last executing test programs: 5m40.354303267s ago: executing program 0 (id=2035): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) syz_genetlink_get_family_id$nl80211(&(0x7f0000002340), r2) sendmsg$NL80211_CMD_DEL_PMK(r2, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x26004000}, 0x4008000) process_madvise(r2, &(0x7f00000027c0), 0x0, 0x0, 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000002840)) process_madvise(r2, &(0x7f0000002bc0)=[{&(0x7f00000028c0)="5ba51a6014b3c7fded6300f786189ed66456036d9723d5e0275de1e367f639411df90ee14bdd66480fb68112b5f5b3263e421424f58f8c456e689391f72604ad8369ab78d2bdbbfd2014fd90b7b9b74a1522bc0de6ccb0643f3d34f8b8436114a95b1d5e9627e941a04ea81cbdd604880825fcea3ca35f", 0x77}, {0x0}, {&(0x7f00000029c0)="6f9916c93056ad98458e56e81379b3b2535ef2b503f3f903fa245aaa8583ca2c4a685e9b8763a68022566f58764444a7ba98b26ba4db099a034a48221958eec5bb93", 0x42}, {&(0x7f0000002a40)="292ed9fb50b362fe7df2b8adec8bab29b7e8a501", 0x14}, {&(0x7f0000002a80)="42b49563c51a70c434d82219de3d57fdb42850e0eedd8d0185ac3c39cb72931fe15aada6f74770afa020861d18f381c15782", 0x32}, {&(0x7f0000002ac0)="5c1455ee49982a1f3a94c41fc5be6e59484d939614336393b2b89704f12fc0e9d40e26ea2a316cf1ae84ca1ce21cc8b8b7df558104d34e95e0f788e1f85c3e0dfec4fadce53d3fcfc49e44e6ce0cd60069118ac1edce4b856d210759df034f049e6544c9c6968ec8da4e35f231de57a3c0d0841065f50a7771117bf9922b7aa98baef432da210e5d255c5a9776142acbdd375d42b7151d14ab497b8aa5d689c4eacfd50ee78c4acae374cc42fe5c5fc798c02e36061464eb5a8a49dc73dc811c9f", 0xc1}], 0x6, 0x4, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000002e80)={0x0, 'netdevsim0\x00', {0x2}, 0x1}) 4m38.202894831s ago: executing program 0 (id=2035): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) syz_genetlink_get_family_id$nl80211(&(0x7f0000002340), r2) sendmsg$NL80211_CMD_DEL_PMK(r2, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x26004000}, 0x4008000) process_madvise(r2, &(0x7f00000027c0), 0x0, 0x0, 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000002840)) process_madvise(r2, &(0x7f0000002bc0)=[{&(0x7f00000028c0)="5ba51a6014b3c7fded6300f786189ed66456036d9723d5e0275de1e367f639411df90ee14bdd66480fb68112b5f5b3263e421424f58f8c456e689391f72604ad8369ab78d2bdbbfd2014fd90b7b9b74a1522bc0de6ccb0643f3d34f8b8436114a95b1d5e9627e941a04ea81cbdd604880825fcea3ca35f", 0x77}, {0x0}, {&(0x7f00000029c0)="6f9916c93056ad98458e56e81379b3b2535ef2b503f3f903fa245aaa8583ca2c4a685e9b8763a68022566f58764444a7ba98b26ba4db099a034a48221958eec5bb93", 0x42}, {&(0x7f0000002a40)="292ed9fb50b362fe7df2b8adec8bab29b7e8a501", 0x14}, {&(0x7f0000002a80)="42b49563c51a70c434d82219de3d57fdb42850e0eedd8d0185ac3c39cb72931fe15aada6f74770afa020861d18f381c15782", 0x32}, {&(0x7f0000002ac0)="5c1455ee49982a1f3a94c41fc5be6e59484d939614336393b2b89704f12fc0e9d40e26ea2a316cf1ae84ca1ce21cc8b8b7df558104d34e95e0f788e1f85c3e0dfec4fadce53d3fcfc49e44e6ce0cd60069118ac1edce4b856d210759df034f049e6544c9c6968ec8da4e35f231de57a3c0d0841065f50a7771117bf9922b7aa98baef432da210e5d255c5a9776142acbdd375d42b7151d14ab497b8aa5d689c4eacfd50ee78c4acae374cc42fe5c5fc798c02e36061464eb5a8a49dc73dc811c9f", 0xc1}], 0x6, 0x4, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000002e80)={0x0, 'netdevsim0\x00', {0x2}, 0x1}) 3m39.785069959s ago: executing program 0 (id=2035): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) syz_genetlink_get_family_id$nl80211(&(0x7f0000002340), r2) sendmsg$NL80211_CMD_DEL_PMK(r2, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x26004000}, 0x4008000) process_madvise(r2, &(0x7f00000027c0), 0x0, 0x0, 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000002840)) process_madvise(r2, &(0x7f0000002bc0)=[{&(0x7f00000028c0)="5ba51a6014b3c7fded6300f786189ed66456036d9723d5e0275de1e367f639411df90ee14bdd66480fb68112b5f5b3263e421424f58f8c456e689391f72604ad8369ab78d2bdbbfd2014fd90b7b9b74a1522bc0de6ccb0643f3d34f8b8436114a95b1d5e9627e941a04ea81cbdd604880825fcea3ca35f", 0x77}, {0x0}, {&(0x7f00000029c0)="6f9916c93056ad98458e56e81379b3b2535ef2b503f3f903fa245aaa8583ca2c4a685e9b8763a68022566f58764444a7ba98b26ba4db099a034a48221958eec5bb93", 0x42}, {&(0x7f0000002a40)="292ed9fb50b362fe7df2b8adec8bab29b7e8a501", 0x14}, {&(0x7f0000002a80)="42b49563c51a70c434d82219de3d57fdb42850e0eedd8d0185ac3c39cb72931fe15aada6f74770afa020861d18f381c15782", 0x32}, {&(0x7f0000002ac0)="5c1455ee49982a1f3a94c41fc5be6e59484d939614336393b2b89704f12fc0e9d40e26ea2a316cf1ae84ca1ce21cc8b8b7df558104d34e95e0f788e1f85c3e0dfec4fadce53d3fcfc49e44e6ce0cd60069118ac1edce4b856d210759df034f049e6544c9c6968ec8da4e35f231de57a3c0d0841065f50a7771117bf9922b7aa98baef432da210e5d255c5a9776142acbdd375d42b7151d14ab497b8aa5d689c4eacfd50ee78c4acae374cc42fe5c5fc798c02e36061464eb5a8a49dc73dc811c9f", 0xc1}], 0x6, 0x4, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000002e80)={0x0, 'netdevsim0\x00', {0x2}, 0x1}) 2m35.946978033s ago: executing program 0 (id=2035): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) syz_genetlink_get_family_id$nl80211(&(0x7f0000002340), r2) sendmsg$NL80211_CMD_DEL_PMK(r2, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x26004000}, 0x4008000) process_madvise(r2, &(0x7f00000027c0), 0x0, 0x0, 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000002840)) process_madvise(r2, &(0x7f0000002bc0)=[{&(0x7f00000028c0)="5ba51a6014b3c7fded6300f786189ed66456036d9723d5e0275de1e367f639411df90ee14bdd66480fb68112b5f5b3263e421424f58f8c456e689391f72604ad8369ab78d2bdbbfd2014fd90b7b9b74a1522bc0de6ccb0643f3d34f8b8436114a95b1d5e9627e941a04ea81cbdd604880825fcea3ca35f", 0x77}, {0x0}, {&(0x7f00000029c0)="6f9916c93056ad98458e56e81379b3b2535ef2b503f3f903fa245aaa8583ca2c4a685e9b8763a68022566f58764444a7ba98b26ba4db099a034a48221958eec5bb93", 0x42}, {&(0x7f0000002a40)="292ed9fb50b362fe7df2b8adec8bab29b7e8a501", 0x14}, {&(0x7f0000002a80)="42b49563c51a70c434d82219de3d57fdb42850e0eedd8d0185ac3c39cb72931fe15aada6f74770afa020861d18f381c15782", 0x32}, {&(0x7f0000002ac0)="5c1455ee49982a1f3a94c41fc5be6e59484d939614336393b2b89704f12fc0e9d40e26ea2a316cf1ae84ca1ce21cc8b8b7df558104d34e95e0f788e1f85c3e0dfec4fadce53d3fcfc49e44e6ce0cd60069118ac1edce4b856d210759df034f049e6544c9c6968ec8da4e35f231de57a3c0d0841065f50a7771117bf9922b7aa98baef432da210e5d255c5a9776142acbdd375d42b7151d14ab497b8aa5d689c4eacfd50ee78c4acae374cc42fe5c5fc798c02e36061464eb5a8a49dc73dc811c9f", 0xc1}], 0x6, 0x4, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000002e80)={0x0, 'netdevsim0\x00', {0x2}, 0x1}) 1m33.298555744s ago: executing program 0 (id=2035): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) syz_genetlink_get_family_id$nl80211(&(0x7f0000002340), r2) sendmsg$NL80211_CMD_DEL_PMK(r2, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x26004000}, 0x4008000) process_madvise(r2, &(0x7f00000027c0), 0x0, 0x0, 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000002840)) process_madvise(r2, &(0x7f0000002bc0)=[{&(0x7f00000028c0)="5ba51a6014b3c7fded6300f786189ed66456036d9723d5e0275de1e367f639411df90ee14bdd66480fb68112b5f5b3263e421424f58f8c456e689391f72604ad8369ab78d2bdbbfd2014fd90b7b9b74a1522bc0de6ccb0643f3d34f8b8436114a95b1d5e9627e941a04ea81cbdd604880825fcea3ca35f", 0x77}, {0x0}, {&(0x7f00000029c0)="6f9916c93056ad98458e56e81379b3b2535ef2b503f3f903fa245aaa8583ca2c4a685e9b8763a68022566f58764444a7ba98b26ba4db099a034a48221958eec5bb93", 0x42}, {&(0x7f0000002a40)="292ed9fb50b362fe7df2b8adec8bab29b7e8a501", 0x14}, {&(0x7f0000002a80)="42b49563c51a70c434d82219de3d57fdb42850e0eedd8d0185ac3c39cb72931fe15aada6f74770afa020861d18f381c15782", 0x32}, {&(0x7f0000002ac0)="5c1455ee49982a1f3a94c41fc5be6e59484d939614336393b2b89704f12fc0e9d40e26ea2a316cf1ae84ca1ce21cc8b8b7df558104d34e95e0f788e1f85c3e0dfec4fadce53d3fcfc49e44e6ce0cd60069118ac1edce4b856d210759df034f049e6544c9c6968ec8da4e35f231de57a3c0d0841065f50a7771117bf9922b7aa98baef432da210e5d255c5a9776142acbdd375d42b7151d14ab497b8aa5d689c4eacfd50ee78c4acae374cc42fe5c5fc798c02e36061464eb5a8a49dc73dc811c9f", 0xc1}], 0x6, 0x4, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000002e80)={0x0, 'netdevsim0\x00', {0x2}, 0x1}) 33.151321243s ago: executing program 0 (id=2035): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f00000000c0)={0x2020}, 0x2020) syz_genetlink_get_family_id$nl80211(&(0x7f0000002340), r2) sendmsg$NL80211_CMD_DEL_PMK(r2, &(0x7f0000002400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x26004000}, 0x4008000) process_madvise(r2, &(0x7f00000027c0), 0x0, 0x0, 0x0) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000002840)) process_madvise(r2, &(0x7f0000002bc0)=[{&(0x7f00000028c0)="5ba51a6014b3c7fded6300f786189ed66456036d9723d5e0275de1e367f639411df90ee14bdd66480fb68112b5f5b3263e421424f58f8c456e689391f72604ad8369ab78d2bdbbfd2014fd90b7b9b74a1522bc0de6ccb0643f3d34f8b8436114a95b1d5e9627e941a04ea81cbdd604880825fcea3ca35f", 0x77}, {0x0}, {&(0x7f00000029c0)="6f9916c93056ad98458e56e81379b3b2535ef2b503f3f903fa245aaa8583ca2c4a685e9b8763a68022566f58764444a7ba98b26ba4db099a034a48221958eec5bb93", 0x42}, {&(0x7f0000002a40)="292ed9fb50b362fe7df2b8adec8bab29b7e8a501", 0x14}, {&(0x7f0000002a80)="42b49563c51a70c434d82219de3d57fdb42850e0eedd8d0185ac3c39cb72931fe15aada6f74770afa020861d18f381c15782", 0x32}, {&(0x7f0000002ac0)="5c1455ee49982a1f3a94c41fc5be6e59484d939614336393b2b89704f12fc0e9d40e26ea2a316cf1ae84ca1ce21cc8b8b7df558104d34e95e0f788e1f85c3e0dfec4fadce53d3fcfc49e44e6ce0cd60069118ac1edce4b856d210759df034f049e6544c9c6968ec8da4e35f231de57a3c0d0841065f50a7771117bf9922b7aa98baef432da210e5d255c5a9776142acbdd375d42b7151d14ab497b8aa5d689c4eacfd50ee78c4acae374cc42fe5c5fc798c02e36061464eb5a8a49dc73dc811c9f", 0xc1}], 0x6, 0x4, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000002e80)={0x0, 'netdevsim0\x00', {0x2}, 0x1}) 16.930679977s ago: executing program 1 (id=2206): openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='cgroup\x00') close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, 0x0, 0x0) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) ioctl$KDMKTONE(r1, 0x5451, 0x0) setuid(0xee01) openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 16.717471249s ago: executing program 1 (id=2207): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r2, 0x0) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept$unix(r2, 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r3, 0x5450, 0x0) 16.480023341s ago: executing program 1 (id=2208): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, "dd93105df100"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) syz_usb_connect(0x6, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = dup(r1) ioctl$DRM_IOCTL_SET_VERSION(r2, 0xc0106407, 0x0) 928.076881ms ago: executing program 1 (id=2209): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r1, r0, 0x0) r2 = accept(r1, 0x0, 0x0) recvmsg$unix(r2, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) fcntl$getflags(r3, 0x0) 340.590492ms ago: executing program 1 (id=2210): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x26e1, 0x0) close(r0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r3 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RGETLOCK(r3, &(0x7f0000000280)=ANY=[], 0x27) 0s ago: executing program 1 (id=2211): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',']) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(r0, &(0x7f0000008400)="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", 0x2000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x90, 0x0, 0x4, {0x6, 0x1, 0x0, 0x1, 0x0, 0x0, {0x40, 0x4, 0x0, 0xffff, 0x0, 0xc9, 0x0, 0x4, 0x120, 0x6000, 0x3, 0x0, 0x0, 0x902}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INIT(r0, &(0x7f0000000440)={0x50, 0x0, r1}, 0x50) r2 = openat(0xffffffffffffff9c, &(0x7f0000000a80)='./file0/file0\x00', 0x0, 0x1) ioctl$TIOCGPTPEER(r2, 0x932, 0x8) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:28602' (ED25519) to the list of known hosts. [ 222.948572][ T30] audit: type=1400 audit(222.310:46): avc: denied { name_bind } for pid=3288 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 223.527528][ T30] audit: type=1400 audit(222.890:47): avc: denied { execute } for pid=3289 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 223.534023][ T30] audit: type=1400 audit(222.900:48): avc: denied { execute_no_trans } for pid=3289 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 230.449246][ T30] audit: type=1400 audit(229.810:49): avc: denied { mounton } for pid=3289 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 230.480287][ T30] audit: type=1400 audit(229.840:50): avc: denied { mount } for pid=3289 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 230.534408][ T3289] cgroup: Unknown subsys name 'net' [ 230.571865][ T30] audit: type=1400 audit(229.940:51): avc: denied { unmount } for pid=3289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 230.854150][ T3289] cgroup: Unknown subsys name 'cpuset' [ 230.914508][ T3289] cgroup: Unknown subsys name 'rlimit' [ 231.247376][ T30] audit: type=1400 audit(230.610:52): avc: denied { setattr } for pid=3289 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 231.255465][ T30] audit: type=1400 audit(230.620:53): avc: denied { mounton } for pid=3289 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 231.261646][ T30] audit: type=1400 audit(230.620:54): avc: denied { mount } for pid=3289 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 231.943633][ T3291] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 231.953236][ T30] audit: type=1400 audit(231.320:55): avc: denied { relabelto } for pid=3291 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 231.962494][ T30] audit: type=1400 audit(231.320:56): avc: denied { write } for pid=3291 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 232.113973][ T30] audit: type=1400 audit(231.470:57): avc: denied { read } for pid=3289 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 232.115696][ T30] audit: type=1400 audit(231.480:58): avc: denied { open } for pid=3289 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 232.152686][ T3289] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 262.846366][ T30] audit: type=1400 audit(262.210:59): avc: denied { execmem } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 262.955693][ T30] audit: type=1400 audit(262.320:60): avc: denied { read } for pid=3294 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 262.961802][ T30] audit: type=1400 audit(262.320:61): avc: denied { open } for pid=3294 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 263.015879][ T30] audit: type=1400 audit(262.380:62): avc: denied { mounton } for pid=3294 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 263.103741][ T30] audit: type=1400 audit(262.470:64): avc: denied { module_request } for pid=3295 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 263.108885][ T30] audit: type=1400 audit(262.470:63): avc: denied { module_request } for pid=3294 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 263.434006][ T30] audit: type=1400 audit(262.800:65): avc: denied { sys_module } for pid=3294 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 271.660045][ T3295] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 271.685150][ T3295] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 272.288883][ T3294] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 272.340957][ T3294] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 275.224894][ T3295] hsr_slave_0: entered promiscuous mode [ 275.243825][ T3295] hsr_slave_1: entered promiscuous mode [ 276.333306][ T3294] hsr_slave_0: entered promiscuous mode [ 276.337161][ T3294] hsr_slave_1: entered promiscuous mode [ 276.342957][ T3294] debugfs: 'hsr0' already exists in 'hsr' [ 276.344195][ T3294] Cannot create hsr debugfs directory [ 277.664997][ T30] audit: type=1400 audit(277.030:66): avc: denied { create } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 277.679441][ T30] audit: type=1400 audit(277.040:67): avc: denied { write } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 277.680845][ T30] audit: type=1400 audit(277.040:68): avc: denied { read } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 277.756536][ T3295] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 277.923392][ T3295] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 278.000578][ T3295] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 278.179652][ T3295] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 279.213175][ T3294] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 279.370104][ T3294] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 279.439779][ T3294] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 279.506671][ T3294] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 282.374822][ T3295] 8021q: adding VLAN 0 to HW filter on device bond0 [ 283.506773][ T3294] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.557044][ T3295] veth0_vlan: entered promiscuous mode [ 294.694757][ T3295] veth1_vlan: entered promiscuous mode [ 295.173422][ T3295] veth0_macvtap: entered promiscuous mode [ 295.254362][ T3295] veth1_macvtap: entered promiscuous mode [ 295.477124][ T3295] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 295.482442][ T3295] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 295.484436][ T3295] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 295.484925][ T3295] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 295.776026][ T3294] veth0_vlan: entered promiscuous mode [ 296.053664][ T30] audit: type=1400 audit(295.420:69): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 296.096046][ T30] audit: type=1400 audit(295.460:70): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/syzkaller.w5TiMs/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 296.159473][ T30] audit: type=1400 audit(295.510:71): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 296.183802][ T3294] veth1_vlan: entered promiscuous mode [ 296.189994][ T30] audit: type=1400 audit(295.550:72): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/syzkaller.w5TiMs/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 296.209460][ T30] audit: type=1400 audit(295.570:73): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/syzkaller.w5TiMs/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3493 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 296.280781][ T30] audit: type=1400 audit(295.650:74): avc: denied { unmount } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 296.353899][ T30] audit: type=1400 audit(295.720:75): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 296.399699][ T30] audit: type=1400 audit(295.760:76): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="gadgetfs" ino=2953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 296.442380][ T30] audit: type=1400 audit(295.810:77): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 296.463758][ T30] audit: type=1400 audit(295.820:78): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 296.618839][ T3294] veth0_macvtap: entered promiscuous mode [ 296.715721][ T3294] veth1_macvtap: entered promiscuous mode [ 296.894900][ T3295] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 297.146914][ T3294] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.152056][ T3294] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.159701][ T3294] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.163996][ T3294] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 302.800415][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 302.809043][ T30] audit: type=1400 audit(302.150:83): avc: denied { create } for pid=3458 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 303.399267][ T30] audit: type=1400 audit(302.760:84): avc: denied { map_create } for pid=3460 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 303.400308][ T30] audit: type=1400 audit(302.760:85): avc: denied { bpf } for pid=3460 comm="syz.0.10" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 303.453737][ T30] audit: type=1400 audit(302.820:86): avc: denied { map_read map_write } for pid=3460 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 303.496411][ T30] audit: type=1400 audit(302.860:87): avc: denied { prog_load } for pid=3460 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 303.532418][ T30] audit: type=1400 audit(302.890:88): avc: denied { perfmon } for pid=3460 comm="syz.0.10" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 303.985946][ T30] audit: type=1400 audit(303.350:89): avc: denied { read write } for pid=3462 comm="syz.0.11" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 303.996458][ T30] audit: type=1400 audit(303.360:90): avc: denied { open } for pid=3462 comm="syz.0.11" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 305.076764][ T30] audit: type=1400 audit(304.440:91): avc: denied { unmount } for pid=3294 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 306.251433][ T30] audit: type=1400 audit(305.620:92): avc: denied { create } for pid=3473 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 309.520650][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 309.521740][ T30] audit: type=1400 audit(308.880:98): avc: denied { read } for pid=3491 comm="syz.0.22" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 309.522563][ T30] audit: type=1400 audit(308.880:99): avc: denied { open } for pid=3491 comm="syz.0.22" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 309.550651][ T30] audit: type=1400 audit(308.910:100): avc: denied { ioctl } for pid=3491 comm="syz.0.22" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x640d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 311.709335][ T30] audit: type=1400 audit(311.070:101): avc: denied { write } for pid=3498 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 317.602195][ T3520] serio: Serial port pts0 [ 320.877269][ T30] audit: type=1400 audit(320.240:102): avc: denied { shutdown } for pid=3527 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 320.885713][ T30] audit: type=1400 audit(320.250:103): avc: denied { ioctl } for pid=3527 comm="syz.0.36" path="socket:[4164]" dev="sockfs" ino=4164 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 321.172589][ T30] audit: type=1400 audit(320.540:104): avc: denied { create } for pid=3529 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 321.176749][ T3530] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 321.211797][ T30] audit: type=1400 audit(320.560:105): avc: denied { getopt } for pid=3529 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 321.222918][ T30] audit: type=1400 audit(320.580:106): avc: denied { ioctl } for pid=3529 comm="syz.0.37" path="socket:[3688]" dev="sockfs" ino=3688 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 321.323147][ T30] audit: type=1400 audit(320.690:107): avc: denied { setopt } for pid=3529 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 323.960770][ T30] audit: type=1400 audit(323.320:108): avc: denied { name_bind } for pid=3540 comm="syz.1.42" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 323.961510][ T30] audit: type=1400 audit(323.320:109): avc: denied { node_bind } for pid=3540 comm="syz.1.42" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 324.260605][ T30] audit: type=1400 audit(323.620:110): avc: denied { mounton } for pid=3542 comm="syz.0.43" path="/25/file0" dev="tmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 328.504667][ T30] audit: type=1400 audit(327.870:111): avc: denied { read write } for pid=3562 comm="syz.0.51" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 328.519179][ T30] audit: type=1400 audit(327.870:112): avc: denied { open } for pid=3562 comm="syz.0.51" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 328.551682][ T30] audit: type=1400 audit(327.920:113): avc: denied { read } for pid=3562 comm="syz.0.51" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 328.554951][ T30] audit: type=1400 audit(327.920:114): avc: denied { open } for pid=3562 comm="syz.0.51" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 328.582406][ T30] audit: type=1400 audit(327.950:115): avc: denied { ioctl } for pid=3562 comm="syz.0.51" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 329.993752][ T30] audit: type=1400 audit(329.360:116): avc: denied { prog_run } for pid=3567 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 343.056787][ T30] audit: type=1400 audit(342.420:117): avc: denied { write } for pid=3619 comm="syz.1.73" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 343.640920][ T30] audit: type=1400 audit(343.000:118): avc: denied { create } for pid=3621 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 343.683942][ T30] audit: type=1400 audit(343.050:119): avc: denied { bind } for pid=3621 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 343.702430][ T30] audit: type=1400 audit(343.060:120): avc: denied { setopt } for pid=3621 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 343.714976][ T30] audit: type=1400 audit(343.080:121): avc: denied { accept } for pid=3621 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 343.754668][ T30] audit: type=1400 audit(343.120:122): avc: denied { read } for pid=3621 comm="syz.0.74" path="socket:[4322]" dev="sockfs" ino=4322 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 344.704939][ T30] audit: type=1400 audit(344.070:123): avc: denied { mounton } for pid=3625 comm="syz.0.76" path="/proc/109/task" dev="proc" ino=4329 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 344.723163][ T30] audit: type=1400 audit(344.080:124): avc: denied { mount } for pid=3625 comm="syz.0.76" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 348.412569][ T30] audit: type=1400 audit(347.780:125): avc: denied { wake_alarm } for pid=3642 comm="syz.1.81" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 352.325438][ T3643] block nbd1: shutting down sockets [ 353.230012][ T3654] capability: warning: `syz.1.85' uses 32-bit capabilities (legacy support in use) [ 353.246816][ T30] audit: type=1400 audit(352.610:126): avc: denied { create } for pid=3652 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 359.112376][ T30] audit: type=1400 audit(358.480:127): avc: denied { getopt } for pid=3675 comm="syz.1.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 359.164235][ T30] audit: type=1400 audit(358.530:128): avc: denied { create } for pid=3678 comm="syz.0.94" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 359.981113][ T3683] serio: Serial port pts0 [ 366.250710][ T30] audit: type=1400 audit(365.610:129): avc: denied { mounton } for pid=3706 comm="syz.0.105" path="/55/file0" dev="tmpfs" ino=318 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 368.854398][ T30] audit: type=1400 audit(368.220:130): avc: denied { write } for pid=3716 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 368.857531][ T3717] trusted_key: syz.0.109 sent an empty control message without MSG_MORE. [ 368.884416][ T30] audit: type=1400 audit(368.250:131): avc: denied { create } for pid=3715 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 368.966820][ T30] audit: type=1400 audit(368.310:132): avc: denied { ioctl } for pid=3715 comm="syz.1.108" path="socket:[4492]" dev="sockfs" ino=4492 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 368.967490][ T30] audit: type=1400 audit(368.310:133): avc: denied { bind } for pid=3715 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 369.009057][ T30] audit: type=1400 audit(368.370:134): avc: denied { write } for pid=3715 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 370.044805][ T30] audit: type=1400 audit(369.410:135): avc: denied { read } for pid=3715 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 373.005003][ T30] audit: type=1400 audit(372.370:136): avc: denied { create } for pid=3730 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 373.065605][ T30] audit: type=1400 audit(372.430:137): avc: denied { setopt } for pid=3730 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 373.920535][ T30] audit: type=1400 audit(373.280:138): avc: denied { read } for pid=3734 comm="syz.1.117" name="iommu" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 373.926561][ T30] audit: type=1400 audit(373.290:139): avc: denied { open } for pid=3734 comm="syz.1.117" path="/dev/iommu" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 373.954231][ T30] audit: type=1400 audit(373.320:140): avc: denied { ioctl } for pid=3734 comm="syz.1.117" path="/dev/iommu" dev="devtmpfs" ino=614 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 374.030499][ T3735] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 376.719840][ T3743] serio: Serial port pts0 [ 379.985674][ T30] audit: type=1400 audit(379.350:141): avc: denied { setopt } for pid=3749 comm="syz.1.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 386.960636][ T30] audit: type=1400 audit(386.320:142): avc: denied { write } for pid=3782 comm="syz.0.137" name="udmabuf" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 389.392957][ T30] audit: type=1400 audit(388.760:143): avc: denied { write } for pid=3792 comm="syz.1.141" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 391.005266][ T30] audit: type=1400 audit(390.370:144): avc: denied { write } for pid=3800 comm="syz.0.145" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 391.006071][ T30] audit: type=1400 audit(390.370:145): avc: denied { open } for pid=3800 comm="syz.0.145" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 391.022072][ T30] audit: type=1400 audit(390.390:146): avc: denied { read } for pid=3800 comm="syz.0.145" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 391.713835][ T30] audit: type=1400 audit(391.080:147): avc: denied { mounton } for pid=3802 comm="syz.1.146" path="/73/file0" dev="tmpfs" ino=423 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 392.335284][ T3804] fuse: root generation should be zero [ 395.525560][ T3823] capability: warning: `syz.1.153' uses deprecated v2 capabilities in a way that may be insecure [ 395.656453][ T30] audit: type=1400 audit(395.010:148): avc: denied { unmount } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 397.476034][ T30] audit: type=1400 audit(396.840:149): avc: denied { read write } for pid=3831 comm="syz.0.157" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 397.496177][ T30] audit: type=1400 audit(396.860:150): avc: denied { open } for pid=3831 comm="syz.0.157" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 397.733467][ T1907] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 397.893577][ T1907] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 399.222900][ T30] audit: type=1400 audit(398.580:151): avc: denied { read } for pid=3834 comm="syz.1.158" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 404.465353][ T30] audit: type=1400 audit(403.830:152): avc: denied { write } for pid=3831 comm="syz.0.157" name="hidraw0" dev="devtmpfs" ino=1548 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 414.989022][ T3872] serio: Serial port pts0 [ 426.362346][ T2130] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 427.166160][ T2130] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 427.897515][ T2130] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 428.515756][ T2130] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 429.872583][ T30] audit: type=1400 audit(429.230:153): avc: denied { read } for pid=3139 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 435.921040][ T2130] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 436.067372][ T2130] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 436.184315][ T2130] bond0 (unregistering): Released all slaves [ 437.097130][ T2130] hsr_slave_0: left promiscuous mode [ 437.184175][ T2130] hsr_slave_1: left promiscuous mode [ 437.485314][ T2130] veth1_macvtap: left promiscuous mode [ 437.495205][ T2130] veth0_macvtap: left promiscuous mode [ 437.512437][ T2130] veth1_vlan: left promiscuous mode [ 437.515722][ T2130] veth0_vlan: left promiscuous mode [ 442.930547][ T3960] serio: Serial port pts0 [ 457.525848][ T4006] serio: Serial port pts0 [ 458.352846][ T3916] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 458.374730][ T3916] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 464.663203][ T3916] hsr_slave_0: entered promiscuous mode [ 464.691754][ T3916] hsr_slave_1: entered promiscuous mode [ 464.908844][ T30] audit: type=1400 audit(464.270:154): avc: denied { setopt } for pid=4033 comm="syz.0.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 471.271713][ T3916] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 471.326059][ T3916] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 471.386791][ T3916] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 471.445219][ T3916] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 478.222142][ T3916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 485.506735][ T30] audit: type=1400 audit(484.870:155): avc: denied { create } for pid=4105 comm="syz.0.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 485.553144][ T30] audit: type=1400 audit(484.920:156): avc: denied { read } for pid=4105 comm="syz.0.224" path="socket:[6399]" dev="sockfs" ino=6399 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 489.614164][ T30] audit: type=1400 audit(488.980:157): avc: denied { getopt } for pid=4127 comm="syz.0.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 493.986115][ T4146] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 496.084828][ T3916] veth0_vlan: entered promiscuous mode [ 496.195397][ T3916] veth1_vlan: entered promiscuous mode [ 496.457341][ T3916] veth0_macvtap: entered promiscuous mode [ 496.506750][ T3916] veth1_macvtap: entered promiscuous mode [ 496.756615][ T3916] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 496.757563][ T3916] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 496.760410][ T3916] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 496.761123][ T3916] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 497.054122][ T30] audit: type=1400 audit(496.420:158): avc: denied { mounton } for pid=3916 comm="syz-executor" path="/syzkaller.bXBExj/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 497.234076][ T30] audit: type=1400 audit(496.600:159): avc: denied { mounton } for pid=3916 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 504.063184][ T30] audit: type=1400 audit(503.430:160): avc: denied { create } for pid=4174 comm="syz.0.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 514.996149][ T4203] syzkaller0: entered promiscuous mode [ 515.004249][ T4203] syzkaller0: entered allmulticast mode [ 528.585024][ T30] audit: type=1400 audit(527.950:161): avc: denied { create } for pid=4250 comm="syz.1.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 528.598726][ T30] audit: type=1400 audit(527.960:162): avc: denied { ioctl } for pid=4250 comm="syz.1.270" path="socket:[5992]" dev="sockfs" ino=5992 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 529.152780][ T30] audit: type=1400 audit(528.510:163): avc: denied { write } for pid=4250 comm="syz.1.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 529.653287][ T30] audit: type=1400 audit(529.020:164): avc: denied { read } for pid=4250 comm="syz.1.270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 529.690866][ T30] audit: type=1400 audit(529.060:165): avc: denied { write } for pid=4250 comm="syz.1.270" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 533.973194][ T30] audit: type=1400 audit(533.330:166): avc: denied { execute } for pid=4264 comm="syz.1.274" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 534.370345][ T30] audit: type=1400 audit(533.730:167): avc: denied { nlmsg_write } for pid=4266 comm="syz.0.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 534.403743][ T4267] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4267 comm=syz.0.275 [ 534.421175][ T4267] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4267 comm=syz.0.275 [ 537.831130][ T30] audit: type=1400 audit(537.200:168): avc: denied { getopt } for pid=4281 comm="syz.1.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 537.844189][ T30] audit: type=1400 audit(537.200:169): avc: denied { ioctl } for pid=4281 comm="syz.1.281" path="socket:[6048]" dev="sockfs" ino=6048 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 542.838166][ C0] hrtimer: interrupt took 1515440 ns [ 545.054181][ C0] vkms_vblank_simulate: vblank timer overrun [ 547.580219][ T30] audit: type=1400 audit(546.940:170): avc: denied { ioctl } for pid=4313 comm="syz.1.294" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=6096 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 547.690206][ T30] audit: type=1400 audit(547.040:171): avc: denied { setopt } for pid=4313 comm="syz.1.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 548.610475][ T30] audit: type=1400 audit(547.980:172): avc: denied { ioctl } for pid=4316 comm="syz.0.295" path="net:[4026532707]" dev="nsfs" ino=4026532707 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 553.233404][ T30] audit: type=1400 audit(552.600:173): avc: denied { allowed } for pid=4331 comm="syz.1.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 553.367208][ T30] audit: type=1400 audit(552.730:174): avc: denied { map } for pid=4331 comm="syz.1.300" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6138 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 553.396693][ T30] audit: type=1400 audit(552.730:175): avc: denied { read write } for pid=4331 comm="syz.1.300" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6138 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 565.605264][ T30] audit: type=1400 audit(564.970:176): avc: denied { block_suspend } for pid=4378 comm="syz.0.315" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 567.342813][ T30] audit: type=1400 audit(566.690:177): avc: denied { mount } for pid=4389 comm="syz.1.318" name="/" dev="ramfs" ino=6879 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 568.280061][ T4394] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23 sclass=netlink_route_socket pid=4394 comm=syz.0.320 [ 573.860213][ T30] audit: type=1400 audit(573.230:178): avc: denied { ioctl } for pid=4412 comm="syz.0.327" path="socket:[7238]" dev="sockfs" ino=7238 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 573.923177][ T4413] netlink: 4 bytes leftover after parsing attributes in process `syz.0.327'. [ 580.434872][ T30] audit: type=1400 audit(579.800:179): avc: denied { create } for pid=4440 comm="syz.0.340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 580.461487][ T30] audit: type=1400 audit(579.820:180): avc: denied { bind } for pid=4440 comm="syz.0.340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 580.488845][ T30] audit: type=1400 audit(579.850:181): avc: denied { connect } for pid=4440 comm="syz.0.340" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 580.501879][ T30] audit: type=1400 audit(579.870:182): avc: denied { read } for pid=4440 comm="syz.0.340" path="socket:[7285]" dev="sockfs" ino=7285 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 594.352552][ T4504] pimreg: entered allmulticast mode [ 594.422386][ T4504] pimreg: left allmulticast mode [ 602.090574][ T30] audit: type=1400 audit(601.460:183): avc: denied { read write } for pid=4523 comm="syz.1.372" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 602.094332][ T30] audit: type=1400 audit(601.460:184): avc: denied { open } for pid=4523 comm="syz.1.372" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 602.125353][ T30] audit: type=1400 audit(601.480:185): avc: denied { ioctl } for pid=4523 comm="syz.1.372" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0x6619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 614.444234][ T30] audit: type=1400 audit(613.810:186): avc: denied { mounton } for pid=4568 comm="syz.0.388" path="/202/file0" dev="tmpfs" ino=1149 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 621.776031][ T23] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 621.857454][ T23] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 623.294201][ T30] audit: type=1400 audit(622.650:187): avc: denied { create } for pid=4603 comm="syz.1.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 623.444935][ T30] audit: type=1400 audit(622.810:188): avc: denied { ioctl } for pid=4603 comm="syz.1.400" path="socket:[7552]" dev="sockfs" ino=7552 ioctlcmd=0xaf21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 628.604951][ T30] audit: type=1400 audit(627.970:189): avc: denied { append } for pid=4619 comm="syz.0.407" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 628.646040][ T30] audit: type=1400 audit(628.010:190): avc: denied { connect } for pid=4619 comm="syz.0.407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 629.948828][ C0] vcan0: j1939_tp_rxtimer: 0x00000000e40612af: rx timeout, send abort [ 629.959574][ C0] vcan0: j1939_xtp_rx_abort_one: 0x00000000e40612af: 0x10000: (3) A timeout occurred and this is the connection abort to close the session. [ 629.972898][ C0] vcan0: j1939_xtp_rx_abort_one: 0x00000000d21b569c: 0x10000: (3) A timeout occurred and this is the connection abort to close the session. [ 630.026540][ T30] audit: type=1400 audit(629.390:191): avc: denied { read } for pid=3094 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 630.035431][ T30] audit: type=1400 audit(629.400:192): avc: denied { search } for pid=3094 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 630.052839][ T30] audit: type=1400 audit(629.410:193): avc: denied { search } for pid=3094 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 630.053969][ T30] audit: type=1400 audit(629.420:194): avc: denied { add_name } for pid=3094 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 630.060687][ T30] audit: type=1400 audit(629.420:195): avc: denied { create } for pid=3094 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 630.073251][ T30] audit: type=1400 audit(629.440:196): avc: denied { append open } for pid=3094 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 630.077169][ T30] audit: type=1400 audit(629.440:197): avc: denied { getattr } for pid=3094 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 632.634126][ T30] audit: type=1400 audit(632.000:198): avc: denied { mounton } for pid=4632 comm="syz.1.412" path="/101/file0/file1" dev="fuse" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 633.660038][ T4643] serio: Serial port pts1 [ 639.673545][ T30] audit: type=1400 audit(639.030:199): avc: denied { ioctl } for pid=4663 comm="syz.0.424" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0xe501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 647.621438][ T4707] serio: Serial port pts0 [ 650.360792][ T30] audit: type=1400 audit(649.730:200): avc: denied { write } for pid=4719 comm="syz.0.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 650.377020][ T30] audit: type=1400 audit(649.740:201): avc: denied { getopt } for pid=4719 comm="syz.0.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 663.843056][ T30] audit: type=1400 audit(663.210:202): avc: denied { setopt } for pid=4784 comm="syz.0.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 663.860265][ T30] audit: type=1400 audit(663.220:203): avc: denied { connect } for pid=4784 comm="syz.0.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 664.393476][ T30] audit: type=1400 audit(663.760:204): avc: denied { write } for pid=4784 comm="syz.0.479" path="socket:[8662]" dev="sockfs" ino=8662 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 664.938943][ T30] audit: type=1400 audit(664.300:205): avc: denied { ioctl } for pid=4784 comm="syz.0.479" path="socket:[8662]" dev="sockfs" ino=8662 ioctlcmd=0x9365 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 669.794380][ T4820] serio: Serial port pts0 [ 673.705475][ T30] audit: type=1400 audit(673.060:206): avc: denied { ioctl } for pid=4833 comm="syz.0.498" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 673.863303][ T4834] input: syz0 as /devices/virtual/input/input1 [ 682.553299][ T30] audit: type=1400 audit(681.920:207): avc: denied { create } for pid=4862 comm="syz.0.511" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 682.606974][ T30] audit: type=1400 audit(681.960:208): avc: denied { mounton } for pid=4862 comm="syz.0.511" path="/274/file0" dev="tmpfs" ino=1566 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 688.235044][ T4882] serio: Serial port pts0 [ 693.699150][ T30] audit: type=1400 audit(693.060:209): avc: denied { unlink } for pid=3294 comm="syz-executor" name="file0" dev="tmpfs" ino=1566 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 695.430221][ T30] audit: type=1400 audit(694.790:210): avc: denied { write } for pid=4893 comm="syz.0.525" name="ipv6_route" dev="proc" ino=4026532766 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 698.331786][ T4908] serio: Serial port pts0 [ 717.823578][ T30] audit: type=1400 audit(717.170:211): avc: denied { mount } for pid=4993 comm="syz.1.565" name="/" dev="autofs" ino=9002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 717.918993][ T30] audit: type=1400 audit(717.280:212): avc: denied { read } for pid=4993 comm="syz.1.565" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 717.924563][ T30] audit: type=1400 audit(717.290:213): avc: denied { open } for pid=4993 comm="syz.1.565" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 717.946198][ T30] audit: type=1400 audit(717.310:214): avc: denied { ioctl } for pid=4993 comm="syz.1.565" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9378 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 718.110680][ T30] audit: type=1400 audit(717.470:215): avc: denied { unmount } for pid=3916 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 723.875650][ T30] audit: type=1400 audit(723.240:216): avc: denied { bind } for pid=5024 comm="syz.0.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 727.263579][ T5044] serio: Serial port pts0 [ 741.900209][ T5110] serio: Serial port pts0 [ 752.709636][ T5153] serio: Serial port pts0 [ 759.256204][ T30] audit: type=1400 audit(758.620:217): avc: denied { shutdown } for pid=5190 comm="syz.0.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 760.696694][ T5199] serio: Serial port pts1 [ 789.913577][ T5300] Zero length message leads to an empty skb [ 792.661980][ T30] audit: type=1400 audit(792.020:218): avc: denied { bind } for pid=5314 comm="syz.0.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 796.741827][ T30] audit: type=1400 audit(796.100:219): avc: denied { bind } for pid=5332 comm="syz.0.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 796.764471][ T30] audit: type=1400 audit(796.130:220): avc: denied { setopt } for pid=5332 comm="syz.0.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 798.536603][ T5339] netlink: 1343 bytes leftover after parsing attributes in process `syz.0.710'. [ 800.105879][ T30] audit: type=1400 audit(799.470:221): avc: denied { open } for pid=5345 comm="syz.0.713" path="/367/file0/file0" dev="fuse" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 800.293386][ T5347] block device autoloading is deprecated and will be removed. [ 800.322695][ T30] audit: type=1400 audit(799.690:222): avc: denied { ioctl } for pid=5345 comm="syz.0.713" path="/367/file0/file0" dev="fuse" ino=4 ioctlcmd=0x932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 800.332809][ T5346] md: md2 stopped. [ 824.502556][ T5454] serio: Serial port pts0 [ 828.346322][ T5477] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 828.365769][ T5477] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 829.703951][ T5480] serio: Serial port pts1 [ 837.040495][ T5517] serio: Serial port pts0 [ 846.989352][ T5563] serio: Serial port pts0 [ 854.530740][ T5601] input: syz1 as /devices/virtual/input/input3 [ 877.009805][ T5720] serio: Serial port pts0 [ 878.605837][ T30] audit: type=1400 audit(877.970:223): avc: denied { map } for pid=5726 comm="syz.1.876" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 887.520041][ T30] audit: type=1400 audit(886.880:224): avc: denied { associate } for pid=5768 comm="syz.1.894" name="3" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 887.796220][ T30] audit: type=1400 audit(887.160:225): avc: denied { read } for pid=5770 comm="syz.1.895" dev="nsfs" ino=4026532706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 887.801999][ T30] audit: type=1400 audit(887.170:226): avc: denied { open } for pid=5770 comm="syz.1.895" path="net:[4026532706]" dev="nsfs" ino=4026532706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 895.795187][ C0] vcan0: j1939_tp_rxtimer: 0x000000000b0a58cd: rx timeout, send abort [ 895.799603][ C0] vcan0: j1939_xtp_rx_abort_one: 0x000000000b0a58cd: 0x2f000: (3) A timeout occurred and this is the connection abort to close the session. [ 904.667141][ T30] audit: type=1400 audit(904.030:227): avc: denied { write } for pid=5830 comm="syz.1.921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 910.689335][ T30] audit: type=1400 audit(910.050:228): avc: denied { create } for pid=5845 comm="syz.1.927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 910.694868][ T30] audit: type=1400 audit(910.060:229): avc: denied { write } for pid=5845 comm="syz.1.927" path="socket:[12057]" dev="sockfs" ino=12057 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 922.573891][ T5894] serio: Serial port pts0 [ 932.335238][ T30] audit: type=1400 audit(931.690:230): avc: denied { watch watch_reads } for pid=5941 comm="syz.0.969" path=2F6D656D66643A2D888C47F3BDBDE2D0401E8BF487E5490884A26D202864656C6574656429 dev="tmpfs" ino=1042 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 933.041298][ T30] audit: type=1400 audit(932.410:231): avc: denied { getopt } for pid=5949 comm="syz.0.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 933.471742][ T5952] serio: Serial port pts0 [ 935.189048][ T5961] serio: Serial port pts1 [ 946.252398][ T30] audit: type=1400 audit(945.610:232): avc: denied { sqpoll } for pid=6006 comm="syz.1.994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 959.406575][ T30] audit: type=1400 audit(958.770:233): avc: denied { write } for pid=6078 comm="syz.1.1027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 968.945137][ T6136] serio: Serial port pts0 [ 970.078809][ T6143] serio: Serial port pts1 [ 978.334592][ T6168] serio: Serial port pts0 [ 982.120812][ T6182] serio: Serial port pts1 [ 984.903431][ T6189] serio: Serial port pts0 [ 990.784788][ T30] audit: type=1400 audit(990.150:234): avc: denied { create } for pid=6205 comm="syz.0.1073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 990.820102][ T30] audit: type=1400 audit(990.190:235): avc: denied { read write } for pid=6205 comm="syz.0.1073" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 990.835290][ T30] audit: type=1400 audit(990.200:236): avc: denied { open } for pid=6205 comm="syz.0.1073" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 990.968887][ T30] audit: type=1400 audit(990.330:237): avc: denied { ioctl } for pid=6205 comm="syz.0.1073" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x941e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 991.789273][ T6211] serio: Serial port pts0 [ 991.890017][ T6212] serio: Serial port pts1 [ 999.346513][ T30] audit: type=1400 audit(998.710:238): avc: denied { create } for pid=6229 comm="syz.1.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 999.375744][ T30] audit: type=1400 audit(998.740:239): avc: denied { bind } for pid=6229 comm="syz.1.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 999.394609][ T30] audit: type=1400 audit(998.760:240): avc: denied { listen } for pid=6229 comm="syz.1.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 999.404555][ T30] audit: type=1400 audit(998.770:241): avc: denied { accept } for pid=6229 comm="syz.1.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1013.065795][ T30] audit: type=1400 audit(1012.430:242): avc: denied { setattr } for pid=6317 comm="syz.1.1120" name="audio" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 1036.215721][ T6413] serio: Serial port pts0 [ 1042.492990][ T6441] serio: Serial port pts0 [ 1052.710403][ T30] audit: type=1400 audit(1052.070:243): avc: denied { read write } for pid=6464 comm="syz.1.1179" name="rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1052.722435][ T30] audit: type=1400 audit(1052.080:244): avc: denied { open } for pid=6464 comm="syz.1.1179" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1057.104636][ T6485] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6485 comm=syz.0.1187 [ 1060.716936][ T6503] serio: Serial port pts0 [ 1065.575776][ T30] audit: type=1400 audit(1064.940:245): avc: denied { read } for pid=6522 comm="syz.1.1203" path="socket:[15086]" dev="sockfs" ino=15086 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1067.122975][ T6530] serio: Serial port pts0 [ 1068.052955][ T30] audit: type=1400 audit(1067.410:246): avc: denied { ioctl } for pid=6534 comm="syz.1.1207" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1068.072700][ T30] audit: type=1400 audit(1067.430:247): avc: denied { set_context_mgr } for pid=6534 comm="syz.1.1207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1068.132970][ T6535] binder: 6534:6535 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 1068.136413][ T6535] binder: 6535 RLIMIT_NICE not set [ 1068.655554][ T6535] binder: 6534:6535 ioctl c0306201 200000c0 returned -14 [ 1069.473086][ T30] audit: type=1400 audit(1068.840:248): avc: denied { lock } for pid=6540 comm="syz.1.1209" path="socket:[14273]" dev="sockfs" ino=14273 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1073.275176][ T6555] serio: Serial port pts0 [ 1078.135317][ T30] audit: type=1400 audit(1077.500:249): avc: denied { append } for pid=6582 comm="syz.0.1228" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1088.114056][ T30] audit: type=1400 audit(1087.480:250): avc: denied { create } for pid=6627 comm="syz.0.1249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1096.486359][ T6670] serio: Serial port pts0 [ 1104.999252][ T6706] serio: Serial port pts0 [ 1111.970220][ T6715] serio: Serial port pts0 [ 1125.062612][ T6728] serio: Serial port pts1 [ 1131.233912][ T6751] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6751 comm=syz.0.1294 [ 1131.252895][ T30] audit: type=1400 audit(1130.610:251): avc: denied { audit_write } for pid=6750 comm="syz.0.1294" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1141.805972][ T6809] serio: Serial port pts0 [ 1159.456479][ T30] audit: type=1400 audit(1158.820:252): avc: denied { ioctl } for pid=6842 comm="syz.0.1333" path="socket:[16786]" dev="sockfs" ino=16786 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1165.122195][ T30] audit: type=1400 audit(1164.450:253): avc: denied { load_policy } for pid=6870 comm="syz.1.1345" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1182.670730][ T6957] serio: Serial port pts0 [ 1187.524848][ T30] audit: type=1400 audit(1186.890:254): avc: denied { ioctl } for pid=6972 comm="syz.1.1385" path="socket:[17059]" dev="sockfs" ino=17059 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1189.151025][ T6978] serio: Serial port pts0 [ 1213.209028][ T7096] serio: Serial port pts0 [ 1231.933911][ T7161] serio: Serial port pts0 [ 1244.303068][ T7207] serio: Serial port pts0 [ 1245.445443][ T7211] serio: Serial port pts1 [ 1251.891144][ T7222] serio: Serial port pts0 [ 1251.961870][ T7223] serio: Serial port pts1 [ 1262.439644][ T30] audit: type=1400 audit(1261.800:255): avc: denied { create } for pid=7253 comm="syz.0.1501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1281.009705][ T7352] serio: Serial port pts0 [ 1306.679772][ T7440] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 1309.460825][ T7456] serio: Serial port pts0 [ 1313.706874][ T7474] serio: Serial port pts1 [ 1318.051372][ T7491] serio: Serial port pts0 [ 1324.709992][ T30] audit: type=1400 audit(1324.070:256): avc: denied { mount } for pid=7511 comm="syz.0.1603" name="/" dev="configfs" ino=47 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1324.953605][ T30] audit: type=1400 audit(1324.320:257): avc: denied { getopt } for pid=7513 comm="syz.0.1604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1331.000748][ T7543] serio: Serial port pts0 [ 1339.495626][ T7576] serio: Serial port pts0 [ 1341.991322][ T7589] serio: Serial port pts1 [ 1353.926888][ T9] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1353.989907][ T9] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1362.863918][ T30] audit: type=1400 audit(1362.230:258): avc: denied { create } for pid=7653 comm="syz.0.1660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1364.616099][ T30] audit: type=1400 audit(1363.980:259): avc: denied { unmount } for pid=3916 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1367.355155][ T30] audit: type=1400 audit(1366.720:260): avc: denied { ioctl } for pid=7684 comm="syz.1.1673" path="socket:[19375]" dev="sockfs" ino=19375 ioctlcmd=0x4b67 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1376.901424][ T30] audit: type=1400 audit(1376.260:261): avc: denied { mounton } for pid=7748 comm="syz.1.1702" path="/proc/1798/cgroup" dev="proc" ino=20514 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 1397.467054][ T7843] serio: Serial port pts0 [ 1411.166701][ T7915] serio: Serial port pts0 [ 1419.133619][ T7943] binder: 7942:7943 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 1419.137552][ T7943] binder: 7943 RLIMIT_NICE not set [ 1422.914457][ T7973] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1422.952840][ T7973] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1434.418614][ T8052] serio: Serial port pts0 [ 1443.499338][ T8082] serio: Serial port pts1 [ 1450.850271][ T8093] serio: Serial port pts0 [ 1452.490587][ T30] audit: type=1400 audit(1451.860:262): avc: denied { write } for pid=8100 comm="syz.1.1844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1457.055156][ C1] vcan0: j1939_tp_rxtimer: 0x00000000ff763f4e: rx timeout, send abort [ 1457.062733][ C1] vcan0: j1939_xtp_rx_abort_one: 0x00000000ff763f4e: 0x2f000: (3) A timeout occurred and this is the connection abort to close the session. [ 1458.101110][ T30] audit: type=1400 audit(1457.470:263): avc: denied { read } for pid=3139 comm="dhcpcd" name="n22" dev="tmpfs" ino=5146 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1458.102302][ T30] audit: type=1400 audit(1457.470:264): avc: denied { open } for pid=3139 comm="dhcpcd" path="/run/udev/data/n22" dev="tmpfs" ino=5146 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1458.107195][ T30] audit: type=1400 audit(1457.470:265): avc: denied { getattr } for pid=3139 comm="dhcpcd" path="/run/udev/data/n22" dev="tmpfs" ino=5146 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1460.990666][ T8136] serio: Serial port pts0 [ 1461.275224][ T30] audit: type=1400 audit(1460.630:266): avc: denied { create } for pid=8131 comm="dhcpcd-run-hook" name="resolv.conf.bond0.2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1461.284059][ T30] audit: type=1400 audit(1460.630:267): avc: denied { write } for pid=8131 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.bond0.2.link" dev="tmpfs" ino=5167 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1461.290297][ T30] audit: type=1400 audit(1460.640:268): avc: denied { append } for pid=8131 comm="dhcpcd-run-hook" name="resolv.conf.bond0.2.link" dev="tmpfs" ino=5167 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1462.280541][ T30] audit: type=1400 audit(1461.650:269): avc: denied { unlink } for pid=8142 comm="rm" name="resolv.conf.bond0.2.link" dev="tmpfs" ino=5167 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1463.186059][ T8149] serio: Serial port pts1 [ 1472.030365][ T30] audit: type=1400 audit(1471.400:270): avc: denied { read } for pid=8165 comm="syz.0.1866" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1472.036111][ T30] audit: type=1400 audit(1471.400:271): avc: denied { open } for pid=8165 comm="syz.0.1866" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1472.590311][ T30] audit: type=1400 audit(1471.950:272): avc: denied { ioctl } for pid=8165 comm="syz.0.1866" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1474.004948][ T8170] serio: Serial port pts0 [ 1476.436897][ T30] audit: type=1400 audit(1475.800:273): avc: denied { setopt } for pid=8181 comm="syz.1.1871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1477.800123][ T30] audit: type=1400 audit(1477.160:274): avc: denied { create } for pid=8189 comm="syz.1.1875" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1477.829229][ T30] audit: type=1400 audit(1477.190:275): avc: denied { mounton } for pid=8189 comm="syz.1.1875" path="/858/file0" dev="tmpfs" ino=4994 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1480.715064][ T30] audit: type=1400 audit(1480.080:276): avc: denied { unlink } for pid=3916 comm="syz-executor" name="file0" dev="tmpfs" ino=4994 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1487.294699][ T30] audit: type=1400 audit(1486.660:277): avc: denied { write } for pid=8233 comm="syz.0.1891" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1488.979258][ T8245] serio: Serial port pts0 [ 1490.137582][ T30] audit: type=1326 audit(1489.500:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8248 comm="syz.0.1896" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff8bb5cc28 code=0x0 [ 1516.256776][ T8303] bond0: (slave netdevsim0): Error: Device can not be enslaved while up [ 1516.625033][ T8305] serio: Serial port pts0 [ 1518.930531][ T8310] serio: Serial port pts0 [ 1526.651222][ T8326] serio: Serial port pts1 [ 1534.395163][ T8336] serio: Serial port pts0 [ 1543.650986][ T8347] bond0: (slave netdevsim0): Error: Device can not be enslaved while up [ 1544.480181][ T5236] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1544.532556][ T5236] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1549.522069][ T30] audit: type=1400 audit(1548.890:279): avc: denied { ioctl } for pid=8355 comm="syz.1.1930" path="net:[4026532706]" dev="nsfs" ino=4026532706 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1550.076095][ T30] audit: type=1400 audit(1549.430:280): avc: denied { accept } for pid=8354 comm="syz.0.1929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 1554.021260][ T8385] serio: Serial port pts0 [ 1559.004175][ T8398] syz.1.1944 uses obsolete (PF_INET,SOCK_PACKET) [ 1559.888332][ T30] audit: type=1400 audit(1559.250:281): avc: denied { mount } for pid=8399 comm="syz.1.1945" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1559.894141][ T30] audit: type=1400 audit(1559.260:282): avc: denied { unmount } for pid=8399 comm="syz.1.1945" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1562.406688][ T30] audit: type=1400 audit(1561.770:283): avc: denied { setattr } for pid=8410 comm="syz.1.1950" name="PACKET" dev="sockfs" ino=20479 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1570.886419][ T30] audit: type=1400 audit(1570.250:284): avc: denied { write } for pid=8423 comm="syz.0.1954" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1571.956148][ T8430] serio: Serial port pts0 [ 1574.407006][ T8435] serio: Serial port pts1 [ 1602.530649][ T8486] serio: Serial port pts0 [ 1615.306565][ T8531] serio: Serial port pts1 [ 1633.411626][ T8589] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1633.440712][ T8589] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1633.941016][ T8592] serio: Serial port pts2 [ 1643.329487][ T8622] serio: Serial port pts0 [ 1648.459362][ T8638] serio: Serial port pts0 [ 1650.319774][ T30] audit: type=1400 audit(1649.620:285): avc: denied { append } for pid=8644 comm="syz.0.2033" name="pfkey" dev="proc" ino=4026532775 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1651.375904][ T2130] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1651.519257][ T30] audit: type=1400 audit(1650.880:286): avc: denied { mounton } for pid=8649 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1651.695307][ T2130] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1652.116468][ T2130] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1652.626662][ T2130] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1657.605935][ T2130] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1657.683897][ T2130] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1657.753625][ T2130] bond0 (unregistering): Released all slaves [ 1658.414848][ T2130] hsr_slave_0: left promiscuous mode [ 1658.425811][ T2130] hsr_slave_1: left promiscuous mode [ 1658.574172][ T2130] veth1_macvtap: left promiscuous mode [ 1658.586882][ T2130] veth0_macvtap: left promiscuous mode [ 1658.588997][ T2130] veth1_vlan: left promiscuous mode [ 1658.589659][ T2130] veth0_vlan: left promiscuous mode [ 1664.701665][ T8665] serio: Serial port pts0 [ 1674.602725][ T8649] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1674.651023][ T8649] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1679.217361][ T8649] hsr_slave_0: entered promiscuous mode [ 1679.239841][ T8649] hsr_slave_1: entered promiscuous mode [ 1679.253540][ T8649] debugfs: 'hsr0' already exists in 'hsr' [ 1679.254469][ T8649] Cannot create hsr debugfs directory [ 1681.853302][ T8721] process 'syz.1.2039' launched './file0' with NULL argv: empty string added [ 1684.634413][ T8649] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1684.762841][ T8649] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1684.885509][ T8649] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1684.942637][ T8649] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1690.743655][ T8649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1696.365188][ T30] audit: type=1326 audit(1695.730:287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8777 comm="syz.1.2047" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffb015cc28 code=0x0 [ 1708.729387][ T8649] veth0_vlan: entered promiscuous mode [ 1708.795157][ T8649] veth1_vlan: entered promiscuous mode [ 1709.119338][ T8649] veth0_macvtap: entered promiscuous mode [ 1709.211171][ T8649] veth1_macvtap: entered promiscuous mode [ 1709.840214][ T8649] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1709.842329][ T8649] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1709.843105][ T8649] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1709.843585][ T8649] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1710.767705][ T30] audit: type=1400 audit(1710.130:288): avc: denied { mounton } for pid=8649 comm="syz-executor" path="/syzkaller.ebw01G/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1710.852614][ T30] audit: type=1400 audit(1710.220:289): avc: denied { unmount } for pid=8649 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1712.184312][ T26] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1712.641291][ T26] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1713.005147][ T26] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1713.345456][ T26] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1713.891182][ T8850] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2056'. [ 1718.630356][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1718.740811][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1718.815426][ T26] bond0 (unregistering): Released all slaves [ 1719.281625][ T26] hsr_slave_0: left promiscuous mode [ 1719.286736][ T26] hsr_slave_1: left promiscuous mode [ 1719.441284][ T26] veth1_macvtap: left promiscuous mode [ 1719.442260][ T26] veth0_macvtap: left promiscuous mode [ 1719.445034][ T26] veth1_vlan: left promiscuous mode [ 1719.445779][ T26] veth0_vlan: left promiscuous mode [ 1737.199634][ T8838] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1737.272358][ T8838] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1743.244503][ T8838] hsr_slave_0: entered promiscuous mode [ 1743.281286][ T8838] hsr_slave_1: entered promiscuous mode [ 1743.302037][ T8838] debugfs: 'hsr0' already exists in 'hsr' [ 1743.303085][ T8838] Cannot create hsr debugfs directory [ 1748.259874][ T8838] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1748.309122][ T8838] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1748.366016][ T8838] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1748.406853][ T8838] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1753.506834][ T8838] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1771.745180][ T8838] veth0_vlan: entered promiscuous mode [ 1771.859939][ T8838] veth1_vlan: entered promiscuous mode [ 1772.193234][ T8838] veth0_macvtap: entered promiscuous mode [ 1772.300161][ T8838] veth1_macvtap: entered promiscuous mode [ 1772.690579][ T8838] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1772.695564][ T8838] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1772.699547][ T8838] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1772.709814][ T8838] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1774.116318][ T7286] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1774.451068][ T7286] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1774.836442][ T7286] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1775.092099][ T7286] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1779.774818][ T7286] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1779.860716][ T7286] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1779.935571][ T7286] bond0 (unregistering): Released all slaves [ 1780.612927][ T7286] hsr_slave_0: left promiscuous mode [ 1780.832922][ T7286] hsr_slave_1: left promiscuous mode [ 1781.225689][ T7286] veth1_macvtap: left promiscuous mode [ 1781.226649][ T7286] veth0_macvtap: left promiscuous mode [ 1781.250497][ T7286] veth1_vlan: left promiscuous mode [ 1781.254966][ T7286] veth0_vlan: left promiscuous mode [ 1798.117643][ T9072] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1798.160395][ T9072] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1803.360913][ T9072] hsr_slave_0: entered promiscuous mode [ 1803.374529][ T9072] hsr_slave_1: entered promiscuous mode [ 1803.395387][ T9072] debugfs: 'hsr0' already exists in 'hsr' [ 1803.398854][ T9072] Cannot create hsr debugfs directory [ 1809.806626][ T9072] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1809.857496][ T9072] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1809.914576][ T9072] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1809.956098][ T9072] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1813.830511][ T9072] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1816.330485][ T9227] serio: Serial port pts0 [ 1829.975351][ T9072] veth0_vlan: entered promiscuous mode [ 1830.052306][ T9072] veth1_vlan: entered promiscuous mode [ 1830.355158][ T9072] veth0_macvtap: entered promiscuous mode [ 1830.416511][ T9072] veth1_macvtap: entered promiscuous mode [ 1830.827393][ T9072] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1830.832434][ T9072] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1830.836835][ T9072] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1830.842888][ T9072] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1832.482670][ T8886] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1832.915593][ T9276] block device autoloading is deprecated and will be removed. [ 1833.051228][ T8886] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1833.800876][ T8886] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1834.176087][ T8886] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1836.629887][ T9292] serio: Serial port pts0 [ 1839.254955][ T8886] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1839.423176][ T8886] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1839.525478][ T8886] bond0 (unregistering): Released all slaves [ 1840.030210][ T8886] hsr_slave_0: left promiscuous mode [ 1840.043048][ T8886] hsr_slave_1: left promiscuous mode [ 1840.220013][ T8886] veth1_macvtap: left promiscuous mode [ 1840.222780][ T8886] veth0_macvtap: left promiscuous mode [ 1840.226101][ T8886] veth1_vlan: left promiscuous mode [ 1840.240104][ T8886] veth0_vlan: left promiscuous mode [ 1854.375296][ T9319] syz.1.2128 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 1856.972782][ T30] audit: type=1400 audit(1856.340:290): avc: denied { setcurrent } for pid=9336 comm="syz.1.2130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1857.006039][ T30] audit: type=1401 audit(1856.370:291): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 1858.472259][ T9343] serio: Serial port pts0 [ 1858.653124][ T9277] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1858.725739][ T9277] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1864.279402][ T9277] hsr_slave_0: entered promiscuous mode [ 1864.285986][ T9277] hsr_slave_1: entered promiscuous mode [ 1864.291945][ T9277] debugfs: 'hsr0' already exists in 'hsr' [ 1864.292771][ T9277] Cannot create hsr debugfs directory [ 1869.325384][ T9277] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1869.435878][ T9277] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1869.516436][ T9277] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1869.587593][ T9277] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1874.243749][ T9277] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1894.028266][ T9277] veth0_vlan: entered promiscuous mode [ 1894.087430][ T9277] veth1_vlan: entered promiscuous mode [ 1894.377145][ T9277] veth0_macvtap: entered promiscuous mode [ 1894.445898][ T9277] veth1_macvtap: entered promiscuous mode [ 1894.781565][ T9277] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1894.784191][ T9277] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1894.790871][ T9277] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1894.794723][ T9277] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1896.460626][ T2130] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1897.161407][ T2130] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1897.645470][ T2130] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1898.036598][ T2130] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1903.781096][ T2130] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1903.869643][ T2130] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1903.943412][ T2130] bond0 (unregistering): Released all slaves [ 1904.556271][ T2130] hsr_slave_0: left promiscuous mode [ 1904.710004][ T2130] hsr_slave_1: left promiscuous mode [ 1905.235642][ T2130] veth1_macvtap: left promiscuous mode [ 1905.237126][ T2130] veth0_macvtap: left promiscuous mode [ 1905.293495][ T2130] veth1_vlan: left promiscuous mode [ 1905.295496][ T2130] veth0_vlan: left promiscuous mode [ 1909.312300][ T30] audit: type=1400 audit(1908.670:292): avc: denied { setattr } for pid=9510 comm="syz.1.2154" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1912.649991][ T9517] serio: Serial port pts0 [ 1922.526961][ T9489] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1922.635799][ T9489] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1928.277007][ T9489] hsr_slave_0: entered promiscuous mode [ 1928.312069][ T9489] hsr_slave_1: entered promiscuous mode [ 1928.322223][ T9489] debugfs: 'hsr0' already exists in 'hsr' [ 1928.334232][ T9489] Cannot create hsr debugfs directory [ 1933.051907][ T9489] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1933.136793][ T9489] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1933.205394][ T9489] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1933.246872][ T9489] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1938.180325][ T9489] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1943.166681][ T9635] serio: Serial port pts0 [ 1956.142428][ T9489] veth0_vlan: entered promiscuous mode [ 1956.244212][ T9489] veth1_vlan: entered promiscuous mode [ 1956.639889][ T9489] veth0_macvtap: entered promiscuous mode [ 1956.704357][ T9489] veth1_macvtap: entered promiscuous mode [ 1957.111453][ T9489] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1957.112425][ T9489] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1957.112802][ T9489] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1957.113189][ T9489] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1959.041450][ T2130] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1959.324435][ T2130] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1959.736935][ T2130] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1960.193236][ T2130] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1961.303694][ T30] audit: type=1400 audit(1960.670:293): avc: denied { append } for pid=9704 comm="syz.1.2176" name="ubi_ctrl" dev="devtmpfs" ino=686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1963.675477][ T30] audit: type=1400 audit(1963.030:294): avc: denied { mount } for pid=9718 comm="syz.1.2179" name="/" dev="autofs" ino=26469 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1965.866948][ T2130] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1965.955514][ T2130] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1966.026515][ T2130] bond0 (unregistering): Released all slaves [ 1966.212154][ T30] audit: type=1400 audit(1965.580:295): avc: denied { unmount } for pid=3916 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1966.610337][ T2130] hsr_slave_0: left promiscuous mode [ 1966.621444][ T2130] hsr_slave_1: left promiscuous mode [ 1967.043169][ T2130] veth1_macvtap: left promiscuous mode [ 1967.044638][ T2130] veth0_macvtap: left promiscuous mode [ 1967.046809][ T2130] veth1_vlan: left promiscuous mode [ 1967.076697][ T2130] veth0_vlan: left promiscuous mode [ 1968.615990][ T30] audit: type=1400 audit(1967.980:296): avc: denied { write } for pid=9728 comm="syz.1.2181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1976.849074][ T9740] veth0_vlan: left promiscuous mode [ 1982.786033][ T9767] serio: Serial port pts0 [ 1985.177190][ T9700] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1985.236122][ T9700] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1989.926295][ T9700] hsr_slave_0: entered promiscuous mode [ 1989.947070][ T9700] hsr_slave_1: entered promiscuous mode [ 1989.955384][ T9700] debugfs: 'hsr0' already exists in 'hsr' [ 1989.960143][ T9700] Cannot create hsr debugfs directory [ 1994.562878][ T9700] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1994.603719][ T9700] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1994.629904][ T9700] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1994.656196][ T9700] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1999.470562][ T9700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2001.141545][ T9835] serio: Serial port pts0 [ 2016.409786][ T9882] serio: Serial port pts0 [ 2016.563896][ T9700] veth0_vlan: entered promiscuous mode [ 2016.670792][ T9700] veth1_vlan: entered promiscuous mode [ 2017.022707][ T9700] veth0_macvtap: entered promiscuous mode [ 2017.067581][ T9700] veth1_macvtap: entered promiscuous mode [ 2017.490953][ T9700] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2017.492221][ T9700] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2017.495720][ T9700] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2017.501159][ T9700] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2019.261558][ T3922] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2019.651721][ T3922] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2020.081256][ T3922] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2020.435004][ T3922] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2023.209562][ T30] audit: type=1400 audit(2022.560:297): avc: denied { mount } for pid=9908 comm="syz.1.2199" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 2023.387223][ T30] audit: type=1400 audit(2022.750:298): avc: denied { unmount } for pid=3916 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 2026.826038][ T3922] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2026.959392][ T3922] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2027.038680][ T3922] bond0 (unregistering): Released all slaves [ 2027.413048][ T3922] hsr_slave_0: left promiscuous mode [ 2027.432212][ T3922] hsr_slave_1: left promiscuous mode [ 2027.606641][ T3922] veth1_macvtap: left promiscuous mode [ 2027.616890][ T3922] veth0_macvtap: left promiscuous mode [ 2027.624477][ T3922] veth1_vlan: left promiscuous mode [ 2027.630368][ T3922] veth0_vlan: left promiscuous mode [ 2035.770546][ T9935] serio: Serial port pts0 [ 2045.106345][ T9894] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2045.142385][ T9894] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2050.408733][ T9894] hsr_slave_0: entered promiscuous mode [ 2050.416703][ T9894] hsr_slave_1: entered promiscuous mode [ 2050.426771][ T9894] debugfs: 'hsr0' already exists in 'hsr' [ 2050.430153][ T9894] Cannot create hsr debugfs directory [ 2052.675812][ T9990] md: md2 stopped. [ 2052.958986][ T9885] ------------[ cut here ]------------ [ 2052.960060][ T9885] refcount_t: underflow; use-after-free. [ 2052.961324][ T9885] WARNING: CPU: 0 PID: 9885 at lib/refcount.c:28 refcount_warn_saturate+0x138/0x19c [ 2052.962570][ T9885] Modules linked in: [ 2052.964801][ T9885] CPU: 0 UID: 0 PID: 9885 Comm: kworker/0:3 Not tainted 6.16.0-syzkaller-04055-g14bed9bc81ba #0 PREEMPT [ 2052.965737][ T9885] Hardware name: linux,dummy-virt (DT) [ 2052.966553][ T9885] Workqueue: md_misc mddev_delayed_delete [ 2052.967207][ T9885] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 2052.967582][ T9885] pc : refcount_warn_saturate+0x138/0x19c [ 2052.968071][ T9885] lr : refcount_warn_saturate+0x138/0x19c [ 2052.968398][ T9885] sp : ffff8000a3047a80 [ 2052.968775][ T9885] x29: ffff8000a3047a80 x28: 0000000000000000 x27: ffff80008708df78 [ 2052.969403][ T9885] x26: 0000000000000000 x25: ffff000012578d00 x24: ffff800087090000 [ 2052.969987][ T9885] x23: ffff0000168fc130 x22: 0000000000000004 x21: 1fffe00002d1f826 [ 2052.970469][ T9885] x20: ffff0000168fc130 x19: 0000000000000003 x18: 0000000000000000 [ 2052.970935][ T9885] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 [ 2052.971494][ T9885] x14: 0000000000000000 x13: 0000000000000001 x12: ffff60000d413a93 [ 2052.972212][ T9885] x11: 1fffe0000d413a92 x10: ffff60000d413a92 x9 : dfff800000000000 [ 2052.973318][ T9885] x8 : ffff00006a09d493 x7 : 0000000000000001 x6 : ffff60000d413a92 [ 2052.974328][ T9885] x5 : ffff00006a09d490 x4 : 1fffe00002defb59 x3 : dfff800000000000 [ 2052.975877][ T9885] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000016f7dac0 [ 2052.977067][ T9885] Call trace: [ 2052.977535][ T9885] refcount_warn_saturate+0x138/0x19c (P) [ 2052.978209][ T9885] kobject_put+0x29c/0x430 [ 2052.978627][ T9885] mddev_delayed_delete+0x14/0x20 [ 2052.978895][ T9885] process_one_work+0x7cc/0x18d4 [ 2052.979150][ T9885] worker_thread+0x734/0xb84 [ 2052.979393][ T9885] kthread+0x348/0x5fc [ 2052.979633][ T9885] ret_from_fork+0x10/0x20 [ 2052.980052][ T9885] irq event stamp: 8172 [ 2052.980291][ T9885] hardirqs last enabled at (8171): [] __up_console_sem+0x74/0x94 [ 2052.980675][ T9885] hardirqs last disabled at (8172): [] el1_dbg+0x24/0x9c [ 2052.981022][ T9885] softirqs last enabled at (7968): [] handle_softirqs+0x88c/0xdb4 [ 2052.981392][ T9885] softirqs last disabled at (7635): [] __do_softirq+0x14/0x20 [ 2052.981892][ T9885] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2055.757453][ T2130] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2056.204584][ T2130] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2056.494028][ T2130] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2056.827178][ T2130] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2062.606194][ T2130] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2062.794647][ T2130] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2062.905675][ T2130] bond0 (unregistering): Released all slaves [ 2063.261610][ T2130] hsr_slave_0: left promiscuous mode [ 2063.282317][ T2130] hsr_slave_1: left promiscuous mode [ 2063.392888][ T2130] veth1_macvtap: left promiscuous mode [ 2063.396101][ T2130] veth0_macvtap: left promiscuous mode [ 2063.404149][ T2130] veth1_vlan: left promiscuous mode [ 2074.595733][ T2130] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2074.694379][ T2130] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2074.787218][ T2130] bond0 (unregistering): Released all slaves [ 2075.134515][ T2130] hsr_slave_0: left promiscuous mode [ 2075.170986][ T2130] hsr_slave_1: left promiscuous mode VM DIAGNOSIS: 13:15:44 Registers: info registers vcpu 0 CPU#0 PC=ffff800081babd2c X00=0000000000000002 X01=0000000000000007 X02=0000000000000000 X03=1fffe00001dd262f X04=0000000000000018 X05=ffff800087a37760 X06=ffff700010f46eec X07=0000000000000001 X08=ffff800087a37760 X09=dfff800000000000 X10=ffff700010f46eec X11=1ffff00010f46eec X12=ffff700010f46eed X13=0000000000008000 X14=3a302f72656b726f X15=617420746f4e2033 X16=2e36206465746e69 X17=7a79732d302e3631 X18=0000000000000000 X19=ffff00000ee93080 X20=ffff80008d43b018 X21=ffff800087ab36e0 X22=0000000000000074 X23=dfff800000000000 X24=ffff00000eea207e X25=0000000000000001 X26=ffff00000ee932d8 X27=ffff00000ee93080 X28=dfff800000000000 X29=ffff8000a3046ee0 X30=ffff800081babfb8 SP=ffff8000a3046ee0 PSTATE=800003c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000aaab18da0f40:000000000000005b Q02=cccc000000000000:cccccccccccccc00 Q03=0000000000000000:0000000000000000 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:cc000000ccccccc0 Q06=0000000000000002:fffffffe7fffffff Q07=0000ffffc9427920:0000aaab18d9ed90 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000809a8428 X00=ffff000016fd956c X01=ffff8000870451a0 X02=0000000100000000 X03=0000000000067281 X04=ffff00006a0db1a0 X05=ffff8000a1a16a30 X06=0000000000000000 X07=0000000000000000 X08=ffff8000a1a16a40 X09=0000000000000000 X10=ffff700014342d85 X11=1ffff00014342d85 X12=ffff700014342d1f X13=0000000000000006 X14=2f74656e2f6c6175 X15=00306576656e6567 X16=4554535953425553 X17=45440074656e3d4d X18=0000000000000000 X19=ffff8000a1a169b0 X20=ffff8000a1a169b0 X21=ffff000016fd8000 X22=0000000000000000 X23=ffff8000803ee68c X24=00000000000000b0 X25=0000000000000001 X26=0000000000000001 X27=00000000ffffffff X28=ffff00000fc7c2d0 X29=ffff8000a1a16860 X30=ffff8000853f72e0 SP=ffff8000a1a16820 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffe16e52f0:96e8c589ae166c00 Q02=0000ffffe16e52d0:ffffff80ffffffd8 Q03=0000ffffe16e5380:0000ffffe16e5380 Q04=0000ffffe16e5380:0000ffffb0138d08 Q05=0000ffffe16e5350:0000ffffe16e5380 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffe16e55a0:0000ffffe16e55a0 Q17=ffffff80ffffffd0:0000ffffe16e5570 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000