last executing test programs: 2m10.512054292s ago: executing program 0 (id=3165): r0 = openat$sysfs(0xffffff9c, &(0x7f00000000c0)='/sys/module/snps_udc_core', 0x0, 0x0) fcntl$getflags(r0, 0x0) 2m3.123997156s ago: executing program 0 (id=3167): r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, 0x0) 1m56.801811809s ago: executing program 0 (id=3168): r0 = open(&(0x7f0000004440)='./file0\x00', 0x40842, 0x0) write$FUSE_BMAP(r0, 0x0, 0x0) 1m49.150196569s ago: executing program 0 (id=3170): r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f00000000c0)) 1m40.89338066s ago: executing program 0 (id=3172): r0 = syz_open_dev$ndb(&(0x7f0000000080), 0x0, 0x101001) ioctl$BLKFRAGET(r0, 0x1265, &(0x7f0000000180)) 1m33.75222142s ago: executing program 0 (id=3174): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x38, 0x1403, 0x1, 0x70bd2c, 0x25dfdbfa, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) 48.432201264s ago: executing program 32 (id=3174): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x38, 0x1403, 0x1, 0x70bd2c, 0x25dfdbfa, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) 41.754267765s ago: executing program 1 (id=3181): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x3a0) 37.781720992s ago: executing program 1 (id=3182): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETSF(r0, 0x540e, 0x0) 27.423697554s ago: executing program 1 (id=3183): pipe2(&(0x7f0000002580)={0xffffffffffffffff}, 0x90880) read$proc_mixer(r0, 0x0, 0x0) 17.38347294s ago: executing program 1 (id=3184): r0 = openat2(0xffffffffffffff9c, &(0x7f0000003500)='./file0\x00', &(0x7f0000000000)={0x149842}, 0x18) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x5450, 0x0) 8.461806095s ago: executing program 1 (id=3185): socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8901, &(0x7f0000000080)) 0s ago: executing program 1 (id=3186): r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x0, 0x0) ioctl$KDDELIO(r0, 0x5450, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:8661' (ED25519) to the list of known hosts. [ 256.676391][ T29] audit: type=1400 audit(256.100:84): avc: denied { name_bind } for pid=3336 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 257.242892][ T29] audit: type=1400 audit(256.660:85): avc: denied { execute } for pid=3337 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 257.248580][ T29] audit: type=1400 audit(256.670:86): avc: denied { execute_no_trans } for pid=3337 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 267.038021][ T29] audit: type=1400 audit(266.460:87): avc: denied { mounton } for pid=3337 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 267.097014][ T29] audit: type=1400 audit(266.520:88): avc: denied { mount } for pid=3337 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 267.175237][ T3337] cgroup: Unknown subsys name 'net' [ 267.242137][ T29] audit: type=1400 audit(266.660:89): avc: denied { unmount } for pid=3337 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 267.643141][ T3337] cgroup: Unknown subsys name 'cpuset' [ 267.707916][ T3337] cgroup: Unknown subsys name 'rlimit' [ 268.128357][ T29] audit: type=1400 audit(267.550:90): avc: denied { setattr } for pid=3337 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 268.137841][ T29] audit: type=1400 audit(267.560:91): avc: denied { mounton } for pid=3337 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 268.148171][ T29] audit: type=1400 audit(267.570:92): avc: denied { mount } for pid=3337 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 268.916600][ T3340] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 268.924517][ T29] audit: type=1400 audit(268.350:93): avc: denied { relabelto } for pid=3340 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 268.936221][ T29] audit: type=1400 audit(268.360:94): avc: denied { write } for pid=3340 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 269.064216][ T29] audit: type=1400 audit(268.490:95): avc: denied { read } for pid=3337 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 269.071350][ T29] audit: type=1400 audit(268.490:96): avc: denied { open } for pid=3337 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 269.124001][ T3337] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 290.117094][ T29] audit: type=1400 audit(289.540:97): avc: denied { execmem } for pid=3341 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 290.245425][ T29] audit: type=1400 audit(289.670:98): avc: denied { read } for pid=3343 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 290.253247][ T29] audit: type=1400 audit(289.680:99): avc: denied { open } for pid=3343 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 290.276409][ T29] audit: type=1400 audit(289.700:100): avc: denied { mounton } for pid=3343 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 290.363489][ T29] audit: type=1400 audit(289.790:101): avc: denied { module_request } for pid=3343 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 290.703097][ T29] audit: type=1400 audit(290.110:102): avc: denied { sys_module } for pid=3343 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 300.133987][ T3343] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 300.294774][ T3343] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 300.331785][ T3344] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 300.506201][ T3344] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.422617][ T3343] hsr_slave_0: entered promiscuous mode [ 304.441188][ T3343] hsr_slave_1: entered promiscuous mode [ 305.114463][ T3344] hsr_slave_0: entered promiscuous mode [ 305.123821][ T3344] hsr_slave_1: entered promiscuous mode [ 305.132472][ T3344] debugfs: 'hsr0' already exists in 'hsr' [ 305.134216][ T3344] Cannot create hsr debugfs directory [ 307.884307][ T29] audit: type=1400 audit(307.310:103): avc: denied { create } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 307.904119][ T29] audit: type=1400 audit(307.310:104): avc: denied { write } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 307.927582][ T29] audit: type=1400 audit(307.350:105): avc: denied { read } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 307.992776][ T3343] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 308.116878][ T3343] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 308.147487][ T3343] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 308.185245][ T3343] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 308.197717][ T3343] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 308.259080][ T3343] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 308.283073][ T3343] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 308.338819][ T3343] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 309.113559][ T3344] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 309.156261][ T3344] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 309.174718][ T3344] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 309.212201][ T3344] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 309.225214][ T3344] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 309.267207][ T3344] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 309.290497][ T3344] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 309.321832][ T3344] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 311.882700][ T3343] 8021q: adding VLAN 0 to HW filter on device bond0 [ 313.136223][ T3344] 8021q: adding VLAN 0 to HW filter on device bond0 [ 327.163865][ T3343] veth0_vlan: entered promiscuous mode [ 327.290194][ T3343] veth1_vlan: entered promiscuous mode [ 327.687443][ T3343] veth0_macvtap: entered promiscuous mode [ 327.806083][ T3343] veth1_macvtap: entered promiscuous mode [ 328.511822][ T1907] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 328.516084][ T1907] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 328.516522][ T1907] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 328.516870][ T1907] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.142469][ T29] audit: type=1400 audit(328.560:106): avc: denied { mounton } for pid=3343 comm="syz-executor" path="/syzkaller.dWYCYw/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 329.166624][ T29] audit: type=1400 audit(328.590:107): avc: denied { mount } for pid=3343 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 329.212435][ T29] audit: type=1400 audit(328.630:108): avc: denied { mounton } for pid=3343 comm="syz-executor" path="/syzkaller.dWYCYw/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 329.294007][ T29] audit: type=1400 audit(328.720:109): avc: denied { mount } for pid=3343 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 329.369802][ T3344] veth0_vlan: entered promiscuous mode [ 329.446611][ T29] audit: type=1400 audit(328.860:110): avc: denied { mounton } for pid=3343 comm="syz-executor" path="/syzkaller.dWYCYw/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 329.511499][ T29] audit: type=1400 audit(328.930:111): avc: denied { mounton } for pid=3343 comm="syz-executor" path="/syzkaller.dWYCYw/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 329.581436][ T29] audit: type=1400 audit(329.000:112): avc: denied { unmount } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 329.626659][ T29] audit: type=1400 audit(329.050:113): avc: denied { mounton } for pid=3343 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 329.656092][ T29] audit: type=1400 audit(329.080:114): avc: denied { mount } for pid=3343 comm="syz-executor" name="/" dev="gadgetfs" ino=3716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 329.716272][ T29] audit: type=1400 audit(329.140:115): avc: denied { mount } for pid=3343 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 329.806039][ T3344] veth1_vlan: entered promiscuous mode [ 330.249903][ T3344] veth0_macvtap: entered promiscuous mode [ 330.266029][ T3343] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 330.379938][ T3344] veth1_macvtap: entered promiscuous mode [ 331.385128][ T813] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.386229][ T813] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.388305][ T813] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.439146][ T813] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.220875][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 358.227193][ T29] audit: type=1400 audit(357.640:121): avc: denied { remount } for pid=3596 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 365.136322][ T29] audit: type=1400 audit(364.560:122): avc: denied { prog_load } for pid=3627 comm="syz.0.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 365.191084][ T29] audit: type=1400 audit(364.580:123): avc: denied { bpf } for pid=3627 comm="syz.0.68" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 374.425277][ T29] audit: type=1400 audit(373.850:124): avc: denied { create } for pid=3661 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 386.511901][ T29] audit: type=1400 audit(385.930:125): avc: denied { read write } for pid=3700 comm="syz.0.103" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 386.512929][ T29] audit: type=1400 audit(385.930:126): avc: denied { open } for pid=3700 comm="syz.0.103" path="/dev/raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 386.540946][ T29] audit: type=1400 audit(385.950:127): avc: denied { ioctl } for pid=3700 comm="syz.0.103" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 392.556340][ T3722] ======================================================= [ 392.556340][ T3722] WARNING: The mand mount option has been deprecated and [ 392.556340][ T3722] and is ignored by this kernel. Remove the mand [ 392.556340][ T3722] option from the mount to silence this warning. [ 392.556340][ T3722] ======================================================= [ 394.260777][ T29] audit: type=1400 audit(393.680:128): avc: denied { create } for pid=3726 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 398.880002][ T29] audit: type=1400 audit(398.300:129): avc: denied { mount } for pid=3739 comm="syz.1.122" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 399.191983][ T29] audit: type=1400 audit(398.610:130): avc: denied { unmount } for pid=3344 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 400.236136][ T29] audit: type=1400 audit(399.660:131): avc: denied { perfmon } for pid=3748 comm="syz.1.125" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 404.320206][ T29] audit: type=1400 audit(403.730:132): avc: denied { read } for pid=3764 comm="syz.0.135" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 404.321097][ T29] audit: type=1400 audit(403.730:133): avc: denied { open } for pid=3764 comm="syz.0.135" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 436.444509][ T29] audit: type=1400 audit(435.870:134): avc: denied { create } for pid=3864 comm="syz.0.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 447.396117][ T29] audit: type=1400 audit(446.820:135): avc: denied { setcurrent } for pid=3900 comm="syz.0.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 458.466100][ T29] audit: type=1400 audit(457.890:136): avc: denied { write } for pid=3934 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 461.082751][ T29] audit: type=1400 audit(460.500:137): avc: denied { write } for pid=3946 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 469.973343][ T29] audit: type=1400 audit(469.380:138): avc: denied { read write } for pid=3344 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 469.974462][ T29] audit: type=1400 audit(469.390:139): avc: denied { open } for pid=3344 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 469.975284][ T29] audit: type=1400 audit(469.390:140): avc: denied { ioctl } for pid=3344 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 483.474431][ T29] audit: type=1400 audit(482.900:141): avc: denied { read } for pid=4003 comm="syz.1.248" name="renderD128" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 483.492655][ T29] audit: type=1400 audit(482.910:142): avc: denied { open } for pid=4003 comm="syz.1.248" path="/dev/dri/renderD128" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 489.490444][ T29] audit: type=1400 audit(488.910:143): avc: denied { write } for pid=4018 comm="syz.0.256" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 529.115824][ T29] audit: type=1400 audit(528.540:144): avc: denied { map_create } for pid=4107 comm="syz.1.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 560.296207][ T29] audit: type=1400 audit(559.720:145): avc: denied { kexec_image_load } for pid=4180 comm="syz.1.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 602.335216][ T29] audit: type=1400 audit(601.760:146): avc: denied { read write } for pid=4256 comm="syz.1.372" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 602.395906][ T29] audit: type=1400 audit(601.820:147): avc: denied { open } for pid=4256 comm="syz.1.372" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 607.406816][ T29] audit: type=1400 audit(606.830:148): avc: denied { mounton } for pid=4264 comm="syz.1.376" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 612.595260][ T29] audit: type=1800 audit(612.020:149): pid=4278 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=set_data cause=unavailable-hash-algorithm comm="syz.1.381" name="/newroot/163" dev="tmpfs" ino=836 res=0 errno=0 [ 617.777602][ T4290] SELinux: Context system_u:object_r:hald_mac_exec_t:s0 is not valid (left unmapped). [ 617.833840][ T29] audit: type=1400 audit(617.260:150): avc: denied { relabelto } for pid=4288 comm="syz.1.386" name="cgroup.procs" dev="cgroup" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:hald_mac_exec_t:s0" [ 617.865448][ T29] audit: type=1400 audit(617.290:151): avc: denied { associate } for pid=4288 comm="syz.1.386" name="cgroup.procs" dev="cgroup" ino=89 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hald_mac_exec_t:s0" [ 626.806432][ T29] audit: type=1400 audit(626.230:152): avc: denied { audit_write } for pid=4310 comm="syz.1.396" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 633.334797][ T29] audit: type=1400 audit(632.760:153): avc: denied { create } for pid=4322 comm="syz.1.402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 637.120867][ T29] audit: type=1400 audit(636.520:154): avc: denied { write } for pid=4329 comm="syz.0.405" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 650.650948][ T4355] syz.1.416 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 652.457120][ T29] audit: type=1400 audit(651.880:155): avc: denied { create } for pid=4359 comm="syz.1.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 657.955085][ T29] audit: type=1400 audit(657.300:156): avc: denied { create } for pid=4366 comm="syz.1.423" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 658.530463][ T29] audit: type=1400 audit(657.950:157): avc: denied { unlink } for pid=3344 comm="syz-executor" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=942 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 679.290215][ T29] audit: type=1326 audit(678.700:158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4409 comm="syz.0.444" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x1283d8 code=0x0 [ 706.539865][ T29] audit: type=1400 audit(705.960:159): avc: denied { write } for pid=4458 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 706.540393][ T29] audit: type=1400 audit(705.960:160): avc: denied { create } for pid=4458 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 706.556011][ T29] audit: type=1400 audit(705.980:161): avc: denied { write open } for pid=4458 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=2403 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 706.602018][ T29] audit: type=1400 audit(706.010:162): avc: denied { append } for pid=4458 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2403 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 706.667096][ T29] audit: type=1400 audit(706.090:163): avc: denied { getattr } for pid=4458 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 707.591352][ T29] audit: type=1400 audit(707.020:164): avc: denied { read } for pid=4463 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 708.171394][ T29] audit: type=1400 audit(707.580:165): avc: denied { write } for pid=4465 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 708.183800][ T29] audit: type=1400 audit(707.600:166): avc: denied { unlink } for pid=4465 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2403 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 726.832364][ T29] audit: type=1400 audit(726.250:167): avc: denied { mount } for pid=4497 comm="syz.0.483" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 727.146382][ T29] audit: type=1400 audit(726.570:168): avc: denied { unmount } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 828.256501][ T29] audit: type=1400 audit(827.680:169): avc: denied { unmount } for pid=3344 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 844.972310][ T4666] mmap: syz.0.564 (4666) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 850.377986][ T29] audit: type=1400 audit(849.800:170): avc: denied { create } for pid=4672 comm="syz.0.568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 937.036809][ T29] audit: type=1400 audit(936.460:171): avc: denied { open } for pid=4782 comm="syz.0.622" path="/dev/ptyq4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 944.392773][ T29] audit: type=1400 audit(943.820:172): avc: denied { read write } for pid=4788 comm="syz.1.625" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 944.397676][ T29] audit: type=1400 audit(943.820:173): avc: denied { open } for pid=4788 comm="syz.1.625" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 952.933909][ T29] audit: type=1400 audit(952.360:174): avc: denied { create } for pid=4802 comm="syz.1.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 972.502608][ T29] audit: type=1400 audit(971.930:175): avc: denied { append } for pid=4830 comm="syz.1.646" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 972.525177][ T29] audit: type=1400 audit(971.950:176): avc: denied { open } for pid=4830 comm="syz.1.646" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 972.535184][ T4832] random: crng reseeded on system resumption [ 972.796167][ T29] audit: type=1400 audit(972.220:177): avc: denied { create } for pid=4831 comm="syz.0.647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 1004.478016][ T29] audit: type=1400 audit(1003.900:178): avc: denied { append } for pid=4873 comm="syz.0.667" name="renderD128" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1013.202552][ T29] audit: type=1400 audit(1012.630:179): avc: denied { create } for pid=4884 comm="syz.0.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1044.183496][ T29] audit: type=1326 audit(1043.610:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4922 comm="syz.0.691" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1283d8 code=0x7ffc0000 [ 1044.320306][ T29] audit: type=1326 audit(1043.740:181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4922 comm="syz.0.691" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x1307a0 code=0x7ffc0000 [ 1062.222549][ T10] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 1062.552139][ T10] usb 1-1: Using ep0 maxpacket: 32 [ 1063.200704][ T10] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1063.697965][ T10] usb 1-1: New USB device found, idVendor=0499, idProduct=1054, bcdDevice= 0.40 [ 1063.698569][ T10] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1063.703178][ T10] usb 1-1: Product: syz [ 1063.703657][ T10] usb 1-1: Manufacturer: syz [ 1063.703886][ T10] usb 1-1: SerialNumber: syz [ 1065.013057][ T10] usb 1-1: parse_audio_format_rates_v2v3(): unable to find clock source (clock -22) [ 1065.055462][ T10] usb 1-1: unit 37 not found! [ 1065.055983][ T10] usb 1-1: unit 0 not found! [ 1065.915587][ T10] usb 1-1: USB disconnect, device number 2 [ 1070.468206][ T4952] udevd[4952]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 1076.393913][ T29] audit: type=1400 audit(1075.690:182): avc: denied { mounton } for pid=4959 comm="syz.1.706" path="/syzcgroup/unified/syz1" dev="cgroup2" ino=63 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 1080.191048][ T29] audit: type=1400 audit(1079.610:183): avc: denied { read write } for pid=4963 comm="syz.0.707" name="vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1080.253915][ T29] audit: type=1400 audit(1079.680:184): avc: denied { open } for pid=4963 comm="syz.0.707" path="/dev/vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1090.016518][ T29] audit: type=1400 audit(1089.420:185): avc: denied { write } for pid=4975 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1090.683339][ T4980] random: crng reseeded on system resumption [ 1092.427758][ T29] audit: type=1400 audit(1091.850:186): avc: denied { write } for pid=4981 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1095.784224][ T29] audit: type=1400 audit(1095.210:187): avc: denied { write } for pid=4984 comm="syz.0.715" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1103.666564][ T29] audit: type=1400 audit(1103.090:188): avc: denied { write } for pid=4993 comm="syz.1.719" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1103.833542][ T29] audit: type=1400 audit(1103.260:189): avc: denied { open } for pid=4993 comm="syz.1.719" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1103.842270][ T4994] random: crng reseeded on system resumption [ 1291.662297][ T29] audit: type=1400 audit(1291.080:190): avc: denied { write } for pid=5177 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1293.493047][ T29] audit: type=1400 audit(1292.910:191): avc: denied { write } for pid=5184 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1322.296261][ T29] audit: type=1400 audit(1321.720:192): avc: denied { write } for pid=5215 comm="syz.1.817" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1350.305138][ T29] audit: type=1400 audit(1349.680:193): avc: denied { allowed } for pid=5244 comm="syz.0.832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1350.708886][ T29] audit: type=1400 audit(1350.130:194): avc: denied { create } for pid=5244 comm="syz.0.832" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1351.091845][ T29] audit: type=1400 audit(1350.370:195): avc: denied { map } for pid=5244 comm="syz.0.832" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9452 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1351.092790][ T29] audit: type=1400 audit(1350.510:196): avc: denied { read write } for pid=5244 comm="syz.0.832" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9452 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1520.500750][ T29] audit: type=1400 audit(1519.920:197): avc: denied { create } for pid=5391 comm="syz.0.890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 1614.581241][ T29] audit: type=1400 audit(1613.990:198): avc: denied { write } for pid=5468 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1616.642951][ T29] audit: type=1400 audit(1616.060:199): avc: denied { write } for pid=5473 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1789.136815][ T29] audit: type=1400 audit(1788.560:200): avc: denied { read } for pid=5620 comm="syz.0.979" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1789.235713][ T29] audit: type=1400 audit(1788.660:201): avc: denied { open } for pid=5620 comm="syz.0.979" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1852.775638][ T29] audit: type=1400 audit(1852.200:202): avc: denied { ioctl } for pid=5666 comm="syz.1.998" path="socket:[10038]" dev="sockfs" ino=10038 ioctlcmd=0x891a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1900.594662][ T29] audit: type=1400 audit(1900.020:203): avc: denied { wake_alarm } for pid=5703 comm="syz.1.1011" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1976.952049][ T29] audit: type=1400 audit(1976.370:204): avc: denied { write } for pid=5762 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1978.891530][ T29] audit: type=1400 audit(1978.290:205): avc: denied { write } for pid=5766 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1996.975614][ T29] audit: type=1400 audit(1996.400:206): avc: denied { ioctl } for pid=5780 comm="syz.1.1039" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb70d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2015.273706][ T29] audit: type=1400 audit(2014.700:207): avc: denied { setopt } for pid=5792 comm="syz.1.1044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2219.162983][ T29] audit: type=1400 audit(2218.590:208): avc: denied { write } for pid=5946 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2221.077550][ T29] audit: type=1400 audit(2220.500:209): avc: denied { write } for pid=5950 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2289.955418][ T29] audit: type=1400 audit(2289.380:210): avc: denied { create } for pid=6001 comm="syz.0.1123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2290.140617][ T29] audit: type=1400 audit(2289.560:211): avc: denied { write } for pid=6001 comm="syz.0.1123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2325.290302][ T6026] Zero length message leads to an empty skb [ 2418.312285][ T6098] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6098 comm=syz.1.1158 [ 2463.695585][ T29] audit: type=1400 audit(2463.110:212): avc: denied { read write } for pid=6128 comm="syz.0.1171" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2464.024551][ T29] audit: type=1400 audit(2463.450:213): avc: denied { open } for pid=6128 comm="syz.0.1171" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2483.562245][ T6144] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6144 comm=syz.0.1177 [ 2539.222139][ T29] audit: type=1400 audit(2538.630:214): avc: denied { write } for pid=6183 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2541.251317][ T29] audit: type=1400 audit(2540.640:215): avc: denied { write } for pid=6187 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2604.045635][ T6233] netlink: 44 bytes leftover after parsing attributes in process `syz.1.1208'. [ 2611.833572][ T29] audit: type=1400 audit(2611.260:216): avc: denied { setopt } for pid=6237 comm="syz.1.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2762.103633][ T6342] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6342 comm=syz.1.1252 [ 2771.264521][ T6349] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1255'. [ 2778.154294][ T29] audit: type=1400 audit(2777.570:217): avc: denied { setattr } for pid=6351 comm="syz.1.1256" name="RAWv6" dev="sockfs" ino=12123 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2810.672854][ T29] audit: type=1400 audit(2810.030:218): avc: denied { write } for pid=6375 comm="syz.1.1265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2867.192047][ T29] audit: type=1400 audit(2866.610:219): avc: denied { write } for pid=6421 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2869.740113][ T29] audit: type=1400 audit(2869.160:220): avc: denied { write } for pid=6425 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3160.872089][ T6630] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2051 sclass=netlink_route_socket pid=6630 comm=syz.0.1360 [ 3199.974936][ T29] audit: type=1400 audit(3199.400:221): avc: denied { write } for pid=6654 comm="syz.1.1370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3354.214235][ T29] audit: type=1400 audit(3353.630:222): avc: denied { write } for pid=6768 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3354.413076][ T6770] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6770 comm=syz.0.1413 [ 3356.238736][ T29] audit: type=1400 audit(3355.660:223): avc: denied { write } for pid=6772 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3361.765812][ T6776] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6776 comm=syz.1.1414 [ 3550.262188][ T6908] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=13 sclass=netlink_route_socket pid=6908 comm=syz.1.1465 [ 3733.312153][ T7032] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7032 comm=syz.0.1514 [ 3759.246308][ T29] audit: type=1400 audit(3758.670:224): avc: denied { write } for pid=7052 comm="syz.0.1523" name="snmp" dev="proc" ino=4026532694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3759.283964][ T29] audit: type=1400 audit(3758.710:225): avc: denied { ioctl } for pid=7051 comm="syz.1.1522" path="/dev/dri/card1" dev="devtmpfs" ino=619 ioctlcmd=0x64b1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3783.341096][ T7073] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7073 comm=syz.0.1530 [ 3786.235763][ T7075] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7075 comm=syz.1.1531 [ 3831.021439][ T29] audit: type=1400 audit(3830.440:226): avc: denied { module_load } for pid=7104 comm="syz.1.1544" path="/sys/kernel/notes" dev="sysfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 3885.192151][ T29] audit: type=1400 audit(3884.590:227): avc: denied { write } for pid=7144 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3887.187874][ T29] audit: type=1400 audit(3886.610:228): avc: denied { write } for pid=7148 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3922.356189][ T29] audit: type=1400 audit(3921.780:229): avc: denied { nlmsg_read } for pid=7173 comm="syz.1.1568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 3937.472791][ T7185] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5138 sclass=netlink_route_socket pid=7185 comm=syz.0.1573 [ 3959.252346][ T7202] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=7202 comm=syz.1.1578 [ 4019.414081][ T29] audit: type=1400 audit(4018.840:230): avc: denied { nlmsg_write } for pid=7248 comm="syz.1.1596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 4114.701732][ T7318] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7318 comm=syz.0.1624 [ 4190.761655][ T7371] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7371 comm=syz.0.1644 [ 4336.354391][ T29] audit: type=1400 audit(4335.780:231): avc: denied { write } for pid=7473 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4338.100673][ T29] audit: type=1400 audit(4337.520:232): avc: denied { write } for pid=7478 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4572.771269][ T29] audit: type=1400 audit(4572.190:233): avc: denied { write } for pid=7647 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4574.811764][ T29] audit: type=1400 audit(4574.240:234): avc: denied { write } for pid=7651 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4577.894774][ T29] audit: type=1400 audit(4577.260:235): avc: denied { setopt } for pid=7653 comm="syz.0.1754" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4651.931586][ T7707] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7707 comm=syz.0.1774 [ 4756.086428][ T29] audit: type=1400 audit(4755.510:236): avc: denied { ioctl } for pid=7781 comm="syz.1.1803" path="socket:[16979]" dev="sockfs" ino=16979 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4792.868461][ T29] audit: type=1400 audit(4792.290:237): avc: denied { write } for pid=7807 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4794.782732][ T29] audit: type=1400 audit(4794.210:238): avc: denied { write } for pid=7812 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4919.087509][ T7907] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7907 comm=syz.1.1848 [ 5012.588280][ T7979] random: crng reseeded on system resumption [ 5013.187289][ T29] audit: type=1400 audit(5012.610:239): avc: denied { read } for pid=7977 comm="syz.1.1879" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 5036.244592][ T29] audit: type=1400 audit(5035.670:240): avc: denied { setattr } for pid=7994 comm="syz.0.1886" name="tun" dev="devtmpfs" ino=690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 5117.162788][ T8055] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2579 sclass=netlink_tcpdiag_socket pid=8055 comm=syz.0.1910 [ 5180.253371][ T8105] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8105 comm=syz.1.1929 [ 5185.943199][ T29] audit: type=1400 audit(5185.360:241): avc: denied { write } for pid=8108 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5187.975929][ T29] audit: type=1400 audit(5187.380:242): avc: denied { write } for pid=8114 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5238.042949][ T8155] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=8155 comm=syz.1.1946 [ 5244.905520][ T8161] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8161 comm=syz.0.1948 [ 5371.573681][ T29] audit: type=1400 audit(5371.000:243): avc: denied { ioctl } for pid=8252 comm="syz.0.1986" path="socket:[18716]" dev="sockfs" ino=18716 ioctlcmd=0x6f04 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5451.950328][ T29] audit: type=1400 audit(5451.370:244): avc: granted { setsecparam } for pid=8310 comm="syz.1.2010" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 5472.458008][ T29] audit: type=1400 audit(5471.880:245): avc: denied { ioctl } for pid=8326 comm="syz.0.2017" path="socket:[18193]" dev="sockfs" ino=18193 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5519.578667][ T29] audit: type=1400 audit(5518.970:246): avc: denied { write } for pid=8361 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5521.414353][ T29] audit: type=1400 audit(5520.840:247): avc: denied { write } for pid=8366 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5559.983505][ T29] audit: type=1400 audit(5559.410:248): avc: denied { execute } for pid=8400 comm="syz.0.2044" name="file0" dev="tmpfs" ino=5702 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 5617.514652][ T29] audit: type=1400 audit(5616.940:249): avc: denied { create } for pid=8444 comm="syz.0.2063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 5617.764317][ T29] audit: type=1400 audit(5617.190:250): avc: denied { getopt } for pid=8444 comm="syz.0.2063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 5630.693542][ T29] audit: type=1400 audit(5630.120:251): avc: denied { read } for pid=8453 comm="syz.1.2066" path="socket:[19055]" dev="sockfs" ino=19055 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5709.950249][ T29] audit: type=1400 audit(5709.370:252): avc: granted { setsecparam } for pid=8513 comm="syz.1.2091" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 5736.276880][ T29] audit: type=1400 audit(5735.700:253): avc: denied { map_read map_write } for pid=8534 comm="syz.0.2099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5774.622035][ T8565] syz.1.2111(8565): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 5839.432318][ T29] audit: type=1400 audit(5838.850:254): avc: denied { ioctl } for pid=8611 comm="syz.1.2130" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x700b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 5991.209985][ T29] audit: type=1400 audit(5990.630:255): avc: denied { write } for pid=8729 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5992.970434][ T29] audit: type=1400 audit(5992.390:256): avc: denied { write } for pid=8735 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6114.875260][ T29] audit: type=1400 audit(6114.160:257): avc: denied { create } for pid=8826 comm="syz.1.2213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6115.253239][ T29] audit: type=1400 audit(6114.680:258): avc: denied { write } for pid=8826 comm="syz.1.2213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6174.308111][ T29] audit: type=1400 audit(6173.730:259): avc: denied { read write } for pid=8869 comm="syz.0.2231" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 6174.524290][ T29] audit: type=1400 audit(6173.920:260): avc: denied { open } for pid=8869 comm="syz.0.2231" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 6174.935380][ T29] audit: type=1400 audit(6174.360:261): avc: denied { ioctl } for pid=8869 comm="syz.0.2231" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 6223.836704][ T8911] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8911 comm=syz.0.2245 [ 6269.880009][ T29] audit: type=1400 audit(6269.300:262): avc: denied { create } for pid=8944 comm="syz.0.2258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6270.252369][ T29] audit: type=1400 audit(6269.670:263): avc: denied { setopt } for pid=8944 comm="syz.0.2258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6460.170945][ T9095] syz.0.2316 (9095): drop_caches: 0 [ 6560.391696][ T9169] misc userio: The device must be registered before sending interrupts [ 6574.224533][ T29] audit: type=1400 audit(6573.650:264): avc: denied { write } for pid=9180 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6575.915267][ T29] audit: type=1400 audit(6575.340:265): avc: denied { write } for pid=9184 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6582.629985][ T29] audit: type=1400 audit(6582.040:266): avc: denied { bind } for pid=9187 comm="syz.1.2352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6671.514408][ T29] audit: type=1400 audit(6670.940:267): avc: denied { ioctl } for pid=9253 comm="syz.1.2378" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 6882.137805][ T29] audit: type=1400 audit(6881.560:268): avc: denied { read } for pid=9411 comm="syz.0.2442" name="uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 6882.138718][ T29] audit: type=1400 audit(6881.560:269): avc: denied { open } for pid=9411 comm="syz.0.2442" path="/dev/uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 6882.348502][ T29] audit: type=1400 audit(6881.770:270): avc: denied { ioctl } for pid=9411 comm="syz.0.2442" path="/dev/uinput" dev="devtmpfs" ino=708 ioctlcmd=0x55cb scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 6977.566169][ T29] audit: type=1400 audit(6976.990:271): avc: denied { append } for pid=9481 comm="syz.0.2470" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 6977.714836][ T9482] random: crng reseeded on system resumption [ 7054.915400][ T29] audit: type=1400 audit(7054.340:272): avc: denied { write } for pid=9542 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7057.177250][ T29] audit: type=1400 audit(7056.600:273): avc: denied { write } for pid=9545 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7262.201537][ T9695] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1017 sclass=netlink_route_socket pid=9695 comm=syz.0.2547 [ 7367.546472][ T9768] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9768 comm=syz.0.2577 [ 7407.672401][ T29] audit: type=1326 audit(7407.100:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9796 comm="syz.1.2588" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x1283d8 code=0x0 [ 7415.152389][ T9802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9802 comm=syz.0.2589 [ 7489.315953][ T29] audit: type=1400 audit(7488.740:275): avc: denied { ioctl } for pid=9856 comm="syz.1.2608" path="/dev/vhost-net" dev="devtmpfs" ino=715 ioctlcmd=0xaf25 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 7515.138482][ T29] audit: type=1400 audit(7514.560:276): avc: denied { write } for pid=9874 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7517.618927][ T29] audit: type=1400 audit(7517.040:277): avc: denied { write } for pid=9879 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7544.650533][ T29] audit: type=1400 audit(7544.070:278): avc: denied { read } for pid=9895 comm="syz.0.2621" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 7544.730865][ T29] audit: type=1400 audit(7544.150:279): avc: denied { open } for pid=9895 comm="syz.0.2621" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 7649.791521][ T29] audit: type=1400 audit(7649.210:280): avc: denied { getopt } for pid=9962 comm="syz.0.2647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7813.534053][T10069] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1015 sclass=netlink_route_socket pid=10069 comm=syz.1.2687 [ 7901.737313][ T29] audit: type=1400 audit(7901.160:281): avc: denied { write } for pid=10127 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7903.681666][ T29] audit: type=1400 audit(7903.090:282): avc: denied { write } for pid=10130 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7929.081665][T10147] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10147 comm=syz.1.2716 [ 7964.063193][ T29] audit: type=1400 audit(7963.490:283): avc: denied { nlmsg_tty_audit } for pid=10172 comm="syz.0.2726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 8018.351135][T10212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10212 comm=syz.0.2740 [ 8178.794248][ T29] audit: type=1400 audit(8178.220:284): avc: denied { setopt } for pid=10325 comm="syz.0.2786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 8230.331397][ T29] audit: type=1400 audit(8229.740:285): avc: denied { write } for pid=10364 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8232.158091][ T29] audit: type=1400 audit(8231.580:286): avc: denied { write } for pid=10368 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8416.966910][T10509] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10509 comm=syz.0.2857 [ 8434.044981][ T29] audit: type=1400 audit(8433.470:287): avc: denied { write } for pid=10520 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8436.592360][ T29] audit: type=1400 audit(8436.010:288): avc: denied { write } for pid=10525 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8586.678868][T10636] block nbd0: NBD_DISCONNECT [ 8652.715231][T10689] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2581 sclass=netlink_route_socket pid=10689 comm=syz.0.2927 [ 8679.645387][ T29] audit: type=1400 audit(8679.070:289): avc: denied { watch watch_reads } for pid=10709 comm="syz.0.2934" path="/proc/3250/attr" dev="proc" ino=26731 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 8763.552824][T10777] SELinux: Context system_u:object_r:locale_t:s0 is not valid (left unmapped). [ 8763.737687][ T29] audit: type=1400 audit(8763.160:290): avc: denied { relabelto } for pid=10776 comm="syz.0.2959" name="file0" dev="tmpfs" ino=8230 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:locale_t:s0" [ 8763.880672][ T29] audit: type=1400 audit(8763.300:291): avc: denied { associate } for pid=10776 comm="syz.0.2959" name="file0" dev="tmpfs" ino=8230 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:locale_t:s0" [ 8926.806532][ T29] audit: type=1400 audit(8926.230:292): avc: denied { write } for pid=10901 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 8928.621297][ T29] audit: type=1400 audit(8928.040:293): avc: denied { write } for pid=10906 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9129.976669][ T29] audit: type=1400 audit(9129.390:294): avc: denied { write } for pid=11055 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9131.901323][ T29] audit: type=1400 audit(9131.320:295): avc: denied { write } for pid=11060 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9361.523158][ T29] audit: type=1400 audit(9360.950:296): avc: denied { getopt } for pid=11222 comm="syz.0.3126" lport=13 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9387.503526][T11237] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=11237 comm=syz.0.3132 [ 9419.777312][T11257] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11257 comm=syz.0.3139 [ 9426.925711][ T29] audit: type=1400 audit(9426.350:297): avc: denied { create } for pid=11261 comm="syz.0.3145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 9427.114860][ T29] audit: type=1400 audit(9426.540:298): avc: denied { write } for pid=11261 comm="syz.0.3145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 9461.221287][ T29] audit: type=1400 audit(9460.640:299): avc: denied { write } for pid=11280 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9463.668226][ T29] audit: type=1400 audit(9463.090:300): avc: denied { write } for pid=11285 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9487.168010][ T29] audit: type=1400 audit(9486.590:301): avc: denied { mount } for pid=11299 comm="syz.1.3153" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 9488.604369][ T29] audit: type=1400 audit(9487.960:302): avc: denied { unmount } for pid=3344 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 9573.254732][T11353] lo speed is unknown, defaulting to 1000 [ 9573.326044][T11353] lo speed is unknown, defaulting to 1000 [ 9573.496915][T11353] lo speed is unknown, defaulting to 1000 [ 9612.796465][T11353] infiniband syz1: set active [ 9612.803073][T11203] lo speed is unknown, defaulting to 1000 [ 9612.811160][T11353] infiniband syz1: added lo [ 9612.885164][T11353] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 9612.976406][T11353] infiniband syz1: Couldn't open port 1 [ 9613.734801][T11353] RDS/IB: syz1: added [ 9613.775436][T11353] smc: adding ib device syz1 with port count 1 [ 9613.778588][T11353] smc: ib device syz1 port 1 has no pnetid [ 9613.804969][T11203] lo speed is unknown, defaulting to 1000 [ 9613.972489][T11353] lo speed is unknown, defaulting to 1000 [ 9618.798734][T11370] lo speed is unknown, defaulting to 1000 [ 9621.126118][T11353] lo speed is unknown, defaulting to 1000 [ 9630.564750][T10402] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9631.315669][T10402] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9631.746982][T10402] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9632.543921][T10402] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9634.182961][ T29] audit: type=1400 audit(9633.570:303): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 9638.454415][T10402] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 9638.585351][T10402] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 9638.634525][T10402] bond0 (unregistering): Released all slaves [ 9643.361988][ T29] audit: type=1400 audit(9642.780:304): avc: denied { write } for pid=11415 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9643.936328][T11370] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 9644.035085][T11370] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 9646.142718][ T29] audit: type=1400 audit(9645.560:305): avc: denied { write } for pid=11419 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9647.021930][T10402] hsr_slave_0: left promiscuous mode [ 9647.064423][T10402] hsr_slave_1: left promiscuous mode [ 9647.241536][T10402] veth1_macvtap: left promiscuous mode [ 9647.243225][T10402] veth0_macvtap: left promiscuous mode [ 9647.248273][T10402] veth1_vlan: left promiscuous mode [ 9647.255460][T10402] veth0_vlan: left promiscuous mode [ 9655.018203][ T8539] smc: removing ib device syz1 [ 9655.494268][ T3187] 8021q: adding VLAN 0 to HW filter on device eth1 [ 9655.503667][T11203] lo speed is unknown, defaulting to 1000 [ 9655.504833][T11203] syz1: Port: 1 Link DOWN [ 9660.482673][ T29] audit: type=1400 audit(9659.890:306): avc: denied { write } for pid=11433 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9663.343926][ T29] audit: type=1400 audit(9662.760:307): avc: denied { write } for pid=11438 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9665.877325][ T3187] 8021q: adding VLAN 0 to HW filter on device eth2 [ 9667.146488][T11370] hsr_slave_0: entered promiscuous mode [ 9667.151182][T10402] unregister_netdevice: waiting for lo to become free. Usage count = 7 [ 9667.155337][T10402] ref_tracker: netdev@00000000957e8ed9 has 1/1 users at [ 9667.155337][T10402] ib_device_set_netdev+0x1c8/0x5b8 [ 9667.155337][T10402] rxe_register_device+0x208/0x300 [ 9667.155337][T10402] rxe_add+0xd78/0x1118 [ 9667.155337][T10402] rxe_net_add+0x9c/0x100 [ 9667.155337][T10402] rxe_newlink+0x80/0x148 [ 9667.155337][T10402] nldev_newlink+0x278/0x490 [ 9667.155337][T10402] rdma_nl_rcv_msg+0x288/0x594 [ 9667.155337][T10402] rdma_nl_rcv_skb.constprop.0.isra.0+0x1fc/0x340 [ 9667.155337][T10402] rdma_nl_rcv+0x10/0x20 [ 9667.155337][T10402] netlink_unicast+0x40c/0x6d0 [ 9667.155337][T10402] netlink_sendmsg+0x638/0xa4c [ 9667.155337][T10402] __sock_sendmsg+0xc8/0x174 [ 9667.155337][T10402] ____sys_sendmsg+0x524/0x730 [ 9667.155337][T10402] ___sys_sendmsg+0x124/0x1a4 [ 9667.155337][T10402] __sys_sendmsg+0x118/0x1a4 [ 9667.155337][T10402] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 9667.155337][T10402] SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 9667.241698][ T29] audit: type=1400 audit(9666.630:308): avc: denied { read } for pid=3142 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9667.242928][ T29] audit: type=1400 audit(9666.660:309): avc: denied { search } for pid=3142 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9667.243327][ T29] audit: type=1400 audit(9666.660:310): avc: denied { write search } for pid=3142 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9667.295194][ T29] audit: type=1400 audit(9666.720:311): avc: denied { add_name } for pid=3142 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9667.298920][ T29] audit: type=1400 audit(9666.720:312): avc: denied { create } for pid=3142 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9667.321034][ T29] audit: type=1400 audit(9666.740:313): avc: denied { append open } for pid=3142 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9667.360795][ T29] audit: type=1400 audit(9666.770:314): avc: denied { getattr } for pid=3142 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9667.374877][T11370] hsr_slave_1: entered promiscuous mode [ 9671.458413][ T29] audit: type=1400 audit(9670.880:315): avc: denied { write } for pid=11446 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9672.856944][ T29] audit: type=1400 audit(9672.280:316): avc: denied { write } for pid=11449 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9673.851256][ T3187] 8021q: adding VLAN 0 to HW filter on device eth3 [ 9675.752174][ T29] audit: type=1400 audit(9675.180:317): avc: denied { write } for pid=11454 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9675.866868][T10402] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9676.348828][T10402] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9676.652575][T10402] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9676.911479][ T29] audit: type=1400 audit(9676.330:318): avc: denied { write } for pid=11457 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9677.017229][T10402] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9678.031281][ T3187] 8021q: adding VLAN 0 to HW filter on device eth4 [ 9680.662356][T10402] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 9680.747234][T10402] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 9680.823885][T10402] bond0 (unregistering): Released all slaves [ 9681.945053][T10402] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 9682.038253][T10402] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 9682.113893][T10402] bond0 (unregistering): Released all slaves [ 9682.670959][T10402] hsr_slave_0: left promiscuous mode [ 9682.732376][T10402] hsr_slave_1: left promiscuous mode [ 9682.813634][T10402] hsr_slave_0: left promiscuous mode [ 9682.873838][T10402] hsr_slave_1: left promiscuous mode [ 9683.058700][T10402] veth1_macvtap: left promiscuous mode [ 9683.072354][T10402] veth0_macvtap: left promiscuous mode [ 9683.073537][T10402] veth1_vlan: left promiscuous mode [ 9683.075920][T10402] veth0_vlan: left promiscuous mode [ 9683.557472][ T29] audit: type=1400 audit(9682.980:319): avc: denied { write } for pid=11463 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9684.781226][ T29] audit: type=1400 audit(9684.200:320): avc: denied { write } for pid=11466 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9695.004803][ T29] audit: type=1400 audit(9694.430:321): avc: denied { write } for pid=11471 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9695.897778][ T29] audit: type=1400 audit(9695.320:322): avc: denied { write } for pid=11474 comm="rm" name="hook-state" dev="tmpfs" ino=645 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9696.504358][ T3187] 8021q: adding VLAN 0 to HW filter on device eth5