last executing test programs: 13m22.490741985s ago: executing program 1 (id=511): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002abd7000fedbdf251d00000008000300", @ANYRES32=r3, @ANYBLOB="18002f800c0f02000200aaaaaaaaaa8c08000100770a000068af62528beb1aa9bef298d7eaa0c2ff1a8a4b172c0516b0e5ff147898627d5500000000000000c0b7d188689315d1a0192301d2580f755d0cacd8278a788d8f468c83bc2471cac1d80d7b8f19"], 0x34}, 0x1, 0x0, 0x0, 0x20008800}, 0x800) 13m20.185753364s ago: executing program 1 (id=513): r0 = memfd_create(&(0x7f00000002c0)='[\v\xdbX\xae[5\xa9\x90\xffc\x1f\x1a\xa9\xfd\xfa\xad\xd1md\xe7\xe2\x7f\x9b\xd5R\x10\xf3\xb6\xffT\xbf\xd1\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\x9fc\xda\xa9\x83r\xd8\x98\x00\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9r\xc3E\xf8\x92\xb7-\x0e\xcf|\x89\xc2tc\xc9d\x9eI\xbaVf\xd1fs\xd1w6\x8a\xe9_', 0x3) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0/file0'}, 0x11) pwrite64(r0, &(0x7f00000000c0)="12dac5", 0x3, 0x2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 13m19.823213293s ago: executing program 1 (id=514): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) capset(&(0x7f0000000400)={0x19980330}, &(0x7f00000003c0)={0xffc, 0x10ffff, 0xffffff88, 0x8000, 0x0, 0x1}) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) dup(r1) 13m19.330026999s ago: executing program 1 (id=516): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) pivot_root(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000400)='./file0/file0\x00') 13m18.791022417s ago: executing program 1 (id=518): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x100000001) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x1, 0x4) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e20, @dev}, 0x10) close(r0) 13m16.858143657s ago: executing program 1 (id=520): syz_clone(0x6a000000, 0x0, 0x0, 0x0, 0x0, 0x0) 13m16.857791607s ago: executing program 32 (id=520): syz_clone(0x6a000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m9.943323474s ago: executing program 2 (id=1063): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001b0009f326e19d00ffdbdf2501"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x44800) 2m9.595511801s ago: executing program 2 (id=1064): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000010c0)=ANY=[@ANYBLOB="340000001000010000000000fedbdf25070000001300000008000000", @ANYRES32, @ANYBLOB="10003a800c00020003959100000000000400378015e56125b8cd1bef119f3dddf7214e5442854800de3446b7229941da72765ae014a76a24cfaaf723935e474b166b7dcb8346324ea8604eaaca5505cc29b15646b11f661e4b01738bc2c412f840d53c097046d0b439d1bede9df988c0454f4a256fa10ba1c18c0aac6a5dbf6bdaca7b84eb4b237ca15bef9d953c65b26147256356003f72466a943e40b20100000000000000afe13344949a2e39ead6e726f4c297"], 0x34}], 0x1}, 0x0) 2m9.248342059s ago: executing program 2 (id=1065): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x3) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x2c, r3, 0x6a98047402e98331, 0x0, 0x0, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_GET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x2c, r3, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r4 = getpid() syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_CLOSE={0x13, 0x48}) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r7, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000004c0)={&(0x7f00000003c0)={0x14, 0xb, 0x6, 0x701, 0x0, 0x0, {0xa, 0x0, 0x9}}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x20024840) 2m6.394770786s ago: executing program 2 (id=1070): mount(0x0, &(0x7f0000000140)='.\x00', &(0x7f0000000080)='proc\x00', 0x189, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) move_mount(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00', 0x221) 2m5.52133127s ago: executing program 2 (id=1072): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000006040)={0x0}, 0x1, 0x0, 0x0, 0x20000010}, 0xc4000) 2m4.869523254s ago: executing program 2 (id=1075): openat(0xffffffffffffff9c, 0x0, 0x6042, 0x106) syz_usb_connect(0x5, 0x24, &(0x7f0000000140)={{0x12, 0x1, 0x110, 0x9, 0x28, 0xfc, 0x10, 0x5ac, 0x291, 0x4325, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x40, 0x0, [{{0x9, 0x4, 0x84, 0x0, 0x0, 0x3, 0xe1, 0x2}}]}}]}}, 0x0) 2m4.830550696s ago: executing program 33 (id=1075): openat(0xffffffffffffff9c, 0x0, 0x6042, 0x106) syz_usb_connect(0x5, 0x24, &(0x7f0000000140)={{0x12, 0x1, 0x110, 0x9, 0x28, 0xfc, 0x10, 0x5ac, 0x291, 0x4325, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x40, 0x0, [{{0x9, 0x4, 0x84, 0x0, 0x0, 0x3, 0xe1, 0x2}}]}}]}}, 0x0) 1m10.792148793s ago: executing program 0 (id=1089): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="68e7ee2c0d000000b473fec986", 0xd}, {&(0x7f0000001180)='\x00', 0x1}], 0x2) 1m10.44749592s ago: executing program 0 (id=1090): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB="340000002b000701feffffff00000000037c00000c0001"], 0x34}, 0x1, 0x0, 0x0, 0x4048011}, 0x8010) 1m10.05467327s ago: executing program 0 (id=1091): syz_usb_control_io$printer(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_RW$syz(r0, 0x3ba0, &(0x7f0000000140)={0x48, 0x8, r0, 0x0, 0x7, 0x2ed46, 0xffffffffffffffd1, 0x0, 0x10004}) 1m9.561909816s ago: executing program 0 (id=1092): setreuid(0xee01, 0xee01) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000100)={@empty}, 0x14) 1m8.983720666s ago: executing program 0 (id=1093): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x15) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000002c0)=0x7e) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000000c0)=0x5f) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)=0x3) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000300)) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x7e) 1m8.760062307s ago: executing program 0 (id=1094): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4000, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 23.452512564s ago: executing program 34 (id=1094): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4000, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 8.333361871s ago: executing program 3 (id=1101): mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r0 = userfaultfd(0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000180)={0xaa, 0x280}) ioctl$UFFDIO_MOVE(r0, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000a94000/0x2000)=nil, &(0x7f00005cb000/0x1000)=nil, 0x2000, 0x3}) 4.983197934s ago: executing program 3 (id=1102): r0 = io_uring_setup(0xf08, &(0x7f0000000780)={0x0, 0xfb6e, 0x38c1, 0x4, 0xf0}) io_uring_register$IORING_REGISTER_FILES(r0, 0x20, &(0x7f00000001c0), 0x0) 4.297225469s ago: executing program 3 (id=1103): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280), 0x40900, 0x0) r1 = syz_io_uring_setup(0x497, &(0x7f0000000180)={0x0, 0x79ab, 0x8, 0x8000, 0x400250}, &(0x7f00000003c0)=0x0, &(0x7f00000000c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000140)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x2007, @fd=r0, 0x6, &(0x7f0000000580)=""/207, 0xcf, 0x2, 0x1}) io_uring_enter(r1, 0x74d1, 0x4c3, 0x43, 0x0, 0xfffffffffffffd1d) 2.72005352s ago: executing program 3 (id=1104): mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x21c0, 0x103) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001180), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) read$FUSE(r0, 0x0, 0x0) syz_fuse_handle_req(r0, &(0x7f00000062c0)="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", 0x2000, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x10, 0xffffffffffffffda, 0x3ff, {0x0, 0xb}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, 0x0, {0x7, 0x2b, 0x0, 0x10004004, 0x0, 0xfffe, 0x0, 0x2, 0x0, 0x0, 0x100}}, 0x50) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) umount2(&(0x7f0000000000)='./file0\x00', 0x3) r2 = socket$netlink(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0x40305828, &(0x7f00000000c0)={{0x1, 0x1, 0x14, r2, {0x1}}, './file0\x00'}) 562.174951ms ago: executing program 3 (id=1105): ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) r0 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) r1 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r1, 0xc05064a7, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000700)=[0x0], &(0x7f00000001c0), 0x0, 0x1, 0x0, 0x0, r2}) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000000300)={0x1, 0x1, &(0x7f0000000180)=[r2], &(0x7f00000000c0)=[0x2], &(0x7f0000000240)=[r3], &(0x7f0000000040)}) 0s ago: executing program 3 (id=1106): sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e25}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f00000000c0)='netlink_extack\x00', r4}, 0x10) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=@newtaction={0xeb0, 0x30, 0xb, 0x0, 0x0, {}, [{0xe9c, 0x1, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x0, 0x0, 0x10000000, 0x0, 0x80006}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x3}}}}, @m_pedit={0xe50, 0x2, 0x0, 0x0, {{0xa}, {0xe24, 0x20, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{0xe, 0x2c, 0xffffffffffffffff, 0x2, 0x9}, 0x0, 0x4}, [{0x5, 0x8, 0x4, 0x3, 0x1ff, 0x1}, {0x7ef, 0xcb2a, 0x3, 0x242, 0x1, 0xffff}, {0x5, 0x1000, 0x2, 0x2, 0x1, 0x2}, {0x8b, 0x81, 0x1, 0x95, 0x81, 0x4}, {0x6, 0x0, 0x8, 0xff, 0x6, 0x3}, {0x6410, 0xff, 0xf, 0x1, 0x8, 0x6}, {0x40000000, 0x9, 0x1, 0x10001, 0x7, 0x7fffffff}, {0xe7, 0x3, 0x8f, 0x7, 0x6, 0x1}, {0x5, 0x6, 0x3, 0x1, 0x200, 0x256}, {0x9, 0x1, 0x1, 0x10, 0x2936e3e2, 0x9}, {0x8, 0x9, 0x0, 0xfff, 0x800, 0x4}, {0x0, 0x0, 0x40, 0x7, 0x7fff}, {0xfffffe00, 0x10001, 0x3, 0x10001, 0xca, 0x6}, {0xffffffff, 0xfffffff7, 0x3, 0x7, 0xc, 0x9e3}, {0xe, 0x8, 0x4, 0x132c, 0x10, 0x7}, {0xa, 0x9, 0x5, 0x0, 0x8, 0x1}, {0x7, 0x6, 0x48655641, 0x2, 0x1, 0x37f2}, {0x42163733, 0x0, 0x6, 0xd7, 0x157}, {0x81, 0xc63, 0x5, 0x9e, 0x4, 0x2fa}, {0x4, 0x0, 0x10001, 0xfff, 0x3, 0x40}, {0x51, 0x7, 0x4, 0xb3, 0x0, 0x7}, {0x1, 0x7, 0x3, 0x671, 0xf, 0x10}, {0x2, 0x4, 0xa, 0x1, 0x4, 0xb13}, {0xa, 0x3, 0x7, 0xa, 0x6, 0xcd8}, {0x2, 0x2, 0x6, 0xa, 0x5, 0x7fff}, {0x3, 0x7, 0x6, 0x101, 0x18c, 0x2f7}, {0x3, 0x7, 0x4, 0x1ff, 0xfffffff8, 0x5}, {0x8, 0xffff, 0x6, 0x2, 0x0, 0x2}, {0xd19, 0x0, 0x3, 0x101, 0x9, 0x1}, {0x0, 0x7, 0x4, 0x5, 0x9, 0x3}, {0x0, 0x7, 0x1, 0x1bf, 0xff}, {0x3fe3, 0x257, 0x1, 0x3, 0x9, 0xff}, {0x9, 0x3, 0x5, 0x5, 0xc}, {0x200, 0x3, 0xfff, 0x97, 0x2, 0x1cfd}, {0x100, 0x8, 0xa, 0x2bc, 0x3ff, 0x9}, {0x5, 0x100, 0x80000000, 0x8, 0x3}, {0x1, 0x8, 0x9, 0x4, 0x80000000, 0x4}, {0x164, 0x2, 0x2b, 0x4, 0x5, 0x8001}, {0x1, 0x3fc0000, 0x2, 0x6, 0x6, 0x8}, {0x8, 0xce, 0x91, 0x8, 0x1, 0x7}, {0x800, 0xff, 0x7, 0x2e5, 0x0, 0x3}, {0x6, 0x10001, 0x8, 0x9, 0x4, 0x5}, {0x2, 0xc7, 0x1, 0x10, 0x4679db6b, 0x7}, {0xf, 0x10000, 0x7f, 0x7, 0x8, 0x8000}, {0x1ffdbd61, 0xc420, 0x8, 0xa59e, 0x81, 0x5b}, {0x5, 0x5, 0x1, 0xfffffffb, 0x7ff, 0x3}, {0x7, 0x1, 0x3, 0x1, 0x7f, 0x3}, {0x2, 0x8, 0x6, 0x0, 0xfffffff9, 0xfffffff8}, {0x100, 0x2, 0x7fffffff, 0x6, 0x4, 0x3}, {0xffff, 0x1, 0x0, 0x5, 0x918d, 0x3}, {0xb, 0x3, 0x7, 0x3, 0x8001, 0x5}, {0x0, 0x4, 0x7, 0x1, 0xfffffffb, 0x2}, {0x4, 0xffff8000, 0x1, 0x2, 0x729}, {0x1, 0xffffffff, 0x7a, 0x9, 0x80000000, 0x4}, {0x754b0fe1, 0x40, 0x7, 0x6, 0xd1f8, 0x1}, {0xb28, 0x4, 0x2, 0xe, 0x6, 0x2000400}, {0x0, 0x101, 0x2, 0x2, 0xd28, 0x771d}, {0x75b, 0x50, 0x2, 0x9, 0x4}, {0x5d4, 0x1000, 0x6, 0x2, 0x101, 0xa}, {0x3, 0x2, 0x8, 0x2, 0x5, 0x8}, {0x400, 0x3, 0x7, 0x9, 0x4, 0x100}, {0x9, 0x0, 0xf14, 0x8001, 0xe09, 0x7f}, {0x400, 0xf, 0xffffffff, 0x10000, 0x5, 0x8001}, {0x1, 0x100, 0x6000, 0x3, 0x5, 0x80}, {0x1, 0x7fff, 0x0, 0x9, 0xf, 0x1}, {0x40, 0xfffffff9, 0xe, 0x3, 0x7f, 0x6}, {0xfff, 0x3, 0x2, 0x7fffffff, 0xa9, 0x4}, {0x5, 0x3, 0x7fff, 0x9, 0x6}, {0x6, 0x36, 0x401, 0x5, 0x1000, 0x25}, {0x8, 0xfffffffc, 0xb, 0x3, 0xd2, 0xa40}, {0xe5, 0x2, 0x8, 0x8, 0x40, 0x401}, {0x2, 0x5, 0x6862, 0x4, 0xb, 0xffffff80}, {0x5efbf69a, 0x1, 0x9, 0x6, 0x707, 0x5}, {0x3e, 0x6, 0x9, 0x7, 0x80000001, 0x8}, {0x2, 0x7, 0x2, 0x1b1, 0x401, 0x21a}, {0x7, 0x800, 0x8, 0x0, 0x0, 0x4}, {0x0, 0x5, 0xd0da, 0x2, 0xff800, 0x4ff4}, {0x8, 0x800, 0x10, 0x5, 0xf71, 0xb5}, {0x1, 0x4, 0xd, 0x2c, 0x2, 0x8}, {0x2, 0xe54, 0x100, 0x662, 0x7ff, 0x401}, {0x30000, 0x6, 0xeb, 0x5, 0x2, 0x3}, {0x8, 0x49c, 0x7, 0x10, 0x1, 0xfa5b}, {0x1, 0x6, 0x9, 0xf91e, 0x8f92, 0x8}, {0x13f, 0x7, 0x800, 0x9, 0x0, 0x6}, {0xa8, 0x0, 0x400, 0x5, 0x2, 0x3}, {0x9dfa, 0x8000, 0xc, 0x4, 0x0, 0x3}, {0xfff, 0x2, 0x1, 0x4, 0x400000, 0xd}, {0x8, 0xa, 0x9142, 0x656, 0x6, 0x2}, {0x4, 0xa, 0x3, 0x3f, 0x2, 0x8000}, {0x4256, 0x523, 0x101, 0x9, 0x7, 0x7}, {0x800, 0x800, 0x8001, 0x0, 0x3, 0x9}, {0xaa28, 0xfffffffc, 0x4, 0x7, 0x9, 0x3}, {0x0, 0x1, 0x9, 0x10001, 0x1, 0x3}, {0x3, 0x101, 0x4, 0x5, 0x9, 0x80000000}, {0x4, 0x5, 0x8, 0x228753fb, 0xb1, 0x400}, {0x7, 0x1ff, 0xbb1, 0x6, 0x8d8, 0xffff}, {0x400, 0xffffff80, 0xfffffffc, 0x5, 0x4, 0x1}, {0x7, 0x5, 0x5, 0x2, 0x280000, 0x7fffffff}, {0x7ff, 0x7, 0x6, 0x6, 0x8, 0x9}, {0x10001, 0xfffffff7, 0x1, 0x3d046e0, 0x7, 0x200}, {0x8, 0x7, 0x6, 0x1, 0x2, 0x4}, {0x1, 0x2, 0x68fa, 0x9, 0x3, 0x6}, {0x8a3c, 0x45, 0x80000000, 0xa976, 0x5, 0xff}, {0x1, 0x8001, 0x7f, 0xf, 0x6, 0x9}, {0x76, 0x2, 0x2, 0x4dc, 0x7, 0xcbe0}, {0x0, 0x8, 0x33cf, 0xc, 0x7, 0xc}, {0x3, 0x1, 0x6, 0x8, 0x7, 0x80000000}, {0x2, 0x80, 0x6, 0x40, 0x97d, 0x5}, {0xffffff7a, 0x7, 0x3065ad5, 0x2, 0x0, 0x1}, {0x7, 0x8, 0x8000, 0x8, 0x400, 0x1}, {0x0, 0x1, 0x1, 0x4, 0x5dc, 0x1}, {0x6, 0x7, 0x9, 0x4, 0xe46, 0x2}, {0x4, 0x0, 0x4, 0xffff, 0x1, 0x20}, {0xdc8, 0x5, 0xfffffffa, 0x5, 0x3e0b, 0xbf13dd1}, {0x6, 0x0, 0x8, 0x9, 0x8, 0xd}, {0xcb7, 0x0, 0x9, 0x6, 0x6, 0x9}, {0x8, 0x3, 0x1ff, 0x5, 0x7fffffff, 0x5}, {0xf, 0x1, 0x8, 0x4, 0x8000, 0x4}, {0x4, 0x1ff, 0xffffff01, 0xfffffffd, 0x2, 0xd9}, {0x7, 0x5, 0x5c, 0x2, 0xa3, 0x6}, {0x838, 0x7, 0x401, 0x0, 0x0, 0x100}, {0x400, 0x2ce, 0x7, 0x7ff, 0x3, 0x5}, {0x23, 0x8, 0x4, 0x23, 0x100, 0x920}, {0x101, 0x830a, 0x3, 0xfc6, 0x3, 0xa}, {0x518, 0x0, 0x9, 0x2, 0x1, 0x4}, {0x4, 0x8, 0x7914, 0x5, 0x9, 0x2efc}, {0x100, 0x28000, 0x7, 0x7a5, 0xa, 0x1}, {0x401, 0x7, 0x0, 0x8, 0x400, 0xd9}], [{0x2, 0x1}, {}, {0x5}, {0x5}, {0x2, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x2}, {0x3, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x2, 0x1}, {}, {0x4}, {0x4}, {0x5}, {0x2, 0x1}, {0x2}, {0x4, 0x1}, {0x4}, {0x3, 0x2}, {0x1, 0x1}, {0x4}, {0x2}, {0x1}, {0x0, 0x1}, {0x1}, {0x1, 0x1}, {0x5}, {0x1, 0x1}, {0x3}, {0x1, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x2}, {0x2, 0xc6c86f6a64db0be9}, {0x5, 0x1}, {0x5, 0x1}, {0x4}, {0x2}, {0x3, 0x1}, {0x5}, {0x4}, {0x3}, {0x3, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {}, {0x6, 0x1}, {0x2}, {0x7}, {0x4}, {0x5}, {}, {}, {0x4, 0x1}, {0x5}, {0x5, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {}, {0x4}, {0x2, 0x1}, {0x0, 0x1}, {}, {0x2}, {0x2, 0x1}, {0x0, 0x1}, {0x3}, {0xedacfb61e3a1d3f6}, {0x2}, {0x5}, {0x5}, {0x3}, {0x2}, {0x3}, {0x0, 0x99aace4e8fc020c4}, {0x3}, {0x1}, {0x4}, {0x1, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x3, 0xc33a971e7efcc7cf}, {0x4}, {0x5}, {0x1, 0x1}, {0x4, 0x1}, {}, {0x5}, {0x5, 0x1}, {}, {0x1, 0x1}, {0x4, 0x95abb27104f6f465}, {0x1, 0x1}, {0x4}, {0x5, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x3}, {0x1, 0x1}, {0x2, 0x1}, {0x1}, {0x2}, {0x4}, {0x1, 0x1}, {0x1}, {0x5}, {0x1, 0x1}, {0x4}, {0x3}, {0x2}, {0x0, 0x1}, {0x4}, {0x3}, {0x3}, {0x4, 0x1}, {0x4}, {0x1, 0x1}, {0x2, 0x1}], 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xeb0}}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:43545' (ED25519) to the list of known hosts. [ 225.017990][ T30] audit: type=1400 audit(224.470:46): avc: denied { name_bind } for pid=3311 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 225.613216][ T30] audit: type=1400 audit(225.070:47): avc: denied { execute } for pid=3312 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 225.627886][ T30] audit: type=1400 audit(225.080:48): avc: denied { execute_no_trans } for pid=3312 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 231.978181][ T30] audit: type=1400 audit(231.430:49): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 231.992030][ T30] audit: type=1400 audit(231.440:50): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 232.065748][ T3312] cgroup: Unknown subsys name 'net' [ 232.102517][ T30] audit: type=1400 audit(231.560:51): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 232.455998][ T3312] cgroup: Unknown subsys name 'cpuset' [ 232.530622][ T3312] cgroup: Unknown subsys name 'rlimit' [ 232.813069][ T30] audit: type=1400 audit(232.270:52): avc: denied { setattr } for pid=3312 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 232.817932][ T30] audit: type=1400 audit(232.270:53): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 232.826998][ T30] audit: type=1400 audit(232.280:54): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 233.508540][ T3314] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 233.513695][ T30] audit: type=1400 audit(232.970:55): avc: denied { relabelto } for pid=3314 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 233.524904][ T30] audit: type=1400 audit(232.970:56): avc: denied { write } for pid=3314 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 233.639912][ T30] audit: type=1400 audit(233.090:57): avc: denied { read } for pid=3312 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 233.642319][ T30] audit: type=1400 audit(233.100:58): avc: denied { open } for pid=3312 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 233.666536][ T3312] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 255.872337][ T30] audit: type=1400 audit(255.330:59): avc: denied { execmem } for pid=3315 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 255.990028][ T30] audit: type=1400 audit(255.430:60): avc: denied { read } for pid=3317 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 255.990942][ T30] audit: type=1400 audit(255.440:61): avc: denied { open } for pid=3317 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 256.010837][ T30] audit: type=1400 audit(255.460:62): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 256.096292][ T30] audit: type=1400 audit(255.550:63): avc: denied { module_request } for pid=3317 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 256.289583][ T30] audit: type=1400 audit(255.740:64): avc: denied { sys_module } for pid=3318 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 265.251617][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 265.420024][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 265.546548][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 265.666952][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 269.200378][ T3317] hsr_slave_0: entered promiscuous mode [ 269.233688][ T3317] hsr_slave_1: entered promiscuous mode [ 269.810848][ T3318] hsr_slave_0: entered promiscuous mode [ 269.821882][ T3318] hsr_slave_1: entered promiscuous mode [ 269.842307][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 269.853524][ T3318] Cannot create hsr debugfs directory [ 272.516778][ T30] audit: type=1400 audit(271.970:65): avc: denied { create } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 272.551061][ T30] audit: type=1400 audit(271.990:66): avc: denied { write } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 272.558397][ T30] audit: type=1400 audit(272.010:67): avc: denied { read } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 272.661269][ T3317] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 272.785609][ T3317] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 272.827228][ T3317] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 272.887779][ T3317] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 273.497417][ T3318] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 273.600874][ T3318] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 273.692984][ T3318] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 273.732298][ T3318] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 276.821837][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 276.967377][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 290.884760][ T3318] veth0_vlan: entered promiscuous mode [ 291.065461][ T3318] veth1_vlan: entered promiscuous mode [ 291.396565][ T3317] veth0_vlan: entered promiscuous mode [ 291.542798][ T3317] veth1_vlan: entered promiscuous mode [ 291.815694][ T3318] veth0_macvtap: entered promiscuous mode [ 291.953124][ T3318] veth1_macvtap: entered promiscuous mode [ 292.344078][ T990] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.348203][ T990] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.394787][ T990] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.396102][ T990] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.403867][ T3317] veth0_macvtap: entered promiscuous mode [ 292.640163][ T3317] veth1_macvtap: entered promiscuous mode [ 293.096616][ T30] audit: type=1400 audit(292.540:68): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 293.140771][ T30] audit: type=1400 audit(292.570:69): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/syzkaller.TQbqnb/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 293.157969][ T30] audit: type=1400 audit(292.610:70): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 293.202207][ T30] audit: type=1400 audit(292.660:71): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/syzkaller.TQbqnb/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 293.220596][ T30] audit: type=1400 audit(292.670:72): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/syzkaller.TQbqnb/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2996 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 293.272445][ T30] audit: type=1400 audit(292.720:73): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 293.314720][ T30] audit: type=1400 audit(292.770:74): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 293.333811][ T30] audit: type=1400 audit(292.780:75): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="gadgetfs" ino=2997 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 293.383950][ T30] audit: type=1400 audit(292.830:76): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 293.385052][ T30] audit: type=1400 audit(292.830:77): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 293.782843][ T3318] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 293.896594][ T1607] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.911280][ T1607] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.912090][ T1607] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 293.912477][ T1607] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 298.977688][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 298.978156][ T30] audit: type=1400 audit(298.430:99): avc: denied { watch } for pid=3478 comm="syz.1.6" path="/4" dev="tmpfs" ino=33 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 299.135647][ T30] audit: type=1400 audit(298.590:100): avc: denied { map_write } for pid=3479 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 299.602359][ T30] audit: type=1400 audit(299.060:101): avc: denied { create } for pid=3479 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 299.624209][ T30] audit: type=1400 audit(299.080:102): avc: denied { write } for pid=3479 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 299.750605][ T30] audit: type=1400 audit(299.200:103): avc: denied { setattr } for pid=3479 comm="syz.0.7" name="vcsa1" dev="devtmpfs" ino=19 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 300.671792][ T3488] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.014181][ T3492] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9'. [ 301.123800][ T3488] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.957156][ T3492] geneve2: entered promiscuous mode [ 301.961327][ T3492] geneve2: entered allmulticast mode [ 302.355287][ T3488] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 302.581610][ T990] netdevsim netdevsim1 netdevsim0: set [1, 1] type 2 family 0 port 39646 - 0 [ 303.213217][ T30] audit: type=1400 audit(302.670:104): avc: denied { create } for pid=3503 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 303.297919][ T30] audit: type=1400 audit(302.750:105): avc: denied { prog_run } for pid=3503 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 303.315724][ T30] audit: type=1400 audit(302.770:106): avc: denied { setopt } for pid=3503 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 303.342645][ T30] audit: type=1400 audit(302.800:107): avc: denied { write } for pid=3503 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 304.411005][ T3488] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 304.413721][ T3488] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 1] type 2 family 0 port 39646 - 0 [ 304.994562][ T984] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 39646 - 0 [ 304.997266][ T984] netdevsim netdevsim1 eth0: set [1, 1] type 2 family 0 port 6081 - 0 [ 305.085737][ T26] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 39646 - 0 [ 305.086475][ T26] netdevsim netdevsim1 eth1: set [1, 1] type 2 family 0 port 6081 - 0 [ 305.222156][ T984] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 39646 - 0 [ 305.222849][ T984] netdevsim netdevsim1 eth2: set [1, 1] type 2 family 0 port 6081 - 0 [ 305.380796][ T1607] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 39646 - 0 [ 305.381122][ T1607] netdevsim netdevsim1 eth3: set [1, 1] type 2 family 0 port 6081 - 0 [ 305.753593][ T30] audit: type=1400 audit(305.210:108): avc: denied { read } for pid=3511 comm="syz.0.21" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 305.757402][ T30] audit: type=1400 audit(305.210:109): avc: denied { open } for pid=3511 comm="syz.0.21" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 306.135438][ T30] audit: type=1400 audit(305.590:110): avc: denied { read write } for pid=3511 comm="syz.0.21" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 306.146630][ T30] audit: type=1400 audit(305.600:111): avc: denied { open } for pid=3511 comm="syz.0.21" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 306.167471][ T30] audit: type=1400 audit(305.620:112): avc: denied { ioctl } for pid=3511 comm="syz.0.21" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 311.988057][ T3546] netlink: 60 bytes leftover after parsing attributes in process `syz.0.37'. [ 312.014890][ T3546] netlink: 60 bytes leftover after parsing attributes in process `syz.0.37'. [ 312.501754][ T3546] netlink: 60 bytes leftover after parsing attributes in process `syz.0.37'. [ 312.502488][ T3546] netlink: 60 bytes leftover after parsing attributes in process `syz.0.37'. [ 312.522294][ T3567] netlink: 28 bytes leftover after parsing attributes in process `syz.1.46'. [ 312.982086][ T30] audit: type=1326 audit(312.430:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3569 comm="syz.1.47" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 312.993132][ T30] audit: type=1326 audit(312.450:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3569 comm="syz.1.47" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 313.012529][ T30] audit: type=1326 audit(312.460:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3569 comm="syz.1.47" exe="/syz-executor" sig=0 arch=c00000b7 syscall=186 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 313.047790][ T30] audit: type=1326 audit(312.500:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3569 comm="syz.1.47" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 313.062650][ T30] audit: type=1326 audit(312.510:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3569 comm="syz.1.47" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 313.461728][ T3546] netlink: 60 bytes leftover after parsing attributes in process `syz.0.37'. [ 313.463070][ T3546] netlink: 60 bytes leftover after parsing attributes in process `syz.0.37'. [ 314.665228][ T3580] netlink: 28 bytes leftover after parsing attributes in process `syz.0.51'. [ 314.770090][ T30] audit: type=1400 audit(314.210:118): avc: denied { create } for pid=3581 comm="syz.1.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 314.802686][ T30] audit: type=1400 audit(314.260:119): avc: denied { ioctl } for pid=3581 comm="syz.1.52" path="socket:[4338]" dev="sockfs" ino=4338 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 314.807607][ T30] audit: type=1400 audit(314.260:120): avc: denied { bind } for pid=3581 comm="syz.1.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 314.820628][ T30] audit: type=1400 audit(314.280:121): avc: denied { write } for pid=3581 comm="syz.1.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 315.345450][ T30] audit: type=1400 audit(314.800:122): avc: denied { create } for pid=3585 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 316.767764][ T3596] netlink: 28 bytes leftover after parsing attributes in process `syz.1.57'. [ 317.907354][ T3608] netlink: 28 bytes leftover after parsing attributes in process `syz.0.63'. [ 318.300356][ T3611] netlink: 8 bytes leftover after parsing attributes in process `syz.0.65'. [ 318.305779][ T3611] netlink: 12 bytes leftover after parsing attributes in process `syz.0.65'. [ 318.307729][ T3611] netlink: 20 bytes leftover after parsing attributes in process `syz.0.65'. [ 318.655061][ T3614] macvlan1: entered promiscuous mode [ 318.666434][ T3614] ipvlan0: entered promiscuous mode [ 318.691157][ T3614] ipvlan0: left promiscuous mode [ 318.694754][ T3614] macvlan1: left promiscuous mode [ 319.843048][ T3623] netlink: 28 bytes leftover after parsing attributes in process `syz.0.69'. [ 320.551889][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 320.552562][ T30] audit: type=1326 audit(320.010:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3628 comm="syz.0.72" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 320.557976][ T30] audit: type=1326 audit(320.010:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3628 comm="syz.0.72" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 320.574068][ T30] audit: type=1326 audit(320.030:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3628 comm="syz.0.72" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 320.592051][ T30] audit: type=1326 audit(320.050:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3628 comm="syz.0.72" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 320.604450][ T30] audit: type=1326 audit(320.060:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3628 comm="syz.0.72" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 320.611624][ T30] audit: type=1326 audit(320.060:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3628 comm="syz.0.72" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 320.619048][ T30] audit: type=1326 audit(320.070:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3628 comm="syz.0.72" exe="/syz-executor" sig=0 arch=c00000b7 syscall=435 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 320.657468][ T30] audit: type=1326 audit(320.110:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3631 comm="syz.0.72" exe="/syz-executor" sig=0 arch=c00000b7 syscall=115 compat=0 ip=0xffffbaf867c8 code=0x7ffc0000 [ 320.670210][ T30] audit: type=1326 audit(320.120:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3628 comm="syz.0.72" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 320.682958][ T30] audit: type=1326 audit(320.140:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3628 comm="syz.0.72" exe="/syz-executor" sig=0 arch=c00000b7 syscall=260 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 321.063591][ T3634] netlink: 28 bytes leftover after parsing attributes in process `syz.1.74'. [ 321.352258][ T3636] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 322.364154][ T3640] netlink: 64 bytes leftover after parsing attributes in process `syz.1.77'. [ 326.611020][ T3664] netlink: 16 bytes leftover after parsing attributes in process `syz.1.88'. [ 327.044736][ T30] kauditd_printk_skb: 28 callbacks suppressed [ 327.053021][ T30] audit: type=1400 audit(326.500:183): avc: denied { name_bind } for pid=3668 comm="syz.1.91" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 327.094129][ T3669] capability: warning: `syz.0.90' uses deprecated v2 capabilities in a way that may be insecure [ 327.983222][ T30] audit: type=1400 audit(327.440:184): avc: denied { execute } for pid=3675 comm="syz.0.93" name="file1" dev="tmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 327.986764][ T3678] process 'syz.0.93' launched './file1' with NULL argv: empty string added [ 328.049529][ T30] audit: type=1400 audit(327.490:185): avc: denied { execute_no_trans } for pid=3675 comm="syz.0.93" path="/47/file1" dev="tmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 328.993928][ T30] audit: type=1326 audit(328.450:186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.1.98" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 329.006087][ T30] audit: type=1326 audit(328.460:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.1.98" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 329.016969][ T30] audit: type=1326 audit(328.470:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.1.98" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 329.026137][ T30] audit: type=1326 audit(328.480:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.1.98" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 329.033109][ T30] audit: type=1326 audit(328.490:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.1.98" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 329.051197][ T30] audit: type=1326 audit(328.510:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.1.98" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 329.053815][ T30] audit: type=1326 audit(328.510:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3685 comm="syz.1.98" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 331.571758][ T3699] netlink: 140 bytes leftover after parsing attributes in process `syz.0.103'. [ 331.582340][ T3699] netlink: 48 bytes leftover after parsing attributes in process `syz.0.103'. [ 334.180112][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 334.181189][ T30] audit: type=1400 audit(333.630:199): avc: denied { create } for pid=3707 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 337.903295][ T30] audit: type=1400 audit(337.350:200): avc: denied { create } for pid=3731 comm="syz.0.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 338.566656][ T3736] netlink: 4 bytes leftover after parsing attributes in process `syz.1.118'. [ 338.912954][ T30] audit: type=1400 audit(338.370:201): avc: denied { ioctl } for pid=3734 comm="syz.1.118" path="socket:[4604]" dev="sockfs" ino=4604 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 338.963249][ T3736] netlink: 4 bytes leftover after parsing attributes in process `syz.1.118'. [ 342.945525][ T30] audit: type=1326 audit(342.400:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3759 comm="syz.0.127" exe="/syz-executor" sig=9 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x0 [ 343.155607][ T30] audit: type=1326 audit(342.610:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.1.128" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 343.161968][ T30] audit: type=1326 audit(342.610:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.1.128" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 343.172678][ T30] audit: type=1326 audit(342.620:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.1.128" exe="/syz-executor" sig=0 arch=c00000b7 syscall=64 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 343.182386][ T30] audit: type=1326 audit(342.630:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.1.128" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 343.190329][ T30] audit: type=1326 audit(342.640:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.1.128" exe="/syz-executor" sig=0 arch=c00000b7 syscall=5 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 343.199977][ T30] audit: type=1326 audit(342.650:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.1.128" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 343.204142][ T30] audit: type=1326 audit(342.660:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.1.128" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 343.215399][ T30] audit: type=1326 audit(342.670:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.1.128" exe="/syz-executor" sig=0 arch=c00000b7 syscall=14 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 343.224059][ T30] audit: type=1326 audit(342.680:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.1.128" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 343.674861][ T3764] SELinux: failed to load policy [ 344.775607][ T3771] wireguard0: entered promiscuous mode [ 344.776226][ T3771] wireguard0: entered allmulticast mode [ 347.655249][ T3781] syz.1.136 uses obsolete (PF_INET,SOCK_PACKET) [ 348.419051][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 348.421190][ T30] audit: type=1326 audit(347.870:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3782 comm="syz.1.137" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 348.433549][ T30] audit: type=1326 audit(347.890:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3782 comm="syz.1.137" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 348.450184][ T30] audit: type=1326 audit(347.910:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3782 comm="syz.1.137" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 348.451629][ T30] audit: type=1326 audit(347.910:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3782 comm="syz.1.137" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 348.460964][ T30] audit: type=1326 audit(347.910:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3782 comm="syz.1.137" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 348.465131][ T30] audit: type=1326 audit(347.910:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3782 comm="syz.1.137" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 348.469866][ T30] audit: type=1326 audit(347.910:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3782 comm="syz.1.137" exe="/syz-executor" sig=0 arch=c00000b7 syscall=264 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 348.475230][ T30] audit: type=1326 audit(347.920:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3782 comm="syz.1.137" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 348.719839][ T30] audit: type=1400 audit(348.160:223): avc: denied { compute_member } for pid=3784 comm="gtp" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 351.638012][ T3786] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 355.305938][ T30] audit: type=1326 audit(354.760:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3813 comm="syz.1.146" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 355.322357][ T30] audit: type=1326 audit(354.780:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3813 comm="syz.1.146" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 355.334038][ T30] audit: type=1326 audit(354.790:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3813 comm="syz.1.146" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 355.345276][ T30] audit: type=1326 audit(354.800:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3813 comm="syz.1.146" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 355.359604][ T30] audit: type=1326 audit(354.810:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3813 comm="syz.1.146" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 355.368201][ T30] audit: type=1326 audit(354.820:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3813 comm="syz.1.146" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 355.376344][ T30] audit: type=1326 audit(354.830:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3813 comm="syz.1.146" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 355.404944][ T30] audit: type=1326 audit(354.860:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3813 comm="syz.1.146" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 355.409855][ T30] audit: type=1326 audit(354.860:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3813 comm="syz.1.146" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 355.417026][ T30] audit: type=1326 audit(354.870:233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3813 comm="syz.1.146" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 356.586900][ T3821] netlink: 4 bytes leftover after parsing attributes in process `syz.0.149'. [ 363.069862][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 363.072056][ T30] audit: type=1400 audit(362.520:244): avc: denied { name_bind } for pid=3840 comm="syz.1.159" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 364.361872][ T3853] netlink: 4 bytes leftover after parsing attributes in process `syz.0.165'. [ 364.884310][ T30] audit: type=1400 audit(364.340:245): avc: denied { sqpoll } for pid=3856 comm="syz.1.167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 365.293083][ T30] audit: type=1326 audit(364.750:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3860 comm="syz.1.168" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 365.326024][ T30] audit: type=1326 audit(364.780:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3860 comm="syz.1.168" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 365.332655][ T30] audit: type=1326 audit(364.780:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3860 comm="syz.1.168" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 365.336600][ T30] audit: type=1326 audit(364.790:249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3860 comm="syz.1.168" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 365.367977][ T30] audit: type=1326 audit(364.820:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3860 comm="syz.1.168" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 365.369623][ T30] audit: type=1326 audit(364.820:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3860 comm="syz.1.168" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 365.386540][ T30] audit: type=1326 audit(364.840:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3860 comm="syz.1.168" exe="/syz-executor" sig=0 arch=c00000b7 syscall=137 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 366.005188][ T3863] syzkaller1: entered allmulticast mode [ 367.306060][ T3871] Zero length message leads to an empty skb [ 367.662527][ T30] audit: type=1400 audit(367.120:253): avc: denied { block_suspend } for pid=3872 comm="syz.0.174" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 368.649973][ T30] audit: type=1326 audit(368.100:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3881 comm="syz.1.178" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 368.650503][ T30] audit: type=1326 audit(368.100:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3881 comm="syz.1.178" exe="/syz-executor" sig=0 arch=c00000b7 syscall=220 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 369.185443][ T30] audit: type=1326 audit(368.640:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3881 comm="syz.1.178" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 369.192635][ T30] audit: type=1326 audit(368.650:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3881 comm="syz.1.178" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 369.203321][ T30] audit: type=1326 audit(368.660:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3885 comm="syz.1.178" exe="/syz-executor" sig=0 arch=c00000b7 syscall=115 compat=0 ip=0xffffaed867c8 code=0x7ffc0000 [ 369.680768][ T3890] syzkaller1: entered promiscuous mode [ 369.681137][ T3890] syzkaller1: entered allmulticast mode [ 370.715186][ T30] audit: type=1326 audit(370.170:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3885 comm="syz.1.178" exe="/syz-executor" sig=0 arch=c00000b7 syscall=93 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 372.091895][ T3900] IPv6: Can't replace route, no match found [ 372.666535][ T30] audit: type=1400 audit(372.120:260): avc: denied { write } for pid=3904 comm="syz.0.187" name="kcm" dev="proc" ino=4026532717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 373.443757][ T30] audit: type=1400 audit(372.900:261): avc: denied { read } for pid=3907 comm="syz.0.189" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 373.459997][ T30] audit: type=1400 audit(372.900:262): avc: denied { open } for pid=3907 comm="syz.0.189" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 373.531377][ T3908] netlink: 8 bytes leftover after parsing attributes in process `syz.1.188'. [ 373.735864][ T30] audit: type=1400 audit(373.190:263): avc: denied { ioctl } for pid=3907 comm="syz.0.189" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x330e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 373.746419][ T3908] vlan2: entered allmulticast mode [ 373.749057][ T3908] bridge_slave_0: entered allmulticast mode [ 374.846661][ T30] audit: type=1326 audit(374.300:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3914 comm="syz.0.191" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 374.880600][ T30] audit: type=1326 audit(374.330:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3914 comm="syz.0.191" exe="/syz-executor" sig=0 arch=c00000b7 syscall=428 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 374.933905][ T30] audit: type=1326 audit(374.380:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3914 comm="syz.0.191" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 374.946849][ T30] audit: type=1326 audit(374.400:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3914 comm="syz.0.191" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 375.287270][ T3919] netlink: 24 bytes leftover after parsing attributes in process `syz.0.192'. [ 376.109118][ T30] audit: type=1326 audit(375.560:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.1.194" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 376.113862][ T30] audit: type=1326 audit(375.570:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.1.194" exe="/syz-executor" sig=0 arch=c00000b7 syscall=140 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 376.129593][ T30] audit: type=1326 audit(375.570:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.1.194" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 376.437474][ T30] audit: type=1400 audit(375.890:271): avc: denied { create } for pid=3924 comm="syz.1.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 376.452255][ T30] audit: type=1400 audit(375.900:272): avc: denied { bind } for pid=3924 comm="syz.1.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 382.072905][ T3933] netlink: 256 bytes leftover after parsing attributes in process `syz.1.198'. [ 382.261431][ T3933] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 382.314473][ T3933] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 383.131039][ T3945] netlink: 12 bytes leftover after parsing attributes in process `syz.0.201'. [ 383.132849][ T3945] netlink: 12 bytes leftover after parsing attributes in process `syz.0.201'. [ 383.354254][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 383.356727][ T30] audit: type=1400 audit(382.810:274): avc: denied { nlmsg_read } for pid=3946 comm="syz.1.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 384.819920][ T30] audit: type=1326 audit(384.270:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.206" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 384.824103][ T30] audit: type=1326 audit(384.280:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.206" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 384.847614][ T30] audit: type=1326 audit(384.300:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.206" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 384.851276][ T30] audit: type=1326 audit(384.300:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.206" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 384.862553][ T30] audit: type=1326 audit(384.320:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.206" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 384.874195][ T30] audit: type=1326 audit(384.330:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.206" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 384.880679][ T30] audit: type=1326 audit(384.340:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.206" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 384.891518][ T30] audit: type=1326 audit(384.350:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.206" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 384.895177][ T30] audit: type=1326 audit(384.350:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3954 comm="syz.1.206" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 385.082257][ T3956] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3956 comm=syz.1.206 [ 385.703686][ T3962] netlink: 'syz.0.209': attribute type 39 has an invalid length. [ 388.764603][ T3983] vlan0: entered allmulticast mode [ 388.764971][ T3983] dummy0: entered allmulticast mode [ 389.443137][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 389.444548][ T30] audit: type=1400 audit(388.900:315): avc: denied { watch } for pid=3985 comm="syz.1.220" path="/116" dev="tmpfs" ino=598 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 390.033225][ T30] audit: type=1400 audit(389.490:316): avc: denied { create } for pid=3990 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=netlink_dnrt_socket permissive=1 [ 392.266425][ T30] audit: type=1400 audit(391.720:317): avc: denied { connect } for pid=4005 comm="syz.0.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 393.980768][ T30] audit: type=1326 audit(393.420:318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4017 comm="syz.0.235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 394.003060][ T30] audit: type=1326 audit(393.460:319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4017 comm="syz.0.235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 394.026079][ T30] audit: type=1326 audit(393.480:320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4017 comm="syz.0.235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 394.029658][ T30] audit: type=1326 audit(393.480:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4017 comm="syz.0.235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 394.042715][ T30] audit: type=1326 audit(393.500:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4017 comm="syz.0.235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 394.067749][ T30] audit: type=1326 audit(393.520:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4017 comm="syz.0.235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 394.085152][ T30] audit: type=1326 audit(393.540:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4017 comm="syz.0.235" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 395.487635][ T4030] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=4030 comm=syz.1.241 [ 401.040803][ T31] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 401.251139][ T31] usb 1-1: Using ep0 maxpacket: 16 [ 401.584234][ T31] usb 1-1: unable to get BOS descriptor or descriptor too short [ 401.602589][ T31] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 401.610246][ T31] usb 1-1: can't read configurations, error -71 [ 402.371144][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 402.383508][ T30] audit: type=1400 audit(401.820:340): avc: denied { write } for pid=4080 comm="syz.0.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 402.592064][ T4083] netlink: '+}[@': attribute type 39 has an invalid length. [ 403.443707][ T3463] infiniband syz1: ib_query_port failed (-19) [ 405.177449][ T30] audit: type=1400 audit(404.630:341): avc: denied { audit_write } for pid=4100 comm="syz.0.274" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 405.198172][ T30] audit: type=1107 audit(404.650:342): pid=4100 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 410.093636][ T30] audit: type=1326 audit(409.540:343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.0.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 410.100594][ T30] audit: type=1326 audit(409.550:344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.0.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=291 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 410.101392][ T30] audit: type=1326 audit(409.560:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.0.291" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 411.239756][ T30] audit: type=1326 audit(410.690:346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4139 comm="gtp" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 411.280688][ T30] audit: type=1326 audit(410.710:347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4139 comm="gtp" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 411.281701][ T30] audit: type=1326 audit(410.710:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4139 comm="gtp" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 411.282066][ T30] audit: type=1326 audit(410.730:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4139 comm="gtp" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 411.282391][ T30] audit: type=1326 audit(410.730:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4139 comm="gtp" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 411.282722][ T30] audit: type=1326 audit(410.730:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4139 comm="gtp" exe="/syz-executor" sig=0 arch=c00000b7 syscall=266 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 411.301170][ T30] audit: type=1326 audit(410.740:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4139 comm="gtp" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 426.497359][ T4164] netlink: 4 bytes leftover after parsing attributes in process `syz.0.302'. [ 439.662937][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 439.666273][ T30] audit: type=1326 audit(439.110:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4178 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 439.672687][ T30] audit: type=1326 audit(439.130:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4178 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 439.701635][ T30] audit: type=1326 audit(439.160:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4178 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 439.726670][ T30] audit: type=1326 audit(439.180:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4178 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 439.731641][ T30] audit: type=1326 audit(439.180:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4178 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 439.740886][ T30] audit: type=1326 audit(439.200:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4178 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 439.762232][ T30] audit: type=1326 audit(439.220:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4178 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 439.790022][ T30] audit: type=1326 audit(439.240:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4178 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 439.790619][ T30] audit: type=1326 audit(439.240:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4178 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 439.812942][ T30] audit: type=1326 audit(439.270:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4178 comm="syz.0.307" exe="/syz-executor" sig=0 arch=c00000b7 syscall=437 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 448.324318][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 448.332667][ T30] audit: type=1400 audit(447.780:369): avc: denied { read } for pid=4198 comm="syz.0.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 448.863870][ T30] audit: type=1400 audit(448.320:370): avc: denied { setopt } for pid=4198 comm="syz.0.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 451.596748][ T4206] netlink: 4 bytes leftover after parsing attributes in process `syz.1.318'. [ 451.734170][ T4206] syz_tun: entered promiscuous mode [ 451.752038][ T4206] macvtap1: entered promiscuous mode [ 451.754394][ T4206] macvtap1: entered allmulticast mode [ 451.754686][ T4206] syz_tun: entered allmulticast mode [ 451.874682][ T4206] syz_tun: left allmulticast mode [ 451.877391][ T4206] syz_tun: left promiscuous mode [ 452.364547][ T4208] netlink: 'syz.1.319': attribute type 1 has an invalid length. [ 453.879648][ T30] audit: type=1326 audit(453.330:371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4214 comm="syz.1.322" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 453.884787][ T30] audit: type=1326 audit(453.330:372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4214 comm="syz.1.322" exe="/syz-executor" sig=0 arch=c00000b7 syscall=195 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 453.886754][ T30] audit: type=1326 audit(453.340:373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4214 comm="syz.1.322" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 454.034447][ T4217] binfmt_misc: register: failed to install interpreter file ./file0 [ 455.587367][ T4230] @0Ù: renamed from bond_slave_1 (while UP) [ 456.920384][ T30] audit: type=1326 audit(456.370:374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4235 comm="syz.1.331" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 456.921438][ T30] audit: type=1326 audit(456.370:375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4235 comm="syz.1.331" exe="/syz-executor" sig=0 arch=c00000b7 syscall=5 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 456.922404][ T30] audit: type=1326 audit(456.380:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4235 comm="syz.1.331" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 456.922928][ T30] audit: type=1326 audit(456.380:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4235 comm="syz.1.331" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 456.940126][ T30] audit: type=1326 audit(456.380:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4235 comm="syz.1.331" exe="/syz-executor" sig=0 arch=c00000b7 syscall=14 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 456.945985][ T30] audit: type=1326 audit(456.380:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4235 comm="syz.1.331" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 457.207623][ T30] audit: type=1400 audit(456.660:380): avc: denied { create } for pid=4237 comm="syz.1.332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 457.652926][ T4240] netlink: 4 bytes leftover after parsing attributes in process `syz.1.333'. [ 458.156506][ T4240] netlink: 4 bytes leftover after parsing attributes in process `syz.1.333'. [ 460.837102][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 460.837692][ T30] audit: type=1400 audit(460.290:382): avc: denied { read write } for pid=3318 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 460.847056][ T30] audit: type=1400 audit(460.300:383): avc: denied { open } for pid=3318 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 460.858184][ T30] audit: type=1400 audit(460.310:384): avc: denied { ioctl } for pid=3318 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 460.968166][ T30] audit: type=1400 audit(460.420:385): avc: denied { bpf } for pid=4252 comm="syz.1.338" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 461.393706][ T30] audit: type=1400 audit(460.850:386): avc: denied { name_bind } for pid=4256 comm="syz.1.340" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 461.762458][ T30] audit: type=1400 audit(461.210:387): avc: denied { map_create } for pid=4258 comm="syz.1.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 461.766510][ T30] audit: type=1400 audit(461.220:388): avc: denied { map_read map_write } for pid=4258 comm="syz.1.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 461.781902][ T30] audit: type=1400 audit(461.230:389): avc: denied { prog_load } for pid=4258 comm="syz.1.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 461.782440][ T30] audit: type=1400 audit(461.240:390): avc: denied { perfmon } for pid=4258 comm="syz.1.341" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 462.019287][ T30] audit: type=1400 audit(461.470:391): avc: denied { mount } for pid=4233 comm="syz.0.330" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 465.542783][ T4275] ======================================================= [ 465.542783][ T4275] WARNING: The mand mount option has been deprecated and [ 465.542783][ T4275] and is ignored by this kernel. Remove the mand [ 465.542783][ T4275] option from the mount to silence this warning. [ 465.542783][ T4275] ======================================================= [ 465.685963][ T4275] netlink: 14 bytes leftover after parsing attributes in process `syz.1.348'. [ 467.891762][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 467.919321][ T30] audit: type=1400 audit(467.350:401): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 472.014421][ T30] audit: type=1400 audit(471.470:402): avc: denied { create } for pid=4291 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 472.062870][ T30] audit: type=1400 audit(471.520:403): avc: denied { write } for pid=4291 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 473.749414][ T30] audit: type=1400 audit(473.200:404): avc: denied { create } for pid=4299 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 473.810391][ T30] audit: type=1400 audit(473.250:405): avc: denied { write } for pid=4299 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 474.522732][ T30] audit: type=1400 audit(473.980:406): avc: denied { execmem } for pid=4303 comm="syz.1.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 478.597701][ T30] audit: type=1400 audit(478.050:407): avc: denied { prog_run } for pid=4313 comm="syz.1.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 478.685658][ T30] audit: type=1400 audit(478.130:408): avc: denied { sys_module } for pid=4312 comm="syz.0.364" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 478.693517][ T30] audit: type=1400 audit(478.140:409): avc: denied { module_load } for pid=4312 comm="syz.0.364" path="/sys/kernel/notes" dev="sysfs" ino=869 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 479.577421][ T30] audit: type=1400 audit(479.030:410): avc: denied { create } for pid=4321 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 479.610522][ T30] audit: type=1400 audit(479.060:411): avc: denied { write } for pid=4321 comm="syz.1.369" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 480.188229][ T30] audit: type=1400 audit(479.640:412): avc: denied { setopt } for pid=4326 comm="syz.1.371" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 480.686870][ T30] audit: type=1400 audit(480.140:413): avc: denied { name_bind } for pid=4329 comm="syz.1.373" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 480.695254][ T30] audit: type=1400 audit(480.150:414): avc: denied { node_bind } for pid=4329 comm="syz.1.373" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 481.331750][ T30] audit: type=1400 audit(480.780:415): avc: denied { mount } for pid=4335 comm="syz.1.375" name="/" dev="ramfs" ino=7495 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 483.306629][ T30] audit: type=1400 audit(482.720:416): avc: denied { read } for pid=4337 comm="syz.0.376" dev="nsfs" ino=4026532615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 483.307611][ T30] audit: type=1400 audit(482.720:417): avc: denied { open } for pid=4337 comm="syz.0.376" path="net:[4026532615]" dev="nsfs" ino=4026532615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 486.896697][ T4344] netlink: 'syz.0.377': attribute type 2 has an invalid length. [ 489.259876][ T30] audit: type=1400 audit(488.700:418): avc: denied { allowed } for pid=4349 comm="syz.0.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 489.282365][ T30] audit: type=1400 audit(488.740:419): avc: denied { create } for pid=4349 comm="syz.0.380" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 489.309952][ T30] audit: type=1400 audit(488.760:420): avc: denied { map } for pid=4349 comm="syz.0.380" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7524 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 489.310676][ T30] audit: type=1400 audit(488.760:421): avc: denied { read write } for pid=4349 comm="syz.0.380" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7524 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 490.704903][ T30] audit: type=1400 audit(490.160:422): avc: denied { read } for pid=4351 comm="syz.0.381" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 490.763543][ T30] audit: type=1400 audit(490.170:423): avc: denied { open } for pid=4351 comm="syz.0.381" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 490.782687][ T30] audit: type=1400 audit(490.230:424): avc: denied { ioctl } for pid=4351 comm="syz.0.381" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 494.942453][ T30] audit: type=1400 audit(494.390:425): avc: denied { create } for pid=4355 comm="syz.0.383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 494.954853][ T4356] netlink: 'syz.0.383': attribute type 1 has an invalid length. [ 495.546848][ T4356] 8021q: adding VLAN 0 to HW filter on device bond1 [ 495.613856][ T4364] netlink: 'syz.1.385': attribute type 1 has an invalid length. [ 495.856162][ T4360] bond1: (slave veth3): Enslaving as an active interface with a down link [ 496.184263][ T30] audit: type=1400 audit(495.640:426): avc: denied { mount } for pid=4363 comm="syz.1.385" name="/" dev="gadgetfs" ino=2997 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 496.427102][ T4356] vlan0: entered allmulticast mode [ 496.428245][ T4356] veth0_to_bond: entered allmulticast mode [ 496.466281][ T4356] veth0_to_bond: entered promiscuous mode [ 496.491640][ T4356] veth0_to_bond: left promiscuous mode [ 496.555900][ T4356] bond1: (slave vlan0): making interface the new active one [ 496.565271][ T4356] veth0_to_bond: entered promiscuous mode [ 496.575182][ T4356] vlan0: entered promiscuous mode [ 496.593980][ T4356] bond1: (slave vlan0): Enslaving as an active interface with an up link [ 497.034810][ T4375] netlink: 12 bytes leftover after parsing attributes in process `syz.1.388'. [ 497.332075][ T30] audit: type=1400 audit(496.790:427): avc: denied { bind } for pid=4377 comm="syz.1.390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 497.384514][ T30] audit: type=1400 audit(496.840:428): avc: denied { setopt } for pid=4377 comm="syz.1.390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 497.847928][ T30] audit: type=1400 audit(497.300:429): avc: denied { ioctl } for pid=4377 comm="syz.1.390" path="socket:[7577]" dev="sockfs" ino=7577 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 498.993465][ T4389] dvmrp1: entered allmulticast mode [ 503.947745][ T4402] netdevsim netdevsim0: Direct firmware load for ./file0 failed with error -2 [ 503.970207][ T30] audit: type=1400 audit(503.420:430): avc: denied { firmware_load } for pid=4400 comm="syz.0.397" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 503.982053][ T4402] netdevsim netdevsim0: Falling back to sysfs fallback for: ./file0 [ 506.382225][ T30] audit: type=1400 audit(505.830:431): avc: denied { write } for pid=4406 comm="syz.0.399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 507.000257][ T30] audit: type=1400 audit(506.450:432): avc: denied { read write } for pid=4408 comm="syz.0.400" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 507.023689][ T30] audit: type=1400 audit(506.470:433): avc: denied { open } for pid=4408 comm="syz.0.400" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 507.070790][ T30] audit: type=1400 audit(506.520:434): avc: denied { ioctl } for pid=4408 comm="syz.0.400" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x7007 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 507.811246][ T62] vlan0: left promiscuous mode [ 508.378407][ T30] audit: type=1326 audit(507.830:435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4414 comm="syz.0.403" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 508.385563][ T30] audit: type=1326 audit(507.840:436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4414 comm="syz.0.403" exe="/syz-executor" sig=0 arch=c00000b7 syscall=194 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 508.414294][ T30] audit: type=1326 audit(507.870:437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4414 comm="syz.0.403" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 508.423829][ T30] audit: type=1326 audit(507.870:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4414 comm="syz.0.403" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 508.442545][ T30] audit: type=1326 audit(507.880:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4414 comm="syz.0.403" exe="/syz-executor" sig=0 arch=c00000b7 syscall=230 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 510.603151][ T30] audit: type=1400 audit(510.050:440): avc: denied { search } for pid=4416 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 510.605916][ T30] audit: type=1400 audit(510.060:441): avc: denied { search } for pid=4416 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=606 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 510.618235][ T30] audit: type=1400 audit(510.070:442): avc: denied { search } for pid=4416 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=784 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 510.661077][ T30] audit: type=1400 audit(510.110:443): avc: denied { search } for pid=4416 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=785 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 510.814015][ T30] audit: type=1400 audit(510.270:444): avc: denied { read open } for pid=4417 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=785 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 510.825721][ T30] audit: type=1400 audit(510.270:445): avc: denied { getattr } for pid=4417 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=785 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 511.074832][ T30] audit: type=1400 audit(510.530:446): avc: denied { add_name } for pid=4416 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 511.090561][ T30] audit: type=1400 audit(510.530:447): avc: denied { create } for pid=4416 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 511.091021][ T30] audit: type=1400 audit(510.540:448): avc: denied { write open } for pid=4416 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1536 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 511.140060][ T30] audit: type=1400 audit(510.590:449): avc: denied { append } for pid=4416 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1536 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 516.429927][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 516.430780][ T30] audit: type=1400 audit(515.880:454): avc: denied { create } for pid=4441 comm="syz.0.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 516.973850][ T4447] netlink: 12 bytes leftover after parsing attributes in process `syz.0.411'. [ 517.751579][ T30] audit: type=1400 audit(517.210:455): avc: denied { ioctl } for pid=4452 comm="syz.1.416" path="socket:[7686]" dev="sockfs" ino=7686 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 517.751981][ T4454] syzkaller1: entered promiscuous mode [ 517.759061][ T4454] syzkaller1: entered allmulticast mode [ 519.153492][ T30] audit: type=1326 audit(518.610:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4460 comm="syz.0.419" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 519.162042][ T30] audit: type=1326 audit(518.610:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4460 comm="syz.0.419" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 519.168210][ T30] audit: type=1326 audit(518.610:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4460 comm="syz.0.419" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 519.181597][ T30] audit: type=1326 audit(518.610:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4460 comm="syz.0.419" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 519.185541][ T4461] mmap: syz.0.419 (4461) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 519.192041][ T30] audit: type=1326 audit(518.620:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4460 comm="syz.0.419" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 519.194891][ T30] audit: type=1326 audit(518.620:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4460 comm="syz.0.419" exe="/syz-executor" sig=0 arch=c00000b7 syscall=222 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 519.197011][ T30] audit: type=1326 audit(518.630:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4460 comm="syz.0.419" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 519.201436][ T30] audit: type=1326 audit(518.640:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4460 comm="syz.0.419" exe="/syz-executor" sig=0 arch=c00000b7 syscall=234 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 522.354701][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 522.361088][ T30] audit: type=1400 audit(521.800:467): avc: denied { connect } for pid=4478 comm="syz.0.426" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 522.451849][ T30] audit: type=1400 audit(521.900:468): avc: denied { read } for pid=4478 comm="syz.0.426" laddr=::1 lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 522.701008][ T4482] netlink: 'syz.1.427': attribute type 21 has an invalid length. [ 524.161026][ T30] audit: type=1400 audit(523.610:469): avc: denied { create } for pid=4493 comm="syz.0.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 524.168055][ T30] audit: type=1400 audit(523.620:470): avc: denied { setopt } for pid=4493 comm="syz.0.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 524.177403][ T30] audit: type=1326 audit(523.630:471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.1.430" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 524.186164][ T30] audit: type=1326 audit(523.630:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.1.430" exe="/syz-executor" sig=0 arch=c00000b7 syscall=196 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 524.188044][ T30] audit: type=1326 audit(523.630:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.1.430" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 524.191128][ T30] audit: type=1326 audit(523.640:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.1.430" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 524.192914][ T30] audit: type=1326 audit(523.640:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.1.430" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 524.194812][ T30] audit: type=1326 audit(523.640:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4488 comm="syz.1.430" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 524.203551][ T4489] netlink: 104 bytes leftover after parsing attributes in process `syz.1.430'. [ 527.415077][ T4516] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 527.584161][ T4516] netlink: 4 bytes leftover after parsing attributes in process `syz.0.440'. [ 527.885026][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 527.887400][ T30] audit: type=1400 audit(527.340:501): avc: denied { bind } for pid=4515 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 528.842509][ T4532] syzkaller1: entered promiscuous mode [ 528.843058][ T4532] syzkaller1: entered allmulticast mode [ 530.192106][ T30] audit: type=1326 audit(529.650:502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4541 comm="syz.0.453" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 530.199870][ T30] audit: type=1326 audit(529.650:503): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4541 comm="syz.0.453" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 530.223322][ T30] audit: type=1326 audit(529.670:504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4541 comm="syz.0.453" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 530.230556][ T30] audit: type=1326 audit(529.680:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4541 comm="syz.0.453" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 530.253851][ T30] audit: type=1326 audit(529.690:506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4541 comm="syz.0.453" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 530.259296][ T30] audit: type=1326 audit(529.710:507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4541 comm="syz.0.453" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 530.276478][ T30] audit: type=1326 audit(529.730:508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4541 comm="syz.0.453" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 530.293986][ T30] audit: type=1326 audit(529.750:509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4541 comm="syz.0.453" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 530.320264][ T30] audit: type=1326 audit(529.770:510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4541 comm="syz.0.453" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 538.127144][ T4600] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 538.435925][ T4600] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 538.715734][ T4600] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 538.964952][ T4600] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 539.384927][ T984] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 539.559210][ T12] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 539.713604][ T4560] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 539.797231][ T4560] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 540.300644][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 540.301876][ T30] audit: type=1326 audit(539.750:516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.481" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 540.305148][ T30] audit: type=1326 audit(539.760:517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.481" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 540.308251][ T30] audit: type=1326 audit(539.760:518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.481" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 540.311944][ T30] audit: type=1326 audit(539.770:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.481" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 540.315210][ T30] audit: type=1326 audit(539.770:520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.481" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 540.322639][ T30] audit: type=1326 audit(539.770:521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.481" exe="/syz-executor" sig=0 arch=c00000b7 syscall=181 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 540.329650][ T30] audit: type=1326 audit(539.780:522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.481" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 540.340030][ T30] audit: type=1326 audit(539.790:523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.481" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 540.342954][ T30] audit: type=1326 audit(539.800:524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.481" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 540.352801][ T30] audit: type=1326 audit(539.810:525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4606 comm="syz.0.481" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbaf5c0a8 code=0x7ffc0000 [ 553.822972][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 553.829181][ T30] audit: type=1400 audit(553.270:534): avc: denied { create } for pid=4635 comm="syz.1.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 553.879968][ T30] audit: type=1400 audit(553.330:535): avc: denied { setopt } for pid=4635 comm="syz.1.494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 554.341125][ T30] audit: type=1400 audit(553.790:536): avc: denied { create } for pid=4637 comm="syz.1.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 556.217446][ T30] audit: type=1326 audit(555.670:537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4642 comm="syz.1.497" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 556.222945][ T30] audit: type=1326 audit(555.680:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4642 comm="syz.1.497" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 556.227554][ T30] audit: type=1326 audit(555.680:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4642 comm="syz.1.497" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 556.239191][ T30] audit: type=1326 audit(555.690:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4642 comm="syz.1.497" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 556.247004][ T30] audit: type=1326 audit(555.700:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4642 comm="syz.1.497" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 556.263339][ T30] audit: type=1326 audit(555.720:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4642 comm="syz.1.497" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 556.265850][ T30] audit: type=1326 audit(555.720:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4642 comm="syz.1.497" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffaed5c0a8 code=0x7ffc0000 [ 557.909307][ T4648] veth0_to_bond: left promiscuous mode [ 557.984553][ T4648] bond1: (slave vlan0): Releasing active interface [ 561.483855][ T4666] netlink: 'syz.1.507': attribute type 10 has an invalid length. [ 562.786565][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 562.787480][ T30] audit: type=1400 audit(562.240:551): avc: denied { block_suspend } for pid=4671 comm="syz.0.510" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 564.801932][ T30] audit: type=1400 audit(564.260:552): avc: denied { execute } for pid=4684 comm="syz.1.513" dev="tmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 564.828224][ T30] audit: type=1400 audit(564.280:553): avc: denied { execute_no_trans } for pid=4684 comm="syz.1.513" path=2F6D656D66643A5B0BDB58AE5B35A990FF631F1AA9FDFAADD16D64E7E27F9BD55210F3B6FF54BFD1C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 565.352706][ T4689] capability: warning: `syz.1.514' uses 32-bit capabilities (legacy support in use) [ 567.114978][ T4560] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 39646 - 0 [ 567.115825][ T4560] netdevsim netdevsim1 eth3 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 567.733003][ T4560] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 39646 - 0 [ 567.750968][ T4560] netdevsim netdevsim1 eth2 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 568.067417][ T4560] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 39646 - 0 [ 568.078819][ T4560] netdevsim netdevsim1 eth1 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 568.098013][ T30] audit: type=1400 audit(567.550:554): avc: denied { execute } for pid=4699 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 568.107831][ T30] audit: type=1400 audit(567.560:555): avc: denied { execute_no_trans } for pid=4699 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 568.332481][ T4560] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 39646 - 0 [ 568.332816][ T4560] netdevsim netdevsim1 eth0 (unregistering): unset [1, 1] type 2 family 0 port 6081 - 0 [ 568.801072][ T30] audit: type=1400 audit(568.250:556): avc: denied { mounton } for pid=4702 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 569.654815][ T30] audit: type=1400 audit(569.110:557): avc: denied { read } for pid=3162 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 572.175916][ T4560] dvmrp1 (unregistering): left allmulticast mode [ 572.853800][ T4560] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 572.946090][ T4560] bond0 (unregistering): (slave 4@0Ù): Releasing backup interface [ 573.047946][ T4560] bond0 (unregistering): Released all slaves [ 573.421284][ T4560] bond1 (unregistering): Released all slaves [ 574.106911][ T4560] hsr_slave_0: left promiscuous mode [ 574.143486][ T4560] hsr_slave_1: left promiscuous mode [ 574.390875][ T4560] veth1_macvtap: left promiscuous mode [ 574.392329][ T4560] veth0_macvtap: left promiscuous mode [ 584.904196][ T4733] netlink: 87 bytes leftover after parsing attributes in process `syz.0.527'. [ 598.043475][ T4702] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 598.156415][ T4702] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 603.685786][ T30] audit: type=1400 audit(603.140:558): avc: denied { connect } for pid=4787 comm="syz.0.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 606.864502][ T4702] hsr_slave_0: entered promiscuous mode [ 606.868099][ T4702] hsr_slave_1: entered promiscuous mode [ 606.876011][ T4702] debugfs: 'hsr0' already exists in 'hsr' [ 606.879506][ T4702] Cannot create hsr debugfs directory [ 610.681904][ T4702] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 610.748086][ T4702] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 610.817946][ T4702] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 610.876028][ T4702] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 618.462930][ T4702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 623.601827][ T30] audit: type=1400 audit(623.050:559): avc: denied { create } for pid=4855 comm="syz.0.542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 626.320831][ T30] audit: type=1400 audit(625.770:560): avc: denied { connect } for pid=4861 comm="syz.0.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 632.463570][ T30] audit: type=1400 audit(631.920:561): avc: denied { bind } for pid=4888 comm="syz.0.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 632.551775][ T30] audit: type=1400 audit(632.010:562): avc: denied { setopt } for pid=4888 comm="syz.0.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 636.421739][ T30] audit: type=1400 audit(635.870:563): avc: denied { mount } for pid=4914 comm="syz.0.552" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 640.931105][ T4702] veth0_vlan: entered promiscuous mode [ 641.136413][ T4702] veth1_vlan: entered promiscuous mode [ 641.595813][ T4702] veth0_macvtap: entered promiscuous mode [ 641.676658][ T4702] veth1_macvtap: entered promiscuous mode [ 642.666343][ T62] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 642.667322][ T62] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 642.667657][ T62] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 642.667943][ T62] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 643.362669][ T30] audit: type=1400 audit(642.790:564): avc: denied { mounton } for pid=4702 comm="syz-executor" path="/syzkaller.2Alyg8/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 643.407436][ T30] audit: type=1400 audit(642.860:565): avc: denied { mount } for pid=4702 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 643.570496][ T30] audit: type=1400 audit(643.020:566): avc: denied { mounton } for pid=4702 comm="syz-executor" path="/syzkaller.2Alyg8/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 643.602771][ T30] audit: type=1400 audit(643.050:567): avc: denied { mounton } for pid=4702 comm="syz-executor" path="/syzkaller.2Alyg8/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=8452 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 643.787422][ T30] audit: type=1400 audit(643.240:568): avc: denied { unmount } for pid=4702 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 643.818063][ T30] audit: type=1400 audit(643.270:569): avc: denied { mounton } for pid=4702 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 643.941455][ T30] audit: type=1400 audit(643.380:570): avc: denied { mount } for pid=4702 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 643.942518][ T30] audit: type=1400 audit(643.390:571): avc: denied { mounton } for pid=4702 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 643.942853][ T30] audit: type=1400 audit(643.390:572): avc: denied { mount } for pid=4702 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 644.362621][ T4952] netlink: 8 bytes leftover after parsing attributes in process `syz.0.561'. [ 644.363708][ T4952] netlink: 8 bytes leftover after parsing attributes in process `syz.0.561'. [ 646.110772][ T4965] syz.2.563 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 646.512353][ T30] audit: type=1400 audit(645.970:573): avc: denied { read } for pid=4966 comm="syz.2.564" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 650.760157][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 650.761285][ T30] audit: type=1400 audit(650.210:577): avc: denied { accept } for pid=4975 comm="syz.2.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 651.862007][ T30] audit: type=1400 audit(651.320:578): avc: denied { read write } for pid=4980 comm="syz.2.568" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 651.876750][ T30] audit: type=1400 audit(651.330:579): avc: denied { open } for pid=4980 comm="syz.2.568" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 654.572200][ T30] audit: type=1400 audit(654.020:580): avc: denied { unmount } for pid=4702 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 662.520910][ T30] audit: type=1400 audit(661.970:581): avc: denied { create } for pid=5011 comm="syz.2.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 662.553871][ T30] audit: type=1400 audit(662.010:582): avc: denied { write } for pid=5011 comm="syz.2.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 662.557222][ T30] audit: type=1400 audit(662.010:583): avc: denied { nlmsg_write } for pid=5011 comm="syz.2.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 663.630675][ T30] audit: type=1400 audit(663.080:584): avc: denied { read } for pid=5018 comm="syz.2.583" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 663.659879][ T30] audit: type=1400 audit(663.110:585): avc: denied { open } for pid=5018 comm="syz.2.583" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 663.696585][ T30] audit: type=1400 audit(663.150:586): avc: denied { ioctl } for pid=5018 comm="syz.2.583" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 691.593519][ T30] audit: type=1400 audit(691.050:587): avc: denied { read write } for pid=5071 comm="syz.2.600" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 691.594497][ T30] audit: type=1400 audit(691.050:588): avc: denied { open } for pid=5071 comm="syz.2.600" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 691.641187][ T30] audit: type=1400 audit(691.080:589): avc: denied { ioctl } for pid=5071 comm="syz.2.600" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 691.687075][ T5077] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 691.741103][ T5077] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 692.803159][ T30] audit: type=1400 audit(692.260:590): avc: denied { accept } for pid=5085 comm="syz.0.605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 711.624587][ T30] audit: type=1400 audit(711.080:591): avc: denied { write } for pid=5102 comm="syz.2.612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 722.852588][ T5123] netlink: 8 bytes leftover after parsing attributes in process `syz.0.618'. [ 723.594682][ T30] audit: type=1400 audit(723.050:592): avc: denied { create } for pid=5124 comm="syz.0.619" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 723.616865][ T30] audit: type=1400 audit(723.070:593): avc: denied { mounton } for pid=5124 comm="syz.0.619" path="/320/file0" dev="tmpfs" ino=1633 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 723.653819][ T30] audit: type=1400 audit(723.110:594): avc: denied { read write } for pid=5124 comm="syz.0.619" name="file0" dev="tmpfs" ino=1633 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 723.656617][ T30] audit: type=1400 audit(723.110:595): avc: denied { open } for pid=5124 comm="syz.0.619" path="/320/file0" dev="tmpfs" ino=1633 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 723.690975][ T30] audit: type=1400 audit(723.140:596): avc: denied { ioctl } for pid=5124 comm="syz.0.619" path="/320/file0" dev="tmpfs" ino=1633 ioctlcmd=0x5828 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 724.777696][ T30] audit: type=1400 audit(724.230:597): avc: denied { unlink } for pid=3317 comm="syz-executor" name="file0" dev="tmpfs" ino=1633 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 725.740814][ T30] audit: type=1400 audit(725.190:598): avc: denied { create } for pid=5137 comm="syz.0.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 725.774243][ T30] audit: type=1400 audit(725.230:599): avc: denied { connect } for pid=5137 comm="syz.0.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 727.440018][ T30] audit: type=1400 audit(726.840:600): avc: denied { read write } for pid=5135 comm="syz.2.621" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 727.441042][ T30] audit: type=1400 audit(726.840:601): avc: denied { open } for pid=5135 comm="syz.2.621" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 743.314866][ T30] audit: type=1400 audit(742.770:602): avc: denied { create } for pid=5198 comm="syz.2.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 744.954722][ T30] audit: type=1400 audit(744.410:603): avc: denied { ioctl } for pid=5206 comm="syz.2.653" path="socket:[10020]" dev="sockfs" ino=10020 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 745.002275][ T30] audit: type=1400 audit(744.450:604): avc: denied { setopt } for pid=5206 comm="syz.2.653" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 747.115695][ T30] audit: type=1400 audit(746.570:605): avc: denied { read } for pid=5212 comm="syz.2.656" name="file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 747.124997][ T30] audit: type=1400 audit(746.570:606): avc: denied { open } for pid=5212 comm="syz.2.656" path="/35/file0/file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 758.520900][ T30] audit: type=1400 audit(757.970:607): avc: denied { mount } for pid=5222 comm="syz.0.660" name="/" dev="hugetlbfs" ino=10057 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 758.680156][ T5231] netlink: 12 bytes leftover after parsing attributes in process `syz.0.660'. [ 767.559255][ T30] audit: type=1400 audit(767.010:608): avc: denied { read } for pid=5234 comm="syz.2.661" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 767.574826][ T30] audit: type=1400 audit(767.030:609): avc: denied { open } for pid=5234 comm="syz.2.661" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 784.895709][ T30] audit: type=1400 audit(784.350:610): avc: denied { read write } for pid=5286 comm="syz.2.679" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 784.930150][ T30] audit: type=1400 audit(784.380:611): avc: denied { open } for pid=5286 comm="syz.2.679" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 785.010029][ T30] audit: type=1400 audit(784.450:612): avc: denied { ioctl } for pid=5286 comm="syz.2.679" path="/dev/uinput" dev="devtmpfs" ino=707 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 785.263500][ T5287] input: syz0 as /devices/virtual/input/input1 [ 808.164357][ T5363] netlink: 12 bytes leftover after parsing attributes in process `syz.0.698'. [ 808.550892][ T30] audit: type=1400 audit(808.010:613): avc: denied { bind } for pid=5361 comm="syz.0.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 814.174207][ T30] audit: type=1400 audit(813.630:614): avc: denied { map } for pid=5354 comm="syz.2.696" path="socket:[10197]" dev="sockfs" ino=10197 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 814.185602][ T30] audit: type=1400 audit(813.640:615): avc: denied { read } for pid=5354 comm="syz.2.696" path="socket:[10197]" dev="sockfs" ino=10197 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 818.120753][ T30] audit: type=1400 audit(817.570:616): avc: denied { create } for pid=5413 comm="syz.2.719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 828.831436][ T30] audit: type=1400 audit(828.290:617): avc: denied { ioctl } for pid=5464 comm="syz.2.739" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=10281 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 848.466496][ T30] audit: type=1400 audit(847.920:618): avc: denied { write } for pid=5493 comm="syz.0.750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 848.493321][ T30] audit: type=1400 audit(847.950:619): avc: denied { read } for pid=5493 comm="syz.0.750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 854.256240][ T30] audit: type=1400 audit(853.710:620): avc: denied { write } for pid=5514 comm="syz.2.756" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 854.273097][ T5516] random: crng reseeded on system resumption [ 854.281306][ T30] audit: type=1400 audit(853.710:621): avc: denied { open } for pid=5514 comm="syz.2.756" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 859.115316][ T30] audit: type=1400 audit(858.570:622): avc: denied { name_bind } for pid=5523 comm="syz.2.759" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 862.586611][ T30] audit: type=1400 audit(862.040:623): avc: denied { getopt } for pid=5535 comm="syz.0.761" laddr=fe80::f lport=44062 faddr=fe80:: scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 874.652887][ T30] audit: type=1400 audit(874.110:624): avc: denied { write } for pid=5549 comm="syz.2.765" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 874.740240][ T30] audit: type=1400 audit(874.190:625): avc: denied { setopt } for pid=5549 comm="syz.2.765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 879.815607][ T30] audit: type=1400 audit(879.270:626): avc: denied { read } for pid=5556 comm="syz.2.766" path="socket:[10388]" dev="sockfs" ino=10388 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 887.570170][ T5585] netlink: 185 bytes leftover after parsing attributes in process `syz.0.773'. [ 891.393775][ T30] audit: type=1400 audit(890.850:627): avc: denied { bind } for pid=5601 comm="syz.2.778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 891.425100][ T30] audit: type=1400 audit(890.880:628): avc: denied { listen } for pid=5601 comm="syz.2.778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 897.704994][ T30] audit: type=1400 audit(895.780:629): avc: denied { write } for pid=5596 comm="syz.0.776" path="socket:[11379]" dev="sockfs" ino=11379 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 917.109582][ T30] audit: type=1400 audit(916.560:630): avc: denied { write } for pid=5631 comm="syz.2.788" name="route" dev="proc" ino=4026532686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 946.345790][ T30] audit: type=1400 audit(945.800:631): avc: denied { create } for pid=5713 comm="syz.2.812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 946.414373][ T30] audit: type=1400 audit(945.830:632): avc: denied { connect } for pid=5713 comm="syz.2.812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 946.966644][ T30] audit: type=1400 audit(946.420:633): avc: denied { read } for pid=5713 comm="syz.2.812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 948.539225][ C0] llc_process_tmr_ev: timer called on closed connection [ 968.115319][ T5761] netlink: 'syz.2.828': attribute type 1 has an invalid length. [ 968.449844][ T5761] 8021q: adding VLAN 0 to HW filter on device bond1 [ 968.688231][ T5761] bond1: (slave veth3): Enslaving as an active interface with a down link [ 968.836195][ T5761] bond1: (slave veth0_to_bond): making interface the new active one [ 968.866700][ T5761] veth0_to_bond: entered promiscuous mode [ 968.886400][ T5761] bond1: (slave veth0_to_bond): Enslaving as an active interface with an up link [ 981.140582][ T26] veth0_to_bond: left promiscuous mode [ 991.713934][ T30] audit: type=1400 audit(991.160:634): avc: denied { getopt } for pid=5797 comm="syz.0.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 996.239860][ T30] audit: type=1400 audit(995.690:635): avc: denied { override_creds } for pid=5811 comm="syz.2.842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 999.319822][ T30] audit: type=1400 audit(998.770:636): avc: denied { write } for pid=5824 comm="syz.2.846" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 999.392192][ T5825] usb usb1: usbfs: interface 0 claimed by hub while 'syz.2.846' sets config #3 [ 1012.546142][ C0] sched: DL replenish lagged too much [ 1015.527380][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.530003][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.531151][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.532048][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.532865][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.533714][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.534530][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.535379][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.536246][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.537047][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.537897][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.539304][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.540070][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.540606][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.541370][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.541920][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.542450][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.542985][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.543542][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.544135][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.544731][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.545284][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.545857][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.546479][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.547204][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.547929][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1015.549312][ C0] vcan0: j1939_xtp_rx_dat: no tx connection found [ 1016.802583][ C0] vcan0: j1939_tp_rxtimer: 0x00000000ceec3788: rx timeout, send abort [ 1016.815574][ T30] audit: type=1400 audit(1016.270:637): avc: denied { read } for pid=3117 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1016.830095][ T30] audit: type=1400 audit(1016.280:638): avc: denied { search } for pid=3117 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1016.830576][ T30] audit: type=1400 audit(1016.280:639): avc: denied { search } for pid=3117 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1016.830891][ T30] audit: type=1400 audit(1016.280:640): avc: denied { add_name } for pid=3117 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1016.831065][ T30] audit: type=1400 audit(1016.280:641): avc: denied { create } for pid=3117 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1016.831224][ T30] audit: type=1400 audit(1016.280:642): avc: denied { append open } for pid=3117 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1016.831419][ T30] audit: type=1400 audit(1016.280:643): avc: denied { getattr } for pid=3117 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1017.304574][ C0] vcan0: j1939_tp_rxtimer: 0x00000000ceec3788: abort rx timeout. Force session deactivation [ 1032.521699][ T30] audit: type=1400 audit(1031.960:644): avc: denied { ioctl } for pid=5878 comm="syz.0.863" path="socket:[11652]" dev="sockfs" ino=11652 ioctlcmd=0x9435 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1041.629976][ T30] audit: type=1400 audit(1041.080:645): avc: denied { cmd } for pid=5920 comm="syz.0.873" path="socket:[11687]" dev="sockfs" ino=11687 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1052.489827][ T30] audit: type=1400 audit(1051.930:646): avc: denied { read write } for pid=5972 comm="syz.2.889" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1052.490746][ T30] audit: type=1400 audit(1051.930:647): avc: denied { open } for pid=5972 comm="syz.2.889" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1052.534497][ T30] audit: type=1400 audit(1051.990:648): avc: denied { ioctl } for pid=5972 comm="syz.2.889" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1062.416226][ C1] vkms_vblank_simulate: vblank timer overrun [ 1064.131923][ T30] audit: type=1400 audit(1063.580:649): avc: denied { bind } for pid=6015 comm="syz.2.902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1064.133391][ T30] audit: type=1400 audit(1063.580:650): avc: denied { node_bind } for pid=6015 comm="syz.2.902" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1084.115538][ T30] audit: type=1400 audit(1083.570:651): avc: denied { mount } for pid=6045 comm="syz.0.912" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1084.147802][ T30] audit: type=1400 audit(1083.590:652): avc: denied { remount } for pid=6045 comm="syz.0.912" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1118.413978][ T6113] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1118.426507][ T6113] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1144.273098][ T6215] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1144.771320][ T30] audit: type=1400 audit(1144.220:653): avc: denied { sqpoll } for pid=6198 comm="syz.0.971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1144.838271][ T6215] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1145.184814][ T6215] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1145.734900][ T6215] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1147.086719][ T1607] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1147.322613][ T1607] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1147.748171][ T5725] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1148.036334][ T12] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1162.564444][ T30] audit: type=1400 audit(1162.020:654): avc: denied { mounton } for pid=6234 comm="syz.0.981" path="/523/file0" dev="tmpfs" ino=2665 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1167.723924][ T6239] veth0: entered promiscuous mode [ 1167.842111][ T6239] veth0: left promiscuous mode [ 1167.940181][ T6239] netlink: 4 bytes leftover after parsing attributes in process `syz.2.982'. [ 1184.511700][ T6275] cgroup: fork rejected by pids controller in /syz0 [ 1198.747873][ T30] audit: type=1400 audit(1198.200:655): avc: denied { read } for pid=6380 comm="syz.0.1001" path="socket:[13377]" dev="sockfs" ino=13377 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1200.313942][ T6391] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1200.357271][ T6391] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1212.985734][ T6424] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1213.000806][ T6424] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1214.856491][ T30] audit: type=1400 audit(1214.310:656): avc: denied { create } for pid=6432 comm="syz.0.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1214.891803][ T30] audit: type=1400 audit(1214.350:657): avc: denied { ioctl } for pid=6432 comm="syz.0.1019" path="socket:[13474]" dev="sockfs" ino=13474 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1214.908248][ T30] audit: type=1400 audit(1214.360:658): avc: denied { write } for pid=6432 comm="syz.0.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1228.393566][ T30] audit: type=1400 audit(1227.840:659): avc: denied { mount } for pid=6510 comm="syz.2.1054" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1228.509567][ T30] audit: type=1400 audit(1227.950:660): avc: denied { unmount } for pid=4702 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1235.456274][ T6536] netlink: 'syz.2.1064': attribute type 58 has an invalid length. [ 1239.231217][ T30] audit: type=1400 audit(1238.680:661): avc: denied { unmount } for pid=4702 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1240.606185][ T5725] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1241.345094][ T5725] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1242.185145][ T5725] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1242.575313][ T5725] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1246.993191][ T5725] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1247.077605][ T5725] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1247.134539][ T5725] bond0 (unregistering): Released all slaves [ 1247.585836][ T5725] bond1 (unregistering): (slave veth3): Releasing active interface [ 1247.588111][ T5725] veth0_to_bond: entered promiscuous mode [ 1247.674969][ T5725] bond1 (unregistering): (slave veth0_to_bond): Releasing active interface [ 1247.754860][ T5725] bond1 (unregistering): Released all slaves [ 1248.385164][ T5725] hsr_slave_0: left promiscuous mode [ 1248.404919][ T5725] hsr_slave_1: left promiscuous mode [ 1248.625942][ T5725] veth1_macvtap: left promiscuous mode [ 1248.627336][ T5725] veth0_macvtap: left promiscuous mode [ 1248.643584][ T5725] veth1_vlan: left promiscuous mode [ 1248.644631][ T5725] veth0_vlan: left promiscuous mode [ 1257.894502][ T30] audit: type=1400 audit(1257.350:662): avc: denied { create } for pid=6590 comm="syz.0.1079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1257.905348][ T30] audit: type=1400 audit(1257.360:663): avc: denied { write } for pid=6590 comm="syz.0.1079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1269.853574][ T30] audit: type=1400 audit(1269.310:664): avc: denied { setopt } for pid=6616 comm="syz.0.1081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1270.375241][ T6563] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1270.514575][ T6563] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1277.847395][ T6563] hsr_slave_0: entered promiscuous mode [ 1277.874965][ T6563] hsr_slave_1: entered promiscuous mode [ 1277.896101][ T6563] debugfs: 'hsr0' already exists in 'hsr' [ 1277.898183][ T6563] Cannot create hsr debugfs directory [ 1278.890882][ T6626] infiniband syz1: set active [ 1278.900174][ T6626] infiniband syz1: added syz_tun [ 1279.503126][ T6626] RDS/IB: syz1: added [ 1279.508042][ T6626] smc: adding ib device syz1 with port count 1 [ 1279.621825][ T6626] smc: ib device syz1 port 1 has pnetid [ 1282.643316][ T6563] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1282.724188][ T6563] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1282.834780][ T6563] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1282.886172][ T6563] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1287.050553][ T6563] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1294.653891][ T6714] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1090'. [ 1300.798109][ T6563] veth0_vlan: entered promiscuous mode [ 1300.894243][ T6563] veth1_vlan: entered promiscuous mode [ 1301.400646][ T6563] veth0_macvtap: entered promiscuous mode [ 1301.460265][ T6563] veth1_macvtap: entered promiscuous mode [ 1302.334963][ T26] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1302.364709][ T5347] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1302.383610][ T26] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1302.384449][ T26] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1339.995707][ T6767] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1340.065150][ T6767] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1356.020337][ T30] audit: type=1400 audit(1355.450:665): avc: denied { read } for pid=6788 comm="syz.3.1100" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1356.053514][ T30] audit: type=1400 audit(1355.510:666): avc: denied { open } for pid=6788 comm="syz.3.1100" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1356.138011][ T30] audit: type=1400 audit(1355.570:667): avc: denied { ioctl } for pid=6788 comm="syz.3.1100" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1361.709754][ T1607] smc: removing ib device syz1 [ 1361.850591][ T3380] syz1: Port: 1 Link DOWN [ 1372.049524][ T6728] unregister_netdevice: waiting for syz_tun to become free. Usage count = 2 [ 1372.051254][ T6728] ref_tracker: netdev@00000000e9d4f927 has 1/1 users at [ 1372.051254][ T6728] ib_device_set_netdev+0x1cc/0x580 [ 1372.051254][ T6728] rxe_register_device+0x200/0x2b8 [ 1372.051254][ T6728] rxe_add+0xd60/0x10c8 [ 1372.051254][ T6728] rxe_net_add+0x9c/0xf4 [ 1372.051254][ T6728] rxe_newlink+0x58/0x14c [ 1372.051254][ T6728] nldev_newlink+0x280/0x4b4 [ 1372.051254][ T6728] rdma_nl_rcv_msg+0x274/0x56c [ 1372.051254][ T6728] rdma_nl_rcv_skb.constprop.0.isra.0+0x1f0/0x328 [ 1372.051254][ T6728] rdma_nl_rcv+0x10/0x1c [ 1372.051254][ T6728] netlink_unicast+0x424/0x700 [ 1372.051254][ T6728] netlink_sendmsg+0x644/0xa54 [ 1372.051254][ T6728] __sock_sendmsg+0xc8/0x168 [ 1372.051254][ T6728] ____sys_sendmsg+0x500/0x764 [ 1372.051254][ T6728] ___sys_sendmsg+0x11c/0x19c [ 1372.051254][ T6728] __sys_sendmsg+0x114/0x19c [ 1372.051254][ T6728] __arm64_sys_sendmsg+0x70/0xa0 [ 1372.051254][ T6728] [ 1372.076053][ T30] audit: type=1400 audit(1371.530:668): avc: denied { write } for pid=3312 comm="syz-executor" path="pipe:[2469]" dev="pipefs" ino=2469 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1375.586527][ T990] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1376.181379][ T990] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1376.772831][ T990] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1377.212578][ T990] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1382.864790][ T990] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1382.937459][ T990] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1383.017384][ T990] bond0 (unregistering): Released all slaves [ 1383.657700][ T990] bond1 (unregistering): (slave veth3): Releasing active interface [ 1383.754784][ T990] bond1 (unregistering): Released all slaves [ 1384.426067][ T990] hsr_slave_0: left promiscuous mode [ 1384.511842][ T990] hsr_slave_1: left promiscuous mode [ 1384.867249][ T990] veth1_macvtap: left promiscuous mode [ 1384.890184][ T990] veth0_macvtap: left promiscuous mode [ 1384.892254][ T990] veth1_vlan: left promiscuous mode [ 1384.893063][ T990] veth0_vlan: left promiscuous mode [ 1391.836886][ T990] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1392.433907][ T990] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1392.804625][ T990] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1393.033700][ T990] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1396.906505][ T990] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1396.982578][ T990] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1397.035843][ T990] bond0 (unregistering): Released all slaves [ 1397.875050][ T990] bond0 (unregistering): Released all slaves [ 1398.390189][ T990] hsr_slave_0: left promiscuous mode [ 1398.398215][ T990] hsr_slave_1: left promiscuous mode [ 1398.562450][ T990] veth1_macvtap: left promiscuous mode [ 1398.565449][ T990] veth0_macvtap: left promiscuous mode [ 1398.570151][ T990] veth1_vlan: left promiscuous mode [ 1398.572839][ T990] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 20:08:05 Registers: info registers vcpu 0 CPU#0 PC=ffff800081be6534 X00=0000000000000002 X01=0000000000000007 X02=0000000000000000 X03=1fffe00001ddec2f X04=0000000000000000 X05=ffff80008d9f79e0 X06=ffff700011b3ef3c X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700011b3ef3c X11=1ffff00011b3ef3c X12=ffff700011b3ef3d X13=0000000000008000 X14=72615f5f20202020 X15=5f7379735f34366d X16=2b67736d646e6573 X17=6178302f30377830 X18=ffff80008000787c X19=ffff00000eef6080 X20=ffff800087b3e700 X21=ffff80008d4db000 X22=0000000000000032 X23=dfff800000000000 X24=ffff00000ed0610b X25=0000000000000002 X26=0000000000000f01 X27=1fffe00001ddec5a X28=ffff00000eef62d0 X29=ffff80008d9f79d0 X30=ffff800081be6498 SP=ffff80008d9f79d0 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=2e312e6f732e786f:627973756262696c Q01=00302e37332e312e:6f732e786f627973 Q02=0000000000000000:0000f00000000000 Q03=0000000000000000:0000000000000000 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:0000c00000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000809cbf10 X00=ffff80008e987608 X01=0000000000000004 X02=ffff80008e987608 X03=ffff800080463598 X04=ffff700011d30ec2 X05=ffff80008e987608 X06=ffff700011d30ec1 X07=0000000000000001 X08=ffff80008e98760b X09=dfff800000000000 X10=ffff700011d30ec1 X11=1ffff00011d30ec1 X12=ffff700011d30ec2 X13=0000000000000000 X14=ffff8000801b48ac X15=ffff8000801b66bc X16=6565726620656d6f X17=206567617355202e X18=ffff80008d4e787c X19=ffff80008e987600 X20=ffff80008e987608 X21=1ffff00011d30ec6 X22=0000000000000000 X23=0000000000000000 X24=ffff80008039acd4 X25=0000000000000000 X26=0000000000000000 X27=ffff00006a0a0048 X28=ffff00006a09ff00 X29=ffff80008e987590 X30=ffff800080463598 SP=ffff80008e987590 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000aaaaad556924:0000aaaaad556920 Q02=0000aaaaad566bb6:0000aaaaad564d10 Q03=0000ffffdef55b80:0000ffffdef558e8 Q04=0000000000000000:0000000000000000 Q05=0000ffffdef55840:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:000001f40000000a Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdef55c50:0000ffffdef55c50 Q17=ffffff80ffffffd0:0000ffffdef55c20 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000