last executing test programs: 20.508146857s ago: executing program 0 (id=3071): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) r1 = io_uring_setup(0x40c7, &(0x7f0000001440)) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={0x0}}, 0x0) close(r0) close(r1) socket$unix(0x1, 0x2, 0x0) 18.977973323s ago: executing program 0 (id=3072): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='freezer.state\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[], 0x33fe0}}, 0x0) r1 = io_uring_setup(0x1049, &(0x7f00000002c0)) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) close(r1) close(r0) syz_io_uring_setup(0x1715, &(0x7f0000000100), 0x0, 0x0) 18.847842698s ago: executing program 1 (id=3073): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[], 0x33fe0}}, 0x0) r2 = io_uring_setup(0x104c, &(0x7f00000003c0)) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) close(r2) 17.237053959s ago: executing program 1 (id=3074): r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = fcntl$dupfd(r2, 0x0, r0) r4 = accept$inet(r3, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r4, 0x5421, &(0x7f0000000340)) 17.236776849s ago: executing program 0 (id=3075): close(0xffffffffffffffff) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='blkio.bfq.time_recursive\x00', 0x26e1, 0x0) close(r1) socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) accept$inet(r1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 16.675076588s ago: executing program 1 (id=3076): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = dup(r1) ioctl$SNAPSHOT_SET_SWAP_AREA(r2, 0x400c330d, 0x0) syz_usb_connect(0x0, 0x0, 0x0, 0x0) 15.894917988s ago: executing program 0 (id=3077): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup2(r1, r0) r2 = socket$inet6(0xa, 0x1, 0x0) dup3(r0, r2, 0x0) accept4$inet6(r2, 0x0, 0x0, 0x0) 15.357333682s ago: executing program 0 (id=3078): r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) close(r1) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) r3 = accept$inet6(r1, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) write$P9_RRENAMEAT(r3, 0x0, 0x0) 14.122032801s ago: executing program 0 (id=3079): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x801, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "0000000000000000000080ffffffffffff00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = dup(r1) ioctl$HIDIOCGREPORT(r2, 0x400c4807, 0x0) syz_usb_connect$printer(0x0, 0x59, 0x0, 0x0) 825.96073ms ago: executing program 1 (id=3080): r0 = landlock_create_ruleset(&(0x7f0000000040)={0x8868}, 0x10, 0x0) landlock_restrict_self(r0, 0x0) r1 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) openat$sequencer(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCMBIS(r2, 0x5416, 0x0) 432.807306ms ago: executing program 1 (id=3081): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000540)={0x4, 0x845b, 0xddbb, 0x5, 0x3}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, 0x0, 0x0) 0s ago: executing program 1 (id=3082): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r1}, 0x18) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3}, 0x18) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, r3}, 0x18) sendmsg$can_j1939(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)='data', 0x4}}, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/4, 0x4}], 0x1}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:30687' (ED25519) to the list of known hosts. [ 189.036914][ T30] audit: type=1400 audit(188.510:58): avc: denied { name_bind } for pid=3268 comm="sshd" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 189.528617][ T30] audit: type=1400 audit(189.000:59): avc: denied { execute } for pid=3270 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 189.538245][ T30] audit: type=1400 audit(189.010:60): avc: denied { execute_no_trans } for pid=3270 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 195.842113][ T30] audit: type=1400 audit(195.310:61): avc: denied { mounton } for pid=3270 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 195.865399][ T30] audit: type=1400 audit(195.330:62): avc: denied { mount } for pid=3270 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 195.899405][ T3270] cgroup: Unknown subsys name 'net' [ 195.924765][ T30] audit: type=1400 audit(195.400:63): avc: denied { unmount } for pid=3270 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 196.433179][ T3270] cgroup: Unknown subsys name 'cpuset' [ 196.492965][ T3270] cgroup: Unknown subsys name 'rlimit' [ 197.012811][ T30] audit: type=1400 audit(196.480:64): avc: denied { setattr } for pid=3270 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 197.020404][ T30] audit: type=1400 audit(196.490:65): avc: denied { mounton } for pid=3270 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 197.026289][ T30] audit: type=1400 audit(196.500:66): avc: denied { mount } for pid=3270 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 197.749773][ T3274] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 197.758972][ T30] audit: type=1400 audit(197.230:67): avc: denied { relabelto } for pid=3274 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 197.767324][ T30] audit: type=1400 audit(197.240:68): avc: denied { write } for pid=3274 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 197.934954][ T30] audit: type=1400 audit(197.400:69): avc: denied { read } for pid=3270 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 197.938056][ T30] audit: type=1400 audit(197.410:70): avc: denied { open } for pid=3270 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 197.968248][ T3270] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 209.760752][ T30] audit: type=1400 audit(209.230:71): avc: denied { execmem } for pid=3275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 209.870461][ T30] audit: type=1400 audit(209.340:72): avc: denied { read } for pid=3278 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 209.872957][ T30] audit: type=1400 audit(209.340:73): avc: denied { open } for pid=3277 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 209.890939][ T30] audit: type=1400 audit(209.360:74): avc: denied { mounton } for pid=3278 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 209.963045][ T30] audit: type=1400 audit(209.430:75): avc: denied { module_request } for pid=3277 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 210.180234][ T30] audit: type=1400 audit(209.650:76): avc: denied { sys_module } for pid=3277 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 217.961002][ T3277] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 217.991131][ T3278] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 218.018460][ T3277] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 218.035035][ T3278] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 221.539205][ T3278] hsr_slave_0: entered promiscuous mode [ 221.576682][ T3278] hsr_slave_1: entered promiscuous mode [ 222.108311][ T3277] hsr_slave_0: entered promiscuous mode [ 222.176986][ T3277] hsr_slave_1: entered promiscuous mode [ 222.239095][ T3277] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 222.245391][ T3277] Cannot create hsr debugfs directory [ 224.074438][ T30] audit: type=1400 audit(223.530:77): avc: denied { create } for pid=3278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 224.113198][ T30] audit: type=1400 audit(223.540:78): avc: denied { write } for pid=3278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 224.114269][ T30] audit: type=1400 audit(223.540:79): avc: denied { read } for pid=3278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 224.125460][ T3278] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 224.204523][ T3278] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 224.248896][ T3278] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 224.307022][ T3278] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 224.908309][ T3277] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 224.933537][ T3277] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 225.076706][ T3277] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 225.135096][ T3277] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 229.235242][ T3278] 8021q: adding VLAN 0 to HW filter on device bond0 [ 230.155123][ T3277] 8021q: adding VLAN 0 to HW filter on device bond0 [ 241.844737][ T3278] veth0_vlan: entered promiscuous mode [ 241.953436][ T3278] veth1_vlan: entered promiscuous mode [ 242.183996][ T3278] veth0_macvtap: entered promiscuous mode [ 242.255071][ T3278] veth1_macvtap: entered promiscuous mode [ 242.615967][ T3278] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 242.617236][ T3278] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 242.617756][ T3278] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 242.618132][ T3278] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 243.099907][ T30] audit: type=1400 audit(242.570:80): avc: denied { mount } for pid=3278 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 243.113467][ T30] audit: type=1400 audit(242.590:81): avc: denied { mounton } for pid=3278 comm="syz-executor" path="/syzkaller.QqH69R/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 243.152554][ T30] audit: type=1400 audit(242.620:82): avc: denied { mount } for pid=3278 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 243.195047][ T30] audit: type=1400 audit(242.650:83): avc: denied { mounton } for pid=3278 comm="syz-executor" path="/syzkaller.QqH69R/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 243.196916][ T30] audit: type=1400 audit(242.660:84): avc: denied { mounton } for pid=3278 comm="syz-executor" path="/syzkaller.QqH69R/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 243.220939][ T30] audit: type=1400 audit(242.690:85): avc: denied { unmount } for pid=3278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 243.237642][ T30] audit: type=1400 audit(242.710:86): avc: denied { mounton } for pid=3278 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 243.265241][ T30] audit: type=1400 audit(242.730:87): avc: denied { mount } for pid=3278 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 243.266134][ T30] audit: type=1400 audit(242.740:88): avc: denied { mounton } for pid=3278 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 243.270653][ T30] audit: type=1400 audit(242.740:89): avc: denied { mount } for pid=3278 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 243.617409][ T3278] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 243.718264][ T3277] veth0_vlan: entered promiscuous mode [ 243.955272][ T3277] veth1_vlan: entered promiscuous mode [ 244.815027][ T3277] veth0_macvtap: entered promiscuous mode [ 245.037385][ T3277] veth1_macvtap: entered promiscuous mode [ 245.669044][ T3277] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.670236][ T3277] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.670857][ T3277] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.684581][ T3277] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.107814][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 248.108025][ T30] audit: type=1400 audit(247.580:97): avc: denied { read write } for pid=3419 comm="syz.1.5" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 248.109998][ T30] audit: type=1400 audit(247.580:98): avc: denied { open } for pid=3419 comm="syz.1.5" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 248.199087][ T30] audit: type=1400 audit(247.610:99): avc: denied { ioctl } for pid=3419 comm="syz.1.5" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 248.201068][ T3421] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 248.247810][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.250331][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.251232][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.272582][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.273592][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.274416][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.275201][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.276003][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.276787][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.277554][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.278599][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.279486][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.280294][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.281073][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.295236][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.296465][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.297358][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.298229][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.299162][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.299976][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.300830][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.302736][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.303584][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.304403][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.305276][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.306222][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.307201][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.308050][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.308859][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.309839][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.310760][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.313070][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.313893][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.314716][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.315504][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.316332][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.317120][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.317904][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.318750][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.319515][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.320318][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.321153][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.322947][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.323739][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.324541][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.325466][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.326261][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.327188][ T3413] hid-generic 0000:0000:0003.0001: unknown main item tag 0x0 [ 248.460826][ T3413] hid-generic 0000:0000:0003.0001: hidraw0: HID v0.00 Device [syz0] on syz1 [ 248.649462][ T3421] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 255.202777][ T3452] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 255.264228][ T3452] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 258.694528][ T3469] serio: Serial port pts0 [ 267.033968][ T3496] serio: Serial port pts0 [ 269.522830][ T30] audit: type=1400 audit(268.990:100): avc: denied { prog_load } for pid=3505 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 269.541020][ T30] audit: type=1400 audit(269.000:101): avc: denied { bpf } for pid=3505 comm="syz.0.41" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 269.543640][ T30] audit: type=1400 audit(269.010:102): avc: denied { perfmon } for pid=3505 comm="syz.0.41" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 269.619039][ T30] audit: type=1400 audit(269.090:103): avc: denied { prog_run } for pid=3505 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 272.250569][ T30] audit: type=1400 audit(271.720:104): avc: denied { read write } for pid=3514 comm="syz.0.45" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 272.263937][ T30] audit: type=1400 audit(271.730:105): avc: denied { open } for pid=3514 comm="syz.0.45" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 272.569070][ T30] audit: type=1400 audit(272.020:106): avc: denied { unmount } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 273.264706][ T30] audit: type=1400 audit(272.740:107): avc: denied { name_bind } for pid=3516 comm="syz.0.46" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 273.270971][ T30] audit: type=1400 audit(272.740:108): avc: denied { node_bind } for pid=3516 comm="syz.0.46" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 273.312924][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 297.426768][ T30] audit: type=1400 audit(296.880:109): avc: denied { create } for pid=3569 comm="syz.1.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 297.525063][ T30] audit: type=1400 audit(297.000:110): avc: denied { bind } for pid=3569 comm="syz.1.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 297.538808][ T30] audit: type=1400 audit(297.010:111): avc: denied { listen } for pid=3569 comm="syz.1.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 297.540189][ T30] audit: type=1400 audit(297.010:112): avc: denied { connect } for pid=3569 comm="syz.1.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 297.609930][ T30] audit: type=1400 audit(297.080:113): avc: denied { write } for pid=3569 comm="syz.1.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 297.677376][ T30] audit: type=1400 audit(297.140:114): avc: denied { accept } for pid=3569 comm="syz.1.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 297.681176][ T3273] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 297.718845][ T30] audit: type=1400 audit(297.190:115): avc: denied { read } for pid=3569 comm="syz.1.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 297.883303][ T3273] usb 1-1: Using ep0 maxpacket: 32 [ 298.048670][ T3273] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 64 [ 298.050782][ T3273] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 298.068077][ T3273] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 298.069070][ T3273] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 298.073217][ T3273] usb 1-1: SerialNumber: syz [ 298.208134][ T3568] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 298.489103][ T3568] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 299.008089][ T3273] cdc_ether 1-1:1.0 usb0: register 'cdc_ether' at usb-dummy_hcd.0-1, CDC Ethernet Device, 42:42:42:42:42:42 [ 300.229089][ T30] audit: type=1400 audit(299.700:116): avc: denied { read } for pid=3126 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 305.935593][ T3273] usb 1-1: USB disconnect, device number 2 [ 306.118187][ T3273] cdc_ether 1-1:1.0 usb0: unregister 'cdc_ether' usb-dummy_hcd.0-1, CDC Ethernet Device [ 308.805204][ T30] audit: type=1400 audit(308.280:117): avc: denied { create } for pid=3603 comm="syz.0.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 308.823712][ T30] audit: type=1400 audit(308.300:118): avc: denied { read } for pid=3603 comm="syz.0.81" path="socket:[4093]" dev="sockfs" ino=4093 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 310.010498][ T30] audit: type=1400 audit(309.460:119): avc: denied { write } for pid=3603 comm="syz.0.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 310.078891][ T30] audit: type=1400 audit(309.550:120): avc: denied { create } for pid=3611 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 310.080991][ T3613] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 310.110906][ T30] audit: type=1400 audit(309.580:121): avc: denied { map_create } for pid=3611 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 310.147127][ T30] audit: type=1400 audit(309.620:122): avc: denied { map_read map_write } for pid=3611 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 310.172803][ T30] audit: type=1400 audit(309.640:123): avc: denied { bind } for pid=3611 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 310.196539][ T30] audit: type=1400 audit(309.670:124): avc: denied { name_bind } for pid=3611 comm="syz.1.83" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 310.207790][ T30] audit: type=1400 audit(309.670:125): avc: denied { node_bind } for pid=3611 comm="syz.1.83" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 315.373049][ T30] audit: type=1400 audit(314.840:126): avc: denied { getopt } for pid=3634 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 316.412997][ T3639] serio: Serial port pts0 [ 316.594533][ T3640] serio: Serial port pts1 [ 322.786656][ T30] audit: type=1400 audit(322.260:127): avc: denied { mounton } for pid=3648 comm="syz.0.96" path="/39/file0" dev="tmpfs" ino=239 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 324.427164][ T30] audit: type=1400 audit(323.870:128): avc: denied { read } for pid=3657 comm="syz.0.99" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 324.428945][ T30] audit: type=1400 audit(323.880:129): avc: denied { open } for pid=3657 comm="syz.0.99" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 324.443490][ T30] audit: type=1400 audit(323.900:130): avc: denied { ioctl } for pid=3657 comm="syz.0.99" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 325.081176][ T30] audit: type=1400 audit(324.550:131): avc: denied { read } for pid=3660 comm="syz.1.100" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 325.085132][ T30] audit: type=1400 audit(324.560:132): avc: denied { open } for pid=3660 comm="syz.1.100" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 326.986510][ T3670] serio: Serial port pts0 [ 331.382953][ T30] audit: type=1400 audit(330.850:133): avc: denied { bind } for pid=3682 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 333.457445][ T30] audit: type=1400 audit(332.930:134): avc: denied { mounton } for pid=3689 comm="syz.1.111" path="/64/bus" dev="tmpfs" ino=381 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 334.463163][ T30] audit: type=1400 audit(333.930:135): avc: denied { unmount } for pid=3278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 335.707506][ T30] audit: type=1400 audit(335.180:136): avc: denied { create } for pid=3697 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 336.293496][ T3700] serio: Serial port pts1 [ 345.043382][ T3718] serio: Serial port pts0 [ 345.949651][ T3721] : renamed from pim6reg1 [ 347.491980][ T30] audit: type=1400 audit(346.960:137): avc: denied { create } for pid=3725 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 347.509707][ T30] audit: type=1400 audit(346.980:138): avc: denied { read } for pid=3081 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 347.510918][ T30] audit: type=1400 audit(346.980:139): avc: denied { append } for pid=3081 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 347.514301][ T30] audit: type=1400 audit(346.980:140): avc: denied { open } for pid=3081 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 347.515205][ T30] audit: type=1400 audit(346.980:141): avc: denied { getattr } for pid=3081 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 347.537063][ T30] audit: type=1400 audit(346.990:142): avc: denied { ioctl } for pid=3725 comm="syz.0.124" path="socket:[4654]" dev="sockfs" ino=4654 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 347.555520][ T30] audit: type=1400 audit(347.030:143): avc: denied { bind } for pid=3725 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 347.573776][ T30] audit: type=1400 audit(347.050:144): avc: denied { write } for pid=3725 comm="syz.0.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 348.900528][ T3732] serio: Serial port pts1 [ 354.033127][ T3745] serio: Serial port pts0 [ 371.712587][ T30] audit: type=1400 audit(371.160:145): avc: denied { name_bind } for pid=3803 comm="syz.1.153" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 371.739240][ T3807] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 375.646267][ T3821] serio: Serial port pts0 [ 383.670447][ T30] audit: type=1400 audit(383.140:146): avc: denied { create } for pid=3847 comm="syz.1.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 385.336037][ T3856] serio: Serial port pts0 [ 392.053161][ T3882] serio: Serial port pts0 [ 392.427778][ T30] audit: type=1400 audit(391.900:147): avc: denied { create } for pid=3879 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 392.530253][ T30] audit: type=1400 audit(391.980:148): avc: denied { read } for pid=3879 comm="syz.0.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 401.090112][ T3907] serio: Serial port pts1 [ 408.228356][ T30] audit: type=1400 audit(407.700:149): avc: denied { write } for pid=3912 comm="syz.1.194" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 410.512285][ T30] audit: type=1400 audit(409.980:150): avc: denied { create } for pid=3919 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 418.595285][ T30] audit: type=1400 audit(418.050:151): avc: denied { block_suspend } for pid=3953 comm="syz.1.214" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 419.424558][ T3959] serio: Serial port pts0 [ 423.394612][ T3971] serio: Serial port pts1 [ 426.836520][ T3979] serio: Serial port pts0 [ 434.988219][ T4003] serio: Serial port pts0 [ 436.804932][ T30] audit: type=1400 audit(436.280:152): avc: denied { create } for pid=4013 comm="syz.0.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 436.838757][ T30] audit: type=1400 audit(436.310:153): avc: denied { ioctl } for pid=4013 comm="syz.0.233" path="socket:[5109]" dev="sockfs" ino=5109 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 437.592436][ T4018] serio: Serial port pts1 [ 449.113056][ T4058] serio: Serial port pts0 [ 456.530453][ T4075] serio: Serial port pts0 [ 461.133705][ T30] audit: type=1400 audit(460.600:154): avc: denied { read write } for pid=4093 comm="syz.0.265" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 461.137225][ T30] audit: type=1400 audit(460.610:155): avc: denied { open } for pid=4093 comm="syz.0.265" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 461.888971][ T4097] serio: Serial port pts1 [ 471.604454][ T4130] serio: Serial port pts0 [ 488.480151][ T30] audit: type=1400 audit(487.950:156): avc: denied { read } for pid=4169 comm="syz.1.296" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 488.484650][ T30] audit: type=1400 audit(487.950:157): avc: denied { open } for pid=4169 comm="syz.1.296" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 492.920544][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 495.816611][ T30] audit: type=1400 audit(495.290:158): avc: denied { create } for pid=4222 comm="syz.0.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 495.842087][ T30] audit: type=1400 audit(495.310:159): avc: denied { setopt } for pid=4222 comm="syz.0.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 495.859450][ T30] audit: type=1400 audit(495.330:160): avc: denied { ioctl } for pid=4222 comm="syz.0.318" path="socket:[6492]" dev="sockfs" ino=6492 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 498.195864][ T4236] serio: Serial port pts0 [ 499.785609][ T30] audit: type=1400 audit(499.260:161): avc: denied { setopt } for pid=4245 comm="syz.0.327" lport=141 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 503.781098][ T4261] serio: Serial port pts1 [ 526.495718][ T4352] serio: Serial port pts0 [ 530.144257][ T30] audit: type=1400 audit(529.610:162): avc: denied { ioctl } for pid=4361 comm="syz.0.376" path="socket:[6776]" dev="sockfs" ino=6776 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 540.174662][ T4388] serio: Serial port pts1 [ 543.724055][ T4398] serio: Serial port pts0 [ 556.354895][ T4424] serio: Serial port pts0 [ 571.351074][ T4486] serio: Serial port pts0 [ 572.095290][ T4491] serio: Serial port pts1 [ 577.527350][ T4498] serio: Serial port pts0 [ 585.593113][ T4525] serio: Serial port pts0 [ 591.539237][ T4542] serio: Serial port pts0 [ 591.782563][ T4544] serio: Serial port pts1 [ 601.609045][ T30] audit: type=1400 audit(601.080:163): avc: denied { create } for pid=4566 comm="syz.0.451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 605.310524][ T30] audit: type=1400 audit(604.780:164): avc: denied { mount } for pid=4580 comm="syz.0.457" name="/" dev="ramfs" ino=7156 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 605.732484][ T30] audit: type=1400 audit(605.200:165): avc: denied { write } for pid=4582 comm="syz.0.458" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 606.976996][ T4589] serio: Serial port pts0 [ 612.102668][ T4603] serio: Serial port pts1 [ 619.632042][ T4626] serio: Serial port pts0 [ 626.631172][ T4659] serio: Serial port pts0 [ 630.443496][ T30] audit: type=1400 audit(629.910:166): avc: denied { setopt } for pid=4668 comm="syz.1.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 630.449802][ T30] audit: type=1400 audit(629.920:167): avc: denied { connect } for pid=4668 comm="syz.1.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 631.577504][ T30] audit: type=1400 audit(631.030:168): avc: denied { ioctl } for pid=4668 comm="syz.1.487" path="socket:[8319]" dev="sockfs" ino=8319 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 632.068032][ T30] audit: type=1400 audit(631.540:169): avc: denied { write } for pid=4668 comm="syz.1.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 636.209945][ T30] audit: type=1400 audit(635.680:170): avc: denied { create } for pid=4683 comm="syz.1.492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 650.507443][ T30] audit: type=1400 audit(649.980:171): avc: denied { getopt } for pid=4751 comm="syz.1.521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 652.069657][ T30] audit: type=1400 audit(651.540:172): avc: denied { mounton } for pid=4758 comm="syz.1.524" path="/proc/613/task" dev="proc" ino=8494 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 652.082993][ T30] audit: type=1400 audit(651.550:173): avc: denied { mount } for pid=4758 comm="syz.1.524" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 658.332254][ T4784] serio: Serial port pts0 [ 659.165955][ T30] audit: type=1326 audit(658.630:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4780 comm="syz.1.533" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1267dc code=0x7fc00000 [ 664.417952][ T4808] capability: warning: `syz.0.542' uses deprecated v2 capabilities in a way that may be insecure [ 667.586414][ T4834] serio: Serial port pts0 [ 667.598895][ T4835] serio: Serial port pts1 [ 692.573813][ T4899] serio: Serial port pts0 [ 696.823190][ T4914] serio: Serial port pts1 [ 701.497936][ T30] audit: type=1400 audit(700.970:175): avc: denied { execute } for pid=4925 comm="syz.1.589" path="/288/blkio.throttle.io_serviced_recursive" dev="tmpfs" ino=1675 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 702.686160][ T30] audit: type=1400 audit(702.150:176): avc: denied { create } for pid=4933 comm="syz.1.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 702.728392][ T30] audit: type=1400 audit(702.200:177): avc: denied { bind } for pid=4933 comm="syz.1.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 702.746749][ T30] audit: type=1400 audit(702.220:178): avc: denied { accept } for pid=4933 comm="syz.1.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 702.765724][ T30] audit: type=1400 audit(702.240:179): avc: denied { ioctl } for pid=4933 comm="syz.1.592" path="socket:[9524]" dev="sockfs" ino=9524 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 702.848478][ T30] audit: type=1400 audit(702.320:180): avc: denied { write } for pid=4933 comm="syz.1.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 704.090343][ T4938] serio: Serial port pts0 [ 715.246618][ T4966] serio: Serial port pts0 [ 715.845360][ T30] audit: type=1400 audit(715.310:181): avc: denied { watch watch_reads } for pid=4971 comm="syz.1.607" path="/proc/738" dev="proc" ino=9589 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 721.083238][ T4987] serio: Serial port pts0 [ 721.382410][ T4991] serio: Serial port pts1 [ 727.743766][ T5000] serio: Serial port pts0 [ 743.492226][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 746.347256][ T30] audit: type=1400 audit(745.800:182): avc: denied { write } for pid=5079 comm="syz.1.649" name="arp" dev="proc" ino=4026532729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 750.689606][ T5103] serio: Serial port pts0 [ 757.948943][ T30] audit: type=1400 audit(757.420:183): avc: denied { connect } for pid=5126 comm="syz.1.667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 759.523625][ T30] audit: type=1400 audit(759.000:184): avc: denied { read write } for pid=5140 comm="syz.0.673" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 759.525955][ T30] audit: type=1400 audit(759.000:185): avc: denied { open } for pid=5140 comm="syz.0.673" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 759.552150][ T30] audit: type=1400 audit(759.010:186): avc: denied { setattr } for pid=5140 comm="syz.0.673" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 766.297055][ T30] audit: type=1400 audit(765.770:187): avc: denied { write } for pid=5170 comm="syz.0.684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 767.610703][ T5176] serio: Serial port pts0 [ 767.920269][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 771.272360][ T5192] serio: Serial port pts1 [ 784.991985][ T5208] serio: Serial port pts0 [ 792.617981][ T30] audit: type=1400 audit(792.090:188): avc: denied { read } for pid=5223 comm="syz.1.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 795.619098][ T30] audit: type=1400 audit(795.090:189): avc: denied { read } for pid=5237 comm="syz.0.710" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 795.620962][ T30] audit: type=1400 audit(795.090:190): avc: denied { open } for pid=5237 comm="syz.0.710" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 815.647548][ T5354] serio: Serial port pts0 [ 817.348566][ T5363] serio: Serial port pts1 [ 824.784741][ T5380] serio: Serial port pts0 [ 835.320560][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 840.280513][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 842.576672][ T5433] serio: Serial port pts0 [ 848.027494][ T30] audit: type=1400 audit(847.500:191): avc: denied { ioctl } for pid=5449 comm="syz.1.795" path="socket:[10731]" dev="sockfs" ino=10731 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 850.015228][ T30] audit: type=1400 audit(849.490:192): avc: denied { lock } for pid=5463 comm="syz.1.801" path="socket:[11483]" dev="sockfs" ino=11483 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 859.101149][ T5502] serio: Serial port pts0 [ 863.393259][ T5511] serio: Serial port pts1 [ 865.672425][ T5518] serio: Serial port pts0 [ 880.912687][ T30] audit: type=1400 audit(880.380:193): avc: denied { ioctl } for pid=5545 comm="syz.0.832" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=10893 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 895.054149][ T5608] serio: Serial port pts0 [ 901.986502][ T5651] serio: Serial port pts0 [ 907.928801][ T5674] serio: Serial port pts1 [ 910.005170][ C1] hrtimer: interrupt took 3543760 ns [ 922.498546][ T30] audit: type=1400 audit(921.970:194): avc: denied { unmount } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 924.269129][ T1346] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 924.786109][ T1346] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 925.195684][ T1346] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 925.807860][ T1346] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 929.346829][ T5728] serio: Serial port pts0 [ 931.914850][ T1346] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 932.007144][ T1346] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 932.085743][ T1346] bond0 (unregistering): Released all slaves [ 932.450412][ T1346] hsr_slave_0: left promiscuous mode [ 932.506120][ T1346] hsr_slave_1: left promiscuous mode [ 932.767617][ T1346] veth1_macvtap: left promiscuous mode [ 932.793203][ T1346] veth0_macvtap: left promiscuous mode [ 932.796103][ T1346] veth1_vlan: left promiscuous mode [ 932.797678][ T1346] veth0_vlan: left promiscuous mode [ 947.313495][ T5785] serio: Serial port pts0 [ 949.555356][ T5702] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 949.627836][ T5702] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 955.688939][ T5702] hsr_slave_0: entered promiscuous mode [ 955.754632][ T5702] hsr_slave_1: entered promiscuous mode [ 955.793285][ T5702] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 955.793996][ T5702] Cannot create hsr debugfs directory [ 960.624830][ T5702] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 960.637118][ T30] audit: type=1400 audit(960.080:195): avc: denied { read } for pid=5702 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 960.729511][ T5702] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 960.833126][ T5702] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 960.898036][ T5702] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 965.447784][ T5702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 983.026508][ T5702] veth0_vlan: entered promiscuous mode [ 983.166192][ T5702] veth1_vlan: entered promiscuous mode [ 983.388093][ T5702] veth0_macvtap: entered promiscuous mode [ 983.427785][ T5702] veth1_macvtap: entered promiscuous mode [ 983.828147][ T5702] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 983.829168][ T5702] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 983.829887][ T5702] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 983.830671][ T5702] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 984.347147][ T30] audit: type=1400 audit(983.820:196): avc: denied { mounton } for pid=5702 comm="syz-executor" path="/syzkaller.OWS3Ck/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 984.516952][ T30] audit: type=1400 audit(983.990:197): avc: denied { mounton } for pid=5702 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 988.513553][ T30] audit: type=1400 audit(987.950:198): avc: denied { watch } for pid=5959 comm="syz.0.948" path="/5" dev="tmpfs" ino=42 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 998.859363][ T30] audit: type=1400 audit(998.330:199): avc: denied { read } for pid=6020 comm="syz.1.973" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 998.860932][ T30] audit: type=1400 audit(998.330:200): avc: denied { open } for pid=6020 comm="syz.1.973" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1001.156095][ T30] audit: type=1400 audit(1000.630:201): avc: denied { ioctl } for pid=6040 comm="syz.0.982" path="socket:[13620]" dev="sockfs" ino=13620 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1001.685251][ T6047] Zero length message leads to an empty skb [ 1007.675169][ T30] audit: type=1400 audit(1007.140:202): avc: denied { nlmsg_write } for pid=6082 comm="syz.1.1000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1009.369706][ T6095] serio: Serial port pts0 [ 1011.769779][ T6109] serio: Serial port pts1 [ 1016.247081][ T30] audit: type=1400 audit(1015.720:203): avc: denied { read } for pid=6114 comm="syz.1.1011" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1016.248778][ T30] audit: type=1400 audit(1015.720:204): avc: denied { open } for pid=6114 comm="syz.1.1011" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1026.435832][ T30] audit: type=1400 audit(1025.910:205): avc: denied { nlmsg_read } for pid=6149 comm="syz.1.1025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1036.274470][ T3843] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 1037.110342][ T6204] serio: Serial port pts0 [ 1037.359012][ T3843] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 1037.360200][ T3843] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1037.413539][ T3843] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1037.414669][ T3843] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1037.415497][ T3843] usb 1-1: Product: ᐁ [ 1037.416122][ T3843] usb 1-1: SerialNumber: э [ 1037.850659][ T3843] usb 1-1: 0:2 : does not exist [ 1038.356266][ T3843] usb 1-1: USB disconnect, device number 3 [ 1039.115548][ T6202] udevd[6202]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 1040.337034][ T6214] serio: Serial port pts1 [ 1046.153912][ T6231] serio: Serial port pts0 [ 1059.716238][ T6255] serio: Serial port pts1 [ 1071.338929][ T6289] serio: Serial port pts0 [ 1086.354729][ T6336] serio: Serial port pts0 [ 1101.939669][ T6367] serio: Serial port pts0 [ 1108.264150][ T6380] serio: Serial port pts0 [ 1121.973622][ T6432] serio: Serial port pts0 [ 1146.046873][ T6519] serio: Serial port pts0 [ 1169.292975][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 1170.146326][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 1180.070212][ T6609] serio: Serial port pts0 [ 1182.010567][ T30] audit: type=1400 audit(1181.480:206): avc: denied { ioctl } for pid=6621 comm="syz.1.1209" path="socket:[15642]" dev="sockfs" ino=15642 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1200.525794][ T6675] serio: Serial port pts0 [ 1200.573000][ T6676] serio: Serial port pts1 [ 1221.163329][ T30] audit: type=1400 audit(1220.630:207): avc: denied { write } for pid=6715 comm="syz.1.1246" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1222.242595][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1227.356618][ T6746] syzkaller0: entered promiscuous mode [ 1227.358035][ T6746] syzkaller0: entered allmulticast mode [ 1227.742673][ T6748] serio: Serial port pts0 [ 1243.442873][ T6755] serio: Serial port pts0 [ 1266.297768][ T6804] serio: Serial port pts0 [ 1289.174127][ T6831] serio: Serial port pts0 [ 1305.959873][ T6866] serio: Serial port pts0 [ 1309.756533][ T6881] serio: Serial port pts1 [ 1329.574581][ T30] audit: type=1400 audit(1329.050:208): avc: denied { map } for pid=6921 comm="syz.0.1325" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 1329.579023][ T30] audit: type=1400 audit(1329.050:209): avc: denied { execute } for pid=6921 comm="syz.0.1325" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 1332.414608][ T30] audit: type=1400 audit(1331.880:210): avc: denied { name_connect } for pid=6935 comm="syz.0.1331" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 1336.226290][ T6956] serio: Serial port pts0 [ 1342.605283][ T6980] serio: Serial port pts1 [ 1353.528852][ T7001] serio: Serial port pts0 [ 1361.323232][ T7018] serio: Serial port pts1 [ 1367.451263][ T30] audit: type=1400 audit(1366.920:211): avc: denied { unmount } for pid=3278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1369.196070][ T7033] serio: Serial port pts0 [ 1373.734550][ T4495] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 1373.987025][ T4495] usb 1-1: Using ep0 maxpacket: 32 [ 1374.063952][ T4495] usb 1-1: config 1 interface 0 altsetting 7 endpoint 0x81 has an invalid bInterval 251, changing to 11 [ 1374.065427][ T4495] usb 1-1: config 1 interface 0 altsetting 7 endpoint 0x81 has invalid maxpacket 2047, setting to 1024 [ 1374.066504][ T4495] usb 1-1: config 1 interface 0 altsetting 7 bulk endpoint 0x3 has invalid maxpacket 8 [ 1374.067385][ T4495] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1374.128292][ T4495] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1374.131102][ T4495] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1374.134983][ T4495] usb 1-1: Product: syz [ 1374.135676][ T4495] usb 1-1: SerialNumber: syz [ 1374.205611][ T7051] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1374.217698][ T7051] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1374.561943][ T4495] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -71 [ 1374.598628][ T4495] usb 1-1: USB disconnect, device number 4 [ 1375.185227][ T30] audit: type=1400 audit(1374.660:212): avc: denied { accept } for pid=7056 comm="syz.0.1371" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1377.253896][ T7071] serio: Serial port pts0 [ 1378.375201][ T7078] serio: Serial port pts1 [ 1386.445078][ T7097] serio: Serial port pts0 [ 1400.800752][ T7151] serio: Serial port pts0 [ 1406.833280][ T7171] serio: Serial port pts0 [ 1407.556650][ T30] audit: type=1400 audit(1407.030:213): avc: denied { ioctl } for pid=7175 comm="syz.1.1418" path="socket:[17655]" dev="sockfs" ino=17655 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1408.688004][ T30] audit: type=1400 audit(1408.160:214): avc: denied { read } for pid=7182 comm="syz.1.1421" name="card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1408.689972][ T30] audit: type=1400 audit(1408.160:215): avc: denied { open } for pid=7182 comm="syz.1.1421" path="/dev/dri/card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1408.722815][ T30] audit: type=1400 audit(1408.180:216): avc: denied { ioctl } for pid=7182 comm="syz.1.1421" path="/dev/dri/card0" dev="devtmpfs" ino=617 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1412.977095][ T7200] serio: Serial port pts0 [ 1413.154033][ T7202] serio: Serial port pts1 [ 1419.853783][ T7215] serio: Serial port pts0 [ 1421.226065][ T7221] serio: Serial port pts1 [ 1439.112687][ T7269] serio: Serial port pts0 [ 1458.487399][ T7335] serio: Serial port pts0 [ 1460.993737][ T7345] serio: Serial port pts1 [ 1475.970297][ T7402] serio: Serial port pts0 [ 1476.013295][ T7403] serio: Serial port pts1 [ 1491.897275][ T7451] serio: Serial port pts0 [ 1514.454698][ T7531] serio: Serial port pts0 [ 1519.156252][ T7552] serio: Serial port pts1 [ 1528.309137][ T7591] serio: Serial port pts0 [ 1530.792773][ T7601] serio: Serial port pts1 [ 1538.792950][ T30] audit: type=1400 audit(1538.260:217): avc: denied { create } for pid=7617 comm="syz.1.1590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1538.854206][ T30] audit: type=1400 audit(1538.330:218): avc: denied { write } for pid=7617 comm="syz.1.1590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1546.293116][ T7638] serio: Serial port pts0 [ 1547.310624][ T30] audit: type=1400 audit(1546.780:219): avc: denied { read write } for pid=7642 comm="syz.1.1599" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1547.319631][ T30] audit: type=1400 audit(1546.790:220): avc: denied { open } for pid=7642 comm="syz.1.1599" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1547.457511][ T30] audit: type=1400 audit(1546.930:221): avc: denied { ioctl } for pid=7642 comm="syz.1.1599" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x330f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1553.957528][ T30] audit: type=1400 audit(1553.430:222): avc: denied { read } for pid=7656 comm="syz.1.1603" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=19565 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1560.388310][ T30] audit: type=1400 audit(1559.860:223): avc: denied { create } for pid=7668 comm="syz.1.1607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1561.745307][ T30] audit: type=1400 audit(1561.210:224): avc: denied { create } for pid=7672 comm="syz.0.1608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1561.797663][ T30] audit: type=1400 audit(1561.270:225): avc: denied { setopt } for pid=7672 comm="syz.0.1608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1563.778630][ T7685] serio: Serial port pts0 [ 1567.894696][ T30] audit: type=1400 audit(1567.340:226): avc: denied { read } for pid=7697 comm="syz.1.1617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1574.955040][ T7721] serio: Serial port pts0 [ 1587.169363][ T30] audit: type=1400 audit(1586.630:227): avc: denied { listen } for pid=7731 comm="syz.0.1627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1587.196486][ T30] audit: type=1400 audit(1586.660:228): avc: denied { accept } for pid=7731 comm="syz.0.1627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1587.845799][ T30] audit: type=1400 audit(1587.320:229): avc: denied { accept } for pid=7731 comm="syz.0.1627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1588.417550][ T30] audit: type=1400 audit(1587.890:230): avc: denied { getopt } for pid=7734 comm="syz.0.1628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1588.464563][ T30] audit: type=1400 audit(1587.940:231): avc: denied { getopt } for pid=7734 comm="syz.0.1628" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1589.660951][ T30] audit: type=1400 audit(1589.130:232): avc: denied { write } for pid=7736 comm="syz.0.1629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1595.864168][ T7757] serio: Serial port pts0 [ 1597.839715][ T30] audit: type=1400 audit(1597.310:233): avc: denied { connect } for pid=7761 comm="syz.0.1637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1597.895948][ T30] audit: type=1400 audit(1597.370:234): avc: denied { listen } for pid=7761 comm="syz.0.1637" laddr=172.20.20.10 lport=60072 faddr=172.20.20.26 fport=20002 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1599.025268][ T30] audit: type=1400 audit(1598.490:235): avc: denied { read } for pid=7763 comm="syz.0.1638" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1599.027529][ T30] audit: type=1400 audit(1598.500:236): avc: denied { open } for pid=7763 comm="syz.0.1638" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1615.175753][ T7812] serio: Serial port pts0 [ 1616.160650][ T30] audit: type=1400 audit(1615.630:237): avc: denied { create } for pid=7814 comm="syz.0.1656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1616.233826][ T30] audit: type=1400 audit(1615.700:238): avc: denied { write } for pid=7814 comm="syz.0.1656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1628.549209][ T7853] serio: Serial port pts1 [ 1632.162540][ T7862] serio: Serial port pts0 [ 1647.968440][ T7878] serio: Serial port pts0 [ 1660.778992][ C1] vkms_vblank_simulate: vblank timer overrun [ 1663.302872][ T7917] serio: Serial port pts0 [ 1667.933004][ T7930] serio: Serial port pts1 [ 1669.336269][ T30] audit: type=1400 audit(1668.810:239): avc: denied { create } for pid=7933 comm="syz.1.1694" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1669.350850][ T30] audit: type=1400 audit(1668.820:240): avc: denied { write } for pid=7933 comm="syz.1.1694" name="file0" dev="tmpfs" ino=5074 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1669.360027][ T30] audit: type=1400 audit(1668.820:241): avc: denied { open } for pid=7933 comm="syz.1.1694" path="/872/file0" dev="tmpfs" ino=5074 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1669.518778][ T30] audit: type=1400 audit(1668.990:242): avc: denied { unlink } for pid=3278 comm="syz-executor" name="file0" dev="tmpfs" ino=5074 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1675.314542][ T7951] serio: Serial port pts0 [ 1677.692857][ T7960] serio: Serial port pts0 [ 1678.966039][ T30] audit: type=1400 audit(1678.430:243): avc: denied { bind } for pid=7964 comm="syz.1.1704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1687.973501][ T7989] process 'syz.0.1710' launched './file1' with NULL argv: empty string added [ 1687.981039][ T30] audit: type=1400 audit(1687.450:244): avc: denied { execute_no_trans } for pid=7987 comm="syz.0.1710" path="/366/file1" dev="tmpfs" ino=2137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1690.630525][ T7999] serio: Serial port pts0 [ 1695.305246][ T30] audit: type=1400 audit(1694.780:245): avc: denied { write } for pid=8014 comm="syz.1.1719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1697.629631][ T8023] serio: Serial port pts1 [ 1701.630229][ T30] audit: type=1400 audit(1701.100:246): avc: denied { create } for pid=8033 comm="syz.1.1725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1701.670111][ T30] audit: type=1400 audit(1701.140:247): avc: denied { read } for pid=8033 comm="syz.1.1725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1702.315366][ T8036] serio: Serial port pts1 [ 1718.428061][ T30] audit: type=1400 audit(1717.850:248): avc: denied { create } for pid=8075 comm="syz.0.1739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1718.429032][ T30] audit: type=1400 audit(1717.870:249): avc: denied { write } for pid=8075 comm="syz.0.1739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1732.709150][ T30] audit: type=1400 audit(1732.180:250): avc: denied { setopt } for pid=8193 comm="syz.1.1750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1733.177480][ T30] audit: type=1400 audit(1732.650:251): avc: denied { bind } for pid=8193 comm="syz.1.1750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1736.837431][ T8210] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1755'. [ 1736.839804][ T8210] netlink: 60 bytes leftover after parsing attributes in process `syz.1.1755'. [ 1743.833297][ T8234] serio: Serial port pts0 [ 1759.334536][ T8271] serio: Serial port pts0 [ 1767.639988][ T8283] serio: Serial port pts1 [ 1770.016232][ T8288] serio: Serial port pts1 [ 1775.321028][ T30] audit: type=1400 audit(1774.790:252): avc: denied { create } for pid=8292 comm="syz.0.1779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1775.374712][ T30] audit: type=1400 audit(1774.850:253): avc: denied { write } for pid=8292 comm="syz.0.1779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1778.349323][ T8303] serio: Serial port pts0 [ 1787.972671][ T30] audit: type=1400 audit(1787.440:254): avc: denied { setattr } for pid=8334 comm="syz.0.1794" name="NETLINK" dev="sockfs" ino=21575 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1787.984914][ T30] audit: type=1400 audit(1787.450:255): avc: denied { setopt } for pid=8334 comm="syz.0.1794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1787.998965][ T30] audit: type=1400 audit(1787.470:256): avc: denied { ioctl } for pid=8334 comm="syz.0.1794" path="socket:[21575]" dev="sockfs" ino=21575 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1804.981166][ T30] audit: type=1400 audit(1804.440:257): avc: denied { setattr } for pid=8394 comm="syz.0.1815" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1815.086810][ T8444] serio: Serial port pts0 [ 1817.433366][ T30] audit: type=1400 audit(1816.900:258): avc: denied { nlmsg_read } for pid=8454 comm="syz.0.1835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1832.319832][ T8492] syz.1.1846 uses obsolete (PF_INET,SOCK_PACKET) [ 1834.849782][ T8501] serio: Serial port pts0 [ 1840.247532][ T8523] serio: Serial port pts1 [ 1855.546901][ T8541] serio: Serial port pts0 [ 1856.357050][ T30] audit: type=1400 audit(1855.830:259): avc: denied { map } for pid=8543 comm="syz.0.1864" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=21900 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1856.358903][ T30] audit: type=1400 audit(1855.830:260): avc: denied { write } for pid=8543 comm="syz.0.1864" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=21900 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1860.524671][ T8559] serio: Serial port pts1 [ 1882.163847][ T30] audit: type=1400 audit(1881.640:261): avc: denied { read } for pid=8598 comm="syz.0.1882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1887.520282][ T30] audit: type=1400 audit(1886.990:262): avc: denied { ioctl } for pid=8622 comm="syz.1.1890" path="socket:[21083]" dev="sockfs" ino=21083 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1888.024127][ T30] audit: type=1400 audit(1887.500:263): avc: denied { connect } for pid=8627 comm="syz.0.1891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1888.088193][ T8630] serio: Serial port pts0 [ 1896.243435][ T8657] serio: Serial port pts1 [ 1907.006198][ T8674] serio: Serial port pts0 [ 1924.490023][ T8691] serio: Serial port pts0 [ 1927.198714][ T8706] serio: Serial port pts0 [ 1929.427154][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1935.212677][ T8745] serio: Serial port pts0 [ 1936.024249][ T30] audit: type=1400 audit(1935.490:264): avc: denied { mount } for pid=8749 comm="syz.1.1928" name="/" dev="hugetlbfs" ino=21232 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1938.794867][ T30] audit: type=1400 audit(1938.270:265): avc: denied { read } for pid=8762 comm="syz.0.1932" dev="nsfs" ino=4026532806 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1938.798826][ T30] audit: type=1400 audit(1938.270:266): avc: denied { open } for pid=8762 comm="syz.0.1932" path="net:[4026532806]" dev="nsfs" ino=4026532806 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1948.064852][ T8805] serio: Serial port pts0 [ 1953.035110][ T30] audit: type=1400 audit(1952.510:267): avc: denied { read } for pid=8822 comm="syz.0.1953" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1953.046193][ T30] audit: type=1400 audit(1952.510:268): avc: denied { open } for pid=8822 comm="syz.0.1953" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1963.763442][ T8882] serio: Serial port pts0 [ 1964.132266][ T8885] serio: Serial port pts1 [ 1967.816616][ T8897] serio: Serial port pts0 [ 1972.966655][ T8904] serio: Serial port pts1 [ 1979.111108][ T30] audit: type=1400 audit(1978.580:269): avc: denied { getopt } for pid=8915 comm="syz.0.1982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1984.394773][ T8938] nbd1: detected capacity change from 0 to 8388607 [ 1985.416899][ T8938] block nbd1: shutting down sockets [ 1985.478322][ C0] I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1985.480567][ C0] Buffer I/O error on dev nbd1, logical block 0, async page read [ 1985.518945][ T8928] I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1985.537342][ T8928] Buffer I/O error on dev nbd1, logical block 0, async page read [ 1985.539600][ T8928] nbd1: unable to read partition table [ 1985.598059][ T8942] I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1985.605224][ T8942] Buffer I/O error on dev nbd1, logical block 0, async page read [ 1985.608394][ T8942] I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1985.609302][ T8942] Buffer I/O error on dev nbd1, logical block 0, async page read [ 1985.610494][ T8942] nbd1: unable to read partition table [ 1985.654144][ T8928] I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1985.655958][ T8928] Buffer I/O error on dev nbd1, logical block 0, async page read [ 1985.658163][ T8928] I/O error, dev nbd1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1985.659088][ T8928] Buffer I/O error on dev nbd1, logical block 0, async page read [ 1985.660065][ T8928] nbd1: unable to read partition table [ 1985.756310][ T8928] I/O error, dev nbd1, sector 8388352 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1985.761017][ T8928] I/O error, dev nbd1, sector 8388352 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1985.784375][ T8928] Buffer I/O error on dev nbd1, logical block 1048544, async page read [ 1989.869628][ T8967] serio: Serial port pts0 [ 1991.005854][ T30] audit: type=1400 audit(1990.470:270): avc: denied { getopt } for pid=8972 comm="syz.0.2001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1994.971073][ T8982] serio: Serial port pts1 [ 2013.018209][ T9017] serio: Serial port pts0 [ 2018.476919][ T30] audit: type=1400 audit(2017.950:271): avc: denied { create } for pid=9028 comm="syz.1.2019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2018.507157][ T30] audit: type=1400 audit(2017.970:272): avc: denied { setopt } for pid=9028 comm="syz.1.2019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2022.698280][ T30] audit: type=1400 audit(2022.140:273): avc: denied { accept } for pid=9040 comm="syz.1.2023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2022.803299][ T30] audit: type=1400 audit(2022.260:274): avc: denied { write } for pid=9040 comm="syz.1.2023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2024.789444][ T9053] serio: Serial port pts0 [ 2028.237503][ T9066] serio: Serial port pts1 [ 2050.533747][ T30] audit: type=1400 audit(2050.000:275): avc: denied { connect } for pid=9143 comm="syz.0.2058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2051.070049][ T9146] vcan0: tx drop: invalid da for name 0x0000000000000003 [ 2053.125745][ T9151] serio: Serial port pts0 [ 2055.684844][ T9166] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9166 comm=syz.0.2066 [ 2056.138507][ T9169] serio: Serial port pts1 [ 2056.188843][ T30] audit: type=1400 audit(2055.660:276): avc: denied { remove_name } for pid=3081 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2056.213002][ T30] audit: type=1400 audit(2055.680:277): avc: denied { rename } for pid=3081 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2056.221057][ T30] audit: type=1400 audit(2055.690:278): avc: denied { create } for pid=3081 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2061.140692][ T30] audit: type=1400 audit(2060.610:279): avc: denied { read } for pid=9177 comm="syz.0.2070" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 2061.174519][ T30] audit: type=1400 audit(2060.610:280): avc: denied { open } for pid=9177 comm="syz.0.2070" path="/dev/input/mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 2066.198534][ T9184] serio: Serial port pts1 [ 2068.910514][ T9192] serio: Serial port pts0 [ 2076.247809][ T9210] serio: Serial port pts0 [ 2083.110139][ T30] audit: type=1400 audit(2082.580:281): avc: denied { mount } for pid=9218 comm="syz.0.2082" name="/" dev="autofs" ino=24075 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 2083.145040][ T30] audit: type=1400 audit(2082.620:282): avc: denied { ioctl } for pid=9218 comm="syz.0.2082" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9379 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2083.310041][ T30] audit: type=1400 audit(2082.780:283): avc: denied { unmount } for pid=5702 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 2087.827704][ T9234] serio: Serial port pts1 [ 2098.250050][ T30] audit: type=1400 audit(2097.720:284): avc: denied { ioctl } for pid=9252 comm="syz.1.2094" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 2100.175159][ T9260] serio: Serial port pts0 [ 2110.636820][ T9290] serio: Serial port pts1 [ 2115.900854][ T30] audit: type=1400 audit(2115.370:285): avc: denied { mounton } for pid=9305 comm="syz.0.2111" path="/566/file0" dev="tmpfs" ino=3277 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 2117.433767][ T9314] serio: Serial port pts0 [ 2117.873595][ T9316] serio: Serial port pts1 [ 2122.747401][ T30] audit: type=1400 audit(2122.180:286): avc: denied { write } for pid=9328 comm="syz.0.2118" path="socket:[23090]" dev="sockfs" ino=23090 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2126.110450][ T30] audit: type=1400 audit(2125.580:287): avc: denied { write } for pid=9352 comm="syz.0.2127" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2126.146030][ T30] audit: type=1400 audit(2125.610:288): avc: denied { ioctl } for pid=9352 comm="syz.0.2127" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2128.290274][ T9360] serio: Serial port pts0 [ 2137.205677][ T9387] serio: Serial port pts1 [ 2144.343154][ T9398] serio: Serial port pts0 [ 2158.006050][ T30] audit: type=1400 audit(2157.480:289): avc: denied { shutdown } for pid=9420 comm="syz.1.2148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2158.668978][ T30] audit: type=1400 audit(2158.130:290): avc: denied { module_load } for pid=9422 comm="syz.1.2149" path="/sys/power/wakeup_count" dev="sysfs" ino=845 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 2163.313894][ T30] audit: type=1400 audit(2162.780:291): avc: denied { write } for pid=9446 comm="syz.0.2157" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 2163.340820][ T30] audit: type=1400 audit(2162.790:292): avc: denied { remove_name } for pid=9446 comm="syz.0.2157" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 2163.345336][ T30] audit: type=1400 audit(2162.810:293): avc: denied { unlink } for pid=9446 comm="syz.0.2157" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2163.949788][ T9451] serio: Serial port pts0 [ 2165.867023][ T9460] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9460 comm=syz.1.2161 [ 2165.881141][ T30] audit: type=1400 audit(2165.350:294): avc: denied { write } for pid=9459 comm="syz.1.2161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2165.889613][ T30] audit: type=1400 audit(2165.360:295): avc: denied { nlmsg_write } for pid=9459 comm="syz.1.2161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2172.350595][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2175.388725][ T9491] serio: Serial port pts1 [ 2187.794258][ T9530] serio: Serial port pts0 [ 2188.969377][ T30] audit: type=1400 audit(2188.440:296): avc: denied { write } for pid=9534 comm="syz.0.2186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2188.999933][ T30] audit: type=1400 audit(2188.470:297): avc: denied { bind } for pid=9534 comm="syz.0.2186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2189.517572][ T30] audit: type=1400 audit(2188.990:298): avc: denied { getopt } for pid=9537 comm="syz.0.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2190.124245][ T9540] serio: Serial port pts1 [ 2203.895390][ T9548] gre0: entered allmulticast mode [ 2205.783467][ T9553] serio: Serial port pts0 [ 2209.694011][ T9566] serio: Serial port pts1 [ 2223.282071][ T30] audit: type=1400 audit(2222.750:299): avc: denied { sqpoll } for pid=9577 comm="syz.0.2199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2225.276845][ T9586] serio: Serial port pts0 [ 2238.255058][ T9627] serio: Serial port pts1 [ 2249.684901][ T9653] serio: Serial port pts0 [ 2254.252181][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2261.785429][ T9693] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9693 comm=syz.1.2234 [ 2264.020324][ T30] audit: type=1400 audit(2263.490:300): avc: denied { create } for pid=9705 comm="syz.1.2239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 2264.567923][ T30] audit: type=1400 audit(2264.040:301): avc: denied { create } for pid=9705 comm="syz.1.2239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2264.594007][ T30] audit: type=1400 audit(2264.060:302): avc: denied { write } for pid=9705 comm="syz.1.2239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2264.678509][ T30] audit: type=1400 audit(2264.150:303): avc: denied { ioctl } for pid=9705 comm="syz.1.2239" path="socket:[25735]" dev="sockfs" ino=25735 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2264.780127][ T9706] veth0_vlan: left promiscuous mode [ 2273.632840][ T9754] serio: Serial port pts0 [ 2285.159635][ T9808] serio: Serial port pts0 [ 2289.274467][ T9822] serio: Serial port pts1 [ 2303.923775][ T9863] serio: Serial port pts0 [ 2308.966585][ T9880] serio: Serial port pts1 [ 2319.717735][ T9912] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2308'. [ 2320.939020][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2322.273509][ T30] audit: type=1400 audit(2321.740:304): avc: denied { setattr } for pid=9926 comm="syz.1.2315" name="PACKET" dev="sockfs" ino=25269 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2322.739358][ T30] audit: type=1400 audit(2322.210:305): avc: denied { connect } for pid=9930 comm="syz.1.2317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2326.562437][ T9947] serio: Serial port pts0 [ 2340.820986][ T30] audit: type=1400 audit(2340.290:306): avc: denied { create } for pid=9992 comm="syz.0.2339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2340.839482][ T30] audit: type=1400 audit(2340.310:307): avc: denied { bind } for pid=9992 comm="syz.0.2339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2340.899860][ T30] audit: type=1400 audit(2340.370:308): avc: denied { write } for pid=9992 comm="syz.0.2339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2347.610340][ T30] audit: type=1400 audit(2347.010:309): avc: denied { mounton } for pid=10019 comm="syz.1.2348" path="/1211/file0" dev="ramfs" ino=26182 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=dir permissive=1 [ 2348.934204][ T30] audit: type=1400 audit(2348.410:310): avc: denied { mounton } for pid=10025 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2349.027086][ T8132] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2349.454442][ T8132] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2349.733220][ T8132] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2350.067922][ T8132] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2353.745454][ T8132] gre0 (unregistering): left allmulticast mode [ 2355.617883][ T8132] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2355.728976][ T8132] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2355.869533][ T8132] bond0 (unregistering): Released all slaves [ 2356.372902][ T8132] hsr_slave_0: left promiscuous mode [ 2356.428546][ T8132] hsr_slave_1: left promiscuous mode [ 2356.682541][ T8132] veth1_macvtap: left promiscuous mode [ 2356.684138][ T8132] veth0_macvtap: left promiscuous mode [ 2356.685697][ T8132] veth1_vlan: left promiscuous mode [ 2361.718735][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2374.753638][T10103] serio: Serial port pts0 [ 2375.600470][T10025] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2375.676074][T10025] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2380.320911][T10025] hsr_slave_0: entered promiscuous mode [ 2380.387006][T10025] hsr_slave_1: entered promiscuous mode [ 2385.506766][T10025] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2385.721201][T10025] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2385.928944][T10025] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2386.143855][T10025] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2390.344780][T10025] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2404.064978][T10025] veth0_vlan: entered promiscuous mode [ 2404.140421][T10025] veth1_vlan: entered promiscuous mode [ 2404.374487][T10025] veth0_macvtap: entered promiscuous mode [ 2404.437107][T10025] veth1_macvtap: entered promiscuous mode [ 2404.768625][T10025] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2404.769920][T10025] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2404.770810][T10025] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2404.795430][T10025] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2405.635293][ T30] audit: type=1400 audit(2405.110:311): avc: denied { unmount } for pid=10025 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2416.938100][ T30] audit: type=1400 audit(2416.410:312): avc: denied { read } for pid=10268 comm="syz.0.2391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2417.663560][T10274] serio: Serial port pts0 [ 2422.667488][ T30] audit: type=1400 audit(2422.140:313): avc: denied { unmount } for pid=5702 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 2431.604392][T10312] serio: Serial port pts1 [ 2437.815826][ T30] audit: type=1400 audit(2437.290:314): avc: denied { read } for pid=10335 comm="syz.1.2414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2442.079047][T10347] input: syz0 as /devices/virtual/input/input1 [ 2456.247288][T10397] serio: Serial port pts0 [ 2458.474506][T10408] serio: Serial port pts0 [ 2463.212731][T10429] serio: Serial port pts0 [ 2465.592943][T10438] serio: Serial port pts1 [ 2484.706177][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2488.944022][T10482] serio: Serial port pts0 [ 2489.526330][T10484] serio: Serial port pts1 [ 2494.883892][T10494] serio: Serial port pts0 [ 2513.664424][T10522] serio: Serial port pts0 [ 2530.853744][T10562] serio: Serial port pts0 [ 2534.069352][T10572] serio: Serial port pts1 [ 2551.282855][T10587] serio: Serial port pts0 [ 2569.646837][T10634] serio: Serial port pts0 [ 2587.088759][T10682] serio: Serial port pts0 [ 2587.556702][T10681] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2525'. [ 2604.908722][T10731] serio: Serial port pts0 [ 2609.764061][T10751] serio: Serial port pts0 [ 2619.179072][ T30] audit: type=1400 audit(2618.650:315): avc: denied { unmount } for pid=5702 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2625.504374][ T30] audit: type=1400 audit(2624.960:316): avc: denied { append } for pid=10785 comm="syz.1.2558" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2636.992925][T10845] serio: Serial port pts0 [ 2640.826689][ T30] audit: type=1400 audit(2640.300:317): avc: denied { bind } for pid=10852 comm="syz.1.2581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2653.165496][T10893] serio: Serial port pts0 [ 2661.276266][T10909] serio: Serial port pts1 [ 2673.163391][T10920] serio: Serial port pts0 [ 2675.885486][T10925] block nbd0: shutting down sockets [ 2678.978765][T10940] serio: Serial port pts0 [ 2690.388945][ T30] audit: type=1400 audit(2689.860:318): avc: denied { ioctl } for pid=10971 comm="syz.1.2620" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2696.576368][T10988] serio: Serial port pts0 [ 2714.155474][T11039] serio: Serial port pts0 [ 2717.886946][T11050] serio: Serial port pts0 [ 2722.655679][ T30] audit: type=1400 audit(2722.130:319): avc: denied { setopt } for pid=11059 comm="syz.0.2650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2722.658707][T11060] lo: entered promiscuous mode [ 2722.769592][T11060] lo: left promiscuous mode [ 2733.880871][T11087] serio: Serial port pts0 [ 2739.965104][ T30] audit: type=1400 audit(2739.430:320): avc: denied { create } for pid=11103 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2740.014629][ T30] audit: type=1400 audit(2739.470:321): avc: denied { write open } for pid=11103 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=2563 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2740.041158][ T30] audit: type=1400 audit(2739.510:322): avc: denied { append } for pid=11103 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2563 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2740.134435][ T30] audit: type=1400 audit(2739.580:323): avc: denied { getattr } for pid=11103 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2740.972524][ T30] audit: type=1400 audit(2740.410:324): avc: denied { read } for pid=11105 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2741.494071][ T30] audit: type=1400 audit(2740.940:325): avc: denied { unlink } for pid=11107 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2563 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2741.578621][T11108] serio: Serial port pts1 [ 2750.777996][T11118] syz.1.2668 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 2755.985252][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2757.280321][T11133] serio: Serial port pts0 [ 2775.652724][T11192] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11192 comm=syz.1.2693 [ 2776.039755][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2781.750446][T11222] serio: Serial port pts0 [ 2783.155830][T11231] serio: Serial port pts1 [ 2799.179748][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2806.369126][T11277] serio: Serial port pts0 [ 2827.508299][ T30] audit: type=1400 audit(2826.980:326): avc: denied { setopt } for pid=11338 comm="syz.0.2744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2828.126321][ T30] audit: type=1400 audit(2827.600:327): avc: denied { shutdown } for pid=11338 comm="syz.0.2744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2844.017196][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2861.710270][T11480] serio: Serial port pts0 [ 2873.277504][ T30] audit: type=1400 audit(2872.700:328): avc: denied { getopt } for pid=11525 comm="syz.0.2811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2886.284710][T11567] syzkaller0: entered promiscuous mode [ 2886.285433][T11567] syzkaller0: entered allmulticast mode [ 2887.299699][T11576] serio: Serial port pts0 [ 2912.123633][T11610] serio: Serial port pts0 [ 2920.414140][T11637] serio: Serial port pts0 [ 2935.755909][T11675] serio: Serial port pts0 [ 2938.742262][T11686] serio: Serial port pts1 [ 2961.631020][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2964.888059][T11733] serio: Serial port pts0 [ 2964.956792][T11735] serio: Serial port pts1 [ 2972.387249][T11752] serio: Serial port pts1 [ 2982.436349][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2996.043713][T11809] serio: Serial port pts0 [ 2997.055031][T11813] serio: Serial port pts1 [ 3000.824745][T11820] netlink: 20 bytes leftover after parsing attributes in process `syz.1.2903'. [ 3002.799413][T11826] serio: Serial port pts1 [ 3011.255894][ T30] audit: type=1400 audit(3010.730:329): avc: denied { ioctl } for pid=11832 comm="syz.0.2907" path="socket:[32450]" dev="sockfs" ino=32450 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3011.326777][ T30] audit: type=1400 audit(3010.800:330): avc: denied { map } for pid=11832 comm="syz.0.2907" path="socket:[32448]" dev="sockfs" ino=32448 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 3013.333024][T11839] serio: Serial port pts0 [ 3023.160979][ T30] audit: type=1400 audit(3022.630:331): avc: denied { ioctl } for pid=11858 comm="syz.1.2916" path="net:[4026532688]" dev="nsfs" ino=4026532688 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3034.154001][T11902] serio: Serial port pts0 [ 3049.610294][T11948] serio: Serial port pts0 [ 3056.573404][T11965] serio: Serial port pts0 [ 3070.919513][T11999] serio: Serial port pts1 [ 3091.360910][ T30] audit: type=1400 audit(3090.830:332): avc: denied { setattr } for pid=12051 comm="syz.1.2980" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 3110.047326][T12127] serio: Serial port pts0 [ 3118.443275][ T30] audit: type=1400 audit(3117.910:333): avc: denied { map } for pid=12151 comm="syz.1.3013" path="socket:[34020]" dev="sockfs" ino=34020 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3118.444601][ T30] audit: type=1400 audit(3117.910:334): avc: denied { read } for pid=12151 comm="syz.1.3013" path="socket:[34020]" dev="sockfs" ino=34020 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3119.088366][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 3119.912974][T12156] serio: Serial port pts1 [ 3125.603627][T12162] serio: Serial port pts0 [ 3136.259280][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 3151.113012][T12224] serio: Serial port pts0 [ 3154.312612][T12236] serio: Serial port pts1 [ 3175.702472][T12275] serio: Serial port pts0 [ 3179.544548][T12282] serio: Serial port pts1 [ 3193.522710][ T30] audit: type=1400 audit(3192.990:335): avc: denied { ioctl } for pid=12293 comm="syz.1.3062" path="socket:[34287]" dev="sockfs" ino=34287 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3203.352253][T12332] serio: Serial port pts0 [ 3205.805058][T12344] serio: Serial port pts1 [ 3219.916864][T12354] ------------[ cut here ]------------ [ 3219.918312][T12354] refcount_t: underflow; use-after-free. [ 3219.919964][T12354] WARNING: CPU: 0 PID: 12354 at lib/refcount.c:28 refcount_warn_saturate+0x138/0x19c [ 3219.922028][T12354] Modules linked in: [ 3219.925718][T12354] CPU: 0 UID: 0 PID: 12354 Comm: syz.1.3082 Not tainted 6.12.0-rc1-syzkaller-00125-g0c559323bbaa #0 [ 3219.927003][T12354] Hardware name: linux,dummy-virt (DT) [ 3219.927739][T12354] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 3219.928234][T12354] pc : refcount_warn_saturate+0x138/0x19c [ 3219.928715][T12354] lr : refcount_warn_saturate+0x138/0x19c [ 3219.929115][T12354] sp : ffff8000a13976c0 [ 3219.929514][T12354] x29: ffff8000a13976c0 x28: ffff0000125edadc x27: 0000000000000002 [ 3219.930472][T12354] x26: 1fffe00002e42080 x25: 1fffe00002e42098 x24: ffff0000172104c2 [ 3219.931063][T12354] x23: ffff0000125edadc x22: 0000000000000000 x21: ffff800084d6a4d4 [ 3219.931945][T12354] x20: ffff0000125edadc x19: 0000000000000003 x18: 000000008b1a7cdb [ 3219.932932][T12354] x17: 0000000000000000 x16: 0000000000000000 x15: ffff000016124680 [ 3219.934435][T12354] x14: 1fffe00002c248cf x13: 1fffe00002c248d9 x12: ffff60000d3f2a93 [ 3219.935579][T12354] x11: 1fffe0000d3f2a92 x10: ffff60000d3f2a92 x9 : dfff800000000000 [ 3219.936763][T12354] x8 : ffff000069f95493 x7 : 0000000000000001 x6 : ffff60000d3f2a92 [ 3219.937745][T12354] x5 : ffff000069f95490 x4 : 1fffe00002c24781 x3 : dfff800000000000 [ 3219.938757][T12354] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000016123c00 [ 3219.939959][T12354] Call trace: [ 3219.940498][T12354] refcount_warn_saturate+0x138/0x19c [ 3219.941168][T12354] sk_skb_reason_drop+0x154/0x174 [ 3219.941842][T12354] j1939_session_destroy+0x104/0x36c [ 3219.942531][T12354] j1939_session_put+0x80/0xac [ 3219.943086][T12354] j1939_sk_sendmsg+0xaf4/0xf60 [ 3219.943639][T12354] __sock_sendmsg+0xc8/0x168 [ 3219.944165][T12354] ____sys_sendmsg+0x54c/0x6dc [ 3219.944726][T12354] ___sys_sendmsg+0x11c/0x19c [ 3219.945257][T12354] __sys_sendmsg+0xe0/0x174 [ 3219.945931][T12354] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 3219.946659][T12354] invoke_syscall+0x6c/0x258 [ 3219.947261][T12354] el0_svc_common.constprop.0+0xac/0x230 [ 3219.947891][T12354] do_el0_svc_compat+0x40/0x68 [ 3219.948848][T12354] el0_svc_compat+0x4c/0x17c [ 3219.949486][T12354] el0t_32_sync_handler+0x98/0x13c [ 3219.950003][T12354] el0t_32_sync+0x194/0x198 [ 3219.950866][T12354] irq event stamp: 572 [ 3219.951523][T12354] hardirqs last enabled at (571): [] __up_console_sem+0x74/0x94 [ 3219.952472][T12354] hardirqs last disabled at (572): [] el1_dbg+0x24/0x9c [ 3219.953222][T12354] softirqs last enabled at (546): [] handle_softirqs+0x878/0xd40 [ 3219.953933][T12354] softirqs last disabled at (499): [] __do_softirq+0x14/0x20 [ 3219.954822][T12354] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) VM DIAGNOSIS: 17:42:42 Registers: info registers vcpu 0 CPU#0 PC=ffff800080186308 X00=ffff80008855e5ab X01=0000000000000000 X02=0000000000000003 X03=1ffff000110abcb5 X04=ffff800085232dac X05=ffff80008855e5ac X06=6e69617420746f4e X07=006465746e696174 X08=ffff80008855e5ab X09=dfff800000000000 X10=ffff7000110abcb5 X11=1ffff000110abcb5 X12=ffff7000110abcb6 X13=1fffe00002c248d9 X14=1fffe00002c248cf X15=ffff000016124680 X16=0000000000000000 X17=0000000000000000 X18=000000008b1a7cdb X19=000000000000000b X20=ffff80008855e5a0 X21=ffff00001734c700 X22=ffff800085232900 X23=ffff8000812e3020 X24=0000000000000000 X25=1ffff00014272e2a X26=0000000000003042 X27=ffff80008855e4a0 X28=000000000000001d X29=ffff8000a13970e0 X30=ffff80008018636c SP=ffff8000a13970e0 PSTATE=100003c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 R00=ffffffff R01=00000004 R02=000001e4 R03=00000000 R04=00000000 R05=00000000 R06=00000000 R07=00000000 R08=00000000 R09=00006364 R10=003d0f00 R11=f7a5c0bc R12=20000550 R13=20000550 R14=00018b94 R15=00018b94 PSR=20000010 --C- A usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000