last executing test programs: 38.063773465s ago: executing program 1 (id=1836): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'wp384\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r4, &(0x7f0000000180)={'#! ', './file0', [], 0xa, "41331062655e414d4b58352b76fced1a601975ad12e2bc2063754491ca9f8f0d9573ce08eb44a06351a623b4848d965c34211640dd8a6dad4380ad6f25791e407facd9c871dd169eda3a6a8e3d22216962d03ac0080d29e2978e011211961429178de7def02450"}, 0xfdef) 25.891762747s ago: executing program 1 (id=1840): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_mr_cache\x00') 19.38407215s ago: executing program 1 (id=1841): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000c00), r1) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002ac0)={&(0x7f0000001180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010426bd7000fbdbdf2501080000050001"], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) 19.092967796s ago: executing program 0 (id=1842): bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000040)=0x3, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x2c, &(0x7f0000000140)={0x0, 0x0}, 0x10) 18.984940067s ago: executing program 1 (id=1843): openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) r1 = inotify_init1(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000600)='fd/4\x00') ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0x4004662b, &(0x7f0000000180)={@id={0x2, 0x0, @auto="05d4f5079caf75d3cdcbceab9c468b45"}}) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000100), 0x0, 0x0, 0x400000000000000) 18.81620171s ago: executing program 0 (id=1844): r0 = socket$inet(0x2, 0x3, 0x5) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$loop(&(0x7f00000001c0), 0x1e6, 0x10000) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x138, 0x10, 0x633, 0x0, 0x0, {{@in=@multicast2, @in6=@rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x0, 0xa}, {@in6=@loopback, 0x0, 0x32}, @in=@local, {}, {0xac2, 0x0, 0x0, 0x5}, {}, 0x2, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x8000, 0x1000, 0x756, {{0x5, 0x4, 0x2, 0x2, 0x14, 0x66, 0x0, 0xe9, 0x2f, 0x0, @private, @empty}}}}) 18.519572357s ago: executing program 1 (id=1845): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000300)={0x18, r4, 0x333, 0x0, 0x0, {0x1c}, [@HEADER={0x4}]}, 0x18}}, 0x0) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="b4050000000000006110b0000000000063514800000000009500090000000000827573595f16aaba19dee4850fad9dc34ae0ec78734eb5ff8c80d4457498c5a7b0c59abd315c61996d140187d64787b68c0a1b3e361a405ed57dc367c33abfd46e35"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x85, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x52) 1.884327275s ago: executing program 1 (id=1846): r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec85000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x18) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = getpid() process_vm_readv(r3, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r4 = syz_open_dev$loop(0x0, 0x75f, 0x103382) memfd_create(&(0x7f0000001e00)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xefE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaa\xc6?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc9\xd1\xa7@\xa1_B\xc2@\r_b\x9a\xeb\b\xa4(V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7<\x7f\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xb0\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93i|\xc0\x00\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcd\x90\x95\xdd\x8a\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x00\x00\x00\x00\x01\x00\x00\x04\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\xb5\x13^\x13\xcb\xf0C\x9c\xabf\x1d0x0}) r7 = syz_open_procfs(r6, &(0x7f0000000600)='fd/4\x00') fallocate(r7, 0x10, 0xfff, 0x7) 1.735359164s ago: executing program 0 (id=1847): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x6, 0xfffffffffffffff8, &(0x7f0000000200)=0x1) fsmount(0xffffffffffffffff, 0x0, 0xa7) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x8, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4084) 728.535979ms ago: executing program 0 (id=1848): r0 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="0007000042009103"], 0xfe33) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000002540)=""/4096, 0x1000}, {&(0x7f0000004580)=""/4093, 0xffd}, {&(0x7f0000003540)=""/4086, 0xff6}, {&(0x7f0000000140)=""/177, 0xb1}, {&(0x7f0000000600)=""/193, 0xc1}, {&(0x7f0000001040)=""/154, 0x9a}, {&(0x7f0000000f00)=""/100, 0x64}, {&(0x7f0000000340)=""/161, 0xa1}], 0x8}, 0x0) 433.798027ms ago: executing program 0 (id=1849): openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r0) r1 = inotify_init1(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000600)='fd/4\x00') ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0x4004662b, &(0x7f0000000180)={@id={0x2, 0x0, @auto="05d4f5079caf75d3cdcbceab9c468b45"}}) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000100), 0x0, 0x0, 0x400000000000000) 0s ago: executing program 0 (id=1850): memfd_create(&(0x7f0000000140)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\xea7\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xcd\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1f, 0x0, 0x0, 0x1000, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000f, 0x28011, r0, 0x1000) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc0686611, &(0x7f0000000180)={0x68, 0x0, 0x3f, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) kernel console output (not intermixed with test programs): 78.915707][ T5453] lo speed is unknown, defaulting to 1000 [ 880.995774][ T30] audit: type=1326 audit(880.670:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5457 comm="syz.0.682" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb9d49728 code=0x7ffc0000 [ 881.019492][ T30] audit: type=1326 audit(880.700:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5457 comm="syz.0.682" exe="/syz-executor" sig=0 arch=c00000b7 syscall=106 compat=0 ip=0xffffb9d49728 code=0x7ffc0000 [ 881.021794][ T30] audit: type=1326 audit(880.700:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5457 comm="syz.0.682" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb9d49728 code=0x7ffc0000 [ 881.023562][ T30] audit: type=1326 audit(880.700:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5457 comm="syz.0.682" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb9d49728 code=0x7ffc0000 [ 891.658884][ T3406] usb 1-1: new high-speed USB device number 19 using dummy_hcd [ 891.899492][ T3406] usb 1-1: Using ep0 maxpacket: 16 [ 891.968119][ T3406] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 891.968722][ T3406] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 891.969208][ T3406] usb 1-1: New USB device found, idVendor=056a, idProduct=0018, bcdDevice= 0.00 [ 891.969598][ T3406] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 892.089153][ T3406] usb 1-1: config 0 descriptor?? [ 892.531062][ T5484] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 892.601610][ T3406] hid-generic 0003:056A:0018.0003: unknown main item tag 0x0 [ 892.602294][ T3406] hid-generic 0003:056A:0018.0003: unknown main item tag 0x0 [ 892.602726][ T3406] hid-generic 0003:056A:0018.0003: unknown main item tag 0x0 [ 892.603145][ T3406] hid-generic 0003:056A:0018.0003: unknown main item tag 0x0 [ 892.603574][ T3406] hid-generic 0003:056A:0018.0003: unknown main item tag 0x0 [ 892.605079][ T5484] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 892.626744][ T3406] hid-generic 0003:056A:0018.0003: hidraw0: USB HID v0.00 Device [HID 056a:0018] on usb-dummy_hcd.0-1/input0 [ 892.879582][ T3406] usb 1-1: USB disconnect, device number 19 [ 894.174239][ T30] audit: type=1400 audit(893.850:579): avc: denied { setattr } for pid=5492 comm="syz.0.694" name="PACKET" dev="sockfs" ino=10057 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 894.232041][ T5493] binder: 5492:5493 tried to acquire reference to desc 0, got 1 instead [ 894.250488][ T5493] binder: cannot allocate buffer [ 894.251317][ T5493] binder: 5492:5493 transaction call to 5492:0 failed 17/29201/-22, size -707-24 line 3332 [ 894.485160][ T3406] binder: undelivered TRANSACTION_ERROR: 29201 [ 900.919316][ T5518] Illegal XDP return value 4294967274 on prog (id 18) dev syz_tun, expect packet loss! [ 901.680119][ T30] audit: type=1400 audit(901.360:580): avc: denied { bind } for pid=5509 comm="syz.0.701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 901.689678][ T30] audit: type=1400 audit(901.370:581): avc: denied { node_bind } for pid=5509 comm="syz.0.701" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 901.728186][ T30] audit: type=1400 audit(901.400:582): avc: denied { setopt } for pid=5509 comm="syz.0.701" laddr=172.20.20.170 lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 929.712481][ T5579] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 942.254506][ T5595] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 942.539898][ T5595] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 953.109812][ T5628] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 953.111671][ T5628] IPv6: NLM_F_CREATE should be set when creating new route [ 953.153428][ T5628] netlink: 'syz.0.733': attribute type 27 has an invalid length. [ 954.965967][ T30] audit: type=1400 audit(954.630:583): avc: denied { setcheckreqprot } for pid=5638 comm="syz.1.737" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 957.256776][ T5628] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 957.263068][ T5628] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 957.263947][ T5628] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 957.264782][ T5628] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 961.891964][ T5678] netlink: 12 bytes leftover after parsing attributes in process `syz.1.749'. [ 961.896297][ T30] audit: type=1400 audit(961.570:584): avc: denied { create } for pid=5672 comm="syz.1.749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 971.383045][ T5697] syzkaller0: entered promiscuous mode [ 971.384078][ T5697] syzkaller0: entered allmulticast mode [ 973.816718][ T30] audit: type=1400 audit(973.440:585): avc: denied { map } for pid=5700 comm="syz.1.756" path="socket:[11460]" dev="sockfs" ino=11460 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 991.773636][ T5730] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 991.844912][ T5730] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 997.331283][ T3405] usb 1-1: new high-speed USB device number 20 using dummy_hcd [ 997.498831][ T3405] usb 1-1: Using ep0 maxpacket: 32 [ 997.631054][ T3405] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 997.632846][ T3405] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1279, setting to 1024 [ 997.634139][ T3405] usb 1-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 997.634887][ T3405] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 997.671401][ T3405] usb 1-1: config 0 descriptor?? [ 997.686814][ T5742] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 997.714920][ T3405] hub 1-1:0.0: USB hub found [ 997.903534][ T3405] hub 1-1:0.0: 1 port detected [ 998.675442][ T5632] usb 1-1: reset high-speed USB device number 20 using dummy_hcd [ 999.192276][ T30] audit: type=1400 audit(998.870:586): avc: denied { write } for pid=5751 comm="syz.0.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 999.199274][ T30] audit: type=1400 audit(998.870:587): avc: denied { nlmsg_write } for pid=5751 comm="syz.0.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 999.668216][ T3406] usb 1-1: USB disconnect, device number 20 [ 1001.129424][ T5773] input: syz1 as /devices/virtual/input/input5 [ 1008.929092][ T5799] netlink: 32 bytes leftover after parsing attributes in process `syz.0.791'. [ 1011.500722][ T30] audit: type=1400 audit(1010.760:588): avc: denied { map } for pid=5796 comm="syz.1.790" path="socket:[12534]" dev="sockfs" ino=12534 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1011.508496][ T30] audit: type=1400 audit(1010.760:589): avc: denied { accept } for pid=5796 comm="syz.1.790" path="socket:[12534]" dev="sockfs" ino=12534 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1022.028638][ T5821] binder: 5820:5821 ioctl c0306201 0 returned -14 [ 1022.046958][ T5821] binder: 5820:5821 ioctl 40045569 3 returned -22 [ 1022.406775][ T30] audit: type=1326 audit(1022.080:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5824 comm="syz.1.799" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff94f49728 code=0x7ffc0000 [ 1022.413666][ T30] audit: type=1326 audit(1022.090:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5824 comm="syz.1.799" exe="/syz-executor" sig=0 arch=c00000b7 syscall=26 compat=0 ip=0xffff94f49728 code=0x7ffc0000 [ 1022.425054][ T30] audit: type=1326 audit(1022.100:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5824 comm="syz.1.799" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff94f49728 code=0x7ffc0000 [ 1022.435132][ T30] audit: type=1326 audit(1022.110:593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5824 comm="syz.1.799" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff94f49728 code=0x7ffc0000 [ 1022.440735][ T30] audit: type=1326 audit(1022.110:594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5824 comm="syz.1.799" exe="/syz-executor" sig=0 arch=c00000b7 syscall=27 compat=0 ip=0xffff94f49728 code=0x7ffc0000 [ 1022.443969][ T30] audit: type=1400 audit(1022.120:595): avc: denied { watch watch_reads } for pid=5824 comm="syz.1.799" path="/378" dev="tmpfs" ino=1912 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1022.454415][ T30] audit: type=1326 audit(1022.120:596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5824 comm="syz.1.799" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff94f49728 code=0x7ffc0000 [ 1022.456645][ T30] audit: type=1326 audit(1022.130:597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5824 comm="syz.1.799" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff94f49728 code=0x7ffc0000 [ 1025.935013][ T30] audit: type=1400 audit(1025.610:598): avc: denied { mount } for pid=5851 comm="syz.0.810" name="/" dev="ramfs" ino=11753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1027.971583][ T30] audit: type=1400 audit(1027.630:599): avc: denied { read } for pid=5851 comm="syz.0.810" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1028.004421][ T30] audit: type=1400 audit(1027.640:600): avc: denied { open } for pid=5851 comm="syz.0.810" path="/424/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1034.194998][ T30] audit: type=1400 audit(1033.870:601): avc: denied { ioctl } for pid=5873 comm="syz.0.815" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1036.260187][ T30] audit: type=1400 audit(1035.930:602): avc: denied { read } for pid=5886 comm="syz.1.820" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1036.288530][ T30] audit: type=1400 audit(1035.950:603): avc: denied { open } for pid=5886 comm="syz.1.820" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1040.858203][ T3405] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 1041.031500][ T3405] usb 1-1: config 0 has more interface descriptors, than it declares in bNumInterfaces, ignoring interface number: 255 [ 1041.032256][ T3405] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1041.033226][ T3405] usb 1-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 2 [ 1041.034085][ T3405] usb 1-1: New USB device found, idVendor=1908, idProduct=1315, bcdDevice= 0.00 [ 1041.035468][ T3405] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1041.062360][ T3405] usb 1-1: config 0 descriptor?? [ 1041.112839][ T3405] usb-storage 1-1:0.0: USB Mass Storage device detected [ 1041.200454][ T3405] usb-storage 1-1:0.0: Quirks match for vid 1908 pid 1315: 20000 [ 1041.303879][ T3405] usb 1-1: USB disconnect, device number 21 [ 1042.294588][ T30] audit: type=1400 audit(1041.970:604): avc: denied { ioctl } for pid=5903 comm="syz.0.825" path="/dev/usbmon0" dev="devtmpfs" ino=695 ioctlcmd=0x9420 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1043.965278][ T5912] netlink: 'syz.1.827': attribute type 1 has an invalid length. [ 1044.392569][ T30] audit: type=1400 audit(1044.070:605): avc: denied { setopt } for pid=5918 comm="syz.0.830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1046.780261][ T3405] usb 1-1: new high-speed USB device number 22 using dummy_hcd [ 1047.089323][ T3405] usb 1-1: Using ep0 maxpacket: 8 [ 1047.142353][ T3405] usb 1-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 1047.143386][ T3405] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1047.194394][ T3405] usb 1-1: config 0 descriptor?? [ 1049.700233][ T3405] asix 1-1:0.0 (unnamed net_device) (uninitialized): Failed to write reg index 0x0000: -71 [ 1049.701632][ T3405] asix 1-1:0.0: probe with driver asix failed with error -71 [ 1049.714412][ T3405] usb 1-1: USB disconnect, device number 22 [ 1067.311736][ T5986] netlink: 8 bytes leftover after parsing attributes in process `syz.1.851'. [ 1072.764333][ T3405] usb 1-1: new high-speed USB device number 23 using dummy_hcd [ 1074.274198][ T3405] usb 1-1: config index 0 descriptor too short (expected 3133, got 61) [ 1074.274825][ T3405] usb 1-1: config 0 has an invalid interface number: 156 but max is 1 [ 1074.275277][ T3405] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1074.275728][ T3405] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 2 [ 1074.276201][ T3405] usb 1-1: config 0 has no interface number 0 [ 1074.276627][ T3405] usb 1-1: config 0 interface 156 altsetting 0 endpoint 0x3 has an invalid bInterval 0, changing to 7 [ 1074.285898][ T3405] usb 1-1: config 0 interface 156 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1074.286655][ T3405] usb 1-1: config 0 interface 156 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 1074.291646][ T3405] usb 1-1: New USB device found, idVendor=abcd, idProduct=cdee, bcdDevice= 5.b9 [ 1074.292180][ T3405] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1075.078600][ T3405] usb 1-1: config 0 descriptor?? [ 1075.166672][ T3405] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 1075.169430][ T3405] usb 1-1: MIDIStreaming interface descriptor not found [ 1075.335735][ T3405] usb 1-1: USB disconnect, device number 23 [ 1076.554228][ T6001] udevd[6001]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.156/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 1098.705928][ T6093] netlink: 12 bytes leftover after parsing attributes in process `syz.1.867'. [ 1100.089003][ T6097] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1100.182792][ T6097] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1100.761476][ T30] audit: type=1400 audit(1100.430:606): avc: denied { read write } for pid=6099 comm="syz.1.870" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1100.768250][ T30] audit: type=1400 audit(1100.440:607): avc: denied { open } for pid=6099 comm="syz.1.870" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1101.775141][ T6106] netlink: 8 bytes leftover after parsing attributes in process `syz.0.873'. [ 1122.158536][ T30] audit: type=1400 audit(1121.830:608): avc: denied { bind } for pid=6152 comm="syz.0.884" lport=136 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1122.159871][ T30] audit: type=1400 audit(1121.830:609): avc: denied { name_bind } for pid=6152 comm="syz.0.884" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1122.160721][ T30] audit: type=1400 audit(1121.830:610): avc: denied { node_bind } for pid=6152 comm="syz.0.884" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1153.955944][ T30] audit: type=1400 audit(1153.630:611): avc: denied { read } for pid=6208 comm="syz.0.898" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1153.985429][ T30] audit: type=1400 audit(1153.630:612): avc: denied { open } for pid=6208 comm="syz.0.898" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1158.431535][ T6215] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1160.542851][ T6215] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1182.639783][ T6292] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1182.679849][ T6292] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1196.250533][ T6320] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1196.290960][ T6320] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1200.385685][ T6359] netlink: 12 bytes leftover after parsing attributes in process `syz.1.934'. [ 1216.803373][ T30] audit: type=1400 audit(1216.420:613): avc: denied { bind } for pid=6428 comm="syz.1.960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1216.804277][ T30] audit: type=1400 audit(1216.430:614): avc: denied { listen } for pid=6428 comm="syz.1.960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1216.804938][ T30] audit: type=1400 audit(1216.430:615): avc: denied { connect } for pid=6428 comm="syz.1.960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1216.805676][ T30] audit: type=1400 audit(1216.460:616): avc: denied { write } for pid=6428 comm="syz.1.960" path="socket:[14393]" dev="sockfs" ino=14393 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1216.806405][ T30] audit: type=1400 audit(1216.470:617): avc: denied { accept } for pid=6428 comm="syz.1.960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1216.813908][ T30] audit: type=1400 audit(1216.490:618): avc: denied { read } for pid=6428 comm="syz.1.960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1223.174441][ T30] audit: type=1400 audit(1222.850:619): avc: denied { ioctl } for pid=6443 comm="syz.1.965" path="socket:[14416]" dev="sockfs" ino=14416 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1229.902086][ T6464] xt_socket: unknown flags 0x50 [ 1235.322700][ T30] audit: type=1400 audit(1234.970:620): avc: denied { mount } for pid=6472 comm="syz.1.973" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1235.345405][ T6473] ======================================================= [ 1235.345405][ T6473] WARNING: The mand mount option has been deprecated and [ 1235.345405][ T6473] and is ignored by this kernel. Remove the mand [ 1235.345405][ T6473] option from the mount to silence this warning. [ 1235.345405][ T6473] ======================================================= [ 1254.245768][ T6508] coredump: 1188(syz.1.983): interrupted: fatal signal pending [ 1254.248168][ T6508] coredump: 1188(syz.1.983): written to core: VMAs: 22, size 40656896; core: 1851211 bytes, pos 2596864 [ 1257.731974][ T6514] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1257.780078][ T6514] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1266.408820][ T30] audit: type=1400 audit(1266.060:621): avc: denied { watch watch_reads } for pid=6540 comm="syz.0.992" path=2F6D656D66643A089D46D808B37E75A581B18A537041D4988544893E4E8A7217202864656C6574656429 dev="tmpfs" ino=63 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1278.932683][ T30] audit: type=1400 audit(1278.610:622): avc: denied { lock } for pid=6566 comm="syz.0.997" path="/dev/uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1279.942356][ T6579] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1002'. [ 1280.921481][ T30] audit: type=1400 audit(1280.540:623): avc: denied { setopt } for pid=6584 comm="syz.1.1005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1281.592443][ T30] audit: type=1400 audit(1281.270:624): avc: denied { mount } for pid=6586 comm="syz.1.1006" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1281.657992][ T30] audit: type=1400 audit(1281.330:625): avc: denied { unmount } for pid=3273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1283.536793][ T6592] netlink: 44 bytes leftover after parsing attributes in process `syz.0.1003'. [ 1295.208767][ T6610] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1295.260008][ T6610] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1302.916789][ T6635] ip6tnl2: entered promiscuous mode [ 1302.918959][ T6635] ip6tnl2: entered allmulticast mode [ 1313.100394][ T6664] "syz.1.1030" (6664) uses obsolete ecb(arc4) skcipher [ 1326.963585][ T30] audit: type=1400 audit(1326.633:626): avc: denied { unmount } for pid=3272 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1335.528743][ T6739] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1335.590145][ T6739] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1338.278426][ T30] audit: type=1400 audit(1337.943:627): avc: denied { bind } for pid=6744 comm="syz.0.1056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1341.147936][ T30] audit: type=1400 audit(1340.813:628): avc: denied { read } for pid=6754 comm="syz.0.1059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1342.390073][ T6770] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1065'. [ 1342.571211][ T30] audit: type=1400 audit(1342.243:629): avc: denied { bind } for pid=6769 comm="syz.1.1065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1348.122097][ T6791] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 1360.683244][ T30] audit: type=1400 audit(1360.353:630): avc: denied { getopt } for pid=6806 comm="syz.1.1076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1369.417797][ T6846] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1370.077998][ T6846] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1381.326835][ T6868] binder: 6867:6868 ioctl c00c620f 20000740 returned -22 [ 1395.972973][ T6895] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1107'. [ 1400.361952][ T30] audit: type=1400 audit(1400.033:631): avc: denied { nlmsg_read } for pid=6903 comm="syz.0.1112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1401.114436][ T30] audit: type=1400 audit(1400.783:632): avc: denied { mount } for pid=6909 comm="syz.0.1115" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1403.440880][ T6912] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1113'. [ 1406.911643][ T30] audit: type=1400 audit(1406.573:633): avc: denied { open } for pid=6909 comm="syz.0.1115" path="/dev/ttyq5" dev="devtmpfs" ino=372 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1415.367865][ T6922] netlink: 236 bytes leftover after parsing attributes in process `syz.1.1119'. [ 1415.369649][ T6922] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1119'. [ 1415.371033][ T6922] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1119'. [ 1415.848931][ T6924] syzkaller0: entered promiscuous mode [ 1415.850834][ T6924] syzkaller0: entered allmulticast mode [ 1418.273627][ T30] audit: type=1400 audit(1417.943:634): avc: denied { unmount } for pid=3272 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1447.799071][ T7016] sit0: entered allmulticast mode [ 1447.821095][ T7016] sit0: entered promiscuous mode [ 1452.661538][ T7041] syzkaller0: entered promiscuous mode [ 1452.662266][ T7041] syzkaller0: entered allmulticast mode [ 1475.939448][ T7067] netlink: 168 bytes leftover after parsing attributes in process `syz.0.1176'. [ 1503.484475][ T30] audit: type=1400 audit(1503.133:635): avc: denied { execute } for pid=7107 comm="syz-executor" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1503.486171][ T30] audit: type=1400 audit(1503.133:636): avc: denied { execute_no_trans } for pid=7107 comm="syz-executor" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1504.251174][ T30] audit: type=1400 audit(1503.903:637): avc: denied { mounton } for pid=7108 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1504.319228][ T30] audit: type=1400 audit(1503.943:638): avc: denied { mounton } for pid=7108 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1510.021119][ T6054] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1510.072749][ T6054] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1510.121206][ T6054] bond0 (unregistering): Released all slaves [ 1510.459153][ T6054] hsr_slave_0: left promiscuous mode [ 1510.531552][ T6054] hsr_slave_1: left promiscuous mode [ 1520.764222][ T7108] lo speed is unknown, defaulting to 1000 [ 1524.922198][ T7108] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1524.942592][ T7108] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1527.534015][ T7108] hsr_slave_0: entered promiscuous mode [ 1527.585385][ T30] audit: type=1400 audit(1527.253:639): avc: denied { sys_chroot } for pid=7185 comm="dhcpcd" capability=18 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 1527.590820][ T7108] hsr_slave_1: entered promiscuous mode [ 1527.596812][ T30] audit: type=1400 audit(1527.263:640): avc: denied { setgid } for pid=7185 comm="dhcpcd" capability=6 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 1527.613740][ T30] audit: type=1400 audit(1527.283:641): avc: denied { setuid } for pid=7185 comm="dhcpcd" capability=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 1527.622999][ T30] audit: type=1400 audit(1527.283:642): avc: denied { setrlimit } for pid=7185 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=process permissive=1 [ 1527.934664][ T7187] binder: 7179:7187 tried to acquire reference to desc 0, got 1 instead [ 1527.953712][ T30] audit: type=1400 audit(1527.623:643): avc: denied { transfer } for pid=7179 comm="syz.1.1196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1527.983910][ T7187] binder: 7179:7187 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 1527.984947][ T7187] binder: 7187 RLIMIT_NICE not set [ 1528.008770][ T7187] binder: undelivered transaction 22, fd fixups failed [ 1528.010368][ T7187] binder: transaction release 22 bad handle 1, ret = -22 [ 1528.011802][ T7187] binder: 7179:7187 async transaction 22 fd fixups failed 29201/-12, line 4778 [ 1529.199694][ T7149] binder: undelivered TRANSACTION_COMPLETE [ 1532.661355][ T7108] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1532.882538][ T7108] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1532.984672][ T7108] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1533.050655][ T7108] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1535.969517][ T7108] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1548.624250][ T7108] veth0_vlan: entered promiscuous mode [ 1548.673648][ T7108] veth1_vlan: entered promiscuous mode [ 1549.071549][ T7108] veth0_macvtap: entered promiscuous mode [ 1549.105587][ T7108] veth1_macvtap: entered promiscuous mode [ 1549.370015][ T7108] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1549.370790][ T7108] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1549.371246][ T7108] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1549.371664][ T7108] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1549.781626][ T30] audit: type=1400 audit(1549.403:644): avc: denied { mounton } for pid=7108 comm="syz-executor" path="/syzkaller.dpGmqe/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1549.864543][ T30] audit: type=1400 audit(1549.533:645): avc: denied { unmount } for pid=7108 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1549.913176][ T30] audit: type=1400 audit(1549.583:646): avc: denied { mounton } for pid=7108 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1555.174758][ T7284] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4193 sclass=netlink_route_socket pid=7284 comm=syz.1.1203 [ 1563.793786][ T7289] lo speed is unknown, defaulting to 1000 [ 1566.543700][ T7289] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1566.564860][ T7289] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1568.529469][ T7289] hsr_slave_0: entered promiscuous mode [ 1568.570359][ T7289] hsr_slave_1: entered promiscuous mode [ 1568.609508][ T7289] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1568.610691][ T7289] Cannot create hsr debugfs directory [ 1570.836746][ T7289] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1570.870700][ T7289] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1570.891019][ T7289] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1570.912676][ T7289] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1572.623171][ T7289] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1578.976480][ T7289] veth0_vlan: entered promiscuous mode [ 1579.024239][ T7289] veth1_vlan: entered promiscuous mode [ 1579.205843][ T7289] veth0_macvtap: entered promiscuous mode [ 1579.236049][ T7289] veth1_macvtap: entered promiscuous mode [ 1579.480482][ T7289] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1579.481060][ T7289] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1579.481419][ T7289] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1579.482101][ T7289] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1587.008916][ T4647] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1587.251726][ T4647] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1587.460851][ T4647] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1587.528214][ T7365] lo speed is unknown, defaulting to 1000 [ 1587.760999][ T4647] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1591.803052][ T4647] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1591.879202][ T4647] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1591.975031][ T4647] bond0 (unregistering): Released all slaves [ 1592.278601][ T4647] hsr_slave_0: left promiscuous mode [ 1592.372929][ T4647] hsr_slave_1: left promiscuous mode [ 1592.612394][ T4647] veth1_macvtap: left promiscuous mode [ 1592.614742][ T4647] veth0_macvtap: left promiscuous mode [ 1592.631040][ T4647] veth1_vlan: left promiscuous mode [ 1592.632232][ T4647] veth0_vlan: left promiscuous mode [ 1596.212375][ T7393] input: syz0 as /devices/virtual/input/input7 [ 1603.073221][ T7365] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1603.119483][ T7365] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1608.353590][ T7365] hsr_slave_0: entered promiscuous mode [ 1608.420139][ T7365] hsr_slave_1: entered promiscuous mode [ 1612.407004][ T7365] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1612.438500][ T7365] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1612.453667][ T7365] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1612.470366][ T7365] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1614.799203][ T7365] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1624.512524][ T7365] veth0_vlan: entered promiscuous mode [ 1624.561983][ T7365] veth1_vlan: entered promiscuous mode [ 1624.746244][ T7365] veth0_macvtap: entered promiscuous mode [ 1624.771888][ T7365] veth1_macvtap: entered promiscuous mode [ 1624.958316][ T7365] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1624.958991][ T7365] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1624.959520][ T7365] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1624.960049][ T7365] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1638.802607][ T7534] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1225'. [ 1682.115143][ T30] audit: type=1326 audit(1681.783:647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7599 comm="syz.0.1249" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7149728 code=0x7ffc0000 [ 1682.136914][ T30] audit: type=1326 audit(1681.803:648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7599 comm="syz.0.1249" exe="/syz-executor" sig=0 arch=c00000b7 syscall=291 compat=0 ip=0xffffb7149728 code=0x7ffc0000 [ 1682.138815][ T30] audit: type=1326 audit(1681.803:649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7599 comm="syz.0.1249" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7149728 code=0x7ffc0000 [ 1682.139575][ T30] audit: type=1326 audit(1681.803:650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7599 comm="syz.0.1249" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7149728 code=0x7ffc0000 [ 1691.708797][ T7611] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=256 sclass=netlink_route_socket pid=7611 comm=syz.1.1253 [ 1709.351144][ T30] audit: type=1400 audit(1709.003:651): avc: denied { create } for pid=7633 comm="syz.1.1261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1729.966541][ T30] audit: type=1326 audit(1729.613:652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7665 comm="syz.1.1270" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffbe549728 code=0x0 [ 1739.122056][ T7678] netlink: 'syz.1.1274': attribute type 10 has an invalid length. [ 1739.123327][ T7678] netlink: 148 bytes leftover after parsing attributes in process `syz.1.1274'. [ 1744.270145][ T7685] futex_wake_op: syz.1.1276 tries to shift op by 32; fix this program [ 1777.740373][ T30] audit: type=1400 audit(1777.413:653): avc: denied { name_bind } for pid=7716 comm="syz.0.1285" src=32 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=udp_socket permissive=1 [ 1814.032343][ T30] audit: type=1400 audit(1813.703:654): avc: denied { read write } for pid=7365 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1814.035081][ T30] audit: type=1400 audit(1813.703:655): avc: denied { open } for pid=7365 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1814.046285][ T30] audit: type=1400 audit(1813.703:656): avc: denied { ioctl } for pid=7365 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1814.056492][ T30] audit: type=1400 audit(1813.723:657): avc: denied { read } for pid=3077 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1814.068336][ T30] audit: type=1400 audit(1813.723:658): avc: denied { search } for pid=3077 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1814.069452][ T30] audit: type=1400 audit(1813.723:659): avc: denied { append } for pid=3077 comm="syslogd" name="messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1814.070551][ T30] audit: type=1400 audit(1813.723:660): avc: denied { open } for pid=3077 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1814.071604][ T30] audit: type=1400 audit(1813.723:661): avc: denied { getattr } for pid=3077 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1814.185948][ T30] audit: type=1400 audit(1813.843:662): avc: denied { prog_load } for pid=7754 comm="syz.0.1294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1814.187742][ T30] audit: type=1400 audit(1813.853:663): avc: denied { bpf } for pid=7754 comm="syz.0.1294" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1828.210108][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1828.210301][ T30] audit: type=1400 audit(1827.883:668): avc: denied { module_request } for pid=7764 comm="syz.0.1297" kmod="netdev-syztnl1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1828.438639][ T30] audit: type=1400 audit(1828.103:669): avc: denied { sys_module } for pid=7764 comm="syz.0.1297" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1830.252999][ T30] audit: type=1400 audit(1829.923:670): avc: denied { name_bind } for pid=7775 comm="syz.0.1301" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1830.255158][ T30] audit: type=1400 audit(1829.923:671): avc: denied { node_bind } for pid=7775 comm="syz.0.1301" saddr=224.0.0.1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1832.157954][ T30] audit: type=1400 audit(1831.823:672): avc: denied { search } for pid=7779 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1832.249430][ T30] audit: type=1400 audit(1831.913:673): avc: denied { read } for pid=7780 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1832.252977][ T30] audit: type=1400 audit(1831.923:674): avc: denied { open } for pid=7780 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1832.253918][ T30] audit: type=1400 audit(1831.923:675): avc: denied { getattr } for pid=7780 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1832.396002][ T30] audit: type=1400 audit(1832.063:676): avc: denied { write } for pid=7779 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=839 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1832.404033][ T30] audit: type=1400 audit(1832.073:677): avc: denied { add_name } for pid=7779 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1833.374916][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1833.375041][ T30] audit: type=1400 audit(1832.943:683): avc: denied { read write } for pid=7783 comm="syz.0.1302" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1833.376256][ T30] audit: type=1400 audit(1832.943:684): avc: denied { open } for pid=7783 comm="syz.0.1302" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1833.378176][ T30] audit: type=1400 audit(1832.943:685): avc: denied { ioctl } for pid=7783 comm="syz.0.1302" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1833.379589][ T30] audit: type=1400 audit(1833.013:686): avc: denied { remove_name } for pid=7782 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=3111 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1833.381282][ T30] audit: type=1400 audit(1833.013:687): avc: denied { unlink } for pid=7782 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=3111 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1833.706129][ T30] audit: type=1400 audit(1833.373:688): avc: denied { read } for pid=7785 comm="syz.1.1303" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1833.709634][ T30] audit: type=1400 audit(1833.383:689): avc: denied { open } for pid=7785 comm="syz.1.1303" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1833.714472][ T30] audit: type=1400 audit(1833.383:690): avc: denied { ioctl } for pid=7785 comm="syz.1.1303" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1834.092285][ T30] audit: type=1400 audit(1833.763:691): avc: denied { create } for pid=7791 comm="syz.1.1304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1834.098232][ T30] audit: type=1400 audit(1833.763:692): avc: denied { write } for pid=7791 comm="syz.1.1304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1843.679359][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1843.679477][ T30] audit: type=1400 audit(1843.293:697): avc: denied { read } for pid=7806 comm="syz.0.1309" dev="nsfs" ino=4026532624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1843.681550][ T30] audit: type=1400 audit(1843.293:698): avc: denied { open } for pid=7806 comm="syz.0.1309" path="net:[4026532624]" dev="nsfs" ino=4026532624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1843.683259][ T30] audit: type=1400 audit(1843.293:699): avc: denied { create } for pid=7806 comm="syz.0.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1843.684385][ T30] audit: type=1400 audit(1843.303:700): avc: denied { write } for pid=7806 comm="syz.0.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1843.685372][ T30] audit: type=1400 audit(1843.303:701): avc: denied { read } for pid=7806 comm="syz.0.1309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1843.853318][ T7811] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1310'. [ 1846.402516][ T30] audit: type=1400 audit(1846.063:702): avc: denied { create } for pid=7810 comm="syz.0.1311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1846.435976][ T30] audit: type=1400 audit(1846.103:703): avc: denied { sys_admin } for pid=7810 comm="syz.0.1311" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1846.460990][ T30] audit: type=1400 audit(1846.123:704): avc: denied { sys_ptrace } for pid=7810 comm="syz.0.1311" capability=19 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 1847.431287][ T7820] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1314'. [ 1847.881096][ T30] audit: type=1400 audit(1847.543:705): avc: denied { create } for pid=7824 comm="syz.1.1316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1850.692950][ T30] audit: type=1400 audit(1850.363:706): avc: denied { create } for pid=7824 comm="syz.1.1316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1853.615502][ T7818] coredump: 121(syz.0.1311): written to core: VMAs: 19, size 33349632; core: 20881062 bytes, pos 33353728 [ 1853.834171][ T30] audit: type=1400 audit(1853.503:707): avc: denied { read write } for pid=7822 comm="syz.0.1313" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1853.836734][ T30] audit: type=1400 audit(1853.503:708): avc: denied { open } for pid=7822 comm="syz.0.1313" path="/dev/uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1858.805877][ T30] audit: type=1400 audit(1858.473:709): avc: denied { create } for pid=7840 comm="syz.1.1319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1858.811120][ T30] audit: type=1400 audit(1858.483:710): avc: denied { bind } for pid=7840 comm="syz.1.1319" lport=9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1858.813183][ T30] audit: type=1400 audit(1858.483:711): avc: denied { node_bind } for pid=7840 comm="syz.1.1319" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1858.817051][ T30] audit: type=1400 audit(1858.483:712): avc: denied { write } for pid=7840 comm="syz.1.1319" laddr=172.20.20.170 lport=9 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1864.883563][ T7848] process 'syz.0.1322' launched './file1' with NULL argv: empty string added [ 1864.900056][ T30] audit: type=1400 audit(1864.553:713): avc: denied { execute } for pid=7847 comm="syz.0.1322" name="file1" dev="tmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1864.900928][ T30] audit: type=1400 audit(1864.553:714): avc: denied { execute_no_trans } for pid=7847 comm="syz.0.1322" path="/45/file1" dev="tmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1868.314255][ T30] audit: type=1400 audit(1867.443:715): avc: denied { write } for pid=7849 comm="syz.0.1323" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1874.079548][ T30] audit: type=1400 audit(1873.753:716): avc: denied { create } for pid=7862 comm="syz.0.1326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1874.083856][ T30] audit: type=1400 audit(1873.753:717): avc: denied { write } for pid=7862 comm="syz.0.1326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1874.084516][ T30] audit: type=1400 audit(1873.753:718): avc: denied { nlmsg_write } for pid=7862 comm="syz.0.1326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1879.653454][ T7872] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1879.689174][ T7872] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1880.691690][ T7884] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1331'. [ 1883.360407][ T30] audit: type=1400 audit(1882.933:719): avc: denied { ioctl } for pid=7882 comm="syz.0.1333" path="socket:[20662]" dev="sockfs" ino=20662 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1888.709737][ T30] audit: type=1400 audit(1888.353:720): avc: denied { create } for pid=7894 comm="syz.0.1337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1888.711821][ T30] audit: type=1400 audit(1888.373:721): avc: denied { write } for pid=7894 comm="syz.0.1337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1893.280351][ T30] audit: type=1400 audit(1892.953:722): avc: denied { mounton } for pid=7892 comm="syz.1.1336" path="/76/file0" dev="tmpfs" ino=399 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1893.322084][ T30] audit: type=1400 audit(1892.973:723): avc: denied { mount } for pid=7892 comm="syz.1.1336" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1893.865433][ T30] audit: type=1400 audit(1893.533:724): avc: denied { bind } for pid=7905 comm="syz.0.1341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1896.114228][ T30] audit: type=1400 audit(1895.783:725): avc: denied { setopt } for pid=7905 comm="syz.0.1341" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1896.130589][ T30] audit: type=1400 audit(1895.783:726): avc: denied { connect } for pid=7905 comm="syz.0.1341" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1897.722277][ T30] audit: type=1400 audit(1897.393:727): avc: denied { write } for pid=7908 comm="syz.0.1342" name="fib_trie" dev="proc" ino=4026533090 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1898.021445][ T30] audit: type=1400 audit(1897.693:728): avc: denied { create } for pid=7910 comm="syz.0.1343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1898.028057][ T30] audit: type=1400 audit(1897.693:729): avc: denied { setopt } for pid=7910 comm="syz.0.1343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1898.295854][ T30] audit: type=1400 audit(1897.963:730): avc: denied { create } for pid=7912 comm="syz.0.1344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1898.312199][ T30] audit: type=1400 audit(1897.983:731): avc: denied { setopt } for pid=7912 comm="syz.0.1344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1899.863234][ T30] audit: type=1400 audit(1899.533:732): avc: denied { unmount } for pid=7289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1911.100886][ T7932] pim6reg1: entered promiscuous mode [ 1911.101397][ T7932] pim6reg1: entered allmulticast mode [ 1912.454664][ T30] audit: type=1400 audit(1912.123:733): avc: denied { getopt } for pid=7929 comm="syz.0.1350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1919.348951][ T30] audit: type=1400 audit(1919.013:734): avc: denied { read } for pid=7950 comm="syz.0.1359" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1919.358935][ T30] audit: type=1400 audit(1919.023:735): avc: denied { open } for pid=7950 comm="syz.0.1359" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1923.109198][ T30] audit: type=1400 audit(1922.783:736): avc: denied { ioctl } for pid=7950 comm="syz.0.1359" path="/dev/binderfs/binder1" dev="binder" ino=5 ioctlcmd=0x6208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1933.883025][ T30] audit: type=1400 audit(1933.553:737): avc: denied { read write } for pid=7965 comm="syz.1.1362" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1933.884800][ T30] audit: type=1400 audit(1933.553:738): avc: denied { open } for pid=7965 comm="syz.1.1362" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1933.909519][ T30] audit: type=1400 audit(1933.573:739): avc: denied { ioctl } for pid=7965 comm="syz.1.1362" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7010 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1945.522113][ T7986] binder: 7976:7986 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 1945.526005][ T7986] binder: 7976:7986 IncRefs 0 refcount change on invalid ref -2 ret -22 [ 1945.526895][ T7986] binder: 7976:7986 ioctl c0306201 20000080 returned -14 [ 1957.836040][ T30] audit: type=1400 audit(1957.503:740): avc: denied { prog_run } for pid=7999 comm="syz.1.1372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1957.870933][ T30] audit: type=1400 audit(1957.533:741): avc: denied { mount } for pid=7999 comm="syz.1.1372" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1957.917136][ T8000] A link change request failed with some changes committed already. Interface batadv_slave_0 may have been left with an inconsistent configuration, please check. [ 1960.183057][ T8004] SELinux: security_context_str_to_sid (Eá…) failed with errno=-22 [ 1960.232709][ T30] audit: type=1400 audit(1959.863:742): avc: denied { mount } for pid=8003 comm="syz.0.1374" name="/" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 1982.452388][ T30] audit: type=1400 audit(1982.123:743): avc: denied { block_suspend } for pid=8031 comm="syz.1.1381" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1982.503847][ T30] audit: type=1400 audit(1982.173:744): avc: denied { module_load } for pid=8031 comm="syz.1.1381" path="/sys/power/wakeup_count" dev="sysfs" ino=845 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 1992.619445][ T8052] wg2: entered promiscuous mode [ 1992.620019][ T8052] wg2: entered allmulticast mode [ 1992.915539][ T8054] SELinux: Context system_u:object_r:apm_bios_t:s0 is not valid (left unmapped). [ 1992.922485][ T30] audit: type=1400 audit(1992.583:745): avc: denied { mac_admin } for pid=8053 comm="syz.0.1387" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1992.925449][ T30] audit: type=1400 audit(1992.593:746): avc: denied { relabelto } for pid=8053 comm="syz.0.1387" name="file0" dev="tmpfs" ino=421 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:apm_bios_t:s0" [ 1992.935792][ T30] audit: type=1400 audit(1992.603:747): avc: denied { associate } for pid=8053 comm="syz.0.1387" name="file0" dev="tmpfs" ino=421 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:apm_bios_t:s0" [ 1993.043272][ T30] audit: type=1400 audit(1992.703:748): avc: denied { unlink } for pid=7365 comm="syz-executor" name="file0" dev="tmpfs" ino=421 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:apm_bios_t:s0" [ 2000.281472][ T30] audit: type=1400 audit(1999.823:749): avc: denied { set_context_mgr } for pid=8059 comm="syz.1.1389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2008.550302][ T30] audit: type=1400 audit(2008.223:750): avc: denied { getopt } for pid=8068 comm="syz.0.1392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2009.243809][ T8076] coredump: 242(syz.0.1395): coredump has not been created, error -13 [ 2014.816374][ T30] audit: type=1400 audit(2014.483:751): avc: denied { read write } for pid=8092 comm="syz.1.1402" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2014.820728][ T30] audit: type=1400 audit(2014.493:752): avc: denied { open } for pid=8092 comm="syz.1.1402" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2014.934918][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.936193][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.951306][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.952000][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.952751][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.953270][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.953748][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.954189][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.954598][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.955027][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.968848][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.969527][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.970008][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.970430][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.970878][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.971372][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.971924][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.972413][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.978336][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.978900][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.979333][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.979778][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.980232][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.980679][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.981255][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.981700][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.982163][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.982573][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.982981][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.983390][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.983968][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.984419][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.984823][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.985258][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.985658][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.986070][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.986478][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.986879][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.988201][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.988624][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.989070][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.989489][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2014.989894][ T7263] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2015.055735][ T7263] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz0] on syz0 [ 2030.254151][ T8110] binder: 8107:8110 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 2030.254856][ T8110] binder: 8107:8110 IncRefs 0 refcount change on invalid ref -2 ret -22 [ 2030.255483][ T8110] binder: 8107:8110 ioctl c0306201 20000080 returned -14 [ 2031.603561][ T30] audit: type=1400 audit(2031.273:753): avc: denied { create } for pid=8111 comm="syz.1.1407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 2055.709692][ T30] audit: type=1400 audit(2055.343:754): avc: denied { ioctl } for pid=8132 comm="syz.0.1413" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2060.961772][ T8140] netlink: 'syz.0.1415': attribute type 3 has an invalid length. [ 2063.450661][ T8153] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2063.489973][ T8153] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2067.166086][ T30] audit: type=1400 audit(2066.833:755): avc: denied { ioctl } for pid=8159 comm="syz.1.1423" path="socket:[21302]" dev="sockfs" ino=21302 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2068.826474][ T30] audit: type=1400 audit(2068.493:756): avc: denied { write } for pid=8163 comm="syz.1.1425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2075.124497][ T30] audit: type=1400 audit(2074.783:757): avc: denied { bind } for pid=8167 comm="syz.1.1426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2075.543226][ T30] audit: type=1400 audit(2075.213:758): avc: denied { read write } for pid=8169 comm="syz.1.1427" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2075.544224][ T30] audit: type=1400 audit(2075.213:759): avc: denied { open } for pid=8169 comm="syz.1.1427" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2075.607944][ T30] audit: type=1400 audit(2075.263:760): avc: denied { mount } for pid=8169 comm="syz.1.1427" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2078.203636][ T30] audit: type=1400 audit(2077.873:761): avc: denied { unmount } for pid=7289 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2083.016207][ T30] audit: type=1400 audit(2082.673:762): avc: denied { create } for pid=8185 comm="syz.0.1433" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2103.124767][ T8215] syzkaller0: entered promiscuous mode [ 2103.125500][ T8215] syzkaller0: entered allmulticast mode [ 2115.322661][ T30] audit: type=1400 audit(2114.993:763): avc: denied { mounton } for pid=8221 comm="syz.0.1444" path="/108/file0" dev="tmpfs" ino=563 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2122.964939][ T8231] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1446'. [ 2125.248818][ T30] audit: type=1400 audit(2124.913:764): avc: denied { relabelfrom } for pid=8232 comm="syz.1.1447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 2125.250380][ T30] audit: type=1400 audit(2124.913:765): avc: denied { relabelto } for pid=8232 comm="syz.1.1447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 2134.119977][ T30] audit: type=1400 audit(2133.443:766): avc: denied { bind } for pid=8240 comm="syz.0.1450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2153.895963][ T30] audit: type=1400 audit(2153.563:767): avc: denied { bind } for pid=8257 comm="syz.0.1456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2153.916842][ T30] audit: type=1400 audit(2153.583:768): avc: denied { setopt } for pid=8257 comm="syz.0.1456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2156.357913][ T30] audit: type=1400 audit(2156.003:769): avc: denied { execute } for pid=8265 comm="syz-executor" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2156.358905][ T30] audit: type=1400 audit(2156.013:770): avc: denied { execute_no_trans } for pid=8265 comm="syz-executor" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2156.526391][ T30] audit: type=1400 audit(2156.193:771): avc: denied { mounton } for pid=8266 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 2156.551769][ T30] audit: type=1400 audit(2156.223:772): avc: denied { mounton } for pid=8266 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2158.740958][ T8266] lo speed is unknown, defaulting to 1000 [ 2162.222624][ T8266] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2162.251337][ T8266] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2164.389397][ T8266] hsr_slave_0: entered promiscuous mode [ 2164.451492][ T8266] hsr_slave_1: entered promiscuous mode [ 2164.499038][ T8266] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2164.499917][ T8266] Cannot create hsr debugfs directory [ 2165.208386][ T7703] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2165.522538][ T7703] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2165.782043][ T7703] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2166.012858][ T7703] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2166.716008][ T30] audit: type=1400 audit(2166.383:773): avc: denied { read } for pid=3122 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 2173.260850][ T7703] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2173.346163][ T7703] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2173.420388][ T7703] bond0 (unregistering): Released all slaves [ 2173.938265][ T7703] hsr_slave_0: left promiscuous mode [ 2174.123643][ T7703] hsr_slave_1: left promiscuous mode [ 2174.266703][ T7703] veth1_macvtap: left promiscuous mode [ 2174.268245][ T7703] veth0_macvtap: left promiscuous mode [ 2174.269259][ T7703] veth1_vlan: left promiscuous mode [ 2174.270031][ T7703] veth0_vlan: left promiscuous mode [ 2181.892763][ T8318] netlink: 'syz.0.1461': attribute type 3 has an invalid length. [ 2183.001306][ T8266] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2183.031326][ T8266] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2183.072300][ T8266] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2183.115111][ T8266] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2186.486664][ T8334] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1462'. [ 2186.692153][ T8266] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2203.199582][ T8266] veth0_vlan: entered promiscuous mode [ 2203.294787][ T8266] veth1_vlan: entered promiscuous mode [ 2203.599881][ T8266] veth0_macvtap: entered promiscuous mode [ 2203.646661][ T8266] veth1_macvtap: entered promiscuous mode [ 2203.935172][ T8266] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2203.936815][ T8266] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2203.940098][ T8266] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2203.940940][ T8266] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2204.304889][ T30] audit: type=1400 audit(2203.973:774): avc: denied { mounton } for pid=8266 comm="syz-executor" path="/syzkaller.vhwGvg/syz-tmp" dev="vda" ino=1749 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 2204.330146][ T30] audit: type=1400 audit(2203.983:775): avc: denied { mount } for pid=8266 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2204.352560][ T30] audit: type=1400 audit(2204.023:776): avc: denied { mount } for pid=8266 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2204.415235][ T30] audit: type=1400 audit(2204.083:777): avc: denied { unmount } for pid=8266 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2204.504352][ T30] audit: type=1400 audit(2204.173:778): avc: denied { mounton } for pid=8266 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 2208.453791][ T8384] xt_limit: Overflow, try lower: 0/0 [ 2209.065914][ T8385] devtmpfs: Unknown parameter 'posixacl' [ 2227.012044][ T30] audit: type=1400 audit(2226.683:779): avc: denied { read } for pid=8401 comm="syz.0.1470" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2227.023443][ T30] audit: type=1400 audit(2226.683:780): avc: denied { open } for pid=8401 comm="syz.0.1470" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2245.738709][ T30] audit: type=1400 audit(2245.373:781): avc: denied { create } for pid=8425 comm="syz.0.1479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2246.858697][ T30] audit: type=1400 audit(2246.523:782): avc: denied { connect } for pid=8425 comm="syz.0.1479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2251.201870][ T30] audit: type=1400 audit(2250.873:783): avc: denied { ioctl } for pid=8432 comm="syz.1.1480" path="socket:[21907]" dev="sockfs" ino=21907 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2285.269338][ T30] audit: type=1326 audit(2284.913:784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8468 comm="syz.1.1490" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffb8749728 code=0x0 [ 2297.778385][ T30] audit: type=1400 audit(2297.363:785): avc: denied { search } for pid=8486 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2297.779491][ T30] audit: type=1400 audit(2297.363:786): avc: denied { getattr } for pid=8486 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=3168 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2297.780286][ T30] audit: type=1400 audit(2297.363:787): avc: denied { write } for pid=8486 comm="rm" name="hook-state" dev="tmpfs" ino=839 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2297.780950][ T30] audit: type=1400 audit(2297.373:788): avc: denied { remove_name } for pid=8486 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=3168 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2297.781656][ T30] audit: type=1400 audit(2297.373:789): avc: denied { unlink } for pid=8486 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=3168 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2298.032805][ T30] audit: type=1400 audit(2297.703:790): avc: denied { read } for pid=3077 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2298.046591][ T30] audit: type=1400 audit(2297.713:791): avc: denied { search } for pid=3077 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2298.058119][ T30] audit: type=1400 audit(2297.713:792): avc: denied { append } for pid=3077 comm="syslogd" name="messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2298.059747][ T30] audit: type=1400 audit(2297.713:793): avc: denied { open } for pid=3077 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2298.061799][ T30] audit: type=1400 audit(2297.713:794): avc: denied { getattr } for pid=3077 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=4 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2305.292304][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 2305.292492][ T30] audit: type=1400 audit(2304.963:804): avc: denied { prog_run } for pid=8492 comm="syz.0.1495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2307.563504][ T30] audit: type=1400 audit(2307.233:805): avc: denied { read } for pid=8499 comm="syz.0.1498" dev="nsfs" ino=4026533083 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2307.569733][ T30] audit: type=1400 audit(2307.233:806): avc: denied { open } for pid=8499 comm="syz.0.1498" path="cgroup:[4026533083]" dev="nsfs" ino=4026533083 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2307.590717][ T30] audit: type=1400 audit(2307.253:807): avc: denied { mounton } for pid=8499 comm="syz.0.1498" path="/proc/411/cgroup" dev="proc" ino=22076 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 2307.811229][ T30] audit: type=1400 audit(2307.483:808): avc: denied { create } for pid=8501 comm="syz.0.1499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2307.815019][ T30] audit: type=1400 audit(2307.483:809): avc: denied { setopt } for pid=8501 comm="syz.0.1499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2308.364800][ T30] audit: type=1400 audit(2308.033:810): avc: denied { bind } for pid=8501 comm="syz.0.1499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2308.379356][ T30] audit: type=1400 audit(2308.043:811): avc: denied { write } for pid=8501 comm="syz.0.1499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2322.852335][ T30] audit: type=1400 audit(2322.523:812): avc: denied { create } for pid=8504 comm="syz.1.1501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2322.873614][ T30] audit: type=1400 audit(2322.543:813): avc: denied { setopt } for pid=8504 comm="syz.1.1501" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2322.885256][ T30] audit: type=1400 audit(2322.553:814): avc: denied { write } for pid=8504 comm="syz.1.1501" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2326.762559][ T30] audit: type=1400 audit(2326.183:815): avc: denied { create } for pid=8506 comm="syz.0.1500" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2326.763558][ T30] audit: type=1400 audit(2326.223:816): avc: denied { ioctl } for pid=8506 comm="syz.0.1500" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=22115 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2336.301583][ T30] audit: type=1400 audit(2335.973:817): avc: denied { ioctl } for pid=8515 comm="syz.0.1503" path="socket:[23327]" dev="sockfs" ino=23327 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2337.194771][ T30] audit: type=1400 audit(2336.863:818): avc: denied { create } for pid=8519 comm="syz.1.1504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2337.215301][ T30] audit: type=1400 audit(2336.883:819): avc: denied { bind } for pid=8519 comm="syz.1.1504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2337.225916][ T30] audit: type=1400 audit(2336.893:820): avc: denied { listen } for pid=8519 comm="syz.1.1504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2337.235604][ T30] audit: type=1400 audit(2336.903:821): avc: denied { connect } for pid=8519 comm="syz.1.1504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2337.760969][ T30] audit: type=1400 audit(2337.423:822): avc: denied { write } for pid=8523 comm="syz.1.1506" name="ip6_flowlabel" dev="proc" ino=4026532941 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2338.181710][ T30] audit: type=1400 audit(2337.843:823): avc: denied { create } for pid=8525 comm="syz.1.1507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2338.198872][ T30] audit: type=1400 audit(2337.853:824): avc: denied { write } for pid=8525 comm="syz.1.1507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2338.200316][ T30] audit: type=1400 audit(2337.863:825): avc: denied { module_request } for pid=8525 comm="syz.1.1507" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2338.488341][ T30] audit: type=1400 audit(2338.133:826): avc: denied { read } for pid=8525 comm="syz.1.1507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2345.335736][ T30] audit: type=1400 audit(2344.953:827): avc: denied { create } for pid=8538 comm="syz.0.1512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2345.336749][ T30] audit: type=1400 audit(2344.983:828): avc: denied { map } for pid=8538 comm="syz.0.1512" path="socket:[22168]" dev="sockfs" ino=22168 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2345.338661][ T30] audit: type=1400 audit(2344.993:829): avc: denied { read } for pid=8538 comm="syz.0.1512" path="socket:[22168]" dev="sockfs" ino=22168 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2352.222604][ T30] audit: type=1400 audit(2351.893:830): avc: denied { create } for pid=8547 comm="syz.1.1515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2352.235297][ T30] audit: type=1400 audit(2351.903:831): avc: denied { write } for pid=8547 comm="syz.1.1515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2361.657997][ T30] audit: type=1400 audit(2361.323:832): avc: denied { read write } for pid=8555 comm="syz.0.1517" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2361.687013][ T30] audit: type=1400 audit(2361.353:833): avc: denied { open } for pid=8555 comm="syz.0.1517" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2361.724751][ T30] audit: type=1400 audit(2361.373:834): avc: denied { mounton } for pid=8555 comm="syz.0.1517" path="/154/file0" dev="tmpfs" ino=800 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2361.848732][ T30] audit: type=1400 audit(2361.503:835): avc: denied { mount } for pid=8555 comm="syz.0.1517" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2365.943400][ T8562] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1518'. [ 2374.493421][ T30] audit: type=1400 audit(2374.163:836): avc: denied { unmount } for pid=7365 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2375.163513][ T30] audit: type=1400 audit(2374.833:837): avc: denied { ioctl } for pid=8570 comm="syz.0.1521" path="socket:[23437]" dev="sockfs" ino=23437 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2385.413722][ T30] audit: type=1400 audit(2385.043:838): avc: denied { create } for pid=8579 comm="syz.0.1523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2385.465477][ T30] audit: type=1400 audit(2385.133:839): avc: denied { write } for pid=8579 comm="syz.0.1523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2385.871633][ T30] audit: type=1400 audit(2385.543:840): avc: denied { read write } for pid=8581 comm="syz.0.1524" name="vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2385.876234][ T30] audit: type=1400 audit(2385.543:841): avc: denied { open } for pid=8581 comm="syz.0.1524" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2385.890642][ T30] audit: type=1400 audit(2385.563:842): avc: denied { ioctl } for pid=8581 comm="syz.0.1524" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2386.282086][ T30] audit: type=1400 audit(2385.953:843): avc: denied { name_bind } for pid=8584 comm="syz.1.1526" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2386.286707][ T30] audit: type=1400 audit(2385.953:844): avc: denied { node_bind } for pid=8584 comm="syz.1.1526" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2398.711818][ T8603] netlink: 36 bytes leftover after parsing attributes in process `syz.0.1529'. [ 2404.710319][ T8618] veth0_vlan: entered allmulticast mode [ 2404.871192][ T8618] veth0_vlan: left promiscuous mode [ 2404.874783][ T8618] veth0_vlan: entered promiscuous mode [ 2412.832756][ T30] audit: type=1326 audit(2412.503:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8629 comm="syz.1.1538" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb8749728 code=0x7ffc0000 [ 2412.835182][ T30] audit: type=1326 audit(2412.503:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8629 comm="syz.1.1538" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb8749728 code=0x7ffc0000 [ 2412.836818][ T30] audit: type=1326 audit(2412.503:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8629 comm="syz.1.1538" exe="/syz-executor" sig=0 arch=c00000b7 syscall=439 compat=0 ip=0xffffb8749728 code=0x7ffc0000 [ 2412.848840][ T30] audit: type=1326 audit(2412.513:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8629 comm="syz.1.1538" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb8749728 code=0x7ffc0000 [ 2413.055329][ T8632] xt_bpf: check failed: parse error [ 2425.855114][ T30] audit: type=1400 audit(2425.523:849): avc: denied { mounton } for pid=8647 comm="syz.1.1544" path="/39/file0" dev="tmpfs" ino=213 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2435.919131][ T30] audit: type=1400 audit(2435.593:850): avc: denied { getopt } for pid=8657 comm="syz.0.1547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2438.159152][ T30] audit: type=1400 audit(2437.803:851): avc: denied { read } for pid=8662 comm="syz.1.1548" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2438.160115][ T30] audit: type=1400 audit(2437.823:852): avc: denied { open } for pid=8662 comm="syz.1.1548" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2438.161404][ T30] audit: type=1400 audit(2437.823:853): avc: denied { write } for pid=8662 comm="syz.1.1548" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2442.134568][ T8667] veth0_vlan: entered allmulticast mode [ 2442.256458][ T8667] ÿÿÿÿÿÿ: renamed from vlan1 [ 2445.748084][ T30] audit: type=1400 audit(2445.413:854): avc: denied { read } for pid=8675 comm="syz.0.1553" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2445.749344][ T30] audit: type=1400 audit(2445.413:855): avc: denied { open } for pid=8675 comm="syz.0.1553" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2445.769144][ T30] audit: type=1400 audit(2445.423:856): avc: denied { ioctl } for pid=8675 comm="syz.0.1553" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2445.771838][ T30] audit: type=1400 audit(2445.423:857): avc: denied { set_context_mgr } for pid=8675 comm="syz.0.1553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2445.785271][ T8677] binder: 8675:8677 Acquire 1 refcount change on invalid ref 0 ret -22 [ 2445.790874][ T8677] binder: 8675:8677 Release 1 refcount change on invalid ref 0 ret -22 [ 2445.792698][ T8677] binder: 8677:8675 cannot find target node [ 2445.793394][ T8677] binder: 8675:8677 transaction call to 0:0 failed 27/29189/-22, size 0-0 line 3144 [ 2447.245824][ T6803] binder: undelivered TRANSACTION_ERROR: 29189 [ 2451.725225][ T30] audit: type=1400 audit(2451.393:858): avc: denied { execute } for pid=8686 comm="syz.0.1556" path="/176/cgroup.stat" dev="tmpfs" ino=912 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2454.761251][ T8691] binder: 8688:8691 BC_FREE_BUFFER u0000000000000000 no match [ 2454.762568][ T8691] binder: 8688:8691 ioctl c0306201 20000080 returned -14 [ 2462.755825][ T30] audit: type=1400 audit(2462.423:859): avc: denied { create } for pid=8692 comm="syz.0.1558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2464.738604][ T30] audit: type=1400 audit(2464.363:860): avc: denied { bind } for pid=8695 comm="syz.0.1559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2464.739442][ T30] audit: type=1400 audit(2464.373:861): avc: denied { setopt } for pid=8695 comm="syz.0.1559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2465.755546][ T30] audit: type=1400 audit(2465.423:862): avc: denied { create } for pid=8698 comm="syz.0.1560" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2465.768166][ T30] audit: type=1400 audit(2465.433:863): avc: denied { read } for pid=8698 comm="syz.0.1560" name="file0" dev="tmpfs" ino=933 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2465.770475][ T30] audit: type=1400 audit(2465.443:864): avc: denied { open } for pid=8698 comm="syz.0.1560" path="/180/file0" dev="tmpfs" ino=933 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2467.141967][ T30] audit: type=1400 audit(2466.813:865): avc: denied { execute } for pid=8701 comm="syz-executor" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2467.149592][ T30] audit: type=1400 audit(2466.813:866): avc: denied { execute_no_trans } for pid=8701 comm="syz-executor" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2467.312443][ T30] audit: type=1400 audit(2466.983:867): avc: denied { mounton } for pid=8702 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 2467.335705][ T30] audit: type=1400 audit(2467.003:868): avc: denied { mounton } for pid=8702 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2467.809295][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 2467.809406][ T30] audit: type=1400 audit(2467.463:870): avc: denied { unlink } for pid=7365 comm="syz-executor" name="file0" dev="tmpfs" ino=933 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2471.095985][ T30] audit: type=1400 audit(2470.503:871): avc: denied { create } for pid=8706 comm="syz.0.1562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2471.279243][ T30] audit: type=1400 audit(2470.553:872): avc: denied { bind } for pid=8706 comm="syz.0.1562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2471.280229][ T30] audit: type=1400 audit(2470.623:873): avc: denied { connect } for pid=8706 comm="syz.0.1562" lport=135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2475.005364][ T8702] lo speed is unknown, defaulting to 1000 [ 2476.414667][ T30] audit: type=1400 audit(2476.083:874): avc: denied { read write } for pid=8718 comm="syz.0.1563" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2476.415654][ T30] audit: type=1400 audit(2476.083:875): avc: denied { open } for pid=8718 comm="syz.0.1563" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2476.451398][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.452355][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.453110][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.453574][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.454009][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.454551][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.455187][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.455845][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.456486][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.467868][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.468645][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.469256][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.469822][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.470393][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.471154][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.472060][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.472708][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.473386][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.473907][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.474486][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.475021][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.475557][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.476071][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.476603][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.510411][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.511232][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.511780][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.512306][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.512853][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.513354][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.513795][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.514235][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.514673][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.515163][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.515585][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.516119][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.516614][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.542574][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.543275][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.543819][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.544341][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.544863][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.545395][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.545912][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.546408][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.546940][ T3406] hid-generic 2000:0000:0000.0005: unknown main item tag 0x0 [ 2476.609816][ T3406] hid-generic 2000:0000:0000.0005: hidraw0: HID v0.02 Device [syz0] on syz0 [ 2476.875939][ T8307] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2477.296348][ T8307] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2477.674927][ T8307] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2478.021676][ T8307] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2479.172587][ T30] audit: type=1400 audit(2478.843:876): avc: denied { read } for pid=3122 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 2479.489011][ T30] audit: type=1400 audit(2479.093:877): avc: denied { read } for pid=3122 comm="dhcpcd" name="n31" dev="tmpfs" ino=3182 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2479.490160][ T30] audit: type=1400 audit(2479.093:878): avc: denied { open } for pid=3122 comm="dhcpcd" path="/run/udev/data/n31" dev="tmpfs" ino=3182 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2485.302966][ T8307] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2485.362866][ T8307] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2485.429561][ T8307] bond0 (unregistering): Released all slaves [ 2485.830449][ T8307] hsr_slave_0: left promiscuous mode [ 2485.993161][ T8307] hsr_slave_1: left promiscuous mode [ 2486.175443][ T8307] veth1_macvtap: left promiscuous mode [ 2486.176366][ T8307] veth0_macvtap: left promiscuous mode [ 2486.188697][ T8307] veth1_vlan: left promiscuous mode [ 2486.189683][ T8307] veth0_vlan: left promiscuous mode [ 2487.842260][ T8755] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1570'. [ 2493.389075][ T8753] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1570'. [ 2493.712361][ T8702] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2493.771017][ T8702] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2494.881997][ T30] audit: type=1400 audit(2494.553:879): avc: denied { read } for pid=8763 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2494.882975][ T30] audit: type=1400 audit(2494.553:880): avc: denied { open } for pid=8763 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2494.883741][ T30] audit: type=1400 audit(2494.553:881): avc: denied { getattr } for pid=8763 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2495.046191][ T30] audit: type=1400 audit(2494.713:882): avc: denied { add_name } for pid=8759 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2495.051838][ T30] audit: type=1400 audit(2494.723:883): avc: denied { create } for pid=8759 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2495.056108][ T30] audit: type=1400 audit(2494.723:884): avc: denied { write } for pid=8759 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=3186 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2495.071327][ T30] audit: type=1400 audit(2494.743:885): avc: denied { append } for pid=8759 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=3186 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2497.149935][ T8702] hsr_slave_0: entered promiscuous mode [ 2497.202172][ T8702] hsr_slave_1: entered promiscuous mode [ 2497.249376][ T8702] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2497.250494][ T8702] Cannot create hsr debugfs directory [ 2508.510711][ T8702] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2508.559579][ T8702] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2508.585809][ T8702] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2508.612930][ T8702] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2510.881330][ T8702] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2519.595320][ T8702] veth0_vlan: entered promiscuous mode [ 2519.755077][ T8702] veth1_vlan: entered promiscuous mode [ 2519.995286][ T8702] veth0_macvtap: entered promiscuous mode [ 2520.046752][ T8702] veth1_macvtap: entered promiscuous mode [ 2520.392355][ T8702] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2520.392885][ T8702] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2520.393357][ T8702] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2520.399919][ T8702] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2520.772864][ T30] audit: type=1400 audit(2520.343:886): avc: denied { mounton } for pid=8702 comm="syz-executor" path="/syzkaller.CAKMc9/syz-tmp" dev="vda" ino=1750 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 2520.773821][ T30] audit: type=1400 audit(2520.363:887): avc: denied { mount } for pid=8702 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2520.774493][ T30] audit: type=1400 audit(2520.383:888): avc: denied { mount } for pid=8702 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2520.775168][ T30] audit: type=1400 audit(2520.423:889): avc: denied { unmount } for pid=8702 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2520.775799][ T30] audit: type=1400 audit(2520.433:890): avc: denied { mounton } for pid=8702 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 2520.776532][ T30] audit: type=1400 audit(2520.433:891): avc: denied { mount } for pid=8702 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2528.073825][ T8857] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1561'. [ 2535.293324][ T30] audit: type=1326 audit(2534.963:892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8867 comm="syz.0.1581" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7149728 code=0x7ffc0000 [ 2535.294311][ T30] audit: type=1326 audit(2534.963:893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8867 comm="syz.0.1581" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb7149728 code=0x7ffc0000 [ 2535.308563][ T30] audit: type=1326 audit(2534.973:894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8867 comm="syz.0.1581" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7149728 code=0x7ffc0000 [ 2535.309415][ T30] audit: type=1326 audit(2534.973:895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8867 comm="syz.0.1581" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7149728 code=0x7ffc0000 [ 2535.310188][ T30] audit: type=1326 audit(2534.983:896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8867 comm="syz.0.1581" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffb7149728 code=0x7ffc0000 [ 2535.310905][ T30] audit: type=1326 audit(2534.983:897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8867 comm="syz.0.1581" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7149728 code=0x7ffc0000 [ 2535.311634][ T30] audit: type=1326 audit(2534.983:898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8867 comm="syz.0.1581" exe="/syz-executor" sig=0 arch=c00000b7 syscall=291 compat=0 ip=0xffffb7149728 code=0x7ffc0000 [ 2535.315618][ T30] audit: type=1326 audit(2534.983:899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8867 comm="syz.0.1581" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7149728 code=0x7ffc0000 [ 2535.322536][ T30] audit: type=1326 audit(2534.993:900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8867 comm="syz.0.1581" exe="/syz-executor" sig=0 arch=c00000b7 syscall=220 compat=0 ip=0xffffb7149728 code=0x7ffc0000 [ 2535.350039][ T8871] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2535.382028][ T30] audit: type=1326 audit(2535.053:901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8867 comm="syz.0.1581" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffb7149728 code=0x7ffc0000 [ 2535.399792][ T8871] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2551.624750][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 2551.624907][ T30] audit: type=1400 audit(2551.293:903): avc: denied { create } for pid=8880 comm="syz.0.1585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2551.641601][ T30] audit: type=1400 audit(2551.313:904): avc: denied { bind } for pid=8880 comm="syz.0.1585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2551.645272][ T30] audit: type=1400 audit(2551.313:905): avc: denied { setopt } for pid=8880 comm="syz.0.1585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2551.652591][ T30] audit: type=1400 audit(2551.323:906): avc: denied { connect } for pid=8880 comm="syz.0.1585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2551.662417][ T30] audit: type=1400 audit(2551.333:907): avc: denied { write } for pid=8880 comm="syz.0.1585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2551.680967][ T30] audit: type=1400 audit(2551.343:908): avc: denied { read } for pid=8880 comm="syz.0.1585" path="socket:[24079]" dev="sockfs" ino=24079 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2573.566643][ T30] audit: type=1400 audit(2573.233:909): avc: denied { create } for pid=8972 comm="syz.1.1622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2573.575478][ T30] audit: type=1400 audit(2573.243:910): avc: denied { setopt } for pid=8972 comm="syz.1.1622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2573.583333][ T8973] TCP: TCP_TX_DELAY enabled [ 2574.906837][ T30] audit: type=1400 audit(2574.533:911): avc: denied { create } for pid=8986 comm="syz.0.1629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2574.909855][ T30] audit: type=1400 audit(2574.543:912): avc: denied { write } for pid=8986 comm="syz.0.1629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2575.138819][ T30] audit: type=1400 audit(2574.793:913): avc: denied { nlmsg_read } for pid=8990 comm="syz.0.1631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2576.732534][ T30] audit: type=1400 audit(2576.403:914): avc: denied { write } for pid=9000 comm="syz.0.1636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2576.981591][ T9003] netlink: 'syz.1.1637': attribute type 19 has an invalid length. [ 2576.982459][ T9003] netlink: 55 bytes leftover after parsing attributes in process `syz.1.1637'. [ 2578.233891][ T30] audit: type=1400 audit(2577.903:915): avc: denied { create } for pid=9012 comm="syz.0.1642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 2578.381236][ T30] audit: type=1400 audit(2578.053:916): avc: denied { create } for pid=9015 comm="syz.1.1643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 2579.444841][ T9023] netlink: 'syz.0.1645': attribute type 29 has an invalid length. [ 2600.185427][ T9023] netlink: 'syz.0.1645': attribute type 29 has an invalid length. [ 2601.413098][ T30] audit: type=1400 audit(2601.083:917): avc: denied { create } for pid=9030 comm="syz.1.1649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 2604.871095][ T30] audit: type=1400 audit(2604.443:918): avc: denied { write } for pid=9024 comm="syz.0.1646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2604.901424][ T30] audit: type=1400 audit(2604.453:919): avc: denied { nlmsg_write } for pid=9024 comm="syz.0.1646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2618.517153][ T30] audit: type=1400 audit(2618.183:920): avc: denied { read append } for pid=9058 comm="syz.1.1656" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2618.522880][ T30] audit: type=1400 audit(2618.193:921): avc: denied { open } for pid=9058 comm="syz.1.1656" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2619.246588][ T30] audit: type=1400 audit(2618.913:922): avc: denied { mounton } for pid=9064 comm="syz.0.1658" path="/proc/652/task" dev="proc" ino=25547 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 2619.432621][ T9066] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 2620.166680][ T30] audit: type=1400 audit(2619.833:923): avc: denied { ioctl } for pid=9058 comm="syz.1.1656" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x5566 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2620.222875][ T9068] input: syz1 as /devices/virtual/input/input8 [ 2620.709794][ T9060] netlink: 'syz.1.1656': attribute type 8 has an invalid length. [ 2621.074345][ T30] audit: type=1400 audit(2620.743:924): avc: denied { read } for pid=9070 comm="syz.0.1659" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2621.166119][ T30] audit: type=1400 audit(2620.813:925): avc: denied { open } for pid=9070 comm="syz.0.1659" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2621.304965][ T30] audit: type=1400 audit(2620.973:926): avc: denied { connect } for pid=9070 comm="syz.0.1659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2621.821552][ T30] audit: type=1400 audit(2621.463:927): avc: denied { read } for pid=9070 comm="syz.0.1659" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 2621.823328][ T30] audit: type=1400 audit(2621.473:928): avc: denied { open } for pid=9070 comm="syz.0.1659" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 2621.824624][ T30] audit: type=1400 audit(2621.473:929): avc: denied { ioctl } for pid=9070 comm="syz.0.1659" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 2622.628590][ T9077] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2622.683643][ T9077] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2624.478814][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 2624.479019][ T30] audit: type=1400 audit(2624.093:931): avc: denied { write } for pid=9086 comm="syz.0.1666" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2624.481094][ T30] audit: type=1400 audit(2624.093:932): avc: denied { open } for pid=9086 comm="syz.0.1666" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2624.482687][ T30] audit: type=1400 audit(2624.123:933): avc: denied { ioctl } for pid=9086 comm="syz.0.1666" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x460f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2627.132083][ T9094] EXT4-fs warning (device vda): verify_group_input:136: Cannot add at group 63 (only 8 groups) [ 2630.244382][ T30] audit: type=1400 audit(2629.913:934): avc: denied { create } for pid=9097 comm="syz.0.1670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2630.325688][ T30] audit: type=1400 audit(2629.983:935): avc: denied { connect } for pid=9097 comm="syz.0.1670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2630.373322][ T30] audit: type=1400 audit(2630.043:936): avc: denied { bind } for pid=9097 comm="syz.0.1670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2630.493921][ T30] audit: type=1400 audit(2630.163:937): avc: denied { getopt } for pid=9097 comm="syz.0.1670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2638.746038][ T30] audit: type=1400 audit(2638.413:938): avc: denied { unmount } for pid=8702 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2639.122205][ T30] audit: type=1400 audit(2638.783:939): avc: denied { append } for pid=9112 comm="syz.0.1676" name="dlm-control" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2639.342801][ T30] audit: type=1400 audit(2639.003:940): avc: denied { name_connect } for pid=9112 comm="syz.0.1676" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 2639.549597][ T30] audit: type=1400 audit(2639.213:941): avc: denied { listen } for pid=9112 comm="syz.0.1676" lport=45820 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2639.600587][ T30] audit: type=1400 audit(2639.263:942): avc: denied { accept } for pid=9112 comm="syz.0.1676" lport=45820 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2639.638791][ T30] audit: type=1400 audit(2639.303:943): avc: denied { setopt } for pid=9112 comm="syz.0.1676" lport=45820 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 2642.138999][ T9124] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 2645.022068][ T30] audit: type=1400 audit(2644.673:944): avc: denied { map } for pid=9133 comm="syz.0.1684" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=25764 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2645.050639][ T30] audit: type=1400 audit(2644.713:945): avc: denied { read write } for pid=9133 comm="syz.0.1684" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=25764 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2647.552121][ T9140] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 2648.348608][ T9142] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2648.430843][ T9142] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2650.551560][ T30] audit: type=1400 audit(2650.173:946): avc: denied { create } for pid=9133 comm="syz.0.1684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2650.553779][ T30] audit: type=1400 audit(2650.183:947): avc: denied { write } for pid=9133 comm="syz.0.1684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2651.954490][ T9153] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 2658.729539][ T30] audit: type=1400 audit(2658.393:948): avc: denied { create } for pid=9172 comm="syz.1.1699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 2666.902822][ T30] audit: type=1400 audit(2666.393:949): avc: denied { write } for pid=9183 comm="syz.1.1703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2666.922897][ T30] audit: type=1400 audit(2666.403:950): avc: denied { accept } for pid=9183 comm="syz.1.1703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2666.936236][ T30] audit: type=1400 audit(2666.413:951): avc: denied { read } for pid=9183 comm="syz.1.1703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2687.622762][ T9220] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1712'. [ 2694.644687][ T30] audit: type=1400 audit(2694.313:952): avc: denied { create } for pid=9226 comm="syz.0.1714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2694.694277][ T30] audit: type=1400 audit(2694.363:953): avc: denied { bind } for pid=9226 comm="syz.0.1714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2695.248731][ T30] audit: type=1400 audit(2694.903:954): avc: denied { setopt } for pid=9226 comm="syz.0.1714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2695.304852][ T30] audit: type=1400 audit(2694.953:955): avc: denied { accept } for pid=9226 comm="syz.0.1714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2698.883385][ T30] audit: type=1400 audit(2698.543:956): avc: denied { ioctl } for pid=9240 comm="syz.1.1718" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x640d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2700.030288][ T30] audit: type=1400 audit(2699.633:957): avc: denied { nlmsg_write } for pid=9239 comm="syz.0.1717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2713.090582][ T30] audit: type=1400 audit(2712.703:958): avc: denied { write } for pid=9265 comm="syz.0.1723" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 2718.838706][ T30] audit: type=1326 audit(2718.463:959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9271 comm="syz.1.1724" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96d49728 code=0x7fc00000 [ 2718.840678][ T30] audit: type=1400 audit(2718.493:960): avc: denied { read } for pid=9271 comm="syz.1.1724" path="socket:[26058]" dev="sockfs" ino=26058 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2718.842287][ T30] audit: type=1326 audit(2718.503:961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9271 comm="syz.1.1724" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff96d49728 code=0x7fc00000 [ 2719.558311][ T30] audit: type=1326 audit(2718.533:962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9271 comm="syz.1.1724" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff96d49728 code=0x7fc00000 [ 2765.459297][ T30] audit: type=1400 audit(2765.103:963): avc: denied { ioctl } for pid=9332 comm="syz.1.1740" path="socket:[26906]" dev="sockfs" ino=26906 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2785.251760][ T30] audit: type=1400 audit(2784.923:964): avc: denied { create } for pid=9352 comm="syz.0.1745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 2786.246218][ T30] audit: type=1400 audit(2785.913:965): avc: denied { read } for pid=9357 comm="syz.0.1747" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2786.249916][ T30] audit: type=1400 audit(2785.923:966): avc: denied { open } for pid=9357 comm="syz.0.1747" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2791.726739][ T30] audit: type=1400 audit(2790.413:967): avc: denied { create } for pid=9367 comm="syz.0.1751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2794.344609][ T30] audit: type=1400 audit(2793.843:968): avc: denied { write } for pid=9367 comm="syz.0.1751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2815.785479][ T30] audit: type=1400 audit(2815.453:969): avc: denied { sqpoll } for pid=9438 comm="syz.1.1780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2820.856392][ T9456] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2820.900994][ T9456] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2823.436450][ T9465] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1791'. [ 2840.254305][ T9490] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 2841.449049][ T30] audit: type=1400 audit(2841.103:970): avc: denied { getopt } for pid=9496 comm="syz.0.1802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2843.240624][ T9503] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 2858.673883][ T9529] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 2864.308427][ T30] audit: type=1400 audit(2863.303:971): avc: denied { read } for pid=9537 comm="syz.0.1813" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2868.450410][ T30] audit: type=1400 audit(2867.803:972): avc: denied { read } for pid=9530 comm="syz.1.1811" path="socket:[27342]" dev="sockfs" ino=27342 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2874.196820][ T9550] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 2881.233007][ T30] audit: type=1400 audit(2880.893:973): avc: denied { load_policy } for pid=9556 comm="syz.0.1819" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 2881.286523][ T9563] SELinux: failed to load policy [ 2882.212650][ T9565] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow [ 2882.669619][ T30] audit: type=1400 audit(2882.313:974): avc: denied { unmount } for pid=7365 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2898.705589][ T30] audit: type=1400 audit(2897.963:975): avc: denied { write } for pid=9584 comm="syz.0.1826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2899.224377][ T30] audit: type=1400 audit(2897.993:976): avc: denied { getopt } for pid=9584 comm="syz.0.1826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2905.999422][ T30] audit: type=1400 audit(2905.583:977): avc: denied { create } for pid=9595 comm="syz.1.1829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2906.000862][ T30] audit: type=1400 audit(2905.593:978): avc: denied { ioctl } for pid=9595 comm="syz.1.1829" path="socket:[27399]" dev="sockfs" ino=27399 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2922.569906][ T30] audit: type=1400 audit(2922.233:979): avc: denied { map } for pid=9622 comm="syz.0.1837" path="socket:[27481]" dev="sockfs" ino=27481 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2922.572015][ T30] audit: type=1400 audit(2922.233:980): avc: denied { read accept } for pid=9622 comm="syz.0.1837" path="socket:[27481]" dev="sockfs" ino=27481 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2926.262759][ T30] audit: type=1400 audit(2925.393:981): avc: denied { bind } for pid=9626 comm="syz.0.1839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2953.081854][ T9663] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 [ 2953.095059][ T9663] Mem abort info: [ 2953.096001][ T9663] ESR = 0x0000000086000006 [ 2953.096737][ T9663] EC = 0x21: IABT (current EL), IL = 32 bits [ 2953.101008][ T9663] SET = 0, FnV = 0 [ 2953.101810][ T9663] EA = 0, S1PTW = 0 [ 2953.102491][ T9663] FSC = 0x06: level 2 translation fault [ 2953.103345][ T9663] user pgtable: 4k pages, 48-bit VAs, pgdp=000000005da04000 [ 2953.104122][ T9663] [0000000000000000] pgd=08000000586ad003, p4d=08000000586ad003, pud=080000005e922003, pmd=0000000000000000 [ 2953.115106][ T9663] Internal error: Oops: 0000000086000006 [#1] PREEMPT SMP [ 2953.115751][ T9663] Modules linked in: [ 2953.116606][ T9663] CPU: 0 UID: 0 PID: 9663 Comm: syz.0.1850 Not tainted 6.11.0-syzkaller-08481-g88264981f208 #0 [ 2953.117751][ T9663] Hardware name: linux,dummy-virt (DT) [ 2953.118553][ T9663] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 2953.119112][ T9663] pc : 0x0 [ 2953.119889][ T9663] lr : filemap_read_folio+0xac/0x1f8 [ 2953.120352][ T9663] sp : ffff80008ec67760 [ 2953.120727][ T9663] x29: ffff80008ec67760 x28: 00000000ffffffff x27: 0000000000080001 [ 2953.121655][ T9663] x26: 1fffe00001b96869 x25: ffff000019177180 x24: dfff800000000000 [ 2953.122515][ T9663] x23: 0000000000000000 x22: 1ffff00011d8cef4 x21: ffff000019177180 [ 2953.123231][ T9663] x20: fffffdffc087b200 x19: fffffdffc087b200 x18: 0000000096cf8f4f [ 2953.124075][ T9663] x17: 0000000000000000 x16: 0000000000000000 x15: ffff00001503e480 [ 2953.124754][ T9663] x14: 1fffe00002a07c8f x13: 1fffe00002a07c9e x12: ffff70001194ea71 [ 2953.125487][ T9663] x11: 1ffff0001194ea70 x10: ffff70001194ea70 x9 : dfff800000000000 [ 2953.126256][ T9663] x8 : 0000000000000003 x7 : 0000000041b58ab3 x6 : ffff700011d8cef4 [ 2953.126858][ T9663] x5 : 00000000f1f1f1f1 x4 : 00000000f3f3f300 x3 : ffff00001503da00 [ 2953.127805][ T9663] x2 : 1fffffbff810f641 x1 : fffffdffc087b200 x0 : ffff000019177180 [ 2953.128699][ T9663] Call trace: [ 2953.128959][ T9663] 0x0 [ 2953.129326][ T9663] do_read_cache_folio+0x1c0/0x47c [ 2953.129630][ T9663] read_cache_folio+0x44/0x6c [ 2953.129890][ T9663] freader_get_folio+0x210/0x6a0 [ 2953.130453][ T9663] freader_fetch+0x90/0x47c [ 2953.130859][ T9663] __build_id_parse.isra.0+0xec/0x5ac [ 2953.131133][ T9663] build_id_parse+0x38/0x58 [ 2953.131385][ T9663] do_procmap_query+0xab4/0xdf0 [ 2953.131638][ T9663] procfs_procmap_ioctl+0x68/0xa4 [ 2953.131903][ T9663] __arm64_sys_ioctl+0x124/0x190 [ 2953.132194][ T9663] invoke_syscall+0x6c/0x258 [ 2953.132508][ T9663] el0_svc_common.constprop.0+0xac/0x230 [ 2953.132875][ T9663] do_el0_svc+0x40/0x58 [ 2953.133250][ T9663] el0_svc+0x50/0x180 [ 2953.133595][ T9663] el0t_64_sync_handler+0x100/0x12c [ 2953.133978][ T9663] el0t_64_sync+0x190/0x194 [ 2953.134737][ T9663] Code: ???????? ???????? ???????? ???????? (????????) [ 2953.135984][ T9663] ---[ end trace 0000000000000000 ]--- [ 2953.136898][ T9663] Kernel panic - not syncing: Oops: Fatal exception [ 2953.138420][ T9663] SMP: stopping secondary CPUs [ 2953.139578][ T9663] Kernel Offset: disabled [ 2953.139795][ T9663] CPU features: 0x08,80002003,40200000,0200421b [ 2953.140360][ T9663] Memory Limit: none [ 2953.140823][ T9663] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:01:42 Registers: info registers vcpu 0 CPU#0 PC=ffff800085198534 X00=ffff800085198530 X01=ffff800083b49050 X02=0000000000000000 X03=1fffe0000d3f2e89 X04=00000000f204f1f1 X05=ffff700010000c9c X06=dfff800000000000 X07=00000000f1f1f1f1 X08=ffff800086bdfbc8 X09=abfa80e824e7bee8 X10=1ffff000110aa184 X11=0000000000000001 X12=0000000000000007 X13=1fffe00002a07cbc X14=1fffe00002a07c8f X15=ffff00001503e480 X16=0000000000000000 X17=081f728189ffbf6c X18=00000000ffffffff X19=ffff800086e07f80 X20=000000000008f28a X21=000000000008f28a X22=00000000000000c0 X23=ffff800080407580 X24=dfff800000000000 X25=000002af50e95000 X26=ffff800086e07f88 X27=dfff800000000000 X28=ffff000069f9bba8 X29=ffff800080006550 X30=ffff800083b49068 SP=ffff800080006550 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0100000000000000:0100000000000000 Q01=0000000100000000:0000000000000000 Q02=0000000000000001:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000001:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff845c520:0000fffff845c520 Q17=ffffff80ffffffd0:0000fffff845c4f0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085198534 X00=ffff800085198530 X01=0000000000000003 X02=0000000000000000 X03=1fffe0000283fb41 X04=1fffe00002d987ab X05=0000000000000400 X06=0000000000000003 X07=dfff800000000000 X08=dfff800000000000 X09=cf2bf9d07ee13ff5 X10=1ffff000110aa186 X11=0000000000000000 X12=ffff800086cc4220 X13=1fffe0000283fca3 X14=0000000000000190 X15=ffff0000141fe480 X16=0000000000000000 X17=ffff7fffe3438000 X18=00000000a7e7518d X19=ffff800086e15330 X20=ffff800086e15300 X21=0000000000000000 X22=0000000000000004 X23=0000000000000028 X24=ffff800086e15330 X25=1fffe00003a77c33 X26=ffff00001d3be198 X27=0000000000000000 X28=1fffe00003a77c20 X29=ffff80008cd778e0 X30=ffff800085196d04 SP=ffff80008cd778e0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0500000000000000:0500000000000000 Q01=0000000500000000:0000000000000000 Q02=0000000000000005:0000000000000000 Q03=00d000a800000000:0000000000000000 Q04=0000000000000000:0000000000000002 Q05=0000000000000005:0000000000000002 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffe403f1b0:0000ffffe403f1b0 Q17=ffffff80ffffffd0:0000ffffe403f180 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000