last executing test programs: 41m44.669418649s ago: executing program 1 (id=1580): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x8000}) write$cgroup_pid(r1, 0x0, 0x0) 41m43.847207045s ago: executing program 1 (id=1582): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) ioctl$int_in(r1, 0x5421, &(0x7f0000000280)) 41m43.183576602s ago: executing program 1 (id=1584): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f00000000c0), 0x8480, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000400)={0xc, 0x0, 0x0}) ioctl$IOMMU_OPTION$IOMMU_OPTION_HUGE_PAGES(r0, 0x3b87, &(0x7f0000000080)={0x18, 0x1, 0x0, 0x0, r1}) 41m42.170422719s ago: executing program 1 (id=1586): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mount(&(0x7f0000000040)=@rnullb, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180)='ramfs\x00', 0x1200800, &(0x7f0000000240)='\x00') 41m41.234598471s ago: executing program 1 (id=1588): r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) fanotify_init(0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x5421, &(0x7f0000000080)={'wg0\x00', {0x2, 0x4e20, @local}}) 41m39.430508612s ago: executing program 1 (id=1590): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCGRS485(r1, 0x5451, 0x0) 41m39.400683294s ago: executing program 32 (id=1590): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCGRS485(r1, 0x5451, 0x0) 34m53.975556967s ago: executing program 2 (id=2340): pipe2(0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x5452, &(0x7f0000000040)) 34m53.184924792s ago: executing program 2 (id=2342): r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) 34m52.301617731s ago: executing program 2 (id=2344): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(r0, 0x541b, &(0x7f00000067c0)=0x0) setpgid(r1, 0x0) 34m51.531004574s ago: executing program 2 (id=2345): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x3ac5048, 0x0) 34m50.543414469s ago: executing program 2 (id=2347): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(r0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x4) 34m49.670978898s ago: executing program 2 (id=2349): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0x5450, 0x0) 34m49.534679986s ago: executing program 33 (id=2349): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0x5450, 0x0) 19.371511569s ago: executing program 0 (id=6589): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) prlimit64(0x0, 0x7, &(0x7f00000002c0)={0x6, 0x100}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x200000, 0x0) 18.940421773s ago: executing program 0 (id=6591): r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x42, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) 18.351213885s ago: executing program 0 (id=6593): r0 = openat$sw_sync_info(0xffffff9c, &(0x7f0000000040), 0x88400, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x20004004) 17.89836542s ago: executing program 0 (id=6595): mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x80) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x10, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x9801) move_mount(r0, 0x0, 0xffffffffffffff9c, &(0x7f0000000780)='./file0\x00', 0x226) 17.379419479s ago: executing program 0 (id=6597): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x1, 0x0, 'queue0\x00'}) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xe0c81) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000400)={0x0, 0x7ff, 0xdf, {0x19, 0x1002}, 0x9, 0x5}) 16.219199413s ago: executing program 0 (id=6599): r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup3(r1, r0, 0x0) getsockname$llc(r0, 0x0, &(0x7f0000000080)) 16.203715064s ago: executing program 34 (id=6599): r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup3(r1, r0, 0x0) getsockname$llc(r0, 0x0, &(0x7f0000000080)) 3.591463321s ago: executing program 3 (id=6618): r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x8040, 0x0) dup3(r0, r1, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000140)={0x1}) 2.908130109s ago: executing program 3 (id=6619): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x0) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f00000000c0)) 2.031485858s ago: executing program 3 (id=6620): r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240), 0x8001, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000040)={0x7}) 1.156288106s ago: executing program 3 (id=6621): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$IOMMU_IOAS_UNMAP$ALL(r2, 0x3b86, 0x0) 563.290548ms ago: executing program 3 (id=6622): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) r2 = dup3(r0, r1, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x4000081}, 0x4004000) 0s ago: executing program 3 (id=6623): r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) dup3(r0, r1, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, 0x0) kernel console output (not intermixed with test programs): dm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 272.903544][ T30] audit: type=1400 audit(272.290:49): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 272.970502][ T30] audit: type=1400 audit(272.360:50): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 273.035471][ T3322] cgroup: Unknown subsys name 'net' [ 273.110775][ T30] audit: type=1400 audit(272.500:51): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 273.519612][ T3322] cgroup: Unknown subsys name 'cpuset' [ 273.593006][ T3322] cgroup: Unknown subsys name 'rlimit' [ 273.960869][ T30] audit: type=1400 audit(273.350:52): avc: denied { setattr } for pid=3322 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 273.970604][ T30] audit: type=1400 audit(273.360:53): avc: denied { mounton } for pid=3322 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 273.975802][ T30] audit: type=1400 audit(273.360:54): avc: denied { mount } for pid=3322 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 274.705308][ T3325] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 274.715074][ T30] audit: type=1400 audit(274.100:55): avc: denied { relabelto } for pid=3325 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 274.723185][ T30] audit: type=1400 audit(274.110:56): avc: denied { write } for pid=3325 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 274.873804][ T30] audit: type=1400 audit(274.260:57): avc: denied { read } for pid=3322 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 274.890106][ T30] audit: type=1400 audit(274.270:58): avc: denied { open } for pid=3322 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 274.920876][ T3322] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 294.212422][ T30] audit: type=1400 audit(293.600:59): avc: denied { execmem } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 294.341228][ T30] audit: type=1400 audit(293.730:60): avc: denied { read } for pid=3328 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 294.347651][ T30] audit: type=1400 audit(293.730:61): avc: denied { open } for pid=3329 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 294.359769][ T30] audit: type=1400 audit(293.740:62): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 294.412589][ T30] audit: type=1400 audit(293.800:63): avc: denied { module_request } for pid=3329 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 294.785493][ T30] audit: type=1400 audit(294.170:64): avc: denied { sys_module } for pid=3329 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 304.759452][ T3329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 304.963100][ T3329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 305.145354][ T3328] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 305.361330][ T3328] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 309.180777][ T3329] hsr_slave_0: entered promiscuous mode [ 309.199761][ T3329] hsr_slave_1: entered promiscuous mode [ 310.354135][ T3328] hsr_slave_0: entered promiscuous mode [ 310.371990][ T3328] hsr_slave_1: entered promiscuous mode [ 310.381894][ T3328] debugfs: 'hsr0' already exists in 'hsr' [ 310.383938][ T3328] Cannot create hsr debugfs directory [ 312.835126][ T30] audit: type=1400 audit(312.220:65): avc: denied { create } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 312.854146][ T30] audit: type=1400 audit(312.230:66): avc: denied { write } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 312.869211][ T30] audit: type=1400 audit(312.250:67): avc: denied { read } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 312.902868][ T3329] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 313.059013][ T3329] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 313.133970][ T3329] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 313.182176][ T3329] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 314.065832][ T3328] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 314.133394][ T3328] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 314.221841][ T3328] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 314.301036][ T3328] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 317.733938][ T3329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 318.393999][ T3328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 330.408748][ T3329] veth0_vlan: entered promiscuous mode [ 330.501301][ T3329] veth1_vlan: entered promiscuous mode [ 330.936143][ T3329] veth0_macvtap: entered promiscuous mode [ 331.048381][ T3329] veth1_macvtap: entered promiscuous mode [ 331.406783][ T3328] veth0_vlan: entered promiscuous mode [ 331.636292][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.654892][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.658642][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.673879][ T3328] veth1_vlan: entered promiscuous mode [ 331.728569][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 332.708440][ T30] audit: type=1400 audit(332.090:68): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.iI3V7G/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 332.759158][ T30] audit: type=1400 audit(332.150:69): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 332.773689][ T30] audit: type=1400 audit(332.160:70): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.iI3V7G/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 332.792511][ T30] audit: type=1400 audit(332.180:71): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 332.899403][ T30] audit: type=1400 audit(332.280:72): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.iI3V7G/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 332.938632][ T30] audit: type=1400 audit(332.310:73): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.iI3V7G/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4177 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 333.034368][ T3328] veth0_macvtap: entered promiscuous mode [ 333.096172][ T30] audit: type=1400 audit(332.480:74): avc: denied { unmount } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 333.148618][ T30] audit: type=1400 audit(332.540:75): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 333.163739][ T30] audit: type=1400 audit(332.550:76): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="gadgetfs" ino=3790 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 333.204109][ T30] audit: type=1400 audit(332.590:77): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 333.248240][ T3328] veth1_macvtap: entered promiscuous mode [ 333.784544][ T3329] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 333.953707][ T995] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 333.981165][ T995] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 333.982129][ T995] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 333.982417][ T995] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.184001][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 339.184544][ T30] audit: type=1400 audit(338.570:83): avc: denied { allowed } for pid=3488 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 339.236160][ T30] audit: type=1400 audit(338.620:84): avc: denied { create } for pid=3488 comm="syz.0.7" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 340.990997][ T3497] capability: warning: `syz.0.11' uses 32-bit capabilities (legacy support in use) [ 343.907952][ T30] audit: type=1400 audit(343.280:85): avc: denied { map_create } for pid=3512 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 343.908839][ T30] audit: type=1400 audit(343.280:86): avc: denied { bpf } for pid=3512 comm="syz.1.17" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 346.738108][ T30] audit: type=1400 audit(346.110:87): avc: denied { write } for pid=3525 comm="syz.1.24" name="mcfilter6" dev="proc" ino=4026532716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 348.604060][ T30] audit: type=1400 audit(347.990:88): avc: denied { create } for pid=3530 comm="syz.1.26" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 354.543711][ T30] audit: type=1400 audit(353.930:89): avc: denied { read write } for pid=3544 comm="syz.1.33" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 354.567886][ T30] audit: type=1400 audit(353.950:90): avc: denied { open } for pid=3544 comm="syz.1.33" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 356.834568][ T30] audit: type=1400 audit(356.220:91): avc: denied { create } for pid=3554 comm="syz.0.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 356.940598][ T30] audit: type=1400 audit(356.330:92): avc: denied { write } for pid=3554 comm="syz.0.41" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 357.454625][ T30] audit: type=1400 audit(356.840:93): avc: denied { read write } for pid=3558 comm="syz.1.37" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 357.473122][ T30] audit: type=1400 audit(356.860:94): avc: denied { open } for pid=3558 comm="syz.1.37" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 357.512212][ T30] audit: type=1400 audit(356.900:95): avc: denied { ioctl } for pid=3558 comm="syz.1.37" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 357.777351][ T30] audit: type=1400 audit(357.150:96): avc: denied { read write } for pid=3328 comm="syz-executor" name="loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 357.778260][ T30] audit: type=1400 audit(357.160:97): avc: denied { open } for pid=3328 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 357.778913][ T30] audit: type=1400 audit(357.160:98): avc: denied { ioctl } for pid=3328 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 360.623927][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 360.629034][ T30] audit: type=1400 audit(360.000:102): avc: denied { lock } for pid=3579 comm="syz.0.47" path="socket:[4386]" dev="sockfs" ino=4386 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_kobject_uevent_socket permissive=1 [ 360.999780][ T30] audit: type=1400 audit(360.390:103): avc: denied { create } for pid=3581 comm="syz.1.54" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 361.032076][ T30] audit: type=1400 audit(360.420:104): avc: denied { ioctl } for pid=3581 comm="syz.1.54" path="socket:[4393]" dev="sockfs" ino=4393 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 362.785912][ T30] audit: type=1400 audit(362.170:105): avc: denied { create } for pid=3591 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 367.822782][ T30] audit: type=1400 audit(367.210:106): avc: denied { watch } for pid=3596 comm="syz.1.61" path="pipe:[4417]" dev="pipefs" ino=4417 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 368.073398][ T30] audit: type=1400 audit(367.460:107): avc: denied { map_read map_write } for pid=3597 comm="syz.0.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 369.538558][ T30] audit: type=1400 audit(368.920:108): avc: denied { map } for pid=3605 comm="syz.0.60" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4436 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 369.539570][ T30] audit: type=1400 audit(368.920:109): avc: denied { read write } for pid=3605 comm="syz.0.60" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4436 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 370.803516][ T3613] binfmt_misc: register: failed to install interpreter file ./file0 [ 374.229020][ T30] audit: type=1400 audit(373.580:110): avc: denied { create } for pid=3629 comm="syz.0.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 374.294486][ T30] audit: type=1400 audit(373.680:111): avc: denied { getopt } for pid=3629 comm="syz.0.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 376.651965][ T30] audit: type=1400 audit(376.040:112): avc: denied { read write } for pid=3641 comm="syz.0.78" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 376.700268][ T30] audit: type=1400 audit(376.040:113): avc: denied { open } for pid=3641 comm="syz.0.78" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 376.774130][ T30] audit: type=1400 audit(376.160:114): avc: denied { ioctl } for pid=3641 comm="syz.0.78" path="/newroot/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 380.940643][ T3658] netlink: 48 bytes leftover after parsing attributes in process `syz.0.84'. [ 382.913008][ T30] audit: type=1400 audit(382.300:115): avc: denied { block_suspend } for pid=3667 comm="syz.0.89" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 384.517380][ T30] audit: type=1400 audit(383.900:116): avc: denied { create } for pid=3676 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 384.558211][ T30] audit: type=1400 audit(383.940:117): avc: denied { setopt } for pid=3676 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 386.271943][ T30] audit: type=1400 audit(385.640:118): avc: denied { read } for pid=3684 comm="syz.1.99" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 386.272940][ T30] audit: type=1400 audit(385.650:119): avc: denied { open } for pid=3684 comm="syz.1.99" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 386.298769][ T30] audit: type=1400 audit(385.680:120): avc: denied { ioctl } for pid=3684 comm="syz.1.99" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 388.702760][ T30] audit: type=1400 audit(388.090:121): avc: denied { getopt } for pid=3700 comm="syz.1.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 401.007579][ T30] audit: type=1400 audit(400.390:122): avc: denied { prog_load } for pid=3768 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 401.011165][ T30] audit: type=1400 audit(400.390:123): avc: denied { perfmon } for pid=3768 comm="syz.1.138" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 402.895296][ T30] audit: type=1400 audit(402.280:124): avc: denied { setopt } for pid=3778 comm="syz.1.143" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 409.699524][ T30] audit: type=1400 audit(409.080:125): avc: denied { audit_write } for pid=3818 comm="syz.1.163" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 409.734172][ T30] audit: type=1400 audit(409.120:126): avc: denied { watch watch_reads } for pid=3818 comm="syz.1.163" path="/proc/171/pagemap" dev="proc" ino=5424 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 432.639266][ T3923] capability: warning: `syz.1.213' uses deprecated v2 capabilities in a way that may be insecure [ 433.644728][ T30] audit: type=1400 audit(433.030:127): avc: denied { create } for pid=3927 comm="syz.0.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 433.717862][ T30] audit: type=1400 audit(433.080:128): avc: denied { ioctl } for pid=3927 comm="syz.0.216" path="socket:[4980]" dev="sockfs" ino=4980 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 435.774701][ T30] audit: type=1400 audit(435.160:129): avc: denied { append } for pid=3938 comm="syz.0.220" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 436.917931][ T30] audit: type=1400 audit(436.300:130): avc: denied { connect } for pid=3944 comm="syz.1.223" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 439.304773][ T30] audit: type=1400 audit(438.690:131): avc: denied { read } for pid=3958 comm="syz.0.230" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 439.330048][ T30] audit: type=1400 audit(438.720:132): avc: denied { open } for pid=3958 comm="syz.0.230" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 446.713996][ T30] audit: type=1400 audit(446.100:133): avc: denied { write } for pid=3994 comm="syz.0.248" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 447.265479][ T30] audit: type=1400 audit(446.650:134): avc: denied { create } for pid=3996 comm="syz.1.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 447.345794][ T30] audit: type=1400 audit(446.730:135): avc: denied { ioctl } for pid=3997 comm="syz.0.250" path="socket:[5809]" dev="sockfs" ino=5809 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 447.358242][ T30] audit: type=1400 audit(446.740:136): avc: denied { read } for pid=3996 comm="syz.1.249" path="socket:[5073]" dev="sockfs" ino=5073 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 447.669912][ T3999] 8021q: VLANs not supported on wg1 [ 447.991629][ T4001] Zero length message leads to an empty skb [ 473.282350][ T4115] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4115 comm=syz.1.304 [ 474.759129][ T30] audit: type=1400 audit(474.130:137): avc: denied { read } for pid=4122 comm="syz.1.310" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 474.765411][ T30] audit: type=1400 audit(474.150:138): avc: denied { open } for pid=4122 comm="syz.1.310" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 476.714726][ T30] audit: type=1400 audit(476.090:139): avc: denied { create } for pid=4130 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 476.822602][ T30] audit: type=1400 audit(476.190:140): avc: denied { ioctl } for pid=4130 comm="syz.1.314" path="socket:[6374]" dev="sockfs" ino=6374 ioctlcmd=0xe501 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 478.922706][ T30] audit: type=1400 audit(478.310:141): avc: denied { read append } for pid=4140 comm="syz.0.319" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 478.931209][ T30] audit: type=1400 audit(478.310:142): avc: denied { open } for pid=4140 comm="syz.0.319" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 478.972504][ T30] audit: type=1400 audit(478.360:143): avc: denied { ioctl } for pid=4140 comm="syz.0.319" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x700b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 481.918601][ T30] audit: type=1400 audit(481.300:144): avc: denied { write } for pid=4159 comm="syz.0.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 485.695896][ T30] audit: type=1400 audit(485.080:145): avc: denied { prog_run } for pid=4176 comm="syz.0.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 486.907770][ T30] audit: type=1400 audit(486.290:146): avc: denied { connect } for pid=4183 comm="syz.0.340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 491.670126][ T30] audit: type=1400 audit(491.040:147): avc: denied { setopt } for pid=4212 comm="syz.1.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 493.050906][ T30] audit: type=1400 audit(492.430:148): avc: denied { unmount } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 493.691587][ T30] audit: type=1400 audit(493.080:149): avc: denied { create } for pid=4222 comm="syz.0.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 506.344185][ T30] audit: type=1400 audit(505.720:150): avc: denied { read } for pid=4290 comm="syz.1.392" name="renderD128" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 506.350139][ T30] audit: type=1400 audit(505.730:151): avc: denied { open } for pid=4290 comm="syz.1.392" path="/dev/dri/renderD128" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 506.440586][ T30] audit: type=1400 audit(505.790:152): avc: denied { ioctl } for pid=4290 comm="syz.1.392" path="/dev/dri/renderD128" dev="devtmpfs" ino=617 ioctlcmd=0x642d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 517.753397][ T4377] binfmt_misc: register: failed to install interpreter file ./file0 [ 522.154849][ T30] audit: type=1400 audit(521.520:153): avc: denied { create } for pid=4397 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 522.170747][ T30] audit: type=1400 audit(521.560:154): avc: denied { write open } for pid=4397 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1875 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 522.204359][ T30] audit: type=1400 audit(521.590:155): avc: denied { append } for pid=4397 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1875 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 522.284556][ T30] audit: type=1400 audit(521.670:156): avc: denied { getattr } for pid=4397 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 523.387980][ T30] audit: type=1400 audit(522.760:157): avc: denied { read } for pid=4404 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 524.435609][ T30] audit: type=1400 audit(523.820:158): avc: denied { unlink } for pid=4412 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1875 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 529.909187][ T30] audit: type=1400 audit(529.300:159): avc: denied { setopt } for pid=4444 comm="syz.1.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 530.520295][ T30] audit: type=1400 audit(529.900:160): avc: denied { ioctl } for pid=4449 comm="syz.0.466" path="socket:[7626]" dev="sockfs" ino=7626 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 532.813084][ T30] audit: type=1400 audit(532.200:161): avc: denied { append } for pid=4465 comm="syz.0.474" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 534.108206][ T30] audit: type=1400 audit(533.490:162): avc: denied { create } for pid=4472 comm="syz.1.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 536.759650][ T30] audit: type=1400 audit(536.150:163): avc: denied { write } for pid=4485 comm="syz.0.484" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 536.793101][ T30] audit: type=1400 audit(536.180:164): avc: denied { ioctl } for pid=4485 comm="syz.0.484" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9372 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 543.414596][ T4516] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4516 comm=syz.1.499 [ 554.880587][ T4570] ======================================================= [ 554.880587][ T4570] WARNING: The mand mount option has been deprecated and [ 554.880587][ T4570] and is ignored by this kernel. Remove the mand [ 554.880587][ T4570] option from the mount to silence this warning. [ 554.880587][ T4570] ======================================================= [ 554.923133][ T30] audit: type=1400 audit(554.290:165): avc: denied { mount } for pid=4568 comm="syz.0.525" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 554.949048][ T30] audit: type=1400 audit(554.320:166): avc: denied { mounton } for pid=4568 comm="syz.0.525" path="/254/file0" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1 [ 555.030846][ T30] audit: type=1400 audit(554.420:167): avc: denied { unmount } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 560.855834][ T30] audit: type=1400 audit(560.240:168): avc: denied { read } for pid=4602 comm="syz.0.542" dev="sockfs" ino=8217 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 560.873942][ T30] audit: type=1400 audit(560.240:169): avc: denied { name_bind 0x1000000 } for pid=4602 comm="syz.0.542" path="socket:[8217]" dev="sockfs" ino=8217 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 567.022036][ T30] audit: type=1400 audit(566.410:170): avc: denied { ioctl } for pid=4631 comm="syz.0.555" path="socket:[8274]" dev="sockfs" ino=8274 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 575.469003][ T30] audit: type=1400 audit(574.850:171): avc: denied { connect } for pid=4675 comm="syz.0.576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 575.486265][ T30] audit: type=1400 audit(574.870:172): avc: denied { write } for pid=4675 comm="syz.0.576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 577.425973][ T30] audit: type=1400 audit(576.810:173): avc: denied { read } for pid=4687 comm="syz.1.582" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 577.452513][ T30] audit: type=1400 audit(576.840:174): avc: denied { open } for pid=4687 comm="syz.1.582" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 577.562144][ T30] audit: type=1400 audit(576.920:175): avc: denied { map } for pid=4687 comm="syz.1.582" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 578.917754][ T30] audit: type=1400 audit(578.300:176): avc: denied { write } for pid=4695 comm="syz.0.586" name="iommu" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 596.154778][ T4778] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4778 comm=syz.1.626 [ 597.963596][ T30] audit: type=1400 audit(597.350:178): avc: denied { ioctl } for pid=4785 comm="syz.1.630" path="/dev/usbmon0" dev="devtmpfs" ino=697 ioctlcmd=0x9204 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 597.973908][ T4788] random: crng reseeded on system resumption [ 597.983388][ T30] audit: type=1400 audit(597.340:177): avc: denied { append } for pid=4786 comm="syz.0.631" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 598.275854][ T30] audit: type=1400 audit(597.660:179): avc: denied { ioctl } for pid=4786 comm="syz.0.631" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x330d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 603.170647][ T30] audit: type=1400 audit(602.560:180): avc: denied { write } for pid=4803 comm="syz.0.639" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 606.281373][ T30] audit: type=1400 audit(605.670:181): avc: denied { create } for pid=4817 comm="syz.0.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 606.315005][ T30] audit: type=1400 audit(605.700:182): avc: denied { read } for pid=4817 comm="syz.0.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 606.870585][ T30] audit: type=1400 audit(606.250:183): avc: denied { write } for pid=4819 comm="syz.1.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 606.947550][ T30] audit: type=1400 audit(606.300:184): avc: denied { write } for pid=4817 comm="syz.0.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 621.710435][ T30] audit: type=1400 audit(621.090:185): avc: denied { setcheckreqprot } for pid=4884 comm="syz.0.679" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 625.008163][ T30] audit: type=1400 audit(624.390:186): avc: denied { create } for pid=4899 comm="syz.1.686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 625.105581][ T30] audit: type=1400 audit(624.490:187): avc: denied { bind } for pid=4899 comm="syz.1.686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 625.155260][ T30] audit: type=1400 audit(624.540:188): avc: denied { accept } for pid=4899 comm="syz.1.686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 626.011271][ T30] audit: type=1400 audit(625.400:189): avc: denied { shutdown } for pid=4903 comm="syz.1.689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 634.280067][ T30] audit: type=1400 audit(633.660:190): avc: denied { write } for pid=4942 comm="syz.0.708" name="renderD128" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 641.290960][ T30] audit: type=1400 audit(640.680:191): avc: denied { write } for pid=4975 comm="syz.1.724" path="socket:[9434]" dev="sockfs" ino=9434 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 643.006120][ T4988] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 659.217462][ C0] hrtimer: interrupt took 80653008 ns [ 665.453691][ T30] audit: type=1400 audit(664.840:192): avc: denied { append } for pid=5091 comm="syz.1.781" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 674.379926][ T30] audit: type=1400 audit(673.760:193): avc: denied { write } for pid=5116 comm="syz.0.793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 674.882799][ T30] audit: type=1400 audit(674.260:194): avc: denied { bind } for pid=5118 comm="syz.1.794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 703.785748][ T30] audit: type=1400 audit(703.170:195): avc: denied { execute } for pid=5243 comm="syz.1.856" name="file0" dev="tmpfs" ino=2162 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 706.175782][ T30] audit: type=1400 audit(705.560:196): avc: denied { create } for pid=5260 comm="syz.0.865" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 706.190562][ T30] audit: type=1400 audit(705.580:197): avc: denied { read } for pid=5260 comm="syz.0.865" name="file0" dev="tmpfs" ino=2231 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 706.194757][ T30] audit: type=1400 audit(705.580:198): avc: denied { open } for pid=5260 comm="syz.0.865" path="/436/file0" dev="tmpfs" ino=2231 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 706.202796][ T30] audit: type=1400 audit(705.590:199): avc: denied { ioctl } for pid=5260 comm="syz.0.865" path="/436/file0" dev="tmpfs" ino=2231 ioctlcmd=0x4c03 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 706.301859][ T30] audit: type=1400 audit(705.690:200): avc: denied { unlink } for pid=3328 comm="syz-executor" name="file0" dev="tmpfs" ino=2231 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 714.145978][ T30] audit: type=1400 audit(713.530:201): avc: denied { append } for pid=5313 comm="syz.1.890" name="loop9" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 728.988706][ T30] audit: type=1400 audit(728.370:202): avc: denied { remount } for pid=5372 comm="syz.0.917" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 729.354846][ T30] audit: type=1400 audit(728.740:203): avc: denied { unmount } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 748.118482][ T30] audit: type=1400 audit(747.510:204): avc: denied { write } for pid=5480 comm="syz.0.969" path="socket:[10828]" dev="sockfs" ino=10828 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 753.390984][ T30] audit: type=1400 audit(752.780:205): avc: denied { getopt } for pid=5501 comm="syz.0.981" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 753.621375][ T30] audit: type=1400 audit(753.010:206): avc: denied { mount } for pid=5506 comm="syz.1.982" name="/" dev="ramfs" ino=10874 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 753.639588][ T30] audit: type=1400 audit(753.020:207): avc: denied { remount } for pid=5506 comm="syz.1.982" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 753.777581][ T30] audit: type=1400 audit(753.160:208): avc: denied { unmount } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 760.713197][ T30] audit: type=1400 audit(760.090:209): avc: denied { ioctl } for pid=5530 comm="syz.1.994" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=11392 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 761.467898][ T30] audit: type=1400 audit(760.850:210): avc: denied { name_bind } for pid=5533 comm="syz.0.995" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 768.293431][ T5575] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1016'. [ 772.352466][ T30] audit: type=1400 audit(771.720:211): avc: denied { getattr } for pid=5593 comm="syz.0.1026" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 775.053738][ T30] audit: type=1400 audit(774.440:212): avc: denied { create } for pid=5610 comm="syz.1.1034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 775.090933][ T30] audit: type=1400 audit(774.480:213): avc: denied { write } for pid=5610 comm="syz.1.1034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 775.792158][ T30] audit: type=1400 audit(775.180:214): avc: denied { create } for pid=5612 comm="syz.0.1035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 775.839432][ T30] audit: type=1400 audit(775.220:215): avc: denied { read write } for pid=5613 comm="syz.1.1036" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 775.873432][ T30] audit: type=1400 audit(775.260:216): avc: denied { open } for pid=5613 comm="syz.1.1036" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 778.021315][ T30] audit: type=1400 audit(777.410:217): avc: denied { bind } for pid=5620 comm="syz.0.1039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 790.552336][ T30] audit: type=1400 audit(789.940:218): avc: denied { setopt } for pid=5657 comm="syz.1.1057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 793.051232][ T30] audit: type=1400 audit(792.440:219): avc: denied { create } for pid=5666 comm="syz.1.1061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 793.085561][ T30] audit: type=1400 audit(792.470:220): avc: denied { write } for pid=5666 comm="syz.1.1061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 801.810951][ T5687] binfmt_misc: register: failed to install interpreter file ./file2 [ 805.835506][ T30] audit: type=1400 audit(805.220:221): avc: denied { prog_load } for pid=5700 comm="syz.1.1077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 820.145328][ T30] audit: type=1400 audit(819.530:222): avc: denied { read } for pid=5766 comm="syz.1.1109" path="socket:[12361]" dev="sockfs" ino=12361 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 825.680289][ T30] audit: type=1400 audit(825.030:223): avc: denied { sqpoll } for pid=5783 comm="syz.0.1116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 834.111534][ T30] audit: type=1400 audit(833.480:224): avc: denied { open } for pid=5832 comm="syz.1.1138" path="/dev/ptyq6" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 834.195587][ T30] audit: type=1400 audit(833.580:225): avc: denied { create } for pid=5833 comm="syz.0.1139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 834.310175][ T30] audit: type=1400 audit(833.700:226): avc: denied { setopt } for pid=5833 comm="syz.0.1139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 834.314146][ T30] audit: type=1400 audit(833.700:227): avc: denied { ioctl } for pid=5832 comm="syz.1.1138" path="/dev/ttyq6" dev="devtmpfs" ino=374 ioctlcmd=0x5405 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 834.348885][ T30] audit: type=1400 audit(833.730:228): avc: denied { read } for pid=5833 comm="syz.0.1139" path="socket:[12475]" dev="sockfs" ino=12475 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 851.672131][ T30] audit: type=1400 audit(851.060:229): avc: denied { map_create } for pid=5920 comm="syz.1.1182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 851.678051][ T30] audit: type=1400 audit(851.060:230): avc: denied { map_read map_write } for pid=5920 comm="syz.1.1182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 864.017409][ T30] audit: type=1400 audit(863.400:231): avc: denied { unlink } for pid=3328 comm="syz-executor" name="file0" dev="tmpfs" ino=2938 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 874.250124][ T30] audit: type=1400 audit(873.630:232): avc: denied { create } for pid=6035 comm="syz.1.1236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 888.879155][ T30] audit: type=1400 audit(888.260:233): avc: denied { setopt } for pid=6102 comm="syz.1.1268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 896.931210][ T30] audit: type=1400 audit(896.320:234): avc: denied { bind } for pid=6138 comm="syz.0.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 900.294326][ T30] audit: type=1400 audit(899.680:235): avc: denied { setopt } for pid=6155 comm="syz.1.1292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 907.500014][ T6183] lo speed is unknown, defaulting to 1000 [ 907.505135][ T6183] lo speed is unknown, defaulting to 1000 [ 907.653224][ T6183] lo speed is unknown, defaulting to 1000 [ 907.941672][ T6183] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 908.313222][ T6183] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 909.321860][ T6183] lo speed is unknown, defaulting to 1000 [ 909.461020][ T6183] lo speed is unknown, defaulting to 1000 [ 912.117816][ T30] audit: type=1400 audit(911.500:236): avc: denied { create } for pid=6194 comm="syz.1.1311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 912.190179][ T30] audit: type=1400 audit(911.580:237): avc: denied { setopt } for pid=6194 comm="syz.1.1311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 912.228752][ T30] audit: type=1400 audit(911.610:238): avc: denied { write } for pid=6194 comm="syz.1.1311" path="socket:[13013]" dev="sockfs" ino=13013 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 912.413574][ T30] audit: type=1400 audit(911.780:239): avc: denied { append } for pid=6196 comm="syz.0.1312" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 913.551297][ T30] audit: type=1400 audit(912.940:240): avc: denied { read write } for pid=6199 comm="syz.0.1314" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 913.588663][ T30] audit: type=1400 audit(912.950:241): avc: denied { open } for pid=6199 comm="syz.0.1314" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 913.860699][ T3473] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 913.861787][ T3473] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 913.862891][ T3473] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 913.863159][ T3473] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 913.863413][ T3473] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 913.863675][ T3473] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 913.863939][ T3473] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 913.864199][ T3473] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 913.864456][ T3473] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 913.864713][ T3473] hid-generic 0000:3000000:0000.0001: unknown main item tag 0x0 [ 913.978564][ T3473] hid-generic 0000:3000000:0000.0001: hidraw0: HID v0.00 Device [sy] on syz0 [ 917.778432][ T30] audit: type=1400 audit(917.160:242): avc: denied { mount } for pid=6214 comm="syz.0.1320" name="/" dev="hugetlbfs" ino=13049 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 917.840387][ T30] audit: type=1400 audit(917.220:243): avc: denied { remount } for pid=6214 comm="syz.0.1320" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 918.207527][ T30] audit: type=1400 audit(917.580:244): avc: denied { unmount } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 921.242803][ T6215] fido_id[6215]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 931.481757][ T30] audit: type=1400 audit(930.870:245): avc: denied { audit_read } for pid=6283 comm="syz.0.1354" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 943.709269][ T30] audit: type=1400 audit(943.090:246): avc: denied { write } for pid=6349 comm="syz.0.1386" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 944.509675][ T30] audit: type=1400 audit(943.900:247): avc: denied { allowed } for pid=6353 comm="syz.0.1388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 951.312137][ T30] audit: type=1400 audit(950.700:248): avc: denied { prog_run } for pid=6383 comm="syz.1.1401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 951.340552][ T30] audit: type=1400 audit(950.730:249): avc: denied { setopt } for pid=6383 comm="syz.1.1401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 965.663525][ T30] audit: type=1400 audit(965.040:250): avc: denied { bind } for pid=6442 comm="syz.0.1430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 965.674159][ T30] audit: type=1400 audit(965.060:251): avc: denied { node_bind } for pid=6442 comm="syz.0.1430" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 966.481694][ T6447] nbd: must specify at least one socket [ 982.868646][ T30] audit: type=1400 audit(982.230:252): avc: denied { read write } for pid=3329 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 982.869774][ T30] audit: type=1400 audit(982.250:253): avc: denied { open } for pid=3329 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 982.888288][ T30] audit: type=1400 audit(982.270:254): avc: denied { ioctl } for pid=3329 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 985.965931][ T30] audit: type=1400 audit(985.350:255): avc: denied { create } for pid=6529 comm="syz.0.1471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 985.984053][ T30] audit: type=1400 audit(985.370:256): avc: denied { bind } for pid=6529 comm="syz.0.1471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 986.779039][ T30] audit: type=1400 audit(986.160:257): avc: denied { read } for pid=6533 comm="syz.1.1473" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 986.803627][ T30] audit: type=1400 audit(986.180:258): avc: denied { open } for pid=6533 comm="syz.1.1473" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 986.924922][ T30] audit: type=1400 audit(986.300:259): avc: denied { create } for pid=6533 comm="syz.1.1473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 987.512810][ T30] audit: type=1400 audit(986.880:260): avc: denied { mounton } for pid=6535 comm="syz.0.1474" path="/709/file0" dev="tmpfs" ino=3627 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 987.561651][ T30] audit: type=1400 audit(986.950:261): avc: denied { remount } for pid=6535 comm="syz.0.1474" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 991.519631][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 991.520240][ T30] audit: type=1400 audit(990.910:263): avc: denied { connect } for pid=6556 comm="syz.0.1483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 998.719252][ T30] audit: type=1400 audit(998.100:264): avc: denied { read } for pid=6589 comm="syz.1.1500" name="system" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 998.774982][ T30] audit: type=1400 audit(998.150:265): avc: denied { open } for pid=6589 comm="syz.1.1500" path="/dev/dma_heap/system" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 998.882020][ T30] audit: type=1400 audit(998.260:266): avc: denied { ioctl } for pid=6589 comm="syz.1.1500" path="/dev/dma_heap/system" dev="devtmpfs" ino=675 ioctlcmd=0xaf00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1005.711733][ T30] audit: type=1400 audit(1005.090:267): avc: denied { create } for pid=6609 comm="syz.0.1510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1005.790910][ T30] audit: type=1400 audit(1005.170:268): avc: denied { setopt } for pid=6609 comm="syz.0.1510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1007.008309][ T30] audit: type=1400 audit(1006.390:269): avc: denied { create } for pid=6615 comm="syz.1.1513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1007.047757][ T30] audit: type=1400 audit(1006.430:270): avc: denied { write } for pid=6615 comm="syz.1.1513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1009.525337][ T30] audit: type=1400 audit(1008.910:271): avc: denied { create } for pid=6624 comm="syz.1.1518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1009.639050][ T30] audit: type=1400 audit(1009.020:272): avc: denied { connect } for pid=6624 comm="syz.1.1518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1012.508033][ T30] audit: type=1400 audit(1011.880:273): avc: denied { setattr } for pid=6640 comm="syz.0.1525" name="dlm-control" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1013.832090][ T30] audit: type=1400 audit(1013.220:274): avc: denied { map_create } for pid=6647 comm="syz.1.1529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1013.835906][ T30] audit: type=1400 audit(1013.220:275): avc: denied { bpf } for pid=6647 comm="syz.1.1529" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1013.860997][ T30] audit: type=1400 audit(1013.250:276): avc: denied { perfmon } for pid=6647 comm="syz.1.1529" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1013.881041][ T30] audit: type=1400 audit(1013.250:277): avc: denied { map_read map_write } for pid=6647 comm="syz.1.1529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1015.361789][ T30] audit: type=1400 audit(1014.750:278): avc: denied { prog_load } for pid=6655 comm="syz.1.1533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1022.854083][ T30] audit: type=1400 audit(1022.240:279): avc: denied { write } for pid=6704 comm="syz.1.1557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1026.318142][ T30] audit: type=1400 audit(1025.700:280): avc: denied { unlink } for pid=3328 comm="syz-executor" name="file0" dev="tmpfs" ino=3887 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1030.053580][ T30] audit: type=1400 audit(1029.430:281): avc: denied { read } for pid=6747 comm="syz.0.1579" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1030.059563][ T30] audit: type=1400 audit(1029.450:282): avc: denied { open } for pid=6747 comm="syz.0.1579" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1031.440214][ T30] audit: type=1400 audit(1030.830:283): avc: denied { write } for pid=6754 comm="syz.1.1582" name="arp" dev="proc" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1032.200733][ T30] audit: type=1400 audit(1031.590:284): avc: denied { append } for pid=6758 comm="syz.1.1584" name="iommu" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1033.221128][ T30] audit: type=1400 audit(1032.570:285): avc: denied { mount } for pid=6762 comm="syz.1.1586" name="/" dev="ramfs" ino=15018 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1033.568582][ T30] audit: type=1400 audit(1032.940:286): avc: denied { unmount } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1035.005999][ T147] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1035.383534][ T30] audit: type=1400 audit(1034.770:287): avc: denied { execute } for pid=6769 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1035.431993][ T30] audit: type=1400 audit(1034.820:288): avc: denied { execute_no_trans } for pid=6769 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1035.673091][ T147] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1035.927326][ T30] audit: type=1400 audit(1035.310:289): avc: denied { read write } for pid=6770 comm="syz.0.1591" name="vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1035.965918][ T30] audit: type=1400 audit(1035.350:290): avc: denied { open } for pid=6770 comm="syz.0.1591" path="/dev/vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1036.059305][ T30] audit: type=1400 audit(1035.440:291): avc: denied { ioctl } for pid=6770 comm="syz.0.1591" path="/dev/vhost-net" dev="devtmpfs" ino=715 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1036.105826][ T30] audit: type=1400 audit(1035.490:292): avc: denied { execmem } for pid=6769 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1036.180562][ T30] audit: type=1400 audit(1035.560:293): avc: denied { mounton } for pid=6772 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1036.268864][ T30] audit: type=1400 audit(1035.630:294): avc: denied { module_request } for pid=6772 comm="syz-executor" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1036.271996][ T147] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1036.815620][ T147] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1036.892451][ T30] audit: type=1400 audit(1036.280:295): avc: denied { sys_module } for pid=6772 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1036.999618][ T30] audit: type=1400 audit(1036.380:296): avc: denied { create } for pid=6774 comm="syz.0.1592" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1043.181693][ T147] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1043.249229][ T147] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1043.303080][ T147] bond0 (unregistering): Released all slaves [ 1043.737551][ T147] hsr_slave_0: left promiscuous mode [ 1043.780234][ T147] hsr_slave_1: left promiscuous mode [ 1044.144886][ T147] veth1_macvtap: left promiscuous mode [ 1044.147037][ T147] veth0_macvtap: left promiscuous mode [ 1044.160992][ T147] veth1_vlan: left promiscuous mode [ 1044.162625][ T147] veth0_vlan: left promiscuous mode [ 1046.129897][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 1046.135451][ T30] audit: type=1400 audit(1045.520:309): avc: denied { read open } for pid=6805 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=651 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1046.145408][ T30] audit: type=1400 audit(1045.520:310): avc: denied { getattr } for pid=6805 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=651 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1046.663339][ T30] audit: type=1400 audit(1046.050:311): avc: denied { add_name } for pid=6801 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1046.678802][ T30] audit: type=1400 audit(1046.050:312): avc: denied { create } for pid=6801 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1046.685843][ T30] audit: type=1400 audit(1046.050:313): avc: denied { write } for pid=6801 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=4285 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1046.732788][ T30] audit: type=1400 audit(1046.120:314): avc: denied { append } for pid=6801 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=4285 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1048.576164][ T30] audit: type=1400 audit(1047.960:315): avc: denied { remove_name } for pid=6813 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=4285 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1048.611168][ T30] audit: type=1400 audit(1047.960:316): avc: denied { unlink } for pid=6813 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=4285 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1050.985486][ T30] audit: type=1400 audit(1050.370:317): avc: denied { read } for pid=6824 comm="syz.0.1611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1056.589684][ T30] audit: type=1400 audit(1055.970:318): avc: denied { prog_run } for pid=6843 comm="syz.0.1620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1056.726069][ T30] audit: type=1400 audit(1056.100:319): avc: denied { create } for pid=6843 comm="syz.0.1620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1056.752735][ T30] audit: type=1400 audit(1056.130:320): avc: denied { setopt } for pid=6843 comm="syz.0.1620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1070.449139][ T6772] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1070.483474][ T6772] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1081.101054][ T6772] hsr_slave_0: entered promiscuous mode [ 1081.172704][ T6772] hsr_slave_1: entered promiscuous mode [ 1086.398477][ T6772] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1086.491694][ T6772] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1086.611384][ T6772] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1086.774359][ T6772] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1094.920273][ T6772] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1108.857484][ T30] audit: type=1400 audit(1108.240:321): avc: denied { create } for pid=7057 comm="syz.0.1674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1108.917482][ T30] audit: type=1400 audit(1108.300:322): avc: denied { ioctl } for pid=7057 comm="syz.0.1674" path="socket:[16116]" dev="sockfs" ino=16116 ioctlcmd=0x480e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1116.922548][ T30] audit: type=1400 audit(1116.310:323): avc: denied { ioctl } for pid=7094 comm="syz.0.1681" path="socket:[16157]" dev="sockfs" ino=16157 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1118.431470][ T6772] veth0_vlan: entered promiscuous mode [ 1118.525280][ T6772] veth1_vlan: entered promiscuous mode [ 1118.643521][ T30] audit: type=1400 audit(1118.030:324): avc: denied { read } for pid=7101 comm="syz.0.1683" path="socket:[16608]" dev="sockfs" ino=16608 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1118.909699][ T6772] veth0_macvtap: entered promiscuous mode [ 1118.969686][ T6772] veth1_macvtap: entered promiscuous mode [ 1119.432703][ T5085] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1119.434053][ T5085] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1119.434417][ T5085] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1119.434760][ T5085] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1120.402950][ T30] audit: type=1400 audit(1119.790:325): avc: denied { mounton } for pid=6772 comm="syz-executor" path="/syzkaller.neJUrL/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1120.419196][ T30] audit: type=1400 audit(1119.800:326): avc: denied { mount } for pid=6772 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1120.475066][ T30] audit: type=1400 audit(1119.860:327): avc: denied { mount } for pid=6772 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1120.511150][ T30] audit: type=1400 audit(1119.880:328): avc: denied { mounton } for pid=6772 comm="syz-executor" path="/syzkaller.neJUrL/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1120.512191][ T30] audit: type=1400 audit(1119.890:329): avc: denied { mounton } for pid=6772 comm="syz-executor" path="/syzkaller.neJUrL/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=16658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1120.580791][ T30] audit: type=1400 audit(1119.970:330): avc: denied { unmount } for pid=6772 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1120.616252][ T30] audit: type=1400 audit(1120.000:331): avc: denied { mounton } for pid=6772 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1120.618863][ T30] audit: type=1400 audit(1120.000:332): avc: denied { mount } for pid=6772 comm="syz-executor" name="/" dev="gadgetfs" ino=3790 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1122.745941][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 1122.757499][ T30] audit: type=1400 audit(1122.130:339): avc: denied { create } for pid=7117 comm="syz.0.1690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1122.869890][ T30] audit: type=1400 audit(1122.250:340): avc: denied { ioctl } for pid=7117 comm="syz.0.1690" path="socket:[16210]" dev="sockfs" ino=16210 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1135.833837][ T30] audit: type=1400 audit(1135.220:341): avc: denied { create } for pid=7187 comm="syz.2.1723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1135.855195][ T30] audit: type=1400 audit(1135.240:342): avc: denied { ioctl } for pid=7187 comm="syz.2.1723" path="socket:[16307]" dev="sockfs" ino=16307 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1137.122900][ T30] audit: type=1400 audit(1136.500:343): avc: denied { open } for pid=7200 comm="syz.0.1729" path="/dev/ptyq4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1144.577412][ T30] audit: type=1400 audit(1143.960:344): avc: denied { ioctl } for pid=7239 comm="syz.2.1749" path="/dev/ptyq8" dev="devtmpfs" ino=120 ioctlcmd=0x540a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1147.747932][ T30] audit: type=1400 audit(1147.110:345): avc: denied { write } for pid=7256 comm="syz.2.1757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1154.409006][ T30] audit: type=1400 audit(1153.800:346): avc: denied { setopt } for pid=7285 comm="syz.0.1770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1155.095722][ T30] audit: type=1400 audit(1154.480:347): avc: denied { write } for pid=7289 comm="syz.0.1772" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1161.797850][ T30] audit: type=1400 audit(1161.180:348): avc: denied { ioctl } for pid=7321 comm="syz.2.1787" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1162.679866][ T30] audit: type=1400 audit(1162.060:349): avc: denied { create } for pid=7325 comm="syz.2.1789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1162.714633][ T30] audit: type=1400 audit(1162.100:350): avc: denied { bind } for pid=7325 comm="syz.2.1789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1162.753183][ T30] audit: type=1400 audit(1162.140:351): avc: denied { setopt } for pid=7325 comm="syz.2.1789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1163.309623][ T30] audit: type=1400 audit(1162.690:352): avc: denied { execute } for pid=7327 comm="syz.2.1790" name="file0" dev="tmpfs" ino=274 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1170.802194][ T30] audit: type=1400 audit(1170.170:353): avc: denied { nlmsg_read } for pid=7365 comm="syz.0.1809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1170.854464][ T7366] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=7366 comm=syz.0.1809 [ 1175.912429][ T30] audit: type=1400 audit(1175.300:354): avc: denied { watch watch_reads } for pid=7386 comm="syz.0.1820" path="/931" dev="tmpfs" ino=4765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1180.949104][ T30] audit: type=1400 audit(1180.330:355): avc: denied { create } for pid=7411 comm="syz.2.1831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1180.988310][ T30] audit: type=1400 audit(1180.370:356): avc: denied { bind } for pid=7411 comm="syz.2.1831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1181.015666][ T30] audit: type=1400 audit(1180.400:357): avc: denied { accept } for pid=7411 comm="syz.2.1831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1181.231610][ T30] audit: type=1400 audit(1180.620:358): avc: denied { read write } for pid=7412 comm="syz.0.1832" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1181.263816][ T30] audit: type=1400 audit(1180.650:359): avc: denied { open } for pid=7412 comm="syz.0.1832" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1182.081970][ T30] audit: type=1400 audit(1181.470:360): avc: denied { mount } for pid=7415 comm="syz.2.1833" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1182.108986][ T30] audit: type=1400 audit(1181.490:361): avc: denied { unmount } for pid=7415 comm="syz.2.1833" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1192.755385][ T30] audit: type=1400 audit(1192.140:362): avc: denied { connect } for pid=7460 comm="syz.0.1855" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1209.813641][ T30] audit: type=1400 audit(1209.200:363): avc: denied { ioctl } for pid=7523 comm="syz.0.1886" path="socket:[17861]" dev="sockfs" ino=17861 ioctlcmd=0x1275 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1214.882890][ T30] audit: type=1400 audit(1214.260:364): avc: denied { audit_write } for pid=7539 comm="syz.0.1894" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1224.954562][ T7579] 8021q: VLANs not supported on ip6_vti0 [ 1229.299784][ T30] audit: type=1400 audit(1228.680:365): avc: denied { write } for pid=7595 comm="syz.2.1921" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1233.943744][ T30] audit: type=1400 audit(1233.330:366): avc: denied { read write } for pid=7616 comm="syz.0.1931" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1233.988947][ T30] audit: type=1400 audit(1233.330:367): avc: denied { open } for pid=7616 comm="syz.0.1931" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1234.053156][ T30] audit: type=1400 audit(1233.430:368): avc: denied { ioctl } for pid=7616 comm="syz.0.1931" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1235.738515][ T30] audit: type=1400 audit(1235.110:369): avc: denied { ioctl } for pid=7627 comm="syz.0.1936" path="socket:[18028]" dev="sockfs" ino=18028 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1241.463376][ T30] audit: type=1400 audit(1240.850:370): avc: denied { write } for pid=7652 comm="syz.2.1949" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1246.023606][ T30] audit: type=1400 audit(1245.410:371): avc: denied { mac_admin } for pid=7660 comm="syz.2.1953" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1254.811675][ T7707] random: crng reseeded on system resumption [ 1254.814327][ T30] audit: type=1400 audit(1254.200:372): avc: denied { append } for pid=7706 comm="syz.0.1975" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1254.817631][ T30] audit: type=1400 audit(1254.200:373): avc: denied { open } for pid=7706 comm="syz.0.1975" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1254.922071][ T30] audit: type=1400 audit(1254.310:374): avc: denied { ioctl } for pid=7706 comm="syz.0.1975" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x330e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1264.999806][ T30] audit: type=1400 audit(1264.370:375): avc: denied { setattr } for pid=7754 comm="syz.2.1999" name="RAW" dev="sockfs" ino=18833 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1273.204011][ T30] audit: type=1400 audit(1272.580:376): avc: denied { read append } for pid=7785 comm="syz.0.2012" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1273.205104][ T30] audit: type=1400 audit(1272.590:377): avc: denied { open } for pid=7785 comm="syz.0.2012" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1273.222374][ T30] audit: type=1400 audit(1272.610:378): avc: denied { wake_alarm } for pid=7785 comm="syz.0.2012" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1279.804561][ T30] audit: type=1400 audit(1279.190:379): avc: denied { create } for pid=7803 comm="syz.2.2021" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1289.058050][ T30] audit: type=1400 audit(1288.440:380): avc: denied { append } for pid=7843 comm="syz.2.2040" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1291.926108][ T30] audit: type=1400 audit(1291.310:381): avc: denied { setattr } for pid=7856 comm="syz.0.2046" name="tty20" dev="devtmpfs" ino=39 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 1292.946324][ T30] audit: type=1400 audit(1292.330:382): avc: denied { ioctl } for pid=7859 comm="syz.2.2048" path="socket:[18424]" dev="sockfs" ino=18424 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1301.199544][ T30] audit: type=1400 audit(1300.580:383): avc: denied { write } for pid=7896 comm="syz.0.2066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1311.854531][ T30] audit: type=1400 audit(1311.240:384): avc: denied { ioctl } for pid=7944 comm="syz.2.2090" path="socket:[19586]" dev="sockfs" ino=19586 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1324.922677][ T30] audit: type=1400 audit(1324.300:385): avc: denied { setopt } for pid=8010 comm="syz.2.2121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1324.929685][ T30] audit: type=1400 audit(1324.310:386): avc: denied { read } for pid=8010 comm="syz.2.2121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1342.083591][ T30] audit: type=1400 audit(1341.470:387): avc: denied { write } for pid=8076 comm="syz.0.2153" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1349.049932][ T30] audit: type=1400 audit(1348.430:388): avc: denied { append } for pid=8105 comm="syz.2.2167" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1357.990338][ T30] audit: type=1400 audit(1357.370:389): avc: denied { create } for pid=8151 comm="syz.0.2189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1358.068435][ T30] audit: type=1400 audit(1357.450:390): avc: denied { ioctl } for pid=8151 comm="syz.0.2189" path="socket:[19903]" dev="sockfs" ino=19903 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1369.255397][ T30] audit: type=1400 audit(1368.640:391): avc: denied { read } for pid=8194 comm="syz.2.2210" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1369.285552][ T30] audit: type=1400 audit(1368.660:392): avc: denied { open } for pid=8194 comm="syz.2.2210" path="/dev/dri/card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1369.491608][ T30] audit: type=1400 audit(1368.870:393): avc: denied { ioctl } for pid=8194 comm="syz.2.2210" path="/dev/dri/card1" dev="devtmpfs" ino=619 ioctlcmd=0x64ab scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1410.044368][ T30] audit: type=1400 audit(1409.430:394): avc: denied { relabelfrom } for pid=8335 comm="syz.2.2279" name="NETLINK" dev="sockfs" ino=20887 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1410.052745][ T30] audit: type=1400 audit(1409.440:395): avc: denied { relabelto } for pid=8335 comm="syz.2.2279" name="NETLINK" dev="sockfs" ino=20887 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_tcpdiag_socket permissive=1 [ 1413.730096][ T30] audit: type=1400 audit(1413.120:396): avc: denied { getopt } for pid=8353 comm="syz.2.2288" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1423.907803][ T30] audit: type=1400 audit(1423.290:397): avc: denied { checkpoint_restore } for pid=8382 comm="syz.2.2302" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1424.434778][ T8385] x_tables: duplicate underflow at hook 1 [ 1433.903911][ T8425] block nbd2: shutting down sockets [ 1442.770060][ T30] audit: type=1400 audit(1442.120:398): avc: denied { read write } for pid=8466 comm="syz.0.2343" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1442.775942][ T30] audit: type=1400 audit(1442.160:399): avc: denied { open } for pid=8466 comm="syz.0.2343" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1445.394540][ T5085] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1446.130401][ T5085] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1446.911015][ T5085] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1447.333792][ T5085] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1451.592948][ T30] audit: type=1400 audit(1450.980:400): avc: denied { write } for pid=8501 comm="syz.0.2357" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1452.989264][ T5085] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1453.115415][ T5085] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1453.194599][ T5085] bond0 (unregistering): Released all slaves [ 1453.922508][ T5085] hsr_slave_0: left promiscuous mode [ 1453.946093][ T5085] hsr_slave_1: left promiscuous mode [ 1454.052232][ T5085] veth1_macvtap: left promiscuous mode [ 1454.054881][ T5085] veth0_macvtap: left promiscuous mode [ 1454.060236][ T5085] veth1_vlan: left promiscuous mode [ 1454.062571][ T5085] veth0_vlan: left promiscuous mode [ 1476.859041][ T8483] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1476.889000][ T8483] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1485.780606][ T8483] hsr_slave_0: entered promiscuous mode [ 1485.796031][ T8483] hsr_slave_1: entered promiscuous mode [ 1490.825425][ T8483] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1490.940494][ T8483] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1491.090571][ T8483] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1491.170218][ T8483] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1496.980451][ T8483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1509.930874][ T30] audit: type=1400 audit(1509.270:401): avc: denied { read } for pid=8705 comm="syz.0.2409" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1509.934957][ T30] audit: type=1400 audit(1509.310:402): avc: denied { open } for pid=8705 comm="syz.0.2409" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1511.163082][ T8710] loop4: detected capacity change from 0 to 7 [ 1529.335242][ T8483] veth0_vlan: entered promiscuous mode [ 1529.833907][ T8483] veth1_vlan: entered promiscuous mode [ 1530.892663][ T8483] veth0_macvtap: entered promiscuous mode [ 1531.201896][ T8483] veth1_macvtap: entered promiscuous mode [ 1532.283129][ T6766] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1532.285932][ T6766] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1532.369492][ T5085] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1532.370663][ T5085] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1535.385215][ T30] audit: type=1400 audit(1534.770:403): avc: denied { write } for pid=8772 comm="syz.0.2424" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1535.548353][ T30] audit: type=1400 audit(1534.920:404): avc: denied { ioctl } for pid=8772 comm="syz.0.2424" path="/dev/nullb0" dev="devtmpfs" ino=672 ioctlcmd=0x127f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1556.592631][ T30] audit: type=1400 audit(1555.980:405): avc: denied { create } for pid=8869 comm="syz.0.2466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1569.358402][ T30] audit: type=1400 audit(1568.740:406): avc: denied { getopt } for pid=8924 comm="syz.0.2492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1569.757943][ T30] audit: type=1400 audit(1569.140:407): avc: denied { read } for pid=8927 comm="syz.3.2494" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1569.759060][ T30] audit: type=1400 audit(1569.140:408): avc: denied { open } for pid=8927 comm="syz.3.2494" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1570.764829][ T8932] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8932 comm=syz.3.2496 [ 1574.112653][ T30] audit: type=1400 audit(1573.500:409): avc: denied { write } for pid=8942 comm="syz.3.2501" name="dlm_plock" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1574.582447][ T30] audit: type=1400 audit(1573.970:410): avc: denied { create } for pid=8945 comm="syz.3.2503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1574.598900][ T30] audit: type=1400 audit(1573.980:411): avc: denied { listen } for pid=8945 comm="syz.3.2503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1574.609334][ T30] audit: type=1400 audit(1573.990:412): avc: denied { ioctl } for pid=8945 comm="syz.3.2503" path="socket:[22451]" dev="sockfs" ino=22451 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1597.695867][ T30] audit: type=1400 audit(1597.080:413): avc: denied { getopt } for pid=9038 comm="syz.3.2547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1599.363063][ T30] audit: type=1400 audit(1598.750:414): avc: denied { create } for pid=9046 comm="syz.3.2551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1599.478068][ T30] audit: type=1400 audit(1598.860:415): avc: denied { ioctl } for pid=9046 comm="syz.3.2551" path="socket:[23195]" dev="sockfs" ino=23195 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1628.662763][ T9172] mmap: syz.3.2609 (9172) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 1630.433746][ T30] audit: type=1400 audit(1629.820:416): avc: denied { write } for pid=9176 comm="syz.0.2611" path="socket:[23400]" dev="sockfs" ino=23400 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1631.000558][ T30] audit: type=1400 audit(1630.390:417): avc: denied { setopt } for pid=9176 comm="syz.0.2611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1642.212795][ T9231] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 1643.777337][ T30] audit: type=1400 audit(1643.150:418): avc: denied { mount } for pid=9236 comm="syz.3.2638" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1643.783245][ T30] audit: type=1400 audit(1643.170:419): avc: denied { remount } for pid=9236 comm="syz.3.2638" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1643.983583][ T30] audit: type=1400 audit(1643.370:420): avc: denied { unmount } for pid=8483 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1652.992922][ T30] audit: type=1400 audit(1652.380:421): avc: denied { getopt } for pid=9277 comm="syz.0.2658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1673.083165][ T30] audit: type=1400 audit(1672.470:422): avc: denied { setopt } for pid=9380 comm="syz.3.2708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1673.114861][ T30] audit: type=1400 audit(1672.500:423): avc: denied { connect } for pid=9380 comm="syz.3.2708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1686.798894][ T30] audit: type=1400 audit(1686.180:424): avc: denied { read write } for pid=9442 comm="syz.0.2738" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1686.799731][ T30] audit: type=1400 audit(1686.180:425): avc: denied { open } for pid=9442 comm="syz.0.2738" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1686.800395][ T30] audit: type=1400 audit(1686.180:426): avc: denied { ioctl } for pid=9442 comm="syz.0.2738" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1693.612614][ T30] audit: type=1400 audit(1692.990:427): avc: denied { write } for pid=9473 comm="syz.0.2753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1693.625950][ T30] audit: type=1400 audit(1693.000:428): avc: denied { nlmsg_read } for pid=9473 comm="syz.0.2753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1693.709767][ T30] audit: type=1400 audit(1693.090:429): avc: denied { read } for pid=9473 comm="syz.0.2753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1695.003444][ T30] audit: type=1400 audit(1694.390:430): avc: denied { create } for pid=9480 comm="syz.3.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1695.080060][ T30] audit: type=1400 audit(1694.460:431): avc: denied { ioctl } for pid=9480 comm="syz.3.2757" path="socket:[24380]" dev="sockfs" ino=24380 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1699.761217][ T30] audit: type=1400 audit(1699.140:432): avc: denied { setopt } for pid=9510 comm="syz.3.2770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1699.779047][ T30] audit: type=1400 audit(1699.160:433): avc: denied { write } for pid=9510 comm="syz.3.2770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1700.944657][ T30] audit: type=1400 audit(1700.330:434): avc: denied { getattr } for pid=9516 comm="syz.3.2773" path="socket:[24457]" dev="sockfs" ino=24457 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1706.593580][ T30] audit: type=1400 audit(1705.980:435): avc: denied { read } for pid=9536 comm="syz.0.2783" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1706.640251][ T30] audit: type=1400 audit(1705.980:436): avc: denied { open } for pid=9536 comm="syz.0.2783" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1706.983344][ T30] audit: type=1400 audit(1706.370:437): avc: denied { ioctl } for pid=9536 comm="syz.0.2783" path="/dev/usbmon0" dev="devtmpfs" ino=697 ioctlcmd=0x9207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1739.789901][ T30] audit: type=1400 audit(1739.170:438): avc: denied { write } for pid=9669 comm="syz.0.2846" name="uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1739.824908][ T30] audit: type=1400 audit(1739.210:439): avc: denied { ioctl } for pid=9669 comm="syz.0.2846" path="/dev/uinput" dev="devtmpfs" ino=708 ioctlcmd=0x55c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1757.716162][ T30] audit: type=1400 audit(1757.100:440): avc: denied { block_suspend } for pid=9773 comm="syz.3.2898" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1759.232662][ T9783] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1759.261117][ T9783] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1786.843066][ T30] audit: type=1400 audit(1786.230:441): avc: denied { compute_member } for pid=9889 comm="syz.3.2950" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1812.642744][ T30] audit: type=1400 audit(1812.030:442): avc: denied { ioctl } for pid=10000 comm="syz.3.3005" path="socket:[26830]" dev="sockfs" ino=26830 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1816.753176][ T30] audit: type=1400 audit(1816.140:443): avc: denied { write } for pid=10016 comm="syz.3.3012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1853.712461][ T30] audit: type=1400 audit(1853.100:444): avc: denied { name_bind } for pid=10149 comm="syz.0.3078" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1853.756177][ T30] audit: type=1400 audit(1853.140:445): avc: denied { node_bind } for pid=10149 comm="syz.0.3078" saddr=::ffff:172.20.20.187 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1856.491880][ T30] audit: type=1400 audit(1855.870:446): avc: denied { watch watch_reads } for pid=10160 comm="syz.3.3083" path="/332/cpu.stat" dev="tmpfs" ino=1700 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1867.678552][ T30] audit: type=1400 audit(1867.060:447): avc: denied { read } for pid=10205 comm="syz.3.3105" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1873.837556][ T30] audit: type=1400 audit(1873.220:448): avc: denied { read } for pid=10230 comm="syz.0.3118" path="socket:[27238]" dev="sockfs" ino=27238 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1911.032579][ T30] audit: type=1400 audit(1910.420:449): avc: denied { sqpoll } for pid=10366 comm="syz.0.3183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1911.140109][T10367] Injecting memory failure for pfn 0x64856 at process virtual address 0x20000000 [ 1911.455706][T10367] Memory failure: 0x64856: Sending SIGBUS to syz.0.3183:10367 due to hardware memory corruption [ 1911.490754][T10367] Memory failure: 0x64856: recovery action for dirty LRU page: Recovered [ 1911.492180][T10367] Injecting memory failure for pfn 0x493f5 at process virtual address 0x20001000 [ 1911.569738][T10367] Memory failure: 0x493f5: unhandlable page. [ 1911.570641][T10367] Memory failure: 0x493f5: recovery action for get hwpoison page: Ignored [ 1913.530409][ T30] audit: type=1400 audit(1912.900:450): avc: denied { remount } for pid=10376 comm="syz.0.3188" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1913.562579][T10377] option changes via remount are deprecated (pid=10376 comm=syz.0.3188) [ 1922.593480][ T30] audit: type=1400 audit(1921.980:451): avc: denied { read write } for pid=10418 comm="syz.3.3208" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1922.609250][ T30] audit: type=1400 audit(1921.990:452): avc: denied { open } for pid=10418 comm="syz.3.3208" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1923.804914][T10427] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=10427 comm=syz.3.3212 [ 1924.757561][ T30] audit: type=1400 audit(1924.140:453): avc: denied { accept } for pid=10430 comm="syz.3.3214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1928.172029][ T30] audit: type=1400 audit(1927.560:454): avc: denied { read } for pid=10447 comm="syz.3.3222" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1928.207814][ T30] audit: type=1400 audit(1927.590:455): avc: denied { open } for pid=10447 comm="syz.3.3222" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1928.250352][ T30] audit: type=1400 audit(1927.630:456): avc: denied { ioctl } for pid=10447 comm="syz.3.3222" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x700a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1955.048962][ T30] audit: type=1400 audit(1954.420:457): avc: denied { append } for pid=10561 comm="syz.0.3277" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1985.333374][ T30] audit: type=1400 audit(1984.720:458): avc: denied { setopt } for pid=10676 comm="syz.3.3333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1991.091117][T10705] netlink: 45 bytes leftover after parsing attributes in process `syz.3.3345'. [ 2000.012931][ T30] audit: type=1400 audit(1999.400:459): avc: denied { mount } for pid=10746 comm="syz.0.3365" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 2000.105656][ T30] audit: type=1400 audit(1999.490:460): avc: denied { remount } for pid=10746 comm="syz.0.3365" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 2000.602656][ T30] audit: type=1400 audit(1999.960:461): avc: denied { unmount } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 2025.272436][ T30] audit: type=1400 audit(2024.640:462): avc: denied { remount } for pid=10846 comm="syz.0.3414" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 2040.572168][ T30] audit: type=1400 audit(2039.960:463): avc: denied { write } for pid=10921 comm="syz.0.3449" name="renderD128" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2044.051429][ T30] audit: type=1400 audit(2043.440:464): avc: denied { connect } for pid=10945 comm="syz.0.3461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2051.215954][T10981] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3478'. [ 2074.643595][ T30] audit: type=1400 audit(2074.030:465): avc: denied { write } for pid=11076 comm="syz.3.3524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2097.481216][T11129] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=11129 comm=syz.0.3547 [ 2099.633894][ T30] audit: type=1400 audit(2099.020:466): avc: denied { setattr } for pid=11136 comm="syz.0.3551" name="ptmx" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 2109.953715][T11179] support for the xor transformation has been removed. [ 2115.644969][T11208] SELinux: Context system_u:object_r:inetd_log_t:s0 is not valid (left unmapped). [ 2115.664613][ T30] audit: type=1400 audit(2115.050:467): avc: denied { relabelto } for pid=11207 comm="syz.0.3584" name="1867" dev="tmpfs" ino=9530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:inetd_log_t:s0" [ 2115.665764][ T30] audit: type=1400 audit(2115.050:468): avc: denied { associate } for pid=11207 comm="syz.0.3584" name="1867" dev="tmpfs" ino=9530 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:inetd_log_t:s0" [ 2116.068319][ T30] audit: type=1400 audit(2115.440:469): avc: denied { remove_name } for pid=3328 comm="syz-executor" name="binderfs" dev="tmpfs" ino=9534 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:inetd_log_t:s0" [ 2116.190071][ T30] audit: type=1400 audit(2115.570:470): avc: denied { rmdir } for pid=3328 comm="syz-executor" name="1867" dev="tmpfs" ino=9530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:inetd_log_t:s0" [ 2121.250065][ T30] audit: type=1400 audit(2120.640:471): avc: denied { watch watch_reads } for pid=11233 comm="syz.3.3593" path="/proc/1212" dev="proc" ino=31062 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 2203.888149][ T30] audit: type=1400 audit(2203.270:472): avc: denied { read } for pid=11566 comm="syz.3.3756" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2203.903484][ T30] audit: type=1400 audit(2203.270:473): avc: denied { open } for pid=11566 comm="syz.3.3756" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2203.939139][ T30] audit: type=1400 audit(2203.320:474): avc: denied { ioctl } for pid=11566 comm="syz.3.3756" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2269.198958][T11877] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=11877 comm=syz.3.3907 [ 2270.920931][T11885] ucma_write: process 1542 (syz.3.3911) changed security contexts after opening file descriptor, this is not allowed. [ 2284.322024][ T30] audit: type=1400 audit(2283.700:475): avc: denied { execute } for pid=11951 comm="syz.3.3943" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=33464 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 2307.198514][ T30] audit: type=1400 audit(2306.580:476): avc: denied { read write } for pid=12046 comm="syz.0.3989" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 2307.231468][ T30] audit: type=1400 audit(2306.620:477): avc: denied { open } for pid=12046 comm="syz.0.3989" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 2308.424748][T12053] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12053 comm=syz.3.3992 [ 2309.252621][ T30] audit: type=1400 audit(2308.630:478): avc: denied { watch } for pid=12054 comm="syz.3.3993" path="/799/file1" dev="tmpfs" ino=4071 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2309.268981][ T30] audit: type=1400 audit(2308.650:479): avc: denied { watch_sb } for pid=12054 comm="syz.3.3993" path="/799/file1" dev="tmpfs" ino=4071 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2334.238525][ T30] audit: type=1400 audit(2333.610:480): avc: denied { module_load } for pid=12138 comm="syz.0.4033" path=2F6D656D66643A20C736BE918D183229219A25A2D238D606070EFCFE128F2613AE254054A3B03E5CECA9F951403641108C6E7C202864656C6574656429 dev="hugetlbfs" ino=32642 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=system permissive=1 [ 2334.382798][T12139] Invalid ELF header magic: != ELF [ 2393.303552][ T30] audit: type=1400 audit(2392.680:481): avc: denied { setopt } for pid=12407 comm="syz.0.4160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2400.281922][T12439] cgroup: fork rejected by pids controller in /syz3 [ 2403.320643][ T8516] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2404.319797][ T8516] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2404.904418][ T8516] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2405.654520][ T8516] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2414.692728][ T8516] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2414.921955][ T8516] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2415.084318][ T8516] bond0 (unregistering): Released all slaves [ 2416.277669][ T8516] hsr_slave_0: left promiscuous mode [ 2416.295687][ T8516] hsr_slave_1: left promiscuous mode [ 2416.394992][ T8516] veth1_macvtap: left promiscuous mode [ 2416.414695][ T8516] veth0_macvtap: left promiscuous mode [ 2416.418237][ T8516] veth1_vlan: left promiscuous mode [ 2416.420265][ T8516] veth0_vlan: left promiscuous mode [ 2424.444768][ T30] audit: type=1400 audit(2423.830:482): avc: denied { read } for pid=12502 comm="syz.0.4200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2446.715670][T12449] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2446.853503][T12449] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2460.830898][T12449] hsr_slave_0: entered promiscuous mode [ 2460.849910][T12449] hsr_slave_1: entered promiscuous mode [ 2471.071554][T12449] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2471.292412][T12449] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2471.581093][T12449] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2471.720936][T12449] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2482.745343][T12449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2489.850185][T12683] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12683 comm=syz.0.4245 [ 2517.232088][ T30] audit: type=1400 audit(2516.610:483): avc: denied { mount } for pid=12756 comm="syz.0.4262" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 2519.453523][T12449] veth0_vlan: entered promiscuous mode [ 2519.882873][T12449] veth1_vlan: entered promiscuous mode [ 2520.834151][T12449] veth0_macvtap: entered promiscuous mode [ 2520.954310][T12449] veth1_macvtap: entered promiscuous mode [ 2521.855290][ T1003] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2521.859312][ T1003] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2521.938893][ T1003] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2521.945523][ T1003] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2543.630699][ T30] audit: type=1400 audit(2543.000:484): avc: denied { setopt } for pid=12856 comm="syz.3.4309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2553.179924][ T30] audit: type=1400 audit(2552.560:485): avc: denied { getopt } for pid=12899 comm="syz.0.4330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2560.509376][ T30] audit: type=1400 audit(2559.890:486): avc: denied { ioctl } for pid=12929 comm="syz.3.4345" path="/dev/fb0" dev="devtmpfs" ino=620 ioctlcmd=0x4606 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2602.138493][T13109] SELinux: syz.0.4431 (13109) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 2618.946040][T13175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13175 comm=syz.0.4463 [ 2627.197913][ T30] audit: type=1400 audit(2626.580:487): avc: denied { bind } for pid=13212 comm="syz.3.4482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2663.229632][ T30] audit: type=1400 audit(2662.610:488): avc: denied { read write } for pid=13382 comm="syz.0.4566" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2663.230470][ T30] audit: type=1400 audit(2662.610:489): avc: denied { open } for pid=13382 comm="syz.0.4566" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2681.932412][T13474] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13474 comm=syz.3.4610 [ 2691.062562][ T30] audit: type=1400 audit(2690.450:490): avc: denied { ioctl } for pid=13503 comm="syz.3.4625" path="socket:[39106]" dev="sockfs" ino=39106 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2722.084409][ T30] audit: type=1400 audit(2721.470:491): avc: denied { read } for pid=13617 comm="syz.3.4680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2753.919034][ T30] audit: type=1400 audit(2753.300:492): avc: denied { write } for pid=13725 comm="syz.0.4731" path="socket:[39412]" dev="sockfs" ino=39412 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2812.865289][ T6537] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 2813.098659][ T6537] usb 1-1: Using ep0 maxpacket: 16 [ 2813.222685][ T6537] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 2813.230648][ T6537] usb 1-1: New USB device found, idVendor=28bd, idProduct=0042, bcdDevice= 0.00 [ 2813.237968][ T6537] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2813.373368][ T6537] usb 1-1: config 0 descriptor?? [ 2814.290003][ T6537] usbhid 1-1:0.0: can't add hid device: -71 [ 2814.309424][ T6537] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 2814.463844][ T6537] usb 1-1: USB disconnect, device number 2 [ 2814.790986][ T30] audit: type=1400 audit(2814.170:493): avc: denied { shutdown } for pid=13940 comm="syz.3.4837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2824.061172][ T30] audit: type=1400 audit(2823.450:494): avc: denied { remount } for pid=13977 comm="syz.3.4854" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2824.371615][ T30] audit: type=1400 audit(2823.750:495): avc: denied { unmount } for pid=12449 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2892.009515][T14309] binfmt_misc: register: failed to install interpreter file ./file0/../file0 [ 2914.489818][T13852] udevd[13852]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 2931.035322][ T30] audit: type=1400 audit(2930.420:496): avc: denied { read } for pid=14525 comm="syz.0.5118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2957.267238][ T30] audit: type=1400 audit(2956.640:497): avc: denied { write } for pid=14674 comm="syz.0.5191" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 2974.839694][ T30] audit: type=1400 audit(2974.220:498): avc: denied { watch watch_reads } for pid=14776 comm="syz.3.5241" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=42786 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3035.869294][ T30] audit: type=1400 audit(3035.250:499): avc: denied { write } for pid=15036 comm="syz.3.5365" path="socket:[43550]" dev="sockfs" ino=43550 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3049.114513][ T30] audit: type=1400 audit(3048.500:500): avc: denied { execute } for pid=15131 comm="syz.3.5378" path="/dev/dsp" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 3081.994372][T11736] hid_parser_main: 22 callbacks suppressed [ 3082.028084][T11736] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 [ 3082.028868][T11736] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 [ 3082.029239][T11736] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 [ 3082.029557][T11736] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 [ 3082.029908][T11736] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 [ 3082.030179][T11736] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 [ 3082.030468][T11736] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 [ 3082.030748][T11736] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 [ 3082.031042][T11736] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 [ 3082.031331][T11736] hid-generic 0000:0000:0004.0002: unknown main item tag 0x0 [ 3082.212557][T11736] hid-generic 0000:0000:0004.0002: hidraw0: HID v0.03 Device [syz1] on syz1 [ 3084.813874][T15293] fido_id[15293]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 3106.785868][ T30] audit: type=1400 audit(3106.160:501): avc: denied { connect } for pid=15421 comm="syz.0.5514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3120.701276][ T30] audit: type=1400 audit(3120.050:502): avc: denied { lock } for pid=15501 comm="syz.3.5554" path="socket:[44961]" dev="sockfs" ino=44961 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 3122.637847][ T30] audit: type=1400 audit(3122.020:503): avc: denied { write } for pid=15510 comm="syz.0.5558" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3126.541781][T15531] netlink: 'syz.0.5567': attribute type 4 has an invalid length. [ 3126.542297][T15531] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.5567'. [ 3151.043434][ T30] audit: type=1400 audit(3150.410:504): avc: denied { listen } for pid=15669 comm="syz.0.5636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3151.913642][ T30] audit: type=1400 audit(3151.300:505): avc: denied { create } for pid=15674 comm="syz.3.5639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 3151.943095][ T30] audit: type=1400 audit(3151.330:506): avc: denied { ioctl } for pid=15674 comm="syz.3.5639" path="socket:[46320]" dev="sockfs" ino=46320 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 3151.955609][ T30] audit: type=1400 audit(3151.340:507): avc: denied { getopt } for pid=15674 comm="syz.3.5639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 3166.768760][ T30] audit: type=1400 audit(3166.150:508): avc: denied { ioctl } for pid=15760 comm="syz.3.5681" path="socket:[45596]" dev="sockfs" ino=45596 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3174.375977][ T30] audit: type=1400 audit(3173.760:509): avc: denied { write } for pid=15798 comm="syz.3.5699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3174.409294][ T30] audit: type=1400 audit(3173.790:510): avc: denied { read } for pid=15798 comm="syz.3.5699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3177.506009][T15818] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3177.542761][T15818] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3188.700690][T15869] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5733'. [ 3220.932041][ T30] audit: type=1400 audit(3220.320:511): avc: denied { setattr } for pid=16019 comm="syz.3.5807" name="timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 3258.914620][ T30] audit: type=1400 audit(3258.300:512): avc: denied { write } for pid=16219 comm="syz.0.5904" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 3302.043796][T15359] hid_parser_main: 91 callbacks suppressed [ 3302.048907][T15359] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 3302.054158][T15359] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 3302.059243][T15359] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 3302.061339][T15359] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 3302.063589][T15359] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 3302.065799][T15359] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 3302.080508][T15359] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 3302.083659][T15359] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 3302.087973][T15359] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 3302.090573][T15359] hid-generic 00A0:0006:0003.0003: unknown main item tag 0x0 [ 3302.163670][T15359] hid-generic 00A0:0006:0003.0003: hidraw0: HID v0.05 Device [syz1] on syz0 [ 3303.848848][T16413] infiniband syz2: set active [ 3303.849843][T16413] infiniband syz2: added bond0 [ 3303.932765][T16413] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 3304.138071][T16413] infiniband syz2: Couldn't open port 1 [ 3305.154738][T16413] RDS/IB: syz2: added [ 3305.176032][T16413] smc: adding ib device syz2 with port count 1 [ 3305.242692][T16413] smc: ib device syz2 port 1 has no pnetid [ 3307.049531][T16437] fido_id[16437]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 3333.565204][ T30] audit: type=1400 audit(3332.950:513): avc: denied { nlmsg_write } for pid=16543 comm="syz.0.6058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 3347.999299][T16610] netlink: 60 bytes leftover after parsing attributes in process `syz.3.6089'. [ 3358.584733][ T30] audit: type=1400 audit(3357.970:514): avc: denied { watch watch_reads } for pid=16672 comm="syz.0.6120" path="/3172/file1" dev="tmpfs" ino=16180 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=lnk_file permissive=1 [ 3363.431509][T16694] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16694 comm=syz.3.6130 [ 3385.268367][ T3416] hid-generic 0062:0008:0005.0004: unexpected long global item [ 3385.280621][ T3416] hid-generic 0062:0008:0005.0004: probe with driver hid-generic failed with error -22 [ 3398.485995][T16863] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=16863 comm=syz.0.6211 [ 3422.785548][T17007] netlink: 'syz.3.6282': attribute type 29 has an invalid length. [ 3479.811874][ T30] audit: type=1400 audit(3479.190:515): avc: denied { bind } for pid=17382 comm="syz.0.6467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3498.378637][ T30] audit: type=1400 audit(3497.760:516): avc: denied { ioctl } for pid=17490 comm="syz.3.6521" path="socket:[51666]" dev="sockfs" ino=51666 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3517.211731][ T30] audit: type=1400 audit(3516.600:517): avc: denied { mounton } for pid=17641 comm="syz.0.6595" path="/3399/file0" dev="ramfs" ino=51941 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=dir permissive=1 [ 3518.467812][T15092] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3518.781295][T15092] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3519.222297][T15092] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3519.589423][T15092] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3524.568896][T15109] smc: removing ib device syz2 [ 3524.591738][T15092] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3524.650358][T15092] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3524.707708][T15092] bond0 (unregistering): Released all slaves [ 3535.209850][T15092] unregister_netdevice: waiting for bond0 to become free. Usage count = 2 [ 3535.212888][T15092] ref_tracker: netdev@0000000063d61ded has 1/1 users at [ 3535.212888][T15092] ib_device_set_netdev+0x1c8/0x5b8 [ 3535.212888][T15092] rxe_register_device+0x208/0x300 [ 3535.212888][T15092] rxe_add+0xd50/0x10e0 [ 3535.212888][T15092] rxe_net_add+0x9c/0x100 [ 3535.212888][T15092] rxe_newlink+0x58/0x158 [ 3535.212888][T15092] nldev_newlink+0x284/0x4a0 [ 3535.212888][T15092] rdma_nl_rcv_msg+0x280/0x584 [ 3535.212888][T15092] rdma_nl_rcv_skb.constprop.0.isra.0+0x1fc/0x338 [ 3535.212888][T15092] rdma_nl_rcv+0x10/0x1c [ 3535.212888][T15092] netlink_unicast+0x420/0x6f0 [ 3535.212888][T15092] netlink_sendmsg+0x638/0xa4c [ 3535.212888][T15092] __sock_sendmsg+0xc8/0x168 [ 3535.212888][T15092] ____sys_sendmsg+0x524/0x730 [ 3535.212888][T15092] ___sys_sendmsg+0x124/0x1a4 [ 3535.212888][T15092] __sys_sendmsg+0x118/0x1a4 [ 3535.212888][T15092] __arm64_sys_sendmsg+0x70/0xa0 [ 3535.212888][T15092] [ 3535.253247][ T30] audit: type=1400 audit(3534.630:518): avc: denied { read } for pid=3127 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3535.309960][ T30] audit: type=1400 audit(3534.690:519): avc: denied { search } for pid=3127 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3535.328017][ T30] audit: type=1400 audit(3534.710:520): avc: denied { search } for pid=3127 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3535.385459][ T30] audit: type=1400 audit(3534.750:521): avc: denied { write } for pid=3322 comm="syz-executor" path="pipe:[2557]" dev="pipefs" ino=2557 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 3535.392658][ T30] audit: type=1400 audit(3534.760:522): avc: denied { add_name } for pid=3127 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3535.393074][ T30] audit: type=1400 audit(3534.760:523): avc: denied { create } for pid=3127 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3535.393402][ T30] audit: type=1400 audit(3534.760:524): avc: denied { append open } for pid=3127 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 3535.472658][ T30] audit: type=1400 audit(3534.840:525): avc: denied { getattr } for pid=3127 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3540.563265][T15092] hsr_slave_0: left promiscuous mode [ 3540.588286][T15092] hsr_slave_1: left promiscuous mode [ 3540.713374][T15092] veth1_macvtap: left promiscuous mode [ 3540.715940][T15092] veth0_macvtap: left promiscuous mode [ 3540.719349][T15092] veth1_vlan: left promiscuous mode [ 3540.721646][T15092] veth0_vlan: left promiscuous mode [ 3547.323930][T15092] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3547.695725][T15092] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3548.019612][T15092] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3548.280142][T15092] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3551.563988][T15092] bond0 (unregistering): Released all slaves [ 3552.511531][T15092] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3552.575829][T15092] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3552.629548][T15092] bond0 (unregistering): Released all slaves [ 3553.075590][T15092] hsr_slave_0: left promiscuous mode [ 3553.082022][T15092] hsr_slave_1: left promiscuous mode [ 3553.135337][T15092] veth1_macvtap: left promiscuous mode [ 3553.138512][T15092] veth0_macvtap: left promiscuous mode [ 3553.139258][T15092] veth1_vlan: left promiscuous mode [ 3553.139668][T15092] veth0_vlan: left promiscuous mode