last executing test programs: 6.952825214s ago: executing program 0 (id=2119): setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$inet6(0xa, 0x2, 0x3f) close_range(r0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r1, r2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) dup3(r3, r4, 0x0) sendmsg$can_bcm(r4, &(0x7f0000000840)={&(0x7f0000000180), 0x10, &(0x7f0000000300)={&(0x7f00000007c0)={0x3, 0x108, 0x0, {}, {}, {0x0, 0x0, 0x1, 0x1}, 0x1, @can={{0x3, 0x1}, 0x1, 0x0, 0x0, 0x0, "5a149b9f186959eb"}}, 0x48}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_RESET_STATS(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)={0x14, r5, 0x1}, 0x14}}, 0x0) sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="fc0000", @ANYRES16=r5, @ANYBLOB="080026bd7000fcdbdf2507000000280004800900010073797a31000000000c00078008000400ff0f00000c000780080001001f0000000c000180080003000900000024000980080001000080000008000100080000000800010008000000080002000002000014000380080002004f17000008000100050000007c0001800800010069623a0054000280080003000900000008000200800000000800030001010000080001001f000000080004000101000008000300d400000008000300ff00000008000200000000000800020001000000e08d367cb043ff561c00028008000200c41a0000082103008100000008000100130000"], 0xfc}}, 0x48005) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)={0x1c8, r5, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x5c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "5d7b1e1ff55e37b966a16646c499761d8ff53969de875e12ce"}}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x3}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x922, @local, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x1, @empty, 0x9}}}}]}, @TIPC_NLA_NODE={0xe0, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x92, 0x3, "e7d1c8e97a63526a9fb0fcfaf484ae87976b3a94d9b90357a8f66f70b6780dda31f9db21c37bde47f76b434f323ef11380bcd4f9f149d9ec913a2dd3c3e3b922f45876202c6dc7c5fc8f837a3922f74ea6d31aa59be445003dd83c2db7af0dae0df82d49199fbf62706f3e2324c6eca3c4b63f68381eb29db59664447f060b99e5ca035558e36fbd3adb53e0751a"}, @TIPC_NLA_NODE_ID={0x3e, 0x3, "e82424bea38d7781ef671731340ca00340ad880b1cefa1542f6a8a8f82fde9f621e456d780e3db7ea28303e58058e3058d00dcf49e9e2fecac1e"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA={0x2c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x408000}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x4}]}, 0x1c8}, 0x1, 0x0, 0x0, 0x40}, 0x4000) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000000)={0x0, 'ip6_vti0\x00', {}, 0xd8}) 6.213344808s ago: executing program 1 (id=2121): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = mq_open(&(0x7f0000000000)='cgroup.controllers\x00', 0x40, 0x0, 0x0) dup3(r0, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x3) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000480), &(0x7f00000004c0)={'L+'}, 0x16, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x31, 0x0, &(0x7f0000000080)) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) sendmsg$netlink(r0, &(0x7f0000000240)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfe}, 0xc, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x4000004}, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) openat$tcp_mem(0xffffffffffffff9c, 0x0, 0x1, 0x0) dup(0xffffffffffffffff) write$cgroup_devices(r1, 0x0, 0x9) r3 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r3, &(0x7f0000000000)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5450, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 5.403655396s ago: executing program 0 (id=2122): mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x0, &(0x7f0000ffd000/0x1000)=nil) socket$netlink(0x10, 0x3, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x440, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x5451, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r2, 0x0, &(0x7f00000000c0)) timerfd_create(0x0, 0x0) syz_open_procfs$userns(0x0, &(0x7f0000000000)) openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder-control\x00', 0x0, 0x0) r3 = mq_open(&(0x7f0000000500)='wg1\x00', 0x40, 0x0, 0x0) r4 = memfd_create(&(0x7f0000000600)='\x00', 0x0) dup3(r4, r3, 0x0) fsync(r3) 4.900338064s ago: executing program 0 (id=2123): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x109100, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(0x0, r0) sendmsg$NL80211_CMD_ADD_TX_TS(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(r0, 0x0, 0x2000c0c0) syz_genetlink_get_family_id$smc(&(0x7f0000000580), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONNECT(r1, 0x0, 0x8000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000980), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_PMK(r1, &(0x7f0000000a80)={&(0x7f0000000940), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000}, 0x0) sendmsg$NL80211_CMD_NEW_MPATH(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x44) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, 0x0, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$NS_GET_USERNS(0xffffffffffffffff, 0xb701, 0x0) 3.490610219s ago: executing program 0 (id=2124): r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) dup3(r0, r1, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r2 = accept(r1, 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(r3, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept$inet6(0xffffffffffffffff, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/virtual', 0x80, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x8903, &(0x7f0000000080)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_CATATONIC(0xffffffffffffffff, 0x9362, 0x0) socket$unix(0x1, 0x2, 0x0) 3.07839858s ago: executing program 1 (id=2125): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000003300)={0x0, 0x0, &(0x7f00000032c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000410221"], 0x14}}, 0x0) recvmsg$inet_nvme(r1, &(0x7f0000005900)={&(0x7f0000003440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) sendmsg$nl_xfrm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 2.516948959s ago: executing program 1 (id=2126): ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000180)={{0xa, 0x1, 0x6, 0x10001, 'syz0\x00', 0x401}, 0x0, 0x2, 0xc9a, 0x0, 0x4, 0x101, 'syz1\x00', &(0x7f0000000140)=['/proc/slabinfo\x00', '4,(,[-,$\x00', '#!.(\x00', '\x00'], 0x1e}) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000800)='/proc/slabinfo\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r1 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) r2 = socket(0x10, 0x2, 0x0) getpeername$l2tp6(r2, 0x0, &(0x7f0000000080)) dup3(r1, r2, 0x80000) close(0xffffffffffffffff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r4) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f00000002c0)={0x0, 0x81, 0x3, 0x1}) r5 = dup(r3) r6 = accept$inet(r0, 0x0, &(0x7f0000000000)) ioctl$FS_IOC_FIEMAP(r6, 0xc020660b, &(0x7f0000000080)=ANY=[@ANYBLOB="08000000000000000500000000000000000000000002000001000000000008000000ffffffffffffff7f0002000000000400000000000000000000000000000000000000000000000204000000000000000000000000005d"]) r7 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r5, 0x4c80, r7) 2.516656089s ago: executing program 0 (id=2127): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) mremap(&(0x7f000016c000/0x4000)=nil, 0x4000, 0x40000000, 0x3, &(0x7f000063c000/0x3000)=nil) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000180)={&(0x7f0000934000/0x4000)=nil, 0x4000}) 1.724166083s ago: executing program 0 (id=2128): openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x5450) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, 0x0) accept4$inet6(r2, 0x0, 0x0, 0x0) listen(r2, 0x0) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, 0x0, 0x0) 1.399537927s ago: executing program 1 (id=2129): r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001180), 0x0, 0x0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000100), 0xe9, 0x480840) r3 = syz_open_dev$sndmidi(&(0x7f0000000140), 0x10000, 0x8898d93b69ee16bc) dup3(r1, r3, 0x0) fsync(r0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001180), 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f0000000180)) r5 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r6, 0x8982, &(0x7f00000001c0)={0x0, 'team_slave_1\x00', {}, 0x5}) dup3(r4, r5, 0x0) read$hiddev(r5, &(0x7f0000000040)=""/140, 0x8c) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r5, 0x40405514, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 'syz1\x00'}) r7 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) dup(r7) 623.430238ms ago: executing program 1 (id=2130): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f0000003300)={0x0, 0x0, &(0x7f00000032c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000410221"], 0x14}}, 0x0) recvmsg$inet_nvme(r1, &(0x7f0000005900)={&(0x7f0000003440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(0xffffffffffffffff, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) sendmsg$nl_xfrm(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 0s ago: executing program 1 (id=2131): r0 = socket(0x10, 0x803, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000480)={'vxcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f00000004c0)={0x1d, r2}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) recvmsg$can_bcm(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r3, &(0x7f0000001940)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r5], 0x20}}, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000700)) socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r6 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) clock_gettime(0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x80) kernel console output (not intermixed with test programs): audit(268.130:79): avc: denied { write } for pid=3283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 268.674856][ T30] audit: type=1400 audit(268.140:80): avc: denied { read } for pid=3283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 268.733901][ T3283] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 268.826531][ T3283] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 268.893966][ T3283] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 269.016970][ T3283] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 269.318296][ T3282] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 269.364568][ T3282] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 269.416820][ T3282] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 269.532005][ T3282] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 273.597184][ T3282] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.654445][ T3283] 8021q: adding VLAN 0 to HW filter on device bond0 [ 287.255256][ T3282] veth0_vlan: entered promiscuous mode [ 287.342838][ T3282] veth1_vlan: entered promiscuous mode [ 287.668392][ T3282] veth0_macvtap: entered promiscuous mode [ 287.784047][ T3283] veth0_vlan: entered promiscuous mode [ 287.816190][ T3282] veth1_macvtap: entered promiscuous mode [ 287.948160][ T3283] veth1_vlan: entered promiscuous mode [ 288.357498][ T3282] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.358837][ T3282] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.359281][ T3282] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.362880][ T3282] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 289.022482][ T3283] veth0_macvtap: entered promiscuous mode [ 289.068999][ T30] audit: type=1400 audit(288.550:81): avc: denied { mount } for pid=3282 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 289.102988][ T30] audit: type=1400 audit(288.580:82): avc: denied { mounton } for pid=3282 comm="syz-executor" path="/syzkaller.lWplRh/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 289.149337][ T30] audit: type=1400 audit(288.630:83): avc: denied { mount } for pid=3282 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 289.227303][ T3283] veth1_macvtap: entered promiscuous mode [ 289.348938][ T30] audit: type=1400 audit(288.830:84): avc: denied { unmount } for pid=3282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 289.452393][ T30] audit: type=1400 audit(288.930:85): avc: denied { mounton } for pid=3282 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1520 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 289.571620][ T30] audit: type=1400 audit(289.040:86): avc: denied { mount } for pid=3282 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 290.199238][ T3283] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 290.203414][ T3283] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 290.204068][ T3283] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 290.204497][ T3283] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 290.721174][ T30] audit: type=1400 audit(290.200:87): avc: denied { read write } for pid=3282 comm="syz-executor" name="loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 290.901919][ T30] audit: type=1400 audit(290.350:88): avc: denied { open } for pid=3282 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 290.927286][ T30] audit: type=1400 audit(290.390:89): avc: denied { ioctl } for pid=3282 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 291.717994][ T30] audit: type=1400 audit(291.190:90): avc: denied { prog_load } for pid=3418 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 294.356776][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 294.357034][ T30] audit: type=1400 audit(293.830:105): avc: denied { read write } for pid=3432 comm="syz.0.5" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 294.374752][ T30] audit: type=1400 audit(293.860:106): avc: denied { open } for pid=3432 comm="syz.0.5" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 294.522328][ T30] audit: type=1400 audit(293.990:107): avc: denied { mount } for pid=3432 comm="syz.0.5" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 297.367598][ T30] audit: type=1400 audit(296.850:108): avc: denied { unmount } for pid=3282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 298.925633][ T30] audit: type=1400 audit(298.410:109): avc: denied { create } for pid=3445 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 299.055618][ T30] audit: type=1400 audit(298.540:110): avc: denied { write } for pid=3445 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 299.748201][ T30] audit: type=1400 audit(299.230:111): avc: denied { read } for pid=3451 comm="syz.0.12" name="card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 299.772488][ T30] audit: type=1400 audit(299.240:112): avc: denied { open } for pid=3451 comm="syz.0.12" path="/dev/dri/card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 299.815045][ T30] audit: type=1400 audit(299.300:113): avc: denied { ioctl } for pid=3451 comm="syz.0.12" path="/dev/dri/card1" dev="devtmpfs" ino=620 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 301.411176][ T3459] serio: Serial port pts0 [ 302.252103][ T3463] serio: Serial port pts1 [ 305.021932][ T30] audit: type=1400 audit(304.500:114): avc: denied { create } for pid=3468 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 306.470697][ T30] audit: type=1400 audit(305.950:115): avc: denied { create } for pid=3473 comm="syz.0.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 307.688297][ T3476] Zero length message leads to an empty skb [ 318.708154][ T30] audit: type=1400 audit(318.190:116): avc: denied { map_create } for pid=3504 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 318.719023][ T30] audit: type=1400 audit(318.200:117): avc: denied { map_read map_write } for pid=3504 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 318.738258][ T30] audit: type=1400 audit(318.220:118): avc: denied { read write } for pid=3504 comm="syz.1.31" name="event0" dev="devtmpfs" ino=752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 318.761449][ T30] audit: type=1400 audit(318.220:119): avc: denied { open } for pid=3504 comm="syz.1.31" path="/dev/input/event0" dev="devtmpfs" ino=752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 319.382595][ T30] audit: type=1400 audit(318.860:120): avc: denied { mounton } for pid=3507 comm="syz.0.32" path="/20/file0" dev="tmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 319.413556][ T30] audit: type=1400 audit(318.870:121): avc: denied { ioctl } for pid=3504 comm="syz.1.31" path="/dev/input/event0" dev="devtmpfs" ino=752 ioctlcmd=0x4506 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 320.808479][ T30] audit: type=1400 audit(320.290:122): avc: denied { write } for pid=3510 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 325.538384][ T3530] serio: Serial port pts0 [ 327.881082][ T30] audit: type=1400 audit(327.350:123): avc: denied { create } for pid=3539 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 328.021880][ T30] audit: type=1400 audit(327.500:124): avc: denied { setopt } for pid=3539 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 328.066806][ T30] audit: type=1400 audit(327.550:125): avc: denied { connect } for pid=3539 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 328.120465][ T3542] serio: Serial port pts0 [ 328.588982][ T30] audit: type=1400 audit(328.070:126): avc: denied { write } for pid=3539 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 329.126690][ T30] audit: type=1400 audit(328.610:127): avc: denied { ioctl } for pid=3539 comm="syz.1.42" path="socket:[4278]" dev="sockfs" ino=4278 ioctlcmd=0x942c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 330.580921][ T30] audit: type=1400 audit(330.060:128): avc: denied { read write } for pid=3549 comm="syz.0.44" name="raw-gadget" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 330.582958][ T30] audit: type=1400 audit(330.060:129): avc: denied { open } for pid=3549 comm="syz.0.44" path="/dev/raw-gadget" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 330.584434][ T30] audit: type=1400 audit(330.070:130): avc: denied { ioctl } for pid=3549 comm="syz.0.44" path="/dev/raw-gadget" dev="devtmpfs" ino=706 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 330.983804][ T3067] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 331.202323][ T3067] usb 1-1: Using ep0 maxpacket: 16 [ 331.298847][ T3067] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0 [ 331.307236][ T3067] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 0 [ 331.311173][ T3067] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x8A has invalid wMaxPacketSize 0 [ 331.312221][ T3067] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x8A has invalid maxpacket 0 [ 331.343193][ C0] hrtimer: interrupt took 821056 ns [ 331.474188][ T3067] usb 1-1: New USB device found, idVendor=04e6, idProduct=0007, bcdDevice= 1.75 [ 331.475264][ T3067] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=5 [ 331.476721][ T3067] usb 1-1: SerialNumber: syz [ 331.786403][ T3067] usb-storage 1-1:1.0: USB Mass Storage device detected [ 331.963987][ T3067] usb-storage 1-1:1.0: Quirks match for vid 04e6 pid 0007: 1 [ 332.001987][ T3067] scsi host0: usb-storage 1-1:1.0 [ 332.343269][ T3067] usb 1-1: USB disconnect, device number 2 [ 332.534212][ T3558] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 332.682365][ T30] audit: type=1400 audit(332.140:131): avc: denied { name_bind } for pid=3557 comm="syz.0.46" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 332.684255][ T30] audit: type=1400 audit(332.150:132): avc: denied { node_bind } for pid=3557 comm="syz.0.46" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 333.996217][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 333.996414][ T30] audit: type=1400 audit(333.480:134): avc: denied { bind } for pid=3561 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 336.237217][ T3568] serio: Serial port pts0 [ 338.092517][ T30] audit: type=1400 audit(337.570:135): avc: denied { ioctl } for pid=3573 comm="syz.1.51" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 340.498071][ T30] audit: type=1400 audit(339.980:136): avc: denied { nlmsg_write } for pid=3580 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 340.524532][ T30] audit: type=1400 audit(340.010:137): avc: denied { create } for pid=3580 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 340.548858][ T30] audit: type=1400 audit(340.030:138): avc: denied { bind } for pid=3580 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 340.577482][ T30] audit: type=1400 audit(340.060:139): avc: denied { accept } for pid=3580 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 340.641134][ T30] audit: type=1400 audit(340.120:140): avc: denied { read } for pid=3580 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 341.813040][ T3585] serio: Serial port pts0 [ 343.134576][ T30] audit: type=1400 audit(342.620:141): avc: denied { execute } for pid=3589 comm="syz.1.56" path="/24/cgroup.controllers" dev="tmpfs" ino=148 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 347.016679][ T3604] ======================================================= [ 347.016679][ T3604] WARNING: The mand mount option has been deprecated and [ 347.016679][ T3604] and is ignored by this kernel. Remove the mand [ 347.016679][ T3604] option from the mount to silence this warning. [ 347.016679][ T3604] ======================================================= [ 347.152413][ T30] audit: type=1400 audit(346.640:142): avc: denied { unmount } for pid=3282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 348.058925][ T1282] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 348.684156][ T1282] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 349.133572][ T1282] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 349.573343][ T1282] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 350.593707][ T30] audit: type=1400 audit(350.070:143): avc: denied { read } for pid=3133 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 353.252678][ T3620] serio: Serial port pts0 [ 353.608962][ T1282] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 353.680813][ T1282] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 353.709534][ T1282] bond0 (unregistering): Released all slaves [ 354.181134][ T1282] hsr_slave_0: left promiscuous mode [ 354.214617][ T1282] hsr_slave_1: left promiscuous mode [ 354.421981][ T1282] veth1_macvtap: left promiscuous mode [ 354.425482][ T1282] veth0_macvtap: left promiscuous mode [ 354.428452][ T1282] veth1_vlan: left promiscuous mode [ 354.441630][ T1282] veth0_vlan: left promiscuous mode [ 356.624859][ T30] audit: type=1400 audit(356.100:144): avc: denied { map } for pid=3629 comm="syz.1.66" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5243 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 356.640495][ T30] audit: type=1400 audit(356.120:145): avc: denied { read write } for pid=3629 comm="syz.1.66" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5243 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 356.644173][ T30] audit: type=1400 audit(356.130:146): avc: denied { read } for pid=3088 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 356.645214][ T30] audit: type=1400 audit(356.130:147): avc: denied { append } for pid=3088 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 356.674656][ T30] audit: type=1400 audit(356.160:148): avc: denied { open } for pid=3088 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 356.684331][ T30] audit: type=1400 audit(356.170:149): avc: denied { getattr } for pid=3088 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 358.105061][ T3640] serio: Serial port pts0 [ 372.159429][ T3608] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 372.238503][ T3608] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 374.454034][ T3693] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 375.687836][ T30] audit: type=1400 audit(375.170:150): avc: denied { create } for pid=3694 comm="syz.1.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 376.485472][ T3608] hsr_slave_0: entered promiscuous mode [ 376.496914][ T3608] hsr_slave_1: entered promiscuous mode [ 376.510431][ T3608] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 376.511099][ T3608] Cannot create hsr debugfs directory [ 380.347169][ T3608] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 380.514283][ T3608] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 380.647148][ T3608] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 380.742382][ T3608] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 384.997356][ T3608] 8021q: adding VLAN 0 to HW filter on device bond0 [ 388.418280][ T3751] serio: Serial port pts0 [ 392.823398][ T3768] serio: Serial port pts0 [ 397.302845][ T30] audit: type=1400 audit(396.770:151): avc: denied { ioctl } for pid=3785 comm="syz.1.81" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5539 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 398.868333][ T30] audit: type=1400 audit(398.340:152): avc: denied { setopt } for pid=3792 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 399.475398][ T30] audit: type=1400 audit(398.960:153): avc: denied { read } for pid=3792 comm="syz.1.82" path="socket:[4645]" dev="sockfs" ino=4645 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 400.577134][ T30] audit: type=1400 audit(400.060:154): avc: denied { ioctl } for pid=3797 comm="syz.1.83" path="socket:[5558]" dev="sockfs" ino=5558 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 400.578907][ T30] audit: type=1400 audit(400.060:155): avc: denied { bind } for pid=3797 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 400.599032][ T30] audit: type=1400 audit(400.060:156): avc: denied { write } for pid=3797 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 404.093700][ T3608] veth0_vlan: entered promiscuous mode [ 404.228292][ T3608] veth1_vlan: entered promiscuous mode [ 404.927700][ T3608] veth0_macvtap: entered promiscuous mode [ 405.126343][ T3608] veth1_macvtap: entered promiscuous mode [ 405.707506][ T3608] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 405.708148][ T3608] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 405.708551][ T3608] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 405.708948][ T3608] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 406.271224][ T30] audit: type=1400 audit(405.750:157): avc: denied { mounton } for pid=3608 comm="syz-executor" path="/syzkaller.ApD1gc/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 406.306039][ T30] audit: type=1400 audit(405.790:158): avc: denied { mount } for pid=3608 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 406.462289][ T30] audit: type=1400 audit(405.940:159): avc: denied { mounton } for pid=3608 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1520 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 411.318641][ T30] audit: type=1400 audit(410.800:160): avc: denied { remount } for pid=3821 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 417.235290][ T30] audit: type=1400 audit(416.720:161): avc: denied { write } for pid=3830 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 417.843728][ T3834] loop7: detected capacity change from 0 to 16384 [ 419.805258][ T3834] I/O error, dev loop7, sector 6528 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 419.816438][ T3834] I/O error, dev loop7, sector 6528 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 419.818848][ T3834] Buffer I/O error on dev loop7, logical block 816, async page read [ 419.965605][ T3833] I/O error, dev loop7, sector 2560 op 0x1:(WRITE) flags 0x4800 phys_seg 128 prio class 0 [ 419.967703][ T3833] Buffer I/O error on dev loop7, logical block 320, lost async page write [ 419.984247][ T3833] Buffer I/O error on dev loop7, logical block 321, lost async page write [ 419.985679][ T3833] Buffer I/O error on dev loop7, logical block 322, lost async page write [ 420.002922][ T3833] Buffer I/O error on dev loop7, logical block 323, lost async page write [ 420.004540][ T3833] Buffer I/O error on dev loop7, logical block 324, lost async page write [ 420.005602][ T3833] Buffer I/O error on dev loop7, logical block 325, lost async page write [ 420.006680][ T3833] Buffer I/O error on dev loop7, logical block 326, lost async page write [ 420.007678][ T3833] Buffer I/O error on dev loop7, logical block 327, lost async page write [ 420.008710][ T3833] Buffer I/O error on dev loop7, logical block 328, lost async page write [ 420.224319][ T3833] I/O error, dev loop7, sector 3584 op 0x1:(WRITE) flags 0x4800 phys_seg 128 prio class 0 [ 420.561350][ T3833] I/O error, dev loop7, sector 4608 op 0x1:(WRITE) flags 0x4800 phys_seg 128 prio class 0 [ 420.837198][ T3833] I/O error, dev loop7, sector 5632 op 0x1:(WRITE) flags 0x800 phys_seg 112 prio class 0 [ 423.952222][ T3842] serio: Serial port pts0 [ 440.312006][ T30] audit: type=1400 audit(439.790:162): avc: denied { prog_run } for pid=3847 comm="syz.1.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 441.112724][ T30] audit: type=1400 audit(440.590:163): avc: denied { write } for pid=3851 comm="syz.1.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 441.135627][ T30] audit: type=1400 audit(440.620:164): avc: denied { read } for pid=3851 comm="syz.1.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 447.682808][ T30] audit: type=1400 audit(447.160:165): avc: denied { ioctl } for pid=3870 comm="syz.1.101" path="socket:[4865]" dev="sockfs" ino=4865 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 452.989337][ T3848] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 453.049410][ T3848] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 454.528818][ T30] audit: type=1400 audit(454.010:166): avc: denied { read } for pid=3887 comm="syz.1.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 455.093155][ T30] audit: type=1400 audit(454.560:167): avc: denied { connect } for pid=3887 comm="syz.1.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 462.843173][ T3848] hsr_slave_0: entered promiscuous mode [ 462.907304][ T3848] hsr_slave_1: entered promiscuous mode [ 462.953185][ T3848] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 462.954398][ T3848] Cannot create hsr debugfs directory [ 466.659082][ T3848] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 467.236515][ T3848] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 467.685011][ T3848] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 468.047678][ T3848] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 469.454208][ T3848] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 469.538672][ T3848] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 469.603353][ T3848] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 469.696490][ T3848] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 475.607170][ T3848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 479.063659][ T30] audit: type=1400 audit(478.540:168): avc: denied { getopt } for pid=3943 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 496.083114][ T3848] veth0_vlan: entered promiscuous mode [ 496.220990][ T3848] veth1_vlan: entered promiscuous mode [ 496.541847][ T3848] veth0_macvtap: entered promiscuous mode [ 496.693511][ T3848] veth1_macvtap: entered promiscuous mode [ 497.237606][ T3848] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 497.238252][ T3848] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 497.238638][ T3848] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 497.239010][ T3848] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 501.052859][ T30] audit: type=1400 audit(500.530:169): avc: denied { ioctl } for pid=3983 comm="syz.0.119" path="socket:[5057]" dev="sockfs" ino=5057 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 502.796502][ T30] audit: type=1400 audit(502.280:170): avc: denied { setopt } for pid=3983 comm="syz.0.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 505.770447][ T30] audit: type=1400 audit(505.190:171): avc: denied { connect } for pid=3993 comm="syz.0.122" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 511.655701][ T319] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 511.723498][ T319] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 511.791856][ T319] bond0 (unregistering): Released all slaves [ 512.152770][ T319] hsr_slave_0: left promiscuous mode [ 512.185387][ T319] hsr_slave_1: left promiscuous mode [ 512.367283][ T319] veth1_macvtap: left promiscuous mode [ 512.368272][ T319] veth0_macvtap: left promiscuous mode [ 512.369423][ T319] veth1_vlan: left promiscuous mode [ 512.371434][ T319] veth0_vlan: left promiscuous mode [ 513.687753][ T4004] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=4004 comm=syz.0.125 [ 520.222469][ T30] audit: type=1400 audit(519.690:172): avc: denied { mounton } for pid=4020 comm="syz.0.131" path="/12/file0" dev="tmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 526.745494][ T4035] serio: Serial port pts0 [ 537.483072][ T4009] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 537.541825][ T4009] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 539.331460][ T4059] serio: Serial port pts0 [ 543.355771][ T4009] hsr_slave_0: entered promiscuous mode [ 543.398327][ T4009] hsr_slave_1: entered promiscuous mode [ 543.415673][ T4009] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 543.416495][ T4009] Cannot create hsr debugfs directory [ 545.938588][ T4009] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 546.392828][ T4009] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 546.747175][ T4009] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 547.136209][ T4009] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 547.501715][ T30] audit: type=1400 audit(546.970:173): avc: denied { create } for pid=4077 comm="syz.0.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 548.282433][ T4009] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 548.326217][ T4009] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 548.415384][ T4009] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 548.506120][ T4009] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 553.622526][ T30] audit: type=1326 audit(553.090:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4083 comm="syz.0.140" exe="/syz-executor" sig=31 arch=c00000b7 syscall=172 compat=0 ip=0xffff9ff40f4c code=0x0 [ 554.128581][ T4009] 8021q: adding VLAN 0 to HW filter on device bond0 [ 557.795967][ T30] audit: type=1400 audit(557.280:175): avc: denied { watch } for pid=4094 comm="syz.0.141" path="/22" dev="tmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 559.274391][ T4101] serio: Serial port pts0 [ 566.934571][ T4127] serio: Serial port pts0 [ 575.309516][ T4009] veth0_vlan: entered promiscuous mode [ 575.679580][ T4009] veth1_vlan: entered promiscuous mode [ 576.213075][ T4009] veth0_macvtap: entered promiscuous mode [ 576.278608][ T4009] veth1_macvtap: entered promiscuous mode [ 576.577120][ T4009] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 576.578537][ T4009] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 576.579330][ T4009] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 576.588508][ T4009] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 583.522848][ T4149] serio: Serial port pts0 [ 592.663753][ T30] audit: type=1400 audit(592.130:176): avc: denied { create } for pid=4163 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 599.785184][ T4181] serio: Serial port pts1 [ 599.788480][ T4180] serio: Serial port pts0 [ 602.952906][ T4190] serio: Serial port pts0 [ 603.587316][ T319] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 603.641531][ T319] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 603.681529][ T319] bond0 (unregistering): Released all slaves [ 604.010981][ T319] hsr_slave_0: left promiscuous mode [ 604.035715][ T319] hsr_slave_1: left promiscuous mode [ 604.143362][ T319] veth1_macvtap: left promiscuous mode [ 604.144460][ T319] veth0_macvtap: left promiscuous mode [ 604.145519][ T319] veth1_vlan: left promiscuous mode [ 604.146501][ T319] veth0_vlan: left promiscuous mode [ 610.451645][ T4210] serio: Serial port pts0 [ 611.558609][ T4214] serio: Serial port pts1 [ 614.340891][ T4221] serio: Serial port pts0 [ 616.336481][ T30] audit: type=1400 audit(615.820:177): avc: denied { create } for pid=4229 comm="syz.1.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 616.421973][ T30] audit: type=1400 audit(615.900:178): avc: denied { setopt } for pid=4229 comm="syz.1.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 617.426537][ T30] audit: type=1400 audit(616.910:179): avc: denied { create } for pid=4231 comm="syz.1.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 617.466096][ T30] audit: type=1400 audit(616.950:180): avc: denied { ioctl } for pid=4231 comm="syz.1.170" path="socket:[6587]" dev="sockfs" ino=6587 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 631.535577][ T4285] serio: Serial port pts0 [ 632.773393][ T30] audit: type=1400 audit(632.240:181): avc: denied { bind } for pid=4289 comm="syz.1.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 632.784837][ T30] audit: type=1400 audit(632.270:182): avc: denied { setopt } for pid=4289 comm="syz.1.190" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 639.225906][ T30] audit: type=1400 audit(638.700:183): avc: denied { create } for pid=4303 comm="syz.0.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 639.264737][ T30] audit: type=1400 audit(638.730:184): avc: denied { write } for pid=4303 comm="syz.0.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 640.241764][ T30] audit: type=1400 audit(639.720:185): avc: denied { read write } for pid=4308 comm="syz.0.196" name="uhid" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 640.260758][ T30] audit: type=1400 audit(639.730:186): avc: denied { open } for pid=4308 comm="syz.0.196" path="/dev/uhid" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 640.442119][ T24] hid-generic FFFC:0000:0000.0001: unknown main item tag 0x0 [ 640.503529][ T24] hid-generic FFFC:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 644.095131][ T4322] serio: Serial port pts0 [ 645.920870][ T30] audit: type=1400 audit(645.400:187): avc: denied { read append } for pid=4328 comm="syz.1.203" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 645.927303][ T30] audit: type=1400 audit(645.410:188): avc: denied { ioctl open } for pid=4328 comm="syz.1.203" path="/dev/loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 645.992494][ T30] audit: type=1400 audit(645.460:189): avc: denied { create } for pid=4328 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 645.997953][ T30] audit: type=1400 audit(645.480:190): avc: denied { write } for pid=4328 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 646.054884][ T30] audit: type=1400 audit(645.540:191): avc: denied { read } for pid=4328 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 648.779235][ T30] audit: type=1400 audit(648.260:192): avc: denied { write } for pid=4336 comm="syz.1.206" name="netlink" dev="proc" ino=4026532635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 649.180996][ T30] audit: type=1400 audit(648.660:193): avc: denied { ioctl } for pid=4336 comm="syz.1.206" path="socket:[6779]" dev="sockfs" ino=6779 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 649.708227][ T30] audit: type=1400 audit(649.190:194): avc: denied { ioctl } for pid=4336 comm="syz.1.206" path="mnt:[4026532622]" dev="nsfs" ino=4026532622 ioctlcmd=0x940d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 650.161622][ T4344] serio: Serial port pts0 [ 652.306875][ T30] audit: type=1400 audit(651.790:195): avc: denied { create } for pid=4353 comm="syz.0.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 652.334424][ T30] audit: type=1400 audit(651.820:196): avc: denied { read } for pid=4353 comm="syz.0.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 654.207454][ T30] audit: type=1400 audit(653.690:197): avc: denied { read } for pid=4360 comm="syz.1.212" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 654.227972][ T30] audit: type=1400 audit(653.700:198): avc: denied { open } for pid=4360 comm="syz.1.212" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 654.255701][ T30] audit: type=1400 audit(653.740:199): avc: denied { ioctl } for pid=4360 comm="syz.1.212" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 654.298698][ T30] audit: type=1400 audit(653.780:200): avc: denied { set_context_mgr } for pid=4360 comm="syz.1.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 654.369011][ T30] audit: type=1400 audit(653.850:201): avc: denied { map } for pid=4360 comm="syz.1.212" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 654.963741][ T30] audit: type=1400 audit(654.450:202): avc: denied { call } for pid=4360 comm="syz.1.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 655.694784][ T4371] serio: Serial port pts0 [ 659.287534][ T4383] serio: Serial port pts0 [ 662.655426][ T4397] serio: Serial port pts0 [ 663.431378][ T4401] serio: Serial port pts1 [ 665.778683][ T4414] serio: Serial port pts0 [ 667.252983][ T4421] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4421 comm=syz.0.230 [ 669.982000][ T30] audit: type=1400 audit(669.450:203): avc: denied { mounton } for pid=4431 comm="syz.1.234" path="/48/file0" dev="tmpfs" ino=281 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 674.269104][ T4452] capability: warning: `syz.0.240' uses deprecated v2 capabilities in a way that may be insecure [ 674.322091][ T30] audit: type=1400 audit(673.800:204): avc: denied { mounton } for pid=4451 comm="syz.0.240" path="/proc/229/task" dev="proc" ino=6954 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 674.593879][ T30] audit: type=1400 audit(674.070:205): avc: denied { getopt } for pid=4453 comm="syz.1.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 676.865909][ T4464] serio: Serial port pts0 [ 676.912625][ T4465] serio: Serial port pts1 [ 679.782043][ T30] audit: type=1400 audit(679.240:206): avc: denied { mount } for pid=4472 comm="syz.0.247" name="/" dev="ramfs" ino=6985 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 681.633913][ T4483] serio: Serial port pts0 [ 682.604802][ T30] audit: type=1400 audit(682.090:207): avc: denied { write } for pid=4487 comm="syz.0.253" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 684.280897][ T30] audit: type=1400 audit(683.760:208): avc: denied { create } for pid=4493 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 684.300634][ T30] audit: type=1400 audit(683.780:209): avc: denied { write } for pid=4493 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 684.944995][ T4496] serio: Serial port pts0 [ 688.701678][ T30] audit: type=1400 audit(688.160:210): avc: denied { write } for pid=4501 comm="syz.1.257" path="socket:[7016]" dev="sockfs" ino=7016 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 691.344684][ T30] audit: type=1400 audit(690.830:211): avc: denied { connect } for pid=4509 comm="syz.1.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 692.021664][ T4512] serio: Serial port pts0 [ 696.885309][ T30] audit: type=1400 audit(696.360:212): avc: denied { name_bind } for pid=4516 comm="syz.1.261" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 696.922257][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::ffff:172.20.20.187]:2. Sending cookies. [ 699.754566][ T30] audit: type=1400 audit(699.240:213): avc: denied { read } for pid=4520 comm="syz.1.263" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 699.759308][ T30] audit: type=1400 audit(699.240:214): avc: denied { open } for pid=4520 comm="syz.1.263" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 699.773541][ T30] audit: type=1400 audit(699.250:215): avc: denied { ioctl } for pid=4520 comm="syz.1.263" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 704.831403][ T30] audit: type=1400 audit(704.310:216): avc: denied { read } for pid=4530 comm="syz.0.266" name="mice" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 704.841871][ T30] audit: type=1400 audit(704.320:217): avc: denied { open } for pid=4530 comm="syz.0.266" path="/dev/input/mice" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 704.907344][ T30] audit: type=1400 audit(704.390:218): avc: denied { write } for pid=4530 comm="syz.0.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 704.945886][ T30] audit: type=1400 audit(704.420:219): avc: denied { ioctl } for pid=4530 comm="syz.0.266" path="socket:[7991]" dev="sockfs" ino=7991 ioctlcmd=0x6430 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 708.624096][ T4542] serio: Serial port pts0 [ 712.088641][ T4555] serio: Serial port pts0 [ 712.422016][ T30] audit: type=1400 audit(711.900:220): avc: denied { ioctl } for pid=4556 comm="syz.1.274" path="socket:[8025]" dev="sockfs" ino=8025 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 716.312070][ T30] audit: type=1400 audit(715.790:221): avc: denied { ioctl } for pid=4571 comm="syz.0.279" path="socket:[8060]" dev="sockfs" ino=8060 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 719.965922][ T4577] serio: Serial port pts0 [ 728.912501][ T30] audit: type=1400 audit(728.380:222): avc: denied { read } for pid=4606 comm="syz.0.291" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 729.702822][ T4615] serio: Serial port pts0 [ 729.822103][ T4617] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4617 comm=syz.0.295 [ 730.154792][ T4619] serio: Serial port pts1 [ 732.557162][ T4632] serio: Serial port pts0 [ 736.326114][ T30] audit: type=1400 audit(735.810:223): avc: denied { create } for pid=4643 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 736.379072][ T30] audit: type=1400 audit(735.850:224): avc: denied { bind } for pid=4643 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 736.396574][ T30] audit: type=1400 audit(735.870:225): avc: denied { listen } for pid=4643 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 736.398101][ T30] audit: type=1400 audit(735.870:226): avc: denied { connect } for pid=4643 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 736.501383][ T30] audit: type=1400 audit(735.970:227): avc: denied { write } for pid=4643 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 739.073078][ T4659] serio: Serial port pts0 [ 742.650636][ T4676] serio: Serial port pts0 [ 744.807111][ T4684] serio: Serial port pts0 [ 748.867127][ T30] audit: type=1400 audit(748.350:228): avc: denied { listen } for pid=4695 comm="syz.1.319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 749.317895][ T4701] serio: Serial port pts0 [ 750.885618][ T30] audit: type=1400 audit(750.370:229): avc: denied { read write } for pid=4706 comm="syz.1.321" name="vhost-net" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 750.886806][ T30] audit: type=1400 audit(750.370:230): avc: denied { open } for pid=4706 comm="syz.1.321" path="/dev/vhost-net" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 753.808158][ T4721] serio: Serial port pts0 [ 755.203438][ T4728] serio: Serial port pts1 [ 760.164102][ T4748] serio: Serial port pts0 [ 770.088130][ T4785] serio: Serial port pts0 [ 773.038167][ T4794] serio: Serial port pts0 [ 773.045047][ T4795] serio: Serial port pts1 [ 778.840477][ T30] audit: type=1400 audit(778.320:231): avc: denied { name_bind } for pid=4819 comm="syz.0.357" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 779.331830][ T30] audit: type=1400 audit(778.810:232): avc: denied { write } for pid=4817 comm="syz.1.356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 781.421666][ T4830] serio: Serial port pts0 [ 781.498878][ T4832] serio: Serial port pts1 [ 784.628363][ T4848] serio: Serial port pts0 [ 786.701119][ T30] audit: type=1400 audit(786.180:233): avc: denied { ioctl } for pid=4853 comm="syz.0.367" path="socket:[8506]" dev="sockfs" ino=8506 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 788.471515][ T30] audit: type=1400 audit(787.940:234): avc: denied { connect } for pid=4857 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 790.686112][ T4868] serio: Serial port pts0 [ 791.416622][ T4871] serio: Serial port pts1 [ 795.259310][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 800.886556][ T30] audit: type=1400 audit(800.370:235): avc: denied { read } for pid=4907 comm="syz.1.383" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 800.888938][ T30] audit: type=1400 audit(800.370:236): avc: denied { open } for pid=4907 comm="syz.1.383" path="/120/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 806.922949][ T30] audit: type=1400 audit(806.400:237): avc: denied { write } for pid=4938 comm="syz.1.394" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 809.974635][ T4953] serio: Serial port pts0 [ 824.624591][ T4986] serio: Serial port pts0 [ 832.828173][ T30] audit: type=1400 audit(832.310:238): avc: denied { getopt } for pid=5001 comm="syz.1.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 834.601263][ T5010] serio: Serial port pts0 [ 840.087229][ T30] audit: type=1400 audit(839.560:239): avc: denied { setopt } for pid=5023 comm="syz.1.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 840.637851][ T5026] netlink: 4 bytes leftover after parsing attributes in process `syz.1.420'. [ 840.771881][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.773599][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.774175][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.775436][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.775814][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.776579][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.776991][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.777687][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.778105][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.778884][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.779244][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.780971][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.781477][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.782196][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.782592][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.783270][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.783671][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.784396][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.784825][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.785778][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.786226][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.786900][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.787332][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.788056][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.788478][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.789182][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.789676][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.791231][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.791778][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.792771][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.793285][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.794021][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.794513][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.795188][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.795601][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.796361][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.796782][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.797447][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.797874][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.798638][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.799079][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.800493][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.801012][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.802121][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.802721][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.803481][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.804026][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.804718][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.805165][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.805856][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.806327][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.807099][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.807572][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.808392][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.808872][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.810214][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.810787][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.811614][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.812148][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.813159][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.813627][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.814429][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.814916][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.815600][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.816062][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 840.816730][ C0] vxcan1: j1939_xtp_rx_dat: no tx connection found [ 840.817173][ C0] vxcan1: j1939_xtp_rx_dat: no rx connection found [ 874.062714][ T30] audit: type=1400 audit(873.540:240): avc: denied { connect } for pid=5087 comm="syz.1.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 882.706047][ T5119] serio: Serial port pts0 [ 894.916121][ T5161] serio: Serial port pts0 [ 903.328313][ T30] audit: type=1400 audit(902.780:241): avc: denied { setattr } for pid=5175 comm="syz.1.467" name="RAW" dev="sockfs" ino=10111 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 904.996351][ C0] vxcan0: j1939_xtp_rx_dat: no tx connection found [ 904.998364][ C0] vxcan0: j1939_xtp_rx_dat: no tx connection found [ 905.751646][ C0] vxcan0: j1939_tp_rxtimer: 0xffff0000188f1800: rx timeout, send abort [ 906.256751][ C0] vxcan0: j1939_tp_rxtimer: 0xffff0000188f1800: abort rx timeout. Force session deactivation [ 906.475628][ T5187] No control pipe specified [ 908.586054][ T5197] serio: Serial port pts0 [ 911.501787][ T5211] serio: Serial port pts0 [ 913.678443][ T5219] serio: Serial port pts0 [ 917.011273][ T5233] serio: Serial port pts0 [ 919.774414][ T5238] serio: Serial port pts0 [ 923.682796][ T5251] serio: Serial port pts0 [ 929.917698][ T5273] serio: Serial port pts0 [ 932.887440][ T5289] serio: Serial port pts0 [ 935.765123][ T30] audit: type=1400 audit(935.250:242): avc: denied { open } for pid=5297 comm="syz.1.502" path="/dev/ptyq7" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 943.518485][ T5313] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=5313 comm=syz.1.507 [ 943.577369][ T5313] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=33898 sclass=netlink_route_socket pid=5313 comm=syz.1.507 [ 944.015234][ T5315] serio: Serial port pts0 [ 945.669201][ T30] audit: type=1400 audit(945.150:243): avc: denied { setattr } for pid=5318 comm="syz.0.509" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 953.203541][ T30] audit: type=1400 audit(952.690:244): avc: denied { write } for pid=5340 comm="syz.0.514" path="socket:[11335]" dev="sockfs" ino=11335 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 953.459450][ T5344] serio: Serial port pts0 [ 955.887598][ T5353] serio: Serial port pts0 [ 957.016529][ T5358] serio: Serial port pts1 [ 967.034782][ T5322] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 967.352648][ T5322] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 967.544189][ T5322] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 967.767613][ T5322] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 972.019339][ T5322] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 972.097391][ T5322] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 972.148419][ T5322] bond0 (unregistering): Released all slaves [ 972.714895][ T5322] hsr_slave_0: left promiscuous mode [ 972.741674][ T5322] hsr_slave_1: left promiscuous mode [ 972.896416][ T5322] veth1_macvtap: left promiscuous mode [ 972.897964][ T5322] veth0_macvtap: left promiscuous mode [ 972.907216][ T5322] veth1_vlan: left promiscuous mode [ 972.908701][ T5322] veth0_vlan: left promiscuous mode [ 975.403577][ T5407] serio: Serial port pts0 [ 988.226950][ T5392] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 988.293781][ T5392] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 993.566658][ T5392] hsr_slave_0: entered promiscuous mode [ 993.594755][ T5392] hsr_slave_1: entered promiscuous mode [ 999.345538][ T5392] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 999.487973][ T5392] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 999.616366][ T5392] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 999.735355][ T5392] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1005.297978][ T5392] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1007.845836][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 1008.571250][ T5532] serio: Serial port pts0 [ 1019.167193][ T5569] serio: Serial port pts0 [ 1022.282513][ T5584] serio: Serial port pts0 [ 1022.537918][ T5392] veth0_vlan: entered promiscuous mode [ 1022.614004][ T5392] veth1_vlan: entered promiscuous mode [ 1023.113783][ T5392] veth0_macvtap: entered promiscuous mode [ 1023.156145][ T5392] veth1_macvtap: entered promiscuous mode [ 1023.521345][ T5392] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1023.522027][ T5392] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1023.522586][ T5392] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1023.523107][ T5392] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1029.054667][ T30] audit: type=1400 audit(1028.540:245): avc: denied { create } for pid=5600 comm="syz.1.558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1032.206492][ T30] audit: type=1400 audit(1031.690:246): avc: denied { listen } for pid=5610 comm="syz.1.562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1042.187394][ T5657] serio: Serial port pts0 [ 1049.962364][ T5694] serio: Serial port pts0 [ 1054.058373][ T1282] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1054.361334][ T30] audit: type=1400 audit(1053.830:247): avc: denied { write } for pid=5715 comm="syz.1.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1054.387193][ T1282] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1054.712835][ T1282] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1055.153655][ T1282] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1055.412478][ T5720] serio: Serial port pts0 [ 1059.484228][ T1282] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1059.567887][ T1282] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1059.626592][ T30] audit: type=1400 audit(1059.110:248): avc: denied { remove_name } for pid=3088 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1059.635807][ T1282] bond0 (unregistering): Released all slaves [ 1059.639373][ T30] audit: type=1400 audit(1059.110:249): avc: denied { rename } for pid=3088 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1059.666026][ T30] audit: type=1400 audit(1059.150:250): avc: denied { create } for pid=3088 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1060.158893][ T1282] hsr_slave_0: left promiscuous mode [ 1060.211723][ T1282] hsr_slave_1: left promiscuous mode [ 1060.306909][ T1282] veth1_macvtap: left promiscuous mode [ 1060.307798][ T1282] veth0_macvtap: left promiscuous mode [ 1060.308957][ T1282] veth1_vlan: left promiscuous mode [ 1060.315209][ T1282] veth0_vlan: left promiscuous mode [ 1063.138298][ T5747] serio: Serial port pts0 [ 1073.451717][ T5717] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1073.497281][ T5717] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1075.601223][ T5797] serio: Serial port pts0 [ 1080.737760][ T5717] hsr_slave_0: entered promiscuous mode [ 1080.793320][ T5717] hsr_slave_1: entered promiscuous mode [ 1086.357611][ T5717] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1086.479029][ T5717] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1086.543228][ T5717] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1086.591662][ T5717] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1090.895771][ T5717] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1092.815474][ T5861] serio: Serial port pts0 [ 1107.688534][ T5717] veth0_vlan: entered promiscuous mode [ 1107.793562][ T5717] veth1_vlan: entered promiscuous mode [ 1108.216996][ T5717] veth0_macvtap: entered promiscuous mode [ 1108.287410][ T5717] veth1_macvtap: entered promiscuous mode [ 1108.657151][ T5717] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1108.657832][ T5717] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1108.658353][ T5717] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1108.658885][ T5717] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1108.746546][ T5929] serio: Serial port pts0 [ 1111.334532][ T30] audit: type=1400 audit(1110.820:251): avc: denied { block_suspend } for pid=5940 comm="syz.1.628" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1111.483205][ T30] audit: type=1400 audit(1110.960:252): avc: denied { module_load } for pid=5940 comm="syz.1.628" path="/sys/power/wakeup_count" dev="sysfs" ino=845 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 1111.984583][ T30] audit: type=1400 audit(1111.460:253): avc: denied { create } for pid=5944 comm="syz.0.629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1111.990912][ T30] audit: type=1400 audit(1111.470:254): avc: denied { write } for pid=5944 comm="syz.0.629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1113.072207][ T5952] serio: Serial port pts0 [ 1113.573280][ T5954] serio: Serial port pts1 [ 1115.331810][ T30] audit: type=1400 audit(1114.810:255): avc: denied { ioctl } for pid=5960 comm="syz.1.633" path="socket:[13409]" dev="sockfs" ino=13409 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1116.093882][ T30] audit: type=1400 audit(1115.580:256): avc: denied { ioctl } for pid=5963 comm="syz.1.634" path="/dev/fb0" dev="devtmpfs" ino=621 ioctlcmd=0xf503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1116.363540][ T5966] serio: Serial port pts0 [ 1120.973133][ T5990] serio: Serial port pts0 [ 1128.905439][ T6018] syz.0.650 uses obsolete (PF_INET,SOCK_PACKET) [ 1135.342032][ T6048] serio: Serial port pts0 [ 1136.004347][ T6051] serio: Serial port pts1 [ 1138.873571][ T30] audit: type=1400 audit(1138.340:257): avc: denied { mount } for pid=6057 comm="syz.1.663" name="/" dev="configfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1139.231763][ T6062] serio: Serial port pts0 [ 1141.731130][ T6072] serio: Serial port pts0 [ 1143.387799][ T6079] serio: Serial port pts1 [ 1144.004608][ T6084] serio: Serial port pts0 [ 1158.946186][ T6116] serio: Serial port pts0 [ 1160.220964][ T6123] serio: Serial port pts1 [ 1165.773665][ T6146] serio: Serial port pts0 [ 1176.924124][ T6153] serio: Serial port pts0 [ 1179.060876][ T6158] serio: Serial port pts0 [ 1196.282024][ T30] audit: type=1400 audit(1195.760:258): avc: denied { accept } for pid=6172 comm="syz.1.694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1198.351050][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1199.181727][ T6184] serio: Serial port pts0 [ 1205.179269][ T6163] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1205.237537][ T6163] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1209.665282][ T6225] 1324Ȭx: entered promiscuous mode [ 1209.666643][ T6225] 1324Ȭx: entered allmulticast mode [ 1215.784005][ T6163] hsr_slave_0: entered promiscuous mode [ 1215.801505][ T6163] hsr_slave_1: entered promiscuous mode [ 1215.814218][ T6163] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1215.814965][ T6163] Cannot create hsr debugfs directory [ 1217.251949][ T6163] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1217.458202][ T6163] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1217.813881][ T6163] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1218.315173][ T6163] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1219.223248][ T6163] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1219.298972][ T6163] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1219.327708][ T6163] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1219.353072][ T6163] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1223.504818][ T6163] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1225.052384][ T30] audit: type=1400 audit(1224.530:259): avc: denied { read } for pid=6253 comm="syz.1.711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1228.262545][ T6265] serio: Serial port pts0 [ 1230.765215][ T6275] serio: Serial port pts0 [ 1236.241320][ T6299] serio: Serial port pts0 [ 1237.649269][ T6163] veth0_vlan: entered promiscuous mode [ 1237.733322][ T6163] veth1_vlan: entered promiscuous mode [ 1239.322430][ T5740] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1239.365334][ T5740] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1239.402743][ T5740] bond0 (unregistering): Released all slaves [ 1239.951792][ T5740] hsr_slave_0: left promiscuous mode [ 1239.996522][ T5740] hsr_slave_1: left promiscuous mode [ 1240.125206][ T5740] veth1_macvtap: left promiscuous mode [ 1240.126181][ T5740] veth0_macvtap: left promiscuous mode [ 1240.127236][ T5740] veth1_vlan: left promiscuous mode [ 1240.128067][ T5740] veth0_vlan: left promiscuous mode [ 1241.020865][ T30] audit: type=1400 audit(1240.500:260): avc: denied { bind } for pid=6315 comm="syz.1.722" lport=132 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1241.023268][ T30] audit: type=1400 audit(1240.510:261): avc: denied { node_bind } for pid=6315 comm="syz.1.722" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1245.933411][ T6163] veth0_macvtap: entered promiscuous mode [ 1246.057744][ T6163] veth1_macvtap: entered promiscuous mode [ 1246.521050][ T6163] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1246.522101][ T6163] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1246.522841][ T6163] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1246.523593][ T6163] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1247.122188][ T30] audit: type=1400 audit(1246.600:262): avc: denied { unmount } for pid=6163 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1248.114982][ T6327] serio: Serial port pts0 [ 1249.039419][ T30] audit: type=1400 audit(1248.510:263): avc: denied { read } for pid=6330 comm="syz.1.726" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1249.045897][ T30] audit: type=1400 audit(1248.510:264): avc: denied { open } for pid=6330 comm="syz.1.726" path="net:[4026532631]" dev="nsfs" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1250.241028][ T6338] serio: Serial port pts0 [ 1252.650611][ T6349] serio: Serial port pts0 [ 1255.257584][ T6358] serio: Serial port pts0 [ 1256.257651][ T6362] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6362 comm=syz.1.735 [ 1257.773461][ T4430] usb 1-1: new full-speed USB device number 3 using dummy_hcd [ 1258.539355][ T4430] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 1258.540749][ T4430] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1258.541521][ T4430] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 10 [ 1258.542008][ T4430] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 1258.542892][ T4430] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 1258.544345][ T4430] usb 1-1: New USB device found, idVendor=1b96, idProduct=000a, bcdDevice= 0.00 [ 1258.544966][ T4430] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1258.585094][ T4430] usb 1-1: config 0 descriptor?? [ 1259.502069][ T4430] hid-generic 0003:1B96:000A.0002: hidraw0: USB HID v0.00 Device [HID 1b96:000a] on usb-dummy_hcd.0-1/input0 [ 1260.661791][ T30] audit: type=1400 audit(1260.140:265): avc: denied { write } for pid=6371 comm="syz.0.738" path="/dev/hidraw0" dev="devtmpfs" ino=1535 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1260.936144][ T3417] usb 1-1: reset full-speed USB device number 3 using dummy_hcd [ 1261.983144][ T4402] usb 1-1: USB disconnect, device number 3 [ 1262.115064][ T6383] serio: Serial port pts0 [ 1267.507482][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1269.063397][ T5589] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 1269.365099][ T5589] usb 2-1: config 1 interface 0 altsetting 6 endpoint 0x81 has invalid maxpacket 1648, setting to 1024 [ 1269.366698][ T5589] usb 2-1: config 1 interface 0 altsetting 6 bulk endpoint 0x82 has invalid maxpacket 16 [ 1269.367622][ T5589] usb 2-1: config 1 interface 0 altsetting 6 has 3 endpoint descriptors, different from the interface descriptor's value: 2 [ 1269.368651][ T5589] usb 2-1: config 1 interface 0 has no altsetting 0 [ 1269.436863][ T5589] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1269.438059][ T5589] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1269.439081][ T5589] usb 2-1: Product: Ь [ 1269.440663][ T5589] usb 2-1: Manufacturer:  [ 1269.441372][ T5589] usb 2-1: SerialNumber: 혅ɽȦੈ捧㐼첈椔䪠ᳩ镜縏뼸춠⯧䔃俨᳹౭黊鸽쵙끈둧폷୒壣掔᾿淉㧺㥯ⁿ윫覺쐜⮓繎㰗皍蔜馌秮皛峻괬媬霠싿擯靱芶頜臒㳓ꢜ剐᝟䚹慊㲯䭃迧⭞ힶ蟎ⵒ㙝Ảං鹚ӧ꫎䤫ⲩ렻躙ⅇ✟淿短疝뢤夶摺︀魒期蔷橰뇕왛殐㛽ꮁ땹 [ 1269.512202][ T6413] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1269.537238][ T6413] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1269.538407][ T6413] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1270.062297][ T5589] cdc_ether 2-1:1.0: probe with driver cdc_ether failed with error -22 [ 1270.361370][ T5589] usb 2-1: USB disconnect, device number 2 [ 1273.944412][ T6430] serio: Serial port pts0 [ 1280.964306][ T30] audit: type=1400 audit(1280.440:266): avc: denied { read write } for pid=6437 comm="syz.1.758" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1280.966352][ T30] audit: type=1400 audit(1280.440:267): avc: denied { open } for pid=6437 comm="syz.1.758" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1281.041352][ T30] audit: type=1400 audit(1280.520:268): avc: denied { ioctl } for pid=6437 comm="syz.1.758" path="/dev/usbmon0" dev="devtmpfs" ino=697 ioctlcmd=0x9206 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1283.588838][ T6444] serio: Serial port pts1 [ 1286.152252][ T30] audit: type=1400 audit(1285.640:269): avc: denied { write } for pid=6448 comm="syz.1.761" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1292.629218][ C0] vkms_vblank_simulate: vblank timer overrun [ 1298.850662][ T30] audit: type=1400 audit(1298.310:270): avc: denied { ioctl } for pid=6469 comm="syz.1.769" path="socket:[14281]" dev="sockfs" ino=14281 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1299.041440][ T30] audit: type=1400 audit(1298.510:271): avc: denied { setattr } for pid=6469 comm="syz.1.769" name="KEY" dev="sockfs" ino=14284 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1299.118425][ T30] audit: type=1400 audit(1298.600:272): avc: denied { accept } for pid=6469 comm="syz.1.769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1305.068157][ T30] audit: type=1400 audit(1304.550:273): avc: denied { bind } for pid=6475 comm="syz.1.771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1332.467133][ T6527] serio: Serial port pts0 [ 1336.129428][ T6500] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1336.196873][ T6500] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1344.555404][ T6500] hsr_slave_0: entered promiscuous mode [ 1344.625527][ T6500] hsr_slave_1: entered promiscuous mode [ 1346.779257][ T6500] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1347.192251][ T6500] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1347.603605][ T6500] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1348.001441][ T6570] serio: Serial port pts0 [ 1348.157457][ T6500] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1349.294416][ T6500] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1349.351275][ T6500] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1349.409106][ T6500] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1349.452502][ T6500] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1352.795543][ T6583] syzkaller0: entered promiscuous mode [ 1352.796756][ T6583] syzkaller0: entered allmulticast mode [ 1352.901574][ T30] audit: type=1400 audit(1352.380:274): avc: denied { relabelfrom } for pid=6582 comm="syz.1.793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1352.903456][ T30] audit: type=1400 audit(1352.380:275): avc: denied { relabelto } for pid=6582 comm="syz.1.793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1352.959213][ T6583] syzkaller0: create flow: hash 827527731 index 1 [ 1353.590524][ T6582] syzkaller0: delete flow: hash 827527731 index 1 [ 1360.207792][ T6500] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1364.280528][ T6602] serio: Serial port pts0 [ 1381.133602][ T6500] veth0_vlan: entered promiscuous mode [ 1381.252713][ T6500] veth1_vlan: entered promiscuous mode [ 1381.823444][ T6500] veth0_macvtap: entered promiscuous mode [ 1381.883577][ T6500] veth1_macvtap: entered promiscuous mode [ 1382.239027][ T6500] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1382.259398][ T6500] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1382.264037][ T6500] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1382.264503][ T6500] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1390.180497][ T1282] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1390.258387][ T1282] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1390.312228][ T1282] bond0 (unregistering): Released all slaves [ 1390.845606][ T1282] hsr_slave_0: left promiscuous mode [ 1390.923539][ T1282] hsr_slave_1: left promiscuous mode [ 1391.082259][ T1282] veth1_macvtap: left promiscuous mode [ 1391.083084][ T1282] veth0_macvtap: left promiscuous mode [ 1391.084184][ T1282] veth1_vlan: left promiscuous mode [ 1391.084991][ T1282] veth0_vlan: left promiscuous mode [ 1397.384132][ T6693] serio: Serial port pts0 [ 1401.855081][ T6716] serio: Serial port pts0 [ 1402.489054][ T6719] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1402.826377][ T6719] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1403.149139][ T6719] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1403.504147][ T6719] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1404.172733][ T6719] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1404.258976][ T6719] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1404.398651][ T6719] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1404.752196][ T6719] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1407.713645][ T6744] netlink: 4 bytes leftover after parsing attributes in process `syz.1.834'. [ 1407.982579][ T30] audit: type=1400 audit(1407.460:276): avc: denied { getopt } for pid=6745 comm="syz.0.835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1411.763741][ T30] audit: type=1400 audit(1411.240:277): avc: denied { rename } for pid=6758 comm="syz.1.838" name="file1" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1412.234292][ T6766] serio: Serial port pts0 [ 1418.655998][ T6800] serio: Serial port pts0 [ 1419.040468][ T6803] serio: Serial port pts1 [ 1423.283816][ T30] audit: type=1400 audit(1422.770:278): avc: denied { read } for pid=6817 comm="syz.0.854" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1423.285079][ T30] audit: type=1400 audit(1422.770:279): avc: denied { open } for pid=6817 comm="syz.0.854" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1424.167040][ T6825] serio: Serial port pts0 [ 1425.056604][ T6831] serio: Serial port pts1 [ 1426.268702][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1426.852333][ T6839] serio: Serial port pts0 [ 1434.505817][ T6856] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1547 sclass=netlink_route_socket pid=6856 comm=syz.1.865 [ 1436.054074][ T30] audit: type=1400 audit(1435.530:280): avc: denied { accept } for pid=6862 comm="syz.1.868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 1437.887889][ T6875] serio: Serial port pts0 [ 1441.951440][ T6888] fuse: root generation should be zero [ 1446.178308][ T30] audit: type=1400 audit(1445.660:281): avc: denied { read } for pid=6901 comm="syz.0.879" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 1446.182146][ T30] audit: type=1400 audit(1445.660:282): avc: denied { open } for pid=6901 comm="syz.0.879" path="/32/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 1446.906927][ T30] audit: type=1400 audit(1446.380:283): avc: denied { ioctl } for pid=6907 comm="syz.0.881" path="uts:[4026532736]" dev="nsfs" ino=4026532736 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1448.852137][ T6917] binder: 6915:6917 ioctl c0306201 0 returned -14 [ 1451.590994][ T6927] serio: Serial port pts0 [ 1464.413539][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1464.901554][ T30] audit: type=1400 audit(1464.380:284): avc: denied { create } for pid=6982 comm="syz.0.905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1464.938564][ T30] audit: type=1400 audit(1464.420:285): avc: denied { ioctl } for pid=6982 comm="syz.0.905" path="socket:[16947]" dev="sockfs" ino=16947 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1480.744269][ T7023] could not allocate digest TFM handle mcryptd(mcryptd(wp512-generic)) [ 1485.810698][ T30] audit: type=1400 audit(1485.280:286): avc: denied { getopt } for pid=7039 comm="syz.0.922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1485.818615][ T30] audit: type=1400 audit(1485.300:287): avc: denied { create } for pid=7039 comm="syz.0.922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1485.838236][ T30] audit: type=1400 audit(1485.320:288): avc: denied { write } for pid=7039 comm="syz.0.922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1485.850976][ T30] audit: type=1400 audit(1485.330:289): avc: denied { connect } for pid=7039 comm="syz.0.922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1485.892911][ T30] audit: type=1400 audit(1485.370:290): avc: denied { ioctl } for pid=7039 comm="syz.0.922" path="socket:[17039]" dev="sockfs" ino=17039 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1485.974228][ T30] audit: type=1400 audit(1485.460:291): avc: denied { getopt } for pid=7039 comm="syz.0.922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1488.920780][ T30] audit: type=1400 audit(1488.390:292): avc: denied { ioctl } for pid=7046 comm="syz.0.925" path="socket:[17070]" dev="sockfs" ino=17070 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1499.056647][ T30] audit: type=1400 audit(1498.540:293): avc: denied { read } for pid=7084 comm="syz.0.937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1504.262881][ T30] audit: type=1400 audit(1503.750:294): avc: denied { create } for pid=7107 comm="syz.1.943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1504.284268][ T30] audit: type=1400 audit(1503.760:295): avc: denied { write } for pid=7107 comm="syz.1.943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1515.707095][ T7146] serio: Serial port pts0 [ 1517.759216][ T30] audit: type=1400 audit(1517.230:296): avc: denied { ioctl } for pid=7153 comm="syz.0.957" path="socket:[17424]" dev="sockfs" ino=17424 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1518.554322][ T7158] serio: Serial port pts0 [ 1523.537721][ T7177] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=381 sclass=netlink_route_socket pid=7177 comm=syz.1.964 [ 1530.418852][ T7204] pimreg: entered allmulticast mode [ 1536.598404][ T30] audit: type=1400 audit(1536.080:297): avc: denied { ioctl } for pid=7230 comm="syz.0.982" path="socket:[17576]" dev="sockfs" ino=17576 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1539.893436][ T30] audit: type=1400 audit(1539.380:298): avc: denied { create } for pid=7253 comm="syz.0.988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1539.956488][ T30] audit: type=1400 audit(1539.430:299): avc: denied { write } for pid=7253 comm="syz.0.988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1540.328605][ T7256] serio: Serial port pts0 [ 1542.356271][ T30] audit: type=1400 audit(1541.840:300): avc: denied { ioctl } for pid=7268 comm="syz.0.992" path="socket:[18459]" dev="sockfs" ino=18459 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1547.482087][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1547.945665][ T30] audit: type=1400 audit(1547.410:301): avc: denied { ioctl } for pid=7299 comm="syz.1.1003" path="socket:[18503]" dev="sockfs" ino=18503 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1548.639306][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 1549.916544][ T30] audit: type=1400 audit(1549.400:302): avc: denied { getopt } for pid=7307 comm="syz.1.1006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1551.901328][ T30] audit: type=1400 audit(1551.370:303): avc: denied { ioctl } for pid=7320 comm="syz.1.1011" path="socket:[17752]" dev="sockfs" ino=17752 ioctlcmd=0x9411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1556.716296][ T30] audit: type=1400 audit(1556.200:304): avc: denied { ioctl } for pid=7340 comm="syz.0.1018" path="/dev/vhost-net" dev="devtmpfs" ino=718 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1581.922266][ T30] audit: type=1400 audit(1581.400:305): avc: denied { setopt } for pid=7386 comm="syz.0.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1581.923974][ T30] audit: type=1400 audit(1581.400:306): avc: denied { bind } for pid=7386 comm="syz.0.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1581.925374][ T30] audit: type=1400 audit(1581.410:307): avc: denied { name_bind } for pid=7386 comm="syz.0.1032" src=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 1581.926695][ T30] audit: type=1400 audit(1581.410:308): avc: denied { node_bind } for pid=7386 comm="syz.0.1032" src=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 1588.121694][ T30] audit: type=1400 audit(1587.590:309): avc: denied { mounton } for pid=7408 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1589.665662][ T7414] IPv6: sit1: Disabled Multicast RS [ 1593.691398][ T30] audit: type=1400 audit(1593.160:310): avc: denied { setattr } for pid=7428 comm="syz.0.1044" name="rfkill" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:wireless_device_t tclass=chr_file permissive=1 [ 1600.192945][ T7408] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1600.234048][ T7408] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1605.311384][ T7408] hsr_slave_0: entered promiscuous mode [ 1605.318710][ T7408] hsr_slave_1: entered promiscuous mode [ 1605.329255][ T7408] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1605.330851][ T7408] Cannot create hsr debugfs directory [ 1606.805735][ T7408] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1607.234540][ T7408] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1607.573955][ T7408] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1608.152983][ T7408] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1609.286333][ T7408] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1609.366237][ T7408] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1609.447262][ T7408] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1609.512279][ T7408] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1615.158951][ T7408] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1624.474540][ C0] vkms_vblank_simulate: vblank timer overrun [ 1636.412571][ T7408] veth0_vlan: entered promiscuous mode [ 1636.606386][ T7408] veth1_vlan: entered promiscuous mode [ 1637.085266][ T7408] veth0_macvtap: entered promiscuous mode [ 1637.134930][ T7408] veth1_macvtap: entered promiscuous mode [ 1637.918759][ T7408] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1637.919380][ T7408] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1637.925540][ T7408] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1637.926030][ T7408] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.299315][ T7551] serio: Serial port pts0 [ 1643.523143][ T30] audit: type=1400 audit(1643.000:311): avc: denied { setopt } for pid=7555 comm="syz.1.1065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1661.721726][ T1194] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1661.889428][ T1194] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1662.008642][ T1194] bond0 (unregistering): Released all slaves [ 1662.625836][ T1194] hsr_slave_0: left promiscuous mode [ 1662.645161][ T1194] hsr_slave_1: left promiscuous mode [ 1662.811026][ T1194] veth1_macvtap: left promiscuous mode [ 1662.812625][ T1194] veth0_macvtap: left promiscuous mode [ 1662.814753][ T1194] veth1_vlan: left promiscuous mode [ 1662.816535][ T1194] veth0_vlan: left promiscuous mode [ 1667.593498][ T7622] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7622 comm=syz.1.1085 [ 1674.041957][ T7651] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7651 comm=syz.0.1095 [ 1675.476225][ T30] audit: type=1400 audit(1674.960:312): avc: denied { ioctl } for pid=7658 comm="syz.0.1099" path="socket:[19232]" dev="sockfs" ino=19232 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1676.068665][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1693.632313][ T30] audit: type=1400 audit(1693.110:313): avc: denied { create } for pid=7693 comm="syz.1.1110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1700.895202][ T30] audit: type=1400 audit(1700.380:314): avc: denied { sqpoll } for pid=7717 comm="syz.1.1119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1706.367373][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1719.782679][ T3358] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 1720.032691][ T3358] usb 1-1: Using ep0 maxpacket: 16 [ 1720.082728][ T3358] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1720.084040][ T3358] usb 1-1: config 1 has 0 interfaces, different from the descriptor's value: 11 [ 1720.085181][ T3358] usb 1-1: New USB device found, idVendor=04e6, idProduct=0003, bcdDevice= 1.77 [ 1720.085964][ T3358] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1720.421322][ T30] audit: type=1400 audit(1719.900:315): avc: denied { bind } for pid=7794 comm="syz.0.1141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1720.651682][ T3358] usb 1-1: USB disconnect, device number 4 [ 1737.393162][ T7819] syzkaller0: entered promiscuous mode [ 1737.394253][ T7819] syzkaller0: entered allmulticast mode [ 1738.071879][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 1749.117634][ T30] audit: type=1400 audit(1748.590:316): avc: denied { append } for pid=7863 comm="syz.1.1162" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1754.526270][ T30] audit: type=1400 audit(1754.010:317): avc: denied { create } for pid=7882 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1754.529263][ T30] audit: type=1400 audit(1754.010:318): avc: denied { write open } for pid=7882 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=2883 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1754.537948][ T30] audit: type=1400 audit(1754.020:319): avc: denied { append } for pid=7882 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2883 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1754.585579][ T30] audit: type=1400 audit(1754.070:320): avc: denied { getattr } for pid=7882 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1755.422741][ T30] audit: type=1400 audit(1754.900:321): avc: denied { read } for pid=7887 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1756.246054][ T30] audit: type=1400 audit(1755.720:322): avc: denied { unlink } for pid=7891 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2883 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1758.311744][ T30] audit: type=1400 audit(1757.780:323): avc: denied { write } for pid=7904 comm="syz.0.1174" name="rtc0" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1758.313387][ T30] audit: type=1400 audit(1757.790:324): avc: denied { setattr } for pid=7904 comm="syz.0.1174" name="rtc0" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1760.364040][ T7917] serio: Serial port pts0 [ 1765.181809][ T7938] serio: Serial port pts0 [ 1770.526910][ T7960] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7960 comm=syz.1.1191 [ 1773.877068][ T7974] batadv_slave_1: entered promiscuous mode [ 1773.908448][ T30] audit: type=1400 audit(1773.390:325): avc: denied { nlmsg_read } for pid=7973 comm="syz.1.1195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1773.951804][ T7973] batadv_slave_1: left promiscuous mode [ 1787.459075][ T30] audit: type=1400 audit(1786.940:326): avc: denied { write } for pid=8041 comm="syz.0.1217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1821.614918][ T30] audit: type=1400 audit(1821.080:327): avc: denied { ioctl } for pid=8126 comm="syz.1.1244" path="/dev/input/mice" dev="devtmpfs" ino=709 ioctlcmd=0x3b8b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1824.205791][ T30] audit: type=1400 audit(1823.680:328): avc: denied { accept } for pid=8134 comm="syz.0.1247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 1833.591683][ T8] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 1834.091173][ T8] usb 1-1: config 1 interface 0 altsetting 9 bulk endpoint 0x82 has invalid maxpacket 32 [ 1834.092291][ T8] usb 1-1: config 1 interface 0 has no altsetting 0 [ 1834.171387][ T8] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1834.172467][ T8] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1834.173178][ T8] usb 1-1: Product: ఄ [ 1834.173763][ T8] usb 1-1: SerialNumber: Љ [ 1834.251620][ T8153] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1834.841943][ T8153] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1834.883449][ T8153] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1835.274361][ T8153] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1835.357798][ T8153] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1835.444552][ T8] usblp 1-1:1.0: usblp0: USB Bidirectional printer dev 5 if 0 alt 9 proto 2 vid 0x0525 pid 0xA4A8 [ 1835.493279][ T8] usb 1-1: USB disconnect, device number 5 [ 1835.622561][ T8] usblp0: removed [ 1845.585334][ T8190] serio: Serial port pts0 [ 1858.570915][ T7542] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 1858.732433][ T7542] usb 2-1: device descriptor read/64, error -71 [ 1859.032494][ T7542] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 1859.191689][ T7542] usb 2-1: device descriptor read/64, error -71 [ 1859.317308][ T7542] usb usb2-port1: attempt power cycle [ 1859.802220][ T7542] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 1859.839392][ T7542] usb 2-1: device descriptor read/8, error -71 [ 1860.132682][ T7542] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 1860.223244][ T7542] usb 2-1: device descriptor read/8, error -71 [ 1860.342523][ T7542] usb usb2-port1: unable to enumerate USB device [ 1870.194512][ T8244] serio: Serial port pts0 [ 1874.125600][ T30] audit: type=1400 audit(1873.590:329): avc: denied { append } for pid=8258 comm="syz.1.1283" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1882.972244][ T30] audit: type=1400 audit(1882.450:330): avc: denied { getopt } for pid=8290 comm="syz.1.1293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1882.973972][ T30] audit: type=1400 audit(1882.450:331): avc: denied { ioctl } for pid=8290 comm="syz.1.1293" path="socket:[21576]" dev="sockfs" ino=21576 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1883.058319][ T30] audit: type=1400 audit(1882.540:332): avc: denied { setopt } for pid=8290 comm="syz.1.1293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1886.429445][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1890.073577][ T8319] serio: Serial port pts0 [ 1900.060731][ T30] audit: type=1400 audit(1899.540:333): avc: denied { create } for pid=8333 comm="syz.0.1307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1909.025278][ T8367] serio: Serial port pts0 [ 1911.114832][ T8378] netlink: 'syz.0.1321': attribute type 10 has an invalid length. [ 1928.258049][ T30] audit: type=1326 audit(1927.740:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8433 comm="syz.0.1341" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff9bf493e8 code=0x0 [ 1935.664664][ T8462] serio: Serial port pts0 [ 1949.335603][ T3358] usb 1-1: new full-speed USB device number 6 using dummy_hcd [ 1949.721117][ T3358] usb 1-1: not running at top speed; connect to a high speed hub [ 1949.807886][ T3358] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 1949.858022][ T3358] usb 1-1: string descriptor 0 read error: -22 [ 1949.861721][ T3358] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 1949.862662][ T3358] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1950.186523][ T3358] usb 1-1: USB disconnect, device number 6 [ 1955.486630][ T8515] serio: Serial port pts0 [ 1964.878137][ T8541] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8541 comm=syz.0.1374 [ 1969.126297][ T30] audit: type=1400 audit(1968.610:335): avc: denied { write } for pid=8559 comm="syz.1.1382" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1973.710382][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1975.887790][ T8583] serio: Serial port pts0 [ 1978.168739][ T8596] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1 sclass=netlink_route_socket pid=8596 comm=syz.1.1394 [ 1980.339270][ T1282] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1980.671988][ T1282] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1980.821867][ T1282] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1981.014917][ T1282] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1984.883877][ T1282] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1984.946443][ T1282] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1985.003701][ T1282] bond0 (unregistering): Released all slaves [ 1985.728218][ T1282] hsr_slave_0: left promiscuous mode [ 1985.763852][ T1282] hsr_slave_1: left promiscuous mode [ 1985.922153][ T1282] veth1_macvtap: left promiscuous mode [ 1985.923663][ T1282] veth0_macvtap: left promiscuous mode [ 1985.935814][ T1282] veth1_vlan: left promiscuous mode [ 1985.937887][ T1282] veth0_vlan: left promiscuous mode [ 1987.543252][ T1282] pimreg (unregistering): left allmulticast mode [ 1987.602112][ T8624] serio: Serial port pts0 [ 2001.186543][ T8601] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2001.237344][ T8601] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2005.126820][ T8601] hsr_slave_0: entered promiscuous mode [ 2005.173673][ T8601] hsr_slave_1: entered promiscuous mode [ 2009.525319][ T8601] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2009.600848][ T8601] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2009.647090][ T8601] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2009.726858][ T8601] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2013.993462][ T8601] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2027.685201][ T30] audit: type=1400 audit(2027.170:336): avc: denied { getopt } for pid=8804 comm="syz.1.1432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2029.577317][ T8601] veth0_vlan: entered promiscuous mode [ 2029.669405][ T8601] veth1_vlan: entered promiscuous mode [ 2030.089106][ T8601] veth0_macvtap: entered promiscuous mode [ 2030.197217][ T8601] veth1_macvtap: entered promiscuous mode [ 2031.084130][ T8601] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2031.085279][ T8601] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2031.086103][ T8601] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2031.086934][ T8601] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2057.378493][ T8889] serio: Serial port pts0 [ 2092.770792][ T30] audit: type=1400 audit(2092.240:337): avc: denied { map } for pid=8994 comm="syz.0.1490" path="socket:[24812]" dev="sockfs" ino=24812 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 2093.506555][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2095.300798][ T30] audit: type=1400 audit(2094.770:338): avc: denied { ioctl } for pid=9001 comm="syz.0.1493" path="socket:[23861]" dev="sockfs" ino=23861 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2097.357406][ T9007] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2097.705283][ T9007] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2097.953406][ T9007] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2098.252261][ T9007] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2098.989558][ T9007] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2099.194315][ T9007] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2099.505220][ T9007] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2099.714532][ T9007] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2105.647631][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2121.989381][ T30] audit: type=1400 audit(2121.470:339): avc: denied { setopt } for pid=9089 comm="syz.0.1521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2128.126715][ T30] audit: type=1400 audit(2127.600:340): avc: denied { watch watch_reads } for pid=9103 comm="syz.0.1526" path="/60/file1" dev="tmpfs" ino=346 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2128.729295][ T30] audit: type=1400 audit(2128.210:341): avc: denied { lock } for pid=9103 comm="syz.0.1526" path="socket:[25012]" dev="sockfs" ino=25012 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 2138.476947][ T30] audit: type=1400 audit(2137.960:342): avc: denied { read } for pid=9124 comm="syz.1.1532" path="socket:[24165]" dev="sockfs" ino=24165 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2149.071848][ T9147] serio: Serial port pts0 [ 2155.122284][ T30] audit: type=1400 audit(2154.590:343): avc: denied { accept } for pid=9162 comm="syz.1.1543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2167.526984][ T9208] serio: Serial port pts0 [ 2167.669276][ T30] audit: type=1400 audit(2167.150:344): avc: denied { accept } for pid=9202 comm="syz.1.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 2174.100409][ T9224] serio: Serial port pts0 [ 2195.561223][ T9275] serio: Serial port pts0 [ 2206.583557][ T29] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 2206.835300][ T29] usb 2-1: config 1 interface 0 altsetting 9 bulk endpoint 0x82 has invalid maxpacket 32 [ 2206.836391][ T29] usb 2-1: config 1 interface 0 has no altsetting 0 [ 2206.876676][ T29] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 2206.877399][ T29] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2206.877842][ T29] usb 2-1: Product: ఄ [ 2206.878245][ T29] usb 2-1: SerialNumber: Љ [ 2206.944208][ T9286] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 2207.461042][ T9286] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2207.505811][ T9286] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2207.867158][ T9286] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2207.933931][ T9286] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2208.023158][ T29] usblp 2-1:1.0: usblp0: USB Bidirectional printer dev 7 if 0 alt 9 proto 2 vid 0x0525 pid 0xA4A8 [ 2208.068490][ T29] usb 2-1: USB disconnect, device number 7 [ 2208.143646][ T29] usblp0: removed [ 2215.750851][ T9312] serio: Serial port pts0 [ 2232.242404][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2247.086683][ T9421] serio: Serial port pts0 [ 2250.304829][ T30] audit: type=1326 audit(2249.780:345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9429 comm="syz.1.1629" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff94b493e8 code=0x0 [ 2273.138511][ T30] audit: type=1400 audit(2272.620:346): avc: denied { write } for pid=9471 comm="syz.0.1642" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 2274.308991][ T9482] serio: Serial port pts0 [ 2278.677534][ T30] audit: type=1400 audit(2278.160:347): avc: denied { append } for pid=9501 comm="syz.0.1651" name="pfkey" dev="proc" ino=4026532705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2280.452203][ T30] audit: type=1400 audit(2279.930:348): avc: denied { setopt } for pid=9508 comm="syz.1.1654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2281.042235][ T9511] serio: Serial port pts0 [ 2286.548699][ T9537] serio: Serial port pts0 [ 2295.851430][ T30] audit: type=1400 audit(2295.340:349): avc: denied { ioctl } for pid=9566 comm="syz.0.1675" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2297.161400][ T30] audit: type=1400 audit(2296.640:350): avc: denied { write } for pid=9569 comm="syz.0.1676" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2297.163049][ T30] audit: type=1400 audit(2296.640:351): avc: denied { open } for pid=9569 comm="syz.0.1676" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2297.164029][ T9570] random: crng reseeded on system resumption [ 2297.227965][ T30] audit: type=1400 audit(2296.700:352): avc: denied { ioctl } for pid=9569 comm="syz.0.1676" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3304 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2314.564224][ T9628] serio: Serial port pts0 [ 2327.501386][ T4402] usb 1-1: new low-speed USB device number 7 using dummy_hcd [ 2327.866112][ T4402] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 16, setting to 8 [ 2327.867245][ T4402] usb 1-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 2328.151534][ T4402] usb 1-1: New USB device found, idVendor=20d6, idProduct=cb17, bcdDevice= 0.40 [ 2328.152724][ T4402] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2328.153717][ T4402] usb 1-1: Product: 돏묃ﳟ峙欒뙌孶㆟⮔糏僥☓否曌㱡脥ᴐ艩Ĩ摞⤧᷏䞌䢷㘘ˑꬬ騰熺古撢㱅㯧ᖜ拊㍈ᾰ雙관㥬얓限腳옡瞪菶ꄊ퇁❗︖쪋읹ⓟ醝 [ 2328.154801][ T4402] usb 1-1: SerialNumber: 偉幷ﬖ咄胦俿攤ᬮ浡儽喈̩摞ᐯ耵灧禥ﵸ栴餓昹튝ꝱ㙕銚›絘骷錺믕梠섔ﬞ㶪♚ḃ龍ꧻ蝀貀⍅薿㣷쯩旉凿臌絣幚ㅑἌ஭ዪ⫓㍂蹧Ƒ啠๴鱅ឨ釤猫⛟ꩳ䙊↙⢺녨券搟㩰硻䖹籈璶奵宔鉟 [ 2328.232826][ T9677] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2332.112914][ T4402] usbhid 1-1:1.0: can't add hid device: -71 [ 2332.115839][ T4402] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 2332.198557][ T4402] usb 1-1: USB disconnect, device number 7 [ 2339.202602][ T9704] serio: Serial port pts0 [ 2345.493550][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2345.797139][ T9726] serio: Serial port pts0 [ 2355.156535][ T30] audit: type=1400 audit(2354.640:353): avc: denied { lock } for pid=9753 comm="syz.0.1738" path="socket:[26279]" dev="sockfs" ino=26279 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2363.599077][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2384.569299][ T9842] serio: Serial port pts0 [ 2391.941248][ T9865] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29890 sclass=netlink_route_socket pid=9865 comm=syz.0.1773 [ 2396.398727][ T9875] process 'syz.0.1778' launched './file1' with NULL argv: empty string added [ 2396.412812][ T30] audit: type=1400 audit(2395.890:354): avc: denied { execute_no_trans } for pid=9874 comm="syz.0.1778" path="/198/file1" dev="tmpfs" ino=1096 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2412.192978][ T9895] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 2415.251247][ T9920] serio: Serial port pts0 [ 2436.062844][ T30] audit: type=1400 audit(2435.540:355): avc: denied { mount } for pid=9947 comm="syz.0.1794" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 2438.461162][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2439.654929][ T9969] input: syz0 as /devices/virtual/input/input1 [ 2440.953111][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::ffff:172.20.20.187]:2. Sending cookies. [ 2441.152920][ T30] audit: type=1400 audit(2440.630:356): avc: denied { create } for pid=9971 comm="syz.0.1801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 2452.388033][T10023] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=10023 comm=syz.0.1818 [ 2452.835893][ T30] audit: type=1400 audit(2452.310:357): avc: denied { map } for pid=10024 comm="syz.1.1819" path="socket:[27467]" dev="sockfs" ino=27467 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 2452.901466][T10027] serio: Serial port pts0 [ 2461.143196][T10054] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=10054 comm=syz.1.1824 [ 2461.922277][ T30] audit: type=1400 audit(2461.400:358): avc: denied { read } for pid=10055 comm="syz.1.1825" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2464.597498][T10063] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=15 sclass=netlink_tcpdiag_socket pid=10063 comm=syz.1.1827 [ 2466.647473][ T30] audit: type=1400 audit(2466.130:359): avc: denied { nlmsg_write } for pid=10067 comm="syz.1.1829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2467.649044][T10070] serio: Serial port pts0 [ 2476.645149][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2479.196497][ T30] audit: type=1326 audit(2478.680:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10110 comm="syz.0.1840" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff8c9493e8 code=0x0 [ 2480.245077][T10121] serio: Serial port pts0 [ 2487.270756][ T30] audit: type=1400 audit(2486.730:361): avc: denied { setattr } for pid=10138 comm="syz.0.1847" path="/dev/net/tun" dev="devtmpfs" ino=690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 2488.606941][T10147] netlink: 76 bytes leftover after parsing attributes in process `syz.0.1848'. [ 2488.622793][T10147] block nbd0: not configured, cannot reconfigure [ 2492.003445][T10158] serio: Serial port pts0 [ 2498.675887][T10170] serio: Serial port pts0 [ 2505.101046][T10182] serio: Serial port pts0 [ 2506.790945][T10187] serio: Serial port pts1 [ 2513.544226][ T30] audit: type=1400 audit(2512.980:362): avc: denied { read } for pid=10206 comm="syz.1.1857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2519.083576][T10224] serio: Serial port pts0 [ 2520.879153][T10234] serio: Serial port pts1 [ 2536.018201][T10268] serio: Serial port pts0 [ 2546.078873][ T30] audit: type=1400 audit(2545.560:363): avc: denied { setopt } for pid=10300 comm="syz.1.1877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2546.687726][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::1]:20002. Sending cookies. [ 2547.684421][T10311] serio: Serial port pts0 [ 2558.895583][T10341] serio: Serial port pts0 [ 2560.633057][T10346] serio: Serial port pts1 [ 2570.452195][T10382] serio: Serial port pts0 [ 2570.574493][T10383] serio: Serial port pts1 [ 2577.460718][T10405] serio: Serial port pts0 [ 2583.757116][T10420] serio: Serial port pts0 [ 2587.596165][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2589.984703][T10443] serio: Serial port pts0 [ 2591.034782][T10448] serio: Serial port pts1 [ 2600.075057][ T30] audit: type=1400 audit(2599.560:364): avc: denied { append } for pid=10473 comm="syz.0.1911" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2602.702516][T10480] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1913'. [ 2604.823068][T10491] serio: Serial port pts0 [ 2608.051544][T10503] serio: Serial port pts1 [ 2617.249338][T10521] serio: Serial port pts0 [ 2619.568406][T10527] serio: Serial port pts1 [ 2625.674555][T10551] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10551 comm=syz.0.1930 [ 2626.257436][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2629.708430][T10569] serio: Serial port pts0 [ 2636.718563][T10598] serio: Serial port pts0 [ 2637.636004][T10603] serio: Serial port pts1 [ 2644.792586][T10629] serio: Serial port pts0 [ 2644.981918][T10631] serio: Serial port pts1 [ 2652.642413][T10660] serio: Serial port pts0 [ 2658.787586][T10683] serio: Serial port pts0 [ 2660.981832][T10688] serio: Serial port pts1 [ 2668.092710][T10714] serio: Serial port pts0 [ 2668.099019][T10715] serio: Serial port pts1 [ 2675.686277][T10740] serio: Serial port pts0 [ 2675.733224][T10741] serio: Serial port pts1 [ 2682.151543][T10760] serio: Serial port pts0 [ 2688.731952][ T30] audit: type=1400 audit(2688.210:365): avc: denied { ioctl } for pid=10777 comm="syz.1.1976" path="/dev/ptyq6" dev="devtmpfs" ino=119 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 2689.322771][T10780] serio: Serial port pts0 [ 2695.716367][T10797] serio: Serial port pts0 [ 2706.085546][T10817] syzkaller0: entered promiscuous mode [ 2706.086903][T10817] syzkaller0: entered allmulticast mode [ 2710.208772][T10820] serio: Serial port pts0 [ 2714.667205][T10835] serio: Serial port pts1 [ 2718.763247][T10844] serio: Serial port pts1 [ 2729.242848][T10877] serio: Serial port pts0 [ 2735.977371][T10890] serio: Serial port pts0 [ 2739.064842][T10898] serio: Serial port pts1 [ 2742.332100][T10908] serio: Serial port pts0 [ 2751.272097][ T30] audit: type=1400 audit(2750.750:366): avc: denied { setattr } for pid=10939 comm="syz.1.2010" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2752.450832][ T9924] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 2752.791123][ T9924] usb 2-1: Using ep0 maxpacket: 32 [ 2753.537326][ T9924] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2753.538137][ T9924] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2753.538784][ T9924] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 7 [ 2753.539307][ T9924] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 2753.544144][ T9924] usb 2-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 2753.544774][ T9924] usb 2-1: New USB device found, idVendor=1b96, idProduct=000a, bcdDevice= 0.00 [ 2753.545166][ T9924] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2753.567120][ T9924] usb 2-1: config 0 descriptor?? [ 2754.114706][ T9924] hid-generic 0003:1B96:000A.0003: hidraw0: USB HID v0.00 Device [HID 1b96:000a] on usb-dummy_hcd.1-1/input0 [ 2754.493163][ T7542] usb 2-1: USB disconnect, device number 8 [ 2754.823441][ T30] audit: type=1400 audit(2754.310:367): avc: denied { create } for pid=10947 comm="syz.0.2012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 2764.792080][T10977] serio: Serial port pts0 [ 2772.224883][T10997] serio: Serial port pts0 [ 2775.371082][T11006] serio: Serial port pts1 [ 2780.274814][T11025] serio: Serial port pts0 [ 2787.345555][ T30] audit: type=1400 audit(2786.820:368): avc: denied { setopt } for pid=11043 comm="syz.1.2028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2787.365438][ T30] audit: type=1400 audit(2786.850:369): avc: denied { map } for pid=11043 comm="syz.1.2028" path="socket:[29820]" dev="sockfs" ino=29820 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2787.383211][ T30] audit: type=1400 audit(2786.850:370): avc: denied { read } for pid=11043 comm="syz.1.2028" path="socket:[29820]" dev="sockfs" ino=29820 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2787.423365][ T30] audit: type=1400 audit(2786.900:371): avc: denied { write } for pid=11043 comm="syz.1.2028" path="socket:[29820]" dev="sockfs" ino=29820 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2787.873913][T11047] serio: Serial port pts0 [ 2789.892243][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2794.704146][ T30] audit: type=1400 audit(2794.180:372): avc: denied { getopt } for pid=11066 comm="syz.0.2035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2795.357459][T11072] serio: Serial port pts1 [ 2795.368125][T11071] serio: Serial port pts0 [ 2802.446289][T11097] serio: Serial port pts0 [ 2802.458087][T11098] serio: Serial port pts1 [ 2809.227668][T11119] serio: Serial port pts0 [ 2809.247379][T11120] serio: Serial port pts1 [ 2815.893562][T11141] serio: Serial port pts0 [ 2816.331776][T11145] serio: Serial port pts1 [ 2819.616049][T11156] serio: Serial port pts0 [ 2828.598568][ T30] audit: type=1400 audit(2828.070:373): avc: denied { setattr } for pid=11197 comm="syz.1.2061" name="" dev="pipefs" ino=29669 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 2831.008032][T11202] serio: Serial port pts0 [ 2834.724794][T11214] veth0_vlan: left promiscuous mode [ 2834.998802][ T30] audit: type=1400 audit(2834.480:374): avc: denied { map } for pid=11213 comm="syz.1.2065" path="socket:[29689]" dev="sockfs" ino=29689 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2835.005035][ T30] audit: type=1400 audit(2834.480:375): avc: denied { read } for pid=11213 comm="syz.1.2065" path="socket:[29689]" dev="sockfs" ino=29689 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2835.886059][T11218] serio: Serial port pts1 [ 2848.775120][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2868.003973][T11310] serio: Serial port pts0 [ 2870.244060][T11321] geneve0: entered allmulticast mode [ 2877.137541][ T30] audit: type=1400 audit(2876.620:376): avc: denied { nlmsg_write } for pid=11353 comm="syz.0.2110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2889.235864][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2895.014123][ T30] audit: type=1400 audit(2894.490:377): avc: denied { read write } for pid=8601 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2895.015591][ T30] audit: type=1400 audit(2894.490:378): avc: denied { open } for pid=8601 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2897.876126][T11417] ------------[ cut here ]------------ [ 2897.877965][T11417] name '30327' [ 2897.879768][T11417] WARNING: CPU: 1 PID: 11417 at fs/proc/generic.c:711 remove_proc_entry+0x1d0/0x340 [ 2897.882155][T11417] Modules linked in: [ 2897.885681][T11417] CPU: 1 UID: 0 PID: 11417 Comm: syz.1.2131 Not tainted 6.11.0-rc6-syzkaller-00326-gd1f2d51b711a #0 [ 2897.887566][T11417] Hardware name: linux,dummy-virt (DT) [ 2897.888451][T11417] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 2897.889078][T11417] pc : remove_proc_entry+0x1d0/0x340 [ 2897.889670][T11417] lr : remove_proc_entry+0x1d0/0x340 [ 2897.890205][T11417] sp : ffff80008e617b00 [ 2897.890752][T11417] x29: ffff80008e617b00 x28: ffff80008812e940 x27: 1fffe000080832a1 [ 2897.891871][T11417] x26: ffff00000f3f3310 x25: ffff000040419510 x24: dfff800000000000 [ 2897.892667][T11417] x23: ffff800086e818e0 x22: ffff000039a09500 x21: 1ffff00011cc2f68 [ 2897.893410][T11417] x20: ffff000040419548 x19: ffff80008527f0c0 x18: 00000000fc5ab66e [ 2897.894153][T11417] x17: 0000000000000000 x16: 0000000000000000 x15: ffff000016eaa880 [ 2897.894917][T11417] x14: 1fffe00002dd550f x13: 1fffe00002dd551e x12: ffff60000d400603 [ 2897.895650][T11417] x11: 1fffe0000d400602 x10: ffff60000d400602 x9 : dfff800000000000 [ 2897.896401][T11417] x8 : ffff00006a003013 x7 : 0000000000000001 x6 : ffff60000d400602 [ 2897.897129][T11417] x5 : ffff00006a003010 x4 : 1fffe00002dd53c1 x3 : dfff800000000000 [ 2897.897865][T11417] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000016ea9e00 [ 2897.898765][T11417] Call trace: [ 2897.899171][T11417] remove_proc_entry+0x1d0/0x340 [ 2897.899817][T11417] bcm_release+0x1dc/0x78c [ 2897.900285][T11417] __sock_release+0x8c/0x1f0 [ 2897.900847][T11417] sock_close+0x18/0x28 [ 2897.901265][T11417] __fput+0x2c4/0x964 [ 2897.901669][T11417] ____fput+0x10/0x1c [ 2897.902104][T11417] task_work_run+0x128/0x210 [ 2897.902521][T11417] do_notify_resume+0x1d4/0x25c [ 2897.902962][T11417] el0_svc+0x100/0x180 [ 2897.903374][T11417] el0t_64_sync_handler+0x100/0x12c [ 2897.903838][T11417] el0t_64_sync+0x190/0x194 [ 2897.904909][T11417] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 2897.905892][T11417] CPU: 1 UID: 0 PID: 11417 Comm: syz.1.2131 Not tainted 6.11.0-rc6-syzkaller-00326-gd1f2d51b711a #0 [ 2897.906508][T11417] Hardware name: linux,dummy-virt (DT) [ 2897.906925][T11417] Call trace: [ 2897.907253][T11417] dump_backtrace+0x9c/0x11c [ 2897.907628][T11417] show_stack+0x18/0x24 [ 2897.908011][T11417] dump_stack_lvl+0x38/0xf4 [ 2897.908401][T11417] dump_stack+0x1c/0x28 [ 2897.908779][T11417] panic+0x5a0/0x654 [ 2897.909144][T11417] check_panic_on_warn+0xa8/0xc4 [ 2897.909577][T11417] __warn+0x148/0x47c [ 2897.910006][T11417] report_bug+0x378/0x47c [ 2897.910381][T11417] bug_handler+0x3c/0x94 [ 2897.910759][T11417] brk_handler+0x118/0x230 [ 2897.911227][T11417] do_debug_exception+0xb8/0x310 [ 2897.911612][T11417] el1_dbg+0x80/0x9c [ 2897.911992][T11417] el1h_64_sync_handler+0xcc/0xe8 [ 2897.912378][T11417] el1h_64_sync+0x64/0x68 [ 2897.912778][T11417] remove_proc_entry+0x1d0/0x340 [ 2897.913171][T11417] bcm_release+0x1dc/0x78c [ 2897.913536][T11417] __sock_release+0x8c/0x1f0 [ 2897.913954][T11417] sock_close+0x18/0x28 [ 2897.914318][T11417] __fput+0x2c4/0x964 [ 2897.914761][T11417] ____fput+0x10/0x1c [ 2897.915128][T11417] task_work_run+0x128/0x210 [ 2897.915498][T11417] do_notify_resume+0x1d4/0x25c [ 2897.915941][T11417] el0_svc+0x100/0x180 [ 2897.916311][T11417] el0t_64_sync_handler+0x100/0x12c [ 2897.916704][T11417] el0t_64_sync+0x190/0x194 [ 2897.917671][T11417] SMP: stopping secondary CPUs [ 2897.919043][T11417] Kernel Offset: disabled [ 2897.920090][T11417] CPU features: 0x04,40001001,a0100000,0200421b [ 2897.921859][T11417] Memory Limit: none [ 2897.923236][T11417] Rebooting in 86400 seconds.. VM DIAGNOSIS: 14:57:44 Registers: info registers vcpu 0 CPU#0 PC=ffff80008476db90 X00=0000000000000003 X01=0000000000000001 X02=0000000000000002 X03=0000000000000000 X04=ffff0000149ad640 X05=ffff0000149ad640 X06=ffff600002935ac8 X07=0000000000000001 X08=ffff0000149ad643 X09=dfff800000000000 X10=ffff600002935ac8 X11=1fffe00002935ac8 X12=ffff600002935ac9 X13=ffff000016069a88 X14=0000000000000001 X15=ffff000016e68a80 X16=0000000000000000 X17=058ae798a9e75d98 X18=000000000e8e833f X19=0000000000000038 X20=ffff0000149ad640 X21=ffff0000149ad780 X22=0000000000000000 X23=ffff00001494b640 X24=ffff00001494b700 X25=ffff00001be8b862 X26=ffff00001494b6f6 X27=ffff0000149ad5c0 X28=1fffe000029296de X29=ffff800080006f30 X30=ffff80008476db84 SP=ffff800080006f10 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000aaaaac9204a4:0000aaaaac9204a0 Q02=0000aaaaac92b956:0000aaaaac92b910 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd9bd9470:0000ffffd9bd9470 Q17=ffffff80ffffffd0:0000ffffd9bd9440 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000819ae7b4 X00=0000000000000002 X01=0000000000000000 X02=0000000000000002 X03=dfff800000000000 X04=0000000000000018 X05=1fffe00001e7042f X06=0000000000000030 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700011cc2e1e X11=1ffff00011cc2e1e X12=ffff700011cc2e1f X13=1fffe00002dd552d X14=1fffe00002dd550f X15=ffff000016eaa880 X16=0000000000000000 X17=3663722d302e3131 X18=00000000afc2eedd X19=ffff00000f382080 X20=ffff80008cb1b018 X21=ffff800087246040 X22=0000000000000036 X23=dfff800000000000 X24=ffff80008c823cd9 X25=0000000000000006 X26=dfff800000000000 X27=0000000000000079 X28=ffff00000f382080 X29=ffff80008e6170a0 X30=ffff8000819aea40 SP=ffff80008e6170a0 PSTATE=800003c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffc9c33510:e88f433677df8900 Q02=0000ffff94cbe000:ffffff80ffffffd8 Q03=0000ffffc9c335a0:0000ffffc9c335a0 Q04=0000ffffc9c335a0:0000ffffc9c33558 Q05=0000ffffc9c33570:0000ffffc9c335a0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc9c337b0:0000ffffc9c337b0 Q17=ffffff80ffffffd0:0000ffffc9c33780 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000