last executing test programs: 6m58.236251071s ago: executing program 1 (id=2781): r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000640)={'syztnl2\x00', 0x0}) dup(r0) fcntl$getflags(r0, 0xb) openat$pfkey(0xffffff9c, &(0x7f0000000100), 0x589000, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000000080)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_udp_int(r1, 0x11, 0xa, &(0x7f0000000000), &(0x7f00000000c0)=0x4) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000140)={'syztnl2\x00', 0x0, 0x29, 0x1, 0x0, 0x64, 0x1, @mcast1, @empty, 0x8000, 0x0, 0xfffffffb, 0x5}}) 6m57.458083913s ago: executing program 1 (id=2782): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) r2 = io_uring_setup(0x104c, &(0x7f0000001440)) sendmsg$DEVLINK_CMD_RATE_DEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) close(r1) socket$inet6(0xa, 0x2, 0x0) close(r2) 6m56.4784433s ago: executing program 1 (id=2783): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup2(r1, r0) prlimit64(0x0, 0x7, &(0x7f0000002040), 0x0) fcntl$getown(0xffffffffffffffff, 0x9) accept$unix(r0, 0x0, 0x0) 6m56.098210561s ago: executing program 1 (id=2784): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x82) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x89901) move_mount(r2, &(0x7f0000000040)='.\x00', 0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0) r3 = open_tree(r2, &(0x7f00000001c0)='./file0\x00', 0x89901) move_mount(r3, &(0x7f0000000040)='.\x00', r1, &(0x7f0000000180)='./file0\x00', 0x200) 6m55.606890455s ago: executing program 1 (id=2785): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) r2 = io_uring_setup(0x4175, &(0x7f0000000040)) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) close(r1) socket$vsock_stream(0x28, 0x1, 0x0) close(r2) 6m55.164107238s ago: executing program 1 (id=2786): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5910fae9d6dcd3292ea54c7b6ef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) recvfrom$packet(r1, &(0x7f0000001840)=""/4096, 0x1000, 0x100, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x8080) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000001800)={0x0, 0x23, &(0x7f00000001c0)={&(0x7f00000001c0)=ANY=[], 0x12f4}}, 0x240000c4) 6m55.163503358s ago: executing program 32 (id=2786): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5910fae9d6dcd3292ea54c7b6ef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) recvfrom$packet(r1, &(0x7f0000001840)=""/4096, 0x1000, 0x100, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x8080) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000001800)={0x0, 0x23, &(0x7f00000001c0)={&(0x7f00000001c0)=ANY=[], 0x12f4}}, 0x240000c4) 23.911468703s ago: executing program 2 (id=3138): ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x5452, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r3, 0x5450, 0x0) 23.491465615s ago: executing program 2 (id=3139): syz_usb_connect(0x0, 0x36, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000400)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = dup(r1) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) 8.269146756s ago: executing program 0 (id=3149): r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup3(r2, r1, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$FICLONE(r0, 0x5451, r4) 8.093123661s ago: executing program 2 (id=3150): r0 = io_uring_setup(0x40c7, &(0x7f0000001440)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7e12ddb3a89047bfffff00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000200)=0x2) read(r2, 0x0, 0x2006) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, 0x0) close(r0) 7.708855112s ago: executing program 0 (id=3151): r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000080)={0x1d, r2, 0x2}, 0x18) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000180), r1) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[], 0x14}}, 0x0) 5.797877146s ago: executing program 2 (id=3152): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) r2 = io_uring_setup(0x1041, &(0x7f00000001c0)) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) close(r1) close(r2) socket$inet_udp(0x2, 0x2, 0x0) 4.775801435s ago: executing program 0 (id=3153): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000001080)='.pending_reads\x00', 0x62cc2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000040)={0x1d, r3, 0x3}, 0x18) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=ANY=[], 0x14}}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x20048011}, 0x0) 4.719632017s ago: executing program 2 (id=3154): r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) close(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) sendmsg$nl_xfrm(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 3.831759412s ago: executing program 2 (id=3155): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7e12ddc5a89047bf00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x0) syz_usb_connect(0x0, 0x97, 0x0, 0x0) 3.219580729s ago: executing program 0 (id=3156): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2006) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 972.313213ms ago: executing program 0 (id=3157): r0 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x40, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f}}, 0x50) syz_fuse_handle_req(r1, &(0x7f0000006380)="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", 0x2000, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20c01, 0x0) dup3(r0, r1, 0x0) pwritev2(r3, &(0x7f00000009c0)=[{&(0x7f0000000380)='$', 0x1}], 0x1, 0x0, 0x0, 0x0) 0s ago: executing program 0 (id=3158): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000080)={0x1d, r1}, 0x18) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3}, 0x18) connect$can_j1939(r2, &(0x7f0000000140)={0x1d, r3}, 0x18) sendmsg$can_j1939(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)='data', 0x4}}, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/4, 0x4}], 0x1}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:31305' (ED25519) to the list of known hosts. [ 135.015086][ T29] audit: type=1400 audit(134.670:58): avc: denied { name_bind } for pid=3272 comm="sshd" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 135.354262][ T29] audit: type=1400 audit(135.010:59): avc: denied { execute } for pid=3274 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 135.357960][ T29] audit: type=1400 audit(135.010:60): avc: denied { execute_no_trans } for pid=3274 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 140.201816][ T29] audit: type=1400 audit(139.860:61): avc: denied { mounton } for pid=3274 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 140.222923][ T29] audit: type=1400 audit(139.870:62): avc: denied { mount } for pid=3274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 140.244983][ T3274] cgroup: Unknown subsys name 'net' [ 140.267737][ T29] audit: type=1400 audit(139.920:63): avc: denied { unmount } for pid=3274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 140.592062][ T3274] cgroup: Unknown subsys name 'cpuset' [ 140.621500][ T3274] cgroup: Unknown subsys name 'rlimit' [ 140.895575][ T29] audit: type=1400 audit(140.550:64): avc: denied { setattr } for pid=3274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 140.901888][ T29] audit: type=1400 audit(140.550:65): avc: denied { mounton } for pid=3274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 140.902873][ T29] audit: type=1400 audit(140.560:66): avc: denied { mount } for pid=3274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 141.257268][ T3276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 141.263754][ T29] audit: type=1400 audit(140.920:67): avc: denied { relabelto } for pid=3276 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 141.274521][ T29] audit: type=1400 audit(140.930:68): avc: denied { write } for pid=3276 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 141.350293][ T29] audit: type=1400 audit(141.010:69): avc: denied { read } for pid=3274 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 141.352168][ T29] audit: type=1400 audit(141.010:70): avc: denied { open } for pid=3274 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 141.366760][ T3274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 147.994513][ T29] audit: type=1400 audit(147.650:71): avc: denied { execmem } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 148.136780][ T29] audit: type=1400 audit(147.790:72): avc: denied { read } for pid=3280 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 148.141718][ T29] audit: type=1400 audit(147.800:73): avc: denied { open } for pid=3280 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 148.189014][ T29] audit: type=1400 audit(147.810:74): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 148.255826][ T29] audit: type=1400 audit(147.910:75): avc: denied { module_request } for pid=3279 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 148.426286][ T29] audit: type=1400 audit(148.080:76): avc: denied { sys_module } for pid=3279 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 152.817919][ T3279] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 152.841844][ T3280] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 152.874607][ T3279] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 152.890580][ T3280] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 154.812310][ T3279] hsr_slave_0: entered promiscuous mode [ 154.862797][ T3279] hsr_slave_1: entered promiscuous mode [ 155.176194][ T3280] hsr_slave_0: entered promiscuous mode [ 155.220882][ T3280] hsr_slave_1: entered promiscuous mode [ 155.293116][ T3280] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 155.294778][ T3280] Cannot create hsr debugfs directory [ 156.377806][ T29] audit: type=1400 audit(156.030:77): avc: denied { create } for pid=3279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 156.394029][ T29] audit: type=1400 audit(156.050:78): avc: denied { write } for pid=3279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 156.395078][ T29] audit: type=1400 audit(156.050:79): avc: denied { read } for pid=3279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 156.421683][ T3279] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 156.484022][ T3279] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 156.543329][ T3279] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 156.567859][ T3279] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 156.818868][ T3280] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 156.877363][ T3280] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 156.904056][ T3280] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 156.927697][ T3280] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 158.633107][ T3279] 8021q: adding VLAN 0 to HW filter on device bond0 [ 159.012876][ T3280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.320752][ T3279] veth0_vlan: entered promiscuous mode [ 165.406676][ T3279] veth1_vlan: entered promiscuous mode [ 165.666173][ T3279] veth0_macvtap: entered promiscuous mode [ 165.731362][ T3279] veth1_macvtap: entered promiscuous mode [ 166.057900][ T3280] veth0_vlan: entered promiscuous mode [ 166.107014][ T3279] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.110782][ T3279] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.111298][ T3279] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.111708][ T3279] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 166.155200][ T3280] veth1_vlan: entered promiscuous mode [ 166.591863][ T29] audit: type=1400 audit(166.250:80): avc: denied { mount } for pid=3279 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 166.605484][ T29] audit: type=1400 audit(166.260:81): avc: denied { mounton } for pid=3279 comm="syz-executor" path="/syzkaller.iN6ADk/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 166.627937][ T29] audit: type=1400 audit(166.280:82): avc: denied { mount } for pid=3279 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 166.661440][ T29] audit: type=1400 audit(166.320:83): avc: denied { mounton } for pid=3279 comm="syz-executor" path="/syzkaller.iN6ADk/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 166.684480][ T29] audit: type=1400 audit(166.340:84): avc: denied { mounton } for pid=3279 comm="syz-executor" path="/syzkaller.iN6ADk/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 166.690591][ T3280] veth0_macvtap: entered promiscuous mode [ 166.716970][ T3280] veth1_macvtap: entered promiscuous mode [ 166.761488][ T29] audit: type=1400 audit(166.420:85): avc: denied { unmount } for pid=3279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 166.784763][ T29] audit: type=1400 audit(166.440:86): avc: denied { mounton } for pid=3279 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 166.834558][ T29] audit: type=1400 audit(166.490:87): avc: denied { mount } for pid=3279 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 166.845646][ T29] audit: type=1400 audit(166.500:88): avc: denied { mounton } for pid=3279 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 166.860540][ T29] audit: type=1400 audit(166.510:89): avc: denied { mount } for pid=3279 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 167.045181][ T3280] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.045797][ T3280] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.046216][ T3280] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.046628][ T3280] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 167.203279][ T3279] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 168.506165][ T3420] serio: Serial port pts0 [ 170.075820][ T3427] serio: Serial port pts1 [ 174.935590][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 174.935701][ T29] audit: type=1400 audit(174.590:99): avc: denied { create } for pid=3435 comm="syz.1.7" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 175.373430][ T3438] serio: Serial port pts0 [ 180.253350][ T29] audit: type=1400 audit(179.910:100): avc: denied { map } for pid=3462 comm="syz.0.18" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4326 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 180.254480][ T29] audit: type=1400 audit(179.910:101): avc: denied { read write } for pid=3462 comm="syz.0.18" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4326 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 180.319130][ T29] audit: type=1400 audit(179.970:102): avc: denied { mounton } for pid=3462 comm="syz.0.18" path="/proc/32/cgroup" dev="proc" ino=4327 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 180.327230][ T3463] ======================================================= [ 180.327230][ T3463] WARNING: The mand mount option has been deprecated and [ 180.327230][ T3463] and is ignored by this kernel. Remove the mand [ 180.327230][ T3463] option from the mount to silence this warning. [ 180.327230][ T3463] ======================================================= [ 180.327768][ T29] audit: type=1400 audit(179.980:103): avc: denied { remount } for pid=3462 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 187.946728][ T29] audit: type=1400 audit(187.600:104): avc: denied { read } for pid=3502 comm="syz.0.37" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 187.947949][ T29] audit: type=1400 audit(187.600:105): avc: denied { open } for pid=3502 comm="syz.0.37" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 187.963036][ T29] audit: type=1400 audit(187.620:106): avc: denied { ioctl } for pid=3502 comm="syz.0.37" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x5441 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 187.966833][ T29] audit: type=1400 audit(187.620:107): avc: denied { create } for pid=3502 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 190.291966][ T29] audit: type=1400 audit(189.950:108): avc: denied { create } for pid=3524 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 190.314767][ T29] audit: type=1400 audit(189.960:109): avc: denied { setopt } for pid=3524 comm="syz.1.47" lport=141 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 190.323876][ T3525] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 192.801337][ T29] audit: type=1400 audit(192.460:110): avc: denied { block_suspend } for pid=3543 comm="syz.1.56" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 197.346546][ T29] audit: type=1400 audit(197.000:111): avc: denied { name_bind } for pid=3572 comm="syz.1.70" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 197.350310][ T29] audit: type=1400 audit(197.010:112): avc: denied { node_bind } for pid=3572 comm="syz.1.70" saddr=224.0.0.1 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 216.182296][ T3623] serio: Serial port pts0 [ 216.326558][ T3625] serio: Serial port pts1 [ 223.064073][ T29] audit: type=1400 audit(222.720:113): avc: denied { name_bind } for pid=3641 comm="syz.1.96" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 226.209156][ T29] audit: type=1400 audit(225.860:114): avc: denied { execute } for pid=3665 comm="syz.1.105" path=2F6D656D66643AC0873A2A18C169D324155B78B18949AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EB257CB8D7D336C6D38A537C9202864656C6574656429 dev="tmpfs" ino=1026 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 227.455393][ T29] audit: type=1400 audit(227.110:115): avc: denied { create } for pid=3673 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 227.467423][ T29] audit: type=1400 audit(227.120:116): avc: denied { write } for pid=3673 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 232.442420][ T29] audit: type=1400 audit(232.100:117): avc: denied { read } for pid=3708 comm="syz.1.123" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 232.443920][ T29] audit: type=1400 audit(232.100:118): avc: denied { open } for pid=3708 comm="syz.1.123" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 234.082042][ T29] audit: type=1400 audit(233.740:119): avc: denied { read } for pid=3720 comm="syz.1.128" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 234.084629][ T29] audit: type=1400 audit(233.740:120): avc: denied { open } for pid=3720 comm="syz.1.128" path="/dev/input/mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 234.956753][ T29] audit: type=1400 audit(234.590:121): avc: denied { read write } for pid=3725 comm="syz.0.129" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 234.957741][ T29] audit: type=1400 audit(234.590:122): avc: denied { open } for pid=3725 comm="syz.0.129" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 234.959618][ T29] audit: type=1400 audit(234.600:123): avc: denied { mounton } for pid=3725 comm="syz.0.129" path="/61/file0" dev="tmpfs" ino=369 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 235.653598][ T29] audit: type=1400 audit(235.300:124): avc: denied { unmount } for pid=3279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 236.663050][ T29] audit: type=1400 audit(236.320:125): avc: denied { read } for pid=3740 comm="syz.1.135" name="nvme-fabrics" dev="devtmpfs" ino=679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 236.664207][ T29] audit: type=1400 audit(236.320:126): avc: denied { open } for pid=3740 comm="syz.1.135" path="/dev/nvme-fabrics" dev="devtmpfs" ino=679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 253.980392][ T29] audit: type=1400 audit(253.630:127): avc: denied { write } for pid=3770 comm="syz.0.145" name="vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 254.035482][ T29] audit: type=1400 audit(253.680:128): avc: denied { read } for pid=3085 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 254.042154][ T29] audit: type=1400 audit(253.690:129): avc: denied { append } for pid=3085 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 254.050519][ T29] audit: type=1400 audit(253.700:130): avc: denied { open } for pid=3085 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 254.052214][ T29] audit: type=1400 audit(253.700:131): avc: denied { getattr } for pid=3085 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 260.647614][ T3788] serio: Serial port pts0 [ 263.749164][ T29] audit: type=1400 audit(263.400:132): avc: denied { write } for pid=3808 comm="syz.0.162" name="igmp" dev="proc" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 270.663202][ T3847] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 270.681237][ T29] audit: type=1400 audit(270.340:133): avc: denied { getopt } for pid=3845 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 271.242539][ T29] audit: type=1400 audit(270.770:134): avc: denied { create } for pid=3849 comm="syz.0.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 271.243448][ T29] audit: type=1400 audit(270.770:135): avc: denied { ioctl } for pid=3849 comm="syz.0.178" path="socket:[5419]" dev="sockfs" ino=5419 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 271.244287][ T29] audit: type=1400 audit(270.780:136): avc: denied { bind } for pid=3849 comm="syz.0.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 271.245047][ T29] audit: type=1400 audit(270.780:137): avc: denied { write } for pid=3849 comm="syz.0.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 278.844706][ T3897] serio: Serial port pts0 [ 278.850375][ T3899] serio: Serial port pts1 [ 294.863296][ T29] audit: type=1400 audit(294.520:138): avc: denied { read } for pid=3909 comm="syz.1.203" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 294.864736][ T29] audit: type=1400 audit(294.520:139): avc: denied { open } for pid=3909 comm="syz.1.203" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 296.451497][ T29] audit: type=1400 audit(296.110:140): avc: denied { read write } for pid=3279 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 296.460663][ T29] audit: type=1400 audit(296.110:141): avc: denied { open } for pid=3279 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 296.471512][ T29] audit: type=1400 audit(296.120:142): avc: denied { read } for pid=3085 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 296.472577][ T29] audit: type=1400 audit(296.120:143): avc: denied { search } for pid=3085 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 296.473430][ T29] audit: type=1400 audit(296.120:144): avc: denied { append } for pid=3085 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 296.474284][ T29] audit: type=1400 audit(296.120:145): avc: denied { open } for pid=3085 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 296.475375][ T29] audit: type=1400 audit(296.130:146): avc: denied { getattr } for pid=3085 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 296.476286][ T29] audit: type=1400 audit(296.130:147): avc: denied { ioctl } for pid=3279 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 297.033810][ T3936] serio: Serial port pts0 [ 302.373534][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 302.373634][ T29] audit: type=1400 audit(302.030:153): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 303.650652][ T29] audit: type=1400 audit(303.310:154): avc: denied { create } for pid=3966 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 303.659401][ T29] audit: type=1400 audit(303.310:155): avc: denied { bind } for pid=3966 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 303.674453][ T29] audit: type=1400 audit(303.330:156): avc: denied { accept } for pid=3966 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 303.696948][ T29] audit: type=1400 audit(303.350:157): avc: denied { write } for pid=3966 comm="syz.1.226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 304.537960][ T29] audit: type=1400 audit(304.190:158): avc: denied { map_create } for pid=3976 comm="syz.1.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 304.539627][ T29] audit: type=1400 audit(304.190:159): avc: denied { bpf } for pid=3976 comm="syz.1.231" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 304.561843][ T29] audit: type=1400 audit(304.210:160): avc: denied { map_read map_write } for pid=3976 comm="syz.1.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 304.577012][ T29] audit: type=1400 audit(304.230:161): avc: denied { prog_load } for pid=3976 comm="syz.1.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 304.581220][ T29] audit: type=1400 audit(304.230:162): avc: denied { perfmon } for pid=3976 comm="syz.1.231" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 309.462114][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 309.462215][ T29] audit: type=1400 audit(309.110:165): avc: denied { name_bind } for pid=4019 comm="syz.1.250" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 309.463520][ T29] audit: type=1400 audit(309.120:166): avc: denied { node_bind } for pid=4019 comm="syz.1.250" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 310.753936][ T4028] syzkaller0: entered promiscuous mode [ 310.754799][ T4028] syzkaller0: entered allmulticast mode [ 310.985059][ T29] audit: type=1400 audit(310.640:167): avc: denied { create } for pid=4031 comm="syz.1.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 328.300906][ T29] audit: type=1400 audit(327.960:168): avc: denied { read write } for pid=4073 comm="syz.0.270" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 328.302050][ T29] audit: type=1400 audit(327.960:169): avc: denied { open } for pid=4073 comm="syz.0.270" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 343.770997][ T29] audit: type=1400 audit(343.400:170): avc: denied { create } for pid=4116 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 343.772012][ T29] audit: type=1400 audit(343.400:171): avc: denied { write } for pid=4116 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 345.302548][ T29] audit: type=1400 audit(344.960:172): avc: denied { read } for pid=4126 comm="syz.1.289" name="dlm-control" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 345.305779][ T29] audit: type=1400 audit(344.960:173): avc: denied { open } for pid=4126 comm="syz.1.289" path="/dev/dlm-control" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 348.505511][ T4150] serio: Serial port pts0 [ 354.932287][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 357.254901][ T4209] serio: Serial port pts0 [ 357.960917][ T4216] serio: Serial port pts1 [ 363.710127][ T4226] serio: Serial port pts0 [ 364.476038][ T4233] serio: Serial port pts1 [ 371.521891][ T29] audit: type=1400 audit(371.180:174): avc: denied { write } for pid=4252 comm="syz.1.338" name="udp6" dev="proc" ino=4026532766 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 371.553517][ T29] audit: type=1400 audit(371.210:175): avc: denied { create } for pid=4252 comm="syz.1.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 371.572561][ T29] audit: type=1400 audit(371.230:176): avc: denied { getopt } for pid=4252 comm="syz.1.338" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 371.579839][ T29] audit: type=1400 audit(371.230:177): avc: denied { ioctl } for pid=4252 comm="syz.1.338" path="socket:[6737]" dev="sockfs" ino=6737 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 372.298049][ T29] audit: type=1400 audit(371.950:178): avc: denied { module_request } for pid=4260 comm="syz.1.342" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 376.285117][ T4286] serio: Serial port pts0 [ 377.180594][ T29] audit: type=1400 audit(376.840:179): avc: denied { create } for pid=4288 comm="syz.0.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 377.184058][ T29] audit: type=1400 audit(376.840:180): avc: denied { ioctl } for pid=4288 comm="syz.0.351" path="socket:[6086]" dev="sockfs" ino=6086 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 377.187096][ T29] audit: type=1400 audit(376.840:181): avc: denied { bind } for pid=4288 comm="syz.0.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 377.202791][ T29] audit: type=1400 audit(376.860:182): avc: denied { write } for pid=4288 comm="syz.0.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 382.800711][ T29] audit: type=1400 audit(382.450:183): avc: denied { execmem } for pid=4303 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 384.166212][ T4316] serio: Serial port pts0 [ 386.559084][ T4324] serio: Serial port pts1 [ 399.531808][ T29] audit: type=1400 audit(399.190:184): avc: denied { name_bind } for pid=4361 comm="syz.1.378" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 400.064362][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 400.874538][ T29] audit: type=1400 audit(400.530:185): avc: denied { read } for pid=4368 comm="syz.1.381" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 400.875669][ T29] audit: type=1400 audit(400.530:186): avc: denied { open } for pid=4368 comm="syz.1.381" path="/dev/uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 402.009724][ T4378] serio: Serial port pts0 [ 408.381762][ T29] audit: type=1400 audit(408.040:187): avc: denied { mounton } for pid=4400 comm="syz.1.393" path="/197/file0" dev="tmpfs" ino=1141 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 409.174392][ T29] audit: type=1400 audit(408.830:188): avc: denied { create } for pid=4406 comm="syz.1.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 409.182101][ T29] audit: type=1400 audit(408.830:189): avc: denied { bind } for pid=4406 comm="syz.1.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 409.182978][ T29] audit: type=1400 audit(408.840:190): avc: denied { name_bind } for pid=4406 comm="syz.1.395" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 409.183819][ T29] audit: type=1400 audit(408.840:191): avc: denied { node_bind } for pid=4406 comm="syz.1.395" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 409.191537][ T29] audit: type=1400 audit(408.850:192): avc: denied { write } for pid=4406 comm="syz.1.395" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 409.198763][ T29] audit: type=1400 audit(408.850:193): avc: denied { connect } for pid=4406 comm="syz.1.395" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 409.203928][ T29] audit: type=1400 audit(408.860:194): avc: denied { name_connect } for pid=4406 comm="syz.1.395" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 410.103795][ T29] audit: type=1400 audit(409.760:195): avc: denied { mount } for pid=4412 comm="syz.0.397" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 410.329086][ T29] audit: type=1400 audit(409.970:196): avc: denied { unmount } for pid=3279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 412.741869][ T4430] syzkaller0: entered promiscuous mode [ 412.742472][ T4430] syzkaller0: entered allmulticast mode [ 413.495024][ T4434] capability: warning: `syz.1.406' uses deprecated v2 capabilities in a way that may be insecure [ 415.799698][ T4444] serio: Serial port pts0 [ 423.077682][ T4454] serio: Serial port pts0 [ 432.446650][ T4479] serio: Serial port pts0 [ 438.110886][ T4497] serio: Serial port pts0 [ 439.656731][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 439.656833][ T29] audit: type=1400 audit(439.310:198): avc: denied { read } for pid=4507 comm="syz.1.433" dev="nsfs" ino=4026532719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 439.665567][ T29] audit: type=1400 audit(439.320:199): avc: denied { open } for pid=4507 comm="syz.1.433" path="net:[4026532719]" dev="nsfs" ino=4026532719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 439.679816][ T29] audit: type=1400 audit(439.330:200): avc: denied { ioctl } for pid=4507 comm="syz.1.433" path="socket:[7421]" dev="sockfs" ino=7421 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 439.870422][ T29] audit: type=1400 audit(439.520:201): avc: denied { sys_module } for pid=4507 comm="syz.1.433" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 440.315992][ T29] audit: type=1400 audit(439.970:202): avc: denied { read } for pid=4507 comm="syz.1.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 440.326043][ T29] audit: type=1400 audit(439.980:203): avc: denied { read } for pid=4507 comm="syz.1.433" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 440.327079][ T29] audit: type=1400 audit(439.980:204): avc: denied { open } for pid=4507 comm="syz.1.433" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 450.598837][ T29] audit: type=1400 audit(450.250:205): avc: denied { watch } for pid=4583 comm="syz.0.466" path="/226" dev="tmpfs" ino=1294 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 450.986095][ T29] audit: type=1400 audit(450.640:206): avc: denied { read } for pid=4586 comm="syz.0.467" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 450.987237][ T29] audit: type=1400 audit(450.640:207): avc: denied { open } for pid=4586 comm="syz.0.467" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 451.021256][ T29] audit: type=1400 audit(450.670:208): avc: denied { ioctl } for pid=4586 comm="syz.0.467" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 452.595041][ T29] audit: type=1400 audit(452.250:209): avc: denied { read } for pid=4600 comm="syz.1.473" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 452.597580][ T29] audit: type=1400 audit(452.250:210): avc: denied { open } for pid=4600 comm="syz.1.473" path="/dev/input/mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 458.759902][ T4625] serio: Serial port pts0 [ 478.110323][ T29] audit: type=1400 audit(477.760:211): avc: denied { prog_run } for pid=4683 comm="syz.0.505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 480.984467][ T4709] serio: Serial port pts0 [ 481.352757][ T29] audit: type=1400 audit(481.010:212): avc: denied { map } for pid=4711 comm="syz.1.518" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 481.354271][ T29] audit: type=1400 audit(481.010:213): avc: denied { execute } for pid=4711 comm="syz.1.518" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 481.376667][ T29] audit: type=1400 audit(481.020:214): avc: denied { map } for pid=4711 comm="syz.1.518" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7798 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 481.377917][ T29] audit: type=1400 audit(481.030:215): avc: denied { read write } for pid=4711 comm="syz.1.518" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7798 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 484.675937][ T29] audit: type=1400 audit(484.330:216): avc: denied { ioctl } for pid=4729 comm="syz.1.524" path="socket:[7825]" dev="sockfs" ino=7825 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 492.763790][ T4759] serio: Serial port pts1 [ 498.285758][ T4777] serio: Serial port pts0 [ 505.736489][ T4789] serio: Serial port pts0 [ 513.937611][ T4815] process 'syz.1.559' launched '/dev/fd/4/./file1' with NULL argv: empty string added [ 513.940220][ T29] audit: type=1400 audit(513.590:217): avc: denied { execute } for pid=4814 comm="syz.1.559" name="file1" dev="tmpfs" ino=1730 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 513.950430][ T29] audit: type=1400 audit(513.610:218): avc: denied { execute_no_trans } for pid=4814 comm="syz.1.559" path="/file1" dev="tmpfs" ino=1730 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 525.379551][ T4872] serio: Serial port pts0 [ 531.342607][ T4877] serio: Serial port pts0 [ 532.310744][ T4884] serio: Serial port pts1 [ 542.287741][ T4918] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 542.302050][ T4918] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 542.317486][ T29] audit: type=1400 audit(541.920:219): avc: denied { connect } for pid=4917 comm="syz.1.602" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 542.320346][ T29] audit: type=1400 audit(541.930:220): avc: denied { write } for pid=4917 comm="syz.1.602" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 542.321102][ T29] audit: type=1400 audit(541.940:221): avc: denied { ioctl } for pid=4917 comm="syz.1.602" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 548.587627][ T29] audit: type=1400 audit(548.240:222): avc: denied { create } for pid=4946 comm="syz.0.615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 548.982529][ T4949] serio: Serial port pts0 [ 560.816806][ T5005] serio: Serial port pts0 [ 561.969463][ T5012] serio: Serial port pts1 [ 567.876654][ T5021] serio: Serial port pts0 [ 570.380806][ C0] hrtimer: interrupt took 1609408 ns [ 571.421244][ T29] audit: type=1400 audit(571.080:223): avc: denied { getopt } for pid=5024 comm="syz.1.645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 575.128798][ T5054] serio: Serial port pts1 [ 575.139639][ T5053] serio: Serial port pts0 [ 583.931520][ T29] audit: type=1400 audit(583.590:224): avc: denied { block_suspend } for pid=5080 comm="syz.0.668" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 590.743404][ T5117] serio: Serial port pts0 [ 594.773977][ T5142] serio: Serial port pts1 [ 603.003662][ T5162] serio: Serial port pts1 [ 605.944236][ T29] audit: type=1400 audit(605.600:225): avc: denied { setopt } for pid=5166 comm="syz.1.701" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 606.013069][ T5167] pimreg: entered allmulticast mode [ 609.409443][ T5179] serio: Serial port pts0 [ 618.743124][ T29] audit: type=1400 audit(618.400:226): avc: denied { mounton } for pid=5208 comm="syz.0.718" path="/349/file0" dev="tmpfs" ino=2015 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 619.885289][ T5218] serio: Serial port pts0 [ 623.262760][ T5243] serio: Serial port pts1 [ 625.760428][ T5247] serio: Serial port pts0 [ 634.356719][ T5283] serio: Serial port pts0 [ 636.721257][ T29] audit: type=1400 audit(636.380:227): avc: denied { read } for pid=5295 comm="syz.0.753" path="socket:[10492]" dev="sockfs" ino=10492 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 646.327616][ T29] audit: type=1400 audit(645.980:228): avc: denied { lock } for pid=5358 comm="syz.1.780" path="socket:[10627]" dev="sockfs" ino=10627 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 646.679308][ T29] audit: type=1400 audit(646.330:229): avc: denied { create } for pid=5362 comm="syz.1.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 646.717904][ T29] audit: type=1400 audit(646.370:230): avc: denied { setopt } for pid=5362 comm="syz.1.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 646.731244][ T29] audit: type=1400 audit(646.380:231): avc: denied { connect } for pid=5362 comm="syz.1.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 646.741826][ T5363] serio: Serial port pts0 [ 647.782124][ T29] audit: type=1400 audit(647.440:232): avc: denied { ioctl } for pid=5362 comm="syz.1.782" path="socket:[10636]" dev="sockfs" ino=10636 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 648.322683][ T29] audit: type=1400 audit(647.970:233): avc: denied { write } for pid=5362 comm="syz.1.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 655.866253][ T5407] serio: Serial port pts0 [ 657.866228][ T29] audit: type=1400 audit(657.520:234): avc: denied { watch_reads } for pid=5417 comm="syz.1.802" path="/413" dev="tmpfs" ino=2386 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 657.882156][ T29] audit: type=1400 audit(657.540:235): avc: denied { create } for pid=5417 comm="syz.1.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 657.889174][ T29] audit: type=1400 audit(657.540:236): avc: denied { connect } for pid=5417 comm="syz.1.802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 660.351717][ T5429] serio: Serial port pts1 [ 665.158875][ T5438] serio: Serial port pts0 [ 670.284185][ T5460] serio: Serial port pts1 [ 677.179474][ T5491] serio: Serial port pts0 [ 679.323607][ T29] audit: type=1400 audit(678.980:237): avc: denied { ioctl } for pid=5502 comm="syz.0.835" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 683.136971][ T29] audit: type=1400 audit(682.790:238): avc: denied { setopt } for pid=5510 comm="syz.0.838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 683.171710][ T29] audit: type=1400 audit(682.830:239): avc: denied { read } for pid=5510 comm="syz.0.838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 686.309186][ T5516] serio: Serial port pts1 [ 695.818015][ T29] audit: type=1400 audit(695.470:240): avc: denied { write } for pid=5544 comm="syz.1.852" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 702.055203][ T29] audit: type=1400 audit(701.710:241): avc: denied { mount } for pid=5565 comm="syz.0.862" name="/" dev="autofs" ino=11411 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 702.079003][ T29] audit: type=1400 audit(701.730:242): avc: denied { ioctl } for pid=5565 comm="syz.0.862" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 702.208943][ T29] audit: type=1400 audit(701.850:243): avc: denied { unmount } for pid=3279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 702.515670][ T5571] serio: Serial port pts0 [ 702.522897][ T5572] serio: Serial port pts1 [ 710.984010][ T5594] : renamed from pim6reg1 [ 720.779386][ T5647] serio: Serial port pts0 [ 729.554919][ T29] audit: type=1400 audit(729.210:244): avc: denied { shutdown } for pid=5667 comm="syz.1.903" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 731.586647][ T5683] serio: Serial port pts1 [ 737.115664][ T29] audit: type=1400 audit(736.770:245): avc: denied { bind } for pid=5692 comm="syz.0.913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 737.116684][ T29] audit: type=1400 audit(736.770:246): avc: denied { name_bind } for pid=5692 comm="syz.0.913" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 737.117565][ T29] audit: type=1400 audit(736.770:247): avc: denied { node_bind } for pid=5692 comm="syz.0.913" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 745.262762][ T5751] Driver unsupported XDP return value 0 on prog (id 4) dev N/A, expect packet loss! [ 746.479744][ T5756] syzkaller0: entered promiscuous mode [ 746.480340][ T5756] syzkaller0: entered allmulticast mode [ 747.985181][ T5760] serio: Serial port pts0 [ 753.882845][ T29] audit: type=1400 audit(753.530:248): avc: denied { create } for pid=5765 comm="syz.0.942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 753.887348][ T29] audit: type=1400 audit(753.540:249): avc: denied { ioctl } for pid=5765 comm="syz.0.942" path="socket:[12468]" dev="sockfs" ino=12468 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 753.892448][ T29] audit: type=1400 audit(753.550:250): avc: denied { ioctl } for pid=5765 comm="syz.0.942" path="socket:[11698]" dev="sockfs" ino=11698 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 762.918743][ T29] audit: type=1400 audit(762.570:251): avc: denied { search } for pid=5768 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 763.024117][ T29] audit: type=1400 audit(762.670:252): avc: denied { read } for pid=5773 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 763.027748][ T29] audit: type=1400 audit(762.680:253): avc: denied { open } for pid=5773 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 763.052843][ T29] audit: type=1400 audit(762.700:254): avc: denied { getattr } for pid=5773 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 763.405694][ T29] audit: type=1400 audit(763.050:255): avc: denied { write } for pid=5768 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=839 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 763.406733][ T29] audit: type=1400 audit(763.050:256): avc: denied { add_name } for pid=5768 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 763.407596][ T29] audit: type=1400 audit(763.050:257): avc: denied { create } for pid=5768 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 763.421852][ T29] audit: type=1400 audit(763.050:258): avc: denied { write open } for pid=5768 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1101 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 763.439150][ T29] audit: type=1400 audit(763.050:259): avc: denied { append } for pid=5768 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1101 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 763.470031][ T29] audit: type=1400 audit(763.120:260): avc: denied { getattr } for pid=5768 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 764.041902][ T5778] serio: Serial port pts0 [ 774.210893][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 774.211017][ T29] audit: type=1400 audit(773.850:269): avc: denied { getopt } for pid=5822 comm="syz.0.963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 774.223277][ T5823] 8021q: VLANs not supported on ipvlan0 [ 774.232196][ T29] audit: type=1400 audit(773.880:270): avc: denied { ioctl } for pid=5822 comm="syz.0.963" path="socket:[12614]" dev="sockfs" ino=12614 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 775.716023][ T5832] serio: Serial port pts1 [ 779.389732][ T5836] Zero length message leads to an empty skb [ 779.722742][ T5840] serio: Serial port pts0 [ 785.630322][ T5845] serio: Serial port pts0 [ 795.339461][ T5877] serio: Serial port pts0 [ 798.984316][ T5896] serio: Serial port pts1 [ 809.916480][ T29] audit: type=1400 audit(809.570:271): avc: denied { write } for pid=5914 comm="syz.1.996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 813.659807][ T5947] serio: Serial port pts0 [ 822.112194][ T5982] serio: Serial port pts0 [ 826.081900][ T29] audit: type=1400 audit(825.740:272): avc: denied { read } for pid=5989 comm="syz.0.1025" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 826.084429][ T29] audit: type=1400 audit(825.740:273): avc: denied { open } for pid=5989 comm="syz.0.1025" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 826.112573][ T29] audit: type=1400 audit(825.770:274): avc: denied { ioctl } for pid=5989 comm="syz.0.1025" path="socket:[12022]" dev="sockfs" ino=12022 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 828.022127][ T6001] serio: Serial port pts1 [ 841.247548][ T6032] serio: Serial port pts0 [ 845.124259][ T6047] serio: Serial port pts1 [ 847.119640][ T6051] serio: Serial port pts0 [ 851.905118][ T6059] serio: Serial port pts1 [ 860.684252][ T6096] serio: Serial port pts0 [ 867.755374][ T6125] serio: Serial port pts1 [ 875.253321][ T29] audit: type=1400 audit(874.910:275): avc: denied { mount } for pid=6138 comm="syz.1.1084" name="/" dev="ramfs" ino=13171 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 876.506175][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 876.915895][ T6153] serio: Serial port pts0 [ 878.297432][ T6161] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 878.311071][ T6161] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 883.804056][ T29] audit: type=1400 audit(883.450:276): avc: denied { setattr } for pid=6193 comm="syz.1.1109" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 886.146451][ T6215] serio: Serial port pts0 [ 886.776317][ T6219] serio: Serial port pts1 [ 892.811221][ T29] audit: type=1400 audit(892.470:277): avc: denied { ioctl } for pid=6231 comm="syz.1.1124" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=13499 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 893.351667][ T29] audit: type=1400 audit(893.010:278): avc: denied { map } for pid=6231 comm="syz.1.1124" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 893.352996][ T29] audit: type=1400 audit(893.010:279): avc: denied { execute } for pid=6231 comm="syz.1.1124" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 896.880350][ T6250] serio: Serial port pts0 [ 898.577423][ T6258] serio: Serial port pts1 [ 906.265137][ T29] audit: type=1400 audit(905.920:280): avc: denied { setopt } for pid=6284 comm="syz.0.1143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 907.016897][ T6294] serio: Serial port pts0 [ 908.302336][ T29] audit: type=1400 audit(907.960:281): avc: denied { read } for pid=6297 comm="syz.1.1147" path="socket:[13612]" dev="sockfs" ino=13612 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 913.300832][ T6315] serio: Serial port pts0 [ 914.391507][ T6321] serio: Serial port pts1 [ 928.966862][ T6377] serio: Serial port pts0 [ 932.386272][ T6396] serio: Serial port pts1 [ 935.891976][ T29] audit: type=1400 audit(935.550:282): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 950.475351][ T6475] serio: Serial port pts0 [ 962.952650][ T29] audit: type=1400 audit(962.600:283): avc: denied { mac_admin } for pid=6501 comm="syz.1.1231" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 962.954157][ T6502] SELinux: Context system_u:object_r:dpkg_var_lib_t:s0 is not valid (left unmapped). [ 962.956787][ T29] audit: type=1400 audit(962.610:284): avc: denied { relabelto } for pid=6501 comm="syz.1.1231" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dpkg_var_lib_t:s0" [ 962.980832][ T29] audit: type=1400 audit(962.620:285): avc: denied { associate } for pid=6501 comm="syz.1.1231" name="event0" dev="devtmpfs" ino=747 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:dpkg_var_lib_t:s0" [ 963.655888][ T6506] serio: Serial port pts1 [ 969.129202][ T29] audit: type=1400 audit(968.780:286): avc: denied { nlmsg_write } for pid=6534 comm="syz.0.1246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 970.728859][ T6549] serio: Serial port pts0 [ 971.696721][ T29] audit: type=1400 audit(971.350:287): avc: denied { read write } for pid=6552 comm="syz.0.1255" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 971.701930][ T29] audit: type=1400 audit(971.350:288): avc: denied { open } for pid=6552 comm="syz.0.1255" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 977.650594][ T6579] serio: Serial port pts0 [ 977.997532][ T6583] serio: Serial port pts1 [ 993.199505][ T6633] serio: Serial port pts0 [ 998.716734][ T6663] serio: Serial port pts1 [ 1008.768638][ T6668] serio: Serial port pts0 [ 1014.039621][ T6673] serio: Serial port pts1 [ 1014.628887][ T6676] serio: Serial port pts0 [ 1024.841515][ T9] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 1025.086393][ T9] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 1025.087771][ T9] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1025.117447][ T9] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1025.119368][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1025.119882][ T9] usb 1-1: Product: ᐁ [ 1025.120485][ T9] usb 1-1: SerialNumber: э [ 1025.610015][ T9] usb 1-1: 0:2 : does not exist [ 1025.841127][ T9] usb 1-1: USB disconnect, device number 2 [ 1026.526690][ T6700] udevd[6700]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 1026.852667][ T6706] serio: Serial port pts0 [ 1032.379514][ T6715] serio: Serial port pts1 [ 1033.509637][ T6723] serio: Serial port pts0 [ 1039.287030][ T6731] serio: Serial port pts0 [ 1040.085137][ T6738] serio: Serial port pts1 [ 1047.482697][ T6756] serio: Serial port pts0 [ 1056.792069][ T6796] serio: Serial port pts0 [ 1058.659970][ T6809] serio: Serial port pts1 [ 1062.693719][ T6814] serio: Serial port pts0 [ 1064.640896][ T6819] serio: Serial port pts1 [ 1078.592126][ T6872] cgroup: fork rejected by pids controller in /syz0 [ 1078.599083][ T29] audit: type=1400 audit(1078.240:289): avc: denied { sqpoll } for pid=6871 comm="syz.0.1373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1079.567496][ T29] audit: type=1400 audit(1079.220:290): avc: denied { execute } for pid=6881 comm="syz-executor" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1079.574425][ T29] audit: type=1400 audit(1079.230:291): avc: denied { execute_no_trans } for pid=6881 comm="syz-executor" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1079.738968][ T29] audit: type=1400 audit(1079.380:292): avc: denied { mounton } for pid=6882 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1079.952689][ T27] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1080.157039][ T27] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1080.341052][ T27] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1080.594557][ T27] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1081.313927][ T29] audit: type=1400 audit(1080.970:293): avc: denied { read } for pid=3130 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1084.464164][ T27] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1084.527048][ T27] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1084.585742][ T27] bond0 (unregistering): Released all slaves [ 1084.922087][ T27] hsr_slave_0: left promiscuous mode [ 1084.965146][ T27] hsr_slave_1: left promiscuous mode [ 1085.185484][ T27] veth1_macvtap: left promiscuous mode [ 1085.187260][ T27] veth0_macvtap: left promiscuous mode [ 1085.190383][ T27] veth1_vlan: left promiscuous mode [ 1085.193093][ T27] veth0_vlan: left promiscuous mode [ 1088.668750][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 1097.854538][ T6882] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1097.907952][ T6882] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1099.814668][ T29] audit: type=1400 audit(1099.470:294): avc: denied { sys_chroot } for pid=6977 comm="dhcpcd" capability=18 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 1099.827002][ T29] audit: type=1400 audit(1099.470:295): avc: denied { setgid } for pid=6977 comm="dhcpcd" capability=6 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 1099.827959][ T29] audit: type=1400 audit(1099.480:296): avc: denied { setuid } for pid=6977 comm="dhcpcd" capability=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 1099.834217][ T29] audit: type=1400 audit(1099.480:297): avc: denied { setrlimit } for pid=6977 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=process permissive=1 [ 1101.423106][ T6882] hsr_slave_0: entered promiscuous mode [ 1101.480740][ T6882] hsr_slave_1: entered promiscuous mode [ 1105.002877][ T6882] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1115.195764][ T6882] veth0_vlan: entered promiscuous mode [ 1115.285785][ T6882] veth1_vlan: entered promiscuous mode [ 1115.575057][ T6882] veth0_macvtap: entered promiscuous mode [ 1115.623067][ T6882] veth1_macvtap: entered promiscuous mode [ 1116.359319][ T29] audit: type=1400 audit(1116.010:298): avc: denied { mounton } for pid=6882 comm="syz-executor" path="/syzkaller.Aw7pmd/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1116.380061][ T29] audit: type=1400 audit(1116.030:299): avc: denied { mount } for pid=6882 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1116.419530][ T29] audit: type=1400 audit(1116.060:300): avc: denied { mounton } for pid=6882 comm="syz-executor" path="/syzkaller.Aw7pmd/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1116.432932][ T29] audit: type=1400 audit(1116.080:301): avc: denied { mounton } for pid=6882 comm="syz-executor" path="/syzkaller.Aw7pmd/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=16782 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1116.473815][ T29] audit: type=1400 audit(1116.130:302): avc: denied { unmount } for pid=6882 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1116.500900][ T29] audit: type=1400 audit(1116.160:303): avc: denied { mounton } for pid=6882 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1116.516674][ T29] audit: type=1400 audit(1116.170:304): avc: denied { mount } for pid=6882 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1116.536402][ T29] audit: type=1400 audit(1116.190:305): avc: denied { mounton } for pid=6882 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1132.268976][ T7170] serio: Serial port pts0 [ 1138.233480][ T7204] serio: Serial port pts0 [ 1138.309609][ T7206] serio: Serial port pts1 [ 1144.877665][ T7217] serio: Serial port pts1 [ 1154.027076][ T7226] serio: Serial port pts0 [ 1162.499782][ T7252] serio: Serial port pts0 [ 1180.889359][ T7316] serio: Serial port pts0 [ 1181.839605][ T7321] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1181.847202][ T7321] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1183.012386][ T7328] serio: Serial port pts1 [ 1199.301814][ T7381] serio: Serial port pts0 [ 1207.489903][ T29] audit: type=1400 audit(1207.140:306): avc: denied { watch watch_reads } for pid=7432 comm="syz.1.1540" path="/proc/2031" dev="proc" ino=17348 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1208.164150][ T7439] serio: Serial port pts0 [ 1214.327523][ T7458] serio: Serial port pts0 [ 1234.396536][ T7539] serio: Serial port pts0 [ 1241.963156][ T7590] serio: Serial port pts0 [ 1247.033151][ T29] audit: type=1400 audit(1246.690:307): avc: denied { write } for pid=7607 comm="syz.1.1614" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1249.269265][ T7626] serio: Serial port pts0 [ 1254.275094][ T7642] bond0: (slave bond_slave_0): Releasing backup interface [ 1254.402066][ T7642] bond0: (slave bond_slave_1): Releasing backup interface [ 1254.626579][ T7642] netlink: 'syz.1.1628': attribute type 10 has an invalid length. [ 1259.094356][ T7676] serio: Serial port pts0 [ 1261.131813][ T7686] serio: Serial port pts1 [ 1265.089684][ T7692] serio: Serial port pts0 [ 1271.654317][ T29] audit: type=1400 audit(1271.310:308): avc: denied { unmount } for pid=6882 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1271.933444][ T7703] serio: Serial port pts0 [ 1276.577374][ T7708] serio: Serial port pts1 [ 1292.850511][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1301.553957][ T7816] serio: Serial port pts0 [ 1302.879121][ T7828] serio: Serial port pts1 [ 1319.602006][ T7846] serio: Serial port pts0 [ 1330.559859][ T7896] serio: Serial port pts1 [ 1334.951638][ T29] audit: type=1400 audit(1334.610:309): avc: denied { mounton } for pid=7901 comm="syz.0.1732" path="/proc/342/task" dev="proc" ino=19572 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1342.638987][ T7933] serio: Serial port pts0 [ 1353.106572][ T29] audit: type=1400 audit(1352.760:310): avc: denied { write } for pid=7980 comm="syz.1.1765" path="socket:[19374]" dev="sockfs" ino=19374 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1353.126329][ T29] audit: type=1400 audit(1352.780:311): avc: denied { read } for pid=7980 comm="syz.1.1765" laddr=::1 lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1363.546753][ T8035] serio: Serial port pts0 [ 1364.889463][ T8039] serio: Serial port pts1 [ 1374.504621][ T8069] serio: Serial port pts0 [ 1374.603109][ T8071] serio: Serial port pts1 [ 1386.314968][ T8134] serio: Serial port pts0 [ 1390.740012][ T8150] serio: Serial port pts1 [ 1403.810241][ T8193] serio: Serial port pts0 [ 1407.523896][ T29] audit: type=1400 audit(1407.180:312): avc: denied { connect } for pid=8202 comm="syz.1.1851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1408.061618][ T8204] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1851'. [ 1410.090761][ T8211] serio: Serial port pts0 [ 1414.219414][ T8230] serio: Serial port pts1 [ 1421.151790][ T8263] serio: Serial port pts0 [ 1432.884841][ T8278] serio: Serial port pts1 [ 1445.034739][ T29] audit: type=1400 audit(1444.690:313): avc: denied { create } for pid=8323 comm="syz.1.1898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1445.059463][ T29] audit: type=1400 audit(1444.700:314): avc: denied { ioctl } for pid=8323 comm="syz.1.1898" path="socket:[20240]" dev="sockfs" ino=20240 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1445.105265][ T29] audit: type=1400 audit(1444.760:315): avc: denied { map } for pid=8323 comm="syz.1.1898" path="socket:[20238]" dev="sockfs" ino=20238 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1449.980930][ T8343] serio: Serial port pts0 [ 1452.674860][ T8357] serio: Serial port pts1 [ 1465.298907][ T8384] serio: Serial port pts0 [ 1477.336128][ T8416] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1930'. [ 1477.342353][ T8416] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1930'. [ 1482.333101][ T8437] serio: Serial port pts0 [ 1484.745937][ T29] audit: type=1400 audit(1484.400:316): avc: denied { write } for pid=8441 comm="syz.1.1940" path="socket:[21279]" dev="sockfs" ino=21279 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1487.012233][ T8463] serio: Serial port pts0 [ 1487.846270][ T29] audit: type=1400 audit(1487.500:317): avc: denied { create } for pid=8465 comm="syz.1.1948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1487.897529][ T29] audit: type=1400 audit(1487.550:318): avc: denied { write } for pid=8465 comm="syz.1.1948" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1488.564883][ T8473] serio: Serial port pts1 [ 1507.099625][ T29] audit: type=1400 audit(1506.750:319): avc: denied { setopt } for pid=8551 comm="syz.1.1973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1507.353636][ T29] audit: type=1400 audit(1507.010:320): avc: denied { bind } for pid=8551 comm="syz.1.1973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1507.363220][ T29] audit: type=1400 audit(1507.020:321): avc: denied { write } for pid=8551 comm="syz.1.1973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1508.386207][ T8560] serio: Serial port pts1 [ 1508.698012][ T8562] serio: Serial port pts0 [ 1516.924657][ T29] audit: type=1400 audit(1516.580:322): avc: denied { create } for pid=8588 comm="syz.0.1985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1518.730178][ T8598] serio: Serial port pts1 [ 1526.773086][ T29] audit: type=1400 audit(1526.430:323): avc: denied { mounton } for pid=8611 comm="syz.1.1993" path="/1053/file0" dev="tmpfs" ino=6099 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 1537.010210][ T8634] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2000'. [ 1537.811094][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 1546.703862][ T8695] block nbd0: NBD_DISCONNECT [ 1546.740528][ T8695] block nbd0: Disconnected due to user request. [ 1546.742634][ T8695] block nbd0: shutting down sockets [ 1547.126181][ T29] audit: type=1400 audit(1546.780:324): avc: denied { getopt } for pid=8697 comm="syz.0.2023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1554.429793][ T8738] serio: Serial port pts0 [ 1559.647368][ T29] audit: type=1400 audit(1559.300:325): avc: denied { remount } for pid=8756 comm="syz.1.2044" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1563.417623][ T29] audit: type=1400 audit(1563.070:326): avc: denied { open } for pid=8767 comm="syz.1.2048" path="/dev/ttyq6" dev="devtmpfs" ino=373 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1565.720155][ T8776] serio: Serial port pts1 [ 1573.389091][ T29] audit: type=1400 audit(1573.040:327): avc: denied { write } for pid=8793 comm="syz.0.2057" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1573.393914][ T29] audit: type=1400 audit(1573.050:328): avc: denied { remove_name } for pid=8793 comm="syz.0.2057" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1573.397445][ T29] audit: type=1400 audit(1573.050:329): avc: denied { unlink } for pid=8793 comm="syz.0.2057" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1573.416808][ T29] audit: type=1400 audit(1573.070:330): avc: denied { write } for pid=3085 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1573.424975][ T29] audit: type=1400 audit(1573.080:331): avc: denied { remove_name } for pid=3085 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1573.427293][ T29] audit: type=1400 audit(1573.080:332): avc: denied { rename } for pid=3085 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1573.437027][ T29] audit: type=1400 audit(1573.090:333): avc: denied { add_name } for pid=3085 comm="syslogd" name="messages.0" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1573.447370][ T29] audit: type=1400 audit(1573.100:334): avc: denied { create } for pid=3085 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1574.120747][ T8798] serio: Serial port pts0 [ 1583.101333][ T29] audit: type=1400 audit(1582.760:335): avc: denied { create } for pid=8835 comm="syz.1.2073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1589.014612][ T29] audit: type=1400 audit(1588.670:336): avc: denied { read } for pid=8869 comm="syz.1.2086" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1589.030151][ T29] audit: type=1400 audit(1588.680:337): avc: denied { open } for pid=8869 comm="syz.1.2086" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1591.880569][ T8894] serio: Serial port pts0 [ 1594.039104][ C0] vkms_vblank_simulate: vblank timer overrun [ 1597.795321][ T8907] serio: Serial port pts0 [ 1600.111368][ T29] audit: type=1400 audit(1599.770:338): avc: denied { create } for pid=8911 comm="syz.0.2100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1600.141641][ T29] audit: type=1400 audit(1599.800:339): avc: denied { setopt } for pid=8911 comm="syz.0.2100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1606.423277][ T29] audit: type=1400 audit(1606.080:340): avc: denied { getopt } for pid=8932 comm="syz.0.2107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1606.823138][ T8935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8935 comm=syz.0.2108 [ 1606.838012][ T29] audit: type=1400 audit(1606.490:341): avc: denied { write } for pid=8934 comm="syz.0.2108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1606.842912][ T29] audit: type=1400 audit(1606.500:342): avc: denied { nlmsg_write } for pid=8934 comm="syz.0.2108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1613.399491][ T8956] serio: Serial port pts0 [ 1614.970118][ T8966] serio: Serial port pts1 [ 1619.164750][ T29] audit: type=1400 audit(1618.820:343): avc: denied { listen } for pid=8979 comm="syz.0.2124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1619.172779][ T29] audit: type=1400 audit(1618.830:344): avc: denied { accept } for pid=8979 comm="syz.0.2124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1619.776188][ T29] audit: type=1400 audit(1619.430:345): avc: denied { accept } for pid=8979 comm="syz.0.2124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1621.802007][ T8988] serio: Serial port pts0 [ 1631.235417][ T29] audit: type=1400 audit(1630.890:346): avc: denied { read } for pid=8995 comm="syz.1.2129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1632.917288][ T29] audit: type=1400 audit(1632.570:347): avc: denied { write } for pid=9002 comm="syz.1.2132" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1638.062603][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1640.581668][ T29] audit: type=1400 audit(1640.230:348): avc: denied { create } for pid=9041 comm="syz.1.2147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1640.624741][ T29] audit: type=1400 audit(1640.280:349): avc: denied { write } for pid=9041 comm="syz.1.2147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1641.213846][ T29] audit: type=1400 audit(1640.870:350): avc: denied { read } for pid=9051 comm="syz.1.2152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1642.215831][ T29] audit: type=1400 audit(1641.870:351): avc: denied { bind } for pid=9060 comm="syz.0.2156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1643.060923][ T29] audit: type=1400 audit(1642.710:352): avc: denied { setattr } for pid=9065 comm="syz.0.2158" name="tty20" dev="devtmpfs" ino=39 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 1652.080461][ T9112] serio: Serial port pts0 [ 1655.529542][ T9120] serio: Serial port pts1 [ 1672.646861][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1677.009814][ T9176] serio: Serial port pts0 [ 1680.616102][ T29] audit: type=1400 audit(1680.270:353): avc: denied { create } for pid=9189 comm="syz.0.2202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1680.700299][ T29] audit: type=1400 audit(1680.350:354): avc: denied { write } for pid=9189 comm="syz.0.2202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1682.360789][ T9198] serio: Serial port pts1 [ 1700.004699][ T9233] syz.1.2217 uses obsolete (PF_INET,SOCK_PACKET) [ 1704.043020][ T9252] serio: Serial port pts0 [ 1716.001143][ T9293] serio: Serial port pts1 [ 1718.196180][ T9300] serio: Serial port pts1 [ 1721.571660][ T9316] serio: Serial port pts0 [ 1724.251870][ T29] audit: type=1400 audit(1723.900:355): avc: denied { create } for pid=9330 comm="syz.1.2249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1724.271059][ T29] audit: type=1400 audit(1723.920:356): avc: denied { write } for pid=9330 comm="syz.1.2249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1736.113777][ T9363] can-isotp: isotp_sendmsg: can_send_ret -ENETDOWN [ 1738.630650][ T9380] serio: Serial port pts0 [ 1746.979276][ T9486] serio: Serial port pts1 [ 1754.293472][ T9515] serio: Serial port pts0 [ 1768.072787][ T9567] serio: Serial port pts1 [ 1773.920839][ T9587] serio: Serial port pts0 [ 1786.451425][ T9598] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9598 comm=syz.1.2308 [ 1793.093590][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1793.571424][ T9633] serio: Serial port pts0 [ 1801.339412][ T9652] serio: Serial port pts1 [ 1805.157270][ T9663] serio: Serial port pts1 [ 1811.095617][ T29] audit: type=1400 audit(1810.750:357): avc: denied { map } for pid=9672 comm="syz.1.2335" path="socket:[24310]" dev="sockfs" ino=24310 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1811.712025][ T29] audit: type=1400 audit(1811.370:358): avc: denied { bind } for pid=9675 comm="syz.1.2336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1814.649510][ T9689] serio: Serial port pts0 [ 1823.923752][ T9709] serio: Serial port pts1 [ 1829.954749][ T9714] serio: Serial port pts0 [ 1841.730869][ T9731] serio: Serial port pts1 [ 1847.193348][ T29] audit: type=1400 audit(1846.850:359): avc: denied { setattr } for pid=9742 comm="syz.1.2357" name="NETLINK" dev="sockfs" ino=24413 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1847.199352][ T29] audit: type=1400 audit(1846.850:360): avc: denied { setopt } for pid=9742 comm="syz.1.2357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1847.212061][ T29] audit: type=1400 audit(1846.870:361): avc: denied { ioctl } for pid=9742 comm="syz.1.2357" path="socket:[24413]" dev="sockfs" ino=24413 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1850.570222][ T9768] serio: Serial port pts0 [ 1853.746287][ T9783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9783 comm=syz.0.2372 [ 1858.200295][ T9794] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=9794 comm=syz.0.2376 [ 1858.242439][ T9794] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=9794 comm=syz.0.2376 [ 1861.840187][ T9805] input: syz0 as /devices/virtual/input/input1 [ 1868.047168][ T9828] serio: Serial port pts0 [ 1871.539356][ T9842] serio: Serial port pts1 [ 1876.335195][ T9855] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2396'. [ 1877.171772][ T9859] serio: Serial port pts1 [ 1887.174618][ T29] audit: type=1400 audit(1886.830:362): avc: denied { ioctl } for pid=9881 comm="syz.1.2406" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1894.479286][ T9924] serio: Serial port pts0 [ 1895.589891][ T9931] serio: Serial port pts1 [ 1904.521391][ T9947] serio: Serial port pts0 [ 1928.010600][T10022] serio: Serial port pts0 [ 1936.296748][T10029] serio: Serial port pts1 [ 1940.801688][T10047] serio: Serial port pts1 [ 1947.040470][T10066] serio: Serial port pts0 [ 1950.135548][T10074] serio: Serial port pts0 [ 1954.719170][T10088] serio: Serial port pts0 [ 1958.137505][T10109] serio: Serial port pts0 [ 1959.557795][ T29] audit: type=1400 audit(1959.210:363): avc: denied { read } for pid=10118 comm="syz.0.2483" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1959.562255][ T29] audit: type=1400 audit(1959.220:364): avc: denied { open } for pid=10118 comm="syz.0.2483" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1966.656410][T10138] serio: Serial port pts1 [ 1978.862698][ T29] audit: type=1400 audit(1978.520:365): avc: denied { append } for pid=10164 comm="syz.1.2499" name="iommu" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1985.080775][ T29] audit: type=1400 audit(1984.730:366): avc: denied { ioctl } for pid=10186 comm="syz.1.2507" path="socket:[26126]" dev="sockfs" ino=26126 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1994.121045][ T29] audit: type=1400 audit(1993.780:367): avc: denied { getopt } for pid=10221 comm="syz.1.2519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2000.784735][T10255] serio: Serial port pts0 [ 2004.079840][ T29] audit: type=1400 audit(2003.730:368): avc: denied { create } for pid=10266 comm="syz.1.2535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2007.136182][T10287] serio: Serial port pts0 [ 2025.369148][T10361] serio: Serial port pts0 [ 2034.350289][ T29] audit: type=1400 audit(2034.010:369): avc: denied { read } for pid=10386 comm="syz.0.2578" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2034.352946][ T29] audit: type=1400 audit(2034.010:370): avc: denied { open } for pid=10386 comm="syz.0.2578" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2040.999215][T10409] serio: Serial port pts0 [ 2052.413972][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2057.009119][ T29] audit: type=1400 audit(2056.630:371): avc: granted { setsecparam } for pid=10458 comm="syz.0.2601" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 2060.990431][T10489] serio: Serial port pts0 [ 2070.529092][T10530] serio: Serial port pts1 [ 2078.116663][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2079.819073][T10548] serio: Serial port pts0 [ 2092.801637][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2093.474339][T10577] serio: Serial port pts1 [ 2097.354472][T10598] serio: Serial port pts0 [ 2098.991419][ T29] audit: type=1400 audit(2098.640:372): avc: denied { checkpoint_restore } for pid=10596 comm="syz.1.2650" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2100.244404][T10612] serio: Serial port pts1 [ 2101.619731][ T29] audit: type=1400 audit(2101.270:373): avc: denied { mount } for pid=10619 comm="syz.1.2656" name="/" dev="hugetlbfs" ino=27906 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 2115.699794][T10676] serio: Serial port pts0 [ 2119.440095][T10690] serio: Serial port pts1 [ 2134.421172][T10706] serio: Serial port pts0 [ 2135.650676][T10714] serio: Serial port pts1 [ 2169.877539][T10900] serio: Serial port pts0 [ 2193.353955][T10988] serio: Serial port pts0 [ 2206.733617][T11020] serio: Serial port pts1 [ 2209.072474][ T29] audit: type=1400 audit(2208.730:374): avc: denied { create } for pid=11025 comm="syz.0.2764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 2216.220842][T11043] serio: Serial port pts0 [ 2223.662434][T11052] serio: Serial port pts1 [ 2232.104906][ T29] audit: type=1400 audit(2231.760:375): avc: denied { ioctl } for pid=11056 comm="syz.0.2773" path="socket:[29358]" dev="sockfs" ino=29358 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2232.630510][T11060] serio: Serial port pts0 [ 2241.539146][T11079] serio: Serial port pts0 [ 2245.082512][T10801] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2245.447071][T10801] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2245.760157][T10801] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2246.023901][T10801] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2250.252689][T10801] bond0 (unregistering): Released all slaves [ 2250.722815][T10801] hsr_slave_0: left promiscuous mode [ 2250.761188][T10801] hsr_slave_1: left promiscuous mode [ 2250.889275][T10801] veth1_macvtap: left promiscuous mode [ 2250.890181][T10801] veth0_macvtap: left promiscuous mode [ 2250.892590][T10801] veth1_vlan: left promiscuous mode [ 2250.893209][T10801] veth0_vlan: left promiscuous mode [ 2252.121873][T10801] pimreg (unregistering): left allmulticast mode [ 2263.023268][T11095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2263.056835][T11095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2266.953953][T11095] hsr_slave_0: entered promiscuous mode [ 2267.021377][T11095] hsr_slave_1: entered promiscuous mode [ 2267.060954][T11095] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2267.061608][T11095] Cannot create hsr debugfs directory [ 2272.022624][T11095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2282.668016][T11095] veth0_vlan: entered promiscuous mode [ 2282.853706][T11095] veth1_vlan: entered promiscuous mode [ 2283.189997][T11095] veth0_macvtap: entered promiscuous mode [ 2283.252021][T11095] veth1_macvtap: entered promiscuous mode [ 2285.904348][T11257] serio: Serial port pts0 [ 2298.541708][ T29] audit: type=1400 audit(2298.200:376): avc: denied { ioctl } for pid=11320 comm="syz.0.2815" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2300.369881][ T29] audit: type=1400 audit(2300.010:377): avc: denied { write } for pid=11327 comm="syz.0.2818" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2300.503384][ T29] audit: type=1400 audit(2300.160:378): avc: denied { ioctl } for pid=11327 comm="syz.0.2818" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x330f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2304.916022][ C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 2308.875397][T11366] serio: Serial port pts0 [ 2317.729030][T11401] serio: Serial port pts1 [ 2324.359050][T11407] serio: Serial port pts0 [ 2338.901326][T11425] serio: Serial port pts1 [ 2339.684612][T11429] serio: Serial port pts0 [ 2343.362866][T11438] serio: Serial port pts0 [ 2346.521248][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2354.360114][T11483] serio: Serial port pts0 [ 2358.411178][T11493] serio: Serial port pts1 [ 2370.439568][ T29] audit: type=1400 audit(2370.090:379): avc: denied { nlmsg_read } for pid=11507 comm="syz.0.2877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2378.078006][T11534] serio: Serial port pts0 [ 2384.665742][ T29] audit: type=1400 audit(2384.320:380): avc: denied { setattr } for pid=11565 comm="syz.2.2896" name="iommu" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2385.100065][T11568] serio: Serial port pts0 [ 2386.850223][T11575] serio: Serial port pts1 [ 2402.195897][T11587] serio: Serial port pts0 [ 2405.364866][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2409.645442][T11625] netlink: 20 bytes leftover after parsing attributes in process `syz.0.2915'. [ 2420.971481][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 2421.636534][T11668] serio: Serial port pts0 [ 2426.125941][ T29] audit: type=1400 audit(2425.780:381): avc: denied { mount } for pid=11680 comm="syz.0.2934" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2432.157990][T11703] serio: Serial port pts0 [ 2434.467146][T11712] serio: Serial port pts1 [ 2451.230857][ T29] audit: type=1400 audit(2450.890:382): avc: denied { setopt } for pid=11735 comm="syz.2.2954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2451.370354][T11738] syz.0.2955 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 2451.589929][ T29] audit: type=1400 audit(2451.240:383): avc: denied { setopt } for pid=11739 comm="syz.2.2956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2451.590256][T11740] lo: entered promiscuous mode [ 2451.632808][T11740] lo: left promiscuous mode [ 2451.985037][T11742] serio: Serial port pts0 [ 2454.214468][T11748] serio: Serial port pts0 [ 2454.416767][T11750] netlink: 'syz.0.2959': attribute type 4 has an invalid length. [ 2458.470370][T11769] serio: Serial port pts1 [ 2472.787044][T11814] serio: Serial port pts0 [ 2476.159546][T11824] serio: Serial port pts1 [ 2488.774260][T11830] syzkaller0: entered promiscuous mode [ 2488.775487][T11830] syzkaller0: entered allmulticast mode [ 2488.825823][ T29] audit: type=1400 audit(2488.470:384): avc: denied { relabelfrom } for pid=11829 comm="syz.2.2986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 2488.839701][ T29] audit: type=1400 audit(2488.490:385): avc: denied { relabelto } for pid=11829 comm="syz.2.2986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 2498.562515][ T29] audit: type=1400 audit(2498.210:386): avc: denied { getopt } for pid=11848 comm="syz.0.2993" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2514.013742][T11903] serio: Serial port pts0 [ 2524.863590][T11938] serio: Serial port pts0 [ 2538.246681][ T29] audit: type=1400 audit(2537.900:387): avc: denied { append } for pid=11974 comm="syz.0.3037" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2541.412399][ T29] audit: type=1400 audit(2541.070:388): avc: denied { ioctl } for pid=11990 comm="syz.2.3043" path="net:[4026532666]" dev="nsfs" ino=4026532666 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2541.762762][T11993] serio: Serial port pts0 [ 2555.369677][T12026] serio: Serial port pts1 [ 2558.832129][T12042] serio: Serial port pts0 [ 2559.431618][ T29] audit: type=1400 audit(2559.080:389): avc: denied { ioctl } for pid=12043 comm="syz.2.3061" path="/dev/binderfs/binder0" dev="binder" ino=6 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2559.443233][ T29] audit: type=1400 audit(2559.090:390): avc: denied { set_context_mgr } for pid=12043 comm="syz.2.3061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2559.455105][T12046] binder: 12043:12046 ioctl c018620c 20000280 returned -22 [ 2571.069594][T12085] serio: Serial port pts0 [ 2575.643517][T12100] serio: Serial port pts1 [ 2596.710881][ T29] audit: type=1400 audit(2596.370:391): avc: denied { name_bind } for pid=12146 comm="syz.0.3094" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 2597.664697][T12151] serio: Serial port pts0 [ 2623.999270][T12243] serio: Serial port pts0 [ 2628.944986][T12267] serio: Serial port pts0 [ 2632.683233][T12277] serio: Serial port pts1 [ 2636.529658][T12287] serio: Serial port pts1 [ 2652.034893][T12319] serio: Serial port pts0 [ 2656.160655][T12335] serio: Serial port pts0 [ 2656.766622][T12338] serio: Serial port pts1 [ 2660.061642][T12348] ------------[ cut here ]------------ [ 2660.063049][T12348] refcount_t: underflow; use-after-free. [ 2660.064335][T12348] WARNING: CPU: 0 PID: 12348 at lib/refcount.c:28 refcount_warn_saturate+0x138/0x19c [ 2660.065515][T12348] Modules linked in: [ 2660.066537][T12348] CPU: 0 UID: 0 PID: 12348 Comm: syz.0.3158 Not tainted 6.12.0-syzkaller-12113-gbcc8eda6d349 #0 [ 2660.067092][T12348] Hardware name: linux,dummy-virt (DT) [ 2660.067637][T12348] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 2660.068282][T12348] pc : refcount_warn_saturate+0x138/0x19c [ 2660.069074][T12348] lr : refcount_warn_saturate+0x138/0x19c [ 2660.069639][T12348] sp : ffff8000a07776e0 [ 2660.069939][T12348] x29: ffff8000a07776e0 x28: ffff00001418f99c x27: 0000000000000002 [ 2660.070548][T12348] x26: 1fffe0000320b300 x25: 1fffe0000320b318 x24: ffff0000190598c2 [ 2660.071028][T12348] x23: ffff00001418f99c x22: 0000000000000000 x21: ffff800084ea1424 [ 2660.071483][T12348] x20: ffff00001418f99c x19: 0000000000000003 x18: 00000000ee36cdfb [ 2660.071961][T12348] x17: 0000000000000000 x16: 0000000000000000 x15: 1fffe00001e5aca4 [ 2660.072434][T12348] x14: 1ffff000110e62fd x13: ffff00000f2d6540 x12: ffff60000d3eb69b [ 2660.072928][T12348] x11: 1fffe0000d3eb69a x10: ffff60000d3eb69a x9 : dfff800000000000 [ 2660.073462][T12348] x8 : ffff000069f5b4d3 x7 : 0000000000000001 x6 : ffff60000d3eb69a [ 2660.073929][T12348] x5 : ffff000069f5b4d0 x4 : 1fffe00001e5ab59 x3 : dfff800000000000 [ 2660.074389][T12348] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00000f2d5ac0 [ 2660.075014][T12348] Call trace: [ 2660.075418][T12348] refcount_warn_saturate+0x138/0x19c (P) [ 2660.075824][T12348] refcount_warn_saturate+0x138/0x19c (L) [ 2660.076196][T12348] sk_skb_reason_drop+0x154/0x174 [ 2660.076535][T12348] j1939_session_destroy+0x104/0x36c [ 2660.076839][T12348] j1939_session_put+0x80/0xac [ 2660.077116][T12348] j1939_sk_sendmsg+0xaf4/0xf60 [ 2660.077382][T12348] __sock_sendmsg+0xc8/0x168 [ 2660.077640][T12348] ____sys_sendmsg+0x54c/0x6dc [ 2660.077908][T12348] ___sys_sendmsg+0x11c/0x19c [ 2660.078368][T12348] __sys_sendmsg+0x114/0x198 [ 2660.078697][T12348] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 2660.079089][T12348] invoke_syscall+0x6c/0x258 [ 2660.079378][T12348] el0_svc_common.constprop.0+0xac/0x230 [ 2660.079656][T12348] do_el0_svc_compat+0x40/0x68 [ 2660.079916][T12348] el0_svc_compat+0x4c/0x17c [ 2660.080181][T12348] el0t_32_sync_handler+0x98/0x13c [ 2660.080447][T12348] el0t_32_sync+0x19c/0x1a0 [ 2660.081232][T12348] irq event stamp: 596 [ 2660.081545][T12348] hardirqs last enabled at (595): [] __up_console_sem+0x74/0x94 [ 2660.082002][T12348] hardirqs last disabled at (596): [] el1_dbg+0x24/0x9c [ 2660.082412][T12348] softirqs last enabled at (570): [] handle_softirqs+0x88c/0xdb4 [ 2660.082831][T12348] softirqs last disabled at (533): [] __do_softirq+0x14/0x20 [ 2660.083299][T12348] ---[ end trace 0000000000000000 ]--- [ 2660.098095][ T29] audit: type=1400 audit(2659.750:392): avc: denied { write } for pid=3274 comm="syz-executor" path="pipe:[3314]" dev="pipefs" ino=3314 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2664.117889][T10801] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2664.183825][T10801] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2664.249994][T10801] bond0 (unregistering): Released all slaves [ 2664.427435][T10801] hsr_slave_0: left promiscuous mode [ 2664.461887][T10801] hsr_slave_1: left promiscuous mode [ 2664.576242][T10801] veth1_macvtap: left promiscuous mode [ 2664.577121][T10801] veth0_macvtap: left promiscuous mode [ 2664.578146][T10801] veth1_vlan: left promiscuous mode [ 2664.580814][T10801] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 19:32:49 Registers: info registers vcpu 0 CPU#0 PC=ffff800081af4e14 X00=0000000000000002 X01=0000000000000000 X02=0000000000000002 X03=1fffe00001dc7c2f X04=0000000000000000 X05=1fffe00001dc7c2f X06=0000000000000030 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff7000140eeda4 X11=1ffff000140eeda4 X12=ffff7000140eeda5 X13=ffff00000f2d6540 X14=1ffff000110e6301 X15=1fffe00001e5aca4 X16=0000000000000000 X17=0000000000000000 X18=000000002776f2ba X19=ffff00000ee3e080 X20=ffff800087604da0 X21=ffff80008cf4b000 X22=0000000000000033 X23=dfff800000000000 X24=ffff80008cc019df X25=0000000000000002 X26=dfff800000000000 X27=000000000000003f X28=ffff00000ee3e080 X29=ffff8000a0776d10 X30=ffff800081af4d7c SP=ffff8000a0776d10 PSTATE=800003c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000852f2030 X00=0000000000000101 X01=0000000000000003 X02=0000000000000000 X03=dfff800000000000 X04=1fffe00002ea53c9 X05=ffff80008cf57b98 X06=ffff80008cf57bb0 X07=ffff800086d5a0d0 X08=ffff80008cf57b58 X09=dfff800000000000 X10=ffff7000119eaf6a X11=1ffff000119eaf6a X12=ffff7000119eaf6b X13=ffff00001752a8c0 X14=1ffff000110e62ff X15=1fffe00002ea5514 X16=0000000000000000 X17=ffff7fffe3248000 X18=00000000ffffffff X19=ffff800080033608 X20=ffff800080539194 X21=0000000000000000 X22=0000000000000100 X23=ffff000069f92cd8 X24=0000000000000000 X25=ffff8000892480c0 X26=ffff00001752a8c0 X27=ffff00001752a8c0 X28=00000000000000c0 X29=ffff80008cf57c40 X30=ffff800085311e78 SP=ffff80008cf57d30 PSTATE=900000c5 N--V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000