last executing test programs: 11.145037976s ago: executing program 1 (id=1296): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r2, r1) sendmsg$SOCK_DESTROY(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 10.547330188s ago: executing program 1 (id=1297): r0 = openat$nullb(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BLKROSET(r0, 0x401070c9, 0x0) 9.83119624s ago: executing program 1 (id=1299): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r2 = accept(r1, 0x0, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmmsg$inet(r4, &(0x7f0000000080), 0x0, 0x0) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0xfffffdb8) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$dupfd(r5, 0x406, r3) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup3(r6, 0xffffffffffffffff, 0x80000) ioctl$F2FS_IOC_GARBAGE_COLLECT(r6, 0x5421, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) getsockopt$bt_hci(r2, 0x0, 0x1, 0x0, &(0x7f00000000c0)) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r7, 0x5411, 0x0) dup2(r7, r4) socket$inet(0x2, 0x6, 0x3) 8.056878186s ago: executing program 1 (id=1304): r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_ep_write(r0, 0x82, 0x5, &(0x7f0000002340)='hello') 2.678314546s ago: executing program 0 (id=1313): r0 = creat(&(0x7f0000000640)='./file1\x00', 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5450, 0x0) dup3(r0, r1, 0x0) fdatasync(r1) 2.250054743s ago: executing program 0 (id=1314): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close_range(r1, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 1.768467215s ago: executing program 0 (id=1315): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_udp_SIOCINQ(r0, 0x5411, 0x0) 1.681512333s ago: executing program 1 (id=1316): pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$inet6(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000003bc0)="98", 0x1}], 0x1}, 0x0) 1.121453182s ago: executing program 0 (id=1317): pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 1.070235986s ago: executing program 1 (id=1318): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x4547, 0x4) bind$inet(r0, &(0x7f0000000640)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000020850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0xb7}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x4d) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000000), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) 512.903605ms ago: executing program 0 (id=1319): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close_range(r1, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 0s ago: executing program 0 (id=1320): r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_ep_write(r0, 0x82, 0x5, &(0x7f0000002340)='hello') kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:5344' (ED25519) to the list of known hosts. [ 197.986800][ T30] audit: type=1400 audit(197.450:58): avc: denied { name_bind } for pid=3195 comm="sshd" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 198.571386][ T30] audit: type=1400 audit(198.030:59): avc: denied { execute } for pid=3197 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 198.578722][ T30] audit: type=1400 audit(198.040:60): avc: denied { execute_no_trans } for pid=3197 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 200.460101][ T30] audit: type=1400 audit(199.920:61): avc: denied { mounton } for pid=3197 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 200.481524][ T30] audit: type=1400 audit(199.940:62): avc: denied { mount } for pid=3197 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 200.526714][ T3197] cgroup: Unknown subsys name 'net' [ 200.558325][ T30] audit: type=1400 audit(200.020:63): avc: denied { unmount } for pid=3197 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 201.060716][ T3197] cgroup: Unknown subsys name 'rlimit' [ 201.485908][ T30] audit: type=1400 audit(200.950:64): avc: denied { setattr } for pid=3197 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 201.489501][ T30] audit: type=1400 audit(200.950:65): avc: denied { create } for pid=3197 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 201.497492][ T30] audit: type=1400 audit(200.950:66): avc: denied { write } for pid=3197 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 201.502001][ T30] audit: type=1400 audit(200.960:67): avc: denied { module_request } for pid=3197 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 202.581444][ T3201] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 202.744498][ T3197] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 203.069310][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 203.069398][ T30] audit: type=1400 audit(202.520:76): avc: denied { mounton } for pid=3204 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 203.070460][ T30] audit: type=1400 audit(202.530:77): avc: denied { mount } for pid=3204 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 203.083338][ T30] audit: type=1400 audit(202.540:78): avc: denied { read } for pid=3204 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 203.084345][ T30] audit: type=1400 audit(202.540:79): avc: denied { open } for pid=3204 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 203.102732][ T30] audit: type=1400 audit(202.560:80): avc: denied { mounton } for pid=3204 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 203.658480][ T30] audit: type=1400 audit(203.120:81): avc: denied { mounton } for pid=3204 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 203.704514][ T30] audit: type=1400 audit(203.150:82): avc: denied { mount } for pid=3204 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 203.731428][ T30] audit: type=1400 audit(203.190:83): avc: denied { read write } for pid=3204 comm="syz-executor" name="loop1" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 203.750141][ T30] audit: type=1400 audit(203.210:84): avc: denied { open } for pid=3204 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 203.770163][ T30] audit: type=1400 audit(203.230:85): avc: denied { ioctl } for pid=3204 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=640 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 208.818590][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 208.818790][ T30] audit: type=1400 audit(208.280:94): avc: denied { create } for pid=3236 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 209.413575][ T30] audit: type=1400 audit(208.860:95): avc: denied { create } for pid=3239 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 213.461428][ T30] audit: type=1400 audit(212.920:96): avc: denied { read } for pid=3258 comm="syz.0.50" name="card0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 213.493664][ T30] audit: type=1400 audit(212.920:97): avc: denied { open } for pid=3258 comm="syz.0.50" path="/dev/dri/card0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 213.543907][ T30] audit: type=1400 audit(212.990:98): avc: denied { write } for pid=3258 comm="syz.0.50" name="card0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 213.591908][ T3259] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 214.653517][ T30] audit: type=1400 audit(214.090:99): avc: denied { read write } for pid=3264 comm="syz.1.56" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 214.655375][ T30] audit: type=1400 audit(214.110:100): avc: denied { open } for pid=3264 comm="syz.1.56" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 215.533024][ T30] audit: type=1400 audit(214.990:101): avc: denied { write } for pid=3269 comm="syz.1.61" name="pfkey" dev="proc" ino=4026532720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 216.889486][ T30] audit: type=1400 audit(216.350:102): avc: denied { create } for pid=3277 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 217.385690][ T30] audit: type=1400 audit(216.830:103): avc: denied { create } for pid=3280 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 218.896882][ T30] audit: type=1400 audit(218.350:104): avc: denied { create } for pid=3285 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 218.974323][ T30] audit: type=1400 audit(218.420:105): avc: denied { create } for pid=3286 comm="syz.0.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 220.060254][ T30] audit: type=1400 audit(219.520:106): avc: denied { read write } for pid=3290 comm="syz.0.80" name="udmabuf" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 220.061832][ T30] audit: type=1400 audit(219.520:107): avc: denied { open } for pid=3290 comm="syz.0.80" path="/dev/udmabuf" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 222.300402][ T30] audit: type=1400 audit(221.760:108): avc: denied { create } for pid=3303 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 223.578124][ T30] audit: type=1400 audit(223.040:109): avc: denied { create } for pid=3308 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 228.241065][ T3328] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 229.949260][ T30] audit: type=1400 audit(229.405:110): avc: denied { read } for pid=3336 comm="syz.1.122" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 229.959772][ T30] audit: type=1400 audit(229.415:111): avc: denied { open } for pid=3336 comm="syz.1.122" path="/dev/loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 229.974022][ T30] audit: type=1400 audit(229.425:112): avc: denied { write } for pid=3336 comm="syz.1.122" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 235.320725][ T30] audit: type=1400 audit(234.775:113): avc: denied { create } for pid=3359 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 236.405417][ T30] audit: type=1400 audit(235.855:114): avc: denied { mount } for pid=3364 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 237.489476][ T30] audit: type=1400 audit(236.945:115): avc: denied { sys_module } for pid=3364 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 242.705982][ T30] audit: type=1400 audit(242.155:116): avc: denied { read } for pid=3388 comm="syz.1.156" name="uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 242.715370][ T30] audit: type=1400 audit(242.165:117): avc: denied { open } for pid=3388 comm="syz.1.156" path="/dev/uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 242.723576][ T30] audit: type=1400 audit(242.175:118): avc: denied { write } for pid=3388 comm="syz.1.156" name="uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 243.493543][ T30] audit: type=1400 audit(242.945:119): avc: denied { write } for pid=3393 comm="syz.1.159" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 246.968210][ T3364] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 247.004341][ T3364] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 249.841040][ T3364] hsr_slave_0: entered promiscuous mode [ 249.896581][ T3364] hsr_slave_1: entered promiscuous mode [ 250.873007][ T3364] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 250.899380][ T3364] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 250.921402][ T3364] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 250.935695][ T3364] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 252.718817][ T3364] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.408618][ T3364] veth0_vlan: entered promiscuous mode [ 262.500742][ T3364] veth1_vlan: entered promiscuous mode [ 262.836052][ T3364] veth0_macvtap: entered promiscuous mode [ 262.896885][ T3364] veth1_macvtap: entered promiscuous mode [ 263.187550][ T3364] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 263.188974][ T3364] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 263.189552][ T3364] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 263.190003][ T3364] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 266.645697][ T56] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 267.138714][ T56] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 267.529892][ T56] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 268.056536][ T56] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 270.113467][ T30] audit: type=1400 audit(269.565:120): avc: denied { read } for pid=3053 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 273.780378][ T56] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 273.861104][ T56] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 273.944121][ T56] bond0 (unregistering): Released all slaves [ 274.369716][ T56] hsr_slave_0: left promiscuous mode [ 274.444634][ T56] hsr_slave_1: left promiscuous mode [ 274.761564][ T56] veth1_macvtap: left promiscuous mode [ 274.776408][ T56] veth0_macvtap: left promiscuous mode [ 274.778796][ T56] veth1_vlan: left promiscuous mode [ 274.781215][ T56] veth0_vlan: left promiscuous mode [ 291.500766][ T3454] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 291.517661][ T3454] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 291.988306][ T3456] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 292.030067][ T3456] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 295.637340][ T3454] hsr_slave_0: entered promiscuous mode [ 295.717523][ T3454] hsr_slave_1: entered promiscuous mode [ 297.616236][ T3456] hsr_slave_0: entered promiscuous mode [ 297.686489][ T3456] hsr_slave_1: entered promiscuous mode [ 297.745218][ T3456] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 297.747719][ T3456] Cannot create hsr debugfs directory [ 301.689302][ T3454] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 301.814850][ T3454] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 301.881127][ T3454] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 301.960222][ T3454] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 302.704370][ T3456] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 302.811960][ T3456] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 302.939000][ T3456] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 303.060406][ T3456] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 307.096069][ T3454] 8021q: adding VLAN 0 to HW filter on device bond0 [ 307.214709][ T3456] 8021q: adding VLAN 0 to HW filter on device bond0 [ 325.638554][ T3454] veth0_vlan: entered promiscuous mode [ 325.855711][ T3454] veth1_vlan: entered promiscuous mode [ 326.349105][ T3454] veth0_macvtap: entered promiscuous mode [ 326.437347][ T3454] veth1_macvtap: entered promiscuous mode [ 326.791577][ T3454] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.803905][ T3454] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.804641][ T3454] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.805038][ T3454] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 327.412115][ T30] audit: type=1400 audit(326.845:121): avc: denied { mounton } for pid=3454 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 328.716437][ T3456] veth0_vlan: entered promiscuous mode [ 328.733765][ T30] audit: type=1400 audit(328.185:122): avc: denied { read } for pid=3008 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 328.758982][ T30] audit: type=1400 audit(328.205:123): avc: denied { append } for pid=3008 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 328.784442][ T30] audit: type=1400 audit(328.235:124): avc: denied { open } for pid=3008 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 328.786031][ T30] audit: type=1400 audit(328.235:125): avc: denied { getattr } for pid=3008 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 328.877452][ T3456] veth1_vlan: entered promiscuous mode [ 329.308625][ T3456] veth0_macvtap: entered promiscuous mode [ 329.380142][ T3456] veth1_macvtap: entered promiscuous mode [ 329.480267][ T30] audit: type=1400 audit(328.935:126): avc: denied { ioctl } for pid=3659 comm="syz.0.163" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9375 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 329.490866][ T3660] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3660 comm=syz.0.163 [ 329.788294][ T30] audit: type=1400 audit(329.245:127): avc: denied { read } for pid=3661 comm="syz.0.164" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 329.794443][ T30] audit: type=1400 audit(329.245:128): avc: denied { open } for pid=3661 comm="syz.0.164" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 329.816313][ T3456] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.817074][ T3456] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.817712][ T3456] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.818380][ T3456] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.824996][ T30] audit: type=1400 audit(329.285:129): avc: denied { ioctl } for pid=3661 comm="syz.0.164" path="/dev/nullb0" dev="devtmpfs" ino=673 ioctlcmd=0x1267 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 332.180542][ T3671] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3671 comm=syz.1.167 [ 334.168396][ T30] audit: type=1400 audit(333.625:130): avc: denied { create } for pid=3679 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 334.240808][ T30] audit: type=1400 audit(333.695:131): avc: denied { write } for pid=3679 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 338.224162][ T30] audit: type=1400 audit(337.675:132): avc: denied { create } for pid=3692 comm="syz.1.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 338.281517][ T30] audit: type=1400 audit(337.735:133): avc: denied { getopt } for pid=3692 comm="syz.1.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 339.214115][ T30] audit: type=1400 audit(338.665:134): avc: denied { create } for pid=3697 comm="syz.1.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 340.277699][ T3703] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3703 comm=syz.1.182 [ 340.486017][ T3705] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3705 comm=syz.0.183 [ 341.598201][ T30] audit: type=1400 audit(341.055:135): avc: denied { nlmsg_read } for pid=3706 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 342.044310][ T3710] Zero length message leads to an empty skb [ 342.983599][ T30] audit: type=1400 audit(342.435:136): avc: denied { write } for pid=3711 comm="syz.1.186" path="socket:[5260]" dev="sockfs" ino=5260 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 356.790073][ T30] audit: type=1400 audit(356.245:137): avc: denied { ioctl } for pid=3750 comm="syz.1.205" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0x891b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 358.361777][ T30] audit: type=1400 audit(357.815:138): avc: denied { prog_load } for pid=3759 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 358.368107][ T30] audit: type=1400 audit(357.825:139): avc: denied { bpf } for pid=3759 comm="syz.1.209" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 358.484846][ T30] audit: type=1400 audit(357.935:140): avc: denied { ioctl } for pid=3759 comm="syz.1.209" path="socket:[5353]" dev="sockfs" ino=5353 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 360.058854][ T30] audit: type=1400 audit(359.515:141): avc: denied { ioctl } for pid=3767 comm="syz.0.213" path="socket:[5368]" dev="sockfs" ino=5368 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 360.090678][ T30] audit: type=1400 audit(359.545:142): avc: denied { bind } for pid=3767 comm="syz.0.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 360.144622][ T30] audit: type=1400 audit(359.595:143): avc: denied { read } for pid=3767 comm="syz.0.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 364.572717][ T30] audit: type=1400 audit(364.025:144): avc: denied { create } for pid=3790 comm="syz.1.223" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 364.580988][ T30] audit: type=1400 audit(364.035:145): avc: denied { map } for pid=3790 comm="syz.1.223" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5413 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 364.593419][ T30] audit: type=1400 audit(364.035:146): avc: denied { read write } for pid=3790 comm="syz.1.223" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5413 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 367.463952][ T30] audit: type=1400 audit(366.905:147): avc: denied { mounton } for pid=3802 comm="syz.1.229" path="/syzkaller.6nDrWW/43/file0" dev="vda" ino=1762 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 367.474647][ T30] audit: type=1400 audit(366.925:148): avc: denied { mount } for pid=3802 comm="syz.1.229" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 367.503643][ T30] audit: type=1400 audit(366.955:149): avc: denied { mounton } for pid=3802 comm="syz.1.229" path="/syzkaller.6nDrWW/43/file0" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 367.716863][ T30] audit: type=1400 audit(367.165:150): avc: denied { unmount } for pid=3456 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 367.774138][ T30] audit: type=1400 audit(367.215:151): avc: denied { unmount } for pid=3456 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 368.927116][ T147] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 369.416297][ T147] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 369.931146][ T147] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 370.460634][ T147] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 372.247087][ T30] audit: type=1400 audit(371.705:152): avc: denied { ioctl } for pid=3823 comm="syz.0.238" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6152 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 374.140191][ T30] audit: type=1400 audit(373.595:153): avc: denied { map_create } for pid=3830 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 374.334407][ T30] audit: type=1400 audit(373.785:154): avc: denied { map_read map_write } for pid=3830 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 374.354287][ T30] audit: type=1400 audit(373.805:155): avc: denied { perfmon } for pid=3830 comm="syz.0.240" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 374.423282][ T30] audit: type=1400 audit(373.845:156): avc: denied { setopt } for pid=3830 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 377.056611][ T147] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 377.177800][ T147] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 377.299195][ T147] bond0 (unregistering): Released all slaves [ 377.843901][ T147] hsr_slave_0: left promiscuous mode [ 377.927851][ T147] hsr_slave_1: left promiscuous mode [ 378.431142][ T147] veth1_macvtap: left promiscuous mode [ 378.451547][ T147] veth0_macvtap: left promiscuous mode [ 378.458539][ T147] veth1_vlan: left promiscuous mode [ 378.466191][ T147] veth0_vlan: left promiscuous mode [ 383.498602][ T30] audit: type=1400 audit(382.955:157): avc: denied { ioctl } for pid=3853 comm="syz.0.248" path="socket:[5648]" dev="sockfs" ino=5648 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 385.789759][ T30] audit: type=1400 audit(385.245:158): avc: denied { setopt } for pid=3859 comm="syz.0.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 392.139292][ T30] audit: type=1400 audit(391.595:159): avc: denied { read } for pid=3883 comm="syz.0.257" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 392.164333][ T30] audit: type=1400 audit(391.615:160): avc: denied { open } for pid=3883 comm="syz.0.257" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 393.343308][ T30] audit: type=1400 audit(392.795:161): avc: denied { create } for pid=3887 comm="syz.0.258" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=blk_file permissive=1 [ 393.414384][ T30] audit: type=1400 audit(392.865:162): avc: denied { read } for pid=3887 comm="syz.0.258" name="file2" dev="vda" ino=1760 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=blk_file permissive=1 [ 393.419752][ T30] audit: type=1400 audit(392.875:163): avc: denied { open } for pid=3887 comm="syz.0.258" path="/syzkaller.2CzGnj/51/file2" dev="vda" ino=1760 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=blk_file permissive=1 [ 393.464903][ T30] audit: type=1400 audit(392.905:164): avc: denied { ioctl } for pid=3887 comm="syz.0.258" path="/syzkaller.2CzGnj/51/file2" dev="vda" ino=1760 ioctlcmd=0x1279 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=blk_file permissive=1 [ 393.756877][ T30] audit: type=1400 audit(393.205:165): avc: denied { unlink } for pid=3454 comm="syz-executor" name="file2" dev="vda" ino=1760 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=blk_file permissive=1 [ 396.906232][ T3809] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 396.976513][ T3809] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 399.918793][ T30] audit: type=1400 audit(399.375:166): avc: denied { unmount } for pid=3454 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 401.464230][ T30] audit: type=1400 audit(400.915:167): avc: denied { write } for pid=3929 comm="syz.0.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 403.713036][ T30] audit: type=1400 audit(403.165:168): avc: denied { ioctl } for pid=3938 comm="syz.0.269" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x550e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 403.770038][ T3809] hsr_slave_0: entered promiscuous mode [ 403.828010][ T3809] hsr_slave_1: entered promiscuous mode [ 403.934783][ T3809] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 403.935902][ T3809] Cannot create hsr debugfs directory [ 410.018262][ T3809] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 410.115341][ T3809] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 410.225078][ T3809] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 410.306644][ T3809] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 416.099678][ T3809] 8021q: adding VLAN 0 to HW filter on device bond0 [ 416.564068][ T30] audit: type=1400 audit(416.015:169): avc: denied { create } for pid=3991 comm="syz.0.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 416.650270][ T30] audit: type=1400 audit(416.105:170): avc: denied { setopt } for pid=3991 comm="syz.0.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 419.346518][ T30] audit: type=1400 audit(418.795:171): avc: denied { create } for pid=4004 comm="syz.0.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 419.383998][ T30] audit: type=1400 audit(418.835:172): avc: denied { write } for pid=4004 comm="syz.0.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 421.064906][ T30] audit: type=1400 audit(420.515:173): avc: denied { node_bind } for pid=4011 comm="syz.0.287" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 421.981775][ T30] audit: type=1400 audit(421.435:174): avc: denied { create } for pid=4016 comm="syz.0.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 422.046444][ T30] audit: type=1400 audit(421.505:175): avc: denied { write } for pid=4016 comm="syz.0.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 422.068026][ T30] audit: type=1400 audit(421.515:176): avc: denied { read } for pid=4016 comm="syz.0.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 432.098124][ T3809] veth0_vlan: entered promiscuous mode [ 432.206775][ T3809] veth1_vlan: entered promiscuous mode [ 432.454440][ T3809] veth0_macvtap: entered promiscuous mode [ 432.494038][ T3809] veth1_macvtap: entered promiscuous mode [ 432.839739][ T3809] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 432.840808][ T3809] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 432.841595][ T3809] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 432.847561][ T3809] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 435.495202][ T30] audit: type=1400 audit(434.935:177): avc: denied { ioctl } for pid=4092 comm="syz.1.311" path="socket:[6126]" dev="sockfs" ino=6126 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 440.784099][ T30] audit: type=1400 audit(440.235:178): avc: denied { write } for pid=4121 comm="syz.0.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 450.634607][ T30] audit: type=1400 audit(450.085:179): avc: denied { create } for pid=4175 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 450.645552][ T30] audit: type=1400 audit(450.095:180): avc: denied { read write } for pid=4175 comm="syz.1.351" path="socket:[7303]" dev="sockfs" ino=7303 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 452.905716][ T30] audit: type=1400 audit(452.355:181): avc: denied { bind } for pid=4187 comm="syz.1.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 452.941029][ T30] audit: type=1400 audit(452.375:182): avc: denied { accept } for pid=4187 comm="syz.1.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 452.994231][ T30] audit: type=1400 audit(452.445:183): avc: denied { write } for pid=4187 comm="syz.1.357" path="socket:[7324]" dev="sockfs" ino=7324 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 453.591810][ T30] audit: type=1400 audit(453.045:184): avc: denied { create } for pid=4192 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 453.641523][ T30] audit: type=1400 audit(453.095:185): avc: denied { write } for pid=4192 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 462.499431][ T30] audit: type=1400 audit(461.955:186): avc: denied { ioctl } for pid=4238 comm="syz.0.381" path="/dev/loop-control" dev="devtmpfs" ino=638 ioctlcmd=0x7213 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 463.081948][ T30] audit: type=1400 audit(462.535:187): avc: denied { read } for pid=4242 comm="syz.0.383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 464.627489][ T30] audit: type=1400 audit(464.075:188): avc: denied { ioctl } for pid=4248 comm="syz.0.386" path="socket:[7434]" dev="sockfs" ino=7434 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 464.993890][ T30] audit: type=1400 audit(464.445:189): avc: denied { name_bind } for pid=4249 comm="syz.1.387" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 465.056771][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 470.255553][ T30] audit: type=1400 audit(469.705:190): avc: denied { mounton } for pid=4271 comm="syz.0.397" path="/syzkaller.2CzGnj/148/file0" dev="vda" ino=1766 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 485.213656][ T30] audit: type=1400 audit(484.665:191): avc: denied { ioctl } for pid=4308 comm="syz.1.412" path="socket:[7540]" dev="sockfs" ino=7540 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 485.400794][ T30] audit: type=1400 audit(484.855:192): avc: denied { setopt } for pid=4308 comm="syz.1.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 485.424356][ T30] audit: type=1400 audit(484.875:193): avc: denied { bind } for pid=4308 comm="syz.1.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 485.454600][ T30] audit: type=1400 audit(484.905:194): avc: denied { name_bind } for pid=4308 comm="syz.1.412" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 485.507844][ T30] audit: type=1400 audit(484.955:195): avc: denied { node_bind } for pid=4308 comm="syz.1.412" saddr=172.20.20.187 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 486.570310][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 490.953704][ T30] audit: type=1400 audit(490.405:196): avc: denied { connect } for pid=4334 comm="syz.0.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 490.955597][ T30] audit: type=1400 audit(490.405:197): avc: denied { name_connect } for pid=4334 comm="syz.0.420" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 495.374727][ T30] audit: type=1400 audit(494.825:198): avc: denied { write } for pid=4357 comm="syz.0.431" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 509.578835][ T4420] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1543 sclass=netlink_tcpdiag_socket pid=4420 comm=syz.0.461 [ 509.581993][ T30] audit: type=1400 audit(509.035:199): avc: denied { write } for pid=4419 comm="syz.0.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 512.175042][ T4433] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1543 sclass=netlink_tcpdiag_socket pid=4433 comm=syz.0.467 [ 514.464917][ T4444] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1543 sclass=netlink_tcpdiag_socket pid=4444 comm=syz.1.473 [ 514.657221][ T30] audit: type=1400 audit(514.115:200): avc: denied { write } for pid=4440 comm="syz.0.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 516.621842][ T30] audit: type=1400 audit(516.075:201): avc: denied { write } for pid=4455 comm="syz.1.478" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 518.864762][ T4466] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1543 sclass=netlink_tcpdiag_socket pid=4466 comm=syz.1.483 [ 519.829807][ T30] audit: type=1400 audit(519.285:202): avc: denied { nlmsg_write } for pid=4463 comm="syz.0.482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 524.111904][ T30] audit: type=1400 audit(523.555:203): avc: denied { read write } for pid=4489 comm="syz.1.493" name="vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 524.116255][ T30] audit: type=1400 audit(523.565:204): avc: denied { open } for pid=4489 comm="syz.1.493" path="/dev/vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 524.146695][ T30] audit: type=1400 audit(523.595:205): avc: denied { ioctl } for pid=4489 comm="syz.1.493" path="/dev/vhost-net" dev="devtmpfs" ino=715 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 532.374200][ T30] audit: type=1400 audit(531.825:206): avc: denied { read write } for pid=4518 comm="syz.0.506" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 532.378445][ T30] audit: type=1400 audit(531.825:207): avc: denied { open } for pid=4518 comm="syz.0.506" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 534.957040][ T30] audit: type=1400 audit(534.405:208): avc: denied { ioctl } for pid=4528 comm="syz.1.511" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 537.777300][ T4542] serio: Serial port pts0 [ 542.857386][ T30] audit: type=1400 audit(542.315:209): avc: denied { create } for pid=4561 comm="syz.1.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 543.834618][ T30] audit: type=1400 audit(543.295:210): avc: denied { write } for pid=4565 comm="syz.1.527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 548.906241][ T4583] block nbd1: NBD_DISCONNECT [ 550.705114][ T30] audit: type=1400 audit(550.165:211): avc: denied { ioctl } for pid=4587 comm="syz.1.537" path="/dev/dri/card1" dev="devtmpfs" ino=620 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 552.576380][ T4594] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4594 comm=syz.1.540 [ 552.594669][ T30] audit: type=1400 audit(552.035:212): avc: denied { write } for pid=4593 comm="syz.1.540" path="socket:[8057]" dev="sockfs" ino=8057 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 554.666388][ T4601] block nbd1: NBD_DISCONNECT [ 555.390818][ T4605] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4605 comm=syz.1.545 [ 556.967087][ T4612] block nbd1: NBD_DISCONNECT [ 557.448989][ T4618] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4618 comm=syz.1.551 [ 561.569436][ T30] audit: type=1400 audit(561.015:213): avc: denied { ioctl } for pid=4638 comm="syz.1.563" path="socket:[8143]" dev="sockfs" ino=8143 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 563.967908][ T30] audit: type=1400 audit(563.425:214): avc: denied { connect } for pid=4652 comm="syz.1.570" lport=185 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 564.080758][ T30] audit: type=1400 audit(563.535:215): avc: denied { read } for pid=4652 comm="syz.1.570" laddr=172.20.20.10 lport=185 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 572.563127][ T30] audit: type=1400 audit(572.015:216): avc: denied { mount } for pid=4690 comm="syz.0.586" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 572.613872][ T30] audit: type=1400 audit(572.065:217): avc: denied { read } for pid=4690 comm="syz.0.586" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 572.618053][ T30] audit: type=1400 audit(572.075:218): avc: denied { open } for pid=4690 comm="syz.0.586" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 576.040103][ T30] audit: type=1400 audit(575.495:219): avc: denied { create } for pid=4704 comm="syz.0.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 576.058811][ T30] audit: type=1400 audit(575.515:220): avc: denied { create } for pid=4704 comm="syz.0.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 576.148607][ T30] audit: type=1400 audit(575.605:221): avc: denied { write } for pid=4704 comm="syz.0.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 582.197491][ T30] audit: type=1400 audit(581.655:222): avc: denied { create } for pid=4723 comm="syz.0.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 582.235412][ T30] audit: type=1400 audit(581.685:223): avc: denied { write } for pid=4723 comm="syz.0.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 584.904538][ T30] audit: type=1400 audit(584.355:224): avc: denied { read } for pid=4736 comm="syz.0.606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 600.304925][ T30] audit: type=1400 audit(599.725:225): avc: denied { lock } for pid=4809 comm="syz.0.640" path="socket:[8812]" dev="sockfs" ino=8812 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 610.617428][ T30] audit: type=1400 audit(610.065:226): avc: denied { mounton } for pid=4856 comm="syz.1.661" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 612.108765][ T30] audit: type=1400 audit(611.565:227): avc: denied { create } for pid=4866 comm="syz.1.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 612.124414][ T30] audit: type=1400 audit(611.575:228): avc: denied { connect } for pid=4866 comm="syz.1.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 612.654501][ T30] audit: type=1400 audit(612.105:229): avc: denied { write } for pid=4866 comm="syz.1.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 615.455334][ T4890] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4890 comm=syz.1.676 [ 616.091619][ T30] audit: type=1400 audit(615.545:230): avc: denied { write } for pid=4892 comm="syz.0.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 617.073997][ T4903] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4903 comm=syz.1.681 [ 621.074463][ T30] audit: type=1400 audit(620.525:231): avc: denied { block_suspend } for pid=4923 comm="syz.0.692" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 621.206544][ T30] audit: type=1400 audit(620.665:232): avc: denied { module_load } for pid=4923 comm="syz.0.692" path="/sys/power/wakeup_count" dev="sysfs" ino=844 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 636.321250][ T5009] sctp: [Deprecated]: syz.0.731 (pid 5009) Use of int in maxseg socket option. [ 636.321250][ T5009] Use struct sctp_assoc_value instead [ 637.518159][ T5015] syz.1.734 (pid 5015) is setting deprecated v1 encryption policy; recommend upgrading to v2. [ 638.844342][ T5024] block nbd1: NBD_DISCONNECT [ 641.080973][ T5037] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5037 comm=syz.0.745 [ 641.848417][ T30] audit: type=1400 audit(641.295:233): avc: denied { setopt } for pid=5040 comm="syz.0.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 644.141635][ T30] audit: type=1400 audit(643.595:234): avc: denied { setopt } for pid=5051 comm="syz.0.753" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 649.810740][ T30] audit: type=1400 audit(649.265:235): avc: denied { ioctl } for pid=5078 comm="syz.0.766" path="socket:[10000]" dev="sockfs" ino=10000 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 649.819024][ T30] audit: type=1400 audit(649.275:236): avc: denied { bind } for pid=5078 comm="syz.0.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 661.413661][ T30] audit: type=1400 audit(660.865:237): avc: denied { ioctl } for pid=5132 comm="syz.0.792" path="socket:[10304]" dev="sockfs" ino=10304 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 678.768601][ T30] audit: type=1400 audit(678.205:238): avc: denied { create } for pid=5225 comm="syz.0.838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 678.825872][ T30] audit: type=1400 audit(678.285:239): avc: denied { write } for pid=5225 comm="syz.0.838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 684.550230][ T30] audit: type=1400 audit(684.005:240): avc: denied { read } for pid=5258 comm="syz.0.855" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 684.584155][ T30] audit: type=1400 audit(684.025:241): avc: denied { open } for pid=5258 comm="syz.0.855" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 684.617767][ T30] audit: type=1400 audit(684.075:242): avc: denied { ioctl } for pid=5258 comm="syz.0.855" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 686.545667][ T30] audit: type=1400 audit(685.995:243): avc: denied { getopt } for pid=5273 comm="syz.1.861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 695.987348][ T5330] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5330 comm=syz.1.889 [ 698.385310][ T5342] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5342 comm=syz.1.895 [ 705.066352][ T30] audit: type=1400 audit(704.525:244): avc: denied { execute } for pid=5375 comm="syz.0.911" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 705.815069][ T30] audit: type=1400 audit(705.265:245): avc: denied { getopt } for pid=5378 comm="syz.1.912" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 709.551162][ T30] audit: type=1400 audit(709.005:246): avc: denied { create } for pid=5401 comm="syz.0.923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 709.570303][ T30] audit: type=1400 audit(709.025:247): avc: denied { ioctl } for pid=5401 comm="syz.0.923" path="socket:[10777]" dev="sockfs" ino=10777 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 715.591487][ T5425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=5425 comm=syz.1.934 [ 718.376068][ T5437] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=5437 comm=syz.0.940 [ 740.224305][ T30] audit: type=1400 audit(739.665:248): avc: denied { read } for pid=5553 comm="syz.1.997" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 740.229918][ T30] audit: type=1400 audit(739.685:249): avc: denied { open } for pid=5553 comm="syz.1.997" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 740.308066][ T30] audit: type=1400 audit(739.765:250): avc: denied { ioctl } for pid=5553 comm="syz.1.997" path="/dev/fb0" dev="devtmpfs" ino=621 ioctlcmd=0x64a3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 752.392005][ T5624] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5624 comm=syz.1.1032 [ 758.234795][ T30] audit: type=1400 audit(757.685:251): avc: denied { ioctl } for pid=5652 comm="syz.0.1046" path="socket:[12037]" dev="sockfs" ino=12037 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 763.365633][ T30] audit: type=1400 audit(762.805:252): avc: denied { ioctl } for pid=5674 comm="syz.0.1055" path="/dev/usbmon0" dev="devtmpfs" ino=697 ioctlcmd=0x9208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 779.257200][ T5756] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5756 comm=syz.0.1087 [ 781.426434][ T5766] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1005 sclass=netlink_xfrm_socket pid=5766 comm=syz.0.1091 [ 783.426694][ T5776] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1005 sclass=netlink_xfrm_socket pid=5776 comm=syz.1.1096 [ 786.825051][ T5789] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1005 sclass=netlink_xfrm_socket pid=5789 comm=syz.1.1102 [ 788.756646][ T30] audit: type=1400 audit(788.215:253): avc: denied { getopt } for pid=5797 comm="syz.0.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 789.367667][ T5801] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1005 sclass=netlink_xfrm_socket pid=5801 comm=syz.1.1108 [ 791.144373][ T5812] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1005 sclass=netlink_xfrm_socket pid=5812 comm=syz.0.1114 [ 791.460872][ T30] audit: type=1400 audit(790.915:254): avc: denied { read } for pid=5814 comm="syz.0.1115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 799.848468][ T5855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=5855 comm=syz.1.1135 [ 800.791297][ T30] audit: type=1400 audit(800.235:255): avc: denied { mount } for pid=5856 comm="syz.1.1137" name="/" dev="autofs" ino=13383 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 802.341528][ T5867] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=5867 comm=syz.1.1141 [ 806.558110][ T30] audit: type=1400 audit(806.015:256): avc: denied { read } for pid=5892 comm="syz.0.1154" dev="nsfs" ino=4026532769 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 806.567652][ T30] audit: type=1400 audit(806.015:257): avc: denied { open } for pid=5892 comm="syz.0.1154" path="net:[4026532769]" dev="nsfs" ino=4026532769 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 808.907180][ T5904] [U] ^@ [ 821.331425][ T30] audit: type=1400 audit(820.785:258): avc: denied { connect } for pid=5969 comm="syz.1.1191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 824.881295][ T5996] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5996 comm=syz.0.1204 [ 843.833272][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 843.948777][ T30] audit: type=1400 audit(843.395:259): avc: denied { create } for pid=6110 comm="syz.0.1261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 849.569740][ T6138] sctp: [Deprecated]: syz.1.1272 (pid 6138) Use of struct sctp_assoc_value in delayed_ack socket option. [ 849.569740][ T6138] Use struct sctp_sack_info instead [ 851.705645][ T6148] sctp: [Deprecated]: syz.0.1277 (pid 6148) Use of struct sctp_assoc_value in delayed_ack socket option. [ 851.705645][ T6148] Use struct sctp_sack_info instead [ 861.262937][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 863.557695][ T6210] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 863.575368][ T6210] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 866.106939][ T6221] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6221 comm=syz.0.1309 [ 871.777427][ T10] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 871.802703][ C0] hrtimer: interrupt took 802304 ns [ 872.504613][ T10] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 872.640819][ T10] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 872.642929][ T10] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 872.643758][ T10] usb 1-1: Product: syz [ 872.644378][ T10] usb 1-1: Manufacturer: syz [ 872.644994][ T10] usb 1-1: SerialNumber: syz [ 874.410083][ T10] cdc_ncm 1-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 874.426396][ T10] cdc_ncm 1-1:1.0: dwNtbInMaxSize=16 is too small. Using 2048 [ 874.427565][ T10] cdc_ncm 1-1:1.0: setting rx_max = 2048 [ 874.869541][ T10] cdc_ncm 1-1:1.0: setting tx_max = 88 [ 875.084826][ T10] cdc_ncm 1-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.0-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 875.247283][ T10] usb 1-1: USB disconnect, device number 2 [ 875.320443][ T10] cdc_ncm 1-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.0-1, CDC NCM (NO ZLP) [ 875.847589][ T10] ------------[ cut here ]------------ [ 875.848550][ T10] ODEBUG: free active (active state 0) object: 00000000763e2132 object type: work_struct hint: usbnet_deferred_kevent+0x0/0xa74 [ 875.881249][ T10] WARNING: CPU: 0 PID: 10 at lib/debugobjects.c:514 debug_print_object+0x184/0x264 [ 875.882587][ T10] Modules linked in: [ 875.886553][ T10] CPU: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.10.0-rc6-syzkaller-00051-g1dfe225e9af5 #0 [ 875.888052][ T10] Hardware name: linux,dummy-virt (DT) [ 875.888963][ T10] Workqueue: usb_hub_wq hub_event [ 875.890261][ T10] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 875.891042][ T10] pc : debug_print_object+0x184/0x264 [ 875.891633][ T10] lr : debug_print_object+0x184/0x264 [ 875.892299][ T10] sp : ffff8000898e7090 [ 875.892852][ T10] x29: ffff8000898e7090 x28: dfff800000000000 x27: 0000000000000004 [ 875.894056][ T10] x26: ffff8000801cc8cc x25: ffff8000898e7218 x24: ffff8000852ac0a0 [ 875.894945][ T10] x23: 0000000000000003 x22: ffff80008689fb68 x21: ffff800084fe5c80 [ 875.895800][ T10] x20: ffff8000852ab8a0 x19: ffff8000898e7200 x18: ffff00000a26a880 [ 875.896760][ T10] x17: 0000000000000000 x16: 0000000000000006 x15: 1fffe0000144d50f [ 875.897639][ T10] x14: 0000000000000000 x13: 0000000000000004 x12: ffff60000d4cb369 [ 875.898488][ T10] x11: 1fffe0000d4cb368 x10: ffff80008814b940 x9 : ffff00000a26a8c8 [ 875.899465][ T10] x8 : 00000000f3000000 x7 : 1fffe0000144d519 x6 : 00000000f3f3f3f3 [ 875.900337][ T10] x5 : 00000000f2f2f200 x4 : ffff70001131cd6e x3 : 0000000000000001 [ 875.901255][ T10] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00000a269e00 [ 875.902495][ T10] Call trace: [ 875.903110][ T10] debug_print_object+0x184/0x264 [ 875.903753][ T10] debug_check_no_obj_freed+0x3b8/0x4fc [ 875.904307][ T10] kfree+0x1bc/0x388 [ 875.904787][ T10] kvfree+0x3c/0x4c [ 875.905303][ T10] netdev_freemem+0x48/0x60 [ 875.905804][ T10] netdev_release+0x70/0x98 [ 875.906307][ T10] device_release+0xe4/0x1e8 [ 875.906809][ T10] kobject_put+0x17c/0x444 [ 875.907324][ T10] put_device+0x14/0x24 [ 875.907781][ T10] free_netdev+0x2c0/0x474 [ 875.908283][ T10] usbnet_disconnect+0x194/0x38c [ 875.908805][ T10] usb_unbind_interface+0x168/0x6f4 [ 875.909390][ T10] device_remove+0x100/0x14c [ 875.909877][ T10] device_release_driver_internal+0x310/0x47c [ 875.910445][ T10] device_release_driver+0x18/0x24 [ 875.910960][ T10] bus_remove_device+0x1a4/0x348 [ 875.911474][ T10] device_del+0x2d8/0x7ac [ 875.911958][ T10] usb_disable_device+0x240/0x5ac [ 875.912614][ T10] usb_disconnect+0x22c/0x75c [ 875.913182][ T10] hub_event+0x10a8/0x365c [ 875.913655][ T10] process_one_work+0x7bc/0x18a0 [ 875.914204][ T10] worker_thread+0x764/0xbec [ 875.914668][ T10] kthread+0x27c/0x300 [ 875.915150][ T10] ret_from_fork+0x10/0x20 [ 875.915931][ T10] irq event stamp: 477634 [ 875.916473][ T10] hardirqs last enabled at (477633): [] finish_task_switch.isra.0+0x1a8/0x8e8 [ 875.917408][ T10] hardirqs last disabled at (477634): [] el1_dbg+0x24/0x9c [ 875.918159][ T10] softirqs last enabled at (477626): [] handle_softirqs+0x8a8/0xd80 [ 875.918909][ T10] softirqs last disabled at (477607): [] __do_softirq+0x14/0x20 [ 875.919639][ T10] ---[ end trace 0000000000000000 ]--- VM DIAGNOSIS: 07:35:55 Registers: info registers vcpu 0 CPU#0 PC=ffff800084f22774 X00=0000000000000000 X01=0000000000000002 X02=0000000000000001 X03=0000000000000002 X04=ffff800084fde84c X05=ffff800088145b8c X06=6e69617420746f4e X07=006465746e696174 X08=ffff800088145b8b X09=dfff800000000000 X10=ffff700011028b71 X11=1ffff00011028b71 X12=ffff700011028b72 X13=0000000000000004 X14=0000000000000000 X15=1fffe0000144d50f X16=0000000000000006 X17=0000000000000000 X18=ffff00000a26a880 X19=ffff800085ed01c1 X20=0000000000000023 X21=dfff800000000000 X22=ffff800088013c23 X23=0000000000000020 X24=ffff800085ed01c0 X25=ffff800088013c23 X26=ffff800085ed0180 X27=ffff800084f95580 X28=000000000000001d X29=ffff8000898e6b60 X30=ffff800084ec0b1c SP=ffff8000898e6b60 PSTATE=800003c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000802da194 X00=0000000000000000 X01=1fffe00002364158 X02=0000000000000004 X03=0000000000000002 X04=ffff700011300f36 X05=1fffe00002364159 X06=ffff000011b20aa8 X07=0000000000000095 X08=00000000ffffffff X09=412a91162ab8dfb8 X10=ffff80008689fb60 X11=0000000000000001 X12=1ffff0001102976e X13=0000000000000004 X14=0000000000000000 X15=1fffe0000236414f X16=0000000000000000 X17=ffff7fffe3e28000 X18=ffff000011b20a80 X19=0000000000000001 X20=ffff80008683ffc8 X21=0000000000000000 X22=ffff800089807d20 X23=1fffe00001463b43 X24=ffff7fffe3e28000 X25=ffff00000a31da18 X26=ffff00000a31e3a0 X27=0000000000000200 X28=0000000000000001 X29=ffff800089807d90 X30=ffff8000802397ac SP=ffff800089807d90 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000