last executing test programs: 1.239449797s ago: executing program 0 (id=5011): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000009, 0x15031, r0, 0x0) 1.181294248s ago: executing program 0 (id=5012): r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) fcntl$lock(r0, 0x5, &(0x7f00000000c0)={0x1, 0x2, 0x0, 0x7}) 1.111447642s ago: executing program 0 (id=5014): pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x880) ioctl$RTC_PIE_OFF(r0, 0x7006) 851.403393ms ago: executing program 1 (id=5015): r0 = openat$pfkey(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PAGEMAP_SCAN(r0, 0x5450, 0x0) 781.374887ms ago: executing program 0 (id=5016): r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$char_usb(r0, 0x0, 0x0) 703.086992ms ago: executing program 1 (id=5017): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r0, 0x5451, 0x0) 621.081458ms ago: executing program 1 (id=5018): r0 = semget$private(0x0, 0x3, 0x0) msgctl$IPC_INFO(r0, 0x3, &(0x7f0000002840)=""/55) 518.992578ms ago: executing program 1 (id=5019): r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xab5}) 442.100353ms ago: executing program 0 (id=5020): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000880), 0x142, 0x0) write$tcp_mem(r0, &(0x7f00000008c0)={0x7, 0x20, 0x1000, 0x20, 0x9}, 0x48) 319.923857ms ago: executing program 1 (id=5021): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x29, 0x3c, 0x0, 0x4) 151.71539ms ago: executing program 0 (id=5022): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x890c, &(0x7f0000000840)) 0s ago: executing program 1 (id=5023): r0 = socket(0x2, 0x2, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, 0x0, &(0x7f0000000180)) kernel console output (not intermixed with test programs): syzkaller login: [ 37.053773][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 37.054228][ T28] audit: type=1400 audit(37.000:87): avc: denied { write } for pid=3075 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 37.520172][ T28] audit: type=1400 audit(37.470:88): avc: denied { write } for pid=3080 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 38.839264][ T28] audit: type=1400 audit(38.780:89): avc: denied { read write } for pid=3081 comm="scp" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 38.868374][ T28] audit: type=1400 audit(38.820:90): avc: denied { open } for pid=3081 comm="scp" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.930949][ T28] audit: type=1400 audit(40.880:91): avc: denied { write } for pid=3084 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 41.082125][ T28] audit: type=1400 audit(41.030:92): avc: denied { write } for pid=3087 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '[localhost]:54526' (ED25519) to the list of known hosts. [ 56.288492][ T28] audit: type=1400 audit(56.230:93): avc: denied { name_bind } for pid=3092 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 58.135553][ T28] audit: type=1400 audit(58.080:94): avc: denied { execute } for pid=3093 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 58.141290][ T28] audit: type=1400 audit(58.090:95): avc: denied { execute_no_trans } for pid=3093 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 60.513781][ T28] audit: type=1400 audit(60.460:96): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 60.518874][ T28] audit: type=1400 audit(60.470:97): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 60.532501][ T3093] cgroup: Unknown subsys name 'net' [ 60.540893][ T28] audit: type=1400 audit(60.490:98): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 60.688762][ T3093] cgroup: Unknown subsys name 'cpuset' [ 60.694308][ T3093] cgroup: Unknown subsys name 'hugetlb' [ 60.696659][ T3093] cgroup: Unknown subsys name 'rlimit' [ 60.940356][ T28] audit: type=1400 audit(60.890:99): avc: denied { setattr } for pid=3093 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 60.944696][ T28] audit: type=1400 audit(60.890:100): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 60.948729][ T28] audit: type=1400 audit(60.890:101): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 61.154633][ T3095] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 61.160499][ T28] audit: type=1400 audit(61.110:102): avc: denied { relabelto } for pid=3095 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 66.701344][ T3093] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 68.898577][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 68.907621][ T28] audit: type=1400 audit(68.840:106): avc: denied { execmem } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 68.956558][ T28] audit: type=1400 audit(68.900:107): avc: denied { read } for pid=3098 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 68.959901][ T28] audit: type=1400 audit(68.910:108): avc: denied { open } for pid=3098 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 68.970638][ T28] audit: type=1400 audit(68.920:109): avc: denied { mounton } for pid=3098 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 68.990483][ T28] audit: type=1400 audit(68.940:110): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 68.991555][ T28] audit: type=1400 audit(68.940:111): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 69.043747][ T28] audit: type=1400 audit(68.990:112): avc: denied { sys_module } for pid=3098 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 69.468706][ T28] audit: type=1400 audit(69.420:113): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 70.490708][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.500125][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 70.776142][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 70.790756][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 71.327480][ T3098] hsr_slave_0: entered promiscuous mode [ 71.332562][ T3098] hsr_slave_1: entered promiscuous mode [ 71.510653][ T3099] hsr_slave_0: entered promiscuous mode [ 71.512634][ T3099] hsr_slave_1: entered promiscuous mode [ 71.514106][ T3099] debugfs: 'hsr0' already exists in 'hsr' [ 71.514743][ T3099] Cannot create hsr debugfs directory [ 71.786224][ T28] audit: type=1400 audit(71.730:114): avc: denied { create } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 71.788448][ T28] audit: type=1400 audit(71.740:115): avc: denied { write } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 71.797769][ T3098] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 71.804980][ T3098] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 71.807756][ T3098] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 71.811362][ T3098] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 71.820047][ T3098] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 71.823704][ T3098] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 71.825858][ T3098] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 71.830983][ T3098] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 71.884795][ T3099] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 71.890318][ T3099] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 71.894184][ T3099] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 71.901222][ T3099] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 71.906620][ T3099] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 71.913586][ T3099] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 71.916170][ T3099] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 71.922788][ T3099] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 72.327969][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 72.438289][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.494667][ T3099] veth0_vlan: entered promiscuous mode [ 74.516055][ T3099] veth1_vlan: entered promiscuous mode [ 74.581854][ T3099] veth0_macvtap: entered promiscuous mode [ 74.593303][ T3099] veth1_macvtap: entered promiscuous mode [ 74.660856][ T31] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.663566][ T31] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.670144][ T31] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.671402][ T31] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 74.814683][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 74.814998][ T28] audit: type=1400 audit(74.760:117): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 74.831624][ T28] audit: type=1400 audit(74.780:118): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.dCYpqe/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 74.835640][ T28] audit: type=1400 audit(74.780:119): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 74.849432][ T28] audit: type=1400 audit(74.800:120): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.dCYpqe/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 74.852678][ T28] audit: type=1400 audit(74.800:121): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.dCYpqe/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1886 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 74.871383][ T28] audit: type=1400 audit(74.820:122): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 74.888157][ T28] audit: type=1400 audit(74.820:123): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 74.888465][ T28] audit: type=1400 audit(74.830:124): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=2465 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 74.888557][ T28] audit: type=1400 audit(74.830:125): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 74.888613][ T28] audit: type=1400 audit(74.830:126): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 74.950127][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 75.153971][ T3098] veth0_vlan: entered promiscuous mode [ 75.169329][ T3098] veth1_vlan: entered promiscuous mode [ 75.211545][ T3098] veth0_macvtap: entered promiscuous mode [ 75.224043][ T3098] veth1_macvtap: entered promiscuous mode [ 75.289046][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.291722][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.294979][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.302074][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.079542][ T3718] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65525 sclass=netlink_audit_socket pid=3718 comm=syz.0.7 [ 77.033958][ T3757] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3757 comm=syz.0.26 [ 77.902818][ T3796] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3796 comm=syz.1.46 [ 82.181415][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 82.181916][ T28] audit: type=1400 audit(82.130:142): avc: denied { write } for pid=3881 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 82.265726][ T28] audit: type=1400 audit(82.210:143): avc: denied { create } for pid=3883 comm="syz.0.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 82.285175][ T28] audit: type=1400 audit(82.230:144): avc: denied { getopt } for pid=3883 comm="syz.0.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 83.722554][ T28] audit: type=1400 audit(83.670:145): avc: denied { prog_load } for pid=3911 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 83.723594][ T28] audit: type=1400 audit(83.670:146): avc: denied { bpf } for pid=3911 comm="syz.1.105" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 83.726482][ T28] audit: type=1400 audit(83.670:147): avc: denied { perfmon } for pid=3911 comm="syz.1.105" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 83.754726][ T28] audit: type=1400 audit(83.700:148): avc: denied { prog_run } for pid=3911 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 85.298129][ T28] audit: type=1400 audit(85.230:149): avc: denied { create } for pid=3927 comm="syz.0.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 85.339824][ T28] audit: type=1400 audit(85.280:150): avc: denied { ioctl } for pid=3927 comm="syz.0.112" path="socket:[2824]" dev="sockfs" ino=2824 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 87.249178][ T28] audit: type=1400 audit(87.200:151): avc: denied { create } for pid=3953 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 87.252828][ T28] audit: type=1400 audit(87.200:152): avc: denied { write } for pid=3953 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 87.474166][ T28] audit: type=1400 audit(87.420:153): avc: denied { getopt } for pid=3966 comm="syz.0.131" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 87.590818][ T28] audit: type=1400 audit(87.540:154): avc: denied { lock } for pid=3973 comm="syz.1.135" path="socket:[3461]" dev="sockfs" ino=3461 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 87.698575][ T3979] capability: warning: `syz.0.136' uses 32-bit capabilities (legacy support in use) [ 89.696575][ T28] audit: type=1400 audit(89.630:155): avc: denied { ioctl } for pid=4056 comm="syz.0.176" path="socket:[3602]" dev="sockfs" ino=3602 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 89.804963][ T28] audit: type=1400 audit(89.750:156): avc: denied { map_create } for pid=4060 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 90.050427][ T28] audit: type=1400 audit(90.000:157): avc: denied { create } for pid=4065 comm="syz.0.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 90.055915][ T28] audit: type=1400 audit(90.000:158): avc: denied { setattr } for pid=4065 comm="syz.0.180" name="PING" dev="sockfs" ino=3067 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 90.087553][ T28] audit: type=1400 audit(90.030:159): avc: denied { map_read map_write } for pid=4060 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 90.929962][ T28] audit: type=1400 audit(90.880:160): avc: denied { ioctl } for pid=4085 comm="syz.0.190" path="socket:[3659]" dev="sockfs" ino=3659 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 93.602266][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 93.602596][ T28] audit: type=1400 audit(93.550:163): avc: denied { ioctl } for pid=4196 comm="syz.0.246" path="socket:[4307]" dev="sockfs" ino=4307 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 93.628712][ T28] audit: type=1400 audit(93.580:164): avc: denied { ioctl } for pid=4195 comm="syz.1.245" path="socket:[4306]" dev="sockfs" ino=4306 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 94.093983][ T28] audit: type=1400 audit(94.040:165): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 94.686918][ T28] audit: type=1400 audit(94.630:166): avc: denied { create } for pid=4240 comm="syz.0.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 94.788544][ T40] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 94.947994][ T40] usb 2-1: Using ep0 maxpacket: 16 [ 94.958669][ T40] usb 2-1: unable to get BOS descriptor or descriptor too short [ 94.967872][ T40] usb 2-1: config 1 has an invalid interface number: 208 but max is 0 [ 94.968213][ T40] usb 2-1: config 1 has no interface number 0 [ 94.968386][ T40] usb 2-1: config 1 interface 208 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 1024 [ 94.986376][ T40] usb 2-1: New USB device found, idVendor=2040, idProduct=b757, bcdDevice=6b.64 [ 94.986676][ T40] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 94.987003][ T40] usb 2-1: Product: syz [ 94.987452][ T40] usb 2-1: Manufacturer: syz [ 94.987509][ T40] usb 2-1: SerialNumber: syz [ 95.003820][ T4233] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 95.244842][ T40] usb 2-1: USB disconnect, device number 2 [ 96.902135][ T28] audit: type=1400 audit(96.850:167): avc: denied { setattr } for pid=4313 comm="syz.1.299" name="" dev="pipefs" ino=3994 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 96.961489][ T28] audit: type=1400 audit(96.910:168): avc: denied { create } for pid=4317 comm="syz.1.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 96.964321][ T28] audit: type=1400 audit(96.910:169): avc: denied { write } for pid=4317 comm="syz.1.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 97.107869][ T28] audit: type=1400 audit(97.050:170): avc: denied { setopt } for pid=4325 comm="syz.0.304" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 97.252688][ T28] audit: type=1400 audit(97.200:171): avc: denied { ioctl } for pid=4332 comm="syz.1.308" path="socket:[4535]" dev="sockfs" ino=4535 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 97.735641][ T28] audit: type=1400 audit(97.680:172): avc: denied { create } for pid=4354 comm="syz.1.318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 100.785337][ T28] audit: type=1400 audit(100.730:173): avc: denied { nlmsg_write } for pid=4465 comm="syz.1.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 101.274040][ T28] audit: type=1400 audit(101.220:174): avc: denied { setopt } for pid=4481 comm="syz.1.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 101.440861][ T28] audit: type=1400 audit(101.390:175): avc: denied { ioctl } for pid=4485 comm="syz.1.384" path="uts:[4026532656]" dev="nsfs" ino=4026532656 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 101.613824][ T28] audit: type=1400 audit(101.560:176): avc: denied { create } for pid=4491 comm="syz.1.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 101.619229][ T28] audit: type=1400 audit(101.570:177): avc: denied { ioctl } for pid=4491 comm="syz.1.387" path="socket:[4800]" dev="sockfs" ino=4800 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 101.776191][ T28] audit: type=1400 audit(101.720:178): avc: denied { connect } for pid=4497 comm="syz.1.390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 102.962361][ T28] audit: type=1400 audit(102.910:179): avc: denied { ioctl } for pid=4529 comm="syz.1.407" path="socket:[5394]" dev="sockfs" ino=5394 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 104.152350][ T28] audit: type=1400 audit(104.100:180): avc: denied { setopt } for pid=4577 comm="syz.1.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 104.479942][ T28] audit: type=1400 audit(104.430:181): avc: denied { allowed } for pid=4592 comm="syz.0.437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 104.496325][ T28] audit: type=1400 audit(104.440:182): avc: denied { create } for pid=4592 comm="syz.0.437" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 105.838734][ T4663] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=4663 comm=syz.0.473 [ 105.896239][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 105.896598][ T28] audit: type=1400 audit(105.840:185): avc: denied { connect } for pid=4665 comm="syz.1.474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 105.914070][ T4668] Zero length message leads to an empty skb [ 106.171944][ T28] audit: type=1400 audit(106.120:186): avc: denied { setattr } for pid=4679 comm="syz.1.481" name="CAN_RAW" dev="sockfs" ino=5629 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 107.083052][ T28] audit: type=1400 audit(107.030:187): avc: denied { map } for pid=4717 comm="syz.0.500" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6216 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 107.083449][ T28] audit: type=1400 audit(107.030:188): avc: denied { read write } for pid=4717 comm="syz.0.500" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6216 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 107.724612][ T28] audit: type=1400 audit(107.670:189): avc: denied { write } for pid=4740 comm="syz.1.512" name="ip6_mr_vif" dev="proc" ino=4026532798 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 108.599911][ T4780] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5126 sclass=netlink_audit_socket pid=4780 comm=syz.0.531 [ 109.440091][ T28] audit: type=1400 audit(109.380:190): avc: denied { setopt } for pid=4820 comm="syz.1.551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 110.040718][ T28] audit: type=1400 audit(109.990:191): avc: denied { setopt } for pid=4845 comm="syz.0.563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 112.399589][ T28] audit: type=1400 audit(112.350:192): avc: denied { create } for pid=4958 comm="syz.1.620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 112.405901][ T28] audit: type=1400 audit(112.350:193): avc: denied { ioctl } for pid=4958 comm="syz.1.620" path="socket:[6107]" dev="sockfs" ino=6107 ioctlcmd=0x89e3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 114.244052][ T28] audit: type=1400 audit(114.190:194): avc: denied { create } for pid=5036 comm="syz.0.657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 114.258907][ T28] audit: type=1400 audit(114.210:195): avc: denied { ioctl } for pid=5036 comm="syz.0.657" path="socket:[7272]" dev="sockfs" ino=7272 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 114.999586][ T28] audit: type=1400 audit(114.950:196): avc: denied { write } for pid=5069 comm="syz.1.674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 115.422001][ T28] audit: type=1400 audit(115.370:197): avc: denied { getattr } for pid=5089 comm="syz.1.685" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6833 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 115.582718][ T5098] raw_sendmsg: syz.1.688 forgot to set AF_INET. Fix it! [ 117.113720][ T28] audit: type=1400 audit(117.060:198): avc: denied { audit_write } for pid=5151 comm="syz.0.715" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 120.194003][ T28] audit: type=1400 audit(120.140:199): avc: denied { read } for pid=5280 comm="syz.1.779" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 120.198353][ T28] audit: type=1400 audit(120.150:200): avc: denied { open } for pid=5280 comm="syz.1.779" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 120.203915][ T28] audit: type=1400 audit(120.150:201): avc: denied { ioctl } for pid=5280 comm="syz.1.779" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 120.209176][ T5282] binder: 5280:5282 ioctl c0306201 20000080 returned -14 [ 120.581517][ T28] audit: type=1400 audit(120.530:202): avc: denied { getopt } for pid=5291 comm="syz.0.785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 123.474818][ T28] audit: type=1400 audit(123.420:203): avc: denied { ioctl } for pid=5378 comm="syz.1.829" path="socket:[7861]" dev="sockfs" ino=7861 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 124.668881][ T5424] capability: warning: `syz.0.851' uses deprecated v2 capabilities in a way that may be insecure [ 124.902824][ T28] audit: type=1400 audit(124.850:204): avc: denied { ioctl } for pid=5432 comm="syz.1.856" path="socket:[8399]" dev="sockfs" ino=8399 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 132.192274][ T28] audit: type=1400 audit(132.140:205): avc: denied { ioctl } for pid=5571 comm="syz.1.915" path="socket:[9236]" dev="sockfs" ino=9236 ioctlcmd=0x8922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 134.132959][ T28] audit: type=1400 audit(134.080:206): avc: denied { getopt } for pid=5644 comm="syz.1.952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 136.475665][ T28] audit: type=1400 audit(136.420:207): avc: denied { getopt } for pid=5743 comm="syz.0.1000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 136.639304][ T5748] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5748 comm=syz.1.1002 [ 136.828713][ T5756] ======================================================= [ 136.828713][ T5756] WARNING: The mand mount option has been deprecated and [ 136.828713][ T5756] and is ignored by this kernel. Remove the mand [ 136.828713][ T5756] option from the mount to silence this warning. [ 136.828713][ T5756] ======================================================= [ 138.063498][ T5807] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5807 comm=syz.0.1031 [ 138.341542][ T28] audit: type=1400 audit(138.290:208): avc: denied { create } for pid=5816 comm="syz.1.1036" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 138.361724][ T28] audit: type=1400 audit(138.310:209): avc: denied { write } for pid=5816 comm="syz.1.1036" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 138.622268][ T28] audit: type=1400 audit(138.570:210): avc: denied { setopt } for pid=5829 comm="syz.1.1042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 139.873288][ T5885] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5885 comm=syz.0.1069 [ 140.711561][ T28] audit: type=1400 audit(140.660:211): avc: granted { setsecparam } for pid=5917 comm="syz.1.1086" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 140.890216][ T28] audit: type=1400 audit(140.840:212): avc: denied { setattr } for pid=5923 comm="syz.0.1090" name="RAWv6" dev="sockfs" ino=9883 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 141.316218][ T5943] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5943 comm=syz.0.1098 [ 141.582598][ T5955] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5955 comm=syz.0.1105 [ 142.243599][ T28] audit: type=1400 audit(142.190:213): avc: denied { ioctl } for pid=5987 comm="syz.1.1121" path="socket:[9202]" dev="sockfs" ino=9202 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 142.669206][ T28] audit: type=1400 audit(142.620:214): avc: denied { execute } for pid=6011 comm="syz.0.1133" name="file0" dev="tmpfs" ino=2887 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 142.798683][ T28] audit: type=1400 audit(142.750:215): avc: denied { getopt } for pid=6015 comm="syz.0.1135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 143.530068][ T28] audit: type=1400 audit(143.480:216): avc: denied { write } for pid=6043 comm="syz.0.1149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 143.539827][ T6045] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6045 comm=syz.0.1149 [ 145.033517][ T28] audit: type=1400 audit(144.980:217): avc: denied { write } for pid=6112 comm="syz.0.1183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 146.953275][ T28] audit: type=1400 audit(146.900:218): avc: denied { load_policy } for pid=6190 comm="syz.0.1222" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 146.955601][ T6192] SELinux: policydb version 1014823782 does not match my version range 15-35 [ 146.962527][ T6192] SELinux: failed to load policy [ 149.091292][ T6303] __vm_enough_memory: pid: 6303, comm: syz.0.1278, bytes: 4278190080 not enough memory for the allocation [ 149.962754][ T6335] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6335 comm=syz.1.1294 [ 150.344228][ T28] audit: type=1400 audit(150.290:219): avc: denied { listen } for pid=6344 comm="syz.1.1299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 150.826279][ T6357] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=40 sclass=netlink_tcpdiag_socket pid=6357 comm=syz.1.1305 [ 151.292008][ T28] audit: type=1400 audit(151.240:220): avc: denied { write } for pid=6370 comm="syz.1.1312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 152.360282][ T6407] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6407 comm=syz.1.1330 [ 155.514006][ T28] audit: type=1400 audit(155.460:221): avc: denied { lock } for pid=6541 comm="syz.1.1398" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 156.158159][ T11] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 156.328642][ T11] usb 1-1: Using ep0 maxpacket: 16 [ 156.343541][ T11] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 222, changing to 7 [ 156.351875][ T11] usb 1-1: New USB device found, idVendor=0763, idProduct=2012, bcdDevice= 0.40 [ 156.352154][ T11] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 156.352459][ T11] usb 1-1: Product: syz [ 156.352558][ T11] usb 1-1: Manufacturer: syz [ 156.352590][ T11] usb 1-1: SerialNumber: syz [ 156.573551][ T11] usb 1-1: Fast Track Pro switching to config #2 [ 156.583898][ T11] usb 1-1: USB disconnect, device number 2 [ 158.866175][ T6666] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6666 comm=syz.0.1451 [ 159.700594][ T28] audit: type=1400 audit(159.650:222): avc: denied { getopt } for pid=6677 comm="syz.0.1457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 162.477654][ T28] audit: type=1400 audit(162.420:223): avc: denied { append } for pid=6781 comm="syz.0.1509" name="nbd0" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 162.956500][ T6794] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1383 sclass=netlink_tcpdiag_socket pid=6794 comm=syz.0.1515 [ 169.272020][ T28] audit: type=1400 audit(169.220:224): avc: denied { setattr } for pid=7012 comm="syz.0.1623" name="NETLINK" dev="sockfs" ino=13055 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 169.685611][ T7035] random: crng reseeded on system resumption [ 169.838030][ T28] audit: type=1400 audit(169.780:225): avc: denied { watch watch_reads } for pid=7038 comm="syz.1.1637" path="/818" dev="tmpfs" ino=4171 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 171.149415][ T28] audit: type=1400 audit(171.100:226): avc: denied { ioctl } for pid=7091 comm="syz.1.1664" path="socket:[13185]" dev="sockfs" ino=13185 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 172.545771][ T7161] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7161 comm=syz.1.1698 [ 173.893009][ T7219] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2564 sclass=netlink_tcpdiag_socket pid=7219 comm=syz.0.1726 [ 177.788555][ T28] audit: type=1400 audit(177.740:227): avc: granted { setsecparam } for pid=7352 comm="syz.0.1793" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 178.684137][ T7376] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=7376 comm=syz.0.1804 [ 184.904922][ T28] audit: type=1400 audit(184.850:228): avc: denied { mounton } for pid=7629 comm="syz.0.1931" path="/syzcgroup/unified/syz0" dev="cgroup2" ino=61 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 185.589890][ T28] audit: type=1400 audit(185.540:229): avc: denied { setattr } for pid=7662 comm="syz.1.1944" name="ALG" dev="sockfs" ino=15186 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 187.588237][ T7745] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2570 sclass=netlink_route_socket pid=7745 comm=syz.0.1985 [ 188.380508][ T28] audit: type=1400 audit(188.330:230): avc: denied { create } for pid=7774 comm="syz.1.2000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 188.386654][ T28] audit: type=1400 audit(188.330:231): avc: denied { write } for pid=7774 comm="syz.1.2000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 188.994688][ T28] audit: type=1400 audit(188.940:232): avc: denied { getopt } for pid=7797 comm="syz.0.2011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 191.093763][ T28] audit: type=1400 audit(191.040:233): avc: denied { ioctl } for pid=7874 comm="syz.0.2049" path="socket:[16037]" dev="sockfs" ino=16037 ioctlcmd=0x586b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 191.652290][ T7885] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7885 comm=syz.1.2054 [ 192.212003][ T7908] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7908 comm=syz.1.2065 [ 192.862479][ T7930] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7930 comm=syz.0.2077 [ 193.204465][ T7946] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7946 comm=syz.1.2084 [ 194.171841][ T28] audit: type=1400 audit(194.120:234): avc: denied { write } for pid=7992 comm="syz.1.2108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 196.192715][ T8075] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=18 sclass=netlink_audit_socket pid=8075 comm=syz.1.2149 [ 198.172893][ T8152] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8152 comm=syz.1.2187 [ 201.098438][ T8261] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8261 comm=syz.1.2242 [ 202.069584][ T28] audit: type=1400 audit(202.020:235): avc: denied { write } for pid=8286 comm="syz.1.2255" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 202.078772][ T8287] binder: 8286:8287 ioctl c018620c 20000300 returned -1 [ 204.562911][ T28] audit: type=1400 audit(204.510:236): avc: denied { setopt } for pid=8374 comm="syz.0.2299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 206.374415][ T8452] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1000 sclass=netlink_route_socket pid=8452 comm=syz.0.2338 [ 208.139307][ T8521] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8521 comm=syz.1.2372 [ 209.252842][ T8561] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8561 comm=syz.0.2392 [ 210.082773][ T8593] syz.1.2408 (8593): drop_caches: 0 [ 210.928247][ T28] audit: type=1400 audit(210.870:237): avc: denied { accept } for pid=8625 comm="syz.1.2425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 212.019419][ T8671] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8671 comm=syz.0.2447 [ 212.974041][ T8710] netlink: 40 bytes leftover after parsing attributes in process `syz.1.2466'. [ 214.499246][ T28] audit: type=1400 audit(214.450:238): avc: denied { map } for pid=8768 comm="syz.0.2496" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 214.502520][ T28] audit: type=1400 audit(214.450:239): avc: denied { execute } for pid=8768 comm="syz.0.2496" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 220.272373][ T28] audit: type=1400 audit(220.220:240): avc: granted { setsecparam } for pid=8999 comm="syz.1.2610" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 225.948127][ T11] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 226.109922][ T11] usb 1-1: New USB device found, idVendor=1235, idProduct=8004, bcdDevice= 0.40 [ 226.110188][ T11] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 226.110509][ T11] usb 1-1: Product: syz [ 226.110562][ T11] usb 1-1: Manufacturer: syz [ 226.110589][ T11] usb 1-1: SerialNumber: syz [ 226.331087][ T11] usb 1-1: 1:1 : UAC_AS_GENERAL descriptor not found [ 226.337948][ T11] usb 1-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 226.349652][ T11] usb 1-1: USB disconnect, device number 3 [ 226.488396][ T28] audit: type=1400 audit(226.440:241): avc: denied { bind } for pid=9191 comm="syz.0.2691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 227.863239][ T9255] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9255 comm=syz.0.2721 [ 228.053740][ T28] audit: type=1400 audit(228.000:242): avc: denied { ioctl } for pid=9264 comm="syz.1.2727" path="socket:[21589]" dev="sockfs" ino=21589 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 229.422777][ T9319] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=279 sclass=netlink_tcpdiag_socket pid=9319 comm=syz.1.2754 [ 232.903221][ T28] audit: type=1400 audit(232.850:243): avc: denied { read } for pid=9462 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 232.911233][ T28] audit: type=1400 audit(232.860:244): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 232.912422][ T28] audit: type=1400 audit(232.860:245): avc: denied { open } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 232.914574][ T28] audit: type=1400 audit(232.860:246): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 233.011804][ T28] audit: type=1400 audit(232.960:247): avc: denied { create } for pid=9466 comm="syz.1.2828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 233.016178][ T28] audit: type=1400 audit(232.960:248): avc: denied { write } for pid=9466 comm="syz.1.2828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 234.209769][ T28] audit: type=1400 audit(234.160:249): avc: denied { open } for pid=9516 comm="syz.1.2851" path="/dev/iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 234.213771][ T9518] syz.1.2851(9518): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 236.170437][ T28] audit: type=1400 audit(236.120:250): avc: denied { ioctl } for pid=9596 comm="syz.1.2892" path="/dev/sequencer" dev="devtmpfs" ino=721 ioctlcmd=0x942e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 236.732921][ T28] audit: type=1400 audit(236.680:251): avc: denied { module_request } for pid=9617 comm="syz.1.2903" kmod="tcp_" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 237.182918][ T9634] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9634 comm=syz.1.2910 [ 237.229063][ T28] audit: type=1400 audit(237.170:252): avc: denied { create } for pid=9635 comm="syz.0.2911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 238.202659][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 238.203236][ T28] audit: type=1400 audit(238.150:255): avc: denied { create } for pid=9670 comm="syz.0.2929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 238.318403][ T9675] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1015 sclass=netlink_tcpdiag_socket pid=9675 comm=syz.0.2931 [ 238.661757][ T28] audit: type=1400 audit(238.610:256): avc: denied { create } for pid=9686 comm="syz.0.2937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 238.666719][ T28] audit: type=1400 audit(238.610:257): avc: denied { ioctl } for pid=9686 comm="syz.0.2937" path="socket:[22423]" dev="sockfs" ino=22423 ioctlcmd=0x6f01 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 239.709867][ T28] audit: type=1400 audit(239.660:258): avc: denied { write } for pid=9722 comm="syz.0.2954" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 239.897655][ T28] audit: type=1400 audit(239.840:259): avc: denied { allowed } for pid=9729 comm="syz.1.2957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 239.909367][ T28] audit: type=1400 audit(239.850:260): avc: denied { create } for pid=9729 comm="syz.1.2957" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 239.919201][ T28] audit: type=1400 audit(239.870:261): avc: denied { map } for pid=9729 comm="syz.1.2957" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22501 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 239.919638][ T28] audit: type=1400 audit(239.870:262): avc: denied { read write } for pid=9729 comm="syz.1.2957" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22501 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 241.252480][ T9775] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5123 sclass=netlink_audit_socket pid=9775 comm=syz.1.2980 [ 241.400205][ T28] audit: type=1400 audit(241.350:263): avc: denied { append } for pid=9780 comm="syz.0.2984" name="i2c-2" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 241.872408][ T28] audit: type=1400 audit(241.820:264): avc: denied { create } for pid=9801 comm="syz.1.2994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 241.874590][ T9803] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1540 sclass=netlink_xfrm_socket pid=9803 comm=syz.1.2994 [ 243.650250][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 243.651254][ T28] audit: type=1400 audit(243.600:268): avc: denied { create } for pid=9894 comm="syz.1.3040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 243.805476][ T28] audit: type=1400 audit(243.750:269): avc: denied { create } for pid=9902 comm="syz.1.3045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 244.464695][ T28] audit: type=1400 audit(244.410:270): avc: denied { ioctl } for pid=9939 comm="syz.0.3061" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=22875 ioctlcmd=0xaa05 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 244.531361][ T28] audit: type=1400 audit(244.480:271): avc: denied { bind } for pid=9943 comm="syz.1.3065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 245.200659][ T28] audit: type=1400 audit(245.150:272): avc: denied { read } for pid=9975 comm="syz.0.3079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 246.750687][ T28] audit: type=1400 audit(246.700:273): avc: denied { write } for pid=10049 comm="syz.0.3116" name="unix" dev="proc" ino=4026532687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 247.176875][ T28] audit: type=1400 audit(247.120:274): avc: denied { getopt } for pid=10066 comm="syz.1.3124" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 247.244186][T10070] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10070 comm=syz.1.3126 [ 247.610328][ T28] audit: type=1400 audit(247.560:275): avc: denied { ioctl } for pid=10083 comm="syz.0.3132" path="socket:[23840]" dev="sockfs" ino=23840 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 247.622262][T10084] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10084 comm=syz.1.3133 [ 247.850423][ T28] audit: type=1400 audit(247.800:276): avc: denied { create } for pid=10091 comm="syz.0.3137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 247.856258][ T28] audit: type=1400 audit(247.800:277): avc: denied { getopt } for pid=10091 comm="syz.0.3137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 249.763110][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 249.764700][ T28] audit: type=1400 audit(249.710:279): avc: denied { execute } for pid=10169 comm="syz.0.3175" name="file0" dev="tmpfs" ino=8096 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 252.590395][T10263] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1549 sclass=netlink_audit_socket pid=10263 comm=syz.1.3223 [ 252.868185][ T28] audit: type=1400 audit(252.810:280): avc: denied { setopt } for pid=10273 comm="syz.0.3227" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 252.959908][ T28] audit: type=1400 audit(252.910:281): avc: denied { create } for pid=10276 comm="syz.0.3229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 252.970558][ T28] audit: type=1400 audit(252.920:282): avc: denied { write } for pid=10276 comm="syz.0.3229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 252.976988][ T28] audit: type=1400 audit(252.920:283): avc: denied { read } for pid=10276 comm="syz.0.3229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 253.580606][ T28] audit: type=1400 audit(253.530:284): avc: denied { create } for pid=10288 comm="syz.1.3235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 253.586401][ T28] audit: type=1400 audit(253.530:285): avc: denied { ioctl } for pid=10288 comm="syz.1.3235" path="socket:[24144]" dev="sockfs" ino=24144 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 253.933007][T10297] ptrace attach of "/syz-executor exec"[10298] was attempted by "/syz-executor exec"[10297] [ 254.466675][ T28] audit: type=1400 audit(254.410:286): avc: denied { create } for pid=10313 comm="syz.1.3247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 254.478622][ T28] audit: type=1400 audit(254.420:287): avc: denied { write } for pid=10313 comm="syz.1.3247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 256.128861][ T28] audit: type=1400 audit(256.080:288): avc: denied { create } for pid=10340 comm="syz.0.3260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 257.310919][ T28] audit: type=1400 audit(257.260:289): avc: denied { ioctl } for pid=10385 comm="syz.1.3282" path="socket:[24305]" dev="sockfs" ino=24305 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 257.513658][ T28] audit: type=1400 audit(257.460:290): avc: denied { setattr } for pid=10394 comm="syz.0.3287" name="vsock" dev="devtmpfs" ino=756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 257.542740][ T28] audit: type=1400 audit(257.490:291): avc: denied { create } for pid=10396 comm="syz.1.3288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 258.563689][ T28] audit: type=1400 audit(258.510:292): avc: denied { create } for pid=10442 comm="syz.1.3311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 258.772577][ T28] audit: type=1400 audit(258.720:293): avc: denied { getopt } for pid=10454 comm="syz.0.3317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 259.729478][ T28] audit: type=1400 audit(259.680:294): avc: denied { connect } for pid=10499 comm="syz.0.3340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 260.302213][ T28] audit: type=1400 audit(260.250:295): avc: denied { ioctl } for pid=10520 comm="syz.1.3350" path="socket:[24969]" dev="sockfs" ino=24969 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 260.841929][T10549] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1545 sclass=netlink_audit_socket pid=10549 comm=syz.1.3364 [ 262.565171][ T28] audit: type=1400 audit(262.510:296): avc: denied { lock } for pid=10613 comm="syz.1.3397" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 262.804389][ T28] audit: type=1400 audit(262.750:297): avc: denied { getopt } for pid=10622 comm="syz.1.3402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 264.920776][ T28] audit: type=1400 audit(264.870:298): avc: denied { read } for pid=10710 comm="syz.0.3445" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 264.921177][ T28] audit: type=1400 audit(264.870:299): avc: denied { open } for pid=10710 comm="syz.0.3445" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 265.934610][ T28] audit: type=1400 audit(265.880:300): avc: denied { write } for pid=10749 comm="syz.1.3465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 266.123726][ T28] audit: type=1400 audit(266.070:301): avc: denied { setopt } for pid=10756 comm="syz.0.3468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 266.138226][ T28] audit: type=1400 audit(266.080:302): avc: denied { setopt } for pid=10757 comm="syz.1.3469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 267.063927][ T28] audit: type=1400 audit(267.010:303): avc: denied { write } for pid=10792 comm="syz.1.3486" path="socket:[25470]" dev="sockfs" ino=25470 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 268.806578][ T28] audit: type=1400 audit(268.750:304): avc: denied { write } for pid=10850 comm="syz.0.3515" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 271.333280][ T28] audit: type=1400 audit(271.280:305): avc: denied { mounton } for pid=10918 comm="syz.0.3549" path="/1775/file0" dev="tmpfs" ino=9082 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 271.335085][ T28] audit: type=1400 audit(271.280:306): avc: denied { mount } for pid=10918 comm="syz.0.3549" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 271.352409][ T28] audit: type=1400 audit(271.300:307): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 271.614235][ T28] audit: type=1400 audit(271.560:308): avc: denied { setattr } for pid=10929 comm="syz.1.3554" name="" dev="pipefs" ino=26729 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 272.327757][ T28] audit: type=1400 audit(272.270:309): avc: denied { ioctl } for pid=10959 comm="syz.0.3569" path="socket:[26186]" dev="sockfs" ino=26186 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 272.344410][ T28] audit: type=1400 audit(272.290:310): avc: denied { execmem } for pid=10960 comm="syz.1.3570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 272.572074][ T28] audit: type=1400 audit(272.520:311): avc: denied { ioctl } for pid=10971 comm="syz.1.3575" path="socket:[26820]" dev="sockfs" ino=26820 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 274.843166][T11053] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11053 comm=syz.1.3615 [ 278.780635][T11183] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11183 comm=syz.1.3676 [ 281.300846][ T28] audit: type=1400 audit(281.250:312): avc: denied { create } for pid=11284 comm="syz.1.3728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 281.306033][ T28] audit: type=1400 audit(281.250:313): avc: denied { write } for pid=11284 comm="syz.1.3728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 282.742790][T11339] SELinux: Context system_u:object_r:ssh_keysign_exec_t:s0 is not valid (left unmapped). [ 282.752979][ T28] audit: type=1400 audit(282.690:314): avc: denied { relabelto } for pid=11338 comm="syz.1.3755" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 282.767741][ T28] audit: type=1400 audit(282.690:315): avc: denied { associate } for pid=11338 comm="syz.1.3755" name="null" dev="devtmpfs" ino=4 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 283.333249][ T28] audit: type=1400 audit(283.280:316): avc: denied { ioctl } for pid=11349 comm="syz.0.3761" path="socket:[27797]" dev="sockfs" ino=27797 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 283.681093][T11363] SELinux: syz.1.3766 (11363) wrote to checkreqprot. This is no longer supported. [ 283.854376][ T28] audit: type=1400 audit(283.800:317): avc: denied { name_bind } for pid=11369 comm="syz.1.3770" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 283.860124][ T28] audit: type=1400 audit(283.810:318): avc: denied { node_bind } for pid=11369 comm="syz.1.3770" saddr=224.0.0.1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 283.965046][ T28] audit: type=1400 audit(283.910:319): avc: denied { write } for pid=11373 comm="syz.1.3772" dev="sockfs" ino=27835 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 283.965518][ T28] audit: type=1400 audit(283.910:320): avc: denied { setattr } for pid=11373 comm="syz.1.3772" name="NETLINK" dev="sockfs" ino=27835 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 284.326244][ T28] audit: type=1400 audit(284.270:321): avc: denied { append } for pid=11389 comm="syz.1.3778" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 284.362448][ T3701] usb 1-1: new low-speed USB device number 4 using dummy_hcd [ 284.603976][ T3701] usb 1-1: unable to get BOS descriptor or descriptor too short [ 284.608535][ T3701] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has invalid maxpacket 16, setting to 0 [ 284.608834][ T3701] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 4 [ 284.609012][ T3701] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has invalid maxpacket 1023, setting to 0 [ 284.641746][ T3701] usb 1-1: string descriptor 0 read error: -22 [ 284.642211][ T3701] usb 1-1: New USB device found, idVendor=0bda, idProduct=4014, bcdDevice= 0.40 [ 284.642270][ T3701] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 284.661635][ T3701] usb 1-1: low speed audio streaming not supported [ 284.662088][ T3701] usb 1-1: low speed audio streaming not supported [ 284.904849][ T3701] usb 1-1: 6:0: failed to get current value for ch 0 (-22) [ 284.941842][ T3701] usb 1-1: 6:0: cannot get min/max values for control 4 (id 6) [ 284.993888][ T3701] usb 1-1: USB disconnect, device number 4 [ 285.852911][T11465] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11465 comm=syz.0.3804 [ 286.722465][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 286.722782][ T28] audit: type=1400 audit(286.670:323): avc: denied { sqpoll } for pid=11503 comm="syz.1.3824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 288.495536][ T28] audit: type=1400 audit(288.440:324): avc: denied { watch watch_reads } for pid=11568 comm="syz.0.3856" path="/1936" dev="tmpfs" ino=9901 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 290.290904][T11655] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11655 comm=syz.1.3895 [ 292.663880][T11749] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11749 comm=syz.0.3942 [ 293.138174][T11767] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11767 comm=syz.0.3951 [ 294.864741][ T28] audit: type=1400 audit(294.810:325): avc: denied { bind } for pid=11832 comm="syz.0.3984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 294.865186][ T28] audit: type=1400 audit(294.810:326): avc: denied { node_bind } for pid=11832 comm="syz.0.3984" saddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 294.909339][ T28] audit: type=1400 audit(294.860:327): avc: denied { getopt } for pid=11834 comm="syz.1.3985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 295.400689][ T28] audit: type=1400 audit(295.350:328): avc: denied { read } for pid=11848 comm="syz.0.3992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 295.642375][ T28] audit: type=1400 audit(295.590:329): avc: denied { ioctl } for pid=11861 comm="syz.0.3997" path="socket:[28521]" dev="sockfs" ino=28521 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 298.788874][ T28] audit: type=1400 audit(298.740:330): avc: denied { write } for pid=11981 comm="syz.1.4058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 299.284899][ T28] audit: type=1400 audit(299.230:331): avc: denied { sys_module } for pid=11991 comm="syz.0.4061" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 300.131777][T12023] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12023 comm=syz.1.4074 [ 300.564618][T12039] hsr0: entered allmulticast mode [ 300.565284][T12039] hsr_slave_0: entered allmulticast mode [ 300.565498][T12039] hsr_slave_1: entered allmulticast mode [ 301.309812][T12070] random: crng reseeded on system resumption [ 302.281643][ T28] audit: type=1400 audit(302.230:332): avc: denied { prog_load } for pid=12110 comm="syz.1.4118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 302.282678][ T28] audit: type=1400 audit(302.230:333): avc: denied { bpf } for pid=12110 comm="syz.1.4118" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 303.002559][T12138] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12138 comm=syz.1.4131 [ 303.461745][ T28] audit: type=1400 audit(303.410:334): avc: denied { getattr } for pid=12155 comm="syz.0.4140" path="socket:[30928]" dev="sockfs" ino=30928 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 303.523849][T12158] SELinux: Context system_u:object_r:devtty_t:s0 is not valid (left unmapped). [ 303.531417][ T28] audit: type=1400 audit(303.480:335): avc: denied { relabelto } for pid=12157 comm="syz.1.4141" name="2056" dev="tmpfs" ino=10481 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:devtty_t:s0" [ 303.532729][ T28] audit: type=1400 audit(303.480:336): avc: denied { associate } for pid=12157 comm="syz.1.4141" name="2056" dev="tmpfs" ino=10481 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:devtty_t:s0" [ 303.549999][ T28] audit: type=1400 audit(303.500:337): avc: denied { write } for pid=3099 comm="syz-executor" name="2056" dev="tmpfs" ino=10481 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:devtty_t:s0" [ 303.551565][ T28] audit: type=1400 audit(303.500:338): avc: denied { remove_name } for pid=3099 comm="syz-executor" name="binderfs" dev="tmpfs" ino=10485 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:devtty_t:s0" [ 303.554384][ T28] audit: type=1400 audit(303.500:339): avc: denied { write } for pid=3099 comm="syz-executor" name="2056" dev="tmpfs" ino=10481 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:devtty_t:s0" [ 303.557001][ T28] audit: type=1400 audit(303.500:340): avc: denied { write } for pid=3099 comm="syz-executor" name="2056" dev="tmpfs" ino=10481 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:devtty_t:s0" [ 303.560295][ T28] audit: type=1400 audit(303.500:341): avc: denied { write } for pid=3099 comm="syz-executor" name="2056" dev="tmpfs" ino=10481 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:devtty_t:s0" [ 305.657874][ T3701] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 305.808186][ T3701] usb 2-1: Using ep0 maxpacket: 8 [ 305.829182][ T3701] usb 2-1: config 179 has an invalid interface number: 65 but max is 0 [ 305.830323][ T3701] usb 2-1: config 179 has no interface number 0 [ 305.831359][ T3701] usb 2-1: config 179 interface 65 altsetting 12 endpoint 0xF has an invalid bInterval 63, changing to 9 [ 305.832494][ T3701] usb 2-1: config 179 interface 65 altsetting 12 endpoint 0xF has invalid maxpacket 57605, setting to 1024 [ 305.833807][ T3701] usb 2-1: config 179 interface 65 altsetting 12 endpoint 0x83 has invalid wMaxPacketSize 0 [ 305.835260][ T3701] usb 2-1: config 179 interface 65 altsetting 12 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 305.838962][ T3701] usb 2-1: config 179 interface 65 has no altsetting 0 [ 305.840076][ T3701] usb 2-1: New USB device found, idVendor=12ab, idProduct=0004, bcdDevice= 0.00 [ 305.841014][ T3701] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 306.070052][ T95] usb 2-1: USB disconnect, device number 3 [ 308.323872][T12308] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5127 sclass=netlink_route_socket pid=12308 comm=syz.1.4209 [ 309.916744][ T37] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 309.929725][ T37] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 309.930027][ T37] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 309.930170][ T37] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.142238][T12442] ALSA: mixer_oss: invalid OSS volume '' [ 313.727895][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 313.728324][ T28] audit: type=1400 audit(313.660:347): avc: denied { setopt } for pid=12461 comm="syz.1.4286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 315.672613][ T28] audit: type=1400 audit(315.620:348): avc: denied { create } for pid=12507 comm="syz.1.4308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 316.362086][ T28] audit: type=1400 audit(316.310:349): avc: denied { prog_run } for pid=12523 comm="syz.1.4316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 321.122097][T12572] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12572 comm=syz.0.4338 [ 322.713600][T12617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12617 comm=syz.0.4361 [ 323.188555][T12635] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12635 comm=syz.1.4370 [ 325.169045][T12691] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12691 comm=syz.1.4399 [ 326.574495][T12721] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12721 comm=syz.1.4412 [ 327.663079][ T28] audit: type=1400 audit(327.610:350): avc: denied { getopt } for pid=12741 comm="syz.1.4423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 331.461624][T12848] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12848 comm=syz.0.4476 [ 332.973473][ T28] audit: type=1400 audit(332.920:351): avc: denied { write } for pid=12898 comm="syz.0.4501" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 336.323047][T12986] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12986 comm=syz.1.4544 [ 336.988097][ T95] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 337.189849][ T95] usb 1-1: config 1 has an invalid interface number: 7 but max is 0 [ 337.190151][ T95] usb 1-1: config 1 has no interface number 0 [ 337.190463][ T95] usb 1-1: config 1 interface 7 altsetting 0 has an endpoint descriptor with address 0xDB, changing to 0x8B [ 337.190532][ T95] usb 1-1: config 1 interface 7 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 337.190572][ T95] usb 1-1: config 1 interface 7 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 337.297746][ T95] usb 1-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 337.298033][ T95] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 337.298255][ T95] usb 1-1: Product: syz [ 337.298335][ T95] usb 1-1: Manufacturer: syz [ 337.298362][ T95] usb 1-1: SerialNumber: syz [ 337.351853][T12999] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 337.620031][T12999] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 337.831304][ T95] usb 1-1: Incompatible driver and firmware versions [ 337.849238][ T95] usb 1-1: USB disconnect, device number 5 [ 347.361225][ T28] audit: type=1400 audit(347.310:352): avc: denied { setopt } for pid=13317 comm="syz.0.4699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 347.510756][ T28] audit: type=1400 audit(347.450:353): avc: denied { getopt } for pid=13323 comm="syz.1.4703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 347.632743][ T28] audit: type=1400 audit(347.570:354): avc: denied { setopt } for pid=13327 comm="syz.1.4705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 350.258202][T13397] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13397 comm=syz.0.4739 [ 351.314259][ T28] audit: type=1400 audit(351.260:355): avc: denied { getattr } for pid=13431 comm="syz.0.4756" name="/" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 351.679957][ T28] audit: type=1400 audit(351.630:356): avc: denied { lock } for pid=13441 comm="syz.1.4761" path="socket:[34135]" dev="sockfs" ino=34135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 352.640082][ T28] audit: type=1400 audit(352.590:357): avc: denied { read } for pid=13478 comm="syz.1.4780" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 354.594001][ T28] audit: type=1400 audit(354.540:358): avc: denied { bind } for pid=13532 comm="syz.0.4807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 356.934396][T13580] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2050 sclass=netlink_audit_socket pid=13580 comm=syz.1.4830 [ 357.522803][T13594] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13594 comm=syz.0.4837 [ 358.172297][ T28] audit: type=1400 audit(358.120:359): avc: granted { setsecparam } for pid=13609 comm="syz.0.4843" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 360.800545][ T28] audit: type=1400 audit(360.750:360): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 360.803570][ T28] audit: type=1400 audit(360.750:361): avc: denied { open } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 360.815054][ T28] audit: type=1400 audit(360.760:362): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 360.897835][ T28] audit: type=1400 audit(360.840:363): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 360.901733][ T28] audit: type=1400 audit(360.850:364): avc: denied { open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 360.912534][ T28] audit: type=1400 audit(360.850:365): avc: denied { read } for pid=13679 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 360.923317][ T28] audit: type=1400 audit(360.870:366): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 360.991776][ T28] audit: type=1400 audit(360.940:367): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 360.994155][ T28] audit: type=1400 audit(360.940:368): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 363.226126][ T28] kauditd_printk_skb: 86 callbacks suppressed [ 363.226559][ T28] audit: type=1400 audit(363.170:455): avc: denied { read } for pid=13723 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 363.241768][ T28] audit: type=1400 audit(363.190:456): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 363.242249][ T28] audit: type=1400 audit(363.190:457): avc: denied { open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 363.246189][ T28] audit: type=1400 audit(363.190:458): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 363.306331][ T28] audit: type=1400 audit(363.250:459): avc: denied { read } for pid=13725 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 363.364287][ T28] audit: type=1400 audit(363.310:460): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 363.366654][ T28] audit: type=1400 audit(363.310:461): avc: denied { open } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 363.391395][ T28] audit: type=1400 audit(363.340:462): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 363.434198][ T28] audit: type=1400 audit(363.380:463): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 363.436422][ T28] audit: type=1400 audit(363.380:464): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 364.601769][T13757] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13757 comm=syz.1.4917 [ 366.838025][ T3701] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 367.022876][ T3701] usb 1-1: New USB device found, idVendor=1a86, idProduct=7522, bcdDevice=35.36 [ 367.024041][ T3701] usb 1-1: New USB device strings: Mfr=241, Product=2, SerialNumber=3 [ 367.025013][ T3701] usb 1-1: Product: syz [ 367.025584][ T3701] usb 1-1: Manufacturer: syz [ 367.026637][ T3701] usb 1-1: SerialNumber: syz [ 367.036084][ T3701] usb 1-1: config 0 descriptor?? [ 367.057045][ T3701] ch341 1-1:0.0: ch341-uart converter detected [ 367.300484][ T3701] usb 1-1: failed to receive control message: -121 [ 367.301835][ T3701] ch341-uart ttyUSB0: probe with driver ch341-uart failed with error -121 [ 367.520317][ T3701] usb 1-1: USB disconnect, device number 6 [ 367.523081][ T3701] ch341 1-1:0.0: device disconnected [ 368.271500][ T28] kauditd_printk_skb: 220 callbacks suppressed [ 368.271857][ T28] audit: type=1400 audit(368.220:685): avc: denied { read } for pid=13841 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 368.309291][ T28] audit: type=1400 audit(368.260:686): avc: denied { read } for pid=13843 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 368.368002][ T28] audit: type=1400 audit(368.310:687): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 368.369847][ T28] audit: type=1400 audit(368.310:688): avc: denied { open } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 368.375356][ T28] audit: type=1400 audit(368.310:689): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 368.427046][ T28] audit: type=1400 audit(368.370:690): avc: denied { read } for pid=13845 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 368.430235][ T28] audit: type=1400 audit(368.370:691): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 368.435556][ T28] audit: type=1400 audit(368.380:692): avc: denied { open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 368.440763][ T28] audit: type=1400 audit(368.380:693): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 368.495207][ T28] audit: type=1400 audit(368.440:694): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 372.160796][T13935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13935 comm=syz.1.4999 [ 373.293693][ T28] kauditd_printk_skb: 233 callbacks suppressed [ 373.294039][ T28] audit: type=1400 audit(373.240:928): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 373.295568][ T28] audit: type=1400 audit(373.240:929): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 373.300883][ T28] audit: type=1400 audit(373.250:930): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 373.338398][ T28] audit: type=1400 audit(373.290:931): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 373.338836][ T28] audit: type=1400 audit(373.290:932): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 373.339176][ T28] audit: type=1400 audit(373.290:933): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 373.373913][ T28] audit: type=1400 audit(373.320:934): avc: denied { read } for pid=13964 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 373.429110][ T28] audit: type=1400 audit(373.370:935): avc: denied { read } for pid=13965 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 373.503525][ T28] audit: type=1400 audit(373.450:936): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 373.506862][ T28] audit: type=1400 audit(373.450:937): avc: denied { open } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 374.704765][ T31] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 374.722396][ T31] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 374.726864][ T31] bond0 (unregistering): Released all slaves [ 374.804063][ T31] hsr_slave_0: left promiscuous mode [ 374.806187][ T31] hsr_slave_1: left promiscuous mode [ 375.416172][ T31] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 375.503284][ T31] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 375.605280][ T31] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 375.684909][ T31] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 375.783235][ T2954] 8021q: adding VLAN 0 to HW filter on device eth1 [ 375.949213][ T31] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 375.959955][ T31] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 375.966708][ T31] bond0 (unregistering): Released all slaves [ 376.038486][ T31] hsr_slave_0: left promiscuous mode [ 376.041248][ T31] hsr_slave_1: left promiscuous mode [ 376.054163][ T31] veth1_macvtap: left promiscuous mode [ 376.055268][ T31] veth0_macvtap: left promiscuous mode [ 376.056338][ T31] veth1_vlan: left promiscuous mode [ 376.059886][ T31] veth0_vlan: left promiscuous mode [ 377.286339][ T2954] 8021q: adding VLAN 0 to HW filter on device eth2 [ 378.275331][ T2954] 8021q: adding VLAN 0 to HW filter on device eth3 [ 378.516689][ T28] kauditd_printk_skb: 262 callbacks suppressed [ 378.517746][ T28] audit: type=1400 audit(378.460:1200): avc: denied { write } for pid=14036 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 378.518084][ T28] audit: type=1400 audit(378.460:1201): avc: denied { write } for pid=14036 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 378.526323][ T28] audit: type=1400 audit(378.460:1202): avc: denied { write } for pid=14036 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 378.526774][ T28] audit: type=1400 audit(378.470:1203): avc: denied { write } for pid=14036 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 378.527772][ T28] audit: type=1400 audit(378.470:1204): avc: denied { write } for pid=14036 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 378.527996][ T28] audit: type=1400 audit(378.470:1205): avc: denied { write } for pid=14036 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 378.658160][ T28] audit: type=1400 audit(378.600:1206): avc: denied { write } for pid=14037 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 378.660226][ T28] audit: type=1400 audit(378.610:1207): avc: denied { write } for pid=14037 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 378.663989][ T28] audit: type=1400 audit(378.610:1208): avc: denied { write } for pid=14037 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 378.668619][ T28] audit: type=1400 audit(378.610:1209): avc: denied { write } for pid=14037 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 379.203044][ T2954] 8021q: adding VLAN 0 to HW filter on device eth4 [ 379.881206][ T2954] 8021q: adding VLAN 0 to HW filter on device eth5 [ 380.690216][ T2954] 8021q: adding VLAN 0 to HW filter on device eth6 [ 381.681274][ T2954] 8021q: adding VLAN 0 to HW filter on device eth7 [ 382.743797][ T2954] 8021q: adding VLAN 0 to HW filter on device eth8 [ 383.615086][ T28] kauditd_printk_skb: 445 callbacks suppressed [ 383.618515][ T28] audit: type=1400 audit(383.560:1655): avc: denied { write } for pid=14081 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 383.618981][ T28] audit: type=1400 audit(383.560:1656): avc: denied { write } for pid=14081 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 383.619310][ T28] audit: type=1400 audit(383.560:1657): avc: denied { write } for pid=14081 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 383.619536][ T28] audit: type=1400 audit(383.560:1658): avc: denied { write } for pid=14081 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 383.619743][ T28] audit: type=1400 audit(383.560:1659): avc: denied { write } for pid=14081 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 383.619991][ T28] audit: type=1400 audit(383.560:1660): avc: denied { write } for pid=14081 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 383.826263][ T28] audit: type=1400 audit(383.770:1661): avc: denied { write } for pid=14083 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 383.826826][ T28] audit: type=1400 audit(383.770:1662): avc: denied { write } for pid=14083 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 383.832301][ T28] audit: type=1400 audit(383.770:1663): avc: denied { write } for pid=14083 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 383.832682][ T28] audit: type=1400 audit(383.780:1664): avc: denied { write } for pid=14083 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 392.805843][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 392.811641][ T28] audit: type=1400 audit(392.750:1673): avc: denied { write } for pid=14099 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 392.814074][ T28] audit: type=1400 audit(392.750:1674): avc: denied { write } for pid=14099 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 392.819012][ T28] audit: type=1400 audit(392.750:1675): avc: denied { write } for pid=14099 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 392.821821][ T28] audit: type=1400 audit(392.750:1676): avc: denied { write } for pid=14099 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 392.825171][ T28] audit: type=1400 audit(392.760:1677): avc: denied { write } for pid=14099 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 392.831009][ T28] audit: type=1400 audit(392.760:1678): avc: denied { write } for pid=14099 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 392.833308][ T28] audit: type=1400 audit(392.770:1679): avc: denied { search } for pid=14099 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 392.851891][ T28] audit: type=1400 audit(392.800:1680): avc: denied { search } for pid=14100 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 392.853948][ T28] audit: type=1400 audit(392.800:1681): avc: denied { search } for pid=14100 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 392.859090][ T28] audit: type=1400 audit(392.800:1682): avc: denied { search } for pid=14100 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 397.913609][ T28] kauditd_printk_skb: 568 callbacks suppressed [ 397.914036][ T28] audit: type=1400 audit(397.860:2251): avc: denied { search } for pid=14146 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 397.920001][ T28] audit: type=1400 audit(397.870:2252): avc: denied { write } for pid=14146 comm="rm" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 397.993619][ T28] audit: type=1400 audit(397.940:2253): avc: denied { search } for pid=14141 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 398.145287][ T28] audit: type=1400 audit(398.090:2254): avc: denied { write } for pid=14148 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 398.148248][ T28] audit: type=1400 audit(398.090:2255): avc: denied { write } for pid=14148 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 398.155691][ T28] audit: type=1400 audit(398.090:2256): avc: denied { write } for pid=14148 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 398.158321][ T28] audit: type=1400 audit(398.090:2257): avc: denied { write } for pid=14148 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 398.158587][ T28] audit: type=1400 audit(398.090:2258): avc: denied { write } for pid=14148 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 398.158761][ T28] audit: type=1400 audit(398.090:2259): avc: denied { write } for pid=14148 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:ssh_keysign_exec_t:s0" [ 398.163391][ T28] audit: type=1400 audit(398.110:2260): avc: denied { search } for pid=14148 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0