last executing test programs: 3.413878384s ago: executing program 0 (id=2574): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 3.191749624s ago: executing program 0 (id=2576): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = dup3(r1, r0, 0x0) accept4$inet(r2, 0x0, 0x0, 0x0) 2.825306312s ago: executing program 0 (id=2578): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) sendmsg$unix(r1, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNGETFILTER(r2, 0x5451, 0x0) 2.083477098s ago: executing program 0 (id=2580): r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x65) r1 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r1, &(0x7f00000024c0)={0xa, 0x7, 0x0, @loopback}, 0x20) 1.696450289s ago: executing program 0 (id=2583): r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000240)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) shutdown(r0, 0x1) 958.241795ms ago: executing program 1 (id=2590): pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff}, 0x80) fsetxattr(r0, &(0x7f00000001c0)=@random={'btrfs.', '&}\x00'}, 0x0, 0x0, 0x1) 947.843536ms ago: executing program 0 (id=2591): r0 = mq_open(&(0x7f0000001580)='smackfsdef', 0x40, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x5421, &(0x7f0000000180)={'syztnl2\x00', 0x0}) rt_sigprocmask(0x0, &(0x7f0000000200)={[0xffdffbdd]}, 0x0, 0x8) prlimit64(0x0, 0x1, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendto$unix(r2, &(0x7f0000000000), 0x0, 0x4010, &(0x7f0000000080)=@abs, 0x6e) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x0, 0x7, 0x3b, 0x0, 0x4, @mcast2, @mcast2, 0x20, 0x7, 0x5, 0xc}}) r3 = socket(0x1, 0x3, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x5411, 0x0) mlockall(0x2) bind$inet(r3, 0x0, 0x0) poll(0x0, 0x0, 0x64) rt_sigreturn() write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000280)={0x30, 0x5, 0x0, {0x0, 0x4, 0x1, 0x2}}, 0x30) r4 = msgget$private(0x0, 0x0) msgrcv(r4, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r4, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) write$P9_RMKNOD(0xffffffffffffffff, 0x0, 0x0) 921.437451ms ago: executing program 1 (id=2592): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, r1, 0x1, 0x70bd2a, 0x25dfdbfb}, 0x14}}, 0x4040824) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440), r0) syz_genetlink_get_family_id$gtp(&(0x7f00000008c0), r0) 711.91506ms ago: executing program 1 (id=2593): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = io_uring_setup(0x168e, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) 235.606617ms ago: executing program 1 (id=2594): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = getpid() r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'syztnl0\x00', 0x0, 0x29, 0x1, 0x7, 0x0, 0x4, @empty, @loopback, 0x700, 0x1, 0x3}}) 57.196579ms ago: executing program 1 (id=2595): ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000080)={0x1, 0x1, 0x1, 0x9}) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = epoll_create(0x5) creat(0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) fsetxattr$security_evm(r0, &(0x7f0000000080), 0x0, 0x0, 0x0) 0s ago: executing program 1 (id=2596): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1}, 0x18) connect$can_j1939(r0, &(0x7f0000000140)={0x1d, r1, 0x0, {0x0, 0xff}}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)='data', 0x62}}, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) kernel console output (not intermixed with test programs): [ 49.746379][ T31] audit: type=1400 audit(49.670:68): avc: denied { read write } for pid=3105 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 49.765517][ T31] audit: type=1400 audit(49.680:69): avc: denied { open } for pid=3105 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:53378' (ED25519) to the list of known hosts. [ 60.012110][ T31] audit: type=1400 audit(59.920:70): avc: denied { name_bind } for pid=3106 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 61.496906][ T31] audit: type=1400 audit(61.420:71): avc: denied { execute } for pid=3108 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 61.526277][ T31] audit: type=1400 audit(61.440:72): avc: denied { execute_no_trans } for pid=3108 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.093938][ T31] audit: type=1400 audit(66.020:73): avc: denied { mounton } for pid=3108 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.099051][ T31] audit: type=1400 audit(66.030:74): avc: denied { mount } for pid=3108 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.114767][ T3108] cgroup: Unknown subsys name 'net' [ 66.122976][ T31] audit: type=1400 audit(66.050:75): avc: denied { unmount } for pid=3108 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.336438][ T3108] cgroup: Unknown subsys name 'hugetlb' [ 66.337712][ T3108] cgroup: Unknown subsys name 'rlimit' [ 66.625383][ T31] audit: type=1400 audit(66.550:76): avc: denied { setattr } for pid=3108 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.629739][ T31] audit: type=1400 audit(66.560:77): avc: denied { mounton } for pid=3108 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.631256][ T31] audit: type=1400 audit(66.560:78): avc: denied { mount } for pid=3108 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.864232][ T3110] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 66.866826][ T31] audit: type=1400 audit(66.790:79): avc: denied { relabelto } for pid=3110 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.867982][ T31] audit: type=1400 audit(66.800:80): avc: denied { write } for pid=3110 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 66.897000][ T31] audit: type=1400 audit(66.820:81): avc: denied { read } for pid=3108 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.897811][ T31] audit: type=1400 audit(66.820:82): avc: denied { open } for pid=3108 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 72.506926][ T3108] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 74.243813][ T31] audit: type=1400 audit(74.170:83): avc: denied { execmem } for pid=3111 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 74.304664][ T31] audit: type=1400 audit(74.230:84): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 74.316716][ T31] audit: type=1400 audit(74.240:85): avc: denied { mount } for pid=3113 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 74.317600][ T31] audit: type=1400 audit(74.240:86): avc: denied { read } for pid=3113 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.318254][ T31] audit: type=1400 audit(74.240:87): avc: denied { open } for pid=3113 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 74.320485][ T31] audit: type=1400 audit(74.250:88): avc: denied { mounton } for pid=3113 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 74.342777][ T31] audit: type=1400 audit(74.270:89): avc: denied { module_request } for pid=3113 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 74.456617][ T31] audit: type=1400 audit(74.380:90): avc: denied { sys_module } for pid=3113 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.216609][ T31] audit: type=1400 audit(75.140:91): avc: denied { ioctl } for pid=3113 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.254024][ T3113] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.268064][ T3113] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 76.478266][ T3114] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 76.485582][ T3114] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.423069][ T3113] hsr_slave_0: entered promiscuous mode [ 77.428160][ T3113] hsr_slave_1: entered promiscuous mode [ 77.513263][ T3114] hsr_slave_0: entered promiscuous mode [ 77.519093][ T3114] hsr_slave_1: entered promiscuous mode [ 77.520691][ T3114] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 77.521150][ T3114] Cannot create hsr debugfs directory [ 77.960546][ T31] audit: type=1400 audit(77.890:92): avc: denied { create } for pid=3113 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 77.974660][ T3113] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 77.996756][ T3113] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.012144][ T3113] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.026789][ T3113] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 78.078837][ T3114] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.085578][ T3114] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.094567][ T3114] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.105575][ T3114] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 78.672966][ T3113] 8021q: adding VLAN 0 to HW filter on device bond0 [ 78.779316][ T3114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.881265][ T3114] veth0_vlan: entered promiscuous mode [ 81.892435][ T3114] veth1_vlan: entered promiscuous mode [ 81.957185][ T3114] veth0_macvtap: entered promiscuous mode [ 81.971823][ T3114] veth1_macvtap: entered promiscuous mode [ 82.034623][ T3114] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.035439][ T3114] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.037277][ T3114] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.037630][ T3114] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.176907][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 82.177016][ T31] audit: type=1400 audit(82.100:95): avc: denied { mount } for pid=3114 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 82.178076][ T31] audit: type=1400 audit(82.100:96): avc: denied { mounton } for pid=3114 comm="syz-executor" path="/syzkaller.ifvAIP/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 82.178847][ T31] audit: type=1400 audit(82.100:97): avc: denied { mount } for pid=3114 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 82.196539][ T31] audit: type=1400 audit(82.120:98): avc: denied { unmount } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 82.199511][ T31] audit: type=1400 audit(82.130:99): avc: denied { mounton } for pid=3114 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 82.208326][ T31] audit: type=1400 audit(82.130:100): avc: denied { mount } for pid=3114 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 82.230329][ T3113] veth0_vlan: entered promiscuous mode [ 82.278829][ T3113] veth1_vlan: entered promiscuous mode [ 82.343171][ T3113] veth0_macvtap: entered promiscuous mode [ 82.355016][ T3113] veth1_macvtap: entered promiscuous mode [ 82.377131][ T31] audit: type=1400 audit(82.300:101): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 82.377618][ T31] audit: type=1400 audit(82.300:102): avc: denied { open } for pid=3114 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 82.378022][ T31] audit: type=1400 audit(82.300:103): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 82.447475][ T3113] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.447784][ T3113] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.447974][ T3113] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.448172][ T3113] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.841168][ T31] audit: type=1400 audit(83.770:104): avc: denied { unmount } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 84.158906][ T3815] lo: entered promiscuous mode [ 84.160600][ T3814] lo: left promiscuous mode [ 84.362206][ T3819] syzkaller0: entered promiscuous mode [ 84.363002][ T3819] syzkaller0: entered allmulticast mode [ 85.978281][ T3847] serio: Serial port pts0 [ 88.358101][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 88.358220][ T31] audit: type=1400 audit(88.290:125): avc: denied { create } for pid=3867 comm="syz.0.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 88.450642][ T31] audit: type=1400 audit(88.380:126): avc: denied { prog_load } for pid=3869 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 88.451490][ T31] audit: type=1400 audit(88.380:127): avc: denied { bpf } for pid=3869 comm="syz.0.23" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 88.500296][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.501029][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.501393][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x2 [ 88.501750][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.502151][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.505535][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.506783][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.507282][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.507649][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.508093][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.508485][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.509023][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.509380][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.510159][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.510614][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.511126][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.511539][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.511911][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.512536][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.513130][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.513531][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.514018][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.514418][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.515013][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.517042][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.517503][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.517928][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.518565][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.519137][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.519826][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.520294][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.520721][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 88.521131][ T717] hid-generic 0000:0000:0000.0001: unknown main item tag 0x1 [ 88.537997][ T717] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 88.866493][ T31] audit: type=1400 audit(88.790:128): avc: denied { create } for pid=3881 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 89.010559][ T31] audit: type=1400 audit(88.940:129): avc: denied { perfmon } for pid=3884 comm="syz.1.26" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 89.027520][ T31] audit: type=1400 audit(88.960:130): avc: denied { prog_run } for pid=3884 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.041073][ T31] audit: type=1400 audit(88.970:131): avc: denied { map_create } for pid=3884 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 89.041891][ T31] audit: type=1400 audit(88.970:132): avc: denied { map_read map_write } for pid=3884 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 91.263775][ T31] audit: type=1400 audit(91.190:133): avc: denied { create } for pid=3901 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 91.355663][ T31] audit: type=1400 audit(91.270:134): avc: denied { bind } for pid=3901 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 93.857652][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 93.857766][ T31] audit: type=1400 audit(93.790:140): avc: denied { create } for pid=3915 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 93.991744][ T31] audit: type=1400 audit(93.910:141): avc: denied { write } for pid=3915 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 103.906595][ T31] audit: type=1400 audit(103.830:142): avc: denied { create } for pid=3968 comm="syz.0.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 105.009645][ T31] audit: type=1400 audit(104.940:143): avc: denied { mount } for pid=3982 comm="syz.1.59" name="/" dev="ramfs" ino=3156 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 105.022516][ T31] audit: type=1400 audit(104.940:144): avc: denied { bind } for pid=3982 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 105.752066][ T31] audit: type=1400 audit(105.680:145): avc: denied { accept } for pid=3994 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 105.762206][ T31] audit: type=1400 audit(105.690:146): avc: denied { read } for pid=3994 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 106.404374][ T31] audit: type=1400 audit(106.330:147): avc: denied { write } for pid=3988 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 109.377265][ T31] audit: type=1400 audit(109.300:148): avc: denied { write } for pid=4029 comm="syz.0.80" path="socket:[2842]" dev="sockfs" ino=2842 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 112.289817][ T31] audit: type=1400 audit(112.220:149): avc: denied { create } for pid=4093 comm="syz.0.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 117.436470][ T31] audit: type=1400 audit(117.360:150): avc: denied { execute } for pid=4151 comm="syz.0.130" path=2F6D656D66643AFF2D02C195386FF2466ACC4B870E3A13BED54E49C46A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=1029 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 117.447675][ T31] audit: type=1400 audit(117.370:151): avc: denied { name_bind } for pid=4152 comm="syz.1.131" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 117.851119][ T31] audit: type=1400 audit(117.780:152): avc: denied { read } for pid=4161 comm="syz.0.135" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 117.857286][ T31] audit: type=1400 audit(117.780:153): avc: denied { open } for pid=4161 comm="syz.0.135" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 117.973099][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 121.848000][ T31] audit: type=1400 audit(121.780:154): avc: denied { watch watch_reads } for pid=4216 comm="syz.1.160" path="/92/control" dev="tmpfs" ino=554 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 121.858015][ T31] audit: type=1400 audit(121.790:155): avc: denied { block_suspend } for pid=4216 comm="syz.1.160" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 125.293616][ T4262] netlink: 8 bytes leftover after parsing attributes in process `syz.0.174'. [ 126.015451][ T31] audit: type=1400 audit(125.940:156): avc: denied { ioctl } for pid=4267 comm="syz.0.180" path="socket:[4347]" dev="sockfs" ino=4347 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 127.704900][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 127.865112][ T31] audit: type=1400 audit(127.790:157): avc: denied { ioctl } for pid=4276 comm="syz.1.184" path="socket:[3680]" dev="sockfs" ino=3680 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 133.542004][ T4325] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 133.553116][ T31] audit: type=1400 audit(133.480:158): avc: denied { getopt } for pid=4324 comm="syz.0.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 133.564263][ T31] audit: type=1400 audit(133.490:159): avc: denied { setopt } for pid=4324 comm="syz.0.202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 136.038200][ T4347] Zero length message leads to an empty skb [ 140.605140][ T31] audit: type=1400 audit(140.530:160): avc: denied { create } for pid=4384 comm="syz.0.224" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 140.616599][ T31] audit: type=1400 audit(140.540:161): avc: denied { map } for pid=4384 comm="syz.0.224" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3855 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 140.619570][ T31] audit: type=1400 audit(140.550:162): avc: denied { read write } for pid=4384 comm="syz.0.224" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3855 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 146.172086][ T4420] serio: Serial port pts0 [ 146.426858][ T4423] serio: Serial port pts1 [ 148.147307][ T4437] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 160.242196][ T31] audit: type=1400 audit(160.170:163): avc: denied { getattr } for pid=4503 comm="syz.1.259" path="net:[4026532756]" dev="nsfs" ino=4026532756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 163.528106][ T4517] serio: Serial port pts0 [ 170.356900][ T31] audit: type=1400 audit(170.280:164): avc: denied { getopt } for pid=4549 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 173.469232][ T31] audit: type=1400 audit(173.400:165): avc: denied { rename } for pid=4566 comm="syz.1.278" name="file1" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 174.513249][ T4583] serio: Serial port pts0 [ 176.184720][ T31] audit: type=1400 audit(176.110:166): avc: denied { create } for pid=4595 comm="syz.0.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 176.193079][ T31] audit: type=1400 audit(176.120:167): avc: denied { write } for pid=4595 comm="syz.0.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 176.719978][ T31] audit: type=1400 audit(176.650:168): avc: denied { ioctl } for pid=4595 comm="syz.0.284" path="socket:[5006]" dev="sockfs" ino=5006 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 179.276759][ T4625] serio: Serial port pts0 [ 181.007402][ T47] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 181.187056][ T47] usb 1-1: Using ep0 maxpacket: 8 [ 181.197034][ T47] usb 1-1: New USB device found, idVendor=04dd, idProduct=8004, bcdDevice=71.e6 [ 181.197544][ T47] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 181.207190][ T47] usb 1-1: config 0 descriptor?? [ 181.221688][ T47] usb 1-1: bad CDC descriptors [ 181.421182][ T3792] usb 1-1: USB disconnect, device number 2 [ 184.820022][ T31] audit: type=1400 audit(184.750:169): avc: denied { ioctl } for pid=4662 comm="syz.1.298" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 194.586501][ T4741] serio: Serial port pts1 [ 196.261909][ T4755] serio: Serial port pts0 [ 212.443710][ T4828] serio: Serial port pts0 [ 214.128093][ T31] audit: type=1400 audit(214.060:170): avc: denied { write } for pid=4842 comm="syz.0.350" name="ip6_tables_targets" dev="proc" ino=4026532726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 217.390901][ T31] audit: type=1400 audit(217.320:171): avc: denied { ioctl } for pid=4864 comm="syz.1.355" path="socket:[5478]" dev="sockfs" ino=5478 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 218.159073][ T31] audit: type=1400 audit(218.090:172): avc: denied { connect } for pid=4878 comm="syz.1.359" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 218.196563][ T50] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 218.386833][ T50] usb 1-1: Using ep0 maxpacket: 32 [ 218.414350][ T50] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 32 [ 218.444872][ T50] usb 1-1: New USB device found, idVendor=0499, idProduct=1010, bcdDevice= 5.f5 [ 218.445492][ T50] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 218.446318][ T50] usb 1-1: Product: syz [ 218.446544][ T50] usb 1-1: Manufacturer: syz [ 218.446763][ T50] usb 1-1: SerialNumber: syz [ 218.452032][ T50] usb 1-1: config 0 descriptor?? [ 218.474414][ T4872] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 218.483581][ T50] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 218.707462][ T115] usb 1-1: USB disconnect, device number 3 [ 221.479866][ T31] audit: type=1400 audit(221.410:173): avc: denied { read } for pid=4920 comm="syz.0.366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 221.497228][ T31] audit: type=1400 audit(221.420:174): avc: denied { write } for pid=4920 comm="syz.0.366" path="socket:[6435]" dev="sockfs" ino=6435 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 226.165393][ T31] audit: type=1400 audit(226.090:175): avc: denied { read } for pid=4966 comm="syz.1.378" path="socket:[5556]" dev="sockfs" ino=5556 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 226.376915][ T115] usb 1-1: new full-speed USB device number 4 using dummy_hcd [ 226.568934][ T115] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 226.569614][ T115] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 226.570183][ T115] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x2 has an invalid bInterval 0, changing to 10 [ 226.570553][ T115] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 226.570935][ T115] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 226.572360][ T115] usb 1-1: New USB device found, idVendor=1b96, idProduct=000a, bcdDevice= 0.00 [ 226.573061][ T115] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 226.577368][ T115] usb 1-1: config 0 descriptor?? [ 227.007525][ T115] ntrig 0003:1B96:000A.0002: hidraw0: USB HID v0.00 Device [HID 1b96:000a] on usb-dummy_hcd.0-1/input0 [ 227.282575][ T115] usb 1-1: USB disconnect, device number 4 [ 227.369730][ T31] audit: type=1400 audit(227.300:176): avc: denied { sqpoll } for pid=4987 comm="syz.0.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 228.844985][ T4997] syz.0.380 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 233.863429][ T31] audit: type=1400 audit(233.790:177): avc: denied { create } for pid=5036 comm="syz.1.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 233.901536][ T31] audit: type=1400 audit(233.810:178): avc: denied { bind } for pid=5036 comm="syz.1.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 234.395735][ T31] audit: type=1400 audit(234.320:179): avc: denied { accept } for pid=5036 comm="syz.1.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 234.397191][ T31] audit: type=1400 audit(234.330:180): avc: denied { ioctl } for pid=5036 comm="syz.1.393" path="socket:[5640]" dev="sockfs" ino=5640 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 234.407836][ T31] audit: type=1400 audit(234.340:181): avc: denied { setopt } for pid=5036 comm="syz.1.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 234.836579][ T31] audit: type=1400 audit(234.760:182): avc: denied { create } for pid=5047 comm="syz.0.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 234.838025][ T31] audit: type=1400 audit(234.760:183): avc: denied { bind } for pid=5047 comm="syz.0.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 234.850766][ T31] audit: type=1400 audit(234.780:184): avc: denied { listen } for pid=5047 comm="syz.0.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 234.851967][ T31] audit: type=1400 audit(234.780:185): avc: denied { accept } for pid=5047 comm="syz.0.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 235.776108][ T31] audit: type=1400 audit(235.700:186): avc: denied { connect } for pid=5054 comm="syz.1.399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 243.748428][ T5092] serio: Serial port pts0 [ 247.994930][ T5127] serio: Serial port pts0 [ 248.087333][ T5132] serio: Serial port pts1 [ 249.956135][ T31] audit: type=1400 audit(249.870:187): avc: denied { create } for pid=5150 comm="syz.0.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 249.982768][ T31] audit: type=1400 audit(249.900:188): avc: denied { write } for pid=5150 comm="syz.0.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 250.003125][ T31] audit: type=1400 audit(249.930:189): avc: denied { read } for pid=5150 comm="syz.0.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 250.653870][ T31] audit: type=1400 audit(250.570:190): avc: denied { getopt } for pid=5150 comm="syz.0.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 250.751025][ T31] audit: type=1400 audit(250.680:191): avc: denied { create } for pid=5150 comm="syz.0.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 250.777283][ T31] audit: type=1400 audit(250.700:192): avc: denied { setopt } for pid=5150 comm="syz.0.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 258.462887][ T31] audit: type=1400 audit(258.390:193): avc: denied { getopt } for pid=5175 comm="syz.1.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 270.619612][ T5241] input: syz1 as /devices/virtual/input/input3 [ 294.983382][ T5252] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 294.992245][ T5252] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 295.349299][ T31] audit: type=1400 audit(295.280:194): avc: denied { read } for pid=5447 comm="syz.1.457" path="socket:[6891]" dev="sockfs" ino=6891 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 295.626324][ T31] audit: type=1400 audit(295.550:195): avc: denied { ioctl } for pid=5480 comm="syz.1.460" path="socket:[6082]" dev="sockfs" ino=6082 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 295.932377][ T5252] hsr_slave_0: entered promiscuous mode [ 295.933692][ T5252] hsr_slave_1: entered promiscuous mode [ 295.934532][ T5252] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 295.934747][ T5252] Cannot create hsr debugfs directory [ 296.166762][ T5252] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 296.218669][ T5252] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 296.275327][ T5252] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 296.327046][ T5252] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 296.430133][ T5252] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 296.434971][ T5252] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 296.441792][ T5252] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 296.447492][ T5252] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 297.148953][ T5252] 8021q: adding VLAN 0 to HW filter on device bond0 [ 299.764557][ T5252] veth0_vlan: entered promiscuous mode [ 299.779666][ T5252] veth1_vlan: entered promiscuous mode [ 299.814375][ T5252] veth0_macvtap: entered promiscuous mode [ 299.823799][ T5252] veth1_macvtap: entered promiscuous mode [ 299.853175][ T5252] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.853456][ T5252] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.853653][ T5252] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.853846][ T5252] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 304.046302][ T5675] serio: Serial port pts0 [ 315.184097][ T5742] serio: Serial port pts0 [ 322.149993][ T5763] serio: Serial port pts0 [ 324.613323][ T5775] serio: Serial port pts0 [ 326.265499][ T5784] serio: Serial port pts0 [ 328.018487][ T5802] serio: Serial port pts0 [ 329.580132][ T5808] input: syz0 as /devices/virtual/input/input4 [ 343.283462][ T5819] input: syz0 as /devices/virtual/input/input5 [ 355.768585][ T31] audit: type=1400 audit(355.700:196): avc: denied { write } for pid=5834 comm="syz.1.515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 356.418903][ T5841] serio: Serial port pts0 [ 358.916869][ T5072] usb 2-1: new low-speed USB device number 2 using dummy_hcd [ 359.114076][ T5072] usb 2-1: config 1 interface 0 altsetting 251 endpoint 0x81 has invalid maxpacket 512, setting to 8 [ 359.114857][ T5072] usb 2-1: config 1 interface 0 altsetting 251 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 359.115384][ T5072] usb 2-1: config 1 interface 0 has no altsetting 0 [ 359.157818][ T5072] usb 2-1: string descriptor 0 read error: -22 [ 359.158957][ T5072] usb 2-1: New USB device found, idVendor=09da, idProduct=0006, bcdDevice= 0.40 [ 359.159479][ T5072] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 359.178121][ T5849] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 359.179325][ T5849] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 359.199513][ T5072] usbhid 2-1:1.0: can't add hid device: -22 [ 359.200171][ T5072] usbhid 2-1:1.0: probe with driver usbhid failed with error -22 [ 360.191206][ T5072] usb 2-1: USB disconnect, device number 2 [ 363.667462][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 364.806964][ T5876] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 368.106621][ T31] audit: type=1400 audit(368.030:197): avc: denied { mounton } for pid=5903 comm="syz.1.527" path="/proc/726/task" dev="proc" ino=8502 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 369.385360][ T5911] serio: Serial port pts0 [ 371.105470][ T5918] serio: Serial port pts0 [ 372.838266][ T5927] serio: Serial port pts0 [ 373.872387][ T1058] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 373.912254][ T1058] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 373.969255][ T1058] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 374.027644][ T1058] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 374.301082][ T1058] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 374.311896][ T1058] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 374.324989][ T1058] bond0 (unregistering): Released all slaves [ 374.414797][ T1058] hsr_slave_0: left promiscuous mode [ 374.430811][ T1058] hsr_slave_1: left promiscuous mode [ 374.443735][ T1058] veth1_macvtap: left promiscuous mode [ 374.444577][ T1058] veth0_macvtap: left promiscuous mode [ 374.445157][ T1058] veth1_vlan: left promiscuous mode [ 374.456608][ T1058] veth0_vlan: left promiscuous mode [ 376.909433][ T5935] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 376.914395][ T5935] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 377.798688][ T5935] hsr_slave_0: entered promiscuous mode [ 377.802013][ T5935] hsr_slave_1: entered promiscuous mode [ 377.803738][ T5935] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 377.804055][ T5935] Cannot create hsr debugfs directory [ 378.438932][ T5935] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 378.459955][ T5935] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 378.473437][ T5935] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 378.498957][ T5935] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 379.511719][ T5935] 8021q: adding VLAN 0 to HW filter on device bond0 [ 380.626955][ T6321] serio: Serial port pts0 [ 382.917228][ T31] audit: type=1400 audit(382.840:198): avc: denied { connect } for pid=6360 comm="syz.1.536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 383.009969][ T6364] serio: Serial port pts0 [ 383.294399][ T5935] veth0_vlan: entered promiscuous mode [ 383.321099][ T5935] veth1_vlan: entered promiscuous mode [ 383.392204][ T5935] veth0_macvtap: entered promiscuous mode [ 383.413214][ T5935] veth1_macvtap: entered promiscuous mode [ 383.485724][ T5935] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 383.486449][ T5935] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 383.486905][ T5935] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 383.487314][ T5935] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 384.658884][ T31] audit: type=1400 audit(384.590:199): avc: denied { rename } for pid=6381 comm="syz.1.538" name="file0" dev="tmpfs" ino=1671 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 384.681890][ T31] audit: type=1400 audit(384.610:200): avc: denied { unlink } for pid=3114 comm="syz-executor" name="file0" dev="tmpfs" ino=1671 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 386.961768][ T6399] serio: Serial port pts0 [ 388.351395][ T6409] serio: Serial port pts1 [ 389.274815][ T6420] serio: Serial port pts0 [ 391.147127][ T6440] serio: Serial port pts0 [ 391.922049][ T31] audit: type=1400 audit(391.850:201): avc: denied { create } for pid=6449 comm="syz.1.555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 392.038313][ T6452] serio: Serial port pts1 [ 394.110058][ T31] audit: type=1400 audit(394.040:202): avc: denied { create } for pid=6476 comm="syz.1.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 394.119765][ T31] audit: type=1400 audit(394.050:203): avc: denied { write } for pid=6476 comm="syz.1.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 397.046241][ C0] hrtimer: interrupt took 580896 ns [ 398.692282][ T6512] netlink: 20 bytes leftover after parsing attributes in process `syz.1.571'. [ 400.491013][ T6523] input: syz1 as /devices/virtual/input/input6 [ 404.078649][ T31] audit: type=1400 audit(404.010:204): avc: denied { create } for pid=6536 comm="syz.0.579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 405.964976][ T6544] serio: Serial port pts0 [ 407.663221][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 408.083928][ T31] audit: type=1400 audit(408.010:205): avc: denied { map } for pid=6560 comm="syz.0.588" path="/dev/dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 408.090080][ T31] audit: type=1400 audit(408.020:206): avc: denied { ioctl } for pid=6560 comm="syz.0.588" path="socket:[8165]" dev="sockfs" ino=8165 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 420.044123][ T6600] serio: Serial port pts0 [ 425.550466][ T6614] input: syz0 as /devices/virtual/input/input7 [ 434.424895][ T6621] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 434.438574][ T6621] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 435.411892][ T6621] hsr_slave_0: entered promiscuous mode [ 435.415646][ T6621] hsr_slave_1: entered promiscuous mode [ 435.427274][ T6621] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 435.427815][ T6621] Cannot create hsr debugfs directory [ 435.814195][ T6621] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 435.884113][ T6621] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 435.961250][ T6621] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 436.019699][ T6621] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 436.192572][ T6621] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 436.217462][ T6621] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 436.232439][ T6621] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 436.250310][ T6621] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 437.427763][ T6621] 8021q: adding VLAN 0 to HW filter on device bond0 [ 442.282795][ T6621] veth0_vlan: entered promiscuous mode [ 442.323289][ T6621] veth1_vlan: entered promiscuous mode [ 442.447624][ T6621] veth0_macvtap: entered promiscuous mode [ 442.465325][ T6621] veth1_macvtap: entered promiscuous mode [ 442.549534][ T6621] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 442.550073][ T6621] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 442.550392][ T6621] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 442.550715][ T6621] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 443.447585][ T1058] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 443.470423][ T1058] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 443.489470][ T1058] bond0 (unregistering): Released all slaves [ 443.566472][ T1058] hsr_slave_0: left promiscuous mode [ 443.573673][ T1058] hsr_slave_1: left promiscuous mode [ 443.584146][ T1058] veth1_macvtap: left promiscuous mode [ 443.584430][ T1058] veth0_macvtap: left promiscuous mode [ 443.584636][ T1058] veth1_vlan: left promiscuous mode [ 443.584882][ T1058] veth0_vlan: left promiscuous mode [ 452.790281][ T7000] serio: Serial port pts0 [ 457.932058][ T7018] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 457.940021][ T7018] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 459.214486][ T7018] hsr_slave_0: entered promiscuous mode [ 459.219744][ T7018] hsr_slave_1: entered promiscuous mode [ 459.224752][ T7018] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 459.225308][ T7018] Cannot create hsr debugfs directory [ 459.484286][ T7018] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 459.559184][ T7018] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 459.630290][ T7018] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 459.714188][ T7018] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 459.849202][ T7018] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 459.857876][ T7018] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 459.865670][ T7018] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 459.877360][ T7018] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 460.529468][ T7018] 8021q: adding VLAN 0 to HW filter on device bond0 [ 462.301478][ T7365] serio: Serial port pts0 [ 462.589002][ T3561] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 462.592955][ T3561] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 462.594751][ T3561] bond0 (unregistering): Released all slaves [ 462.660890][ T3561] hsr_slave_0: left promiscuous mode [ 462.662649][ T3561] hsr_slave_1: left promiscuous mode [ 462.666389][ T3561] veth1_macvtap: left promiscuous mode [ 462.666642][ T3561] veth0_macvtap: left promiscuous mode [ 462.666971][ T3561] veth1_vlan: left promiscuous mode [ 462.667185][ T3561] veth0_vlan: left promiscuous mode [ 463.843833][ T7018] veth0_vlan: entered promiscuous mode [ 463.861021][ T7018] veth1_vlan: entered promiscuous mode [ 463.918671][ T7018] veth0_macvtap: entered promiscuous mode [ 463.924211][ T7018] veth1_macvtap: entered promiscuous mode [ 463.962016][ T7018] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 463.962504][ T7018] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 463.962905][ T7018] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 463.963195][ T7018] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 464.024334][ T7388] serio: Serial port pts0 [ 466.314992][ T7404] serio: Serial port pts0 [ 468.761299][ T31] audit: type=1400 audit(468.690:207): avc: denied { write } for pid=7427 comm="syz.0.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 468.970278][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 471.851089][ T7451] input: syz1 as /devices/virtual/input/input8 [ 482.732754][ T7481] serio: Serial port pts0 [ 488.469334][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 488.672181][ T7506] serio: Serial port pts0 [ 490.299120][ T7513] serio: Serial port pts0 [ 499.863854][ T7552] serio: Serial port pts0 [ 501.686947][ T31] audit: type=1400 audit(501.610:208): avc: denied { write } for pid=7563 comm="syz.1.669" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 501.689222][ T31] audit: type=1400 audit(501.610:209): avc: denied { remove_name } for pid=7563 comm="syz.1.669" name="binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 501.690013][ T31] audit: type=1400 audit(501.610:210): avc: denied { unlink } for pid=7563 comm="syz.1.669" name="binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 501.691167][ T31] audit: type=1400 audit(501.620:211): avc: denied { getopt } for pid=7563 comm="syz.1.669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 501.702194][ T7566] netlink: 24 bytes leftover after parsing attributes in process `syz.1.669'. [ 503.611926][ T7564] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 503.621985][ T7564] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 504.530719][ T3561] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 504.593340][ T3561] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 504.645193][ T3561] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 504.712410][ T3561] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 504.744732][ T7564] hsr_slave_0: entered promiscuous mode [ 504.750063][ T7564] hsr_slave_1: entered promiscuous mode [ 504.754302][ T7564] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 504.754682][ T7564] Cannot create hsr debugfs directory [ 504.992518][ T3561] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 504.997007][ T3561] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 505.001408][ T3561] bond0 (unregistering): Released all slaves [ 505.068166][ T3561] hsr_slave_0: left promiscuous mode [ 505.070573][ T3561] hsr_slave_1: left promiscuous mode [ 505.076729][ T3561] veth1_macvtap: left promiscuous mode [ 505.077181][ T3561] veth0_macvtap: left promiscuous mode [ 505.077668][ T3561] veth1_vlan: left promiscuous mode [ 505.081442][ T3561] veth0_vlan: left promiscuous mode [ 506.054304][ T7564] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 506.067683][ T7564] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 506.074662][ T7564] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 506.088020][ T7564] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 506.761815][ T7564] 8021q: adding VLAN 0 to HW filter on device bond0 [ 506.890525][ T31] audit: type=1400 audit(506.810:212): avc: denied { connect } for pid=7944 comm="syz.1.675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 506.891325][ T31] audit: type=1400 audit(506.820:213): avc: denied { write } for pid=7944 comm="syz.1.675" path="socket:[11103]" dev="sockfs" ino=11103 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 507.029504][ T7949] serio: Serial port pts0 [ 508.922849][ T7564] veth0_vlan: entered promiscuous mode [ 508.942300][ T7564] veth1_vlan: entered promiscuous mode [ 509.009897][ T7564] veth0_macvtap: entered promiscuous mode [ 509.020143][ T7564] veth1_macvtap: entered promiscuous mode [ 509.070109][ T7564] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 509.070969][ T7564] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 509.071724][ T7564] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 509.072268][ T7564] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 512.726505][ T7998] serio: Serial port pts0 [ 517.673648][ T8025] serio: Serial port pts0 [ 518.259175][ T8031] EXT4-fs (vda): resizing filesystem from 262144 to 2 blocks [ 518.259661][ T8031] EXT4-fs warning (device vda): ext4_resize_fs:2041: can't shrink FS - resize aborted [ 520.446884][ T8051] serio: Serial port pts0 [ 523.733941][ T31] audit: type=1400 audit(523.660:214): avc: denied { write } for pid=8073 comm="syz.1.700" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 523.836391][ T8076] serio: Serial port pts0 [ 526.698712][ T8097] input: syz1 as /devices/virtual/input/input9 [ 527.213524][ T8102] syz.1.706[8102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.214063][ T8102] syz.1.706[8102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 530.769571][ T8117] serio: Serial port pts0 [ 542.742815][ T8161] serio: Serial port pts0 [ 544.334654][ T8168] serio: Serial port pts0 [ 546.281106][ T8177] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8177 comm=syz.1.723 [ 549.561580][ T8188] serio: Serial port pts0 [ 551.700429][ T31] audit: type=1400 audit(551.630:215): avc: denied { connect } for pid=8194 comm="syz.1.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 552.203258][ T31] audit: type=1400 audit(552.130:216): avc: denied { listen } for pid=8194 comm="syz.1.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 553.490711][ T31] audit: type=1400 audit(553.420:217): avc: denied { accept } for pid=8210 comm="syz.1.730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 553.688113][ T8216] serio: Serial port pts0 [ 556.211033][ T8230] serio: Serial port pts0 [ 557.018301][ T8239] serio: Serial port pts1 [ 558.665315][ T31] audit: type=1400 audit(558.590:218): avc: denied { ioctl } for pid=8256 comm="syz.0.740" path="socket:[12434]" dev="sockfs" ino=12434 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 559.377939][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 563.977765][ T8308] serio: Serial port pts0 [ 569.533138][ T31] audit: type=1400 audit(569.460:219): avc: denied { write } for pid=8345 comm="syz.0.765" laddr=127.0.0.1 lport=256 faddr=127.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 571.549257][ T8355] serio: Serial port pts0 [ 577.947833][ T8372] serio: Serial port pts0 [ 582.402361][ T8390] serio: Serial port pts1 [ 585.554572][ T31] audit: type=1400 audit(585.480:220): avc: denied { ioctl } for pid=8410 comm="syz.0.782" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 585.557108][ T31] audit: type=1400 audit(585.480:221): avc: denied { set_context_mgr } for pid=8410 comm="syz.0.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 585.577232][ T31] audit: type=1400 audit(585.500:222): avc: denied { map } for pid=8410 comm="syz.0.782" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 586.091738][ T31] audit: type=1400 audit(586.020:223): avc: denied { call } for pid=8410 comm="syz.0.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 586.569420][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 588.836899][ T8446] serio: Serial port pts0 [ 590.786871][ T8467] serio: Serial port pts0 [ 592.842678][ T8488] serio: Serial port pts0 [ 601.692540][ T8510] serio: Serial port pts1 [ 603.324958][ T31] audit: type=1400 audit(603.250:224): avc: denied { create } for pid=8516 comm="syz.0.807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 604.089288][ T31] audit: type=1400 audit(604.020:225): avc: denied { write } for pid=8524 comm="syz.0.810" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 608.301070][ T8541] serio: Serial port pts0 [ 610.555905][ T8555] serio: Serial port pts0 [ 611.540184][ T8560] serio: Serial port pts1 [ 613.238771][ T31] audit: type=1400 audit(613.170:226): avc: denied { read } for pid=8583 comm="syz.0.826" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 613.848871][ T8589] serio: Serial port pts0 [ 614.137000][ T8592] serio: Serial port pts1 [ 617.394203][ T8610] serio: Serial port pts0 [ 623.017178][ T8650] input: syz0 as /devices/virtual/input/input10 [ 624.424614][ T8655] serio: Serial port pts0 [ 628.590620][ T31] audit: type=1400 audit(628.510:227): avc: denied { mounton } for pid=8664 comm="syz.0.845" path="/89/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 631.611716][ T8682] syz.0.850[8682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.612115][ T8682] syz.0.850[8682] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 633.874146][ T31] audit: type=1400 audit(633.800:228): avc: denied { bind } for pid=8691 comm="syz.0.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 633.885064][ T31] audit: type=1400 audit(633.810:229): avc: denied { accept } for pid=8691 comm="syz.0.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 634.993368][ T8697] serio: Serial port pts0 [ 659.460413][ T8722] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 659.518190][ T8722] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 659.680295][ T8894] serio: Serial port pts0 [ 660.630793][ T8722] hsr_slave_0: entered promiscuous mode [ 660.631853][ T8722] hsr_slave_1: entered promiscuous mode [ 660.633491][ T8722] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 660.633714][ T8722] Cannot create hsr debugfs directory [ 660.934784][ T8722] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 661.018905][ T8722] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 661.082279][ T8722] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 661.140578][ T8722] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 661.301313][ T8722] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 661.322447][ T8722] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 661.339404][ T8722] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 661.366861][ T8722] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 661.491905][ T31] audit: type=1400 audit(661.420:230): avc: denied { create } for pid=9057 comm="syz.0.867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 662.394978][ T8722] 8021q: adding VLAN 0 to HW filter on device bond0 [ 664.141305][ T9094] serio: Serial port pts0 [ 665.764434][ T8722] veth0_vlan: entered promiscuous mode [ 665.795868][ T8722] veth1_vlan: entered promiscuous mode [ 665.920526][ T8722] veth0_macvtap: entered promiscuous mode [ 665.943900][ T8722] veth1_macvtap: entered promiscuous mode [ 666.031796][ T8722] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 666.032374][ T8722] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 666.032733][ T8722] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 666.033114][ T8722] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 666.311924][ T9118] serio: Serial port pts0 [ 669.505513][ T1058] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 669.512533][ T1058] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 669.519857][ T1058] bond0 (unregistering): Released all slaves [ 669.605344][ T1058] hsr_slave_0: left promiscuous mode [ 669.611133][ T1058] hsr_slave_1: left promiscuous mode [ 669.619897][ T1058] veth1_macvtap: left promiscuous mode [ 669.620378][ T1058] veth0_macvtap: left promiscuous mode [ 669.620798][ T1058] veth1_vlan: left promiscuous mode [ 669.621369][ T1058] veth0_vlan: left promiscuous mode [ 670.161680][ T9153] serio: Serial port pts0 [ 676.136948][ T9186] input: syz1 as /devices/virtual/input/input13 [ 683.063512][ T9225] syzkaller0: entered promiscuous mode [ 683.063867][ T9225] syzkaller0: entered allmulticast mode [ 684.489368][ T9239] serio: Serial port pts0 [ 686.612500][ T31] audit: type=1400 audit(686.540:231): avc: denied { write } for pid=9245 comm="syz.1.905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 686.854322][ T9248] serio: Serial port pts0 [ 689.618630][ T9259] serio: Serial port pts0 [ 694.103605][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 694.450800][ T9284] netlink: 44378 bytes leftover after parsing attributes in process `syz.0.916'. [ 704.065763][ T9350] serio: Serial port pts0 [ 707.510449][ T9368] serio: Serial port pts0 [ 712.615325][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 712.696691][ T9406] serio: Serial port pts0 [ 718.510082][ T31] audit: type=1400 audit(718.440:232): avc: denied { map } for pid=9436 comm="syz.0.958" path="socket:[14608]" dev="sockfs" ino=14608 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 718.511092][ T31] audit: type=1400 audit(718.440:233): avc: denied { read } for pid=9436 comm="syz.0.958" path="socket:[14608]" dev="sockfs" ino=14608 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 719.723714][ T9443] serio: Serial port pts0 [ 726.476448][ T31] audit: type=1400 audit(726.400:234): avc: denied { create } for pid=9486 comm="syz.1.974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 730.136648][ T9513] serio: Serial port pts0 [ 732.629011][ T9531] serio: Serial port pts0 [ 733.014002][ T9539] serio: Serial port pts1 [ 734.261997][ T9548] serio: Serial port pts0 [ 739.839414][ T9583] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 743.836606][ T31] audit: type=1400 audit(743.760:235): avc: denied { write } for pid=9605 comm="syz.1.1005" path="socket:[15466]" dev="sockfs" ino=15466 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 743.867510][ T31] audit: type=1400 audit(743.760:236): avc: denied { nlmsg_write } for pid=9605 comm="syz.1.1005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 744.115483][ T9610] serio: Serial port pts0 [ 746.355638][ T31] audit: type=1326 audit(746.280:237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9618 comm="syz.0.1010" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x0 [ 748.981421][ T9641] serio: Serial port pts0 [ 751.286329][ T9649] serio: Serial port pts0 [ 757.477341][ T31] audit: type=1400 audit(757.410:238): avc: denied { setopt } for pid=9679 comm="syz.1.1023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 758.038754][ T9686] serio: Serial port pts0 [ 762.943687][ T9717] serio: Serial port pts0 [ 763.511722][ T9721] syz.1.1036[9721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 763.511981][ T9721] syz.1.1036[9721] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 764.286940][ T9727] serio: Serial port pts1 [ 765.243634][ T9733] serio: Serial port pts0 [ 771.079914][ T717] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 771.420168][ T717] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 771.425199][ T717] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 771.437544][ T717] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 771.440991][ T717] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 771.441505][ T717] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 771.485291][ T717] usb 2-1: config 0 descriptor?? [ 771.958558][ T717] plantronics 0003:047F:FFFF.0003: unknown main item tag 0x0 [ 771.979040][ T717] plantronics 0003:047F:FFFF.0003: No inputs registered, leaving [ 772.002416][ T717] plantronics 0003:047F:FFFF.0003: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 774.110571][ T8] usb 2-1: USB disconnect, device number 3 [ 775.039145][ T31] audit: type=1400 audit(774.970:239): avc: denied { unmount } for pid=8722 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 779.027411][ T9793] serio: Serial port pts1 [ 785.716648][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 795.704660][ T31] audit: type=1400 audit(795.630:240): avc: denied { getopt } for pid=9887 comm="syz.1.1078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 795.708545][ T31] audit: type=1400 audit(795.640:241): avc: denied { write } for pid=9887 comm="syz.1.1078" path="socket:[15794]" dev="sockfs" ino=15794 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 812.231741][ T9946] raw_sendmsg: syz.1.1095 forgot to set AF_INET. Fix it! [ 818.991041][ T31] audit: type=1400 audit(818.920:242): avc: denied { bind } for pid=9996 comm="syz.1.1114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 832.235296][ T31] audit: type=1400 audit(832.160:243): avc: denied { create } for pid=10043 comm="syz.0.1130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 836.623890][T10062] input: syz1 as /devices/virtual/input/input15 [ 844.422125][T10103] serio: Serial port pts0 [ 852.452651][ T31] audit: type=1400 audit(852.380:244): avc: denied { accept } for pid=10110 comm="syz.1.1148" lport=54699 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 857.088727][T10129] serio: Serial port pts0 [ 863.026549][T10181] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10181 comm=syz.1.1173 [ 872.424730][ T31] audit: type=1400 audit(872.350:245): avc: denied { setopt } for pid=10209 comm="syz.1.1181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 873.923252][ T31] audit: type=1400 audit(873.850:246): avc: denied { setopt } for pid=10223 comm="syz.0.1186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 875.148103][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 880.667822][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 881.345324][T10288] netlink: 36 bytes leftover after parsing attributes in process `syz.1.1210'. [ 895.826169][ T31] audit: type=1400 audit(895.750:247): avc: denied { bind } for pid=10372 comm="syz.0.1243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 896.238809][T10377] serio: Serial port pts0 [ 903.873942][ T31] audit: type=1400 audit(903.800:248): avc: denied { connect } for pid=10404 comm="syz.1.1253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 911.211713][ T31] audit: type=1400 audit(911.140:249): avc: denied { ioctl } for pid=10445 comm="syz.0.1266" path="socket:[17824]" dev="sockfs" ino=17824 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 915.384269][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 915.822411][ T31] audit: type=1400 audit(915.750:250): avc: denied { execute } for pid=10472 comm="syz.1.1275" path="/selinux/commit_pending_bools" dev="selinuxfs" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=file permissive=1 [ 915.975440][ T31] audit: type=1400 audit(915.900:251): avc: denied { ioctl } for pid=10476 comm="syz.1.1276" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=17057 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 928.232704][T10562] capability: warning: `syz.0.1311' uses deprecated v2 capabilities in a way that may be insecure [ 930.466937][ T31] audit: type=1400 audit(930.390:252): avc: denied { name_bind } for pid=10581 comm="syz.0.1319" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 930.486924][ T31] audit: type=1400 audit(930.410:253): avc: denied { map } for pid=10581 comm="syz.0.1319" path="socket:[17207]" dev="sockfs" ino=17207 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 930.501106][ T31] audit: type=1400 audit(930.410:254): avc: denied { read } for pid=10581 comm="syz.0.1319" path="socket:[17207]" dev="sockfs" ino=17207 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 931.111793][ T115] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 931.129406][ T31] audit: type=1400 audit(931.060:255): avc: denied { remove_name } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 931.141616][ T31] audit: type=1400 audit(931.070:256): avc: denied { rename } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 931.351408][ T115] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 931.354467][ T115] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 931.378340][ T115] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 931.379474][ T115] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 931.379768][ T115] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 931.418448][ T115] usb 1-1: config 0 descriptor?? [ 931.958633][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.959292][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.959633][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.959971][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.960572][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.960996][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.961223][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.961562][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.961842][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.963800][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.976404][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.976697][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.977001][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.977269][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.977502][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.977720][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.977936][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.978168][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.978390][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.978609][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.978827][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.979049][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.979274][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.979505][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.979733][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.980003][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.980234][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.980437][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.980659][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.981106][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.981547][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.982158][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.982963][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.983400][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.983844][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.984347][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.984721][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.985116][ T115] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 931.985800][ T115] plantronics 0003:047F:FFFF.0004: No inputs registered, leaving [ 932.000070][ T115] plantronics 0003:047F:FFFF.0004: hiddev0,hidraw0: USB HID v0.00 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 941.332874][ T31] audit: type=1400 audit(941.260:257): avc: denied { ioctl } for pid=10627 comm="syz.1.1330" path="socket:[18198]" dev="sockfs" ino=18198 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 942.219151][ T4508] usb 1-1: USB disconnect, device number 5 [ 942.558571][ T31] audit: type=1400 audit(942.490:258): avc: denied { write } for pid=10656 comm="syz.1.1336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 971.503958][T10782] can: request_module (can-proto-0) failed. [ 978.571654][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 981.907237][ T31] audit: type=1400 audit(981.840:259): avc: denied { lock } for pid=10869 comm="syz.1.1417" path="socket:[19549]" dev="sockfs" ino=19549 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1018.898567][T11029] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11029 comm=syz.0.1478 [ 1025.851693][ T31] audit: type=1400 audit(1025.780:260): avc: denied { connect } for pid=11065 comm="syz.1.1493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1026.007482][ T31] audit: type=1400 audit(1025.940:261): avc: denied { lock } for pid=11071 comm="syz.1.1495" path="socket:[19901]" dev="sockfs" ino=19901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1032.228498][ T31] audit: type=1400 audit(1032.160:262): avc: denied { setattr } for pid=11101 comm="syz.1.1506" name="nullb0" dev="devtmpfs" ino=669 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1032.963402][T11111] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11111 comm=syz.1.1507 [ 1032.979987][ T31] audit: type=1400 audit(1032.910:263): avc: denied { setopt } for pid=11103 comm="syz.1.1507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1032.987156][T11111] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=11111 comm=syz.1.1507 [ 1043.213556][T11171] process 'syz.1.1531' launched './file1' with NULL argv: empty string added [ 1043.216275][ T31] audit: type=1400 audit(1043.140:264): avc: denied { execute_no_trans } for pid=11170 comm="syz.1.1531" path="/331/file1" dev="tmpfs" ino=1835 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1056.467343][T11241] syz.1.1558 (11241): /proc/11240/oom_adj is deprecated, please use /proc/11240/oom_score_adj instead. [ 1056.485199][ T31] audit: type=1400 audit(1056.410:265): avc: denied { bind } for pid=11240 comm="syz.1.1558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1056.498278][ T31] audit: type=1400 audit(1056.430:266): avc: denied { node_bind } for pid=11240 comm="syz.1.1558" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 1056.507508][ T31] audit: type=1400 audit(1056.440:267): avc: denied { watch } for pid=11240 comm="syz.1.1558" path="/350" dev="tmpfs" ino=1931 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1067.719363][T11275] serio: Serial port pts0 [ 1080.338869][T11315] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11315 comm=syz.0.1584 [ 1080.349088][T11315] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65525 sclass=netlink_route_socket pid=11315 comm=syz.0.1584 [ 1084.348834][ T31] audit: type=1400 audit(1084.280:268): avc: denied { mounton } for pid=11336 comm="syz.0.1593" path="/467/file0" dev="ramfs" ino=20610 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=dir permissive=1 [ 1084.392160][ T31] audit: type=1400 audit(1084.320:269): avc: denied { unmount } for pid=11336 comm="syz.0.1593" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1089.975721][ T31] audit: type=1400 audit(1089.900:270): avc: denied { getopt } for pid=11381 comm="syz.0.1612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1089.982028][ T31] audit: type=1400 audit(1089.910:271): avc: denied { accept } for pid=11381 comm="syz.0.1612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1090.779204][T11391] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11391 comm=syz.0.1615 [ 1101.411129][T11434] serio: Serial port pts0 [ 1102.148807][ T31] audit: type=1400 audit(1102.080:272): avc: denied { create } for pid=11431 comm="syz.1.1631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 1105.303962][ T31] audit: type=1400 audit(1105.230:273): avc: denied { ioctl } for pid=11447 comm="syz.1.1635" path="socket:[21586]" dev="sockfs" ino=21586 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1105.305695][T11448] veth0_vlan: left promiscuous mode [ 1107.944055][T11459] syzkaller0: entered allmulticast mode [ 1120.629770][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1127.068365][T11528] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11528 comm=syz.1.1659 [ 1127.085022][T11528] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=381 sclass=netlink_route_socket pid=11528 comm=syz.1.1659 [ 1151.508529][ T31] audit: type=1400 audit(1151.440:274): avc: denied { listen } for pid=11615 comm="syz.0.1696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 1155.052938][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1168.371836][ T31] audit: type=1400 audit(1168.300:275): avc: denied { connect } for pid=11693 comm="syz.0.1726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1168.372837][ T31] audit: type=1400 audit(1168.300:276): avc: denied { name_connect } for pid=11693 comm="syz.0.1726" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 1177.520551][ T31] audit: type=1326 audit(1177.440:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11728 comm="syz.1.1737" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 1177.521408][ T31] audit: type=1326 audit(1177.440:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11728 comm="syz.1.1737" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 1177.527557][ T31] audit: type=1326 audit(1177.460:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11728 comm="syz.1.1737" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 1177.528557][ T31] audit: type=1326 audit(1177.460:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11728 comm="syz.1.1737" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 1177.529188][ T31] audit: type=1326 audit(1177.460:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11728 comm="syz.1.1737" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 1177.536273][ T31] audit: type=1326 audit(1177.460:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11728 comm="syz.1.1737" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 1177.538679][ T31] audit: type=1326 audit(1177.460:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11728 comm="syz.1.1737" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 1177.563737][ T31] audit: type=1326 audit(1177.460:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11728 comm="syz.1.1737" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 1185.662270][T11757] netlink: 'syz.0.1745': attribute type 27 has an invalid length. [ 1187.670651][T11757] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1187.671195][T11757] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1187.671500][T11757] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1187.671809][T11757] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1188.272451][T11758] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1188.555492][T11758] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1188.575655][T11758] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1188.615373][T11758] veth1_vlan: left promiscuous mode [ 1188.619724][T11758] veth0_vlan: left promiscuous mode [ 1188.620941][T11758] veth0_vlan: entered promiscuous mode [ 1188.623913][T11758] veth1_vlan: entered promiscuous mode [ 1188.660000][T11758] veth1_macvtap: left promiscuous mode [ 1188.674047][T11758] veth0_macvtap: left promiscuous mode [ 1188.675383][T11758] veth0_macvtap: entered promiscuous mode [ 1188.695274][T11758] veth1_macvtap: entered promiscuous mode [ 1188.707987][T11758] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1188.708485][T11758] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1188.708867][T11758] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1188.709320][T11758] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1188.860849][T11758] A link change request failed with some changes committed already. Interface ip6_vti0.0 may have been left with an inconsistent configuration, please check. [ 1195.948506][ T31] audit: type=1400 audit(1195.880:285): avc: denied { listen } for pid=11771 comm="syz.1.1749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1196.550673][T11781] binder: BINDER_SET_CONTEXT_MGR already set [ 1196.551005][T11781] binder: 11780:11781 ioctl 4018620d 20000040 returned -16 [ 1197.146592][ T31] audit: type=1400 audit(1197.070:286): avc: denied { accept } for pid=11788 comm="syz.1.1756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 1206.218866][T11820] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11820 comm=syz.1.1766 [ 1206.234963][T11820] SELinux: Context system_u:object_r:ld_so_t:s0 is not valid (left unmapped). [ 1206.238173][ T31] audit: type=1400 audit(1206.170:287): avc: denied { relabelto } for pid=11819 comm="syz.1.1766" name="mice" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ld_so_t:s0" [ 1206.242056][ T31] audit: type=1400 audit(1206.170:288): avc: denied { associate } for pid=11819 comm="syz.1.1766" name="mice" dev="devtmpfs" ino=710 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:ld_so_t:s0" [ 1212.603703][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 1213.526688][ T31] audit: type=1400 audit(1213.450:289): avc: denied { create } for pid=11856 comm="syz.1.1783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1213.528748][ T31] audit: type=1400 audit(1213.450:290): avc: denied { ioctl } for pid=11856 comm="syz.1.1783" path="socket:[21466]" dev="sockfs" ino=21466 ioctlcmd=0x8980 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1213.530311][ T31] audit: type=1400 audit(1213.450:291): avc: denied { listen } for pid=11856 comm="syz.1.1783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1219.310344][ T31] audit: type=1400 audit(1219.240:292): avc: denied { read } for pid=11886 comm="syz.1.1794" name="mice" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ld_so_t:s0" [ 1219.312610][ T31] audit: type=1400 audit(1219.240:293): avc: denied { open } for pid=11886 comm="syz.1.1794" path="/dev/input/mice" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ld_so_t:s0" [ 1219.756957][T11890] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11890 comm=syz.0.1791 [ 1221.977867][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1266.337397][T12025] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=12025 comm=syz.0.1847 [ 1266.359017][ T31] audit: type=1400 audit(1266.290:294): avc: denied { nlmsg_write } for pid=12024 comm="syz.0.1847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1266.361238][ T31] audit: type=1400 audit(1266.290:295): avc: denied { read } for pid=12024 comm="syz.0.1847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1266.371363][T12025] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=12025 comm=syz.0.1847 [ 1268.026979][ T8351] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 1268.218994][ T8351] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x3 has an invalid bInterval 0, changing to 7 [ 1268.219563][ T8351] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1268.220038][ T8351] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0xF has invalid wMaxPacketSize 0 [ 1268.220458][ T8351] usb 2-1: New USB device found, idVendor=a9cd, idProduct=cdee, bcdDevice= 5.b9 [ 1268.220879][ T8351] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1268.225502][ T8351] usb 2-1: config 0 descriptor?? [ 1268.274439][ T8351] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 1268.275126][ T8351] usb 2-1: MIDIStreaming interface descriptor not found [ 1268.492705][ T8] usb 2-1: USB disconnect, device number 4 [ 1268.672758][ T31] audit: type=1400 audit(1268.600:296): avc: denied { setopt } for pid=12052 comm="syz.0.1853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1268.906647][ T31] audit: type=1400 audit(1268.830:297): avc: denied { ioctl } for pid=12052 comm="syz.0.1853" path="socket:[23616]" dev="sockfs" ino=23616 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1278.546525][ T8] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 1278.749335][ T8] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1278.750466][ T8] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1278.751211][ T8] usb 2-1: New USB device found, idVendor=046d, idProduct=c222, bcdDevice= 0.00 [ 1278.751590][ T8] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1278.767463][ T8] usb 2-1: config 0 descriptor?? [ 1279.263353][ T8] lg-g15 0003:046D:C222.0005: unknown main item tag 0x0 [ 1279.265310][ T8] lg-g15 0003:046D:C222.0005: item fetching failed at offset 7/11 [ 1279.272245][ T8] lg-g15 0003:046D:C222.0005: probe with driver lg-g15 failed with error -22 [ 1279.453865][ T3792] usb 2-1: USB disconnect, device number 5 [ 1284.694799][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1298.042070][ T8351] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 1298.307126][ T8351] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1298.307858][ T8351] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1298.308253][ T8351] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1298.308869][ T8351] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1298.309253][ T8351] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1298.313517][ T8351] usb 2-1: config 0 descriptor?? [ 1298.798573][ T8351] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1298.801368][ T8351] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1298.810825][ T8351] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1298.811472][ T8351] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1298.811844][ T8351] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1298.812163][ T8351] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1298.812436][ T8351] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1298.812709][ T8351] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1298.813036][ T8351] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1298.813336][ T8351] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1298.813630][ T8351] plantronics 0003:047F:FFFF.0006: unknown main item tag 0x0 [ 1298.814211][ T8351] plantronics 0003:047F:FFFF.0006: No inputs registered, leaving [ 1298.820824][ T8351] plantronics 0003:047F:FFFF.0006: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 1299.962566][T12179] usb 2-1: string descriptor 0 read error: -2 [ 1300.837622][ T8] usb 2-1: USB disconnect, device number 6 [ 1332.716299][ T9] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 1332.896584][ T9] usb 1-1: Using ep0 maxpacket: 8 [ 1332.923517][ T9] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 1332.924493][ T9] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 1332.924968][ T9] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 1332.925316][ T9] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 1332.925647][ T9] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 1332.933478][ T9] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 1332.933935][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1333.207143][T12331] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1333.212152][T12331] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1336.161643][ T9] usb 1-1: usb_control_msg returned -71 [ 1336.162306][ T9] usbtmc 1-1:16.0: can't read capabilities [ 1336.177206][ T9] usb 1-1: USB disconnect, device number 6 [ 1347.754029][ T31] audit: type=1400 audit(1347.680:298): avc: denied { nlmsg_read } for pid=12418 comm="syz.1.1947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1350.149082][ T31] audit: type=1400 audit(1350.080:299): avc: denied { accept } for pid=12484 comm="syz.0.1959" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1350.923256][ T31] audit: type=1400 audit(1350.850:300): avc: denied { ioctl } for pid=12497 comm="syz.0.1963" path="socket:[23381]" dev="sockfs" ino=23381 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1351.130721][T12498] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12498 comm=syz.0.1963 [ 1352.308488][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1359.092304][T12542] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 1359.136867][ T31] audit: type=1400 audit(1359.060:301): avc: denied { read } for pid=12541 comm="syz.1.1980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1370.549420][ T31] audit: type=1400 audit(1370.480:302): avc: denied { ioctl } for pid=12622 comm="syz.1.1997" path="socket:[24617]" dev="sockfs" ino=24617 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1383.641721][ T31] audit: type=1400 audit(1383.570:303): avc: denied { setattr } for pid=12707 comm="syz.1.2012" name="" dev="pipefs" ino=24692 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1385.310087][T12716] veth0_vlan: left promiscuous mode [ 1385.762478][ T31] audit: type=1400 audit(1385.690:304): avc: denied { create } for pid=12723 comm="syz.1.2018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 1395.498159][T12741] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 1400.205004][ T31] audit: type=1400 audit(1400.130:305): avc: denied { create } for pid=12808 comm="syz.1.2047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1401.097189][T12771] usb 2-1: new full-speed USB device number 7 using dummy_hcd [ 1401.340135][T12771] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 10 [ 1401.340758][T12771] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0x8B has invalid maxpacket 127, setting to 64 [ 1401.341362][T12771] usb 2-1: config 27 interface 0 altsetting 0 has a duplicate endpoint with address 0xB, skipping [ 1401.341794][T12771] usb 2-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 1401.342128][T12771] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1401.361332][T12813] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1401.374115][T12771] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 1401.375737][T12771] usb 2-1: invalid MIDI out EP 0 [ 1401.447981][T12771] snd-usb-audio 2-1:27.0: probe with driver snd-usb-audio failed with error -22 [ 1401.668145][T12813] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2048'. [ 1401.671255][T12813] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2048'. [ 1401.675612][T12813] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2048'. [ 1401.690487][T12813] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2048'. [ 1401.731602][ T3792] usb 2-1: USB disconnect, device number 7 [ 1422.329141][ T31] audit: type=1400 audit(1422.260:306): avc: denied { setattr } for pid=12911 comm="syz.0.2072" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1422.716594][ C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 1423.618309][T12918] SELinux: Context system_u:object_r:scanner_device_t:s0 is not valid (left unmapped). [ 1423.619897][ T31] audit: type=1400 audit(1423.550:307): avc: denied { relabelto } for pid=12917 comm="syz.0.2075" name="dsp1" dev="devtmpfs" ino=738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:scanner_device_t:s0" [ 1423.620564][ T31] audit: type=1400 audit(1423.550:308): avc: denied { associate } for pid=12917 comm="syz.0.2075" name="dsp1" dev="devtmpfs" ino=738 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:scanner_device_t:s0" [ 1453.036539][T11763] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 1453.270853][T11763] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1453.271188][T11763] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1453.271423][T11763] usb 2-1: New USB device found, idVendor=256c, idProduct=006d, bcdDevice= 0.00 [ 1453.271603][T11763] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1453.355132][T11763] usb 2-1: config 0 descriptor?? [ 1458.724953][ T31] audit: type=1400 audit(1458.650:309): avc: denied { bind } for pid=13086 comm="syz.0.2139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1458.737085][ T31] audit: type=1400 audit(1458.650:310): avc: denied { name_bind } for pid=13086 comm="syz.0.2139" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1458.739536][ T31] audit: type=1400 audit(1458.650:311): avc: denied { node_bind } for pid=13086 comm="syz.0.2139" saddr=fe80::bb src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 1459.099771][T11763] usb 2-1: string descriptor 0 read error: -32 [ 1459.102702][T11763] uclogic 0003:256C:006D.0007: interface is invalid, ignoring [ 1471.138410][ T8] usb 2-1: USB disconnect, device number 8 [ 1476.153254][T13123] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5136 sclass=netlink_audit_socket pid=13123 comm=syz.1.2148 [ 1480.186924][ T31] audit: type=1400 audit(1480.100:312): avc: denied { unmount } for pid=7564 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1490.764245][T13218] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13218 comm=syz.0.2188 [ 1492.498628][ T31] audit: type=1400 audit(1492.430:313): avc: denied { accept } for pid=13231 comm="syz.1.2195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1498.420729][ T31] audit: type=1400 audit(1498.350:314): avc: denied { mount } for pid=13277 comm="syz.1.2213" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1498.458942][ T31] audit: type=1400 audit(1498.390:315): avc: denied { unmount } for pid=8722 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1498.602323][ T31] audit: type=1400 audit(1498.530:316): avc: denied { getattr } for pid=13283 comm="syz.0.2214" name="/" dev="pidfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1503.409901][ T31] audit: type=1400 audit(1503.340:317): avc: denied { accept } for pid=13316 comm="syz.0.2229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 1506.260222][ T31] audit: type=1400 audit(1506.190:318): avc: denied { create } for pid=13330 comm="syz.1.2235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1506.264877][ T31] audit: type=1400 audit(1506.190:319): avc: denied { listen } for pid=13330 comm="syz.1.2235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1506.279005][ T31] audit: type=1400 audit(1506.210:320): avc: denied { ioctl } for pid=13330 comm="syz.1.2235" path="socket:[26271]" dev="sockfs" ino=26271 ioctlcmd=0xab0a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1506.680102][ T31] audit: type=1400 audit(1506.610:321): avc: denied { getopt } for pid=13336 comm="syz.1.2238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1507.676360][ T31] audit: type=1400 audit(1507.580:322): avc: denied { setopt } for pid=13348 comm="syz.0.2243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1517.067956][ T31] audit: type=1400 audit(1517.000:323): avc: denied { getopt } for pid=13410 comm="syz.0.2265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1519.157987][T13428] sctp: [Deprecated]: syz.1.2272 (pid 13428) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1519.157987][T13428] Use struct sctp_sack_info instead [ 1519.158079][ T31] audit: type=1400 audit(1519.090:324): avc: denied { getopt } for pid=13427 comm="syz.1.2272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1531.995312][T13539] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13539 comm=syz.0.2314 [ 1542.002030][ T31] audit: type=1400 audit(1541.930:325): avc: denied { remount } for pid=13601 comm="syz.0.2340" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1550.196378][ T31] audit: type=1400 audit(1550.120:326): avc: denied { nlmsg_tty_audit } for pid=13676 comm="syz.1.2375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1551.652727][T13689] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 1551.653416][T13689] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 1556.312409][T13731] option changes via remount are deprecated (pid=13730 comm=syz.1.2399) [ 1556.313479][ T31] audit: type=1400 audit(1556.240:327): avc: denied { remount } for pid=13730 comm="syz.1.2399" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1559.627697][ T31] audit: type=1400 audit(1559.560:328): avc: denied { shutdown } for pid=13768 comm="syz.1.2417" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1562.342639][ T31] audit: type=1400 audit(1562.260:329): avc: denied { write } for pid=13792 comm="syz.1.2427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1562.344850][ T31] audit: type=1400 audit(1562.270:330): avc: denied { connect } for pid=13792 comm="syz.1.2427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1562.856904][ T31] audit: type=1400 audit(1562.780:331): avc: denied { accept } for pid=13792 comm="syz.1.2427" laddr=::ac14:14aa lport=57215 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1562.861856][ T31] audit: type=1400 audit(1562.790:332): avc: denied { getopt } for pid=13792 comm="syz.1.2427" laddr=::ac14:14aa lport=57215 faddr=fc00:: scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 1564.050662][T13802] SELinux: policydb version 1446001614 does not match my version range 15-33 [ 1564.051484][T13802] SELinux: failed to load policy [ 1564.052234][ T31] audit: type=1400 audit(1563.980:333): avc: denied { load_policy } for pid=13801 comm="syz.0.2431" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1565.229463][T13810] "syz.0.2435" (13810) uses obsolete ecb(arc4) skcipher [ 1565.578698][ T31] audit: type=1400 audit(1565.510:334): avc: denied { write } for pid=13825 comm="syz.0.2439" name="task" dev="proc" ino=27350 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1565.596638][ T31] audit: type=1400 audit(1565.520:335): avc: denied { add_name } for pid=13825 comm="syz.0.2439" name="core" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1565.598369][ T31] audit: type=1400 audit(1565.520:336): avc: denied { create } for pid=13825 comm="syz.0.2439" name="core" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 1565.599100][ T31] audit: type=1400 audit(1565.520:337): avc: denied { associate } for pid=13825 comm="syz.0.2439" name="core" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1567.906813][T13832] capability: warning: `syz.0.2442' uses 32-bit capabilities (legacy support in use) [ 1572.127076][T13859] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13859 comm=syz.0.2453 [ 1572.371044][ T31] audit: type=1400 audit(1572.300:338): avc: denied { unmount } for pid=7564 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1581.051793][T13929] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13929 comm=syz.1.2478 [ 1582.426862][ T31] audit: type=1400 audit(1582.350:339): avc: denied { mounton } for pid=13935 comm="syz.1.2480" path="/883/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1582.432945][ T31] audit: type=1400 audit(1582.360:340): avc: denied { mount } for pid=13935 comm="syz.1.2480" name="/" dev="pipefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1597.443728][ T31] audit: type=1400 audit(1597.370:341): avc: denied { create } for pid=14031 comm="syz.1.2501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1597.444668][ T31] audit: type=1400 audit(1597.370:342): avc: denied { read } for pid=14031 comm="syz.1.2501" path="socket:[28517]" dev="sockfs" ino=28517 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1597.481421][ T31] audit: type=1400 audit(1597.410:343): avc: denied { read write } for pid=8722 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1597.493149][ T31] audit: type=1400 audit(1597.420:344): avc: denied { open } for pid=8722 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1597.494579][ T31] audit: type=1400 audit(1597.420:345): avc: denied { ioctl } for pid=8722 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1597.828636][ T31] audit: type=1400 audit(1597.760:346): avc: denied { setattr } for pid=14038 comm="syz.1.2504" name="fd" dev="proc" ino=28692 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1599.204075][ T31] audit: type=1400 audit(1599.130:347): avc: denied { module_request } for pid=14042 comm="syz.1.2506" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1614.345589][T14114] netlink: 'syz.1.2522': attribute type 12 has an invalid length. [ 1621.448982][T14142] serio: Serial port pts0 [ 1664.774746][ T1058] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1664.881830][ T1058] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1664.940110][ T1058] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1665.020246][ T1058] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1665.388017][ T1058] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1665.392066][ T1058] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1665.394937][ T1058] bond0 (unregistering): Released all slaves [ 1665.479281][ T1058] hsr_slave_0: left promiscuous mode [ 1665.481846][ T1058] hsr_slave_1: left promiscuous mode [ 1665.488025][ T1058] veth1_macvtap: left promiscuous mode [ 1665.488525][ T1058] veth0_macvtap: left promiscuous mode [ 1665.489071][ T1058] veth1_vlan: left promiscuous mode [ 1666.221687][ T1058] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1666.357550][ T1058] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1666.430179][ T1058] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1666.500087][ T1058] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1666.927299][ T1058] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1666.933168][ T1058] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1666.946746][ T1058] bond0 (unregistering): Released all slaves [ 1667.029487][ T1058] hsr_slave_0: left promiscuous mode [ 1667.033404][ T1058] hsr_slave_1: left promiscuous mode [ 1667.054642][ T1058] veth1_macvtap: left promiscuous mode [ 1667.055258][ T1058] veth0_macvtap: left promiscuous mode [ 1667.055646][ T1058] veth1_vlan: left promiscuous mode [ 1668.239091][T14167] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1668.242926][T14167] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1668.469508][T14163] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1668.475278][T14163] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1669.711299][T14167] hsr_slave_0: entered promiscuous mode [ 1669.713949][T14167] hsr_slave_1: entered promiscuous mode [ 1669.715820][T14167] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1669.720864][T14167] Cannot create hsr debugfs directory [ 1669.840205][T14163] hsr_slave_0: entered promiscuous mode [ 1669.847025][T14163] hsr_slave_1: entered promiscuous mode [ 1669.856663][T14163] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1669.857077][T14163] Cannot create hsr debugfs directory [ 1670.386796][T14163] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1670.411709][T14163] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1670.422337][T14163] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1670.433566][T14163] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1670.709564][T14167] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1670.725730][T14167] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1670.733185][T14167] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1670.741753][T14167] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1671.461994][T14163] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1671.664866][T14167] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1675.003126][T14167] veth0_vlan: entered promiscuous mode [ 1675.050353][T14167] veth1_vlan: entered promiscuous mode [ 1675.127764][T14163] veth0_vlan: entered promiscuous mode [ 1675.165283][T14163] veth1_vlan: entered promiscuous mode [ 1675.204186][T14167] veth0_macvtap: entered promiscuous mode [ 1675.214800][T14167] veth1_macvtap: entered promiscuous mode [ 1675.292536][T14163] veth0_macvtap: entered promiscuous mode [ 1675.311817][T14163] veth1_macvtap: entered promiscuous mode [ 1675.315458][T14167] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.317170][T14167] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.317609][T14167] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.317944][T14167] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.403093][T14163] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.403401][T14163] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.403585][T14163] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.403773][T14163] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.521256][ T31] audit: type=1400 audit(1675.450:348): avc: denied { mount } for pid=14167 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1680.235574][T14984] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1016 sclass=netlink_route_socket pid=14984 comm=syz.1.2543 [ 1680.629186][ T31] audit: type=1400 audit(1680.560:349): avc: denied { lock } for pid=14992 comm="syz.1.2547" path="socket:[30469]" dev="sockfs" ino=30469 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 1681.076802][T15004] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15004 comm=syz.1.2552 [ 1681.123014][T15006] serio: Serial port pts0 [ 1683.715041][ T31] audit: type=1326 audit(1683.640:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15030 comm="syz.1.2562" exe="/syz-executor" sig=31 arch=40000028 syscall=20 compat=0 ip=0x128b1c code=0x0 [ 1689.359838][ T31] audit: type=1400 audit(1689.280:351): avc: denied { bind } for pid=15068 comm="syz.0.2580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1689.374084][ T31] audit: type=1400 audit(1689.290:352): avc: denied { node_bind } for pid=15068 comm="syz.0.2580" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1689.397818][ T31] audit: type=1400 audit(1689.310:353): avc: denied { name_bind } for pid=15068 comm="syz.0.2580" src=1792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1689.760833][T15077] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15077 comm=syz.1.2584 [ 1690.193553][ T31] audit: type=1400 audit(1690.120:354): avc: denied { shutdown } for pid=15073 comm="syz.0.2583" lport=55620 faddr=172.30.0.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1692.518390][ C1] vxcan1: j1939_tp_rxtimer: 0x851a4b00: rx timeout, send abort [ 1692.530011][ C1] vxcan1: j1939_xtp_rx_abort_one: 0x851a4b00: 0x0ff00: (3) A timeout occurred and this is the connection abort to close the session. [ 1692.532334][ C1] ------------[ cut here ]------------ [ 1692.535577][ C1] WARNING: CPU: 1 PID: 23 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 1692.537695][ C1] refcount_t: underflow; use-after-free. [ 1692.537997][ C1] Modules linked in: [ 1692.538750][ C1] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1692.540485][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.11.0-syzkaller #0 [ 1692.541723][ C1] Hardware name: ARM-Versatile Express [ 1692.542313][ C1] Call trace: [ 1692.542780][ C1] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 1692.543638][ C1] r7:00000000 r6:826228c4 r5:00000000 r4:8200e404 [ 1692.544005][ C1] [<81966d9c>] (show_stack) from [<81984a58>] (dump_stack_lvl+0x54/0x7c) [ 1692.544405][ C1] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 1692.544876][ C1] r5:00000000 r4:8286ed18 [ 1692.545103][ C1] [<81984a80>] (dump_stack) from [<8196785c>] (panic+0x120/0x368) [ 1692.545519][ C1] [<8196773c>] (panic) from [<802421d4>] (get_taint+0x0/0x1c) [ 1692.546290][ C1] r3:8260c5c4 r2:00000001 r1:81ff6c38 r0:81ffea04 [ 1692.553494][ C1] r7:8081a110 [ 1692.554029][ C1] [<80242160>] (check_panic_on_warn) from [<80242328>] (__warn+0x7c/0x180) [ 1692.554901][ C1] [<802422ac>] (__warn) from [<80242614>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 1692.555441][ C1] r8:00000009 r7:8205cdc4 r6:df879bd4 r5:82e42400 r4:00000000 [ 1692.555759][ C1] [<80242430>] (warn_slowpath_fmt) from [<8081a110>] (refcount_warn_saturate+0x13c/0x174) [ 1692.556636][ C1] r10:ddde4ec8 r9:00000003 r8:00000001 r7:00000000 r6:817f4e34 r5:00000002 [ 1692.557155][ C1] r4:85432180 [ 1692.557456][ C1] [<80819fd4>] (refcount_warn_saturate) from [<8146782c>] (sk_skb_reason_drop+0x1d8/0x248) [ 1692.558594][ C1] [<81467654>] (sk_skb_reason_drop) from [<817f4e34>] (j1939_session_destroy+0x78/0x200) [ 1692.559447][ C1] r9:00000003 r8:00000001 r7:84e6b81c r6:851a4b50 r5:851a4b00 r4:85432180 [ 1692.559978][ C1] [<817f4dbc>] (j1939_session_destroy) from [<817f5620>] (j1939_xtp_rx_abort_one+0xbc/0x2a4) [ 1692.560625][ C1] r6:84e6b000 r5:851a4b00 r4:85432780 [ 1692.560936][ C1] [<817f5564>] (j1939_xtp_rx_abort_one) from [<817f83d8>] (j1939_tp_recv+0x4c4/0x530) [ 1692.561554][ C1] r9:00000040 r8:84795d50 r7:84e6b000 r6:84e6b008 r5:84e6b000 r4:85432780 [ 1692.562169][ C1] [<817f7f14>] (j1939_tp_recv) from [<817f1da0>] (j1939_can_recv+0x1e4/0x2dc) [ 1692.562680][ C1] r7:84e6b000 r6:84e6b008 r5:84e6b810 r4:85432780 [ 1692.563192][ C1] [<817f1bbc>] (j1939_can_recv) from [<817e7b6c>] (can_rcv_filter+0x9c/0x218) [ 1692.563800][ C1] r9:00000040 r8:847c46a0 r7:98ec0000 r6:854329c0 r5:00000001 r4:84f2e7e0 [ 1692.564285][ C1] [<817e7ad0>] (can_rcv_filter) from [<817e8510>] (can_receive+0xb4/0xf0) [ 1692.564797][ C1] r9:00000040 r8:00000000 r7:847c4000 r6:85396200 r5:84696800 r4:854329c0 [ 1692.565293][ C1] [<817e845c>] (can_receive) from [<817e85d0>] (can_rcv+0x84/0xac) [ 1692.565832][ C1] r9:00000040 r8:00000002 r7:00000000 r6:00000000 r5:817e854c r4:854329c0 [ 1692.566389][ C1] [<817e854c>] (can_rcv) from [<814886a4>] (__netif_receive_skb_one_core+0x5c/0x80) [ 1692.566958][ C1] r5:817e854c r4:847c4000 [ 1692.567267][ C1] [<81488648>] (__netif_receive_skb_one_core) from [<81488710>] (__netif_receive_skb+0x18/0x5c) [ 1692.567830][ C1] r5:ddde4fb0 r4:854329c0 [ 1692.568129][ C1] [<814886f8>] (__netif_receive_skb) from [<81488a00>] (process_backlog+0x88/0x15c) [ 1692.568563][ C1] r5:ddde4fb0 r4:854329c0 [ 1692.568805][ C1] [<81488978>] (process_backlog) from [<81489904>] (__napi_poll+0x34/0x240) [ 1692.569270][ C1] r10:ddde4ec0 r9:ddde5100 r8:df879e38 r7:df879e33 r6:00000040 r5:ddde4fb0 [ 1692.569657][ C1] r4:00000001 [ 1692.572906][ C1] [<814898d0>] (__napi_poll) from [<8148a13c>] (net_rx_action+0x338/0x420) [ 1692.574307][ C1] r9:ddde5100 r8:df879e38 r7:0000012c r6:00021ff1 r5:ddde4fb0 r4:00000000 [ 1692.574868][ C1] [<81489e04>] (net_rx_action) from [<8024b5d8>] (handle_softirqs+0x15c/0x468) [ 1692.575652][ C1] r10:00000002 r9:82e42400 r8:00000100 r7:04208040 r6:00000003 r5:00000002 [ 1692.576289][ C1] r4:8260408c [ 1692.576496][ C1] [<8024b47c>] (handle_softirqs) from [<8024b928>] (run_ksoftirqd+0x44/0x4c) [ 1692.576895][ C1] r10:00000000 r9:00000002 r8:826240c8 r7:00000001 r6:82cc7440 r5:82e42400 [ 1692.577233][ C1] r4:00000001 [ 1692.577426][ C1] [<8024b8e4>] (run_ksoftirqd) from [<80274f1c>] (smpboot_thread_fn+0x16c/0x288) [ 1692.577845][ C1] [<80274db0>] (smpboot_thread_fn) from [<8026faf4>] (kthread+0x104/0x134) [ 1692.578288][ C1] r10:00000000 r9:df819d60 r8:82cc76c0 r7:82cc7440 r6:80274db0 r5:82e42400 [ 1692.578822][ C1] r4:82cc75c0 r3:00000000 [ 1692.579097][ C1] [<8026f9f0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1692.579610][ C1] Exception stack(0xdf879fb0 to 0xdf879ff8) [ 1692.580150][ C1] 9fa0: 00000000 00000000 00000000 00000000 [ 1692.580700][ C1] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1692.581378][ C1] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1692.581857][ C1] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026f9f0 r4:82cc75c0 [ 1692.584591][ C1] Rebooting in 86400 seconds.. VM DIAGNOSIS: 20:53:10 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=7ed72000 R03=00000000 R04=012e61a8 R05=76fef5a0 R06=0000069c R07=00000006 R08=012e62e0 R09=012e61c8 R10=76fb854c R11=7ea36c84 R12=76fb7f30 R13=7ea36bb8 R14=76f2d050 R15=76e3bc1c PSR=60000010 -ZC- A S usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=00000000 R02=00000000 R03=8286ed18 R04=82e42400 R05=8200e404 R06=827f09a6 R07=8286f154 R08=00000001 R09=00000000 R10=00000017 R11=df879b1c R12=df879ad0 R13=df879ad0 R14=8193a71c R15=8193a71c PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000