last executing test programs: 25.242768673s ago: executing program 0 (id=2678): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f00000000c0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 24.314156561s ago: executing program 0 (id=2680): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(r0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 23.354167979s ago: executing program 0 (id=2682): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180), 0xc2143, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, 0x0) 22.298415259s ago: executing program 0 (id=2684): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f00000002c0)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x2125099, 0x0) 21.485281564s ago: executing program 0 (id=2686): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) write$RDMA_USER_CM_CMD_CONNECT(r2, 0x0, 0x0) 18.295331635s ago: executing program 0 (id=2689): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, 0x0) 18.263184395s ago: executing program 32 (id=2689): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, 0x0) 7.93815255s ago: executing program 1 (id=2702): write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x5450, 0x0) 6.645858915s ago: executing program 1 (id=2703): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r1 = dup(r0) sendmmsg$alg(r1, &(0x7f0000000040), 0x0, 0x40810) 5.145681553s ago: executing program 1 (id=2704): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, 0x0) 3.669827191s ago: executing program 1 (id=2705): unshare(0x22020600) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) 2.007227552s ago: executing program 1 (id=2706): openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/fs/cgroup', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) 0s ago: executing program 1 (id=2707): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x29, 0x5, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000c40), r0) kernel console output (not intermixed with test programs): [ 211.445541][ T30] audit: type=1400 audit(210.810:82): avc: denied { write } for pid=3324 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 212.442080][ T30] audit: type=1400 audit(211.810:83): avc: denied { write } for pid=3329 comm="rm" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '[localhost]:30912' (ED25519) to the list of known hosts. [ 259.689675][ T30] audit: type=1400 audit(259.050:84): avc: denied { name_bind } for pid=3338 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 260.370983][ T30] audit: type=1400 audit(259.740:85): avc: denied { execute } for pid=3339 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 260.381775][ T30] audit: type=1400 audit(259.750:86): avc: denied { execute_no_trans } for pid=3339 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 270.904074][ T30] audit: type=1400 audit(270.270:87): avc: denied { mounton } for pid=3339 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 270.958795][ T30] audit: type=1400 audit(270.320:88): avc: denied { mount } for pid=3339 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 271.020523][ T3339] cgroup: Unknown subsys name 'net' [ 271.088401][ T30] audit: type=1400 audit(270.450:89): avc: denied { unmount } for pid=3339 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 271.461236][ T3339] cgroup: Unknown subsys name 'cpuset' [ 271.528465][ T3339] cgroup: Unknown subsys name 'rlimit' [ 271.974692][ T30] audit: type=1400 audit(271.340:90): avc: denied { setattr } for pid=3339 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 271.988026][ T30] audit: type=1400 audit(271.350:91): avc: denied { mounton } for pid=3339 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 271.997322][ T30] audit: type=1400 audit(271.360:92): avc: denied { mount } for pid=3339 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 272.714969][ T3342] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 272.725582][ T30] audit: type=1400 audit(272.090:93): avc: denied { relabelto } for pid=3342 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 272.734588][ T30] audit: type=1400 audit(272.100:94): avc: denied { write } for pid=3342 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 272.895693][ T30] audit: type=1400 audit(272.260:95): avc: denied { read } for pid=3339 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 272.904996][ T30] audit: type=1400 audit(272.270:96): avc: denied { open } for pid=3339 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 272.949065][ T3339] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 301.163721][ T30] audit: type=1400 audit(300.520:97): avc: denied { write } for pid=3343 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 303.052133][ T30] audit: type=1400 audit(302.420:98): avc: denied { write } for pid=3346 comm="rm" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 357.464857][ T30] audit: type=1400 audit(356.830:99): avc: denied { execmem } for pid=3349 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 357.627442][ T30] audit: type=1400 audit(356.990:100): avc: denied { read } for pid=3352 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 357.648163][ T30] audit: type=1400 audit(357.010:101): avc: denied { open } for pid=3352 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 357.683473][ T30] audit: type=1400 audit(357.050:102): avc: denied { mounton } for pid=3352 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 357.793109][ T30] audit: type=1400 audit(357.160:103): avc: denied { module_request } for pid=3352 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 357.819239][ T30] audit: type=1400 audit(357.160:104): avc: denied { module_request } for pid=3351 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 358.402253][ T30] audit: type=1400 audit(357.770:105): avc: denied { sys_module } for pid=3352 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 374.145035][ T3351] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 374.230281][ T3352] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 374.282650][ T3351] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 374.352052][ T3352] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 381.890782][ T3351] hsr_slave_0: entered promiscuous mode [ 381.920996][ T3351] hsr_slave_1: entered promiscuous mode [ 382.941565][ T3352] hsr_slave_0: entered promiscuous mode [ 382.984478][ T3352] hsr_slave_1: entered promiscuous mode [ 383.010456][ T3352] debugfs: 'hsr0' already exists in 'hsr' [ 383.013135][ T3352] Cannot create hsr debugfs directory [ 388.198212][ T30] audit: type=1400 audit(387.560:106): avc: denied { create } for pid=3351 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 388.243032][ T30] audit: type=1400 audit(387.570:107): avc: denied { write } for pid=3351 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 388.274831][ T30] audit: type=1400 audit(387.630:108): avc: denied { read } for pid=3351 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 388.495080][ T3351] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 388.618373][ T3351] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 388.640411][ T3351] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 388.859073][ T3351] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 388.883314][ T3351] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 389.061361][ T3351] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 389.195123][ T3351] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 389.345380][ T3351] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 390.863932][ T3352] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 391.093324][ T3352] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 391.193550][ T3352] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 391.320937][ T3352] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 391.331015][ T3352] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 391.609268][ T3352] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 391.757069][ T3352] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 391.822727][ T3352] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 398.507021][ T3351] 8021q: adding VLAN 0 to HW filter on device bond0 [ 399.984679][ T3352] 8021q: adding VLAN 0 to HW filter on device bond0 [ 427.208190][ T3351] veth0_vlan: entered promiscuous mode [ 427.560528][ T3351] veth1_vlan: entered promiscuous mode [ 428.324015][ T3351] veth0_macvtap: entered promiscuous mode [ 428.596600][ T3351] veth1_macvtap: entered promiscuous mode [ 429.158840][ T3352] veth0_vlan: entered promiscuous mode [ 430.059664][ T3352] veth1_vlan: entered promiscuous mode [ 430.870159][ T3355] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 430.873422][ T3355] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 431.100971][ T3355] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 431.102206][ T3355] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 432.674822][ T3352] veth0_macvtap: entered promiscuous mode [ 432.898032][ T30] audit: type=1400 audit(432.260:109): avc: denied { mounton } for pid=3351 comm="syz-executor" path="/syzkaller.GrssPT/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 432.958835][ T30] audit: type=1400 audit(432.310:110): avc: denied { mount } for pid=3351 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 433.119684][ T3352] veth1_macvtap: entered promiscuous mode [ 433.124613][ T30] audit: type=1400 audit(432.490:111): avc: denied { mounton } for pid=3351 comm="syz-executor" path="/syzkaller.GrssPT/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 433.171517][ T30] audit: type=1400 audit(432.540:112): avc: denied { mount } for pid=3351 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 433.221301][ T30] audit: type=1400 audit(432.590:113): avc: denied { mounton } for pid=3351 comm="syz-executor" path="/syzkaller.GrssPT/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 433.259259][ T30] audit: type=1400 audit(432.630:114): avc: denied { mounton } for pid=3351 comm="syz-executor" path="/syzkaller.GrssPT/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3047 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 433.453048][ T30] audit: type=1400 audit(432.810:115): avc: denied { unmount } for pid=3351 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 433.754654][ T30] audit: type=1400 audit(433.120:116): avc: denied { mounton } for pid=3351 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 433.814746][ T30] audit: type=1400 audit(433.180:117): avc: denied { mount } for pid=3351 comm="syz-executor" name="/" dev="gadgetfs" ino=3052 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 433.888510][ T30] audit: type=1400 audit(433.250:118): avc: denied { mount } for pid=3351 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 434.862948][ T3355] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 434.888783][ T3425] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 434.890653][ T3425] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 434.891363][ T3425] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 435.601573][ T3351] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 443.190228][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 443.191183][ T30] audit: type=1400 audit(442.560:124): avc: denied { create } for pid=3510 comm="syz.1.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 443.273587][ T30] audit: type=1400 audit(442.620:125): avc: denied { ioctl } for pid=3510 comm="syz.1.3" path="socket:[3945]" dev="sockfs" ino=3945 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 443.372097][ T30] audit: type=1400 audit(442.740:126): avc: denied { prog_load } for pid=3510 comm="syz.1.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 443.378938][ T30] audit: type=1400 audit(442.740:127): avc: denied { bpf } for pid=3510 comm="syz.1.3" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 445.583646][ T30] audit: type=1400 audit(444.930:128): avc: denied { read write } for pid=3518 comm="syz.0.7" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 445.698980][ T30] audit: type=1400 audit(445.050:129): avc: denied { open } for pid=3518 comm="syz.0.7" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 460.432952][ T30] audit: type=1400 audit(459.800:130): avc: denied { read write } for pid=3557 comm="syz.1.26" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 460.460983][ T30] audit: type=1400 audit(459.810:131): avc: denied { open } for pid=3557 comm="syz.1.26" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 460.740756][ T10] hid-generic 0005:0010:0002.0001: item fetching failed at offset 0/1 [ 460.769741][ T10] hid-generic 0005:0010:0002.0001: probe with driver hid-generic failed with error -22 [ 462.974100][ T30] audit: type=1400 audit(462.340:132): avc: denied { ioctl } for pid=3564 comm="syz.1.29" path="/dev/vhost-net" dev="devtmpfs" ino=715 ioctlcmd=0xaf78 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 465.231016][ T30] audit: type=1400 audit(464.600:133): avc: denied { getattr } for pid=3571 comm="syz.1.32" name="/" dev="pidfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 470.531491][ T30] audit: type=1400 audit(469.880:134): avc: denied { map_create } for pid=3586 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 486.149391][ T30] audit: type=1400 audit(485.490:135): avc: denied { create } for pid=3617 comm="syz.0.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 488.671890][ T30] audit: type=1400 audit(488.040:136): avc: denied { read write } for pid=3623 comm="syz.1.56" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 488.700404][ T30] audit: type=1400 audit(488.040:137): avc: denied { open } for pid=3623 comm="syz.1.56" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 501.190834][ T30] audit: type=1400 audit(500.510:138): avc: denied { map_read map_write } for pid=3658 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 510.761530][ T30] audit: type=1400 audit(510.130:139): avc: denied { read } for pid=3680 comm="syz.0.84" path="socket:[5251]" dev="sockfs" ino=5251 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 516.869616][ T30] audit: type=1400 audit(516.230:140): avc: denied { perfmon } for pid=3697 comm="syz.1.92" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 516.974285][ T30] audit: type=1400 audit(516.340:141): avc: denied { prog_run } for pid=3697 comm="syz.1.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 518.568773][ T30] audit: type=1400 audit(517.910:142): avc: denied { create } for pid=3701 comm="syz.1.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 518.612708][ T30] audit: type=1400 audit(517.970:143): avc: denied { ioctl } for pid=3701 comm="syz.1.95" path="socket:[5294]" dev="sockfs" ino=5294 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 522.761059][ T30] audit: type=1400 audit(522.100:144): avc: denied { read } for pid=3712 comm="syz.1.100" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 522.791712][ T30] audit: type=1400 audit(522.140:145): avc: denied { open } for pid=3712 comm="syz.1.100" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 522.844707][ T30] audit: type=1400 audit(522.200:146): avc: denied { ioctl } for pid=3712 comm="syz.1.100" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae04 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 523.159837][ T30] audit: type=1400 audit(522.520:147): avc: denied { read write } for pid=3351 comm="syz-executor" name="loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 523.230437][ T30] audit: type=1400 audit(522.570:148): avc: denied { open } for pid=3351 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 523.301297][ T30] audit: type=1400 audit(522.640:149): avc: denied { ioctl } for pid=3351 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 526.521591][ T3722] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3722 comm=syz.0.104 [ 530.774502][ T30] audit: type=1400 audit(530.120:150): avc: denied { allowed } for pid=3733 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 530.902366][ T30] audit: type=1400 audit(530.260:151): avc: denied { create } for pid=3733 comm="syz.0.110" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 536.854486][ T3749] capability: warning: `syz.0.117' uses deprecated v2 capabilities in a way that may be insecure [ 551.181077][ T30] audit: type=1400 audit(550.540:152): avc: denied { create } for pid=3783 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 551.231885][ T30] audit: type=1400 audit(550.600:153): avc: denied { ioctl } for pid=3783 comm="syz.0.133" path="socket:[5438]" dev="sockfs" ino=5438 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 551.254986][ T30] audit: type=1400 audit(550.620:154): avc: denied { write } for pid=3783 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 551.479076][ T30] audit: type=1400 audit(550.840:155): avc: denied { open } for pid=3785 comm="syz.1.134" path="/dev/ptyq6" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 554.548368][ T30] audit: type=1400 audit(553.900:156): avc: denied { append } for pid=3792 comm="syz.1.138" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 556.561176][ T30] audit: type=1400 audit(555.900:157): avc: denied { relabelfrom } for pid=3796 comm="syz.1.139" name="NETLINK" dev="sockfs" ino=4547 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 556.678354][ T30] audit: type=1400 audit(555.980:158): avc: denied { relabelto } for pid=3796 comm="syz.1.139" name="NETLINK" dev="sockfs" ino=4547 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_tcpdiag_socket permissive=1 [ 560.662290][ T30] audit: type=1400 audit(560.030:159): avc: denied { create } for pid=3808 comm="syz.1.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 566.075204][ T30] audit: type=1400 audit(565.440:160): avc: denied { write } for pid=3823 comm="syz.0.153" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 566.269595][ T30] audit: type=1400 audit(565.640:161): avc: denied { create } for pid=3824 comm="syz.1.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 566.357339][ T30] audit: type=1400 audit(565.720:162): avc: denied { ioctl } for pid=3824 comm="syz.1.154" path="socket:[5556]" dev="sockfs" ino=5556 ioctlcmd=0x4b46 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 570.574466][ T30] audit: type=1400 audit(569.940:163): avc: denied { write } for pid=3837 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 572.082973][ T30] audit: type=1400 audit(571.430:164): avc: denied { setattr } for pid=3841 comm="syz.0.161" name="ptmx" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 575.810490][ T30] audit: type=1400 audit(575.170:165): avc: denied { read } for pid=3853 comm="syz.1.167" name="iommu" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 575.842273][ T30] audit: type=1400 audit(575.190:166): avc: denied { open } for pid=3853 comm="syz.1.167" path="/dev/iommu" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 575.921240][ T30] audit: type=1400 audit(575.260:167): avc: denied { ioctl } for pid=3853 comm="syz.1.167" path="/dev/iommu" dev="devtmpfs" ino=615 ioctlcmd=0x3b94 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 580.945409][ T30] audit: type=1400 audit(580.310:168): avc: denied { watch } for pid=3867 comm="syz.0.174" path="pipe:[4665]" dev="pipefs" ino=4665 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 583.728910][ T30] audit: type=1400 audit(583.090:169): avc: denied { unmount } for pid=3351 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 599.642424][ T30] audit: type=1400 audit(599.010:170): avc: denied { read write } for pid=3924 comm="syz.1.201" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 599.656949][ T30] audit: type=1400 audit(599.020:171): avc: denied { open } for pid=3924 comm="syz.1.201" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.574455][ T30] audit: type=1400 audit(600.920:172): avc: denied { bind } for pid=3928 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 601.604550][ T30] audit: type=1400 audit(600.970:173): avc: denied { accept } for pid=3928 comm="syz.1.203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 625.575344][ T30] audit: type=1400 audit(624.900:174): avc: denied { setopt } for pid=4005 comm="syz.1.241" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 629.449515][ T30] audit: type=1400 audit(628.820:175): avc: denied { getopt } for pid=4018 comm="syz.0.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 633.310973][ T4032] capability: warning: `syz.1.253' uses 32-bit capabilities (legacy support in use) [ 642.517065][ T30] audit: type=1400 audit(641.850:176): avc: denied { ioctl } for pid=4058 comm="syz.0.267" path="time:[4026531834]" dev="nsfs" ino=4026531834 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 644.883123][ T30] audit: type=1400 audit(644.250:177): avc: denied { create } for pid=4067 comm="syz.1.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 644.942129][ T30] audit: type=1400 audit(644.310:178): avc: denied { ioctl } for pid=4067 comm="syz.1.272" path="socket:[5978]" dev="sockfs" ino=5978 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 661.269113][ T30] audit: type=1400 audit(660.630:179): avc: denied { create } for pid=4120 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 661.509161][ T30] audit: type=1400 audit(660.860:180): avc: denied { write } for pid=4120 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 661.794113][ T30] audit: type=1400 audit(661.160:181): avc: denied { read } for pid=4120 comm="syz.1.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 675.641613][ T30] audit: type=1400 audit(675.010:182): avc: denied { map } for pid=4161 comm="syz.1.317" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6206 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 675.683294][ T30] audit: type=1400 audit(675.050:183): avc: denied { read write } for pid=4161 comm="syz.1.317" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6206 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 689.183521][ T30] audit: type=1400 audit(688.550:184): avc: denied { write } for pid=4209 comm="syz.0.339" name="arp" dev="proc" ino=4026532638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 693.823462][ T30] audit: type=1400 audit(693.190:185): avc: denied { ioctl } for pid=4228 comm="syz.1.348" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 696.702497][ T30] audit: type=1400 audit(696.070:186): avc: denied { create } for pid=4237 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 696.849374][ T30] audit: type=1400 audit(696.200:187): avc: denied { write } for pid=4237 comm="syz.0.353" path="socket:[6338]" dev="sockfs" ino=6338 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 702.992364][ T30] audit: type=1400 audit(702.340:188): avc: denied { mount } for pid=4255 comm="syz.1.362" name="/" dev="ramfs" ino=6377 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 703.087265][ T4257] ======================================================= [ 703.087265][ T4257] WARNING: The mand mount option has been deprecated and [ 703.087265][ T4257] and is ignored by this kernel. Remove the mand [ 703.087265][ T4257] option from the mount to silence this warning. [ 703.087265][ T4257] ======================================================= [ 703.102349][ T30] audit: type=1400 audit(702.410:189): avc: denied { remount } for pid=4255 comm="syz.1.362" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 703.609018][ T30] audit: type=1400 audit(702.960:190): avc: denied { unmount } for pid=3352 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 707.279822][ T30] audit: type=1400 audit(706.650:191): avc: denied { create } for pid=4270 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 707.372408][ T30] audit: type=1400 audit(706.740:192): avc: denied { bind } for pid=4270 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 707.448079][ T30] audit: type=1400 audit(706.810:193): avc: denied { write } for pid=4270 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 710.934313][ T4288] Zero length message leads to an empty skb [ 715.319364][ T30] audit: type=1400 audit(714.680:194): avc: denied { write } for pid=4303 comm="syz.0.386" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 716.087937][ T3341] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 716.504796][ T3341] usb 1-1: config 0 has an invalid interface number: 1 but max is 0 [ 716.516971][ T3341] usb 1-1: config 0 has no interface number 0 [ 716.521529][ T3341] usb 1-1: config 0 interface 1 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 10 [ 716.527435][ T3341] usb 1-1: config 0 interface 1 altsetting 0 endpoint 0x82 has invalid maxpacket 159, setting to 8 [ 716.532397][ T3341] usb 1-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 716.547185][ T3341] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 716.692733][ T3341] usb 1-1: config 0 descriptor?? [ 716.772027][ T4305] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 716.971694][ T30] audit: type=1400 audit(716.320:195): avc: denied { read write } for pid=4306 comm="syz.1.387" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 716.972905][ T30] audit: type=1400 audit(716.330:196): avc: denied { open } for pid=4306 comm="syz.1.387" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 717.053781][ T4307] ucma_write: process 398 (syz.1.387) changed security contexts after opening file descriptor, this is not allowed. [ 717.470581][ T3341] iowarrior 1-1:0.1: IOWarrior product=0x1512, serial= interface=1 now attached to iowarrior0 [ 717.891179][ T3341] usb 1-1: USB disconnect, device number 2 [ 721.211248][ T30] audit: type=1400 audit(720.580:197): avc: denied { ioctl } for pid=4316 comm="syz.1.392" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=6489 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 723.374569][ T30] audit: type=1400 audit(722.740:198): avc: denied { write } for pid=4322 comm="syz.0.395" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 726.550193][ T30] audit: type=1400 audit(725.920:199): avc: denied { create } for pid=4331 comm="syz.1.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 728.929463][ T30] audit: type=1400 audit(728.300:200): avc: denied { write } for pid=4340 comm="syz.1.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 747.033039][ T30] audit: type=1400 audit(746.400:201): avc: denied { read append } for pid=4398 comm="syz.1.431" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 747.093426][ T30] audit: type=1400 audit(746.430:202): avc: denied { open } for pid=4398 comm="syz.1.431" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 747.120717][ T30] audit: type=1400 audit(746.490:203): avc: denied { ioctl } for pid=4398 comm="syz.1.431" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 762.603806][ T30] audit: type=1400 audit(761.970:204): avc: denied { checkpoint_restore } for pid=4452 comm="syz.0.456" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 766.427187][ T30] audit: type=1400 audit(765.730:205): avc: denied { ioctl } for pid=4461 comm="syz.1.460" path="socket:[6729]" dev="sockfs" ino=6729 ioctlcmd=0xf501 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 789.258529][ T30] audit: type=1400 audit(788.610:206): avc: denied { write } for pid=4525 comm="syz.1.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 790.202423][ T30] audit: type=1400 audit(789.570:207): avc: denied { append } for pid=4529 comm="syz.1.492" name="iommu" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 802.126820][ T30] audit: type=1400 audit(801.490:208): avc: denied { write } for pid=4586 comm="syz.1.520" path="socket:[7851]" dev="sockfs" ino=7851 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 802.760849][ T30] audit: type=1400 audit(802.130:209): avc: denied { setopt } for pid=4586 comm="syz.1.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 808.814007][ T30] audit: type=1400 audit(808.180:210): avc: denied { remount } for pid=4608 comm="syz.1.532" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 809.061092][ T30] audit: type=1400 audit(808.420:211): avc: denied { unmount } for pid=3352 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 812.830203][ T30] audit: type=1400 audit(812.200:212): avc: denied { create } for pid=4630 comm="syz.1.542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 815.306749][ T30] audit: type=1400 audit(814.670:213): avc: denied { write } for pid=4634 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 815.333101][ T30] audit: type=1400 audit(814.700:214): avc: denied { create } for pid=4634 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 815.421669][ T30] audit: type=1400 audit(814.700:215): avc: denied { write open } for pid=4634 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=2086 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 815.441530][ T30] audit: type=1400 audit(814.810:216): avc: denied { append } for pid=4634 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2086 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 815.537413][ T30] audit: type=1400 audit(814.850:217): avc: denied { getattr } for pid=4634 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 816.520423][ T30] audit: type=1400 audit(815.890:218): avc: denied { read } for pid=4644 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 816.944906][ T30] audit: type=1400 audit(816.310:219): avc: denied { lock } for pid=4647 comm="syz.0.549" path="socket:[6985]" dev="sockfs" ino=6985 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 818.107665][ T30] audit: type=1400 audit(817.470:220): avc: denied { write } for pid=4649 comm="rm" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 818.110722][ T30] audit: type=1400 audit(817.480:221): avc: denied { unlink } for pid=4649 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2086 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 819.817232][ T30] audit: type=1400 audit(819.180:222): avc: denied { setattr } for pid=4659 comm="syz.1.554" name="tty22" dev="devtmpfs" ino=41 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 829.984420][ T30] audit: type=1400 audit(829.350:223): avc: denied { write } for pid=4712 comm="syz.0.580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 844.917008][ T30] audit: type=1400 audit(844.280:224): avc: denied { append } for pid=4774 comm="syz.1.610" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 845.031687][ T30] audit: type=1400 audit(844.390:225): avc: denied { wake_alarm } for pid=4774 comm="syz.1.610" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 853.810951][ T30] audit: type=1400 audit(853.180:226): avc: denied { create } for pid=4811 comm="syz.1.628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 853.846993][ T30] audit: type=1400 audit(853.210:227): avc: denied { getattr } for pid=4811 comm="syz.1.628" path="socket:[8316]" dev="sockfs" ino=8316 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 859.327263][ T30] audit: type=1400 audit(858.690:228): avc: denied { setopt } for pid=4836 comm="syz.0.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 874.603161][ T30] audit: type=1400 audit(873.960:229): avc: denied { create } for pid=4912 comm="syz.0.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 874.618952][ T30] audit: type=1400 audit(873.990:230): avc: denied { getopt } for pid=4912 comm="syz.0.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 883.301147][ T30] audit: type=1400 audit(882.670:231): avc: denied { getopt } for pid=4954 comm="syz.1.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 891.778668][ T30] audit: type=1400 audit(891.140:232): avc: denied { read write } for pid=4998 comm="syz.0.720" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 891.819556][ T30] audit: type=1400 audit(891.160:233): avc: denied { open } for pid=4998 comm="syz.0.720" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 891.892341][ T30] audit: type=1400 audit(891.260:234): avc: denied { ioctl } for pid=4998 comm="syz.0.720" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xaf07 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 911.750353][ T30] audit: type=1400 audit(911.110:235): avc: denied { create } for pid=5074 comm="syz.1.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 911.787865][ T30] audit: type=1400 audit(911.150:236): avc: denied { setopt } for pid=5074 comm="syz.1.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 912.832580][ T30] audit: type=1400 audit(912.200:237): avc: denied { append } for pid=5079 comm="syz.0.759" name="loop9" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 914.943093][ T30] audit: type=1400 audit(914.310:238): avc: denied { write } for pid=5085 comm="syz.0.762" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 927.533924][ T30] audit: type=1400 audit(926.880:239): avc: denied { audit_write } for pid=5146 comm="syz.0.790" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 936.818032][ T5191] raw_sendmsg: syz.0.811 forgot to set AF_INET. Fix it! [ 971.509401][ T30] audit: type=1400 audit(970.850:240): avc: denied { append } for pid=5395 comm="syz.0.911" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 971.510998][ T5397] random: crng reseeded on system resumption [ 971.533810][ T30] audit: type=1400 audit(970.880:241): avc: denied { open } for pid=5395 comm="syz.0.911" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 971.645276][ T30] audit: type=1400 audit(971.010:242): avc: denied { ioctl } for pid=5395 comm="syz.0.911" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x330d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 972.418758][ T30] audit: type=1400 audit(971.780:243): avc: denied { bind } for pid=5402 comm="syz.0.915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 972.428645][ T30] audit: type=1400 audit(971.800:244): avc: denied { listen } for pid=5402 comm="syz.0.915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 975.277006][ T30] audit: type=1400 audit(974.640:245): avc: denied { ioctl } for pid=5422 comm="syz.0.924" path="/dev/ptyq4" dev="devtmpfs" ino=116 ioctlcmd=0x540a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 975.644862][ T30] audit: type=1400 audit(975.010:246): avc: denied { ioctl } for pid=5426 comm="syz.1.926" path="socket:[11338]" dev="sockfs" ino=11338 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 985.676968][ T30] audit: type=1400 audit(985.040:247): avc: denied { write } for pid=5489 comm="syz.1.957" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 993.226306][ T30] audit: type=1400 audit(992.570:248): avc: denied { setopt } for pid=5543 comm="syz.1.983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 993.958473][ T30] audit: type=1400 audit(993.320:249): avc: denied { setopt } for pid=5549 comm="syz.1.986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 993.966564][ T30] audit: type=1400 audit(993.330:250): avc: denied { getopt } for pid=5549 comm="syz.1.986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1008.963889][ T30] audit: type=1400 audit(1008.320:251): avc: denied { read } for pid=5629 comm="syz.0.1024" path="socket:[10667]" dev="sockfs" ino=10667 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1016.546930][ T30] audit: type=1400 audit(1015.900:252): avc: denied { read write } for pid=5690 comm="syz.0.1055" name="renderD128" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1016.609050][ T30] audit: type=1400 audit(1015.910:253): avc: denied { open } for pid=5690 comm="syz.0.1055" path="/dev/dri/renderD128" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1016.680878][ T30] audit: type=1400 audit(1016.050:254): avc: denied { ioctl } for pid=5690 comm="syz.0.1055" path="/dev/dri/renderD128" dev="devtmpfs" ino=617 ioctlcmd=0x6441 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1020.276896][ T30] audit: type=1400 audit(1019.610:255): avc: denied { mount } for pid=5719 comm="syz.1.1069" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1038.362886][ T30] audit: type=1400 audit(1037.730:256): avc: denied { setopt } for pid=5814 comm="syz.0.1115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1038.379229][ T30] audit: type=1400 audit(1037.730:257): avc: denied { bind } for pid=5814 comm="syz.0.1115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1038.387321][ T30] audit: type=1400 audit(1037.740:258): avc: denied { node_bind } for pid=5814 comm="syz.0.1115" saddr=172.30.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 1041.505207][ T30] audit: type=1400 audit(1040.870:259): avc: denied { create } for pid=5840 comm="syz.1.1128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1041.545203][ T30] audit: type=1400 audit(1040.910:260): avc: denied { ioctl } for pid=5840 comm="syz.1.1128" path="socket:[11053]" dev="sockfs" ino=11053 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1044.032600][ T30] audit: type=1400 audit(1043.400:261): avc: denied { node_bind } for pid=5865 comm="syz.0.1140" saddr=172.30.255.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1059.699581][ T30] audit: type=1400 audit(1059.060:262): avc: denied { sqpoll } for pid=5975 comm="syz.1.1193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1059.740320][ T5976] Injecting memory failure for pfn 0x65057 at process virtual address 0x20000000 [ 1059.951621][ T5976] Memory failure: 0x65057: Sending SIGBUS to syz.1.1193:5976 due to hardware memory corruption [ 1059.989167][ T5976] Memory failure: 0x65057: recovery action for dirty LRU page: Recovered [ 1059.990775][ T5976] Injecting memory failure for pfn 0x49519 at process virtual address 0x20001000 [ 1059.992384][ T5976] Memory failure: 0x49519: unhandlable page. [ 1060.001673][ T5976] Memory failure: 0x49519: recovery action for get hwpoison page: Ignored [ 1062.099870][ T30] audit: type=1400 audit(1061.470:263): avc: denied { watch watch_reads } for pid=5990 comm="syz.1.1200" path="/594/file0" dev="tmpfs" ino=3036 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1063.111919][ T30] audit: type=1400 audit(1062.480:264): avc: denied { write } for pid=5996 comm="syz.0.1203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1063.139105][ T30] audit: type=1400 audit(1062.510:265): avc: denied { read } for pid=5996 comm="syz.0.1203" path="socket:[13398]" dev="sockfs" ino=13398 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1090.986716][ T30] audit: type=1400 audit(1090.350:266): avc: denied { watch } for pid=6176 comm="syz.0.1290" path="/654/net_prio.prioidx" dev="tmpfs" ino=3348 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1090.987636][ T30] audit: type=1400 audit(1090.350:267): avc: denied { watch_sb } for pid=6176 comm="syz.0.1290" path="/654/net_prio.prioidx" dev="tmpfs" ino=3348 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1093.201594][ T30] audit: type=1400 audit(1092.570:268): avc: denied { ioctl } for pid=6194 comm="syz.0.1298" path="/dev/nullb0" dev="devtmpfs" ino=672 ioctlcmd=0x127a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1096.513710][ T30] audit: type=1400 audit(1095.880:269): avc: denied { write } for pid=6222 comm="syz.1.1311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1097.645079][ T30] audit: type=1400 audit(1097.010:270): avc: denied { audit_read } for pid=6234 comm="syz.1.1317" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1097.651132][ T6235] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6235 comm=syz.1.1317 [ 1117.047234][ T30] audit: type=1400 audit(1116.420:271): avc: denied { write } for pid=6370 comm="syz.0.1384" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1117.050127][ T30] audit: type=1400 audit(1116.420:272): avc: denied { open } for pid=6370 comm="syz.0.1384" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1117.468213][ T30] audit: type=1400 audit(1116.830:273): avc: denied { read } for pid=6374 comm="syz.0.1385" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1117.486153][ T30] audit: type=1400 audit(1116.850:274): avc: denied { block_suspend } for pid=6374 comm="syz.0.1385" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1118.283914][ T30] audit: type=1400 audit(1117.650:275): avc: denied { read } for pid=6380 comm="syz.0.1388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1121.232129][ T30] audit: type=1400 audit(1120.600:276): avc: denied { write } for pid=6397 comm="syz.0.1396" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1121.248670][ T30] audit: type=1400 audit(1120.600:277): avc: denied { open } for pid=6397 comm="syz.0.1396" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1121.249489][ T30] audit: type=1400 audit(1120.610:278): avc: denied { ioctl } for pid=6397 comm="syz.0.1396" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1126.451195][ T30] audit: type=1400 audit(1125.820:279): avc: denied { ioctl } for pid=6434 comm="syz.0.1414" path="socket:[14167]" dev="sockfs" ino=14167 ioctlcmd=0x8913 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1134.345181][ T30] audit: type=1400 audit(1133.710:280): avc: denied { ioctl } for pid=6484 comm="syz.1.1437" path="socket:[14236]" dev="sockfs" ino=14236 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1145.072249][ T6530] infiniband syz2: set active [ 1145.078646][ T6530] infiniband syz2: added bond0 [ 1145.123944][ T6530] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 1145.140186][ T30] audit: type=1400 audit(1144.510:281): avc: denied { connect } for pid=6539 comm="syz.1.1464" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1145.175268][ T6530] infiniband syz2: Couldn't open port 1 [ 1145.823503][ T6530] RDS/IB: syz2: added [ 1145.842821][ T6530] smc: adding ib device syz2 with port count 1 [ 1145.844832][ T6530] smc: ib device syz2 port 1 has no pnetid [ 1148.321046][ T30] audit: type=1400 audit(1147.690:282): avc: denied { allowed } for pid=6551 comm="syz.1.1469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1169.494708][ T30] audit: type=1400 audit(1168.860:283): avc: denied { watch watch_reads } for pid=6689 comm="syz.1.1535" path="/767/file0" dev="tmpfs" ino=3912 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1186.222253][ T3348] hid-generic 00A0:0006:0003.0002: unknown main item tag 0x0 [ 1186.223823][ T3348] hid-generic 00A0:0006:0003.0002: unknown main item tag 0x0 [ 1186.224196][ T3348] hid-generic 00A0:0006:0003.0002: unknown main item tag 0x0 [ 1186.224367][ T3348] hid-generic 00A0:0006:0003.0002: unknown main item tag 0x0 [ 1186.224516][ T3348] hid-generic 00A0:0006:0003.0002: unknown main item tag 0x0 [ 1186.224656][ T3348] hid-generic 00A0:0006:0003.0002: unknown main item tag 0x0 [ 1186.224790][ T3348] hid-generic 00A0:0006:0003.0002: unknown main item tag 0x0 [ 1186.224953][ T3348] hid-generic 00A0:0006:0003.0002: unknown main item tag 0x0 [ 1186.225094][ T3348] hid-generic 00A0:0006:0003.0002: unknown main item tag 0x0 [ 1186.225230][ T3348] hid-generic 00A0:0006:0003.0002: unknown main item tag 0x0 [ 1186.352263][ T3348] hid-generic 00A0:0006:0003.0002: hidraw0: HID v0.05 Device [syz1] on syz0 [ 1188.494957][ T6782] fido_id[6782]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1189.838259][ T30] audit: type=1400 audit(1189.210:284): avc: denied { map_create } for pid=6806 comm="syz.0.1591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1189.840856][ T30] audit: type=1400 audit(1189.210:285): avc: denied { map_read map_write } for pid=6806 comm="syz.0.1591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1192.921659][ T30] audit: type=1400 audit(1192.290:286): avc: denied { create } for pid=6827 comm="syz.1.1601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1192.964591][ T30] audit: type=1400 audit(1192.330:287): avc: denied { accept } for pid=6827 comm="syz.1.1601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1193.032812][ T30] audit: type=1400 audit(1192.400:288): avc: denied { ioctl } for pid=6827 comm="syz.1.1601" path="socket:[14818]" dev="sockfs" ino=14818 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1194.408624][ T30] audit: type=1400 audit(1193.750:289): avc: denied { mount } for pid=6838 comm="syz.1.1605" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1194.449951][ T30] audit: type=1400 audit(1193.810:290): avc: denied { remount } for pid=6838 comm="syz.1.1605" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1194.658784][ T30] audit: type=1400 audit(1194.030:291): avc: denied { unmount } for pid=3352 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1197.043982][ T30] audit: type=1400 audit(1196.410:292): avc: denied { write } for pid=6861 comm="syz.0.1616" path="socket:[15826]" dev="sockfs" ino=15826 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1200.072650][ T30] audit: type=1400 audit(1199.440:293): avc: denied { prog_load } for pid=6882 comm="syz.1.1627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1203.468191][ T30] audit: type=1400 audit(1202.830:294): avc: denied { listen } for pid=6910 comm="syz.0.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1203.488653][ T30] audit: type=1400 audit(1202.860:295): avc: denied { accept } for pid=6910 comm="syz.0.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1217.988943][ T30] audit: type=1400 audit(1217.360:296): avc: denied { getopt } for pid=7024 comm="syz.1.1695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1220.500574][ T30] audit: type=1400 audit(1219.860:297): avc: denied { ioctl } for pid=7054 comm="syz.1.1710" path="socket:[16102]" dev="sockfs" ino=16102 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1220.742510][ T7055] 8021q: VLANs not supported on wg1 [ 1233.337241][ T30] audit: type=1400 audit(1232.700:298): avc: denied { watch watch_reads } for pid=7146 comm="syz.1.1754" path="/proc/1778/net" dev="proc" ino=15359 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1234.241271][ T30] audit: type=1400 audit(1233.610:299): avc: denied { execute } for pid=7152 comm="syz.0.1757" name="file1" dev="tmpfs" ino=4525 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1239.532617][ T30] audit: type=1400 audit(1238.890:300): avc: denied { ioctl } for pid=7181 comm="syz.1.1771" path="socket:[16444]" dev="sockfs" ino=16444 ioctlcmd=0x4813 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1247.618272][ T30] audit: type=1400 audit(1246.980:301): avc: denied { append } for pid=7254 comm="syz.1.1808" name="pfkey" dev="proc" ino=4026532774 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1257.314654][ T30] audit: type=1400 audit(1256.680:302): avc: denied { create } for pid=7338 comm="syz.0.1850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1260.270201][ T30] audit: type=1400 audit(1259.640:303): avc: denied { read } for pid=7367 comm="syz.1.1863" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1260.485492][ T30] audit: type=1400 audit(1259.850:304): avc: denied { write } for pid=7369 comm="syz.1.1864" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1264.115101][ T7401] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7401 comm=syz.0.1878 [ 1265.844875][ T30] audit: type=1400 audit(1265.210:305): avc: denied { lock } for pid=7410 comm="syz.1.1884" path="socket:[17761]" dev="sockfs" ino=17761 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1269.407771][ T30] audit: type=1400 audit(1268.770:306): avc: denied { read } for pid=7426 comm="syz.0.1891" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1269.411714][ T30] audit: type=1400 audit(1268.780:307): avc: denied { open } for pid=7426 comm="syz.0.1891" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1269.502737][ T30] audit: type=1400 audit(1268.870:308): avc: denied { ioctl } for pid=7426 comm="syz.0.1891" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1279.843259][ T30] audit: type=1400 audit(1279.210:309): avc: denied { remount } for pid=7476 comm="syz.1.1914" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1280.017209][ T30] audit: type=1400 audit(1279.380:310): avc: denied { unmount } for pid=3352 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1281.212448][ T30] audit: type=1400 audit(1280.580:311): avc: denied { read } for pid=7485 comm="syz.0.1920" path="socket:[16960]" dev="sockfs" ino=16960 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1290.621041][ T30] audit: type=1400 audit(1289.990:312): avc: denied { ioctl } for pid=7548 comm="syz.0.1949" path="socket:[17968]" dev="sockfs" ino=17968 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1300.449167][ T30] audit: type=1400 audit(1299.810:313): avc: denied { read write } for pid=7630 comm="syz.1.1990" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1300.480274][ T30] audit: type=1400 audit(1299.830:314): avc: denied { open } for pid=7630 comm="syz.1.1990" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1301.648615][ T30] audit: type=1400 audit(1301.020:315): avc: denied { connect } for pid=7646 comm="syz.0.1998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1308.753518][ T30] audit: type=1400 audit(1308.120:316): avc: denied { bind } for pid=7709 comm="syz.0.2028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1308.799262][ T30] audit: type=1400 audit(1308.170:317): avc: denied { connect } for pid=7709 comm="syz.0.2028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1309.150834][ T7714] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2030'. [ 1311.086993][ T30] audit: type=1400 audit(1310.450:318): avc: denied { append } for pid=7731 comm="syz.1.2039" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1311.692479][ T30] audit: type=1400 audit(1311.060:319): avc: denied { setopt } for pid=7737 comm="syz.0.2042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1329.420315][ T30] audit: type=1400 audit(1328.790:320): avc: denied { map } for pid=7863 comm="syz.0.2103" path="socket:[19512]" dev="sockfs" ino=19512 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 1333.382090][ T7893] netlink: 48 bytes leftover after parsing attributes in process `syz.0.2116'. [ 1333.424047][ T7893] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2116'. [ 1333.429077][ T7893] netlink: 48 bytes leftover after parsing attributes in process `syz.0.2116'. [ 1340.452562][ T30] audit: type=1400 audit(1339.820:321): avc: denied { getopt } for pid=7962 comm="syz.0.2151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1340.604353][ T30] audit: type=1400 audit(1339.970:322): avc: denied { map } for pid=7950 comm="syz.1.2145" path="socket:[18843]" dev="sockfs" ino=18843 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1347.276318][ T30] audit: type=1400 audit(1346.640:323): avc: denied { setopt } for pid=8002 comm="syz.1.2170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1347.299141][ T30] audit: type=1400 audit(1346.650:324): avc: denied { bind } for pid=8002 comm="syz.1.2170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1361.752915][ T30] audit: type=1400 audit(1361.120:325): avc: denied { connect } for pid=8090 comm="syz.0.2213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1365.618106][ T30] audit: type=1400 audit(1364.970:326): avc: denied { setopt } for pid=8112 comm="syz.0.2223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1379.877038][ T30] audit: type=1400 audit(1379.240:327): avc: denied { setopt } for pid=8189 comm="syz.0.2260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1381.805318][ T30] audit: type=1400 audit(1381.170:328): avc: denied { write } for pid=8192 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1384.369952][ T30] audit: type=1400 audit(1383.740:329): avc: denied { write } for pid=8208 comm="rm" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1388.031781][ T30] audit: type=1400 audit(1387.400:330): avc: denied { prog_run } for pid=8232 comm="syz.1.2279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1388.828079][ T30] audit: type=1400 audit(1388.190:331): avc: denied { read } for pid=8236 comm="syz.1.2281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1389.359549][ T30] audit: type=1400 audit(1388.720:332): avc: denied { write } for pid=8236 comm="syz.1.2281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1402.854033][ T30] audit: type=1400 audit(1402.220:333): avc: denied { map } for pid=8316 comm="syz.1.2319" path="socket:[20274]" dev="sockfs" ino=20274 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1402.874883][ T30] audit: type=1400 audit(1402.240:334): avc: denied { read accept } for pid=8316 comm="syz.1.2319" path="socket:[20274]" dev="sockfs" ino=20274 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1463.240826][ T30] audit: type=1400 audit(1462.600:335): avc: denied { read } for pid=8729 comm="syz.0.2486" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1498.903078][ T30] audit: type=1400 audit(1498.270:336): avc: denied { connect } for pid=8893 comm="syz.0.2566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1504.840861][ T30] audit: type=1400 audit(1504.200:337): avc: denied { read } for pid=8921 comm="syz.1.2580" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1504.848898][ T30] audit: type=1400 audit(1504.210:338): avc: denied { open } for pid=8921 comm="syz.1.2580" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1504.877328][ T30] audit: type=1400 audit(1504.220:339): avc: denied { ioctl } for pid=8921 comm="syz.1.2580" path="/dev/fb0" dev="devtmpfs" ino=620 ioctlcmd=0x4606 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1507.769763][ T30] audit: type=1400 audit(1507.120:340): avc: denied { write } for pid=8933 comm="syz.1.2586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1516.827009][ T30] audit: type=1400 audit(1516.190:341): avc: denied { write } for pid=8964 comm="syz.1.2600" name="arp" dev="proc" ino=4026532719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1535.073450][ T9033] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9033 comm=syz.0.2633 [ 1564.654760][ T8662] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1565.592453][ T8662] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1566.184668][ T30] audit: type=1400 audit(1565.520:342): avc: denied { execute } for pid=9147 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1566.192508][ T8662] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1566.239465][ T30] audit: type=1400 audit(1565.600:343): avc: denied { execute_no_trans } for pid=9147 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1566.941131][ T8662] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1569.587356][ T30] audit: type=1400 audit(1568.830:344): avc: denied { read } for pid=3189 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1575.522195][ T8692] smc: removing ib device syz2 [ 1575.913942][ T8662] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1576.118078][ T8662] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1576.340618][ T8662] bond0 (unregistering): Released all slaves [ 1583.714861][ T30] audit: type=1400 audit(1583.080:345): avc: denied { write } for pid=9188 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1586.135326][ T30] audit: type=1400 audit(1585.500:346): avc: denied { read } for pid=9197 comm="syz.1.2707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1587.089201][ T8662] unregister_netdevice: waiting for bond0 to become free. Usage count = 2 [ 1587.094225][ T8662] ref_tracker: netdev@00000000ea727126 has 1/1 users at [ 1587.094225][ T8662] ib_device_set_netdev+0x1c8/0x5b8 [ 1587.094225][ T8662] rxe_register_device+0x208/0x300 [ 1587.094225][ T8662] rxe_add+0xd78/0x1118 [ 1587.094225][ T8662] rxe_net_add+0x9c/0x100 [ 1587.094225][ T8662] rxe_newlink+0x80/0x148 [ 1587.094225][ T8662] nldev_newlink+0x278/0x490 [ 1587.094225][ T8662] rdma_nl_rcv_msg+0x288/0x594 [ 1587.094225][ T8662] rdma_nl_rcv_skb.constprop.0.isra.0+0x1fc/0x340 [ 1587.094225][ T8662] rdma_nl_rcv+0x10/0x20 [ 1587.094225][ T8662] netlink_unicast+0x40c/0x6d0 [ 1587.094225][ T8662] netlink_sendmsg+0x638/0xa4c [ 1587.094225][ T8662] __sock_sendmsg+0xc8/0x174 [ 1587.094225][ T8662] ____sys_sendmsg+0x524/0x730 [ 1587.094225][ T8662] ___sys_sendmsg+0x124/0x1a4 [ 1587.094225][ T8662] __sys_sendmsg+0x118/0x1a4 [ 1587.094225][ T8662] __arm64_sys_sendmsg+0x70/0xa0 [ 1587.094225][ T8662] [ 1587.169172][ T30] audit: type=1400 audit(1586.540:347): avc: denied { read } for pid=3144 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1587.184269][ T30] audit: type=1400 audit(1586.550:348): avc: denied { search } for pid=3144 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1587.214690][ T30] audit: type=1400 audit(1586.550:349): avc: denied { write search } for pid=3144 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1587.218771][ T30] audit: type=1400 audit(1586.580:350): avc: denied { add_name } for pid=3144 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1587.219438][ T30] audit: type=1400 audit(1586.580:351): avc: denied { create } for pid=3144 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1587.282412][ T30] audit: type=1400 audit(1586.620:352): avc: denied { append open } for pid=3144 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1587.349583][ T30] audit: type=1400 audit(1586.690:353): avc: denied { getattr } for pid=3144 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1587.973542][ T30] audit: type=1400 audit(1587.310:354): avc: denied { write } for pid=9201 comm="rm" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1592.531315][ T3189] 8021q: adding VLAN 0 to HW filter on device eth1 [ 1595.579138][ T30] audit: type=1400 audit(1594.890:355): avc: denied { write } for pid=9205 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1597.020315][ T30] audit: type=1400 audit(1596.360:356): avc: denied { write } for pid=9208 comm="rm" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1597.944326][ T3189] 8021q: adding VLAN 0 to HW filter on device eth2 [ 1601.635442][ T8662] hsr_slave_0: left promiscuous mode [ 1601.654012][ T8662] hsr_slave_1: left promiscuous mode [ 1601.807679][ T8662] veth1_macvtap: left promiscuous mode [ 1601.812679][ T8662] veth0_macvtap: left promiscuous mode [ 1601.835488][ T8662] veth1_vlan: left promiscuous mode [ 1601.839755][ T8662] veth0_vlan: left promiscuous mode [ 1602.520894][ T30] audit: type=1400 audit(1601.890:357): avc: denied { write } for pid=9213 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1603.643011][ T30] audit: type=1400 audit(1603.010:358): avc: denied { write } for pid=9217 comm="rm" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1610.944655][ T3189] 8021q: adding VLAN 0 to HW filter on device eth3 [ 1612.924779][ T8662] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1613.557037][ T8662] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1614.033852][ T8662] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1614.451494][ T8662] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1615.182441][ T30] audit: type=1400 audit(1614.500:359): avc: denied { write } for pid=9222 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=716 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1