last executing test programs: 31.711201447s ago: executing program 0 (id=725): add_key(0x0, 0x0, &(0x7f0000000240)="0100000200373a4541062101a59ea940d2cb0b3692f5020000a00000050000000000eb000000a5e5be21c44e328e68f3922af831e4e51bfb30f7788fd57e51bc464355bd646d037ccc16ddb08a7b3a697a793acf37119e61f502d8bbb016f701890700000068d945af468c1c9090c76906b94e0f27761c75e58c82da54", 0x7d, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000080000000017000000400006803c000400"], 0x54}}, 0x0) 30.257452135s ago: executing program 0 (id=728): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=@newtaction={0x68, 0x30, 0x9, 0x0, 0x0, {}, [{0x54, 0x1, [@m_bpf={0x50, 0x1, 0x0, 0x0, {{0x8}, {0x28, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6}, @TCA_ACT_BPF_OPS={0x4}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x0, 0x10000000}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 29.909959444s ago: executing program 0 (id=729): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1700000069000b"], 0x20}, 0x1, 0x200000000000000}, 0x0) 29.325063009s ago: executing program 0 (id=731): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f00000000c0)) inotify_init1(0x0) io_getevents(0x0, 0x6, 0x0, 0x0, 0x0) 28.86640028s ago: executing program 0 (id=733): getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, &(0x7f0000000580)) 26.839679631s ago: executing program 0 (id=734): r0 = socket$inet6(0xa, 0x3, 0x8000000003c) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000014c0)=@raw={'raw\x00', 0x8, 0x3, 0x528, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x458, 0xffffffff, 0xffffffff, 0x458, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@empty, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00', {}, {}, 0x62}, 0x0, 0x358, 0x388, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth0_to_hsr\x00', {0x4, 0x8, 0x20, 0x5e1b2d47, 0xf91, 0x5, 0x4, 0x9f7, 0x18}, {0x8}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x588) r1 = socket$inet6(0xa, 0x3, 0x2c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x693, @empty, 0x7fff}, 0x1c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$binfmt_misc(r1, &(0x7f00000002c0), 0xfff7) 7.920826673s ago: executing program 1 (id=737): r0 = openat$selinux_create(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) write$selinux_create(r0, &(0x7f0000000180)=@objname={'system_u:object_r:xserver_misc_device_t:s0', 0x20, '/usr/sbin/cups-browsed', 0x20, 0x6, 0x20, './file0\x00'}, 0x5f) 7.495682307s ago: executing program 1 (id=738): r0 = syz_io_uring_setup(0x416f, &(0x7f0000000780)={0x0, 0x0, 0x10100}, &(0x7f0000001240), &(0x7f0000001340)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f0000000000), 0x0) 6.730714448s ago: executing program 1 (id=739): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x48, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}]}, 0x48}}, 0x0) 5.647311053s ago: executing program 1 (id=740): r0 = openat$binfmt_register(0xffffff9c, &(0x7f0000000440), 0x1, 0x0) write$binfmt_register(r0, &(0x7f0000000000)={0x3a, 'syz1', 0x3a, 'E', 0x3a, 0x81, 0x3a, 'syz2', 0x3a, '!', 0x3a, './file0/file0', 0x3a, [0x50]}, 0x24) 5.10749153s ago: executing program 1 (id=741): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00'}, 0x11) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) 0s ago: executing program 1 (id=742): openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x50, &(0x7f0000000000)={0x0, 0x0}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:59617' (ED25519) to the list of known hosts. [ 193.076838][ T29] audit: type=1400 audit(192.660:58): avc: denied { name_bind } for pid=3269 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 193.791926][ T29] audit: type=1400 audit(193.380:59): avc: denied { execute } for pid=3271 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 193.806806][ T29] audit: type=1400 audit(193.390:60): avc: denied { execute_no_trans } for pid=3271 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 199.048134][ T29] audit: type=1400 audit(198.640:61): avc: denied { mounton } for pid=3271 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 199.066575][ T29] audit: type=1400 audit(198.650:62): avc: denied { mount } for pid=3271 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 199.107637][ T3271] cgroup: Unknown subsys name 'net' [ 199.148429][ T29] audit: type=1400 audit(198.740:63): avc: denied { unmount } for pid=3271 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 199.603490][ T3271] cgroup: Unknown subsys name 'cpuset' [ 199.653649][ T3271] cgroup: Unknown subsys name 'rlimit' [ 200.120904][ T29] audit: type=1400 audit(199.710:64): avc: denied { setattr } for pid=3271 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 200.123687][ T29] audit: type=1400 audit(199.710:65): avc: denied { mounton } for pid=3271 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 200.129668][ T29] audit: type=1400 audit(199.720:66): avc: denied { mount } for pid=3271 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 200.881810][ T3274] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 200.901442][ T29] audit: type=1400 audit(200.480:67): avc: denied { relabelto } for pid=3274 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 200.902890][ T29] audit: type=1400 audit(200.490:68): avc: denied { write } for pid=3274 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 201.051041][ T29] audit: type=1400 audit(200.640:69): avc: denied { read } for pid=3271 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 201.053110][ T29] audit: type=1400 audit(200.640:70): avc: denied { open } for pid=3271 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 201.081846][ T3271] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 209.061607][ T29] audit: type=1400 audit(208.650:71): avc: denied { execmem } for pid=3275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 209.169772][ T29] audit: type=1400 audit(208.760:72): avc: denied { read } for pid=3277 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 209.246614][ T29] audit: type=1400 audit(208.820:73): avc: denied { open } for pid=3277 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 209.262864][ T29] audit: type=1400 audit(208.850:74): avc: denied { mounton } for pid=3277 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 209.373159][ T29] audit: type=1400 audit(208.960:75): avc: denied { module_request } for pid=3277 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 209.610313][ T29] audit: type=1400 audit(209.190:76): avc: denied { sys_module } for pid=3277 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 215.553987][ T3277] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 215.596029][ T3277] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 216.371892][ T3278] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 216.393435][ T3278] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 218.723133][ T3277] hsr_slave_0: entered promiscuous mode [ 218.799765][ T3277] hsr_slave_1: entered promiscuous mode [ 219.228800][ T3278] hsr_slave_0: entered promiscuous mode [ 219.308840][ T3278] hsr_slave_1: entered promiscuous mode [ 219.346962][ T3278] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 219.348451][ T3278] Cannot create hsr debugfs directory [ 221.890731][ T29] audit: type=1400 audit(221.480:77): avc: denied { create } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 221.907436][ T29] audit: type=1400 audit(221.490:78): avc: denied { write } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 221.909386][ T29] audit: type=1400 audit(221.500:79): avc: denied { read } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 221.934435][ T3277] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 222.058694][ T3277] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 222.143175][ T3277] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 222.184677][ T3277] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 222.598172][ T3278] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 222.631322][ T3278] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 222.688711][ T3278] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 222.740756][ T3278] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 225.009004][ T3277] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.488364][ T3278] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.069137][ T3277] veth0_vlan: entered promiscuous mode [ 237.184575][ T3278] veth0_vlan: entered promiscuous mode [ 237.337515][ T3278] veth1_vlan: entered promiscuous mode [ 237.361793][ T3277] veth1_vlan: entered promiscuous mode [ 237.971952][ T3277] veth0_macvtap: entered promiscuous mode [ 238.030677][ T3278] veth0_macvtap: entered promiscuous mode [ 238.059677][ T3277] veth1_macvtap: entered promiscuous mode [ 238.168537][ T3278] veth1_macvtap: entered promiscuous mode [ 238.782602][ T3277] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 238.784001][ T3277] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 238.784437][ T3277] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 238.786651][ T3277] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 239.022419][ T3278] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 239.023608][ T3278] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 239.024421][ T3278] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 239.046828][ T3278] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 239.591366][ T29] audit: type=1400 audit(239.100:80): avc: denied { mount } for pid=3277 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 239.686108][ T29] audit: type=1400 audit(239.260:81): avc: denied { mounton } for pid=3278 comm="syz-executor" path="/syzkaller.4dnvkG/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 239.719346][ T29] audit: type=1400 audit(239.280:82): avc: denied { mount } for pid=3278 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 239.814656][ T29] audit: type=1400 audit(239.400:83): avc: denied { mounton } for pid=3277 comm="syz-executor" path="/syzkaller.dckSin/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 239.828451][ T29] audit: type=1400 audit(239.410:84): avc: denied { mounton } for pid=3277 comm="syz-executor" path="/syzkaller.dckSin/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 239.901724][ T29] audit: type=1400 audit(239.490:85): avc: denied { unmount } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 239.918712][ T29] audit: type=1400 audit(239.500:86): avc: denied { mounton } for pid=3277 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 239.944011][ T29] audit: type=1400 audit(239.530:87): avc: denied { mount } for pid=3277 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 239.957358][ T29] audit: type=1400 audit(239.540:88): avc: denied { mounton } for pid=3277 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 239.960498][ T29] audit: type=1400 audit(239.550:89): avc: denied { mount } for pid=3277 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 240.410305][ T3277] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 247.129697][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 247.129921][ T29] audit: type=1400 audit(246.710:101): avc: denied { prog_run } for pid=3412 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 258.344131][ T29] audit: type=1400 audit(257.830:102): avc: denied { read write } for pid=3428 comm="syz.0.4" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 258.348898][ T29] audit: type=1400 audit(257.830:103): avc: denied { open } for pid=3428 comm="syz.0.4" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 258.349718][ T29] audit: type=1400 audit(257.870:104): avc: denied { ioctl } for pid=3428 comm="syz.0.4" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 258.813926][ T3061] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 259.326427][ T3061] usb 1-1: Using ep0 maxpacket: 16 [ 259.603741][ T3061] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 259.607855][ T3061] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has invalid wMaxPacketSize 0 [ 259.609632][ T3061] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 260.833889][ T3061] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 260.848404][ T3061] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 260.849379][ T3061] usb 1-1: Product: syz [ 260.850057][ T3061] usb 1-1: Manufacturer: syz [ 260.850709][ T3061] usb 1-1: SerialNumber: syz [ 261.862821][ T3061] usb 1-1: 2:1 : format type 0 is detected, processed as PCM [ 262.621534][ T3430] netlink: 'syz.0.4': attribute type 27 has an invalid length. [ 262.727154][ T29] audit: type=1400 audit(262.270:105): avc: denied { create } for pid=3437 comm="syz.1.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 262.802324][ T29] audit: type=1400 audit(262.340:106): avc: denied { bind } for pid=3437 comm="syz.1.5" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 262.804484][ T29] audit: type=1400 audit(262.360:107): avc: denied { node_bind } for pid=3437 comm="syz.1.5" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 268.547889][ T3061] usb 1-1: 2:1: cannot set freq 9338507 to ep 0x82 [ 273.820459][ T3430] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.821826][ T3430] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.822739][ T3430] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.823548][ T3430] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 274.870882][ T3273] usb 1-1: USB disconnect, device number 2 [ 278.447558][ T3273] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 279.113823][ T3273] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 279.116041][ T3273] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 279.116970][ T3273] usb 1-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 279.118264][ T3273] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 279.399111][ T3273] usb 1-1: config 0 descriptor?? [ 279.744670][ T3431] udevd[3431]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 284.966519][ T3273] usbhid 1-1:0.0: can't add hid device: -32 [ 284.969005][ T3273] usbhid 1-1:0.0: probe with driver usbhid failed with error -32 [ 297.144654][ T3361] usb 1-1: USB disconnect, device number 3 [ 313.641388][ T29] audit: type=1400 audit(312.940:108): avc: denied { create } for pid=3472 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 313.642924][ T29] audit: type=1400 audit(313.140:109): avc: denied { write } for pid=3472 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 313.644057][ T29] audit: type=1400 audit(313.140:110): avc: denied { nlmsg_write } for pid=3472 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 334.052612][ T29] audit: type=1400 audit(333.640:111): avc: denied { create } for pid=3486 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 334.128293][ T29] audit: type=1400 audit(333.720:112): avc: denied { write } for pid=3486 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 335.981179][ T29] audit: type=1400 audit(335.570:113): avc: denied { read write } for pid=3494 comm="syz.0.18" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 335.983313][ T29] audit: type=1400 audit(335.570:114): avc: denied { open } for pid=3494 comm="syz.0.18" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 336.120435][ T3495] fuse: Unknown parameter 'use00000000000000000000' [ 336.849495][ T29] audit: type=1400 audit(336.440:115): avc: denied { create } for pid=3498 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 336.880451][ T29] audit: type=1400 audit(336.470:116): avc: denied { setopt } for pid=3498 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 336.900889][ T29] audit: type=1400 audit(336.490:117): avc: denied { ioctl } for pid=3498 comm="syz.0.20" path="socket:[4234]" dev="sockfs" ino=4234 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 336.920017][ T29] audit: type=1400 audit(336.510:118): avc: denied { write } for pid=3498 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 343.003588][ T3503] syzkaller0: entered promiscuous mode [ 343.006754][ T3503] syzkaller0: entered allmulticast mode [ 363.249364][ T3514] fuse: Unknown parameter 'user_i00000000000000000000' [ 363.813915][ T29] audit: type=1326 audit(363.400:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.1.25" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff953499e8 code=0x7ffc0000 [ 363.830163][ T29] audit: type=1326 audit(363.420:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.1.25" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff953499e8 code=0x7ffc0000 [ 363.836802][ T29] audit: type=1326 audit(363.420:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.1.25" exe="/syz-executor" sig=0 arch=c00000b7 syscall=155 compat=0 ip=0xffff953499e8 code=0x7ffc0000 [ 363.842422][ T29] audit: type=1326 audit(363.430:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.1.25" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff953499e8 code=0x7ffc0000 [ 363.852576][ T29] audit: type=1326 audit(363.440:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.1.25" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff953499e8 code=0x7ffc0000 [ 364.072029][ T29] audit: type=1400 audit(363.660:124): avc: denied { create } for pid=3518 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 368.746124][ T3523] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 368.779156][ T3523] xt_socket: unknown flags 0x50 [ 368.894223][ T29] audit: type=1400 audit(368.350:125): avc: denied { setopt } for pid=3518 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 379.738974][ T3534] fuse: Unknown parameter 'user_i00000000000000000000' [ 381.280233][ T29] audit: type=1400 audit(380.860:126): avc: denied { read } for pid=3127 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 385.768736][ T123] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 386.072558][ T123] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 386.292898][ T123] bond0 (unregistering): Released all slaves [ 387.072577][ T123] hsr_slave_0: left promiscuous mode [ 387.337264][ T123] hsr_slave_1: left promiscuous mode [ 398.268306][ T3550] netlink: 24 bytes leftover after parsing attributes in process `syz.1.31'. [ 400.670606][ T3556] syzkaller0: entered promiscuous mode [ 400.671726][ T3556] syzkaller0: entered allmulticast mode [ 421.119156][ T29] audit: type=1400 audit(420.710:127): avc: denied { create } for pid=3565 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 430.143276][ T3525] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 430.250583][ T3525] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 437.852884][ T3612] EXT4-fs warning (device vda): ext4_group_extend:1868: need to use ext2online to resize further [ 437.857181][ T29] audit: type=1400 audit(437.300:128): avc: denied { create } for pid=3596 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 437.859359][ T29] audit: type=1400 audit(437.330:129): avc: denied { setopt } for pid=3596 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 437.860783][ T29] audit: type=1400 audit(437.370:130): avc: denied { mounton } for pid=3596 comm="syz.1.34" path="/proc/70/task" dev="proc" ino=5139 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 441.403839][ T3525] hsr_slave_0: entered promiscuous mode [ 441.512121][ T3525] hsr_slave_1: entered promiscuous mode [ 448.437793][ T3625] fuse: Unknown parameter 'user_id00000000000000000000' [ 448.468932][ T29] audit: type=1400 audit(448.030:131): avc: denied { mounton } for pid=3624 comm="syz.1.35" path="/22/file0" dev="tmpfs" ino=129 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 450.024229][ T3525] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 450.163248][ T3525] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 450.234062][ T3525] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 450.312229][ T3525] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 457.830927][ T3525] 8021q: adding VLAN 0 to HW filter on device bond0 [ 461.291303][ T3651] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 461.361600][ T3651] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 461.954416][ T3656] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 462.058598][ T3656] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 462.747815][ T3660] fuse: Unknown parameter 'user_id00000000000000000000' [ 463.430779][ T29] audit: type=1400 audit(463.020:132): avc: denied { name_bind } for pid=3663 comm="syz.1.40" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 463.486238][ T29] audit: type=1400 audit(463.060:133): avc: denied { node_bind } for pid=3663 comm="syz.1.40" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 466.272588][ T29] audit: type=1400 audit(465.830:134): avc: denied { read } for pid=3675 comm="syz.1.41" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 466.273549][ T29] audit: type=1400 audit(465.840:135): avc: denied { open } for pid=3675 comm="syz.1.41" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 466.317752][ T29] audit: type=1400 audit(465.880:136): avc: denied { ioctl } for pid=3675 comm="syz.1.41" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 470.162675][ T3692] Zero length message leads to an empty skb [ 470.223072][ T29] audit: type=1400 audit(469.720:137): avc: denied { create } for pid=3680 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 470.224649][ T29] audit: type=1400 audit(469.740:138): avc: denied { setopt } for pid=3680 comm="syz.1.42" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 478.692722][ T3710] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 478.988719][ T3710] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 480.900364][ T3525] veth0_vlan: entered promiscuous mode [ 481.251211][ T3525] veth1_vlan: entered promiscuous mode [ 481.820978][ T3525] veth0_macvtap: entered promiscuous mode [ 481.927507][ T3525] veth1_macvtap: entered promiscuous mode [ 483.152870][ T29] audit: type=1400 audit(482.560:139): avc: denied { mounton } for pid=3717 comm="syz.1.44" path="/31/file0" dev="tmpfs" ino=176 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 484.598993][ T3525] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 484.599638][ T3525] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 484.600019][ T3525] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 484.600398][ T3525] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 485.397636][ T29] audit: type=1400 audit(484.890:140): avc: denied { mounton } for pid=3525 comm="syz-executor" path="/syzkaller.4qOA18/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 485.399160][ T29] audit: type=1400 audit(484.960:141): avc: denied { mount } for pid=3525 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 485.423427][ T29] audit: type=1400 audit(485.010:142): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 485.943810][ T29] audit: type=1400 audit(485.530:143): avc: denied { mounton } for pid=3525 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 489.306177][ T29] audit: type=1400 audit(488.890:144): avc: denied { create } for pid=3731 comm="syz.0.45" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 489.971321][ T29] audit: type=1400 audit(489.550:145): avc: denied { unmount } for pid=3278 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 491.507119][ T29] audit: type=1326 audit(491.090:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3731 comm="syz.0.45" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbbb499e8 code=0x7fc00000 [ 491.540805][ T29] audit: type=1326 audit(491.130:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3731 comm="syz.0.45" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbbb499e8 code=0x7fc00000 [ 491.580291][ T29] audit: type=1326 audit(491.130:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3731 comm="syz.0.45" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbbb499e8 code=0x7fc00000 [ 492.658162][ T3410] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 492.887458][ T3410] usb 1-1: Using ep0 maxpacket: 8 [ 492.937555][ T3410] usb 1-1: config 0 has an invalid interface number: 25 but max is 0 [ 492.938805][ T3410] usb 1-1: config 0 has no interface number 0 [ 492.939895][ T3410] usb 1-1: config 0 interface 25 has no altsetting 0 [ 492.976137][ T3410] usb 1-1: New USB device found, idVendor=1870, idProduct=0001, bcdDevice=e6.7f [ 492.977177][ T3410] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 492.978052][ T3410] usb 1-1: Product: syz [ 492.978690][ T3410] usb 1-1: Manufacturer: syz [ 492.979279][ T3410] usb 1-1: SerialNumber: syz [ 493.060526][ T3410] usb 1-1: config 0 descriptor?? [ 493.484504][ T3737] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 494.266959][ T29] audit: type=1400 audit(493.640:149): avc: denied { create } for pid=3734 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 494.299796][ T3737] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 495.586783][ T9] usb 1-1: USB disconnect, device number 4 [ 503.003196][ T29] audit: type=1400 audit(501.230:150): avc: denied { create } for pid=3749 comm="syz.1.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 503.065991][ T29] audit: type=1400 audit(501.250:151): avc: denied { setopt } for pid=3749 comm="syz.1.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 503.066562][ T29] audit: type=1400 audit(501.250:152): avc: denied { bind } for pid=3749 comm="syz.1.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 503.068591][ T29] audit: type=1400 audit(501.260:153): avc: denied { name_bind } for pid=3749 comm="syz.1.52" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 503.106894][ T29] audit: type=1400 audit(501.270:154): avc: denied { node_bind } for pid=3749 comm="syz.1.52" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 503.109099][ T29] audit: type=1400 audit(501.300:155): avc: denied { write } for pid=3749 comm="syz.1.52" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 503.110401][ T29] audit: type=1400 audit(501.310:156): avc: denied { connect } for pid=3749 comm="syz.1.52" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 503.160679][ T29] audit: type=1400 audit(501.310:157): avc: denied { name_connect } for pid=3749 comm="syz.1.52" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 503.946671][ T3754] loop0: detected capacity change from 0 to 7 [ 511.654188][ T3765] fuse: Bad value for 'fd' [ 517.617218][ T9] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 519.589545][ T9] usb 1-1: config index 0 descriptor too short (expected 1042, got 18) [ 519.590811][ T9] usb 1-1: New USB device found, idVendor=0403, idProduct=da73, bcdDevice=dc.8d [ 519.591618][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 520.551451][ T9] usb 1-1: config 0 descriptor?? [ 520.596178][ T9] usb 1-1: NDI device with a latency value of 1 [ 521.545968][ T9] ftdi_sio 1-1:0.0: FTDI USB Serial Device converter detected [ 521.556225][ T29] audit: type=1400 audit(521.120:158): avc: denied { create } for pid=3776 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 521.559247][ T9] ftdi_sio ttyUSB0: unknown device type: 0xdc8d [ 521.577934][ T29] audit: type=1400 audit(521.160:159): avc: denied { write } for pid=3776 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 521.597300][ T9] usb 1-1: USB disconnect, device number 5 [ 522.549122][ T9] ftdi_sio 1-1:0.0: device disconnected [ 535.877741][ T29] audit: type=1400 audit(535.450:160): avc: denied { create } for pid=3787 comm="syz.1.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 535.878762][ T29] audit: type=1400 audit(535.460:161): avc: denied { write } for pid=3787 comm="syz.1.66" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 543.381886][ T29] audit: type=1400 audit(542.930:162): avc: denied { ioctl } for pid=3799 comm="syz.0.68" path="socket:[4779]" dev="sockfs" ino=4779 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 545.617507][ T3812] loop0: detected capacity change from 0 to 7 [ 545.766542][ T29] audit: type=1400 audit(545.360:163): avc: denied { write } for pid=3813 comm="syz.0.71" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 548.995947][ T3819] input: syz1 as /devices/virtual/input/input1 [ 565.657835][ T29] audit: type=1400 audit(564.680:164): avc: denied { bind } for pid=3823 comm="syz.0.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 565.658845][ T29] audit: type=1400 audit(564.690:165): avc: denied { name_bind } for pid=3823 comm="syz.0.73" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=udp_socket permissive=1 [ 572.702567][ T29] audit: type=1400 audit(572.290:166): avc: denied { connect } for pid=3836 comm="syz.0.76" lport=135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 578.507236][ T29] audit: type=1400 audit(578.090:167): avc: denied { read } for pid=3845 comm="syz.1.79" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 578.529322][ T29] audit: type=1400 audit(578.120:168): avc: denied { open } for pid=3845 comm="syz.1.79" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 578.598698][ T29] audit: type=1400 audit(578.190:169): avc: denied { ioctl } for pid=3845 comm="syz.1.79" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 581.018548][ T29] audit: type=1400 audit(580.600:170): avc: denied { bind } for pid=3849 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 581.027608][ T29] audit: type=1400 audit(580.610:171): avc: denied { setopt } for pid=3849 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 581.041073][ T3850] netlink: 128 bytes leftover after parsing attributes in process `syz.1.80'. [ 582.223544][ T29] audit: type=1400 audit(581.810:172): avc: denied { create } for pid=3849 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 582.229146][ T29] audit: type=1400 audit(581.820:173): avc: denied { bind } for pid=3849 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 582.897145][ T29] audit: type=1400 audit(582.400:174): avc: denied { setopt } for pid=3849 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 583.201990][ T29] audit: type=1400 audit(582.790:175): avc: denied { accept } for pid=3849 comm="syz.1.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 587.631134][ T3864] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 588.119411][ T3868] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 588.177393][ T3868] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 589.358197][ T3876] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 589.947804][ T29] audit: type=1400 audit(589.540:176): avc: denied { read } for pid=3877 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 591.169016][ T3888] netlink: 16 bytes leftover after parsing attributes in process `syz.1.94'. [ 591.463713][ T3892] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 591.507707][ T3892] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 591.536273][ T29] audit: type=1400 audit(591.120:177): avc: denied { write } for pid=3891 comm="syz.1.96" name="ip6_flowlabel" dev="proc" ino=4026532787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 591.980094][ T29] audit: type=1400 audit(591.570:178): avc: denied { read } for pid=3893 comm="syz.1.97" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 592.003644][ T29] audit: type=1400 audit(591.590:179): avc: denied { open } for pid=3893 comm="syz.1.97" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 592.038464][ T29] audit: type=1400 audit(591.630:180): avc: denied { ioctl } for pid=3893 comm="syz.1.97" path="/dev/usbmon0" dev="devtmpfs" ino=695 ioctlcmd=0x9206 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 592.462911][ T3899] binfmt_misc: register: failed to install interpreter file ./file0/file0 [ 592.708661][ T29] audit: type=1400 audit(592.280:181): avc: denied { write } for pid=3900 comm="syz.0.101" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 593.408709][ T29] audit: type=1400 audit(593.000:182): avc: denied { bind } for pid=3906 comm="syz.0.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 597.447397][ T3919] ip6t_rpfilter: unknown options [ 598.738598][ T9] usb 1-1: new full-speed USB device number 6 using dummy_hcd [ 600.809222][ T9] usb 1-1: New USB device found, idVendor=0bda, idProduct=0177, bcdDevice=7d.0b [ 600.809947][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 600.852905][ T9] usb 1-1: config 0 descriptor?? [ 601.831296][ T9] ums-realtek 1-1:0.0: USB Mass Storage device detected [ 604.819221][ T9] usb 1-1: USB disconnect, device number 6 [ 606.196958][ T3928] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 606.260641][ T3928] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 608.176506][ T29] audit: type=1400 audit(607.760:183): avc: denied { ioctl } for pid=3935 comm="syz.1.114" path="socket:[4971]" dev="sockfs" ino=4971 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 609.697946][ T29] audit: type=1400 audit(609.290:184): avc: denied { create } for pid=3946 comm="syz.0.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 609.739540][ T29] audit: type=1400 audit(609.330:185): avc: denied { write } for pid=3946 comm="syz.0.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 612.143479][ T29] audit: type=1400 audit(611.730:186): avc: denied { ioctl } for pid=3953 comm="syz.0.119" path="socket:[5685]" dev="sockfs" ino=5685 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 613.038144][ T3962] fuse: Bad value for 'fd' [ 613.680585][ T29] audit: type=1400 audit(613.270:187): avc: denied { write } for pid=3963 comm="syz.0.123" path="socket:[5005]" dev="sockfs" ino=5005 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 613.713589][ T29] audit: type=1400 audit(613.300:188): avc: denied { nlmsg_read } for pid=3963 comm="syz.0.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 621.049790][ T3975] fuse: Bad value for 'fd' [ 625.311435][ T29] audit: type=1400 audit(624.900:189): avc: denied { read } for pid=3978 comm="syz.1.128" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 625.313367][ T29] audit: type=1400 audit(624.900:190): avc: denied { open } for pid=3978 comm="syz.1.128" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 626.250622][ T3985] fuse: Bad value for 'fd' [ 631.947228][ T4000] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 632.008887][ T4000] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 640.462122][ T29] audit: type=1400 audit(640.050:191): avc: denied { read } for pid=4028 comm="syz.0.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 643.747477][ T29] audit: type=1400 audit(643.320:192): avc: denied { execute } for pid=4047 comm="syz.1.157" name="file0" dev="tmpfs" ino=448 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 659.613910][ T29] audit: type=1400 audit(659.200:193): avc: denied { create } for pid=4094 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 659.642552][ T29] audit: type=1400 audit(659.230:194): avc: denied { write } for pid=4094 comm="syz.1.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 682.020746][ T4148] netlink: 204 bytes leftover after parsing attributes in process `syz.1.197'. [ 694.626562][ T4174] Illegal XDP return value 2731724768 on prog (id 10) dev syz_tun, expect packet loss! [ 699.645174][ C1] hrtimer: interrupt took 1307360 ns [ 707.937694][ T29] audit: type=1400 audit(706.850:195): avc: denied { create } for pid=4190 comm="syz.0.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 728.171111][ T4228] lo: entered promiscuous mode [ 738.468782][ T4223] lo: left promiscuous mode [ 740.706964][ T29] audit: type=1400 audit(740.300:196): avc: denied { getopt } for pid=4240 comm="syz.1.229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 746.614184][ T29] audit: type=1400 audit(745.980:197): avc: denied { mount } for pid=4254 comm="syz.0.234" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 761.598589][ T29] audit: type=1400 audit(761.150:198): avc: denied { accept } for pid=4266 comm="syz.1.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 763.659587][ T4279] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 763.711647][ T4279] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 764.778465][ T4285] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 764.838827][ T4285] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 765.653223][ T4287] netlink: 'syz.1.244': attribute type 4 has an invalid length. [ 779.795901][ T4311] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 779.849748][ T4311] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 798.314411][ T29] audit: type=1400 audit(797.900:199): avc: denied { connect } for pid=4330 comm="syz.1.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 805.031960][ T29] audit: type=1400 audit(804.620:200): avc: denied { read } for pid=4334 comm="syz.1.260" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 805.033795][ T29] audit: type=1400 audit(804.620:201): avc: denied { open } for pid=4334 comm="syz.1.260" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 864.513742][ T4391] loop7: detected capacity change from 0 to 16384 [ 894.406298][ T29] audit: type=1400 audit(893.970:202): avc: denied { ioctl } for pid=4417 comm="syz.1.279" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 894.428393][ T29] audit: type=1400 audit(893.980:203): avc: denied { set_context_mgr } for pid=4417 comm="syz.1.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 894.472306][ T4418] binder: 4417:4418 context manager tried to acquire desc 0 [ 894.474635][ T4418] binder: 4417:4418 ioctl c0306201 200003c0 returned -22 [ 899.281562][ T29] audit: type=1400 audit(898.870:204): avc: denied { create } for pid=4413 comm="syz.0.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 899.301809][ T29] audit: type=1400 audit(898.880:205): avc: denied { write } for pid=4413 comm="syz.0.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 900.237387][ T29] audit: type=1400 audit(899.830:206): avc: denied { read } for pid=4413 comm="syz.0.278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 901.320497][ T4422] DRBG: could not allocate digest TFM handle: hmac(sha512) [ 917.949222][ T4444] netlink: 24 bytes leftover after parsing attributes in process `syz.0.284'. [ 926.943054][ T29] audit: type=1400 audit(926.480:207): avc: denied { append } for pid=4454 comm="syz.0.287" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 928.257275][ T4461] netlink: 'syz.1.290': attribute type 8 has an invalid length. [ 928.258569][ T4461] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 971.346633][ T29] audit: type=1400 audit(970.930:208): avc: denied { setopt } for pid=4516 comm="syz.1.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 973.740527][ T29] audit: type=1400 audit(973.300:209): avc: denied { relabelfrom } for pid=4520 comm="syz.0.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 973.742037][ T29] audit: type=1400 audit(973.300:210): avc: denied { relabelto } for pid=4520 comm="syz.0.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1027.732676][ T29] audit: type=1400 audit(1027.290:211): avc: denied { create } for pid=4570 comm="syz.1.320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1043.579111][ T4595] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1043.618110][ T4595] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1043.707121][ T29] audit: type=1400 audit(1043.290:212): avc: denied { mount } for pid=4592 comm="syz.0.325" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1066.754338][ T29] audit: type=1400 audit(1066.340:213): avc: denied { ioctl } for pid=4612 comm="syz.1.330" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7685 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1098.218568][ T4645] capability: warning: `syz.0.339' uses 32-bit capabilities (legacy support in use) [ 1099.386643][ T29] audit: type=1400 audit(1098.970:214): avc: denied { read write } for pid=4649 comm="syz.1.341" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1099.400543][ T29] audit: type=1400 audit(1098.990:215): avc: denied { open } for pid=4649 comm="syz.1.341" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1113.636530][ T4669] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1113.678568][ T4669] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1118.619452][ T4676] xt_hashlimit: size too large, truncated to 1048576 [ 1151.242030][ T4700] dummy0: entered promiscuous mode [ 1170.674328][ T4689] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1170.789403][ T4689] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1179.522515][ T4689] hsr_slave_0: entered promiscuous mode [ 1179.648731][ T4689] hsr_slave_1: entered promiscuous mode [ 1179.706896][ T4689] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1179.708109][ T4689] Cannot create hsr debugfs directory [ 1186.293807][ T4689] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1186.837104][ T4689] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1187.644380][ T4689] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1188.321591][ T4689] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1191.431896][ T4689] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1191.544788][ T4689] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1191.697412][ T4689] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1191.801906][ T4689] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1200.806920][ T29] audit: type=1404 audit(1199.500:216): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1200.831754][ T29] audit: type=1400 audit(1200.420:217): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 1202.749940][ T29] audit: type=1400 audit(1201.850:218): avc: denied { setopt } for pid=4742 comm="syz.0.354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1202.751666][ T29] audit: type=1404 audit(1201.850:219): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 Jan 1 00:20:00 syzkaller kern.notice kernel: [ 1200.806920][ T29] audit: type=1404 audit(1199.500:216): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1208.756395][ T29] audit: type=1400 audit(1207.570:220): avc: denied { module_request } for pid=4742 comm="syz.0.354" kmod="net-pf-2-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1208.757664][ T29] audit: type=1400 audit(1208.340:221): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1209.816084][ T29] audit: type=1400 audit(1208.340:222): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1209.817785][ T29] audit: type=1400 audit(1209.400:223): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1211.151654][ T29] audit: type=1400 audit(1210.740:224): avc: denied { open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1211.161377][ T29] audit: type=1400 audit(1210.750:225): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1215.145518][ T29] audit: type=1400 audit(1214.490:226): avc: denied { read write } for pid=3525 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1215.146839][ T29] audit: type=1400 audit(1214.490:227): avc: denied { open } for pid=3525 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1215.147766][ T29] audit: type=1400 audit(1214.490:228): avc: denied { ioctl } for pid=3525 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1215.149132][ T29] audit: type=1400 audit(1214.720:229): avc: denied { sys_module } for pid=4689 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1218.378797][ T29] audit: type=1400 audit(1217.710:230): avc: denied { map_create } for pid=4753 comm="syz.0.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1218.380458][ T29] audit: type=1400 audit(1217.710:231): avc: denied { bpf } for pid=4753 comm="syz.0.355" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1218.381673][ T29] audit: type=1400 audit(1217.750:232): avc: denied { map_read map_write } for pid=4753 comm="syz.0.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1218.382843][ T29] audit: type=1400 audit(1217.770:233): avc: denied { prog_load } for pid=4753 comm="syz.0.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1218.383972][ T29] audit: type=1400 audit(1217.770:234): avc: denied { perfmon } for pid=4753 comm="syz.0.355" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1219.497433][ T29] audit: type=1400 audit(1218.990:235): avc: denied { create } for pid=4758 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1220.244290][ T4762] loop9: detected capacity change from 0 to 7 [ 1221.344611][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1221.361661][ T29] audit: type=1400 audit(1220.930:238): avc: denied { lock } for pid=4764 comm="syz.0.359" path="socket:[7901]" dev="sockfs" ino=7901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1224.079212][ T2099] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1224.210226][ T2099] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1224.272853][ T2099] bond0 (unregistering): Released all slaves [ 1224.908710][ T29] audit: type=1400 audit(1224.480:239): avc: denied { prog_run } for pid=4768 comm="syz.0.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1225.093200][ T2099] hsr_slave_0: left promiscuous mode [ 1225.180971][ T2099] hsr_slave_1: left promiscuous mode [ 1225.336836][ T2099] veth1_macvtap: left promiscuous mode [ 1225.340632][ T2099] veth0_macvtap: left promiscuous mode [ 1225.342830][ T2099] veth1_vlan: left promiscuous mode [ 1225.348486][ T2099] veth0_vlan: left promiscuous mode [ 1234.681285][ T4689] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1234.919159][ T29] audit: type=1400 audit(1234.510:240): avc: denied { create } for pid=4772 comm="syz.0.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1234.940400][ T29] audit: type=1400 audit(1234.530:241): avc: denied { bind } for pid=4772 comm="syz.0.362" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1234.941597][ T29] audit: type=1400 audit(1234.530:242): avc: denied { node_bind } for pid=4772 comm="syz.0.362" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1234.978041][ T29] audit: type=1400 audit(1234.570:243): avc: denied { execmem } for pid=4772 comm="syz.0.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1239.197146][ T29] audit: type=1400 audit(1238.780:244): avc: denied { write } for pid=4782 comm="syz.0.363" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1241.090021][ T29] audit: type=1400 audit(1240.680:245): avc: denied { read } for pid=4790 comm="syz.0.366" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1241.092201][ T29] audit: type=1400 audit(1240.680:246): avc: denied { open } for pid=4790 comm="syz.0.366" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1241.117040][ T29] audit: type=1400 audit(1240.690:247): avc: denied { ioctl } for pid=4790 comm="syz.0.366" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1241.830976][ T29] audit: type=1400 audit(1241.420:248): avc: denied { create } for pid=4795 comm="syz.0.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1241.882941][ T29] audit: type=1400 audit(1241.470:249): avc: denied { write } for pid=4795 comm="syz.0.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1241.900472][ T29] audit: type=1400 audit(1241.490:250): avc: denied { read } for pid=4795 comm="syz.0.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1242.836739][ T29] audit: type=1400 audit(1242.420:251): avc: denied { ioctl } for pid=4804 comm="syz.0.370" path="socket:[7994]" dev="sockfs" ino=7994 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1242.839216][ T4805] netlink: 8 bytes leftover after parsing attributes in process `syz.0.370'. [ 1243.786933][ T29] audit: type=1400 audit(1243.370:252): avc: denied { create } for pid=4814 comm="syz.0.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1243.815603][ T29] audit: type=1400 audit(1243.400:253): avc: denied { bind } for pid=4814 comm="syz.0.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1243.833185][ T29] audit: type=1400 audit(1243.420:254): avc: denied { setopt } for pid=4814 comm="syz.0.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1248.863362][ T4689] veth0_vlan: entered promiscuous mode [ 1249.068413][ T4689] veth1_vlan: entered promiscuous mode [ 1249.733932][ T4689] veth0_macvtap: entered promiscuous mode [ 1249.959840][ T4689] veth1_macvtap: entered promiscuous mode [ 1250.720348][ T4689] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1250.721849][ T4689] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1250.722674][ T4689] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1250.723442][ T4689] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1251.648948][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 1251.649160][ T29] audit: type=1400 audit(1250.990:258): avc: denied { mounton } for pid=4689 comm="syz-executor" path="/syzkaller.lCk0eh/syz-tmp" dev="vda" ino=1747 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1251.651196][ T29] audit: type=1400 audit(1251.020:259): avc: denied { mount } for pid=4689 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1251.652503][ T29] audit: type=1400 audit(1251.070:260): avc: denied { mounton } for pid=4689 comm="syz-executor" path="/syzkaller.lCk0eh/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1251.653846][ T29] audit: type=1400 audit(1251.150:261): avc: denied { mount } for pid=4689 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1251.663751][ T29] audit: type=1400 audit(1251.220:262): avc: denied { mounton } for pid=4689 comm="syz-executor" path="/syzkaller.lCk0eh/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1251.749433][ T29] audit: type=1400 audit(1251.290:263): avc: denied { mounton } for pid=4689 comm="syz-executor" path="/syzkaller.lCk0eh/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=8093 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1251.751183][ T29] audit: type=1400 audit(1251.330:264): avc: denied { unmount } for pid=4689 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1251.828632][ T29] audit: type=1400 audit(1251.380:265): avc: denied { mounton } for pid=4689 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1251.829784][ T29] audit: type=1400 audit(1251.390:266): avc: denied { mount } for pid=4689 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1251.830624][ T29] audit: type=1400 audit(1251.400:267): avc: denied { mounton } for pid=4689 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1262.924671][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 1262.927569][ T29] audit: type=1400 audit(1262.510:269): avc: denied { read write } for pid=4841 comm="syz.0.377" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1262.953427][ T29] audit: type=1400 audit(1262.540:270): avc: denied { open } for pid=4841 comm="syz.0.377" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1263.050920][ T29] audit: type=1400 audit(1262.640:271): avc: denied { ioctl } for pid=4841 comm="syz.0.377" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1268.608773][ T29] audit: type=1400 audit(1268.200:272): avc: denied { mounton } for pid=4848 comm="syz.1.379" path="/proc/9/task" dev="proc" ino=8157 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1274.387396][ T29] audit: type=1400 audit(1273.970:273): avc: denied { read write } for pid=4860 comm="syz.0.382" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1274.389141][ T29] audit: type=1400 audit(1273.980:274): avc: denied { open } for pid=4860 comm="syz.0.382" path="/dev/uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1275.097861][ T29] audit: type=1400 audit(1274.670:275): avc: denied { create } for pid=4860 comm="syz.0.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1292.490106][ T29] audit: type=1400 audit(1292.030:276): avc: denied { read write } for pid=4872 comm="syz.1.385" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1292.492385][ T29] audit: type=1400 audit(1292.040:277): avc: denied { open } for pid=4872 comm="syz.1.385" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1292.520676][ T29] audit: type=1400 audit(1292.100:278): avc: denied { mounton } for pid=4872 comm="syz.1.385" path="/4/file0" dev="tmpfs" ino=37 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1293.979368][ T29] audit: type=1400 audit(1293.560:279): avc: denied { unmount } for pid=4689 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1295.200910][ T29] audit: type=1400 audit(1294.780:280): avc: denied { write } for pid=4883 comm="syz.1.388" name="if_inet6" dev="proc" ino=4026532906 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1302.371335][ T29] audit: type=1400 audit(1301.900:281): avc: denied { create } for pid=4901 comm="syz.1.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1307.302831][ T29] audit: type=1404 audit(1306.850:282): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1309.360537][ T29] audit: type=1404 audit(1307.190:283): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1309.362102][ T29] audit: type=1400 audit(1307.500:284): avc: denied { setopt } for pid=4901 comm="syz.1.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1310.344388][ T29] audit: type=1400 audit(1309.930:285): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1310.356330][ T29] audit: type=1400 audit(1309.940:286): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1310.357819][ T29] audit: type=1400 audit(1309.940:287): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1310.359099][ T29] audit: type=1400 audit(1309.940:288): avc: denied { open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1310.360418][ T29] audit: type=1400 audit(1309.940:289): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1312.367196][ T29] audit: type=1400 audit(1311.910:290): avc: denied { module_request } for pid=4901 comm="syz.1.395" kmod="net-pf-2-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1319.608634][ T29] audit: type=1400 audit(1319.200:291): avc: denied { read write } for pid=4689 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1319.611492][ T29] audit: type=1400 audit(1319.200:292): avc: denied { open } for pid=4689 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1319.641901][ T29] audit: type=1400 audit(1319.200:293): avc: denied { ioctl } for pid=4689 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1320.023974][ T29] audit: type=1400 audit(1319.610:294): avc: denied { create } for pid=4908 comm="syz.1.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1320.059548][ T29] audit: type=1400 audit(1319.650:295): avc: denied { setopt } for pid=4908 comm="syz.1.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1320.819902][ T29] audit: type=1400 audit(1320.400:296): avc: denied { read write } for pid=4910 comm="syz.1.397" name="vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1320.832937][ T29] audit: type=1400 audit(1320.420:297): avc: denied { open } for pid=4910 comm="syz.1.397" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1320.900815][ T29] audit: type=1400 audit(1320.490:298): avc: denied { ioctl } for pid=4910 comm="syz.1.397" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 ioctlcmd=0xaf61 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1321.243830][ T29] audit: type=1400 audit(1320.830:299): avc: denied { prog_load } for pid=4912 comm="syz.1.398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1321.250284][ T29] audit: type=1400 audit(1320.840:300): avc: denied { bpf } for pid=4912 comm="syz.1.398" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1321.297250][ T4913] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1321.360027][ T4913] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1322.481137][ T4918] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1322.561460][ T4918] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1324.267923][ T4922] netlink: 12 bytes leftover after parsing attributes in process `syz.1.402'. [ 1325.249832][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 1325.250079][ T29] audit: type=1400 audit(1324.840:309): avc: denied { create } for pid=4923 comm="syz.1.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1325.261672][ T29] audit: type=1400 audit(1324.850:310): avc: denied { setopt } for pid=4923 comm="syz.1.403" lport=135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1325.281615][ T29] audit: type=1400 audit(1324.870:311): avc: denied { create } for pid=4923 comm="syz.1.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1325.289241][ T29] audit: type=1400 audit(1324.880:312): avc: denied { read } for pid=4923 comm="syz.1.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1326.127105][ T29] audit: type=1400 audit(1325.660:313): avc: denied { map_read map_write } for pid=4915 comm="syz.0.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1326.839469][ T29] audit: type=1404 audit(1326.320:314): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1328.628296][ T29] audit: type=1400 audit(1327.500:315): avc: denied { setopt } for pid=4915 comm="syz.0.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 Jan 1 00:22:08 syzkaller kern.notice kernel: [ 1328.628296][ T29] audit: type=1400 audit(1327.500:315): avc: denied { setopt } for pid=4915 comm="syz.0.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1330.848370][ T29] audit: type=1400 audit(1328.290:316): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 [ 1330.849955][ T29] audit: type=1404 audit(1328.410:317): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1330.896069][ T29] audit: type=1400 audit(1330.480:318): avc: denied { write } for pid=4923 comm="syz.1.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1332.202806][ T29] audit: type=1400 audit(1331.790:319): avc: denied { read } for pid=3082 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1335.930733][ T29] audit: type=1400 audit(1335.520:320): avc: denied { search } for pid=3082 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1335.939792][ T29] audit: type=1400 audit(1335.520:321): avc: denied { append } for pid=3082 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1338.358235][ T29] audit: type=1400 audit(1336.640:322): avc: denied { module_request } for pid=4915 comm="syz.0.400" kmod="net-pf-2-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1338.360711][ T29] audit: type=1400 audit(1337.940:323): avc: denied { open } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1338.361550][ T29] audit: type=1400 audit(1337.940:324): avc: denied { getattr } for pid=3082 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1338.987611][ T29] audit: type=1400 audit(1338.570:325): avc: denied { read write } for pid=4689 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1338.992882][ T29] audit: type=1400 audit(1338.580:326): avc: denied { open } for pid=4689 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1339.027813][ T29] audit: type=1400 audit(1338.610:327): avc: denied { ioctl } for pid=4689 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1339.651160][ T29] audit: type=1400 audit(1339.240:328): avc: denied { prog_load } for pid=4934 comm="syz.1.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1339.658462][ T29] audit: type=1400 audit(1339.250:329): avc: denied { bpf } for pid=4934 comm="syz.1.404" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1341.291121][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 1341.291344][ T29] audit: type=1400 audit(1340.880:337): avc: denied { create } for pid=4938 comm="syz.0.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1341.411882][ T29] audit: type=1400 audit(1341.000:338): avc: denied { setopt } for pid=4938 comm="syz.0.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1342.554170][ T29] audit: type=1400 audit(1342.140:339): avc: denied { create } for pid=4940 comm="syz.0.407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1344.420508][ T29] audit: type=1400 audit(1343.980:340): avc: denied { read write } for pid=4940 comm="syz.0.407" name="vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1344.436258][ T29] audit: type=1400 audit(1343.980:341): avc: denied { open } for pid=4940 comm="syz.0.407" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1346.629835][ T29] audit: type=1400 audit(1346.220:342): avc: denied { write } for pid=4936 comm="syz.1.405" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1359.506989][ T29] audit: type=1400 audit(1358.930:343): avc: denied { map_create } for pid=4951 comm="syz.0.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1359.509513][ T29] audit: type=1400 audit(1358.980:344): avc: denied { map_read map_write } for pid=4951 comm="syz.0.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1365.215504][ T29] audit: type=1400 audit(1364.800:345): avc: denied { ioctl } for pid=4955 comm="syz.1.409" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1365.224220][ T4956] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1365.297200][ T4956] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1367.202195][ T29] audit: type=1400 audit(1366.770:346): avc: denied { mounton } for pid=4960 comm="syz.1.411" path="/24/file0" dev="tmpfs" ino=138 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1367.203661][ T29] audit: type=1400 audit(1366.790:347): avc: denied { mount } for pid=4960 comm="syz.1.411" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1367.288674][ T4961] ======================================================= [ 1367.288674][ T4961] WARNING: The mand mount option has been deprecated and [ 1367.288674][ T4961] and is ignored by this kernel. Remove the mand [ 1367.288674][ T4961] option from the mount to silence this warning. [ 1367.288674][ T4961] ======================================================= [ 1367.656800][ T29] audit: type=1400 audit(1367.230:348): avc: denied { unmount } for pid=4960 comm="syz.1.411" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1374.428046][ T29] audit: type=1400 audit(1374.020:349): avc: denied { read } for pid=4964 comm="syz.0.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1375.409273][ T29] audit: type=1400 audit(1375.000:350): avc: denied { create } for pid=4962 comm="syz.1.412" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1375.425651][ T29] audit: type=1400 audit(1375.010:351): avc: denied { ioctl } for pid=4962 comm="syz.1.412" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=8561 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1376.026961][ T29] audit: type=1400 audit(1375.610:352): avc: denied { read write } for pid=4962 comm="syz.1.412" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1376.072204][ T29] audit: type=1400 audit(1375.660:353): avc: denied { open } for pid=4962 comm="syz.1.412" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1377.309022][ T29] audit: type=1400 audit(1376.890:354): avc: denied { create } for pid=4970 comm="syz.1.414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1377.326527][ T29] audit: type=1400 audit(1376.910:355): avc: denied { accept } for pid=4970 comm="syz.1.414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1378.317078][ T29] audit: type=1400 audit(1377.900:356): avc: denied { create } for pid=4972 comm="syz.1.415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1378.323883][ T29] audit: type=1400 audit(1377.910:357): avc: denied { connect } for pid=4972 comm="syz.1.415" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1378.342378][ T29] audit: type=1400 audit(1377.920:358): avc: denied { write } for pid=4972 comm="syz.1.415" laddr=fe80::a8aa:aaff:feaa:aa16 lport=60 faddr=ff01::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1380.809368][ T29] audit: type=1400 audit(1380.390:359): avc: denied { mount } for pid=4975 comm="syz.1.416" name="/" dev="pstore" ino=2489 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1381.063096][ T29] audit: type=1400 audit(1380.650:360): avc: denied { unmount } for pid=4689 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1383.510691][ T29] audit: type=1400 audit(1383.100:361): avc: denied { sys_module } for pid=4983 comm="syz.1.420" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1384.353840][ T29] audit: type=1400 audit(1383.940:362): avc: denied { ioctl } for pid=4983 comm="syz.1.420" path="socket:[9352]" dev="sockfs" ino=9352 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1386.154224][ T4987] ip6gretap1: entered allmulticast mode [ 1386.271783][ T29] audit: type=1400 audit(1385.860:363): avc: denied { create } for pid=4983 comm="syz.1.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1390.309543][ T29] audit: type=1400 audit(1389.900:364): avc: denied { bind } for pid=4998 comm="syz.1.423" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1390.311485][ T29] audit: type=1400 audit(1389.900:365): avc: denied { node_bind } for pid=4998 comm="syz.1.423" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1395.842200][ T29] audit: type=1400 audit(1395.430:366): avc: denied { create } for pid=5019 comm="syz.1.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1395.898868][ T5020] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1395.998174][ T5020] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1404.070140][ T29] audit: type=1400 audit(1403.660:367): avc: denied { prog_run } for pid=5041 comm="syz.1.435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1404.512249][ T29] audit: type=1400 audit(1404.100:368): avc: denied { name_bind } for pid=5041 comm="syz.1.435" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1404.547407][ T29] audit: type=1400 audit(1404.130:369): avc: denied { node_bind } for pid=5041 comm="syz.1.435" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1407.840352][ T29] audit: type=1400 audit(1407.420:370): avc: denied { read } for pid=5049 comm="syz.1.438" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1407.862638][ T29] audit: type=1400 audit(1407.450:371): avc: denied { open } for pid=5049 comm="syz.1.438" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1407.903126][ T29] audit: type=1400 audit(1407.490:372): avc: denied { ioctl } for pid=5049 comm="syz.1.438" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1407.941123][ T29] audit: type=1400 audit(1407.530:373): avc: denied { set_context_mgr } for pid=5049 comm="syz.1.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1408.059877][ T29] audit: type=1400 audit(1407.640:374): avc: denied { map } for pid=5049 comm="syz.1.438" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1408.149390][ T5051] binder: 5049:5051 tried to acquire reference to desc 0, got 1 instead [ 1408.166197][ T29] audit: type=1400 audit(1407.750:375): avc: denied { call } for pid=5049 comm="syz.1.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1408.179774][ T5051] binder_alloc: 5049: binder_alloc_buf size -168 failed, no address space [ 1408.184071][ T5051] binder_alloc: allocated: 0 (num: 0 largest: 0), free: 12288 (num: 1 largest: 12288) [ 1408.210658][ T5051] binder: cannot allocate buffer: no space left [ 1408.212412][ T5051] binder: 5049:5051 transaction call to 5049:0 failed 6/29201/-28, size -192-24 line 3333 [ 1408.271186][ T5051] netlink: 8 bytes leftover after parsing attributes in process `syz.1.438'. [ 1408.308828][ T5051] netlink: 8 bytes leftover after parsing attributes in process `syz.1.438'. [ 1408.462695][ T3439] binder: undelivered TRANSACTION_ERROR: 29201 [ 1408.971075][ T29] audit: type=1400 audit(1408.560:376): avc: denied { bind } for pid=5052 comm="syz.1.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1409.646811][ T5055] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1409.720633][ T5055] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1410.863220][ T29] audit: type=1400 audit(1410.450:377): avc: denied { read } for pid=5059 comm="syz.1.442" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1410.868063][ T29] audit: type=1400 audit(1410.460:378): avc: denied { open } for pid=5059 comm="syz.1.442" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1410.874438][ T29] audit: type=1400 audit(1410.460:379): avc: denied { ioctl } for pid=5059 comm="syz.1.442" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1413.232864][ T5067] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1413.316212][ T5067] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1414.263500][ T29] audit: type=1400 audit(1413.850:380): avc: denied { create } for pid=5071 comm="syz.1.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1414.359197][ T29] audit: type=1400 audit(1413.890:381): avc: denied { write } for pid=5071 comm="syz.1.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1419.581022][ T29] audit: type=1400 audit(1419.170:382): avc: denied { bind } for pid=5094 comm="syz.1.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1419.601704][ T29] audit: type=1400 audit(1419.190:383): avc: denied { setopt } for pid=5094 comm="syz.1.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1421.411185][ T29] audit: type=1400 audit(1421.000:384): avc: denied { read write } for pid=5101 comm="syz.1.456" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1421.412911][ T29] audit: type=1400 audit(1421.000:385): avc: denied { open } for pid=5101 comm="syz.1.456" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1421.468145][ T29] audit: type=1400 audit(1421.050:386): avc: denied { mount } for pid=5101 comm="syz.1.456" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1422.038350][ T29] audit: type=1400 audit(1421.630:387): avc: denied { read } for pid=5101 comm="syz.1.456" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1422.044094][ T29] audit: type=1400 audit(1421.630:388): avc: denied { open } for pid=5101 comm="syz.1.456" path="/63/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1422.173638][ T29] audit: type=1400 audit(1421.750:389): avc: denied { unmount } for pid=4689 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1422.659514][ T5108] sch_tbf: burst 5 is lower than device lo mtu (65550) ! [ 1423.717350][ T29] audit: type=1400 audit(1423.250:390): avc: denied { accept } for pid=5109 comm="syz.1.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1423.719006][ T29] audit: type=1400 audit(1423.270:391): avc: denied { getopt } for pid=5109 comm="syz.1.458" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1428.952812][ T29] audit: type=1400 audit(1428.540:392): avc: denied { audit_control } for pid=5122 comm="syz.1.463" capability=30 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1430.848734][ T5131] veth0_to_team: entered promiscuous mode [ 1430.850045][ T5131] veth0_to_team: entered allmulticast mode [ 1434.631210][ T29] audit: type=1400 audit(1434.220:393): avc: denied { execute } for pid=5144 comm="syz.1.472" path=2F6D656D66643A2327256E6F642576202864656C6574656429 dev="tmpfs" ino=30 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1435.163596][ T5147] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1435.259585][ T5147] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1441.993351][ T29] audit: type=1400 audit(1440.880:394): avc: denied { read write } for pid=5157 comm="syz.0.478" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1441.994485][ T29] audit: type=1400 audit(1440.900:395): avc: denied { open } for pid=5157 comm="syz.0.478" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1442.017365][ T29] audit: type=1400 audit(1441.020:396): avc: denied { write } for pid=5157 comm="syz.0.478" name="igmp" dev="proc" ino=4026532938 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1442.677186][ T30] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1442.678996][ T30] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 1442.722054][ T30] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz1 [ 1460.291088][ T29] audit: type=1400 audit(1459.880:397): avc: denied { write } for pid=5175 comm="syz.1.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1460.920943][ T29] audit: type=1400 audit(1460.510:398): avc: denied { setopt } for pid=5177 comm="syz.1.484" lport=47 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1462.136775][ T29] audit: type=1400 audit(1461.720:399): avc: denied { write } for pid=5183 comm="syz.1.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1463.509368][ T29] audit: type=1400 audit(1463.100:400): avc: denied { create } for pid=5185 comm="syz.1.488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1463.560060][ T29] audit: type=1400 audit(1463.150:401): avc: denied { ioctl } for pid=5185 comm="syz.1.488" path="socket:[9618]" dev="sockfs" ino=9618 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1463.607269][ T29] audit: type=1400 audit(1463.190:402): avc: denied { create } for pid=5185 comm="syz.1.488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 1486.516984][ T5257] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1486.562636][ T5257] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1486.898909][ T29] audit: type=1400 audit(1486.420:403): avc: denied { name_bind } for pid=5256 comm="syz.1.515" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1486.900612][ T29] audit: type=1400 audit(1486.430:404): avc: denied { create } for pid=5256 comm="syz.1.515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1487.398859][ T29] audit: type=1400 audit(1486.980:405): avc: denied { write } for pid=5256 comm="syz.1.515" path="socket:[8988]" dev="sockfs" ino=8988 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1487.400405][ T29] audit: type=1400 audit(1486.990:406): avc: denied { nlmsg_write } for pid=5256 comm="syz.1.515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1487.429469][ T5259] kernel profiling enabled (shift: 9) [ 1495.061253][ T5263] binder: binder_mmap: 5262 20076000-2007a000 bad vm_flags failed -1 [ 1496.631195][ T5269] netlink: 20 bytes leftover after parsing attributes in process `syz.0.520'. [ 1496.660135][ T5269] netlink: 20 bytes leftover after parsing attributes in process `syz.0.520'. [ 1498.143241][ T5277] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1498.210638][ T5277] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1499.298659][ T29] audit: type=1400 audit(1498.890:407): avc: denied { name_bind } for pid=5283 comm="syz.1.527" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1499.350814][ T29] audit: type=1400 audit(1498.940:408): avc: denied { read } for pid=5283 comm="syz.1.527" laddr=ff02::1 lport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1500.280411][ T29] audit: type=1400 audit(1499.870:409): avc: denied { setopt } for pid=5288 comm="syz.1.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1518.858150][ T29] audit: type=1400 audit(1518.450:410): avc: denied { search } for pid=5304 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1519.966915][ T29] audit: type=1400 audit(1518.650:411): avc: denied { read } for pid=5305 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=719 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1519.969262][ T29] audit: type=1400 audit(1518.650:412): avc: denied { open } for pid=5305 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=719 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1519.970856][ T29] audit: type=1400 audit(1518.650:413): avc: denied { getattr } for pid=5305 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=719 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1519.973240][ T29] audit: type=1400 audit(1518.880:414): avc: denied { write } for pid=5304 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=718 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1520.006418][ T29] audit: type=1400 audit(1518.880:415): avc: denied { add_name } for pid=5304 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1520.008168][ T29] audit: type=1400 audit(1518.880:416): avc: denied { create } for pid=5304 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1520.009461][ T29] audit: type=1400 audit(1518.880:417): avc: denied { write open } for pid=5304 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1743 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1520.010903][ T29] audit: type=1400 audit(1518.890:418): avc: denied { append } for pid=5304 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1743 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1520.012194][ T29] audit: type=1400 audit(1518.920:419): avc: denied { getattr } for pid=5304 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1525.409294][ T5329] veth0_to_team: entered promiscuous mode [ 1525.410511][ T5329] veth0_to_team: entered allmulticast mode [ 1526.776763][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 1526.776906][ T29] audit: type=1400 audit(1526.360:424): avc: denied { create } for pid=5331 comm="syz.0.537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1536.397650][ T29] audit: type=1400 audit(1535.960:425): avc: denied { read } for pid=5347 comm="syz.0.542" dev="nsfs" ino=4026532622 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1536.399585][ T29] audit: type=1400 audit(1535.960:426): avc: denied { open } for pid=5347 comm="syz.0.542" path="pid:[4026532622]" dev="nsfs" ino=4026532622 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1547.838790][ T29] audit: type=1400 audit(1547.430:427): avc: denied { mounton } for pid=5362 comm="syz.1.547" path="/proc/297/task" dev="proc" ino=9875 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1547.879362][ T29] audit: type=1400 audit(1547.460:428): avc: denied { mount } for pid=5362 comm="syz.1.547" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1547.984016][ T5363] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 1549.201493][ T29] audit: type=1400 audit(1548.780:429): avc: denied { mount } for pid=5367 comm="syz.1.549" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1558.851306][ T29] audit: type=1400 audit(1558.440:430): avc: denied { write } for pid=5382 comm="syz.0.554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1567.037464][ T29] audit: type=1400 audit(1566.630:431): avc: denied { read } for pid=5405 comm="syz.1.562" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1567.038647][ T29] audit: type=1400 audit(1566.630:432): avc: denied { open } for pid=5405 comm="syz.1.562" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1567.045818][ T29] audit: type=1400 audit(1566.630:433): avc: denied { ioctl } for pid=5405 comm="syz.1.562" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9376 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1567.158200][ T5406] netlink: 'syz.1.562': attribute type 4 has an invalid length. [ 1574.148063][ T29] audit: type=1400 audit(1573.720:434): avc: denied { relabelfrom } for pid=5409 comm="syz.1.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1574.149884][ T29] audit: type=1400 audit(1573.720:435): avc: denied { relabelto } for pid=5409 comm="syz.1.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1581.753748][ T5440] syzkaller0: entered promiscuous mode [ 1581.758648][ T5440] syzkaller0: entered allmulticast mode [ 1603.993678][ T29] audit: type=1400 audit(1603.580:436): avc: denied { mounton } for pid=5455 comm="syz.0.582" path="/244/file0" dev="tmpfs" ino=1267 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1625.960302][ T29] audit: type=1400 audit(1625.550:437): avc: denied { sqpoll } for pid=5504 comm="syz.0.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1625.994043][ T29] audit: type=1400 audit(1625.580:438): avc: denied { map } for pid=5504 comm="syz.0.596" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10364 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1625.996732][ T29] audit: type=1400 audit(1625.590:439): avc: denied { read write } for pid=5504 comm="syz.0.596" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10364 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1639.650266][ T29] audit: type=1400 audit(1639.240:440): avc: denied { bind } for pid=5529 comm="syz.0.605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1647.608966][ T29] audit: type=1400 audit(1647.200:441): avc: denied { unmount } for pid=4689 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1648.796854][ T29] audit: type=1400 audit(1648.280:442): avc: denied { write } for pid=5556 comm="syz.1.614" name="fd" dev="proc" ino=10101 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1648.798309][ T29] audit: type=1400 audit(1648.290:443): avc: denied { add_name } for pid=5556 comm="syz.1.614" name="3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1648.799565][ T29] audit: type=1400 audit(1648.290:444): avc: denied { create } for pid=5556 comm="syz.1.614" name="3" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 1648.800347][ T29] audit: type=1400 audit(1648.300:445): avc: denied { associate } for pid=5556 comm="syz.1.614" name="3" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1649.814264][ T5561] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1649.870042][ T5561] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1653.059877][ T29] audit: type=1400 audit(1652.440:446): avc: denied { create } for pid=5569 comm="syz.1.619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1653.061634][ T29] audit: type=1400 audit(1652.470:447): avc: denied { setopt } for pid=5569 comm="syz.1.619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1653.248413][ T29] audit: type=1400 audit(1652.790:448): avc: denied { bind } for pid=5569 comm="syz.1.619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1654.727529][ T29] audit: type=1400 audit(1654.320:449): avc: denied { write } for pid=5577 comm="syz.1.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1654.734102][ T29] audit: type=1400 audit(1654.320:450): avc: denied { nlmsg_write } for pid=5577 comm="syz.1.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1654.739143][ T5578] netlink: 16 bytes leftover after parsing attributes in process `syz.1.623'. [ 1658.770208][ T5592] netlink: 8 bytes leftover after parsing attributes in process `syz.1.629'. [ 1658.772542][ T5592] netlink: 8 bytes leftover after parsing attributes in process `syz.1.629'. [ 1661.298795][ T29] audit: type=1400 audit(1660.890:451): avc: denied { read write } for pid=5604 comm="syz.1.635" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1661.320892][ T29] audit: type=1400 audit(1660.910:452): avc: denied { open } for pid=5604 comm="syz.1.635" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1664.732491][ T29] audit: type=1400 audit(1664.270:453): avc: denied { name_bind } for pid=5617 comm="syz.0.638" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 1665.243815][ T29] audit: type=1400 audit(1664.830:454): avc: denied { create } for pid=5617 comm="syz.0.638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1665.734300][ T29] audit: type=1400 audit(1665.320:455): avc: denied { getopt } for pid=5625 comm="syz.1.641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1667.668361][ T29] audit: type=1400 audit(1667.250:456): avc: denied { read } for pid=5636 comm="syz.1.646" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1667.700927][ T29] audit: type=1400 audit(1667.290:457): avc: denied { open } for pid=5636 comm="syz.1.646" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1667.737897][ T29] audit: type=1400 audit(1667.320:458): avc: denied { ioctl } for pid=5636 comm="syz.1.646" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1669.552863][ T29] audit: type=1400 audit(1669.130:459): avc: denied { ioctl } for pid=5647 comm="syz.0.650" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x55ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1670.951805][ T5655] netlink: 4 bytes leftover after parsing attributes in process `syz.0.654'. [ 1672.696931][ T29] audit: type=1400 audit(1672.280:460): avc: denied { read } for pid=5664 comm="syz.0.658" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1672.699097][ T29] audit: type=1400 audit(1672.290:461): avc: denied { open } for pid=5664 comm="syz.0.658" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1672.709765][ T29] audit: type=1400 audit(1672.290:462): avc: denied { ioctl } for pid=5664 comm="syz.0.658" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x1278 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1674.323903][ T29] audit: type=1400 audit(1673.910:463): avc: denied { write } for pid=5674 comm="syz.1.663" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1674.334704][ T5676] random: crng reseeded on system resumption [ 1674.341110][ T29] audit: type=1400 audit(1673.920:464): avc: denied { open } for pid=5674 comm="syz.1.663" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1674.512995][ T29] audit: type=1400 audit(1674.100:465): avc: denied { ioctl } for pid=5674 comm="syz.1.663" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3313 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1676.900143][ T5689] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1676.947166][ T5689] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1677.406305][ T5692] netlink: 8 bytes leftover after parsing attributes in process `syz.1.670'. [ 1687.632561][ T29] audit: type=1326 audit(1687.210:466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5736 comm="syz.1.686" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffb9f499e8 code=0x0 [ 1692.148302][ T29] audit: type=1400 audit(1691.720:467): avc: denied { create } for pid=5757 comm="syz.1.694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1692.223529][ T29] audit: type=1400 audit(1691.790:468): avc: denied { connect } for pid=5757 comm="syz.1.694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1692.276851][ T29] audit: type=1400 audit(1691.820:469): avc: denied { bind } for pid=5757 comm="syz.1.694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1692.283206][ T5758] RDS: rds_bind could not find a transport for fe80::aa, load rds_tcp or rds_rdma? [ 1697.320825][ T29] audit: type=1400 audit(1696.910:470): avc: denied { create } for pid=5775 comm="syz.0.702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1697.389759][ T5776] netlink: 16 bytes leftover after parsing attributes in process `syz.0.702'. [ 1697.467111][ T29] audit: type=1400 audit(1696.960:471): avc: denied { write } for pid=5775 comm="syz.0.702" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1707.114309][ T29] audit: type=1400 audit(1706.700:472): avc: denied { open } for pid=5826 comm="syz.1.719" path="/dev/ptyq6" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1707.161150][ T29] audit: type=1400 audit(1706.750:473): avc: denied { ioctl } for pid=5826 comm="syz.1.719" path="/dev/ptyq6" dev="devtmpfs" ino=117 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1708.880257][ T5836] netlink: 4 bytes leftover after parsing attributes in process `syz.0.721'. [ 1716.382794][ T5851] smc: net device bridge_slave_0 applied user defined pnetid SYZ1 [ 1717.248492][ T5855] netlink: 8 bytes leftover after parsing attributes in process `syz.1.727'. [ 1719.357500][ T5868] xt_hashlimit: size too large, truncated to 1048576 [ 1736.442463][ T29] audit: type=1400 audit(1736.030:474): avc: denied { create } for pid=5877 comm="syz.1.735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1736.469142][ T29] audit: type=1400 audit(1736.060:475): avc: denied { write } for pid=5877 comm="syz.1.735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1750.501456][ T29] audit: type=1400 audit(1750.090:476): avc: denied { execute } for pid=5905 comm="syz-executor" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1751.591788][ T29] audit: type=1400 audit(1751.180:477): avc: denied { execute_no_trans } for pid=5905 comm="syz-executor" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1752.967840][ T29] audit: type=1400 audit(1752.550:478): avc: denied { mounton } for pid=5906 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1773.025705][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 26s! [syz.1.742:5904] [ 1773.029888][ C0] Modules linked in: [ 1773.033040][ C0] irq event stamp: 5317 [ 1773.033962][ C0] hardirqs last enabled at (5316): [] exit_to_kernel_mode+0x38/0x118 [ 1773.037418][ C0] hardirqs last disabled at (5317): [] el1_interrupt+0x24/0x54 [ 1773.038262][ C0] softirqs last enabled at (210): [] fpsimd_restore_current_state+0x44/0xe4 [ 1773.039163][ C0] softirqs last disabled at (218): [] sock_devmem_dontneed+0x158/0x490 [ 1773.040941][ C0] CPU: 0 UID: 0 PID: 5904 Comm: syz.1.742 Not tainted 6.11.0-syzkaller-11993-g3efc57369a0c #0 [ 1773.042936][ C0] Hardware name: linux,dummy-virt (DT) [ 1773.044061][ C0] pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1773.044903][ C0] pc : debug_lockdep_rcu_enabled+0x0/0x2c [ 1773.045569][ C0] lr : xas_start+0x88/0x4e0 [ 1773.046201][ C0] sp : ffff80008e867630 [ 1773.046863][ C0] x29: ffff80008e867630 x28: 0000000000a5ab46 x27: 1fffe0000254d980 [ 1773.048411][ C0] x26: 0000000000000000 x25: 0000000000000000 x24: ffff80008e8677e8 [ 1773.049513][ C0] x23: ffff000012a6cc00 x22: 1ffff00011d0cefd x21: ffff0000150f9280 [ 1773.050688][ C0] x20: 0000000000000000 x19: ffff80008e8677d0 x18: 00000000ffffffff [ 1773.051718][ C0] x17: 0000000000000000 x16: 0000000000000000 x15: ffff00000db28a80 [ 1773.052742][ C0] x14: 1fffe00001b6514f x13: 1fffe00001b65154 x12: ffff700011d0ceff [ 1773.053844][ C0] x11: 1ffff00011d0cefe x10: ffff700011d0cefe x9 : dfff800000000000 [ 1773.055007][ C0] x8 : 0000000000000003 x7 : 0000000041b58ab3 x6 : dfff800000000000 [ 1773.056264][ C0] x5 : ffff0000150f9280 x4 : 00000000770aab46 x3 : 0000000000000003 [ 1773.057001][ C0] x2 : 1fffe00002a1f259 x1 : 0000000000000000 x0 : ffff0000150f92c8 [ 1773.057843][ C0] Call trace: [ 1773.058181][ C0] debug_lockdep_rcu_enabled+0x0/0x2c [ 1773.058833][ C0] xas_load+0x1c/0x3c4 [ 1773.059378][ C0] xas_store+0x700/0x1130 [ 1773.059898][ C0] __xa_erase+0x90/0xf8 [ 1773.060407][ C0] sock_devmem_dontneed+0x1ec/0x490 [ 1773.060885][ C0] sk_setsockopt+0x270/0x2188 [ 1773.061411][ C0] sock_setsockopt+0x34/0x64 [ 1773.061833][ C0] do_sock_setsockopt+0x2cc/0x354 [ 1773.062255][ C0] __sys_setsockopt+0xdc/0x178 [ 1773.063031][ C0] __arm64_sys_setsockopt+0xa4/0x100 [ 1773.063560][ C0] invoke_syscall+0x6c/0x258 [ 1773.063966][ C0] el0_svc_common.constprop.0+0xac/0x230 [ 1773.064298][ C0] do_el0_svc+0x40/0x58 [ 1773.064593][ C0] el0_svc+0x50/0x180 [ 1773.064934][ C0] el0t_64_sync_handler+0x100/0x12c [ 1773.065251][ C0] el0t_64_sync+0x190/0x194 [ 1773.066024][ C0] Sending NMI from CPU 0 to CPUs 1: [ 1773.067556][ C1] NMI backtrace for cpu 1 [ 1773.068682][ C1] CPU: 1 UID: 0 PID: 16 Comm: rcu_preempt Not tainted 6.11.0-syzkaller-11993-g3efc57369a0c #0 [ 1773.069788][ C1] Hardware name: linux,dummy-virt (DT) [ 1773.070755][ C1] pstate: 10000005 (nzcV daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 1773.071912][ C1] pc : finish_task_switch.isra.0+0x1ac/0x8e0 [ 1773.073225][ C1] lr : finish_task_switch.isra.0+0x1a8/0x8e0 [ 1773.074465][ C1] sp : ffff80008cec7920 [ 1773.075732][ C1] x29: ffff80008cec7920 x28: 0000019cd1f07040 x27: ffff000069fcdb48 [ 1773.078597][ C1] x26: 1fffe0000d3f9b69 x25: 0000000000000000 x24: 0000000000000000 [ 1773.081395][ C1] x23: ffff000016bebc00 x22: ffff000069fccfd8 x21: ffff800086bef000 [ 1773.083674][ C1] x20: ffff000069fccfc0 x19: 0000000000000000 x18: 00000000ffffffff [ 1773.086207][ C1] x17: ffff7fffe3425000 x16: 0000000000000000 x15: ffff00000da86480 [ 1773.088626][ C1] x14: 1fffe00001b50c8f x13: 1fffe00001b50c94 x12: ffff60000d3f99f9 [ 1773.090997][ C1] x11: 1fffe0000d3f99f8 x10: ffff60000d3f99f8 x9 : dfff800000000000 [ 1773.092947][ C1] x8 : ffff000069fccfc0 x7 : 0000000000000001 x6 : ffff60000d3f99f8 [ 1773.094680][ C1] x5 : 0000000000000000 x4 : 1ffff000119d8f16 x3 : 0000000000000001 [ 1773.096836][ C1] x2 : 0000000000000000 x1 : 0000000000000003 x0 : 000000000017c173 [ 1773.098985][ C1] Call trace: [ 1773.099862][ C1] finish_task_switch.isra.0+0x1ac/0x8e0 [ 1773.100848][ C1] __schedule+0xaf8/0x2dfc [ 1773.101643][ C1] schedule+0xd0/0x304 [ 1773.102488][ C1] schedule_timeout+0x108/0x234 [ 1773.103827][ C1] rcu_gp_fqs_loop+0x1b0/0xa48 [ 1773.104727][ C1] rcu_gp_kthread+0x24c/0x2c8 [ 1773.105542][ C1] kthread+0x27c/0x300 [ 1773.106262][ C1] ret_from_fork+0x10/0x20 [ 1773.108873][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 1773.110177][ C0] CPU: 0 UID: 0 PID: 5904 Comm: syz.1.742 Tainted: G L 6.11.0-syzkaller-11993-g3efc57369a0c #0 [ 1773.110784][ C0] Tainted: [L]=SOFTLOCKUP [ 1773.111128][ C0] Hardware name: linux,dummy-virt (DT) [ 1773.111589][ C0] Call trace: [ 1773.111908][ C0] dump_backtrace+0x9c/0x11c [ 1773.112267][ C0] show_stack+0x18/0x24 [ 1773.112656][ C0] dump_stack_lvl+0x38/0xf4 [ 1773.113027][ C0] dump_stack+0x1c/0x28 [ 1773.113365][ C0] panic+0x5b0/0x664 [ 1773.113732][ C0] watchdog_timer_fn+0x448/0x5c8 [ 1773.114111][ C0] __hrtimer_run_queues+0x600/0x958 [ 1773.114555][ C0] hrtimer_interrupt+0x2a4/0x76c [ 1773.115256][ C0] arch_timer_handler_phys+0x40/0x6c [ 1773.115718][ C0] handle_percpu_devid_irq+0x19c/0x30c [ 1773.116246][ C0] generic_handle_domain_irq+0x78/0xa4 [ 1773.116636][ C0] gic_handle_irq+0x54/0x184 [ 1773.117057][ C0] call_on_irq_stack+0x24/0x4c [ 1773.117444][ C0] do_interrupt_handler+0x12c/0x150 [ 1773.117818][ C0] el1_interrupt+0x34/0x54 [ 1773.118201][ C0] el1h_64_irq_handler+0x18/0x24 [ 1773.118593][ C0] el1h_64_irq+0x64/0x68 [ 1773.118964][ C0] debug_lockdep_rcu_enabled+0x0/0x2c [ 1773.119372][ C0] xas_load+0x1c/0x3c4 [ 1773.119737][ C0] xas_store+0x700/0x1130 [ 1773.120076][ C0] __xa_erase+0x90/0xf8 [ 1773.120439][ C0] sock_devmem_dontneed+0x1ec/0x490 [ 1773.120872][ C0] sk_setsockopt+0x270/0x2188 [ 1773.121276][ C0] sock_setsockopt+0x34/0x64 [ 1773.121712][ C0] do_sock_setsockopt+0x2cc/0x354 [ 1773.122146][ C0] __sys_setsockopt+0xdc/0x178 [ 1773.122537][ C0] __arm64_sys_setsockopt+0xa4/0x100 [ 1773.122910][ C0] invoke_syscall+0x6c/0x258 [ 1773.123285][ C0] el0_svc_common.constprop.0+0xac/0x230 [ 1773.123690][ C0] do_el0_svc+0x40/0x58 [ 1773.124021][ C0] el0_svc+0x50/0x180 [ 1773.124371][ C0] el0t_64_sync_handler+0x100/0x12c [ 1773.124804][ C0] el0t_64_sync+0x190/0x194 [ 1773.125704][ C0] SMP: stopping secondary CPUs [ 1773.127147][ C0] Kernel Offset: disabled [ 1773.127539][ C0] CPU features: 0x08,80002003,40200000,0200421b [ 1773.128311][ C0] Memory Limit: none [ 1773.129649][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 14:11:01 Registers: info registers vcpu 0 CPU#0 PC=ffff8000802f5728 X00=00000000000000c0 X01=0000000000000001 X02=1fffe00001b65001 X03=dfff800000000000 X04=1fffe00001b65001 X05=0000000000000001 X06=0000000000000000 X07=ffff800086b93154 X08=0000000000000001 X09=000000000000015c X10=ffff800088563a00 X11=0000000000000000 X12=0000000000000028 X13=1fffe00001b6516d X14=1fffe00001b6514f X15=ffff00000db28a80 X16=0000000000000000 X17=0000000000000000 X18=00000000d2180eeb X19=ffff00000ed39080 X20=ffff00000db28000 X21=0000000000000000 X22=00000000000000c0 X23=ffff00000db28a80 X24=ffff00000ed392d0 X25=1ffff00010e881ef X26=ffff00000ed391c0 X27=000000000000002a X28=ffff00000ed39080 X29=ffff800080007690 X30=ffff800081a1e67c SP=ffff800080007690 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffc5741000:c13d314669efae00 Q02=0000ffffba0ce000:ffffff80ffffffd8 Q03=0000ffffc5741090:0000ffffc5741090 Q04=0000ffffc5741090:0000ffffc5741048 Q05=0000ffffc5741060:0000ffffc5741090 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc57412a0:0000ffffc57412a0 Q17=ffffff80ffffffd0:0000ffffc5741270 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800080942374 X00=99765dd6194c1600 X01=0000000100000201 X02=0000000000000000 X03=1fffe00002d7d8cf X04=00000000f204f1f1 X05=ffff70001402cf38 X06=dfff800000000000 X07=0000000000000001 X08=ffff8000a21b0048 X09=dfff800000000000 X10=ffff700014436009 X11=1ffff00014436009 X12=ffff70001443600a X13=1fffe00002d7d8de X14=1fffe00002d7d8cf X15=ffff000016bec680 X16=0000000000000000 X17=0000000000000000 X18=000000006825d523 X19=ffff000016bebc00 X20=0000000000000001 X21=0000000000000000 X22=0000000000000001 X23=ffff80008524a900 X24=ffff8000a21b0048 X25=ffff8000a21b0000 X26=0000000000000000 X27=0000000000000000 X28=dfff800000000000 X29=ffff8000a01678b0 X30=ffff8000851a5c20 SP=ffff8000a0167970 PSTATE=a0000005 N-C- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000001 Q01=0000000000000000:0000000000000000 Q02=0000aaaac14ab749:0000aaaac14ab690 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffe9540fa0:0000ffffe9540fa0 Q17=ffffff80ffffffd0:0000ffffe9540f70 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000