.590:229): avc: denied { read } for pid=4905 comm="syz.1.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 767.613381][ T30] audit: type=1400 audit(767.020:230): avc: denied { read write } for pid=4907 comm="syz.1.453" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 767.615771][ T30] audit: type=1400 audit(767.020:231): avc: denied { open } for pid=4907 comm="syz.1.453" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 767.685564][ T30] audit: type=1400 audit(767.090:232): avc: denied { ioctl } for pid=4907 comm="syz.1.453" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0xaf00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 775.812247][ T30] audit: type=1400 audit(775.220:233): avc: denied { write } for pid=4935 comm="syz.1.463" name="virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 776.087632][ T30] audit: type=1400 audit(775.500:234): avc: denied { ioctl } for pid=4935 comm="syz.1.463" path="/dev/virtual_nci" dev="devtmpfs" ino=672 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 776.855710][ T30] audit: type=1400 audit(776.270:235): avc: denied { create } for pid=4944 comm="syz.0.465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 781.149827][ T4937] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 794.935432][ T30] audit: type=1400 audit(794.340:236): avc: denied { ioctl } for pid=5006 comm="syz.1.485" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=9572 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 800.817839][ T30] audit: type=1400 audit(800.220:237): avc: denied { create } for pid=5030 comm="syz.0.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 800.859568][ T30] audit: type=1400 audit(800.270:238): avc: denied { read } for pid=5030 comm="syz.0.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 807.389258][ T30] audit: type=1400 audit(806.790:239): avc: denied { read } for pid=5044 comm="syz.1.498" path="socket:[9642]" dev="sockfs" ino=9642 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 810.647474][ T5051] serio: Serial port pts0 [ 818.258453][ T5067] serio: Serial port pts1 [ 842.575565][ T30] audit: type=1400 audit(841.880:240): avc: denied { setopt } for pid=5118 comm="syz.1.519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 842.577337][ T30] audit: type=1400 audit(841.920:241): avc: denied { ioctl } for pid=5118 comm="syz.1.519" path="socket:[8937]" dev="sockfs" ino=8937 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 843.002776][ T5121] serio: Serial port pts0 [ 845.849189][ T30] audit: type=1400 audit(845.260:242): avc: denied { read } for pid=5132 comm="syz.1.524" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 845.856435][ T30] audit: type=1400 audit(845.260:243): avc: denied { open } for pid=5132 comm="syz.1.524" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 845.911330][ T30] audit: type=1400 audit(845.320:244): avc: denied { ioctl } for pid=5132 comm="syz.1.524" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 858.674836][ T5161] serio: Serial port pts0 [ 861.572237][ T30] audit: type=1400 audit(860.980:245): avc: denied { getopt } for pid=5173 comm="syz.0.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 869.081386][ T5206] process 'syz.0.550' launched './file1' with NULL argv: empty string added [ 869.119450][ T30] audit: type=1400 audit(868.510:246): avc: denied { execute_no_trans } for pid=5205 comm="syz.0.550" path="/89/file1" dev="tmpfs" ino=525 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 872.157618][ T3408] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 872.581115][ T30] audit: type=1400 audit(871.990:247): avc: denied { bind } for pid=5216 comm="syz.1.554" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 872.595533][ T30] audit: type=1400 audit(871.990:248): avc: denied { node_bind } for pid=5216 comm="syz.1.554" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 872.602250][ T30] audit: type=1400 audit(872.010:249): avc: denied { connect } for pid=5216 comm="syz.1.554" laddr=172.20.20.170 lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 872.809187][ T3408] usb 1-1: config 0 has no interfaces? [ 872.810806][ T3408] usb 1-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 872.811606][ T3408] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 872.887665][ T3408] usb 1-1: config 0 descriptor?? [ 874.131885][ T29] usb 1-1: USB disconnect, device number 2 [ 900.430797][ T5333] serio: Serial port pts0 [ 910.375768][ T5364] serio: Serial port pts1 [ 930.820345][ T5421] serio: Serial port pts0 [ 936.745869][ T5446] serio: Serial port pts0 [ 944.878261][ T30] audit: type=1400 audit(944.270:250): avc: denied { read } for pid=5461 comm="syz.1.634" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 944.880019][ T30] audit: type=1400 audit(944.280:251): avc: denied { open } for pid=5461 comm="syz.1.634" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 944.932092][ T30] audit: type=1400 audit(944.330:252): avc: denied { ioctl } for pid=5461 comm="syz.1.634" path="/dev/usbmon0" dev="devtmpfs" ino=695 ioctlcmd=0x9205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 946.127653][ T30] audit: type=1400 audit(945.530:253): avc: denied { accept } for pid=5463 comm="syz.1.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 963.287600][ T30] audit: type=1400 audit(962.680:254): avc: denied { append } for pid=5520 comm="syz.1.654" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 969.348375][ T5547] serio: Serial port pts0 [ 975.478253][ T30] audit: type=1400 audit(974.870:255): avc: denied { ioctl } for pid=5564 comm="syz.0.667" path="socket:[10617]" dev="sockfs" ino=10617 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 977.281425][ T5567] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 983.166761][ T5588] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=5588 comm=syz.0.674 [ 993.903373][ T5632] serio: Serial port pts0 [ 996.843381][ T30] audit: type=1400 audit(996.250:256): avc: denied { map } for pid=5641 comm="syz.0.693" path="socket:[10765]" dev="sockfs" ino=10765 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 996.857882][ T30] audit: type=1400 audit(996.250:257): avc: denied { read } for pid=5641 comm="syz.0.693" path="socket:[10765]" dev="sockfs" ino=10765 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1001.742548][ T5667] syz.1.701 uses obsolete (PF_INET,SOCK_PACKET) [ 1002.459618][ T5670] serio: Serial port pts0 [ 1004.022118][ T5676] serio: Serial port pts1 [ 1011.607088][ T30] audit: type=1400 audit(1011.010:258): avc: denied { write } for pid=5688 comm="syz.1.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1022.026185][ T5714] can: request_module (can-proto-0) failed. [ 1036.357388][ T5770] serio: Serial port pts0 [ 1037.747033][ T5777] serio: Serial port pts1 [ 1051.890851][ T5783] serio: Serial port pts0 [ 1076.933649][ T5863] trusted_key: syz.0.767 sent an empty control message without MSG_MORE. [ 1076.996828][ T5863] kernel profiling enabled (shift: 17) [ 1085.795307][ T5899] serio: Serial port pts0 [ 1092.172420][ T5916] serio: Serial port pts0 [ 1096.742809][ T5931] serio: Serial port pts1 [ 1113.730431][ T5953] serio: Serial port pts0 [ 1125.203116][ T30] audit: type=1400 audit(1124.610:259): avc: denied { create } for pid=5977 comm="syz.1.800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1130.611412][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1132.513152][ T30] audit: type=1400 audit(1131.920:260): avc: denied { write } for pid=6003 comm="syz.1.809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1134.122359][ T6012] block nbd1: NBD_DISCONNECT [ 1134.131580][ T6012] block nbd1: Disconnected due to user request. [ 1134.132760][ T6012] block nbd1: shutting down sockets [ 1143.930509][ T6045] serio: Serial port pts0 [ 1151.826282][ T30] audit: type=1400 audit(1151.230:261): avc: denied { write } for pid=6076 comm="syz.1.835" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1151.893477][ T30] audit: type=1400 audit(1151.300:262): avc: denied { setopt } for pid=6076 comm="syz.1.835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1154.506017][ T6085] serio: Serial port pts0 [ 1169.870958][ T6101] serio: Serial port pts0 [ 1185.325647][ T6138] serio: Serial port pts0 [ 1204.598211][ T6153] serio: Serial port pts0 [ 1216.317660][ T6210] serio: Serial port pts0 [ 1218.375547][ T6219] serio: Serial port pts1 [ 1232.783005][ T30] audit: type=1400 audit(1232.170:263): avc: denied { read write } for pid=6226 comm="syz.0.880" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1232.847492][ T30] audit: type=1400 audit(1232.250:264): avc: denied { open } for pid=6226 comm="syz.0.880" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1233.007296][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.009319][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.010134][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.010927][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.011726][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.012538][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.013353][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.016964][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.017854][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.018755][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.019553][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.020465][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.021339][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.022149][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.022948][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.025220][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.026120][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.027128][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.027921][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.029038][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.029871][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.030657][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.031522][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.032357][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.033194][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.035832][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.036668][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.037510][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.038604][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.039520][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.040425][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.041243][ T5696] hid-generic 0000:04AD:0000.0001: unknown main item tag 0x0 [ 1233.108129][ T5696] hid-generic 0000:04AD:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 1233.516530][ T1881] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 1233.719626][ T1881] usb 1-1: config 0 has no interfaces? [ 1233.720700][ T1881] usb 1-1: New USB device found, idVendor=1a34, idProduct=0802, bcdDevice= 0.00 [ 1233.721555][ T1881] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1233.782202][ T1881] usb 1-1: config 0 descriptor?? [ 1234.186325][ T29] usb 1-1: USB disconnect, device number 3 [ 1238.360888][ T6251] serio: Serial port pts0 [ 1245.479804][ T6266] serio: Serial port pts1 [ 1262.742400][ T6303] serio: Serial port pts0 [ 1281.787305][ T6329] serio: Serial port pts0 [ 1304.938079][ T149] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1305.465638][ T149] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1305.802583][ T149] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1306.102603][ T149] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1311.660119][ T149] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1311.768669][ T149] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1311.873067][ T149] bond0 (unregistering): Released all slaves [ 1312.474297][ T149] hsr_slave_0: left promiscuous mode [ 1312.533408][ T149] hsr_slave_1: left promiscuous mode [ 1312.698697][ T149] veth1_macvtap: left promiscuous mode [ 1312.700193][ T149] veth0_macvtap: left promiscuous mode [ 1312.702035][ T149] veth1_vlan: left promiscuous mode [ 1312.703458][ T149] veth0_vlan: left promiscuous mode [ 1322.016462][ T6391] serio: Serial port pts0 [ 1328.818728][ T6359] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1328.907216][ T6359] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1333.209622][ T6359] hsr_slave_0: entered promiscuous mode [ 1333.247282][ T6359] hsr_slave_1: entered promiscuous mode [ 1337.518653][ T6359] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1337.630475][ T6359] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1337.691431][ T6359] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1337.747281][ T6359] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1341.912957][ T6359] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1344.567316][ T30] audit: type=1400 audit(1343.870:265): avc: denied { sqpoll } for pid=6478 comm="syz.0.932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1349.758693][ T6505] serio: Serial port pts0 [ 1355.636614][ T6359] veth0_vlan: entered promiscuous mode [ 1355.721055][ T6359] veth1_vlan: entered promiscuous mode [ 1356.042051][ T6359] veth0_macvtap: entered promiscuous mode [ 1356.135126][ T6359] veth1_macvtap: entered promiscuous mode [ 1356.752836][ T6359] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1356.756805][ T6359] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1356.757323][ T6359] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1356.757700][ T6359] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1357.601299][ T30] audit: type=1400 audit(1357.010:266): avc: denied { unmount } for pid=6359 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1377.111225][ T30] audit: type=1400 audit(1376.510:267): avc: denied { watch watch_reads } for pid=6601 comm="syz.1.959" path="/proc/45" dev="proc" ino=14402 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1378.161151][ T6606] serio: Serial port pts0 [ 1382.367490][ T3408] usb 1-1: new full-speed USB device number 4 using dummy_hcd [ 1382.740162][ T3408] usb 1-1: not running at top speed; connect to a high speed hub [ 1382.769200][ T3408] usb 1-1: config 1 interface 0 altsetting 1 endpoint 0x81 has invalid maxpacket 1023, setting to 64 [ 1382.770888][ T3408] usb 1-1: config 1 interface 0 altsetting 1 endpoint 0x2 has invalid maxpacket 528, setting to 64 [ 1382.772026][ T3408] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1382.936212][ T3408] usb 1-1: New USB device found, idVendor=046d, idProduct=c626, bcdDevice= 0.40 [ 1382.937543][ T3408] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1382.938406][ T3408] usb 1-1: Product: ᲋ޒᖄꃊ་ꓼ肟데પ꟭セ֨됤꿾﫮⒏혿碉襫軴 [ 1382.939223][ T3408] usb 1-1: Manufacturer: ࠒ [ 1382.939918][ T3408] usb 1-1: SerialNumber: 䈚⛺Ⳛ걉ۃ粍븧諸暏⩰뤻ꮱ梒糉긻Ἡ잶鮃발힟柞돬礛좒봎䖡㧸盪蠲➂됏泣⵷琔飪㮧ኻ숨ﱗ┵段ᴘ➖약塿子癄侹嘫૵햗熯㣸䅾┠5钧⊠ [ 1383.055716][ T6618] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1383.090240][ T6618] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1383.526634][ T3408] usbhid 1-1:1.0: can't add hid device: -71 [ 1383.530183][ T3408] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 1383.610511][ T3408] usb 1-1: USB disconnect, device number 4 [ 1384.778587][ T30] audit: type=1400 audit(1384.190:268): avc: denied { setopt } for pid=6622 comm="syz.0.964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1386.258935][ T6628] serio: Serial port pts1 [ 1394.241819][ T6635] serio: Serial port pts0 [ 1401.746657][ T6640] serio: Serial port pts1 [ 1409.991791][ T6647] serio: Serial port pts0 [ 1412.857148][ T6651] serio: Serial port pts1 [ 1415.656291][ T6656] serio: Serial port pts1 [ 1431.375788][ T30] audit: type=1400 audit(1430.780:269): avc: denied { read } for pid=6667 comm="syz.1.973" dev="nsfs" ino=4026532630 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1431.380755][ T30] audit: type=1400 audit(1430.790:270): avc: denied { open } for pid=6667 comm="syz.1.973" path="net:[4026532630]" dev="nsfs" ino=4026532630 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1443.331886][ T6721] serio: Serial port pts0 [ 1458.683675][ T6753] serio: Serial port pts0 [ 1479.297032][ T30] audit: type=1400 audit(1478.700:271): avc: denied { read } for pid=6821 comm="syz.0.1025" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1479.303283][ T30] audit: type=1400 audit(1478.700:272): avc: denied { open } for pid=6821 comm="syz.0.1025" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1479.371976][ T6822] raw_sendmsg: syz.0.1025 forgot to set AF_INET. Fix it! [ 1487.766872][ T6866] serio: Serial port pts0 [ 1488.835579][ T6871] serio: Serial port pts1 [ 1498.083366][ T6888] serio: Serial port pts0 [ 1508.236978][ T6903] serio: Serial port pts1 [ 1521.815336][ T6930] serio: Serial port pts0 [ 1538.913608][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1539.321182][ T7012] capability: warning: `syz.0.1085' uses 32-bit capabilities (legacy support in use) [ 1544.340009][ T30] audit: type=1400 audit(1543.740:273): avc: denied { create } for pid=7029 comm="syz.0.1091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1544.450026][ T30] audit: type=1400 audit(1543.840:274): avc: denied { write } for pid=7029 comm="syz.0.1091" path="socket:[16091]" dev="sockfs" ino=16091 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1545.108110][ T7036] serio: Serial port pts0 [ 1563.669659][ T30] audit: type=1400 audit(1563.080:275): avc: denied { block_suspend } for pid=7093 comm="syz.1.1110" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1565.960786][ T7080] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 1570.463597][ T30] audit: type=1400 audit(1569.870:276): avc: denied { ioctl } for pid=7116 comm="syz.0.1119" path="socket:[16235]" dev="sockfs" ino=16235 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1574.935224][ T7142] serio: Serial port pts0 [ 1578.718551][ T7154] serio: Serial port pts1 [ 1590.397689][ T7160] serio: Serial port pts0 [ 1609.202453][ T30] audit: type=1400 audit(1608.610:277): avc: denied { accept } for pid=7203 comm="syz.0.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1609.242710][ T30] audit: type=1400 audit(1608.640:278): avc: denied { read } for pid=7203 comm="syz.0.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1611.583690][ T7217] serio: Serial port pts0 [ 1612.637958][ T7221] serio: Serial port pts1 [ 1639.908824][ T7277] serio: Serial port pts0 [ 1647.521517][ T30] audit: type=1400 audit(1646.930:279): avc: denied { ioctl } for pid=7298 comm="syz.0.1174" path="socket:[16549]" dev="sockfs" ino=16549 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1674.509231][ T30] audit: type=1400 audit(1673.920:280): avc: denied { ioctl } for pid=7421 comm="syz.1.1219" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1683.121813][ T30] audit: type=1400 audit(1682.520:281): avc: denied { relabelfrom } for pid=7452 comm="syz.1.1230" name="NETLINK" dev="sockfs" ino=17684 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1683.148484][ T30] audit: type=1400 audit(1682.550:282): avc: denied { relabelto } for pid=7452 comm="syz.1.1230" name="NETLINK" dev="sockfs" ino=17684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_netfilter_socket permissive=1 [ 1687.534658][ T7476] serio: Serial port pts0 [ 1688.597608][ T7479] serio: Serial port pts1 [ 1703.989569][ T7517] serio: Serial port pts0 [ 1723.825595][ T7578] serio: Serial port pts0 [ 1732.867861][ T3366] usb 1-1: new full-speed USB device number 5 using dummy_hcd [ 1733.138814][ T3366] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1733.170641][ T3366] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 1733.171784][ T3366] usb 1-1: can't read configurations, error -71 [ 1739.220354][ T30] audit: type=1400 audit(1738.610:283): avc: denied { setopt } for pid=7620 comm="syz.1.1286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1749.289565][ T30] audit: type=1400 audit(1748.700:284): avc: denied { create } for pid=7662 comm="syz.1.1301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1750.670283][ T7670] serio: Serial port pts0 [ 1753.158931][ T7681] serio: Serial port pts0 [ 1753.926081][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1755.266249][ T7691] serio: Serial port pts1 [ 1756.248790][ T7694] serio: Serial port pts0 [ 1770.487430][ T7701] serio: Serial port pts1 [ 1777.042808][ T7721] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7721 comm=syz.1.1318 [ 1788.308489][ T7758] loop7: detected capacity change from 0 to 16384 [ 1789.446300][ T7758] I/O error, dev loop7, sector 3712 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 1789.450866][ T7758] I/O error, dev loop7, sector 3712 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1789.452426][ T7758] Buffer I/O error on dev loop7, logical block 464, async page read [ 1789.643189][ T7757] I/O error, dev loop7, sector 1920 op 0x1:(WRITE) flags 0x4800 phys_seg 128 prio class 0 [ 1789.655525][ T7757] Buffer I/O error on dev loop7, logical block 240, lost async page write [ 1789.660146][ T7757] Buffer I/O error on dev loop7, logical block 241, lost async page write [ 1789.661501][ T7757] Buffer I/O error on dev loop7, logical block 242, lost async page write [ 1789.662885][ T7757] Buffer I/O error on dev loop7, logical block 243, lost async page write [ 1789.677147][ T7757] Buffer I/O error on dev loop7, logical block 244, lost async page write [ 1789.679046][ T7757] Buffer I/O error on dev loop7, logical block 245, lost async page write [ 1789.680284][ T7757] Buffer I/O error on dev loop7, logical block 246, lost async page write [ 1789.681371][ T7757] Buffer I/O error on dev loop7, logical block 247, lost async page write [ 1789.682479][ T7757] Buffer I/O error on dev loop7, logical block 248, lost async page write [ 1790.021323][ T7757] I/O error, dev loop7, sector 2944 op 0x1:(WRITE) flags 0x800 phys_seg 96 prio class 0 [ 1798.289584][ T7800] serio: Serial port pts0 [ 1799.019007][ T7804] serio: Serial port pts1 [ 1825.890737][ T30] audit: type=1400 audit(1825.300:285): avc: denied { mounton } for pid=7848 comm="syz.0.1361" path="/proc/1546/task" dev="proc" ino=18230 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1828.807654][ T7867] serio: Serial port pts0 [ 1829.170560][ T7869] serio: Serial port pts1 [ 1834.621476][ T7882] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=7882 comm=syz.0.1370 [ 1834.691780][ T7882] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1543 sclass=netlink_route_socket pid=7882 comm=syz.0.1370 [ 1841.236058][ T7896] serio: Serial port pts0 [ 1859.172289][ T7925] serio: Serial port pts0 [ 1859.203501][ T30] audit: type=1400 audit(1858.610:286): avc: denied { remove_name } for pid=3080 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1859.219934][ T30] audit: type=1400 audit(1858.620:287): avc: denied { rename } for pid=3080 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1859.221028][ T30] audit: type=1400 audit(1858.620:288): avc: denied { create } for pid=3080 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1878.663688][ T7958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7958 comm=syz.1.1393 [ 1881.706856][ T7974] serio: Serial port pts0 [ 1889.960998][ T8010] serio: Serial port pts0 [ 1895.344730][ T8031] serio: Serial port pts1 [ 1913.326348][ T30] audit: type=1400 audit(1912.730:289): avc: denied { ioctl } for pid=8075 comm="syz.0.1428" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1920.991293][ T8110] input: syz1 as /devices/virtual/input/input2 [ 1922.871950][ T30] audit: type=1400 audit(1922.280:290): avc: denied { mounton } for pid=8119 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1923.031202][ T149] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1923.433749][ T149] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1923.871385][ T149] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1924.250561][ T149] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1928.280358][ T30] audit: type=1400 audit(1927.690:291): avc: denied { bind } for pid=8139 comm="syz.1.1448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1928.301167][ T30] audit: type=1400 audit(1927.710:292): avc: denied { write } for pid=8139 comm="syz.1.1448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1929.562601][ T149] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1929.715516][ T149] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1929.785700][ T149] bond0 (unregistering): Released all slaves [ 1930.180707][ T149] hsr_slave_0: left promiscuous mode [ 1930.239616][ T149] hsr_slave_1: left promiscuous mode [ 1930.551669][ T149] veth1_macvtap: left promiscuous mode [ 1930.553629][ T149] veth0_macvtap: left promiscuous mode [ 1930.566879][ T149] veth1_vlan: left promiscuous mode [ 1930.569271][ T149] veth0_vlan: left promiscuous mode [ 1944.385135][ T8174] serio: Serial port pts0 [ 1947.096291][ T8119] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1947.162638][ T8119] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1952.187221][ T8119] hsr_slave_0: entered promiscuous mode [ 1952.244846][ T8119] hsr_slave_1: entered promiscuous mode [ 1952.286948][ T8119] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1952.287675][ T8119] Cannot create hsr debugfs directory [ 1957.119063][ T8119] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1957.226146][ T8119] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1957.270046][ T8119] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1957.338029][ T8119] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1962.087612][ T8119] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1962.706926][ T8233] serio: Serial port pts0 [ 1966.191341][ T8249] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8249 comm=syz.1.1457 [ 1969.617709][ T8265] serio: Serial port pts0 [ 1978.257860][ T8119] veth0_vlan: entered promiscuous mode [ 1978.447275][ T8119] veth1_vlan: entered promiscuous mode [ 1978.907108][ T8119] veth0_macvtap: entered promiscuous mode [ 1979.002862][ T8119] veth1_macvtap: entered promiscuous mode [ 1979.576289][ T8119] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1979.577283][ T8119] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1979.578118][ T8119] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1979.578840][ T8119] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1985.828437][ T30] audit: type=1400 audit(1985.240:293): avc: denied { write } for pid=8307 comm="syz.1.1466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2014.443068][ T8408] serio: Serial port pts0 [ 2015.133077][ T30] audit: type=1400 audit(2014.540:294): avc: denied { name_bind } for pid=8412 comm="syz.1.1497" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 2015.162224][ T30] audit: type=1400 audit(2014.560:295): avc: denied { map } for pid=8412 comm="syz.1.1497" path="socket:[20240]" dev="sockfs" ino=20240 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2015.167287][ T30] audit: type=1400 audit(2014.570:296): avc: denied { read } for pid=8412 comm="syz.1.1497" path="socket:[20240]" dev="sockfs" ino=20240 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2025.576314][ T8442] serio: Serial port pts1 [ 2041.313513][ T8500] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 2048.162307][ T8530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=8530 comm=syz.0.1536 [ 2048.179708][ T8530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=8530 comm=syz.0.1536 [ 2048.183603][ T8530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8530 comm=syz.0.1536 [ 2048.727794][ T30] audit: type=1400 audit(2048.140:297): avc: denied { read } for pid=8527 comm="syz.1.1535" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 2048.730599][ T30] audit: type=1400 audit(2048.140:298): avc: denied { open } for pid=8527 comm="syz.1.1535" path="/280/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 2048.959840][ T8534] block device autoloading is deprecated and will be removed. [ 2048.979255][ T30] audit: type=1400 audit(2048.380:299): avc: denied { ioctl } for pid=8527 comm="syz.1.1535" path="/280/file0/file0" dev="fuse" ino=0 ioctlcmd=0x921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 2054.952700][ T8560] serio: Serial port pts0 [ 2060.251995][ T8580] serio: Serial port pts1 [ 2070.257403][ T8586] serio: Serial port pts0 [ 2086.538328][ T30] audit: type=1400 audit(2085.950:300): avc: denied { write } for pid=8625 comm="syz.1.1567" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2096.466938][ T8660] serio: Serial port pts0 [ 2100.780309][ T8673] serio: Serial port pts1 [ 2115.345384][ T8683] serio: Serial port pts0 [ 2132.899104][ T30] audit: type=1400 audit(2132.300:301): avc: denied { ioctl } for pid=8708 comm="syz.0.1591" path="socket:[21063]" dev="sockfs" ino=21063 ioctlcmd=0x5462 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2168.140008][ T8833] serio: Serial port pts0 [ 2179.631177][ T30] audit: type=1400 audit(2179.040:302): avc: denied { create } for pid=8868 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2179.652370][ T30] audit: type=1400 audit(2179.050:303): avc: denied { write open } for pid=8868 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=4281 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2179.653645][ T30] audit: type=1400 audit(2179.060:304): avc: denied { append } for pid=8868 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=4281 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2179.682587][ T30] audit: type=1400 audit(2179.090:305): avc: denied { getattr } for pid=8868 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2180.139667][ T30] audit: type=1400 audit(2179.550:306): avc: denied { read } for pid=8872 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2180.835717][ T30] audit: type=1400 audit(2180.230:307): avc: denied { unlink } for pid=8873 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=4281 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2203.481181][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2216.593618][ T9017] serio: Serial port pts0 [ 2218.369797][ T30] audit: type=1400 audit(2217.780:308): avc: denied { getopt } for pid=9024 comm="syz.1.1692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2238.845210][ T9093] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=9093 comm=syz.0.1715 [ 2238.870570][ T9093] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=9093 comm=syz.0.1715 [ 2251.325355][ T30] audit: type=1400 audit(2250.730:309): avc: denied { mount } for pid=9148 comm="syz.1.1736" name="/" dev="hugetlbfs" ino=22492 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 2254.636424][ T9166] serio: Serial port pts0 [ 2256.396988][ T30] audit: type=1400 audit(2255.810:310): avc: denied { connect } for pid=9171 comm="syz.0.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2256.451740][ T9172] ------------[ cut here ]------------ [ 2256.456142][ T9172] refcount_t: underflow; use-after-free. [ 2256.459802][ T9172] WARNING: CPU: 0 PID: 9172 at lib/refcount.c:28 refcount_warn_saturate+0x138/0x19c [ 2256.462558][ T9172] Modules linked in: [ 2256.466786][ T9172] CPU: 0 UID: 0 PID: 9172 Comm: syz.0.1746 Not tainted 6.12.0-rc1-syzkaller-00165-g360c1f1f24c6 #0 [ 2256.468041][ T9172] Hardware name: linux,dummy-virt (DT) [ 2256.469066][ T9172] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 2256.469845][ T9172] pc : refcount_warn_saturate+0x138/0x19c [ 2256.470634][ T9172] lr : refcount_warn_saturate+0x138/0x19c [ 2256.471228][ T9172] sp : ffff80008fc676c0 [ 2256.471783][ T9172] x29: ffff80008fc676c0 x28: ffff00001c290adc x27: 0000000000000002 [ 2256.473245][ T9172] x26: 1fffe00002f92300 x25: 1fffe00002f92318 x24: ffff000017c918c2 [ 2256.474769][ T9172] x23: ffff00001c290adc x22: 0000000000000000 x21: ffff800084d67e94 [ 2256.475776][ T9172] x20: ffff00001c290adc x19: 0000000000000003 x18: 0000000094e64b70 [ 2256.476806][ T9172] x17: 0000000000000000 x16: 0000000000000000 x15: ffff00000fb52880 [ 2256.477866][ T9172] x14: 1fffe00001f6a50f x13: 1fffe00001f6a519 x12: ffff600002f4a601 [ 2256.478843][ T9172] x11: 1fffe00002f4a600 x10: ffff600002f4a600 x9 : dfff800000000000 [ 2256.479864][ T9172] x8 : ffff000017a53003 x7 : 0000000000000001 x6 : ffff600002f4a600 [ 2256.480759][ T9172] x5 : ffff000017a53000 x4 : ffff600002f4a601 x3 : ffff800080230758 [ 2256.481696][ T9172] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00000fb51e00 [ 2256.482916][ T9172] Call trace: [ 2256.483428][ T9172] refcount_warn_saturate+0x138/0x19c [ 2256.484085][ T9172] sk_skb_reason_drop+0x154/0x174 [ 2256.484636][ T9172] j1939_session_destroy+0x104/0x36c [ 2256.485269][ T9172] j1939_session_put+0x80/0xac [ 2256.485791][ T9172] j1939_sk_sendmsg+0xaf4/0xf60 [ 2256.486377][ T9172] __sock_sendmsg+0xc8/0x168 [ 2256.486883][ T9172] ____sys_sendmsg+0x54c/0x6dc [ 2256.487536][ T9172] ___sys_sendmsg+0x11c/0x19c [ 2256.488149][ T9172] __sys_sendmsg+0xe0/0x174 [ 2256.488970][ T9172] __arm64_sys_sendmsg+0x70/0xa0 [ 2256.489531][ T9172] invoke_syscall+0x6c/0x258 [ 2256.490067][ T9172] el0_svc_common.constprop.0+0xac/0x230 [ 2256.490634][ T9172] do_el0_svc+0x40/0x58 [ 2256.491121][ T9172] el0_svc+0x50/0x180 [ 2256.491619][ T9172] el0t_64_sync_handler+0x100/0x12c [ 2256.492161][ T9172] el0t_64_sync+0x190/0x194 [ 2256.493088][ T9172] irq event stamp: 632 [ 2256.493665][ T9172] hardirqs last enabled at (631): [] finish_task_switch.isra.0+0x1a8/0x8e0 [ 2256.494586][ T9172] hardirqs last disabled at (632): [] el1_dbg+0x24/0x9c [ 2256.495305][ T9172] softirqs last enabled at (616): [] handle_softirqs+0x878/0xd40 [ 2256.496108][ T9172] softirqs last disabled at (577): [] __do_softirq+0x14/0x20 [ 2256.496956][ T9172] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2258.358114][ T149] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2258.611735][ T149] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2258.892151][ T149] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2259.150387][ T149] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2263.044980][ T149] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2263.100737][ T149] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2263.166995][ T149] bond0 (unregistering): Released all slaves [ 2263.326172][ T149] hsr_slave_0: left promiscuous mode [ 2263.360081][ T149] hsr_slave_1: left promiscuous mode [ 2263.598201][ T149] veth1_macvtap: left promiscuous mode [ 2263.599133][ T149] veth0_macvtap: left promiscuous mode [ 2263.600560][ T149] veth1_vlan: left promiscuous mode [ 2263.601729][ T149] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 06:55:00 Registers: info registers vcpu 0 CPU#0 PC=ffff8000803bcce4 X00=ffff00000fb51e00 X01=0000000000000000 X02=0000000000000000 X03=0000000000000000 X04=1fffe00001f6a3c1 X05=ffff000069f95490 X06=ffff60000d3f2a92 X07=0000000000000001 X08=ffff000069f95493 X09=dfff800000000000 X10=ffff60000d3f2a92 X11=1fffe0000d3f2a92 X12=ffff60000d3f2a93 X13=1fffe00001f6a519 X14=1fffe00001f6a50f X15=ffff00000fb52880 X16=0000000000000000 X17=0000000000000000 X18=0000000094e64b70 X19=ffff00000fb51e00 X20=dfff800000000000 X21=ffff800086e05ca0 X22=ffff80008fc67570 X23=ffff8000812e1420 X24=ffff8000852708a0 X25=1ffff00011f8ce58 X26=ffff00000fb51e00 X27=0000000000000003 X28=1ffff000110a3409 X29=ffff80008fc67270 X30=ffff8000803bccb8 SP=ffff80008fc67270 PSTATE=600003c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0200000000000000:0200000000000000 Q01=0000000200000000:0000000000000000 Q02=0000000000000002:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000002:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff739d280:0000fffff739d280 Q17=ffffff80ffffffd0:0000fffff739d250 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000803d23a8 X00=ffff000018865418 X01=0000000000000004 X02=ffff000069fba1a0 X03=0000000000000000 X04=0000000000000000 X05=0000000000000001 X06=0000000000000000 X07=0000000000000000 X08=ffff80008cd87de0 X09=dfff800000000000 X10=ffff7000119b0fbb X11=1ffff000119b0fbb X12=ffff7000119b0fbc X13=1fffe00002819154 X14=1fffe0000281914f X15=ffff0000140c8a80 X16=ffff80008cd80000 X17=ffff7fffe3425000 X18=00000000ffffffff X19=ffff80008cc5ba28 X20=0000000000000001 X21=0000000000000000 X22=0000000000000000 X23=0000000000000000 X24=ffff800086bef000 X25=0000000000000000 X26=0000000000000000 X27=0000000000000000 X28=ffff0000140c8000 X29=ffff80008cd87860 X30=ffff8000802f6a24 SP=ffff80008cd876e0 PSTATE=000000c5 ---- EL1h FPCR=00000000 FPSR=00000000 Q00=0200000000000000:0200000000000000 Q01=0000000200000000:0000000000000000 Q02=0000000000000002:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000002:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff9ee2ab0:0000fffff9ee2ab0 Q17=ffffff80ffffffd0:0000fffff9ee2a80 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000