last executing test programs: 15m10.420535835s ago: executing program 1 (id=5165): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={r0, 0x4, 0x7ffffffffffffff2, 0x40000009}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0x5451, 0x0) 15m9.790018756s ago: executing program 1 (id=5167): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='net/ipv6_route\x00') pipe2(0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0x5450, 0x0) 15m9.026433771s ago: executing program 1 (id=5170): r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = dup(r0) write$cgroup_devices(r1, &(0x7f0000000180)={'c', ' *:* ', 'rwm\x00'}, 0xa) 15m7.401661122s ago: executing program 1 (id=5173): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x3ac5048, 0x0) 15m6.46699403s ago: executing program 1 (id=5174): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000fc0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001000)={0x0, 0x0}, &(0x7f0000001040)=0xc) ioprio_get$uid(0x3, r1) 15m5.733286773s ago: executing program 1 (id=5177): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = dup(r0) read$nci(r1, &(0x7f0000001800)=""/11, 0xb) 15m5.40747138s ago: executing program 32 (id=5177): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = dup(r0) read$nci(r1, &(0x7f0000001800)=""/11, 0xb) 19.862099145s ago: executing program 0 (id=7435): close(0xffffffffffffffff) r0 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) ioctl$TCSETSF2(r0, 0x5451, 0x0) 19.460620373s ago: executing program 0 (id=7437): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0x1, 0x6, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x4000}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r0, 0xffffffffffffffff}, &(0x7f0000000780), &(0x7f0000000740)}, 0x22) close_range(r1, 0xffffffffffffffff, 0x0) 18.795586725s ago: executing program 0 (id=7438): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 18.330976783s ago: executing program 0 (id=7440): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mount(&(0x7f0000000040)=@rnullb, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180)='ramfs\x00', 0x1200800, &(0x7f0000000240)='\x00') 17.856896572s ago: executing program 0 (id=7442): mkdirat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2\x00', 0x1ff) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs2/binder0\x00', 0x1949, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x5421, &(0x7f0000000300)) 16.389677329s ago: executing program 0 (id=7445): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = dup(r0) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000038c0)={0x0, 0x0, 0x0, 0x0, 0x0, "87d800e015e59987681145f91c004dd0457b49"}) 16.389506719s ago: executing program 33 (id=7445): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = dup(r0) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000038c0)={0x0, 0x0, 0x0, 0x0, 0x0, "87d800e015e59987681145f91c004dd0457b49"}) 4.418659539s ago: executing program 2 (id=7463): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet6_int(r1, 0x29, 0x4a, 0x0, &(0x7f0000000140)) 3.346516799s ago: executing program 2 (id=7464): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$NL80211_CMD_GET_MPATH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x4040000) 2.346167637s ago: executing program 2 (id=7465): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0x5451, 0x0) 1.457275043s ago: executing program 2 (id=7466): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$IPCTNL_MSG_CT_GET_STATS(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x40800}, 0x4000) 836.035025ms ago: executing program 2 (id=7467): setresuid(0x0, 0xee01, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={0x0, 0xf8}}, 0x0) 0s ago: executing program 2 (id=7468): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={0x0}}, 0x0) kernel console output (not intermixed with test programs): adm_t tclass=xdp_socket permissive=1 [ 861.550810][ T29] audit: type=1400 audit(860.950:226): avc: denied { read } for pid=6294 comm="syz.1.1388" path="socket:[13441]" dev="sockfs" ino=13441 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 863.484782][ T29] audit: type=1400 audit(862.890:227): avc: denied { watch } for pid=6307 comm="syz.0.1394" path=2F6D656D66643A2D263A0A2DB25D3B0FB2864E563626B83D945A7DFA577EAE8788EADED93D2D01202864656C6574656429 dev="tmpfs" ino=1036 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 872.512411][ T29] audit: type=1400 audit(871.920:228): avc: denied { block_suspend } for pid=6349 comm="syz.0.1414" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 886.692266][ T29] audit: type=1400 audit(886.100:229): avc: denied { getopt } for pid=6417 comm="syz.1.1448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 887.119748][ T29] audit: type=1400 audit(886.510:230): avc: denied { read } for pid=6419 comm="syz.0.1449" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 887.125026][ T29] audit: type=1400 audit(886.530:231): avc: denied { open } for pid=6419 comm="syz.0.1449" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 887.189166][ T29] audit: type=1400 audit(886.590:232): avc: denied { ioctl } for pid=6419 comm="syz.0.1449" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 889.795209][ T29] audit: type=1400 audit(889.200:233): avc: denied { ioctl } for pid=6431 comm="syz.0.1456" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 896.850847][ T29] audit: type=1400 audit(896.240:234): avc: denied { bind } for pid=6467 comm="syz.1.1473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 896.904401][ T29] audit: type=1400 audit(896.310:235): avc: denied { setopt } for pid=6467 comm="syz.1.1473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 901.371708][ T29] audit: type=1400 audit(900.770:236): avc: denied { ioctl } for pid=6488 comm="syz.0.1483" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=13756 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 903.660236][ T29] audit: type=1400 audit(903.050:237): avc: denied { create } for pid=6498 comm="syz.1.1488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 903.755723][ T29] audit: type=1400 audit(903.160:238): avc: denied { ioctl } for pid=6498 comm="syz.1.1488" path="socket:[14380]" dev="sockfs" ino=14380 ioctlcmd=0x480e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 946.485113][ T29] audit: type=1400 audit(945.890:239): avc: denied { append } for pid=6693 comm="syz.1.1581" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 963.567199][ T29] audit: type=1400 audit(962.950:240): avc: denied { open } for pid=6769 comm="syz.0.1619" path="/dev/ptyq4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 963.724254][ T29] audit: type=1400 audit(963.130:241): avc: denied { ioctl } for pid=6769 comm="syz.0.1619" path="/dev/ptyq4" dev="devtmpfs" ino=116 ioctlcmd=0x540a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 970.043917][ T29] audit: type=1400 audit(969.450:242): avc: denied { create } for pid=6798 comm="syz.1.1633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 970.082153][ T29] audit: type=1400 audit(969.490:243): avc: denied { setopt } for pid=6798 comm="syz.1.1633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 970.121371][ T29] audit: type=1400 audit(969.510:244): avc: denied { read } for pid=6798 comm="syz.1.1633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 974.332932][ T29] audit: type=1400 audit(973.740:245): avc: denied { create } for pid=6822 comm="syz.0.1645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 974.406243][ T29] audit: type=1400 audit(973.810:246): avc: denied { ioctl } for pid=6822 comm="syz.0.1645" path="socket:[15406]" dev="sockfs" ino=15406 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 974.457583][ T29] audit: type=1400 audit(973.860:247): avc: denied { write } for pid=6822 comm="syz.0.1645" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 988.450914][ T29] audit: type=1400 audit(987.860:248): avc: denied { getopt } for pid=6899 comm="syz.1.1683" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 998.386509][ T29] audit: type=1400 audit(997.790:249): avc: denied { create } for pid=6942 comm="syz.1.1703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 998.492248][ T29] audit: type=1400 audit(997.900:250): avc: denied { ioctl } for pid=6942 comm="syz.1.1703" path="socket:[15071]" dev="sockfs" ino=15071 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1020.246176][ T29] audit: type=1400 audit(1019.650:251): avc: denied { create } for pid=7038 comm="syz.0.1750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1020.269694][ T29] audit: type=1400 audit(1019.670:252): avc: denied { ioctl } for pid=7038 comm="syz.0.1750" path="socket:[15795]" dev="sockfs" ino=15795 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1048.714266][ T29] audit: type=1400 audit(1048.120:253): avc: denied { read } for pid=7180 comm="syz.1.1820" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1048.750458][ T29] audit: type=1400 audit(1048.150:254): avc: denied { open } for pid=7180 comm="syz.1.1820" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1049.871857][ T29] audit: type=1400 audit(1049.270:255): avc: denied { ioctl } for pid=7186 comm="syz.0.1823" path="socket:[16003]" dev="sockfs" ino=16003 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1049.916059][ T29] audit: type=1400 audit(1049.320:256): avc: denied { write } for pid=7186 comm="syz.0.1823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1055.190199][ T29] audit: type=1400 audit(1054.590:257): avc: denied { write } for pid=7213 comm="syz.0.1836" name="arp" dev="proc" ino=4026532638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1064.096748][ T29] audit: type=1400 audit(1063.500:258): avc: denied { read write } for pid=7262 comm="syz.0.1859" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1064.141113][ T29] audit: type=1400 audit(1063.530:259): avc: denied { open } for pid=7262 comm="syz.0.1859" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1064.523676][ T30] hid-generic 0008:0006:0007.0001: unknown main item tag 0x0 [ 1064.542666][ T30] hid-generic 0008:0006:0007.0001: unknown main item tag 0x0 [ 1064.546341][ T30] hid-generic 0008:0006:0007.0001: unknown main item tag 0x0 [ 1064.551753][ T30] hid-generic 0008:0006:0007.0001: unknown main item tag 0x0 [ 1064.553742][ T30] hid-generic 0008:0006:0007.0001: unknown main item tag 0x0 [ 1064.555609][ T30] hid-generic 0008:0006:0007.0001: unknown main item tag 0x0 [ 1064.557440][ T30] hid-generic 0008:0006:0007.0001: unknown main item tag 0x0 [ 1064.559799][ T30] hid-generic 0008:0006:0007.0001: unknown main item tag 0x0 [ 1064.561642][ T30] hid-generic 0008:0006:0007.0001: unknown main item tag 0x0 [ 1064.563582][ T30] hid-generic 0008:0006:0007.0001: unknown main item tag 0x0 [ 1064.676240][ T30] hid-generic 0008:0006:0007.0001: hidraw0: HID v0.0b Device [syz1] on syz1 [ 1067.333255][ T7272] fido_id[7272]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1070.663459][ T29] audit: type=1400 audit(1070.070:260): avc: denied { prog_load } for pid=7292 comm="syz.1.1873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1070.796869][ T29] audit: type=1400 audit(1070.190:261): avc: denied { prog_run } for pid=7292 comm="syz.1.1873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1074.891847][ T29] audit: type=1400 audit(1074.290:262): avc: denied { connect } for pid=7312 comm="syz.0.1883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1075.413687][ T29] audit: type=1400 audit(1074.820:263): avc: denied { write } for pid=7312 comm="syz.0.1883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1075.651756][ T29] audit: type=1400 audit(1075.060:264): avc: denied { allowed } for pid=7317 comm="syz.1.1885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1078.479851][ T29] audit: type=1400 audit(1077.880:265): avc: denied { write } for pid=7322 comm="syz.0.1887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1090.343374][ T7376] ======================================================= [ 1090.343374][ T7376] WARNING: The mand mount option has been deprecated and [ 1090.343374][ T7376] and is ignored by this kernel. Remove the mand [ 1090.343374][ T7376] option from the mount to silence this warning. [ 1090.343374][ T7376] ======================================================= [ 1090.401580][ T29] audit: type=1400 audit(1089.800:266): avc: denied { mount } for pid=7375 comm="syz.0.1913" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1090.582362][ T29] audit: type=1400 audit(1089.970:267): avc: denied { unmount } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1099.903552][ T29] audit: type=1400 audit(1099.310:268): avc: denied { bind } for pid=7426 comm="syz.0.1938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1105.306316][ T29] audit: type=1400 audit(1104.710:269): avc: denied { write } for pid=7444 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1107.797209][ T29] audit: type=1400 audit(1107.200:270): avc: denied { write } for pid=7459 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1134.765520][ T29] audit: type=1400 audit(1134.170:271): avc: denied { write } for pid=7602 comm="syz.1.2022" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1143.563718][ T29] audit: type=1400 audit(1142.970:272): avc: denied { connect } for pid=7644 comm="syz.1.2042" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1151.099913][ T29] audit: type=1400 audit(1150.480:273): avc: denied { map_create } for pid=7677 comm="syz.1.2059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1151.100808][ T29] audit: type=1400 audit(1150.490:274): avc: denied { map_write } for pid=7677 comm="syz.1.2059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1153.335596][ T29] audit: type=1400 audit(1152.740:275): avc: denied { ioctl } for pid=7686 comm="syz.1.2063" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3309 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1154.929990][ T29] audit: type=1400 audit(1154.320:276): avc: denied { nlmsg_read } for pid=7694 comm="syz.0.2067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1157.864953][ T29] audit: type=1400 audit(1157.270:277): avc: denied { append } for pid=7708 comm="syz.0.2074" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1158.034951][ T29] audit: type=1400 audit(1157.440:278): avc: denied { create } for pid=7709 comm="syz.1.2075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1158.063364][ T29] audit: type=1400 audit(1157.470:279): avc: denied { ioctl } for pid=7709 comm="syz.1.2075" path="socket:[17963]" dev="sockfs" ino=17963 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1168.141017][ T29] audit: type=1400 audit(1167.540:280): avc: denied { map_read } for pid=7736 comm="syz.1.2087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1184.113516][ T7797] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 1184.175501][ T7797] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 1188.433738][ T7822] binder: 7820:7822 ioctl c0306201 0 returned -14 [ 1188.452136][ T7822] binder: 7820:7822 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 [ 1188.453317][ T7822] binder: 7820:7822 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 1188.454227][ T7822] binder: 7820:7822 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 1188.454593][ T7822] binder: 7822 RLIMIT_NICE not set [ 1195.002604][ T29] audit: type=1400 audit(1194.390:281): avc: denied { lock } for pid=7855 comm="syz.1.2142" path="socket:[18226]" dev="sockfs" ino=18226 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1202.452477][ T4392] hid_parser_main: 43 callbacks suppressed [ 1202.457303][ T4392] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 1202.551373][ T4392] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1205.706404][ T7896] fido_id[7896]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1214.125431][ T29] audit: type=1400 audit(1213.530:282): avc: denied { setopt } for pid=7943 comm="syz.0.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1236.046592][ T29] audit: type=1400 audit(1235.450:283): avc: denied { read write } for pid=8048 comm="syz.0.2235" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1236.047579][ T29] audit: type=1400 audit(1235.450:284): avc: denied { open } for pid=8048 comm="syz.0.2235" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1245.164153][ T29] audit: type=1400 audit(1244.570:285): avc: denied { mount } for pid=8094 comm="syz.1.2257" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1245.202544][ T29] audit: type=1400 audit(1244.590:286): avc: denied { remount } for pid=8094 comm="syz.1.2257" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1245.573226][ T29] audit: type=1400 audit(1244.980:287): avc: denied { unmount } for pid=3344 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1250.142423][ T29] audit: type=1400 audit(1249.550:288): avc: denied { connect } for pid=8123 comm="syz.0.2272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1252.293275][ T29] audit: type=1400 audit(1251.700:289): avc: denied { write } for pid=8137 comm="syz.1.2279" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1255.912949][ T10] hid-generic 0081:0011:FFFFFF81.0003: hidraw0: HID v0.00 Device [syz0] on syz0 [ 1258.979143][ T29] audit: type=1400 audit(1258.370:290): avc: denied { append } for pid=8174 comm="syz.0.2297" name="nbd0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1260.186703][ T8166] fido_id[8166]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1269.619957][ T29] audit: type=1400 audit(1269.010:291): avc: denied { checkpoint_restore } for pid=8224 comm="syz.0.2322" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1278.176934][ T29] audit: type=1400 audit(1277.580:292): avc: denied { getattr } for pid=8255 comm="syz.1.2337" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1279.511785][ T3412] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 1279.593301][ T29] audit: type=1400 audit(1279.000:293): avc: denied { read } for pid=8263 comm="syz.1.2341" path="socket:[19289]" dev="sockfs" ino=19289 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1279.751308][ T3412] usb 1-1: Using ep0 maxpacket: 32 [ 1279.819868][ T3412] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 1279.829612][ T3412] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 1279.831215][ T3412] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1279.834592][ T3412] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 1279.836032][ T3412] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1279.839110][ T3412] usb 1-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 1279.840561][ T3412] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1279.920956][ T3412] usb 1-1: config 0 descriptor?? [ 1280.345836][ T3412] usblp 1-1:0.0: usblp0: USB Bidirectional printer dev 2 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 1285.856494][ T29] audit: type=1400 audit(1285.260:294): avc: denied { write } for pid=8278 comm="syz.1.2348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1290.421557][ T4392] usb 1-1: USB disconnect, device number 2 [ 1290.549864][ T4392] usblp0: removed [ 1292.570270][ T29] audit: type=1400 audit(1291.980:295): avc: denied { map } for pid=8311 comm="syz.1.2364" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1292.600064][ T8313] binder_alloc: binder_alloc_mmap_handler: 8311 20ffd000-20fff000 already mapped failed -16 [ 1293.249422][ T29] audit: type=1400 audit(1292.650:296): avc: denied { execute } for pid=8316 comm="syz.0.2367" name="file2" dev="tmpfs" ino=5983 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1293.261201][ T8318] binfmt_misc: register: failed to install interpreter file ./file2 [ 1295.225426][ T29] audit: type=1400 audit(1294.630:297): avc: denied { create } for pid=8328 comm="syz.0.2373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1295.283078][ T29] audit: type=1400 audit(1294.690:298): avc: denied { setopt } for pid=8328 comm="syz.0.2373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1297.583908][ T29] audit: type=1400 audit(1296.970:299): avc: denied { read } for pid=8342 comm="syz.0.2379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1298.140291][ T29] audit: type=1400 audit(1297.540:300): avc: denied { write } for pid=8342 comm="syz.0.2379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1318.945371][ T29] audit: type=1400 audit(1318.350:301): avc: denied { mount } for pid=8465 comm="syz.1.2439" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1319.004045][ T29] audit: type=1400 audit(1318.410:302): avc: denied { remount } for pid=8465 comm="syz.1.2439" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1319.331099][ T29] audit: type=1400 audit(1318.730:303): avc: denied { unmount } for pid=3344 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1346.989384][ T29] audit: type=1400 audit(1346.390:304): avc: denied { ioctl } for pid=8617 comm="syz.0.2515" path="socket:[21563]" dev="sockfs" ino=21563 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1351.192785][ T29] audit: type=1400 audit(1350.600:305): avc: denied { bind } for pid=8637 comm="syz.1.2525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1357.259853][ T4392] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 1357.447433][ T4392] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1357.449403][ T4392] usb 1-1: New USB device found, idVendor=1770, idProduct=ff00, bcdDevice= 0.00 [ 1357.449549][ T4392] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1357.507575][ T4392] usb 1-1: config 0 descriptor?? [ 1357.686161][ T4392] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 1357.859704][ T4392] usb 1-1: USB disconnect, device number 3 [ 1366.280402][ T917] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 1366.590563][ T917] usb 1-1: config 1 has an invalid interface number: 7 but max is 0 [ 1366.591355][ T917] usb 1-1: config 1 has no interface number 0 [ 1366.592087][ T917] usb 1-1: config 1 interface 7 altsetting 0 has an endpoint descriptor with address 0xDB, changing to 0x8B [ 1366.592451][ T917] usb 1-1: config 1 interface 7 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 1366.592767][ T917] usb 1-1: config 1 interface 7 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1366.662374][ T917] usb 1-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 1366.664363][ T917] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1366.666120][ T917] usb 1-1: Product: syz [ 1366.667397][ T917] usb 1-1: Manufacturer: syz [ 1366.670183][ T917] usb 1-1: SerialNumber: syz [ 1366.746859][ T8708] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1367.007564][ T8708] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1367.611434][ T917] sierra_net 1-1:1.7 wwan0: register 'sierra_net' at usb-dummy_hcd.0-1, Sierra Wireless USB-to-WWAN Modem, 00:00:00:00:01:07 [ 1367.690910][ T917] sierra_net 1-1:1.7 wwan0: Submit SYNC failed -71 [ 1367.709433][ T917] sierra_net 1-1:1.7 wwan0: Send SYNC failed, status -71 [ 1367.779491][ T917] sierra_net 1-1:1.7 wwan0: Submit SYNC failed -71 [ 1367.788569][ T917] sierra_net 1-1:1.7 wwan0: Send SYNC failed, status -71 [ 1368.121338][ T917] usb 1-1: USB disconnect, device number 4 [ 1368.665699][ T917] sierra_net 1-1:1.7 wwan0: unregister 'sierra_net' usb-dummy_hcd.0-1, Sierra Wireless USB-to-WWAN Modem [ 1369.046606][ T917] sierra_net 1-1:1.7 wwan0 (unregistered): usb_control_msg failed, status -19 [ 1370.690396][ T29] audit: type=1400 audit(1370.090:306): avc: denied { setopt } for pid=8724 comm="syz.0.2565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1371.454483][ T29] audit: type=1400 audit(1370.840:307): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1374.955981][ T29] audit: type=1400 audit(1374.340:308): avc: denied { write } for pid=8748 comm="syz.1.2577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1377.875688][ T29] audit: type=1400 audit(1377.280:309): avc: denied { setopt } for pid=8765 comm="syz.1.2585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1391.585406][ T29] audit: type=1400 audit(1390.990:310): avc: denied { bind } for pid=8835 comm="syz.1.2619" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1391.649822][ T29] audit: type=1400 audit(1391.040:311): avc: denied { name_bind } for pid=8835 comm="syz.1.2619" src=20005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1391.662287][ T29] audit: type=1400 audit(1391.040:312): avc: denied { node_bind } for pid=8835 comm="syz.1.2619" saddr=172.20.20.16 src=20005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1407.880890][ T4392] usb 1-1: new low-speed USB device number 5 using dummy_hcd [ 1408.253783][ T4392] usb 1-1: config 0 has an invalid interface number: 1 but max is 0 [ 1408.254534][ T4392] usb 1-1: config 0 has no interface number 0 [ 1408.259980][ T4392] usb 1-1: config 0 interface 1 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 10 [ 1408.260854][ T4392] usb 1-1: config 0 interface 1 altsetting 0 endpoint 0x82 has invalid maxpacket 159, setting to 8 [ 1408.261260][ T4392] usb 1-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 1408.261384][ T4392] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1408.459604][ T4392] usb 1-1: config 0 descriptor?? [ 1408.569712][ T8917] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1408.697163][ T4392] iowarrior 1-1:0.1: IOWarrior product=0x1512, serial= interface=1 now attached to iowarrior0 [ 1408.869929][ T4392] usb 1-1: USB disconnect, device number 5 [ 1409.689041][ T29] audit: type=1400 audit(1409.090:313): avc: denied { write } for pid=8921 comm="syz.1.2659" path="socket:[21395]" dev="sockfs" ino=21395 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1459.561035][ T29] audit: type=1400 audit(1458.960:314): avc: denied { lock } for pid=9186 comm="syz.0.2786" path="socket:[23636]" dev="sockfs" ino=23636 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1468.133420][ T29] audit: type=1400 audit(1467.510:315): avc: denied { append } for pid=9235 comm="syz.0.2808" name="dlm-monitor" dev="devtmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1469.905715][ T9244] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2812'. [ 1477.722075][ T9277] input: syz1 as /devices/virtual/input/input3 [ 1487.086404][ T29] audit: type=1400 audit(1486.490:316): avc: denied { mount } for pid=9320 comm="syz.0.2849" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1487.126119][ T29] audit: type=1400 audit(1486.530:317): avc: denied { remount } for pid=9320 comm="syz.0.2849" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1487.413167][ T29] audit: type=1400 audit(1486.820:318): avc: denied { unmount } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1494.485486][ T29] audit: type=1400 audit(1493.870:319): avc: denied { mounton } for pid=9371 comm="syz.1.2875" path="/1437/file0" dev="tmpfs" ino=7313 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1494.936146][ T29] audit: type=1400 audit(1494.340:320): avc: denied { unmount } for pid=3344 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1499.759547][ T29] audit: type=1400 audit(1499.160:321): avc: denied { append } for pid=9401 comm="syz.1.2889" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1551.970196][ T29] audit: type=1400 audit(1551.370:322): avc: denied { read write } for pid=9689 comm="syz.1.3028" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1551.985984][ T29] audit: type=1400 audit(1551.390:323): avc: denied { ioctl open } for pid=9689 comm="syz.1.3028" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1582.059082][ T29] audit: type=1400 audit(1581.460:324): avc: denied { remount } for pid=9829 comm="syz.1.3097" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1590.329795][ T29] audit: type=1400 audit(1589.700:325): avc: denied { write } for pid=9867 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1593.011323][ T29] audit: type=1400 audit(1592.410:326): avc: denied { write } for pid=9885 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1596.246516][ T29] audit: type=1400 audit(1595.650:327): avc: denied { write } for pid=9906 comm="syz.1.3131" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1617.651749][ T29] audit: type=1400 audit(1617.060:328): avc: denied { read } for pid=10012 comm="syz.0.3184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1666.873482][ T29] audit: type=1400 audit(1666.280:329): avc: denied { setattr } for pid=10292 comm="syz.0.3317" name="tun" dev="devtmpfs" ino=690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 1672.032260][ T29] audit: type=1400 audit(1671.440:330): avc: denied { ioctl } for pid=10322 comm="syz.0.3331" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1674.311464][ T29] audit: type=1400 audit(1673.720:331): avc: denied { write } for pid=10336 comm="syz.1.3338" path="socket:[27657]" dev="sockfs" ino=27657 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1681.432953][ T29] audit: type=1400 audit(1680.840:332): avc: denied { bind } for pid=10355 comm="syz.1.3347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1683.025959][ T29] audit: type=1400 audit(1682.430:333): avc: denied { write } for pid=10366 comm="syz.0.3353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1713.586739][T10483] hid-generic 0003:0006:0002.0004: unknown main item tag 0x0 [ 1713.611457][T10483] hid-generic 0003:0006:0002.0004: unknown main item tag 0x0 [ 1713.615723][T10483] hid-generic 0003:0006:0002.0004: unknown main item tag 0x0 [ 1713.624074][T10483] hid-generic 0003:0006:0002.0004: unknown main item tag 0x0 [ 1713.626584][T10483] hid-generic 0003:0006:0002.0004: unknown main item tag 0x0 [ 1713.645625][T10483] hid-generic 0003:0006:0002.0004: unknown main item tag 0x0 [ 1713.646450][T10483] hid-generic 0003:0006:0002.0004: unknown main item tag 0x0 [ 1713.646828][T10483] hid-generic 0003:0006:0002.0004: unknown main item tag 0x0 [ 1713.647176][T10483] hid-generic 0003:0006:0002.0004: unknown main item tag 0x0 [ 1713.647535][T10483] hid-generic 0003:0006:0002.0004: unknown main item tag 0x0 [ 1713.765227][T10483] hid-generic 0003:0006:0002.0004: hidraw0: USB HID v0.01 Device [syz1] on syz0 [ 1715.885653][T10538] fido_id[10538]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1716.769672][ T29] audit: type=1400 audit(1716.170:334): avc: denied { connect } for pid=10552 comm="syz.1.3441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1723.333984][ T29] audit: type=1400 audit(1722.740:335): avc: denied { watch watch_reads } for pid=10597 comm="syz.0.3462" path="/proc/3496" dev="proc" ino=27054 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1724.672116][ T29] audit: type=1400 audit(1724.070:336): avc: denied { watch watch_reads } for pid=10607 comm="syz.0.3467" path="/dev/dlm-monitor" dev="devtmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1743.645764][T10712] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3515'. [ 1750.847240][ T29] audit: type=1400 audit(1750.250:337): avc: denied { connect } for pid=10753 comm="syz.0.3537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1753.261442][T10771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10771 comm=syz.1.3544 [ 1761.237131][ T29] audit: type=1400 audit(1760.640:338): avc: denied { append } for pid=10823 comm="syz.1.3569" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1769.326468][ T29] audit: type=1400 audit(1768.730:339): avc: denied { append } for pid=10869 comm="syz.1.3590" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1771.371288][ T29] audit: type=1400 audit(1770.770:340): avc: denied { connect } for pid=10881 comm="syz.0.3597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1774.885429][ T29] audit: type=1400 audit(1774.290:341): avc: denied { read write } for pid=3344 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1774.895023][ T29] audit: type=1400 audit(1774.300:342): avc: denied { open } for pid=3344 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1774.906775][ T29] audit: type=1400 audit(1774.310:343): avc: denied { ioctl } for pid=3344 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1778.829414][ T29] audit: type=1400 audit(1778.230:344): avc: denied { read write } for pid=10924 comm="syz.0.3617" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1778.833374][ T29] audit: type=1400 audit(1778.230:345): avc: denied { open } for pid=10924 comm="syz.0.3617" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1778.860135][ T29] audit: type=1400 audit(1778.260:346): avc: denied { ioctl } for pid=10924 comm="syz.0.3617" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x450a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1779.481318][ T29] audit: type=1400 audit(1778.890:347): avc: denied { read } for pid=10930 comm="syz.1.3620" dev="nsfs" ino=4026532711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1779.483687][ T29] audit: type=1400 audit(1778.890:348): avc: denied { open } for pid=10930 comm="syz.1.3620" path="net:[4026532711]" dev="nsfs" ino=4026532711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1779.495245][ T29] audit: type=1400 audit(1778.890:349): avc: denied { create } for pid=10930 comm="syz.1.3620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1779.506279][ T29] audit: type=1400 audit(1778.910:350): avc: denied { write } for pid=10930 comm="syz.1.3620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1780.180253][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 1780.191204][ T29] audit: type=1400 audit(1779.580:352): avc: denied { read } for pid=10930 comm="syz.1.3620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1786.064988][ T29] audit: type=1400 audit(1785.470:353): avc: denied { create } for pid=10953 comm="syz.1.3630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1786.161429][ T29] audit: type=1400 audit(1785.550:354): avc: denied { getattr } for pid=10953 comm="syz.1.3630" path="socket:[29714]" dev="sockfs" ino=29714 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1788.206635][ T29] audit: type=1400 audit(1787.610:355): avc: denied { block_suspend } for pid=10965 comm="syz.1.3636" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1788.656306][ T29] audit: type=1400 audit(1788.060:356): avc: denied { create } for pid=10969 comm="syz.1.3638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1791.819144][ T29] audit: type=1400 audit(1791.220:357): avc: denied { allowed } for pid=10982 comm="syz.0.3644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1791.836196][ T29] audit: type=1400 audit(1791.240:358): avc: denied { create } for pid=10982 comm="syz.0.3644" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1795.466789][ T29] audit: type=1400 audit(1794.870:359): avc: denied { read write } for pid=10994 comm="syz.1.3649" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1795.473662][ T29] audit: type=1400 audit(1794.870:360): avc: denied { open } for pid=10994 comm="syz.1.3649" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1800.089238][ T29] audit: type=1400 audit(1799.480:361): avc: denied { create } for pid=11020 comm="syz.1.3661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1800.112428][ T29] audit: type=1400 audit(1799.520:362): avc: denied { write } for pid=11020 comm="syz.1.3661" path="socket:[28812]" dev="sockfs" ino=28812 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1800.686607][ T29] audit: type=1400 audit(1800.090:363): avc: denied { setopt } for pid=11020 comm="syz.1.3661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1801.381692][ T29] audit: type=1400 audit(1800.790:364): avc: denied { ioctl } for pid=11030 comm="syz.0.3665" path="socket:[29835]" dev="sockfs" ino=29835 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1801.396616][ T29] audit: type=1400 audit(1800.800:365): avc: denied { write } for pid=11030 comm="syz.0.3665" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1803.354777][ T29] audit: type=1400 audit(1802.760:366): avc: denied { create } for pid=11040 comm="syz.1.3670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1803.372491][ T29] audit: type=1400 audit(1802.780:367): avc: denied { write } for pid=11040 comm="syz.1.3670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1804.721984][ T29] audit: type=1400 audit(1804.130:368): avc: denied { map } for pid=11048 comm="syz.0.3674" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28849 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1804.725360][ T29] audit: type=1400 audit(1804.130:369): avc: denied { read write } for pid=11048 comm="syz.0.3674" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28849 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1806.046721][ T29] audit: type=1400 audit(1805.450:370): avc: denied { create } for pid=11056 comm="syz.0.3678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1806.135028][ T29] audit: type=1400 audit(1805.540:371): avc: denied { setopt } for pid=11056 comm="syz.0.3678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1813.093758][ T29] audit: type=1400 audit(1812.500:372): avc: denied { create } for pid=11099 comm="syz.1.3699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1813.116917][ T29] audit: type=1400 audit(1812.520:373): avc: denied { read } for pid=11099 comm="syz.1.3699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1813.643555][ T29] audit: type=1400 audit(1813.050:374): avc: denied { write } for pid=11099 comm="syz.1.3699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1820.585548][T11143] netlink: 60 bytes leftover after parsing attributes in process `syz.1.3719'. [ 1832.366409][ T29] audit: type=1400 audit(1831.770:375): avc: denied { read } for pid=11205 comm="syz.1.3750" name="iommu" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1832.393446][ T29] audit: type=1400 audit(1831.800:376): avc: denied { open } for pid=11205 comm="syz.1.3750" path="/dev/iommu" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1832.450357][ T29] audit: type=1400 audit(1831.850:377): avc: denied { ioctl } for pid=11205 comm="syz.1.3750" path="/dev/iommu" dev="devtmpfs" ino=615 ioctlcmd=0x3b89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1836.333651][ T29] audit: type=1400 audit(1835.740:378): avc: denied { execute } for pid=11235 comm="syz.0.3764" name="file0" dev="tmpfs" ino=9550 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1837.917358][T11249] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11249 comm=syz.0.3770 [ 1840.327275][ T29] audit: type=1400 audit(1839.730:379): avc: denied { create } for pid=11260 comm="syz.1.3777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1840.382244][ T29] audit: type=1400 audit(1839.770:380): avc: denied { bind } for pid=11260 comm="syz.1.3777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1840.392005][ T29] audit: type=1400 audit(1839.800:381): avc: denied { setopt } for pid=11260 comm="syz.1.3777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1840.466437][ T29] audit: type=1400 audit(1839.870:382): avc: denied { create } for pid=11262 comm="syz.0.3778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1840.485918][ T29] audit: type=1400 audit(1839.890:383): avc: denied { getopt } for pid=11262 comm="syz.0.3778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1841.557554][ T29] audit: type=1400 audit(1840.960:384): avc: denied { setopt } for pid=11268 comm="syz.1.3782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1843.260953][ T29] audit: type=1400 audit(1842.650:385): avc: denied { read } for pid=11282 comm="syz.1.3787" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1843.261880][ T29] audit: type=1400 audit(1842.670:386): avc: denied { open } for pid=11282 comm="syz.1.3787" path="/dev/dri/card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1843.315181][ T29] audit: type=1400 audit(1842.710:387): avc: denied { ioctl } for pid=11282 comm="syz.1.3787" path="/dev/dri/card1" dev="devtmpfs" ino=619 ioctlcmd=0x64c6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1847.889484][ T29] audit: type=1400 audit(1847.290:388): avc: denied { read write } for pid=11313 comm="syz.0.3802" name="vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1847.893587][ T29] audit: type=1400 audit(1847.290:389): avc: denied { open } for pid=11313 comm="syz.0.3802" path="/dev/vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1847.902371][ T29] audit: type=1400 audit(1847.300:390): avc: denied { ioctl } for pid=11313 comm="syz.0.3802" path="/dev/vhost-net" dev="devtmpfs" ino=715 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1848.884056][ T29] audit: type=1400 audit(1848.290:391): avc: denied { create } for pid=11319 comm="syz.1.3805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1848.931087][ T29] audit: type=1400 audit(1848.310:392): avc: denied { ioctl } for pid=11319 comm="syz.1.3805" path="socket:[30284]" dev="sockfs" ino=30284 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1853.054501][ T29] audit: type=1400 audit(1852.460:393): avc: denied { prog_load } for pid=11347 comm="syz.1.3818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1853.081268][ T29] audit: type=1400 audit(1852.480:394): avc: denied { bpf } for pid=11347 comm="syz.1.3818" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1854.354829][ T29] audit: type=1400 audit(1853.760:395): avc: denied { write } for pid=11356 comm="syz.1.3823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1856.978468][ T29] audit: type=1400 audit(1856.380:396): avc: denied { map_create } for pid=11372 comm="syz.1.3830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1856.981503][ T29] audit: type=1400 audit(1856.390:397): avc: denied { perfmon } for pid=11372 comm="syz.1.3830" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1857.074452][ T29] audit: type=1400 audit(1856.480:398): avc: denied { map_read map_write } for pid=11372 comm="syz.1.3830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1871.677458][ T29] audit: type=1400 audit(1871.080:399): avc: denied { mounton } for pid=11451 comm="syz.1.3868" path="/1934/file0" dev="tmpfs" ino=9844 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1871.693216][ T29] audit: type=1400 audit(1871.100:400): avc: denied { mount } for pid=11451 comm="syz.1.3868" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1871.789535][ T29] audit: type=1400 audit(1871.190:401): avc: denied { unmount } for pid=3344 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1876.220711][ T29] audit: type=1400 audit(1875.630:402): avc: denied { write } for pid=11482 comm="syz.1.3883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1884.087661][ T29] audit: type=1400 audit(1883.490:403): avc: denied { accept } for pid=11517 comm="syz.0.3900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1887.092755][ T29] audit: type=1400 audit(1886.500:404): avc: denied { setopt } for pid=11528 comm="syz.0.3905" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1887.112340][ T29] audit: type=1400 audit(1886.520:405): avc: denied { connect } for pid=11528 comm="syz.0.3905" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1888.775668][ T29] audit: type=1400 audit(1888.180:406): avc: denied { read } for pid=11537 comm="syz.1.3909" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1888.776856][ T29] audit: type=1400 audit(1888.180:407): avc: denied { open } for pid=11537 comm="syz.1.3909" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1888.817400][ T29] audit: type=1400 audit(1888.210:408): avc: denied { ioctl } for pid=11537 comm="syz.1.3909" path="/dev/fb0" dev="devtmpfs" ino=620 ioctlcmd=0x4605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1890.556900][ T29] audit: type=1400 audit(1889.960:409): avc: denied { search } for pid=11545 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1890.557580][ T29] audit: type=1400 audit(1889.960:410): avc: denied { search } for pid=11545 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=512 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1890.564149][ T29] audit: type=1400 audit(1889.960:411): avc: denied { search } for pid=11545 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1890.569538][ T29] audit: type=1400 audit(1889.960:412): avc: denied { search } for pid=11545 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=667 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1890.789271][ T29] audit: type=1400 audit(1890.190:413): avc: denied { read } for pid=11550 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=667 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1890.790151][ T29] audit: type=1400 audit(1890.190:414): avc: denied { read open } for pid=11550 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=667 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1890.812786][ T29] audit: type=1400 audit(1890.200:415): avc: denied { getattr } for pid=11550 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=667 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1891.073214][ T29] audit: type=1400 audit(1890.460:416): avc: denied { write } for pid=11545 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1891.074157][ T29] audit: type=1400 audit(1890.480:417): avc: denied { add_name } for pid=11545 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1891.079920][ T29] audit: type=1400 audit(1890.480:418): avc: denied { create } for pid=11545 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1891.722071][T11555] lo: entered allmulticast mode [ 1908.426101][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 1908.426904][ T29] audit: type=1400 audit(1907.830:426): avc: denied { read write } for pid=11649 comm="syz.1.3961" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1908.440459][ T29] audit: type=1400 audit(1907.850:427): avc: denied { open } for pid=11649 comm="syz.1.3961" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1908.450573][ T29] audit: type=1400 audit(1907.860:428): avc: denied { ioctl } for pid=11649 comm="syz.1.3961" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1908.946320][ T29] audit: type=1400 audit(1908.340:429): avc: denied { ioctl } for pid=11653 comm="syz.0.3963" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=31934 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1910.863950][ T29] audit: type=1400 audit(1910.260:430): avc: denied { audit_write } for pid=11662 comm="syz.1.3967" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1922.259759][ T29] audit: type=1400 audit(1921.650:431): avc: denied { create } for pid=11724 comm="syz.0.3996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1922.801164][ T29] audit: type=1400 audit(1922.200:432): avc: denied { setopt } for pid=11724 comm="syz.0.3996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1928.743889][ T29] audit: type=1400 audit(1928.140:433): avc: denied { read write } for pid=11767 comm="syz.1.4017" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1928.755883][ T29] audit: type=1400 audit(1928.150:434): avc: denied { open } for pid=11767 comm="syz.1.4017" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1928.794491][T11768] ucma_write: process 4091 (syz.1.4017) changed security contexts after opening file descriptor, this is not allowed. [ 1932.430194][ T29] audit: type=1400 audit(1931.830:435): avc: denied { create } for pid=11792 comm="syz.1.4028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1932.450503][ T29] audit: type=1400 audit(1931.850:436): avc: denied { setopt } for pid=11792 comm="syz.1.4028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1932.451428][ T29] audit: type=1400 audit(1931.850:437): avc: denied { getopt } for pid=11792 comm="syz.1.4028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1932.664427][ T29] audit: type=1400 audit(1932.070:438): avc: denied { open } for pid=11794 comm="syz.0.4029" path="/dev/ptyq4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1932.699423][ T29] audit: type=1400 audit(1932.100:439): avc: denied { ioctl } for pid=11794 comm="syz.0.4029" path="/dev/ttyq4" dev="devtmpfs" ino=372 ioctlcmd=0x5404 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1933.527628][ T29] audit: type=1400 audit(1932.930:440): avc: denied { connect } for pid=11801 comm="syz.0.4032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1933.942571][ T29] audit: type=1400 audit(1933.350:441): avc: denied { write } for pid=11804 comm="syz.0.4035" path="socket:[32171]" dev="sockfs" ino=32171 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1933.984954][ T29] audit: type=1400 audit(1933.390:442): avc: denied { getopt } for pid=11805 comm="syz.1.4034" laddr=fe80::aa lport=58 faddr=ff03::1 fport=65534 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1935.127222][ T29] audit: type=1400 audit(1934.520:443): avc: denied { append } for pid=11814 comm="syz.1.4039" name="iommu" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1937.634379][ T29] audit: type=1400 audit(1937.040:444): avc: denied { write } for pid=11830 comm="syz.1.4048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1937.670772][ T29] audit: type=1400 audit(1937.070:445): avc: denied { read } for pid=11830 comm="syz.1.4048" path="socket:[32216]" dev="sockfs" ino=32216 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1943.553692][T11867] binfmt_misc: register: failed to install interpreter file ./file0 [ 1945.961098][ T29] audit: type=1400 audit(1945.350:446): avc: denied { watch watch_reads } for pid=11877 comm="syz.0.4070" path="/proc/4144/pagemap" dev="proc" ino=32279 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 1948.577540][T11889] loop4: detected capacity change from 0 to 7 [ 1951.201958][ T29] audit: type=1400 audit(1950.600:447): avc: denied { watch watch_reads } for pid=11898 comm="syz.0.4079" path="/2040/cpu.stat" dev="tmpfs" ino=10388 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1953.706039][ T29] audit: type=1400 audit(1953.110:448): avc: denied { connect } for pid=11907 comm="syz.0.4084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1957.265919][ T29] audit: type=1400 audit(1956.670:449): avc: denied { remount } for pid=11928 comm="syz.1.4093" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1964.211351][ T29] audit: type=1400 audit(1963.620:450): avc: denied { create } for pid=11963 comm="syz.1.4111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1964.235601][ T29] audit: type=1400 audit(1963.640:451): avc: denied { prog_run } for pid=11963 comm="syz.1.4111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1964.241736][ T29] audit: type=1400 audit(1963.640:452): avc: denied { setopt } for pid=11963 comm="syz.1.4111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1976.162648][ T29] audit: type=1400 audit(1975.570:453): avc: denied { sys_module } for pid=12039 comm="syz.0.4146" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1991.014457][ T29] audit: type=1400 audit(1990.380:454): avc: denied { create } for pid=12112 comm="syz.1.4179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1991.043176][ T29] audit: type=1400 audit(1990.450:455): avc: denied { bind } for pid=12112 comm="syz.1.4179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1991.073562][ T29] audit: type=1400 audit(1990.480:456): avc: denied { write } for pid=12112 comm="syz.1.4179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2003.125464][ T29] audit: type=1400 audit(2002.530:457): avc: denied { read } for pid=12178 comm="syz.0.4210" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2003.126466][ T29] audit: type=1400 audit(2002.530:458): avc: denied { open } for pid=12178 comm="syz.0.4210" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2003.152561][ T29] audit: type=1400 audit(2002.550:459): avc: denied { ioctl } for pid=12178 comm="syz.0.4210" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x7014 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2006.727022][ T29] audit: type=1400 audit(2006.130:460): avc: denied { create } for pid=12193 comm="syz.1.4218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2006.781552][ T29] audit: type=1400 audit(2006.190:461): avc: denied { setopt } for pid=12193 comm="syz.1.4218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2021.019277][ T29] audit: type=1400 audit(2020.420:462): avc: denied { unlink } for pid=3343 comm="syz-executor" name="bus" dev="tmpfs" ino=10887 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2024.927084][ T29] audit: type=1400 audit(2024.330:463): avc: denied { append } for pid=12313 comm="syz.1.4277" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2026.573139][ T29] audit: type=1400 audit(2025.980:464): avc: denied { read write } for pid=12322 comm="syz.0.4281" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2026.577014][ T29] audit: type=1400 audit(2025.980:465): avc: denied { open } for pid=12322 comm="syz.0.4281" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2026.650495][ T30] hid_parser_main: 149 callbacks suppressed [ 2026.653984][ T30] hid-generic 00A0:0006:0003.0005: unknown main item tag 0x0 [ 2026.654683][ T30] hid-generic 00A0:0006:0003.0005: unknown main item tag 0x0 [ 2026.654957][ T30] hid-generic 00A0:0006:0003.0005: unknown main item tag 0x0 [ 2026.655218][ T30] hid-generic 00A0:0006:0003.0005: unknown main item tag 0x0 [ 2026.655483][ T30] hid-generic 00A0:0006:0003.0005: unknown main item tag 0x0 [ 2026.655741][ T30] hid-generic 00A0:0006:0003.0005: unknown main item tag 0x0 [ 2026.655994][ T30] hid-generic 00A0:0006:0003.0005: unknown main item tag 0x0 [ 2026.656248][ T30] hid-generic 00A0:0006:0003.0005: unknown main item tag 0x0 [ 2026.656496][ T30] hid-generic 00A0:0006:0003.0005: unknown main item tag 0x0 [ 2026.665734][ T30] hid-generic 00A0:0006:0003.0005: unknown main item tag 0x0 [ 2026.797102][ T30] hid-generic 00A0:0006:0003.0005: hidraw0: HID v0.05 Device [syz1] on syz0 [ 2028.289744][T12324] fido_id[12324]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2030.392921][ T29] audit: type=1400 audit(2029.800:466): avc: denied { ioctl } for pid=12337 comm="syz.0.4288" path="socket:[33032]" dev="sockfs" ino=33032 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2043.362193][ T29] audit: type=1400 audit(2042.770:467): avc: denied { ioctl } for pid=12420 comm="syz.0.4329" path="socket:[34222]" dev="sockfs" ino=34222 ioctlcmd=0x662c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2043.370329][ T29] audit: type=1400 audit(2042.780:468): avc: denied { write } for pid=12420 comm="syz.0.4329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2044.945986][ T29] audit: type=1400 audit(2044.350:469): avc: denied { lock } for pid=12432 comm="syz.0.4335" path="socket:[34246]" dev="sockfs" ino=34246 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 2053.723736][ T29] audit: type=1400 audit(2053.130:470): avc: denied { append } for pid=12496 comm="syz.1.4366" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2055.995315][ T29] audit: type=1400 audit(2055.400:471): avc: denied { read } for pid=12516 comm="syz.1.4376" path="socket:[34375]" dev="sockfs" ino=34375 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2070.144201][ T29] audit: type=1400 audit(2069.550:472): avc: denied { mounton } for pid=12599 comm="syz.1.4415" path="/2197/file0" dev="tmpfs" ino=11191 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2070.334329][ T29] audit: type=1400 audit(2069.740:473): avc: denied { mount } for pid=12599 comm="syz.1.4415" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2070.449383][ T29] audit: type=1400 audit(2069.850:474): avc: denied { unmount } for pid=3344 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2075.344253][T12632] netlink: 48 bytes leftover after parsing attributes in process `syz.0.4431'. [ 2075.356095][T12632] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4431'. [ 2075.362021][T12632] netlink: 48 bytes leftover after parsing attributes in process `syz.0.4431'. [ 2080.316726][ T29] audit: type=1400 audit(2079.720:475): avc: denied { setopt } for pid=12655 comm="syz.1.4442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2087.551730][T12702] mmap: syz.1.4465 (12702) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 2089.886968][ T5862] hid_parser_main: 5 callbacks suppressed [ 2089.899366][ T5862] hid-generic 0006:0004:0009.0006: unknown main item tag 0x0 [ 2089.900174][ T5862] hid-generic 0006:0004:0009.0006: unknown main item tag 0x0 [ 2089.901151][ T5862] hid-generic 0006:0004:0009.0006: unknown main item tag 0x0 [ 2089.901439][ T5862] hid-generic 0006:0004:0009.0006: unknown main item tag 0x0 [ 2089.901703][ T5862] hid-generic 0006:0004:0009.0006: unknown main item tag 0x0 [ 2089.901983][ T5862] hid-generic 0006:0004:0009.0006: unknown main item tag 0x0 [ 2089.910079][ T5862] hid-generic 0006:0004:0009.0006: unknown main item tag 0x0 [ 2089.910700][ T5862] hid-generic 0006:0004:0009.0006: unknown main item tag 0x0 [ 2089.911073][ T5862] hid-generic 0006:0004:0009.0006: unknown main item tag 0x0 [ 2089.911412][ T5862] hid-generic 0006:0004:0009.0006: unknown main item tag 0x0 [ 2090.032005][ T5862] hid-generic 0006:0004:0009.0006: hidraw0: VIRTUAL HID v0.8e Device [syz1] on syz0 [ 2091.575720][T12716] fido_id[12716]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2093.530897][ T29] audit: type=1400 audit(2092.930:476): avc: denied { sqpoll } for pid=12737 comm="syz.1.4481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2093.546973][T12738] cgroup: fork rejected by pids controller in /syz1 [ 2095.133965][ T1106] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2095.671670][ T1106] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2095.806422][ T29] audit: type=1400 audit(2095.210:477): avc: denied { execute } for pid=12747 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2095.839413][ T29] audit: type=1400 audit(2095.240:478): avc: denied { execute_no_trans } for pid=12747 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2095.926300][ T1106] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2096.321206][ T1106] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2096.517130][ T29] audit: type=1400 audit(2095.920:479): avc: denied { execmem } for pid=12747 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2096.621465][ T29] audit: type=1400 audit(2096.030:480): avc: denied { mounton } for pid=12750 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2097.824001][ T29] audit: type=1400 audit(2097.220:481): avc: denied { read } for pid=3187 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 2099.374402][ T1106] lo: left allmulticast mode [ 2102.053563][ T1106] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2102.139730][ T1106] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2102.186250][ T1106] bond0 (unregistering): Released all slaves [ 2103.001374][ T1106] hsr_slave_0: left promiscuous mode [ 2103.032661][ T1106] hsr_slave_1: left promiscuous mode [ 2103.144454][ T1106] veth1_macvtap: left promiscuous mode [ 2103.151217][ T1106] veth0_macvtap: left promiscuous mode [ 2103.154946][ T1106] veth1_vlan: left promiscuous mode [ 2103.156643][ T1106] veth0_vlan: left promiscuous mode [ 2105.491806][ T29] audit: type=1400 audit(2104.880:482): avc: denied { write } for pid=12775 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2107.207103][ T29] audit: type=1400 audit(2106.610:483): avc: denied { write } for pid=12780 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2112.313871][ T3187] 8021q: adding VLAN 0 to HW filter on device eth1 [ 2116.013009][ T29] audit: type=1400 audit(2115.410:484): avc: denied { write } for pid=12815 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2117.682778][ T29] audit: type=1400 audit(2117.090:485): avc: denied { write } for pid=12831 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2118.963652][ T3187] 8021q: adding VLAN 0 to HW filter on device eth2 [ 2122.912743][ T29] audit: type=1400 audit(2122.320:486): avc: denied { write } for pid=12857 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2124.274291][T12750] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2124.324281][T12750] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2125.016528][ T29] audit: type=1400 audit(2124.420:487): avc: denied { write } for pid=12870 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2126.177256][ T3187] 8021q: adding VLAN 0 to HW filter on device eth4 [ 2129.074748][ T29] audit: type=1400 audit(2128.480:488): avc: denied { write } for pid=12883 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2131.030891][T12750] hsr_slave_0: entered promiscuous mode [ 2131.072305][T12750] hsr_slave_1: entered promiscuous mode [ 2131.095815][T12750] debugfs: 'hsr0' already exists in 'hsr' [ 2131.096547][T12750] Cannot create hsr debugfs directory [ 2131.140798][ T29] audit: type=1400 audit(2130.540:489): avc: denied { write } for pid=12890 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2132.514262][ T3187] 8021q: adding VLAN 0 to HW filter on device eth3 [ 2139.302184][ T29] audit: type=1400 audit(2138.680:490): avc: denied { write } for pid=12921 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2139.584972][T12750] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 2139.691902][T12750] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 2139.707074][T12750] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 2139.810830][T12750] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 2139.843314][T12750] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 2139.937569][T12750] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 2139.973292][T12750] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 2140.105613][T12750] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 2141.366300][ T29] audit: type=1400 audit(2140.770:491): avc: denied { write } for pid=12937 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2145.174855][T12750] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2146.013763][ T29] audit: type=1400 audit(2145.420:492): avc: denied { write } for pid=12953 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2147.619392][ T29] audit: type=1400 audit(2147.020:493): avc: denied { write } for pid=12967 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2149.551978][T12981] usb usb1: usbfs: process 12981 (syz.0.4548) did not claim interface 0 before use [ 2149.910423][ T29] audit: type=1400 audit(2149.320:494): avc: denied { write } for pid=12976 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2152.482499][ T29] audit: type=1400 audit(2151.890:495): avc: denied { write } for pid=12989 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2154.270559][ T29] audit: type=1400 audit(2153.670:496): avc: denied { write } for pid=12997 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2156.405501][ T29] audit: type=1400 audit(2155.810:497): avc: denied { write } for pid=13012 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2159.216010][ T29] audit: type=1400 audit(2158.620:498): avc: denied { mount } for pid=13029 comm="syz.0.4561" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2159.222557][ T29] audit: type=1400 audit(2158.620:499): avc: denied { write } for pid=13024 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2160.442745][ T29] audit: type=1400 audit(2159.850:500): avc: denied { write } for pid=13037 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2163.241235][ T29] audit: type=1400 audit(2162.640:501): avc: denied { write } for pid=13050 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2164.906221][T12750] veth0_vlan: entered promiscuous mode [ 2165.108583][ T29] audit: type=1400 audit(2164.510:502): avc: denied { write } for pid=13064 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2165.281158][T12750] veth1_vlan: entered promiscuous mode [ 2166.094572][T12750] veth0_macvtap: entered promiscuous mode [ 2166.257511][T12750] veth1_macvtap: entered promiscuous mode [ 2166.922160][ T40] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2166.925719][ T9494] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2166.930069][ T9494] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2166.942755][ T9494] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2167.815292][ T29] audit: type=1400 audit(2167.220:503): avc: denied { mounton } for pid=12750 comm="syz-executor" path="/syzkaller.nMQs5t/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 2167.867024][ T29] audit: type=1400 audit(2167.270:504): avc: denied { mount } for pid=12750 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2168.010569][ T29] audit: type=1400 audit(2167.410:505): avc: denied { mounton } for pid=12750 comm="syz-executor" path="/syzkaller.nMQs5t/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 2168.051417][ T29] audit: type=1400 audit(2167.450:506): avc: denied { mounton } for pid=12750 comm="syz-executor" path="/syzkaller.nMQs5t/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=35450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 2168.133127][ T29] audit: type=1400 audit(2167.530:507): avc: denied { unmount } for pid=12750 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 2168.157076][ T29] audit: type=1400 audit(2167.560:508): avc: denied { mounton } for pid=12750 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 2168.162892][ T29] audit: type=1400 audit(2167.570:509): avc: denied { mount } for pid=12750 comm="syz-executor" name="/" dev="gadgetfs" ino=4271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 2168.207263][ T29] audit: type=1400 audit(2167.610:510): avc: denied { mount } for pid=12750 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2168.219023][ T29] audit: type=1400 audit(2167.620:511): avc: denied { mounton } for pid=12750 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 2185.412180][ T29] audit: type=1400 audit(2184.820:512): avc: denied { setopt } for pid=13176 comm="syz.1.4621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2189.989324][ T29] audit: type=1400 audit(2189.390:513): avc: denied { connect } for pid=13209 comm="syz.0.4637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2200.421816][ T29] audit: type=1400 audit(2199.810:514): avc: denied { bind } for pid=13267 comm="syz.1.4666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2205.190304][ T29] audit: type=1400 audit(2204.580:515): avc: denied { getopt } for pid=13298 comm="syz.0.4682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2207.311599][ T29] audit: type=1400 audit(2206.720:516): avc: denied { write } for pid=13308 comm="syz.1.4686" name="arp" dev="proc" ino=4026532723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2215.888780][ T29] audit: type=1400 audit(2215.290:517): avc: denied { write } for pid=13361 comm="syz.0.4712" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2215.893194][ T29] audit: type=1400 audit(2215.300:518): avc: denied { open } for pid=13361 comm="syz.0.4712" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2215.905955][ T29] audit: type=1400 audit(2215.310:519): avc: denied { ioctl } for pid=13361 comm="syz.0.4712" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2237.665241][ T29] audit: type=1400 audit(2237.070:520): avc: denied { create } for pid=13500 comm="syz.0.4778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2237.693844][ T29] audit: type=1400 audit(2237.100:521): avc: denied { setopt } for pid=13500 comm="syz.0.4778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2237.703657][ T29] audit: type=1400 audit(2237.110:522): avc: denied { connect } for pid=13500 comm="syz.0.4778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2238.080931][ T29] audit: type=1400 audit(2237.490:523): avc: denied { setopt } for pid=13502 comm="syz.0.4779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2249.974111][T13570] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13570 comm=syz.0.4811 [ 2250.642060][ T29] audit: type=1400 audit(2250.040:524): avc: denied { checkpoint_restore } for pid=13571 comm="syz.0.4812" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2266.391802][ T29] audit: type=1400 audit(2265.800:525): avc: denied { name_bind } for pid=13675 comm="syz.0.4862" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2266.393988][ T29] audit: type=1400 audit(2265.800:526): avc: denied { node_bind } for pid=13675 comm="syz.0.4862" saddr=255.255.255.255 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2273.817526][ T29] audit: type=1400 audit(2273.220:527): avc: denied { read } for pid=13731 comm="syz.0.4889" path="socket:[37580]" dev="sockfs" ino=37580 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2273.999366][ T29] audit: type=1400 audit(2273.400:528): avc: denied { read append } for pid=13733 comm="syz.1.4890" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2274.041360][ T29] audit: type=1400 audit(2273.450:529): avc: denied { open } for pid=13733 comm="syz.1.4890" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2274.057233][ T29] audit: type=1400 audit(2273.460:530): avc: denied { write } for pid=13733 comm="syz.1.4890" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2274.068490][ T29] audit: type=1400 audit(2273.470:531): avc: denied { ioctl } for pid=13733 comm="syz.1.4890" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2292.651875][ T29] audit: type=1400 audit(2292.050:532): avc: denied { ioctl } for pid=13835 comm="syz.1.4937" path="socket:[38639]" dev="sockfs" ino=38639 ioctlcmd=0x54da scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2296.653378][ T29] audit: type=1400 audit(2296.060:533): avc: denied { listen } for pid=13865 comm="syz.0.4951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2296.707061][ T29] audit: type=1400 audit(2296.100:534): avc: denied { accept } for pid=13865 comm="syz.0.4951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2308.757505][ T29] audit: type=1400 audit(2308.160:535): avc: denied { setattr } for pid=13935 comm="syz.1.4986" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 2333.934759][ T29] audit: type=1400 audit(2333.340:536): avc: denied { write } for pid=14047 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2336.399457][ T29] audit: type=1400 audit(2335.800:537): avc: denied { write } for pid=14063 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2337.002891][ T29] audit: type=1400 audit(2336.400:538): avc: denied { create } for pid=14070 comm="syz.1.5048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2337.069734][ T29] audit: type=1400 audit(2336.470:539): avc: denied { connect } for pid=14070 comm="syz.1.5048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2337.753284][ T29] audit: type=1400 audit(2337.160:540): avc: denied { write } for pid=14075 comm="syz.1.5051" laddr=::1 lport=58 faddr=::1 fport=136 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2349.258601][ T29] audit: type=1400 audit(2348.650:541): avc: denied { map } for pid=14147 comm="syz.0.5087" path="socket:[40196]" dev="sockfs" ino=40196 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 2359.772856][T14214] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5119'. [ 2359.774567][T14214] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5119'. [ 2363.565604][ T29] audit: type=1400 audit(2362.970:542): avc: denied { nlmsg_write } for pid=14233 comm="syz.0.5130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2363.606101][T14235] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=14235 comm=syz.0.5130 [ 2365.224082][ T29] audit: type=1400 audit(2364.620:543): avc: denied { mount } for pid=14246 comm="syz.0.5136" name="/" dev="pstore" ino=2441 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 2377.343415][ T29] audit: type=1400 audit(2376.750:544): avc: denied { write } for pid=14321 comm="syz.0.5172" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 2378.521815][ T29] audit: type=1400 audit(2377.930:545): avc: denied { write } for pid=14327 comm="syz.0.5176" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 2378.651676][ T1106] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2379.183203][ T1106] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2379.818812][ T1106] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2380.433896][ T1106] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2384.819142][ T29] audit: type=1400 audit(2384.220:546): avc: denied { ioctl } for pid=14353 comm="syz.0.5186" path="socket:[40675]" dev="sockfs" ino=40675 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2385.359236][ T29] audit: type=1400 audit(2384.760:547): avc: denied { getopt } for pid=14353 comm="syz.0.5186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2386.073510][ T1106] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2386.156434][ T1106] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2386.221972][ T1106] bond0 (unregistering): Released all slaves [ 2386.770672][ T1106] hsr_slave_0: left promiscuous mode [ 2386.806907][ T1106] hsr_slave_1: left promiscuous mode [ 2386.982134][ T1106] veth1_macvtap: left promiscuous mode [ 2386.984542][ T1106] veth0_macvtap: left promiscuous mode [ 2386.985795][ T1106] veth1_vlan: left promiscuous mode [ 2386.986344][ T1106] veth0_vlan: left promiscuous mode [ 2395.410756][ T29] audit: type=1400 audit(2394.810:548): avc: denied { write } for pid=14366 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2396.569778][ T29] audit: type=1400 audit(2395.960:549): avc: denied { write } for pid=14375 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2397.624919][ T3187] 8021q: adding VLAN 0 to HW filter on device eth1 [ 2401.405104][ T29] audit: type=1400 audit(2400.790:550): avc: denied { write } for pid=14404 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2402.945144][ T29] audit: type=1400 audit(2402.350:551): avc: denied { write } for pid=14415 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2403.215057][ T29] audit: type=1400 audit(2402.620:552): avc: denied { write } for pid=14418 comm="syz.0.5202" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2404.209520][T14332] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2404.230800][ T3187] 8021q: adding VLAN 0 to HW filter on device eth2 [ 2404.342853][T14332] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2408.082521][ T29] audit: type=1400 audit(2407.490:553): avc: denied { write } for pid=14439 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2409.563680][ T29] audit: type=1400 audit(2408.970:554): avc: denied { write } for pid=14448 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2410.754271][ T3187] 8021q: adding VLAN 0 to HW filter on device eth3 [ 2410.901601][T14332] hsr_slave_0: entered promiscuous mode [ 2410.919225][T14332] hsr_slave_1: entered promiscuous mode [ 2410.923137][T14332] debugfs: 'hsr0' already exists in 'hsr' [ 2410.923826][T14332] Cannot create hsr debugfs directory [ 2413.756222][ T29] audit: type=1400 audit(2413.160:555): avc: denied { write } for pid=14461 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2414.516762][T14332] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2414.642988][T14332] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 2414.665767][T14332] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2414.774437][T14332] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 2414.807208][T14332] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2414.937566][T14332] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 2415.007125][T14332] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2415.074595][ T29] audit: type=1400 audit(2414.480:556): avc: denied { write } for pid=14465 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2415.104970][T14332] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 2416.489299][ T3187] 8021q: adding VLAN 0 to HW filter on device eth4 [ 2421.663232][T14332] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2423.195309][ T29] audit: type=1400 audit(2422.600:557): avc: denied { write } for pid=14498 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2424.807201][ T29] audit: type=1400 audit(2424.210:558): avc: denied { write } for pid=14511 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2432.409821][ T29] audit: type=1400 audit(2431.800:559): avc: denied { write } for pid=14549 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2432.975759][ T29] audit: type=1400 audit(2432.380:560): avc: denied { watch } for pid=14559 comm="syz.0.5234" path="/proc/5524" dev="proc" ino=41083 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 2434.055141][ T29] audit: type=1400 audit(2433.460:561): avc: denied { write } for pid=14563 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2437.369900][ T29] audit: type=1400 audit(2436.770:562): avc: denied { write } for pid=14578 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2437.910787][T14589] SELinux: syz.0.5241 (14589) wrote to user. This is no longer supported. [ 2438.723796][ T29] audit: type=1400 audit(2438.100:563): avc: denied { write } for pid=14590 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2442.355739][T14332] veth0_vlan: entered promiscuous mode [ 2442.505644][T14332] veth1_vlan: entered promiscuous mode [ 2442.947153][T14332] veth0_macvtap: entered promiscuous mode [ 2443.086151][T14332] veth1_macvtap: entered promiscuous mode [ 2443.870749][ T5248] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2443.871944][ T5248] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2443.872549][ T5248] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2443.872955][ T5248] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2445.435665][ T29] audit: type=1400 audit(2444.840:564): avc: denied { write } for pid=14615 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2447.559548][ T29] audit: type=1400 audit(2446.960:565): avc: denied { write } for pid=14628 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2471.947186][ T29] audit: type=1400 audit(2471.350:566): avc: denied { ioctl } for pid=14778 comm="syz.0.5323" path="socket:[41420]" dev="sockfs" ino=41420 ioctlcmd=0x1275 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2477.292411][ T29] audit: type=1400 audit(2476.700:567): avc: denied { nlmsg_read } for pid=14805 comm="syz.0.5337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2477.294049][T14807] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=14807 comm=syz.0.5337 [ 2479.580057][ T29] audit: type=1400 audit(2478.990:568): avc: denied { setopt } for pid=14821 comm="syz.0.5344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2479.600217][ T29] audit: type=1400 audit(2479.000:569): avc: denied { bind } for pid=14821 comm="syz.0.5344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2479.608485][ T29] audit: type=1400 audit(2479.010:570): avc: denied { node_bind } for pid=14821 comm="syz.0.5344" saddr=172.30.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 2500.504288][ T29] audit: type=1400 audit(2499.910:571): avc: denied { getattr } for pid=14949 comm="syz.2.5407" name="/" dev="pidfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2506.985343][ T29] audit: type=1400 audit(2506.390:572): avc: denied { accept } for pid=14988 comm="syz.2.5426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2511.595715][ T29] audit: type=1400 audit(2511.000:573): avc: denied { wake_alarm } for pid=15017 comm="syz.2.5440" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2511.623964][ T29] audit: type=1400 audit(2511.030:574): avc: denied { read } for pid=15017 comm="syz.2.5440" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2511.640886][ T29] audit: type=1400 audit(2511.040:575): avc: denied { open } for pid=15017 comm="syz.2.5440" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2524.519419][ T29] audit: type=1400 audit(2523.920:576): avc: denied { write } for pid=15087 comm="syz.2.5474" name="userio" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2536.816583][ T29] audit: type=1400 audit(2536.220:577): avc: denied { read } for pid=15185 comm="syz.0.5521" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2542.537080][ T29] audit: type=1400 audit(2541.940:578): avc: denied { append } for pid=15220 comm="syz.0.5538" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2542.544456][T15221] random: crng reseeded on system resumption [ 2542.551402][ T29] audit: type=1400 audit(2541.940:579): avc: denied { open } for pid=15220 comm="syz.0.5538" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2542.789203][ T29] audit: type=1400 audit(2542.190:580): avc: denied { ioctl } for pid=15220 comm="syz.0.5538" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x330e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2562.395756][ T29] audit: type=1400 audit(2561.800:581): avc: denied { append } for pid=15343 comm="syz.2.5598" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 2562.399266][ T29] audit: type=1400 audit(2561.800:582): avc: denied { open } for pid=15343 comm="syz.2.5598" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 2565.487130][ T29] audit: type=1400 audit(2564.890:583): avc: denied { relabelfrom } for pid=15364 comm="syz.2.5609" name="NETLINK" dev="sockfs" ino=44384 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2565.492104][ T29] audit: type=1400 audit(2564.890:584): avc: denied { relabelto } for pid=15364 comm="syz.2.5609" name="NETLINK" dev="sockfs" ino=44384 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_tcpdiag_socket permissive=1 [ 2567.076904][ T29] audit: type=1400 audit(2566.470:585): avc: denied { ioctl } for pid=15378 comm="syz.2.5615" path="socket:[43558]" dev="sockfs" ino=43558 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2581.570696][ T29] audit: type=1400 audit(2580.970:586): avc: denied { setattr } for pid=15467 comm="syz.2.5657" name="timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 2581.663706][ T29] audit: type=1400 audit(2581.060:587): avc: denied { read } for pid=15468 comm="syz.0.5658" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2586.520639][ T29] audit: type=1400 audit(2585.930:588): avc: denied { bind } for pid=15495 comm="syz.0.5670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2598.332666][ T29] audit: type=1400 audit(2597.740:589): avc: denied { append } for pid=15577 comm="syz.0.5710" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2607.754058][ T29] audit: type=1400 audit(2607.160:590): avc: denied { write } for pid=15630 comm="syz.2.5736" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 2627.383149][ T29] audit: type=1400 audit(2626.780:591): avc: denied { mount } for pid=15737 comm="syz.2.5789" name="/" dev="hugetlbfs" ino=45192 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 2627.384262][ T29] audit: type=1400 audit(2626.780:592): avc: denied { remount } for pid=15737 comm="syz.2.5789" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 2627.580984][ T29] audit: type=1400 audit(2626.990:593): avc: denied { unmount } for pid=14332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 2633.252652][ T29] audit: type=1400 audit(2632.660:594): avc: denied { unmount } for pid=15776 comm="syz.2.5806" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2643.506681][ T29] audit: type=1400 audit(2642.910:595): avc: denied { write } for pid=15827 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2645.202045][ T29] audit: type=1400 audit(2644.610:596): avc: denied { write } for pid=15841 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2647.077217][ T29] audit: type=1107 audit(2646.480:597): pid=15854 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 2647.086264][ T29] audit: type=1107 audit(2646.490:598): pid=15854 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='TĘ3' [ 2657.171858][ T29] audit: type=1400 audit(2656.580:599): avc: denied { write } for pid=15918 comm="syz.2.5873" path="socket:[45468]" dev="sockfs" ino=45468 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2657.590278][ T29] audit: type=1400 audit(2656.980:600): avc: denied { ioctl } for pid=15920 comm="syz.0.5874" path="socket:[45475]" dev="sockfs" ino=45475 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2657.662561][T15922] 8021q: VLANs not supported on wg1 [ 2664.915706][ T29] audit: type=1400 audit(2664.320:601): avc: denied { read } for pid=15980 comm="syz.2.5904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2671.951654][ T29] audit: type=1400 audit(2671.360:602): avc: denied { write } for pid=16028 comm="syz.2.5928" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2675.520688][ T29] audit: type=1400 audit(2674.920:603): avc: denied { ioctl } for pid=16051 comm="syz.0.5939" path="socket:[45679]" dev="sockfs" ino=45679 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2679.762276][ T29] audit: type=1400 audit(2679.170:604): avc: denied { read } for pid=16076 comm="syz.2.5952" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2686.556801][ T29] audit: type=1400 audit(2685.960:605): avc: denied { ioctl } for pid=16111 comm="syz.0.5969" path="socket:[45784]" dev="sockfs" ino=45784 ioctlcmd=0x89b0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2696.609131][ T29] audit: type=1400 audit(2696.010:606): avc: denied { setopt } for pid=16171 comm="syz.0.5997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2699.812105][T14893] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 2700.059923][T14893] usb 1-1: Using ep0 maxpacket: 16 [ 2700.179729][T14893] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 2700.180789][T14893] usb 1-1: New USB device found, idVendor=28bd, idProduct=0042, bcdDevice= 0.00 [ 2700.181390][T14893] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2700.276778][T14893] usb 1-1: config 0 descriptor?? [ 2701.049602][T14893] usbhid 1-1:0.0: can't add hid device: -71 [ 2701.051048][T14893] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 2701.270421][T14893] usb 1-1: USB disconnect, device number 6 [ 2727.064440][ T29] audit: type=1400 audit(2726.470:607): avc: denied { getopt } for pid=16331 comm="syz.2.6074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2731.884909][T16358] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2731.921101][T16358] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2733.502853][ T29] audit: type=1400 audit(2732.910:608): avc: denied { ioctl } for pid=16369 comm="syz.0.6092" path="uts:[4026532622]" dev="nsfs" ino=4026532622 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2736.921735][T16388] loop2: detected capacity change from 0 to 8 [ 2745.479490][ T29] audit: type=1400 audit(2744.880:609): avc: denied { watch } for pid=16430 comm="syz.0.6122" path="/sys/kernel/rcu_expedited" dev="sysfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 2745.480358][ T29] audit: type=1400 audit(2744.880:610): avc: denied { watch_sb watch_reads } for pid=16430 comm="syz.0.6122" path="/sys/kernel/rcu_expedited" dev="sysfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=file permissive=1 [ 2755.557201][ T29] audit: type=1400 audit(2754.950:611): avc: denied { write } for pid=16491 comm="syz.2.6151" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2765.303729][ T29] audit: type=1400 audit(2764.710:612): avc: denied { mount } for pid=16554 comm="syz.2.6183" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 2765.365176][ T29] audit: type=1400 audit(2764.770:613): avc: denied { remount } for pid=16554 comm="syz.2.6183" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 2765.529915][ T29] audit: type=1400 audit(2764.910:614): avc: denied { unmount } for pid=14332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 2772.549565][ T29] audit: type=1400 audit(2771.950:615): avc: denied { append } for pid=16597 comm="syz.0.6203" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 2776.552296][ T29] audit: type=1400 audit(2775.950:616): avc: denied { read append } for pid=16619 comm="syz.2.6213" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2776.573593][ T29] audit: type=1400 audit(2775.980:617): avc: denied { open } for pid=16619 comm="syz.2.6213" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2776.640381][ T29] audit: type=1400 audit(2776.030:618): avc: denied { ioctl } for pid=16619 comm="syz.2.6213" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x6615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2781.577228][ T29] audit: type=1400 audit(2780.980:619): avc: denied { read write } for pid=16646 comm="syz.0.6226" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 2783.783141][ T29] audit: type=1400 audit(2783.190:620): avc: denied { map } for pid=16660 comm="syz.0.6233" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2787.745043][T16691] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16691 comm=syz.0.6248 [ 2797.037189][ T29] audit: type=1400 audit(2796.440:621): avc: denied { ioctl } for pid=16756 comm="syz.2.6281" path="/dev/usbmon0" dev="devtmpfs" ino=697 ioctlcmd=0x9207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2809.249239][ T29] audit: type=1400 audit(2808.650:622): avc: denied { write } for pid=16813 comm="syz.0.6308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2814.766875][T16814] infiniband syz2: set active [ 2814.771454][T16814] infiniband syz2: added bond0 [ 2814.811978][T16814] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 2814.854109][T16814] infiniband syz2: Couldn't open port 1 [ 2815.072774][T16814] RDS/IB: syz2: added [ 2815.083979][T16814] smc: adding ib device syz2 with port count 1 [ 2815.090009][T16814] smc: ib device syz2 port 1 has no pnetid [ 2823.017233][ T29] audit: type=1400 audit(2822.420:623): avc: denied { write } for pid=16859 comm="syz.2.6330" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2846.169709][T16980] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16980 comm=syz.0.6387 [ 2856.553932][ T29] audit: type=1400 audit(2855.950:624): avc: denied { watch watch_reads } for pid=17040 comm="syz.0.6418" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=49366 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2884.214371][T17198] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=17198 comm=syz.0.6491 [ 2894.797530][T17241] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=17241 comm=syz.2.6512 [ 2896.899682][ T29] audit: type=1400 audit(2896.300:625): avc: denied { mount } for pid=17248 comm="syz.0.6517" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 2902.459458][ T29] audit: type=1400 audit(2901.860:626): avc: denied { create } for pid=17289 comm="syz.2.6533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2925.181415][ T29] audit: type=1400 audit(2924.580:627): avc: denied { setopt } for pid=17423 comm="syz.0.6600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2962.667588][T17606] syz.0.6687: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 2962.694155][T17606] CPU: 1 UID: 0 PID: 17606 Comm: syz.0.6687 Tainted: G L syzkaller #0 PREEMPT [ 2962.694447][T17606] Tainted: [L]=SOFTLOCKUP [ 2962.694555][T17606] Hardware name: linux,dummy-virt (DT) [ 2962.695023][T17606] Call trace: [ 2962.695299][T17606] show_stack+0x18/0x24 (C) [ 2962.695595][T17606] dump_stack_lvl+0x7c/0xb0 [ 2962.695717][T17606] dump_stack+0x1c/0x28 [ 2962.695813][T17606] warn_alloc+0x1c8/0x320 [ 2962.695931][T17606] __vmalloc_node_range_noprof+0xc34/0x1124 [ 2962.696005][T17606] vmalloc_user_noprof+0xe4/0x128 [ 2962.696091][T17606] xskq_create+0xd4/0x180 [ 2962.696205][T17606] xsk_setsockopt+0x374/0x62c [ 2962.696260][T17606] do_sock_setsockopt+0x178/0x35c [ 2962.696323][T17606] __sys_setsockopt+0xc8/0x160 [ 2962.696426][T17606] __arm64_sys_setsockopt+0xa4/0x100 [ 2962.696510][T17606] invoke_syscall+0x74/0x240 [ 2962.696569][T17606] el0_svc_common.constprop.0+0xac/0x230 [ 2962.696636][T17606] do_el0_svc+0x40/0x58 [ 2962.696723][T17606] el0_svc+0x58/0x2a4 [ 2962.696783][T17606] el0t_64_sync_handler+0xa0/0xe4 [ 2962.696902][T17606] el0t_64_sync+0x198/0x19c [ 2962.715185][T17606] Mem-Info: [ 2962.729944][T17606] active_anon:5720 inactive_anon:0 isolated_anon:0 [ 2962.729944][T17606] active_file:13532 inactive_file:2967 isolated_file:0 [ 2962.729944][T17606] unevictable:768 dirty:15 writeback:0 [ 2962.729944][T17606] slab_reclaimable:7257 slab_unreclaimable:33488 [ 2962.729944][T17606] mapped:2820 shmem:824 pagetables:612 [ 2962.729944][T17606] sec_pagetables:0 bounce:0 [ 2962.729944][T17606] kernel_misc_reclaimable:0 [ 2962.729944][T17606] free:284575 free_pcp:6808 free_cma:8128 [ 2962.730954][T17606] Node 0 active_anon:22880kB inactive_anon:0kB active_file:54128kB inactive_file:11868kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:11280kB dirty:60kB writeback:0kB shmem:3296kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:6240kB pagetables:2448kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB gpu_active:0kB gpu_reclaim:0kB [ 2962.731394][T17606] Node 0 DMA free:1138300kB boost:0kB min:22528kB low:28160kB high:33792kB reserved_highatomic:0KB free_highatomic:0KB active_anon:22880kB inactive_anon:0kB active_file:54128kB inactive_file:11868kB unevictable:3072kB writepending:60kB zspages:0kB present:2097152kB managed:1524804kB mlocked:0kB bounce:0kB free_pcp:27232kB local_pcp:13728kB free_cma:32512kB [ 2962.732175][T17606] lowmem_reserve[]: 0 0 0 0 0 [ 2962.732839][T17606] Node 0 DMA: 3191*4kB (UME) 1636*8kB (UM) 1108*16kB (UM) 246*32kB (UM) 62*64kB (UME) 30*128kB (UM) 55*256kB (UMC) 74*512kB (UEC) 43*1024kB (UMC) 10*2048kB (UEC) 235*4096kB (UMC) = 1138300kB [ 2962.734409][T17606] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 2962.734490][T17606] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=32768kB [ 2962.734532][T17606] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 2962.734626][T17606] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=64kB [ 2962.734756][T17606] 17321 total pagecache pages [ 2962.734953][T17606] 0 pages in swap cache [ 2962.735072][T17606] Free swap = 124996kB [ 2962.735131][T17606] Total swap = 124996kB [ 2962.735277][T17606] 524288 pages RAM [ 2962.735318][T17606] 0 pages HighMem/MovableOnly [ 2962.735357][T17606] 143087 pages reserved [ 2962.735393][T17606] 8192 pages cma reserved [ 2962.735446][T17606] 0 pages hwpoisoned [ 2969.129643][ T29] audit: type=1400 audit(2968.540:628): avc: denied { read } for pid=17639 comm="syz.0.6705" path="socket:[52267]" dev="sockfs" ino=52267 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2984.844408][ T29] audit: type=1400 audit(2984.250:629): avc: denied { append } for pid=17718 comm="syz.2.6741" name="loop5" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 3001.846488][T17802] binfmt_misc: register: failed to install interpreter file ./file0/file0 [ 3009.876607][ T29] audit: type=1400 audit(3009.280:630): avc: denied { mount } for pid=17845 comm="syz.2.6803" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 3009.961428][ T29] audit: type=1400 audit(3009.360:631): avc: denied { remount } for pid=17845 comm="syz.2.6803" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 3010.200218][ T29] audit: type=1400 audit(3009.600:632): avc: denied { unmount } for pid=14332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 3057.327489][T18060] Injecting memory failure for pfn 0x5f172 at process virtual address 0x20000000 [ 3057.468359][T18060] Memory failure: 0x5f172: Sending SIGBUS to syz.2.6905:18060 due to hardware memory corruption [ 3057.473193][T18060] Memory failure: 0x5f172: recovery action for dirty LRU page: Recovered [ 3057.479924][T18060] Injecting memory failure for pfn 0x49519 at process virtual address 0x20001000 [ 3057.484567][T18060] Memory failure: 0x49519: unhandlable page. [ 3057.492321][T18060] Memory failure: 0x49519: recovery action for get hwpoison page: Ignored [ 3062.036070][T18088] netlink: 48 bytes leftover after parsing attributes in process `syz.0.6918'. [ 3063.939754][ T29] audit: type=1400 audit(3063.330:633): avc: denied { ioctl } for pid=18096 comm="syz.2.6923" path="socket:[53281]" dev="sockfs" ino=53281 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3072.001863][ T29] audit: type=1400 audit(3071.410:634): avc: denied { watch_mount watch_reads } for pid=18139 comm="syz.2.6944" path="/818/file0" dev="tmpfs" ino=4174 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3093.297607][ T29] audit: type=1400 audit(3092.660:635): avc: denied { compute_member } for pid=18229 comm="syz.0.6987" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 3099.035723][ T29] audit: type=1400 audit(3098.430:636): avc: denied { read } for pid=18261 comm="syz.0.7002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3103.470526][T18287] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18287 comm=syz.2.7014 [ 3118.950605][T18391] SELinux: syz.0.7037 (18391) wrote to checkreqprot. This is no longer supported. [ 3133.532643][ T29] audit: type=1400 audit(3132.940:637): avc: denied { remount } for pid=18454 comm="syz.2.7069" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 3133.607640][ T29] audit: type=1400 audit(3133.010:638): avc: denied { unmount } for pid=14332 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 3162.531017][ T29] audit: type=1400 audit(3161.940:639): avc: denied { setattr } for pid=18610 comm="syz.0.7144" name="ptmx" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 3164.543660][ T29] audit: type=1400 audit(3163.950:640): avc: denied { getopt } for pid=18622 comm="syz.0.7150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3171.532885][ T29] audit: type=1400 audit(3170.940:641): avc: denied { append } for pid=18658 comm="syz.2.7168" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 3177.037581][T18684] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3177.116706][T18684] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3178.673407][ T29] audit: type=1400 audit(3178.070:642): avc: denied { watch } for pid=18691 comm="syz.0.7184" path="/3710/file1" dev="tmpfs" ino=18872 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3178.686932][ T29] audit: type=1400 audit(3178.070:643): avc: denied { watch_sb } for pid=18691 comm="syz.0.7184" path="/3710/file1" dev="tmpfs" ino=18872 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3193.292145][ T29] audit: type=1400 audit(3192.670:644): avc: denied { mount } for pid=18769 comm="syz.0.7221" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 3193.330315][ T29] audit: type=1400 audit(3192.720:645): avc: denied { remount } for pid=18769 comm="syz.0.7221" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 3193.541623][ T29] audit: type=1400 audit(3192.930:646): avc: denied { unmount } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 3222.005794][ T29] audit: type=1400 audit(3221.380:647): avc: denied { write } for pid=18936 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3223.484809][ T29] audit: type=1400 audit(3222.890:648): avc: denied { write } for pid=18951 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3225.415952][ T29] audit: type=1400 audit(3224.810:649): avc: denied { watch } for pid=18963 comm="syz.0.7312" path="/dev/tty20" dev="devtmpfs" ino=39 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 3225.423980][ T29] audit: type=1400 audit(3224.820:650): avc: denied { watch_sb watch_reads } for pid=18963 comm="syz.0.7312" path="/dev/tty20" dev="devtmpfs" ino=39 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 3242.689272][ T29] audit: type=1400 audit(3242.090:651): avc: denied { execute } for pid=19064 comm="syz.0.7359" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=56551 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 3246.469336][ T29] audit: type=1400 audit(3245.870:652): avc: denied { shutdown } for pid=19091 comm="syz.0.7372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3250.114200][ T29] audit: type=1400 audit(3249.510:653): avc: denied { ioctl } for pid=19122 comm="syz.0.7387" path="socket:[56669]" dev="sockfs" ino=56669 ioctlcmd=0x8927 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3252.006565][ T29] audit: type=1400 audit(3251.410:654): avc: denied { append } for pid=19132 comm="syz.0.7391" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3254.797262][ T29] audit: type=1400 audit(3254.200:655): avc: denied { read } for pid=19151 comm="syz.2.7399" path="socket:[56045]" dev="sockfs" ino=56045 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3266.023550][ T29] audit: type=1400 audit(3265.430:656): avc: denied { mount } for pid=19237 comm="syz.0.7440" name="/" dev="ramfs" ino=56849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 3266.172645][ T29] audit: type=1400 audit(3265.570:657): avc: denied { unmount } for pid=3343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 3266.963259][T18377] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3267.426455][T18377] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3267.813812][T18377] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3268.157226][T18377] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3272.739443][T18362] smc: removing ib device syz2 [ 3272.985877][T18377] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3273.105398][T18377] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3273.235365][T18377] bond0 (unregistering): Released all slaves [ 3279.028871][ T29] audit: type=1400 audit(3278.430:658): avc: denied { write } for pid=19287 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3281.535336][ T29] audit: type=1400 audit(3280.940:659): avc: denied { write } for pid=19300 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3282.844164][ T3187] 8021q: adding VLAN 0 to HW filter on device eth5 [ 3284.209965][T18377] unregister_netdevice: waiting for bond0 to become free. Usage count = 2 [ 3284.212779][T18377] ref_tracker: netdev@00000000730e6ca2 has 1/1 users at [ 3284.212779][T18377] ib_device_set_netdev+0x1c8/0x5b8 [ 3284.212779][T18377] rxe_register_device+0x208/0x300 [ 3284.212779][T18377] rxe_add+0xd78/0x1118 [ 3284.212779][T18377] rxe_net_add+0x9c/0x100 [ 3284.212779][T18377] rxe_newlink+0x80/0x148 [ 3284.212779][T18377] nldev_newlink+0x278/0x490 [ 3284.212779][T18377] rdma_nl_rcv_msg+0x288/0x594 [ 3284.212779][T18377] rdma_nl_rcv_skb.constprop.0.isra.0+0x1fc/0x340 [ 3284.212779][T18377] rdma_nl_rcv+0x10/0x20 [ 3284.212779][T18377] netlink_unicast+0x40c/0x6d0 [ 3284.212779][T18377] netlink_sendmsg+0x638/0xa4c [ 3284.212779][T18377] __sock_sendmsg+0xc8/0x174 [ 3284.212779][T18377] ____sys_sendmsg+0x524/0x730 [ 3284.212779][T18377] ___sys_sendmsg+0x124/0x1a4 [ 3284.212779][T18377] __sys_sendmsg+0x118/0x1a4 [ 3284.212779][T18377] __arm64_sys_sendmsg+0x70/0xa0 [ 3284.212779][T18377] [ 3284.300347][ T29] audit: type=1400 audit(3283.670:660): avc: denied { read } for pid=3142 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3284.324245][ T29] audit: type=1400 audit(3283.710:661): avc: denied { write } for pid=3337 comm="syz-executor" path="pipe:[3298]" dev="pipefs" ino=3298 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 3284.325184][ T29] audit: type=1400 audit(3283.720:662): avc: denied { search } for pid=3142 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 3284.407175][ T29] audit: type=1400 audit(3283.810:663): avc: denied { write search } for pid=3142 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3284.409673][ T29] audit: type=1400 audit(3283.810:664): avc: denied { add_name } for pid=3142 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3284.450839][ T29] audit: type=1400 audit(3283.830:665): avc: denied { create } for pid=3142 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3284.451692][ T29] audit: type=1400 audit(3283.840:666): avc: denied { append open } for pid=3142 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3284.452022][ T29] audit: type=1400 audit(3283.840:667): avc: denied { getattr } for pid=3142 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3288.662036][ T29] audit: type=1400 audit(3288.060:668): avc: denied { write } for pid=19316 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3289.783812][ T29] audit: type=1400 audit(3289.190:669): avc: denied { write } for pid=19319 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3290.739493][T18377] hsr_slave_0: left promiscuous mode [ 3290.759995][T18377] hsr_slave_1: left promiscuous mode [ 3290.862875][T18377] veth1_macvtap: left promiscuous mode [ 3290.865240][T18377] veth0_macvtap: left promiscuous mode [ 3290.867355][T18377] veth1_vlan: left promiscuous mode [ 3290.871958][T18377] veth0_vlan: left promiscuous mode [ 3295.666821][ T3187] 8021q: adding VLAN 0 to HW filter on device eth6 [ 3296.654199][T18377] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3296.976672][T18377] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3297.423590][T18377] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3297.464382][ T29] audit: type=1400 audit(3296.870:670): avc: denied { write } for pid=19325 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3297.775648][T18377] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3298.299744][ T29] audit: type=1400 audit(3297.700:671): avc: denied { write } for pid=19328 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3301.925163][T18377] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3301.996659][T18377] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3302.051875][T18377] bond0 (unregistering): Released all slaves [ 3302.194787][ T3187] 8021q: adding VLAN 0 to HW filter on device eth7 [ 3302.506267][T18377] hsr_slave_0: left promiscuous mode [ 3302.531460][T18377] hsr_slave_1: left promiscuous mode [ 3302.599896][T18377] veth1_macvtap: left promiscuous mode [ 3302.600644][T18377] veth0_macvtap: left promiscuous mode [ 3302.603548][T18377] veth1_vlan: left promiscuous mode [ 3302.604442][T18377] veth0_vlan: left promiscuous mode [ 3309.185134][ T29] audit: type=1400 audit(3308.590:672): avc: denied { write } for pid=19339 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3309.779401][ T29] audit: type=1400 audit(3309.180:673): avc: denied { write } for pid=19342 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3310.208627][ T3187] 8021q: adding VLAN 0 to HW filter on device eth8 [ 3311.443247][ T29] audit: type=1400 audit(3310.850:674): avc: denied { write } for pid=19346 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3312.106238][ T29] audit: type=1400 audit(3311.510:675): avc: denied { write } for pid=19349 comm="rm" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3312.647060][ T3187] 8021q: adding VLAN 0 to HW filter on device eth9 [ 3313.876887][ T29] audit: type=1400 audit(3313.280:676): avc: denied { write } for pid=19353 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=666 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1