last executing test programs: 4.389675832s ago: executing program 0 (id=194): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000400)={'batadv_slave_0\x00'}) 4.127880283s ago: executing program 0 (id=196): r0 = socket$inet(0x2, 0x1, 0x0) fstatfs(r0, 0x0) 3.916236719s ago: executing program 0 (id=198): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001940)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0xfffffffd, 0x300, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{0x0, 0x3000000}, 0x97, 0x0, [{}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}]}, [{}, {}, {}, {}, {}, {0x448eade7}, {0x0, 0x0, 0x80000000, 0x1}, {}, {0x0, 0x80000}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x20000000, 0x7fffffff, 0x0, 0x3}, {}, {0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10009}, {}, {0x0, 0x0, 0xec}, {0x0, 0x0, 0x0, 0x1}, {}, {0xfffffff9, 0x0, 0x0, 0x0, 0x2}, {}, {}, {0x3, 0x0, 0x0, 0x4}, {0x0, 0x4}, {0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffed}, {}, {}, {}, {0xffffffff}, {}, {0x2}, {}, {}, {0x100000}, {0x0, 0x4000}, {0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {0x1}, {0xd5}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x0, 0x0, 0x0, 0x1}, {0x2000000}, {}, {0x0, 0x1}, {}, {0x0, 0x10}, {}, {}, {0x0, 0x40, 0x0, 0x0, 0x4, 0x6}, {0x0, 0x0, 0x0, 0x0, 0x7}, {}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x10}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {0x0, 0x0, 0x0, 0x0, 0xfffffffb}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, {0x0, 0x0, 0x4}, {0x3, 0x0, 0x0, 0x4000}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, {}, {0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffd}, {}, {0x4, 0x4, 0x0, 0x0, 0x0, 0xfffffffc}, {0x4, 0x0, 0x0, 0x0, 0x0, 0x4000000}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {}, {0x0, 0x400000}, {0x814, 0x0, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {0x4}, {0x0, 0x0, 0x0, 0xfffffff9}, {}, {0x4, 0x0, 0x4, 0x100, 0x8}, {0x0, 0x0, 0x0, 0x0, 0x2}, {0x8}, {}, {0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x4}, {}, {0x0, 0xddb2}, {}, {}, {}, {0x0, 0x3, 0x0, 0x1}, {}, {}, {0x0, 0x0, 0x0, 0x10000}, {0xfffffffe}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {0x0, 0xd}, {}, {}, {0x4, 0x0, 0x0, 0x0, 0x0, 0xb}, {0x0, 0x0, 0x1, 0x0, 0xd}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x5}, {0x3}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x7}, {}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x5}, {0x0, 0x1}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0xc2879ef463c8aad0}, {0x0, 0x1}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 3.450028435s ago: executing program 0 (id=201): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) r0 = fsopen(&(0x7f0000000100)='proc\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x1) fchdir(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000000580)=""/4113, 0x1011) 2.929465385s ago: executing program 0 (id=203): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000380)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000006c0f00000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0xa54a9d76e5e2e84, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0xd) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2040, 0x0) 1.926467112s ago: executing program 1 (id=206): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000400)={'batadv_slave_0\x00'}) 1.677440071s ago: executing program 1 (id=207): prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x2) 1.438510839s ago: executing program 1 (id=208): r0 = socket$inet(0x2, 0x1, 0x0) fstatfs(r0, 0x0) 1.251372254s ago: executing program 1 (id=209): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0xfff0, &(0x7f0000000540)={&(0x7f0000000240)=@newlink={0x48, 0x10, 0xff05, 0x0, 0x0, {0x0, 0x0, 0x4a00}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r3}, @IFLA_ADDRESS={0xa, 0x1, @multicast}]}, 0x48}}, 0x0) 520.52777ms ago: executing program 1 (id=210): openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) 231.081832ms ago: executing program 1 (id=211): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000440)={0x0, 0x4}, 0x24) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) sendmsg$inet(0xffffffffffffffff, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000700)=[{0x0}, {&(0x7f00000000c0)}], 0x2}, 0x400c080) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000180)='io_uring_file_get\x00', 0xffffffffffffffff, 0x0, 0x8}, 0x18) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r4 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2a8, 0x0, 0x940c, 0x3002, 0x0, 0x2c0, 0x328, 0x3d8, 0x3d8, 0x328, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0, 0x4001}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x1, 0xbe, {0x565159d7}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x308) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f00000003c0)=0x1306124, 0x4) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000340)=0x8800, 0x4) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000000400)={'batadv_slave_0\x00'}) 0s ago: executing program 0 (id=212): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x42000, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet6_sctp(0xa, 0x1, 0x84) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r5, 0x0, 0xc8, &(0x7f0000003d40), 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000002640)=@delchain={0x228, 0x65, 0x2, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x2}, {0x0, 0x1}, {0x0, 0xb}}, [@TCA_CHAIN={0x8, 0xb, 0x6}, @TCA_CHAIN={0x8, 0xb, 0x6}, @filter_kind_options=@f_bpf={{0x8}, {0x1cc, 0x2, [@TCA_BPF_FD={0x8}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_ACT={0x1a4, 0x1, [@m_simple={0x30, 0x1e, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x1}}}}, @m_simple={0xe8, 0x1e, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x8, 0x3, 'bpf\x00'}]}, {0xb1, 0x6, "9787c29d6ac649e7ec160dfef7c4cea330102e688fe12213d2bf7dae04880a34e7bf775010128401ec7b2a9ceab9c40c5f9bd00ceff17d69ca7a27324ef7a1ad28d4b3c6a826826e9c291c16ab3d13e1f337751959e47bf0fe515b70ea5a3584d9cdba83a705d3257305f931866cf9f1faa34fce0e8a7ee76e20f05d4e1adbee4ba00ddd7b896197ea2a0391ef62c651d59ed7e0e8964192a2c1c29308d03650349840a4d759fc9421e3569c90"}, {0xc, 0x7, {0x0, 0x79d0f023c2b305dd}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_connmark={0x58, 0x15, 0x0, 0x0, {{0xd}, {0x4}, {0x25, 0x6, "726786f34dc39a3b098ea66afe225634df06865f963558e69516e656d1b4d3ec4c"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_csum={0x30, 0x8, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_BPF_FLAGS_GEN={0x8, 0x9, 0x3}, @TCA_BPF_FD={0x8}]}}, @TCA_RATE={0x6, 0x5, {0x6, 0x2}}, @filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_TO={0x8, 0x2, 0xca}]}}]}, 0x228}, 0x1, 0x0, 0x0, 0x81}, 0x20000080) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) recvmmsg(r6, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0xffffffffffffff2f}}], 0x4000000000003b4, 0x2040000, &(0x7f0000003700)={0x77359400}) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:64000' (ED25519) to the list of known hosts. [ 134.471562][ T30] audit: type=1400 audit(134.080:46): avc: denied { name_bind } for pid=3301 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 134.793184][ T30] audit: type=1400 audit(134.400:47): avc: denied { execute } for pid=3302 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 134.796207][ T30] audit: type=1400 audit(134.400:48): avc: denied { execute_no_trans } for pid=3302 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 138.721812][ T30] audit: type=1400 audit(138.330:49): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 138.738940][ T30] audit: type=1400 audit(138.340:50): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 138.796317][ T3302] cgroup: Unknown subsys name 'net' [ 138.820729][ T30] audit: type=1400 audit(138.430:51): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 139.102920][ T3302] cgroup: Unknown subsys name 'cpuset' [ 139.136673][ T3302] cgroup: Unknown subsys name 'rlimit' [ 139.402370][ T30] audit: type=1400 audit(139.000:52): avc: denied { setattr } for pid=3302 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 139.403025][ T30] audit: type=1400 audit(139.010:53): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 139.407511][ T30] audit: type=1400 audit(139.010:54): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 139.784103][ T3304] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 139.794374][ T30] audit: type=1400 audit(139.400:55): avc: denied { relabelto } for pid=3304 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 139.809475][ T30] audit: type=1400 audit(139.410:56): avc: denied { write } for pid=3304 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 139.882013][ T30] audit: type=1400 audit(139.490:57): avc: denied { read } for pid=3302 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 139.886175][ T30] audit: type=1400 audit(139.490:58): avc: denied { open } for pid=3302 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 139.903221][ T3302] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 154.634585][ T30] audit: type=1400 audit(154.240:59): avc: denied { execmem } for pid=3305 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 154.709233][ T30] audit: type=1400 audit(154.310:60): avc: denied { read } for pid=3307 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 154.709817][ T30] audit: type=1400 audit(154.310:61): avc: denied { open } for pid=3307 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 154.723257][ T30] audit: type=1400 audit(154.330:62): avc: denied { mounton } for pid=3308 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 154.762908][ T30] audit: type=1400 audit(154.370:63): avc: denied { module_request } for pid=3307 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 154.764114][ T30] audit: type=1400 audit(154.370:64): avc: denied { module_request } for pid=3308 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 154.905334][ T30] audit: type=1400 audit(154.510:65): avc: denied { sys_module } for pid=3308 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 159.650395][ T3308] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.725709][ T3308] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 159.737643][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.831744][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 161.759735][ T3308] hsr_slave_0: entered promiscuous mode [ 161.767619][ T3308] hsr_slave_1: entered promiscuous mode [ 162.148742][ T3307] hsr_slave_0: entered promiscuous mode [ 162.154414][ T3307] hsr_slave_1: entered promiscuous mode [ 162.161935][ T3307] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 162.163888][ T3307] Cannot create hsr debugfs directory [ 163.571740][ T30] audit: type=1400 audit(163.180:66): avc: denied { create } for pid=3308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 163.576867][ T30] audit: type=1400 audit(163.180:67): avc: denied { write } for pid=3308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 163.600781][ T30] audit: type=1400 audit(163.200:68): avc: denied { read } for pid=3308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 163.624195][ T3308] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 163.764289][ T3308] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 163.795458][ T3308] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 163.835687][ T3308] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 164.247222][ T3307] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 164.286150][ T3307] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 164.314170][ T3307] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 164.337794][ T3307] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 165.722080][ T3308] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.049876][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 172.267137][ T3307] veth0_vlan: entered promiscuous mode [ 172.330637][ T3307] veth1_vlan: entered promiscuous mode [ 172.456306][ T3308] veth0_vlan: entered promiscuous mode [ 172.544478][ T3308] veth1_vlan: entered promiscuous mode [ 172.695148][ T3307] veth0_macvtap: entered promiscuous mode [ 172.753038][ T3307] veth1_macvtap: entered promiscuous mode [ 172.816949][ T3308] veth0_macvtap: entered promiscuous mode [ 172.883562][ T3308] veth1_macvtap: entered promiscuous mode [ 173.097226][ T3307] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.116531][ T3307] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.123921][ T3307] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.124455][ T3307] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.320313][ T3308] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.322891][ T3308] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.324044][ T3308] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.325016][ T3308] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 173.603018][ T30] audit: type=1400 audit(173.210:69): avc: denied { mount } for pid=3307 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 173.617034][ T30] audit: type=1400 audit(173.220:70): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/syzkaller.2wyaTo/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 173.680520][ T30] audit: type=1400 audit(173.280:71): avc: denied { mount } for pid=3307 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 173.706264][ T30] audit: type=1400 audit(173.310:72): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/syzkaller.2wyaTo/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 173.718692][ T30] audit: type=1400 audit(173.320:73): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/syzkaller.2wyaTo/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 173.856423][ T30] audit: type=1400 audit(173.460:74): avc: denied { unmount } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 173.874336][ T30] audit: type=1400 audit(173.480:75): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1550 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 173.885093][ T30] audit: type=1400 audit(173.490:76): avc: denied { mount } for pid=3307 comm="syz-executor" name="/" dev="gadgetfs" ino=2943 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 173.929142][ T30] audit: type=1400 audit(173.530:77): avc: denied { mount } for pid=3307 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 173.932464][ T30] audit: type=1400 audit(173.540:78): avc: denied { mounton } for pid=3307 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 174.202734][ T3307] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 175.795864][ T3459] block nbd0: shutting down sockets [ 177.621281][ T3475] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 177.729242][ T3475] Zero length message leads to an empty skb [ 178.766213][ T30] kauditd_printk_skb: 35 callbacks suppressed [ 178.775199][ T30] audit: type=1400 audit(178.370:114): avc: denied { getopt } for pid=3486 comm="syz.0.12" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 179.942909][ T3497] netlink: 9412 bytes leftover after parsing attributes in process `syz.0.17'. [ 180.195735][ T3499] netlink: 244 bytes leftover after parsing attributes in process `syz.0.18'. [ 181.084265][ T3509] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 181.093668][ T30] audit: type=1400 audit(180.700:115): avc: denied { relabelto } for pid=3506 comm="syz.0.22" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 181.108697][ T30] audit: type=1400 audit(180.710:116): avc: denied { associate } for pid=3506 comm="syz.0.22" name="/" dev="cgroup2" ino=1 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsadm_exec_t:s0" [ 181.350137][ T30] audit: type=1400 audit(180.950:117): avc: denied { ioctl } for pid=3510 comm="syz.1.24" path="socket:[3036]" dev="sockfs" ino=3036 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 181.350706][ T30] audit: type=1400 audit(180.950:118): avc: denied { bind } for pid=3510 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 181.353554][ T30] audit: type=1400 audit(180.960:119): avc: denied { write } for pid=3510 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 181.745338][ T30] audit: type=1326 audit(181.350:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 181.752828][ T30] audit: type=1326 audit(181.350:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 181.765928][ T30] audit: type=1326 audit(181.370:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 181.770146][ T30] audit: type=1326 audit(181.380:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 183.788746][ T30] kauditd_printk_skb: 498 callbacks suppressed [ 183.789238][ T30] audit: type=1326 audit(183.390:622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=1 ip=0xef168 code=0x7ffc0000 [ 183.789581][ T30] audit: type=1326 audit(183.390:623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=1 ip=0x127d1c code=0x7ffc0000 [ 183.790143][ T30] audit: type=1326 audit(183.390:624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=1 ip=0xef168 code=0x7ffc0000 [ 183.790457][ T30] audit: type=1326 audit(183.390:625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=283 compat=1 ip=0x131f20 code=0x7ffc0000 [ 183.823772][ T30] audit: type=1326 audit(183.420:626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=1 ip=0x127d1c code=0x7ffc0000 [ 183.863968][ T30] audit: type=1326 audit(183.470:627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=1 ip=0xef168 code=0x7ffc0000 [ 183.865910][ T30] audit: type=1326 audit(183.470:628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=1 ip=0x127d1c code=0x7ffc0000 [ 183.871062][ T30] audit: type=1326 audit(183.470:629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=1 ip=0xef168 code=0x7ffc0000 [ 183.885719][ T30] audit: type=1326 audit(183.490:630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=1 ip=0x127d1c code=0x7ffc0000 [ 183.891131][ T30] audit: type=1326 audit(183.500:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3516 comm="syz.0.27" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=1 ip=0xef168 code=0x7ffc0000 [ 191.672764][ T30] kauditd_printk_skb: 96 callbacks suppressed [ 191.676098][ T30] audit: type=1400 audit(191.280:728): avc: denied { write } for pid=3552 comm="syz.0.42" name="raw6" dev="proc" ino=4026532772 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 192.060948][ T30] audit: type=1400 audit(191.670:729): avc: denied { watch watch_reads } for pid=3554 comm="syz.0.43" path="/20" dev="tmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 192.933034][ T30] audit: type=1400 audit(192.540:730): avc: denied { create } for pid=3558 comm="syz.0.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 193.170724][ T3562] netlink: 4 bytes leftover after parsing attributes in process `syz.1.46'. [ 193.981023][ T30] audit: type=1326 audit(193.590:731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3567 comm="syz.1.49" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 193.983832][ T30] audit: type=1326 audit(193.590:732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3567 comm="syz.1.49" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 193.989229][ T30] audit: type=1326 audit(193.590:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3567 comm="syz.1.49" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 193.995378][ T30] audit: type=1326 audit(193.600:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3567 comm="syz.1.49" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 194.000424][ T30] audit: type=1326 audit(193.610:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3567 comm="syz.1.49" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=1 ip=0x131f20 code=0x7ffc0000 [ 194.005548][ T30] audit: type=1326 audit(193.610:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3567 comm="syz.1.49" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 194.018669][ T30] audit: type=1326 audit(193.610:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3567 comm="syz.1.49" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 194.594373][ T3574] netlink: 'syz.0.51': attribute type 4 has an invalid length. [ 194.746053][ T3574] netlink: 'syz.0.51': attribute type 4 has an invalid length. [ 195.294945][ T3571] block nbd1: shutting down sockets [ 196.207582][ T3582] ======================================================= [ 196.207582][ T3582] WARNING: The mand mount option has been deprecated and [ 196.207582][ T3582] and is ignored by this kernel. Remove the mand [ 196.207582][ T3582] option from the mount to silence this warning. [ 196.207582][ T3582] ======================================================= [ 196.730167][ T3588] syz.0.57 uses obsolete (PF_INET,SOCK_PACKET) [ 196.734141][ T30] kauditd_printk_skb: 70 callbacks suppressed [ 196.734660][ T30] audit: type=1400 audit(196.340:808): avc: denied { ioctl } for pid=3586 comm="syz.0.57" path="socket:[3793]" dev="sockfs" ino=3793 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 197.329806][ T30] audit: type=1326 audit(196.940:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3586 comm="syz.0.57" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 197.330433][ T30] audit: type=1326 audit(196.940:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3586 comm="syz.0.57" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 197.334800][ T30] audit: type=1326 audit(196.940:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3586 comm="syz.0.57" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 197.335388][ T30] audit: type=1326 audit(196.940:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3586 comm="syz.0.57" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f20 code=0x7ffc0000 [ 197.335859][ T30] audit: type=1326 audit(196.940:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3586 comm="syz.0.57" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 197.336271][ T30] audit: type=1326 audit(196.940:814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3586 comm="syz.0.57" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 197.355395][ T30] audit: type=1326 audit(196.960:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3586 comm="syz.0.57" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 197.363263][ T30] audit: type=1326 audit(196.960:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3586 comm="syz.0.57" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f20 code=0x7ffc0000 [ 197.366877][ T30] audit: type=1326 audit(196.960:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3586 comm="syz.0.57" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 197.772047][ T3587] block nbd1: shutting down sockets [ 198.164602][ T3595] SELinux: syz.0.59 (3595) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 198.642792][ T3600] process 'syz.0.61' launched './file1' with NULL argv: empty string added [ 201.772874][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 201.773488][ T30] audit: type=1400 audit(201.380:850): avc: denied { setopt } for pid=3615 comm="syz.1.67" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 201.873042][ T3616] pimreg: entered allmulticast mode [ 201.891385][ T3616] pimreg: left allmulticast mode [ 207.816857][ T30] audit: type=1326 audit(207.420:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3635 comm="syz.0.75" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 207.824952][ T30] audit: type=1326 audit(207.420:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3635 comm="syz.0.75" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 207.842470][ T30] audit: type=1326 audit(207.450:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3635 comm="syz.0.75" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 207.844711][ T30] audit: type=1326 audit(207.450:854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3635 comm="syz.0.75" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f20 code=0x7ffc0000 [ 207.865260][ T30] audit: type=1326 audit(207.470:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3635 comm="syz.0.75" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 207.867444][ T30] audit: type=1326 audit(207.470:856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3635 comm="syz.0.75" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 207.876707][ T30] audit: type=1326 audit(207.480:857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3635 comm="syz.0.75" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 207.879771][ T30] audit: type=1326 audit(207.480:858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3635 comm="syz.0.75" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f20 code=0x7ffc0000 [ 207.895896][ T30] audit: type=1326 audit(207.500:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3635 comm="syz.0.75" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 207.899540][ T30] audit: type=1326 audit(207.500:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3635 comm="syz.0.75" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 213.547305][ T3659] macvlan1: entered promiscuous mode [ 213.594616][ T3659] ipvlan0: entered promiscuous mode [ 213.617247][ T3659] ipvlan0: left promiscuous mode [ 213.650745][ T3659] macvlan1: left promiscuous mode [ 215.022725][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 215.023600][ T30] audit: type=1326 audit(214.630:874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.0.90" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 215.028815][ T30] audit: type=1326 audit(214.630:875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.0.90" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 215.033666][ T30] audit: type=1326 audit(214.640:876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.0.90" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 215.050553][ T30] audit: type=1326 audit(214.640:877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.0.90" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f20 code=0x7ffc0000 [ 215.054254][ T30] audit: type=1326 audit(214.660:878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.0.90" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 215.056157][ T30] audit: type=1326 audit(214.660:879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.0.90" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 215.057786][ T30] audit: type=1326 audit(214.660:880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.0.90" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 215.061620][ T30] audit: type=1326 audit(214.660:881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.0.90" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f20 code=0x7ffc0000 [ 215.081803][ T30] audit: type=1326 audit(214.690:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.0.90" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 215.088799][ T30] audit: type=1326 audit(214.690:883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3667 comm="syz.0.90" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 216.792938][ T3681] binfmt_misc: register: failed to install interpreter file ./file2 [ 223.438461][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 223.441187][ T30] audit: type=1400 audit(223.040:920): avc: denied { bind } for pid=3693 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 223.455508][ T30] audit: type=1400 audit(223.060:921): avc: denied { write } for pid=3693 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 224.361013][ T30] audit: type=1400 audit(223.970:922): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 224.364809][ T30] audit: type=1400 audit(223.970:923): avc: denied { open } for pid=3307 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 224.375706][ T30] audit: type=1400 audit(223.980:924): avc: denied { ioctl } for pid=3307 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 224.492372][ T30] audit: type=1400 audit(224.100:925): avc: denied { prog_load } for pid=3703 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 224.496893][ T30] audit: type=1400 audit(224.100:926): avc: denied { bpf } for pid=3703 comm="syz.0.104" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 224.497540][ T30] audit: type=1400 audit(224.100:927): avc: denied { perfmon } for pid=3703 comm="syz.0.104" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 224.666990][ T30] audit: type=1400 audit(224.270:928): avc: denied { map_create } for pid=3705 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 224.667712][ T30] audit: type=1400 audit(224.270:929): avc: denied { map_read map_write } for pid=3705 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 230.369119][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 230.369744][ T30] audit: type=1400 audit(229.950:934): avc: denied { create } for pid=3717 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 230.370130][ T30] audit: type=1400 audit(229.960:935): avc: denied { setopt } for pid=3717 comm="syz.1.108" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 231.760599][ T30] audit: type=1400 audit(231.370:936): avc: denied { create } for pid=3723 comm="syz.1.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 231.782538][ T30] audit: type=1400 audit(231.390:937): avc: denied { ioctl } for pid=3723 comm="syz.1.111" path="socket:[4377]" dev="sockfs" ino=4377 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 232.213714][ T3726] netlink: 12 bytes leftover after parsing attributes in process `syz.1.112'. [ 232.221334][ T30] audit: type=1400 audit(231.830:938): avc: denied { module_request } for pid=3725 comm="syz.1.112" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 234.905273][ T30] audit: type=1400 audit(234.510:939): avc: denied { create } for pid=3735 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 234.915198][ T30] audit: type=1400 audit(234.520:940): avc: denied { connect } for pid=3735 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 236.736034][ T30] audit: type=1400 audit(236.340:941): avc: denied { prog_run } for pid=3739 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 239.865105][ T30] audit: type=1400 audit(239.470:942): avc: denied { connect } for pid=3747 comm="syz.1.122" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 239.875888][ T30] audit: type=1400 audit(239.480:943): avc: denied { write } for pid=3747 comm="syz.1.122" laddr=fe80::13 lport=60 faddr=fe80::d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 240.226936][ T30] audit: type=1326 audit(239.820:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3749 comm="syz.1.123" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 240.232026][ T30] audit: type=1326 audit(239.830:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3749 comm="syz.1.123" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 240.241512][ T30] audit: type=1326 audit(239.850:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3749 comm="syz.1.123" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 240.244762][ T30] audit: type=1326 audit(239.850:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3749 comm="syz.1.123" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=1 ip=0x131f20 code=0x7ffc0000 [ 240.251332][ T30] audit: type=1326 audit(239.860:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3749 comm="syz.1.123" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 240.255529][ T30] audit: type=1326 audit(239.860:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3749 comm="syz.1.123" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 240.262432][ T30] audit: type=1326 audit(239.870:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3749 comm="syz.1.123" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 241.972061][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 241.972917][ T30] audit: type=1400 audit(241.560:969): avc: denied { create } for pid=3757 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 241.973491][ T30] audit: type=1400 audit(241.580:970): avc: denied { getopt } for pid=3757 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 241.973958][ T30] audit: type=1400 audit(241.580:971): avc: denied { connect } for pid=3757 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 241.974375][ T30] audit: type=1400 audit(241.580:972): avc: denied { name_connect } for pid=3757 comm="syz.0.127" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 242.523086][ T30] audit: type=1400 audit(242.130:973): avc: denied { write } for pid=3757 comm="syz.0.127" lport=49056 faddr=::ffff:10.1.1.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 244.833003][ T30] audit: type=1400 audit(244.440:974): avc: denied { create } for pid=3764 comm="syz.0.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 246.061158][ T30] audit: type=1326 audit(245.660:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3775 comm="syz.1.135" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 246.061809][ T30] audit: type=1326 audit(245.670:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3775 comm="syz.1.135" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f20 code=0x7ffc0000 [ 246.062417][ T30] audit: type=1326 audit(245.670:977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3775 comm="syz.1.135" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7ffc0000 [ 246.069934][ T30] audit: type=1326 audit(245.670:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3775 comm="syz.1.135" exe="/syz-executor" sig=0 arch=40000028 syscall=347 compat=1 ip=0x131f20 code=0x7ffc0000 [ 247.093417][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 247.109163][ T30] audit: type=1400 audit(246.700:984): avc: denied { create } for pid=3783 comm="syz.1.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 247.127340][ T30] audit: type=1400 audit(246.720:985): avc: denied { setopt } for pid=3783 comm="syz.1.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 247.153279][ T30] audit: type=1400 audit(246.760:986): avc: denied { bind } for pid=3783 comm="syz.1.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 247.667553][ T30] audit: type=1400 audit(247.270:987): avc: denied { write } for pid=3785 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 247.799133][ T30] audit: type=1400 audit(247.390:988): avc: denied { execmem } for pid=3786 comm="syz.0.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 248.088854][ T30] audit: type=1400 audit(247.680:989): avc: denied { read } for pid=3785 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 248.554046][ T3791] netlink: 4 bytes leftover after parsing attributes in process `syz.0.142'. [ 248.584531][ T3791] netlink: 12 bytes leftover after parsing attributes in process `syz.0.142'. [ 249.098937][ T30] audit: type=1400 audit(248.700:990): avc: granted { setsecparam } for pid=3795 comm="syz.1.144" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 249.474605][ T30] audit: type=1400 audit(249.070:991): avc: denied { create } for pid=3800 comm="syz.1.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 249.492127][ T30] audit: type=1400 audit(249.100:992): avc: denied { setopt } for pid=3800 comm="syz.1.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 249.496931][ T30] audit: type=1400 audit(249.100:993): avc: denied { write } for pid=3800 comm="syz.1.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 252.596850][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 252.597416][ T30] audit: type=1400 audit(252.200:1003): avc: denied { create } for pid=3833 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 252.619375][ T30] audit: type=1400 audit(252.220:1004): avc: denied { write } for pid=3833 comm="syz.0.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 252.630124][ T3836] netlink: 28 bytes leftover after parsing attributes in process `syz.0.162'. [ 252.930293][ T30] audit: type=1400 audit(252.540:1005): avc: denied { mounton } for pid=3838 comm="syz.0.163" path="/81/file0" dev="tmpfs" ino=433 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 252.989659][ T30] audit: type=1400 audit(252.590:1006): avc: denied { mount } for pid=3838 comm="syz.0.163" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 253.096649][ T30] audit: type=1400 audit(252.700:1007): avc: denied { unmount } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 253.115720][ T30] audit: type=1400 audit(252.720:1008): avc: denied { unmount } for pid=3307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 253.302408][ T30] audit: type=1400 audit(252.910:1009): avc: denied { create } for pid=3841 comm="syz.1.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 253.329501][ T30] audit: type=1400 audit(252.910:1010): avc: denied { ioctl } for pid=3841 comm="syz.1.165" path="socket:[4586]" dev="sockfs" ino=4586 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 253.330681][ T30] audit: type=1400 audit(252.920:1011): avc: denied { bind } for pid=3841 comm="syz.1.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 253.331294][ T30] audit: type=1400 audit(252.930:1012): avc: denied { write } for pid=3841 comm="syz.1.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 259.312795][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 259.313358][ T30] audit: type=1400 audit(258.920:1049): avc: denied { create } for pid=3876 comm="syz.1.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 259.412352][ T30] audit: type=1400 audit(259.020:1050): avc: denied { write } for pid=3876 comm="syz.1.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 259.431403][ T30] audit: type=1400 audit(259.030:1051): avc: denied { write } for pid=3876 comm="syz.1.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 260.842714][ T30] audit: type=1400 audit(260.450:1052): avc: denied { create } for pid=3882 comm="gtp" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 260.860813][ T30] audit: type=1400 audit(260.470:1053): avc: denied { ioctl } for pid=3882 comm="gtp" path="socket:[4640]" dev="sockfs" ino=4640 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 260.864782][ T30] audit: type=1400 audit(260.470:1054): avc: denied { setopt } for pid=3882 comm="gtp" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 260.888550][ T30] audit: type=1400 audit(260.480:1055): avc: denied { write } for pid=3882 comm="gtp" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 262.137323][ T30] audit: type=1400 audit(261.740:1056): avc: denied { read write } for pid=3892 comm="syz.1.187" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 262.138285][ T30] audit: type=1400 audit(261.740:1057): avc: denied { open } for pid=3892 comm="syz.1.187" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 262.194125][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.194975][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.195204][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.195432][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.195647][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.195862][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.196066][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.196269][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.196493][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.196711][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.196920][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.197123][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.197327][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.197531][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.197807][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.221291][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.222203][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.222647][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.223081][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.223488][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.223894][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.224330][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.224743][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.225145][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.225543][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.225952][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.226351][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.226759][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.227182][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.227586][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.242992][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.243802][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.244215][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.244614][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.245022][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.245418][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.245817][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.246216][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.246611][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.247040][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.247439][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.277678][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.279238][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: unknown main item tag 0x0 [ 262.372126][ T3455] hid-generic 0000:007F:FFFFFFFE.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 263.387558][ T30] audit: type=1400 audit(262.990:1058): avc: denied { create } for pid=3897 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 263.516802][ T3894] fido_id[3894]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 264.697011][ T3902] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 266.829527][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 266.830425][ T30] audit: type=1400 audit(266.430:1061): avc: denied { mount } for pid=3922 comm="syz.0.201" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 267.619215][ T3932] syzkaller1: entered promiscuous mode [ 267.620377][ T3932] syzkaller1: entered allmulticast mode [ 269.533195][ T30] audit: type=1400 audit(269.140:1062): avc: denied { read } for pid=3945 comm="syz.1.210" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 269.543989][ T30] audit: type=1400 audit(269.140:1063): avc: denied { open } for pid=3945 comm="syz.1.210" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 269.730174][ T30] audit: type=1326 audit(269.330:1064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3927 comm="syz.0.203" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258c4 code=0x7fc00000 [ 270.304212][ T30] audit: type=1400 audit(269.910:1065): avc: denied { read } for pid=3949 comm="syz.0.212" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 270.306593][ T30] audit: type=1400 audit(269.910:1066): avc: denied { open } for pid=3949 comm="syz.0.212" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 270.316545][ T30] audit: type=1400 audit(269.920:1067): avc: denied { ioctl } for pid=3949 comm="syz.0.212" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 270.323587][ T3950] [ 270.324027][ T3950] ====================================================== [ 270.324293][ T3950] WARNING: possible circular locking dependency detected [ 270.324829][ T3950] 6.15.0-syzkaller-13804-g939f15e640f1 #0 Not tainted [ 270.325254][ T3950] ------------------------------------------------------ [ 270.325507][ T3950] syz.0.212/3950 is trying to acquire lock: [ 270.325914][ T3950] ffff00001472f358 (&disk->open_mutex){+.+.}-{4:4}, at: __del_gendisk+0x104/0x820 [ 270.327717][ T3950] [ 270.327717][ T3950] but task is already holding lock: [ 270.328057][ T3950] ffff00001472e368 (&set->update_nr_hwq_lock){++++}-{4:4}, at: del_gendisk+0x108/0x1b0 [ 270.328860][ T3950] [ 270.328860][ T3950] which lock already depends on the new lock. [ 270.328860][ T3950] [ 270.329212][ T3950] [ 270.329212][ T3950] the existing dependency chain (in reverse order) is: [ 270.329499][ T3950] [ 270.329499][ T3950] -> #2 (&set->update_nr_hwq_lock){++++}-{4:4}: [ 270.330136][ T3950] down_write+0xb0/0x1a4 [ 270.330531][ T3950] blk_mq_update_nr_hw_queues+0x44/0x8e0 [ 270.330899][ T3950] nbd_start_device+0xf8/0x9d0 [ 270.331142][ T3950] nbd_ioctl+0x178/0xa08 [ 270.331357][ T3950] compat_blkdev_ioctl+0x1f8/0x860 [ 270.331838][ T3950] __arm64_compat_sys_ioctl+0x1d0/0x238 [ 270.332230][ T3950] invoke_syscall+0x6c/0x258 [ 270.332458][ T3950] el0_svc_common.constprop.0+0xac/0x230 [ 270.332755][ T3950] do_el0_svc_compat+0x40/0x68 [ 270.333026][ T3950] el0_svc_compat+0x4c/0x17c [ 270.333266][ T3950] el0t_32_sync_handler+0x98/0x13c [ 270.333557][ T3950] el0t_32_sync+0x19c/0x1a0 [ 270.333861][ T3950] [ 270.333861][ T3950] -> #1 (&nbd->config_lock){+.+.}-{4:4}: [ 270.334340][ T3950] __mutex_lock+0x144/0x9d8 [ 270.334591][ T3950] mutex_lock_nested+0x24/0x30 [ 270.334965][ T3950] refcount_dec_and_mutex_lock+0x44/0xbc [ 270.335221][ T3950] nbd_config_put+0x28/0x5b0 [ 270.335447][ T3950] nbd_release+0x7c/0x128 [ 270.335655][ T3950] blkdev_put_whole+0x98/0xf0 [ 270.335882][ T3950] bdev_release+0x2a4/0x510 [ 270.336096][ T3950] blkdev_release+0x14/0x24 [ 270.336312][ T3950] __fput+0x2c8/0x954 [ 270.336522][ T3950] fput_close_sync+0xdc/0x230 [ 270.336749][ T3950] __arm64_sys_close+0x6c/0xbc [ 270.336986][ T3950] invoke_syscall+0x6c/0x258 [ 270.337202][ T3950] el0_svc_common.constprop.0+0xac/0x230 [ 270.337439][ T3950] do_el0_svc+0x40/0x58 [ 270.337646][ T3950] el0_svc+0x50/0x198 [ 270.338015][ T3950] el0t_64_sync_handler+0x10c/0x138 [ 270.338363][ T3950] el0t_64_sync+0x198/0x19c [ 270.338641][ T3950] [ 270.338641][ T3950] -> #0 (&disk->open_mutex){+.+.}-{4:4}: [ 270.339221][ T3950] __lock_acquire+0x1638/0x2380 [ 270.339452][ T3950] lock_acquire+0x310/0x38c [ 270.339675][ T3950] __mutex_lock+0x144/0x9d8 [ 270.339889][ T3950] mutex_lock_nested+0x24/0x30 [ 270.340111][ T3950] __del_gendisk+0x104/0x820 [ 270.340332][ T3950] del_gendisk+0x110/0x1b0 [ 270.340547][ T3950] loop_control_ioctl+0x398/0x4d8 [ 270.340784][ T3950] __arm64_compat_sys_ioctl+0x1d0/0x238 [ 270.341028][ T3950] invoke_syscall+0x6c/0x258 [ 270.341306][ T3950] el0_svc_common.constprop.0+0xac/0x230 [ 270.341602][ T3950] do_el0_svc_compat+0x40/0x68 [ 270.341883][ T3950] el0_svc_compat+0x4c/0x17c [ 270.342110][ T3950] el0t_32_sync_handler+0x98/0x13c [ 270.342340][ T3950] el0t_32_sync+0x19c/0x1a0 [ 270.342578][ T3950] [ 270.342578][ T3950] other info that might help us debug this: [ 270.342578][ T3950] [ 270.343010][ T3950] Chain exists of: [ 270.343010][ T3950] &disk->open_mutex --> &nbd->config_lock --> &set->update_nr_hwq_lock [ 270.343010][ T3950] [ 270.343889][ T3950] Possible unsafe locking scenario: [ 270.343889][ T3950] [ 270.344167][ T3950] CPU0 CPU1 [ 270.344384][ T3950] ---- ---- [ 270.344607][ T3950] rlock(&set->update_nr_hwq_lock); [ 270.344949][ T3950] lock(&nbd->config_lock); [ 270.345314][ T3950] lock(&set->update_nr_hwq_lock); [ 270.345707][ T3950] lock(&disk->open_mutex); [ 270.346021][ T3950] [ 270.346021][ T3950] *** DEADLOCK *** [ 270.346021][ T3950] [ 270.346310][ T3950] 1 lock held by syz.0.212/3950: [ 270.346539][ T3950] #0: ffff00001472e368 (&set->update_nr_hwq_lock){++++}-{4:4}, at: del_gendisk+0x108/0x1b0 [ 270.347372][ T3950] [ 270.347372][ T3950] stack backtrace: [ 270.348114][ T3950] CPU: 1 UID: 0 PID: 3950 Comm: syz.0.212 Not tainted 6.15.0-syzkaller-13804-g939f15e640f1 #0 PREEMPT [ 270.348644][ T3950] Hardware name: linux,dummy-virt (DT) [ 270.349185][ T3950] Call trace: [ 270.349494][ T3950] show_stack+0x18/0x24 (C) [ 270.349779][ T3950] dump_stack_lvl+0xa4/0xf4 [ 270.350061][ T3950] dump_stack+0x1c/0x28 [ 270.350235][ T3950] print_circular_bug+0x28c/0x370 [ 270.350419][ T3950] check_noncircular+0x168/0x17c [ 270.350600][ T3950] __lock_acquire+0x1638/0x2380 [ 270.350862][ T3950] lock_acquire+0x310/0x38c [ 270.351051][ T3950] __mutex_lock+0x144/0x9d8 [ 270.351238][ T3950] mutex_lock_nested+0x24/0x30 [ 270.351592][ T3950] __del_gendisk+0x104/0x820 [ 270.351883][ T3950] del_gendisk+0x110/0x1b0 [ 270.352084][ T3950] loop_control_ioctl+0x398/0x4d8 [ 270.352316][ T3950] __arm64_compat_sys_ioctl+0x1d0/0x238 [ 270.352578][ T3950] invoke_syscall+0x6c/0x258 SYZFAIL: failed to recv rpc [ 270.352780][ T3950] el0_svc_common.constprop.0+0xac/0x230 [ 270.353376][ T3950] do_el0_svc_compat+0x40/0x68 [ 270.353694][ T3950] el0_svc_compat+0x4c/0x17c [ 270.353926][ T3950] el0t_32_sync_handler+0x98/0x13c [ 270.354321][ T3950] el0t_32_sync+0x19c/0x1a0 [ 270.375696][ T30] audit: type=1400 audit(269.940:1068): avc: denied { write } for pid=3302 comm="syz-executor" path="pipe:[1953]" dev="pipefs" ino=1953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 271.333254][ T1531] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 271.487094][ T1531] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 271.655638][ T1531] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 271.786257][ T1531] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 272.060426][ T30] audit: type=1400 audit(271.670:1069): avc: denied { read } for pid=3152 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 272.136029][ T30] audit: type=1400 audit(271.740:1070): avc: denied { search } for pid=3152 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 272.137257][ T30] audit: type=1400 audit(271.740:1071): avc: denied { search } for pid=3152 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 272.145260][ T30] audit: type=1400 audit(271.750:1072): avc: denied { search } for pid=3152 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 272.148342][ T30] audit: type=1400 audit(271.750:1073): avc: denied { read } for pid=3152 comm="dhcpcd" name="n18" dev="tmpfs" ino=1603 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 272.151279][ T30] audit: type=1400 audit(271.760:1074): avc: denied { open } for pid=3152 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1603 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 272.157394][ T30] audit: type=1400 audit(271.760:1075): avc: denied { getattr } for pid=3152 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1603 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 274.196205][ T1531] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 274.275011][ T1531] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 274.335271][ T1531] bond0 (unregistering): Released all slaves [ 274.563868][ T1531] hsr_slave_0: left promiscuous mode [ 274.567475][ T1531] hsr_slave_1: left promiscuous mode [ 274.591317][ T1531] veth1_macvtap: left promiscuous mode [ 274.592642][ T1531] veth0_macvtap: left promiscuous mode [ 274.593967][ T1531] veth1_vlan: left promiscuous mode [ 274.595149][ T1531] veth0_vlan: left promiscuous mode [ 274.743990][ T30] audit: type=1400 audit(274.350:1076): avc: denied { read open } for pid=3955 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 274.745605][ T30] audit: type=1400 audit(274.350:1077): avc: denied { getattr } for pid=3955 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 274.786305][ T30] audit: type=1400 audit(274.390:1078): avc: denied { add_name } for pid=3954 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 VM DIAGNOSIS: 07:10:05 Registers: info registers vcpu 0 CPU#0 PC=ffff8000809a8bac X00=ffff000012b7bdc0 X01=0000000000000000 X02=0000000000000000 X03=0000000000000000 X04=ffff6000040cf08d X05=0000000000000000 X06=ffff800084f73358 X07=0000000000000003 X08=ffff00000fd4dac0 X09=ffff0000206783d8 X10=0000000000000000 X11=1fffe000040cf08c X12=ffff6000040cf08d X13=00ca00d800ec0008 X14=1fffe00002624acd X15=185034dd707deede X16=163a0000bf70ffff X17=232e44d9c70d0d19 X18=ffff0000207aa780 X19=0000000000000001 X20=1ffff00010000c0c X21=ffff8000871415b0 X22=ffff000012b7bdc0 X23=ffff000012b7be9c X24=ffff000012b7be40 X25=0000000000000036 X26=ffff000012b7bdc0 X27=0000000000000000 X28=ffff000013640000 X29=ffff800080006130 X30=ffff8000844bd998 SP=ffff8000800060a0 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800080462f00 X00=1ffff00010d2bf48 X01=dfff800000000000 X02=ffff800086945000 X03=ffff8000812c7054 X04=ffff80008695fa40 X05=0000000000000000 X06=1ffff00010cc839f X07=dfff800000000000 X08=1ffff0001413cdf5 X09=0000000041b58ab3 X10=ffff70001413ce09 X11=1ffff0001413ce09 X12=ffff70001413ce0a X13=0000000000000006 X14=0000000000000000 X15=fffffffffffda240 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=dfff800000000000 X20=00000000000066b9 X21=ffff800086945f58 X22=00000000000066ba X23=ffff8000812c6938 X24=ffff8000a09e6ca0 X25=ffff8000a09e6cc0 X26=ffff800080000000 X27=000000000003c8cc X28=00000000000066b9 X29=ffff8000a09e6b50 X30=ffff800080463f8c SP=ffff8000a09e6b50 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000