last executing test programs: 8.920536655s ago: executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000080)={@ipv4={""/10, ""/2, @local}, 0x0}, &(0x7f0000000240)=0x14) syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x5, 0xfffffc00, 0x4, 0x1902, 0x1, 0x6, '\x00', r1, r0}, 0x48) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @empty}}}, 0x108) getsockopt$inet_buf(r2, 0x0, 0x30, &(0x7f0000000340)=""/225, &(0x7f0000000180)=0xe1) 8.163579912s ago: executing program 1: dup(0xffffffffffffffff) socket$unix(0x1, 0x0, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541b, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x275a, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x541b, &(0x7f0000000040)={'batadv_slave_1\x00'}) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) close(r3) ioctl$TUNGETIFF(r0, 0x5451, 0x0) 5.473324672s ago: executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) fcntl$lock(r0, 0x7, &(0x7f00000000c0)) 5.052511089s ago: executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_TESTMODE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 4.359607691s ago: executing program 0: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000200), 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, 0x0) 3.999978113s ago: executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x10}}, 0x0) 3.384458678s ago: executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) lsetxattr$trusted_overlay_upper(&(0x7f0000000280)='./file0/../file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) 3.292764366s ago: executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x4000, 0x80) 2.543994243s ago: executing program 0: r0 = socket$igmp(0x2, 0x3, 0x2) fcntl$lock(r0, 0x7, &(0x7f00000000c0)) 2.049812077s ago: executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_TESTMODE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 757.916992ms ago: executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) close(r0) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, r2, 0x3}, 0x18) sendmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000080)=@can={{}, 0x0, 0x0, 0x0, 0x0, "aa51790df30dad01"}, 0x10}}, 0x0) 0s ago: executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x10}}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:52361' (ED25519) to the list of known hosts. [ 242.366542][ T29] audit: type=1400 audit(241.910:58): avc: denied { name_bind } for pid=3197 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 242.936064][ T29] audit: type=1400 audit(242.470:59): avc: denied { execute } for pid=3199 comm="sh" name="syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 242.953559][ T29] audit: type=1400 audit(242.480:60): avc: denied { execute_no_trans } for pid=3199 comm="sh" path="/syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:04:10 fuzzer started [ 253.537990][ T29] audit: type=1400 audit(253.080:61): avc: denied { node_bind } for pid=3199 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 253.683830][ T29] audit: type=1400 audit(253.220:62): avc: denied { name_bind } for pid=3199 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 1970/01/01 00:04:13 dialing manager at localhost:30002 [ 256.947849][ T29] audit: type=1400 audit(256.490:63): avc: denied { setattr } for pid=3211 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 257.085854][ T29] audit: type=1400 audit(256.620:64): avc: denied { mounton } for pid=3212 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 257.090194][ T29] audit: type=1400 audit(256.630:65): avc: denied { mount } for pid=3212 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 257.220042][ T29] audit: type=1400 audit(256.760:66): avc: denied { mounton } for pid=3208 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1738 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 257.257631][ T29] audit: type=1400 audit(256.790:67): avc: denied { mount } for pid=3208 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 257.349805][ T3208] cgroup: Unknown subsys name 'net' [ 257.399564][ T29] audit: type=1400 audit(256.940:68): avc: denied { unmount } for pid=3208 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 258.056664][ T3217] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 258.082424][ T29] audit: type=1400 audit(257.620:69): avc: denied { relabelto } for pid=3217 comm="mkswap" name="swap-file" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 258.090636][ T3208] cgroup: Unknown subsys name 'rlimit' [ 258.113888][ T29] audit: type=1400 audit(257.650:70): avc: denied { write } for pid=3217 comm="mkswap" path="/swap-file" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 258.314858][ T3210] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:04:18 starting 2 executor processes [ 259.139718][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 259.139884][ T29] audit: type=1400 audit(258.680:73): avc: denied { execmem } for pid=3219 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 259.254858][ T29] audit: type=1400 audit(258.800:74): avc: denied { mounton } for pid=3221 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 259.276612][ T29] audit: type=1400 audit(258.820:75): avc: denied { mount } for pid=3221 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 259.300656][ T29] audit: type=1400 audit(258.840:76): avc: denied { read } for pid=3222 comm="syz-executor.1" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 259.309369][ T29] audit: type=1400 audit(258.850:77): avc: denied { open } for pid=3222 comm="syz-executor.1" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 259.343205][ T29] audit: type=1400 audit(258.880:78): avc: denied { mounton } for pid=3221 comm="syz-executor.0" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 259.433643][ T29] audit: type=1400 audit(258.970:79): avc: denied { module_request } for pid=3221 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 259.799367][ T29] audit: type=1400 audit(259.340:80): avc: denied { sys_module } for pid=3222 comm="syz-executor.1" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 268.629931][ T3222] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 268.742941][ T3222] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 268.764498][ T3221] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 268.849654][ T3221] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 272.477214][ T3222] hsr_slave_0: entered promiscuous mode [ 272.538523][ T3222] hsr_slave_1: entered promiscuous mode [ 273.012971][ T3221] hsr_slave_0: entered promiscuous mode [ 273.055724][ T3221] hsr_slave_1: entered promiscuous mode [ 273.093901][ T3221] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 273.096128][ T3221] Cannot create hsr debugfs directory [ 275.332515][ T29] audit: type=1400 audit(274.860:81): avc: denied { create } for pid=3222 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 275.334143][ T29] audit: type=1400 audit(274.860:82): avc: denied { write } for pid=3222 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 275.335553][ T29] audit: type=1400 audit(274.870:83): avc: denied { read } for pid=3222 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 275.359291][ T3222] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 275.477916][ T3222] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 275.591039][ T3222] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 275.686165][ T3222] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 276.495936][ T3221] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 276.608682][ T3221] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 276.718479][ T3221] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 276.807418][ T3221] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 281.268449][ T3222] 8021q: adding VLAN 0 to HW filter on device bond0 [ 282.196227][ T3221] 8021q: adding VLAN 0 to HW filter on device bond0 [ 293.126017][ T3222] veth0_vlan: entered promiscuous mode [ 293.258084][ T3222] veth1_vlan: entered promiscuous mode [ 293.537036][ T3222] veth0_macvtap: entered promiscuous mode [ 293.609864][ T3222] veth1_macvtap: entered promiscuous mode [ 294.023921][ T3222] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.026070][ T3222] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.026973][ T3222] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.027774][ T3222] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 294.516998][ T3221] veth0_vlan: entered promiscuous mode [ 294.664329][ T29] audit: type=1400 audit(294.200:84): avc: denied { mounton } for pid=3222 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 294.770071][ T29] audit: type=1400 audit(294.310:85): avc: denied { mount } for pid=3222 comm="syz-executor.1" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 294.816923][ T3221] veth1_vlan: entered promiscuous mode [ 295.117136][ T3221] veth0_macvtap: entered promiscuous mode [ 295.218136][ T3221] veth1_macvtap: entered promiscuous mode [ 295.465608][ T3221] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 295.466170][ T3221] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 295.466592][ T3221] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 295.466960][ T3221] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 295.620593][ T29] audit: type=1400 audit(295.150:86): avc: denied { read write } for pid=3222 comm="syz-executor.1" name="loop1" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 295.633283][ T29] audit: type=1400 audit(295.160:87): avc: denied { open } for pid=3222 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 295.634227][ T29] audit: type=1400 audit(295.170:88): avc: denied { ioctl } for pid=3222 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=640 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 296.333701][ T29] audit: type=1400 audit(295.880:89): avc: denied { create } for pid=3355 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 296.351028][ T29] audit: type=1400 audit(295.890:90): avc: denied { setopt } for pid=3355 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 296.872863][ T29] audit: type=1400 audit(296.420:91): avc: denied { create } for pid=3358 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 296.887363][ T29] audit: type=1400 audit(296.420:92): avc: denied { setopt } for pid=3358 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 297.927518][ T29] audit: type=1400 audit(297.470:93): avc: denied { ioctl } for pid=3363 comm="syz-executor.1" path="socket:[4474]" dev="sockfs" ino=4474 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 299.772874][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 299.773093][ T29] audit: type=1400 audit(299.310:97): avc: denied { create } for pid=3372 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 303.418974][ T29] audit: type=1400 audit(302.960:98): avc: denied { read write } for pid=3389 comm="syz-executor.1" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 303.452926][ T29] audit: type=1400 audit(302.990:99): avc: denied { open } for pid=3389 comm="syz-executor.1" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 303.493638][ T29] audit: type=1400 audit(303.030:100): avc: denied { setattr } for pid=3389 comm="syz-executor.1" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 305.878575][ T29] audit: type=1400 audit(305.420:101): avc: denied { ioctl } for pid=3402 comm="syz-executor.0" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 309.057844][ T29] audit: type=1400 audit(308.600:102): avc: denied { ioctl } for pid=3417 comm="syz-executor.0" path="socket:[4560]" dev="sockfs" ino=4560 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 309.114582][ T29] audit: type=1400 audit(308.640:103): avc: denied { bind } for pid=3417 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 309.158447][ T29] audit: type=1400 audit(308.700:104): avc: denied { write } for pid=3417 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 313.545967][ T29] audit: type=1400 audit(313.090:105): avc: denied { read } for pid=3428 comm="syz-executor.0" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 313.563593][ T29] audit: type=1400 audit(313.090:106): avc: denied { open } for pid=3428 comm="syz-executor.0" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 313.599115][ T29] audit: type=1400 audit(313.140:107): avc: denied { ioctl } for pid=3428 comm="syz-executor.0" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 313.635829][ T29] audit: type=1400 audit(313.170:108): avc: denied { set_context_mgr } for pid=3428 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 314.866018][ T29] audit: type=1400 audit(314.410:109): avc: denied { prog_load } for pid=3432 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 314.867678][ T29] audit: type=1400 audit(314.410:110): avc: denied { bpf } for pid=3432 comm="syz-executor.0" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 314.892715][ T29] audit: type=1400 audit(314.420:111): avc: denied { perfmon } for pid=3432 comm="syz-executor.0" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 314.918741][ T29] audit: type=1400 audit(314.460:112): avc: denied { prog_run } for pid=3432 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 314.947125][ T29] audit: type=1400 audit(314.490:113): avc: denied { ioctl } for pid=3432 comm="syz-executor.0" path="socket:[4591]" dev="sockfs" ino=4591 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 317.832848][ T29] audit: type=1400 audit(317.370:114): avc: denied { create } for pid=3440 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 317.840659][ T3441] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3441 comm=syz-executor.0 [ 322.585265][ T3455] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 322.589475][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 322.589572][ T29] audit: type=1400 audit(322.100:116): avc: denied { create } for pid=3453 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 322.632914][ T29] audit: type=1400 audit(322.170:117): avc: denied { write } for pid=3453 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 323.129568][ T3457] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 323.198204][ T29] audit: type=1400 audit(322.740:118): avc: denied { ioctl } for pid=3456 comm="syz-executor.0" path="socket:[3635]" dev="sockfs" ino=3635 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 323.506103][ T29] audit: type=1400 audit(323.050:119): avc: denied { create } for pid=3458 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 323.560486][ T29] audit: type=1400 audit(323.090:120): avc: denied { write } for pid=3458 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 325.108978][ T29] audit: type=1400 audit(324.650:121): avc: denied { read } for pid=3465 comm="syz-executor.1" name="dlm-control" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 325.110736][ T29] audit: type=1400 audit(324.650:122): avc: denied { open } for pid=3465 comm="syz-executor.1" path="/dev/dlm-control" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 325.134484][ T29] audit: type=1400 audit(324.670:123): avc: denied { mounton } for pid=3464 comm="syz-executor.0" path="/syzkaller-testdir1014279456/syzkaller.3c7lVd/32/file0" dev="vda" ino=1753 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 325.387440][ T29] audit: type=1400 audit(324.910:124): avc: denied { mount } for pid=3464 comm="syz-executor.0" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 325.854942][ T29] audit: type=1400 audit(325.390:125): avc: denied { create } for pid=3468 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 327.974927][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 327.975104][ T29] audit: type=1400 audit(327.520:134): avc: denied { mounton } for pid=3476 comm="syz-executor.0" path="/syzkaller-testdir1014279456/syzkaller.3c7lVd/33/file0" dev="vda" ino=1753 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 328.030808][ T29] audit: type=1400 audit(327.570:135): avc: denied { remount } for pid=3476 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 328.033800][ T3478] ======================================================= [ 328.033800][ T3478] WARNING: The mand mount option has been deprecated and [ 328.033800][ T3478] and is ignored by this kernel. Remove the mand [ 328.033800][ T3478] option from the mount to silence this warning. [ 328.033800][ T3478] ======================================================= [ 328.222724][ T29] audit: type=1400 audit(327.760:136): avc: denied { unmount } for pid=3221 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 328.772774][ T29] audit: type=1400 audit(328.300:137): avc: denied { create } for pid=3480 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 328.847619][ T29] audit: type=1400 audit(328.390:138): avc: denied { setopt } for pid=3480 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 329.476406][ T29] audit: type=1400 audit(329.020:139): avc: denied { write } for pid=3484 comm="syz-executor.1" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 329.578040][ T29] audit: type=1400 audit(329.100:140): avc: denied { setopt } for pid=3484 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 329.635453][ T29] audit: type=1400 audit(329.170:141): avc: denied { ioctl } for pid=3484 comm="syz-executor.1" path="socket:[4678]" dev="sockfs" ino=4678 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 339.656486][ T29] audit: type=1400 audit(339.200:142): avc: denied { create } for pid=3525 comm="syz-executor.1" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 342.625949][ T29] audit: type=1400 audit(342.160:143): avc: denied { create } for pid=3537 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 342.677917][ T29] audit: type=1400 audit(342.220:144): avc: denied { bind } for pid=3537 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 342.758398][ T29] audit: type=1400 audit(342.300:145): avc: denied { accept } for pid=3537 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 342.829350][ T29] audit: type=1400 audit(342.370:146): avc: denied { write } for pid=3537 comm="syz-executor.0" path="socket:[4778]" dev="sockfs" ino=4778 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 346.297714][ T29] audit: type=1400 audit(345.830:147): avc: denied { ioctl } for pid=3547 comm="syz-executor.0" path="/dev/vhost-net" dev="devtmpfs" ino=715 ioctlcmd=0x3b84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 347.933379][ T29] audit: type=1400 audit(347.460:148): avc: denied { write } for pid=3555 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 348.513935][ T29] audit: type=1400 audit(348.050:149): avc: denied { write } for pid=3557 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 358.287716][ T29] audit: type=1400 audit(357.830:150): avc: denied { create } for pid=3598 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 358.296000][ T29] audit: type=1400 audit(357.840:151): avc: denied { ioctl } for pid=3598 comm="syz-executor.1" path="socket:[4873]" dev="sockfs" ino=4873 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 359.060521][ T29] audit: type=1400 audit(358.600:152): avc: denied { mount } for pid=3602 comm="syz-executor.0" name="/" dev="bdev" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bdev_t tclass=filesystem permissive=1 [ 359.921088][ T3608] loop1: detected capacity change from 0 to 512 [ 359.988433][ T3608] EXT4-fs: Ignoring removed nobh option [ 360.365337][ T3608] fscrypt (loop1, inode 2): Error -61 getting encryption context [ 360.369211][ T3608] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -61 [ 360.396486][ T3608] EXT4-fs error (device loop1): ext4_orphan_get:1394: inode #13: comm syz-executor.1: casefold flag without casefold feature [ 360.492802][ T3608] EXT4-fs error (device loop1): ext4_orphan_get:1397: comm syz-executor.1: couldn't read orphan inode 13 (err -117) [ 360.562911][ T3608] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 360.615849][ T29] audit: type=1400 audit(360.120:153): avc: denied { mount } for pid=3606 comm="syz-executor.1" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 360.654835][ T3608] fscrypt (loop1, inode 2): Error -61 getting encryption context [ 360.885948][ T3222] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 362.154425][ T29] audit: type=1400 audit(361.690:154): avc: denied { write } for pid=3618 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 362.178377][ T29] audit: type=1400 audit(361.720:155): avc: denied { read } for pid=3007 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 362.188612][ T29] audit: type=1400 audit(361.720:156): avc: denied { append } for pid=3007 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 362.202063][ T29] audit: type=1400 audit(361.720:157): avc: denied { open } for pid=3007 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 362.235053][ T3619] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 362.239411][ T29] audit: type=1400 audit(361.770:158): avc: denied { getattr } for pid=3007 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 364.426191][ T3626] loop0: detected capacity change from 0 to 512 [ 364.538908][ T3626] EXT4-fs: Ignoring removed nobh option [ 364.727374][ T3626] fscrypt (loop0, inode 2): Error -61 getting encryption context [ 364.728256][ T3626] EXT4-fs (loop0): Cannot turn on journaled quota: type 1: error -61 [ 364.737565][ T3626] EXT4-fs error (device loop0): ext4_orphan_get:1394: inode #13: comm syz-executor.0: casefold flag without casefold feature [ 364.775320][ T3626] EXT4-fs error (device loop0): ext4_orphan_get:1397: comm syz-executor.0: couldn't read orphan inode 13 (err -117) [ 364.797809][ T3626] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 364.837588][ T3626] fscrypt (loop0, inode 2): Error -61 getting encryption context [ 365.016284][ T3221] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 367.409628][ T3643] loop1: detected capacity change from 0 to 512 [ 367.461214][ T3643] EXT4-fs: Ignoring removed nobh option [ 367.647392][ T3643] fscrypt (loop1, inode 2): Error -61 getting encryption context [ 367.648836][ T3643] EXT4-fs (loop1): Cannot turn on journaled quota: type 1: error -61 [ 367.705003][ T3643] EXT4-fs error (device loop1): ext4_orphan_get:1394: inode #13: comm syz-executor.1: casefold flag without casefold feature [ 367.743165][ T3643] EXT4-fs error (device loop1): ext4_orphan_get:1397: comm syz-executor.1: couldn't read orphan inode 13 (err -117) [ 367.820288][ T3643] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 367.935689][ T3643] fscrypt (loop1, inode 2): Error -61 getting encryption context [ 367.960235][ T29] audit: type=1400 audit(367.490:159): avc: denied { map } for pid=3644 comm="syz-executor.0" path="/dev/vcsu" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 368.344505][ T3222] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 371.987943][ T29] audit: type=1400 audit(371.530:160): avc: denied { create } for pid=3662 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 372.047364][ T29] audit: type=1400 audit(371.590:161): avc: denied { ioctl } for pid=3662 comm="syz-executor.0" path="socket:[3996]" dev="sockfs" ino=3996 ioctlcmd=0x7010 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 373.759005][ T29] audit: type=1400 audit(373.300:162): avc: denied { map_create } for pid=3669 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 377.037692][ T29] audit: type=1400 audit(376.580:163): avc: denied { read } for pid=3678 comm="syz-executor.0" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 377.049633][ T29] audit: type=1400 audit(376.580:164): avc: denied { open } for pid=3678 comm="syz-executor.0" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 377.657728][ T3681] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 380.353034][ T29] audit: type=1400 audit(379.880:165): avc: denied { write } for pid=3689 comm="syz-executor.1" name="rt6_stats" dev="proc" ino=4026532692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 381.525818][ T29] audit: type=1400 audit(381.060:166): avc: denied { ioctl } for pid=3694 comm="syz-executor.0" path="/dev/iommu" dev="devtmpfs" ino=616 ioctlcmd=0x3b89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 382.275411][ T29] audit: type=1400 audit(381.800:167): avc: denied { read } for pid=3698 comm="syz-executor.0" name="card0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 382.283143][ T29] audit: type=1400 audit(381.820:168): avc: denied { open } for pid=3698 comm="syz-executor.0" path="/dev/dri/card0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 383.018775][ T3703] capability: warning: `syz-executor.1' uses deprecated v2 capabilities in a way that may be insecure [ 385.870145][ T29] audit: type=1400 audit(385.410:169): avc: denied { ioctl } for pid=3713 comm="syz-executor.1" path="/dev/dri/card0" dev="devtmpfs" ino=619 ioctlcmd=0x641e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 386.864890][ T3719] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3719 comm=syz-executor.1 [ 388.934202][ T29] audit: type=1400 audit(388.470:170): avc: denied { read } for pid=3729 comm="syz-executor.0" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 388.967328][ T29] audit: type=1400 audit(388.480:171): avc: denied { open } for pid=3729 comm="syz-executor.0" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 389.003377][ T29] audit: type=1400 audit(388.490:172): avc: denied { ioctl } for pid=3729 comm="syz-executor.0" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x7002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 390.039146][ T29] audit: type=1400 audit(389.580:173): avc: denied { read } for pid=3734 comm="syz-executor.0" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 390.068899][ T29] audit: type=1400 audit(389.610:174): avc: denied { open } for pid=3734 comm="syz-executor.0" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 390.115606][ T29] audit: type=1400 audit(389.650:175): avc: denied { ioctl } for pid=3734 comm="syz-executor.0" path="/dev/fb0" dev="devtmpfs" ino=621 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 394.735504][ T3760] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3760 comm=syz-executor.0 [ 397.374555][ T3772] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3772 comm=syz-executor.0 [ 404.654743][ T29] audit: type=1400 audit(404.200:176): avc: denied { setopt } for pid=3796 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 415.663075][ T29] audit: type=1400 audit(415.200:177): avc: denied { write } for pid=3836 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 417.160232][ T29] audit: type=1400 audit(416.690:178): avc: denied { setopt } for pid=3844 comm="syz-executor.1" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 419.479210][ T3853] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1005 sclass=netlink_route_socket pid=3853 comm=syz-executor.1 [ 421.658937][ T3866] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1005 sclass=netlink_route_socket pid=3866 comm=syz-executor.0 [ 423.062241][ T29] audit: type=1400 audit(422.590:179): avc: denied { write } for pid=3870 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 424.950837][ T3877] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3877 comm=syz-executor.1 [ 426.272656][ T29] audit: type=1400 audit(425.780:180): avc: denied { read } for pid=3881 comm="syz-executor.0" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 426.273795][ T29] audit: type=1400 audit(425.800:181): avc: denied { open } for pid=3881 comm="syz-executor.0" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 426.301026][ T29] audit: type=1400 audit(425.820:182): avc: denied { setattr } for pid=3881 comm="syz-executor.0" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 427.057553][ T3887] tmpfs: Bad value for 'mpol' [ 427.089396][ T29] audit: type=1400 audit(426.630:183): avc: denied { map_read map_write } for pid=3886 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 428.930750][ T29] audit: type=1400 audit(428.470:184): avc: denied { getopt } for pid=3895 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 429.763178][ T29] audit: type=1400 audit(429.300:185): avc: denied { write } for pid=3901 comm="syz-executor.0" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 432.105854][ T3916] tmpfs: Bad value for 'mpol' [ 441.790441][ T29] audit: type=1400 audit(441.330:186): avc: denied { connect } for pid=3957 comm="syz-executor.1" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 447.072735][ T29] audit: type=1400 audit(446.610:187): avc: denied { getopt } for pid=3974 comm="syz-executor.0" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 452.287798][ T3998] serio: Serial port pts0 [ 456.247705][ T55] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 456.535629][ T55] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 456.853515][ T55] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 457.164510][ T55] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 458.573476][ T29] audit: type=1400 audit(458.080:188): avc: denied { read } for pid=3052 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 460.919854][ T29] audit: type=1400 audit(460.460:189): avc: denied { append } for pid=4027 comm="syz-executor.0" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 464.973128][ T55] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 465.104607][ T55] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 465.229717][ T55] bond0 (unregistering): Released all slaves [ 465.425400][ T29] audit: type=1400 audit(464.970:190): avc: denied { create } for pid=4039 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 465.448534][ T29] audit: type=1400 audit(464.990:191): avc: denied { ioctl } for pid=4039 comm="syz-executor.0" path="socket:[6632]" dev="sockfs" ino=6632 ioctlcmd=0x5112 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 466.103774][ T55] hsr_slave_0: left promiscuous mode [ 466.222489][ T55] hsr_slave_1: left promiscuous mode [ 466.564010][ T55] veth1_macvtap: left promiscuous mode [ 466.566824][ T55] veth0_macvtap: left promiscuous mode [ 466.568230][ T55] veth1_vlan: left promiscuous mode [ 466.589577][ T55] veth0_vlan: left promiscuous mode [ 473.688829][ T29] audit: type=1400 audit(473.230:192): avc: denied { create } for pid=4073 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 473.713518][ T29] audit: type=1400 audit(473.250:193): avc: denied { setopt } for pid=4073 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 484.168654][ T4115] Zero length message leads to an empty skb [ 486.057858][ T29] audit: type=1400 audit(485.600:194): avc: denied { read } for pid=4122 comm="syz-executor.0" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 486.099749][ T29] audit: type=1400 audit(485.620:195): avc: denied { open } for pid=4122 comm="syz-executor.0" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 486.126582][ T29] audit: type=1400 audit(485.670:196): avc: denied { ioctl } for pid=4122 comm="syz-executor.0" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 487.718955][ T4012] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 487.828614][ T4012] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 495.485214][ T4012] hsr_slave_0: entered promiscuous mode [ 495.544488][ T4012] hsr_slave_1: entered promiscuous mode [ 501.407281][ T4012] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 501.496081][ T4012] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 501.597147][ T4012] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 501.695469][ T4012] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 504.834802][ T29] audit: type=1400 audit(504.370:197): avc: denied { write } for pid=4194 comm="syz-executor.0" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 505.070793][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.083103][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.084114][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.084922][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.085727][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.086490][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.093618][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.094627][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.095376][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.096164][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.096892][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.097697][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.098472][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.112734][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.113756][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.114535][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.115249][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.115925][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.116638][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.117358][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.118066][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.118811][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.119545][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.120275][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.120993][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.143595][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.144622][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.145335][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.146039][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.154302][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.155126][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.155871][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.156597][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.157305][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.192509][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.193571][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.194363][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.195106][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.195837][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.196560][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.197294][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.198019][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.198777][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.199501][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.200226][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.200956][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.212442][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.213313][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.213879][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.214485][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.214930][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.215353][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.215804][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.216205][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.216594][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.216960][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.217337][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.217699][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.243045][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.243610][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.244062][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.244500][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.244948][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.245343][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.245870][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.246298][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.246815][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.247217][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.247600][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.248031][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.248467][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.248838][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.249335][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.249760][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.250236][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.250731][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.282960][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.283648][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.284189][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.284692][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.285155][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.285598][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.286033][ T946] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 505.394096][ T946] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 508.806116][ T4012] 8021q: adding VLAN 0 to HW filter on device bond0 [ 515.700670][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.710665][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.716832][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.717791][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.718542][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.719262][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.743233][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.744243][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.744997][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.745735][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.746502][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.747245][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.747962][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.748713][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.749451][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.750203][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.750948][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.785779][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.786764][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.787462][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.788240][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.788982][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.789668][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.790451][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.816624][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.817590][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.818341][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.819081][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.819799][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.820524][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.846496][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.847511][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.848243][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.849000][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.849825][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.850654][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.883997][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.885063][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.885799][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.886594][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.887326][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.888038][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.888745][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.889467][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.890229][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.890971][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.904973][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.905969][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.906759][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.907525][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.908249][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.909244][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.909956][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.910736][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.940583][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.946328][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.947232][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.947966][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.948796][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.949622][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.950467][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.980725][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.984642][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.985483][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.986232][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.986974][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.987768][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.988507][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.989254][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.989973][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 515.990747][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 516.012138][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 516.013167][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 516.013924][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 516.014715][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 516.015434][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 516.016146][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 516.016844][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 516.017547][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 516.018277][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 516.018989][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 516.019695][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 516.020429][ T30] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 516.093758][ T30] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz0 [ 519.896328][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.896894][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.897387][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.897877][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.898374][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.898780][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.899221][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.899615][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.900065][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.900603][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.901026][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.918910][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.919473][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.920024][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.920443][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.920880][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.953258][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.954290][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.954723][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.955103][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.955486][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.955858][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.956231][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.956657][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.957030][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.957434][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.957843][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.958213][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.958660][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.959211][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.959813][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.960309][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.960791][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.972409][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.973393][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.973805][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.974349][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.974837][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.975427][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.975989][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.976548][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.977067][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.977589][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.978114][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.978629][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.979102][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.979586][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.980063][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.980537][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.981060][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.993905][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.994469][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.994997][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.995489][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.996038][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.996525][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.997146][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.997962][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.998526][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.999021][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 519.999522][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.000012][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.000545][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.001027][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.012363][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.013019][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.017003][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.017631][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.018163][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.018716][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.019212][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.019744][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.020268][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.020756][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.022962][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.023472][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.023990][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.024437][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.024939][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.032504][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.033026][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.033433][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.033856][ T3304] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 520.067558][ T3304] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz0 [ 523.525855][ T29] audit: type=1400 audit(523.070:198): avc: denied { write } for pid=4261 comm="syz-executor.0" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 527.073610][ T4275] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 532.887317][ T4012] veth0_vlan: entered promiscuous mode [ 532.958777][ T4012] veth1_vlan: entered promiscuous mode [ 533.315010][ T4012] veth0_macvtap: entered promiscuous mode [ 533.389797][ T4012] veth1_macvtap: entered promiscuous mode [ 533.809958][ T4012] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 533.810695][ T4012] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 533.825264][ T4012] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 533.826333][ T4012] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 534.234548][ T29] audit: type=1400 audit(533.760:199): avc: denied { mounton } for pid=4012 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 537.818673][ T29] audit: type=1400 audit(537.350:200): avc: denied { getopt } for pid=4328 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 538.432981][ T29] audit: type=1400 audit(537.970:201): avc: denied { create } for pid=4330 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 539.175770][ T29] audit: type=1400 audit(538.720:202): avc: denied { write } for pid=4334 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 539.820406][ T29] audit: type=1400 audit(539.360:203): avc: denied { map } for pid=4338 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7090 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 539.837480][ T29] audit: type=1400 audit(539.360:204): avc: denied { read write } for pid=4338 comm="syz-executor.0" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7090 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 539.879163][ T29] audit: type=1400 audit(539.420:205): avc: denied { read } for pid=4340 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 555.327029][ T4418] loop1: detected capacity change from 0 to 512 [ 555.568996][ T4418] EXT4-fs warning (device loop1): ext4_block_to_path:105: block 3279945729 > max in inode 13 [ 555.634083][ T4418] EXT4-fs warning (device loop1): ext4_block_to_path:105: block 3279945730 > max in inode 13 [ 555.649631][ T4418] EXT4-fs (loop1): 1 truncate cleaned up [ 555.669809][ T4418] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 555.712603][ T4418] fscrypt (loop1, inode 2): Error -61 getting encryption context [ 555.956585][ T4423] EXT4-fs error (device loop1): ext4_mb_generate_buddy:1217: group 0, block bitmap and bg descriptor inconsistent: 218 vs 220 free clusters [ 556.182487][ T4012] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 556.578573][ T4425] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4425 comm=syz-executor.0 [ 557.142865][ T29] audit: type=1400 audit(556.680:206): avc: denied { create } for pid=4427 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 557.172164][ T29] audit: type=1400 audit(556.710:207): avc: denied { read } for pid=4427 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 559.293292][ T4439] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4439 comm=syz-executor.0 [ 559.420369][ T29] audit: type=1400 audit(558.960:208): avc: denied { create } for pid=4440 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 559.480169][ T29] audit: type=1400 audit(559.010:209): avc: denied { bind } for pid=4440 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 559.560731][ T29] audit: type=1400 audit(559.100:210): avc: denied { listen } for pid=4440 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 559.589828][ T29] audit: type=1400 audit(559.130:211): avc: denied { accept } for pid=4440 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 562.917316][ T29] audit: type=1400 audit(562.460:212): avc: denied { getopt } for pid=4453 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 566.222244][ T29] audit: type=1400 audit(565.760:213): avc: denied { setopt } for pid=4475 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 579.582817][ T29] audit: type=1400 audit(579.110:214): avc: denied { write } for pid=4546 comm="syz-executor.0" path="socket:[8467]" dev="sockfs" ino=8467 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 580.448187][ T4550] loop0: detected capacity change from 0 to 1024 [ 580.534699][ T4550] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 580.740844][ T4550] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 580.819232][ T29] audit: type=1400 audit(580.360:215): avc: denied { read } for pid=4553 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 580.836421][ T29] audit: type=1400 audit(580.370:216): avc: denied { getopt } for pid=4553 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 581.149179][ T3221] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 591.989683][ T4603] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4603 comm=syz-executor.1 [ 602.222692][ T29] audit: type=1400 audit(601.760:217): avc: denied { ioctl } for pid=4656 comm="syz-executor.0" path="socket:[8701]" dev="sockfs" ino=8701 ioctlcmd=0x940e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 602.459567][ T29] audit: type=1400 audit(602.000:218): avc: denied { read } for pid=4656 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 603.734860][ T29] audit: type=1400 audit(603.280:219): avc: denied { ioctl } for pid=4665 comm="syz-executor.0" path="socket:[8077]" dev="sockfs" ino=8077 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 606.980455][ T4681] loop1: detected capacity change from 0 to 512 [ 607.304205][ T4681] EXT4-fs error (device loop1): ext4_get_branch:178: inode #11: block 4294967295: comm syz-executor.1: invalid block [ 607.344130][ T4681] EXT4-fs (loop1): Remounting filesystem read-only [ 607.373980][ T4681] EXT4-fs (loop1): 2 truncates cleaned up [ 607.419047][ T4681] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 607.453067][ T4681] SELinux: (dev loop1, type ext4) getxattr errno 5 [ 607.559945][ T4681] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 609.885070][ T29] audit: type=1400 audit(609.410:220): avc: denied { ioctl } for pid=4697 comm="syz-executor.1" path="socket:[8789]" dev="sockfs" ino=8789 ioctlcmd=0x642a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 610.408488][ T4698] loop0: detected capacity change from 0 to 512 [ 610.699835][ T4698] EXT4-fs error (device loop0): ext4_get_branch:178: inode #11: block 4294967295: comm syz-executor.0: invalid block [ 610.723192][ T4698] EXT4-fs (loop0): Remounting filesystem read-only [ 610.726886][ T4698] EXT4-fs (loop0): 2 truncates cleaned up [ 610.740517][ T4698] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 610.747750][ T4698] SELinux: (dev loop0, type ext4) getxattr errno 5 [ 610.844256][ T4698] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 616.336782][ T29] audit: type=1400 audit(615.880:221): avc: denied { read } for pid=4733 comm="syz-executor.1" path="socket:[8869]" dev="sockfs" ino=8869 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 620.607118][ T29] audit: type=1400 audit(620.140:222): avc: denied { listen } for pid=4760 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 627.165153][ T29] audit: type=1400 audit(626.700:223): avc: denied { read } for pid=4802 comm="syz-executor.0" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 627.168347][ T29] audit: type=1400 audit(626.710:224): avc: denied { open } for pid=4802 comm="syz-executor.0" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 627.185035][ T29] audit: type=1400 audit(626.730:225): avc: denied { ioctl } for pid=4802 comm="syz-executor.0" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0xf507 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 627.220144][ T4803] binder: 4802:4803 ioctl f507 0 returned -22 [ 629.284606][ T4815] binder: 4814:4815 ioctl f507 0 returned -22 [ 631.424146][ T4830] binder: 4827:4830 ioctl f507 0 returned -22 [ 635.413578][ T29] audit: type=1400 audit(634.960:226): avc: denied { setopt } for pid=4853 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 635.940181][ T29] audit: type=1400 audit(635.480:227): avc: denied { map } for pid=4856 comm="syz-executor.0" path="/proc/4856/net/route" dev="proc" ino=4026532733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 646.139023][ T29] audit: type=1400 audit(645.680:228): avc: denied { setopt } for pid=4909 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 648.532115][ T29] audit: type=1400 audit(648.070:229): avc: denied { read } for pid=4921 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 660.930757][ T29] audit: type=1400 audit(660.470:230): avc: denied { read } for pid=4974 comm="syz-executor.1" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 660.949452][ T29] audit: type=1400 audit(660.480:231): avc: denied { open } for pid=4974 comm="syz-executor.1" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 661.186854][ T4975] Restarting kernel threads ... [ 661.196327][ T29] audit: type=1400 audit(660.720:232): avc: denied { ioctl } for pid=4974 comm="syz-executor.1" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3305 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 661.208741][ T4975] done. [ 664.109220][ T4986] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5136 sclass=netlink_tcpdiag_socket pid=4986 comm=syz-executor.1 [ 666.576320][ T4996] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5136 sclass=netlink_tcpdiag_socket pid=4996 comm=syz-executor.1 [ 669.058469][ T5006] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5136 sclass=netlink_tcpdiag_socket pid=5006 comm=syz-executor.1 [ 675.698628][ T5042] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5042 comm=syz-executor.0 [ 677.304055][ T29] audit: type=1400 audit(676.850:233): avc: denied { bind } for pid=5049 comm="syz-executor.1" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 692.372537][ T29] audit: type=1400 audit(691.910:234): avc: denied { create } for pid=5110 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 692.422342][ T29] audit: type=1400 audit(691.960:235): avc: denied { write } for pid=5110 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 694.783377][ T5126] sctp: [Deprecated]: syz-executor.1 (pid 5126) Use of int in maxseg socket option. [ 694.783377][ T5126] Use struct sctp_assoc_value instead [ 696.592226][ T5137] sctp: [Deprecated]: syz-executor.1 (pid 5137) Use of int in maxseg socket option. [ 696.592226][ T5137] Use struct sctp_assoc_value instead [ 698.598837][ T29] audit: type=1400 audit(698.140:236): avc: denied { mount } for pid=5149 comm="syz-executor.1" name="/" dev="configfs" ino=1074 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 700.955574][ T5163] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5163 comm=syz-executor.1 [ 703.286953][ T29] audit: type=1400 audit(702.820:237): avc: denied { getopt } for pid=5170 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 703.319603][ T5176] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=259 sclass=netlink_audit_socket pid=5176 comm=syz-executor.0 [ 719.074972][ T29] audit: type=1400 audit(718.620:238): avc: denied { setattr } for pid=5214 comm="syz-executor.1" name="tty22" dev="devtmpfs" ino=41 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 730.368090][ T29] audit: type=1400 audit(729.910:239): avc: denied { getopt } for pid=5248 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 730.393517][ T29] audit: type=1400 audit(729.930:240): avc: denied { remove_name } for pid=3007 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 730.403733][ T29] audit: type=1400 audit(729.940:241): avc: denied { rename } for pid=3007 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 730.465570][ T29] audit: type=1400 audit(730.000:242): avc: denied { create } for pid=3007 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 733.674016][ T29] audit: type=1400 audit(733.210:243): avc: denied { read } for pid=5258 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 746.279146][ T5289] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5289 comm=syz-executor.1 [ 748.364414][ T5295] mmap: syz-executor.1 (5295) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 752.186701][ T5300] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5300 comm=syz-executor.1 [ 755.333179][ T5310] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5310 comm=syz-executor.1 [ 757.765454][ T29] audit: type=1400 audit(757.310:244): avc: denied { ioctl } for pid=5317 comm="syz-executor.1" path="socket:[10111]" dev="sockfs" ino=10111 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 758.498755][ T5320] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5320 comm=syz-executor.1 [ 761.856942][ T5330] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5330 comm=syz-executor.1 [ 763.382238][ T29] audit: type=1400 audit(762.920:245): avc: denied { mounton } for pid=5339 comm="syz-executor.1" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 764.493705][ T29] audit: type=1400 audit(764.030:246): avc: denied { name_bind } for pid=5343 comm="syz-executor.1" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 765.099612][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 765.895618][ T29] audit: type=1400 audit(765.420:247): avc: denied { audit_write } for pid=5350 comm="syz-executor.1" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 768.467209][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 771.198423][ T29] audit: type=1400 audit(770.740:248): avc: denied { setopt } for pid=5372 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 772.103224][ T5377] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=5377 comm=syz-executor.0 [ 778.034095][ T5408] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=5408 comm=syz-executor.0 [ 778.714605][ T29] audit: type=1400 audit(778.250:249): avc: denied { execute } for pid=5411 comm="syz-executor.0" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 779.660366][ T5416] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 784.570056][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 786.458199][ T29] audit: type=1400 audit(786.000:250): avc: denied { create } for pid=5445 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 786.504449][ T29] audit: type=1400 audit(786.050:251): avc: denied { write } for pid=5445 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 786.509509][ T5446] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5446 comm=syz-executor.0 [ 787.205542][ T5449] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 787.987917][ T29] audit: type=1400 audit(787.520:252): avc: denied { ioctl } for pid=5451 comm="syz-executor.1" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=11199 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 791.040961][ T29] audit: type=1400 audit(790.580:253): avc: denied { create } for pid=5463 comm="syz-executor.0" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=chr_file permissive=1 [ 791.169316][ T29] audit: type=1400 audit(790.700:254): avc: denied { link } for pid=5463 comm="syz-executor.0" name="file1" dev="vda" ino=1755 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=chr_file permissive=1 [ 791.323012][ T29] audit: type=1400 audit(790.860:255): avc: denied { unlink } for pid=3221 comm="syz-executor.0" name="file1" dev="vda" ino=1755 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=chr_file permissive=1 [ 794.220304][ T5474] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 795.466498][ T5482] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 798.394329][ T29] audit: type=1400 audit(797.930:256): avc: denied { setopt } for pid=5492 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 800.215362][ T5501] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 807.930911][ T29] audit: type=1400 audit(807.460:257): avc: denied { read } for pid=5539 comm="syz-executor.1" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 807.944812][ T29] audit: type=1400 audit(807.470:258): avc: denied { open } for pid=5539 comm="syz-executor.1" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 807.994129][ T29] audit: type=1400 audit(807.540:259): avc: denied { ioctl } for pid=5539 comm="syz-executor.1" path="/dev/usbmon0" dev="devtmpfs" ino=697 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 813.758064][ T29] audit: type=1400 audit(813.300:260): avc: denied { write } for pid=5570 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 816.990886][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 817.120028][ T29] audit: type=1400 audit(816.650:261): avc: denied { accept } for pid=5586 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 819.006597][ T29] audit: type=1400 audit(818.550:262): avc: denied { create } for pid=5594 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 819.069394][ T29] audit: type=1400 audit(818.600:263): avc: denied { write } for pid=5594 comm="syz-executor.0" path="socket:[12471]" dev="sockfs" ino=12471 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 831.467384][ T29] audit: type=1400 audit(831.010:264): avc: denied { read } for pid=5648 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 840.837889][ T29] audit: type=1400 audit(840.380:265): avc: denied { write } for pid=5693 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 840.866091][ T29] audit: type=1400 audit(840.400:266): avc: denied { connect } for pid=5693 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 840.914160][ T29] audit: type=1400 audit(840.450:267): avc: denied { name_connect } for pid=5693 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 843.144871][ T29] audit: type=1400 audit(842.690:268): avc: denied { read } for pid=5703 comm="syz-executor.1" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 843.157574][ T29] audit: type=1400 audit(842.690:269): avc: denied { open } for pid=5703 comm="syz-executor.1" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 843.183704][ T29] audit: type=1400 audit(842.720:270): avc: denied { ioctl } for pid=5703 comm="syz-executor.1" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 850.122665][ T29] audit: type=1400 audit(849.650:271): avc: denied { mount } for pid=5735 comm="syz-executor.0" name="/" dev="ramfs" ino=11793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 853.989806][ T29] audit: type=1400 audit(853.530:272): avc: denied { ioctl } for pid=5757 comm="syz-executor.1" path="socket:[11827]" dev="sockfs" ino=11827 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 872.240166][ T29] audit: type=1400 audit(871.780:273): avc: denied { ioctl } for pid=5840 comm="syz-executor.1" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 881.633605][ T29] audit: type=1400 audit(881.170:274): avc: denied { create } for pid=5884 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 881.653961][ T29] audit: type=1400 audit(881.200:275): avc: denied { setopt } for pid=5884 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 884.043615][ T5897] nbd0: detected capacity change from 0 to 23 [ 885.015681][ T5901] loop1: detected capacity change from 0 to 128 [ 885.122709][ T5901] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (39871!=39978) [ 885.185370][ T5901] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 ro without journal. Quota mode: none. [ 885.227254][ T5901] EXT4-fs warning (device loop1): ext4_dirblock_csum_verify:405: inode #2: comm syz-executor.1: No space for directory leaf checksum. Please run e2fsck -D. [ 885.229826][ T5901] EXT4-fs error (device loop1): __ext4_find_entry:1693: inode #2: comm syz-executor.1: checksumming directory block 0 [ 885.570500][ T4012] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 885.765215][ T48] block nbd0: Receive control failed (result -104) [ 901.576147][ T29] audit: type=1400 audit(901.110:276): avc: denied { write } for pid=5966 comm="syz-executor.1" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 903.756067][ T29] audit: type=1400 audit(903.290:277): avc: denied { read } for pid=5979 comm="syz-executor.1" path="socket:[12229]" dev="sockfs" ino=12229 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 905.534552][ T29] audit: type=1400 audit(905.070:278): avc: denied { read } for pid=5989 comm="syz-executor.1" dev="nsfs" ino=4026532781 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 905.535459][ T29] audit: type=1400 audit(905.070:279): avc: denied { open } for pid=5989 comm="syz-executor.1" path="net:[4026532781]" dev="nsfs" ino=4026532781 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 908.943051][ T29] audit: type=1400 audit(908.460:280): avc: denied { create } for pid=6003 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 908.949731][ T29] audit: type=1400 audit(908.490:281): avc: denied { write } for pid=6003 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 914.257974][ T52] block nbd0: Possible stuck request 000000001921fe15: control (read@0,4096B). Runtime 30 seconds [ 935.030360][ T29] audit: type=1400 audit(934.570:282): avc: denied { setattr } for pid=6103 comm="syz-executor.1" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 943.698252][ T29] audit: type=1400 audit(943.240:283): avc: denied { create } for pid=6129 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 943.716846][ T29] audit: type=1400 audit(943.260:284): avc: denied { write } for pid=6129 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 944.293081][ T52] block nbd0: Possible stuck request 000000001921fe15: control (read@0,4096B). Runtime 60 seconds [ 945.016307][ T3022] udevd[3022]: worker [3403] /devices/virtual/block/nbd0 is taking a long time [ 956.293716][ T29] audit: type=1400 audit(955.830:285): avc: denied { read } for pid=6176 comm="syz-executor.1" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 956.296513][ T29] audit: type=1400 audit(955.840:286): avc: denied { open } for pid=6176 comm="syz-executor.1" path="/dev/loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 956.314041][ T29] audit: type=1400 audit(955.850:287): avc: denied { ioctl } for pid=6176 comm="syz-executor.1" path="/dev/loop-control" dev="devtmpfs" ino=638 ioctlcmd=0x55d1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 957.752871][ T29] audit: type=1400 audit(957.290:288): avc: denied { read } for pid=6181 comm="syz-executor.1" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 957.755816][ T29] audit: type=1400 audit(957.290:289): avc: denied { open } for pid=6181 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 957.780745][ T29] audit: type=1400 audit(957.320:290): avc: denied { ioctl } for pid=6181 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=673 ioctlcmd=0x1264 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 959.678685][ T6192] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6192 comm=syz-executor.1 [ 961.543253][ T6202] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6202 comm=syz-executor.1 [ 974.388704][ T52] block nbd0: Possible stuck request 000000001921fe15: control (read@0,4096B). Runtime 90 seconds [ 975.540271][ T6216] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 975.628264][ T6216] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 980.170120][ T6216] hsr_slave_0: entered promiscuous mode [ 980.213826][ T6216] hsr_slave_1: entered promiscuous mode [ 980.273923][ T6216] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 980.275065][ T6216] Cannot create hsr debugfs directory [ 982.249742][ T6216] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 982.679266][ T6216] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 983.076942][ T6216] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 983.490648][ T6216] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 984.674582][ T6216] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 984.717050][ T6216] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 984.776905][ T6216] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 984.836952][ T6216] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 989.090123][ T6216] 8021q: adding VLAN 0 to HW filter on device bond0 [ 999.835441][ T6356] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6356 comm=syz-executor.1 [ 1001.493202][ T29] audit: type=1400 audit(1001.000:291): avc: denied { bind } for pid=6358 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1001.559703][ T29] audit: type=1400 audit(1001.100:292): avc: denied { write } for pid=6358 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1004.504963][ T52] block nbd0: Possible stuck request 000000001921fe15: control (read@0,4096B). Runtime 120 seconds [ 1005.956536][ T6216] veth0_vlan: entered promiscuous mode [ 1006.071038][ T6216] veth1_vlan: entered promiscuous mode [ 1006.647553][ T6216] veth0_macvtap: entered promiscuous mode [ 1006.753780][ T6216] veth1_macvtap: entered promiscuous mode [ 1007.350429][ T6216] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1007.363510][ T6216] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1007.364439][ T6216] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1007.366758][ T6216] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1009.187912][ T6391] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6391 comm=syz-executor.0 [ 1011.370636][ T6402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6402 comm=syz-executor.1 [ 1012.402894][ T29] audit: type=1400 audit(1011.940:293): avc: denied { ioctl } for pid=6403 comm="syz-executor.0" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1014.740466][ T6414] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6414 comm=syz-executor.1 [ 1030.288963][ T29] audit: type=1400 audit(1029.820:294): avc: denied { mounton } for pid=6466 comm="syz-executor.0" path="/proc/6466/cgroup" dev="proc" ino=14080 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 1034.594773][ T52] block nbd0: Possible stuck request 000000001921fe15: control (read@0,4096B). Runtime 150 seconds [ 1037.093337][ T29] audit: type=1400 audit(1036.630:295): avc: denied { accept } for pid=6483 comm="syz-executor.0" lport=51646 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1037.168965][ T29] audit: type=1400 audit(1036.700:296): avc: denied { write } for pid=6483 comm="syz-executor.0" lport=51646 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 1038.236932][ T29] audit: type=1400 audit(1037.760:297): avc: denied { lock } for pid=6486 comm="syz-executor.1" path="socket:[15325]" dev="sockfs" ino=15325 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 1052.534372][ T6530] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6530 comm=syz-executor.0 [ 1054.718859][ T6538] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6538 comm=syz-executor.1 [ 1057.400968][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1061.827906][ T29] audit: type=1400 audit(1061.360:298): avc: denied { ioctl } for pid=6565 comm="syz-executor.1" path="socket:[14278]" dev="sockfs" ino=14278 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1065.158387][ T3022] udevd[3022]: worker [3403] /devices/virtual/block/nbd0 timeout; kill it [ 1065.177335][ T3022] udevd[3022]: seq 7397 '/devices/virtual/block/nbd0' killed [ 1065.266652][ T52] block nbd0: Possible stuck request 000000001921fe15: control (read@0,4096B). Runtime 180 seconds [ 1071.437472][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1074.228060][ T29] audit: type=1400 audit(1073.760:299): avc: denied { unmount } for pid=4012 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1095.338006][ T52] block nbd0: Possible stuck request 000000001921fe15: control (read@0,4096B). Runtime 210 seconds [ 1099.208143][ T6733] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=6733 comm=syz-executor.0 [ 1105.447204][ T6764] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=6764 comm=syz-executor.0 [ 1125.427427][ T52] block nbd0: Possible stuck request 000000001921fe15: control (read@0,4096B). Runtime 240 seconds [ 1126.705660][ T29] audit: type=1400 audit(1126.240:300): avc: denied { bind } for pid=6864 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1127.268335][ T6867] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5126 sclass=netlink_route_socket pid=6867 comm=syz-executor.0 [ 1129.423651][ T6879] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5126 sclass=netlink_route_socket pid=6879 comm=syz-executor.0 [ 1131.538727][ T6892] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5126 sclass=netlink_route_socket pid=6892 comm=syz-executor.1 [ 1133.497900][ T6903] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5126 sclass=netlink_route_socket pid=6903 comm=syz-executor.0 [ 1135.259500][ T29] audit: type=1400 audit(1134.800:301): avc: denied { ioctl } for pid=6910 comm="syz-executor.1" path="socket:[16068]" dev="sockfs" ino=16068 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1136.389438][ T6916] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5126 sclass=netlink_route_socket pid=6916 comm=syz-executor.1 [ 1139.505451][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1152.208645][ T6979] serio: Serial port pts0 [ 1152.803881][ T29] audit: type=1400 audit(1152.340:302): avc: denied { getopt } for pid=6982 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1155.525268][ T52] block nbd0: Possible stuck request 000000001921fe15: control (read@0,4096B). Runtime 270 seconds [ 1158.255094][ T7009] serio: Serial port pts0 [ 1164.653438][ T7035] serio: Serial port pts0 [ 1170.505208][ T7065] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7065 comm=syz-executor.0 [ 1175.149724][ T7090] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7090 comm=syz-executor.1 [ 1181.158593][ T7122] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1181.162773][ T29] audit: type=1400 audit(1180.700:303): avc: denied { nlmsg_read } for pid=7120 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1181.240951][ T29] audit: type=1400 audit(1180.770:304): avc: denied { read } for pid=7120 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1184.019740][ T7136] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1185.614215][ T52] block nbd0: Possible stuck request 000000001921fe15: control (read@0,4096B). Runtime 300 seconds [ 1189.007908][ T7161] netlink: 164 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1205.150376][ T29] audit: type=1400 audit(1204.690:305): avc: denied { mount } for pid=7225 comm="syz-executor.0" name="/" dev="hugetlbfs" ino=17560 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1205.175120][ T29] audit: type=1400 audit(1204.700:306): avc: denied { remount } for pid=7225 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1205.303103][ T29] audit: type=1400 audit(1204.840:307): avc: denied { unmount } for pid=6216 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1215.656502][ T52] block nbd0: Possible stuck request 000000001921fe15: control (read@0,4096B). Runtime 330 seconds [ 1229.766467][ T29] audit: type=1400 audit(1229.310:308): avc: denied { write } for pid=7359 comm="syz-executor.0" path="socket:[17754]" dev="sockfs" ino=17754 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1231.424015][ T7370] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7370 comm=syz-executor.0 [ 1233.459750][ T7382] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7382 comm=syz-executor.1 [ 1235.372018][ T7394] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7394 comm=syz-executor.1 [ 1241.710081][ T7432] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7432 comm=syz-executor.0 [ 1245.730955][ T52] block nbd0: Possible stuck request 000000001921fe15: control (read@0,4096B). Runtime 360 seconds [ 1247.670360][ T7463] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7463 comm=syz-executor.1 [ 1261.224141][ T29] audit: type=1400 audit(1260.760:309): avc: denied { write } for pid=7528 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1264.884276][ T7548] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pid=7548 comm=syz-executor.1 [ 1267.009737][ T7561] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pid=7561 comm=syz-executor.0 [ 1268.608439][ T7572] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7572 comm=syz-executor.1 [ 1269.559016][ T7577] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pid=7577 comm=syz-executor.0 [ 1270.173643][ T29] audit: type=1400 audit(1269.710:310): avc: denied { ioctl } for pid=7578 comm="syz-executor.1" path="socket:[19142]" dev="sockfs" ino=19142 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1272.389127][ T7590] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pid=7590 comm=syz-executor.0 [ 1272.608348][ T7592] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7592 comm=syz-executor.1 [ 1275.826755][ T52] block nbd0: Possible stuck request 000000001921fe15: control (read@0,4096B). Runtime 390 seconds [ 1285.465545][ T29] audit: type=1400 audit(402654468.982:311): avc: denied { getopt } for pid=7667 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1285.937807][ T7672] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7672 comm=syz-executor.0 [ 1305.892902][ T52] block nbd0: Possible stuck request 000000001921fe15: control (read@0,4096B). Runtime 420 seconds [ 1309.302740][ T29] audit: type=1400 audit(402654492.832:312): avc: denied { lock } for pid=7792 comm="syz-executor.0" path="socket:[19612]" dev="sockfs" ino=19612 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1321.885020][ T31] INFO: task udevd:3403 blocked for more than 430 seconds. [ 1321.886506][ T31] Not tainted 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 [ 1321.889887][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1321.890955][ T31] task:udevd state:D stack:0 pid:3403 tgid:3403 ppid:3022 flags:0x00000005 [ 1321.900417][ T31] Call trace: [ 1321.900743][ T31] __switch_to+0x1c8/0x2a0 [ 1321.924759][ T31] __schedule+0xad4/0x2b18 [ 1321.925537][ T31] schedule+0xd0/0x304 [ 1321.926133][ T31] schedule_preempt_disabled+0x18/0x2c [ 1321.926800][ T31] __mutex_lock+0x4e8/0x840 [ 1321.927376][ T31] mutex_lock_nested+0x24/0x30 [ 1321.928077][ T31] bdev_open+0x2c4/0xa48 [ 1321.928783][ T31] blkdev_open+0x114/0x194 [ 1321.929392][ T31] do_dentry_open+0x510/0x12e8 [ 1321.929997][ T31] vfs_open+0x54/0x8c [ 1321.930645][ T31] path_openat+0x14a0/0x20ec 1982/10/05 08:28:25 SYZFATAL: failed to recv *flatrpc.HostMessageRaw: EOF [ 1321.972994][ T31] do_filp_open+0x16c/0x330 [ 1321.973871][ T31] do_sys_openat2+0x12c/0x160 [ 1321.975037][ T31] __arm64_sys_openat+0x12c/0x1b8 [ 1321.975680][ T31] invoke_syscall+0x6c/0x25c [ 1321.976282][ T31] el0_svc_common.constprop.0+0xac/0x230 [ 1321.976981][ T31] do_el0_svc+0x40/0x58 [ 1321.977585][ T31] el0_svc+0x50/0x180 [ 1321.978169][ T31] el0t_64_sync_handler+0x100/0x12c [ 1321.978796][ T31] el0t_64_sync+0x190/0x194 [ 1321.979913][ T31] INFO: task syz-executor.0:5892 blocked for more than 430 seconds. [ 1321.980626][ T31] Not tainted 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 [ 1322.003175][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1322.004110][ T31] task:syz-executor.0 state:D stack:0 pid:5892 tgid:5892 ppid:3221 flags:0x00000005 [ 1322.005198][ T31] Call trace: [ 1322.005719][ T31] __switch_to+0x1c8/0x2a0 [ 1322.006447][ T31] __schedule+0xad4/0x2b18 [ 1322.007054][ T31] schedule+0xd0/0x304 [ 1322.008178][ T31] schedule_preempt_disabled+0x18/0x2c [ 1322.008811][ T31] __mutex_lock+0x4e8/0x840 [ 1322.009402][ T31] mutex_lock_nested+0x24/0x30 [ 1322.009991][ T31] bdev_release+0x104/0x510 [ 1322.028039][ T31] blkdev_release+0x14/0x24 [ 1322.028982][ T31] __fput+0x2bc/0x95c [ 1322.029606][ T31] ____fput+0x10/0x1c [ 1322.030191][ T31] task_work_run+0x124/0x20c [ 1322.030803][ T31] do_notify_resume+0x1d4/0x25c [ 1322.042159][ T31] el0_svc+0x100/0x180 [ 1322.043044][ T31] el0t_64_sync_handler+0x100/0x12c [ 1322.043698][ T31] el0t_64_sync+0x190/0x194 [ 1322.045239][ T31] INFO: task syz-executor.0:5894 blocked for more than 430 seconds. [ 1322.045935][ T31] Not tainted 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 [ 1322.046595][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1322.047263][ T31] task:syz-executor.0 state:D stack:0 pid:5894 tgid:5892 ppid:3221 flags:0x0000000d [ 1322.048266][ T31] Call trace: [ 1322.048813][ T31] __switch_to+0x1c8/0x2a0 [ 1322.049474][ T31] __schedule+0xad4/0x2b18 [ 1322.050092][ T31] schedule+0xd0/0x304 [ 1322.050791][ T31] schedule_preempt_disabled+0x18/0x2c [ 1322.063040][ T31] __mutex_lock+0x4e8/0x840 [ 1322.064383][ T31] mutex_lock_nested+0x24/0x30 [ 1322.065026][ T31] bdev_release+0x104/0x510 [ 1322.065611][ T31] blkdev_release+0x14/0x24 [ 1322.066183][ T31] __fput+0x2bc/0x95c [ 1322.066791][ T31] ____fput+0x10/0x1c [ 1322.067386][ T31] task_work_run+0x124/0x20c [ 1322.068033][ T31] do_notify_resume+0x1d4/0x25c [ 1322.068690][ T31] el0_svc+0x100/0x180 [ 1322.069350][ T31] el0t_64_sync_handler+0x100/0x12c [ 1322.069965][ T31] el0t_64_sync+0x190/0x194 [ 1322.070919][ T31] [ 1322.070919][ T31] Showing all locks held in the system: [ 1322.092650][ T31] 1 lock held by khungtaskd/31: [ 1322.093498][ T31] #0: ffff800086a8e100 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x44/0x2d4 [ 1322.096681][ T31] 2 locks held by getty/3143: [ 1322.097338][ T31] #0: ffff0000136890a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 1322.099169][ T31] #1: ffff80008990d2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x93c/0xe9c [ 1322.100787][ T31] 2 locks held by syz-fuzzer/3213: [ 1322.134759][ T31] 1 lock held by udevd/3403: [ 1322.135734][ T31] #0: ffff000010b544c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa48 [ 1322.137350][ T31] 3 locks held by syz-executor.1/4011: [ 1322.137993][ T31] 1 lock held by syz-executor.0/5892: [ 1322.138708][ T31] #0: ffff000010b544c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0x104/0x510 [ 1322.175524][ T31] 1 lock held by syz-executor.0/5894: [ 1322.176513][ T31] #0: ffff000010b544c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0x104/0x510 [ 1322.183555][ T31] 1 lock held by syz-executor.0/5897: [ 1322.184173][ T31] #0: ffff000010b544c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open+0x2c4/0xa48 [ 1322.185694][ T31] 2 locks held by syz-executor.0/6216: [ 1322.186330][ T31] 3 locks held by kworker/u8:0/7197: [ 1322.186902][ T31] 1 lock held by syz-executor.0/7833: [ 1322.187498][ T31] #0: ffff0000183b0e10 (&sb->s_type->i_mutex_key#11){+.+.}-{3:3}, at: __sock_release+0x68/0x1f0 [ 1322.236191][ T31] 5 locks held by syz-executor.1/7835: [ 1322.237706][ T31] [ 1322.238342][ T31] ============================================= [ 1322.238342][ T31] [ 1322.239789][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 1322.241382][ T31] CPU: 1 PID: 31 Comm: khungtaskd Not tainted 6.10.0-rc4-syzkaller-00052-ge5b3efbe1ab1 #0 [ 1322.242599][ T31] Hardware name: linux,dummy-virt (DT) [ 1322.243259][ T31] Call trace: [ 1322.243689][ T31] dump_backtrace+0x9c/0x11c [ 1322.244239][ T31] show_stack+0x18/0x24 [ 1322.244774][ T31] dump_stack_lvl+0x38/0xf4 [ 1322.245313][ T31] dump_stack+0x1c/0x28 [ 1322.245803][ T31] panic+0x5c4/0x64c [ 1322.246327][ T31] watchdog+0x4bc/0xd68 [ 1322.246767][ T31] kthread+0x27c/0x300 [ 1322.247236][ T31] ret_from_fork+0x10/0x20 [ 1322.248279][ T31] SMP: stopping secondary CPUs [ 1322.249727][ T31] Kernel Offset: disabled [ 1322.250222][ T31] CPU features: 0x04,40001001,a0100000,0200421b [ 1322.251658][ T31] Memory Limit: none [ 1322.253535][ T31] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:51:31 Registers: info registers vcpu 0 CPU#0 PC=ffff8000804f7798 X00=ffff00000b401e08 X01=0000000000000000 X02=1fffe000016803c1 X03=1fffe0000d4ca3d6 X04=1ffff000113a0f36 X05=0000000000000000 X06=ffff700010d33d14 X07=0000000000000001 X08=ffff80008699e8a0 X09=dfff800000000000 X10=ffff700010d33d14 X11=1ffff00010d33d14 X12=ffff700010d33d15 X13=0000000000000004 X14=0000000000000000 X15=1fffe0000168050f X16=0000000000000006 X17=0000000000000000 X18=ffff00000b402880 X19=ffff00000b401e00 X20=ffff7fffe3e05000 X21=ffff800080308854 X22=ffff00000b401e00 X23=ffff800080308ec0 X24=1ffff000113a0f50 X25=ffff80008699e920 X26=ffff80008699e8a0 X27=0000000000000001 X28=0000000000000000 X29=ffff800089d079f0 X30=ffff8000804f76e8 SP=ffff800089d079f0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0500000000000000:0500000000000000 Q01=0000000500000000:0000000000000000 Q02=0000000000000005:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000005:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd9e463a0:0000ffffd9e463a0 Q17=ffffff80ffffffd0:0000ffffd9e46370 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000802d92c8 X00=0000000000000000 X01=0000000000000003 X02=1fffe000017f73c1 X03=0000000000000001 X04=1ffff00011af0fc0 X05=0000000000000000 X06=0000000000000000 X07=0000000000000000 X08=0000000000000087 X09=0000000000000000 X10=0000000000000000 X11=0000000000000000 X12=0000000000000000 X13=0000000000000000 X14=0000000000000000 X15=0000000000000000 X16=0000aaaab4b572d8 X17=0000ffffb4ad814c X18=0000000000000000 X19=0000aaaab8b23110 X20=0000aaaab4b16000 X21=0000aaaab4b15000 X22=0000aaaab4b5a000 X23=0000000000000529 X24=0000000000000004 X25=0000ffffdb252ec8 X26=0000aaaab4b57000 X27=0000ffffdb252f48 X28=0000000000000001 X29=0000ffffdb252df0 X30=0000ffffb4ad8158 SP=ffff80008d788000 PSTATE=600003c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000