last executing test programs: 18.776162187s ago: executing program 0 (id=2113): socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x46, &(0x7f0000000040)={@broadcast, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "5678c1", 0x10, 0x84, 0x0, @empty, @local, {[@fragment, @srh]}}}}}, 0x0) 17.761051318s ago: executing program 0 (id=2114): r0 = syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$MRT_INIT(r1, 0x0, 0xc8, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f00000001c0)) 8.872467695s ago: executing program 1 (id=2122): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001340)={0x0, 0xf, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf"], 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0x40305828, &(0x7f0000000100)={@desc={0x1, 0x0, @auto="0f5f606a517d75da"}}) 6.970700626s ago: executing program 1 (id=2123): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="b80000001900674c0000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a"], 0xb8}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001680)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000500)="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", 0x165}], 0x1}}], 0x1, 0x11) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b80000001900674c0000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e2ffffffffffffff000000000000000000000000000000000000000000000300000000000000000040"], 0xb8}}, 0x0) 5.088142844s ago: executing program 1 (id=2124): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0x9c3c}, {0x20, 0x0, 0x0, 0xfffff038}, {0x6}]}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) write$P9_RMKNOD(r2, &(0x7f0000000080)={0x14}, 0xfdef) 4.079939845s ago: executing program 0 (id=2125): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000540)=ANY=[@ANYBLOB="84010000100013e90000000000000000fe8000000000000000000000000000bbac1e000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414bb00000000000000000000000000000000320000002001000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c001400736861310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007"], 0x184}}, 0x0) 3.398242876s ago: executing program 1 (id=2126): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 2.413870714s ago: executing program 0 (id=2127): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001340)={0x0, 0xf, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf"], 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000100), 0xfecc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0x40305828, &(0x7f0000000100)={@desc={0x1, 0x0, @auto="0f5f606a517d75da"}}) 1.780354771s ago: executing program 1 (id=2128): openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x5452, &(0x7f0000000140)) 1.091349133s ago: executing program 0 (id=2129): prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x2, 0x0, &(0x7f0000000000)) 448.34739ms ago: executing program 1 (id=2130): prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r0 = socket(0x2b, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x2b, 0xfffffffffffffffe, 0x108) 0s ago: executing program 0 (id=2131): r0 = socket$inet6(0xa, 0x2, 0x3a) sendmmsg$inet6(r0, &(0x7f0000000800)=[{{&(0x7f00000003c0)={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000100)="8000102e7577d401", 0x8}], 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000000000002900000034"], 0x18}}], 0x1, 0x0) kernel console output (not intermixed with test programs): e [ 334.735053][ T3958] macvtap0: left promiscuous mode [ 335.850067][ T30] audit: type=1400 audit(335.570:201): avc: denied { name_bind } for pid=3965 comm="syz.1.210" src=4096 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 336.061276][ T3971] netlink: 'syz.1.211': attribute type 3 has an invalid length. [ 336.124889][ T30] audit: type=1400 audit(335.830:202): avc: denied { recv } for pid=3267 comm="syz-executor" saddr=127.0.0.1 src=60306 daddr=127.0.0.1 dest=30004 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 336.158860][ T30] audit: type=1400 audit(335.880:203): avc: denied { recv } for pid=3275 comm="syz-executor" saddr=127.0.0.1 src=30004 daddr=127.0.0.1 dest=60306 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 336.435425][ T30] audit: type=1400 audit(336.160:204): avc: denied { read } for pid=3977 comm="syz.1.213" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 336.439092][ T30] audit: type=1400 audit(336.160:205): avc: denied { open } for pid=3977 comm="syz.1.213" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 336.458434][ T30] audit: type=1400 audit(336.180:206): avc: denied { ioctl } for pid=3977 comm="syz.1.213" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x7003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 336.473479][ T30] audit: type=1400 audit(336.190:207): avc: denied { write } for pid=3977 comm="syz.1.213" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 336.684890][ T30] audit: type=1400 audit(336.400:208): avc: denied { setopt } for pid=3964 comm="syz.0.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 337.796655][ T30] audit: type=1400 audit(337.520:209): avc: denied { write } for pid=3992 comm="syz.0.219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 337.887706][ T30] audit: type=1400 audit(337.610:210): avc: denied { write } for pid=3994 comm="syz.1.220" name="tcp" dev="proc" ino=4026532744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 358.866440][ T10] usb 1-1: new full-speed USB device number 9 using dummy_hcd [ 359.438006][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 359.438605][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 359.439112][ T10] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 359.439650][ T10] usb 1-1: New USB device found, idVendor=1b96, idProduct=000a, bcdDevice= 0.00 [ 359.440016][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 359.458499][ T10] usb 1-1: config 0 descriptor?? [ 359.949236][ T10] hid-generic 0003:1B96:000A.0005: unknown main item tag 0x0 [ 359.949849][ T10] hid-generic 0003:1B96:000A.0005: unknown main item tag 0x0 [ 359.950325][ T10] hid-generic 0003:1B96:000A.0005: unknown main item tag 0x0 [ 359.950814][ T10] hid-generic 0003:1B96:000A.0005: unknown main item tag 0x0 [ 359.951241][ T10] hid-generic 0003:1B96:000A.0005: unknown main item tag 0x0 [ 359.976885][ T10] hid-generic 0003:1B96:000A.0005: hidraw0: USB HID v0.00 Device [HID 1b96:000a] on usb-dummy_hcd.0-1/input0 [ 361.662338][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 361.662431][ T30] audit: type=1400 audit(361.380:213): avc: granted { setsecparam } for pid=4031 comm="syz.0.234" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 362.220045][ T955] usb 1-1: USB disconnect, device number 9 [ 362.527141][ T955] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 362.655440][ T30] audit: type=1400 audit(362.370:214): avc: denied { cmd } for pid=4035 comm="syz.1.236" path="socket:[5785]" dev="sockfs" ino=5785 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 362.714403][ T955] usb 1-1: Using ep0 maxpacket: 8 [ 362.737066][ T955] usb 1-1: config 1 interface 0 altsetting 6 endpoint 0x81 has an invalid bInterval 129, changing to 11 [ 362.737633][ T955] usb 1-1: config 1 interface 0 altsetting 6 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 362.738193][ T955] usb 1-1: config 1 interface 0 has no altsetting 0 [ 362.788780][ T955] usb 1-1: New USB device found, idVendor=07c0, idProduct=1125, bcdDevice= 0.40 [ 362.789361][ T955] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 362.789750][ T955] usb 1-1: Product: syz [ 362.790005][ T955] usb 1-1: Manufacturer: syz [ 362.790366][ T955] usb 1-1: SerialNumber: syz [ 363.246826][ T955] usbhid 1-1:1.0: can't add hid device: -71 [ 363.248760][ T955] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 363.321054][ T955] usb 1-1: USB disconnect, device number 10 [ 365.160092][ T30] audit: type=1400 audit(364.880:215): avc: denied { open } for pid=4059 comm="syz.0.246" path="/dev/ptyq5" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 365.191940][ T30] audit: type=1400 audit(364.910:216): avc: denied { ioctl } for pid=4059 comm="syz.0.246" path="/dev/ptyq5" dev="devtmpfs" ino=118 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 365.731983][ T30] audit: type=1400 audit(365.450:217): avc: denied { unmount } for pid=3274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 366.012246][ T4072] process 'syz.1.250' launched './file1' with NULL argv: empty string added [ 369.962109][ T30] audit: type=1400 audit(369.680:218): avc: denied { connect } for pid=4076 comm="syz.1.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 375.942144][ T30] audit: type=1400 audit(375.660:219): avc: denied { create } for pid=4105 comm="syz.0.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 375.950595][ T30] audit: type=1400 audit(375.660:220): avc: denied { write } for pid=4105 comm="syz.0.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 376.179817][ T30] audit: type=1400 audit(375.900:221): avc: denied { read } for pid=4105 comm="syz.0.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 376.192334][ T30] audit: type=1400 audit(375.910:222): avc: denied { ioctl } for pid=4105 comm="syz.0.265" path="socket:[6263]" dev="sockfs" ino=6263 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 377.602629][ T30] audit: type=1400 audit(377.320:223): avc: denied { read write } for pid=4116 comm="syz.1.269" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 377.608056][ T30] audit: type=1400 audit(377.320:224): avc: denied { open } for pid=4116 comm="syz.1.269" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 382.624137][ T30] audit: type=1400 audit(382.340:225): avc: denied { create } for pid=4142 comm="syz.0.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 382.627341][ T30] audit: type=1400 audit(382.350:226): avc: denied { connect } for pid=4142 comm="syz.0.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 382.630223][ T30] audit: type=1400 audit(382.350:227): avc: denied { setopt } for pid=4142 comm="syz.0.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 382.638098][ T30] audit: type=1400 audit(382.360:228): avc: denied { bind } for pid=4142 comm="syz.0.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 382.650828][ T30] audit: type=1400 audit(382.370:229): avc: denied { write } for pid=4142 comm="syz.0.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 382.710118][ T30] audit: type=1400 audit(382.430:230): avc: denied { read } for pid=4142 comm="syz.0.279" path="socket:[6347]" dev="sockfs" ino=6347 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 387.384637][ T30] audit: type=1400 audit(387.090:231): avc: denied { getopt } for pid=4172 comm="syz.0.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 388.094722][ T8] usb 1-1: new full-speed USB device number 11 using dummy_hcd [ 388.310323][ T8] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 18801, setting to 64 [ 388.311145][ T8] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 388.414150][ T8] usb 1-1: New USB device found, idVendor=046d, idProduct=c227, bcdDevice= 0.40 [ 388.415513][ T8] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 388.416048][ T8] usb 1-1: Manufacturer: 鹢鈆ⱽ찿뼟⌚填̹耨쒍쭩숝䨝狢ⶃ韎⮒浄㫘枬陞硖Ꭱ픨ᎃ췿첿쨨ࣖ㕀瀰䵊ᱜ꾴蛰鎾䚫萙꘍紦ᴳ맣ྡྷṵ䉺葔䯮㼬󙝆 [ 388.416886][ T8] usb 1-1: SerialNumber: syz [ 388.458683][ T4175] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 388.530879][ T4175] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 389.123928][ T30] audit: type=1400 audit(388.830:232): avc: denied { create } for pid=4174 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 389.240690][ T8] usbhid 1-1:1.0: can't add hid device: -71 [ 389.241734][ T8] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 389.262653][ T8] usb 1-1: USB disconnect, device number 11 [ 391.549772][ T4189] netlink: 4 bytes leftover after parsing attributes in process `syz.0.298'. [ 395.822214][ T30] audit: type=1400 audit(395.540:233): avc: denied { read write } for pid=4204 comm="syz.0.303" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 395.827816][ T30] audit: type=1400 audit(395.540:234): avc: denied { open } for pid=4204 comm="syz.0.303" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 402.565000][ T30] audit: type=1326 audit(402.260:235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4214 comm="syz.1.308" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7fc00000 [ 410.769734][ T30] audit: type=1400 audit(410.490:236): avc: denied { read } for pid=4254 comm="syz.0.322" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 410.771040][ T30] audit: type=1400 audit(410.490:237): avc: denied { open } for pid=4254 comm="syz.0.322" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 410.785734][ T30] audit: type=1400 audit(410.510:238): avc: denied { ioctl } for pid=4254 comm="syz.0.322" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 413.345987][ T4260] capability: warning: `syz.1.319' uses 32-bit capabilities (legacy support in use) [ 413.366964][ T30] audit: type=1400 audit(413.090:239): avc: denied { read } for pid=4247 comm="syz.1.319" name="card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 413.375956][ T30] audit: type=1400 audit(413.100:240): avc: denied { open } for pid=4247 comm="syz.1.319" path="/dev/dri/card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 413.444940][ T30] audit: type=1400 audit(413.160:241): avc: denied { ioctl } for pid=4247 comm="syz.1.319" path="/dev/dri/card1" dev="devtmpfs" ino=620 ioctlcmd=0x643a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 430.644646][ T30] audit: type=1400 audit(430.360:242): avc: denied { ioctl } for pid=4324 comm="syz.1.349" path="socket:[7220]" dev="sockfs" ino=7220 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 434.874868][ T4363] tap0: tun_chr_ioctl cmd 2147767506 [ 436.856646][ T4377] tap0: tun_chr_ioctl cmd 2147767521 [ 438.704324][ T30] audit: type=1400 audit(438.420:243): avc: denied { create } for pid=4388 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 438.707212][ T30] audit: type=1400 audit(438.430:244): avc: denied { setopt } for pid=4388 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 439.590738][ T30] audit: type=1400 audit(439.310:245): avc: denied { bind } for pid=4399 comm="syz.0.384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 439.593037][ T30] audit: type=1400 audit(439.310:246): avc: denied { name_bind } for pid=4399 comm="syz.0.384" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 439.614391][ T30] audit: type=1400 audit(439.320:247): avc: denied { node_bind } for pid=4399 comm="syz.0.384" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 439.632023][ T30] audit: type=1400 audit(439.350:248): avc: denied { read } for pid=4399 comm="syz.0.384" laddr=ff02::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 440.870826][ T4412] pim6reg1: entered promiscuous mode [ 440.871405][ T4412] pim6reg1: entered allmulticast mode [ 441.958942][ T30] audit: type=1400 audit(441.680:249): avc: denied { setopt } for pid=4419 comm="syz.0.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 442.995885][ T24] usb 1-1: new full-speed USB device number 12 using dummy_hcd [ 443.423772][ T24] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 18801, setting to 64 [ 443.745777][ T24] usb 1-1: New USB device found, idVendor=046d, idProduct=c227, bcdDevice= 0.40 [ 443.746307][ T24] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 443.746804][ T24] usb 1-1: Product: syz [ 443.747066][ T24] usb 1-1: Manufacturer: syz [ 443.747329][ T24] usb 1-1: SerialNumber: syz [ 443.772217][ T4424] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 444.216866][ T24] usbhid 1-1:1.0: can't add hid device: -71 [ 444.217714][ T24] usbhid 1-1:1.0: probe with driver usbhid failed with error -71 [ 444.265793][ T24] usb 1-1: USB disconnect, device number 12 [ 445.698943][ T30] audit: type=1400 audit(445.420:250): avc: denied { read } for pid=4432 comm="syz.0.397" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 445.699924][ T30] audit: type=1400 audit(445.420:251): avc: denied { open } for pid=4432 comm="syz.0.397" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 448.542261][ T30] audit: type=1400 audit(448.250:252): avc: denied { ioctl } for pid=4432 comm="syz.0.397" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 450.565214][ T4437] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 450.606703][ T4437] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 451.615428][ T30] audit: type=1326 audit(451.320:253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 451.628975][ T30] audit: type=1326 audit(451.320:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 451.630393][ T30] audit: type=1326 audit(451.350:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 451.658915][ T30] audit: type=1326 audit(451.380:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 451.661140][ T30] audit: type=1326 audit(451.380:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132750 code=0x7ffc0000 [ 451.689223][ T30] audit: type=1326 audit(451.400:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 451.691003][ T30] audit: type=1326 audit(451.400:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 451.692342][ T30] audit: type=1326 audit(451.400:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 451.708086][ T30] audit: type=1326 audit(451.420:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 451.709558][ T30] audit: type=1326 audit(451.420:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4448 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x132750 code=0x7ffc0000 [ 462.095319][ T24] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 462.284944][ T24] usb 1-1: Using ep0 maxpacket: 8 [ 462.345528][ T24] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 462.346071][ T24] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 462.346441][ T24] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 462.346843][ T24] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 462.347203][ T24] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 462.347712][ T24] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 462.348112][ T24] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 462.594661][ T24] usb 1-1: GET_CAPABILITIES returned 0 [ 462.595173][ T24] usbtmc 1-1:16.0: can't read capabilities [ 467.879346][ T4500] usbtmc 1-1:16.0: usb_control_msg returned -110 [ 467.914926][ T955] usb 1-1: USB disconnect, device number 13 [ 468.666623][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 468.666817][ T30] audit: type=1400 audit(468.380:294): avc: denied { setopt } for pid=4509 comm="syz.0.428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 469.084902][ T30] audit: type=1400 audit(468.800:295): avc: denied { watch watch_reads } for pid=4513 comm="syz.0.429" path="/261/control" dev="tmpfs" ino=1358 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 476.640066][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 495.824649][ T10] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 496.016886][ T10] usb 1-1: config 0 has an invalid interface number: 156 but max is 1 [ 496.017873][ T10] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 496.018634][ T10] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 2 [ 496.019675][ T10] usb 1-1: config 0 has no interface number 0 [ 496.020531][ T10] usb 1-1: config 0 interface 156 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 496.021284][ T10] usb 1-1: config 0 interface 156 altsetting 0 endpoint 0x3 has an invalid bInterval 0, changing to 7 [ 496.021701][ T10] usb 1-1: config 0 interface 156 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 496.042260][ T10] usb 1-1: New USB device found, idVendor=abcd, idProduct=cdee, bcdDevice= 5.b9 [ 496.043225][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=21 [ 496.045046][ T10] usb 1-1: SerialNumber: syz [ 496.086818][ T10] usb 1-1: config 0 descriptor?? [ 496.152368][ T10] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 496.157326][ T10] usb 1-1: MIDIStreaming interface descriptor not found [ 510.025079][ T8] usb 1-1: USB disconnect, device number 14 [ 514.952421][ T4627] tap0: tun_chr_ioctl cmd 1074025698 [ 516.591162][ T30] audit: type=1400 audit(516.310:296): avc: denied { create } for pid=4638 comm="syz.1.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 516.626952][ T30] audit: type=1400 audit(516.350:297): avc: denied { write } for pid=4638 comm="syz.1.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 517.333344][ T4646] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 517.399711][ T4646] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 517.451663][ T4646] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 517.547988][ T4646] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 519.112214][ T4661] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 529.165816][ T3406] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 529.425250][ T3406] usb 1-1: Using ep0 maxpacket: 16 [ 529.467541][ T3406] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 529.468063][ T3406] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 529.468558][ T3406] usb 1-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 529.468911][ T3406] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 529.489066][ T3406] usb 1-1: config 0 descriptor?? [ 530.065579][ T3406] hid-generic 0003:045E:07DA.0006: hidraw0: USB HID v0.00 Device [HID 045e:07da] on usb-dummy_hcd.0-1/input0 [ 530.470975][ T4536] usb 1-1: USB disconnect, device number 15 [ 531.552030][ T4680] syzkaller0: entered promiscuous mode [ 531.552560][ T4680] syzkaller0: entered allmulticast mode [ 547.320739][ T4706] netlink: 24 bytes leftover after parsing attributes in process `syz.1.503'. [ 547.797288][ T30] audit: type=1400 audit(547.520:298): avc: denied { create } for pid=4713 comm="syz.1.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 547.818718][ T30] audit: type=1400 audit(547.540:299): avc: denied { setopt } for pid=4713 comm="syz.1.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 548.418354][ T4724] netlink: 'syz.0.505': attribute type 4 has an invalid length. [ 550.153072][ T4749] syzkaller0: mtu less than device minimum [ 555.071340][ T4784] syzkaller0: entered allmulticast mode [ 565.059426][ T30] audit: type=1326 audit(564.780:300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4813 comm="syz.1.545" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 565.075928][ T30] audit: type=1326 audit(564.800:301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4813 comm="syz.1.545" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 565.079344][ T30] audit: type=1326 audit(564.800:302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4813 comm="syz.1.545" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 565.084378][ T30] audit: type=1326 audit(564.800:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4813 comm="syz.1.545" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 565.085187][ T30] audit: type=1326 audit(564.800:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4813 comm="syz.1.545" exe="/syz-executor" sig=0 arch=40000028 syscall=373 compat=1 ip=0x132750 code=0x7ffc0000 [ 565.085933][ T30] audit: type=1326 audit(564.800:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4813 comm="syz.1.545" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 565.097954][ T30] audit: type=1326 audit(564.800:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4813 comm="syz.1.545" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 565.692229][ T4816] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 565.796376][ T4816] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 566.515449][ T30] audit: type=1326 audit(566.230:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4818 comm="syz.1.547" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 566.516380][ T30] audit: type=1326 audit(566.230:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4818 comm="syz.1.547" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 566.533335][ T30] audit: type=1326 audit(566.240:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4818 comm="syz.1.547" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 575.815526][ T4827] syzkaller0: entered promiscuous mode [ 575.816082][ T4827] syzkaller0: entered allmulticast mode [ 583.994619][ T24] usb 1-1: new high-speed USB device number 16 using dummy_hcd [ 584.204717][ T24] usb 1-1: Using ep0 maxpacket: 8 [ 584.233247][ T24] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 584.234250][ T24] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 584.234724][ T24] usb 1-1: New USB device found, idVendor=046d, idProduct=c24f, bcdDevice= 0.00 [ 584.236487][ T24] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 584.252207][ T24] usb 1-1: config 0 descriptor?? [ 584.556879][ T24] usbhid 1-1:0.0: can't add hid device: -71 [ 584.557708][ T24] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 584.575607][ T24] usb 1-1: USB disconnect, device number 16 [ 588.393477][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 588.394713][ T30] audit: type=1400 audit(588.110:314): avc: denied { recv } for pid=4774 comm="syz.1.527" saddr=fe80::2 daddr=ff02::1 netif=eth0 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 588.525731][ T4840] syz.0.553 uses obsolete (PF_INET,SOCK_PACKET) [ 592.192213][ T4855] binder: 4852:4855 BC_REQUEST_DEATH_NOTIFICATION invalid ref 3 [ 592.251277][ T4855] binder: 4852:4855 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 592.252442][ T4855] binder: 4855 RLIMIT_NICE not set [ 596.259626][ T30] audit: type=1400 audit(595.980:315): avc: denied { create } for pid=4870 comm="syz.1.562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 596.353163][ T4872] netlink: 'syz.1.562': attribute type 1 has an invalid length. [ 596.356797][ T30] audit: type=1400 audit(596.070:316): avc: denied { write } for pid=4870 comm="syz.1.562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 596.361617][ T4872] netlink: 24 bytes leftover after parsing attributes in process `syz.1.562'. [ 599.727849][ T4895] netlink: 60 bytes leftover after parsing attributes in process `syz.0.571'. [ 600.444432][ T4899] gretap1: entered promiscuous mode [ 600.444967][ T4899] gretap1: entered allmulticast mode [ 600.890443][ T30] audit: type=1400 audit(600.610:317): avc: denied { bind } for pid=4900 comm="syz.1.574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 600.914339][ T30] audit: type=1400 audit(600.630:318): avc: denied { setopt } for pid=4900 comm="syz.1.574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 606.700661][ T30] audit: type=1400 audit(606.420:319): avc: denied { create } for pid=4925 comm="syz.0.583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 609.474199][ T30] audit: type=1400 audit(609.190:320): avc: denied { write } for pid=4925 comm="syz.0.583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 609.478036][ T4930] netlink: 8 bytes leftover after parsing attributes in process `syz.0.583'. [ 610.904232][ T30] audit: type=1400 audit(610.620:321): avc: denied { connect } for pid=4938 comm="syz.0.584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 617.968991][ T30] audit: type=1400 audit(617.690:322): avc: denied { setattr } for pid=4964 comm="syz.1.596" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 658.334481][ T30] audit: type=1326 audit(658.050:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4993 comm="syz.0.607" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 658.338045][ T30] audit: type=1326 audit(658.060:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4993 comm="syz.0.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 658.340457][ T30] audit: type=1326 audit(658.060:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4993 comm="syz.0.607" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 658.362083][ T30] audit: type=1326 audit(658.080:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4993 comm="syz.0.607" exe="/syz-executor" sig=0 arch=40000028 syscall=424 compat=1 ip=0x132750 code=0x7ffc0000 [ 658.383464][ T30] audit: type=1326 audit(658.100:327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4993 comm="syz.0.607" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 658.416128][ T30] audit: type=1326 audit(658.140:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4993 comm="syz.0.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 658.417349][ T30] audit: type=1326 audit(658.140:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4993 comm="syz.0.607" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 661.406382][ T30] audit: type=1400 audit(661.130:330): avc: denied { read } for pid=4998 comm="syz.0.609" dev="nsfs" ino=4026532632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 661.434798][ T30] audit: type=1400 audit(661.140:331): avc: denied { open } for pid=4998 comm="syz.0.609" path="net:[4026532632]" dev="nsfs" ino=4026532632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 664.864537][ T5014] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 664.925324][ T5014] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 668.826128][ T5029] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29797 sclass=netlink_route_socket pid=5029 comm=syz.1.621 [ 671.616391][ T30] audit: type=1326 audit(671.340:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5044 comm="syz.1.629" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x0 [ 674.766958][ T5050] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 674.826352][ T5050] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 675.386845][ T5053] tun0: tun_chr_ioctl cmd 1074025692 [ 675.398715][ T30] audit: type=1400 audit(675.120:333): avc: denied { bind } for pid=5047 comm="syz.0.630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 680.741076][ T5069] netlink: 28 bytes leftover after parsing attributes in process `syz.0.639'. [ 695.936120][ T30] audit: type=1400 audit(695.660:334): avc: denied { create } for pid=5079 comm="syz.0.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 711.925437][ T5095] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 711.986344][ T5095] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 749.137438][ T30] audit: type=1400 audit(748.860:335): avc: denied { accept } for pid=5129 comm="syz.0.665" laddr=::ffff:172.0.0.0 lport=36203 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 750.396878][ T5133] netlink: 28 bytes leftover after parsing attributes in process `syz.0.666'. [ 750.495472][ T5133] netlink: 28 bytes leftover after parsing attributes in process `syz.0.666'. [ 771.830071][ T5167] netlink: 4 bytes leftover after parsing attributes in process `syz.1.678'. [ 772.347801][ T5167] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=5167 comm=syz.1.678 [ 772.350449][ T30] audit: type=1400 audit(772.070:336): avc: denied { read } for pid=5164 comm="syz.1.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 786.681053][ T30] audit: type=1400 audit(786.400:337): avc: denied { listen } for pid=5208 comm="syz.1.697" lport=44927 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 786.694717][ T30] audit: type=1400 audit(786.410:338): avc: denied { remove_name } for pid=3078 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 786.712817][ T30] audit: type=1400 audit(786.430:339): avc: denied { rename } for pid=3078 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 787.345902][ T30] audit: type=1400 audit(787.060:340): avc: denied { getopt } for pid=5208 comm="syz.1.697" lport=44927 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 792.707570][ T30] audit: type=1400 audit(792.430:341): avc: denied { getopt } for pid=5228 comm="syz.1.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 796.159517][ T30] audit: type=1400 audit(795.880:342): avc: denied { nlmsg_read } for pid=5239 comm="syz.1.709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 800.174715][ T29] usb 1-1: new high-speed USB device number 17 using dummy_hcd [ 800.395044][ T29] usb 1-1: Using ep0 maxpacket: 8 [ 800.559555][ T29] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 800.560118][ T29] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 800.560581][ T29] usb 1-1: New USB device found, idVendor=046d, idProduct=c20e, bcdDevice= 0.00 [ 800.560990][ T29] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 800.600641][ T29] usb 1-1: config 0 descriptor?? [ 801.351436][ T29] hid-generic 0003:046D:C20E.0007: unbalanced delimiter at end of report description [ 801.384470][ T29] hid-generic 0003:046D:C20E.0007: probe with driver hid-generic failed with error -22 [ 801.630282][ T1882] usb 1-1: USB disconnect, device number 17 [ 810.721171][ T5289] TCP: tcp_parse_options: Illegal window scaling value 127 > 14 received [ 811.226470][ T5291] netlink: 40 bytes leftover after parsing attributes in process `syz.0.731'. [ 817.688820][ T5316] netlink: 24 bytes leftover after parsing attributes in process `syz.1.742'. [ 836.364634][ T30] audit: type=1400 audit(836.080:343): avc: denied { sqpoll } for pid=5347 comm="syz.1.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 843.606242][ T30] audit: type=1400 audit(843.320:344): avc: denied { read } for pid=5370 comm="syz.1.765" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 843.649213][ T30] audit: type=1400 audit(843.370:345): avc: denied { open } for pid=5370 comm="syz.1.765" path="/dev/loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 843.704966][ T30] audit: type=1400 audit(843.420:346): avc: denied { ioctl } for pid=5370 comm="syz.1.765" path="/dev/loop-control" dev="devtmpfs" ino=638 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 847.683397][ T5393] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 847.745703][ T5393] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 850.414808][ T8] usb 1-1: new high-speed USB device number 18 using dummy_hcd [ 850.844567][ T8] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 850.845243][ T8] usb 1-1: New USB device found, idVendor=046d, idProduct=08c1, bcdDevice=ee.8d [ 850.845591][ T8] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 850.868780][ T8] usb 1-1: config 0 descriptor?? [ 851.202971][ T8] usb 1-1: USB disconnect, device number 18 [ 853.346849][ T30] audit: type=1400 audit(853.070:347): avc: denied { read } for pid=5411 comm="syz.0.779" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 853.360883][ T30] audit: type=1400 audit(853.080:348): avc: denied { open } for pid=5411 comm="syz.0.779" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 856.959603][ T30] audit: type=1400 audit(856.680:349): avc: denied { write } for pid=5426 comm="syz.1.785" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 862.652702][ T5452] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 862.751784][ T5452] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 865.628573][ T5460] netlink: 8 bytes leftover after parsing attributes in process `syz.0.795'. [ 865.875994][ T30] audit: type=1326 audit(865.590:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5454 comm="syz.1.793" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7fc00000 [ 871.938623][ T30] audit: type=1326 audit(871.660:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5479 comm="syz.0.801" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 871.948832][ T30] audit: type=1326 audit(871.670:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5479 comm="syz.0.801" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 871.949768][ T30] audit: type=1326 audit(871.670:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5479 comm="syz.0.801" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 872.023331][ T30] audit: type=1326 audit(871.740:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5479 comm="syz.0.801" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 872.025192][ T30] audit: type=1326 audit(871.740:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5479 comm="syz.0.801" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=1 ip=0x130548 code=0x7ffc0000 [ 872.026257][ T30] audit: type=1326 audit(871.740:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5479 comm="syz.0.801" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=1 ip=0x13211c code=0x7ffc0000 [ 872.027077][ T30] audit: type=1326 audit(871.740:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5479 comm="syz.0.801" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=1 ip=0x13211c code=0x7ffc0000 [ 872.084217][ T30] audit: type=1326 audit(871.800:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5479 comm="syz.0.801" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=1 ip=0x13211c code=0x7ffc0000 [ 872.115150][ T30] audit: type=1326 audit(871.830:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5479 comm="syz.0.801" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=1 ip=0x13211c code=0x7ffc0000 [ 872.216091][ T30] audit: type=1326 audit(871.940:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5479 comm="syz.0.801" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=1 ip=0x13211c code=0x7ffc0000 [ 872.344495][ T8] usb 1-1: new high-speed USB device number 19 using dummy_hcd [ 872.665125][ T8] usb 1-1: Using ep0 maxpacket: 8 [ 872.786582][ T8] usb 1-1: config 150 has an invalid interface number: 1 but max is 0 [ 872.787045][ T8] usb 1-1: config 150 has no interface number 0 [ 872.787387][ T8] usb 1-1: config 150 interface 1 has no altsetting 0 [ 872.959733][ T8] usb 1-1: New USB device found, idVendor=04e2, idProduct=1424, bcdDevice=c7.eb [ 872.960276][ T8] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 872.960641][ T8] usb 1-1: Product: syz [ 872.960900][ T8] usb 1-1: Manufacturer: syz [ 872.961177][ T8] usb 1-1: SerialNumber: syz [ 873.440721][ T29] usb 1-1: USB disconnect, device number 19 [ 875.874185][ T5494] tunl0: entered promiscuous mode [ 875.950715][ T5494] netlink: 'syz.0.807': attribute type 3 has an invalid length. [ 875.951196][ T5494] netlink: 9 bytes leftover after parsing attributes in process `syz.0.807'. [ 880.522487][ T30] kauditd_printk_skb: 39 callbacks suppressed [ 880.522616][ T30] audit: type=1400 audit(880.240:400): avc: denied { map } for pid=5510 comm="syz.1.812" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 886.635371][ T5538] netlink: 'syz.1.819': attribute type 4 has an invalid length. [ 886.664099][ T30] audit: type=1400 audit(886.380:401): avc: denied { ioctl } for pid=5535 comm="syz.0.818" path="socket:[10698]" dev="sockfs" ino=10698 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 886.765058][ T5538] netlink: 'syz.1.819': attribute type 4 has an invalid length. [ 896.537537][ T5568] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 896.576243][ T5568] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 897.638185][ T5571] pim6reg1: entered promiscuous mode [ 897.639180][ T5571] pim6reg1: entered allmulticast mode [ 907.450087][ T5605] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 907.517016][ T5605] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 908.779185][ T30] audit: type=1400 audit(908.500:402): avc: denied { recv } for pid=3267 comm="syz-executor" saddr=127.0.0.1 src=60306 daddr=127.0.0.1 dest=30004 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 908.791631][ T30] audit: type=1400 audit(908.510:403): avc: denied { read } for pid=3078 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 908.800971][ T30] audit: type=1400 audit(908.520:404): avc: denied { search } for pid=3078 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 908.801757][ T30] audit: type=1400 audit(908.520:405): avc: denied { append } for pid=3078 comm="syslogd" name="messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 908.802496][ T30] audit: type=1400 audit(908.520:406): avc: denied { open } for pid=3078 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 908.803212][ T30] audit: type=1400 audit(908.520:407): avc: denied { getattr } for pid=3078 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 908.834742][ T30] audit: type=1400 audit(908.550:408): avc: denied { recv } for pid=5607 comm="syz.0.842" saddr=127.0.0.1 src=30004 daddr=127.0.0.1 dest=60306 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 908.889504][ T30] audit: type=1400 audit(908.610:409): avc: denied { read write } for pid=5609 comm="syz.1.843" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 908.892471][ T30] audit: type=1400 audit(908.610:410): avc: denied { open } for pid=5609 comm="syz.1.843" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 908.895571][ T30] audit: type=1400 audit(908.620:411): avc: denied { ioctl } for pid=5609 comm="syz.1.843" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 913.019986][ T5623] Illegal XDP return value 4294966772 on prog (id 38) dev syz_tun, expect packet loss! [ 914.099470][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 914.099558][ T30] audit: type=1400 audit(913.820:431): avc: denied { setopt } for pid=5624 comm="syz.1.849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 914.637540][ T30] audit: type=1400 audit(914.360:432): avc: denied { create } for pid=5624 comm="syz.1.849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 914.647151][ T30] audit: type=1400 audit(914.360:433): avc: denied { module_request } for pid=5624 comm="syz.1.849" kmod="net-pf-10-proto-0-type-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 915.295387][ T30] audit: type=1400 audit(915.000:434): avc: denied { sqpoll } for pid=5624 comm="syz.1.849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 915.333316][ T30] audit: type=1400 audit(915.050:435): avc: denied { create } for pid=5624 comm="syz.1.849" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 915.367058][ T30] audit: type=1400 audit(915.090:436): avc: denied { map } for pid=5624 comm="syz.1.849" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10191 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 915.367990][ T30] audit: type=1400 audit(915.090:437): avc: denied { read write } for pid=5624 comm="syz.1.849" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10191 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 917.397206][ T30] audit: type=1400 audit(917.120:438): avc: denied { create } for pid=5634 comm="syz.1.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 917.439119][ T30] audit: type=1400 audit(917.160:439): avc: denied { setopt } for pid=5634 comm="syz.1.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 917.456786][ T30] audit: type=1400 audit(917.180:440): avc: denied { accept } for pid=5634 comm="syz.1.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 923.005688][ T30] audit: type=1400 audit(922.730:441): avc: denied { execmem } for pid=5643 comm="syz.1.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 930.922356][ T30] audit: type=1400 audit(930.640:442): avc: denied { read write } for pid=5643 comm="syz.1.853" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 930.923352][ T30] audit: type=1400 audit(930.640:443): avc: denied { open } for pid=5643 comm="syz.1.853" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 937.324573][ T30] audit: type=1400 audit(937.040:444): avc: denied { recv } for pid=4867 comm="syz.0.560" saddr=fe80::2 daddr=ff02::1 netif=eth0 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 937.825830][ T30] audit: type=1400 audit(937.540:445): avc: denied { search } for pid=5647 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 937.937850][ T30] audit: type=1400 audit(937.660:446): avc: denied { read } for pid=5648 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 937.939011][ T30] audit: type=1400 audit(937.660:447): avc: denied { open } for pid=5648 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 937.939728][ T30] audit: type=1400 audit(937.660:448): avc: denied { getattr } for pid=5648 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 938.096953][ T30] audit: type=1400 audit(937.820:449): avc: denied { write } for pid=5647 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 938.117316][ T30] audit: type=1400 audit(937.830:450): avc: denied { add_name } for pid=5647 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 938.118105][ T30] audit: type=1400 audit(937.830:451): avc: denied { create } for pid=5647 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 938.118788][ T30] audit: type=1400 audit(937.830:452): avc: denied { write open } for pid=5647 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=2863 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 938.134220][ T30] audit: type=1400 audit(937.850:453): avc: denied { append } for pid=5647 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2863 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 942.885702][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 942.885888][ T30] audit: type=1400 audit(942.590:458): avc: denied { execute } for pid=5652 comm="syz-executor" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 942.887967][ T30] audit: type=1400 audit(942.610:459): avc: denied { execute_no_trans } for pid=5652 comm="syz-executor" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 943.020368][ T30] audit: type=1400 audit(942.740:460): avc: denied { mounton } for pid=5653 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 943.021251][ T30] audit: type=1400 audit(942.740:461): avc: denied { mount } for pid=5653 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 943.045058][ T30] audit: type=1400 audit(942.760:462): avc: denied { read } for pid=5653 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 943.045950][ T30] audit: type=1400 audit(942.760:463): avc: denied { open } for pid=5653 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 943.059694][ T30] audit: type=1400 audit(942.770:464): avc: denied { mounton } for pid=5653 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 943.416069][ T30] audit: type=1400 audit(943.140:465): avc: denied { sys_module } for pid=5653 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 947.527923][ T5653] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 947.559458][ T5653] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 949.579845][ T5653] hsr_slave_0: entered promiscuous mode [ 949.615300][ T5653] hsr_slave_1: entered promiscuous mode [ 949.654945][ T5653] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 949.655423][ T5653] Cannot create hsr debugfs directory [ 950.539859][ T5653] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 950.788106][ T5653] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 950.986436][ T5653] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 951.194882][ T5653] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 951.889007][ T5653] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 951.929140][ T5653] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 951.977237][ T5653] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 952.017632][ T5653] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 953.711209][ T30] audit: type=1400 audit(953.430:466): avc: denied { compute_member } for pid=5701 comm="syz.1.858" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 954.151553][ T5653] 8021q: adding VLAN 0 to HW filter on device bond0 [ 960.985400][ T30] audit: type=1400 audit(960.700:467): avc: denied { create } for pid=5732 comm="syz.1.862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 961.055536][ T30] audit: type=1400 audit(960.760:468): avc: denied { setopt } for pid=5732 comm="syz.1.862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 961.100768][ T30] audit: type=1400 audit(960.820:469): avc: denied { name_bind } for pid=5732 comm="syz.1.862" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 963.147805][ T5653] veth0_vlan: entered promiscuous mode [ 963.230930][ T5653] veth1_vlan: entered promiscuous mode [ 963.492767][ T5653] veth0_macvtap: entered promiscuous mode [ 963.545866][ T5653] veth1_macvtap: entered promiscuous mode [ 963.828424][ T5653] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 963.829656][ T5653] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 963.830245][ T5653] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 963.830811][ T5653] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 964.184129][ T30] audit: type=1400 audit(963.900:470): avc: denied { mounton } for pid=5653 comm="syz-executor" path="/syzkaller.A7jhyc/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 964.192622][ T30] audit: type=1400 audit(963.910:471): avc: denied { mount } for pid=5653 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 964.244419][ T30] audit: type=1400 audit(963.960:472): avc: denied { mounton } for pid=5653 comm="syz-executor" path="/syzkaller.A7jhyc/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 964.264658][ T30] audit: type=1400 audit(963.980:473): avc: denied { mount } for pid=5653 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 964.322246][ T30] audit: type=1400 audit(964.040:474): avc: denied { unmount } for pid=5653 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 964.344342][ T30] audit: type=1400 audit(964.060:475): avc: denied { mounton } for pid=5653 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 964.358539][ T30] audit: type=1400 audit(964.080:476): avc: denied { mount } for pid=5653 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 968.661380][ T30] audit: type=1400 audit(968.380:477): avc: denied { mounton } for pid=5767 comm="syz.0.868" path="/proc/11/task" dev="proc" ino=11590 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 971.830004][ T30] audit: type=1400 audit(971.550:478): avc: denied { bind } for pid=5784 comm="syz.1.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 975.757844][ T30] audit: type=1400 audit(975.480:479): avc: denied { ioctl } for pid=5813 comm="syz.1.885" path="socket:[11072]" dev="sockfs" ino=11072 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 977.814398][ T30] audit: type=1400 audit(977.520:480): avc: denied { ioctl } for pid=5825 comm="syz.0.890" path="socket:[11711]" dev="sockfs" ino=11711 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 977.920596][ T30] audit: type=1400 audit(977.640:481): avc: denied { read } for pid=5824 comm="syz.1.889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 980.140906][ T30] audit: type=1400 audit(979.860:482): avc: denied { create } for pid=5843 comm="syz.0.898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 980.149157][ T30] audit: type=1400 audit(979.870:483): avc: denied { connect } for pid=5843 comm="syz.0.898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 980.164648][ T30] audit: type=1400 audit(979.880:484): avc: denied { setopt } for pid=5843 comm="syz.0.898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 980.687672][ T30] audit: type=1400 audit(980.410:485): avc: denied { create } for pid=5849 comm="syz.1.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 980.794372][ T30] audit: type=1400 audit(980.500:486): avc: denied { ioctl } for pid=5849 comm="syz.1.901" path="socket:[11108]" dev="sockfs" ino=11108 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 980.853270][ T5850] netlink: 68 bytes leftover after parsing attributes in process `syz.1.901'. [ 980.856492][ T5850] netlink: 48 bytes leftover after parsing attributes in process `syz.1.901'. [ 980.997230][ T5850] netlink: 20 bytes leftover after parsing attributes in process `syz.1.901'. [ 981.055385][ T30] audit: type=1400 audit(980.780:487): avc: denied { write } for pid=5849 comm="syz.1.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 981.650060][ T30] audit: type=1400 audit(981.370:488): avc: denied { nlmsg_write } for pid=5849 comm="syz.1.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 981.707036][ T30] audit: type=1400 audit(981.430:489): avc: denied { write } for pid=5849 comm="syz.1.901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 981.742781][ T30] audit: type=1400 audit(981.460:490): avc: denied { ioctl } for pid=5858 comm="syz.0.903" path="socket:[11788]" dev="sockfs" ino=11788 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 982.230538][ T30] audit: type=1400 audit(981.950:491): avc: denied { unmount } for pid=5653 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 982.946915][ T30] audit: type=1400 audit(982.670:492): avc: denied { write } for pid=5866 comm="syz.1.907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 983.134408][ T30] audit: type=1400 audit(982.850:493): avc: denied { setopt } for pid=5866 comm="syz.1.907" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 983.529570][ T30] audit: type=1400 audit(983.250:494): avc: denied { read } for pid=5870 comm="syz.0.909" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 983.531305][ T30] audit: type=1400 audit(983.250:495): avc: denied { open } for pid=5870 comm="syz.0.909" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 983.613165][ T5871] binder: 5870:5871 tried to acquire reference to desc 0, got 1 instead [ 983.636868][ T5871] binder: 5870:5871 got transaction with invalid parent offset or type [ 983.641164][ T5871] binder: 5870:5871 transaction call to 5870:0 failed 8/29201/-22, size 80-24 line 3540 [ 983.664838][ T5747] binder: undelivered TRANSACTION_ERROR: 29201 [ 987.603022][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 987.603338][ T30] audit: type=1400 audit(987.320:503): avc: denied { unmount } for pid=5653 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1003.774429][ T30] audit: type=1400 audit(1003.490:504): avc: denied { name_bind } for pid=5902 comm="syz.1.923" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1010.934851][ T30] audit: type=1400 audit(1010.650:505): avc: denied { create } for pid=5931 comm="syz.0.934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1010.950271][ T30] audit: type=1400 audit(1010.660:506): avc: denied { ioctl } for pid=5931 comm="syz.0.934" path="socket:[12333]" dev="sockfs" ino=12333 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1010.958589][ T30] audit: type=1400 audit(1010.670:507): avc: denied { bind } for pid=5931 comm="syz.0.934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1010.975092][ T30] audit: type=1400 audit(1010.690:508): avc: denied { connect } for pid=5931 comm="syz.0.934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1010.982395][ T30] audit: type=1400 audit(1010.700:509): avc: denied { write } for pid=5931 comm="syz.0.934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1011.010477][ T30] audit: type=1400 audit(1010.730:510): avc: denied { read } for pid=5931 comm="syz.0.934" path="socket:[12333]" dev="sockfs" ino=12333 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1011.326084][ T30] audit: type=1400 audit(1011.050:511): avc: denied { bind } for pid=5933 comm="syz.1.935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1011.836482][ T30] audit: type=1400 audit(1011.560:512): avc: denied { create } for pid=5936 comm="syz.1.936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1012.248491][ C0] vcan0: j1939_tp_rxtimer: 0x00000000bca05c1e: rx timeout, send abort [ 1012.258120][ C0] vcan0: j1939_xtp_rx_abort_one: 0x00000000bca05c1e: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 1013.403079][ T5946] netlink: 4 bytes leftover after parsing attributes in process `syz.0.940'. [ 1015.540182][ T30] audit: type=1326 audit(1015.240:513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5960 comm="syz.0.947" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x0 [ 1019.308104][ T30] audit: type=1400 audit(1019.020:514): avc: denied { create } for pid=5977 comm="syz.0.955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1019.314532][ T30] audit: type=1400 audit(1019.030:515): avc: denied { write } for pid=5977 comm="syz.0.955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1019.315489][ T30] audit: type=1400 audit(1019.030:516): avc: denied { connect } for pid=5977 comm="syz.0.955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1019.316084][ T30] audit: type=1400 audit(1019.030:517): avc: denied { name_connect } for pid=5977 comm="syz.0.955" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 1019.366153][ T30] audit: type=1400 audit(1019.090:518): avc: denied { shutdown } for pid=5977 comm="syz.0.955" lport=49657 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1019.375129][ T30] audit: type=1400 audit(1019.100:519): avc: denied { getopt } for pid=5977 comm="syz.0.955" lport=49657 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1021.569761][ T30] audit: type=1400 audit(1021.290:520): avc: denied { getopt } for pid=5995 comm="syz.1.963" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1022.957200][ T6009] netlink: 8 bytes leftover after parsing attributes in process `syz.1.968'. [ 1022.957793][ T6009] netlink: 8 bytes leftover after parsing attributes in process `syz.1.968'. [ 1023.595708][ T6014] netlink: 8 bytes leftover after parsing attributes in process `syz.1.970'. [ 1023.596248][ T6014] netlink: 8 bytes leftover after parsing attributes in process `syz.1.970'. [ 1024.004227][ T30] audit: type=1400 audit(1023.720:521): avc: denied { create } for pid=6016 comm="syz.0.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1024.024542][ T30] audit: type=1400 audit(1023.740:522): avc: denied { getopt } for pid=6016 comm="syz.0.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1026.211071][ T30] audit: type=1400 audit(1025.930:523): avc: denied { read } for pid=6033 comm="syz.0.980" name="card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1026.214718][ T30] audit: type=1400 audit(1025.930:524): avc: denied { open } for pid=6033 comm="syz.0.980" path="/dev/dri/card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1026.758306][ T30] audit: type=1400 audit(1026.470:525): avc: denied { ioctl } for pid=6033 comm="syz.0.980" path="/dev/dri/card1" dev="devtmpfs" ino=620 ioctlcmd=0x643a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1027.132261][ T30] audit: type=1400 audit(1026.850:526): avc: denied { execute_no_trans } for pid=6034 comm="syz.1.979" path="/485/file1" dev="tmpfs" ino=2505 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1031.891111][ T30] audit: type=1326 audit(1031.610:527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6067 comm="syz.1.991" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x0 [ 1032.656800][ T30] audit: type=1400 audit(1032.380:528): avc: denied { create } for pid=6073 comm="syz.0.995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1035.116033][ T30] audit: type=1400 audit(1034.840:529): avc: denied { mounton } for pid=6081 comm="syz.1.998" path="/bus" dev="tmpfs" ino=2541 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1036.645286][ T30] audit: type=1326 audit(1036.370:530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.1.1001" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1036.647716][ T30] audit: type=1326 audit(1036.370:531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.1.1001" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1036.650532][ T30] audit: type=1326 audit(1036.370:532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.1.1001" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1036.652303][ T30] audit: type=1326 audit(1036.370:533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.1.1001" exe="/syz-executor" sig=0 arch=40000028 syscall=311 compat=1 ip=0x132750 code=0x7ffc0000 [ 1036.662879][ T30] audit: type=1326 audit(1036.380:534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.1.1001" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1036.704212][ T30] audit: type=1326 audit(1036.420:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6089 comm="syz.1.1001" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1039.855420][ T30] audit: type=1400 audit(1039.580:536): avc: denied { setopt } for pid=6108 comm="syz.1.1010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1039.877672][ T30] audit: type=1400 audit(1039.600:537): avc: denied { write } for pid=6108 comm="syz.1.1010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1040.822004][ T30] audit: type=1326 audit(1040.540:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6106 comm="syz.0.1009" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1040.822900][ T30] audit: type=1326 audit(1040.540:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6106 comm="syz.0.1009" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1040.830500][ T30] audit: type=1326 audit(1040.540:540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6106 comm="syz.0.1009" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1040.842994][ T30] audit: type=1326 audit(1040.560:541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6106 comm="syz.0.1009" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1040.844836][ T30] audit: type=1326 audit(1040.560:542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6106 comm="syz.0.1009" exe="/syz-executor" sig=0 arch=40000028 syscall=350 compat=1 ip=0x132750 code=0x7ffc0000 [ 1040.845495][ T30] audit: type=1326 audit(1040.560:543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6106 comm="syz.0.1009" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1040.846161][ T30] audit: type=1326 audit(1040.560:544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6106 comm="syz.0.1009" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1040.856338][ T30] audit: type=1326 audit(1040.580:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6106 comm="syz.0.1009" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1059.984675][ T30] kauditd_printk_skb: 26 callbacks suppressed [ 1059.984800][ T30] audit: type=1400 audit(1059.700:572): avc: denied { create } for pid=6173 comm="syz.0.1032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1063.489867][ T30] audit: type=1400 audit(1063.210:573): avc: denied { create } for pid=6197 comm="syz.1.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1063.516506][ T30] audit: type=1400 audit(1063.240:574): avc: denied { setopt } for pid=6197 comm="syz.1.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1064.688267][ T30] audit: type=1400 audit(1064.410:575): avc: denied { bind } for pid=6197 comm="syz.1.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1066.305498][ T5694] usb 1-1: new full-speed USB device number 20 using dummy_hcd [ 1066.705823][ T5694] usb 1-1: config 1 has an invalid descriptor of length 77, skipping remainder of the config [ 1066.707971][ T5694] usb 1-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 22 [ 1066.832499][ T5694] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1066.835011][ T5694] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1066.835726][ T5694] usb 1-1: SerialNumber: syz [ 1066.912992][ T5694] cdc_acm 1-1:1.0: invalid descriptor buffer length [ 1067.102025][ T5747] usb 1-1: USB disconnect, device number 20 [ 1069.045208][ T30] audit: type=1400 audit(1068.770:576): avc: denied { create } for pid=6219 comm="syz.1.1048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1069.066651][ T30] audit: type=1400 audit(1068.790:577): avc: denied { connect } for pid=6219 comm="syz.1.1048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1069.762650][ T30] audit: type=1400 audit(1069.480:578): avc: denied { write } for pid=6223 comm="syz.1.1050" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1070.645009][ T30] audit: type=1400 audit(1070.360:579): avc: denied { create } for pid=6233 comm="syz.0.1054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1070.658653][ T30] audit: type=1400 audit(1070.380:580): avc: denied { write } for pid=6233 comm="syz.0.1054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1070.659350][ T30] audit: type=1400 audit(1070.380:581): avc: denied { nlmsg_read } for pid=6233 comm="syz.0.1054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1075.889008][ T30] audit: type=1400 audit(1075.610:582): avc: denied { create } for pid=6260 comm="syz.1.1065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1077.449706][ T6274] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1069'. [ 1082.447019][ T6294] netlink: 'syz.0.1075': attribute type 1 has an invalid length. [ 1083.506527][ T6300] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1078'. [ 1085.835835][ T30] audit: type=1400 audit(1085.550:583): avc: denied { setopt } for pid=6313 comm="syz.0.1084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1085.837582][ T30] audit: type=1400 audit(1085.560:584): avc: denied { bind } for pid=6313 comm="syz.0.1084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1085.841074][ T30] audit: type=1400 audit(1085.560:585): avc: denied { name_bind } for pid=6313 comm="syz.0.1084" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1085.842640][ T30] audit: type=1400 audit(1085.560:586): avc: denied { node_bind } for pid=6313 comm="syz.0.1084" saddr=127.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 1085.882025][ T30] audit: type=1400 audit(1085.600:587): avc: denied { name_connect } for pid=6313 comm="syz.0.1084" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1086.022975][ T30] audit: type=1400 audit(1085.740:588): avc: denied { read } for pid=6313 comm="syz.0.1084" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1090.435117][ T30] audit: type=1400 audit(1090.150:589): avc: denied { create } for pid=6334 comm="syz.1.1092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1090.450402][ T30] audit: type=1400 audit(1090.170:590): avc: denied { write } for pid=6334 comm="syz.1.1092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1090.507583][ T30] audit: type=1400 audit(1090.200:591): avc: denied { connect } for pid=6335 comm="syz.0.1093" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1090.508363][ T30] audit: type=1400 audit(1090.220:592): avc: denied { write } for pid=6335 comm="syz.0.1093" laddr=fe80::a8aa:aaff:feaa:aa16 lport=58 faddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1090.558122][ T6337] netlink: 'syz.0.1093': attribute type 13 has an invalid length. [ 1097.108838][ T6374] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1106'. [ 1097.977478][ T6381] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1108'. [ 1097.978740][ T6381] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1108'. [ 1100.471674][ T6395] netlink: 'syz.0.1114': attribute type 1 has an invalid length. [ 1109.305886][ T6436] syzkaller0: entered promiscuous mode [ 1109.306623][ T6436] syzkaller0: entered allmulticast mode [ 1127.184243][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1127.184567][ T30] audit: type=1400 audit(1126.900:595): avc: denied { relabelfrom } for pid=6465 comm="syz.0.1139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1127.189361][ T30] audit: type=1400 audit(1126.910:596): avc: denied { relabelto } for pid=6465 comm="syz.0.1139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1133.109080][ T30] audit: type=1400 audit(1132.830:597): avc: denied { connect } for pid=6488 comm="syz.1.1147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1133.177099][ T30] audit: type=1400 audit(1132.900:598): avc: denied { listen } for pid=6488 comm="syz.1.1147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1133.421164][ T30] audit: type=1400 audit(1133.130:599): avc: denied { accept } for pid=6488 comm="syz.1.1147" lport=48651 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1135.568448][ T6500] ip6tnl1: entered promiscuous mode [ 1138.087460][ T30] audit: type=1400 audit(1137.810:600): avc: denied { bind } for pid=6513 comm="syz.1.1157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1138.093000][ T30] audit: type=1400 audit(1137.810:601): avc: denied { node_bind } for pid=6513 comm="syz.1.1157" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1145.040295][ T6540] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1145.136462][ T6540] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1148.380187][ T6557] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1148.438475][ T6557] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1148.718753][ T30] audit: type=1400 audit(1148.440:602): avc: denied { execute } for pid=6558 comm="syz.1.1176" path=2F6D656D66643A59FFFF202864656C6574656429 dev="hugetlbfs" ino=13918 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 1151.344977][ T30] audit: type=1400 audit(1151.050:603): avc: denied { bind } for pid=6576 comm="syz.0.1185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1152.280846][ T6585] netlink: 13 bytes leftover after parsing attributes in process `syz.1.1184'. [ 1153.977042][ T6593] netlink: 47 bytes leftover after parsing attributes in process `syz.0.1190'. [ 1153.977578][ T6593] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1190'. [ 1158.048233][ T30] audit: type=1326 audit(1157.770:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6616 comm="syz.1.1201" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1158.067951][ T30] audit: type=1326 audit(1157.790:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6616 comm="syz.1.1201" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1158.068826][ T30] audit: type=1326 audit(1157.790:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6616 comm="syz.1.1201" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1158.084244][ T30] audit: type=1326 audit(1157.800:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6616 comm="syz.1.1201" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1158.085063][ T30] audit: type=1326 audit(1157.800:608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6616 comm="syz.1.1201" exe="/syz-executor" sig=0 arch=40000028 syscall=8 compat=1 ip=0x132750 code=0x7ffc0000 [ 1158.085740][ T30] audit: type=1326 audit(1157.800:609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6616 comm="syz.1.1201" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1158.086376][ T30] audit: type=1326 audit(1157.800:610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6616 comm="syz.1.1201" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1160.168346][ T30] audit: type=1400 audit(1159.890:611): avc: denied { write } for pid=6629 comm="syz.1.1204" name="task" dev="proc" ino=14028 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1160.214711][ T30] audit: type=1400 audit(1159.930:612): avc: denied { add_name } for pid=6629 comm="syz.1.1204" name="core" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1160.215680][ T30] audit: type=1400 audit(1159.930:613): avc: denied { create } for pid=6629 comm="syz.1.1204" name="core" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 1161.446945][ T6638] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1161.506001][ T6638] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1162.658821][ T29] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 1162.858247][ T29] usb 1-1: Using ep0 maxpacket: 8 [ 1162.924591][ T29] usb 1-1: config 0 has an invalid interface number: 183 but max is 0 [ 1162.925125][ T29] usb 1-1: config 0 has no interface number 0 [ 1163.024042][ T29] usb 1-1: New USB device found, idVendor=1e2d, idProduct=00f2, bcdDevice=dd.b3 [ 1163.024538][ T29] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1163.024938][ T29] usb 1-1: Product: syz [ 1163.025205][ T29] usb 1-1: Manufacturer: syz [ 1163.025472][ T29] usb 1-1: SerialNumber: syz [ 1163.061461][ T29] usb 1-1: config 0 descriptor?? [ 1163.102138][ T29] option 1-1:0.183: GSM modem (1-port) converter detected [ 1163.303188][ T4536] usb 1-1: USB disconnect, device number 21 [ 1163.371262][ T4536] option 1-1:0.183: device disconnected [ 1163.975193][ T4536] usb 1-1: new high-speed USB device number 22 using dummy_hcd [ 1164.174794][ T4536] usb 1-1: Using ep0 maxpacket: 32 [ 1164.274887][ T4536] usb 1-1: New USB device found, idVendor=0413, idProduct=6029, bcdDevice=b2.3d [ 1164.275369][ T4536] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1164.275690][ T4536] usb 1-1: Product: syz [ 1164.275938][ T4536] usb 1-1: Manufacturer: syz [ 1164.276184][ T4536] usb 1-1: SerialNumber: syz [ 1164.306594][ T4536] usb 1-1: config 0 descriptor?? [ 1164.536932][ T29] usb 1-1: USB disconnect, device number 22 [ 1168.579614][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 1168.579704][ T30] audit: type=1400 audit(1168.300:617): avc: denied { getopt } for pid=6667 comm="syz.0.1219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1182.126963][ T30] audit: type=1326 audit(1181.850:618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6704 comm="syz.0.1232" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1182.129179][ T30] audit: type=1326 audit(1181.850:619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6704 comm="syz.0.1232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1182.131517][ T30] audit: type=1326 audit(1181.850:620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6704 comm="syz.0.1232" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1182.134795][ T30] audit: type=1326 audit(1181.850:621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6704 comm="syz.0.1232" exe="/syz-executor" sig=0 arch=40000028 syscall=372 compat=1 ip=0x132750 code=0x7ffc0000 [ 1182.159681][ T30] audit: type=1326 audit(1181.850:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6704 comm="syz.0.1232" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1182.160476][ T30] audit: type=1326 audit(1181.870:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6704 comm="syz.0.1232" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1189.840937][ T6725] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1189.876290][ T6725] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1191.444543][ T6741] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1191.520644][ T6741] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1194.462639][ T6748] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1249'. [ 1198.106820][ T30] audit: type=1400 audit(1197.830:624): avc: denied { lock } for pid=6755 comm="syz.1.1252" path="socket:[14585]" dev="sockfs" ino=14585 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1202.874330][ T30] audit: type=1400 audit(1202.590:625): avc: denied { read write } for pid=6767 comm="syz.1.1256" name="vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1202.890385][ T30] audit: type=1400 audit(1202.610:626): avc: denied { open } for pid=6767 comm="syz.1.1256" path="/dev/vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1202.924473][ T30] audit: type=1400 audit(1202.640:627): avc: denied { ioctl } for pid=6767 comm="syz.1.1256" path="/dev/vhost-net" dev="devtmpfs" ino=715 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1207.058189][ T37] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1207.338235][ T37] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1207.579115][ T37] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1207.826194][ T37] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1208.739486][ T30] audit: type=1400 audit(1208.450:628): avc: denied { read } for pid=3123 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1211.909776][ T37] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1212.029566][ T37] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1212.090647][ T37] bond0 (unregistering): Released all slaves [ 1212.499334][ T37] hsr_slave_0: left promiscuous mode [ 1212.539940][ T37] hsr_slave_1: left promiscuous mode [ 1212.724484][ T37] veth1_macvtap: left promiscuous mode [ 1212.727124][ T37] veth0_macvtap: left promiscuous mode [ 1212.729153][ T37] veth1_vlan: left promiscuous mode [ 1212.730873][ T37] veth0_vlan: left promiscuous mode [ 1223.719044][ T6773] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1223.746520][ T6773] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1225.002129][ T30] audit: type=1400 audit(1224.720:629): avc: denied { sys_chroot } for pid=6856 comm="dhcpcd" capability=18 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 1225.007154][ T30] audit: type=1400 audit(1224.720:630): avc: denied { setgid } for pid=6856 comm="dhcpcd" capability=6 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 1225.057762][ T30] audit: type=1400 audit(1224.780:631): avc: denied { setuid } for pid=6856 comm="dhcpcd" capability=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 1225.059018][ T30] audit: type=1400 audit(1224.780:632): avc: denied { setrlimit } for pid=6856 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=process permissive=1 [ 1225.898981][ T6773] hsr_slave_0: entered promiscuous mode [ 1225.959397][ T6773] hsr_slave_1: entered promiscuous mode [ 1225.996164][ T6773] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1225.996796][ T6773] Cannot create hsr debugfs directory [ 1229.062203][ T6773] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1229.121906][ T6773] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1229.169747][ T6773] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1229.207697][ T6773] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1232.128236][ T6773] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1240.262713][ T6773] veth0_vlan: entered promiscuous mode [ 1240.320342][ T6773] veth1_vlan: entered promiscuous mode [ 1240.569836][ T6773] veth0_macvtap: entered promiscuous mode [ 1240.620458][ T6773] veth1_macvtap: entered promiscuous mode [ 1240.777007][ T6773] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1240.777695][ T6773] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1240.778154][ T6773] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1240.778680][ T6773] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1241.471031][ T6951] pim6reg1: entered promiscuous mode [ 1241.471583][ T6951] pim6reg1: entered allmulticast mode [ 1242.118227][ T30] audit: type=1400 audit(1241.830:633): avc: denied { read } for pid=6955 comm="syz.1.1280" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1242.119122][ T30] audit: type=1400 audit(1241.830:634): avc: denied { open } for pid=6955 comm="syz.1.1280" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1242.154268][ T30] audit: type=1400 audit(1241.870:635): avc: denied { map } for pid=6955 comm="syz.1.1280" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1245.607256][ T7007] netlink: 'syz.1.1302': attribute type 2 has an invalid length. [ 1245.608399][ T7007] netlink: 'syz.1.1302': attribute type 1 has an invalid length. [ 1245.608754][ T7007] netlink: 128 bytes leftover after parsing attributes in process `syz.1.1302'. [ 1246.701713][ T30] audit: type=1400 audit(1246.420:636): avc: denied { read } for pid=7013 comm="syz.1.1304" name="uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1246.702629][ T30] audit: type=1400 audit(1246.420:637): avc: denied { open } for pid=7013 comm="syz.1.1304" path="/dev/uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1275.415915][ T30] audit: type=1400 audit(1275.140:638): avc: denied { setopt } for pid=7122 comm="syz.1.1346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1288.014620][ T30] audit: type=1400 audit(1287.730:639): avc: denied { mount } for pid=7173 comm="syz.1.1370" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1288.045148][ T30] audit: type=1400 audit(1287.760:640): avc: denied { remount } for pid=7173 comm="syz.1.1370" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1291.302502][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1293.220702][ T30] audit: type=1400 audit(1292.940:641): avc: denied { map } for pid=7199 comm="syz.0.1381" path="socket:[15986]" dev="sockfs" ino=15986 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1297.506067][ T30] audit: type=1400 audit(1297.230:642): avc: denied { unmount } for pid=6773 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1298.151575][ T7224] netlink: 'syz.0.1391': attribute type 2 has an invalid length. [ 1298.152071][ T7224] netlink: 'syz.0.1391': attribute type 1 has an invalid length. [ 1298.152390][ T7224] netlink: 128 bytes leftover after parsing attributes in process `syz.0.1391'. [ 1301.755444][ T7242] netlink: 'syz.1.1398': attribute type 2 has an invalid length. [ 1301.755934][ T7242] netlink: 'syz.1.1398': attribute type 1 has an invalid length. [ 1301.756260][ T7242] netlink: 128 bytes leftover after parsing attributes in process `syz.1.1398'. [ 1302.656270][ T7246] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1302.696069][ T7246] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1302.989931][ T30] audit: type=1326 audit(1302.710:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.1400" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1302.992393][ T30] audit: type=1326 audit(1302.710:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.1400" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1303.000451][ T30] audit: type=1326 audit(1302.720:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.1400" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1303.005587][ T30] audit: type=1326 audit(1302.730:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.1400" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1303.024475][ T30] audit: type=1326 audit(1302.730:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.1400" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=1 ip=0x132750 code=0x7ffc0000 [ 1303.025439][ T30] audit: type=1326 audit(1302.730:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.1400" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1303.026045][ T30] audit: type=1326 audit(1302.730:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.1400" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1303.026709][ T30] audit: type=1326 audit(1302.730:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.1400" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1303.027379][ T30] audit: type=1326 audit(1302.730:651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.1400" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1303.027986][ T30] audit: type=1326 audit(1302.730:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7247 comm="syz.1.1400" exe="/syz-executor" sig=0 arch=40000028 syscall=3 compat=1 ip=0x132750 code=0x7ffc0000 [ 1304.115479][ T7238] binder: 7237:7238 tried to acquire reference to desc 0, got 1 instead [ 1304.121186][ T4536] binder: release 7237:7238 transaction 14 out, still active [ 1304.124915][ T4536] binder: undelivered TRANSACTION_COMPLETE [ 1304.259431][ T4536] binder: send failed reply for transaction 14, target dead [ 1314.227900][ T7284] netlink: 'syz.1.1413': attribute type 2 has an invalid length. [ 1314.228423][ T7284] netlink: 'syz.1.1413': attribute type 1 has an invalid length. [ 1314.228769][ T7284] netlink: 128 bytes leftover after parsing attributes in process `syz.1.1413'. [ 1317.827961][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 1317.828601][ T30] audit: type=1400 audit(1317.520:675): avc: denied { accept } for pid=7289 comm="syz.1.1415" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1318.416046][ T30] audit: type=1400 audit(1318.130:676): avc: denied { read write } for pid=7293 comm="syz.1.1417" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1318.418199][ T30] audit: type=1400 audit(1318.140:677): avc: denied { open } for pid=7293 comm="syz.1.1417" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1323.582266][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1335.207345][ T30] audit: type=1400 audit(1334.920:678): avc: denied { setattr } for pid=7344 comm="syz.0.1438" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1354.309465][ T30] audit: type=1400 audit(1354.030:679): avc: denied { write } for pid=7405 comm="syz.1.1462" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1355.060923][ T7413] fuse: Bad value for 'fd' [ 1367.837838][ T30] audit: type=1400 audit(1367.560:680): avc: denied { getopt } for pid=7449 comm="syz.1.1481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1397.208700][ T30] audit: type=1400 audit(1396.920:681): avc: denied { write } for pid=7529 comm="syz.0.1512" name="netstat" dev="proc" ino=4026532973 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1401.576711][ T30] audit: type=1400 audit(1401.300:682): avc: denied { ioctl } for pid=7545 comm="syz.1.1519" path="socket:[17641]" dev="sockfs" ino=17641 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1461.469761][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1494.139600][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1517.486082][ T7863] binder: 7862:7863 ioctl c018620c 20000080 returned -1 [ 1534.868758][ T30] audit: type=1400 audit(1534.590:683): avc: denied { watch } for pid=7915 comm="syz.0.1669" path="/438/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1537.315149][ T30] audit: type=1400 audit(1537.040:684): avc: denied { ioctl } for pid=7923 comm="syz.1.1671" path="pid:[4026532624]" dev="nsfs" ino=4026532624 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1537.784106][ T30] audit: type=1400 audit(1537.500:685): avc: denied { write } for pid=7921 comm="syz.0.1672" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1577.892164][ T8053] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1577.936219][ T8053] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1578.879892][ T8062] netlink: 'syz.0.1726': attribute type 19 has an invalid length. [ 1579.085591][ T30] audit: type=1400 audit(1578.800:686): avc: denied { mount } for pid=8056 comm="syz.1.1724" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1579.148092][ T8063] netlink: 164 bytes leftover after parsing attributes in process `syz.1.1724'. [ 1581.866650][ T8076] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1729'. [ 1584.887965][ T30] audit: type=1326 audit(1584.590:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8094 comm="syz.1.1736" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1584.888763][ T30] audit: type=1326 audit(1584.610:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8094 comm="syz.1.1736" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1584.889406][ T30] audit: type=1326 audit(1584.610:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8094 comm="syz.1.1736" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1584.894496][ T30] audit: type=1326 audit(1584.610:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8094 comm="syz.1.1736" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1584.895281][ T30] audit: type=1326 audit(1584.610:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8094 comm="syz.1.1736" exe="/syz-executor" sig=0 arch=40000028 syscall=62 compat=1 ip=0x132750 code=0x7ffc0000 [ 1584.895897][ T30] audit: type=1326 audit(1584.610:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8094 comm="syz.1.1736" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 1584.904977][ T30] audit: type=1326 audit(1584.610:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8094 comm="syz.1.1736" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1584.907186][ T30] audit: type=1326 audit(1584.630:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8094 comm="syz.1.1736" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 1589.217365][ T30] audit: type=1400 audit(1588.940:695): avc: denied { create } for pid=8097 comm="syz.1.1737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1589.226978][ T30] audit: type=1400 audit(1588.950:696): avc: denied { write } for pid=8097 comm="syz.1.1737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1589.227470][ T8101] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1737'. [ 1596.676604][ T8110] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1741'. [ 1596.861708][ T30] audit: type=1400 audit(1596.580:697): avc: denied { read } for pid=8111 comm="syz.1.1742" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1596.867469][ T30] audit: type=1400 audit(1596.590:698): avc: denied { open } for pid=8111 comm="syz.1.1742" path="/dev/loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1596.875694][ T30] audit: type=1400 audit(1596.590:699): avc: denied { ioctl } for pid=8111 comm="syz.1.1742" path="/dev/loop-control" dev="devtmpfs" ino=638 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1600.760729][ T8121] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1600.796735][ T8121] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1627.208012][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 1635.291671][ T8265] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1635.325759][ T8265] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1638.546287][ T6948] usb 1-1: new high-speed USB device number 23 using dummy_hcd [ 1638.899901][ T6948] usb 1-1: config 0 has no interfaces? [ 1638.900874][ T6948] usb 1-1: New USB device found, idVendor=09c0, idProduct=0203, bcdDevice=d3.32 [ 1638.901411][ T6948] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1638.939526][ T6948] usb 1-1: config 0 descriptor?? [ 1639.197564][ T3406] usb 1-1: USB disconnect, device number 23 [ 1639.541671][ T8282] ======================================================= [ 1639.541671][ T8282] WARNING: The mand mount option has been deprecated and [ 1639.541671][ T8282] and is ignored by this kernel. Remove the mand [ 1639.541671][ T8282] option from the mount to silence this warning. [ 1639.541671][ T8282] ======================================================= [ 1639.551233][ T8282] fuse: Bad value for 'rootmode' [ 1641.766471][ T30] audit: type=1400 audit(1641.480:700): avc: denied { watch watch_reads } for pid=8292 comm="syz.0.1815" path="/514" dev="tmpfs" ino=2734 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1644.185252][ T30] audit: type=1400 audit(1643.890:701): avc: denied { mount } for pid=8320 comm="syz.1.1826" name="/" dev="configfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1644.193254][ T30] audit: type=1400 audit(1643.910:702): avc: denied { read } for pid=8320 comm="syz.1.1826" name="/" dev="configfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1644.205226][ T30] audit: type=1400 audit(1643.920:703): avc: denied { open } for pid=8320 comm="syz.1.1826" path="/276/file0" dev="configfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1644.352133][ T30] audit: type=1400 audit(1644.070:704): avc: denied { unmount } for pid=6773 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1644.524593][ T30] audit: type=1400 audit(1644.240:705): avc: denied { write } for pid=8323 comm="syz.1.1828" name="uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1644.530995][ T30] audit: type=1400 audit(1644.250:706): avc: denied { ioctl } for pid=8323 comm="syz.1.1828" path="/dev/uinput" dev="devtmpfs" ino=708 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1644.547615][ T8324] input: syz0 as /devices/virtual/input/input1 [ 1694.199901][ T8078] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1695.352776][ T8078] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1696.097633][ T8078] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1697.208802][ T8078] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1709.089695][ T8078] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1709.342489][ T8078] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1709.501132][ T8078] bond0 (unregistering): Released all slaves [ 1710.289630][ T8078] hsr_slave_0: left promiscuous mode [ 1710.361268][ T8078] hsr_slave_1: left promiscuous mode [ 1710.871705][ T8078] veth1_macvtap: left promiscuous mode [ 1710.873077][ T8078] veth0_macvtap: left promiscuous mode [ 1710.947481][ T8078] veth1_vlan: left promiscuous mode [ 1710.951141][ T8078] veth0_vlan: left promiscuous mode [ 1739.823155][ T8341] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1739.982137][ T8341] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1762.621501][ T8341] hsr_slave_0: entered promiscuous mode [ 1762.688926][ T8341] hsr_slave_1: entered promiscuous mode [ 1762.776302][ T8341] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1762.777266][ T8341] Cannot create hsr debugfs directory [ 1779.165733][ T8341] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1779.292294][ T8341] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1779.370618][ T8341] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1779.442755][ T8341] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1784.697237][ T8386] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1784.862848][ T8386] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1793.421088][ T8341] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1797.079594][ T8386] hsr_slave_0: entered promiscuous mode [ 1797.139862][ T8386] hsr_slave_1: entered promiscuous mode [ 1797.186399][ T8386] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1797.187723][ T8386] Cannot create hsr debugfs directory [ 1798.975713][ T8386] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1799.401990][ T8386] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1799.719478][ T8386] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1799.987675][ T8386] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1800.947946][ T8386] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1801.007104][ T8386] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1801.040988][ T8386] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1801.101356][ T8386] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1804.624619][ T8386] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1806.583292][ T8341] veth0_vlan: entered promiscuous mode [ 1806.746321][ T8341] veth1_vlan: entered promiscuous mode [ 1807.085931][ T8341] veth0_macvtap: entered promiscuous mode [ 1807.120672][ T8341] veth1_macvtap: entered promiscuous mode [ 1807.468982][ T8341] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1807.469595][ T8341] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1807.469948][ T8341] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1807.470311][ T8341] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1813.038516][ T8386] veth0_vlan: entered promiscuous mode [ 1813.176853][ T8386] veth1_vlan: entered promiscuous mode [ 1813.361718][ T8386] veth0_macvtap: entered promiscuous mode [ 1813.390610][ T8386] veth1_macvtap: entered promiscuous mode [ 1813.632946][ T8386] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1813.647621][ T8386] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1813.648523][ T8386] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1813.649299][ T8386] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1814.684416][ T30] audit: type=1400 audit(1814.400:707): avc: denied { getopt } for pid=8552 comm="syz.1.1841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1815.205395][ T8553] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1841'. [ 1815.212463][ T8553] sit0: entered promiscuous mode [ 1815.212877][ T8553] sit0: entered allmulticast mode [ 1816.982274][ T8557] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1842'. [ 1825.107111][ T30] audit: type=1400 audit(1824.830:708): avc: denied { ioctl } for pid=8596 comm="syz.0.1857" path="socket:[21128]" dev="sockfs" ino=21128 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1838.547207][ T30] audit: type=1400 audit(1838.260:709): avc: denied { write } for pid=8659 comm="syz.0.1882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1840.695504][ T30] audit: type=1400 audit(1840.410:710): avc: denied { getopt } for pid=8675 comm="syz.0.1889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1843.624856][ T30] audit: type=1400 audit(1843.340:711): avc: denied { create } for pid=8681 comm="syz.0.1891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1843.651449][ T30] audit: type=1400 audit(1843.370:712): avc: denied { ioctl } for pid=8681 comm="syz.0.1891" path="socket:[21273]" dev="sockfs" ino=21273 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1850.808358][ T8726] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1910'. [ 1850.812596][ T30] audit: type=1400 audit(1850.530:713): avc: denied { append } for pid=8705 comm="syz.0.1901" name="loop2" dev="devtmpfs" ino=641 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1867.740168][ T30] audit: type=1400 audit(1867.410:714): avc: denied { create } for pid=8764 comm="syz.1.1925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1867.765464][ T30] audit: type=1400 audit(1867.490:715): avc: denied { connect } for pid=8764 comm="syz.1.1925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1868.315621][ T30] audit: type=1400 audit(1868.040:716): avc: denied { read } for pid=8764 comm="syz.1.1925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1868.857393][ T30] audit: type=1400 audit(1868.580:717): avc: denied { write } for pid=8764 comm="syz.1.1925" path="socket:[21409]" dev="sockfs" ino=21409 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1871.897456][ T8782] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1871.939339][ T8782] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1898.375318][ T8870] binder: Unknown parameter 'sma' [ 1898.381413][ T30] audit: type=1400 audit(1898.090:718): avc: denied { remount } for pid=8869 comm="syz.1.1968" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1899.080159][ T30] audit: type=1400 audit(1898.800:719): avc: denied { setopt } for pid=8875 comm="syz.0.1970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1900.376501][ T8887] binder: Unknown parameter 'sm' [ 1901.448319][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 1902.534465][ T30] audit: type=1400 audit(1902.250:720): avc: denied { bind } for pid=8913 comm="syz.1.1985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1902.535805][ T30] audit: type=1400 audit(1902.250:721): avc: denied { listen } for pid=8913 comm="syz.1.1985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1903.627499][ T30] audit: type=1400 audit(1903.350:722): avc: denied { name_bind } for pid=8926 comm="syz.1.1991" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1908.316986][ T30] audit: type=1400 audit(1908.030:723): avc: denied { open } for pid=8953 comm="syz.1.2004" path="/dev/ptyq6" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1908.369299][ T30] audit: type=1400 audit(1908.080:724): avc: denied { ioctl } for pid=8953 comm="syz.1.2004" path="/dev/ptyq6" dev="devtmpfs" ino=119 ioctlcmd=0x5414 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1910.399194][ T30] audit: type=1400 audit(1910.120:725): avc: denied { setopt } for pid=8965 comm="syz.0.2010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1929.227036][ T30] audit: type=1400 audit(1928.940:726): avc: denied { setattr } for pid=8982 comm="syz.1.2017" name="NETLINK" dev="sockfs" ino=22076 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1929.776836][ T8988] netlink: 9 bytes leftover after parsing attributes in process `syz.1.2019'. [ 1929.799908][ T8988] gretap0: entered promiscuous mode [ 1929.898190][ T8988] netlink: 5 bytes leftover after parsing attributes in process `syz.1.2019'. [ 1929.900286][ T8988] gretap0: left promiscuous mode [ 1929.900926][ T8988] gretap0: entered allmulticast mode [ 1933.128912][ T30] audit: type=1400 audit(1932.810:727): avc: denied { bind } for pid=8989 comm="syz.1.2020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1933.138102][ T8990] lo: entered promiscuous mode [ 1933.213073][ T8990] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1958.701601][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1967.549849][ T9082] VFS: Lookup of 'file0' in fuse fuse would have caused loop [ 1975.052470][ T9094] netlink: 'syz.0.2055': attribute type 4 has an invalid length. [ 1975.660300][ T9095] netlink: 'syz.0.2055': attribute type 4 has an invalid length. [ 1978.559042][ T9101] A link change request failed with some changes committed already. Interface veth0_to_bond may have been left with an inconsistent configuration, please check. [ 1983.714703][ T9121] netlink: 20 bytes leftover after parsing attributes in process `syz.0.2067'. [ 1998.910671][ T30] audit: type=1400 audit(1998.630:728): avc: denied { map } for pid=9137 comm="syz.0.2074" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 2007.518218][ T9152] netlink: 'syz.1.2079': attribute type 4 has an invalid length. [ 2021.603035][ T30] audit: type=1400 audit(2021.290:729): avc: denied { mount } for pid=9179 comm="syz.0.2091" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 2022.222105][ T30] audit: type=1400 audit(2021.930:730): avc: denied { unmount } for pid=8341 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 2028.510448][ T30] audit: type=1326 audit(2028.210:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9194 comm="syz.0.2098" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 2028.567776][ T30] audit: type=1326 audit(2028.210:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9194 comm="syz.0.2098" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 2028.569327][ T30] audit: type=1326 audit(2028.210:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9194 comm="syz.0.2098" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 2028.570692][ T30] audit: type=1326 audit(2028.290:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9194 comm="syz.0.2098" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 2028.571946][ T30] audit: type=1326 audit(2028.290:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9194 comm="syz.0.2098" exe="/syz-executor" sig=0 arch=40000028 syscall=65 compat=1 ip=0x132750 code=0x7ffc0000 [ 2028.573197][ T30] audit: type=1326 audit(2028.290:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9194 comm="syz.0.2098" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 2028.581884][ T30] audit: type=1326 audit(2028.290:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9194 comm="syz.0.2098" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 2028.641156][ T30] audit: type=1326 audit(2028.360:738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9194 comm="syz.0.2098" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132750 code=0x7ffc0000 [ 2028.695070][ T30] audit: type=1326 audit(2028.410:739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9194 comm="syz.0.2098" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x12606c code=0x7ffc0000 [ 2028.700704][ T30] audit: type=1326 audit(2028.410:740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9194 comm="syz.0.2098" exe="/syz-executor" sig=0 arch=40000028 syscall=378 compat=1 ip=0x132750 code=0x7ffc0000 [ 2032.505647][ T9209] fuse: Bad value for 'fd' [ 2037.015897][ T9223] fuse: Bad value for 'fd' [ 2048.497055][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 2048.497278][ T30] audit: type=1400 audit(2048.200:766): avc: denied { getopt } for pid=9246 comm="syz.1.2121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2057.376787][ T30] audit: type=1400 audit(2057.100:767): avc: denied { getopt } for pid=9262 comm="syz.0.2129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2058.043976][ T9265] [ 2058.045173][ T9265] ====================================================== [ 2058.046872][ T9265] WARNING: possible circular locking dependency detected [ 2058.051842][ T9265] 6.11.0-rc3-syzkaller-00066-g1fb918967b56 #0 Not tainted [ 2058.053288][ T9265] ------------------------------------------------------ [ 2058.054772][ T9265] syz.1.2130/9265 is trying to acquire lock: [ 2058.056278][ T9265] ffff8000880033a8 (rtnl_mutex){+.+.}-{3:3}, at: rtnl_lock+0x1c/0x28 [ 2058.065404][ T9265] [ 2058.065404][ T9265] but task is already holding lock: [ 2058.067191][ T9265] ffff000019ddab50 (&smc->clcsock_release_lock){+.+.}-{3:3}, at: smc_setsockopt+0xd8/0xcec [ 2058.069755][ T9265] [ 2058.069755][ T9265] which lock already depends on the new lock. [ 2058.069755][ T9265] [ 2058.072063][ T9265] [ 2058.072063][ T9265] the existing dependency chain (in reverse order) is: [ 2058.074373][ T9265] [ 2058.074373][ T9265] -> #2 (&smc->clcsock_release_lock){+.+.}-{3:3}: [ 2058.085495][ T9265] __mutex_lock+0x134/0x840 [ 2058.086823][ T9265] mutex_lock_nested+0x24/0x30 [ 2058.087953][ T9265] smc_switch_to_fallback+0x34/0x80c [ 2058.089081][ T9265] smc_sendmsg+0xe4/0x8f8 [ 2058.090194][ T9265] __sock_sendmsg+0xc8/0x168 [ 2058.091873][ T9265] __sys_sendto+0x1a8/0x254 [ 2058.093116][ T9265] __arm64_sys_sendto+0xc0/0x134 [ 2058.094441][ T9265] invoke_syscall+0x6c/0x258 [ 2058.095821][ T9265] el0_svc_common.constprop.0+0xac/0x230 [ 2058.097145][ T9265] do_el0_svc_compat+0x40/0x68 [ 2058.098524][ T9265] el0_svc_compat+0x4c/0x17c [ 2058.099755][ T9265] el0t_32_sync_handler+0x98/0x13c [ 2058.114289][ T9265] el0t_32_sync+0x194/0x198 [ 2058.115712][ T9265] [ 2058.115712][ T9265] -> #1 (sk_lock-AF_INET){+.+.}-{0:0}: [ 2058.117647][ T9265] lock_sock_nested+0x38/0xe8 [ 2058.118734][ T9265] sockopt_lock_sock+0x58/0x74 [ 2058.119888][ T9265] do_ip_setsockopt+0xe0/0x2358 [ 2058.120938][ T9265] ip_setsockopt+0x34/0x9c [ 2058.122073][ T9265] raw_setsockopt+0x7c/0x2e0 [ 2058.123111][ T9265] sock_common_setsockopt+0x70/0xe0 [ 2058.124515][ T9265] do_sock_setsockopt+0x17c/0x354 [ 2058.125841][ T9265] __sys_setsockopt+0xdc/0x178 [ 2058.127175][ T9265] __arm64_sys_setsockopt+0xa4/0x100 [ 2058.128576][ T9265] invoke_syscall+0x6c/0x258 [ 2058.129836][ T9265] el0_svc_common.constprop.0+0xac/0x230 [ 2058.131338][ T9265] do_el0_svc_compat+0x40/0x68 [ 2058.132606][ T9265] el0_svc_compat+0x4c/0x17c [ 2058.133827][ T9265] el0t_32_sync_handler+0x98/0x13c [ 2058.135174][ T9265] el0t_32_sync+0x194/0x198 [ 2058.136511][ T9265] [ 2058.136511][ T9265] -> #0 (rtnl_mutex){+.+.}-{3:3}: [ 2058.138377][ T9265] __lock_acquire+0x2aa4/0x6340 [ 2058.143454][ T9265] lock_acquire+0x48c/0x7a4 [ 2058.145133][ T9265] __mutex_lock+0x134/0x840 [ 2058.146960][ T9265] mutex_lock_nested+0x24/0x30 [ 2058.149061][ T9265] rtnl_lock+0x1c/0x28 [ 2058.150379][ T9265] do_ip_setsockopt+0xd8/0x2358 [ 2058.152226][ T9265] ip_setsockopt+0x34/0x9c [ 2058.160160][ T9265] tcp_setsockopt+0x90/0xcc [ 2058.161520][ T9265] sock_common_setsockopt+0x70/0xe0 [ 2058.162882][ T9265] smc_setsockopt+0x150/0xcec [ 2058.164223][ T9265] do_sock_setsockopt+0x17c/0x354 [ 2058.165623][ T9265] __sys_setsockopt+0xdc/0x178 [ 2058.166962][ T9265] __arm64_sys_setsockopt+0xa4/0x100 [ 2058.168329][ T9265] invoke_syscall+0x6c/0x258 [ 2058.169570][ T9265] el0_svc_common.constprop.0+0xac/0x230 [ 2058.171059][ T9265] do_el0_svc_compat+0x40/0x68 [ 2058.172416][ T9265] el0_svc_compat+0x4c/0x17c [ 2058.173757][ T9265] el0t_32_sync_handler+0x98/0x13c [ 2058.175690][ T9265] el0t_32_sync+0x194/0x198 [ 2058.177816][ T9265] [ 2058.177816][ T9265] other info that might help us debug this: [ 2058.177816][ T9265] [ 2058.180614][ T9265] Chain exists of: [ 2058.180614][ T9265] rtnl_mutex --> sk_lock-AF_INET --> &smc->clcsock_release_lock [ 2058.180614][ T9265] [ 2058.185481][ T9265] Possible unsafe locking scenario: [ 2058.185481][ T9265] [ 2058.187328][ T9265] CPU0 CPU1 [ 2058.188630][ T9265] ---- ---- [ 2058.189874][ T9265] lock(&smc->clcsock_release_lock); [ 2058.191346][ T9265] lock(sk_lock-AF_INET); [ 2058.193049][ T9265] lock(&smc->clcsock_release_lock); [ 2058.195382][ T9265] lock(rtnl_mutex); [ 2058.196749][ T9265] [ 2058.196749][ T9265] *** DEADLOCK *** [ 2058.196749][ T9265] [ 2058.199663][ T9265] 1 lock held by syz.1.2130/9265: [ 2058.200935][ T9265] #0: ffff000019ddab50 (&smc->clcsock_release_lock){+.+.}-{3:3}, at: smc_setsockopt+0xd8/0xcec [ 2058.205279][ T9265] [ 2058.205279][ T9265] stack backtrace: SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2058.207803][ T9265] CPU: 1 UID: 0 PID: 9265 Comm: syz.1.2130 Not tainted 6.11.0-rc3-syzkaller-00066-g1fb918967b56 #0 [ 2058.210264][ T9265] Hardware name: linux,dummy-virt (DT) [ 2058.212069][ T9265] Call trace: [ 2058.213049][ T9265] dump_backtrace+0x9c/0x11c [ 2058.214363][ T9265] show_stack+0x18/0x24 [ 2058.215513][ T9265] dump_stack_lvl+0xa4/0xf4 [ 2058.216664][ T9265] dump_stack+0x1c/0x28 [ 2058.217764][ T9265] print_circular_bug+0x420/0x6f8 [ 2058.219210][ T9265] check_noncircular+0x2dc/0x364 [ 2058.221246][ T9265] __lock_acquire+0x2aa4/0x6340 [ 2058.222597][ T9265] lock_acquire+0x48c/0x7a4 [ 2058.224186][ T9265] __mutex_lock+0x134/0x840 [ 2058.225917][ T9265] mutex_lock_nested+0x24/0x30 [ 2058.227622][ T9265] rtnl_lock+0x1c/0x28 [ 2058.228616][ T9265] do_ip_setsockopt+0xd8/0x2358 [ 2058.229776][ T9265] ip_setsockopt+0x34/0x9c [ 2058.230876][ T9265] tcp_setsockopt+0x90/0xcc [ 2058.231965][ T9265] sock_common_setsockopt+0x70/0xe0 [ 2058.233130][ T9265] smc_setsockopt+0x150/0xcec [ 2058.235120][ T9265] do_sock_setsockopt+0x17c/0x354 [ 2058.236790][ T9265] __sys_setsockopt+0xdc/0x178 [ 2058.237996][ T9265] __arm64_sys_setsockopt+0xa4/0x100 [ 2058.239273][ T9265] invoke_syscall+0x6c/0x258 [ 2058.240418][ T9265] el0_svc_common.constprop.0+0xac/0x230 [ 2058.241803][ T9265] do_el0_svc_compat+0x40/0x68 [ 2058.243014][ T9265] el0_svc_compat+0x4c/0x17c [ 2058.244757][ T9265] el0t_32_sync_handler+0x98/0x13c [ 2058.246274][ T9265] el0t_32_sync+0x194/0x198 [ 2058.254581][ T30] audit: type=1400 audit(2057.830:768): avc: denied { write } for pid=3267 comm="syz-executor" path="pipe:[2640]" dev="pipefs" ino=2640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 2059.966120][ T2096] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2060.141475][ T2096] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2060.386970][ T2096] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2060.616508][ T2096] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2064.682631][ T2096] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2064.778063][ T2096] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2064.856240][ T2096] bond0 (unregistering): Released all slaves [ 2065.336035][ T2096] hsr_slave_0: left promiscuous mode [ 2065.556443][ T2096] hsr_slave_1: left promiscuous mode [ 2065.796801][ T2096] veth1_macvtap: left promiscuous mode [ 2065.826978][ T2096] veth0_macvtap: left promiscuous mode [ 2065.828460][ T2096] veth1_vlan: left promiscuous mode [ 2065.829333][ T2096] veth0_vlan: left promiscuous mode [ 2075.946644][ T2096] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2076.210627][ T2096] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2076.493562][ T2096] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2076.869501][ T2096] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2080.741278][ T2096] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2080.854394][ T2096] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2080.967116][ T2096] bond0 (unregistering): Released all slaves [ 2081.279518][ T2096] hsr_slave_0: left promiscuous mode [ 2081.327379][ T2096] hsr_slave_1: left promiscuous mode [ 2081.518710][ T2096] veth1_macvtap: left promiscuous mode [ 2081.519674][ T2096] veth0_macvtap: left promiscuous mode [ 2081.520896][ T2096] veth1_vlan: left promiscuous mode [ 2081.521851][ T2096] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 00:06:18 Registers: info registers vcpu 0 CPU#0 PC=ffff80008098cb10 X00=0000000000000003 X01=0000000000000000 X02=0000000000000000 X03=ffff80008098cb9c X04=ffff60000141addd X05=ffff700010000e18 X06=dfff800000000000 X07=00000000f1f1f1f1 X08=ffff00000a0d6ee7 X09=dfff800000000000 X10=ffff60000141addc X11=1ffff00010000ea3 X12=ffff700010000ea4 X13=0000000000000004 X14=00000000f3f3f3f3 X15=0000000000000002 X16=ffff800080000000 X17=ffff7fffe3b72000 X18=00000000b6dc66e2 X19=ffff8000800072a0 X20=ffff8000800073c8 X21=ffff800080007320 X22=ffff8000800072a0 X23=ffff800086ab4ca0 X24=ffff8000841638f0 X25=ffff800086ab4b40 X26=ffff80008979f8c0 X27=ffff80008979f000 X28=1fffe0000d4c0bdd X29=ffff800080007270 X30=ffff800081543c9c SP=ffff800080007270 PSTATE=80000005 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000802ed2a4 X00=ffff800086be3924 X01=ffff0000118d9e00 X02=0000000000000004 X03=dfff800000000000 X04=1ffff00010d7c724 X05=ffff700011838df0 X06=00000000f1f1f1f1 X07=ffff0000118d9e00 X08=ffff700011838de8 X09=00000000f3f3f3f3 X10=00000000f3000000 X11=dfff800000000000 X12=000000000000f1f1 X13=205d353632395420 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000073cc84ee X19=ffff800086be3920 X20=ffff8000851042e8 X21=1ffff00011838df0 X22=00000000000000c0 X23=0000000000000000 X24=0000000000000000 X25=ffff800085199420 X26=ffff80008030f7a8 X27=ffff8000882a9000 X28=dfff800000000000 X29=ffff80008c1c6f20 X30=ffff800085111a94 SP=ffff80008c1c6f20 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000