last executing test programs: 44.156408041s ago: executing program 1 (id=695): r0 = syz_usb_connect(0x0, 0x48, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000022546940fa0ae803d0990102030109023600010000000009047500038cbb2a0009050a001000010000090588"], 0x0) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, &(0x7f00000004c0)={0x44, &(0x7f0000000100)=ANY=[@ANYBLOB="000c0100000006"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 43.799769301s ago: executing program 1 (id=696): syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) r0 = syz_io_uring_setup(0x5169, &(0x7f0000000200)={0x0, 0x0, 0x10100}, &(0x7f0000000100), &(0x7f0000000000)=0x0) syz_io_uring_setup(0xa94, &(0x7f0000000280), &(0x7f0000000040)=0x0, &(0x7f00000005c0)) syz_io_uring_submit(r2, r1, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0xfffffffffffffe54}) io_uring_enter(r0, 0x48e9, 0x0, 0x0, 0x0, 0x0) 43.354750334s ago: executing program 1 (id=697): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000000), 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000980)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) 42.944683715s ago: executing program 1 (id=698): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0\x00') 42.564236966s ago: executing program 1 (id=699): r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000800)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/96, 0x60}], 0x1, 0x5b, 0x2) 42.194824346s ago: executing program 1 (id=700): mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x6000) 42.194436936s ago: executing program 32 (id=700): mlockall(0x2) r0 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x7000) shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x6000) 4.372642698s ago: executing program 0 (id=732): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="18000000240001030000000000000000010000000400ae"], 0x18}, 0x1, 0x0, 0x0, 0x88001}, 0x4000) recvmmsg(r0, &(0x7f0000002f00)=[{{0x0, 0x0, 0x0}, 0x1}, {{0x0, 0x0, 0x0}, 0x100}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000001c40)=""/4083, 0xff3}], 0x1}, 0x6}], 0x44, 0x20, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000003c0)='sys_enter\x00', r1}, 0x18) r2 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r2, &(0x7f0000000440)={0x28, 0x0, 0x2710, @host}, 0x10) listen(r2, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x40000182, 0x0, 0x0) 1.297837654s ago: executing program 0 (id=733): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000000000850000007200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000680), 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000240)='kfree\x00', r0}, 0x18) r1 = syz_usb_connect(0x2, 0x24, &(0x7f0000000440)=ANY=[@ANYBLOB="12011f00abbe6740e9174e8b089c000000010902120001000000000904000000ff"], 0x0) syz_usb_control_io(r1, &(0x7f00000000c0)={0x2c, &(0x7f0000000c80)={0x20, 0xe, 0x2, {0x2, 0x7e8e703122aff25f}}, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$hid(r1, 0x0, 0x0) syz_usb_control_io$uac1(r1, 0x0, &(0x7f00000001c0)={0x44, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet6_udp(0xa, 0x2, 0x0) 777.737068ms ago: executing program 0 (id=734): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[], 0x14}}, 0x8814) 503.709716ms ago: executing program 0 (id=735): syz_usb_connect(0x0, 0x3b, &(0x7f0000000080)=ANY=[@ANYBLOB="120100001b3ebd40d80483009c8301020301090229000100000000090400000002020100052406"], 0x0) 107.576857ms ago: executing program 0 (id=736): r0 = syz_usb_connect(0x0, 0x1cb, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000122f0d4071040403dfe4000000010902b901010000003f0904"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5004}, 0x140) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000ac0)={0x44, &(0x7f0000000880)={0x0, 0xa}, 0x0, 0x0, 0x0, &(0x7f00000009c0)={0x20, 0x85, 0x4, 0x4}, &(0x7f0000000a00)={0x20, 0x83, 0x2}, 0x0, &(0x7f0000000a80)={0x20, 0x89, 0x2, 0x1}}) 0s ago: executing program 0 (id=737): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="070000000000000002004e23e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c565036850569b4a502214400000000009b32ad34895f37f63c05093139"], 0x90) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:44454' (ED25519) to the list of known hosts. [ 202.565496][ T29] audit: type=1400 audit(201.960:58): avc: denied { name_bind } for pid=3274 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 202.908984][ T29] audit: type=1400 audit(202.300:59): avc: denied { execute } for pid=3276 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 202.913788][ T29] audit: type=1400 audit(202.300:60): avc: denied { execute_no_trans } for pid=3276 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 209.134998][ T29] audit: type=1400 audit(208.530:61): avc: denied { mounton } for pid=3276 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 209.153947][ T29] audit: type=1400 audit(208.540:62): avc: denied { mount } for pid=3276 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 209.171534][ T3276] cgroup: Unknown subsys name 'net' [ 209.190678][ T29] audit: type=1400 audit(208.580:63): avc: denied { unmount } for pid=3276 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 209.709662][ T3276] cgroup: Unknown subsys name 'cpuset' [ 209.795988][ T3276] cgroup: Unknown subsys name 'rlimit' [ 210.338606][ T29] audit: type=1400 audit(209.730:64): avc: denied { setattr } for pid=3276 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 210.349443][ T29] audit: type=1400 audit(209.730:65): avc: denied { mounton } for pid=3276 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 210.351350][ T29] audit: type=1400 audit(209.740:66): avc: denied { mount } for pid=3276 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 211.158678][ T3278] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 211.170727][ T29] audit: type=1400 audit(210.560:67): avc: denied { relabelto } for pid=3278 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 211.185440][ T29] audit: type=1400 audit(210.570:68): avc: denied { write } for pid=3278 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 211.352592][ T29] audit: type=1400 audit(210.740:69): avc: denied { read } for pid=3276 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 211.357908][ T29] audit: type=1400 audit(210.750:70): avc: denied { open } for pid=3276 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 211.387448][ T3276] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 223.456897][ T29] audit: type=1400 audit(222.850:71): avc: denied { execmem } for pid=3279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 223.562747][ T29] audit: type=1400 audit(222.950:72): avc: denied { read } for pid=3281 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 223.568189][ T29] audit: type=1400 audit(222.960:73): avc: denied { open } for pid=3281 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 223.601348][ T29] audit: type=1400 audit(222.990:74): avc: denied { mounton } for pid=3281 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 223.685211][ T29] audit: type=1400 audit(223.080:75): avc: denied { module_request } for pid=3281 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 223.832669][ T29] audit: type=1400 audit(223.220:76): avc: denied { sys_module } for pid=3281 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 230.055418][ T3281] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 230.094678][ T3281] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 230.499083][ T3282] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 230.574726][ T3282] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.358859][ T3281] hsr_slave_0: entered promiscuous mode [ 232.409513][ T3281] hsr_slave_1: entered promiscuous mode [ 233.830066][ T3282] hsr_slave_0: entered promiscuous mode [ 233.877222][ T3282] hsr_slave_1: entered promiscuous mode [ 233.946719][ T3282] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 233.949921][ T3282] Cannot create hsr debugfs directory [ 235.332925][ T29] audit: type=1400 audit(234.720:77): avc: denied { create } for pid=3281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 235.333930][ T29] audit: type=1400 audit(234.720:78): avc: denied { write } for pid=3281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 235.354140][ T29] audit: type=1400 audit(234.750:79): avc: denied { read } for pid=3281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 235.424491][ T3281] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 235.506770][ T3281] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 235.607853][ T3281] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 235.781095][ T3281] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 236.981456][ T3282] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 237.038693][ T3282] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 237.148792][ T3282] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 237.206626][ T3282] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 238.789108][ T3281] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.853357][ T3282] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.709254][ T3281] veth0_vlan: entered promiscuous mode [ 248.837154][ T3281] veth1_vlan: entered promiscuous mode [ 249.279529][ T3281] veth0_macvtap: entered promiscuous mode [ 249.341450][ T3281] veth1_macvtap: entered promiscuous mode [ 249.790046][ T3281] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.813531][ T3281] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.814652][ T3281] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.815480][ T3281] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 250.304021][ T29] audit: type=1400 audit(249.660:80): avc: denied { mount } for pid=3281 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 250.305728][ T29] audit: type=1400 audit(249.680:81): avc: denied { mounton } for pid=3281 comm="syz-executor" path="/syzkaller.ABaXug/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 250.325128][ T29] audit: type=1400 audit(249.710:82): avc: denied { mount } for pid=3281 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 250.356461][ T29] audit: type=1400 audit(249.750:83): avc: denied { mounton } for pid=3281 comm="syz-executor" path="/syzkaller.ABaXug/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 250.365752][ T29] audit: type=1400 audit(249.760:84): avc: denied { mounton } for pid=3281 comm="syz-executor" path="/syzkaller.ABaXug/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 250.394236][ T29] audit: type=1400 audit(249.780:85): avc: denied { unmount } for pid=3281 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 250.419006][ T29] audit: type=1400 audit(249.810:86): avc: denied { mounton } for pid=3281 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 250.503526][ T29] audit: type=1400 audit(249.860:87): avc: denied { mount } for pid=3281 comm="syz-executor" name="/" dev="gadgetfs" ino=4170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 250.505151][ T29] audit: type=1400 audit(249.900:88): avc: denied { mount } for pid=3281 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 250.514192][ T29] audit: type=1400 audit(249.900:89): avc: denied { mounton } for pid=3281 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 250.580484][ T3282] veth0_vlan: entered promiscuous mode [ 250.649182][ T3282] veth1_vlan: entered promiscuous mode [ 250.971435][ T3281] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 250.998382][ T3282] veth0_macvtap: entered promiscuous mode [ 251.115676][ T3282] veth1_macvtap: entered promiscuous mode [ 251.944272][ T3282] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 251.944866][ T3282] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 251.945277][ T3282] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 251.945836][ T3282] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.385251][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 255.385444][ T29] audit: type=1400 audit(254.780:96): avc: denied { map_create } for pid=3426 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 255.456119][ T29] audit: type=1400 audit(254.850:97): avc: denied { map_read map_write } for pid=3426 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 255.506754][ T29] audit: type=1400 audit(254.880:98): avc: denied { perfmon } for pid=3426 comm="syz.1.2" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 266.777949][ T29] audit: type=1400 audit(266.170:99): avc: denied { prog_run } for pid=3430 comm="syz.0.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 267.297792][ T29] audit: type=1400 audit(266.690:100): avc: denied { create } for pid=3435 comm="syz.1.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 267.328952][ T29] audit: type=1400 audit(266.720:101): avc: denied { write } for pid=3435 comm="syz.1.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 267.336476][ T29] audit: type=1400 audit(266.730:102): avc: denied { nlmsg_read } for pid=3435 comm="syz.1.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 267.828511][ T29] audit: type=1400 audit(267.160:103): avc: denied { create } for pid=3438 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 267.830351][ T29] audit: type=1400 audit(267.200:104): avc: denied { bind } for pid=3438 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 267.851172][ T29] audit: type=1400 audit(267.230:105): avc: denied { setopt } for pid=3438 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 271.890862][ T29] audit: type=1400 audit(271.280:106): avc: denied { write } for pid=3444 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 271.947789][ T3446] netlink: 'syz.0.9': attribute type 4 has an invalid length. [ 271.965515][ T29] audit: type=1400 audit(271.360:107): avc: denied { create } for pid=3444 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 271.975664][ T29] audit: type=1400 audit(271.360:108): avc: denied { write } for pid=3444 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 271.976791][ T29] audit: type=1400 audit(271.370:109): avc: denied { nlmsg_write } for pid=3444 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 271.978350][ T3446] netlink: 60 bytes leftover after parsing attributes in process `syz.0.9'. [ 293.714910][ T3456] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 296.792760][ T29] audit: type=1400 audit(293.100:110): avc: denied { create } for pid=3453 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 296.794528][ T29] audit: type=1400 audit(293.730:111): avc: denied { ioctl } for pid=3453 comm="syz.0.12" path="socket:[4251]" dev="sockfs" ino=4251 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 296.796111][ T29] audit: type=1400 audit(293.750:112): avc: denied { setopt } for pid=3453 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 304.217287][ T29] audit: type=1326 audit(303.610:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3462 comm="syz.0.13" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 304.227665][ T29] audit: type=1326 audit(303.610:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3462 comm="syz.0.13" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 304.229390][ T29] audit: type=1326 audit(303.620:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3462 comm="syz.0.13" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 304.235826][ T29] audit: type=1326 audit(303.630:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3462 comm="syz.0.13" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 304.238128][ T29] audit: type=1400 audit(303.630:117): avc: denied { create } for pid=3462 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 304.246684][ T29] audit: type=1326 audit(303.640:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3462 comm="syz.0.13" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 304.250280][ T29] audit: type=1326 audit(303.640:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3462 comm="syz.0.13" exe="/syz-executor" sig=0 arch=c00000b7 syscall=216 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 304.299448][ T29] audit: type=1326 audit(303.690:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3462 comm="syz.0.13" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 304.303988][ T29] audit: type=1326 audit(303.690:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3462 comm="syz.0.13" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 305.283917][ T29] audit: type=1400 audit(304.670:122): avc: denied { ioctl } for pid=3465 comm="syz.0.14" path="socket:[3724]" dev="sockfs" ino=3724 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 339.768907][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 339.769088][ T29] audit: type=1400 audit(339.160:125): avc: denied { mounton } for pid=3491 comm="syz.0.22" path="/proc/34/task" dev="proc" ino=3783 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 341.256107][ T29] audit: type=1400 audit(340.650:126): avc: denied { getopt } for pid=3494 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 341.520960][ T29] audit: type=1400 audit(340.910:127): avc: denied { name_bind } for pid=3497 comm="syz.0.24" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 341.524760][ T29] audit: type=1400 audit(340.920:128): avc: denied { node_bind } for pid=3497 comm="syz.0.24" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 350.792714][ T29] audit: type=1326 audit(350.170:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3503 comm="syz.1.26" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 350.815899][ T29] audit: type=1326 audit(350.200:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3503 comm="syz.1.26" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 350.879450][ T29] audit: type=1326 audit(350.220:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3503 comm="syz.1.26" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 350.880500][ T29] audit: type=1326 audit(350.220:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3503 comm="syz.1.26" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 350.881363][ T29] audit: type=1326 audit(350.230:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3503 comm="syz.1.26" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 350.884401][ T29] audit: type=1326 audit(350.230:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3503 comm="syz.1.26" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 350.885958][ T29] audit: type=1326 audit(350.230:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3503 comm="syz.1.26" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 350.889142][ T29] audit: type=1326 audit(350.240:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3503 comm="syz.1.26" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 350.890529][ T29] audit: type=1326 audit(350.240:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3503 comm="syz.1.26" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 350.904394][ T29] audit: type=1326 audit(350.240:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3503 comm="syz.1.26" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 373.129266][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 373.129410][ T29] audit: type=1400 audit(372.520:148): avc: denied { ioctl } for pid=3520 comm="syz.0.31" path="socket:[3817]" dev="sockfs" ino=3817 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 374.198732][ T3525] pim6reg1: entered promiscuous mode [ 374.200148][ T3525] pim6reg1: entered allmulticast mode [ 375.847875][ T3529] netlink: 20 bytes leftover after parsing attributes in process `syz.1.34'. [ 377.374575][ T3531] vlan2: entered promiscuous mode [ 377.375205][ T3531] veth0_to_hsr: entered promiscuous mode [ 377.533106][ T3531] veth0_to_hsr: left promiscuous mode [ 378.643508][ T29] audit: type=1400 audit(378.030:149): avc: denied { bind } for pid=3535 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 378.644974][ T29] audit: type=1400 audit(378.030:150): avc: denied { name_bind } for pid=3535 comm="syz.1.37" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 378.656479][ T29] audit: type=1400 audit(378.030:151): avc: denied { node_bind } for pid=3535 comm="syz.1.37" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 378.705794][ T29] audit: type=1400 audit(378.100:152): avc: denied { block_suspend } for pid=3535 comm="syz.1.37" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 378.827906][ T3538] pim6reg1: entered promiscuous mode [ 378.828570][ T3538] pim6reg1: entered allmulticast mode [ 379.473222][ T29] audit: type=1326 audit(378.860:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3540 comm="syz.1.39" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 379.474283][ T29] audit: type=1326 audit(378.860:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3540 comm="syz.1.39" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 379.475110][ T29] audit: type=1326 audit(378.870:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3540 comm="syz.1.39" exe="/syz-executor" sig=0 arch=c00000b7 syscall=116 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 379.476019][ T29] audit: type=1326 audit(378.870:156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3540 comm="syz.1.39" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 379.477142][ T29] audit: type=1326 audit(378.870:157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3540 comm="syz.1.39" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 384.380186][ T29] audit: type=1326 audit(383.770:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3549 comm="syz.0.43" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 384.537506][ T29] audit: type=1326 audit(383.930:159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3549 comm="syz.0.43" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 384.546294][ T29] audit: type=1326 audit(383.940:160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3549 comm="syz.0.43" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 384.548640][ T29] audit: type=1326 audit(383.940:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3549 comm="syz.0.43" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 384.552684][ T29] audit: type=1326 audit(383.940:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3549 comm="syz.0.43" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 384.564057][ T29] audit: type=1326 audit(383.960:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3549 comm="syz.0.43" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 384.566258][ T29] audit: type=1326 audit(383.960:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3549 comm="syz.0.43" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 384.568918][ T29] audit: type=1326 audit(383.960:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3549 comm="syz.0.43" exe="/syz-executor" sig=0 arch=c00000b7 syscall=228 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 386.613609][ T29] audit: type=1326 audit(385.990:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3549 comm="syz.0.43" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 387.306025][ T3553] pim6reg1: entered promiscuous mode [ 387.323746][ T3553] pim6reg1: entered allmulticast mode [ 402.108837][ T29] audit: type=1400 audit(401.500:167): avc: denied { read write } for pid=3569 comm="syz.0.50" name="vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 402.112395][ T29] audit: type=1400 audit(401.500:168): avc: denied { open } for pid=3569 comm="syz.0.50" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 402.126814][ T29] audit: type=1400 audit(401.510:169): avc: denied { ioctl } for pid=3569 comm="syz.0.50" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 402.534926][ T29] audit: type=1400 audit(401.920:170): avc: denied { create } for pid=3572 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 412.325933][ T29] audit: type=1400 audit(411.710:171): avc: denied { create } for pid=3578 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 413.007694][ T3583] ptrace attach of "/syz-executor exec"[3584] was attempted by "/syz-executor exec"[3583] [ 413.388151][ T29] audit: type=1400 audit(412.780:172): avc: denied { write } for pid=3585 comm="syz.0.55" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 421.350970][ T3595] netlink: 72 bytes leftover after parsing attributes in process `syz.1.57'. [ 422.465206][ T29] audit: type=1400 audit(421.860:173): avc: denied { create } for pid=3601 comm="syz.1.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 429.199975][ T29] audit: type=1400 audit(428.570:174): avc: denied { mounton } for pid=3609 comm="syz.0.62" path="/31/file0" dev="tmpfs" ino=173 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 429.279095][ T3610] ======================================================= [ 429.279095][ T3610] WARNING: The mand mount option has been deprecated and [ 429.279095][ T3610] and is ignored by this kernel. Remove the mand [ 429.279095][ T3610] option from the mount to silence this warning. [ 429.279095][ T3610] ======================================================= [ 429.749323][ T29] audit: type=1400 audit(429.140:175): avc: denied { unmount } for pid=3609 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 447.380420][ T29] audit: type=1400 audit(446.490:176): avc: denied { map } for pid=3617 comm="syz.0.64" path="socket:[4496]" dev="sockfs" ino=4496 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 453.648572][ T29] audit: type=1400 audit(453.040:177): avc: denied { map } for pid=3628 comm="syz.1.68" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4525 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 453.669088][ T29] audit: type=1400 audit(453.050:178): avc: denied { write } for pid=3628 comm="syz.1.68" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4525 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 460.069014][ T3639] A link change request failed with some changes committed already. Interface bond_slave_0 may have been left with an inconsistent configuration, please check. [ 502.491101][ T29] audit: type=1400 audit(501.760:179): avc: denied { write } for pid=3660 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 504.611150][ T3671] netlink: 4 bytes leftover after parsing attributes in process `syz.0.79'. [ 515.296973][ T29] audit: type=1400 audit(514.690:180): avc: denied { read write } for pid=3282 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 515.308730][ T29] audit: type=1400 audit(514.700:182): avc: denied { read } for pid=3087 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 515.315167][ T29] audit: type=1400 audit(514.710:183): avc: denied { search } for pid=3087 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 515.317850][ T29] audit: type=1400 audit(514.710:184): avc: denied { append } for pid=3087 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 515.319833][ T29] audit: type=1400 audit(514.690:181): avc: denied { open } for pid=3282 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 515.343990][ T29] audit: type=1400 audit(514.720:185): avc: denied { ioctl } for pid=3282 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 515.345676][ T29] audit: type=1400 audit(514.730:186): avc: denied { open } for pid=3087 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 515.346748][ T29] audit: type=1400 audit(514.730:187): avc: denied { getattr } for pid=3087 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 515.936142][ T29] audit: type=1400 audit(515.320:188): avc: denied { map_create } for pid=3681 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 515.942677][ T29] audit: type=1400 audit(515.330:189): avc: denied { bpf } for pid=3681 comm="syz.1.82" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 519.449865][ T3690] pim6reg1: entered promiscuous mode [ 519.450374][ T3690] pim6reg1: entered allmulticast mode [ 525.311442][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 525.314627][ T29] audit: type=1400 audit(524.530:204): avc: denied { create } for pid=3691 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 525.590174][ T29] audit: type=1400 audit(524.790:205): avc: denied { read } for pid=3691 comm="syz.1.87" dev="nsfs" ino=4026532725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 525.593021][ T29] audit: type=1400 audit(524.790:206): avc: denied { open } for pid=3691 comm="syz.1.87" path="net:[4026532725]" dev="nsfs" ino=4026532725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 525.594643][ T29] audit: type=1400 audit(524.800:207): avc: denied { create } for pid=3691 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 526.642864][ T29] audit: type=1400 audit(525.600:208): avc: denied { ioctl } for pid=3691 comm="syz.1.87" path="socket:[4041]" dev="sockfs" ino=4041 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 526.644700][ T29] audit: type=1400 audit(525.860:209): avc: denied { setopt } for pid=3691 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 529.516570][ T29] audit: type=1400 audit(528.400:210): avc: denied { create } for pid=3686 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 529.517879][ T29] audit: type=1400 audit(528.580:211): avc: denied { connect } for pid=3686 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 533.877472][ T29] audit: type=1400 audit(532.790:212): avc: denied { write } for pid=3686 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 539.516018][ T29] audit: type=1400 audit(537.520:213): avc: denied { create } for pid=3701 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 539.517112][ T29] audit: type=1400 audit(537.520:214): avc: denied { ioctl } for pid=3701 comm="syz.1.89" path="socket:[4618]" dev="sockfs" ino=4618 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 539.517998][ T29] audit: type=1400 audit(537.520:215): avc: denied { module_request } for pid=3701 comm="syz.1.89" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 540.313040][ T29] audit: type=1400 audit(539.700:216): avc: denied { sys_module } for pid=3701 comm="syz.1.89" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 544.556533][ T29] audit: type=1326 audit(543.950:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3714 comm="syz.0.93" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 544.559893][ T29] audit: type=1326 audit(543.950:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3714 comm="syz.0.93" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 544.563814][ T29] audit: type=1326 audit(543.950:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3714 comm="syz.0.93" exe="/syz-executor" sig=0 arch=c00000b7 syscall=116 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 544.564695][ T29] audit: type=1326 audit(543.950:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3714 comm="syz.0.93" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 545.512441][ T29] audit: type=1400 audit(544.890:221): avc: denied { write } for pid=3709 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 554.633165][ T29] audit: type=1400 audit(553.450:222): avc: denied { create } for pid=3723 comm="syz.0.96" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 558.368081][ T29] audit: type=1400 audit(557.760:223): avc: denied { prog_run } for pid=3731 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 573.017010][ T3748] wg2: entered promiscuous mode [ 573.017583][ T3748] wg2: entered allmulticast mode [ 573.279041][ T29] audit: type=1400 audit(572.670:224): avc: denied { mounton } for pid=3750 comm="syz.0.106" path="/52/file0" dev="tmpfs" ino=279 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 574.943284][ T29] audit: type=1400 audit(574.330:225): avc: denied { create } for pid=3756 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 574.978639][ T29] audit: type=1400 audit(574.370:226): avc: denied { create } for pid=3756 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 576.054546][ T29] audit: type=1400 audit(575.400:227): avc: denied { create } for pid=3756 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 576.055957][ T29] audit: type=1400 audit(575.410:228): avc: denied { create } for pid=3756 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 576.056780][ T29] audit: type=1400 audit(575.440:229): avc: denied { setopt } for pid=3756 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 576.117139][ T29] audit: type=1400 audit(575.500:230): avc: denied { write } for pid=3756 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 584.087982][ T29] audit: type=1400 audit(583.480:231): avc: denied { search } for pid=3771 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 584.195465][ T29] audit: type=1400 audit(583.590:232): avc: denied { read } for pid=3774 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=712 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 584.198121][ T29] audit: type=1400 audit(583.590:233): avc: denied { open } for pid=3774 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=712 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 584.216802][ T29] audit: type=1400 audit(583.590:234): avc: denied { getattr } for pid=3774 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=712 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 584.370657][ T29] audit: type=1400 audit(583.760:235): avc: denied { write } for pid=3771 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=711 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 584.385537][ T29] audit: type=1400 audit(583.770:236): avc: denied { add_name } for pid=3771 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 584.386591][ T29] audit: type=1400 audit(583.770:237): avc: denied { create } for pid=3771 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 584.387492][ T29] audit: type=1400 audit(583.770:238): avc: denied { write open } for pid=3771 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1135 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 584.394348][ T29] audit: type=1400 audit(583.780:239): avc: denied { append } for pid=3771 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1135 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 584.442153][ T29] audit: type=1400 audit(583.830:240): avc: denied { getattr } for pid=3771 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 589.850444][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 589.850539][ T29] audit: type=1400 audit(589.240:243): avc: denied { remove_name } for pid=3781 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1135 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 589.867652][ T29] audit: type=1400 audit(589.260:244): avc: denied { unlink } for pid=3781 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1135 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 590.718489][ T29] audit: type=1400 audit(590.110:245): avc: denied { read } for pid=3785 comm="syz.1.117" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 590.732650][ T29] audit: type=1400 audit(590.120:246): avc: denied { open } for pid=3785 comm="syz.1.117" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 590.774628][ T29] audit: type=1400 audit(590.170:247): avc: denied { ioctl } for pid=3785 comm="syz.1.117" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 596.296893][ T29] audit: type=1400 audit(595.690:248): avc: denied { read } for pid=3789 comm="syz.0.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 602.633367][ T29] audit: type=1400 audit(601.900:249): avc: denied { create } for pid=3793 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 602.634595][ T29] audit: type=1400 audit(601.950:250): avc: denied { setopt } for pid=3793 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 602.635686][ T29] audit: type=1400 audit(602.030:251): avc: denied { bind } for pid=3793 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 602.636665][ T29] audit: type=1400 audit(602.030:252): avc: denied { read } for pid=3793 comm="syz.0.120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 602.638481][ T29] audit: type=1400 audit(602.030:253): avc: denied { connect } for pid=3793 comm="syz.0.120" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 606.501034][ T29] audit: type=1326 audit(605.890:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3810 comm="syz.1.127" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7fc00000 [ 606.527708][ T29] audit: type=1326 audit(605.920:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3810 comm="syz.1.127" exe="/syz-executor" sig=0 arch=c00000b7 syscall=56 compat=0 ip=0xffff80752ba8 code=0x7fc00000 [ 608.066255][ T29] audit: type=1326 audit(607.440:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3810 comm="syz.1.127" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7fc00000 [ 608.225926][ T29] audit: type=1400 audit(607.610:257): avc: denied { create } for pid=3813 comm="syz.0.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 608.505872][ T3816] netlink: 'syz.1.129': attribute type 39 has an invalid length. [ 608.796758][ T29] audit: type=1400 audit(608.190:258): avc: denied { create } for pid=3817 comm="syz.0.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 609.653374][ T3822] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3822 comm=syz.0.131 [ 610.814427][ T29] audit: type=1400 audit(610.200:259): avc: denied { bind } for pid=3824 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 610.820737][ T29] audit: type=1400 audit(610.210:260): avc: denied { name_bind } for pid=3824 comm="syz.0.133" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 610.851137][ T29] audit: type=1400 audit(610.240:261): avc: denied { node_bind } for pid=3824 comm="syz.0.133" saddr=255.255.255.255 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 614.545062][ T29] audit: type=1400 audit(613.930:262): avc: denied { create } for pid=3845 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 614.579121][ T29] audit: type=1400 audit(613.970:263): avc: denied { setopt } for pid=3845 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 614.625061][ T29] audit: type=1400 audit(614.010:264): avc: denied { bind } for pid=3845 comm="syz.1.140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 614.636836][ T29] audit: type=1400 audit(614.030:265): avc: denied { name_bind } for pid=3845 comm="syz.1.140" src=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 614.638531][ T29] audit: type=1400 audit(614.030:266): avc: denied { node_bind } for pid=3845 comm="syz.1.140" saddr=172.20.20.187 src=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 614.685001][ T29] audit: type=1400 audit(614.070:267): avc: denied { write } for pid=3845 comm="syz.1.140" laddr=172.20.20.187 lport=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 614.693477][ T29] audit: type=1400 audit(614.080:268): avc: denied { connect } for pid=3845 comm="syz.1.140" laddr=172.20.20.187 lport=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 614.705083][ T29] audit: type=1400 audit(614.100:269): avc: denied { name_connect } for pid=3845 comm="syz.1.140" dest=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 619.293696][ T29] audit: type=1400 audit(618.670:270): avc: denied { create } for pid=3869 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 619.307948][ T29] audit: type=1400 audit(618.700:271): avc: denied { write } for pid=3869 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 627.554313][ T29] audit: type=1400 audit(626.910:272): avc: denied { create } for pid=3912 comm="syz.0.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 629.038644][ T29] audit: type=1400 audit(628.430:273): avc: denied { name_connect } for pid=3923 comm="syz.0.173" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 630.127404][ T29] audit: type=1400 audit(629.520:274): avc: denied { create } for pid=3923 comm="syz.0.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 630.130630][ T29] audit: type=1400 audit(629.520:275): avc: denied { write } for pid=3923 comm="syz.0.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 630.134779][ T29] audit: type=1400 audit(629.520:276): avc: denied { nlmsg_read } for pid=3923 comm="syz.0.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 630.148298][ T29] audit: type=1400 audit(629.540:277): avc: denied { read } for pid=3923 comm="syz.0.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 632.246907][ T3929] Driver unsupported XDP return value 0 on prog (id 15) dev N/A, expect packet loss! [ 639.207744][ T3969] netlink: 36 bytes leftover after parsing attributes in process `syz.1.193'. [ 641.128589][ T29] audit: type=1400 audit(640.510:278): avc: denied { relabelfrom } for pid=3977 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 641.140878][ T29] audit: type=1400 audit(640.520:279): avc: denied { relabelto } for pid=3977 comm="syz.1.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 642.438523][ T3982] netlink: 36 bytes leftover after parsing attributes in process `syz.1.198'. [ 644.399086][ T3995] netlink: 36 bytes leftover after parsing attributes in process `syz.0.205'. [ 646.677966][ T4007] veth1_macvtap: left promiscuous mode [ 646.678700][ T4007] macsec0: entered promiscuous mode [ 667.067028][ T29] audit: type=1400 audit(666.460:280): avc: denied { module_load } for pid=4055 comm="syz.1.230" path="/sys/kernel/notes" dev="sysfs" ino=848 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 669.110494][ T4061] netlink: 8 bytes leftover after parsing attributes in process `syz.1.232'. [ 669.243754][ T4061] bond1: entered promiscuous mode [ 669.244535][ T4061] bond1: entered allmulticast mode [ 669.251296][ T4061] 8021q: adding VLAN 0 to HW filter on device bond1 [ 669.886148][ T29] audit: type=1400 audit(669.170:281): avc: denied { read } for pid=4063 comm="syz.1.233" path="socket:[6186]" dev="sockfs" ino=6186 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 673.667407][ T29] audit: type=1400 audit(673.060:282): avc: denied { read } for pid=4066 comm="syz.1.234" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 673.698199][ T29] audit: type=1400 audit(673.090:283): avc: denied { open } for pid=4066 comm="syz.1.234" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 673.837910][ T29] audit: type=1400 audit(673.220:284): avc: denied { ioctl } for pid=4066 comm="syz.1.234" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 673.884277][ T4067] binder: 4066:4067 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 686.673072][ T4078] netlink: 8 bytes leftover after parsing attributes in process `syz.1.237'. [ 686.894753][ T4078] bond2: entered promiscuous mode [ 686.895401][ T4078] bond2: entered allmulticast mode [ 686.897463][ T4078] 8021q: adding VLAN 0 to HW filter on device bond2 [ 688.423773][ T29] audit: type=1400 audit(687.820:285): avc: denied { read write } for pid=4081 comm="syz.1.238" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 688.426378][ T29] audit: type=1400 audit(687.820:286): avc: denied { open } for pid=4081 comm="syz.1.238" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 688.432618][ T29] audit: type=1400 audit(687.820:287): avc: denied { ioctl } for pid=4081 comm="syz.1.238" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 688.460496][ T4083] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 688.506424][ T4083] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 690.968937][ T29] audit: type=1400 audit(690.360:288): avc: denied { write } for pid=4084 comm="syz.1.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 691.527739][ T4088] netlink: 4 bytes leftover after parsing attributes in process `syz.1.239'. [ 691.767075][ T29] audit: type=1400 audit(691.140:289): avc: denied { read } for pid=4084 comm="syz.1.239" path="socket:[6210]" dev="sockfs" ino=6210 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 692.902338][ T29] audit: type=1326 audit(692.280:290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4084 comm="syz.1.239" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7fc00000 [ 695.468581][ T4103] netlink: 8 bytes leftover after parsing attributes in process `syz.0.242'. [ 695.910562][ T4103] bond1: entered promiscuous mode [ 695.916877][ T4103] bond1: entered allmulticast mode [ 695.949953][ T4103] 8021q: adding VLAN 0 to HW filter on device bond1 [ 707.283018][ T29] audit: type=1400 audit(706.550:291): avc: denied { read } for pid=4113 comm="syz.1.245" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 707.284988][ T29] audit: type=1400 audit(706.550:292): avc: denied { open } for pid=4113 comm="syz.1.245" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 708.314353][ T29] audit: type=1400 audit(707.680:293): avc: denied { read } for pid=3087 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 708.316173][ T29] audit: type=1400 audit(707.690:294): avc: denied { search } for pid=3087 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 708.317596][ T29] audit: type=1400 audit(707.690:295): avc: denied { append } for pid=3087 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 708.319016][ T29] audit: type=1400 audit(707.690:296): avc: denied { open } for pid=3087 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 708.320501][ T29] audit: type=1400 audit(707.700:297): avc: denied { getattr } for pid=3087 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 714.805157][ T29] audit: type=1400 audit(714.200:298): avc: denied { execmem } for pid=4118 comm="syz.0.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 715.063854][ T29] audit: type=1400 audit(714.450:299): avc: denied { prog_load } for pid=4113 comm="syz.1.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 715.065060][ T29] audit: type=1400 audit(714.460:300): avc: denied { bpf } for pid=4113 comm="syz.1.245" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 715.066183][ T29] audit: type=1400 audit(714.460:301): avc: denied { perfmon } for pid=4113 comm="syz.1.245" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 715.104112][ T29] audit: type=1400 audit(714.500:302): avc: denied { create } for pid=4113 comm="syz.1.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 715.126213][ T29] audit: type=1400 audit(714.520:303): avc: denied { create } for pid=4113 comm="syz.1.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 717.220945][ T4121] netlink: 8 bytes leftover after parsing attributes in process `syz.1.247'. [ 717.476421][ T29] audit: type=1400 audit(716.500:304): avc: denied { read write } for pid=3282 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 717.477498][ T29] audit: type=1400 audit(716.500:305): avc: denied { open } for pid=3282 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 717.478459][ T29] audit: type=1400 audit(716.500:306): avc: denied { ioctl } for pid=3282 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 717.559870][ T4121] bond3: entered promiscuous mode [ 717.560522][ T4121] bond3: entered allmulticast mode [ 717.564937][ T4121] 8021q: adding VLAN 0 to HW filter on device bond3 [ 718.180547][ T29] audit: type=1400 audit(717.570:307): avc: denied { create } for pid=4124 comm="syz.1.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 718.904761][ T4130] netlink: 12 bytes leftover after parsing attributes in process `syz.1.250'. [ 720.269122][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 720.269227][ T29] audit: type=1400 audit(719.660:314): avc: denied { create } for pid=4133 comm="syz.1.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 720.273170][ T29] audit: type=1400 audit(719.670:315): avc: denied { connect } for pid=4133 comm="syz.1.251" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 720.278551][ T29] audit: type=1400 audit(719.670:316): avc: denied { write } for pid=4133 comm="syz.1.251" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 fport=20000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 723.013918][ T4137] netlink: 8 bytes leftover after parsing attributes in process `syz.1.252'. [ 723.206604][ T4137] bond4: entered promiscuous mode [ 723.207445][ T4137] bond4: entered allmulticast mode [ 723.259617][ T4137] 8021q: adding VLAN 0 to HW filter on device bond4 [ 723.746959][ T29] audit: type=1400 audit(723.140:317): avc: denied { write } for pid=4139 comm="syz.1.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 724.338717][ T29] audit: type=1400 audit(723.730:318): avc: denied { setopt } for pid=4141 comm="syz.1.254" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 724.347784][ T29] audit: type=1400 audit(723.740:319): avc: denied { block_suspend } for pid=4141 comm="syz.1.254" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 747.928087][ T4159] netlink: 8 bytes leftover after parsing attributes in process `syz.0.258'. [ 748.034874][ T4159] bond2: entered promiscuous mode [ 748.035499][ T4159] bond2: entered allmulticast mode [ 748.039764][ T4159] 8021q: adding VLAN 0 to HW filter on device bond2 [ 755.174647][ T29] audit: type=1400 audit(754.500:320): avc: denied { create } for pid=4170 comm="syz.1.261" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 755.226934][ T29] audit: type=1400 audit(754.610:321): avc: denied { ioctl } for pid=4170 comm="syz.1.261" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=6288 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 757.472720][ T29] audit: type=1400 audit(756.860:322): avc: denied { read } for pid=4172 comm="syz.1.262" dev="nsfs" ino=4026532725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 757.473707][ T29] audit: type=1400 audit(756.860:323): avc: denied { open } for pid=4172 comm="syz.1.262" path="net:[4026532725]" dev="nsfs" ino=4026532725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 757.599435][ T29] audit: type=1400 audit(756.990:324): avc: denied { write } for pid=4172 comm="syz.1.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 758.387626][ T29] audit: type=1400 audit(757.780:325): avc: denied { read } for pid=4172 comm="syz.1.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 759.893060][ T4177] bond5: entered promiscuous mode [ 759.893684][ T4177] bond5: entered allmulticast mode [ 759.895505][ T4177] 8021q: adding VLAN 0 to HW filter on device bond5 [ 760.317887][ T29] audit: type=1400 audit(759.710:326): avc: denied { create } for pid=4181 comm="syz.1.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 760.330677][ T29] audit: type=1400 audit(759.720:327): avc: denied { write } for pid=4181 comm="syz.1.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 760.354241][ T29] audit: type=1400 audit(759.730:328): avc: denied { nlmsg_write } for pid=4181 comm="syz.1.265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 761.435318][ T4188] bond6: entered promiscuous mode [ 761.435873][ T4188] bond6: entered allmulticast mode [ 761.438440][ T4188] 8021q: adding VLAN 0 to HW filter on device bond6 [ 763.393276][ T29] audit: type=1400 audit(762.710:329): avc: denied { mounton } for pid=4196 comm="syz.1.272" path="/142/file0" dev="tmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 763.394255][ T29] audit: type=1400 audit(762.730:330): avc: denied { mount } for pid=4196 comm="syz.1.272" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 763.395439][ T29] audit: type=1400 audit(762.740:331): avc: denied { remount } for pid=4196 comm="syz.1.272" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 763.516033][ T29] audit: type=1400 audit(762.900:332): avc: denied { unmount } for pid=3282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 764.424414][ T4203] bond7: entered promiscuous mode [ 764.424967][ T4203] bond7: entered allmulticast mode [ 764.426907][ T4203] 8021q: adding VLAN 0 to HW filter on device bond7 [ 776.033770][ T29] audit: type=1400 audit(775.420:333): avc: denied { sys_module } for pid=4217 comm="syz.0.278" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 778.120575][ T4225] bond3: entered promiscuous mode [ 778.121431][ T4225] bond3: entered allmulticast mode [ 778.124579][ T4225] 8021q: adding VLAN 0 to HW filter on device bond3 [ 783.124695][ T29] audit: type=1326 audit(782.460:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4227 comm="syz.0.280" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 783.127044][ T29] audit: type=1326 audit(782.470:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4227 comm="syz.0.280" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 783.129015][ T29] audit: type=1326 audit(782.470:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4227 comm="syz.0.280" exe="/syz-executor" sig=0 arch=c00000b7 syscall=436 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 783.137895][ T29] audit: type=1326 audit(782.480:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4227 comm="syz.0.280" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 783.140121][ T29] audit: type=1326 audit(782.490:338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4227 comm="syz.0.280" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 796.657491][ T4245] bond4: entered promiscuous mode [ 796.662718][ T4245] bond4: entered allmulticast mode [ 796.669926][ T4245] 8021q: adding VLAN 0 to HW filter on device bond4 [ 799.128248][ T29] audit: type=1400 audit(798.520:339): avc: denied { create } for pid=4250 comm="syz.0.286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 804.488503][ T4256] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 804.567049][ T29] audit: type=1400 audit(803.960:340): avc: denied { ioctl } for pid=4254 comm="syz.1.287" path="socket:[6415]" dev="sockfs" ino=6415 ioctlcmd=0x8955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 808.378571][ T4260] bond8: entered promiscuous mode [ 808.379849][ T4260] bond8: entered allmulticast mode [ 808.431435][ T4260] 8021q: adding VLAN 0 to HW filter on device bond8 [ 811.824835][ T29] audit: type=1400 audit(811.220:341): avc: denied { ioctl } for pid=4267 comm="syz.0.292" path="socket:[5777]" dev="sockfs" ino=5777 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 811.825855][ T4268] netlink: 8 bytes leftover after parsing attributes in process `syz.0.292'. [ 815.439538][ T4272] mmap: syz.0.293 (4272) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 817.760559][ T29] audit: type=1400 audit(817.150:342): avc: denied { name_bind } for pid=4275 comm="syz.0.295" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 817.777123][ T29] audit: type=1400 audit(817.170:343): avc: denied { node_bind } for pid=4275 comm="syz.0.295" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 821.497264][ T29] audit: type=1400 audit(820.890:344): avc: denied { prog_run } for pid=4282 comm="syz.0.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 821.848025][ T4285] netlink: 16 bytes leftover after parsing attributes in process `syz.0.299'. [ 822.079066][ T29] audit: type=1400 audit(821.470:345): avc: denied { name_bind } for pid=4286 comm="syz.0.300" src=20128 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 826.883455][ T29] audit: type=1400 audit(825.880:346): avc: denied { mounton } for pid=4293 comm="syz.1.303" path="/proc/381/task" dev="proc" ino=5802 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 826.903310][ T29] audit: type=1400 audit(825.900:347): avc: denied { mount } for pid=4293 comm="syz.1.303" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 828.005888][ T4297] xt_CT: No such helper "pptp" [ 842.492584][ T4312] netlink: 'syz.0.306': attribute type 4 has an invalid length. [ 880.749975][ T29] audit: type=1400 audit(880.140:348): avc: denied { create } for pid=4317 comm="syz.1.308" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 880.795829][ T29] audit: type=1400 audit(880.190:349): avc: denied { read } for pid=4317 comm="syz.1.308" name="file0" dev="tmpfs" ino=810 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 880.813646][ T29] audit: type=1400 audit(880.190:350): avc: denied { open } for pid=4317 comm="syz.1.308" path="/157/file0" dev="tmpfs" ino=810 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 880.847077][ T29] audit: type=1400 audit(880.210:351): avc: denied { ioctl } for pid=4317 comm="syz.1.308" path="/157/file0" dev="tmpfs" ino=810 ioctlcmd=0x1271 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 883.764764][ T29] audit: type=1400 audit(883.160:352): avc: denied { unlink } for pid=3282 comm="syz-executor" name="file0" dev="tmpfs" ino=810 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 888.105453][ T4331] input: syz0 as /devices/virtual/input/input1 [ 888.179716][ T29] audit: type=1400 audit(887.300:353): avc: denied { read write } for pid=4324 comm="syz.1.310" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 888.308558][ T29] audit: type=1400 audit(887.320:354): avc: denied { open } for pid=4324 comm="syz.1.310" path="/dev/uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 888.388374][ T29] audit: type=1400 audit(887.390:355): avc: denied { ioctl } for pid=4324 comm="syz.1.310" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 891.844721][ T29] audit: type=1400 audit(891.230:356): avc: denied { create } for pid=4336 comm="syz.0.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 891.861099][ T29] audit: type=1400 audit(891.250:357): avc: denied { shutdown } for pid=4336 comm="syz.0.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 891.936897][ T29] audit: type=1400 audit(891.330:358): avc: denied { getopt } for pid=4336 comm="syz.0.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 891.966425][ T29] audit: type=1400 audit(891.350:359): avc: denied { connect } for pid=4336 comm="syz.0.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 891.970544][ T29] audit: type=1400 audit(891.360:360): avc: denied { name_connect } for pid=4336 comm="syz.0.313" dest=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 892.040205][ T29] audit: type=1400 audit(891.430:361): avc: denied { setopt } for pid=4336 comm="syz.0.313" laddr=::ffff:172.20.20.170 lport=42242 faddr=::ffff:172.30.0.1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 910.825936][ T29] audit: type=1400 audit(910.220:362): avc: denied { bind } for pid=4360 comm="syz.1.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 910.865299][ T29] audit: type=1400 audit(910.250:363): avc: denied { write } for pid=4360 comm="syz.1.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 911.027031][ T29] audit: type=1400 audit(910.420:364): avc: denied { ioctl } for pid=4360 comm="syz.1.321" path="socket:[5850]" dev="sockfs" ino=5850 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 911.039057][ T4361] netlink: 4 bytes leftover after parsing attributes in process `syz.1.321'. [ 913.713084][ T29] audit: type=1400 audit(913.100:365): avc: denied { create } for pid=4368 comm="syz.1.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 913.806307][ T29] audit: type=1400 audit(913.200:366): avc: denied { ioctl } for pid=4368 comm="syz.1.325" path="socket:[5858]" dev="sockfs" ino=5858 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 918.964672][ T29] audit: type=1400 audit(918.360:367): avc: denied { create } for pid=4376 comm="syz.0.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 919.036435][ T29] audit: type=1400 audit(918.430:368): avc: denied { write } for pid=4376 comm="syz.0.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 919.193734][ T4381] netlink: 4 bytes leftover after parsing attributes in process `syz.0.328'. [ 927.950588][ T29] audit: type=1400 audit(927.340:369): avc: denied { bind } for pid=4387 comm="syz.1.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 928.368102][ T4388] netlink: 4 bytes leftover after parsing attributes in process `syz.1.330'. [ 930.826841][ T29] audit: type=1400 audit(930.220:370): avc: denied { create } for pid=4390 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 936.317417][ T29] audit: type=1400 audit(935.500:371): avc: denied { map } for pid=4390 comm="syz.1.331" path="socket:[5879]" dev="sockfs" ino=5879 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 936.319351][ T29] audit: type=1400 audit(935.500:372): avc: denied { read } for pid=4390 comm="syz.1.331" path="socket:[5879]" dev="sockfs" ino=5879 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 938.552231][ T29] audit: type=1400 audit(936.970:373): avc: denied { connect } for pid=4390 comm="syz.1.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 946.832744][ T29] audit: type=1400 audit(946.210:374): avc: denied { read } for pid=4399 comm="syz.1.333" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 946.834333][ T29] audit: type=1400 audit(946.210:375): avc: denied { open } for pid=4399 comm="syz.1.333" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 946.835431][ T29] audit: type=1400 audit(946.210:376): avc: denied { ioctl } for pid=4399 comm="syz.1.333" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 946.836524][ T29] audit: type=1400 audit(946.220:377): avc: denied { map } for pid=4399 comm="syz.1.333" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 946.988589][ T4401] bond_slave_0: mtu greater than device maximum [ 949.801056][ T29] audit: type=1400 audit(949.190:378): avc: denied { bind } for pid=4404 comm="syz.0.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 949.804129][ T29] audit: type=1400 audit(949.190:379): avc: denied { name_bind } for pid=4404 comm="syz.0.335" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 949.805836][ T29] audit: type=1400 audit(949.190:380): avc: denied { node_bind } for pid=4404 comm="syz.0.335" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 949.807309][ T29] audit: type=1400 audit(949.200:381): avc: denied { listen } for pid=4404 comm="syz.0.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 949.855599][ T29] audit: type=1400 audit(949.250:382): avc: denied { write } for pid=4404 comm="syz.0.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 959.018538][ T29] audit: type=1400 audit(957.990:383): avc: denied { create } for pid=4412 comm="syz.0.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 959.070297][ T29] audit: type=1400 audit(958.030:384): avc: denied { bind } for pid=4412 comm="syz.0.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 959.073949][ T29] audit: type=1400 audit(958.080:385): avc: denied { write } for pid=4412 comm="syz.0.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 962.462632][ T29] audit: type=1400 audit(961.840:386): avc: denied { map } for pid=4418 comm="syz.1.339" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6655 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 962.647031][ T29] audit: type=1400 audit(962.040:387): avc: denied { read write } for pid=4418 comm="syz.1.339" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6655 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 966.464412][ T29] audit: type=1400 audit(965.860:388): avc: denied { create } for pid=4423 comm="syz.0.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 975.231157][ T29] audit: type=1400 audit(974.620:389): avc: denied { ioctl } for pid=4436 comm="syz.0.343" path="socket:[5926]" dev="sockfs" ino=5926 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 984.003019][ T29] audit: type=1400 audit(983.370:390): avc: denied { create } for pid=4456 comm="syz.1.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 984.007624][ T29] audit: type=1400 audit(983.400:391): avc: denied { write } for pid=4456 comm="syz.1.347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 984.382851][ T29] audit: type=1400 audit(983.770:392): avc: denied { create } for pid=4458 comm="syz.1.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 984.425557][ T29] audit: type=1400 audit(983.820:393): avc: denied { write } for pid=4458 comm="syz.1.348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 987.111021][ T4467] binder: Bad value for 'context' [ 987.133357][ T29] audit: type=1400 audit(986.500:394): avc: denied { remount } for pid=4466 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 988.323808][ T4469] netlink: 8 bytes leftover after parsing attributes in process `syz.1.351'. [ 991.268658][ T29] audit: type=1400 audit(990.660:395): avc: denied { create } for pid=4476 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 991.303990][ T29] audit: type=1400 audit(990.700:396): avc: denied { getopt } for pid=4476 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 991.893394][ T29] audit: type=1400 audit(991.280:397): avc: denied { setopt } for pid=4476 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 993.625049][ T29] audit: type=1400 audit(993.020:398): avc: denied { read } for pid=4484 comm="syz.0.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 995.975604][ T29] audit: type=1400 audit(995.350:399): avc: denied { read } for pid=4496 comm="syz.1.363" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 995.978208][ T29] audit: type=1400 audit(995.370:400): avc: denied { open } for pid=4496 comm="syz.1.363" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 996.002510][ T29] audit: type=1400 audit(995.390:401): avc: denied { write } for pid=3087 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 996.015389][ T29] audit: type=1400 audit(995.410:402): avc: denied { remove_name } for pid=3087 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 996.020494][ T29] audit: type=1400 audit(995.410:403): avc: denied { rename } for pid=3087 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 996.030451][ T29] audit: type=1400 audit(995.420:404): avc: denied { add_name } for pid=3087 comm="syslogd" name="messages.0" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 999.864087][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 999.864314][ T29] audit: type=1400 audit(999.260:407): avc: denied { create } for pid=4507 comm="syz.1.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1004.207801][ T29] audit: type=1400 audit(1003.600:408): avc: denied { read } for pid=4520 comm="syz.1.371" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1004.228870][ T29] audit: type=1400 audit(1003.600:409): avc: denied { open } for pid=4520 comm="syz.1.371" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1004.303899][ T29] audit: type=1400 audit(1003.650:410): avc: denied { ioctl } for pid=4520 comm="syz.1.371" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7007 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1009.143278][ T29] audit: type=1400 audit(1007.670:411): avc: denied { create } for pid=4522 comm="syz.1.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 1009.144929][ T29] audit: type=1400 audit(1008.440:412): avc: denied { read } for pid=4522 comm="syz.1.372" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1009.146366][ T29] audit: type=1400 audit(1008.440:413): avc: denied { open } for pid=4522 comm="syz.1.372" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1009.147768][ T29] audit: type=1400 audit(1008.440:414): avc: denied { ioctl } for pid=4522 comm="syz.1.372" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1025.550141][ T29] audit: type=1400 audit(1024.920:415): avc: denied { override_creds } for pid=4545 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1031.538336][ T29] audit: type=1400 audit(1030.920:416): avc: denied { mount } for pid=4577 comm="syz.0.391" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1038.192845][ T29] audit: type=1400 audit(1037.430:417): avc: denied { execute } for pid=4594 comm="syz.0.398" path="/195/cpu.stat" dev="tmpfs" ino=1002 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1038.594936][ T29] audit: type=1400 audit(1037.990:418): avc: denied { bind } for pid=4596 comm="syz.1.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1039.147901][ T29] audit: type=1400 audit(1038.540:419): avc: denied { setopt } for pid=4596 comm="syz.1.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1039.227676][ T29] audit: type=1400 audit(1038.590:420): avc: denied { accept } for pid=4596 comm="syz.1.397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1041.698603][ T4618] netlink: 8 bytes leftover after parsing attributes in process `syz.1.401'. [ 1041.699398][ T4618] netlink: 12 bytes leftover after parsing attributes in process `syz.1.401'. [ 1041.820801][ T4618] ipt_REJECT: TCP_RESET invalid for non-tcp [ 1043.065245][ T29] audit: type=1400 audit(1042.230:421): avc: denied { create } for pid=4623 comm="syz.0.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1044.416834][ T29] audit: type=1400 audit(1043.810:422): avc: denied { ioctl } for pid=4631 comm="syz.1.408" path="socket:[6938]" dev="sockfs" ino=6938 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1045.550435][ T29] audit: type=1400 audit(1044.940:423): avc: denied { read } for pid=4643 comm="syz.1.413" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1045.553951][ T29] audit: type=1400 audit(1044.940:424): avc: denied { open } for pid=4643 comm="syz.1.413" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1045.568757][ T29] audit: type=1400 audit(1044.960:425): avc: denied { ioctl } for pid=4643 comm="syz.1.413" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1046.940476][ T29] audit: type=1400 audit(1046.330:426): avc: denied { map } for pid=4649 comm="syz.1.416" path="/dev/dri/card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1046.998509][ T29] audit: type=1400 audit(1046.380:427): avc: denied { execute } for pid=4649 comm="syz.1.416" path="/dev/dri/card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1049.033714][ T29] audit: type=1400 audit(1048.430:428): avc: denied { read write } for pid=4663 comm="syz.1.422" name="vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1049.034857][ T29] audit: type=1400 audit(1048.430:429): avc: denied { open } for pid=4663 comm="syz.1.422" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1049.048937][ T29] audit: type=1400 audit(1048.440:430): avc: denied { ioctl } for pid=4663 comm="syz.1.422" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1049.169159][ T29] audit: type=1400 audit(1048.560:431): avc: denied { connect } for pid=4663 comm="syz.1.422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1053.166154][ T29] audit: type=1400 audit(1052.510:432): avc: denied { name_connect } for pid=4679 comm="syz.1.429" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 1059.497200][ T29] audit: type=1400 audit(1058.890:433): avc: denied { setopt } for pid=4703 comm="syz.0.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1060.020950][ T29] audit: type=1400 audit(1059.410:434): avc: denied { write } for pid=4705 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1060.602059][ T29] audit: type=1400 audit(1059.990:435): avc: denied { getopt } for pid=4710 comm="syz.0.442" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1064.604566][ T4727] netlink: 4 bytes leftover after parsing attributes in process `syz.0.447'. [ 1068.955542][ T29] audit: type=1400 audit(1068.350:436): avc: denied { listen } for pid=4750 comm="syz.1.459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1069.905745][ T4761] netlink: 28 bytes leftover after parsing attributes in process `syz.1.461'. [ 1069.920072][ T4761] netlink: 28 bytes leftover after parsing attributes in process `syz.1.461'. [ 1071.310254][ T4772] netlink: 24 bytes leftover after parsing attributes in process `syz.1.464'. [ 1072.555815][ T29] audit: type=1400 audit(1071.950:437): avc: denied { accept } for pid=4778 comm="syz.1.467" lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1077.768195][ T29] audit: type=1326 audit(1077.160:438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4789 comm="syz.1.469" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 1077.773441][ T29] audit: type=1326 audit(1077.160:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4789 comm="syz.1.469" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 1077.803670][ T29] audit: type=1326 audit(1077.190:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4789 comm="syz.1.469" exe="/syz-executor" sig=0 arch=c00000b7 syscall=202 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 1077.804734][ T29] audit: type=1326 audit(1077.190:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4789 comm="syz.1.469" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 1077.805639][ T29] audit: type=1326 audit(1077.190:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4789 comm="syz.1.469" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff80752ba8 code=0x7ffc0000 [ 1078.956184][ T29] audit: type=1400 audit(1078.350:443): avc: denied { watch } for pid=4793 comm="syz.1.471" path="/233" dev="tmpfs" ino=1187 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1079.672671][ T29] audit: type=1400 audit(1079.060:444): avc: denied { nlmsg_read } for pid=4795 comm="syz.1.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1083.789156][ T4816] Zero length message leads to an empty skb [ 1084.169376][ T4824] sch_tbf: burst 0 is lower than device lo mtu (18) ! [ 1084.432706][ T29] audit: type=1326 audit(1083.820:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4825 comm="syz.0.486" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 1084.437473][ T29] audit: type=1326 audit(1083.830:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4825 comm="syz.0.486" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 1084.447764][ T29] audit: type=1326 audit(1083.840:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4825 comm="syz.0.486" exe="/syz-executor" sig=0 arch=c00000b7 syscall=272 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 1084.452765][ T29] audit: type=1326 audit(1083.840:448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4825 comm="syz.0.486" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 1084.455366][ T29] audit: type=1326 audit(1083.850:449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4825 comm="syz.0.486" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffbcd52ba8 code=0x7ffc0000 [ 1086.358003][ T29] audit: type=1400 audit(1085.750:450): avc: denied { write } for pid=4837 comm="syz.0.491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1086.718641][ T4840] netlink: 4 bytes leftover after parsing attributes in process `syz.0.492'. [ 1091.303182][ T4858] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1091.307017][ T4858] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1092.456512][ T4861] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1092.486374][ T4861] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1092.564539][ T4861] capability: warning: `syz.1.499' uses deprecated v2 capabilities in a way that may be insecure [ 1093.954265][ T29] audit: type=1400 audit(1093.350:451): avc: denied { setopt } for pid=4866 comm="syz.0.502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1094.945368][ T29] audit: type=1400 audit(1094.340:452): avc: denied { bind } for pid=4878 comm="syz.0.508" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1094.946407][ T29] audit: type=1400 audit(1094.340:453): avc: denied { name_bind } for pid=4878 comm="syz.0.508" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1094.947292][ T29] audit: type=1400 audit(1094.340:454): avc: denied { node_bind } for pid=4878 comm="syz.0.508" saddr=ff01::1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1096.377827][ T4893] bond0: Unable to set down delay as MII monitoring is disabled [ 1096.904368][ T4897] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1096.906473][ T4897] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1099.097889][ T4913] netdevsim netdevsim1 netdevsim0: entered promiscuous mode [ 1099.127362][ T4913] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 1104.003662][ T4943] netlink: 8 bytes leftover after parsing attributes in process `syz.0.533'. [ 1104.507914][ T29] audit: type=1400 audit(1103.890:455): avc: denied { create } for pid=4946 comm="syz.1.536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1104.897776][ T4952] xt_hashlimit: size too large, truncated to 1048576 [ 1108.653205][ T29] audit: type=1400 audit(1107.680:456): avc: denied { create } for pid=4959 comm="syz.1.542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1113.397246][ T29] audit: type=1400 audit(1112.790:457): avc: denied { search } for pid=4980 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1113.512241][ T29] audit: type=1400 audit(1112.890:458): avc: denied { read } for pid=4984 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=712 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1113.513479][ T29] audit: type=1400 audit(1112.900:459): avc: denied { open } for pid=4984 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=712 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1113.514420][ T29] audit: type=1400 audit(1112.900:460): avc: denied { getattr } for pid=4984 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=712 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1113.618901][ T29] audit: type=1400 audit(1113.010:461): avc: denied { write } for pid=4980 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=711 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1113.630014][ T29] audit: type=1400 audit(1113.010:462): avc: denied { add_name } for pid=4980 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1113.637308][ T29] audit: type=1400 audit(1113.030:463): avc: denied { create } for pid=4980 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1113.642660][ T29] audit: type=1400 audit(1113.030:464): avc: denied { write open } for pid=4980 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1815 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1113.664141][ T29] audit: type=1400 audit(1113.060:465): avc: denied { append } for pid=4980 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1815 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1113.683913][ T29] audit: type=1400 audit(1113.080:466): avc: denied { getattr } for pid=4980 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1114.997729][ T4991] process 'syz.1.553' launched '/dev/fd/3' with NULL argv: empty string added [ 1128.557647][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 1128.557804][ T29] audit: type=1400 audit(1127.950:473): avc: denied { map } for pid=5035 comm="syz.0.572" path="socket:[7619]" dev="sockfs" ino=7619 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1128.585302][ T29] audit: type=1400 audit(1127.950:474): avc: denied { read } for pid=5035 comm="syz.0.572" path="socket:[7619]" dev="sockfs" ino=7619 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1130.418664][ T29] audit: type=1400 audit(1129.790:475): avc: denied { setopt } for pid=5042 comm="syz.0.575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1130.803255][ T29] audit: type=1400 audit(1130.190:476): avc: denied { create } for pid=5044 comm="syz.0.576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1130.804295][ T29] audit: type=1400 audit(1130.190:477): avc: denied { write } for pid=5044 comm="syz.0.576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1130.805102][ T29] audit: type=1400 audit(1130.190:478): avc: denied { nlmsg_read } for pid=5044 comm="syz.0.576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1138.197470][ T29] audit: type=1400 audit(1137.580:479): avc: denied { read write } for pid=5083 comm="syz.1.593" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1138.205082][ T29] audit: type=1400 audit(1137.590:480): avc: denied { open } for pid=5083 comm="syz.1.593" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1138.444549][ T29] audit: type=1400 audit(1137.830:481): avc: denied { mount } for pid=5083 comm="syz.1.593" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1138.705349][ T5089] netlink: 68 bytes leftover after parsing attributes in process `syz.0.594'. [ 1138.706393][ T5089] netlink: 8 bytes leftover after parsing attributes in process `syz.0.594'. [ 1139.188078][ T29] audit: type=1400 audit(1138.580:482): avc: denied { unmount } for pid=5083 comm="syz.1.593" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1139.611164][ T29] audit: type=1400 audit(1139.000:483): avc: denied { create } for pid=5093 comm="syz.0.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1139.647637][ T29] audit: type=1400 audit(1139.040:484): avc: denied { ioctl } for pid=5093 comm="syz.0.596" path="socket:[7698]" dev="sockfs" ino=7698 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1143.421140][ T5108] could not allocate digest TFM handle sha1-ssse3 [ 1146.500786][ T29] audit: type=1400 audit(1145.870:485): avc: denied { read } for pid=5125 comm="syz.0.610" laddr=fe80:: lport=40858 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1146.569077][ T5132] netlink: 'syz.1.611': attribute type 29 has an invalid length. [ 1152.330324][ T29] audit: type=1400 audit(1151.720:486): avc: denied { write } for pid=5153 comm="syz.1.619" name="packet" dev="proc" ino=4026532792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1154.533143][ T5178] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1154.535481][ T5178] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1160.579675][ T5197] tc_dump_action: action bad kind [ 1161.176572][ T5199] netlink: 20 bytes leftover after parsing attributes in process `syz.0.640'. [ 1164.336094][ T5211] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1164.340175][ T5211] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1173.677779][ T29] audit: type=1400 audit(1173.070:487): avc: denied { setopt } for pid=5271 comm="syz.0.669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1176.226402][ T5284] sock: sock_timestamping_bind_phc: sock not bind to device [ 1182.954336][ T29] audit: type=1400 audit(1182.350:488): avc: denied { create } for pid=5310 comm="syz.1.687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1185.036056][ T5329] netlink: 8 bytes leftover after parsing attributes in process `syz.1.693'. [ 1185.092753][ T5329] vlan2: entered promiscuous mode [ 1185.093355][ T5329] xfrm0: entered promiscuous mode [ 1185.096061][ T5329] vlan2: entered allmulticast mode [ 1185.096500][ T5329] xfrm0: entered allmulticast mode [ 1185.443189][ T5333] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1185.445165][ T5333] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1186.845859][ T29] audit: type=1400 audit(1186.230:489): avc: denied { unmount } for pid=3282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1187.292959][ T29] audit: type=1400 audit(1186.680:490): avc: denied { execute } for pid=5343 comm="syz-executor" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1187.298578][ T29] audit: type=1400 audit(1186.690:491): avc: denied { execute_no_trans } for pid=5343 comm="syz-executor" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1187.768126][ T29] audit: type=1400 audit(1187.160:492): avc: denied { mounton } for pid=5344 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1187.817734][ T1126] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1188.330499][ T1126] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1189.015114][ T1126] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1189.377615][ T1126] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1191.586211][ T29] audit: type=1400 audit(1190.970:493): avc: denied { read } for pid=3132 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1192.339572][ T1126] xfrm0: left allmulticast mode [ 1192.365893][ T1126] xfrm0: left promiscuous mode [ 1196.349104][ T1126] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1196.555367][ T1126] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1196.725850][ T1126] bond0 (unregistering): Released all slaves [ 1198.094172][ T1126] bond1 (unregistering): Released all slaves [ 1199.238353][ T1126] bond2 (unregistering): Released all slaves [ 1200.525933][ T1126] bond3 (unregistering): Released all slaves [ 1201.951418][ T1126] bond4 (unregistering): Released all slaves [ 1203.985041][ T1126] bond5 (unregistering): Released all slaves [ 1205.290636][ T1126] bond6 (unregistering): Released all slaves [ 1206.600066][ T1126] bond7 (unregistering): Released all slaves [ 1207.906117][ T1126] bond8 (unregistering): Released all slaves [ 1209.170865][ T1126] hsr_slave_0: left promiscuous mode [ 1209.256774][ T1126] hsr_slave_1: left promiscuous mode [ 1209.519654][ T1126] veth1_macvtap: left promiscuous mode [ 1209.525000][ T1126] veth0_macvtap: left promiscuous mode [ 1209.527575][ T1126] veth1_vlan: left promiscuous mode [ 1209.530093][ T1126] veth0_vlan: left promiscuous mode [ 1211.558428][ T29] audit: type=1400 audit(1210.950:494): avc: denied { read } for pid=5396 comm="syz.0.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1224.706105][ T5344] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1224.736189][ T5344] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1226.015884][ T29] audit: type=1400 audit(1225.410:495): avc: denied { bind } for pid=5457 comm="syz.0.732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1227.006964][ T29] audit: type=1400 audit(1226.400:496): avc: denied { sys_chroot } for pid=5468 comm="dhcpcd" capability=18 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 1227.019827][ T29] audit: type=1400 audit(1226.400:497): avc: denied { setgid } for pid=5468 comm="dhcpcd" capability=6 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 1227.020787][ T29] audit: type=1400 audit(1226.410:498): avc: denied { setuid } for pid=5468 comm="dhcpcd" capability=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 1227.024039][ T29] audit: type=1400 audit(1226.420:499): avc: denied { setrlimit } for pid=5468 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=process permissive=1 [ 1228.796109][ T5344] hsr_slave_0: entered promiscuous mode [ 1228.836587][ T5344] hsr_slave_1: entered promiscuous mode [ 1228.875335][ T5344] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1228.875989][ T5344] Cannot create hsr debugfs directory [ 1229.545005][ T5487] [ 1229.545619][ T5487] ====================================================== [ 1229.546077][ T5487] WARNING: possible circular locking dependency detected [ 1229.547259][ T5487] 6.13.0-rc7-syzkaller-00043-g619f0b6fad52 #0 Not tainted [ 1229.547988][ T5487] ------------------------------------------------------ [ 1229.548273][ T5487] syz.0.737/5487 is trying to acquire lock: [ 1229.548601][ T5487] ffff000016ac7698 (sk_lock-AF_INET){+.+.}-{0:0}, at: sockopt_lock_sock+0x58/0x74 [ 1229.553600][ T5487] [ 1229.553600][ T5487] but task is already holding lock: [ 1229.554082][ T5487] ffff8000883441e8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1229.554920][ T5487] [ 1229.554920][ T5487] which lock already depends on the new lock. [ 1229.554920][ T5487] [ 1229.555532][ T5487] [ 1229.555532][ T5487] the existing dependency chain (in reverse order) is: [ 1229.556143][ T5487] [ 1229.556143][ T5487] -> #2 (rtnl_mutex){+.+.}-{4:4}: [ 1229.557175][ T5487] __mutex_lock+0x144/0x8ac [ 1229.557628][ T5487] mutex_lock_nested+0x24/0x30 [ 1229.558025][ T5487] rtnl_lock+0x1c/0x28 [ 1229.558418][ T5487] do_ip_setsockopt+0xd8/0x2354 [ 1229.558811][ T5487] ip_setsockopt+0x34/0x9c [ 1229.559179][ T5487] tcp_setsockopt+0x90/0xcc [ 1229.559572][ T5487] sock_common_setsockopt+0x70/0xe0 [ 1229.560004][ T5487] smc_setsockopt+0x150/0xcd4 [ 1229.560434][ T5487] do_sock_setsockopt+0x17c/0x354 [ 1229.560845][ T5487] __sys_setsockopt+0xcc/0x144 [ 1229.561278][ T5487] __arm64_sys_setsockopt+0xa4/0x100 [ 1229.561894][ T5487] invoke_syscall+0x6c/0x258 [ 1229.562341][ T5487] el0_svc_common.constprop.0+0xac/0x230 [ 1229.562782][ T5487] do_el0_svc+0x40/0x58 [ 1229.563197][ T5487] el0_svc+0x50/0x180 [ 1229.563702][ T5487] el0t_64_sync_handler+0x10c/0x138 [ 1229.564145][ T5487] el0t_64_sync+0x198/0x19c [ 1229.564709][ T5487] [ 1229.564709][ T5487] -> #1 (&smc->clcsock_release_lock){+.+.}-{4:4}: [ 1229.565513][ T5487] __mutex_lock+0x144/0x8ac [ 1229.565924][ T5487] mutex_lock_nested+0x24/0x30 [ 1229.566349][ T5487] smc_switch_to_fallback+0x34/0x804 [ 1229.566793][ T5487] smc_sendmsg+0xe4/0x8f8 [ 1229.567196][ T5487] __sock_sendmsg+0xc8/0x168 [ 1229.567674][ T5487] __sys_sendto+0x1d8/0x26c [ 1229.568074][ T5487] __arm64_sys_sendto+0xc0/0x134 [ 1229.568476][ T5487] invoke_syscall+0x6c/0x258 [ 1229.569437][ T5487] el0_svc_common.constprop.0+0xac/0x230 [ 1229.569969][ T5487] do_el0_svc+0x40/0x58 [ 1229.570382][ T5487] el0_svc+0x50/0x180 [ 1229.570785][ T5487] el0t_64_sync_handler+0x10c/0x138 [ 1229.571300][ T5487] el0t_64_sync+0x198/0x19c [ 1229.572020][ T5487] [ 1229.572020][ T5487] -> #0 (sk_lock-AF_INET){+.+.}-{0:0}: [ 1229.572997][ T5487] __lock_acquire+0x2b80/0x6604 [ 1229.573490][ T5487] lock_acquire+0x450/0x76c [ 1229.573868][ T5487] lock_sock_nested+0x38/0xe8 [ 1229.574323][ T5487] sockopt_lock_sock+0x58/0x74 [ 1229.574865][ T5487] do_ip_setsockopt+0xe0/0x2354 [ 1229.575323][ T5487] ip_setsockopt+0x34/0x9c [ 1229.575742][ T5487] udp_setsockopt+0x20/0x44 [ 1229.576151][ T5487] sock_common_setsockopt+0x70/0xe0 [ 1229.576597][ T5487] do_sock_setsockopt+0x17c/0x354 [ 1229.576989][ T5487] __sys_setsockopt+0xcc/0x144 [ 1229.577391][ T5487] __arm64_sys_setsockopt+0xa4/0x100 [ 1229.577823][ T5487] invoke_syscall+0x6c/0x258 [ 1229.578211][ T5487] el0_svc_common.constprop.0+0xac/0x230 [ 1229.578658][ T5487] do_el0_svc+0x40/0x58 [ 1229.579032][ T5487] el0_svc+0x50/0x180 [ 1229.579457][ T5487] el0t_64_sync_handler+0x10c/0x138 [ 1229.579886][ T5487] el0t_64_sync+0x198/0x19c [ 1229.580339][ T5487] [ 1229.580339][ T5487] other info that might help us debug this: [ 1229.580339][ T5487] [ 1229.581165][ T5487] Chain exists of: [ 1229.581165][ T5487] sk_lock-AF_INET --> &smc->clcsock_release_lock --> rtnl_mutex [ 1229.581165][ T5487] [ 1229.582751][ T5487] Possible unsafe locking scenario: [ 1229.582751][ T5487] [ 1229.583218][ T5487] CPU0 CPU1 [ 1229.583658][ T5487] ---- ---- [ 1229.584070][ T5487] lock(rtnl_mutex); [ 1229.584591][ T5487] lock(&smc->clcsock_release_lock); [ 1229.585237][ T5487] lock(rtnl_mutex); [ 1229.585885][ T5487] lock(sk_lock-AF_INET); [ 1229.586430][ T5487] [ 1229.586430][ T5487] *** DEADLOCK *** [ 1229.586430][ T5487] [ 1229.587060][ T5487] 1 lock held by syz.0.737/5487: [ 1229.587498][ T5487] #0: ffff8000883441e8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1229.588461][ T5487] [ 1229.588461][ T5487] stack backtrace: [ 1229.589371][ T5487] CPU: 1 UID: 0 PID: 5487 Comm: syz.0.737 Not tainted 6.13.0-rc7-syzkaller-00043-g619f0b6fad52 #0 [ 1229.590054][ T5487] Hardware name: linux,dummy-virt (DT) [ 1229.590989][ T5487] Call trace: [ 1229.591669][ T5487] show_stack+0x18/0x24 (C) [ 1229.592358][ T5487] dump_stack_lvl+0xa4/0xf4 [ 1229.592789][ T5487] dump_stack+0x1c/0x28 [ 1229.593249][ T5487] print_circular_bug+0x428/0x704 [ 1229.593676][ T5487] check_noncircular+0x2dc/0x364 [ 1229.594186][ T5487] __lock_acquire+0x2b80/0x6604 [ 1229.594594][ T5487] lock_acquire+0x450/0x76c [ 1229.594995][ T5487] lock_sock_nested+0x38/0xe8 [ 1229.595434][ T5487] sockopt_lock_sock+0x58/0x74 [ 1229.595835][ T5487] do_ip_setsockopt+0xe0/0x2354 [ 1229.596266][ T5487] ip_setsockopt+0x34/0x9c [ 1229.596662][ T5487] udp_setsockopt+0x20/0x44 [ 1229.597060][ T5487] sock_common_setsockopt+0x70/0xe0 [ 1229.597512][ T5487] do_sock_setsockopt+0x17c/0x354 [ 1229.597910][ T5487] __sys_setsockopt+0xcc/0x144 [ 1229.598331][ T5487] __arm64_sys_setsockopt+0xa4/0x100 [ 1229.598809][ T5487] invoke_syscall+0x6c/0x258 [ 1229.599188][ T5487] el0_svc_common.constprop.0+0xac/0x230 [ 1229.599646][ T5487] do_el0_svc+0x40/0x58 [ 1229.600025][ T5487] el0_svc+0x50/0x180 [ 1229.600413][ T5487] el0t_64_sync_handler+0x10c/0x138 [ 1229.600830][ T5487] el0t_64_sync+0x198/0x19c SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1229.617197][ T29] audit: type=1400 audit(1228.990:500): avc: denied { write } for pid=3276 comm="syz-executor" path="pipe:[3247]" dev="pipefs" ino=3247 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 1230.900180][ T1126] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1230.975639][ T1126] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1231.016278][ T1126] bond0 (unregistering): Released all slaves [ 1231.112361][ T1126] hsr_slave_0: left promiscuous mode [ 1231.145687][ T1126] hsr_slave_1: left promiscuous mode VM DIAGNOSIS: 13:13:28 Registers: info registers vcpu 0 CPU#0 PC=ffff8000852f7d1c X00=ffff8000800074d8 X01=ffff80008fa67fd8 X02=0000000000000000 X03=ffff800080010764 X04=0000000048bd567c X05=0000000000000103 X06=ffff00000f389e40 X07=0000000075f5717b X08=0000000000000068 X09=ffff000012b1f960 X10=ffff700010000e86 X11=1ffff00010000e86 X12=dfff800000000000 X13=000000000000f1f1 X14=0000000000000001 X15=1850466fc173b6f9 X16=2cc5000067ebffff X17=f869638412a871b7 X18=ffff00001e828dc0 X19=ffff800086d49290 X20=ffff800086d90710 X21=ffff800084349878 X22=ffff000069f6e290 X23=ffff700010000f3d X24=ffff000016664443 X25=0000000000000001 X26=ffff8000800079f8 X27=1ffff00010000f22 X28=ffff8000800079e0 X29=ffff800080007790 X30=ffff80008261b3a8 SP=ffff800080007790 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=000a09202c002a3a:6c6175543a735171 Q01=f0000000000f0000:0000000000000000 Q02=f00ff00ff00ff00f:f00ff00ff00ff00f Q03=f0000f0000000000:f0000f0000000000 Q04=f00ff00ff00ff00f:f00ff00ff00ff00f Q05=0000f000000f00f0:0000f000000f00f0 Q06=cc00000c00000030:cc00000c00000030 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000852fa934 X00=ffff8000852fa930 X01=0000000000000000 X02=0000000000000000 X03=1fffe00002576b59 X04=ffff80008f726fd0 X05=ffff700011ee4dc6 X06=ffff000012bb5ac0 X07=00000000f2f2f2f2 X08=00000000f3f3f300 X09=00000000f2000000 X10=00000000f204f204 X11=1ffff00010dc5a78 X12=ffff700010dc5a79 X13=0000000000000004 X14=0000000000000001 X15=fffffffffffe8088 X16=0000000000000000 X17=0000000000000000 X18=00000000be92a66a X19=ffff800086fcca30 X20=ffff000012bb5ac0 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff800086fcca00 X25=0000000000000000 X26=0000000000000004 X27=ffff800086fcca30 X28=0000000000000080 X29=ffff80008f726d10 X30=ffff800080423624 SP=ffff80008f726d10 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffcf174040:4c8cd6531ed4bd00 Q02=0000ffffcf174020:ffffff80ffffffd8 Q03=0000ffffcf1740d0:0000ffffcf1740d0 Q04=0000ffffcf1740d0:0000ffffbcd2ec88 Q05=0000ffffcf1740a0:0000ffffcf1740d0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffcf1742f0:0000ffffcf1742f0 Q17=ffffff80ffffffd0:0000ffffcf1742c0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000